Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CAS, CS |
2024-03-14 16:20 |
Okinawa |
|
An Approximate Solution Using K-Shortest Path and Reinforcement Learning for a Load Balancing Problem in Communication Networks Himeno Takahashi, Norihiko Shinomiya (Soka Univ.) CAS2023-123 CS2023-116 |
In recent years, the amount of data traffic in information and communication networks has been increasing and the risk o... [more] |
CAS2023-123 CS2023-116 pp.70-73 |
CQ, CBE (Joint) |
2023-01-27 10:15 |
Ibaraki |
Epochal Tsukuba International Congress Center (Primary: On-site, Secondary: Online) |
An approximate solution using K-shortest paths for a communication link load balancing problem Himeno Takahashi, Daichi Shimizu, Norihiko Shinomiya (Soka Univ) CQ2022-72 |
In recent years, the amount of data traffic in information and communication networks has been increasing and the risk o... [more] |
CQ2022-72 pp.65-68 |
NS, NWS (Joint) |
2023-01-27 11:20 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
SRLG-Disjoint Optical Redundant Route Selection with k-SPF Algorithm Hiroshi Matsuura, Koujun Koshiji, Yasuhasu Kaneko, Hanami Yokoi, Tatsuya Matsukawa, Takayuki Fujii, Takashi Miyamura (NTT) NS2022-164 |
When an end-to-end wavelength path is established, a primary/backup redundant route pair for the path should be prepared... [more] |
NS2022-164 pp.84-89 |
NS, IN (Joint) |
2017-03-03 13:20 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
On Path Selection Considering Length and Reliability for Automatic Evacuation Guiding Based on Interactions between Evacuees and Their Mobile Nodes Takanori Hara, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2016-247 |
When disasters occur, evacuees have to evacuate to safe place quickly. To tackle this problem, there has been proposed a... [more] |
NS2016-247 pp.517-522 |
R |
2016-07-29 14:55 |
Hokkaido |
Otaru Chamber of Commerce and Industry |
A note on statistical detection of a dependent failure-occurrence for a 2-unit parallel system by using failure time data Shuhei Ota, Mitsuhiro Kimura (Hosei Univ.) R2016-16 |
This paper proposes a statistical test method which detects a dependent failure occurrence in parallel systems based on ... [more] |
R2016-16 pp.19-24 |
IE, ITE-ME, IPSJ-AVM, ITE-CE [detail] |
2014-08-01 13:50 |
Chiba |
|
A Study of Image Coding using Multiple Sparse Bases Sets based on Image Features Ji Wang, Yoshiyuki Yashima (Chiba Institute of Tech.), Motohiro Takagi, Hiroshi Fujii, Atsushi Shimizu (NTT) IE2014-28 |
In this paper, we propose a new image coding method using the multiple sparse bases sets. In our method, large amount of... [more] |
IE2014-28 pp.35-40 |
NS, OCS, PN (Joint) |
2012-06-22 14:45 |
Yamagata |
Yamagata Univ. |
A Study on RMLSA Algorithm in Elastic Optical Path Networks Tatsuya Hashimoto, Ken-ichi Baba, Shinji Shimojo (Osaka Univ.) PN2012-11 |
Recently, due to the rapid increase of network traffic, it is necessary to use more efficiently network bandwidth on the... [more] |
PN2012-11 pp.55-60 |
NS, RCS (Joint) |
2010-12-17 13:00 |
Okayama |
Okayama Univ. |
Ant Colony Optimization for the Node Placement Problem Keiichi Ohkura, Kengo Katayama (Okayama Univ. of Sci.), Nobuo Funabiki (Okayama Univ.), Hideo Minamihara, Noritaka Nishihara (Okayama Univ. of Sci.) NS2010-134 |
We address a problem of finding an optimal node placement that minimizes the amount of traffics reducing the weighted ho... [more] |
NS2010-134 pp.173-178 |
COMP |
2010-10-15 10:05 |
Miyagi |
Tohoku Univ. |
Constant-Work-Space Algorithms for Geometric Problems(2) Tetsuo Asano (JAIST), Wolfgang Mulzer (Princeton Univ.), Gunter Rote (Free Univ.), Yajun Wang (Microsoft) COMP2010-32 |
We present space-efficient algorithms for geometric problems in a restricted computational model called ``constant wor... [more] |
COMP2010-32 pp.9-15 |
IA |
2009-11-25 14:55 |
Saga |
Saga-Ken |
Design and implementation of Single Sign-On Authentication in Large-scale Campus Network Takatoshi Fujimura, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) IA2009-60 |
Abstract Network services depend on Web browsers has been growing, however, the increase of the authentication situation... [more] |
IA2009-60 pp.13-18 |