IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 67  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
PRMU, IBISML, IPSJ-CVIM 2024-03-04
11:16
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
PRMU2023-73 (To be available after the conference date) [more] PRMU2023-73
pp.128-133
NS, IN
(Joint)
2024-03-01
13:00
Okinawa Okinawa Convention Center Interest Packet Forwarding Scheme by MPR Set with Movement Prediction in CCN-based MANETs
Haruya Matsumoto, Masaki Hanada (Tokyo Univ. of information Sciences) IN2023-110
In recent years, many studies in terms of CCN-based MANET, applying CCN architecture to MANET, have been conducted.In a ... [more] IN2023-110
pp.267-272
NS, IN
(Joint)
2022-03-11
15:30
Online Online A Flooding Realization Method by Dynamic FIB Construction in CCN
Aoi Namai, Satoshi Ohzahata, Ryo Yamamoto (UEC) IN2021-51
Content Centric Networking (CCN), which the network identifier is the name of the content, has been proposed. In CCN, a ... [more] IN2021-51
pp.121-126
NS, RCS
(Joint)
2020-12-18
15:25
Online Online RSU Assisted VANET Warning Dissemination in Mountain Roads
Takumu Shide, Masami Yoshida, Alberto Gallegos Ramonet, Taku Noguchi (Ritsumeikan Univ.) NS2020-105
A large number of studies on VANETs, which use vehicle-to-vehicle communications and/or road-to-vehicle communications, ... [more] NS2020-105
pp.97-102
NS, ICM, CQ, NV
(Joint)
2020-11-27
14:25
Online Online A Study on Resource Discovery for Edge Computing in Named Data Networking
Daishi Kondo, Yosuke Tanigawa, Hideki Tode (Osaka Prefecture Univ.) NS2020-85
Edge computing over Named Data Networking (NDN) has been expected as a promising approach to deploy applications such as... [more] NS2020-85
pp.56-61
CQ 2020-09-03
11:45
Osaka Osaka University Nakanoshima Center
(Primary: On-site, Secondary: Online)
Study on the Effectivity of Rendezvous Search Using Random Walk in Large-Scale Unknown Networks
Fumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki (Kwansei Univ.) CQ2020-37
Many studies proposed a rendezvous search method that multiple searchers starting from different nodes on a network try ... [more] CQ2020-37
pp.15-20
IA, SITE, IPSJ-IOT [detail] 2020-03-03
10:30
Online Online A Study on Efficient Blind Search Utilizing the Rendezvous of Random Walk Agents
Fumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki (Kwansei Gakuin Univ) SITE2019-96 IA2019-74
A blind search is a search method for a network, without using topology information of an entire network. While a blind... [more] SITE2019-96 IA2019-74
pp.99-104
SeMI, RCS, NS, SR, RCC
(Joint)
2019-07-11
10:40
Osaka I-Site Nanba(Osaka) [Poster Presentation] Experimental Verification of Adaptive Superframe Change for a Multihop Mobile Sensor Network
Hiroto Maruo, Shinsuke Hara (Osaka City Univ.), Takuma Hamagami, Yasukata Kawamoto (OKI), Hiroyuki Yomo (Kansai Univ.), Hiroyuki Okuhata (Soliton) RCC2019-26 NS2019-62 RCS2019-119 SR2019-38 SeMI2019-35
In the AccuWiSe (Accurate Wireless Sensing) system, which can wirelessly collect vital data from a number of exercisers ... [more] RCC2019-26 NS2019-62 RCS2019-119 SR2019-38 SeMI2019-35
pp.79-83(RCC), pp.105-109(NS), pp.101-105(RCS), pp.111-115(SR), pp.93-97(SeMI)
IA 2018-11-28
14:40
Tokyo Akihabara Convention Hall, 5th Floor (Conference Room 5B) A Study on the Cooperative Search Using Multiple Random Walks in Unstructured Network
Yusuke Sakumoto (Tokyo Metropolitan Univ.), Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2018-36
To begin the communication between two nodes, the node with the communication request must specify the location of the p... [more] IA2018-36
pp.1-8
PN 2017-08-29
13:45
Hokkaido Toya Kanko Hotel Proposal of the Data Center-centric Flow Classification Method using Traffic Paterns
Yukihiro Imakiire, Takehiro Sato, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2017-25
Introduction of optical switching networks into Data Center networks (DCNs) attracts attention to reduce power consumpti... [more] PN2017-25
pp.63-68
CCS 2017-08-11
11:00
Hokkaido Bibai Onsen Yu-rinkan A Flooding Scheme in Wireless Sensor Networks Using Integer-Valued Neuron Models
Hidehiro Nakano, Arata Miyauchi (Tokyo City Univ.) CCS2017-16
In Wireless Sensor Networks, flooding is used in diffusing advertising messages, control messages, and so on.
