Thu, Mar 12 AM 08:35 - 09:55 |
(1) |
08:35-08:55 |
Load-balanced and interference-aware spanning tree construction algorithm for TDMA-based wireless mesh networks |
Hiroshi Tokito, Masahiro Sasabe, Go Hasegawa, Hirotaka Nakano (Osaka Univ.) |
(2) |
08:55-09:15 |
Power control method considering radio interference and path length for wireless mesh networks |
Toshiaki Hidekuma, Go Hasegawa, Masahiro Sasabe, Hirotaka Nakano (Osaka Univ.) |
(3) |
09:15-09:35 |
A routing protocol based on information of neiboring nodes for mobile ad-hoc network |
Tomonori Enami (Kochi Univ. of Tech.), Issei Ishimoto (Allied Telesys), Kazunori Ueda (Kochi Univ. of Tech.) |
(4) |
09:35-09:55 |
Autonomous Burst Access Control Cooperated with Adjacent Nodes in Wireless Multihop Network |
Makoto Mochiki, Yosuke Tanigawa (Osaka Univ.), Hideki Tode (Osaka Prefecture Univ.), Koso Murakami (Osaka Univ.) |
|
09:55-10:00 |
Break ( 5 min. ) |
Thu, Mar 12 AM 10:00 - 11:40 |
(5) |
10:00-10:20 |
A study on development of networked home appliances |
Shinji Furuya, Tetsuya Yokotani, Kiyoshi Shimokasa (Mitsubishi Electric Corp.) |
(6) |
10:20-10:40 |
A Study on SDH/OTN Integrated Network Management Method |
Kei Karato, Shun Ymamoto, Tomoyoshi Kataoka (Nippon Telegraph and Telephone Co.), Yukihide Yana, Yuzo Fujita (NTT Software Corp.) |
(7) |
10:40-11:00 |
A Study on Home Network Visualization |
Yoichi Kato, Masaru Miyamoto (NTT) |
(8) |
11:00-11:20 |
A method to detect prefix hijacking under misrepresentation of AS path |
Mitsuho Tahara, Naoki Tateishi, Satoshi Matsuba, Hikaru Seshake (NTT) |
(9) |
11:20-11:40 |
Address system in a bypass network for the Internet |
Takahiko Yamada (Ritsumeikan Univ.) |
Fri, Mar 13 AM 08:10 - 09:50 |
(10) |
08:10-08:30 |
Reducing measurement overhead using path overlapping in overlay networks |
Hiroki Mori, Go Hasegawa, Masayuki Murata (Osaka Univ) |
(11) |
08:30-08:50 |
Analysis of Pattern of Query Trends in P2P File-Sharing System |
Masato Doi, Shingo Ata, Ikuo Oka (Osaka City Univ.) |
(12) |
08:50-09:10 |
A Cooperative Routing Method Considering Residual Holding Time for Multiple Overlay Networks |
Hiroki Okada, Kazuhiko Kinoshita (Osaka Univ.), Nariyoshi Yamai (Okayama Univ.), Koso Murakami (Osaka Univ.) |
(13) |
09:10-09:30 |
Asymmetric-DHT based on node capabilities |
Kazuhisa Kawada, Kazunori Ueda (Kochi Univ. of Tech.) |
(14) |
09:30-09:50 |
The transparent data use environment on the distributed datebase |
Kenichi Kamiya, Kazunori Ueda (Kochi Univ. of Tech.) |
|
09:50-09:55 |
Break ( 5 min. ) |
Fri, Mar 13 AM 09:55 - 11:55 |
(15) |
09:55-10:15 |
Estimation of Environment-Independent Parameter in Subjective Assessment by using Comparative Evaluation |
Yasuhiro Sato, Shingo Ata, Ikuo Oka (Osaka City Univ.) |
(16) |
10:15-10:35 |
Performance evaluation of P2P file-sharing network with relay caching in overlay routing |
Takeshi Noda, Go Hasegawa, Masayuki Murata (Osaka Univ.) |
(17) |
10:35-10:55 |
Pricing of Flat-Rate VOD Type IPTV Service Based on Users' Benefit and Provider's Profit |
Kazutaka Tezuka (Waseda Univ.), Kyoko Yamori (Asahi Univ./Waseda Univ.), Yoshiaki Tanaka (Waseda Univ.) |
(18) |
10:55-11:15 |
A Study on Efficient Order Management in VPN Service |
Ryoji Shiozawa, Yasuharu Terasawa, Haruji Furukawa (NTT COMWARE Corp.) |
(19) |
11:15-11:35 |
The Proposal of Management Method for a QoS Assured Network by Cooperating between IP flow control and MPLS DiffServ-TE |
