IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 74 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2014-03-06
10:40
Miyazaki Miyazaki Seagia Proposal and evaluation of dynamically invoking proxy method to improve the availability of P2P live streaming
Junichi Nishiya, Katsuyoshi Iida (Tokyo Inst. of Tech.) NS2013-204
In order to provide live streaming services, many content providers paid much attention to peer-to-peer TV because it ca... [more] NS2013-204
pp.161-166
NS, IN
(Joint)
2014-03-07
10:20
Miyazaki Miyazaki Seagia A Light-Weight Secure Voice Communication System for Mobile Devices using Enhanced Proxy Server
Shinji Kanazawa, Akihiro Fujimoto, Fumitaka Uchio (Wakayama Univ.) NS2013-229
Recently, the major approach for audio conferencing system is based on client-server application. However ,in such syste... [more] NS2013-229
pp.307-311
RCS, NS
(Joint)
2013-12-19
10:50
Kagawa Sunport Hall Takamatsu Dynamic Arrangement Method of Data Transfer Proxy with Information Retrieval
Shinya Yamamura, Kota Ejima (Fujitsu Kyushu Network Technologies), Masato Tsuru (Kyush Inst. of Tech.) NS2013-139
In this paper, we propose an architecture based on content delivery technology that caches meta information of contents ... [more] NS2013-139
pp.31-36
IT, ISEC, WBS 2013-03-08
16:00
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme
Shota Kanno, Kaoru Kurosawa (Ibaraki Univ.), Goichiro Hanaoka, Takahiro Matsuda (AIST) IT2012-107 ISEC2012-125 WBS2012-93
In proxy re-encryption (PRE) schemes, the proxy re-encrypts a ciphertext $C$ for Alice into $C'$ which Bob can decrypt.... [more] IT2012-107 ISEC2012-125 WBS2012-93
pp.285-291
MoNA, CQ
(Joint)
2012-09-28
13:30
Kagawa Kagawa pref. Takamatsu-city Implementation and Performance Evaluation of SPDY Accelerator for Improving Web Access Speed
Gen Mineki, Satoshi Uemura, Teruyuki Hasegawa (KDDI R&D Labs.) MoMuC2012-29
The next-generation protocol SPDY proposed by Google was decided to use as a basis of the technical specification of the... [more] MoMuC2012-29
pp.53-57
AN, MoNA, IPSJ-MBL, IPSJ-UBI
(Joint) [detail]
2012-03-13
09:30
Tokyo NICT Koganei TCP Performance Evaluation on Multihop Cognitive Wireless Networks
Youhei Fujii, Kouta Nishida, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie (KIT) AN2011-90
Recently, cognitive radio has been attract much attention because it is a promising technology to solve the upcoming res... [more] AN2011-90
pp.135-140
NS, IN
(Joint)
2012-03-09
11:40
Miyazaki Miyazaki Seagia Fast Protection Switching Method by Cooperation of Upper Layer Protocols and Ethernet Ring
Kazuki Hamada, Norihiko Ochiai, Ryuichi Kitaichi (Mitsubishi Electric) NS2011-232
The protection switching process by ERP(Ethernet Ring Protection Switching) can be operated within 50ms after failure de... [more] NS2011-232
pp.295-300
NS 2012-01-27
09:00
Okinawa Ryukyu University The Organization Method of Heterogeneous Agents based on Agent Repository
Yuta Nakashima, Takahiro Uchiya, Ichi Takumi (NIT), Tetsuo Kinoshita (Tohoku Univ) NS2011-164
Various agents have been designed and developed aiming to cooperative problem solving and support of human activities. G... [more] NS2011-164
pp.109-114
MVE, ITE-HI, HI-SIG-VR 2011-06-29
14:20
Tokyo Sanjo Conference Hall The Research of the skillful Object Manipulation -- The Report about the System Constructing and the pre-Experiment --
Minato Mizutori, Koichi Hirota (Tokyo Univ.) MVE2011-26
Recent gains in technology make virtual environment more close to the real world. But manipulation in virtual environmen... [more] MVE2011-26
pp.61-65
RCS 2011-06-23
14:10
Okinawa Ryukyu Univ. A study on HTTP performance acceleration with WEB prefetching in large latency network system
Fumiaki Nagase, Tetsu Sakata (NTT) RCS2011-47
As the internet services are widely spread in recent years, network latency between users and www servers are becoming l... [more] RCS2011-47
