Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, IPSJ-EIP |
2016-06-02 13:30 |
Kanagawa |
Institute of Information Security |
A detection method of man-in-the-middle attack based on the variance of the RTT Hayato Sato, Sumiko Miyata, Norio Kashima (SIT) SITE2016-1 |
A man-in-the-middle (MITM) attack is one of the threats to information security.
In order to detect the MITM attack, a ... [more] |
SITE2016-1 pp.23-28 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 13:30 |
Fukushima |
|
Development of the folk implements database using the relational model and thesaurus for the digital archive Toshihide Hanyu, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo NetSI), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-77 IA2014-109 |
In recent years, digitization of museum material information has been promoted. Some museums provide digital material in... [more] |
SITE2014-77 IA2014-109 pp.215-220 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 13:55 |
Fukushima |
|
A search scheme considering the search process using ACO and search history Shun Koizumi (Kanagawa Univ.), Sumiko Miyata (Kanagawa Univ), Tetsuya Morizumi (ToyoNSI), Hirotsugu Kinoshita (Kanagawa Univ) SITE2014-78 IA2014-110 |
Recent years, the spread of Internet reveals that we can search information easily.
However, it is difficult to find ac... [more] |
SITE2014-78 IA2014-110 pp.221-226 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 14:45 |
Fukushima |
|
Management of information resources using the Swarm Intelligence expressing the attraction and repulsion by similarity Katsunori Ishida, Shun Koizumi, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (TNSi), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-80 IA2014-112 |
[more] |
SITE2014-80 IA2014-112 pp.233-238 |
NS, IN (Joint) |
2015-03-03 16:20 |
Okinawa |
Okinawa Convention Center |
Applying Flow Admission Control Based on Equality to this Situation that Flows Have Multi Requested Bandwidth by Using the Threshold Hiroshi Suka (Tokyo Tech), Sumiko Miyata (Kanagawa Univ), Katsunori Yamaoka (Tokyo Tech) NS2014-279 |
Flow-admission control based on
equality of heterogeneous traffic (hereafter called conventional CAC) have
been propo... [more] |
NS2014-279 pp.601-606 |
ICM, CQ, NS, NV (Joint) |
2014-11-14 14:35 |
Kochi |
Kochi-City-Culture-Plaza CUL-PORT |
A Threshold Configuration Method of Emergency Trunk Reservation Control Considering Arriving Traffic Intensity Kazuki Tanabe (Titech), Sumiko Miyata (Kanagawa Univ.), Ken-ichi Baba (Kogakuin Univ.), Katsunori Yamaoka (Titech) CQ2014-85 |
We propose a threshold configuration and holding time limitation for general telephone calls under trunk reservation con... [more] |
CQ2014-85 pp.83-88 |
CS |
2014-11-07 08:30 |
Hokkaido |
Shiretoko (Hokkaido) |
Derivation of the mean packet delay using M/G/1 model in LR-PON Sumiko Miyata (Kanagawa Univ), Ken-ichi Baba (Kogakuin Univ), Katsunori Yamaoka (Tokyo Tech), Hirotsugu Kinoshita (Kanagawa Univ) CS2014-63 |
Recently, LR-PON (Long Reach-Passive Optical Networks), in which the distance between OLT and ONUs is large, may become ... [more] |
CS2014-63 pp.55-60 |
CS, NS, IN (Joint) |
2014-09-12 15:25 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
EPON reservation interval allocation method for decreasing mean delay time Sumiko Miyata (Kanagawa Univ.), Ken-ichi Baba (Kogakuin Univ.), Katsunori Yamaoka (Tokyo Inst. of Tech.), Hirotsugu Kinoshita (Kanagawa Univ.) CS2014-52 |
The packet transmission of upstream in EPON can be divided into data interval and reservation interval. In reservation i... [more] |
CS2014-52 pp.67-72 |
MoNA, CQ (Joint) |
2014-09-11 11:40 |
Miyagi |
|
A Threshold Relaxation Method for Accepting More General Telephone Calls in Emergency Situation Kazuki Tanabe (Titech), Sumiko Miyata (Kanagawa Univ.), Ken-ichi Baba (Kogakuin Univ.), Katsunori Yamaoka (Titech) MoNA2014-33 |
We propose a threshold relaxation and holding time limitation for general telephone calls under trunk reservation contro... [more] |
MoNA2014-33 pp.13-18 |
SITE, IPSJ-EIP, IPSJ-DCC |
2014-05-14 15:15 |
Kanagawa |
Institute of Information Security |
Retrieval for the nonwritten-materials using Ontology Toshihide Hanyu, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration Co., Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-4 |
In order to look for the material, we had to go to the museum directly. In recent years, Digitization
of the material i... [more] |
SITE2014-4 pp.53-58 |
NS, IN (Joint) |
2014-03-07 14:30 |
Miyazaki |
Miyazaki Seagia |
Optimal cost sharing for the mobile tethering and coalition condition Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) IN2013-204 |
A tethering function allows phones or tablets to share their Internet connections (bandwidth) with other devices such as... [more] |
IN2013-204 pp.355-360 |
IN, IA (Joint) |
2013-12-20 08:55 |
Hiroshima |
Hiroshima City Univ. |
A Study of Limiting Holding Time of General Telephone Calls and Threshold Control under Emergency Condition Kazuki Tanabe (Titech), Sumiko Miyata (Kanagawa Univ.), Katsunori Yamaoka (Titech) IN2013-109 |
Under emergency conditions, a threshold control method, which reserves several telephone lines to accommodate emergency ... [more] |
IN2013-109 pp.59-64 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-15 13:25 |
Okinawa |
Ryukyu Univ. |
Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-55 |
The development of information technology has come hand-in-hand with various security problems that are becoming increas... [more] |
SITE2013-55 pp.157-161 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-15 13:50 |
Okinawa |
Ryukyu Univ. |
A self-organizing management system for the information resources with the swarm intelligence Katsunori Ishida, Shun Koizumi, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (TOYO NETWORKS & SYSTEM INTEGRATION), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-56 |
[more] |
SITE2013-56 pp.163-168 |
SITE, IPSJ-CE, IPSJ-CLE |
2013-12-15 14:15 |
Okinawa |
Ryukyu Univ. |
A search scheme with an emphasis on the search process using ACO Shun Koizumi, Katsunori Ishida, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-57 |
When somebody tries to search some objects on the Internet, some level of results are got easily. But the qualities of r... [more] |
SITE2013-57 pp.169-173 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 13:25 |
Nara |
Todaiji Total Cultural Center |
Game theoretic analysis of the value exchange system Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-66 IA2012-104 |
Recently, a local currency has been attracting attention for the purpose of circulating a thing and service in local com... [more] |
SITE2012-66 IA2012-104 pp.201-206 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 15:40 |
Nara |
Todaiji Total Cultural Center |
A watermarking method for the Bezier curve Takafumi Kudo, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Faculty of Engineering, Toyo Networks and System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-70 IA2012-108 |
E-book that can read on your computer or mobile device began to come into wide use in the market. The comics have been d... [more] |
SITE2012-70 IA2012-108 pp.243-248 |
SITE |
2012-12-12 13:00 |
Osaka |
|
A value exchange system using the local currency value Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-43 |
The value exchange systems-using the value of the local currency have been studied. A local currency has been attracting... [more] |
SITE2012-43 pp.1-6 |
SITE |
2012-12-12 13:30 |
Osaka |
|
A watermarking method for the free form curve Takafumi Kudo, Sumiko Miyata (Kanagawa Univ), Tetsuya Morizumi (Faculty of Engineering, Toyo Networks and System Integration C), Hirotsugu Kinoshita (Kanagawa Univ) SITE2012-44 |
The number of sites on the Internet that are used to post cartoons and illustrations has been increased.
A lot of techn... [more] |
SITE2012-44 pp.7-11 |
SITE |
2012-12-12 14:00 |
Osaka |
|
Trend and ethical problem of the honeypot Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45 |
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more] |
SITE2012-45 pp.13-18 |