Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2018-03-02 13:30 |
Miyazaki |
Phoenix Seagaia Resort |
MPR Selection and Routing Methods Using Link Disconnection Prediction in OLSR Protocol Wataru Nagata, Akira Toyozaki, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Waseda Univ.), Yasuo Nagai (Tokyo Univ. of Information Sciences) IN2017-134 |
OLSR is one of well-known proactive protocols for MANETs.
OLSR may cause the reduction of network performance because ... [more] |
IN2017-134 pp.267-272 |
IN |
2018-01-22 13:50 |
Aichi |
WINC AICHI |
Autonomous Distributed Calculation and Storage of Tie Strengths between Contents in Graph System Daichi Kitamura, Kunitake Kaneko (Keio University) IN2017-76 |
Graphs as relation between contents is used to calculate the tie strength between them and it is of- ten used for recomm... [more] |
IN2017-76 pp.37-42 |
CQ (2nd) |
2018-01-20 12:50 |
Tokyo |
Nishiwaseda Campus, Waseda Univ. |
[Poster Presentation]
Load Balancing Routing Inspired by True Slime Mold for Ad Hoc Networks Hiroshi Katada, Takumi Miyoshi (SIT) |
Biomimetics or bio-inspired methods that apply and model the living phenomena in various fields have been attracting att... [more] |
|
NS |
2018-01-18 15:20 |
Okinawa |
Ishigakishi-Shoko-Kaikan |
[Encouragement Talk]
Adaptive Parameter Control Based on Random Value Information in Backoff-based Opportunistic Routing Taku Yamazaki (Waseda Univ.), Ryo Yamamoto (The Univ. of Electro-Communications), Tadahide Kunitachi (YAZAKI CORP.), Yoshiaki Tanaka (Waseda Univ.) NS2017-149 |
As an application of ad hoc networks, a method of replacing wire harnesses by wireless communication has been studied. I... [more] |
NS2017-149 pp.29-34 |
ITS, WBS, RCC |
2017-12-15 13:55 |
Okinawa |
Tiruru/Okinawa Jichikaikan |
Prolonging lifetime of nodes by route reconstruction method using sequence numbers in AODV Yuta Suzuki, Kouji Ohuchi (Shizuoka Univ.) WBS2017-78 ITS2017-55 RCC2017-94 |
Multihop communication, in which mobile terminals form a network without the infrastructure, is a promising technique to... [more] |
WBS2017-78 ITS2017-55 RCC2017-94 pp.245-250 |
IA, IN (Joint) |
2017-12-14 15:35 |
Hiroshima |
Hiroshima City Univ. |
The Priority Route Assignment Method in Flow-Level Routing Yuki Udagawa, Osamu Mizuno (Kogakuin Univ.) IN2017-53 |
OSPF(Open Shortest Path First) and RIP(Routing Information Protocol) are utilized as routing protocols in enterprise net... [more] |
IN2017-53 pp.43-48 |
ICM, CQ, NS, NV (Joint) |
2017-11-16 11:45 |
Kagawa |
|
[Invited Lecture]
Opportunistic Routing by Narrowing Forwarding Areas in Ad Hoc Networks Taku Yamazaki (Waseda Univ.), Ryo Yamamoto (The Univ. of Electro-Communications), Takumi Miyoshi (Shibaura Inst. Tech.), Takuya Asaka (Tokyo Metropolitan Univ.), Yoshiaki Tanaka (Waseda Univ.) NS2017-116 |
In ad hoc networks, terminals' mobility and wireless interferences cause degradation of communication quality and variat... [more] |
NS2017-116 pp.29-32 |
ICTSSL, IN (Joint) |
2017-10-10 15:15 |
Shizuoka |
|
The Offload Method Considering Traffic Type in Flow-Level Routing Yuki Udagawa, Osamu Mizuno (Kogakuin Univ.) IN2017-37 |
OSPF(Open Shortest Path First) and RIP(Routing Information Protocol) are the most widely used routing protocols at ISP(I... [more] |
IN2017-37 pp.13-18 |
CS, NS, IN, NV (Joint) |
2017-09-08 16:10 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Hybrid Approach for Named Data Networking Based Ad Hoc Routing Ngo Quang Minh, Ryo Yamamoto, Satoshi Ohzahata, Toshihiko Kato (The Univ. of Electro-Commun.) NS2017-87 |
This paper proposes a new routing protocol for named data networking (NDN) based ad hoc networks. One feature of our pr... [more] |
NS2017-87 pp.97-102 |
CQ |
2017-08-28 11:30 |
Tokyo |
Tokyo University of Science |
Performance Evaluation of Vehicular DTN Protocols for Anycast Vehicle-to-cloud Communications Zhaoyang Du, Celimuge Wu, Tsutomu Yoshinaga (UEC), Yusheng Ji (NII) CQ2017-52 |
Recently, the Delay Tolerant Networks (DTN) have been attracting interest due to having the ability to deliver messages ... [more] |
CQ2017-52 pp.13-18 |
CS |
2017-07-27 09:48 |
Nagasaki |
Fukue Bunka Kaikan |
Code Dissemination based on RPL with Scope Selection and Code Acquisition in Wireless Sensor Networks Hiromu Asahina, Iwao Sasase (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.), P. Takis Mathiopoulos (UoA) CS2017-18 |
In this paper, we propose RPL based code dissemination with scope selection and code acquisition.
