Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2009/02/26)

Presentation
String Matching Algorithms specialized for IDS

Takashi IMAIZUMI,  Keisuke MIZUNO,  

[Date]2009/2/26
[Paper #]SITE2008-62,IA2008-85
Configuration of Redundant Network in Okayama University via Regional IXes and SINET

Nariyoshi Yamai,  Kiyohiko Okayama,  Yong Jin,  Keita Kawano,  Yoshihiro Oosumi,  

[Date]2009/2/26
[Paper #]SITE2008-63,IA2008-86
A Solving Method for SPF Forwarded Mail Problem by Tracing Recipient Addresses

Takumi SEIKE,  Kiyohiko OKAYAMA,  Keita KAWANO,  Motonori NAKAMURA,  Nariyoshi YAMAI,  

[Date]2009/2/26
[Paper #]SITE2008-64,IA2008-87
A Wearable Device Support System using Virtualization and IP Mobility Architecture

Hidenobu WATANABE,  Toshihiro OHIGASHI,  Tohru KONDO,  Kouji NISHIMURA,  Reiji AIBARA,  

[Date]2009/2/26
[Paper #]SITE2008-65,IA2008-88
musasabi: a P2P-based Platform for Stable Services

KOTA ABE,  

[Date]2009/2/26
[Paper #]SITE2008-66,IA2008-89
A User-oriented Digital Signage System with a contents registration function

Kaoru SUZUKI,  Kaori MAEDA,  Hiroyuki INOUE,  

[Date]2009/2/26
[Paper #]SITE2008-67,IA2008-90
A system for geoinformation-attached video streaming over P2P network using mobile devices

TATSUYA UEDA,  KOTA ABE,  HAYATO ISHIBASHI,  TOSHIO MATSUURA,  HIROSHI FUJII,  SHIU SAKASHITA,  

[Date]2009/2/26
[Paper #]SITE2008-68,IA2008-91
Development of "Opengate-PKI" Network User Authentication System with PKI

Suguru FUJISAWA,  Makoto OTANI,  Kenzi WATANABE,  

[Date]2009/2/26
[Paper #]SITE2008-69,IA2008-92
Shortening Boot Times of Guest OSes on OS Boot/Shutdown Control System using Authentication Device

Shingo TAKADA,  Akira SATO,  xIYasushi SATO,  Hisashi NAKAI,  Kozo ITANO,  

[Date]2009/2/26
[Paper #]SITE2008-70,IA2008-93
Evaluation of P2P Type File Distribution using IP Mobility

Hajime MASAOKA,  Akio SEKI,  Seigo KISHIBA,  Toru KONDO,  Kouji NISHIMURA,  Reiji AIBARA,  

[Date]2009/2/26
[Paper #]SITE2008-71,IA2008-94
A remote power control system for PC classroom to save energy

Mayu Funaki,  Katsura NISHIGAKI,  Akinori SAITOH,  

[Date]2009/2/26
[Paper #]SITE2008-72,IA2008-95
A system to re-register login password with less human resource

Katsura NISHIGAKI,  Akinori SAITOH,  

[Date]2009/2/26
[Paper #]SITE2008-73,IA2008-96
Implementation of an Access Control Mechanism that Enables Delegating Rights of Network Usage Permissions for Guest PCs

Mitsuhiro MABUCHI,  Tsuyoshi OZAWA,  Shingo TAKADA,  Hiraku TOYOOKA,  Keigo MATSUI,  Akira SATO,  Yasushi SHINJO,  Kazuhiko KATO,  

[Date]2009/2/26
[Paper #]SITE2008-74,IA2008-97
Effect of application order of topology inference rule for Layer2 Network Topology Visualizing System

Shunsuke FUJITA,  Kazuyuki YOSHIDA,  

[Date]2009/2/26
[Paper #]SITE2008-75,IA2008-98
Installation of Security Policy into Kumamoto University and DNS based Detection of Security Incidents in the Campus Network

YASUO MUSASHI,  

[Date]2009/2/26
[Paper #]SITE2008-76,IA2008-99
Instant OS image management system for various virtual machine environments

Masahiko Yamazaki,  Shunsuke Matsunaga,  Hideo Masuda,  

[Date]2009/2/26
[Paper #]SITE2008-77,IA2008-100
Scan Attack Detection using the Counting of TCP Connection Request with Pseudo SYN-ACK Reply.

Kenji OTSUKA,  Kiyoyuki KODAMA,  SAYuuki KINUGA,  Kazuyuki YOSHIDA,  

[Date]2009/2/26
[Paper #]SITE2008-78,IA2008-101
Proposal on Bayesian Spam Filter Using Distribution of Symbol and Unknown Word

Kenji OGAWA,  Hiroyuki INABA,  

[Date]2009/2/26
[Paper #]SITE2008-79,IA2008-102
Formalization of Knowledge for Automatic Administration System to the Internal Security Problem

Soichiro MORISHITA,  KOBAYASHI Hidetoshi /,  Taketoshi MISHIMA,  

[Date]2009/2/26
[Paper #]SITE2008-80,IA2008-103
Improving the educational assistant tool for BBS users using comments evaluation system

Yu ICHIFUJI,  Susumu KONNO,  Hideaki SONE,  

[Date]2009/2/26
[Paper #]SITE2008-81,IA2008-104
<<123>> 21-40hit(58hit)