Communication-Network Systems(Date:2020/03/05)

Presentation
A Study on Attractor Selection-based Multipath Routing for Vehicular Network

Ryusuke Igarashi(Muroran-IT),  Dan Okochi(Muroran-IT),  Ryo Nakagawa(Muroran-IT),  Yukio Ogawa(Muroran-IT),  Kaoru Ota(Muroran-IT),  Mianxiong Dong(Muroran-IT),  

[Date]2020-03-06
[Paper #]IN2019-107
Study on support system for maintenance center of network equipment using machine learning

Kodo Ran(FUJITSU Ltd.),  Yuji Kojima(FUJITSU Ltd.),  Shinji Yamashita(FUJITSU LABORATORIES LTD.),  Masahiro Ishikawa(FUJITSU NETWORK SOLUTIONS LTD.),  Kazunari Fukagawa(FUJITSU KYUSHU NETWORK TECHNOLOGIES LTD.),  Osamu Kimura(FUJITSU Ltd.),  Manabu Wakao(FUJITSU Ltd.),  Masao Hayashi(FUJITSU Ltd.),  

[Date]2020-03-06
[Paper #]NS2019-228
ICN-based Service Function Chaining for Workflows

Hidehiro Kanemitsu(TEU),  Masaki Hanada(TUIS),  Kenji Kanai(WASEDA),  Hidenori Nakazato(WASEDA),  

[Date]2020-03-06
[Paper #]IN2019-120
Study of power management technology trend in smart homes

Satsuki Takano(JAIST),  Yuto Lim(JAIST),  Yasuo Tan(JAIST),  

[Date]2020-03-06
[Paper #]IN2019-112
Framework to Utilize Others' Behavior without Sharing Privacy Information

Masaaki Yamauchi(Osaka Univ.),  Yuichi Ohsita(Osaka Univ.),  Masayuki Murata(Osaka Univ.),  

[Date]2020-03-06
[Paper #]IN2019-114
Anomaly Detection in Smart Home Networks using Situation Estimation in-Home Activities

Masahiro Tanaka(Osaka Univ.),  Masaaki Yamauchi(Osaka Univ.),  Yuichi Ohsita(Osaka Univ.),  Masayuki Murata(Osaka Univ.),  Kensuke Ueda(mitsubishi),  Yoshiaki Kato(mitsubishi),  

[Date]2020-03-06
[Paper #]IN2019-115
On the Implementation and Evaluation of a Network-oriented Mixed Reality Service based on Core/Periphery Structure

Shiori Takagi(Osaka Univ.),  Shin'ichi Arakawa(Osaka Univ.),  Masayuki Murata(Osaka Univ.),  

[Date]2020-03-06
[Paper #]NS2019-218
A proposal of accesses control for two types web contents considering tolerable delay time

Kosuke Watanabe(SIT),  Sumiko Miyata(SIT),  

[Date]2020-03-06
[Paper #]IN2019-146
Two types of flows admission control method for maximizing all user satisfaction considering seek-bar operation

Keisuke Ode(SIT),  Sumiko Miyata(SIT),  

[Date]2020-03-06
[Paper #]IN2019-145
Taxonomy of Attack and Prevention Methods for DNS Tunneling

Naotake Ishikura(Osaka Prefecture Univ.),  Daishi Kondo(Osaka Prefecture Univ.),  Hideki Tode(Osaka Prefecture Univ.),  

[Date]2020-03-06
[Paper #]NS2019-225
A Proposal of Steganography Using Transform Domain Using Shamir's Secret Sharing Method and Spread Spectrum Method

Onuma Kaito(SIT),  Miyata Sumiko(SIT),  

[Date]2020-03-06
[Paper #]IN2019-143
Response Time Improvement by Network Clustering for Standby P2P Temporarily Substituting Server Functions

Kiyoshi Kanazawa(Soka Univ.),  Kazumasa Takami(Soka Univ.),  

[Date]2020-03-06
[Paper #]IN2019-138
Network Control Mechanism Using Uncertain Information inspired by Collective Decision Making

Saeko Shigaki(Osaka Univ.),  Naomi Kuze(Osaka Univ.),  Daichi Kominami(Osaka Univ.),  Kenji Kashima(Kyoto Univ.),  Masayuki Murata(Osaka Univ.),  

[Date]2020-03-06
[Paper #]IN2019-128
Stop sign violation detection method for traffic safety education assistance system

Shou Tanaka(Soka Univ.),  Kazumasa Takami(Soka Univ.),  

[Date]2020-03-06
[Paper #]IN2019-119
Learning Content Transmission Method in Delayed Update-Tolerant Web Cache Servers for E-learning Support in Developing Country

Yudai Kurashita(Soka Univ.),  Kazumasa Takami(Soka Univ.),  

[Date]2020-03-06
[Paper #]IN2019-147
Traffic Flow Statistics Estimation Method by Flow De-Aggregation for SDN Data-Plane Verification

Takahiro Shimizu(TUAT),  Naoya Kitagawa(TUAT),  Nariyoshi Yamai(TUAT),  

[Date]2020-03-06
[Paper #]IN2019-127
Experimental results of soft error effect on a network equipment with error collection and detection function

Mizuki Tateno(NTT),  Kousuke Watanabe(NTT),  

[Date]2020-03-06
[Paper #]NS2019-251
A New Model of Flaming Phenomena Caused by Resonance to External Stimuli in Online Social Networks

Tomoya Kinoshita(Tokyo Metropolitan Univ.),  Masaki Aida(Tokyo Metropolitan Univ.),  

[Date]2020-03-06
[Paper #]IN2019-129
A Study on Vulnerability of Data Name Encryption in ICN Networks against Frequency Attacks

Nagahiro Enatsu(Osaka Univ.),  Yuki Koizumi(Osaka Univ.),  Toru Hasegawa(Osaka Univ.),  

[Date]2020-03-06
[Paper #]IN2019-109
To Evaluate the Benefits of Compound Words for Determining if a Test Case is Necessary using Support Vector Machine

Satoshi Sunaga(NTT),  Kazuhiro Kikuma(NTT),  Shota Inokoshi(Nihon Univ.),  Koki Sato(Nihon Univ.),  Kiyoshi Ueda(Nihon Univ.),  

[Date]2020-03-06
[Paper #]NS2019-226
<<12345678>> 81-100hit(156hit)