Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2022-11-21 14:30 |
Niigata |
Bandai Civic Hall (Niigata) (Primary: On-site, Secondary: Online) |
A Study of Application Identification Schemes and Impact on Video Transmission Quality in The Customer and Application-Aware SR-TE Framework Ryunosuke Saito, Harunobu Yoshida, Shintaro Ishihara, Toyokazu Akiyama, Kazumasa Kobayashi (Kyoto Sangyo Univ.), Wataru Mishima (NTT Com) IA2022-40 |
Customers using Internet service providers (ISP) generate traffic for a variety of applications, each with different req... [more] |
IA2022-40 pp.20-24 |
NS |
2020-05-15 11:35 |
Online |
Online |
Progressive Slicing : Practical Application Classification System for Application Slicing Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2020-17 |
With the proliferation of encrypted traffic and the increasing importance of application-specific QoE management, the ne... [more] |
NS2020-17 pp.57-62 |
OCS, PN, NS (Joint) |
2019-06-21 13:45 |
Iwate |
MALIOS(Morioka) |
Rethinking the Test Dataset Construction of Machine Learning for Mobile Application Identification Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2019-40 |
Machine Learning based application identification has been intensively studied for applications such as application spe... [more] |
NS2019-40 pp.29-34 |
NS |
2019-04-18 15:50 |
Kagoshima |
Tenmonkan Vision Hall |
[Invited Talk]
Application-Specific Network Slicing Leveraging P4 Switch and Deep Learning Ping DU, Akihiro Nakao (UTokyo) NS2019-9 |
The future Mobile networks are expected to support multiple kinds of applications with different QoS requirements.
Effe... [more] |
NS2019-9 pp.49-54 |
NS |
2019-01-17 15:15 |
Nagasaki |
Nagasaki Prefectural Art Museum |
High-Precision Zero-Rating for Next Generation Mobile Networks Ming Yang, Ping Du (UTokyo), Noriaki Kamiyama (Fukuoka Univ), Akihiro Nakao (UTokyo) NS2018-192 |
Zero-rating is a business strategy where mobile network operators (MNOs) and virtual mobile network operators(MVNOs will... [more] |
NS2018-192 pp.83-88 |
RCS, NS (Joint) |
2017-12-14 12:50 |
Hiroshima |
Aster Plaza |
Identification of Applications on Smartphone by Encrypted Traffic Analysis Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC) NS2017-126 |
Requirements of smartphone users shift from the quality of service, i.e., throughput, to the quality of applications . M... [more] |
NS2017-126 pp.1-6 |
NS, IN (Joint) |
2017-03-03 10:40 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Classification of Highly-Accurate Identifiable Applications Using Gini Index and Cosine Similarity Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2016-192 |
Existing research on application identification has problems from three points of view; credibility of training data, fl... [more] |
NS2016-192 pp.199-204 |
NS, CS, IN, NV (Joint) |
2016-09-30 13:55 |
Miyagi |
Tohoku Univ. |
Identification Method of Communication between Components of Application system based on Connection Structure of Port Number for Anomaly Detection in Cloud Computing Takaya Ide, Hitoshi Yabusaki, Kyosuke Hashimoto, Junji Kinoshita (Hitachi) NS2016-87 |
Silent failure is a problem to maintain reliability for application systems. To detect silent failures, it is effective ... [more] |
NS2016-87 pp.73-78 |
NS, IN (Joint) |
2016-03-03 10:40 |
Miyazaki |
Phoenix Seagaia Resort |
Application Identification by Packet Inspection based on N-gram Masaki Hara, Shinnosuke Nirasawa (Kogakuin Univ.), Akihiro Nakao (Univ.Tokyo), Masato Oguchi (Ochanomizu Univ.), Shu Yamamoto (Univ.Tokyo), Saneyasu Yamaguchi (Kogakuin Univ.) NS2015-192 |
Application Identification is important for controlling quality of services in extremely crowded networks, such as a net... [more] |
NS2015-192 pp.139-144 |
IN, NS, CS, NV (Joint) |
2015-09-04 10:35 |
Iwate |
Iwate-ken Kokaido |
[Encouragement Talk]
Identification of Mobile Applications via In-Network Machine Learning Using N-gram for Application-Specific Traffic Control Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2015-78 |
