Top/local%2F%CF%A2%CD%ED%C0%E8%C9%BD

2022ǯÅÙ

¸ýƬȯɽ¤Ê¤É

2021ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • Ëöåô ¹ãµ±¡¤µÜºê ½¤°ì, ÊÔ½¸¸åµ­¡ÖÁȹ礻¥²¡¼¥àÍýÏÀ¡×Æý¸¹æ¤ò´ë²è¤·¤Æ, ¥·¥¹¥Æ¥àÀ©¸æ¾ðÊó³Ø²ñ»ï, Âè65´¬ Âè10¹æ, p. 425, 2021ǯ10·î¹æ.

2020ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

2019ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • ²¬Éô¼÷ÃË, ²Ê¸¦Èñ¤Ë¤ª¤±¤ë¼ã¼ê¸¦µæ¼Ô»Ù±ç, ±þÍÑʪÍý, Vol.88, No.8, pp.547-549, 2019ǯ8·î.
  • ²¬Éô¼÷ÃË, ÄÍËܾ»É§, À±Ìî´², Antonio Kung, Laula Fiorini, Delphine Lefebvre, Horizon 2020¤Ë¤è¤ëÆü²¤¶¦Æ±¸¦µæ³«È¯ACCRA¥×¥í¥¸¥§¥¯¥È, ¥í¥Ü¥Ã¥È, No.248, pp.4-10, 2019ǯ5·î.

¤½¤Î¾

2018ǯÅÙ

ÏÀʸ»ïÏÀʸ

  • Jose C. Nacher, Masayuki Ishitsuka, Shuichi Miyazaki, Tatsuya Akutsu, Finding and analysing the minimum set of driver nodes required to control multilayer networks, Scientific Reports, volume 9, Article number: 576, January 2019.
  • Grazia D¡ÇOnofrio, Laura Fiorini, Hiroshi Hoshino, Aiko Matsumori, Yasuo Okabe, Masahiko Tsukamoto, Raffaele Limosani, Alessandra Vitanza, Francesca Greco, Antonio Greco, Francesco Giuliani, Filippo Cavallo, Daniele Sancarlo, Assistive robots for socialization in elderly people: results pertaining to the needs of the users, Aging Clin Exp Res (2018) pp 1–17, Dec. 2018.
  • Grazia D¡ÇOnofrio, Laura Fiorini, Marleen de Mul, Isabelle Fabbricotti, Yasuo Okabe, Hiroshi Hoshino, Raffaele Limosani, Alessandra Vitanza, Francesca Greco, Francesco Giuliani, Denis Guiot, Eloïse Senges, Antonio Kung, Filippo Cavallo, Daniele Sancarlo, Antonio Greco, Agile Co-Creation for Robots and Aging (ACCRA) Project: new technological solutions for older people, European Geriatric Medicine, Volume 9, Issue 6, pp 795–800, December 2018.
  • À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²£ÅÄ ¸­»Ë, ²¬Éô ¼÷ÃË, Åý¹çID¤Ë´ð¤Å¤¯¸úΨŪ¤Ê¸¢¸Â°Ü¾ù¤¬²Äǽ¤Ê¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à, ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï¥³¥ó¥·¥å¡¼¥Þ¡¦¥Ç¥Ð¥¤¥¹¡õ¥·¥¹¥Æ¥à¡ÊCDS¡Ë, Vol. 8, No. 3, pp.20-31, 2018ǯ10·î.

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

¤½¤Î¾

2017ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

  • Shuichi Miyazaki and Kazuya Okamoto, Jointly Stable Matchings, Proc. 28th International Symposium on Algorithms and Computation (ISAAC 2017), pp. 56:1-56:12, December 2017.
  • Kazuma Matsumoto, and Yasuo Okabe, A Collusion-resilient Hybrid P2P Framework for Massively Multiplayer Online Games, The 5th IEEE International COMPSAC Workshop on Consumer Devices and Systems (CDS), in Proc. IEEE 41th Annual Computer Software and Applications Conference (COMPSAC2017), Vol. 2, pp.342-347, July 2017.
  • Tomohiro Ito, Daisuke Kotani, and Yasuo Okabe, A Threshold-based Authentication System Which Provides Attributes Using Secret Sharing, The 3rd IEEE International COMPSAC Workshop on Secure Identity Management in the Cloud Environment (SIMICE), in Proc. IEEE 41th Annual Computer Software and Applications Conference (COMPSAC2017), Vol. 2, pp.730-735, July 2017.
  • Hiroki Nakano, Yasuo Okabe, Toward Implementing Power Packet Networks, Proc. 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), pp.201-202, June 2017.

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

¤½¤Î¾


2016ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

  • Yoshiharu Tsuzaki, Yasuo Okabe, Reactive Configuration Updating for Intent-Based Networking, The 31st International Conference on Information Networking (ICOIN2017), Jan. 2017.
  • Yoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Okamoto Manabu, Identifying Link Layer Home Network Topologies Using HTIP, 14th Annual IEEE Consumer Communications & Networking Conference, pp. 892-899, Jan. 2017.
  • Sushmita Gupta, Kazuo Iwama, and Shuichi Miyazaki, Total Stability in Stable Matching Games, Proc. the 15th Scandinavian Symposium and Workshops on Algorithm Theory, (SWAT 2016), pp. 23:1-23:12, June 2016.
  • Sato Hiroyuki, Yasuo Okabe, Nakamura Motonori, User Identification of Pseudonyms without Identity Information Exposure in Access Federations, Proc. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC2016), Vol. 1, pp.487-492, June 2016.
  • Yasuo Okabe, Takaaki Komura, Hiroyuki Sato, Kazutsuna Yamaji, Motonori Nakamura, An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other, Second IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking (MidCCI2016), in Proc. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC2016), Vol. 2, pp.202-207, June 2016.
  • Teruhisa Tajima, Yasuo Okabe, Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN, The 4th IEEE International Workshop on Consumer Devices and Systems (CDS), in Proc. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC2016), Vol. 2, pp.312-318, June 2016.

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

¤½¤Î¾

  • µÜºê½¤°ì, ¥³¥ó¥Ô¥å¡¼¥¿¥µ¥¤¥¨¥ó¥¹¤Î¿ô³Ø¡¡¡Á¥¢¥ë¥´¥ê¥º¥àÍýÏÀ¡¢°ÂÄê·ëº§ÌäÂê¡¢P¡âNPͽÁÛ¡Á, µþÅÔÂç³Ø¥µ¥Þ¡¼¥¹¥¯¡¼¥ë2016, 2016ǯ8·î19Æü