If flood... [more]
CCS2017-16
pp.37-41
NS, ASN, RCC, RCS, SR
(Joint)
2017-07-20
11:05
Hokkaido Hokkaido Univ. [Poster Presentation] Performance evaluation of vital data monitoring from a large number of exercisers with mobility and radio link modeling
Shintaro Yamaguchi, Atsushi Niino (Kansai Univ.), Hirofumi Ogura (Osaka City Univ.), Hiroyuki Yomo (Kansai Univ.), Ryusuke Miyamoto (Meiji Univ.), Shinsuke Hara (Osaka City Univ.), Takashi Kawabata (Kansai Univ.) RCC2017-21 NS2017-42 RCS2017-113 SR2017-36 ASN2017-30
In recent years, it is desired to understand exerciser's health condition and physical ability by monitoring vital data ... [more] RCC2017-21 NS2017-42 RCS2017-113 SR2017-36 ASN2017-30
pp.67-72(RCC), pp.81-86(NS), pp.121-126(RCS), pp.79-84(SR), pp.99-104(ASN)
CQ 2017-05-30
13:25
Miyazaki Hotel Merieges (Miyazaki) An optimization method for flooding in wireless networks
Hidehiro Nakano, Arata Miyauchi (Tokyo City Univ.) CQ2017-27
In Wireless Sensor Networks, flooding is used in diffusing advertising messages, control messages, and so on.
If flood... [more]
CQ2017-27
pp.75-78
RECONF, CPSY, DC, IPSJ-ARC
(Joint) [detail]
2017-05-24
10:35
Hokkaido Noboribetsu-Onsen Dai-ichi-Takimoto-Kan On Implementation of the Light-Weight MPAR protocol in NS2
Yusuke Sugiura, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2017-13 DC2017-13
Avoidance routing protects data privacy by detouring insecure area where malicious nodes eavesdrop on the channel. Recen... [more] CPSY2017-13 DC2017-13
pp.75-77
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2017-03-10
11:40
Okinawa Kumejima Island Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts
Yoshimichi Nakatsuka, Hiroaki Nishi (Keio Univ.) CPSY2016-150 DC2016-96
The WWW changed the Internet from a tool of communication to a pool of information. A network architecture focusing on c... [more] CPSY2016-150 DC2016-96
pp.327-332
NS, IN
(Joint)
2017-03-02
09:50
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Adaptive Distribution of In-network Guidance Information for Information-Centric Networks
Kenichi Hashimoto, Yosuke Tanigawa, Hideki Tode (Osaka Prefecture Univ.) NS2016-159
For several years, access load on servers and network traffic are greatly increasing due to larger content-size and high... [more] NS2016-159
pp.13-18
CAS, CS 2017-02-24
16:00
Shiga   A Back-Off based Semi-Markovian Model for Flooding in Ad Hoc Networks
Pratikshya Shrestha, Megumi Saito, Zhenni Pan, Kang Kang, Shigeru Shimamoto (Waseda Univ.) CAS2016-135 CS2016-96
Reactive routing protocols in ad hoc networks do not maintain routes and keep the network silent when there is no traffi... [more] CAS2016-135 CS2016-96
pp.117-122
ICSS, IPSJ-SPT 2016-03-03
16:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Evaluation of the attack detection method based on duration of continuous packet arrival
Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] ICSS2015-56
pp.53-58
IA, SITE, IPSJ-IOT [detail] 2016-03-03
13:00
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services
Nor Masri bin Sahri, Koji Okamura (Kyushu University) SITE2015-58 IA2015-90
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed... [more] SITE2015-58 IA2015-90
pp.55-60
CS 2015-11-12
10:45
Hokkaido Hotel Taisetsu (Sounkyo Spa, Hokkaido) Target Link Flooding Attack Prevention Scheme by Monitoring Traceroute Packets Flow
Takayuki Hirayama, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-48
Recently, target link flooding attack has been reported as a threatful DDoS (Distributed Denial of Ser-
vice) attack. T... [more]
CS2015-48
pp.19-24
 Results 1 - 20 of 67  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan