Abstract is missing.
- Location l-Diversity against Multifarious Inference AttacksShinya Miyakawa, Nobuyuki Saji, Takuya Mori. 1-10 [doi]
- Proposal of Movie CAPTCHA Method Using Amodal CompletionTakuma Mori, Ryuya Uda, Masayuki Kikuchi. 11-18 [doi]
- Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity ProtocolAkihiro Takahashi, Tomotaka Maeda, Yasuo Okabe. 19-28 [doi]
- Detecting Malicious Websites by Learning IP Address FeaturesDaiki Chiba, Kazuhiro Tobe, Tatsuya Mori, Shigeki Goto. 29-39 [doi]
- Scalable and Performance-Efficient Client Honeypot on High Interaction SystemMitsuaki Akiyama, Yuhei Kawakoya, Takeo Hariu. 40-50 [doi]
- SSH Dictionary Attack Detection Based on Flow AnalysisAkihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga. 51-59 [doi]
- A Design and Implementation of OpenFlow Controller Handling IP Multicast with Fast Tree SwitchingDaisuke Kotani, Kazuya Suzuki, Hideyuki Shimonishi. 60-67 [doi]
- Inter-AS Locator Allocation of Hierarchical Automatic Number Allocation in a 10, 000-AS NetworkKenji Fujikawa, Hajime Tazaki, Hiroaki Harai. 68-73 [doi]
- Simulator-Assisted Joint Service-Level-Agreement and Vertical-Handover Adaptation for Profit MaximizationIsmaeel Al Ridhawi, Nancy Samaan, Ahmed Karmouch. 74-82 [doi]
- Proposal of Web Framework for Ubiquitous Sensor Network and Its Trial Application Using NO2 Sensor Mounted on BicycleTakayuki Nakamura, Yukio Kikuya, Yutaka Arakawa, Motonori Nakamura, Yuka Higashijima, Yasuko Yamada Maruo, Masayuki Nakamura. 83-90 [doi]
- Emotion Communication Model Based on Life-Log Comparison: Mutual Understanding through Comparable ExperiencesRika Mochizuki, Tomoki Watanabe, Toru Kobayashi. 91-99 [doi]
- A Sensor Data Collection Method Based on the Constraint of Collected Number of Data and Granularity of Characteristics on an Overlay NetworkJun Shinomiya, Yuuichi Teranishi, Kaname Harumoto, Shojiro Nishio. 100-107 [doi]
- An Academic Community Cloud Architecture for Science ApplicationsShigetoshi Yokoyama, Nobukazu Yoshioka. 108-112 [doi]
- Zero-Watt Networked Standby: Development and Evaluation of a Home A/V Network SystemYoshimichi Tanizawa, Takeshi Ishihara, Yuichiro Oyama, Takaomi Murakami, Tsuyoshi Kogawa, Eiji Kamagata, Kotaro Ise. 113-122 [doi]
- Jobcast - Parallel and Distributed Processing Framework: Data Processing on a Cloud Style KVS DatabaseIkuo Nakagawa, Kenichi Nagami. 123-128 [doi]
- DNS Traffic Analysis: Issues of IPv6 and CDNKazunori Fujiwara, Akira Sato, Kenichi Yoshida. 129-137 [doi]
- A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home NetworkingTakuya Miyamoto, Youichi Koyama, Kazumi Sakai, Yasuo Okabe. 138-147 [doi]
- Accelerating Flow-Level Network Simulation with Low-Pass Filtering of Fluid ModelsYusuke Sakumoto, Hiroyuki Ohsaki, Makoto Imase. 148-154 [doi]
- i-Path: Improving Path Visibility for the Future InternetDai Mochinaga, Katsushi Kobayashi, Ryo Yamada, Shigeki Goto, Akihiro Shimoda, Ichiro Murase. 155-160 [doi]
- Markov Chain-Based Routing Algorithm in Delay-Tolerant NetworksChenji Pan, Jiaping Gui, Jiaju Yan, Yue Wu. 161-165 [doi]
- PIPER: A Framework for Exploring the Privacy Implications of Pervasive Computing Applications in Their Physical EnvironmentsRyan Babbitt, Hen-I Yang, Johnny Wong. 166-171 [doi]
- Extraction and Annotation of Personal Cliques from Social NetworksMaike Erdmann, Tomoya Takeyoshi, Gen Hattori, Chihiro Ono. 172-177 [doi]
- Access Control Architecture Separating Privilege by a Thread on a Web ServerRyosuke Matsumoto, Yasuo Okabe. 178-183 [doi]
- Performance Analysis of Fountain-Based Protocol in CSMA/CA Wireless NetworksZan-Kai Chong, Hiroyuki Ohsaki, Bok-Min Goi, Hong Tat Ewe, Cheng-Kuan Bryan Ng. 184-189 [doi]
- Elekspot: A Platform for Urban Place Recognition via CrowdsourcingMinkyu Lee, Suk Hoon Jung, Sangjae Lee, Dongsoo Han. 190-195 [doi]
- A Mobile Platform for Managing Mobile MapReduce Participatory Sensing DataTheofilos Kakantousis, Vana Kalogeraki. 196-201 [doi]
- A Study on Transport Framework for Transaction Communication with Network Aggressive SupportingTakuya Omizo. 202-205 [doi]
- Modeling I/O Interference in Data Intensive Map-Reduce ApplicationsSven Groot. 206-209 [doi]
- Can SDN Help HPC?Eiji Kawai. 210 [doi]
- Strategic Optimization of Computation Nodes Allocation in a Coupled Simulation: Computational Fluid Dyanmics and Aero Acoustic SimulationsKazunori Nozaki, Hiroyuki Ohsaki, Masao Tanaka, Annemie Van Hirtum, Eisaku Sakane. 211-214 [doi]
- Multilevel Modeling of Physiological Systems and Simulation Platform: PhysioDesigner, Flint and Flint K3 ServiceYoshiyuki Asai, Takeshi Abe, Masao Okita, Tomohiro Okuyama, Nobukazu Yoshioka, Shigetoshi Yokoyama, Masaru Nagaku, Kenichi Hagihara, Hiroaki Kitano. 215-219 [doi]
- Survey of Network Metrology PlatformsAnne-Cécile Orgerie, Paulo Gonçalves, Matthieu Imbert, Julien Ridoux, Darryl Veitch. 220-225 [doi]
- Dynamic Communication Protocol for Quick Response in Interactive CommunicationNaoki Oguchi, Shunji Abe. 226-231 [doi]
- New Horizon of IT-enabled ServicesShiro Uesugi. 232 [doi]
- Evaluation Study of Usability Factors on Mobile Payment Application on Two Different Service Providers in ThailandNagul Cooharojananone, Pongjit Kongnim, Aratchaporn Mongkolnut, Hitoshi Okada. 233-238 [doi]
- A Resilient Service for Survivor Identification in Large-Scale DisastersShigeichiro Yamasaki. 239-244 [doi]
- The Study on the Effect of Facebook's Social Network Features toward Intention to Buy on F-commerce in ThailandWannapon Suraworachet, Sarawadee Premsiri, Nagul Cooharojananone. 245-250 [doi]
- A Local Currency System Reflecting Variety of Values with a Swarm IntelligenceHirotsugu Kinoshita, Yoshiaki Tajima, Tetsuya Morizumi, Masato Noto, Hideyuki Kanabe, Sumiko Miyata. 251-255 [doi]
- A Malware Classification Method Based on Similarity of Function StructureYang Zhong, Hirofumi Yamaki, Hiroki Takakura. 256-261 [doi]
- Malware Detection Method by Catching Their Random Behavior in Multiple ExecutionsTakahiro Kasama, Katsunari Yoshioka, Daisuke Inoue, Tsutomu Matsumoto. 262-266 [doi]
- A Behavior-Based Detection Method for Outbreaks of Low-Rate AttacksYaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun-ichi Takeuchi. 267-272 [doi]
- Unknown Attacks Detection Using Feature Extraction from Anomaly-Based IDS AlertsMasaaki Sato, Hirofumi Yamaki, Hiroki Takakura. 273-277 [doi]
- A Proposal for Anomaly Traffic Detection in the IP Multimedia Subsystem Using Tanimoto Distance and a Modified Moving AverageNoppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi. 278-283 [doi]
- An Efficient Dynamic Detection Method for Various x86 ShellcodesTakayoshi Fujii, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto. 284-289 [doi]
- A DHT-based HTTP Access Control System with Access Ticket Issuing MechanismSatoshi Uemura, Shigehiro Ano. 290-295 [doi]
- Evaluating the Performance of Locator/ID Separation Based on LISP Map Cache EmulationMasafumi Watari, Atsushi Tagami, Shigehiro Ano. 296-301 [doi]
