|
12:55-13:00 |
Opening Address ( 5 min. ) |
Thu, Mar 5 PM 13:00 - 15:20 |
(1) |
13:00-13:20 |
Implementation and Evaluation of Packet Processing with Stream Encryption |
Kiyofumi Takeuchi, Tatsunori Tsujimura (Mitsubishi Electric Corp.) |
(2) |
13:20-13:40 |
A Study on Implementation of IPsec for Multi-Core CPU |
Tatsunori Tsujimura, Kiyofumi Takeuchi (Mitsubishi Electric Corp.) |
(3) |
13:40-14:00 |
Implementation and Evaluation of PMIPv6 on Linux Environnement |
Mathieu Poulain (Telecom Br/Keio Univ), Fumio Teraoka (Keio Univ.) |
(4) |
14:00-14:20 |
Evaluation of Black Domain List by Using DNS Query Graph |
Keisuke Ishibashi, Tsuyoshi Toyono, Kazumichi Sato, Makoto Iwamura (NTT) |
(5) |
14:20-14:40 |
A Local Update Method for Link-State Routing |
Kazuya Suzuki, Masahiro Jibiki (NEC), Kenichi Yoshida (Univ. of Tsukuba) |
(6) |
14:40-15:00 |
An Analysis of Placement of Multiple Home Agents in Mobile IPv6 |
Makoto Endo, Fumio Teraoka (Keio Univ.) |
(7) |
15:00-15:20 |
On locating lossy segments for SIP signaling message in SIP service |
Takeshi Usui, Takeshi Kubo, Yoshinori Kitatsuji, Teruyuki Hasegawa, Hidetoshi Yokota (KDDI lab) |
|
15:20-15:40 |
Break ( 20 min. ) |
Thu, Mar 5 PM 15:40 - 17:40 |
(8) |
15:40-16:00 |
Reliable Streaming Transmission Using PR-SCTP |
Tomotaka Maeda, Masahiro Kozuka, Yasuo Okabe (Kyoto Univ) |
(9) |
16:00-16:20 |
A study on XCP routers' misbehaviors on congestion control |
Hieu Hanh Le, Masayoshi Shimamura, Kenji Masui, Katsuyoshi Iida (Tokyo Inst. of Tech.) |
(10) |
16:20-16:40 |
A Proposal of Distributed Authentication Platform and Public Identifiers
-- On Appropriateness of Web Traversal Anonymous Authentication using OpenID -- |
Aya Okashita (NEC) |
(11) |
16:40-17:00 |
Proposal and Implementation of P2P Streaming System with Smooth Stream Switching |
Eiji Kominami, Naomi Terada, Eiji Kawai, Kazutoshi Fujikawa, Hideki Sunahara (Nara Inst. of S and T.) |
(12) |
17:00-17:20 |
Proposal of geographical range search on P2P network |
Hideki Kamiya, Hiroshi Mineno (Shizuoka Univ.), Tomoyuki Osano, Hiromitsu Sumino, Norihiro Ishikawa (NTT dokomo), Tadanori Mizuno (Shizuoka Univ.) |
(13) |
17:20-17:40 |
Implementation of precision clock synchronization protocol to IEEE802.11 |
Masayuki Hiyama (Nagaoka Univ. of Tech.), Katsuyuki Yamazaki (Nagaoka Univ. of Tech/Univ. of Tokyo.), Yuichi Morita, Masanao Shinohara, Toshihiko Kanazawa (Univ. of Tokyo.) |
Thu, Mar 5 PM 13:00 - 15:20 |
(14) |
13:00-13:20 |
Reduction of Operation Cost Using Thin Client Management Tool |
Tatsumi Abe (The University of Tokyo), Takeshi Shimomura, Tatsuo Imogawa (Canon IT Solutions Inc.), Takayuki Sekiya, Kazutaka Maruyama (The University of Tokyo) |
(15) |
13:20-13:40 |
Study on Path Control for Reliable Transport |
Hitoshi Yabusaki, Daisuke Matsubara (Hitachi.LTD) |
(16) |
13:40-14:00 |
Design of HD Videoconference Systems for Remote Lectures at 18 National Universities |
Takeshi Sakurada, Yoichi Hagiwara (Tokyo Univ. of A&T) |
(17) |
14:00-14:20 |
Attendance management by the Web base system with the QR code |
Koji Ishikawa, Kunihiko Mori (Kagoshima Univ.) |
(18) |
14:20-14:40 |
Entropy Study on A Resource Record DNS Query Traffic from the Campus Network |
Kazuya Takemori, Wei Juan Kong, Dennis Arturo Ludena Romana, Shinichiro Kubota, Kenichi Sugitani, Yasuo Musashi (Kumamoto Univ.) |
(19) |
14:40-15:00 |
String Matching Algorithms specialized for IDS |
Takashi Imaizumi (Chiba Univ.), Keisuke Mizuno (Nara Inst. of S and T) |
(20) |
15:00-15:20 |
