Communication-Internet Architecture(Date:2015/02/26)

Presentation
Disaster Information Support by Volunteers

Dai SATO,  

[Date]2015/2/26
[Paper #]SITE2014-69,IA2014-101
A Case Study of Migrating a Network System to a Cloud Environment in Hiroshima City University

KAORI MAEDA,  NOBUO SUEMATSU,  TOSHIAKI KITAMURA,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.19
九州工業大学における全学セキュア・ネットワークの導入について(キャンパスネットワーク,インターネットと情報倫理教育,一般)

,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.20
Campus WiFi upgrades at Kyushu Institute of Technology

,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.21
Modeling of Management Knowledge Based on Ontology toward General-Purpose Network Management

Shinji KAWAGUCHI,  Ryota OHSHIMA,  Kunitake KANEKO,  Fumio TERAOKA,  

[Date]2015/2/26
[Paper #]SITE2014-70,IA2014-102
Construction of Routing Information Knowledge Base towards Wide Area Network Management

Ryota OHSHIMA,  Shinji KAWAGUCHI,  Osamu KAMATANI,  Osamu AKASHI,  Kunitake KANEKO,  Fumio TERAOKA,  

[Date]2015/2/26
[Paper #]SITE2014-71,IA2014-103
Proposal and evaluation of the circular migration method using a differential virtual disk

Naoya SAWADA,  Kazuya OKADA,  Takeshi OKUDA,  Youki KADOBAYASHI,  Suguru YAMAGUCHI,  

[Date]2015/2/26
[Paper #]SITE2014-72,IA2014-104
Evaluation of Greedy Algorithms for Embedding Multiple VLANs

Andrew LEE,  Shuichi MIYAZAKI,  Yasuo OKABE,  

[Date]2015/2/26
[Paper #]SITE2014-73,IA2014-105
A Proxy-based Active Measurement Scheme for Android Smartphones

ATSUO TACHIBANA,  ANUP KUMAR PAUL,  TERUYUKI HASEGAWA,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.26
An Evaluation of Network Boot Traffic of Educational PC Focused on the Effectiveness on Local Cache

HIROSHI UEDA,  YOSHIKAZU ISHII,  KOICHIRO TONOMURA,  TOHRU UEKI,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.27
Report of the accuracy evaluation of SNMP-based Burst Traffic detection method

SHUTO MURAI,  HIDEYUKI SUNADA,  KAZUHIRO MAKI,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.28
Analysis of direct outbound queries in DNS and consideration of malicious traffic detection method

Hikaru ICHISE,  Yong JIN,  Katsuyoshi IIDA,  

[Date]2015/2/26
[Paper #]SITE2014-74,IA2014-106
Network Disaster Drill of Kochi Academic Information Network

Masahiro FUKUMOTO,  Yutaka KIKUCHI,  Kenji OKAMURA,  Masahiko TOYONAGA,  koji SASSA,  Masato SASAKI,  Kazumasa IMAI,  Satoru YAMADA,  Kenji ISSIKI,  Hiroshi KAZAMA,  Shinichi NAWA,  Takashi TAKABATAKE,  

[Date]2015/2/26
[Paper #]SITE2014-75,IA2014-107
Study on a Scheme of Personal Data Utilization from the Viewpoint of Privacy

Sachiko KANAMORI,  Kanako KAWAGUCHI,  

[Date]2015/2/26
[Paper #]SITE2014-76,IA2014-108
A study of disk usage distribution analysis to set optimal quota value

Takuya Kawatani,  Eisuke Ito,  Yoshiaki Kasahara,  Naomi Fujimura,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.32
Realization of a Network Configuration Management for increasing Operation Efficiency

TOHRU KONDO,  KOICHI TASHIMA,  SEIGO KISHIBA,  TOMOHIKO YOSHIDA,  NORIKAZU IWATA,  TOSHIHIRO OHIGASHI,  KOUJI NISHIMURA,  REIJI AIBARA,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.33
How to build and manage a large scale switchless server clustering

NAOTO MATSUMOTO,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.34
Efficient Management of Group Administrators in a Group Management System

SAYAKO SHIMIZU,  MASAYOSHI TODA,  YASUO OKABE,  

[Date]2015/2/26
[Paper #]Vol.2015-IOT-28 No.35
Development of the folk implements database using the relational model and thesaurus for the digital archive

Toshihide HANYU,  Sumiko MIYATA,  Tetsuya MORIZUMI,  Hirotsugu KINOSHITA,  

[Date]2015/2/26
[Paper #]SITE2014-77,IA2014-109
A search scheme considering the search process using ACO and search history

Shun KOIZUMI,  Sumiko MIYATA,  tetsuya MORIZUMI,  Hirotsugu KINOSHITA,  

[Date]2015/2/26
[Paper #]SITE2014-78,IA2014-110
<<123>> 21-40hit(53hit)