|
|
Technical Committee on Information and Communication Management (ICM) (Searched in: 2016)
|
|
Search Results: Keywords 'from:2016-05-26 to:2016-05-26'
|
[Go to Official ICM Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, IPSJ-IOT, IPSJ-CSEC |
2016-05-26 15:20 |
Shimane |
|
[Special Talk]
Report on Special Session "Status and Issues of VNO using resources of multi-operators" Toshio Tonouchi (NEC) ICM2016-1 |
[more] |
ICM2016-1 pp.39-42 |
ICM, IPSJ-IOT, IPSJ-CSEC |
2016-05-26 15:50 |
Shimane |
|
[Special Talk]
TM Forum Tokyo Spotlight 2016 Shingo Horiuchi (NTT) ICM2016-2 |
[more] |
ICM2016-2 pp.43-44 |
ICM, IPSJ-IOT, IPSJ-CSEC |
2016-05-26 16:20 |
Shimane |
|
[Invited Talk]
User's Behaviour Engineering for Network Resource Management Kyoko Yamori (Asahi Univ.) ICM2016-3 |
[more] |
ICM2016-3 pp.45-48 |
ICM, IPSJ-IOT, IPSJ-CSEC |
2016-05-26 16:50 |
Shimane |
|
[Invited Talk]
New trend for Cloud Security Masahiro Morozumi (CSA-JC) ICM2016-4 |
(To be available after the conference date) [more] |
ICM2016-4 pp.49-54 |
ICM, IPSJ-IOT, IPSJ-CSEC |
2016-05-27 13:00 |
Shimane |
|
A study of a system configuration management using an automatic building script Shinsaku Numata, Shoji Hashimoto, Dai Kashiwa (NTTCom) ICM2016-5 |
Conventional system configuration management has been conducted by using document, such as Design Document and Environme... [more] |
ICM2016-5 pp.127-132 |
ICM, IPSJ-IOT, IPSJ-CSEC |
2016-05-27 13:20 |
Shimane |
|
A Study of Same Objective API Matching with Cosine Similarity and Combinatorial Optimization Takashi Shirai, Hikotoshi Nakazato, Tomonari Fujimoto, Hiroyuki Ohnishi, Junko Sasaki, Hideaki Kimura (NTT) ICM2016-6 |
[more] |
ICM2016-6 pp.133-138 |
ICM, IPSJ-IOT, IPSJ-CSEC |
2016-05-27 13:40 |
Shimane |
|
Feasibility study of an Automated Whitelist Generator for Log Monitoring Hiroki Miura, Tetsuaki Kamata, Toyonori Fujiura, Yuzuru Mori (NTT) ICM2016-7 |
The log monitoring with the white list has a big problem that takes to create a white list.
So far, we proposed an Auto... [more] |
ICM2016-7 pp.139-144 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|