Communication-Communication Systems(Date:2005/09/08)

Presentation
表紙

,  

[Date]2005/9/8
[Paper #]
目次

,  

[Date]2005/9/8
[Paper #]
A Method of Clock Synchronization over IP network

Yusuke YAMADA,  

[Date]2005/9/8
[Paper #]CS2005-16
A Method for Communication between Independent Private Network Area Using Virtual Address

Kuniharu ARIMA,  Hiroaki KAMODA,  Akihiro HAYAKAWA,  Masaki YAMAOKA,  

[Date]2005/9/8
[Paper #]CS2005-17
A control-forwarding separated node using a hardware packet transferring

Toshiyuki SUDO,  Takeshi KAWASAKI,  Naoki OGUCHI,  Takeshi KODAMA,  Tetsumei TSURUOKA,  

[Date]2005/9/8
[Paper #]CS2005-18
A Detection Technique of Epidemic Worms using Clustering of Packet Payloads

Yuji WAIZUMI,  Masashi TSUJI,  Yoshiaki NEMOTO,  

[Date]2005/9/8
[Paper #]CS2005-19
An Optical Path Rearrange System with a Packet Forwarding Table Update Mechanism for Topology Transition in Exterior Networks

Yoshihiro NAKAHIRA,  Akihiro FUJII,  Issei ASABAYASHI,  Hiroyuki SAKAMOTO,  Masato KAWAHARA,  

[Date]2005/9/8
[Paper #]CS2005-20
Low Power Consumption Type Multi-Robot Network System for Rescue Operations

Masahiro OKAMOTO,  Hisayoshi SUGIYAMA,  Tetsuo TSUJIOKA,  Masashi MURATA,  

[Date]2005/9/8
[Paper #]CS2005-21
Message Reduction by Network Support in Layered Pure P2P Systems

Takeshi SANO,  Miki YAMAMOTO,  

[Date]2005/9/8
[Paper #]NS2005-77,IN2005-60,CS2005-22
Resource Management Schemes in Virtual Private Networks

Tomonori TAKEDA,  Ryuichi MATSUZAKI,  Ichiro INOUE,  Shigeo URUSHIDANI,  

[Date]2005/9/8
[Paper #]NS2005-78,IN2005-61,CS2005-23
Technique of Quarantine LAN System

Masateru Oonishi,  

[Date]2005/9/8
[Paper #]NS2005-79,IN2005-62,CS2005-24
Overlay Network Technologies for QOS control

Tutomu Murase,  Hideyuki Shimonishi,  Masayoshi Kobayashi,  Yoshiaki Kiriha,  

[Date]2005/9/8
[Paper #]NS2005-80,IN2005-63,CS2005-25
International standardization activities for PON Conformance & Interoperability : From producing B-PON/G-PON international standard recommendations to the Conformance & Interoperability certification

Tatsuhiko YOSHIDA,  

[Date]2005/9/8
[Paper #]NS2005-81,IN2005-64,CS2005-26
An Self Adaptive Intrusion Detection Method for AODV-based Mobile Ad Hoc Network

Satoshi KUROSAWA,  Hidehisa NAKAYAMA,  Nei KATO,  Abbas JAMALIPOUR,  

[Date]2005/9/8
[Paper #]CS2005-27
Energy Analysis of IEEE 802.11 DCF under Non-Saturation Conditions

Katsumi SAKAKIBARA,  Haruhiko NAKAGAWA,  Jiro YAMAKITA,  

[Date]2005/9/8
[Paper #]CS2005-28
A Performance Evaluation of a MAC Protocol of RFID Systems with Plural Readers

Makoto EJIMA,  Masaki BANDAI,  Takashi WATANABE,  

[Date]2005/9/8
[Paper #]CS2005-29
Proposal and evaluation of a routing protocol for VANET using mobile velocity vector

Mitsuru OCHI,  Tarik TALEB,  Abbas JAMALIPOUR,  Nei KATO,  Yoshiaki NEMOTO,  

[Date]2005/9/8
[Paper #]CS2005-30
Status toward standardization of layer 2 security and items

Ken MURAKAMI,  Kouji SATO,  Tetsuya YOKOTANI,  Tetsujiro YASUSHI,  

[Date]2005/9/8
[Paper #]NS2005-85,IN2005-73,CS2005-31
Identification of Attack Nodes from Traffic Matrix Estimation

Yuichi OHSITA,  Shingo ATA,  Masayuki MURATA,  

[Date]2005/9/8
[Paper #]NS2005-86,IN2005-74,CS2005-32
Fluid-based Analysis of Network with DCCP Connections and RED Routers

Hiroyuki HISAMATU,  Hiroyuki OHSAKI,  Masayuki MURATA,  

[Date]2005/9/8
[Paper #]NS2005-87,IN2005-75,CS2005-33
12>> 1-20hit(26hit)