Top/Çî»Î³Ø°ÌÏÀʸ¡¦½¤»ÎÏÀʸ
Çî»Î³Ø°ÌÏÀʸ†
2021ǯÅÙ†
2022ǯ3·î†
- ´Ø¸ýδ¾¼,
¥«¡¼¥Ê¥Ó¥²¡¼¥·¥ç¥ó¤Î¤¿¤á¤ÎÃÏÍý¶õ´Ö¾ðÊó¤ÎÅÁã¤Ë´Ø¤¹¤ë¸¦µæ
- Koki Hamada,
Algorithms for Stable Matching Problems toward Real-World Applications
2019ǯÅÙ†
2020ǯ3·î†
- ¾âËÜÍÌ,
Web¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤ËÂФ¹¤ë¥µ¥¤¥Ð¡¼¹¶·â¤Î¸úΨŪ¤Ê¸¡ÃÎ
2018ǯÅÙ†
2019ǯ3·î†
- »û²¬½¨ÉÒ,
¥Í¥Ã¥È¥ï¡¼¥¯Àܳ¤µ¤ì¤¿Áȹþ¤ß¥·¥¹¥Æ¥à¤Î³ÈÄ¥À¤Ë´Ø¤¹¤ë¸¦µæ
2018ǯ11·î†
- À¶¿å¤µ¤ä»Ò,
Âç³Ø¤Ë¤ª¤±¤ë¥¢¥¯¥»¥¹¥Þ¥Í¥¸¥á¥ó¥È¤Ë´Ø¤¹¤ë¸¦µæ
2017ǯÅÙ†
2017ǯ5·î†
- ¾¾ËÜμ²ð, Web¥µ¡¼¥Ð¤Î¹â½¸ÀÑ¥Þ¥ë¥Á¥Æ¥Ê¥ó¥È¥¢¡¼¥¥Æ¥¯¥Á¥ã¤Ë´Ø¤¹¤ë¸¦µæ
2016ǯÅÙ†
2017ǯ3·î†
- Èþ¸¶µÁ¹Ô, ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍýµ»½Ñ¤È±þÍÑ¥µ¡¼¥Ó¥¹¤Ë´Ø¤¹¤ë¸¦µæ
2015ǯÅÙ†
2016ǯ3·î†
- Daisuke Kotani, Stability and Robustness of Control Planes in OpenFlow Networks
2014ǯÅÙ†
2014ǯ7·î†
- Naoyuki Morimoto, Design and Analysis of Algorithms for Graph Exploration and Resource Allocation Problems and Their Application to Energy Management
2011ǯÅÙ†
2011ǯ7·î†
- Mitsuo Okada,
Asymmetric and Pseudo-Blind Digital Watermarking for Fair and Privacy-Secure Digital Content Trading
2010ǯÅÙ†
2011ǯ3·î†
- Kazuya Suzuki, Studies on Network Monitoring Systems to Reveal Suspicious Activities
2010ǯ7·î†
- ÂçÊ¿·ò»Ê, ¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÀܳ¤ÎÄã´ÉÍý¥³¥¹¥È¤Ê±¿ÍѤ˴ؤ¹¤ë¸¦µæ
- ´Ý»³¿, ʬ»¶²½¡¦¾éĹ²½¤òÍѤ¤¤¿¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à¤Î¹â¿®Íê²½¤Ë´Ø¤¹¤ë¸¦µæ
2008ǯÅÙ†
2009ǯ3·î†
- Koji Kobayashi, Competitive Analysis of Online Problems on Networks
- Jungsuk Song, Studies on High-Performance Network Intrusion Detection System Based on Unsupervised Machine Learning
½¤»ÎÏÀʸ†
2023ǯÅÙ†
- ¹¾Ê¿ ÃÒÇ·,
Distributed Tracing for Cascading Changes of Objects in the Kubernetes Control Plane
