Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS |
2018-07-12 10:41 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
Performance evaluation of communication using MQTT over Layer 2 Network Yuya Sasaki, Tetsuya Yokotani, Hiroaki Mukai (KIT) CS2018-18 |
As the Internet of things (IoT)grown, it is expected that a number of devices connected in network will be increased. Cu... [more] |
CS2018-18 pp.37-40 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 10:15 |
Fukushima |
|
Evaluation of Greedy Algorithms for Embedding Multiple VLANs Andrew Lee, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) SITE2014-73 IA2014-105 |
Given the same amount of hardware resource and bandwidth limitation, networks with optimal configurations enable Interne... [more] |
SITE2014-73 IA2014-105 pp.143-147 |
ICM |
2014-03-14 14:30 |
Okinawa |
|
Flexible Traffic Control on Layer-2 Network Haruhisa Nozue, Akifumi Tanase (NTT) ICM2013-71 |
We propose a bandwidth control method to use surplus bandwidth properly and efficiently in a wide area Ethernet service.... [more] |
ICM2013-71 pp.115-118 |
IA |
2013-10-10 14:00 |
Overseas |
Konkuk Univ., Seoul |
Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26 |
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more] |
IA2013-26 pp.1-6 |
MoNA |
2013-08-02 10:10 |
Hokkaido |
Hokkaido University |
A study on two-layer multicast to support mobile source terminals and its router placement technique in wireless mesh networks Ryoma Iio, Hiroaki Morino (Shibaura Inst. of Tech.) MoNA2013-21 |
Services to provide live streaming video from mobile sources are becoming widespread, including Ustream. It is expected ... [more] |
MoNA2013-21 pp.47-52 |
NS |
2013-05-16 15:25 |
Kanagawa |
The Graduate Univ. for Advanced Studies |
A proposal for an optimal implementation of the Subscriber Edge Router in Career Network Masakazu Higashi, Kenji Kimura, Nobuya Shirai (NTT west) NS2013-20 |
In this paper, we explain typical issues about carrier network. (e.g. Difference of subscribers per access edge between ... [more] |
NS2013-20 pp.51-55 |
ICSS |
2012-11-22 14:30 |
Hiroshima |
Miyajima Mori-no-Yado |
Proposal of a network design support system for risk mitigation against inside attacks Hirokazu Hasegawa (Nagoya Univ.), Ray Atarashi (IIJ-II), Masahiko Kato (IIJ), Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura (Nagoya Univ.) ICSS2012-51 |
In sophisticated cyber attacks, even information protected by an isolated network is compromised. Although there are var... [more] |
ICSS2012-51 pp.37-42 |
MoNA, AN, USN (Joint) |
2012-01-19 13:20 |
Mie |
Todaya (Toba) |
Examination of reconstruction method in wirelessmesh network usingVLAN spanning trees and virtual trunk nodes Issei Yajima, Hiroaki Morino (Shibaura Inst of Tec) AN2011-62 |
Wireless mesh networksrouting control is proposed which quikly reconstructs trees for link break among each node using V... [more] |
AN2011-62 pp.43-48 |
CS, NS, IN (Joint) |
2011-09-02 13:50 |
Miyagi |
Tohoku University |
VLAN Spanning Tree Construction Scheme in Wireless Mesh Networks using Virtual Trunk Nodes Issei Yajima, Hiroaki Morino (Shibaura Inst of Tec) NS2011-75 |
The authors focus wireless mesh networks as infrastructure technology of new local community network which deliverinform... [more] |
NS2011-75 pp.91-95 |
CPSY, DC (Joint) |
2010-08-03 - 2010-08-05 |
Ishikawa |
Kanazawa Cultural Hall |
A Network Virtualization Method using L2-Tunneling for Cloud Data Centers and its Evaluation. Shunsuke Kikuchi, Yuji Imai, Keisuke Fukui (Fujitsu lab.), Shigeru Kotabe (FUJITSU Kyushu Network Technologies LTD.) CPSY2010-15 |
This paper describes a network virtualization method using L2-Tunneling for Cloud Data Centers and evaluates its feasibi... [more] |
CPSY2010-15 pp.43-48 |
ICM |
2010-07-09 10:55 |
Hokkaido |
Future University Hakodate |