- Comparative Study on Meta-heuristics for Achieving Parabolic Fairness in Wireless Channel AllocationMario Köppen, Kaori Yoshida, Rodrigo Verschae, Masato Tsuru, Yuji Oie. 302-307 [doi]
- Two-Level Heuristic Algorithm for Utility-Based Data Placement and Rate Allocation in Content-Aware NetworksDariusz Gasior, Maciej Drwal. 308-313 [doi]
- Distributing Link Stress for Internet TV SystemsSeung Chul Han. 314-319 [doi]
- Detecting Critical Links for Keeping Shortest Distance from Clients to Servers during FailuresNao Maeda, Hiroyoshi Miwa. 320-325 [doi]
- Real-Time Disaster Evacuation Guidance Using Opportunistic CommunicationsAkihiro Fujihara, Hiroyoshi Miwa. 326-331 [doi]
- Vertical Handover Control Considering End-to-End Communication Quality in IP MobilityTakuya Horai, Kaori Maeda, Yasuhiro Ohishi, Hayato Morihiro, Tomoki Harase. 332-337 [doi]
- Design and Evaluation of Global Live Migration with Mobility Support for IP MulticastKeisuke Kamada, Tohru Kondo, Kouji Nishimura, Reiji Aibara. 338-344 [doi]
- An Adaptive Approach for Network Traffic Load Balancing by Using One-Way DelayHiroki Kashiwazaki, Satoshi Kobayashi, Shugo Kawai, Norikatsu Ohishi, Yoshiaki Takai. 345-350 [doi]
- Multihoming Method Using Routing Header in IPv6 EnvironmentTakuya Yamaguchi, Yong Jin, Ryoichi Tokumoto, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura. 351-356 [doi]
- A Location Free Network System Applicable to Geographical Terms of the Electronic Journal Site LicenseYoshihiro Ohsumi, Kiyohiko Okayama, Nariyoshi Yamai, Takaoki Fujiwara, Takashi Hieda. 357-362 [doi]
- Koshien-Cloud: Operations of Distributed Cloud as a Large Scale Web Contents Distribution PlatformYoshihiro Okamoto, Satoru Noguchi, Satoshi Matsuura, Atsuo Inomata, Kazutoshi Fujikawa. 363-368 [doi]
- An Account Provision and Management Architecture for Messaging Services in EmergencyKazuyuki Tasaka, Yasutaka Nishimura, Kiyohito Yoshihara. 369-374 [doi]
- An Execution Control System for Application Software Reducing Administrative Burden of Educational PCsMasanori Fujiwara, Keita Kawano, Nariyoshi Yamai. 375-380 [doi]
- Spam Mail Discrimination System Based on Behavior of DNS Servers Associated with URLsShuji Suwa, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura, Keita Kawano, Gada. 381-386 [doi]
- A Casual Network Security Using a Portable Sensor Device and Wiki SoftwareTakashi Yamanoue, Kentaro Oda, Koichi Shimozono. 387-392 [doi]
- A Proposal of the System for Automatic Sharing Information of Movements in Growing VegetablesHayato Shibahara, Masato Yamanouchi, Hideki Sunahara. 394-398 [doi]
- Development of Arkas Sensor Platform and Application for Heavy Snowfall ObservationHiroshi Yamamoto, Shohei Minomi, Katsuichi Nakamura, Katsuyuki Yamazaki. 399-404 [doi]
- On Socio-technical Enablers for Ubiquitous Computing ApplicationsKurt Geihs, Jan Marco Leimeister, Alexander Roßnagel, Ludger Schmidt. 405-408 [doi]
- Distortions in QoE Measurements of Ubiquitous Mobile Video Services Caused by the Preconceptions of Test SubjectsPéter András Kara, László Bokor, Sándor Imre. 409-413 [doi]
- Personalized Clothing-Recommendation System Based on a Modified Bayesian NetworkYu-Chu Lin, Yuusuke Kawakita, Etsuko Suzuki, Haruhisa Ichikawa. 414-417 [doi]
- An Adaptive Vertical Handover in Service Specific Overlay NetworksYousif Al Ridhawi, Ismaeel Al Ridhawi, Nancy Samaan, Ahmed Karmouch. 418-423 [doi]
- A Divide and Merge Method for Sensor Data Processing on Large-Scale Publish/Subscribe SystemsRyota Miyagi, Satoshi Matsuura, Satoru Noguchi, Atsuo Inomata, Kazutoshi Fujikawa. 424-429 [doi]