Communication-Internet Architecture(Date:2013/03/07)

Presentation
広域分散ストレージ検証環境におけるI/O性能評価(セキュリティと分散ストレージ,インターネットと情報倫理教育,一般)

HIROKI KASHIWAZAKI,  TOHRU KONDOU,  YOSHIAKI KITAGUCHI,  TOMOHIKO KUSUDA,  YOSHIROU ONUMA,  IKUO NAKAGAWA,  KOUHEI ICHIKAWA,  MASAHARU MUNETOMO,  YOSHIAKI TAKAI,  SHUNJI ABE,  SHIGETOSHI YOKOYAMA,  SHINJI SHIMOJO,  

[Date]2013/3/7
[Paper #]Vol.2013-IOT-20 No.19
大学間連携による頑強な広域分散データ基盤アーキテクチャの提案(セキュリティと分散ストレージ,インターネットと情報倫理教育,一般)

,  

[Date]2013/3/7
[Paper #]Vol.2013-IOT-20 No.20
A Proposal of Information Centeric Networking in New Generation Network Architecture ZNA

Takao KONDO,  Heryanto H,  Kunitake KANEKO,  Fumio TERAOKA,  

[Date]2013/3/7
[Paper #]SITE2012-57,IA2012-95
A Flood Hazard Model Based on Damage Situations

Kei HIROI,  Yuzo TAENAKA,  Kanae MATSUI,  Hideya OCHIAI,  Hitoshi YOKOYAMA,  Hideki SUNAHARA,  

[Date]2013/3/7
[Paper #]SITE2012-58,IA2012-96
Proposal and Evaluation of Priority Control Method on Per-Flow Basis Based on Bandwidth Utilization to Keep Response Time Within a Certain Threshold

Keiya ISHIKAWA,  Yuzo TAENAKA,  Masaya NAKAYAMA,  

[Date]2013/3/7
[Paper #]SITE2012-59,IA2012-97
A Server Configuration with Autonomous Session State Migration to Demand Fluctuation

Takeshi Usui,  Masahiro Jibiki,  Yusuke Sakumoto,  Chisa Takano,  Masaki Aida,  Nozomu Nishinaga,  

[Date]2013/3/7
[Paper #]SITE2012-60,IA2012-98
Issues and Solutions for Use of Schema-Informed EXI on XMPP

,  

[Date]2013/3/7
[Paper #]Vol.2013-IOT-20 No.25
異種テストベッド間のテストベッド連携手法の提案(システム運用と管理1,インターネットと情報倫理教育,一般)

MASATOSHI ENOMOTO,  HIROAKI HAZEYAMA,  SHINSUKE MIWA,  TAKESHI OKUDA,  SUGURU YAMAGUCHI,  

[Date]2013/3/7
[Paper #]Vol.2013-IOT-20 No.26
Identifying User Authentication ]Methods on SSH Sessions

Akihiro SATOH,  Yutaka NAKAMURA,  Takeshi IKENAGA,  

[Date]2013/3/7
[Paper #]SITE2012-61,IA2012-99
Secure Resrouce Provisioning Across Multiple Domains

Toru MANO,  Kimihiro MIZUTANI,  Osamu AKASHI,  

[Date]2013/3/7
[Paper #]SITE2012-62,IA2012-100
Study on Cocktail Party Effect Personal Authentication System by Recognizing the Differnce of Voices

Kosei TAKETA,  Hiroyuki INABA,  

[Date]2013/3/7
[Paper #]SITE2012-63,IA2012-101
Proposal of Active IDS by Risk Level Probe

Atsushi USHIDA,  Hiroyuki INABA,  

[Date]2013/3/7
[Paper #]SITE2012-64,IA2012-102
A Fast storing Method of Large Scale Configuration ManagementRepository for IT System Management

TSUKASA SHIBAYAMA,  MASATAKA NAGURA,  YUKINORI SAKASHITA,  

[Date]2013/3/7
[Paper #]Vol.2013-IOT-20 No.31
A Presumption Method of IT Resource Information by Bayesian Inference for Manageraent System

YUKINORI SAKASHITA,  SATOSHI TOJO,  MiKIFUMI SHIKIDA,  

[Date]2013/3/7
[Paper #]Vol.2013-IOT-20 No.32
The network Administration Support System which can track changes to network settings

,  

[Date]2013/3/7
[Paper #]Vol.2013-IOT-20 No.33
A Trial of Event Log Reference Service for Networking Devices

Koichi TASHIMA,  Kouji NISHIMURA,  Tohru KONDO,  Seigo KISHIBA,  Toshihiro OHIGASHI,  Norikazu IWATA,  Reiji AIBARA,  

[Date]2013/3/7
[Paper #]Vol.2013-IOT-20 No.34
About the International Symposium on Internet Ethics ISIE2012

Yoshinori EZAWA,  

[Date]2013/3/7
[Paper #]SITE2012-65,IA2012-103
Game theoretic analysis of the value exchange system

Yoshiaki TAJIMA,  Sumiko MIYATA,  Tetsuya MORIZUMI,  Hirotsugu KINOSHITA,  

[Date]2013/3/7
[Paper #]SITE2012-66,IA2012-104(2013-03)
Consideration about the use possibility to the intellectual property field of digital forensics.

Masahiro SUGAWA,  

[Date]2013/3/7
[Paper #]SITE2012-67,IA2012-105
Implementation of Information Collection System on Wireless Networks for IP Mobility Support

Bocheng Wang,  Tohru Kondo,  Toshihiro Ohigashi,  Seigo Kishiba,  Reiji Aibara,  

[Date]2013/3/7
[Paper #]Vol.2013-IOT-20 No.38
<<123>> 21-40hit(51hit)