Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, CS, IN (Joint) |
2010-09-02 13:40 |
Miyagi |
Tohoku University |
A study of the IP multicast fault detection method in the access network Masakazu Miyamoto, Kiyoshi Hayase, Hiroaki Satou (NTT) IN2010-52 |
With the advent of IP retransmission service of digital terrestrial broadcasting, High efficiency and high quality, reli... [more] |
IN2010-52 pp.49-54 |
NS, CS, IN (Joint) |
2010-09-02 14:05 |
Miyagi |
Tohoku University |
Network Traffic Estimation with Dynamic Model Selection Approach Kousuke Nogami, Hiroshi Yoshida, Kozo Satoda (NEC) IN2010-53 |
[more] |
IN2010-53 pp.55-60 |
NS, CS, IN (Joint) |
2010-09-02 14:45 |
Miyagi |
Tohoku University |
Survey and Future View of Standardization Activities of Home Network focusing on ITU-T Tetsuya Yokotani, Hideaki Yamanaka, Kuniaki Motoshima (Mitsubishi Electric) CS2010-30 |
[more] |
CS2010-30 pp.15-20 |
NS, CS, IN (Joint) |
2010-09-02 15:10 |
Miyagi |
Tohoku University |
Implementation and Performance Evaluation of "DS-SWFQe" Yusuke Sakagami, Ryusuke Kawate, Koji Sato, Hideaki Yamanaka (Mitsubishi Electric) CS2010-31 |
We have proposed DS-SWFQ(Delay Sensitive- Simplified Weighted Fair Queuing), which can multiplex a large number of flows... [more] |
CS2010-31 pp.21-25 |
NS, CS, IN (Joint) |
2010-09-02 15:35 |
Miyagi |
Tohoku University |
Multlevel Transmission System using Multiple LDs and Block Receiving Technique Takashi Yamada, Noritake Miyoshi, Hideaki Kimura (NTT) CS2010-32 |
We propose a multilevel transmission technique that employs optical amplitude domain multiplexing. With this technique w... [more] |
CS2010-32 pp.27-30 |
NS, CS, IN (Joint) |
2010-09-03 10:00 |
Miyagi |
Tohoku University |
Performance evaluation of IEEE 802.16j relay networks with consideration of blocking radio waves by obstacles Yuuki Ise, Go Hasegawa, Yoshiaki Taniguchi, Hirotaka Nakano (Osaka Univ.) IN2010-54 |
In IEEE 802.16j relay network, the network performance can be affected by obstacles because of the changes in the charac... [more] |
IN2010-54 pp.61-66 |
NS, CS, IN (Joint) |
2010-09-03 10:25 |
Miyagi |
Tohoku University |
An Integrated Mobile Network towards Popularization of Mobile Multimedia Takahiko Yamada (Ritsumeikan Univ.) IN2010-55 |
[more] |
IN2010-55 pp.67-72 |
NS, CS, IN (Joint) |
2010-09-03 10:50 |
Miyagi |
Tohoku University |
Ad-Hoc Buffering in Neighbor Nodes for Burst Data Transmissions in Wireless Multihop Sensor Networks Yuki Kaneko, Hiroaki Higaki (Tokyo Denki Univ.) IN2010-56 |
In sensor networks, burst sensor messages are required to be transmitted along a wireless multihop routes
to a sink nod... [more] |
IN2010-56 pp.73-78 |
NS, CS, IN (Joint) |
2010-09-03 11:15 |
Miyagi |
Tohoku University |
Method for Achieving Maximum Data Message Flow in Wireless Multihop Networks Yuki Tatsuno, Hiroaki Higaki (Tokyo Denki Univ.) IN2010-57 |
For multimedia data message transmissions in wireless multihop networks, transmission capacity is reserved in wireless l... [more] |
IN2010-57 pp.79-84 |
NS, CS, IN (Joint) |
2010-09-03 13:00 |
Miyagi |
Tohoku University |
An Evaluation on Ad-Hoc Pairing for a Public Device Yasutaka Nishimura, Naoki Imai, Manabu Isomura, Kiyohito Yoshihara (KDDI Lab) IN2010-58 |
Cooperation between a user’s mobile device and a public device enables a user to use a device appropriate for user’s sit... [more] |
IN2010-58 pp.85-90 |
NS, CS, IN (Joint) |
2010-09-03 13:25 |
Miyagi |
Tohoku University |
A SIP Verification Method of Integrity and Authenticity for Secure Media Communication Hisashi Takahara, Motonori Nakamura (SOKENDAI) IN2010-59 |
There is SRTP that is one of ways to realize secure media communication in the Internet with shared keys. For keep relia... [more] |
IN2010-59 pp.91-96 |
NS, CS, IN (Joint) |
2010-09-03 13:50 |
Miyagi |
Tohoku University |
An Adaptive Vehicular Position Estimation by Switching LSM/INS for VCASS Yuki Tani, Haokun Wang, Ryota Takahashi, Shinji Nakai, Tomotaka Wada, Hiromi Okada (Kansai Univ.) IN2010-60 |
IVC (Inter-Vehicular Communications) is the key technology to realize the next generation ITS. The authors have develope... [more] |
IN2010-60 pp.97-102 |
NS, CS, IN (Joint) |
2010-09-03 14:15 |
Miyagi |
Tohoku University |
Development of P-VCASS considering transmission capacity of Pedestrian Terminals Masaki Isa, Kazushi Fujimoto, Yuki Nakanishi, Tomotaka Wada, Hiromi Okada (Kansai Univ.) IN2010-61 |
The authors have proposed a collision judgment protocol for Pedestrian-Vehicular Collision Avoidance Support System (P-V... [more] |
IN2010-61 pp.103-108 |
NS, CS, IN (Joint) |
2010-09-03 14:55 |
Miyagi |
Tohoku University |
Terminal Clustering and Detection Algorithm for Disaster Immediate Detection by ERUC Kazuya Mori, Akinori Yamane, Yohei Hayakawa, Tomotaka Wada (Kansai Univ.), Kazuhiro Ohtsuki (Kobe Univ.), Hiromi Okada (Kansai Univ.) IN2010-62 |
Recently, a lot of evacuators are killed due to sudden disasters such as fire, earthquake, and terrorism. To solve these... [more] |
IN2010-62 pp.109-114 |
NS, CS, IN (Joint) |
2010-09-03 15:20 |
Miyagi |
Tohoku University |
A Computing Resource Assignment Method in Cloud Computing Taichi Kusaka, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefectural Univ) IN2010-63 |
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computer... [more] |
IN2010-63 pp.115-120 |
NS, CS, IN (Joint) |
2010-09-03 15:45 |
Miyagi |
Tohoku University |
A Method of Application Identification from Encrypted Traffic based on Characteristic Changes by Encryption Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2010-64 |
Recent years, there are many studies on identification of application from the monitored traffic in the Internet where v... [more] |
IN2010-64 pp.121-126 |
NS, CS, IN (Joint) |
2010-09-03 10:00 |
Miyagi |
Tohoku University |
Performance Comparison of Network Coding and Burst-Transmission Scheme for Multihop Wireless Networks Takashi Yazane, Hiroyuki Masuyama, Shoji Kasahara, Yutaka Takahashi (Kyoto Univ.) NS2010-62 |
In this paper, we compare the throughput performance of network coding with that of the burst transmission scheme for mu... [more] |
NS2010-62 pp.79-84 |
NS, CS, IN (Joint) |
2010-09-03 10:25 |
Miyagi |
Tohoku University |
[Encouragement Talk]
A Spectrum Sharing Method Considering Intersystem Fairness in WiFi/WiMAX Integrated Network Masashi Nakagawa (Osaka Univ.), Keita Kawano (Okayama Univ.), Kazuhiko Kinoshita, Koso Murakami (Osaka Univ.) NS2010-63 |
With advances in wireless communication technologies, people can use multimedia services not only via wired networks but... [more] |
NS2010-63 pp.85-90 |
NS, CS, IN (Joint) |
2010-09-03 10:50 |
Miyagi |
Tohoku University |
Improvement and Evaluation of Access Protocol for a Regional Protection System using a Wireless Network Koki Kanai, Masaaki Niimura, Hisayoshi Kunimune (Shinshu Univ.), Eiki Motoyama (NJRC), Hikofumi Suzuki, Yasushi Fuwa (Shinshu Univ.) NS2010-64 |
We have been continuing research in regard to a wireless Ad-Hoc Network having fault-tolerant functions. The advanced fa... [more] |
NS2010-64 pp.91-96 |
NS, CS, IN (Joint) |
2010-09-03 11:15 |
Miyagi |
Tohoku University |
A packet transmission control method in Mesh Networks Fumiyasu Sugigaki, Hiroshi Inai (Okayama Prefectural Univ.) NS2010-65 |
One of the problems of wireless mesh networks includes the HOL(Head of Line)blocking at relay nodes.To overcome that pro... [more] |
NS2010-65 pp.97-102 |
|