Proposal of Virtual Network Configuration Acquisition Function for Data Center Operations and Management System Hideki Okita, Masahiro Yoshizawa, Keitaro Uehara, Kazuhiko Mizuno, Toshiaki Tarui, Ken Naono (Hitachi) ICM2010-20 |
Virtualization technologies have been widely deployed in data centers to improve the system utilization. However, they c... [more] |
ICM2010-20 pp.67-72 |
LOIS, ICM (Joint) |
2010-01-22 16:30 |
Fukuoka |
Fukuoka Institute of Technology |
Constructing Virtual LAN Segments across Multiple Virtualized Servers Shuichiro Aiba, Moe Yamanouchi, Hiroaki Tomozawa, Minoru Kato, Satoshi Matsumoto (NTT COMWARE) ICM2009-43 |
The Virtualization Technology, which can make separate use of the physical resource dynamically and logically, is expect... [more] |
ICM2009-43 pp.45-50 |
CQ, NS, ICM (Joint) |
2009-11-13 14:50 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
Implementation and Evaluation of Network Management System to Reduce Management Cost Caused by Server Virtualization Masahiro Yoshizawa, Toshiaki Tarui, Hideki Okita (Hitachi, Ltd.) NS2009-116 |
In data centers, the cost of managing their network is increasing. Because data center operators have to use different N... [more] |
NS2009-116 pp.71-76 |
IA |
2009-01-29 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The design of network system management and control architecture on the multi-domain environment Ray Atarashi, Megumi Ninomiya, Masahiko Kato (Internet Initiative Japan Inc.) IA2008-60 |
It is necessary to establish the technology that manages the resource of the network and the computer integrated to desi... [more] |
IA2008-60 pp.71-76 |
IA |
2008-11-05 16:15 |
Toyama |
Tateyama Kokusai Hotel |
The Topology Data Model Design for Network System Management Ray Atarashi, Megumi Ninomiya, Masahiko Kato (IIJ) IA2008-45 |
The network systems are required reliability and stability because the systems support the social infrastructure. One o... [more] |
IA2008-45 pp.25-30 |
PN |
2008-08-08 13:35 |
Hokkaido |
Asari Classe Hotel |
Experiment of the in-band GMPLS message Channel for GELS network Satoru Okamoto, Sho Shimizu, Yutaka Arakawa, Naoaki Yamanaka (Keio Univ.) PN2008-21 |
For realizing the carrier grade GMPLS controlled Ethernet, a data communication network (DCN) based on the in-fiber in-b... [more] |
PN2008-21 pp.43-48 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:45 |
Hokkaido |
Future University-Hakodate |
A composition method of network-independent dynamic authentication VLAN Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT) |
Virtual Private Network (VPN) is a technology that constructs a private network between bases geographically away. OpenV... [more] |
ISEC2007-40 SITE2007-34 pp.171-176 |
ICM |
2007-05-10 13:10 |
Kochi |
Kochi Uni. of Technology |
User-Oriented Network System using Multi-VLAN Access Method Yoji Ozawa, Hideki Okita (Hitachi Ltd. CRL) |
Many enterpises promote to integrate various services into IP network. Those services are TV conference, telephony, and ... [more] |
|
SIP, CAS, CS |
2007-03-06 09:30 |
Tottori |
Blancart Misasa (Tottori) |
[Poster Presentation]
The proposal and implementation of Single Sign On System on secure network by PKI mutual recognition using USB token Yoshikazu Umemoto, Takeshi Fujino (Ritsumeikan Univ.) CAS2006-103 SIP2006-204 CS2006-120 |
Various services, such as WWW, FTP, remote login, are provided in the Internet or the Intranet. The management of the au... [more] |
CAS2006-103 SIP2006-204 CS2006-120 pp.49-54 |
ICM, IN, LOIS (Joint) |
2007-01-18 18:40 |
Oita |
Beppu Convention Center(B-Con Plaza) |
[Invited Talk]
Overview of Ubiquitous Office Technologies Yuichi Ohmizu (NTT Communications) IN2006-152 TM2006-57 OIS2006-62 |
(To be available after the conference date) [more] |
IN2006-152 TM2006-57 OIS2006-62 pp.85-90(IN), pp.37-42(TM), pp.19-24(OIS) |