Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS, CS (Joint) |
2006-09-14 09:30 |
Miyagi |
|
Topology Design Strategy for WDM Grid Computing Networks Galy Lee (Waseda Univ.), Sugang Xu (NICT), Yoshiaki Tanaka (Waseda Univ.) IN2006-49 |
Requirement for powerful ultra high-performance computer system pushes the research and development of technologies for ... [more] |
IN2006-49 pp.1-6 |
IN, NS, CS (Joint) |
2006-09-14 09:50 |
Miyagi |
|
Achieving predictable throughput of TCP based on inline network Kana Yamanegi, Go Hasegawa, Masayuki Murata (Osaka Univ.) IN2006-50 |
[more] |
IN2006-50 pp.7-12 |
IN, NS, CS (Joint) |
2006-09-14 10:10 |
Miyagi |
|
Characteristic Evaluation of Path Construction Using Link Weight Considering Characteristic of High-Functional Nodes Yudai Nitta, Taro Hashimoto, Katsuyoshi Iida, Katsunori Yamaoka, Yoshinori Sakai (Tokyo Tech.) IN2006-51 |
When high functional node with the retransmission processing exists, we proposed new link weight which integrate the del... [more] |
IN2006-51 pp.13-18 |
IN, NS, CS (Joint) |
2006-09-14 10:30 |
Miyagi |
|
A Study on the Stability of Control Plane with Retrial Traffic
-- A Comparizon of Hard- and Soft-State Protocols -- Masaki Aida (Tokyo Metropolitan Univ.), Chisa Takano (NTT-AT), Masayuki Murata, Makoto Imase (Osaka Univ.) IN2006-52 |
[more] |
IN2006-52 pp.19-24 |
IN, NS, CS (Joint) |
2006-09-14 11:00 |
Miyagi |
|
Distributed Progressive Method of ALM Tree Construction for Bi-Directional Real-Time Multimedia Communication Kenichiro Takano, Toshiaki Osada, Gen Kitagata, Tetsuo Kinoshita, Norio Shiratori (Tohoku Univ.) IN2006-53 |
[more] |
IN2006-53 pp.25-29 |
IN, NS, CS (Joint) |
2006-09-14 11:20 |
Miyagi |
|
Semi-Structured Peer-to-Peer Networks Capable of Access Load Balancing Satoshi Nagamatsu, Toshiya Okamura, Kei Ohnishi, Yuji Oie (Kyushu Inst. of Tech.) IN2006-54 |
The present P2P systems widely use flooding-based methods to locate
contents. The flooding-based methods have high acc... [more] |
IN2006-54 pp.31-36 |
IN, NS, CS (Joint) |
2006-09-14 11:40 |
Miyagi |
|
Evaluation of QoS overlay routing algorithm to cope with changes in traffic patterns Ryoichi Kawahara (NTT), Masato Uchida (Kyushu Inst. of Tech.), Satoshi Kamei (NTT) IN2006-55 |
A recent trend in routing research is the use of overlay routing to improve end-to-end QoS without changing the network ... [more] |
IN2006-55 pp.37-42 |
IN, NS, CS (Joint) |
2006-09-14 13:30 |
Miyagi |
|
[Invited Talk]
On Tracing and Mitigating Distributed Denial of Service Attacks Nirwan Ansari (New Jersey Inst. of Tech.) NS2006-76 IN2006-56 CS2006-22 |
The CSI/FBI surveys have been revealing that the (distributed) denial of service ((D)DoS) attacks are still a major conc... [more] |
NS2006-76 IN2006-56 CS2006-22 pp.33-43(NS), pp.43-53(IN), pp.1-11(CS) |
IN, NS, CS (Joint) |
2006-09-14 14:15 |
Miyagi |
|
[Invited Talk]
* Katsumi Nagata (Plala networks) NS2006-77 IN2006-57 CS2006-23 |
[more] |
NS2006-77 IN2006-57 CS2006-23 p.45(NS), p.55(IN), p.13(CS) |
IN, NS, CS (Joint) |
2006-09-14 15:10 |
Miyagi |
|
[Invited Talk]
The multi layered security Hiromi Ruri (Intec NetCore, Inc.) NS2006-78 IN2006-58 CS2006-24 |
[more] |
NS2006-78 IN2006-58 CS2006-24 pp.47-52(NS), pp.57-62(IN), pp.15-20(CS) |
IN, NS, CS (Joint) |
2006-09-14 15:55 |
Miyagi |
|
[Invited Talk]
One-Time Password Authentication Methods Takasuke Tsuji (Trinity Security Systems), Akihiro Shimizu (Kochi Univ. of Tech.) NS2006-79 IN2006-59 CS2006-25 |
Internet and mobile communication applications for managing personal information have been developing. Those application... [more] |
NS2006-79 IN2006-59 CS2006-25 pp.53-56(NS), pp.63-66(IN), pp.21-24(CS) |
IN, NS, CS (Joint) |
2006-09-14 16:40 |
Miyagi |
|
[Invited Talk]
