Thu, Mar 3 AM Opening 11:00 - 11:10 |
|
11:00-11:10 |
Opening Address ( 10 min. ) |
Thu, Mar 3 AM IOT Session 1 (Campus Network) 11:10 - 12:00 |
(1) |
11:10-11:35 |
|
(2) |
11:35-12:00 |
|
Thu, Mar 3 AM IA Session 1 (UAV, Flow Control) 11:10 - 12:00 |
(3) IA |
11:10-11:35 |
Design of Flight Information Registration and Management Functions for UAV Concierge System |
Shun'ichiro Ito, Shigeru Kashihara (NAIST), Hiroshi Yamamoto (Ritsumei Univ), Suguru Yamaguchi (NAIST) |
(4) IA |
11:35-12:00 |
A Distributed Flow Control using Backward Propagation |
Kohei Tsutsumi (Kwansei Gakuin Univ), Hideaki Suzuki (NICT/CiNet), Hiroyuki Ohsaki (Kwansei Gakuin Univ) |
|
12:00-13:00 |
Lunch Break ( 60 min. ) |
Thu, Mar 3 PM IOT Session 2 (System Development) 13:00 - 14:40 |
(5) |
13:00-13:25 |
|
(6) |
13:25-13:50 |
|
(7) |
13:50-14:15 |
|
(8) |
14:15-14:40 |
|
Thu, Mar 3 PM IA Session 2 (SDN OpenFlow) 13:00 - 14:40 |
(9) IA |
13:00-13:25 |
Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services |
Nor Masri bin Sahri, Koji Okamura (Kyushu University) |
(10) IA |
13:25-13:50 |
An Analysis of Botnet Attack for SMTP Server using Software Define Network (SDN) |
Mohd Zafran Bin Abdul Aziz, Koji Okamura (Kyushu University) |
(11) IA |
13:50-14:15 |
Implementing Multicasting Openflow Controller Based on Heuristic algorithm |
Alaa Allakany, Koji Okamura (Kyushu Univ.) |
(12) IA |
14:15-14:40 |
Detection and Control of DNS-based Botnet Communications by using SDN-Ryu Solution |
Sebastian Li, Yong Jin, Katsuyoshi Iida (Tokyo Tech) |
|
14:40-14:50 |
Break ( 10 min. ) |
Thu, Mar 3 PM IOT Session 3 (Disaster) 14:50 - 15:40 |
(13) |
14:50-15:15 |
|
(14) |
15:15-15:40 |
|
Thu, Mar 3 PM IA Session 3 (Overlay Networking) 14:50 - 16:05 |
(15) IA |
14:50-15:15 |
A Structured Overlay to Construct Routing Tables by Stochastic Entry Deleting Method |
Shuhei Mitsuyama, Masashi Hojo, Kazuyuki Shudo (Tokyo Tech) |
(16) IA |
15:15-15:40 |
FRT-Skip Graph: A Skip Graph-Style Strucutred Overlay based on Flexible Routing Tables |
Masashi Hojo (Tokyo Tech), Ryohei Banno (NTT), Kazuyuki Shudo (Tokyo Tech) |
(17) IA |
15:40-16:05 |
Self-Refining Skip Graph: A Structured Overlay Approaching to Ideal Skip Graph |
Takafumi Kawaguchi, Ryohei Banno, Masashi Hojo, Kazuyuki Shudo (Tokyo Tech) |
|
16:05-16:15 |
Break ( 10 min. ) |
Thu, Mar 3 PM IOT Session 4 (Failure) 16:15 - 17:30 |
(18) |
16:15-16:40 |
|
(19) |
16:40-17:05 |
|
(20) |
17:05-17:30 |
|
Thu, Mar 3 PM SITE Session 1 (Information Management and Ethics) 16:15 - 17:30 |
(21) SITE |
16:15-16:40 |
Balancing Content Filtering and Education
-- The Issue of Overblocking in School Education -- |
Takahiro Haga (GSGU), Akiko Igarashi (Uchida) |
(22) SITE |
16:40-17:05 |
Life Story Work, Self-Information, and Identity
-- How birth information presentation works on children's identity -- |
Akiyoshi Kabeya (Chiba Univ.) |
(23) SITE |
17:05-17:30 |
A study of trustworthy information for Internet users |
Shinji Ishii, Takaaki Hasegawa (Saitama Univ.) |
Fri, Mar 4 AM IOT Session 5 (Virtualization, Cloud) 08:55 - 10:35 |
(24) |
08:55-09:20 |
|
(25) |
09:20-09:45 |
|
(26) |
09:45-10:10 |
|
(27) |
10:10-10:35 |
|
Fri, Mar 4 AM IA Session 4 (CCN/NDN) 08:55 - 10:35 |
(28) IA |
08:55-09:20 |
Enhancement of Live Streaming Performance and Mobility in Data Oriented Network (NDN) |
Ryosuke Omae, Masatoshi Kawarasaki (Tsukuba Univ.) |
(29) IA |
09:20-09:45 |
Congestion Control Method in Information Centric Networking |
Daichi Tanaka, Masatoshi Kawarasaki (Univ. of Tsukuba) |
(30) IA |
09:45-10:10 |
On Estimating Message Diffusion Dynamics in Epidemic Broadcasting |
Yuta Hashimoto, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) |
(31) IA |
10:10-10:35 |
L5-path: A Session Layer Protocol on ZNA, a New Generation Network Architecture |
Hiroki Watanabe, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Mar 4 AM IOT Session 6 (Analysis) 10:45 - 12:00 |
(32) |
10:45-11:10 |
|
(33) |
11:10-11:35 |
|
(34) |
11:35-12:00 |
|
Fri, Mar 4 AM IA Session 5 (Management) 10:45 - 12:00 |
(35) IA |
10:45-11:10 |
Interactive Analysis of Large-scale Networks based on Integration of Multiple-layer Information |
Osamu Akashi, Kimihiro Mizutani, Toru Mano, Takeru Inoue (NTT), Kensuke Fukuda, Shigeo Urushidani (NII) |
(36) IA |
11:10-11:35 |
Network Type Dynamic Analysis System for Prevention of Malware Infection Expansion |
Satoshi Fuchigami, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) |
(37) IA |
11:35-12:00 |
A Proposal of Timeline-Based Event Log Management Method |
Takashi Tomine, Yu Tsuda (NICT), Akira Kato, Hideki Sunahara (Keio Univ.), Daisuke Inoue (NICT) |
|
12:00-13:00 |
Lunch Break ( 60 min. ) |
Fri, Mar 4 PM IOT Session 7 (Security, Failure, Campus Network) 13:00 - 15:05 |
(38) |
13:00-13:25 |
|
(39) |
13:25-13:50 |
|
(40) |
13:50-14:15 |
|
(41) |
14:15-14:40 |
|
(42) |
14:40-15:05 |
|
Fri, Mar 4 PM SITE Session 2 (Ethic and Privacy) 13:00 - 14:40 |
(43) SITE |
13:00-13:25 |
An Essay on Trust for Privacy Preserving 1 |
Kanako Kawaguchi (Tokyo Univ. of Arts) |
(44) SITE |
13:25-13:50 |
An proposal for planing privacy policy based on multi stakeholder process
-- Considering the practical experiment on the International cooperation information sharing platform -- |
Naonori Kato, Haruo Takasaki, Yosuke Murakami (KDDI Research Institute) |
(45) SITE |
13:50-14:15 |
Interpretation of the Pattern Language as the Aspect, and its Ethics |
Tetsuya Morizumi (Kanagawa Univ.) |
(46) SITE |
14:15-14:40 |
The Interest of "Personal Identity" and Privacy
-- Living in the "Scored Society" -- |
Takushi Otani (Kibi International Univ.) |
|
15:05-15:15 |
Break ( 10 min. ) |
Fri, Mar 4 PM Invited Talk 15:15 - 16:30 |
(47) |
15:15-16:15 |
|
|
16:15-16:30 |
Closing Address ( 15 min. ) |