Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, IN, NV (Joint) |
2017-05-11 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal and Evaluation of a New MAC Protocol with Higher Priority on Transmission by Access Point for Wireless LAN Hou Jiyuan, Masaya Nakayama, Yasushi Wakahara (The Univ. of Tokyo) IN2017-1 |
CSMA/CA based MAC protocol of wireless LAN has a problem of large ratio of management time to data transmission time esp... [more] |
IN2017-1 pp.1-6 |
MoNA, IPSJ-MBL, IPSJ-UBI |
2014-03-14 15:50 |
Kanagawa |
Keio Univ. (Hiyoshi Campus) |
Early Re-transmission for Improving TCP Goodput over Ad Hoc Networks Tomoya Ohara, Yasushi Wakahara (Univ. of Tokyo) MoNA2013-76 |
In recent years, the expectation of networks for inter-vehicle communication, the utilization for natural disasters reli... [more] |
MoNA2013-76 pp.119-124 |
NS, IN (Joint) |
2014-03-07 13:00 |
Miyazaki |
Miyazaki Seagia |
Hybrid Access Control with Grouping of Terminals for Improving Throughput of Wireless LANs Kengo Michishita, Yasushi Wakahara (Univ. of Tokyo) NS2013-272 |
In DCF of the media access control for wireless LANs, its throughput decreases in accordance with the increase in the nu... [more] |
NS2013-272 pp.555-560 |
IN, NWS (Joint) |
2014-01-23 15:15 |
Aichi |
Nagoya International Center |
[Invited Talk]
Throughput of Multi-hop Wireless Networks Yasushi Wakahara (Univ. of Tokyo), Xinru Yao ((formerly)Univ. of Tokyo) IN2013-125 |
Multi-hop wireless networks are considered promising and are expected to be more widely utilized in the ubiquitous netwo... [more] |
IN2013-125 pp.45-50 |
ITS, IEE-ITS, IPSJ-ITS |
2013-09-02 13:30 |
Tokyo |
|
Real Time Traffic Prediction in Urban Traffic Networks Zilu Liang, Yasushi Wakahara (Univ. of Tokyo) ITS2013-13 |
Intelligent Transportation Systems (ITS) have been considered important technologies to deal with urban traffic congesti... [more] |
ITS2013-13 pp.27-32 |
NS, IN (Joint) |
2013-03-07 10:50 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Comparative study of financial and voting-based reputation systems
-- Experiment on feasibility of financial metric using eCommerce data sets -- Marat Vyshegorodtsev, Daisuke Miyamoto, Yasushi Wakahara (Univ. of Tokyo) IN2012-173 |
The reputation scoring systems play an important role in providing trust in peer-to-peer networks. Peer feedbacks and st... [more] |
IN2012-173 pp.113-118 |
NS, RCS (Joint) |
2012-12-13 12:30 |
Ehime |
Ehime Univ. |
Synchronized Multi-Hop Protocol with Fast Transmission Failure Recovery for IEEE 802.11 Multi-Hop Wireless Network under Large Interference Range Xinru Yao, Zilu Liang, Yasushi Wakahara (Univ. of Tokyo) NS2012-120 RCS2012-195 |
Multi-hop wireless networks are considered promising for the next-generation communication systems because of their wide... [more] |
NS2012-120 RCS2012-195 pp.19-24(NS), pp.71-76(RCS) |
NS, RCS (Joint) |
2012-12-14 15:20 |
Ehime |
Ehime Univ. |
Reliable Local Recovery in Ad Hoc Wireless Networks Zilu Liang, Yasushi Wakahara (Univ. of Tokyo) NS2012-139 |
Route failure occurs frequently in ad hoc networks due to unstable link state and node movement. Local recovery mechanis... [more] |
NS2012-139 pp.133-138 |
IN, RCS (Joint) |
2012-05-18 15:15 |
Tokyo |
Kuramae-Kaikan, Tokyo Institute of Technology |
Proposal for Improving Throughput of Multi-Hop Wireless Network Xinru Yao, Zilu Liang, Yasushi Wakahara (Univ. of Tokyo) IN2012-20 |
A multi-hop wireless network is considered promising for next-generation communication systems because of its high appli... [more] |
IN2012-20 pp.49-54 |
NS, IN (Joint) |
2012-03-08 11:40 |
Miyazaki |
Miyazaki Seagia |
Proposal and Evaluation of Distributed Management Method for Preventing Malicious Use of Game Information in P2P Massively Multi-player Online Role Playing Game Kotaro Yamazaki, Yuzo Taenaka, Yasushi Wakahara (Univ. of Tokyo) IN2011-150 |
Recently an online game MMORPG has been explosively spread. However, MMORPG has a problem that the load of the server is... [more] |
IN2011-150 pp.79-84 |
CQ, NS, ICM (Joint) |
2009-11-13 13:20 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
