Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS, CS, NV (Joint) |
2021-09-09 13:30 |
Online |
Online |
{Architecture for Configurable Real-time Device Identification in Campus Core Networks Kohei Hayashi (Osaka City Univ.), Kota Tuchie, Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata (Osaka City Univ.) IN2021-14 |
In recent years, data traffic of IoT devices is increasing rapidly. In order to achieve a secure management of large-sca... [more] |
IN2021-14 pp.13-18 |
IN, NS, CS, NV (Joint) |
2021-09-09 13:05 |
Online |
Online |
Service Chain Provisioning Considering Traffic Changing Effect of Virtualized Network Functions Shintaro Ozaki, Takehiro Sato, Eiji Oki (Kyoto Univ.) NS2021-61 |
We present a service chain provisioning model that determines the resource allocation while considering traffic changes ... [more] |
NS2021-61 pp.24-29 |
IN, NS, CS, NV (Joint) |
2021-09-10 15:10 |
Online |
Online |
[Invited Talk]
Performance Analysis Modeling on Success Prioritized DCF Daisuke Umehara, Yamato Yoshikawa (Kyoto Inst. of Tech.) CS2021-50 |
Random access distributed coordination function (DCF) is widely used as a medium access control protocol. We have propos... [more] |
CS2021-50 pp.44-46 |
RCS, SAT (Joint) |
2021-08-27 17:35 |
Online |
Online |
A Study of Adaptive Coding and Modulation Scheme suitable for Flexible Satellite Communication System Mitsugu Okawa, Hiromitsu Wakana, Amane Miura (NICT) SAT2021-40 |
The resource control for frequency bandwidth and transmission power between beams is effective in Ka-band high capacity ... [more] |
SAT2021-40 pp.67-72 |
ICM |
2021-03-19 10:50 |
Online |
Online |
[Encouragement Talk]
Utility of Training Data in Sequential Accumulation Learning-Based Anomaly Detection Natsuki Fukazawa, Naoki Yoshida, Shingo Ata, Ikuo Oka (Osaka City Univ.) ICM2020-69 |
In Network-based Intrusion Detection Systems (NIDS) using supervised learning, one of important challengings is how to c... [more] |
ICM2020-69 pp.52-57 |
MVE, IMQ, IE, CQ (Joint) [detail] |
2021-03-02 14:40 |
Online |
Online |
Performance evaluation of priority control scheme for the shortest reservation call in disaster congestion Yuto Mogi, Kenko Ota, Takehumi Hiraguri, Hideaki Yoshino (NIT) CQ2020-112 |
When a disaster such as an earthquake occurs, telephone traffic to the disaster area increases rapidly for mainly safety... [more] |
CQ2020-112 pp.22-27 |
CQ, CBE (Joint) |
2021-01-20 11:15 |
Online |
Online |
[Invited Lecture]
Network control technologies based on QoS requirements Masahiro Kobayashi, Shigeaki Harada (NTT) CQ2020-64 |
With the development of virtualization technologies such as Software-Defined Networking (SDN) and Network Functions Virt... [more] |
CQ2020-64 pp.22-26 |
CQ, CBE (Joint) |
2021-01-20 16:05 |
Online |
Online |
[Invited Talk]
A machine learning approach to data generation in networks Kohei Watabe (Nagaoka Univ. of Tech.) CQ2020-71 |
When we evaluate communication networks and protocols/applications running on them, it is important to demonstrate their... [more] |
CQ2020-71 p.57 |
SRW, SeMI, CNR (Joint) |
2020-11-26 12:10 |
Online |
Online |
Load-balanced node grouping method for IEEE 802.11ah networks under non-uniform node distribution Maki Shimokawa, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori (Mie Univ.) SeMI2020-19 |
IEEE802.11ah introduces the restricted access window (RAW) mechanism to mitigate intense channel access contentions for ... [more] |
SeMI2020-19 pp.17-22 |
CS |
2020-11-06 14:45 |
Online |
Online + Central Community Center, Nonoichi Community Center (Primary: Online, Secondary: On-site) |
[Invited Lecture]
A self-learning traffic analysis method for self-driving private mobile networks Anan Sawabe (NEC/UTokyo), Takanori Iwai (NEC), Akihiro Nakao (UTokyo) CS2020-63 |
Recent wide-spreading IoT use cases lead IoT vertical players without wireless network expertise to utilize high perform... [more] |