Kubernetes À©¸æ¥×¥ì¡¼¥ó¤Ë¤ª¤±¤ë¥ª¥Ö¥¸¥§¥¯¥È¤ÎÏ¢º¿ÅªÊѹ¹¤Îʬ»¶¥È¥ì¡¼¥·¥ó¥°¼êË¡¡Ë
- Ê¿°æ ²í¿Í,
Putting Authorization Serverson User-owned Devices in User-Managed Access
¡ÊUser-Managed Access¤Ë¤ª¤±¤ë¥æ¡¼¥¶½êͤÎüËö¤Îǧ²Ä¥µ¡¼¥Ð²½¡Ë
- üâÅè °ì¼ù,
DDoS Attack Information Sharing Among CDNs Interconnected Through CDNI
¡ÊCDNI ¤òÄ̤·¤ÆÁê¸ßÀܳ¤µ¤ì¤¿ CDN ´Ö¤Ç͸ú¤ÊDDoS ¹¶·â¾ðÊó¶¦Í¼êË¡¡Ë
- ¼»³ ·òÂÀ,
Detection of Communication Quality Degradation Based on Similarity Among Time Series Data of TCP Flows Using Passive Measurement
¡Ê¥Ñ¥Ã¥·¥Ö·×¬¤òÍѤ¤¤¿ TCP ¥Õ¥í¡¼¤Î»þ·ÏÎó¥Ç¡¼¥¿´Ö¤ÎÎà»÷Å٤˴ð¤Ä゙¤¯ÄÌ¿®ÉʼÁÎô²½¤Î¸¡ÃΡË
2022ǯÅÙ†
- »ûÅÄ ·òÂÀ,
Breaking Puzzle-Based CAPTCHAs by CNN
¡Ê¥Ñ¥º¥ë·¿CAPTCHA¤ËÂФ¹¤ëCNN¤Ë¤è¤ëÆÍÇË¡Ë
- ßÀÅç ·½Í¤,
Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents
¡Ê¥Þ¥ë¥¦¥§¥¢Æ°Åª²òÀϤˤª¤±¤ë¥Õ¥¡¥¤¥ëÆâÍƤòÈëÆ¿¤·¤¿ÉôʬŪ¤Ê³°Éô°ÑÂ÷¡Ë
- ¾¾ËÜ Ä¾¼ù,
Reducing Data Transfer with Binary Delta Encoding in Container Image Updating
¡Ê¥³¥ó¥Æ¥Ê¥¤¥á¡¼¥¸¹¹¿·¤Ë¤ª¤±¤ë¥Ð¥¤¥Ê¥êº¹Ê¬Éä¹æ¤Ë´ð¤Å¤¯¥Ç¡¼¥¿Å¾Á÷Î̺︺¡Ë
- ¿åë ¹äÂç
Visibility of Attack-related Traffic Trends in Sparsely Populated Darknets
¡Ê¾®µ¬ÌÏ¥À¡¼¥¯¥Í¥Ã¥È·²¤òÍѤ¤¤¿¹¶·â´ØÏ¢¥È¥é¥Õ¥£¥Ã¥¯¤Î·¹¸þ¤Î²Ä»ëÀ¡Ë
2021ǯÅÙ†
- ¾®ÎÓ²íµ¨,
Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities
¡ÊÀȼåÀ¤ÎPoC¥³¡¼¥É¤Ë¤ª¤±¤ëÌÖÍåŪ¤Ê¼Â¹Ô¥Ñ¥¹Ãµº÷¤Ë¤è¤ëIDS ¤Î¥·¥°¥Í¥Á¥ãÀ¸À®¡Ë
- º´ÃÝÀ¿,
Competitive Analysis for the Online Facility Assignment Problem on a Line
¡ÊľÀþ¾å¤Î¥ª¥ó¥é¥¤¥ó»ÜÀß³äÅöÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ¡Ë
- È«»³¹·Âç,
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication
¡Ê¸ø³«¸°Ç§¾Ú¤Ë¤ª¤±¤ëÊ£¿ôǧ¾Ú´ï¤Î½êͼԤ˴ð¤Å¤¯¸°´ÉÍý¡Ë
2020ǯÅÙ†
- ±»ËÜÂóÌé,
Analysis of AS-Level Maps of the Internet Focusing on Placement of Vantage Points