pp.73-78
MoNA, IPSJ-MBL, IPSJ-DPS 2011-06-03
17:05
Okayama Osaka Univ. 50th Anniversary Hall PMIPv6 Multi-homing Support for Handovers across Heterogeneous Networks
Dae Sun Kim, Yoshinori Kitatsuji, Hidetoshi Yokota (KDDI R&D Labs) MoMuC2011-11
It is getting common that a mobile terminal such as a smartphone has multiple interfaces with different access
types an... [more]
MoMuC2011-11
pp.161-166
IN, NS
(Joint)
2011-03-04
08:50
Okinawa Okinawa Convention Center Encrypted E-mail sharing system with multi-forwarding
Fubuki Kubota, Taiichi Saito (Tokyo Denki Univ) NS2010-243
Proxy Re-Encryption scheme allows a proxy to transform a ciphertext computed with Alice's public key into one that can b... [more] NS2010-243
pp.445-448
IN, NS
(Joint)
2011-03-04
13:00
Okinawa Okinawa Convention Center Experimental Performance Evaluation of TCP Proxy Mechanism TCP-gSTAR for High Speed Satellite Links
Hiroyasu Obata, Masaaki Bessho, Kenji Ishida, Chisa Takano, Junichi Funasaka (Hiroshima City Univ.) IN2010-203
The satellite link speed has become larger such as terrestrial links.
For example, the maximum link speed of WINDS (Wid... [more]
IN2010-203
pp.353-358
NS, RCS
(Joint)
2010-12-16
15:40
Okayama Okayama Univ. Performance Evaluation of Throughput Fairness on Proxy-based TCP for Wireless Multi-hop Networks
Masato Matsumoto, Yuta Yamamoto, Miki Yamamoto (Kansai Univ.) NS2010-121 RCS2010-175
Technical issues for wireless multihop networks include throughput degradation for long hop sessions, especially
for lo... [more]
NS2010-121 RCS2010-175
pp.97-102
ICSS 2010-11-05
13:25
Hiroshima Hiroshima City University A Timed-Release Proxy Re-Encryption Scheme and its Applications
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-48
Timed-Release Encryption (TRE) prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time S... [more] ICSS2010-48
pp.23-28
NS, CS, IN
(Joint)
2010-09-03
13:25
Miyagi Tohoku University A SIP Verification Method of Integrity and Authenticity for Secure Media Communication
Hisashi Takahara, Motonori Nakamura (SOKENDAI) IN2010-59
There is SRTP that is one of ways to realize secure media communication in the Internet with shared keys. For keep relia... [more] IN2010-59
pp.91-96
ICM 2010-07-08
13:00
Hokkaido Future University Hakodate A Study on CWMP (TR-069) Proxy with Home Network Protocols
Ryota Minokoshi, Nobuo Fukushima, Katsuyuki Yamashita, Shinichiro Kizaki, Yasuyuki Okabe, Hiroyuki Maeomichi (NTT COMWARE) ICM2010-8
To provide remote support services, such as trouble shooting of home-connected device, access technology that enables a ... [more] ICM2010-8
pp.1-6
ICM 2010-03-11
09:10
Kagoshima   Reducing total ICT energy consumption and power generation with collaboration among end systems, the communication network and the power network
Shin-ichi Kuribayashi, Yasunori Osana (Seikei Univ.) ICM2009-47
There is a high hope that the use of ICT will dramatically reduce energy consumption. However, widespread use of ICT equ... [more] ICM2009-47
pp.13-17
MoNA, IN
(Joint)
2009-11-12
11:35
Fukuoka Fukuoka Institute of Technology Cache Design for RESTful Active Proxy for Efficient SNMP Monitoring
Ahmad Kamil Abdul Hamid, Yoshihiro Kawahara, Tohru Asami (The Univ. of Tokyo) IN2009-70
In this paper, we propose a RESTful active proxy, called Tambourine, towards realizing globalization in network manageme... [more] IN2009-70
pp.11-16
CQ, NS, ICM
(Joint)
2009-11-13
15:10
Ishikawa Kanazawa Institute of Technology (Ishikawa) Novel Load Distribution System to Mitigate Flash Crowds
Kenji Yokota, Takuya Asaka, Tatsuro Takahashi (Kyoto Univ.) NS2009-117
In recent years there is a rapid increase of traffic to a certain Web server within a short time as the number of Intern... [more] NS2009-117
pp.77-82
 Results 21 - 40 of 74 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan