|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, ICM, CQ, NV (Joint) |
2020-11-27 13:35 |
Online |
Online |
Dynamically prioritized virtual-network monitoring according to uptime of virtual machines Hideki Okita, Hayato Hoshihara (Hitachi), Norihisa Komoda, Toru Fujiwara (Osaka Univ.) ICM2020-31 |
A monitoring method that utilizes Ethernet OAM, which was originally developed for monitoring failures in wide-area netw... [more] |
ICM2020-31 pp.61-66 |
LOIS, IPSJ-DC |
2007-07-27 16:05 |
Hokkaido |
Future University-Hakodate |
A Method for Generating a Post-Encryption Schema for a Schema Validation of Encrypted XML Data Kojiro Nakayama, Michiko Oba (Hitachi), Norihisa Komoda (Osaka Univ.) |
If XML data is partially encrypted using XML Encryption, we cannot perform shcema validation because the data is no long... [more] |
OIS2007-26 pp.71-76 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|