Configuration of Redundant Network in Okayama University via Regional IXes and SINET |
Nariyoshi Yamai, Kiyohiko Okayama, Yong Jin, Keita Kawano, Yoshihiro Oosumi (Okayama Univ.) |
|
15:20-15:40 |
Break ( 20 min. ) |
Thu, Mar 5 PM 15:40 - 18:00 |
(21) |
15:40-16:00 |
A Solving Method for SPF Forwarded Mail Problem by Tracing Recipient Addresses |
Takumi Seike, Kiyohiko Okayama, Keita Kawano (Okayama Univ.), Motonori Nakamura (NII), Nariyoshi Yamai (Okayama Univ.) |
(22) |
16:00-16:20 |
A Wearable Device Support System using Virtualization and IP Mobility Architecture |
Hidenobu Watanabe, Toshihiro Ohigashi, Tohru Kondo, Kouji Nishimura, Reiji Aibara (Hiroshima Univ) |
(23) |
16:20-16:40 |
musasabi: a P2P-based Platform for Stable Services |
Kota Abe (Osaka City Univ.) |
(24) |
16:40-17:00 |
A User-oriented Digital Signage System with a contents registration function |
Kaoru Suzuki, Kaori Maeda, Hiroyuki Inoue (Hiroshima City Univ.) |
(25) |
17:00-17:20 |
A system for geoinformation-attached video streaming over P2P network using mobile devices |
Tatsuya Ueda, Kota Abe, Hayato Ishibashi, Toshio Matsuura (Osaka City Univ.), Hiroshi Fujii, Shiu Sakashita (Acutus Software, Inc.) |
(26) |
17:20-17:40 |
Development of "Opengate-PKI" Network User Authentication System with PKI |
Suguru Fujisawa, Makoto Otani, Kenzi Watanabe (Saga University) |
(27) |
17:40-18:00 |
Shortening Boot Times of Guest OSes on OS Boot/Shutdown Control System using Authentication Devices |
Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano (Univ. of Tsukuba) |
|
- |
Dinner Break |
Thu, Mar 5 PM 20:00 - 22:40 |
(28) |
20:00-20:20 |
Evaluation of P2P Type File Distribution using IP Mobility |
Hajime Masaoka, Akio Seki, Seigo Kishiba, Tohru Kondo, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) |
(29) |
20:20-20:40 |
A remote power control system for PC classroom to save energy |
Mayu Funaki, Katsura Nishigaki, Akinori Saitoh (Tottory Univ. of Environmental Studies) |
(30) |
20:40-21:00 |
A system to re-register login password with less human resource |
Katsura Nishigaki, Akinori Saitoh (Tottori Univ. of Environmental Studies) |
(31) |
21:00-21:20 |
Implementation of an Access Control Mechanism that Enables Delegating Rights of Network Usage Permissions for Guest PCs |
Mitsuhiro Mabuchi, Tsuyoshi Ozawa, Shingo Takada, Hiraku Toyooka, Keigo Matsui, Akira Sato, Yasushi Shinjo, Kazuhiko Kato (Univ. of Tsukuba) |
(32) |
21:20-21:40 |
Effect of application order of topology inference rule for Layer2 Network Topology Visualizing System |
Shunsuke Fujita, Kazuyuki Yoshida (Oita Univ.) |
(33) |
21:40-22:00 |
Installation of Security Policy into Kumamoto University and DNS based Detection of Security Incidents in the Campus Network |
Yasuo Musashi (Kumamoto Univ.) |
(34) |
22:00-22:20 |
Instant OS image management system for various virtual machine environments |
Masahiko Yamazaki, Shunsuke Matsunaga, Hideo Masuda (Kyoto Inst. of Tech.) |
(35) |
22:20-22:40 |
Scan Attack Detection using the Counting of TCP Connection Request with Pseudo SYN-ACK Reply. |
Kenji Otsuka, Kiyoyuki Kodama, Yuuki Kinugasa (Oita Univ.), Kazuyuki Yoshida (oita Univ.) |
Fri, Mar 6 AM 08:30 - 10:30 |
(36) |
08:30-08:50 |
Proposal on Bayesian Spam Filter Using Distribution of Symbol and Unknown Word |
Kenji Ogawa, Hiroyuki Inaba (Kyoto Inst of Tech.) |
(37) |
08:50-09:10 |
Formalization of Knowledge for Automatic Administration System to the Internal Security Problem |
Soichiro Morishita (Univ. of Tokyo), Hiroki Hashiguchi, Taketoshi Mishima (Saitama Univ.) |
(38) |
