Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-03-01 11:35 |
Okinawa |
Okinawa Convention Center |
Application of a Deep Reinforcement Learning Algorithm to Virtual Machine Migration Control in Multi-Stage Information Processing Systems Yuki Kojitani (Okayama Univ.), Kazutoshi Nakane (Nagoya Univ.), Yuya Tarutani (Okayama Univ.), Celimuge Wu (UEC), Yusheng Ji (NII), Tokumi Yokohira (Okayama Univ.), Tutomu Murase (Nagoya Univ.), Yukinobu Fukushima (Okayama Univ.) IN2023-87 |
This paper tackles a virtual machine (VM) migration control problem to maximize the progress (accuracy) of information p... [more] |
IN2023-87 pp.130-135 |
CS, CQ (Joint) |
2023-05-18 15:10 |
Kagawa |
Rexxam Hall (Kagawa Kenmin Hall) (Primary: On-site, Secondary: Online) |
On the performance of sorting out invalid jobs in scheduling using the policy gradient method for deadline-aware jobs Tatusya Sagisaka, Kohei Shiomoto (TCU), Takashi Kurimoto (NII) CQ2023-1 |
When transferring data in the field of communication between data centers, existing methods such as Earliest Deadline Fi... [more] |
CQ2023-1 pp.1-6 |
SWIM, SC |
2022-08-26 15:45 |
Online |
Held online |
Proposal for Introduction of Resource control policies apply to Decentralized ID Ryo Tateishi, Hosono Shigeru (TUT) SWIM2022-19 SC2022-25 |
Realization of Web 3.0 architecture requires a shift from Centralized ID to Decentralized ID with Self-Sovereign, and a ... [more] |
SWIM2022-19 SC2022-25 pp.52-57 |
NS, IN (Joint) |
2020-03-06 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
IOTA-Based Access Control Framework for the Internet of Things Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2019-230 |
With the rapid dissemination of the Internet of Things (IoT), the number of resources deployed in IoT systems such as d... [more] |
NS2019-230 pp.295-300 |
RCS |
2019-06-19 14:55 |
Okinawa |
Miyakojima Hirara Port Terminal Building |
Policy Gradient Reinforcement Learning for Reducing Transmission Delay in EDCA Masao Shinzaki, Yusuke Koda, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura (Kyoto Univ.) RCS2019-52 |
This paper proposes a packet mapping algorithm among Access Categories (ACs) in Enhanced Distributed Channel Access (EDC... [more] |
RCS2019-52 pp.91-96 |
IN, NS (Joint) |
2019-03-05 15:40 |
Okinawa |
Okinawa Convention Center |
Optimal policy rule application method for each IoT device Kaori Kurita, Hiroki Iwahashi, Hidetaka Nishihara, Kazuhiro Matsuo (NTT) NS2018-292 |
In recent years, due to diversification of IoT devices connected to the Internet, control of flexible communication serv... [more] |
NS2018-292 pp.569-574 |
RCS, NS (Joint) |
2017-12-15 10:30 |
Hiroshima |
Aster Plaza |
[Invited Lecture]
Realization of Network Slice in 5G Mobile Core Takeshi Usui, Yoshinori Kitatsuji (KDDI Research) NS2017-134 RCS2017-260 |
Recently, the research and development, and standardization regarding the 5th generation mobile network (5G) have been a... [more] |
NS2017-134 RCS2017-260 pp.43-46(NS), pp.55-58(RCS) |
NS, IN (Joint) |
2017-03-03 11:00 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Evaluation of Network Policy Editing Function in Network Management System using OpenFlow Takeshi Oowari, Osamu Mizuno (Kogakuin Univ.) IN2016-127 |
There are some cases to re-configure network policies to meet requests for change of network operation according to user... [more] |
IN2016-127 pp.181-186 |
IA, IN (Joint) |
2016-12-15 14:55 |
Hiroshima |
Hiroshima city university |
Virtual MAC Address Notifying Network Conditions and Triggering Per-packet Routing Policy Hiroyuki Tsubokawa, Takao Kondo, Fumio Teraoka, Kunitake Kaneko (Keio Univ.) IN2016-71 |
A typical SDN technology, e.g., OpenFlow, achieved flow-based traffic control mechanism.Recently, SDN technologies aim t... [more] |
IN2016-71 pp.29-34 |
CQ, ICM, NS (Joint) |
