Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, CS, IN |
2004-09-02 13:00 |
Miyagi |
Tohoku University |
-
-- - -- Norio Yamagaki, Hideki Tode, Koso Murakami (Osaka Univ.) |
Recently, various types of traffic have increased with the development of broadband networks. Thus, the realization of Q... [more] |
NS2004-84 IN2004-43 CS2004-39 pp.1-4 |
NS, CS, IN |
2004-09-02 13:25 |
Miyagi |
Tohoku University |
- Rie Fujita, Hiroki Shimabara, Hideki Tode, Toshihiro Masaki, Koso Murakami (Osaka Univ.) |
[more] |
NS2004-85 IN2004-44 CS2004-40 pp.5-8 |
NS, CS, IN |
2004-09-02 13:50 |
Miyagi |
Tohoku University |
- Koji Sugisono, Seisho Yasukawa, Takashi Kurimoto (NTT) |
[more] |
NS2004-86 IN2004-45 CS2004-41 pp.9-12 |
NS, CS, IN |
2004-09-02 14:15 |
Miyagi |
Tohoku University |
[Encouragement Talk]
- -, Miki Yamamoto (Osaka Univ.) |
[more] |
NS2004-87 IN2004-46 CS2004-42 pp.13-16 |
NS, CS, IN |
2004-09-02 15:00 |
Miyagi |
Tohoku University |
Tree-Based Flow Tracing for Locating Network Pathologies Kazuhide Koide (Tohoku Univ.), Glenn Mansfield Keeni, Takeo Saito (CySols), Gen Kitagata, Norio Shiratori (Tohoku Univ.) |
If measurement points are in a leaf site, cause of the limitation of the
network information, it is difficult to catch ... [more] |
NS2004-88 IN2004-47 CS2004-43 pp.17-22 |
NS, CS, IN |
2004-09-02 15:25 |
Miyagi |
Tohoku University |
Experiments on Event Detection by Traffic Monitoring Katsuhisa Abe (Tohoku Univ.), Glenn Mansfield Keeni (Cyver Solutions), Norio Shiratori (Tohoku Univ.) |
In this work we propose a mechanism to detect indications of events, such as network failure, operational failure and se... [more] |
NS2004-89 IN2004-48 CS2004-44 pp.23-26 |
NS, CS, IN |
2004-09-02 15:50 |
Miyagi |
Tohoku University |
- -, Susumu Konno, Yukio Iwaya, Toru Abe, Tetsuo Kinoshita (Tohoku Univ.) |
[more] |
NS2004-90 IN2004-49 CS2004-45 pp.27-30 |
NS, CS, IN |
2004-09-02 16:15 |
Miyagi |
Tohoku University |
[Encouragement Talk]
- Akihito Okura, Hiroshi Kawakami, Takeshi Ihara, Akira Miura (NTT DoCoMo) |
IP Network has been under examination as future cellular network. In IP networks, QoS control is necessary to differenti... [more] |
NS2004-91 IN2004-50 CS2004-46 pp.31-34 |
NS, CS, IN |
2004-09-02 17:00 |
Miyagi |
Tohoku University |
[Invited Talk]
IDS/IPS Extensions of OS Kernel
-- The Concept, Implementation and Applications -- Takashi Horie (NTT DATA Co.) |
In recent years, SELinux has attracted a lot of interest. It has stricter access control mechanisms than traditional UNI... [more] |
NS2004-92 IN2004-51 CS2004-47 pp.35-42 |
NS, CS, IN |
2004-09-02 13:00 |
Miyagi |
Tohoku University |
An Architecture for the Home Interlinking Network
-- Network Connecter for Invariable Topology -- Juhro Takase (Tokyo Urban Tech) |
The Home Interlinking Network (HIN) and its architecture are proposed as a means to support the increasing number of eld... [more] |
NS2004-93 IN2004-52 CS2004-48 pp.43-48 |
NS, CS, IN |
2004-09-02 13:25 |
Miyagi |
Tohoku University |
A Routing Protocol for the Home Interlinking Network
-- Based on the Source Routing -- Juhro Takase (Tokyo Urban Tech) |
In the Home Interlinking Network (HIN), which has network connectors that allow flooding at each node in order to bypass... [more] |
NS2004-94 IN2004-53 CS2004-49 pp.49-54 |
NS, CS, IN |
2004-09-02 13:50 |
Miyagi |
Tohoku University |
- Norihito Fujita, Yuichi Ishikawa, Toshio Koide, Akira Tsukamoto (NEC) |
Scalable deployment and management of overlay networks for collaborative
groups with dynamic membership are discussed. ... [more] |
NS2004-95 IN2004-54 CS2004-50 pp.55-58 |
NS, CS, IN |
2004-09-02 14:15 |
Miyagi |
Tohoku University |
Proposal on Server Support Approach to Zero Configuration In-Home Networking Kiyohito Yoshihara (KDDI R&D Labs.), Takeshi Kouyama, Masayuki Nishikawa (KDDI corp.), Hiroki Horiuchi (KDDI R&D Labs.) |
This paper proposes a new server support approach to zero
configuration in-home networking, in order to reduce complica... [more] |
NS2004-96 IN2004-55 CS2004-51 pp.59-64 |
NS, CS, IN |
2004-09-02 15:00 |
Miyagi |
Tohoku University |
- Hideo Kamada, Kazuhiko Kinoshita (Osaka Univ.), Nariyoshi Yamai (Okayama Univ.), Hideki Tode, Koso Murakami (Osaka Univ.) |
[more] |
NS2004-97 IN2004-56 CS2004-52 pp.65-68 |
NS, CS, IN |
2004-09-02 15:25 |
Miyagi |
Tohoku University |
Detecting Feature Interactions in Integrated Services of Networked Home Appliances Hiroshi Igaki, Youhei Kushido, Ken-ichi Ishii, Masahide Nakamura, Ken-ichi Matsumoto (NAIST) |
The integrated services are one of the major applications of the home network system. Features of multiple networked app... [more] |
NS2004-98 IN2004-57 CS2004-53 pp.69-74 |
NS, CS, IN |
2004-09-02 15:50 |
Miyagi |
Tohoku University |
An experimental evaluation of topologies integrating Web services Ken-ichi Ishii, Youhei Kushido, Hiroshi Igaki, Masahide Nakamura, Ken-ichi Matsumoto (NAIST) |
Web services are a powerful service-oriented infrastructure to provide various value-added services, which specifically ... [more] |
NS2004-99 IN2004-58 CS2004-54 pp.75-80 |
NS, CS, IN |
2004-09-02 16:15 |
Miyagi |
Tohoku University |
Dynamic QoS control for 3D virtual space based on user-oriented control policy Ryosuke Ohmae, Takuo Suganuma, Norio Shiratori (Tohoku Univ.) |
Recently, applications using 3D-virtual space technology become widely used.
In the future, various users will particip... [more] |
NS2004-100 IN2004-59 CS2004-55 pp.81-86 |
NS, CS, IN |
2004-09-03 09:00 |
Miyagi |
Tohoku University |
Proposal of tracing DoS attack roots by analysing traffic patterns using Independent Component Analysis Tohru Satoh, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) |
In recent years, DoS(Denial of Service) attack and more powerful DDoS(Distributed DoS) attack pose security problems on... [more] |
NS2004-101 IN2004-60 CS2004-56 pp.1-6 |
NS, CS, IN |
2004-09-03 09:25 |
Miyagi |
Tohoku University |
Detecting DRDoS Attacks with Bidirectional Packet Confirmation Atsunori Yamamoto (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Hiroshi Tsunoda, Nei Kato, Yoshiaki Nemoto (Tohoku Univ.) |
In DRDoS attacks, which are threat in today's Internet, the attacker attacks the target host with response packets from ... [more] |
NS2004-102 IN2004-61 CS2004-57 pp.7-12 |
NS, CS, IN |
2004-09-03 09:50 |
Miyagi |
Tohoku University |
A study of detecting DoS attack by using automatically generated traffic patterns Youta Hiraishi, Ippei Watanabe, Mitsuru Miyauchi (CIT) |
In this paper, detection techniques for DoS attack are proposed, by comparing the estimated forecast traffic with actual... [more] |
NS2004-103 IN2004-62 CS2004-58 pp.13-18 |