IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Networks (IN)  (Searched in: 2015)

Search Results: Keywords 'from:2015-09-03 to:2015-09-03'

[Go to Official IN Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 28 of 28 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, NS, CS, NV
(Joint)
2015-09-04
14:40
Iwate Iwate-ken Kokaido Study of reduction for equilibrium value in data migration of storage renewal
Kotaro Mihara, Kazuhiro Kikuma (NTT) NS2015-82
 [more] NS2015-82
pp.65-70
IN, NS, CS, NV
(Joint)
2015-09-04
15:15
Iwate Iwate-ken Kokaido cost and performance evaluation of hybrid cloud systems based on traffic prediction
Yukio Ogawa (Hitachi Ltd.), Go Hasegawa, Masayuki Murata (Osaka Univ.) IN2015-50
In this report, we focus on the cloud bursting scenario of hybrid cloud systems, in which an on-premise application syst... [more] IN2015-50
pp.57-62
IN, NS, CS, NV
(Joint)
2015-09-04
15:40
Iwate Iwate-ken Kokaido Adaptive Probabilistic Caching for Information-Centric Networking
Saran Tarnoi (SOKENDAI), Vorapong Suppakitpaisarn (Univ.Tokyo), Yusheng Ji (NII) IN2015-51
A probabilistic caching scheme (Prob) was introduced to give an efficient and lightweight caching scheme for information... [more] IN2015-51
pp.63-68
IN, NS, CS, NV
(Joint)
2015-09-04
16:05
Iwate Iwate-ken Kokaido A Study on Network Architecture based on Architecture Evolution of the Internet
Tetsuya Hishiki, Hiroshi Waki, Takumi Ohba, Arata Koike (NTT) IN2015-52
We focus on “middle entity”, which provides values to applications at the middle of end-to-end communication. We discuss... [more] IN2015-52
pp.69-74
IN, NS, CS, NV
(Joint)
2015-09-04
16:40
Iwate Iwate-ken Kokaido Study of Architecture that Assists M2M/IoT Devices for Secure Connection as Necessary
Mika Mori, Yoshiko Sueda, Masao Aihara (NTT) NS2015-83
 [more] NS2015-83
pp.71-76
IN, NS, CS, NV
(Joint)
2015-09-04
17:05
Iwate Iwate-ken Kokaido A Study of Dynamic Private View SandBox Network to prevent DoS attack, IP spoofing and IP based-gathering
Takeshi Ogawa, Yuta Kobayashi, Noriharu Miyaho (Tokyo Denki Univ.) NS2015-84
Dos attacks, IP address spoofing and name-based aggregation are important issues to be solved in the Internet. In this p... [more] NS2015-84
pp.77-82
IN, NS, CS, NV
(Joint)
2015-09-04
17:30
Iwate Iwate-ken Kokaido A study on solutions against caller identity spoofing over IMS networks
Kenjiro Arai, Koji Tanida, Tsuyoshi Jocha (NTT) NS2015-85
The IMS networks defined in the 3rd Generation Partnership Project (3GPP) provides a reliable caller’s identity presenta... [more] NS2015-85
pp.83-88
IN, NS, CS, NV
(Joint)
2015-09-04
17:55
Iwate Iwate-ken Kokaido Efficient Paging Method Considering Movement Condition of Mobile Terminals in LTE Network
Takeshi Hashimoto, Takeshi Kubo, Yoshinori Kitatsuji (KDDI Lab) NS2015-86
 [more] NS2015-86
pp.89-94
 Results 21 - 28 of 28 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan