Wed, Oct 25 AM 09:20 - 16:35 |
(1) |
09:20-09:45 |
Routing procedure in GMPLS network considering each usernetwork's fault tolerant assumption |
Kodai Yamamoto, Hidenori Nakazato, Hideyoshi Tominaga (Waseda Univ.) |
(2) |
09:45-10:10 |
Performance Evaluation of Rate Control on Correlation Coefficient of Network Delay in Tandem Router Network |
Hitoshi Kusunoki, Daisuke Ikegami, Hidenori Nakazato, Hideyoshi Tominaga (Waseda University) |
(3) |
10:10-10:35 |
A Proposal of Inter-Stream FEC Method for Multi-Server Distribution |
Hideki Tode, Taichi Fujie, Koso Murakami (Osaka Univ.) |
|
10:35-10:45 |
Break ( 10 min. ) |
(4) |
10:45-11:10 |
Proposal for Forward Link Scheduler of Cognitive Radio System |
Norihisa Matsumoto, Seishi Hanaoka, Masashi Yano (Hitachi), Osamu Takahashi (FUN) |
(5) |
11:10-11:35 |
A Concept of Real-Space Networks using Bi-directional Communication Tags |
Tetsuya Kawakami, Michiru Yokobori, Yoshihiro Suzuki, Kazuhiko Miyamoto (Matsushita) |
(6) |
11:35-12:00 |
Wireless Sensor Systems for Master of Activity Skills |
Yusho Ishikawa, Masakazu Ono, Hiroaki Higaki (Tokyo Denki Univ.) |
|
12:00-13:05 |
Lunch Break ( 65 min. ) |
(7) |
13:05-13:30 |
A Power Aware, Load Adaptive MAC Protocol for Sensor Networks |
Keizo Harada, Akio Koyama (Yamagata Univ.), Junpei Arai (Yamagata CIT), Leonard Barolli (F.I.T.) |
(8) |
13:30-13:55 |
Performance evaluation of network disruptive influence on reliability and coverage intensity in sensor networks |
Hikaru Tomoda, Yoshikuni Onozato (Gunma Univ) |
(9) |
13:55-14:20 |
A proposal of a distribution routing algorithm for a digital picture-card show system |
Aki Mouri, Yosuke Shinohara, Nobuo Funabiki, Toru Nakanishi (Okayama Univ.) |
(10) |
14:20-14:45 |
Context Reuse in Application-oriented Context Awareness |
Daisuke Yamada, Masashi Ochida, Tatsuya Nakamura (NTTDATA INTELLILINK) |
|
14:45-14:55 |
Break ( 10 min. ) |
(11) |
14:55-15:20 |
Design and Implementation of a Context-Aware Access Control Mechanism for Distributed Environments |
Adolfo Mazorra, Shigetoshi Yokoyama, Taro Nakao (NTT Data) |
(12) |
15:20-15:45 |
An Agent Based EC/SNS Integration Service Considering User Interests |
Kazunari Yoshihara, Akio Koyama (Yamagata Univ.) |
(13) |
15:45-16:10 |
[Encouragement Talk]
Analysis of Malicious Traffic in the mobile network |
Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) |
(14) |
16:10-16:35 |
[Encouragement Talk]
Isochronous MAC using Low Frequency Radio Wave Time Synchronization for Wireless Sensor Networks |
Masumi Ichien, Takashi Takeuchi (Kobe Univ.), Shinji Mikami (Kanazawa Univ.), Hiroshi Kawaguchi, Chikara Ohta, Masahiko Yoshimoto (Kobe Univ.) |
Thu, Oct 26 AM 09:40 - 14:55 |
(15) |
09:40-10:05 |
A Study on Multi-Channel MAC Protocol with Busy Tone in Ad Hoc Networks |
Masatoshi Fukushima, Ushio Yamamoto, Yoshikuni Onozato (Gunma Univ.) |
(16) |
10:05-10:30 |
Tracking Cost of Mobile Agents in Ad Hoc Network |
Ryo Nakanishi, Shota Kawakami, Yoshikuni Onozato (Gunma Univ) |
(17) |
10:30-10:55 |
Power-Aware Load-Balancing Routing Protocol for Wireless Ad Hoc Networks |
Masayuki Takazawa, Akio Koyama (Yamagata Univ.), Junpei Arai (Yamagata College of Ind.), Leonard Barolli (FIT) |
(18) |
10:55-11:20 |
Analysis of continuation time in straight-away ad-hoc networks |
Misa Takahashi (Takasaki City Univ. of Economics), Akiko Uehara (Tokyo Institute of Technology), Yukio Takahashi (Tokyo Institute of Technologyi) |
(19) |
11:20-11:45 |
Fitting Curves of Willingness to Receive Reward for Relay in Ad Hoc Networks |
Naoyuki Karasawa (Niigata Univ.), Kenji Donkai, Kyoko Yamori, Yoshiaki Tanaka (Waseda Univ.) |
|
11:45-12:50 |
Lunch Break ( 65 min. ) |
(20) |
12:50-13:15 |
A Method of Transmission Power Control in Adhoc Network Considering Priority Control |
Hirotada Honda (Keio Univ.) |
(21) |
13:15-13:40 |
Reconstruction of Core-based Multicast Tree for Many-to-Many Mobile Communications with Delay Constraint |
Tsuyoshi Yamada, Shoji Yoshimura (Osaka Univ.), Keita Kawano (Okayama Univ.), Kazuhiko Kinoshita, Koso Murakami (Osaka Univ.) |
(22) |
13:40-14:05 |
An Effective Authentication Procedure considering Security Risks for Seamless Handover |
Takashi Matsunaka, Haruki Izumikawa, Keizo Sugiyama (KDDI R&D Labs. Inc.) |
(23) |
14:05-14:30 |
An Agent Control Method with Heterogeneous Work Demand for Time-constrained Applications |
Tran Nguyen Trung, Hideo Kamada, Kazuhiko Kinoshita (Osaka Univ.), Nariyoshi Yamai (Okayama Univ.), Koso Murakami (Osaka Univ.) |
(24) |
14:30-14:55 |
Network Attack Detection Method Using IP Aggregation |
Ken Ito, Marat Zhanikeev, Yoshiaki Tanaka (Waseda Univ.) |