IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 35  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN, CS, NV
(Joint)
2019-09-06
13:55
Miyagi Research Institute of Electrical Communication, Tohoku Univ. On availability of a multi-layered and widely-distributed network monitoring system
Hiroshi Tsunoda (Tohoku Inst. Tech.), Glenn Mansfield Keeni (Cyber Solutions) CS2019-58
 [more] CS2019-58
pp.61-64
CS, NS, IN, NV
(Joint)
2017-09-07
09:00
Miyagi Research Institute of Electrical Communication, Tohoku Univ. Study on Connectivity Testing over Wireless Links in a Redistribution System of Early Warning Information
Masahiro Matsuda, Eri Zeniya, Hiroshi Tsunoda (Tohtech) CS2017-42
As increasing the awareness of disaster prevention and mitigation, various early warning systems have been developed and... [more] CS2017-42
pp.1-5
NS, CS, IN, NV
(Joint)
2016-09-30
10:50
Miyagi Tohoku Univ. Societal model for Internet of Things: the requirements
Hiroshi Tsunoda (Tohoku Inst. Tech.), Glenn Mansfield Keeni (Cyber Solutions) CS2016-39
From transportation to home and health care,
Internet of Things (IoT) has penetrated almost every sphere of society.
I... [more]
CS2016-39
pp.51-55
CS, NS, IN
(Joint)
2014-09-12
09:20
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan Monitoring syslog
Hiroshi Tsunoda (Tohoku Inst. of Tech.), Glenn Mansfield Keeni (Cyber Solutions) CS2014-49
Log messages are generated by operating systems and applications. These messages contain important information about th... [more] CS2014-49
pp.51-54
IN, IA
(Joint)
2013-12-19
14:25
Hiroshima Hiroshima City Univ. Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems (1) -- Project Vision and Overview --
Norio Shiratori, Naoki Nakamura, Satoru Izumi (Tohoku Univ.), Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Masahiro Ishigaki (Tohoku Univ.), Tsutomu Inaba, Takashi Ogasawara (NTT EAST), Takuo Suganuma (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.) IN2013-102
We have been promoted research and development under the support of the Green ICT Innovation Promotion (PREDICT) of Mini... [more] IN2013-102
pp.19-24
IN, IA
(Joint)
2013-12-19
14:50
Hiroshima Hiroshima City Univ. Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems (2) -- Estimation of Power Consumption based on Network Information and International Standardization of G-MIB --
Satoru Izumi, Naoki Nakamura (Tohoku Univ.), Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Takuo Suganuma (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Norio Shiratori (Tohoku Univ.) IN2013-103
In this paper, we propose an estimation method of power consumptions based on network information to realize energy-savi... [more] IN2013-103
pp.25-30
NS, CS, IN
(Joint)
2013-09-13
11:10
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan A method for estimating active period of networked devices using connection management techniques and its evaluation
Yuusuke Syouji, Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst.of Tech.) CS2013-39
 [more] CS2013-39
pp.55-60
NS, IN
(Joint)
2012-03-08
09:50
Miyazaki Miyazaki Seagia Analyzing terminal operation status based on the connection history
Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta, Glenn Mansfield Keeni (Cyber Solutions Inc.) IN2011-153
For a long time, global warming has become an international concern and reducing power consumption is strongly required ... [more] IN2011-153
pp.97-102
CS, CQ
(Joint)
2010-04-27
09:55
Aomori Oirase Keiryu Hotel An Image Transfer System using Multiple Cellular Phone Line
Yuji Waizumi (Tohoku Univ.), Kouichi Abe (MagickWorX), Kaoru Miyauchi (K&C), Hiroki Nishiyama (Tohoku Univ.), Hiroshi Tsunoda, Hidehisa Nakayama (Tohoku Inst. of Tech.), Takuya Kitamura (Fudoki), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2010-8
 [more] CS2010-8
pp.41-46
IN, NS, CS
(Joint)
2009-09-10
13:50
Miyagi Tohoku University (Miyagi) Network Application Identification based on Characteristics of Message Transmission
Yuji Waizumi, Yuya Tsukabe (Tohoku Univ.), Hiroshi Tsunoda (Tohoku Inst. of Tech.), Yoshiaki Nemoto (Tohoku Univ.) CS2009-35
A person-to-person imformation sharing is easily realized by P2P networks that serves are unnecessary
to do so. Leakage... [more]
CS2009-35
pp.13-18
IN, NS, CS
(Joint)
2009-09-10
14:15
Miyagi Tohoku University (Miyagi) Efficient Log Transfer based on Priority Queuing and Message Aggregation for Logging over Wireless Networks
Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Mashimo, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2009-36
 [more] CS2009-36
pp.19-24
CQ, CS
(Joint)
2009-04-16
10:50
Okinawa Okinawaken Seinen Kaikan Experiments of WLAN based Activity Monitoring System for Real-time Simultaneous Utilization
Hidehisa Nakayama, Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Akihiro Suzuki (I.T.Research Co.,Ltd), Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2009-1
 [more] CS2009-1
pp.1-6
CS, SIP, CAS 2008-03-06
14:45
Yamaguchi Yamaguchi University Priority-based Adaptive Transmission Control for Efficient Log Transfer
Hiroshi Tsunoda, Takafumi Maruyama, Satoru Abe (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto (Tohoku Univ.) CAS2007-113 SIP2007-188 CS2007-78
Logs generated by operating systems and application programs provide important information to a network administrator. L... [more] CAS2007-113 SIP2007-188 CS2007-78
pp.27-32
CS, SIP, CAS 2008-03-06
15:35
Yamaguchi Yamaguchi University Generating Appropriate Templates for Efficient Application Identification
Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CAS2007-115 SIP2007-190 CS2007-80
Recently, damages of information leakage caused by
illegal use of network applications have been reported.
To prevent ... [more]
CAS2007-115 SIP2007-190 CS2007-80
pp.39-44
IN 2007-12-14
13:30
Hiroshima Hiroshima City University A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads
Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-114
Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we hav... [more] IN2007-114
pp.91-96
IN 2007-12-14
13:55
Hiroshima Hiroshima City University Classifying Network Anomaly Events Using the Occurence Probability of Correlation Coefficients
Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-115
For taking effective countermeasures against network anomaly events,the classification of detected anomaly events is req... [more] IN2007-115
pp.97-102
NS, ICM, CQ
(Joint)
2007-11-15
16:25
Fukuoka Institute of System LSI Design Industry, Fukuoka [Encouragement Talk] An evaluation of transition pattern of payload legnth for network application identification
Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) TM2007-34
Recently, increasing of information leakages caused by illegal use of network applications have been reported. To preven... [more] TM2007-34
pp.1-6
NS, CS, IN
(Joint)
2007-09-21
13:20
Miyagi Tohoku University Detector Selection Method for Detecting Malicious Nodes in Wireless Sensor Networks
Hiroshi Tsunoda (Tohoku Univ.), Ake Olbert, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2007-18
 [more] CS2007-18
pp.9-14
NS, CS, IN
(Joint)
2007-09-21
13:40
Miyagi Tohoku University A Network Application Identification Method Using Similarity of Packet Payloads
Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-19
 [more] CS2007-19
pp.15-20
NS, CS, IN
(Joint)
2007-09-21
14:00
Miyagi Tohoku University An Enhancement of Network Anomaly Detection Method Using Occurence Probability Matrices of Correlation Coefficients
Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CS2007-20
Recently, a network anomaly detection method focusing
correlation coefficients between traffic features has been pro... [more]
CS2007-20
pp.21-26
 Results 1 - 20 of 35  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan