Communication-Information Networks(Date:2005/09/08)

Presentation
表紙

,  

[Date]2005/9/8
[Paper #]
目次

,  

[Date]2005/9/8
[Paper #]
Message Reduction by Network Support in Layered Pure P2P Systems

Takeshi SANO,  Miki YAMAMOTO,  

[Date]2005/9/8
[Paper #]NS2005-77,IN2005-60,CS2005-22
Resource Management Schemes in Virtual Private Networks

Tomonori TAKEDA,  Ryuichi MATSUZAKI,  Ichiro INOUE,  Shigeo URUSHIDANI,  

[Date]2005/9/8
[Paper #]NS2005-78,IN2005-61,CS2005-23
Technique of Quarantine LAN System

Masateru Oonishi,  

[Date]2005/9/8
[Paper #]NS2005-79,IN2005-62,CS2005-24
Overlay Network Technologies for QOS control

Tutomu Murase,  Hideyuki Shimonishi,  Masayoshi Kobayashi,  Yoshiaki Kiriha,  

[Date]2005/9/8
[Paper #]NS2005-80,IN2005-63,CS2005-25
International standardization activities for PON Conformance & Interoperability : From producing B-PON/G-PON international standard recommendations to the Conformance & Interoperability certification

Tatsuhiko YOSHIDA,  

[Date]2005/9/8
[Paper #]NS2005-81,IN2005-64,CS2005-26
Active Queue Management using Congestion Estimation

Hayato HOSHIHARA,  Hisashi KOGA,  Hiroshi KITAMURA,  Toshinori WATANABE,  

[Date]2005/9/8
[Paper #]IN2005-65
A Mathematical Model for Evaluating the Efficiency of IP Traceback Schemes Based on Probabilistic Packet Marking

Keisei OH,  Shigeo SHIODA,  

[Date]2005/9/8
[Paper #]IN2005-66
Transport Protocols for Fast Long-Distance Networks : Comparison of Their Performances in JGNII

Kazumi KUMAZOE,  Katsushi KOUYAMA,  Yoshiaki HORI,  Masato TSURU,  Yuji OIE,  

[Date]2005/9/8
[Paper #]IN2005-67
Proposal and evaluation of routing methods in power-law networks

Ryota FUKUMOTO,  Shinichi ARAKAWA,  Masayuki MURATA,  

[Date]2005/9/8
[Paper #]IN2005-68
Detecting Mass-Mailing Worm Infected Hosts by Mining DNS Traffic Data

Keisuke ISHIBASHI,  Tsuyoshi TOYONO,  Katsuyasu TOYAMA,  

[Date]2005/9/8
[Paper #]IN2005-69
Automatic Network Event Summarization based on Combination of Traffic Anomaly Detection and Log Mining

Masahiro NAGAO,  Gen KITAGATA,  Takuo SUGANUMA,  Norio SHIRATORI,  

[Date]2005/9/8
[Paper #]IN2005-70
A proposal of a Traceback method between ASes against DRDoS attacks

Teruaki TAKAHASHI,  Toshifumi KAI,  Katsuyuki SHINOHARA,  

[Date]2005/9/8
[Paper #]IN2005-71
A Network Anomaly Detection based on Multi-Stage Traffic Analysis

Masashi TSUJI,  Yuji WAIZUMI,  Hiroshi TSUNODA,  Yoshiaki NEMOTO,  

[Date]2005/9/8
[Paper #]IN2005-72
Status toward standardization of layer 2 security and items

Ken MURAKAMI,  Kouji SATO,  Tetsuya YOKOTANI,  Tetsujiro YASUSHI,  

[Date]2005/9/8
[Paper #]NS2005-85,IN2005-73,CS2005-31
Identification of Attack Nodes from Traffic Matrix Estimation

Yuichi OHSITA,  Shingo ATA,  Masayuki MURATA,  

[Date]2005/9/8
[Paper #]NS2005-86,IN2005-74,CS2005-32
Fluid-based Analysis of Network with DCCP Connections and RED Routers

Hiroyuki HISAMATU,  Hiroyuki OHSAKI,  Masayuki MURATA,  

[Date]2005/9/8
[Paper #]NS2005-87,IN2005-75,CS2005-33
The Effective Recovery Method of Lost information for Periodical Management Information Collection over Mobile Environment

Hiroki Kamiyama,  Gen Kitagata,  Kazuhide Koide,  Glenn Mansfield Keeni,  Norio Shiratori,  

[Date]2005/9/8
[Paper #]NS2005-88,IN2005-76,CS2005-34
Scalable QoS degradation locating

Masayoshi KOBAYASHI,  Yohei Hasegawa,  Tutomu Murase,  

[Date]2005/9/8
[Paper #]NS2005-89,IN2005-77,CS2005-35
12>> 1-20hit(33hit)