Shuntaro Kashihara, Masanori Miyazawa, Kenichi Ogaki, Tomohiro Otani (KDDI R&D Labs) |
(20) |
11:35-11:55 |
Proposed congestion control method allowing the size of required resource to be reduced |
Kenichi Hatakeyama, Yasunori Osana, Shin-ichi Kuribayashi (Seikei Univ.) |
|
11:55-12:55 |
Lunch Break ( 60 min. ) |
Fri, Mar 13 PM 12:55 - 14:15 |
(21) |
12:55-13:15 |
[Encouragement Talk]
Construction of Candidate Topologies for Large-Scale Networks |
Noriaki Kamiyama (NTT Corp.) |
(22) |
13:15-13:35 |
Bandwidth Capacity Design under Incomplete Traffic Information
-- Formulation on Linear Programming and its Evaluation -- |
Ryutaro Matsumura, Masayuki Tsujino, Motoi Iwashita (NTT Corp.) |
(23) |
13:35-13:55 |
Proposal of Optical Path Optimized Reconfiguration Method |
Nobuyuki Takai, Yuzo Bessho, Yoshimasa Baba (Mitsubishi Electric Corp.) |
(24) |
13:55-14:15 |
Study on Optimized Network Topology According to Environmental Conditions |
Masayuki Tsujino, Ryutaro Matsumura, Motoi Iwashita (NTT Corp.) |
|
14:15-14:20 |
Break ( 5 min. ) |
Fri, Mar 13 PM 14:20 - 16:20 |
(25) |
14:20-14:40 |
A Practical Traffic Data Management System Based on a Large-Sacle PC Cluster |
Hironao Tamura, Hiroya Makino, Yushi Makino, Kazuhide Takahashi, Shoichi Hirata (NTTDoCoMo) |
(26) |
14:40-15:00 |
The Proposal of Service Delivery Platform Built on Distributed Data Driven Architecture |
Yosuke Kono, Akiyuki Tomizawa, Takayuki Nakamura, Hiroshi Yasuda (DoCoMo Tech.), Kazuhide Takahashi (NTT DoCoMo) |
(27) |
15:00-15:20 |
Study on the use of Virtualization Technology in the 3-layer Architecture Systems |
Kazuhiko Higashi, Hiroaki Tomozawa, Takuya Ogawa, Minoru Kato (NTT Comware) |
(28) |
15:20-15:40 |
A Study of Scenario Editing Method for Client Autonomous Manipulation Agent |
Kenichi Nishikawa, Fumihiro Yokose, Haruhisa Nozue, Nagatoshi Nawa, Takeshi Masuda, Tetsuya Yamamura (NTT Corp.) |
(29) |
15:40-16:00 |
A Prototype of the Client Autonomous Manipulation Agent |
Haruhisa Nozue, Fumihiro Yokose, Kenichi Nishikawa, Nagatoshi Nawa, Takeshi Masuda, Tetsuya Yamamura (NTT Corp.) |
(30) |
16:00-16:20 |
Study and Implementation of Data Architecture to manage and leverage Resource Information |
Nobuyuki Iwashima, Yoichi Yamashita, Shigekazu Hayami, Shinji Hidaka, Kazuma Ishikawa, Yoshiyuki Nakayama, Hidetoshi Mori (NTT WEST) |
|
16:20-16:25 |
Break ( 5 min. ) |
Fri, Mar 13 PM 16:25 - 17:45 |
(31) |
16:25-16:45 |
Directional Active Probing in Real Network Services |
Marat Zhanikeev, Yoshiaki Tanaka (Waseda Univ.) |
(32) |
16:45-17:05 |
Adaptive Load Distribution Method by Autonomous Increase and Decrease of Distributed Components |
Wataru Miyazaki, Kazuhiko Kinoshita (Osaka Univ.), Hideki Tode (Osaka Prefecture Univ.), Koso Murakami (Osaka Univ.), Shinji Kikuchi, Satoshi Tsuchiya, Atsuji Sekiguchi, Tsuneo Katsuyama (Fujitsu Lab.) |
(33) |
17:05-17:25 |
Analysis of Difference between Encrypted and Normal Traffic and its Application to Detect Encrypted Traffic. |
Yu-ki Minamiura, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI Electric Industry Co., Ltd.), Masayuki Murata (Osaka Univ.), Ikuo Oka (Osaka City Univ.) |
(34) |
17:25-17:45 |
Resource management method of Network
-- Application of the obstacle restoration of the traffic control technology -- |
Rei Tamagawa, Yuji Kamite, Toshiki Tsuboi, Shin Abe (NTTCommunications) |