Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2016-01-22 12:25 |
Fukuoka |
|
A server resource allocation method considering combination of NW functions on NFV
-- NetroSphere: Towards the Transformation of Carrier Networks -- Hiroyuki Kurita, Hiroyuki Nakamura (NTT) NS2015-158 |
Carriers are now considering application of NFV to their networks. Towards NFV, transport functions such as firewall and... [more] |
NS2015-158 pp.69-74 |
IN |
2014-04-17 13:00 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
Elastic and strict load balancing via consistent hashing Yuichi Nakatani, Hiroyuki Kurita, Naoki Takada, Takao Yamashita (NTT) IN2014-1 |
Load balancing is a key function constructing massively distributed systems. Stateful services like SIP and distributed ... [more] |
IN2014-1 pp.1-6 |
NS |
2014-04-17 12:55 |
Okinawa |
Ishigaki-City-Hall |
Access Methods for Distributed Key-Value Stores with Highly SkewedAccess Distribution of Keys Hiroyuki Kurita, Naoki Takada, Takao Yamashita, Tomoharu Motono (NTT) NS2014-6 |
Distributed Key-Value Stores are becoming applicable to various applications, such as not only Web applications but auth... [more] |
NS2014-6 pp.27-32 |
NS |
2014-04-17 13:20 |
Okinawa |
Ishigaki-City-Hall |
Comparison of Load Balancing Designed for Requests Following Zipfian Distribution and Hybrid Load Balancer Using Round-Robin and Consistent Hashing Takao Yamashita, Hiroyuki Kurita, Naoki Takada, Kenji Ota (NTT) NS2014-7 |
In this paper, we evaluate, by simulation, how much amount of memory a load balancing method we previously proposed to p... [more] |
NS2014-7 pp.33-38 |
NS, IN (Joint) |
2013-03-08 09:00 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Load Balancing and Approximate Memory Minimization in Scale-Out System Architecture for Processing Requests That Follow Zipfian Distribution Takao Yamashita, Hiroyuki Kurita, Naoki Takada, Takuya Minami, Kenji Ota (NTT) IN2012-177 |
In this paper, we propose a load balancing method to process requests that follow a Zipfian distribution, which has extr... [more] |
IN2012-177 pp.137-142 |
IN |
2012-04-12 13:55 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
Load Balancing Methods for Distribution Contains a Few Frequently Requested Keys and Many Rarely Requested Keys Hiroyuki Kurita, Naoki Takada, Takuya Minami, Takao Yamashita, Yuji Agawa (NTT) IN2012-2 |
The consistent hash method is known as a load balancing method for the case where a large number of requests are to be h... [more] |
IN2012-2 pp.7-12 |
IN |
2010-10-14 16:00 |
Aichi |
Nagoya Institute of Technology |
[Invited Talk]
The authentication platform for VPN services Kenichi Matsui, Kenji Ota, Hiroyuki Kurita (NTT) IN2010-69 |
VPN (Virtual Private Network) services are widely used especially for corporate users to connect remote networks. Becaus... [more] |
IN2010-69 pp.25-30 |
CS, IN, NS (Joint) |
2008-09-12 11:20 |
Miyagi |
Tohoku University |
Relay method for VPN connection with a proxy-box intervening between terminal device and VPN gateway Jun-ya Kato, Hiroyuki Kurita (NTT) IN2008-58 |
We have proposed the SIP dial-up method controlling IKE/IPsec connection with SIP signaling for establishing remote acce... [more] |
IN2008-58 pp.87-92 |
NS, IN (Joint) |
2008-03-07 14:10 |
Okinawa |
Bankoku Shinryokan |
Implementation and evaluation report of mobile VPN method with SIP mobility Jun-ya Kato, Masahisa Kawashima, Hiroyuki Kurita (NTT) IN2007-205 |
This paper presents an implementation of a SIP-based remote VPN method, which we proposed, and the result of its perform... [more] |
IN2007-205 pp.277-282 |
MoNA, IN (Joint) |
2007-11-16 10:00 |
Fukuoka |
Fukuoka Institute of Technology |
An authentication method for an early deployment of nomadic IMS services Hirokazu Kitami, Yoshihito Oshima, Masahisa Kawashima, Jun-ya Kato, Hiroyuki Kurita (NTT) MoMuC2007-57 |
[more] |
MoMuC2007-57 pp.7-12 |
MoNA, IN (Joint) |
2007-11-16 10:25 |
Fukuoka |
Fukuoka Institute of Technology |
NW Attachment Control Scheme for Onymous IP Terminals in Nomadic Services Hiroyuki Kurita, Jun-ya Kato, Masahisa Kawashima (NTT) MoMuC2007-58 |
[more] |
MoMuC2007-58 pp.13-18 |
CPSY, DC |
2006-04-14 15:10 |
Tokyo |
Takeda Hall |
A Microarchitectural Framework for Flawless Dependablity Hidetsugu Irie (JST/Tokyo Univ.), Ken Ogino, Satoshi Katsunuma, Kazuto Shimizu, Hiroyuki Kurita, Masahiro Goshima, Shuichi Sakai (Tokyo Univ.) |
The dependability of computer system has become hard to maintain because it is achieved with various techniques through ... [more] |
CPSY2006-9 DC2006-9 pp.49-54 |
MoNA |
2005-05-25 14:20 |
Tokyo |
Kagaku-Kaikan |
Resource Management for Session Layer Architecture Hiroyuki Kurita, Kunitake Kaneko, Hiroyuki Morikawa, Tomonori Aoyama (Univ. of Tokyo) |
[more] |
MoMuC2005-6 pp.31-36 |