Traffic feature analysis and application discrimination Fumitaka Nakamura (The University of Tokyo), Takashi Matsuda (Global Information and Telecommunication Institute), Yasushi Wakahara (Graduate School of Frontier Sciences, The University of Tokyo), Yoshiaki Tanaka (Global Information and Telecommunication Institute) NS2006-80 IN2006-60 CS2006-26 |
In this paper, We introduce packet discrimination method and its evaluation which we have proposed and presented. The me... [more] |
NS2006-80 IN2006-60 CS2006-26 pp.57-62(NS), pp.67-72(IN), pp.25-30(CS) |
IN, NS, CS (Joint) |
2006-09-15 09:00 |
Miyagi |
|
The analysis method for real-time traffic problems by using Contents Oriented Communications for VANET Junya Fukumoto, Naoto Sirokane, Eisuke Kadokawa, Masashi Sandaizi, Tomotaka Wada (Kansai Univ.), Kazuhiro Ohtsuki (Koube Univ.), Hiromi Okada (Kansai Univ.) IN2006-61 |
Recently, ITS ( Intelligent Transport Systems ) has been paid attention to by people all over the world. ITS is the syst... [more] |
IN2006-61 pp.73-76 |
IN, NS, CS (Joint) |
2006-09-15 09:20 |
Miyagi |
|
A Study on Open Policy Delivery Services for Application Layer Tohru Okuyama, Tomoaki Oida (Asahi Univ.) IN2006-62 |
It is necessary to provide a policy delivery approach for building up policy control services such as making VPN connect... [more] |
IN2006-62 pp.77-80 |
IN, NS, CS (Joint) |
2006-09-15 09:40 |
Miyagi |
|
A Proposal for Context Information Management Scheme for Ubiquitous Information Environment based on Multiagent Framework Yoshikazu Tokairin, Kazuhiro Yamanaka, Hideyuki Takahashi, Gen Kitagata, Takuo Suganuma, Norio Shiratori (Tohoku Univ.) IN2006-63 |
In this paper we propose an effective context information management scheme based on multi-agent framework. To do this w... [more] |
IN2006-63 pp.81-86 |
IN, NS, CS (Joint) |
2006-09-15 10:00 |
Miyagi |
|
A Proposal for User-oriented Watch-over System based on Symbiotic Computing Kazuhiro Yamanaka, Yoshikazu Tokairin, Hideyuki Takahashi (Tohoku Univ.), Goichi Itabashi (Scientia), Gen Kitagata, Takuo Suganuma, Norio Shiratori (Tohoku Univ.) IN2006-64 |
In this paper, we propose a ubiquitous watching over system ``uEyes'' which gently provides live video streaming service... [more] |
IN2006-64 pp.87-92 |
IN, NS, CS (Joint) |
2006-09-15 10:30 |
Miyagi |
|
Development of 1Gbps Fullwire Security Accelerator Kazuya Asano, Tomokazu Aoki, Teruhiko Nagatomo, Taku Sugawara, Taul Katayama, Junichi Hashida, Norio Abe, Hiroaki Takagi (FLS), Hiromitsu Horie (Fujitsu) IN2006-65 |
We developed a security accelerator LSI which can process IPSEC providing wire-rate full-duplex 1Gbps throughput across ... [more] |
IN2006-65 pp.93-95 |
IN, NS, CS (Joint) |
2006-09-15 10:50 |
Miyagi |
|
Performance Evaluation of Flow Hog Identification Method Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara (NTT) IN2006-66 |
Worm-infected hosts generate a large number of flows during a short time. We proposed a method identifying hosts that ge... [more] |
IN2006-66 pp.97-102 |
IN, NS, CS (Joint) |
2006-09-15 11:10 |
Miyagi |
|
Asynchronous IPsec stack for Linux 2.6 kernel: implementation and performance evaluation Keisuke Mera, Takeshi Ishihara, Shigeo Matsuzawa (Toshiba) IN2006-67 |
Hardware cipher processing of IPsec protocol have been used for reducing the load of IPsec packet processing.
Such a me... [more] |
IN2006-67 pp.103-108 |
IN, NS, CS (Joint) |
2006-09-15 11:30 |
Miyagi |
|
A Proposal for Distributed Network Event Management System Tatsuya Komatsu, Masahiro Nagao (Tohoku Univ), Kazuhide Koide (NICT), Gen Kitagata, Takuo Suganuma (Tohoku Univ), Glenn Mansfield Keeni (Cyber Solutions), Norio Shiratori (Tohoku Univ) IN2006-68 |
[more] |
IN2006-68 pp.109-113 |
|