Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS, IN, NS (Joint) |
2005-09-16 09:25 |
Miyagi |
Tohoku Univ. |
Automatic Network Event Summarization based on Combination of Traffic Anomaly Detection and Log Mining Masahiro Nagao, Gen Kitagata, Takuo Suganuma, Norio Shiratori (Tohoku Univ.) |
Recently, the research of anomaly detection techniques to use them for network management is active. However, those exis... [more] |
IN2005-70 pp.55-60 |
CS, IN, NS (Joint) |
2005-09-16 09:50 |
Miyagi |
Tohoku Univ. |
A proposal of a Traceback method between ASes against DRDoS attacks Teruaki Takahashi (Kogakuin Univ.), Toshihumi Kai (MEW, Ltd.), Katsuyuki Shinohara (Kogakuin Univ.) |
In recent years, the damage by illegal access is seen as a problem with the development of the information infrastructur... [more] |
IN2005-71 pp.61-66 |
CS, IN, NS (Joint) |
2005-09-16 10:15 |
Miyagi |
Tohoku Univ. |
A Network Anomaly Detection based on Multi-Stage Traffic Analysis Masashi Tsuji, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) |
The explosive growth of the Internet has increasingly given rise to better sophisticated and larger number of intrusions... [more] |
IN2005-72 pp.67-72 |
CS, IN, NS (Joint) |
2005-09-16 09:00 |
Miyagi |
Tohoku Univ. |
An Self Adaptive Intrusion Detection Method\\ for AODV-based Mobile Ad Hoc Networks Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato (Tohoku Univ.), Abbas Jamalipour (Univ. of Sydney) |
Mobile ad hoc networks (MANET) are usually formed without any major
infrastructure. As a result, they are relatively v... [more] |
CS2005-27 pp.61-66 |
CS, IN, NS (Joint) |
2005-09-16 09:25 |
Miyagi |
Tohoku Univ. |
Energy Analysis of IEEE 802.11 DCF under Non-Saturation Conditions Katsumi Sakakibara, Haruhiko Nakagawa, Jiro Yamakita (Okayama Prif. Univ.) |
We develop an analytic model to evaluate non-saturation energy consumption of IEEE 802.11 DCF, based on Bianchi's model ... [more] |
CS2005-28 pp.67-72 |
CS, IN, NS (Joint) |
2005-09-16 09:50 |
Miyagi |
Tohoku Univ. |
About the MAC protocol performance of the RFID system that can deal with two or more leaders Makoto Ejima, Masaki Bandai, Takashi Watanabe (Shizuoka Univ) |
[more] |
CS2005-29 pp.73-77 |
CS, IN, NS (Joint) |
2005-09-16 10:15 |
Miyagi |
Tohoku Univ. |
Proposal and evaluation of a routing protocol for VANET using mobile velocity vector Mitsuru Ochi, Tarik Taleb (Tohoku Univ.), Abbas Jamalipour (Univ. of Sydney), Nei Kato, Yoshiaki Nemoto (Tohoku Univ.) |
[more] |
CS2005-30 pp.79-84 |
CS, IN, NS (Joint) |
2005-09-16 10:45 |
Miyagi |
Tohoku Univ. |
Identification of attack sources by estimating traffic matrix Yuichi Ohsita (Osak Univ), Shingo Ata (Osaka City Univ), Masayuki Murata (Osak Univ) |
Distributed denial-of-service attacks on public servers have recently become more serious. The most effective way to pre... [more] |
NS2005-86 IN2005-74 CS2005-32 pp.43-48(NS), pp.79-84(IN), pp.91-96(CS) |
CS, IN, NS (Joint) |
2005-09-16 10:45 |
Miyagi |
Tohoku Univ. |
Status toward standardization of layer 2 security and items Ken Murakami, Koji Sato, Tetsuya Yokotani, Tetsujiro Yasushi (Mitsubishi Electric Corp.) |
The Link Security Task Group in IEEE802.1 plans to make standards of layer 2 security. In this task group, secured commu... [more] |
NS2005-85 IN2005-73 CS2005-31 pp.37-41(NS), pp.73-77(IN), pp.85-89(CS) |
CS, IN, NS (Joint) |
2005-09-16 10:45 |
Miyagi |
Tohoku Univ. |
Fluid-based analysis of a network with DCCP connections and RED routers Hiroyuki Hisamatsu, Hiroyuki Ohsaki, Masayuki Murata (Osaka Univ.) |
In this paper, we model DCCP congestion control mechanism and RED as
independent discrete-time systems using fluid-flow... [more] |
NS2005-87 IN2005-75 CS2005-33 pp.49-54(NS), pp.85-90(IN), pp.97-102(CS) |
CS, IN, NS (Joint) |
2005-09-16 10:45 |
Miyagi |
Tohoku Univ. |
Effective recovery method for continuous collection of management information over mobile environment Hiroki Kamiyama, Gen Kitagata, Kazuhide Koide (Tohoku Univ.), Glenn Mansfield Keeni (Cysol), Norio Shiratori (Tohoku Univ.) |
The rapid spread of the Internet and the development of mobile terminals such as PDA and note PC have made the mobility ... [more] |
NS2005-88 IN2005-76 CS2005-34 pp.55-60(NS), pp.91-96(IN), pp.103-108(CS) |
CS, IN, NS (Joint) |
2005-09-16 10:45 |
Miyagi |
Tohoku Univ. |
Evaluation of scalable QoS degradation locating from end-to-end flow quality information Masayoshi Kobayashi, Yohei Hasegawa, Tutomu Murase (NEC Corp.) |
We have proposed a method to locating the QoS degradation points from end-to-end per flow quality information and networ... [more] |
NS2005-89 IN2005-77 CS2005-35 pp.61-66(NS), pp.97-102(IN), pp.109-114(CS) |
CS, IN, NS (Joint) |
2005-09-16 10:45 |
Miyagi |
Tohoku Univ. |
Proposal of a method for hiding classified information on blog Yuichi Nakatani, Tetsuro Tokunaga, Hitoshi Yamaguchi, Tadashi Itoh (NTT) |
Recently, the number of blog users increases rapidly, and blogs are expected to be new information-publish tools based o... [more] |
NS2005-90 IN2005-78 CS2005-36 pp.67-70(NS), pp.103-106(IN), pp.115-118(CS) |
CS, IN, NS (Joint) |
2005-09-16 13:30 |
Miyagi |
Tohoku Univ. |
A Service Discovery Protocol for Mobile Ad Hoc Networks Based on Dyanmic Reconfiguration of Service Provision Groups Xuefeng Bai, Tomoyuki Ohta, Yoshiaki Kakuda (Hiroshima City Univ.), Atsushi Ito (KDDI) |
[more] |
IN2005-79 pp.107-112 |
CS, IN, NS (Joint) |
2005-09-16 13:55 |
Miyagi |
Tohoku Univ. |
Network Information Acquisition Method for Service Migration Destination Selection in Ubiquitous Environment and its Application Takahiro Chiba, Hideyuki Takahashi, Kazuhide Koide, Gen Kitagata, Takuo Suganuma, Norio Shiratori (Tohoku Univ.) |
Recently, service migration between terminals on ubiquitous environment is well studied. But, it is based only on the ph... [more] |
IN2005-80 pp.113-117 |
CS, IN, NS (Joint) |
2005-09-16 14:20 |
Miyagi |
Tohoku Univ. |
Performance Analysis of Real Time Communication Mechanism for Cooperation Control in Mobile Robot Group Junpei Arai (Yamagata College of Ind.), Akio Koyama (Yamagata Univ.), Leonard Barolli (Fukuoka Institute of Tech.) |
In recent years, a network robotic technology which is combined with a robotic technology, a ubiquitous network technolo... [more] |
IN2005-81 pp.119-124 |
CS, IN, NS (Joint) |
2005-09-16 14:45 |
Miyagi |
Tohoku Univ. |
Proposal for mobile node with multiple interfaces Keigo Aso, Jun Hirano, Takashi Aramaki (Matsushita Electric) |
In the current environment there are diversity with regards to the connect mode, it is possible for one node to hold mul... [more] |
IN2005-82 pp.125-130 |
CS, IN, NS (Joint) |
2005-09-16 15:25 |
Miyagi |
Tohoku Univ. |
QoS Control method for large data transfer in grid environment Masaaki Noro (NICT), Ken-ichi Baba, Shinji Shimojo (Osaka Univ.) |
[more] |
IN2005-83 pp.131-136 |
CS, IN, NS (Joint) |
2005-09-16 15:50 |
Miyagi |
Tohoku Univ. |
Resource Assignment and Relay Tree Construction Scheme Based on Users' Demands of Quaity for Real-Time Communication with Multi-User Daisuke Hasegawa, Kenichiro Takano, Toshiaki Osada, Gen Kitagata, Takuo Suganuma, Norio Shiratori (Tohoku Univ.) |
For real-time communication with multi-user like video conference, it is needed to assign bandwidth according to network... [more] |
IN2005-84 pp.137-142 |
CS, IN, NS (Joint) |
2005-09-16 16:15 |
Miyagi |
Tohoku Univ. |
Dynamic QoS Control Scheme for Networked Virtual Environment based on Perceptual Level QoS Takayuki Kuroda, Shintaro Imai, Atushi Takeda, Gen Kitagata, Takuo Suganuma, Norio Shiratori (Tohoku Univ.) |
In this research, we focus on user's subjective QoS evaluation for controlling QoS of 3-D virtual space. We propose an a... [more] |
IN2005-85 pp.143-148 |
|