Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, LOIS |
2015-01-16 11:00 |
Fukuoka |
Kanmon Straits & Mojiko Retro |
A Self-Adaptive Approach for Fine-grained Network Operation and Management in Software Defined Networks Kotaro Shibata (Osaka City Univ.), Hiroki Nakayama, Tsunemasa Hayashi (BOSCO-tech), Shingo Ata (Osaka City Univ.) ICM2014-45 LOIS2014-52 |
Software Defined Network (SDN) is attracting many researchers in networking area, especially in the field of network ope... [more] |
ICM2014-45 LOIS2014-52 pp.73-78 |
CS, NS, IN (Joint) |
2014-09-11 10:50 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Proposal of Estimation Method of Power Consumptions based on Network Information and Its Evaluation Satoru Izumi, Naoki Nakamura, Takuo Suganuma, Norio Shiratori (Tohoku Univ.) IN2014-52 |
We have been investigating a Green-oriented Network Management Framework to realize energy-saving of network systems at ... [more] |
IN2014-52 pp.13-18 |
CS, NS, IN (Joint) |
2014-09-11 11:15 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Implementation of a System for Visualizing Power Consumptions of Networked Devices in Large-scale Network and Its Evaluation Naoki Nakamura, Satoru Izumi, Toshiaki Osada, Takuo Suganuma, Norio Shiratori (Tohoku Univ.) IN2014-53 |
In order to achieve power-saving of the whole ICT system, we proposed an user-oriented system for visualizing electric p... [more] |
IN2014-53 pp.19-24 |
CS, NS, IN (Joint) |
2014-09-12 09:20 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Monitoring syslog Hiroshi Tsunoda (Tohoku Inst. of Tech.), Glenn Mansfield Keeni (Cyber Solutions) CS2014-49 |
Log messages are generated by operating systems and applications. These messages contain important information about th... [more] |
CS2014-49 pp.51-54 |
MoNA, CQ (Joint) |
2014-09-11 13:05 |
Miyagi |
|
Active Information Resource based Management Support for Emergency Network Services Yusuke Tanimura, Kazuto Sasai, Gen Kitagata, Tetsuo Kinoshita (Tohoku Univ.) MoNA2014-34 |
In this paper, we propose a network management support system to operate emergency network services smoothly. During an ... [more] |
MoNA2014-34 pp.19-24 |
ICM |
2014-07-10 14:35 |
Iwate |
Aiina Iwate |
[Special Talk]
Report on 14th IEEE/IFIP Network Operations and Management Symposium (NOMS 2014) Hiroshi Matsuura (NTT), Masanori Miyazawa (KDDI R&D Labs), Shinji Kikuchi (FLAB) ICM2014-10 |
The 14th IEEE/IFIP Network Operations and Management Symposium (NOMS 2014) was held in Krakow, Poland from May 5th to 9t... [more] |
ICM2014-10 pp.5-10 |
NS |
2014-05-15 14:25 |
Yamanashi |
Yamanashi Univ. |
Managing Wireless LAN Access Points with OpenFlow Takashi Naito, Eiji Oki (Univ. of Electro-Comm.) NS2014-27 |
The OpenFlow protocol controls network with central controlled is consisted of OpenFlow controller and OpenFlow switch, ... [more] |
NS2014-27 pp.15-19 |
NS |
2014-04-18 10:20 |
Okinawa |
Ishigaki-City-Hall |
Towards Measurement and Analysis of Large-scale Networks Osamu Akashi, Kimihiro Mizutani (NTT), Kensuke Fukuda, Shigeo Urushidani (NII) NS2014-15 |
It is important to analyze the behavior of large-scale networks. However, this analysis is difficult because we have to ... [more] |
NS2014-15 pp.77-82 |
ICM |
2014-03-14 16:00 |
Okinawa |
|
Congestion Control of EPC Signaling by Using Network Function Virtualization Takeshi Usui, Yujin Noishiki, Takeshi Hashimoto, Yoshinori Kitatsuji (KDDI Labo) ICM2013-75 |
(To be available after the conference date) [more] |
ICM2013-75 pp.137-142 |
ET |
2014-03-08 15:35 |
Kochi |
Kochi National College of Technology |
Development of a learning system for network management using SDN Asako Kawanishi (CIT), Manabu Tonishi (Mejiro Univ.), Naoto Nakamura (CIT) ET2013-103 |
In network management, control in consideration of QoS and dealing with problems that may occur in practice is important... [more] |
ET2013-103 pp.65-70 |
IN, IA (Joint) |
2013-12-19 14:25 |
Hiroshima |
Hiroshima City Univ. |
Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems (1)
-- Project Vision and Overview -- Norio Shiratori, Naoki Nakamura, Satoru Izumi (Tohoku Univ.), Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Masahiro Ishigaki (Tohoku Univ.), Tsutomu Inaba, Takashi Ogasawara (NTT EAST), Takuo Suganuma (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.) IN2013-102 |
We have been promoted research and development under the support of the Green ICT Innovation Promotion (PREDICT) of Mini... [more] |
IN2013-102 pp.19-24 |
IN, IA (Joint) |
2013-12-19 15:15 |
Hiroshima |
Hiroshima City Univ. |
Research and Development of Next Generation Network Management Technology for Energy Efficient Information Systems (3)
-- Visualization of Usage of User Terminal in Large-scale Network -- Naoki Nakamura, Satoru Izumi (Tohoku Univ), Kohei Ohta (Cyber Solutions Inc.), Tsutomu Inaba, Takashi Ogasawara (NTT EAST), Glenn Mansfield Keeni (Cyber Solutions Inc.), Takuo Suganuma, Norio Shiratori (Tohoku Univ) IN2013-104 |
In this paper, we developed a "Visualization of Energy Waste Technology", that is the core of the "Green-oriented Networ... [more] |
IN2013-104 pp.31-36 |
ICM |
2013-07-11 17:00 |
Hokkaido |
Future University Hakodate |
[Invited Talk]
Vision for the next generation communication platform with SDN Toshiya Asaba (Stratosphere) |
SDN enables a new type of communication infrastructure utilization through automation and autonomy of the control over t... [more] |
|
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 10:00 |
Nara |
Todaiji Total Cultural Center |
Identifying User Authentication Methods on SSH Sessions Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99 |
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] |
SITE2012-61 IA2012-99 pp.151-156 |
ICM, LOIS |
2013-01-17 09:50 |
Saga |
|
Management Engine Applying Hierarchical Role Model Kenji Minato, Yukio Tsukishima, Wenyu Shen (NTT) ICM2012-38 LOIS2012-48 |
The research of network virtualization and abstraction has been making progress, aiming at reducing CAPEX / OPEX and int... [more] |
ICM2012-38 LOIS2012-48 pp.7-12 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 15:40 |
Hokkaido |
Hokkaido Univ. |
A Proposal of an Integrated Network Management Method Using Ontology and Its Prototype Implementation Atsushi Ishida (Keio Univ.), Saber Zrelli (YOKOGAWA), Fumio Teraoka (Keio Univ.) SITE2011-52 IA2011-102 |
Extended Network Management (ENM) Project is proposing the ENM framework for unified management of the networks composed... [more] |
SITE2011-52 IA2011-102 pp.271-276 |
NS, IN (Joint) |
2012-03-08 09:50 |
Miyazaki |
Miyazaki Seagia |
Analyzing terminal operation status based on the connection history Hiroshi Tsunoda, Masahiro Matsuda (Tohoku Inst. of Tech.), Kohei Ohta, Glenn Mansfield Keeni (Cyber Solutions Inc.) IN2011-153 |
For a long time, global warming has become an international concern and reducing power consumption is strongly required ... [more] |
IN2011-153 pp.97-102 |
NS |
2012-01-26 10:00 |
Okinawa |
Ryukyu University |
Development and Evaluation of FeliCa Stamp Rally Ver.2 System Takanori Takahashi, Shogo Hori, Ryoko Matsumoto, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2011-149 |
FeliCa stump rally events, which are science and technology exhibitions for young people, have been held under the colla... [more] |
NS2011-149 pp.23-28 |
ET |
2012-01-21 10:10 |
Chiba |
|
Development of a Cloud System for LAN Administration Study Yasuhiro Nakagawa, Masahiro Ukigai (C.I.T.) ET2011-88 |
Social demand is increasing for switching over from IPv4 protocol to IPv6 one on the Internet, as one of the resolutions... [more] |
ET2011-88 pp.1-6 |
IN, IA (Joint) |
2011-12-16 15:10 |
Hiroshima |
Hiroshima City University |
SSH Brute Force Attack Detection based on Flow Features Analysis Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (KIT) IN2011-119 |
SSH brute force attack has become more seriously, so administrators are desired to implement its countermeasures. In the... [more] |
IN2011-119 pp.73-78 |