09:10-09:30 |
Improving the educational assistant tool for BBS users using comments evaluation system |
Yu Ichifuji (Tohoku Univ.), Susumu Konno (Chiba Inst. of Tech), Hideaki Sone (Tohoku Univ.) |
(39) |
09:30-09:50 |
Proposal of The Access Control Agent System in the Internet for Semantics Cloud |
Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd), Hirotsugu Kinoshita (Kanagawa Univ.) |
(40) |
09:50-10:10 |
Consideration for Intellectual Property and standardization of MEMS
-- perspective of vertical integration and horizontal division of labor -- |
Yosuke Komori, Yukio Hiramatsu (Osaka Inst. of Tech.) |
(41) |
10:10-10:30 |
The Education of Internet Ethics in Korea and International Cooperation Methods |
Jungho Park (Sunmoon Univ.), Jinwook Chung (Sunkyunkwan Univ.), Angu Kang, Jaechul Seo (National Internet Development Agency, Korea) |
Fri, Mar 6 AM 08:30 - 10:30 |
(42) |
08:30-08:50 |
Design of A New Generation Network Protocol IP-- |
Kenji Fujikawa (NICT), Masataka Ohta (Tokyo Inst. of Tech.) |
(43) |
08:50-09:10 |
Proposal on 2-Dimensional Error Correcting Code with Self-Synchronization Capability for Digital Watermark |
Kenji Yoshizaki, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
(44) |
09:10-09:30 |
A Survey of deployment status of smart cards for autentication at universities |
Tetsutaro Uehara, Shoichi Shimizu, Yasuhiro Nagai, Takaaki Komura, Hajime Kita (Kyoto Univ.) |
(45) |
09:30-09:50 |
Single Sign-On with Opengate |
Hirofumi Eto, Makoto Otani, Kenzi Watanabe, Shin-ichi Tadaki (Saga Univ.) |
(46) |
09:50-10:10 |
A Management Method of MAC Address Authentication in Large-Scale Campus Networks |
Kouichi Tashima, Tohru Kondo, Seigo Kishiba, Toshihiro Ohigashi, Norikazu Iwata, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) |
(47) |
10:10-10:30 |
AS Relationships Estimation by Use of Eigenvalue Analysis |
Hirochika Asai, Hiroshi Esaki (Univ. of Tokyo) |
|
- |
Break |
Fri, Mar 6 AM 10:40 - 12:20 |
(48) |
10:40-11:00 |
A Survey on Computer Ethics Education in Foreign Countries
-- For Development of Teaching Materials by International Collaboration -- |
Takahiro Tagawa (Kyushu Univ.), Izumi Fuse, Shigeto Okabe (Hokkaido Univ.), Takahiro Sumiya, Atsushi Nakamura (Hiroshima Univ.), Takashi Yamanoue (Kagoshima Univ.), Takeo Tatsumi (Tokyo Univ. of Agr. & Tech.), Michio Nakanishi (Osaka Inst. of Tech.), Shozo Fukada (Ehime Univ.), Ikuya Murata (Hokkaido Univ. of Edu.), Tetsutaro Uehara (Kyoto Univ.), Tsuneo Yamada (National Institute of Multimedia Education) |
(49) |
11:00-11:20 |
Information ethics and moral of teacher education of information studies |
Takeo Tatsumi (Tokyo Univ. of Agri & Tech) |
(50) |
11:20-11:40 |
Information Ethics on Guidelines for the Course of Study and the cource materials |
Chiho Asai, Tetsutaro Uehara, Mikihiko Mori, Takaaki Tsuji, Kenji Ohira, Kokoro Ikeda, Hajime Kita (Kyoto Univer.) |
(51) |
11:40-12:00 |
About the Lecturer of the Information Society and its Examination to students Immediately after College Admission |
Kiyotaka Atsumi (Suzuka National College of Tech.) |
(52) |
12:00-12:20 |
Development of Learning Objects for Information Ethics Education Complying with the Context and Information Ethics |
Haruo Kodama (NIME/Graduate Univ. for Adbanced Studies.) |
|
- |
Lunch Break |
Fri, Mar 6 PM 13:30 - 14:55 |
(53) |
13:30-14:30 |
[Invited Talk]
Information morality requested from enterprise |
Ritsuko Watanabe (Inst. of HyperNetwork Society.) |
|
14:30-14:50 |
( 20 min. ) |
|
14:50-14:55 |
Closing Address ( 5 min. ) |