Communication-Internet Architecture(Date:2017/11/15)

Presentation
Log analysis for hijacked user account's login detection method based on an autonomous system number of access source

Akira Sato(Univ. of Tsukuba),  Shuji Sannomiya(Univ. of Tsukuba),  Yoshihiro Oyama(Univ. of Tsukuba),  Hisashi Nakai(Univ. of Tsukuba),  Kenichi Yoshida(Univ. of Tsukuba),  Keisuke Kameyama(Univ. of Tsukuba),  

[Date]2017-11-16
[Paper #]IA2017-50
Implementation and preliminary evaluation of low-latency network architecture

Krittin Intharawijitr(Tokyo Tech),  Katsuyoshi Iida(Hokkaido Univ.),  Hiroyuki Koga(Univ. of Kitakyushu),  Katsunori Yamaoka(Tokyo Tech),  

[Date]2017-11-16
[Paper #]IA2017-51
SDN Based End-to-end Inter-domain Routing Mechanism for Mobility Management and Its Implementation

Misumi Hata(Tohoku Univ.),  Mustafa Soylu(ITU),  Satoru Izumi(Tohoku Univ.),  Toru Abe(Tohoku Univ.),  Takuo Suganuma(Tohoku Univ.),  

[Date]2017-11-16
[Paper #]IA2017-46
Approximate Analysis of Message Delivery Delay in Large-Scale Geographic DTN Routing

Sumika Nishikawa(Kwansei Gakuin Univ.),  Daiki Matsui(Kwansei Gakuin Univ.),  Yasuhiro Yamasaki(Kwansei Gakuin Univ.),  Hiroyuki Ohsaki(Kwansei Gakuin Univ.),  

[Date]2017-11-16
[Paper #]IA2017-52
[Invited Talk] A Network Slicing for 5G Networks

Choong Seon Hong(Kyung Hee University),  

[Date]2017-11-16
[Paper #]IA2017-43
<<12 21-25hit(25hit)