Thu, Dec 13 PM 13:30 - 15:10 |
(1) |
13:30-13:55 |
On the effectiveness of large scale module netwrok |
Takanori Komatsu, Akira Namatame (NDA) |
(2) |
13:55-14:20 |
A proposal of communication link model based on resonance frequency of network users |
Masato Uwajima, Toru Sasaki, Chisa Takano, Masaki Aida (Tokyo Metropolitan Univ.) |
(3) |
14:20-14:45 |
A new moderate UDT improving throughput fairness with other high-speed transport protocols |
Shinya Kawano, Hisashi Koga, Toshinori Watanabe (UEC) |
(4) |
14:45-15:10 |
A Two-way Anonymous Communication Method without Routing Information |
Kosuke Matsubara, Masaaki Niimura, Yasushi Fuwa (Shinshu Univ.) |
|
15:10-15:25 |
Break ( 15 min. ) |
Thu, Dec 13 PM 15:25 - 17:05 |
(5) |
15:25-15:50 |
Tele-traffic Analysis of a Single-server Queuing System with Time-out Scheme |
Kentaro Hoshi, Sumito Iijima, Yoshitaka Takahashi, Naohisa Komatsu (Waseda Univ) |
(6) |
15:50-16:15 |
Estimation of Larger Quantiles Based on the r Largest Traffic Data |
Hirofumi Yokoi, Isami Nakajima, Katsunori Ori (NTT), Katsunori Yamaoka (Tokyo Tech) |
(7) |
16:15-16:40 |
Efficient Management of Access Control List by Combining Prefix Expansion and Range Matching Devices |
Haesung Hwang (Osaka Univ.), Koji Yamamoto (Renesas Technology), Shingo Ata (Osaka City Uni.), Kazunari Inoue (Renesas Technology), Masayuki Murata (Osaka Univ.) |
(8) |
16:40-17:05 |
Proposal on wireless LAN MAC Frame Contorl in Receive Opportunity for Flow QoS |
Tutomu Murase, Yumi Hirano (NEC), Shigeo Shioda, Shiro Sakata (Univercity of Chiba) |
|
17:05-17:20 |
Break ( 15 min. ) |
Thu, Dec 13 PM 17:20 - 18:05 |
(9) |
17:20-18:05 |
[Invited Talk]
Network-wide Internet Traffic Measurement/Analysis and Anomolous Traffic Detection |
Keisuke Ishibashi (NTT) |
Fri, Dec 14 AM 10:00 - 11:40 |
(10) |
10:00-10:25 |
A Heuristic Algorithm for Access Point Allocation in Indoor Environments for Wireless Mesh Networks |
Tamer Farag, Nobuo Funabiki, Toru Nakanishi (Okayama Univ.) |
(11) |
10:25-10:50 |
Simulation of selecting a connection point for communications between heterogeneous wireless networks |
Masato Fukui, Xuejun Tian, Tetsuo Ideguchi, Takashi Okuda (Aichi-Pre Univ.) |
(12) |
10:50-11:15 |
A Clustering Method to Improve Data Aggregation in Wireless Sensor Networks |
Naotaka Tsutsumi, Shinji Inoue, Yoshiaki Kakuda (Hiroshima City Univ.) |
(13) |
11:15-11:40 |
Proposal of Time Synchronization for Intermittent Communication Considering Paths in Wireless Sensor Networks |
Satoshi Kuwatsuka, Shinji Inoue, Yoshiaki Kakuda (Hiroshima City Univ.) |
|
11:40-12:40 |
Lunch Break ( 60 min. ) |
Fri, Dec 14 PM 12:40 - 14:20 |
(14) |
12:40-13:05 |
Evaluation of hardware-based IPsec processing method for embedded devices |
Yasuhiro Fukuju, Keisuke Mera, Takeshi Ishihara (Toshiba Corp.) |
(15) |
13:05-13:30 |
Entropy-based Analysis of User IP Space |
Zhenxing Lu, Marat Zhanikeev, Yoshiaki Tanaka (Waseda Univ.) |
(16) |
13:30-13:55 |
A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads |
Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) |
(17) |
13:55-14:20 |
Classifying Network Anomaly Events Using the Occurence Probability of Correlation Coefficients |
Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) |
|
14:20-14:35 |
Break ( 15 min. ) |
Fri, Dec 14 PM 14:35 - 15:50 |
(18) |
14:35-15:00 |
A study of contents discovery methods applying user relationship on ad-hoc network |
Naoyuki Hirata (Tokai Univ), Yoshiko Sueda, Osamu Mizuno (NTT), Hiroshi Ishii (Tokai Univ) |
(19) |
15:00-15:25 |
A File Fetching Method to Reduce the Redundant Traffic on P2P Networks |
Akihiko Ishidu, Junichi Funasaka, Kenji Ishida (Hiroshima City Univ.) |
(20) |
15:25-15:50 |
An Evaluation of the Most Suitable Server Selection by Remote Observation over the Testbed |
Keisuke Utsu, Masaki Shioda, Hiroshi Ishii (Tokai Univ.) |