Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NV (Joint) |
2011-07-22 11:05 |
Hokkaido |
Hokkaido University |
On Router Virtualization for Realizing Group-Based Communication in Content-Centric Networking Masato Ohtani, Keiichiro Tsukamoto, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2011-59 |
Data-centric network architecture, which takes the data transferred on network rather than the point-to-point communicat... [more] |
IN2011-59 pp.81-86 |
IN, NS (Joint) |
2011-03-03 10:30 |
Okinawa |
Okinawa Convention Center |
Proposal of Inter-Cloud System Architecture Kunio Hato, Hu Bo, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-169 |
Commercial services using cloud systems have been spreading widely because server virtualization technologies and broadb... [more] |
IN2010-169 pp.151-156 |
IN, NS (Joint) |
2011-03-03 10:50 |
Okinawa |
Okinawa Convention Center |
Proposal of an Inter-Cloud Resource Assignment Algorithm Hu Bo, Kunio Hato, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-170 |
We proposes a resource assignment algorithm for inter-cloud computing systems. An inter-cloud computing system is promis... [more] |
IN2010-170 pp.157-162 |
IN |
2011-01-20 08:50 |
Osaka |
Osaka Univ. |
On Estimating Referring Block in Hyperlinked Web Page based on Block-to-Block Similarity Keiichiro Tsukamoto, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2010-118 |
(Advance abstract in Japanese is available) [more] |
IN2010-118 pp.1-6 |
CS, IN, NS (Joint) |
2008-09-11 15:40 |
Miyagi |
Tohoku University |
[Invited Talk]
Trend of VPN-based communication technology Junichi Murayama (NTT) NS2008-54 IN2008-48 CS2008-17 |
The Internet is attractive because of its global reachability, while it causes security problems. On the other hand, a v... [more] |
NS2008-54 IN2008-48 CS2008-17 pp.69-74(NS), pp.27-32(IN), pp.1-6(CS) |
IN |
2008-06-20 14:55 |
Hokkaido |
Hokkaido Univ. |
Dynamic Topology Reconfiguration Method for Overlay Networks using Users' Community Information Tomoyasu Ogasa, Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2008-24 |
In an overlay network, it is important to reconfigure its network topology appropriately according to change of traffic ... [more] |
IN2008-24 pp.85-90 |
NS, IN (Joint) |
2008-03-06 11:50 |
Okinawa |
Bankoku Shinryokan |
Identification Method of Attacking Source Using Traffic Flow in Backbone Networks Takeshi Kuwahara, Tsuyoshi Kondoh, Takeshi Yagi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-169 |
In this paper, we propose a novel identification method of attacking source using traffic flow information in backbone n... [more] |
IN2007-169 pp.61-66 |
MoNA, IN (Joint) |
2007-11-15 14:55 |
Fukuoka |
Fukuoka Institute of Technology |
NMF: Network Mining Framework using Topological Structure of Complex Networks Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2007-90 |
In this paper, we propose a network mining framework called NMF that supports integration of several link mining methods... [more] |
IN2007-90 pp.7-12 |
MoNA, IN (Joint) |
2007-11-15 15:20 |
Fukuoka |
Fukuoka Institute of Technology |
On Application Concentrator for Supporting Application-Level Multiple Association Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2007-91 |
In this paper, we propose a concept of application concentrator that realizes the multiple association at an application... [more] |
IN2007-91 pp.13-18 |
NS, CS, IN (Joint) |
2007-09-21 09:50 |
Miyagi |
Tohoku University |
A Practical Feasibility Study of a Network Control Method for Sharing DDoS-Attack Mitigation Devices Takeshi Yagi, Takeshi Kuwahara, Junichi Murayama (NTT) IN2007-60 |
This paper reports results of feasibility study about dynamic traffic control methods to re-route traffic into DDoS-atta... [more] |
IN2007-60 pp.99-104 |
NS, CS, IN (Joint) |
2007-09-21 10:10 |
Miyagi |
Tohoku University |
A Proposal of Detection Method for Application Anomaly Traffic over Large-scale Backbone Networks Takeshi Kuwahara, Takeshi Yagi, Atsushi Kobayashi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-61 |
This paper proposes a novel anomaly detection method for application traffic over large-scale backbone networks. The pro... [more] |
IN2007-61 pp.105-110 |
IN |
2007-07-20 11:00 |
Hyogo |
Kobe University |
On Network Architecture for Realizing Group-Oriented Communication Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2007-35 |
In this paper, we propose a novel communication paradigm called group-oriented communication. Different
from convention... [more] |
IN2007-35 pp.49-54 |
IN |
2007-07-20 11:25 |
Hyogo |
Kobe University |
A Practical Feasibility Test of SPX:Secure networking Platform for group-oriented eXchange Takeshi Yagi, Junichi Murayama, Katsuyasu Toyama (NTT), Yousuke Takahashi, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.) IN2007-36 |
This paper reports results of development and feasibility study about SPX (Secure networking Platform for group-oriented... [more] |
IN2007-36 pp.55-60 |
RCS, IN (Joint) |
2007-05-17 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Toward Group-Oriented Communication: Comparative Study of Modern Network Architectures Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Kunio Hato, Junichi Murayama (NTT) IN2007-2 |
In this paper, we disscuss a network architecture realizing group-oriented communication for solving the problem
in the... [more] |
IN2007-2 pp.7-12 |
NS, IN (Joint) |
2007-03-08 10:50 |
Okinawa |
Okinawa Convention Center |
A Load Balancing Method between Distributed DDoS-Attack Mitigation Systems by dividing anomaly traffic Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-200 |
This paper proposes a large-volume DDoS-attack defense method which scrubs anomaly traffic with a DDoS-attack mitigatio... [more] |
IN2006-200 pp.119-124 |
IN |
2007-02-02 11:15 |
Aichi |
Aichi Prefectural University |
Architecture Design of SPX : Secure networking Platform for group-oriented eXchange Takeshi Yagi, Kunio Hato, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT), Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.) IN2006-173 |
This paper discusses some security problems in the Internet, such as spam and phishing, and proposes the community commu... [more] |
IN2006-173 pp.65-70 |
ICM, IN, LOIS (Joint) |
2007-01-19 10:40 |
Oita |
Beppu Convention Center(B-Con Plaza) |
A Communication Control Method using Personal Information for Secure SNS Takeshi Yagi, Kunio Hato, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT), Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.) IN2006-155 |
This paper proposes communication control method to enhance security of social networking services. This method is compo... [more] |
IN2006-155 pp.103-108 |
IN |
2006-12-15 14:00 |
Osaka |
|
Evaluations of a Network Control Scheme for Sharing DDoS Attack Mitigation System called as Scrubingbox Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-131 |
This paper evaluates dynamic traffic control methods to re-route traffic into DDoS-attack mitigation devices, namely Scr... [more] |
IN2006-131 pp.103-108 |
IN |
2006-02-16 13:25 |
Kochi |
Kochi Univ. of Technology |
A Distributed Traffic-Monitoring Scheme for Overlay Networks Takeshi Yagi, Yuuichi Naruse, Junichi Murayama, Kazuhiro Matsuda (NTT) |
[more] |
IN2005-144 pp.7-12 |
NS, IN |
2005-03-04 10:30 |
Okinawa |
Okinawa Zanpa-misaki Royal |
A dynamic parameter tuning for I2VFC: Inter- and Intra- VPN Fairness Control Mechanism Yasuyuki Honda, Osamu Honda, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Mika Ishizuka, Junichi Murayama (NTT Corporation) |
[more] |
NS2004-270 IN2004-270 pp.135-140 |