Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2014-03-06 10:40 |
Miyazaki |
Miyazaki Seagia |
Proposal and evaluation of dynamically invoking proxy method to improve the availability of P2P live streaming Junichi Nishiya, Katsuyoshi Iida (Tokyo Inst. of Tech.) NS2013-204 |
In order to provide live streaming services, many content providers paid much attention to peer-to-peer TV because it ca... [more] |
NS2013-204 pp.161-166 |
NS, IN (Joint) |
2014-03-07 10:20 |
Miyazaki |
Miyazaki Seagia |
A Light-Weight Secure Voice Communication System for Mobile Devices using Enhanced Proxy Server Shinji Kanazawa, Akihiro Fujimoto, Fumitaka Uchio (Wakayama Univ.) NS2013-229 |
Recently, the major approach for audio conferencing system is based on client-server application. However ,in such syste... [more] |
NS2013-229 pp.307-311 |
RCS, NS (Joint) |
2013-12-19 10:50 |
Kagawa |
Sunport Hall Takamatsu |
Dynamic Arrangement Method of Data Transfer Proxy with Information Retrieval Shinya Yamamura, Kota Ejima (Fujitsu Kyushu Network Technologies), Masato Tsuru (Kyush Inst. of Tech.) NS2013-139 |
In this paper, we propose an architecture based on content delivery technology that caches meta information of contents ... [more] |
NS2013-139 pp.31-36 |
IT, ISEC, WBS |
2013-03-08 16:00 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme Shota Kanno, Kaoru Kurosawa (Ibaraki Univ.), Goichiro Hanaoka, Takahiro Matsuda (AIST) IT2012-107 ISEC2012-125 WBS2012-93 |
In proxy re-encryption (PRE) schemes, the proxy re-encrypts a ciphertext $C$ for Alice into $C'$ which Bob can decrypt.... [more] |
IT2012-107 ISEC2012-125 WBS2012-93 pp.285-291 |
MoNA, CQ (Joint) |
2012-09-28 13:30 |
Kagawa |
Kagawa pref. Takamatsu-city |
Implementation and Performance Evaluation of SPDY Accelerator for Improving Web Access Speed Gen Mineki, Satoshi Uemura, Teruyuki Hasegawa (KDDI R&D Labs.) MoMuC2012-29 |
The next-generation protocol SPDY proposed by Google was decided to use as a basis of the technical specification of the... [more] |
MoMuC2012-29 pp.53-57 |
AN, MoNA, IPSJ-MBL, IPSJ-UBI (Joint) [detail] |
2012-03-13 09:30 |
Tokyo |
NICT Koganei |
TCP Performance Evaluation on Multihop Cognitive Wireless Networks Youhei Fujii, Kouta Nishida, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie (KIT) AN2011-90 |
Recently, cognitive radio has been attract much attention because it is a promising technology to solve the upcoming res... [more] |
AN2011-90 pp.135-140 |
NS, IN (Joint) |
2012-03-09 11:40 |
Miyazaki |
Miyazaki Seagia |
Fast Protection Switching Method by Cooperation of Upper Layer Protocols and Ethernet Ring Kazuki Hamada, Norihiko Ochiai, Ryuichi Kitaichi (Mitsubishi Electric) NS2011-232 |
The protection switching process by ERP(Ethernet Ring Protection Switching) can be operated within 50ms after failure de... [more] |
NS2011-232 pp.295-300 |
NS |
2012-01-27 09:00 |
Okinawa |
Ryukyu University |
The Organization Method of Heterogeneous Agents based on Agent Repository Yuta Nakashima, Takahiro Uchiya, Ichi Takumi (NIT), Tetsuo Kinoshita (Tohoku Univ) NS2011-164 |
Various agents have been designed and developed aiming to cooperative problem solving and support of human activities. G... [more] |
NS2011-164 pp.109-114 |
MVE, ITE-HI, HI-SIG-VR |
2011-06-29 14:20 |
Tokyo |
Sanjo Conference Hall |
The Research of the skillful Object Manipulation
-- The Report about the System Constructing and the pre-Experiment -- Minato Mizutori, Koichi Hirota (Tokyo Univ.) MVE2011-26 |
Recent gains in technology make virtual environment more close to the real world. But manipulation in virtual environmen... [more] |
MVE2011-26 pp.61-65 |
RCS |
2011-06-23 14:10 |
Okinawa |
Ryukyu Univ. |
A study on HTTP performance acceleration with WEB prefetching in large latency network system Fumiaki Nagase, Tetsu Sakata (NTT) RCS2011-47 |
As the internet services are widely spread in recent years, network latency between users and www servers are becoming l... [more] |
