IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Internet Architecture (IA)  (Searched in: 2012)

Search Results: Keywords 'from:2013-03-14 to:2013-03-14'

[Go to Official IA Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, SITE, IPSJ-IOT [detail] 2013-03-14
10:40
Nara Todaiji Total Cultural Center A Study of the Anomaly Detection Method Characteristics based on the Traffic Parameter Clustering
Kouhei Tatsumi, Toyokazu Akiyama (Kyoto Sangyo Univ.) SITE2012-49 IA2012-87
The ”targeted attacks” especially to the government and the companies increase in recent years. Such unknown
attacks ar... [more]
SITE2012-49 IA2012-87
pp.25-30
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:05
Nara Todaiji Total Cultural Center Design and implementation of mutual authentication based on PAKE in the Web SSO
Kouhei Sugiyama, Toyokazu Akiyama (Kyoto Sangyo Univ.) SITE2012-50 IA2012-88
Recently, large amount of Web services exist, such as file sharing, Web mail and so on. When we use Web services, usuall... [more] SITE2012-50 IA2012-88
pp.31-36
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:30
Nara Todaiji Total Cultural Center Proposal of DDoS attack mitigation using two-step map table lookup on LISP
Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-51 IA2012-89
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed and practiced, most ... [more] SITE2012-51 IA2012-89
pp.37-42
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:55
Nara Todaiji Total Cultural Center A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] SITE2012-52 IA2012-90
pp.43-48
IA, SITE, IPSJ-IOT [detail] 2013-03-14
14:00
Nara Todaiji Total Cultural Center An Efficient Policy Retrieval and Wi-Fi Control for ANDSF System
Dae Sun Kim, Yujin Noishiki, Yoshinori Kitatsuji, Hidetoshi Yokota (KDDI R&D Labs) SITE2012-53 IA2012-91
This paper presents a strategic solution to mobile data offloading between 3GPP and non-3GPP access networks. As mobile ... [more] SITE2012-53 IA2012-91
pp.71-77
IA, SITE, IPSJ-IOT [detail] 2013-03-14
14:25
Nara Todaiji Total Cultural Center Channel switching-aware TCP for cognitive radio mobile ad hoc networks
Shun Koba, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie (Kyushu Inst. of Tech.) SITE2012-54 IA2012-92
With the proliferation of new wireless service, a scarcity of wireless resources will arise and become a critical issue.... [more] SITE2012-54 IA2012-92
pp.79-84
IA, SITE, IPSJ-IOT [detail] 2013-03-14
14:50
Nara Todaiji Total Cultural Center Retransmission Control Scheme for Smart Meter Wireless Multi-hop Network
Makoto Ishizaki, Daiki Nobayashi, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-55 IA2012-93
To achieve a smart grid, supply and demand situation of electrical power in each consumer should be
transferred to a pr... [more]
SITE2012-55 IA2012-93
pp.85-90
IA, SITE, IPSJ-IOT [detail] 2013-03-14
15:15
Nara Todaiji Total Cultural Center A ZigBee Device Plug-In Architecture for IEEE1888 Networks
Hideya Ochiai (Univ. of Tokyo/NICT), Yuuichi Teranishi (NICT/Osaka Univ.), Hiroshi Esaki (Univ. of Tokyo) SITE2012-56 IA2012-94
This paper proposes an architecture of ZigBee device plug-in for IEEE1888 networks. This architecture allows to add new ... [more] SITE2012-56 IA2012-94
pp.91-94
IA, SITE, IPSJ-IOT [detail] 2013-03-14
16:00
Nara Todaiji Total Cultural Center A Proposal of Information Centric Networking in New Generation Network Architecture ZNA
Takao Kondo, Heryanto, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) SITE2012-57 IA2012-95
Today's Internet is made up based on the early day's host-centric design. Unfortunately, this does not suit today's Inte... [more] SITE2012-57 IA2012-95
pp.117-122
IA, SITE, IPSJ-IOT [detail] 2013-03-14
16:25
Nara Todaiji Total Cultural Center A Flood Hazard Model Based on Damage Situations
Kei Hiroi (Keio Univ.), Yuzo Taenaka (Univ. of Tokyo), Kanae Matsui (Keio Univ.), Hideya Ochiai (Univ. of Tokyo), Hitoshi Yokoyama (Tokanken), Hideki Sunahara (Keio Univ.) SITE2012-58 IA2012-96
