|
|
Technical Committee on Network Systems (NS) (Searched in: 2015)
|
|
Search Results: Keywords 'from:2015-09-03 to:2015-09-03'
|
[Go to Official NS Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS, CS, NV (Joint) |
2015-09-04 14:40 |
Iwate |
Iwate-ken Kokaido |
Study of reduction for equilibrium value in data migration of storage renewal Kotaro Mihara, Kazuhiro Kikuma (NTT) NS2015-82 |
[more] |
NS2015-82 pp.65-70 |
IN, NS, CS, NV (Joint) |
2015-09-04 15:15 |
Iwate |
Iwate-ken Kokaido |
cost and performance evaluation of hybrid cloud systems based on traffic prediction Yukio Ogawa (Hitachi Ltd.), Go Hasegawa, Masayuki Murata (Osaka Univ.) IN2015-50 |
In this report, we focus on the cloud bursting scenario of hybrid cloud systems, in which an on-premise application syst... [more] |
IN2015-50 pp.57-62 |
IN, NS, CS, NV (Joint) |
2015-09-04 15:40 |
Iwate |
Iwate-ken Kokaido |
Adaptive Probabilistic Caching for Information-Centric Networking Saran Tarnoi (SOKENDAI), Vorapong Suppakitpaisarn (Univ.Tokyo), Yusheng Ji (NII) IN2015-51 |
A probabilistic caching scheme (Prob) was introduced to give an efficient and lightweight caching scheme for information... [more] |
IN2015-51 pp.63-68 |
IN, NS, CS, NV (Joint) |
2015-09-04 16:05 |
Iwate |
Iwate-ken Kokaido |
A Study on Network Architecture based on Architecture Evolution of the Internet Tetsuya Hishiki, Hiroshi Waki, Takumi Ohba, Arata Koike (NTT) IN2015-52 |
We focus on “middle entity”, which provides values to applications at the middle of end-to-end communication. We discuss... [more] |
IN2015-52 pp.69-74 |
IN, NS, CS, NV (Joint) |
2015-09-04 16:40 |
Iwate |
Iwate-ken Kokaido |
Study of Architecture that Assists M2M/IoT Devices for Secure Connection as Necessary Mika Mori, Yoshiko Sueda, Masao Aihara (NTT) NS2015-83 |
[more] |
NS2015-83 pp.71-76 |
IN, NS, CS, NV (Joint) |
2015-09-04 17:05 |
Iwate |
Iwate-ken Kokaido |
A Study of Dynamic Private View SandBox Network to prevent DoS attack, IP spoofing and IP based-gathering Takeshi Ogawa, Yuta Kobayashi, Noriharu Miyaho (Tokyo Denki Univ.) NS2015-84 |
Dos attacks, IP address spoofing and name-based aggregation are important issues to be solved in the Internet. In this p... [more] |
NS2015-84 pp.77-82 |
IN, NS, CS, NV (Joint) |
2015-09-04 17:30 |
Iwate |
Iwate-ken Kokaido |
A study on solutions against caller identity spoofing over IMS networks Kenjiro Arai, Koji Tanida, Tsuyoshi Jocha (NTT) NS2015-85 |
The IMS networks defined in the 3rd Generation Partnership Project (3GPP) provides a reliable caller’s identity presenta... [more] |
NS2015-85 pp.83-88 |
IN, NS, CS, NV (Joint) |
2015-09-04 17:55 |
Iwate |
Iwate-ken Kokaido |
Efficient Paging Method Considering Movement Condition of Mobile Terminals in LTE Network Takeshi Hashimoto, Takeshi Kubo, Yoshinori Kitatsuji (KDDI Lab) NS2015-86 |
[more] |
NS2015-86 pp.89-94 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|