Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, VLD |
2023-03-02 16:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Reducing Conflict Misses with Multiple Indexings in Compressed Caches Tasuku Fukami, Shinya Takamaeda (UTokyo) VLD2022-98 HWS2022-69 |
Cache memory is a common hardware mechanism that improves memory access performance. To enlarge cache capacity virtually... [more] |
VLD2022-98 HWS2022-69 pp.131-136 |
CAS, CS |
2023-03-01 15:50 |
Fukuoka |
Kitakyushu International Conference Center (Primary: On-site, Secondary: Online) |
Improvements to Cache Replacement Policy for Cached SFC in NDN Shigeaki Masuda, Hidenori Nakazato (Waseda Univ.) CAS2022-107 CS2022-84 |
We propose to give priority to the contents which are the results of applying service functions where service function c... [more] |
CAS2022-107 CS2022-84 pp.65-70 |
CQ, CBE (Joint) |
2023-01-26 11:00 |
Ibaraki |
Epochal Tsukuba International Congress Center (Primary: On-site, Secondary: Online) |
A Study on Cache Decision Policies to Enhance QoE of Video and Audio Transmission in ICN/CCN Keisuke Kobayashi, Toshiro Nunome (Nagoya Inst. of Tech) CQ2022-63 |
This paper considers video and audio transmission in ICN (Information-Centric Networking) / CCN (Content-Centric Network... [more] |
CQ2022-63 pp.11-16 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 18:05 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Proposal of Kaminsky Attack Detection Method Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) NS2022-116 |
The Kaminsky attack is known as an efficient and successful method for DNS cache poisoning attacks. Takahashi et al. pro... [more] |
NS2022-116 pp.91-96 |
NS, ICM, CQ, NV (Joint) |
2022-11-25 11:10 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Device to Device Caching Method using Predicted Demand in Moved Location by Deep Learning Makoto Tsunekiyo (Fukuoka Univ.), Noriaki Kamiyama (Ritsumeikan Univ.) CQ2022-54 |
An effective method to reduce the load on the cell network backhaul is to cache content at the mobile terminal (MT) and ... [more] |
CQ2022-54 pp.40-45 |
IA, CQ, MIKA (Joint) |
2022-09-15 17:50 |
Hokkaido |
Hokkaido Citizens Actives Center (Primary: On-site, Secondary: Online) |
A consideration of DoH-exclusive DNS architecture Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2022-23 |
Conventional DNS communication uses non-encrypted UDP protocol so that DNS cache poisoning attacks and privacy leakage h... [more] |
IA2022-23 pp.50-53 |
NS, IN, CS, NV (Joint) |
2022-09-02 11:30 |
Iwate |
MALIOS (Iwate Prefecture) + Online Meeting (Primary: On-site, Secondary: Online) |
One-to-many Transfer based on Multipath Multicast with In-network Cache Ryota Fukuda, Masahiro Shibata, Masato Tsuru (KIT) NS2022-69 |
There is a growing need for fast and efficient one-to-many file transfer to cope with the rapid increase in traffic volu... [more] |
NS2022-69 pp.49-54 |
CPSY, DC, IPSJ-ARC [detail] |
2022-07-28 11:30 |
Yamaguchi |
Kaikyo Messe Shimonoseki (Primary: On-site, Secondary: Online) |
An Efficient Content Sharing for the User QoE Improvement in Mobile Cooperative Cache Taiki Akiba, Celimuge Wu, Tsutomu Yoshinaga (UEC) CPSY2022-7 DC2022-7 |
In recent years, a load on base stations has been increasing due to an increase in the number of mobile users and a high... [more] |
CPSY2022-7 DC2022-7 pp.35-40 |
CQ |
2022-07-22 09:55 |
Osaka |
Ritsumeikan Ibaraki Future Plaza Conference Hall (Primary: On-site, Secondary: Online) |
Investigating Impact of Fake Type Content Poisoning Attack on ICN Takuto Kudo (Fukuoka Univ.), Noriaki Kamiyama (Ritumeikan Univ.) CQ2022-23 |
Information-centric networking (ICN) has been widely studied as a new network architecture for efficient content delive... [more] |
CQ2022-23 pp.36-41 |
ICM |
2022-07-08 10:20 |
Hokkaido |
Tokachi Plaza (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Comprehensive Evaluation to Determine Cache Action in vhost-user Daichi Takeya, Ryota Kawashima (NITech), Hiroki Nakayama, Tsunemasa Hayashi (BOSCO), Hiroshi Matsuo (NITech) ICM2022-18 |
Next generation network functions are expected to be deployed on highly advanced infrastrucures towards AI-based autonom... [more] |
ICM2022-18 pp.42-47 |
RECONF |
2022-06-08 09:20 |
Ibaraki |
CCS, Univ. of Tsukuba (Primary: On-site, Secondary: Online) |
Investigation of methods to accelerate inference processing by deep learning Seiya Iwamoto, Chikako Nakanishi (OIT) RECONF2022-13 |
AI technologies such as deep learning are generally computationally intensive and have very high performance requirement... [more] |
RECONF2022-13 pp.52-56 |
NS |
2022-05-13 14:55 |
Kyoto |
Rakuyu Kaikan, Kyoto Univ. + Online (Primary: On-site, Secondary: Online) |
Performance Evaluation of Distributed Cache Retrieve Scheme with Reservation Function in Information-Centric Networking Yurino Sato (Sasebo KOSEN), Yusuke Ito (Tokyo Univ. of Science), Hiroyuki Koga (Univ. of Kitakyushu) NS2022-20 |
Information-Centric networking (ICN) is designed for content delivery services-which are one of the most popular Interne... [more] |
NS2022-20 pp.65-70 |
ICSS, IPSJ-SPT |
2022-03-07 15:20 |
Online |
Online |
Evaluation of Detection System of DNS Cache Poisoning Using Blockchain Technology Kenshiro Tanaka, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) ICSS2021-65 |
DNS cache poisoning is an attack on DNS essential to use of Internet communications. Takahashi et al. proposed a detecti... [more] |
ICSS2021-65 pp.38-43 |
CAS, CS |
2022-03-03 10:05 |
Online |
Online |
Traffic Overhead by NLSR Advertisement for Cached Contents in NDN Ryota Minorikawa, Hidenori Nakazato (Waseda Univ.) CAS2021-74 CS2021-76 |
We studied the practicality of adding a function for content mobility to the Named-data Link State Routing Protocol (NLS... [more] |
CAS2021-74 CS2021-76 pp.1-6 |
RCS, SIP, IT |
2022-01-20 10:55 |
Online |
Online |
Design of Coded Caching for Multi-User MISO Channels with Heterogeneous Cache Sizes Ayaka Urabe, Koji Ishibashi (UEC), MohammadJavad Salehi, Antti Tolli (Univ. Oulu) IT2021-38 SIP2021-46 RCS2021-206 |
This paper focuses on coded caching when every user has a different memory size for caching and studies the design over ... [more] |
IT2021-38 SIP2021-46 RCS2021-206 pp.57-62 |
ICM |
2021-07-16 10:25 |
Online |
Online |
Evaluating the Effectiveness of Non-Temporal Instructions for Eliminating Cache Pollution in Virtual I/O Daichi Takeya, Ryota Kawashima (NITech), Hiroki Nakayama, Tsunemasa Hayashi (BOSCO), Hiroshi Matsuo (NITech) ICM2021-16 |
Cloud Native Network Functions (CNFs) have been adopted in cutting-edge commercial networks for flexible and agile opera... [more] |
ICM2021-16 pp.34-39 |
NS |
2021-05-13 15:15 |
Online |
Online |
Graph Reordering while Acquiring Graph Data Managed Distributedly by Random Walk Kohei Tsuchida, Kunitake Kaneko (Keio Univ.) NS2021-20 |
It is known that cache misses occur so many times, which leads to slow down the calculation speed while graph processing... [more] |
NS2021-20 pp.32-37 |
RCS, SR, SRW (Joint) |
2021-03-05 10:55 |
Online |
Online |
Beamforming Design for Heterogeneous Wireless Systems with Coded-Caching Ayaka Urabe, Koji Ishibashi (UEC) RCS2020-256 |
In this paper, we propose a transmission beamforming design for the multiple input single output (MISO) system consistin... [more] |
RCS2020-256 pp.246-251 |
ICSS, IPSJ-SPT |
2021-03-02 11:05 |
Online |
Online |
Study on analyzing Memcached DRDoS attacks and their infrastructures Mizuki Kondo, Natsuo Shintani (YNU), Daisuke Makita (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2020-45 |
Internet-facing Memcached services are known to have been misused as powerful reflectors of DRDoS attacks. In this paper... [more] |
ICSS2020-45 pp.114-119 |
CAS, CS |
2021-03-02 12:35 |
Online |
Online |
Cache Replacement Policy for Service Function Chaining in NDN Konomu Ito, Hidenori Nakazato (Waseda Univ.) CAS2020-80 CS2020-87 |
A cache replacement policy in Service Function Chaining (SFC) in the environment of Named Data Networking (NDN), an inca... [more] |
CAS2020-80 CS2020-87 pp.47-52 |