2015ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

¤½¤Î¾

2014ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

  • Andrew Lee, µÜºê½¤°ì, ²¬Éô¼÷ÃË, Ê£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎºÇ¾®Ä¾·ÂÊ£¿ô¥¹¥¿¥¤¥Ê¡¼ÌÚÌäÂê, ¾ðÊó½èÍý³Ø²ñÂè77²óÁ´¹ñÂç²ñ, 4W-09, 2015ǯ3·î.
  • ÄÔÈø¾°¼ù, ²¬Éô¼÷ÃË, ȯ¿®¼ÔÄÉÀײÄǽ¤«¤Ä²¾Ì¾·¿¤ÎP2P¾ðÊóȯ¿®¥·¥¹¥Æ¥à, ¾ðÊó½èÍý³Ø²ñÂè77²óÁ´¹ñÂç²ñ, 4X-02, 2015ǯ3·î.
  • ÅÄÅç¾Èµ×, ²¬Éô¼÷ÃË, Web¥Ö¥é¥¦¥¸¥ó¥°¹â®²½¤Î¤¿¤á¤ÎTCP¥Ø¥Ã¥À¤Ë´ð¤Å¤¯802.11̵ÀþÄÌ¿®ºÇŬ²½, ¾ðÊó½èÍý³Ø²ñÂè77²óÁ´¹ñÂç²ñ, 3X-06, 2015ǯ3·î, ³ØÀ¸¾©Îå¾Þ¼õ¾Þ.
  • Andrew Lee, µÜºê½¤°ì, ²¬Éô¼÷ÃË, Ê£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎìÅÍߥ¢¥ë¥´¥ê¥º¥à¤Îɾ²Á, ¿®³Øµ»Êó, vol. 114, no. 495, IA2014-105, pp. 143-147, 2015ǯ3·î.
  • ºä°æ°ìÈþ, ²¬Éô¼÷ÃË, ÃæÌîÇî¼ù, ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥·¥ß¥å¥ì¡¼¥¿, µþÅÔÂç³ØÂè9²óICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2015ǯ3·î.
  • À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²¬Éô ¼÷ÃË, ¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à¤Ë¤ª¤±¤ë¥°¥ë¡¼¥×´ÉÍý¼Ô¤Î¸úΨŪ´ÉÍý, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, 2015-IOT-28, 35, pp.1-6, 2015ǯ2·î.
  • ²¬Éô¼÷ÃË, Energy on DemandÅÅÎÏÀ©¸æ¤Î¤¿¤á¤ÎÅÅÎϼûÍ×ͽ¬¤È¥×¥é¥¤¥Ð¥·¡¼, ÅìËÌÂç³ØÅŵ¤ÄÌ¿®¸¦µæ½êÊ¿À®26ǯÅÙ¶¦Æ±¥×¥í¥¸¥§¥¯¥È¸¦µæ¡Ö¾ðÊó¤Îή¤ì¤ËÃåÌܤ·¤¿¿·À¤Âå¾ðÊó½èÍý´ðÈ×µ»½Ñ¤Ë´Ø¤¹¤ë¸¦µæ¡×ȯɽ²ñ, 2014ǯ12·î.
  • ÄźêÁ±À², ²¬Éô¼÷ÃË, ¿·Îï, ÎÓãÌé, ²¬ÅĹ̻Ê, ÎëÌÚÌкÈ, Ãæ¼½¤, LACCOONS:¥Í¥Ã¥È¥ï¡¼¥¯»ÅÍÍÄêµÁ¤Ë¤è¤ë¹­°èʬ»¶¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°±¿ÍÑ´ÉÍý¥·¥¹¥Æ¥à, Âè36²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¸¦µæ²ñCISʬ²Ê²ñ¡¤2014ǯ11·î.
  • ºä°æ°ìÈþ, ²¬Éô¼÷ÃË, ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥×¥í¥È¥³¥ë¤Î¸¡Æ¤, Âè36²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¸¦µæ²ñ¥Ç¥â¾Ò²ð¥»¥Ã¥·¥ç¥ó¡¤2014ǯ11·î.
  • ÄÔÈø¾°¼ù,²¬Éô¼÷ÃË, ¼«¼£¤¬²Äǽ¤ÊP2P·¿Æ¿Ì¾Publish/Subscribe¥·¥¹¥Æ¥à, ¿®³Øµ»Êó, Vol. 114, No. 335, IA2014-63, pp.13-27, 2014ǯ11·î.
  • ÅÄÅç¾Èµ×,²¬Éô¼÷ÃË, 802.11̵ÀþLAN¤Ë¤ª¤±¤ë¥Ð¥Ã¥¯¥ª¥Õ»þ´Ö¤ÎÀ©¸æ¤È¥¢¥¯¥»¥¹¥Ý¥¤¥ó¥È¤Î¥Ð¥Ã¥Õ¥¡ºÇŬ²½¤Ë¤è¤ëÄãÃÙ±ä̵Àþ¤ÎÄó°Æ, ¿®³Øµ»Êó, Vol. 114, No. 335, IA2014-65, pp.25-27, 2014ǯ11·î.
  • ¾¾ËÜμ²ð, mod_mruby: ¥¹¥¯¥ê¥×¥È¸À¸ì¤Ç¹â®¤«¤Ä¾Ê¥á¥â¥ê¤Ë³ÈÄ¥²Äǽ¤ÊWeb ¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½, Embedded Technology 2014¥¹¥Ú¥·¥ã¥ë¥»¥Ã¥·¥ç¥óC-2, 2014ǯ11·î.
