Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, ICM, CQ, NV (Joint) |
2019-11-21 09:55 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Investigation of influence on network performance by position of Selfish node on MANET Atuya Misaki, Bista B Bhed, Kanayo Ogura, Toyoo Takata (Iwate Prefectural Univ.) NS2019-120 |
In MANET, the presence of the selfish node is known to have a significant effect on network performance. In the research... [more] |
NS2019-120 pp.1-6 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 10:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Visual Analytics for Anomaly Classification in LAN Based on Deep Convolutional Neural Network Yuwei Sun, Hideya Ochiai, Hiroshi Esaki (UTokyo) NS2019-121 |
Recently, the attack monitored in Local Area Network (LAN) is surging. There are some methods being used to analyze the ... [more] |
NS2019-121 pp.7-12 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 10:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Investigation of The Effect of Using Attribute Information in Network Traffic Prediction with Deep Learning Yusuke Tokuyama, Yukinobu Fukushima, Yuya Tarutani, Tokumi Yokohira (Okayama Univ.) NS2019-122 |
It is crucial for network operators to predict network traffic in the future as accurate as possible for appropriate res... [more] |
NS2019-122 pp.13-18 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 09:30 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Risk Evaluation of Block Diffusion Delaying Attacks in a Bitcoin Network Masanari Yamamoto, Masahiro Sasabe, Shoji Kasahara (NAIST) CQ2019-88 |
In the Bitcoin system,transactions and their collections, i.e., blocks, are distributed over a Peer-to-Peer (P2P) networ... [more] |
CQ2019-88 pp.1-6 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 09:55 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Deep Neural Network Based Distortion Compensation for Doherty Amplifiers Yoshimasa Egashira, Reina Hongyo, Keiichi Yamaguchi (Toshiba) CQ2019-89 |
The problem with Doherty amplifiers, which are high-efficiency power amplifiers, is the occurrence of complex memory dis... [more] |
CQ2019-89 pp.7-12 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 10:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Proposal of access control scheme for straight routing in drone relay networks Taisei Hayashi, Isamu Shitara, Takefumi Hiraguri, Tsutomu Mitsui (NIT), Kentaro Nishimori (Niigata Univ.) CQ2019-91 |
In order to realize the wide area communications, the drone mesh networks has been proposed in which drones constructs t... [more] |
CQ2019-91 pp.17-20 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 10:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Virtual Edge: A Method to Edge Selection for Task Offloading in VANETs Narisu Cha, Celimuge Wu, Tsutomu Yoshinaga (UEC) CQ2019-104 |
Edge computing can reduce service latency through task offloading. Since computational resources on the edge of the netw... [more] |
CQ2019-104 pp.89-94 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123 |
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] |
NS2019-123 pp.19-25 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Analysis of UTM traffic log using LLL algorithm Takuya Morita, Hikofumi Suzuki, Hiroyuki Okazaki (Shinshu Univ.) NS2019-124 |
In recent years, with the spread of information communication equipment and the development of the Internet, various ser... [more] |
NS2019-124 pp.27-30 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 12:10 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Blockchain simulation against network routing attacks Kazuma Matsuoka, Tsunehiko Suzuki (Chukyo Univ.) NS2019-125 |
We re-implemented a Ruby library "VITOCHA", which can be used for programming virtual networks, using Python. The librar... [more] |
NS2019-125 pp.31-35 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
A Silent Anomaly Detection Approach Using Machine Learning in Mobile Access Networks Akihiro Shiozu, Masatomo Suzuki, Seiji Shibata, Yuichi Suwa (DOCOMO Technology,Inc.) ICM2019-21 |
[more] |
ICM2019-21 pp.1-6 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:45 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
An adaptive interval adajustment method for an agent-based monitoring system Masaru Sakai, Kensuke Takahashi, Satoshi Kondou (NTT) ICM2019-22 |
In recent years, with the increasing complexity of ICT services, the burden of operators for the service monitoring and ... [more] |
ICM2019-22 pp.7-12 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 12:10 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Study on Reduction of Inconsistency between SDN Controllers Considering Traffic Fluctuation Masaru Kosugi, Kohei Shiomoto (Tokyo City Univ.) ICM2019-23 |
In a large-scale network, centralized control of all network devices with a single SDN controller is undesirable because... [more] |
ICM2019-23 pp.13-18 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 13:35 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Trends and Prospects in Private Mobile Infrastructure Yohei Motomura, Jun-ya Kato (NTT) ICM2019-24 |
It is becoming possible to build private mobile infrastructure (Private LTE/Local 5G), as a result of the commercializat... [more] |
ICM2019-24 pp.19-24 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 14:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
AI that can verify learning history
-- The AI pedigree verification platform using blockchain -- Yasutaka Kawamoto, Akihiro Kobayashi (OKI) NS2019-126 |
“Society 5.0” is a society that automatically collects data, analyzes with AI, and automatically feeds back the analysis... [more] |
NS2019-126 p.37 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 15:15 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Collecting and analyzing video streaming services' quality data with Web browser Tomoya Asai (WebDINO), Takuto Kimura (NTT) CQ2019-92 |
[more] |
CQ2019-92 pp.21-26 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 16:00 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Trends and Countermeasures of Cyber Attacks
-- Introduction to Cyber Security for Network Engineers -- Yukiko Yano (NEC) CQ2019-93 |
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] |
CQ2019-93 p.27 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 16:55 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
[Invited Talk]
Research Trends in Congestion Control for Datacenter Miki Yamamoto (Kansai Univ.) CQ2019-94 |
[more] |
CQ2019-94 pp.29-34 |
NS, ICM, CQ, NV (Joint) |
2019-11-22 09:00 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Twilio services analyses and positioning by view of IN services implementation technology. Yoshihiro Konno (Twilio Japan) NS2019-127 |
Twilio is Cloud API service (Cloud Communication Platform) which allows adding capabilities like voice, messaging (SMS/C... [more] |
NS2019-127 pp.39-44 |
NS, ICM, CQ, NV (Joint) |
2019-11-22 09:25 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
A survey of response characteristics by wide area network scanning in Japan Yutaka Ishioka, Hiroaki Waki, Kazuhito Matsushita, Mitsuhiro Ohsaki (NTT-AT) NS2019-128 |
(To be available after the conference date) [more] |
NS2019-128 pp.45-49 |
|