Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CAS, CS |
2024-03-14 16:20 |
Okinawa |
|
An Approximate Solution Using K-Shortest Path and Reinforcement Learning for a Load Balancing Problem in Communication Networks Himeno Takahashi, Norihiko Shinomiya (Soka Univ.) CAS2023-123 CS2023-116 |
In recent years, the amount of data traffic in information and communication networks has been increasing and the risk o... [more] |
CAS2023-123 CS2023-116 pp.70-73 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 09:55 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
Cooperative Platoon Control for Traffic Congestion Reduction using Inter-Vehicle Communication Masaya Ando, Masami Yoshida, Taku Noguchi (Ritsumeikan Univ.) CQ2023-41 |
In recent years, traffic congestion has become a problem due to the increased vehicles. Traffic congestion is one of the... [more] |
CQ2023-41 pp.20-25 |
IA |
2023-09-21 14:40 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Extracting context from external events using auxiliary information from network traffic data Eilaf M.A Babai, Koji Okamura (Kyushu Univ.) IA2023-13 |
Network traffic flow data is the main source of information about the network status, and it is constantly monitored to ... [more] |
IA2023-13 pp.11-18 |
AI |
2023-09-12 15:15 |
Hokkaido |
|
A Study on the Implementation of Cooperative CAVs by Sharing the Observation Information Using Simulations and Considerations Based on Qualitative Evaluation Ken Matsuda (Graduate School of FUN), Ei-Ichi Osawa (FUN) AI2023-4 |
This study focuses on cooperative connected autonomous vehicles (cooperative CAVs). This research aims to propose a simu... [more] |
AI2023-4 pp.19-24 |
NS |
2023-04-14 11:40 |
Fukushima |
Nihon University, Koriyama Campus + Online (Primary: On-site, Secondary: Online) |
Network Anomaly Detection through Variable Granularity Traffic Analysis Shohei Kamamura, Yuya Takeda (Seikei Univ.), Yuki Takei, Masato Nishiguchi, Yuhei Hayashi, Takayuki Fujiwara (NTT) NS2023-9 |
In the Society 5.0, it is important to accurately measure and analyze the communication traffic flow in wide-area IP net... [more] |
NS2023-9 pp.44-49 |
SeMI, IPSJ-DPS, IPSJ-MBL, IPSJ-ITS |
2022-05-27 11:15 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Performance study of congestion mitigation on expressways by velocity control with short-term velocity forecasting using vehicular communication Tetsuya Fukumaru, Hiroaki Morino (SIT) SeMI2022-13 |
Natural traffic jam on highways on sags is known to be mainly caused by temporal slow-down of some vehicles at a gentle ... [more] |
SeMI2022-13 pp.59-64 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-07 09:45 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A Method for Identifying Content Delivery Services Using Traffic Information and Public Information from ISP's Perspective Yuki Tamura, Takao Kondo, Ryo Yasumori, Fumio Teraoka (Keio Univ.) SITE2021-47 IA2021-60 |
In this paper, we propose a method for identifying the traffic of content delivery services based on flow information (e... [more] |
SITE2021-47 IA2021-60 pp.7-14 |
SS, MSS |
2022-01-12 11:35 |
Nagasaki |
Nagasakiken-Kensetsu-Sogo-Kaikan Bldg. (Primary: On-site, Secondary: Online) |
A Method for Mesoscopic Modeling Method of Large Volume Traffic Flow Applying Process Mining Techniques Kenji Uehara, Kunihiko Hiraishi (JAIST) MSS2021-51 SS2021-38 |
With the improvement of computing power and the widespread use of sensor technologies such as cameras and GNSS, highly a... [more] |
MSS2021-51 SS2021-38 pp.112-117 |
IA, IN (Joint) |
2020-12-15 11:40 |
Online |
Online |
Application Identification Method with Meta-Learning Shun Tobiyama, Bo Hu, Kazunori Kamiya (NTT), Kenji Takahashi (NTT Ltd.) IN2020-40 |
With the continuous evolution of the Internet, a variety of web applications, such as video streaming, social network se... [more] |
IN2020-40 pp.43-48 |
NS |
2020-10-07 09:55 |
Online |
Online |
ABC Slicing: Delay-guaranteed Bandwidth Slicing for Latency-Sensitive Applications Takamitsu Iwai, Akihiro nakao (UTokyo) NS2020-55 |
Applications such as video streaming and automated driving require low latency communication. The traffic in these appli... [more] |
NS2020-55 pp.7-12 |
ITS, IEE-ITS, IPSJ-ITS |
2020-09-08 16:00 |
Online |
Online |
Desirable ITS communication for safety
-- Sensor and communication fusion, and TsRm evaluation method for overengineering prevention -- Ikkei Hasebe, Takaaki Hasegawa (Saitama Univ) ITS2020-3 |
In this paper, in order to clarify the desired ITS information and communication systems considering both safety and soc... [more] |
ITS2020-3 pp.1-8 |
ITS, IEE-ITS |
2020-03-10 15:10 |
Shiga |
Ritsumeikan Univ. (BKC) (Cancelled but technical report was issued) |
Desirable ITS Communication and Evaluation Method
-- A Study on Communication Design and Information Acquisition Rate of Sensor and Communication System in TsRm Communication Evaluation Method -- Ikkei Hasebe, Takaaki Hasegawa (Saitama Univ) ITS2019-65 |
In this paper, using a microscopic traffic flow simulator, we examine the relationship between performance characteristi... [more] |
ITS2019-65 pp.63-68 |
NS, IN (Joint) |
2020-03-06 14:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Evaluation of Network Resource Allocation Based on Monitored Traffic Condition inspired by the Cognitive Process of the Human Brain Semin An, Yuichi Ohsita, Masayuki Murata (Osaka Univ.) IN2019-135 |
Many kinds of services have been provided through networks.
