Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE |
2009-03-05 15:40 |
Kumamoto |
|
A Solving Method for SPF Forwarded Mail Problem by Tracing Recipient Addresses Takumi Seike, Kiyohiko Okayama, Keita Kawano (Okayama Univ.), Motonori Nakamura (NII), Nariyoshi Yamai (Okayama Univ.) SITE2008-64 IA2008-87 |
Recently, one of sender authentication methods called SPF has been popularized as Anti-spam technology.
However, SPF ha... [more] |
SITE2008-64 IA2008-87 pp.119-124 |
IA, SITE |
2009-03-05 16:00 |
Kumamoto |
|
A Wearable Device Support System using Virtualization and IP Mobility Architecture Hidenobu Watanabe, Toshihiro Ohigashi, Tohru Kondo, Kouji Nishimura, Reiji Aibara (Hiroshima Univ) SITE2008-65 IA2008-88 |
The wearable computing uses wearable devices that can be worn to human's body. We always can use the application with su... [more] |
SITE2008-65 IA2008-88 pp.125-130 |
IA, SITE |
2009-03-05 16:20 |
Kumamoto |
|
musasabi: a P2P-based Platform for Stable Services Kota Abe (Osaka City Univ.) SITE2008-66 IA2008-89 |
Since P2P systems must handle unexpected peer leave, P2P systems are hard to implement compared to server-client systems... [more] |
SITE2008-66 IA2008-89 pp.131-136 |
IA, SITE |
2009-03-05 16:40 |
Kumamoto |
|
A User-oriented Digital Signage System with a contents registration function Kaoru Suzuki, Kaori Maeda, Hiroyuki Inoue (Hiroshima City Univ.) SITE2008-67 IA2008-90 |
In this paper,we describe development of a digital signage system which displays digital data created for a paper announ... [more] |
SITE2008-67 IA2008-90 pp.137-142 |
IA, SITE |
2009-03-05 17:00 |
Kumamoto |
|
A system for geoinformation-attached video streaming over P2P network using mobile devices Tatsuya Ueda, Kota Abe, Hayato Ishibashi, Toshio Matsuura (Osaka City Univ.), Hiroshi Fujii, Shiu Sakashita (Acutus Software, Inc.) SITE2008-68 IA2008-91 |
Mobile devices are getting smaller and more powerful. Many of them are equipped with GPS (Global Positioning System) de... [more] |
SITE2008-68 IA2008-91 pp.143-147 |
IA, SITE |
2009-03-05 17:20 |
Kumamoto |
|
Development of "Opengate-PKI" Network User Authentication System with PKI Suguru Fujisawa, Makoto Otani, Kenzi Watanabe (Saga University) SITE2008-69 IA2008-92 |
PKI(Public Key Infrastructure) provides security service on network, for example encryption of data, guarantee of data i... [more] |
SITE2008-69 IA2008-92 pp.149-154 |
IA, SITE |
2009-03-05 17:40 |
Kumamoto |
|
Shortening Boot Times of Guest OSes on OS Boot/Shutdown Control System using Authentication Devices Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano (Univ. of Tsukuba) SITE2008-70 IA2008-93 |
We are developing an OS boot/shutdown control system which provides a suitable computer environment
by identifying bot... [more] |
SITE2008-70 IA2008-93 pp.155-160 |
IA, SITE |
2009-03-05 20:00 |
Kumamoto |
|
Evaluation of P2P Type File Distribution using IP Mobility Hajime Masaoka, Akio Seki, Seigo Kishiba, Tohru Kondo, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) SITE2008-71 IA2008-94 |
Recently, P2P type file shareing softwares including the BitTorrent are used by distributing Unix line OS such as Linux ... [more] |
SITE2008-71 IA2008-94 pp.161-166 |
IA, SITE |
2009-03-05 20:20 |
Kumamoto |
|
A remote power control system for PC classroom to save energy Mayu Funaki, Katsura Nishigaki, Akinori Saitoh (Tottory Univ. of Environmental Studies) SITE2008-72 IA2008-95 |
In PC classroom, running all PCs for 7x24 means waste of electric power cost. Contrarily, ordinary-off style operation b... [more] |
SITE2008-72 IA2008-95 pp.167-172 |
IA, SITE |
2009-03-05 20:40 |
Kumamoto |
|
A system to re-register login password with less human resource Katsura Nishigaki, Akinori Saitoh (Tottori Univ. of Environmental Studies) SITE2008-73 IA2008-96 |
In university computer center, especially at the end of long vacation, many users that forgets their password makes cent... [more] |
SITE2008-73 IA2008-96 pp.173-178 |