2015-11-27 09:00 |
Niigata |
Niigata University |
A Study on Phased Installation of Policy Control Functions in Carrier Networks Chiharu Morioka, Hidetaka Nishihara, Takeshi Osaka, Tsukasa Okamoto (NTT) NS2015-119 |
(To be available after the conference date) [more] |
NS2015-119 pp.47-50 |
NS |
2015-05-21 09:55 |
Tokyo |
Tokyo Univ. |
Evaluation of the fair traffic control method for best-effort service Takamitsu Narumi (NTT) NS2015-15 |
The best-effort service is become larger chance for heavy users, because the best-effort service is given an opportunity... [more] |
NS2015-15 pp.5-8 |
MSS |
2015-03-05 13:25 |
Ishikawa |
IT Business Plaza Musashi |
Optimal LLP supervisory control based on the learning of state transition model Hijiri Umemoto, Tatsushi Yamasaki (Setsunan Univ.) MSS2014-92 |
The authors have proposed an optimal LLP supervisory control method based on reinforcement learning for discrete event s... [more] |
MSS2014-92 pp.7-12 |
ICSS |
2015-03-04 14:30 |
Okinawa |
Meio Univiersity |
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] |
ICSS2014-93 pp.181-186 |
NS, IN (Joint) |
2015-03-03 14:30 |
Okinawa |
Okinawa Convention Center |
A Study on Policy Control Functions in Service Chaining Architecture Chiharu Morioka, Akiko Kuboniwa, Aki Fukuoka, Tsukasa Okamoto (NTT) NS2014-257 |
(To be available after the conference date) [more] |
NS2014-257 pp.469-473 |
CAS, MSS, IPSJ-AL [detail] |
2014-11-21 13:30 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki island) |
On optimal LLP supervisory control of discrete event systems based on reinforcement learning Hijiri Umemoto, Tatsushi Yamasaki (Setsunan Univ.) CAS2014-102 MSS2014-66 |
For large scale and time varying discrete event systems, LLP(Limited Lookahead Policy) supervisory control is proposed. ... [more] |
CAS2014-102 MSS2014-66 pp.135-140 |
ICSS, IA |
2014-06-06 13:50 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Implementation of the Administration Policy Description Method on Automatic Network Organization System Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2014-10 ICSS2014-10 |
To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction ... [more] |
IA2014-10 ICSS2014-10 pp.49-54 |
KBSE |
2014-01-28 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
An Evaluation on the Modifiability of Model Driven Security Requirements Analysis Method based on Common Criteria Atsushi Noro, Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2013-78 |
Requirements analysis is complicated because in requirements analysis of the system is a security request as well as a f... [more] |
KBSE2013-78 pp.77-82 |
NS |
2013-05-16 15:25 |
Kanagawa |
The Graduate Univ. for Advanced Studies |
A proposal for an optimal implementation of the Subscriber Edge Router in Career Network Masakazu Higashi, Kenji Kimura, Nobuya Shirai (NTT west) NS2013-20 |
In this paper, we explain typical issues about carrier network. (e.g. Difference of subscribers per access edge between ... [more] |
NS2013-20 pp.51-55 |
ICSS |
2012-11-22 15:35 |
Hiroshima |
Miyajima Mori-no-Yado |
Implementation and Evaluation of a File Sharing Service with File Name Encryption using CP-ABE Megumi Goto, Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) ICSS2012-53 |
Online storage services, e.g. Dropbox, have a weakness, which the storage administrator can obtain contents of user's fi... [more] |
ICSS2012-53 pp.49-54 |
IBISML |
2012-11-07 15:30 |
Tokyo |
Bunkyo School Building, Tokyo Campus, Tsukuba Univ. |
Stochastic policy gradient method for a stochastic policy using a Gaussian process regression Yutaka Nakamura, Hiroshi Ishiguro (Osaka Univ.) IBISML2012-52 |
Reinforcement learning (RL) methods using Gaussian process regression (GP) for approximating the value function have bee... [more] |
IBISML2012-52 pp.129-133 |