Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, CCS (Joint) |
2022-08-04 14:50 |
Hokkaido |
Hokkaido University(Centennial Hall) (Primary: On-site, Secondary: Online) |
[Invited Talk]
Byzantine Tolerant Gathering of Mobile Agents Yuichi Sudo (Hosei Univ.) IN2022-16 |
[more] |
IN2022-16 p.11 |
IT, ISEC, RCC, WBS |
2022-03-10 15:45 |
Online |
Online |
[Invited Talk]
Byzantine Tolerant Gathering of Mobile Agents Yuichi Sudo (Hosei Univ.) IT2021-102 ISEC2021-67 WBS2021-70 RCC2021-77 |
(To be available after the conference date) [more] |
IT2021-102 ISEC2021-67 WBS2021-70 RCC2021-77 p.116 |
NS, NWS (Joint) |
2022-01-28 13:30 |
Online |
Online |
Implementation and Evaluation for A Self-Stabilizing Leader Election Algorithm on the Population Protocol Model Keitaro Watanabe, Hideharu Kojima (Osaka Univ.), Yuichi Sudo (Hosei Univ.), Naoto Yanai, Tatsuhiro Tsuchiya (Osaka Univ.) NS2021-120 |
[more] |
NS2021-120 pp.56-61 |
COMP, IPSJ-AL |
2021-05-07 16:40 |
Online |
Online |
Exploration of dynamic graphs by the minimum number of agents Shunsuke Iitsuka (Osaka Univ.), Yuichi Sudo (Hosei Univ.), Taisuke Izumi, Toshimitsu Masuzawa (Osaka Univ.) COMP2021-3 |
We consider the collaborative exploration of dynamic graphs by multiple agents, where dynamic graphs are defined as the ... [more] |
COMP2021-3 pp.17-22 |
COMP, IPSJ-AL |
2021-05-07 17:10 |
Online |
Online |
A self-stabilizing 1-minimal independent dominating set algorithm based on loop composition Yuto Taniuchi (Osaka Univ.), Yuichi Sudo (Hosei Univ.), Taisuke Izumi, Toshimitsu Masuzawa (Osaka Univ.) COMP2021-4 |
We consider the 1-minimal independent dominating set (1-MIDS) problem: given a connected graph $G=(V,E)$, our goal is to... [more] |
COMP2021-4 pp.23-30 |
COMP |
2020-03-01 10:00 |
Tokyo |
The University of Electro-Communications (Cancelled but technical report was issued) |
Algorithms for uniform deployment of mobile agents in dynamic rings Masahiro Shibata (Kyutech), Yuichi Sudo (Osaka Univ.), Junya Nakamura (Toyohashi Tech), Yonghwan Kim (NITech) COMP2019-45 |
[more] |
COMP2019-45 pp.1-8 |
COMP |
2019-12-13 09:25 |
Gunma |
Ikaho Seminar House, Gunma University |
A Self-Stabilizing 1-maximal Independent Set Algorithm Hideyuki Tanaka, Yuichi Sudo (Osaka Univ.), Hirotsugu Kakugawa (Ryukoku Univ.), Toshimitsu Masuzawa (Osaka Univ.), Ajoy K. Datta (UNLV) COMP2019-30 |
We consider the 1-maximal independent set (1-MIS) problem: given a connected graph $G=(V,E)$, our goal is to find an 1-m... [more] |
COMP2019-30 pp.9-16 |
COMP |
2019-12-13 09:50 |
Gunma |
Ikaho Seminar House, Gunma University |
Self-stabilizing graph exploration by a mobile agent with fast recovery from edge deletions Yuki Hara, Yuichi Sudo (Osaka Univ.), Hirotsugu Kakugawa (Ryukoku Univ.), Toshimitsu Masuzawa (Osaka Univ.) COMP2019-31 |
[more] |
COMP2019-31 pp.17-24 |
COMP |
2019-03-18 16:15 |
Tokyo |
The University of Tokyo |
Move-optimal Randomized Partial Gathering of Anonymous Mobile Agents in Anonymous Unidirectional Rings Norikazu Kawata (Osaka Univ.), Masahiro Shibata (KIT), Yuichi Sudo (Osaka Univ.), Fukuhito Ooshita (NAIST), Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) COMP2018-51 |
(To be available after the conference date) [more] |
COMP2018-51 pp.47-54 |
COMP |
2018-12-12 16:15 |
Miyagi |
Tohoku University |
Self-stabilizing exploration of a graph by a mobile agent Yuki Hara, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) COMP2018-39 |