The scope selection ... [more] |
CS2017-18 pp.29-34 |
IN |
2017-07-18 13:00 |
Hokkaido |
Japan Red Cross Hokkaido College of Nursing |
A Studey on the Traffic Off-Load Function in Flow-Level Routing Method Yuki Udagawa, Osamu Mizuno (Kogakuin Univ.) IN2017-19 |
OSPF(Open Shortest Path First) and RIP(Routing Information Protocol) are the most widely used routing methods at ISP(Int... [more] |
IN2017-19 pp.1-6 |
CCS |
2017-06-29 14:35 |
Ibaraki |
Ibaraki Univ. |
Design and Implementation of the Routing Protocol in Power Packet Network Yuma Yamamoto, Kaori Kuroda, Mikio Hasegawa (Tokyo Univ. of Science) CCS2017-3 |
Power packet networks and routers have been developed. The destination address is added to each power packet, which will... [more] |
CCS2017-3 pp.11-14 |
RECONF, CPSY, DC, IPSJ-ARC (Joint) [detail] |
2017-05-24 10:35 |
Hokkaido |
Noboribetsu-Onsen Dai-ichi-Takimoto-Kan |
On Implementation of the Light-Weight MPAR protocol in NS2 Yusuke Sugiura, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2017-13 DC2017-13 |
Avoidance routing protects data privacy by detouring insecure area where malicious nodes eavesdrop on the channel. Recen... [more] |
CPSY2017-13 DC2017-13 pp.75-77 |
RCS, IN, NV (Joint) |
2017-05-12 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Ad-hoc Routing Method based on Predicted Link Connection Duration and Hop Count Wataru Nagata, Takeshi Misu, Masaki Hanada (Tokyo Univ. of Information Sciences), Hidehiro Kanemitsu (Waseda Univ.), Yasuo Nagai (Tokyo Univ. of Information Sciences) IN2017-6 |
With the growth of IoT (Internet of Things), cars that are equipped with Internet access (i.e., connected cars) are grad... [more] |
IN2017-6 pp.25-30 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 10:40 |
Okinawa |
Kumejima Island |
Wormhole attack prevention in MANET using multipath routing protocol Chika Onodera, Takashi Minohara (Takushoku Univ.) CPSY2016-147 DC2016-93 |
In recent years, mobile ad hoc networks(MANET) are becoming more and more important when it is hard to use normal networ... [more] |
CPSY2016-147 DC2016-93 pp.309-314 |
NS, IN (Joint) |
2017-03-03 09:30 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Performance Analysis of Adaptive Coefficient Control in Backoff-based Opportunistic Routing Taku Yamazaki (Waseda Univ.), Ryo Yamamoto (The Univ. of Electro-Communications), Tadahide Kunitachi (YAZAKI CORP.), Yoshiaki Tanaka (Waseda Univ.) NS2016-212 |
As an application of ad hoc networks, it has been studied to replace wire harnesses with wireless harnesses. In the envi... [more] |
NS2016-212 pp.313-318 |
NS, IN (Joint) |
2017-03-03 15:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Hole Bypassing Geographic Routing Protocol with Delay Guarantee in WSNs Phi Le Nguyen (SOKENDAI), Yusheng Ji (NII/SOKENDAI), Thanh Trung Nguyen, Thanh-Hung Nguyen (HUST) IN2016-163 |
Wireless sensor networks are used in many mission-critical applications such as target tracking in battlefield, emergenc... [more] |
IN2016-163 pp.395-400 |
DC |
2017-02-21 15:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of Message Efficient Avoidance Routing Yusuke Sugiura, Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) DC2016-81 |
Avoidance routing protocol protects data by detouring insecure area where malicious nodes clandestinely listen to the ch... [more] |
DC2016-81 pp.41-44 |
CQ |
2017-01-19 13:00 |
Osaka |
Osaka University Nakanoshima Center |
Hole Aware Real-time Routing Protocol in WSNs Phi Le Nguyen (SOKENDAI), Vu Quoc Huy (HUST), Yusheng Ji (NII/SOKENDAI) CQ2016-90 |
Wireless sensor networks are used in many mission-critical applications such as target tracking in battlefield, emergenc... [more] |
CQ2016-90 pp.1-6 |