¡ÊVantage Point¤ÎÇÛÃÖ¤ËÃå⽬¤·¤¿AS¥ì¥Ù¥ë¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥Þ¥Ã¥×¤Î²òÀÏ¡Ë
- ÂçÀ¾·ûÂÀϺ,
Network Control in a Cloud Platform Using Identities of Workloads
¡Ê¥¯¥é¥¦¥É´ðÈפˤª¤±¤ëWorkload ¤ÎIdentity ¤òÍѤ¤¤¿¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¡Ë
- À¾²¬¹¬Íè,
Mutual Secrecy of Attributes and Authorization Policies in Identity Federation
¡Êǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë°ÀÃͤÈǧ²Ä¾ò·ï¤ÎÁê¸ßÈëÆ¿¡Ë
2019ǯÅÙ†
- ¹Ó°æµ£,
Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning
¡Ê¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ëµ¡³£³Ø½¬¤òÍѤ¤¤¿¥Ü¥Ã¥È¤Î¸¡ÃΡË
- ¾¾»³Í´µ®,
Generating Stable Marriage Instances with Optimal Solutions
¡Ê°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëºÇŬ²òÉÕ¤ÎãÂêÀ¸À®¡Ë
- ÍûÅìÍÛ,
Improving Attack Detection Performance in NIDS Using GAN
¡ÊŨÂÐŪÀ¸À®¥Í¥Ã¥È¥ï¡¼¥¯(GAN)¤òÍѤ¤¤¿¥Í¥Ã¥È¥ï¡¼¥¯¿¯Æþ¸¡ÃÎ¥·¥¹¥Æ¥à(NIDS) ¤Î¹¶·â¸¡ÃÎÀǽ²þÁ±¡Ë
2018ǯÅÙ†
- ß·ÅijÊ,
Network Routing Optimization Based on Machine Learning Using Graph Networks Robust against Topology Change
¡Ê¥È¥Ý¥í¥¸¡¼ÊѲ½¤ËÂбþ¤Ç¤¤ë¥°¥é¥Õ¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿µ¡³£³Ø½¬¤Ë´ð¤Å¤¯¥Í¥Ã¥È¥ï¡¼¥¯·ÐÏ©ºÇŬ²½¡Ë
2017ǯÅÙ†
- ½©µÈμ,
Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet
¡ÊÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤È¥À¡¼¥¯¥Í¥Ã¥È¤Î´ØÏ¢ÉÕ¤±¤Ë¤è¤ë¿·¤¿¤ÊÂ絬ÌÏ¥¹¥¥ã¥ó³èÆ°¤Î¸¡ÃΡË
- ¾®´ä¹îµ±,
A Low-Interaction Honeypot Observing Attacks against HTTP/2
¡ÊHTTP/2¤ËÂФ¹¤ë¹¶·â¤ò´Ñ¬¤¹¤ëÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤Î¹½ÃÛ¡Ë
- ½¡¸÷Íã,
Tunneling-based Network Traffic Engineering Using Mixed Integer Programming
¡Êº®¹çÀ°¿ô·×²èË¡¤òÍøÍѤ·¤¿¥È¥ó¥Í¥ê¥ó¥°¤Ë¤è¤ë¥È¥é¥Õ¥£¥Ã¥¯¥¨¥ó¥¸¥Ë¥¢¥ê¥ó¥°¡Ë
- »³ºê·¼ÂÀϺ,
Xilara: An XSS Filter Based on HTML Template Restoration