Selection of Base Station for Maximizing Packet Delivery Ratio for Streaming over Vehicle-to-Vehicle and Road-to-Vehicle Communication Kentaro Matsuoka, Takefumi Ogawa, Yasushi Wakahara (The Univ. of Tokyo) NS2009-112 |
In recent years, a lot of researchers have directed their attention to road-to-vehicle and vehicle-to-vehicle communicat... [more] |
NS2009-112 pp.49-54 |
IN |
2009-07-10 11:00 |
Hokkaido |
HOKKAIDO UNIVERSITY |
A P2P Management System for Preventing Malicious Files from Spreading Wei Tian (Waseda Univ.), Yuji Sekiya, Yasushi Wakahara (Univ. Tokyo), Yoshiaki Tanaka (Waseda Univ.) IN2009-33 |
In recent years, P2P file sharing systems have become one of the most popular applications in networks. However, becaus... [more] |
IN2009-33 pp.49-54 |
IN, NS (Joint) |
2009-03-04 11:10 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Cut-Through Rebroadcasting for Curve Scenarios in Vehicular Ad Hoc Networks Pakornsiri Akkhara, Yuji Sekiya, Yasushi Wakahara (The Univ. of Tokyo) IN2008-182 |
One important feature of the applications in VANETs is the ability to extend the line-of-sight of the drivers by the ext... [more] |
IN2008-182 pp.297-302 |
NS, IN (Joint) |
2008-03-06 11:10 |
Okinawa |
Bankoku Shinryokan |
An Effective Buffer Management System in a Long-Delayed Network Jun Kubo, Fumitaka Nakamura, Yasushi Wakahara (Tokyo Univ.) NS2007-158 |
CFDP is suitable file transfer protocol for a long-delayed network like the Interplanetary Internet. CFDP does not provi... [more] |
NS2007-158 pp.155-160 |
IN |
2008-01-17 13:40 |
Aichi |
Nagoya Institute of Technology |
Sub-Marine Attack and its Defense in Ad Hoc Network Routing Protocols XiaoYang Zhang, Yasushi Wakahara (Univ. of Tokyo) IN2007-120 |
Recently, significant attention has been devoted to developing secure routing protocols for an Ad hoc network. In this p... [more] |
IN2007-120 pp.7-12 |
NS, IN (Joint) |
2007-03-09 13:30 |
Okinawa |
Okinawa Convention Center |
Realization of FSN method for detecting IP spoofed packets Toshinori Ohtsuka, Fumitaka Nakamura, Yuji Sekiya, Yasushi Wakahara (Tokyo Univ.) NS2006-236 |
In the Internet there are a lot of security problem such as Distributed Denial of Service (DDoS)attacks, virus, worms an... [more] |
NS2006-236 pp.409-414 |
NS, IN (Joint) |
2007-03-09 13:50 |
Okinawa |
Okinawa Convention Center |
Method of P2P Traffic Discrimination Based on Interval Time Between Forward and Backward Connections Takashi Matsuda, Fumitaka Nakamura, Yasushi Wakahara, Yoshiaki Tanaka (Waseda Univ.) NS2006-237 |
In recent years, the amount of network traffic is rapidly increasing. And, the personal information is flowing out by v... [more] |
NS2006-237 pp.415-420 |
CS |
2007-01-12 10:40 |
Okinawa |
Yonaguni (Okinawa) |
Implementation of FSN method which is detecting function of IP spoofed packets in each ISP's network Toshinori Otsuka, Fumitaka Nakamura, Yuji Sekiya, Yasushi Wakahara (Tokyo Univ.) CS2006-90 |
In the Internet there are a lot of Distributed Denial of Service(DDoS) attacks.
A lot of attacks aim to cause damage t... [more] |
CS2006-90 pp.115-120 |
CQ, NS, ICM (Joint) |
2006-11-17 13:10 |
Tottori |
Tottori Univ. of Environmental Studies |
A Method of Pure P2P Traffic Discrimination Based on Mutual Connections Takashi Matsuda (Waseda Univ.), Fumitaka Nakamura, Yasushi Wakahara (Univ. of Tokyo), Yoshiaki Tanaka (Waseda Univ.) NS2006-134 |
In recent years, the amount of network traffic is rapidly increasing, which makes some traffic control necessary in orde... [more] |
NS2006-134 pp.61-66 |
IN, NS, CS (Joint) |
2006-09-14 16:40 |
Miyagi |
|
[Invited Talk]
Traffic feature analysis and application discrimination Fumitaka Nakamura (The University of Tokyo), Takashi Matsuda (Global Information and Telecommunication Institute), Yasushi Wakahara (Graduate School of Frontier Sciences, The University of Tokyo), Yoshiaki Tanaka (Global Information and Telecommunication Institute) NS2006-80 IN2006-60 CS2006-26 |
In this paper, We introduce packet discrimination method and its evaluation which we have proposed and presented. The me... [more] |
NS2006-80 IN2006-60 CS2006-26 pp.57-62(NS), pp.67-72(IN), pp.25-30(CS) |