The rotor-router is a self-stabilizing algorithm for graph exploration by a mobile agent, that is, it eventually allows,... [more] |
COMP2018-39 pp.47-54 |
COMP, IPSJ-AL |
2018-05-26 15:20 |
Aichi |
Nagoya Institute of Technology |
Convergence Time in Population Protocol Model of Agents with Different Moving Speeds Ryoya Sadano, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) COMP2018-7 |
In this paper, we propose a new population protocol model, which is a computational model of mobile sensor networks, whi... [more] |
COMP2018-7 pp.85-91 |
COMP, IPSJ-AL |
2018-05-26 15:50 |
Aichi |
Nagoya Institute of Technology |
Energy Balancing with Wireless Energy Transmission in Sensor Networks Hiroshi Michizu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) COMP2018-8 |
In recent years, many people are studying wireless energy transmission technology for transmitting electric energy wirel... [more] |
COMP2018-8 pp.93-100 |
COMP |
2017-10-27 15:20 |
Tokyo |
|
COMP2017-24 |
[more] |
COMP2017-24 pp.29-36 |
COMP |
2017-10-27 15:50 |
Tokyo |
|
Exploration of dynamic tori by mobile agents Tsuyoshi Gotoh, Yuichi Sudo (Osaka Univ), Fukuhito Ooshita (NAIST), Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ) COMP2017-25 |
Mobile agents (agents) are entities which can move autonomously in a networked system and execute actions at nodes they ... [more] |
COMP2017-25 pp.37-44 |
IN |
2017-06-15 14:35 |
Fukushima |
Roudou-Fukushi-Kaikan (Koriyama) |
Collecting Methods of Unknown Malwares for Evaluation of Security Devices Yuichi Sudo, Toru Ogata, Yukio Koike (NTT West) IN2017-12 |
(To be available after the conference date) [more] |
IN2017-12 pp.17-20 |
COMP, ISEC |
2016-12-21 15:10 |
Hiroshima |
Hiroshima University |
A Loosely-Stabilizing Population Protocol for Maximal Independent Set Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) ISEC2016-78 COMP2016-39 |
Self–stabilizing population protocols are impossible to design for some problems. For example, leader election on ... [more] |
ISEC2016-78 COMP2016-39 pp.43-49 |
IN, RCS (Joint) |
2016-05-20 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Virtual Firewall Scheme that Filters DNS Fragment Packets caused by DNS Amplification Attacks Eitetsu Gen (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2016-16 |
Recently, DNS amplification attacks occur frequently. Those attacks disturb service offering by means of sending many pa... [more] |
IN2016-16 pp.85-88 |
NS, IN (Joint) |
2016-03-04 13:30 |
Miyazaki |
Phoenix Seagaia Resort |
Evaluation on Virtual Firewall Schemes against DNS Amplification Attacks Eitetsu Gen, Shota Endo (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2015-140 |
Recently, DDoS attacks that disturb service offering in the Internet have occurred frequently. In order to mitigate such... [more] |
IN2015-140 pp.189-192 |
CS, NS, IN (Joint) |
2014-09-12 13:25 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Detection of Malicious Database Queries based on Matching with HTTP Requests Yuichi Sudo, Takahiro Hamada, Yuichi Murata, Hideo Kitazume (NTT) IN2014-65 |
If an attacker takes over a Web server by vulnerability attack or fraud login and so on, the attacker can control the se... [more] |
IN2014-65 pp.99-104 |
NS, IN (Joint) |
2014-03-07 10:20 |
Miyazaki |
Miyazaki Seagia |
Blocking off Reflective DoS Attacks by Dynamic Packet Filter Yuichi Sudo, Kunio Hato (NTT) IN2013-181 |
Recently, danger of reflective DoS attacks is growing. For example, attacking traffic more than 300 Gbps of reflective D... [more] |
IN2013-181 pp.223-228 |