¡ÊXilara: HTML¥Æ¥ó¥×¥ì¡¼¥È¤ÎÉü¸µ¤òÍѤ¤¤ëXSS¥Õ¥£¥ë¥¿¡Ë
2016ǯÅÙ†
- °Ëƣͧ¹À,
A Threshold-based Authentication System Which Provides Attributes Using Secret Sharing
¡Ê°À¾ðÊó¤òÈë̩ʬ»¶¤·¤¿ïçÃÍ·¿Ç§¾Ú¥·¥¹¥Æ¥à¡Ë
- ·¬¸¶µ®ÌÀ,
Mitigating Flooding DDoS Attacks with Per-Service Bandwidth Control at Firewalls
¡Ê¥Õ¥¡¥¤¥¢¥¦¥©¡¼¥ë¤Ë¤ª¤±¤ë¥µ¡¼¥Ó¥¹Ã±°Ì¤ÎÂÓ°èÀ©¸æ¤Ë¤è¤ë¥Õ¥é¥Ã¥É·¿DDoS ¹¶·â¤Ø¤ÎÂкö¡Ë
- ¹âȫͪ,
An Anonymous Distributed Electronic Voting System Using Zerocoin,
¡ÊZerocoin ¤òÍøÍѤ·¤¿Æ¿Ì¾Ê¬»¶·¿ÅÅ»ÒÅêɼ¥·¥¹¥Æ¥à¡Ë
2014ǯÅÙ†
- ÅÄÅç¾Èµ×,
Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN
¡Ê̵ÀþLAN¤Ë¤ª¤±¤ëWebÂδ¶ÉʼÁ¸þ¾å¤Î¤¿¤á¤Î¥Ñ¥±¥Ã¥ÈÁ÷¿®À©¸æºÇŬ²½¡Ë
- ÄÔÈø¾°¼ù,
A Traceable and Pseudonymous P2P Information Distribution System
¡Êȯ¿®¼ÔÄÉÀײÄǽ¤Ê²¾Ì¾·¿ P2P ¾ðÊóȯ¿®¥·¥¹¥Æ¥à¡Ë
- Andrew Lee,
The Minimum Diameter Multiple Steiner Tree Problem for Embedding Multiple VLANs
¡ÊÊ£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎºÇ¾®Ä¾·ÂÊ£¿ô¥¹¥¿¥¤¥Ê¡¼ÌÚÌäÂê¡Ë
2013ǯÅÙ†
- ÄÛÆâ¾Ç·,
Digital Watermarking Method on Executable Files for Tracking Illegal Uploaders
¡Ê¥½¥Õ¥È¥¦¥§¥¢ÉÔÀµ¥¢¥Ã¥×¥í¡¼¥É¼ÔÄÉÀפΤ¿¤á¤Î¼Â¹Ô·Á¼°¥Õ¥¡¥¤¥ë¤Ø¤ÎÅÅ»ÒÆ©¤«¤·ÁÞÆþ¡Ë
2012ǯÅÙ†
2013ǯ3·î†
- ²¬ËÜÂç¼ù,
Cooperative Load Distribution for Addressing Flash Crowds Using PsP File Sharing Network
¡ÊP2P¥Õ¥¡¥¤¥ë¶¦Í¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿¥Õ¥é¥Ã¥·¥å¥¯¥é¥¦¥ÉÂÑÀ¤Î¤¢¤ë¶¨Ä´·¿Éé²Ùʬ»¶¼êË¡¡Ë
- »ûËÜÂÙÂç,
Managing networks independently of the physical topology by Service Defined Network
¡ÊService Defined Network¡Ê£Ó£ö£Ä£Î¡Ë¤Ë¤è¤ëʪÍý¹½À®¤Ë°Í¸¤·¤Ê¤¤¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍý¡Ë
- ²£È«À¿Ìé,
An Extension and Evaluation of Power over Ethernet for on-Demand Power Supply
¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¤Î¤¿¤á¤ÎPower over Ethernet¤Î³ÈÄ¥¡Ë