CS2020-63 pp.81-82 |
NS |
2020-10-08 10:20 |
Online |
Online |
A Proposal of Transmission Timing Control to Avoid Collisions among Aperiodic and Periodic Packets in Wireless Sensor Networks Aya Koyama, Yosuke Tanigawa, Hideki Tode (Osaka Prefecture Univ.) NS2020-63 |
Recently, many wireless sensor networks need to communicate aperiodically generated packets like event detection as well... [more] |
NS2020-63 pp.42-47 |
ICM |
2020-07-17 09:25 |
Online |
Online |
Study on which data we should label in a few-shot learning for service identification over encrypted web services Shouta Yoshida, Yutaka Eguchi, Kohei Shiomoto (TCU) ICM2020-14 |
It is very important to monitor and control the communication traffic to cope with the
increasing communication traffic... [more] |
ICM2020-14 pp.37-42 |
RCS |
2020-06-24 14:15 |
Online |
Online |
Performance Evaluation of Multiplexing Method of Multiple Service Channels to Maximize Integrated System Throughput under Finite Traffic Model Shusei Inoue, Kenichi Higuchi (Tokyo Univ. of Science) RCS2020-26 |
The fifth generation mobile communication system and beyond are expected to support various wireless communication servi... [more] |
RCS2020-26 pp.19-24 |
IN, RCS, NV (Joint) |
2020-05-21 13:50 |
Online |
Online |
[Invited Lecture]
NetworkAPI : An Application-aware Traffic Engineering using SRv6 and IP anycast Takuya Miyasaka, Takeshi Kitahara (KDDI Research) IN2020-3 RCS2020-16 |
Application-aware Traffic Engineering (TE) plays a crucial role to ensure quality of services (QoS) for recently emergin... [more] |
IN2020-3 RCS2020-16 pp.7-12(IN), pp.31-36(RCS) |
IE, IMQ, MVE, CQ (Joint) [detail] |
2020-03-06 10:45 |
Fukuoka |
Kyushu Institute of Technology (Cancelled but technical report was issued) |
Accurate OD Traffic Matrix Estimation Using Pseudo Network Topology Yohei Hasegawa, Masato Uchida (Waseda Univ.) CQ2019-150 |
In this paper, we consider the problem of estimating the traffic rate of every unobservable global flow (individual-flow... [more] |
CQ2019-150 pp.81-86 |
ICM |
2020-03-03 10:00 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
Automatic Accumulation of Learning Data on Learning-based Anomaly Detection Utilizing Communication Traffics Natsuki Fukazawa, Naoki Yoshida, Shingo Ata, Ikuo Oka (Osaka City Univ.) ICM2019-50 |
With the advancement and diversification of information infrastructure in recent years, the importance
of network secur... [more] |
ICM2019-50 pp.49-54 |
ICM |
2020-03-03 16:40 |
Okinawa |
Ohama Nobumoto Memorial Hall (Cancelled but technical report was issued) |
SDN-based Dynamic Traffic Shaping Method Kota Ebine, Ryotaro Yamauchi, Shin-ichi Kuribayashi (Seikei Univ.) ICM2019-66 |
Traffic shaping controls communication traffic flow to prevent a specified communication rate from being exceeded. In co... [more] |
ICM2019-66 pp.141-146 |
LOIS, ICM |
2020-01-10 11:25 |
Nagasaki |
ARKAS SASEBO |
[Encouragement Talk]
A Two-stage Clustering Method for P2PTV Unit Traffic Classification and Its Evaluation Rina Ooka, Takumi Miyoshi, Taku Yamazaki (Shibaura Inst. of Tech.) ICM2019-39 LOIS2019-54 |
Peer-to-peer-based video streaming (P2PTV) in which user terminals (peers) directly communicate with each other has attr... [more] |
ICM2019-39 LOIS2019-54 pp.51-56 |
IN, IA (Joint) |
2019-12-19 13:50 |
Hiroshima |
Satellite Campus Hiroshima |
Evaluation of Traffic Accommodation Efficiency in Reconfigurable Wide Area Network Kazuya Anazawa, Toru Mano, Takeru Inoue, Atsushi Taniguchi, Kohei Mizuno (NTT) IN2019-50 |
In this paper, we quantitatively evaluate the effect of traffic accommodation efficiency in wide area network obtained b... [more] |
IN2019-50 pp.31-36 |
RISING (2nd) |
2019-11-26 14:10 |
Tokyo |
Fukutake Learning Theater, Hongo Campus, Univ. Tokyo |
|
Due to the sophistication and diversification of information infrastructure in recent years, the risk due to connections... [more] |
|