IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 30  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2022-11-21
14:30
Niigata Bandai Civic Hall (Niigata)
(Primary: On-site, Secondary: Online)
A Study of Application Identification Schemes and Impact on Video Transmission Quality in The Customer and Application-Aware SR-TE Framework
Ryunosuke Saito, Harunobu Yoshida, Shintaro Ishihara, Toyokazu Akiyama, Kazumasa Kobayashi (Kyoto Sangyo Univ.), Wataru Mishima (NTT Com) IA2022-40
Customers using Internet service providers (ISP) generate traffic for a variety of applications, each with different req... [more] IA2022-40
pp.20-24
NS 2020-05-15
11:35
Online Online Progressive Slicing : Practical Application Classification System for Application Slicing
Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2020-17
With the proliferation of encrypted traffic and the increasing importance of application-specific QoE management, the ne... [more] NS2020-17
pp.57-62
OCS, PN, NS
(Joint)
2019-06-21
13:45
Iwate MALIOS(Morioka) Rethinking the Test Dataset Construction of Machine Learning for Mobile Application Identification
Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2019-40
Machine Learning based application identification has been intensively studied for applications such as application spe... [more] NS2019-40
pp.29-34
NS 2019-04-18
15:50
Kagoshima Tenmonkan Vision Hall [Invited Talk] Application-Specific Network Slicing Leveraging P4 Switch and Deep Learning
Ping DU, Akihiro Nakao (UTokyo) NS2019-9
The future Mobile networks are expected to support multiple kinds of applications with different QoS requirements.
Effe... [more]
NS2019-9
pp.49-54
NS 2019-01-17
15:15
Nagasaki Nagasaki Prefectural Art Museum High-Precision Zero-Rating for Next Generation Mobile Networks
Ming Yang, Ping Du (UTokyo), Noriaki Kamiyama (Fukuoka Univ), Akihiro Nakao (UTokyo) NS2018-192
Zero-rating is a business strategy where mobile network operators (MNOs) and virtual mobile network operators(MVNOs will... [more] NS2018-192
pp.83-88
RCS, NS
(Joint)
2017-12-14
12:50
Hiroshima Aster Plaza Identification of Applications on Smartphone by Encrypted Traffic Analysis
Anan Sawabe, Takanori Iwai, Kozo Satoda (NEC) NS2017-126
Requirements of smartphone users shift from the quality of service, i.e., throughput, to the quality of applications . M... [more] NS2017-126
pp.1-6
NS, IN
(Joint)
2017-03-03
10:40
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Classification of Highly-Accurate Identifiable Applications Using Gini Index and Cosine Similarity
Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2016-192
Existing research on application identification has problems from three points of view; credibility of training data, fl... [more] NS2016-192
pp.199-204
NS, CS, IN, NV
(Joint)
2016-09-30
13:55
Miyagi Tohoku Univ. Identification Method of Communication between Components of Application system based on Connection Structure of Port Number for Anomaly Detection in Cloud Computing
Takaya Ide, Hitoshi Yabusaki, Kyosuke Hashimoto, Junji Kinoshita (Hitachi) NS2016-87
Silent failure is a problem to maintain reliability for application systems. To detect silent failures, it is effective ... [more] NS2016-87
pp.73-78
NS, IN
(Joint)
2016-03-03
10:40
Miyazaki Phoenix Seagaia Resort Application Identification by Packet Inspection based on N-gram
Masaki Hara, Shinnosuke Nirasawa (Kogakuin Univ.), Akihiro Nakao (Univ.Tokyo), Masato Oguchi (Ochanomizu Univ.), Shu Yamamoto (Univ.Tokyo), Saneyasu Yamaguchi (Kogakuin Univ.) NS2015-192
Application Identification is important for controlling quality of services in extremely crowded networks, such as a net... [more] NS2015-192
pp.139-144
IN, NS, CS, NV
(Joint)
2015-09-04
10:35
Iwate Iwate-ken Kokaido [Encouragement Talk] Identification of Mobile Applications via In-Network Machine Learning Using N-gram for Application-Specific Traffic Control
Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2015-78
Identifying the application transmitting a given flow of network traffic is beneficial for network management, especiall... [more] NS2015-78
pp.41-46
WIT, SP, ASJ-H, PRMU 2015-06-18
14:25
Niigata   Living sound identification system using smartphone for persons with hearing loss
Ashita Sarudate, Hiroshi Nunokawa, Kenzo Itoh (Iwate Prefectural Univ.) PRMU2015-38 SP2015-7 WIT2015-7
Persons with hearing loss cannot be listened to "living sound" which is required in order to live indoors. One way to so... [more] PRMU2015-38 SP2015-7 WIT2015-7
pp.37-42
CQ, CS
(Joint)
2015-04-22
11:10
Fukuoka Fukuoka Institute of Technology Multi-flow-based Traffic Analysis for Behavior Identification
Yusuke Iemura, Yuichi Kumano (Osaka City Univ), Nobuyuki Nakamura (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ) CQ2015-10
Recently, application identification methods are attracted as an important role for network management which enables app... [more] CQ2015-10
pp.51-56
ICM 2015-03-19
10:40
Okinawa Ishigaki-City-Hall A Method of Multi-stage Application Identification for Improving Identification Accuracy
Yuichi Kumano, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) ICM2014-57
A method of application identification is important for network management because it is used for traffic controls and a... [more] ICM2014-57
pp.19-24
NS, IN
(Joint)
2015-03-03
14:10
Okinawa Okinawa Convention Center Identification of Mobile Applications via In-Network Machine Learning for Application Specific QoS Traffic Control
Takamitsu Iwai, Akihiro Nakao (UTokyo) NS2014-260
Due to the proliferation of smartphones and the explosive increase in mobile data traffic, application traffic identific... [more] NS2014-260
pp.487-492
NS, CS, IN
(Joint)
2013-09-13
13:50
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan A Study on Online Application Identification of Encrypted Traffic
Yuichi Kumano, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2013-74
Application identification in the middle is one of important technique for network operators to manage application based... [more] IN2013-74
pp.85-90
IN, NS, CS
(Joint)
2012-09-21
15:55
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan A Study on Web Application Identification based on Communication Characteristics
Shoki Matsuo, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) CS2012-60
Recently, websites which offer various Web Applications, such as Web Mail, Video Sharing, and so on, has been increasing... [more] CS2012-60
pp.61-66
MoNA, IN
(Joint)
2011-11-18
12:25
Fukuoka   A study on improving accuracy of application identification for encrypted traffic
Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2011-101
In network management, application identification of traffic is important. However, encrypted traffic has been increasin... [more] IN2011-101
pp.49-54
NS, CS, IN
(Joint)
2010-09-03
15:45
Miyagi Tohoku University A Method of Application Identification from Encrypted Traffic based on Characteristic Changes by Encryption
Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2010-64
Recent years, there are many studies on identification of application from the monitored traffic in the Internet where v... [more] IN2010-64
pp.121-126
IA 2010-08-06
14:25
Tokyo IIJ Kanda Jinbocho Bldg. Network Application Identification using Sequential Transition Patterns of Payload Length
Tsuyoshi Sato, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) IA2010-23
Recently, increasing of information leakages caused by illegal use of network applications have been reported.To prevent... [more] IA2010-23
pp.41-46
IN 2010-07-08
15:50
Hokkaido Hokkaido Univ. Analysis of Characteristic Changes by Encryption for Application Identification of Encrypted Traffic
Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2010-30
In network management, application identification of traffic is important. However, since encrypted traffic has been inc... [more] IN2010-30
pp.43-48
 Results 1 - 20 of 30  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan