Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PRMU, IBISML, IPSJ-CVIM |
2024-03-04 11:16 |
Hiroshima |
Hiroshima Univ. Higashi-Hiroshima campus (Primary: On-site, Secondary: Online) |
PRMU2023-73 |
(To be available after the conference date) [more] |
PRMU2023-73 pp.128-133 |
NS, IN (Joint) |
2024-03-01 13:00 |
Okinawa |
Okinawa Convention Center |
Interest Packet Forwarding Scheme by MPR Set with Movement Prediction in CCN-based MANETs Haruya Matsumoto, Masaki Hanada (Tokyo Univ. of information Sciences) IN2023-110 |
In recent years, many studies in terms of CCN-based MANET, applying CCN architecture to MANET, have been conducted.In a ... [more] |
IN2023-110 pp.267-272 |
NS, IN (Joint) |
2022-03-11 15:30 |
Online |
Online |
A Flooding Realization Method by Dynamic FIB Construction in CCN Aoi Namai, Satoshi Ohzahata, Ryo Yamamoto (UEC) IN2021-51 |
Content Centric Networking (CCN), which the network identifier is the name of the content, has been proposed. In CCN, a ... [more] |
IN2021-51 pp.121-126 |
NS, RCS (Joint) |
2020-12-18 15:25 |
Online |
Online |
RSU Assisted VANET Warning Dissemination in Mountain Roads Takumu Shide, Masami Yoshida, Alberto Gallegos Ramonet, Taku Noguchi (Ritsumeikan Univ.) NS2020-105 |
A large number of studies on VANETs, which use vehicle-to-vehicle communications and/or road-to-vehicle communications, ... [more] |
NS2020-105 pp.97-102 |
NS, ICM, CQ, NV (Joint) |
2020-11-27 14:25 |
Online |
Online |
A Study on Resource Discovery for Edge Computing in Named Data Networking Daishi Kondo, Yosuke Tanigawa, Hideki Tode (Osaka Prefecture Univ.) NS2020-85 |
Edge computing over Named Data Networking (NDN) has been expected as a promising approach to deploy applications such as... [more] |
NS2020-85 pp.56-61 |
CQ |
2020-09-03 11:45 |
Osaka |
Osaka University Nakanoshima Center (Primary: On-site, Secondary: Online) |
Study on the Effectivity of Rendezvous Search Using Random Walk in Large-Scale Unknown Networks Fumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki (Kwansei Univ.) CQ2020-37 |
Many studies proposed a rendezvous search method that multiple searchers starting from different nodes on a network try ... [more] |
CQ2020-37 pp.15-20 |
IA, SITE, IPSJ-IOT [detail] |
2020-03-03 10:30 |
Online |
Online |
A Study on Efficient Blind Search Utilizing the Rendezvous of Random Walk Agents Fumiya Toyoda, Yusuke Sakumoto, Hiroyuki Ohsaki (Kwansei Gakuin Univ) SITE2019-96 IA2019-74 |
A blind search is a search method for a network, without using topology information of an entire network. While a blind... [more] |
SITE2019-96 IA2019-74 pp.99-104 |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-11 10:40 |
Osaka |
I-Site Nanba(Osaka) |
[Poster Presentation]
Experimental Verification of Adaptive Superframe Change for a Multihop Mobile Sensor Network Hiroto Maruo, Shinsuke Hara (Osaka City Univ.), Takuma Hamagami, Yasukata Kawamoto (OKI), Hiroyuki Yomo (Kansai Univ.), Hiroyuki Okuhata (Soliton) RCC2019-26 NS2019-62 RCS2019-119 SR2019-38 SeMI2019-35 |
In the AccuWiSe (Accurate Wireless Sensing) system, which can wirelessly collect vital data from a number of exercisers ... [more] |
RCC2019-26 NS2019-62 RCS2019-119 SR2019-38 SeMI2019-35 pp.79-83(RCC), pp.105-109(NS), pp.101-105(RCS), pp.111-115(SR), pp.93-97(SeMI) |
IA |
2018-11-28 14:40 |
Tokyo |
Akihabara Convention Hall, 5th Floor (Conference Room 5B) |
A Study on the Cooperative Search Using Multiple Random Walks in Unstructured Network Yusuke Sakumoto (Tokyo Metropolitan Univ.), Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2018-36 |
To begin the communication between two nodes, the node with the communication request must specify the location of the p... [more] |
IA2018-36 pp.1-8 |
PN |
2017-08-29 13:45 |
Hokkaido |
Toya Kanko Hotel |
Proposal of the Data Center-centric Flow Classification Method using Traffic Paterns Yukihiro Imakiire, Takehiro Sato, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2017-25 |
Introduction of optical switching networks into Data Center networks (DCNs) attracts attention to reduce power consumpti... [more] |
PN2017-25 pp.63-68 |
CCS |
2017-08-11 11:00 |
Hokkaido |
Bibai Onsen Yu-rinkan |
A Flooding Scheme in Wireless Sensor Networks Using Integer-Valued Neuron Models Hidehiro Nakano, Arata Miyauchi (Tokyo City Univ.) CCS2017-16 |
In Wireless Sensor Networks, flooding is used in diffusing advertising messages, control messages, and so on.
