|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, IA (Joint) |
2013-12-19 14:25 |
Hiroshima |
Hiroshima City Univ. |
Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems (1)
-- Project Vision and Overview -- Norio Shiratori, Naoki Nakamura, Satoru Izumi (Tohoku Univ.), Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Masahiro Ishigaki (Tohoku Univ.), Tsutomu Inaba, Takashi Ogasawara (NTT EAST), Takuo Suganuma (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.) IN2013-102 |
We have been promoted research and development under the support of the Green ICT Innovation Promotion (PREDICT) of Mini... [more] |
IN2013-102 pp.19-24 |
IN, IA (Joint) |
2013-12-19 14:50 |
Hiroshima |
Hiroshima City Univ. |
Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems (2)
-- Estimation of Power Consumption based on Network Information and International Standardization of G-MIB -- Satoru Izumi, Naoki Nakamura (Tohoku Univ.), Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Takuo Suganuma (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Norio Shiratori (Tohoku Univ.) IN2013-103 |
In this paper, we propose an estimation method of power consumptions based on network information to realize energy-savi... [more] |
IN2013-103 pp.25-30 |
IN, IA (Joint) |
2013-12-19 15:15 |
Hiroshima |
Hiroshima City Univ. |
Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems (3)
-- Visualization of Usage of User Terminal in Large-scale Network -- Naoki Nakamura, Satoru Izumi (Tohoku Univ), Kohei Ohta (Cyber Solutions Inc.), Tsutomu Inaba, Takashi Ogasawara (NTT EAST), Glenn Mansfield Keeni (Cyber Solutions Inc.), Takuo Suganuma, Norio Shiratori (Tohoku Univ) IN2013-104 |
In this paper, we developed a "Visualization of Energy Waste Technology", that is the core of the "Green-oriented Networ... [more] |
IN2013-104 pp.31-36 |
NS, IN (Joint) |
2012-03-08 09:50 |
Miyazaki |
Miyazaki Seagia |
Analyzing terminal operation status based on the connection history Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta, Glenn Mansfield Keeni (Cyber Solutions Inc.) IN2011-153 |
For a long time, global warming has become an international concern and reducing power consumption is strongly required ... [more] |
IN2011-153 pp.97-102 |
CQ, CS (Joint) |
2009-04-16 10:50 |
Okinawa |
Okinawaken Seinen Kaikan |
Experiments of WLAN based Activity Monitoring System for Real-time Simultaneous Utilization Hidehisa Nakayama, Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Akihiro Suzuki (I.T.Research Co.,Ltd), Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2009-1 |
[more] |
CS2009-1 pp.1-6 |
CS, SIP, CAS |
2008-03-06 14:45 |
Yamaguchi |
Yamaguchi University |
Priority-based Adaptive Transmission Control for Efficient Log Transfer Hiroshi Tsunoda, Takafumi Maruyama, Satoru Abe (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto (Tohoku Univ.) CAS2007-113 SIP2007-188 CS2007-78 |
Logs generated by operating systems and application programs provide important information to a network administrator. L... [more] |
CAS2007-113 SIP2007-188 CS2007-78 pp.27-32 |
NS, CS, IN |
2004-09-03 09:25 |
Miyagi |
Tohoku University |
Detecting DRDoS Attacks with Bidirectional Packet Confirmation Atsunori Yamamoto (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Hiroshi Tsunoda, Nei Kato, Yoshiaki Nemoto (Tohoku Univ.) |
In DRDoS attacks, which are threat in today's Internet, the attacker attacks the target host with response packets from ... [more] |
NS2004-102 IN2004-61 CS2004-57 pp.7-12 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|