Identifying the application transmitting a given flow of network traffic is beneficial for network management, especiall... [more] |
NS2015-78 pp.41-46 |
WIT, SP, ASJ-H, PRMU |
2015-06-18 14:25 |
Niigata |
|
Living sound identification system using smartphone for persons with hearing loss Ashita Sarudate, Hiroshi Nunokawa, Kenzo Itoh (Iwate Prefectural Univ.) PRMU2015-38 SP2015-7 WIT2015-7 |
Persons with hearing loss cannot be listened to "living sound" which is required in order to live indoors. One way to so... [more] |
PRMU2015-38 SP2015-7 WIT2015-7 pp.37-42 |
CQ, CS (Joint) |
2015-04-22 11:10 |
Fukuoka |
Fukuoka Institute of Technology |
Multi-flow-based Traffic Analysis for Behavior Identification Yusuke Iemura, Yuichi Kumano (Osaka City Univ), Nobuyuki Nakamura (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ) CQ2015-10 |
Recently, application identification methods are attracted as an important role for network management which enables app... [more] |
CQ2015-10 pp.51-56 |
ICM |
2015-03-19 10:40 |
Okinawa |
Ishigaki-City-Hall |
A Method of Multi-stage Application Identification for Improving Identification Accuracy Yuichi Kumano, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) ICM2014-57 |
A method of application identification is important for network management because it is used for traffic controls and a... [more] |
ICM2014-57 pp.19-24 |
NS, IN (Joint) |
2015-03-03 14:10 |
Okinawa |
Okinawa Convention Center |
Identification of Mobile Applications via In-Network Machine Learning for Application Specific QoS Traffic Control Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2014-260 |
Due to the proliferation of smartphones and the explosive increase in mobile data traffic, application traffic identific... [more] |
NS2014-260 pp.487-492 |
NS, CS, IN (Joint) |
2013-09-13 13:50 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
A Study on Online Application Identification of Encrypted Traffic Yuichi Kumano, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2013-74 |
Application identification in the middle is one of important technique for network operators to manage application based... [more] |
IN2013-74 pp.85-90 |
IN, NS, CS (Joint) |
2012-09-21 15:55 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
A Study on Web Application Identification based on Communication Characteristics Shoki Matsuo, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) CS2012-60 |
Recently, websites which offer various Web Applications, such as Web Mail, Video Sharing, and so on, has been increasing... [more] |
CS2012-60 pp.61-66 |
MoNA, IN (Joint) |
2011-11-18 12:25 |
Fukuoka |
|
A study on improving accuracy of application identification for encrypted traffic Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2011-101 |
In network management, application identification of traffic is important. However, encrypted traffic has been increasin... [more] |
IN2011-101 pp.49-54 |
NS, CS, IN (Joint) |
2010-09-03 15:45 |
Miyagi |
Tohoku University |
A Method of Application Identification from Encrypted Traffic based on Characteristic Changes by Encryption Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2010-64 |
Recent years, there are many studies on identification of application from the monitored traffic in the Internet where v... [more] |
IN2010-64 pp.121-126 |
IA |
2010-08-06 14:25 |
Tokyo |
IIJ Kanda Jinbocho Bldg. |
Network Application Identification using Sequential Transition Patterns of Payload Length Tsuyoshi Sato, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) IA2010-23 |
Recently, increasing of information leakages caused by illegal use of network applications have been reported.To prevent... [more] |
IA2010-23 pp.41-46 |
IN |
2010-07-08 15:50 |
Hokkaido |
Hokkaido Univ. |
Analysis of Characteristic Changes by Encryption for Application Identification of Encrypted Traffic Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2010-30 |
In network management, application identification of traffic is important. However, since encrypted traffic has been inc... [more] |
IN2010-30 pp.43-48 |