2012ǯ9·î†
- ¾®Ã«ÂçÍ´,
Stable handling of heavy flows in OpenFlow networks
¡Ê£Ï£ð£å£î£Æ£ì£ï£÷¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¹â¥È¥é¥Õ¥£¥Ã¥¯¤Ê¥Õ¥í¡¼¤Î°ÂÄêŪ¤Ê½èÍý¡Ë
2011ǯÅÙ†
- Âç¿À¾Ä, Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation
¡Ê¥»¥¥å¥¢¤ÊID ÊÑ´¹¤Ë¤è¤ëSAMLÏ¢·È¤Ë¤ª¤±¤ë¸Ä¿Í¾ðÊó¤ÎµÕή½Ð¤Ë
ÂФ¹¤ë²¾Ì¾ÀÊݸî¡Ë
- ¹â¶¶¶Ç¹°, Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol
¡ÊHost Identity Protocol¤òÍѤ¤¤¿¥»¥¥å¥¢¤Ê¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹¥â¥Ç¥ë¤ÎÀ߷פȼÂÁõ¡Ë
- µÜËÜÂöÌé, A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking
¡Ê²ÈÄíÆ⥪¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤Ë¤ª¤±¤ëGMPLS·¿ÅÅÎÏ»ñ¸»Í½Ìó¥·¥¹¥Æ¥à¡Ë
2010ǯÅÙ†
- Àж¶Áï, Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate Authority
¡Ê¿®Íê¤Ç¤¤ëÃç²ð¼Ô¤òɬÍפȤ·¤Ê¤¤ÅÅ»Òʸ½ñÇÛã¾ÚÌÀ¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ¡Ë
- ¼ÆÅÄÃε±, The Design and Implementation of an Energy On-Demand DC Grid in Home
¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâľήÁ÷ÅÅÌÖ¤ÎÀ߷פȼÂÁõ¡Ë
- ÀÐÅÄÊݵ±, High-Performance Intrusion Detection Using OptiGrid and Grid-Based Labelling
¡ÊOptiGrid¥¯¥é¥¹¥¿¥ê¥ó¥°¤È¥°¥ê¥Ã¥É¤òÍøÍѤ·¤¿¥é¥Ù¥ê¥ó¥°¤Ë¤è¤ë¹âÀºÅ٤ʰ۾︡ÃΡË
2009ǯÅÙ†
- ÃæÅÄ·ò²ð, An Analysis of Network IDS Alerts to Grasp Attack Situation
¡Ê¥Í¥Ã¥È¥ï¡¼¥¯·¿IDS¤Î¥¢¥é¡¼¥È²òÀϤˤè¤ë¹¶·â¾õ¶·¤ÎÇÄ°®¼êË¡¡Ë
- Ê¡ÅĹä»Î, Online Algorithms for the k-Canadian Traveller Problem on Restricted Graphs
¡ÊÀ©¸Â¤µ¤ì¤¿¥°¥é¥Õ¾å¤Ç¤Îk-Canadian Traveller Problem¤ËÂФ¹¤ë¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à¡Ë
- Æ£ËÜ·½, £Ñ£ï£Å£î(Quality of Energy)Power Routing toward Energy-on-Demand Home Network
¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤Î£Ñ£ï£Å£î(¥¨¥Í¥ë¥®¡¼ÉʼÁ)¤ò¹Íθ¤·¤¿·ÐÏ©À©¸æ¡Ë
2008ǯÅÙ†
- À¶¿å·ÉÂÀ, Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange
¡ÊƱ»þÈëÌ©¸ò´¹¤òÍøÍѤ·¤¿ÇÛãÆâÍƾÚÌÀ¤¬²Äǽ¤ÊÅŻҥ᡼¥ë¥·¥¹¥Æ¥à¤ÎÀ߷פª¤è¤Ó¼ÂÁõ¡Ë
- Á°Àî·Ä»Ê, A Location Privacy Protection Framework with Mobility Using Host Identity Protocol
¡ÊHost Identity Protocol¤òÍѤ¤¤¿°ÜÆ°ÄÌ¿®¤Î¤¿¤á¤Î¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·Êݸî¥Õ¥ì¡¼¥à¥ï¡¼¥¯¡Ë
2007ǯÅÙ†
- ¹âÌÚ½Ó¹¨, Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols
¡Ê¥Þ¥¸¥Ã¥¯¥×¥í¥È¥³¥ëÍøÍѤˤè¤ë¥×¥é¥¤¥Ð¥·¡¼¤ËÇÛθ¤·¤¿Shibboleth°À¸ò´¹¤Î³ÈÄ¥¡Ë
- Á°ÅÄÊþ¹§, Path Alternation in Real-Time Video Streaming using PR-SCTP
¡ÊPR-SCTP¤ò¤â¤Á¤¤¤¿¥ê¥¢¥ë¥¿¥¤¥à±ÇÁüÅÁÁ÷¤Ë¤ª¤±¤ë·ÐÏ©ÀÚ¤êÂؤ¨¡Ë
- ¿¹Ëܾ°Ç·, Improving Competitive Ratios for the Online Graph Exploration Problem
¡Ê¥ª¥ó¥é¥¤¥ó¥°¥é¥Õõº÷ÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ¤Î²þÎÉ¡Ë
2006ǯÅÙ†
- ÂçÄíÈ»¿Í, Analysis of IDS Data over Large Scaled Open Networks and Its Visualization Utilizing Machine Learning
¡Ê³«Êü·¿Â絬Ìϥͥåȥ¥¯¤Ë¤ª¤±¤ëIDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤȵ¡³£³Ø½¬¤òÍѤ¤¤¿²Ä»ë²½¡Ë
- Æ£¸¶æÆ°ìϯ, A Privacy Enhanced Extension of Attribute Exchange in the SAML Framework and its Application to Shibboleth Authorization
¡ÊSAML¥Õ¥ì¡¼¥à¥ï¡¼¥¯¤Ë¤ª¤±¤ë°À¸ò´¹¤Î¥×¥é¥¤¥Ð¥·¡¼¤ò¶¯²½¤·¤¿³ÈÄ¥¤ª¤è¤Ó¤½¤ÎShibbolethǧ²Ä¤Ø¤ÎŬÍÑ¡Ë
- ÅÏÊÕ°ê·Ã, Design and Implementation of TCP-Friendly Multi-Path Streaming System
¡ÊÊ£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ¡Ë
2005ǯÅÙ†
- ¾®ÎÓ¹ÀÆó, Improving Competitive Ratios of Online Buffer Management for Shared-Memory Switches and Multi-Queue Switches
¡Ê¶¦Í¥á¥â¥ê·¿¥¹¥¤¥Ã¥Á¤È¥Þ¥ë¥Á¥¥å¡¼¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ¡Ë
- ÃæÌîË, Analysis for Topological Properties of Networks Feeding Netnews