Traffic from such services should be accommodated so as to ... [more] |
IN2019-135 pp.339-344 |
NS, OCS, PN (Joint) |
2018-06-15 13:20 |
Fukushima |
Koriyama-Shoko-Kaigisho |
[Encouragement Talk]
Real-time Estimating Application Flow from Encrypted Traffic Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC) NS2018-33 |
In recent years, mobile network operators have focused on QoE and QoC of users, which requires advanced network control ... [more] |
NS2018-33 pp.31-36 |
ICTSSL |
2017-03-02 13:55 |
Niigata |
Niigata University |
A consideration on traffic control by information floating Kazuyuki Miyakita, Keisuke Nakano (Niigata Univ.) ICTSSL2016-70 |
In information floating (IF), information exchange between mobile nodes is restricted to a designated area (transmittabl... [more] |
ICTSSL2016-70 pp.5-10 |
NS, CS, IN, NV (Joint) |
2016-09-30 13:05 |
Miyagi |
Tohoku Univ. |
Flow bundle method performing efficient channel utilization with less control traffic in software defined wireless network
-- Effective evaluation in multi-channel wireless mesh network -- Kazuki Mizuyama (Kyutech), Yuzo Taenaka (UTokyo), Kazuya Tsukamoto (Kyutech) NS2016-85 |
Software Defined Network (SDN) attracts much attention. Our previous study presented several channel utilization methods... [more] |
NS2016-85 pp.61-66 |
IN, RCS (Joint) |
2016-05-19 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An evaluation of proactive network control on a wide-area SDN testbed Yousuke Takahashi, Akito Suzuki, Keisuke Ishibashi, Kohei Shiomoto (NTT), Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.) IN2016-7 RCS2016-29 |
Software-defined networking, particularly OpenFlow, has enabled traffic engineering (TE) using arbi- trary traffic group... [more] |
IN2016-7 RCS2016-29 pp.37-42(IN), pp.31-36(RCS) |
NS, RCS (Joint) |
2015-12-17 11:00 |
Ehime |
Matsuyama Community Center |
[Encouragement Talk]
A reduction method of control traffic by exploiting bundle flow control in Software Defined Wireless Mesh Network Kazuki Mizuyama (KIT), Masaki Tagawa (NAIST), Yuzo Taenaka (UTokyo), Kazuya Tsukamoto (KIT) NS2015-131 |
The previous study presented several channel utilization methods by exploiting OpenFlow in multi-channel wireless mesh n... [more] |
NS2015-131 pp.25-30 |
WBS, ITS (Joint) |
2014-12-19 13:00 |
Kumamoto |
Kumamoto University |
Road Traffic Flow Surveillance Robust for Various Environments Using an Infrared Thermal Camera Yoichiro Iwasaki, Toshiyuki Nakamiya (Tokai Univ.) ITS2014-37 |
We have already proposed two vehicle detection methods, our method 1 and our method 2, using thermal images taken with a... [more] |
ITS2014-37 pp.99-102 |
NS, IN (Joint) |
2014-03-06 09:50 |
Miyazaki |
Miyazaki Seagia |
A Design of Behavioral Anomaly Detection System on Network Application Traffic from Many Sensors Kohei Kotera, Akira Nagata, Katsuichi Nakamura (Network Application Engineering Labs), Yoshiaki Hori (Saga Univ.) NS2013-187 |
We propose an behavioral anomaly detection system which makes it possible to analyze and immediately detect anomaly traf... [more] |
NS2013-187 pp.61-66 |