Thu, Jan 20 PM 13:00 - 14:15 |
(1) |
13:00-13:25 |
Pics 'n' Trails: an Open Multimedia Dataset for Lifelog Research |
Chaminda de Silva, Kiyoharu Aizawa (Univ. of Tokyo), Yuki Arase, Xing Xie (Microsoft Research Asia) |
(2) |
13:25-13:50 |
Personalized Ubiquitous-Environment Roaming Architecture: PURE |
Toru Kobayashi, Masami Ueno (NTT), Yoshikatsu Tada (UEC) |
(3) |
13:50-14:15 |
A Research on the Image Accessibility Improvement in the Web Services. |
Junpei Ukita, Toshihiko Wakahara (FIT) |
|
14:15-14:25 |
Break ( 10 min. ) |
Thu, Jan 20 PM 14:25 - 16:05 |
(4) |
14:25-14:50 |
[Encouragement Talk]
Traffic Control of Virtual Machine using Flow-based Analysis |
Shuichiro Aiba, Mahito Ogura, Minoru Kato, Satoshi Matsumoto (NTT COMWARE) |
(5) |
14:50-15:15 |
Streaming videos on nation-wide OpenFlow-based network in Snow Festival 2010 |
Yoshihiko Kanaumi, Shuichi Saito, Eiji Kawai (NICT) |
(6) |
15:15-15:40 |
Design and Implementation of Socket API Assigning Optical Paths to L4 Connections |
Kenji Fujikawa, Tomoji Tomuro, Hideki Otsuki (NICt) |
(7) |
15:40-16:05 |
Impact of Inaccurate Score Distribution Expectation on Agent Execution Control for Information Retrieval with Time Constraint |
Atsushi Narishige, Kazuhiko Kinoshita (Osaka Univ.), Nariyoshi Yamai (Okayama Univ.), Koso Murakami (Osaka Univ.) |
|
16:05-16:15 |
Break ( 10 min. ) |
Thu, Jan 20 PM 16:15 - 17:30 |
(8) |
16:15-16:40 |
A study of image displayable design QR code |
Kazuaki Fujita, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) |
(9) |
16:40-17:05 |
On Error Correcting Capability of QR Code
-- On Decoding with Error Correction Beyond the Bounded-distance and Erasure Error Correction -- |
Keisuke Saito, Yusuke Endo, Masakatu Morii (Kobe Univ.) |
(10) |
17:05-17:30 |
A User Attestation System Using a Cellular Phone Equipped with Digital Camera and 2D Color Code |
Noriyasu Yamamoto, Toshihiko Wakahara (FIT) |
|
17:30-17:40 |
Break ( 10 min. ) |
Thu, Jan 20 PM 17:40 - 18:30 |
(11) |
17:40-18:05 |
[Special Talk]
Report on CNSM2010 |
Kenji Hori, Daisuke Arai, Kiyohito Yoshihara (KDDI Labs.) |
(12) |
18:05-18:30 |
[Special Talk]
Report on 6th International Conference on Network and Service Management (CNSM 2010) |
Takashi Miyamura, Shohei Kamamura, Kohei Shiomoto (NTT) |
Fri, Jan 21 AM 09:30 - 10:45 |
(13) |
09:30-09:55 |
A Study on a Framework for Designing |
Teruaki Suzuki (Niigata Univ. of Mngmnt) |
(14) |
09:55-10:20 |
A Study on the Implement Model of Common EMSs by Technology Comparative Analysis |
Manabu Nishio (NTT) |
(15) |
10:20-10:45 |
Study of allocation method for guarantee service in Optical Access Network |
Shunsuke Kanai, Atsushi Itou, Atsushi Yamakawa, Tsutomu Maruyama (NTT) |
|
10:45-10:55 |
Break ( 10 min. ) |
Fri, Jan 21 AM 10:55 - 12:10 |
(16) |
10:55-11:20 |
Life-log Utilization Model based on Positive Human Affordance |
Masayuki Ihara, Minoru Kobayashi (NTT), Takahiro Yoshioka (Kyushu Univ.) |
(17) |
11:20-11:45 |
A New One-time Authentication System Using a Cellular Phone with FeliCa Chip |
Yusuke Kowakame, Toshihiko Wakahara (FIT) |
(18) |
11:45-12:10 |
A detection method using WAF to identify obfuscated malicious JavaScript |
Yoshinori Matsumoto (Univ. Of Hyogo), Takuho Mitsunaga, Nobuaki Kondo (KDL), Yukio Rikiso (Univ. Of Hyogo) |
|
12:10-13:30 |
Break (Lunch) ( 80 min. ) |
Fri, Jan 21 PM 13:30 - 14:45 |
(19) |
13:30-13:55 |
A Multi-Platform Vulnerability Management System Based on the Standard Protocol and Public Contents |
Akihito Nakamura (AIST) |
(20) |
13:55-14:20 |
A Failure Restoration Method for Users on Virtual Hosting Service. |
Mahito Ogura, Shuichiro Aiba, Minoru Kato, Satoshi Matsumoto (NTT COMWARE) |
(21) |
14:20-14:45 |
A study of the efficient method of legacy network management system software renewal |
Takashi Okamura, Hiroyuki Nagashima (COMWARE) |