IA, SITE |
2009-03-05 21:00 |
Kumamoto |
|
Implementation of an Access Control Mechanism that Enables Delegating Rights of Network Usage Permissions for Guest PCs Mitsuhiro Mabuchi, Tsuyoshi Ozawa, Shingo Takada, Hiraku Toyooka, Keigo Matsui, Akira Sato, Yasushi Shinjo, Kazuhiko Kato (Univ. of Tsukuba) SITE2008-74 IA2008-97 |
When guests access their PCs to an organization's network, it is a challenging task for network administrators to achiev... [more] |
SITE2008-74 IA2008-97 pp.179-184 |
IA, SITE |
2009-03-05 21:20 |
Kumamoto |
|
Effect of application order of topology inference rule for Layer2 Network Topology Visualizing System Shunsuke Fujita, Kazuyuki Yoshida (Oita Univ.) SITE2008-75 IA2008-98 |
We propose the algorithm that infers the Ethernet Network Topology, and make and use the system which infers and display... [more] |
SITE2008-75 IA2008-98 pp.185-190 |
IA, SITE |
2009-03-05 21:40 |
Kumamoto |
|
Installation of Security Policy into Kumamoto University and DNS based Detection of Security Incidents in the Campus Network Yasuo Musashi (Kumamoto Univ.) SITE2008-76 IA2008-99 |
In Kumamoto University, we created policies and standards through August 2001 to February 2003, and procedures through M... [more] |
SITE2008-76 IA2008-99 pp.191-196 |
IA, SITE |
2009-03-05 22:00 |
Kumamoto |
|
Instant OS image management system for various virtual machine environments Masahiko Yamazaki, Shunsuke Matsunaga, Hideo Masuda (Kyoto Inst. of Tech.) SITE2008-77 IA2008-100 |
Using the VM technology, we can reduce hardware and operating cost with unified few computers. However, it is not enough... [more] |
SITE2008-77 IA2008-100 pp.197-202 |
IA, SITE |
2009-03-05 22:20 |
Kumamoto |
|
Scan Attack Detection using the Counting of TCP Connection Request with Pseudo SYN-ACK Reply. Kenji Otsuka, Kiyoyuki Kodama, Yuuki Kinugasa (Oita Univ.), Kazuyuki Yoshida (oita Univ.) SITE2008-78 IA2008-101 |
[more] |
SITE2008-78 IA2008-101 pp.203-208 |
IA, SITE |
2009-03-06 08:30 |
Kumamoto |
|
Proposal on Bayesian Spam Filter Using Distribution of Symbol and Unknown Word Kenji Ogawa, Hiroyuki Inaba (Kyoto Inst of Tech.) SITE2008-79 IA2008-102 |
Recently, spam mail, that is an irrelevant and unsolicited mail, is one of the most serious problem in Internet.
A Bay... [more] |
SITE2008-79 IA2008-102 pp.209-212 |
IA, SITE |
2009-03-06 08:50 |
Kumamoto |
|
Formalization of Knowledge for Automatic Administration System to the Internal Security Problem Soichiro Morishita (Univ. of Tokyo), Hiroki Hashiguchi, Taketoshi Mishima (Saitama Univ.) SITE2008-80 IA2008-103 |
An internal security problem means the problem about security matters caused by users on the inside rather than outside ... [more] |
SITE2008-80 IA2008-103 pp.213-218 |
IA, SITE |
2009-03-06 09:10 |
Kumamoto |
|
Improving the educational assistant tool for BBS users using comments evaluation system Yu Ichifuji (Tohoku Univ.), Susumu Konno (Chiba Inst. of Tech), Hideaki Sone (Tohoku Univ.) SITE2008-81 IA2008-104 |
Electronic bulletin board systems (BBS) have become a common communication tool on the Internet. Some people who use BBS... [more] |
SITE2008-81 IA2008-104 pp.219-223 |
IA, SITE |
2009-03-06 09:30 |
Kumamoto |
|
Proposal of The Access Control Agent System in the Internet for Semantics Cloud Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2008-82 IA2008-105 |
The concept called Cloud of the Internet is defined, semantics to which search engine and information production system ... [more] |
SITE2008-82 IA2008-105 pp.225-230 |
IA, SITE |
2009-03-06 09:50 |
Kumamoto |
|
Consideration for Intellectual Property and standardization of MEMS
-- perspective of vertical integration and horizontal division of labor -- Yosuke Komori, Yukio Hiramatsu (Osaka Inst. of Tech.) SITE2008-83 IA2008-106 |
This paper investigates and analyses the trends of market forecast, patent application and standardization regarding Mic... [more] |
SITE2008-83 IA2008-106 pp.231-236 |