Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2024-04-12 11:25 |
Okayama |
Okayama Prefectural Library + Online (Primary: On-site, Secondary: Online) |
Implementation and Preliminary Evaluation of an FPGA-based Network Switch Supporting Credit-based Shaper for Time Sensitive Networks Akram Ben Ahmed, Takahiro Hirofuchi, Takaaki Fukai (AIST) NS2024-11 |
Time Sensitive Networking (TSN) is a set of novel open standards that aims to provide deterministic, reliable, high-band... [more] |
NS2024-11 pp.47-52 |
CAS, CS |
2024-03-15 13:00 |
Okinawa |
|
Routing Information Reduction in NDN by Network Segmentation Ryota Minorikawa, Hidenori Nakazato (Waseda Univ.) CAS2023-131 CS2023-124 |
We studied the performance of Named-data Link State Routing Protocol (NLSR), a routing protocol of Named Data Networking... [more] |
CAS2023-131 CS2023-124 pp.110-115 |
RCS, SR, SRW (Joint) |
2024-03-14 09:00 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
Fundamental Performance Evaluation of Congestion Control Algorithm for QUIC Communications in Asymmetrical Latency Environment Hikaru Kawasaki, Kazuo Ibuka, Homare Murakami, Takeshi Matsumura (NICT) RCS2023-269 |
QUIC is a user datagram protocol-enhanced scheme at the transport layer and is expected to be efficient in mobile commun... [more] |
RCS2023-269 pp.89-94 |
RCS, SR, SRW (Joint) |
2024-03-14 10:50 |
Tokyo |
The University of Tokyo (Hongo Campus), and online (Primary: On-site, Secondary: Online) |
Evaluation of Real-Time Vital Signs Monitoring System for Exercisers Takuma Hamagami, Yasutaka Kawamoto, Yasuhiro Kawakita (OKI), Koji Murase (Wakayama Univ) RCS2023-273 |
In order to prevent disease/injury such as heat stroke and to realize evidence based physical training for a number of s... [more] |
RCS2023-273 pp.112-117 |
NS, IN (Joint) |
2024-03-01 11:35 |
Okinawa |
Okinawa Convention Center |
A wake-up control for energy-efficient data collections from wireless sensors with common observations Nanako Ikeda, Hiroyuki Yomo (Kansai Univ.) NS2023-207 |
In this paper, we focus on wireless sensor networks (WSNs) exploiting wake-up receivers, in which a sink node remotely a... [more] |
NS2023-207 pp.208-213 |
NS, IN (Joint) |
2024-03-01 14:15 |
Okinawa |
Okinawa Convention Center |
A Method for Constructing Collision Avoidance Route for Multiple Unmanned Aerial Vehicles Using AODV-Based Link Hierarchization Shuto Ohkawa, Kiyoshi Ueda (Nihon Univ.), Takumi Miyoshi, Taku Yamazaki (SIT), Ryo Yamamoto (UEC) NS2023-245 |
Unmanned Aerial Vehicle routing methods have been researched using protocols for ad hoc networks composed of smart meter... [more] |
NS2023-245 pp.429-434 |
SR |
2024-01-26 10:00 |
Nagano |
Nagano-ken JA building (Primary: On-site, Secondary: Online) |
[Short Paper]
Evaluation of Migration Methods in RPL Yuki Kawashima, Yoshihiko Shirokura, Yukimasa Nagai (MELCO) SR2023-79 |
In wireless sensor networks, RPL (Routing Protocol for Low Power and Lossy Networks) is used as the routing protocol. Re... [more] |
SR2023-79 pp.42-44 |
LOIS, ICM |
2024-01-26 10:10 |
Nagasaki |
Nagasaki Prefectural Art Museum (Primary: On-site, Secondary: Online) |
Service Failure Detection Focusing on Simultaneous Increase in Various Types of Connection Retries in User Traffic Naoki Hayashi, Fumio Katayama, Naoki Tateishi, Osamu Okino, Mitsuho Tahara (NTT) ICM2023-34 LOIS2023-38 |
Many communication services are provided in carrier networks, and these communication services are realized by various e... [more] |
ICM2023-34 LOIS2023-38 pp.33-38 |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Study on Routing Schemes Using Reinforcement Learning with Cooperation for IoT Applications Takahashi Shotaro, Inoue Shota, Ohsaki Hiroyuki (Kwansei Univ) IA2023-71 |
Low-power and Lossy Networks (LLN) have attracted much attention as wireless networks for Internet of Things (IoT) appli... [more] |
IA2023-71 pp.59-64 |
IA |
2024-01-25 16:40 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Cross-Layer Security Design Considerations for the Latest In-Vehicle Network Architecture Toyokazu Akiyama (Kyoto Sangyo Univ.) IA2023-72 |
The architecture of the in-vehicle network is changing dramatically with the introduction of automotive ethernet and the... [more] |
IA2023-72 pp.65-69 |
ICTSSL, CAS |
2024-01-25 09:30 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
Base stations with optimal 5% cluster head ratio of LEACH protocol in wireless sensor networks Yoshihiro Kaneko, Keitaro Hirano (Gifu Univ.) CAS2023-82 ICTSSL2023-35 |
A wireless sensor network WSN is widely used in various applications. Usually, a sensor node SN is so tiny and limited i... [more] |
CAS2023-82 ICTSSL2023-35 pp.1-4 |
ICTSSL, CAS |
2024-01-25 16:15 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
A revised unequal clustering routing EEUCS in wireless sensor networks Yoshihiro Kaneko, Kohei Kawabata (Gifu Univ.) CAS2023-96 ICTSSL2023-49 |
A routing protocol LEACH(Low Energy Adaptive Clustering Hierarchy) is representative in a wireless sensor network WSN an... [more] |
CAS2023-96 ICTSSL2023-49 pp.66-69 |
IN |
2024-01-19 13:00 |
Aichi |
|
Quantitative Evaluation of Effect of Congestion on Accuracy of IEEE 802.1AS Time Synchronization Maika Koizumi, Yoshihiro Ito (NITech) IN2023-61 |
This paper targets time synchronization using IEEE 802.1AS, a time synchronization protocol, in an Ethernet-based in-veh... [more] |
IN2023-61 pp.70-74 |
SS, MSS |
2024-01-18 13:35 |
Ishikawa |
(Primary: On-site, Secondary: Online) |
A greedy stable time by various parameter combination of a routing protocol in wireless sensor networks Yoshihiro Kaneko (Gifu Univ.) MSS2023-66 SS2023-45 |
A wireless sensor network WSN is composed of one base station BS and many sensor nodes SNs that sense and transmit data ... [more] |
MSS2023-66 SS2023-45 pp.81-86 |
NS, RCS (Joint) |
2023-12-15 14:25 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Development of a Sensor Network MAC Protocol Verification System using Wireless Modems Kenta Asahi, David Asano, Yasushi Fuwa (Shinshu Univ.) NS2023-147 |
Wireless sensor network systems have different specifications required depending on the environment and applications in ... [more] |
NS2023-147 pp.120-125 |
NS, RCS (Joint) |
2023-12-15 14:50 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Development of a Transition Diagram-Based MAC Protocol Design Environment for Sensor Network Verification Systems Ryo Kobayashi, Asano David, Yasushi Fuwa (Shinshu Univ.) NS2023-148 |
Our wireless sensor network requires new communication protocols to be designed for each specific scenario. We have eval... [more] |
NS2023-148 pp.126-131 |
NS, RCS (Joint) |
2023-12-15 15:15 |
Fukuoka |
Kyushu Institute of Technology Tobata campus, and Online (Primary: On-site, Secondary: Online) |
Investigation on Shortening the Time to Fix Transmission Timing in Wireless Sensor Networks Using Reinforcement Learning Kureha Ikeda, Yasushi Fuwa, David Asano (Shinshu Univ.) NS2023-149 |
This study proposes a novel approach to optimizing transmission timing in Wireless Sensor Networks (WSNs) by applying re... [more] |
NS2023-149 pp.132-137 |
IA |
2023-11-22 16:25 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Primary: On-site, Secondary: Online) |
Improving the accuracy of flow prediction and anomaly detection in GAMPAL, a general-purpose anomaly detection mechanism for Internet traffic Taku Wakui (Keio Univ./Hitachi), Fumio Teraoka (Keio Univ.), Takao Kondo (Hokkaido Univ./Keio Univ.) IA2023-41 |
The authors propose a general-purpose anomaly detection mechanism using Prefix Aggregate without Labeled data (GAMPAL) f... [more] |
IA2023-41 pp.33-40 |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
RISING (3rd) |
2023-10-31 13:00 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Wireless MAC Protocol Adaptation Method Considering Application Layer Koshiro Aruga, Takeo Fujii (UEC) |
In recent years, with the development of the Internet of Things (IoT), the number of devices performing wireless communi... [more] |
|