Communication-Network Systems(Date:2005/09/08)

Presentation
表紙

,  

[Date]2005/9/8
[Paper #]
目次

,  

[Date]2005/9/8
[Paper #]
Message Reduction by Network Support in Layered Pure P2P Systems

Takeshi SANO,  Miki YAMAMOTO,  

[Date]2005/9/8
[Paper #]NS2005-77,IN2005-60,CS2005-22
Resource Management Schemes in Virtual Private Networks

Tomonori TAKEDA,  Ryuichi MATSUZAKI,  Ichiro INOUE,  Shigeo URUSHIDANI,  

[Date]2005/9/8
[Paper #]NS2005-78,IN2005-61,CS2005-23
Technique of Quarantine LAN System

Masateru Oonishi,  

[Date]2005/9/8
[Paper #]NS2005-79,IN2005-62,CS2005-24
Overlay Network Technologies for QOS control

Tutomu Murase,  Hideyuki Shimonishi,  Masayoshi Kobayashi,  Yoshiaki Kiriha,  

[Date]2005/9/8
[Paper #]NS2005-80,IN2005-63,CS2005-25
International standardization activities for PON Conformance & Interoperability : From producing B-PON/G-PON international standard recommendations to the Conformance & Interoperability certification

Tatsuhiko YOSHIDA,  

[Date]2005/9/8
[Paper #]NS2005-81,IN2005-64,CS2005-26
A Framework for Network Media Optimization in Multihomed QoS Networks

Hiroyuki KOGA,  Hiroaki HARAGUCHI,  Katsuyoshi IIDA,  Yuji OIE,  

[Date]2005/9/8
[Paper #]NS2005-82
Scalable public key management for mobile ad hoc networks based on decentralized CA

Hiroaki Morino,  Hoang Nam Nguyen,  

[Date]2005/9/8
[Paper #]NS2005-83
Proposal of NAT/Proxy Traversing Remote Access Technology

Hideo YOSHIMI,  Nobuyuki ENOMOTO,  Chinryu SAI,  Youichi HIDAKA,  Kazuo TAKAGI,  Atsushi IWATA,  

[Date]2005/9/8
[Paper #]NS2005-84
Status toward standardization of layer 2 security and items

Ken MURAKAMI,  Kouji SATO,  Tetsuya YOKOTANI,  Tetsujiro YASUSHI,  

[Date]2005/9/8
[Paper #]NS2005-85,IN2005-73,CS2005-31
Identification of Attack Nodes from Traffic Matrix Estimation

Yuichi OHSITA,  Shingo ATA,  Masayuki MURATA,  

[Date]2005/9/8
[Paper #]NS2005-86,IN2005-74,CS2005-32
Fluid-based Analysis of Network with DCCP Connections and RED Routers

Hiroyuki HISAMATU,  Hiroyuki OHSAKI,  Masayuki MURATA,  

[Date]2005/9/8
[Paper #]NS2005-87,IN2005-75,CS2005-33
The Effective Recovery Method of Lost information for Periodical Management Information Collection over Mobile Environment

Hiroki Kamiyama,  Gen Kitagata,  Kazuhide Koide,  Glenn Mansfield Keeni,  Norio Shiratori,  

[Date]2005/9/8
[Paper #]NS2005-88,IN2005-76,CS2005-34
Scalable QoS degradtion locating

Masayoshi KOBAYASHI,  Yohei Hasegawa,  Tutomu Murase,  

[Date]2005/9/8
[Paper #]NS2005-89,IN2005-77,CS2005-35
Proposal of a method for hiding classified information on blog

Yuichi NAKATANI,  Tetsuro TOKUNAGA,  Hitoshi YAMAGUCHI,  Tadashi ITOH,  

[Date]2005/9/8
[Paper #]NS2005-90,IN2005-78,CS2005-36
A Node Configuration Problem for WDM Ring Networks

Megumi ISOGAI,  Nobuo FUNABIKI,  Toru NAKANISHI,  

[Date]2005/9/8
[Paper #]NS2005-91
Performance Evaluation considering location error for MANET routing protocol

NORIYUKI HAMABATA,  KAORU SEZAKI,  

[Date]2005/9/8
[Paper #]NS2005-92
Multicast Content Delivery with Multiple Speeds Based on Users' Utility

Takehiro KAJITA,  Kyoko YAMORI,  Yoshiaki TANAKA,  

[Date]2005/9/8
[Paper #]NS2005-93
A Method of Mutual Cooperation between IP Routers for End-to-End Delay Guarantee

Dai YAMAMOTO,  Rie FUJITA,  Hideki TODE,  Toshihiro MASAKI,  Koso MURAKAMI,  

[Date]2005/9/8
[Paper #]NS2005-94
12>> 1-20hit(27hit)