Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE, SC |
2023-11-17 13:50 |
Miyagi |
Sento Kaikan |
Implementation and validation of content data ownership management system for open metaverse platform Yuki Sasaki, Shinya Kitajima (Fujitsu), Akira Iwata, Tetsuya Imamura (JP GAMES) KBSE2023-34 SC2023-17 |
Recently, the virtual space called metaverse has attracted attention. Several studies suggest that blockchain is an appr... [more] |
KBSE2023-34 SC2023-17 pp.13-18 |
IN |
2023-01-19 15:40 |
Aichi |
Aichi Industry & Labor Center (Primary: On-site, Secondary: Online) |
[Invited Talk]
International Cross-Industry Data Sharing for Realizing Carbon Neutral, Resource Recycling and SDGs Koki Mitani (NTT) IN2022-60 |
In recent years, as interest in Sustainable Development Goals (SDGs) has grown, discussions for building a data infrastr... [more] |
IN2022-60 pp.53-58 |
PN, NS, OCS (Joint) |
2020-06-19 10:25 |
Online |
Online |
Design and Implementation of Improved User-PC Computing System Hein Htet, Nobuo Funabiki, Ariel Kamoyedji, Minoru Kuribayashi (Okayama Univ.) NS2020-28 |
Recently, the computing ability of a personal computer (PC) has rapidly evolved with increases of the CPU clock rate, th... [more] |
NS2020-28 pp.37-42 |
CS, CQ (Joint) |
2017-04-21 10:15 |
Hokkaido |
Chitose Institute of Science and Technology |
Consideration of Fine-grained Control of IoT Sensor Traffic using SDN Hiroaki Yamanaka (NICT) CQ2017-5 |
The traffic volume for collecting sensor data from massive number of IoT sensors in a local area to the data center is l... [more] |
CQ2017-5 pp.19-24 |
NS, IN (Joint) |
2017-03-03 10:10 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Proposal of usage notification method for traffic control with user usage amount by using the Policy and Charging Control Hiroki Iwahashi, Hideaki Iwata (NTT) NS2016-214 |
The amount of user traffic is increasing by some of the video distribution services in which users watch high resolution... [more] |
NS2016-214 pp.325-330 |
CQ |
2017-01-20 16:00 |
Osaka |
Osaka University Nakanoshima Center |
Bandwidth Allocation Control Based on Usage Frequency of Mobile Applications Yuki Goto, Ryoichi Shinkuma (Kyoto Univ.), Hirotada Honda, Hideki Nojiri, Akira Takahashi (NTT) CQ2016-109 |
Due to the recent diversification of applications in the current internet, to focus on factors of applications other tha... [more] |
CQ2016-109 pp.109-114 |
CQ, ICM, NS (Joint) |
2015-11-27 14:45 |
Niigata |
Niigata University |
Study on Analysis of Area QoE in Mobile Environment Yuki Shitara, Tatsuya Yamazaki (Niigata Univ.), Kyoko Yamori (Asahi Univ.), Takumi Miyoshi (S.I.T.) CQ2015-90 |
In recent years, smart phones and PC tablets have become popular as a mobile device and communication service which is r... [more] |
CQ2015-90 pp.81-86 |
IN, NWS (Joint) |
2014-01-24 14:55 |
Aichi |
Nagoya International Center |
An Evaluation of Node-Based Delays in Tor Network Kale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato (Univ. of Electro-Comm.) IN2013-138 |
The Tor Network is a low-latency anonymity and censorship resistance network, which relaying traffics through onion rout... [more] |
IN2013-138 pp.121-126 |
IN, RCS (Joint) |
2012-05-17 09:50 |
Tokyo |
Kuramae-Kaikan, Tokyo Institute of Technology |
Proposal of Uplink Power Control Method for LTE Femtocells Based on Resource Usage Aggregation Motoki Morita, Takahiro Nobukiyo, Kojiro Hamabe (NEC) RCS2012-23 |
In LTE, uplink (UL) power control is important to mitigate the UL aggregate interference from all femtocells to the macr... [more] |
RCS2012-23 pp.7-12 |
NS, RCS (Joint) |
2010-12-16 10:20 |
Okayama |
Okayama Univ. |
A Proposal of Traffic Control Method with Bandwidth Usage Estimation for Real-Time Applications in Wireless Mesh Networks Sritrusta Sukaridhoto, Nobuo Funabiki, Toru Nakanishi (Okayama Univ.) NS2010-109 RCS2010-163 |
As a flexible and cost effective solution for a large-scale Internet access network, we have studied the Wireless Intern... [more] |
NS2010-109 RCS2010-163 pp.25-30 |
IA, SITE, IPSJ-IOT [detail] |
2010-03-01 17:45 |
Miyagi |
|
A Privacy Aspect on the Disclosure of Personal Data to Third Parties Sven Wohlgemuth, Noboru Sonehara, Isao Echizen (NII), Guenter Mueller (Univ. of Freiburg) SITE2009-56 IA2009-108 |
After Mainframe and Client-Server computing, Cloud computing is the next computing paradigm. The main difference is that... [more] |
SITE2009-56 IA2009-108 pp.147-152 |
SR, AN, USN (Joint) |
2009-10-22 11:10 |
Miyagi |
Tohoku Univ. |
MAC Protocol for Hidden Terminal Problem Alleviation using Transmission Pause Control in Wireless Multi Hop Networks Shota Furukawa, Hiroo Sekiya, Nobuyoshi Komuro, Shiro Sakata (Chiba Univ.) AN2009-25 |
When IEEE802.11 DCF (Distributed Coordination Function) is applied to wireless multi hop network, network throughput dec... [more] |
AN2009-25 pp.19-24 |
OCS, NS (Joint) |
2008-01-24 14:00 |
Oita |
OITA University |
[Encouragement Talk]
A Study on Prioritized Usage Control of Different Shared Devices for Contention Avoidance in Optical Switching Node Shinya Yatsuo, Hideki Tode (Osaka Univ.), Kosuke Nishimura, Tomohiro Otani (KDDI R&D Labs), Koso Murakami (Osaka Univ.) NS2007-122 |
Matrix type high-speed optical packet/burst switch is developed that shares high-cost devices for contention avoidance, ... [more] |
NS2007-122 pp.19-22 |
CS, IE, ITE-BCT, IPSJ-AVM |
2006-12-15 11:20 |
Aichi |
Nagoya Univ. |
Reducing False Positive and Observation Cost in Bandwidth Usage-based Pulsing DoS Detection Schemes Kenjiro Arai, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-62 IE2006-130 |
Pulsing Denial-of-Service (PDoS) attacks seriously degrade the
throughput of TCP flow and consequently pose a grave con... [more] |
CS2006-62 IE2006-130 pp.25-30 |
IN, NS, CS (Joint) |
2006-09-15 15:40 |
Miyagi |
|
Detecting Pulsing Denial-of-Service Attacks by Using Bandwidth Usage Condition Kenjiro Arai, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-34 |
Pulsing Denial-of-Service (PDoS) attacks seriously degrade the throughput of TCP flow and consequently pose a grave conc... [more] |
CS2006-34 pp.73-78 |