If flood... [more] |
CCS2017-16 pp.37-41 |
NS, ASN, RCC, RCS, SR (Joint) |
2017-07-20 11:05 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Performance evaluation of vital data monitoring from a large number of exercisers with mobility and radio link modeling Shintaro Yamaguchi, Atsushi Niino (Kansai Univ.), Hirofumi Ogura (Osaka City Univ.), Hiroyuki Yomo (Kansai Univ.), Ryusuke Miyamoto (Meiji Univ.), Shinsuke Hara (Osaka City Univ.), Takashi Kawabata (Kansai Univ.) RCC2017-21 NS2017-42 RCS2017-113 SR2017-36 ASN2017-30 |
In recent years, it is desired to understand exerciser's health condition and physical ability by monitoring vital data ... [more] |
RCC2017-21 NS2017-42 RCS2017-113 SR2017-36 ASN2017-30 pp.67-72(RCC), pp.81-86(NS), pp.121-126(RCS), pp.79-84(SR), pp.99-104(ASN) |
CQ |
2017-05-30 13:25 |
Miyazaki |
Hotel Merieges (Miyazaki) |
An optimization method for flooding in wireless networks Hidehiro Nakano, Arata Miyauchi (Tokyo City Univ.) CQ2017-27 |
In Wireless Sensor Networks, flooding is used in diffusing advertising messages, control messages, and so on.
If flood... [more] |
CQ2017-27 pp.75-78 |
RECONF, CPSY, DC, IPSJ-ARC (Joint) [detail] |
2017-05-24 10:35 |
Hokkaido |
Noboribetsu-Onsen Dai-ichi-Takimoto-Kan |
On Implementation of the Light-Weight MPAR protocol in NS2 Yusuke Sugiura, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2017-13 DC2017-13 |
Avoidance routing protects data privacy by detouring insecure area where malicious nodes eavesdrop on the channel. Recen... [more] |
CPSY2017-13 DC2017-13 pp.75-77 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 11:40 |
Okinawa |
Kumejima Island |
Detection and Mitigation of Interest Flooding Attacks in Named Data Networking using packet hop counts Yoshimichi Nakatsuka, Hiroaki Nishi (Keio Univ.) CPSY2016-150 DC2016-96 |
The WWW changed the Internet from a tool of communication to a pool of information. A network architecture focusing on c... [more] |
CPSY2016-150 DC2016-96 pp.327-332 |
NS, IN (Joint) |
2017-03-02 09:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Adaptive Distribution of In-network Guidance Information for Information-Centric Networks Kenichi Hashimoto, Yosuke Tanigawa, Hideki Tode (Osaka Prefecture Univ.) NS2016-159 |
For several years, access load on servers and network traffic are greatly increasing due to larger content-size and high... [more] |
NS2016-159 pp.13-18 |
CAS, CS |
2017-02-24 16:00 |
Shiga |
|
A Back-Off based Semi-Markovian Model for Flooding in Ad Hoc Networks Pratikshya Shrestha, Megumi Saito, Zhenni Pan, Kang Kang, Shigeru Shimamoto (Waseda Univ.) CAS2016-135 CS2016-96 |
Reactive routing protocols in ad hoc networks do not maintain routes and keep the network silent when there is no traffi... [more] |
CAS2016-135 CS2016-96 pp.117-122 |
ICSS, IPSJ-SPT |
2016-03-03 16:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Evaluation of the attack detection method based on duration of continuous packet arrival Yuhei Hayashi, Satoshi Nishiyama, Akinori Suzuki, Katsuhiko Sakai, Ichiro Kudo, Kazunori Kamiya (NTT) ICSS2015-56 |
Application layer DDoS attacks occur frequently. In order to detect the attacks in network, a security appliance with De... [more] |
ICSS2015-56 pp.53-58 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-03 13:00 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services Nor Masri bin Sahri, Koji Okamura (Kyushu University) SITE2015-58 IA2015-90 |
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed... [more] |
SITE2015-58 IA2015-90 pp.55-60 |
CS |
2015-11-12 10:45 |
Hokkaido |
Hotel Taisetsu (Sounkyo Spa, Hokkaido) |
Target Link Flooding Attack Prevention Scheme by Monitoring Traceroute Packets Flow Takayuki Hirayama, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-48 |
Recently, target link flooding attack has been reported as a threatful DDoS (Distributed Denial of Ser-
vice) attack. T... [more] |
CS2015-48 pp.19-24 |