RCS2011-47 pp.73-78 |
MoNA, IPSJ-MBL, IPSJ-DPS |
2011-06-03 17:05 |
Okayama |
Osaka Univ. 50th Anniversary Hall |
PMIPv6 Multi-homing Support for Handovers across Heterogeneous Networks Dae Sun Kim, Yoshinori Kitatsuji, Hidetoshi Yokota (KDDI R&D Labs) MoMuC2011-11 |
It is getting common that a mobile terminal such as a smartphone has multiple interfaces with different access
types an... [more] |
MoMuC2011-11 pp.161-166 |
IN, NS (Joint) |
2011-03-04 08:50 |
Okinawa |
Okinawa Convention Center |
Encrypted E-mail sharing system with multi-forwarding Fubuki Kubota, Taiichi Saito (Tokyo Denki Univ) NS2010-243 |
Proxy Re-Encryption scheme allows a proxy to transform a ciphertext computed with Alice's public key into one that can b... [more] |
NS2010-243 pp.445-448 |
IN, NS (Joint) |
2011-03-04 13:00 |
Okinawa |
Okinawa Convention Center |
Experimental Performance Evaluation of TCP Proxy Mechanism TCP-gSTAR for High Speed Satellite Links Hiroyasu Obata, Masaaki Bessho, Kenji Ishida, Chisa Takano, Junichi Funasaka (Hiroshima City Univ.) IN2010-203 |
The satellite link speed has become larger such as terrestrial links.
For example, the maximum link speed of WINDS (Wid... [more] |
IN2010-203 pp.353-358 |
NS, RCS (Joint) |
2010-12-16 15:40 |
Okayama |
Okayama Univ. |
Performance Evaluation of Throughput Fairness on Proxy-based TCP for Wireless Multi-hop Networks Masato Matsumoto, Yuta Yamamoto, Miki Yamamoto (Kansai Univ.) NS2010-121 RCS2010-175 |
Technical issues for wireless multihop networks include throughput degradation for long hop sessions, especially
for lo... [more] |
NS2010-121 RCS2010-175 pp.97-102 |
ICSS |
2010-11-05 13:25 |
Hiroshima |
Hiroshima City University |
A Timed-Release Proxy Re-Encryption Scheme and its Applications Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-48 |
Timed-Release Encryption (TRE) prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time S... [more] |
ICSS2010-48 pp.23-28 |
NS, CS, IN (Joint) |
2010-09-03 13:25 |
Miyagi |
Tohoku University |
A SIP Verification Method of Integrity and Authenticity for Secure Media Communication Hisashi Takahara, Motonori Nakamura (SOKENDAI) IN2010-59 |
There is SRTP that is one of ways to realize secure media communication in the Internet with shared keys. For keep relia... [more] |
IN2010-59 pp.91-96 |
ICM |
2010-07-08 13:00 |
Hokkaido |
Future University Hakodate |
A Study on CWMP (TR-069) Proxy with Home Network Protocols Ryota Minokoshi, Nobuo Fukushima, Katsuyuki Yamashita, Shinichiro Kizaki, Yasuyuki Okabe, Hiroyuki Maeomichi (NTT COMWARE) ICM2010-8 |
To provide remote support services, such as trouble shooting of home-connected device, access technology that enables a ... [more] |
ICM2010-8 pp.1-6 |
ICM |
2010-03-11 09:10 |
Kagoshima |
|
Reducing total ICT energy consumption and power generation with collaboration among end systems, the communication network and the power network Shin-ichi Kuribayashi, Yasunori Osana (Seikei Univ.) ICM2009-47 |
There is a high hope that the use of ICT will dramatically reduce energy consumption. However, widespread use of ICT equ... [more] |
ICM2009-47 pp.13-17 |
MoNA, IN (Joint) |
2009-11-12 11:35 |
Fukuoka |
Fukuoka Institute of Technology |
Cache Design for RESTful Active Proxy for Efficient SNMP Monitoring Ahmad Kamil Abdul Hamid, Yoshihiro Kawahara, Tohru Asami (The Univ. of Tokyo) IN2009-70 |
In this paper, we propose a RESTful active proxy, called Tambourine, towards realizing globalization in network manageme... [more] |
IN2009-70 pp.11-16 |
CQ, NS, ICM (Joint) |
2009-11-13 15:10 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
Novel Load Distribution System to Mitigate Flash Crowds Kenji Yokota, Takuya Asaka, Tatsuro Takahashi (Kyoto Univ.) NS2009-117 |
In recent years there is a rapid increase of traffic to a certain Web server within a short time as the number of Intern... [more] |
NS2009-117 pp.77-82 |