Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, ICTSSL, IEE-SMF |
2023-10-20 13:40 |
Fukuoka |
Fukuoka University |
A study of graph cutting methods that maintain the shortest paths in Internet topology Masatoshi Enomoto (YCC), Ken-ichi Chinen (TMCIT) |
[more] |
|
IN, NS (Joint) |
2023-03-02 10:20 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
A consideration for a network testbed aware topology creation method Masatoshi Enomoto (Yokohama College of Commerce), Ken-ichi Chinen (Tokyo Metropolitan College of Industrial Technology) IN2022-66 |
[more] |
IN2022-66 pp.7-10 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-07 11:10 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
The Design of Easy Deployable Raspberry Pi Cluster Ken-ichi Chinen, Kouki Hikida, Takashi Sato, Michihiro Kobayakawa (TMCIT) SITE2021-50 IA2021-63 |
Raspberry Pi is designed for computer education.
Because of its small size and low cost,
it is used widely in computer... [more] |
SITE2021-50 IA2021-63 pp.25-30 |
NS, IN (Joint) |
2020-03-06 10:40 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
A Proposal of Dynamic Progress Management using State Machine on Cyber Security Training Yuma Kodera, Ken-ichi Chinen (JAIST) IN2019-124 |
[more] |
IN2019-124 pp.273-278 |
NS, IN (Joint) |
2020-03-06 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Observation of Gradually Information Change on Workplace Sharing Style Training
-- Application for Scoring of Cybersecurity Training System -- Masanori Sunagawa, Ken-ichi Chinen (JAIST) IN2019-125 |
[more] |
IN2019-125 pp.279-283 |
IN, NS (Joint) |
2019-03-05 16:00 |
Okinawa |
Okinawa Convention Center |
The Variation of Correct Answer in Quiz-based Security Training
-- Case Study in CyTrONE -- Ken-ichi Chinen, Masanori Sunagawa, Razvan Beuran (JAIST) IN2018-153 |
This paper describes the design and implementation of the correct answer variation mechanism on security training system... [more] |
IN2018-153 pp.415-420 |
NS, IN (Joint) |
2015-03-03 13:00 |
Okinawa |
Okinawa Convention Center |
A Potential of Duplicated Content Exclusion Mechanism in Receiving for High-rate Uploading Ken-ichi Chinen (JAIST/NICT), Kazunobu Konishi (Panasonic), Satoshi Kikuchi (NICT/JAIST), Eiichi Muramoto (Panasonic), Yoichi Shinoda (JAIST/NICT) IN2014-158 |
A duplication of content are an issue in content management systems.
Receiving of content spends resources.
Thus, a re... [more] |
IN2014-158 pp.221-226 |
IA |
2013-09-06 14:30 |
Tokyo |
IIJ |
The Verification of CGN(Carrier Grade NAT) by Large-scale User Emulated Traffic Generation Mechanism Kaname Nishizuka (NTT Communications), Ken-ichi Chinen (JAIST), Daigo Natsume (NTT Neomeit) IA2013-23 |
In order to verify IPv4 address sharing technologies such as CGN (Carrier Grade NAT),
it is needed to use the realistic... [more] |
IA2013-23 pp.35-40 |
IN, NV (Joint) |
2013-07-18 10:45 |
Hokkaido |
Hokkaido Univ. Faculty of Eng. Academic Lounge 3 |
BlackSmith: Pack-based Virtual Node Control System for Network Experiment Environment Yuki Kaji, Tomoya Inoue, Ken-ichi Chinen, Yoichi Shinoda (JAIST) IN2013-36 |
We designed the BlackSmith to reduce management cost in network experiment. The cost increases as the number of experime... [more] |
IN2013-36 pp.1-6 |
NS, IN (Joint) |
2013-03-07 09:20 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Modular Construction of Network Experiments Shotaro Murakami, Ken-ichi Chinen, Yoichi Shinoda (JAIST) NS2012-210 |
The network experiment environment is constructed and execute with SpringOS ’s own language. However, the experimenter m... [more] |
NS2012-210 pp.261-266 |
NS, IN (Joint) |
2013-03-08 13:40 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Generic Virtual Node-based Dynamic Scale Expansion in SpringOS Ken-ichi Chinen, Yoichi Shinoda (JAIST) IN2012-187 |
We develop generic virtual node-base network experiment driving system. ”Generic Virtual node” in this paper means virtu... [more] |
IN2012-187 pp.197-202 |
IN |
2010-12-17 13:55 |
Hiroshima |
Hiroshima City Univ. |
Performance evaluation of SpringOS on StarBED
-- OS installation, switch configuration and scenario driving in Oct. 2010 -- Takeshi Nakagawa (FJH), Toshiyuki Miyachi (NICT), Ken-ichi Chinen (JAIST), Shinsuke Miwa (NICT) IN2010-113 |
As demands to use large-scale network testbeds for evaluating
network technologies are raising, usage rate of each netw... [more] |
IN2010-113 pp.93-98 |
IA |
2009-09-25 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reconstructing StarBED Physical Configuration for Providing Security and Usability Satoshi Ohta, Toshiyuki Miyachi (NICT), Takeshi Nakagawa (FJH), Satoshi Uda (JAIST), Shinsuke Miwa (NICT), Ken-ichi Chinen, Yoichi Shinoda (JAIST) IA2009-37 |
Experiments on large-scale network testbed based on actual nodes become important for evaluating binary code of software... [more] |
IA2009-37 pp.23-27 |
NS, IN (Joint) |
2007-03-09 15:20 |
Okinawa |
Okinawa Convention Center |
A solution for RFC4541 problem by FDAR Makoto Misumi (NICT), Shin-ichi Nakagawa (NICT/JAIST/Tokyo Inst. of Tech), Ken-ichi Chinen (JAIST), Yoichi Shinoda (JAIST/NICT), Katsunori Yamaoka (Tokyo Inst. of Tech.) IN2006-264 |
When a IP Multicast network is constructed on switch-based network,
a lot of broadcasts of the multicast packet are gen... [more] |
IN2006-264 pp.501-506 |
MoNA, IPSJ-MBL |
2006-05-19 08:55 |
Okinawa |
|
Experiment Report for Mega-order Sensor Node Multicast Simulation Makoto Misumi (NICT), Shin-ichi Nakagawa (NiCT/JAIST), Tsuyoshi Ganeko, Ken-ichi Chinen, Yoichi Shinoda (JAIST) |
IP multicast is the most efficient transport method for
many to many data, especially in case of ten thousand
sending ... [more] |
MoMuC2006-16 pp.85-90 |
CS, CQ (Joint) |
2006-04-18 11:40 |
Akita |
Akita Univ. |
Practical and Experimental Approach for the One Million Order Sensor Node (Mega Node Experiment) Monitoring with IP Multicast Makoto Misumi, Shin-ichi Nakagawa (NiCT), Tsuyoshi Ganeko, Ken-ichi Chinen, Yoichi Shinoda (JAIST) CQ2006-16 |
To search for the condition to achieve data acquisition that used the
multicast for the communication more than one mil... [more] |
CQ2006-16 pp.75-81 |