People in the disaster risk area needs disaster information such as river levels for reduction of disaster damages. Howe... [more] SITE2012-58 IA2012-96
pp.123-126
IA, SITE, IPSJ-IOT [detail] 2013-03-14
16:50
Nara Todaiji Total Cultural Center Proposal and Evaluation of Priority Control Method on Per-Flow Basis Based on Bandwidth Utilization to Keep Response Time Within a Certain Threshold
Keiya Ishikawa, Yuzo Taenaka, Masaya Nakayama (Univ. of Tokyo) SITE2012-59 IA2012-97
Multiple data flows sharing limited bandwidth cause communication delay in communication networks. In particular it is i... [more] SITE2012-59 IA2012-97
pp.127-132
IA, SITE, IPSJ-IOT [detail] 2013-03-14
17:15
Nara Todaiji Total Cultural Center A Server Configuration with Autonomous Session State Migration to Demand Fluctuation
Takeshi Usui, Masahiro Jibiki (NICT), Yusuke Sakumoto (Tokyo Metropolitan Univ.), Chisa Takano (Hiroshima City Univ.), Masaki Aida (Tokyo Metropolitan Univ.), Nozomu Nishinaga (NICT) SITE2012-60 IA2012-98
Optimal server consolidation is attracting attention for energy saving. The service access increases or decreases in num... [more] SITE2012-60 IA2012-98
pp.133-138
IA, SITE, IPSJ-IOT [detail] 2013-03-15
10:00
Nara Todaiji Total Cultural Center Identifying User Authentication Methods on SSH Sessions
Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] SITE2012-61 IA2012-99
pp.151-156
IA, SITE, IPSJ-IOT [detail] 2013-03-15
10:25
Nara Todaiji Total Cultural Center Secure Resrouce Provisioning Across Multiple Domains
Toru Mano, Kimihiro Mizutani, Osamu Akashi (NTT) SITE2012-62 IA2012-100
Network resource provisioning is an important technique for infrastructure providers (infra-providers).
However, to ful... [more]
SITE2012-62 IA2012-100
pp.157-162
IA, SITE, IPSJ-IOT [detail] 2013-03-15
10:50
Nara Todaiji Total Cultural Center Study on Cocktail Party Effect Personal Authentication System by Recognizing the Differnce of Voices
Kosei Taketa, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-63 IA2012-101
Recently, personal authentications have been important because of the popularization of personal portable devices or ICc... [more] SITE2012-63 IA2012-101
pp.163-168
IA, SITE, IPSJ-IOT [detail] 2013-03-15
11:15
Nara Todaiji Total Cultural Center Proposal of Active IDS by Risk Level Probe
Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-64 IA2012-102
Intrusion Detection System (IDS) is a security system in order to detect illegal access by checking the status of a comp... [more] SITE2012-64 IA2012-102
pp.169-174
IA, SITE, IPSJ-IOT [detail] 2013-03-15
13:00
Nara Todaiji Total Cultural Center About the International Symposium on Internet Ethics ISIE2012
Yoshinori Ezawa (Kansai Univ.) SITE2012-65 IA2012-103
The International Symposium on Internet Ethics 2012 was planned and organized by the Korea Internet and Security Agency ... [more] SITE2012-65 IA2012-103
pp.197-200
IA, SITE, IPSJ-IOT [detail] 2013-03-15
13:25
Nara Todaiji Total Cultural Center Game theoretic analysis of the value exchange system
Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-66 IA2012-104
Recently, a local currency has been attracting attention for the purpose of circulating a thing and service in local com... [more] SITE2012-66 IA2012-104
pp.201-206
IA, SITE, IPSJ-IOT [detail] 2013-03-15
13:50
Nara Todaiji Total Cultural Center Consideration about the use possibility to the intellectual property field of digital forensic.
Masahiro Sugawa (Niigata Univ.) SITE2012-67 IA2012-105
Digital forensic is being used widely from a criminal case to civil case. On this paper, it is considered whether digita... [more] SITE2012-67 IA2012-105
pp.207-211
IA, SITE, IPSJ-IOT [detail] 2013-03-15
14:50
Nara Todaiji Total Cultural Center Notes on Low Distortion Embedding Method of Digital Camera Scannable Invisible Code
Masaharu Morita, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-68 IA2012-106
Recently, various utilizations of digital-camera have been spreading with popularization of cell-phones and smart-phones... [more] SITE2012-68 IA2012-106
pp.231-236
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan