Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 12:45 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Keynote Address]
Thoughts on Network Data Analysis Kenichi Yoshida (Univ. of Tsukuba) IA2023-60 |
The author began his career as a researcher during the second AI boom (1980 -) and found a way out in Internet research ... [more] |
IA2023-60 pp.23-26 |
HIP |
2018-08-02 10:00 |
Tokyo |
Tokyo Woman's Christian University |
Recognition of the cheek visual aparence changes for the man machine interface to limb-disabled person Noboru Murabayashi, Kenichi Yoshida (Univ. of Tsukuba) HIP2018-38 |
Computer interface for severely limb-disabled person is an important issue to investigate. Head, eye and mouse tracking ... [more] |
HIP2018-38 pp.1-4 |
ICSS, IA |
2018-06-25 14:50 |
Ehime |
Ehime University |
Survey on current situation of incorrect setting of DNS server Akira Sato (Univ. of Tsukuba), Kazunori Fujiwara (JPRS), Takaho Omuro, Kodai Watanabe, Kenichi Yoshida (Univ. of Tsukuba) IA2018-5 ICSS2018-5 |
It is necessary for the stable operation of the Internet that DNS (Domain Name System) can be used normally. Currently, ... [more] |
IA2018-5 ICSS2018-5 pp.27-31 |
IA |
2017-11-16 14:50 |
Overseas |
KMITL, Bangkok, Thailand |
Log analysis for hijacked user account's login detection method based on an autonomous system number of access source Akira Sato, Shuji Sannomiya, Yoshihiro Oyama, Hisashi Nakai, Kenichi Yoshida, Keisuke Kameyama (Univ. of Tsukuba) IA2017-50 |
User accounts may be hijacked carelessly, and system administrators
should detect such hijacked user accounts as soon a... [more] |
IA2017-50 pp.95-98 |
IA, SITE, IPSJ-IOT [detail] |
2017-03-04 11:15 |
Okinawa |
Culture Resort Festone (Okinawa) |
Design framework of wide area/distributed services Tomohisa Aoshima, Kenichi Yoshida (U.Tsukuba) SITE2016-80 IA2016-110 |
[more] |
SITE2016-80 IA2016-110 pp.161-166 |
IA |
2016-11-04 10:55 |
Overseas |
Taipei (Taiwan) |
Real-time Abnormal Traffic Detection Circuit Based on Simple Frequent-Itemset-Mining Method Shuji Sannomiya, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2016-47 |
To resist the growth of abnormal traffic such as P2P flows, DDoS attacks and Internet worms, a circuit design to realize... [more] |
IA2016-47 pp.93-98 |
IA |
2015-11-12 16:00 |
Chiba |
NARITA VIEW HOTEL |
Enhancing performance of cardinality analysis for faster network Shinichi Mori, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2015-52 |
Cardinality in network flow data gives useful information for network administrators about suspicious communication on t... [more] |
IA2015-52 pp.81-85 |
IA, ICSS |
2015-06-12 14:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
A detect method for an undesirable use of e-mail server using cardinality analysis Akira Sato, Yuki Kato, Kenichi Yoshida, Yasushi Shinjo (Univ. of Tsukuba) IA2015-16 ICSS2015-16 |
[more] |
IA2015-16 ICSS2015-16 pp.87-92 |
IA |
2014-11-05 16:10 |
Overseas |
Thailand |
[Invited Talk]
Vicar in Network Shinichi Mori, Yuki Kato, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2014-38 |
Cardinality is known to be informative to find various network threats. Recently, we have developed methods to analyze I... [more] |
IA2014-38 pp.21-26 |
IA |
2013-10-11 13:30 |
Overseas |
Konkuk Univ., Seoul |
[Invited Talk]
Cardinality in Big Data
-- Examples in L3&L7 Network -- Takeshi Mitamura (Japan Registry Services), Kenichi Yoshida (Univ. of Tsukuba) IA2013-35 |
``Big Data'' and ``Data Mining'' are vogue buzz words. Although their definitions vary among researchers, we recognize t... [more] |
IA2013-35 p.51 |
IA |
2012-10-18 17:00 |
Overseas |
Phuket |
LessFU: A Memory Management Strategy Kenichi Yoshida, Kazuhiko Tsuda (Univ. of Tsukuba) IA2012-40 |
LRU is a standard memory management strategy. Although it is used in various situations, LRU cannot achieve good perform... [more] |
IA2012-40 pp.37-42 |
MoNA, IE, ITE-CE, ITE-ME, IPSJ-AVM (Joint) [detail] |
2012-07-19 15:15 |
Ibaraki |
University Hall, University of Tsukuba |
Similar Video Retrieval Method based on the Coarsened SURF Noboru Murabayashi, Kenichi Yoshida (Univ. of Tsukuba) MoMuC2012-14 IE2012-39 |
Supposing video frame size is $720 \times 480$ and video retrieval are conducted using local features, there are thousan... [more] |
MoMuC2012-14 IE2012-39 pp.19-24 |
PRMU, FM |
2011-12-16 11:00 |
Shizuoka |
Hamamatsu Campus, Shizuoka Univ. |
Study of Improved Tiny LSH Method by using MPEG-7 Video Signature as Image Features Noboru Murabayashi, Kenichi Yoshida (Univ. of Tsukuba) PRMU2011-135 |
According to the increasing popularity of video-sharing websites,
copyright infringed videos have become a critical iss... [more] |
PRMU2011-135 pp.59-64 |
IA |
2011-10-21 11:40 |
Overseas |
Dalian University of Technology (Dalian, China) |
Edited Internet Video Detection using MPEG-7 Video Signature Noboru Murabayashi, Kenichi Yoshida (Tsukuba Univ.) IA2011-31 |
According to the increasing popularity of the video-sharing websites,
copyright infringed videos become the critical is... [more] |
IA2011-31 pp.33-37 |
PRMU, DE |
2011-06-07 16:10 |
Kanagawa |
|
Video retrieval method based on the improved Tiny LSH using image and audio features Noboru Murabayashi, Kenichi Yoshida (Univ. of Tsukuba) DE2011-23 PRMU2011-54 |
The rapid spread of the broad band internet increases the importance of the copied video detection method from large-sca... [more] |
DE2011-23 PRMU2011-54 pp.125-130 |
PRMU |
2011-02-18 13:30 |
Saitama |
|
Performance comparison of the hashing retrieval method for the large-scale video data Noboru Murabayashi, Kenichi Yoshida (Univ. of Tsukuba) PRMU2010-226 |
In the previous researchs, we proposed the Tiny LSH method as a high-speed retrieval technique for the large-scale vide... [more] |
PRMU2010-226 pp.117-122 |
IA |
2009-10-31 09:30 |
Overseas |
Tsinghua University (Beijing) |
A case study of Analyzed Method for the Number of Varieties in Frequently Found Flows in real network environment Yusuke Shomura, Akira Sato, Kenichi Yoshida, Satoshi Matsumoto, Kozo Itano (Univ. of Tsukuba) IA2009-53 |
Recently, users are using network in various ways. This makes the
network monitoring and network management difficult t... [more] |
IA2009-53 pp.39-44 |
IE |
2009-04-27 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
High Speed Video Clip Retrieval Method based on the Tiny LSH and Direct-Mapped Cache Noboru Murabayashi, Kenichi Yoshida (Tsukuba Univ.) IE2009-1 |
The wide spread use of the broad band network has been the realization of a new video service infrastructure. Although t... [more] |
IE2009-1 pp.1-6 |
IA, SITE |
2009-03-05 14:20 |
Kumamoto |
|
A Local Update Method for Link-State Routing Kazuya Suzuki, Masahiro Jibiki (NEC), Kenichi Yoshida (Univ. of Tsukuba) SITE2008-48 IA2008-71 |
We propose a local update method, which limits calculating routes
to nodes which need to update their routes when a fa... [more] |
SITE2008-48 IA2008-71 pp.25-30 |
IA |
2008-07-09 10:05 |
Tokyo |
Shinagawa Inter-City (mornign), The Grand Hall (afternoon) |
Large-Scale Measurements of Network Latency Takahito Tejima, Sou Watanabe (Polyphony Digital Inc.), Kenichi Yoshida (Tsukuba Univ.) IA2008-16 |
We analyzed network statistics of a world-wide online network game,
and aggregated ten million actual one way latency ... [more] |
IA2008-16 pp.19-24 |