¡Ê¥Í¥Ã¥È¥Ë¥å¡¼¥¹ÇÛÁ÷ÌÖ¤Î¥È¥Ý¥í¥¸¡¼¤Ë¤ª¤±¤ë½ôÀ¼Á¤Î²òÀÏ¡Ë
2004ǯÅÙ†
- À¾Â¼Í´²ð, P2P¥Í¥Ã¥È¥ï¡¼¥¯¾å¤Ç¤Î¥ª¥ó¥é¥¤¥ó¥²¡¼¥à¤Î°ÂÁ´¤Ê¼Â¹Ô
- ²«±Ï, Secure Models of Autonomous Distributed Public Wireless Internet Access Services
¡Ê¼«Î§Ê¬»¶·¿¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¢¥¯¥»¥¹¥µ¡¼¥Ó¥¹¤Î¥»¥¥å¥ê¥Æ¥£¥â¥Ç¥ë¡Ë
2003ǯÅÙ†
- ÂçÊ¿·ò»Ê, Address Assignment and Route Selection for IPv6 End-to-End Site Multihoming¡ÊIPv6¤Ë¤ª¤±¤ë¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥µ¥¤¥È¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¼Â¸½¤Î¤¿¤á¤Î¥¢¥É¥ì¥¹³äÅö¤È·ÐÏ©ÁªÂò¡Ë
- ½ïÊý¾¡Ìé, Mobility Support for RSVP with IPv6 End-to-End Multihoming
¡ÊIPv6¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¤Ë¤è¤ëRSVP¤Î¥â¥Ð¥¤¥ëÂбþ¡Ë
- ²ÃÆ£½Óºö, Cheat-Proof Serverless Network Games¡ÊÉÔÀµ¤òµö¤µ¤Ê¤¤¥µ¡¼¥Ð¥ì¥¹¥Í¥Ã¥È¥ï¡¼¥¯¥²¡¼¥à¡Ë
- ¾¾Ëܸ»Ë, Design and Implementation of End-to-End Mutihoming Systems
¡Ê¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°Êý¼°¤ÎÀ߷פȼÂÁõ¡Ë
2001ǯÅÙ†
- ¾åÅijٻË, ²èÁü¤Î¸õÊä¤ò¹Ê¤ê¹þ¤àÊ£¿ô¤Î´ð½à¤Î¼«Æ°À¸À®¤È¤½¤ÎÁªÂò¤Ë´ð¤Å¤¯²èÁüõº÷
- ËÌÀîÂóϺ, NOTASIP¤Ë´ð¤Å¤¤¤¿¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÅÅÏÃ¥·¥¹¥Æ¥à
- º´¡¹ÌÚ´ðÀ², ³¬Áز½QoS¥ë¡¼¥Æ¥£¥ó¥°¥×¥í¥È¥³¥ë¤Ë¤ª¤±¤ë¥ê¥ó¥¯¾ðÊó¹¹ð¼êË¡
- À¹°Ò, QoSÊݾڥޥë¥Á¥¥ã¥¹¥ÈÂбþIP¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë²Ý¶â¥×¥í¥È¥³¥ë¤ÎÀ߷פȼÂÁõ
¹©³ØÉô¾ðÊó³Ø²Ê·×»»µ¡²Ê³Ø¥³¡¼¥¹ÆÃÊ̸¦µæÊó¹ð½ñ†
2023ǯÅÙ†
- ¾åÅÄÁó°ìϯ, unikernel ¤òÍѤ¤¤¿³ÖÎ¥À¡¦²ÄÈÂÀ¤Î¹â¤¤WebAssembly ¤Î¼Â¹Ô´Ä¶
- ÊÒ²¬ËêÇ·²ð, ¥Í¥Ã¥È¥ï¡¼¥¯µóÆ°¾ðÊó¤òÍøÍѤ·¤¿SPA¥Ù¡¼¥¹¤ÎưŪ¥¢¥¯¥»¥¹À©¸æ
- ½Õ̾·òÂÀϺ, P4¤Ç¤ÎXor Filter¤ò⽤¤¤¤¿¥á¥â¥ê¸úΨ¤Î⾼¤¤¥É¥á¥¤¥ó¥Ö¥í¥Ã¥¯¥ê¥¹¥È
2022ǯÅÙ†
- ÀÄ»³ ÂçÚð,
TLS¥»¥Ã¥·¥ç¥ó¥ê¥µ¥ó¥×¥·¥ç¥ó¤òÍøÍѤ·¤¿¥¯¥é¥¦¥É´ÉÍýIoT¥Ç¥Ð¥¤¥¹¤Î¾ÚÌÀ½ñ¼º¸ú¸å¤ÎÉüµìÍÑÄÌ¿®Ï©¤Î³ÎÊÝ
- Èø¾å ´²Ìï,
Ê£¿ô´Ä¶¤Ç¥Þ¥¤¥¯¥í¥µ¡¼¥Ó¥¹¤ò¶¦ÍѤ¹¤ë¤¿¤á¤Î¥×¥í¥È¥³¥ëÈó°Í¸¤Ê¥³¥ó¥Æ¥¯¥¹¥ÈÅÁÇÅ
- ²¼ÅÄ ¹¯À¤,
¥¢¥Ê¥í¥°¡¦¥Ç¥£¥¸¥¿¥ëÊ»ÍѤΰۼï¾éĹ¤Ê·×¬·Ï¤Ë¤è¤ë¥Ç¡¼¥¿´°Á´À¤È²ÄÍÑÀ¤ÎÊݸî
2021ǯÅÙ†
- ¹¾Ê¿ÃÒÇ·,
KubernetesÀ©¸æ¥×¥ì¡¼¥ó¤Ë¤ª¤±¤ë½¾Â°¥ê¥½¡¼¥¹¤ÎÏ¢º¿ÅªÊѹ¹¤Î´Æ»ë
- Ê¿°æ²í¿Í,
¥¼¥í¥È¥é¥¹¥Èǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë°Û¤Ê¤ë¥Ç¡¼¥¿¥½¡¼¥¹´Ö¤Î¥³¥ó¥Æ¥¥¹¥È¤Îɳ¤Å¤±
- ¼»³·òÂÀ,
Ê£¿ô¤ÎTCP¥Õ¥í¡¼¤Î¥Ñ¥Ã¥·¥Ö·×¬¤Ë¤è¤ë¾åή¥Í¥Ã¥È¥ï¡¼¥¯¤Î¾õÂÖ¿äÄê
2020ǯÅÙ†
- »ûÅÄ·òÂÀ,
¥¯¥é¥¦¥É·¿CAPTCHA¤ËÂФ¹¤ëbot¤Ë¤è¤ë¥¢¥¯¥»¥¹¤ÎʬÀÏ
- ßÀÅç ·½Í¤,
ÂÐÏÃŪ¤ËÄÌ¿®À©¸æ¤¬²Äǽ¤Ê¥Þ¥ë¥¦¥§¥¢²òÀÏ¥·¥¹¥Æ¥à
- ¾¾ËÜľ¼ù,
¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¥±¥¤¥Ñ¥Ó¥ê¥Æ¥£¤Ë´ð¤Å¤¯¥æ¡¼¥¶¡¼¼çÂΤÎǧ²ÄµÚ¤Ó¥¢¥¯¥»¥¹À©¸æ
2019ǯÅÙ†
- ¾®ÎÓ²íµ¨,
À©¸æ¥Ñ¥¹¤ÎÁ´Îóµó¤Ë¤è¤ëMetasploit¹¶·â¥³¡¼¥É¤¬½ÐÎϤ¹¤ë¹¶·â¥Ñ¥±¥Ã¥È¤ÎÌÖÍåŪÀ¸À®
- È«»³¹·Âç,
¥¼¥í¥È¥é¥¹¥Èǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë¥æ¡¼¥¶Æ±°ÕÉÕ¤¥³¥ó¥Æ¥¥¹¥È¶¦Í
- º´ÃÝÀ¿,
À©¸Â¤µ¤ì¤¿¥ª¥ó¥é¥¤¥óÆóÉô¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ
2018ǯÅÙ†
- ±»ËÜÂóÌé,
¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Ë¤ª¤±¤ë°Û¤Ê¤ëÃÏ°è¤ÎTier2¤ÎASƱ»Î¤ÎÀܳ´Ø·¸¤ÎʬÀÏ
- ÎÓϹ¬,
¥µ¥¤¥Ð¡¼¶¼°Ò¾ðÊó¤Ë´ð¤Å¤¯¥¤¥ó¥·¥Ç¥ó¥ÈȯÀ¸·¹¸þ¤Îͽ¬
- À¾²¬¹¬Íè,
Shibboleth¤Ç¤Î¥·¥ó¥°¥ë¥µ¥¤¥ó¥ª¥ó¤Ë¤ª¤±¤ë¥¢¥«¥¦¥ó¥È°ÜÆ°¤Î°ì³çÀ©¸æ
- ¼ãÎÓ·Ä,
¥È¥é¥Õ¥£¥Ã¥¯·¹¸þ¤Ë´ð¤Å¤¤¤¿Access Control List¤ÎºÆ¹½ÃÛ
2017ǯÅÙ†
- ¹Ó°æµ£,
¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ë¥ê¥¹¥¯¥Ù¡¼¥¹Ç§¾Úµ»½Ñ¤ÎÍøÍÑ
- ¾¾»³Í´µ®,
ºÇÂ祵¥¤¥º°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëºÇŬ²ò¤¬´ûÃΤÎÎãÂêÀ¸À®
2001ǯÅÙ†
- ³Þ¾¾·ò°ì, ¥³¥Þ¥ó¥É¥Ñ¥¤¥×¥é¥¤¥ó¤Ë¤è¤ë¥Þ¥ë¥Á¥á¥Ç¥£¥¢¥¹¥È¥ê¡¼¥à½èÍý
- ¾¾Ëܸ»Ë, ¥â¥Ð¥¤¥ë¥Í¥Ã¥È¥ï¡¼¥¯¥¢¡¼¥¥Æ¥¯¥Á¥ãLIN6¤Î¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°Âбþ
ÏÀʸ
Last-modified: 2024-07-14 (Sun) 18:34:13