  • À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²¬Éô ¼÷ÃË: ´ÉÍý¸¢¸Â¤ò°ìÈ̥桼¥¶¤Ë¤â°Ü¾ù¤Ç¤­¤ë¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, 2014-IOT-27, 18, pp.1-6, 2014ǯ10·î.
  • È«»³µ®¹Ô, µÜºê½¤°ì, ¥Þ¥¸¥Ã¥¯¥×¥í¥È¥³¥ë¤òÍѤ¤¤¿P2P´Ä¶­¤Ç¤Î¸øÀµ¤Ê¥Í¥Ã¥È¥ï¡¼¥¯¥Ö¥é¥Ã¥¯¥¸¥ã¥Ã¥¯, Ê¿À®26ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ D-01, 2014ǯ9·î.
  • »³ºêÊþºÈ, µÜºê½¤°ì, ¸ø³«¸°°Å¹æ¤òÍѤ¤¤¿P2P·¿¥Í¥Ã¥È¥ï¡¼¥¯Ëã¿ý¾­´ý, Ê¿À®26ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ D-02, 2014ǯ9·î.
  • ÅÄÅç¾Èµ×, ²¬Éô¼÷ÃË, 802.11̵ÀþLAN¤Ë¤ª¤±¤ëÊ£¿ôüËö¤ÎÁ÷¿®¥¿¥¤¥ß¥ó¥°À©¸æ¥·¥ß¥å¥ì¡¼¥·¥ç¥ó, Ê¿À®26ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ E-12, 2014ǯ9·î.
  • ½ÅÌ²¬Éô¡¦²Ï¸ý¡¦ÄÍËÜ¡¦ÆÁÅÄ, ¾ðÊóή ¡ß IoT¡Ê¥Ñ¥Í¥ëƤÏÀ¡Ë, FIT2014 ¾ðÊó¤Îή¤ì¤ËÃåÌܤ·¤¿¼Â»þ´Öʬ»¶½èÍý´ðÈ× - IoT¤È¥¯¥é¥¦¥É¥½¡¼¥·¥ó¥°¤Î´ÑÅÀ¤«¤é -, 2014ǯ9·î.
  • ÊÒ»³·òÂÀϺ, µÆÃÓÀµ»Ë, »³ÅÄÀ», ÂçÄÍÈ»¿Í, ²¬ÅĹ̻Ê, ²¬Éô¼÷ÃË, ÄÅùõÁ±À², ¿·Îï, ÎÓãÌé, ¥Í¥Ã¥È¥ï¡¼¥¯»ÅÍÍÄêµÁ¤Ë¤è¤ë¹­°èʬ»¶¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°±¿ÍÑ´ÉÍý¥·¥¹¥Æ¥à¤Î³«È¯, Âè6²ó¿·À¤Âå¥Í¥Ã¥È¥ï¡¼¥¯¥·¥ó¥Ý¥¸¥¦¥à, 2014ǯ7·î
  • À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²¬Éô ¼÷ÃË, Åý¹çID¤È°À­¤òÍѤ¤¤¿¥°¥ë¡¼¥×¤ÎÂηϲ½, ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2014)¥·¥ó¥Ý¥¸¥¦¥à 3G-4, 2014ǯ7·î.
  • ¾¾ËÜμ²ð, º£¤É¤­¤ÎWEB¥Û¥¹¥Æ¥£¥ó¥°¤Î¹âÉé²ÙÂкö, Hosting Casual Talks #1 at ³ô¼°²ñ¼Ò¤Ï¤Æ¤Ê, 2014ǯ6·î.
  • ÄÅùõÁ±À², Ʊ°ì¤ÎÁ÷¼õ¿®¥¢¥É¥ì¥¹¤ò»ý¤ÄÂçÎ̥᡼¥ë¤Î ¸úΨŪȽÄê¼êË¡, Hosting Casual Talks #1 at ³ô¼°²ñ¼Ò¤Ï¤Æ¤Ê, 2014ǯ6·î.
  • ¾®ÎÓ¹ÀÆó¡¤À½ã¡¤µÜºê½¤°ì¡¤¥ª¥ó¥é¥¤¥ó¥Õ¥ì¡¼¥àžÁ÷Î̺ÇÂç²½ÌäÂê¤Ë¤ª¤±¤ë¶¥¹çÈæ¤Î²þÎÉ, ¿®³Øµ»Êó¡¤Vol.114, No.19, COMP2014-6 (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ), pp.37-44, 2014ǯ4·î.
  • µÜºê½¤°ì¡¤¶á»÷¥¢¥ë¥´¥ê¥º¥à¤È°ÂÄê¥Þ¥Ã¥Á¥ó¥°¡¤µþÅÔÂç³Ø·ÐºÑ¸¦µæ½ê ¥ß¥¯¥í¡¦¥²¡¼¥àÍýÏÀ¸¦µæ²ñ¡¤2014ǯ4·î3Æü.

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

¹ñºÝɸ½à²½Äó°Æ

2013ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

  • Jun Kawahara, Koji M. Kobayashi, Shuichi Miyazaki, Better Bounds for Online k-Frame Throughput Maximization in Network Switches, Proc. 24th International Symposium on Algorithms and Computation (ISAAC 2013) (Lecture Notes in Computer Science 8283), pp. 218-228, Dec., 2013.
  • Yoshiharu Tsuzaki, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, Yasuo Okabe, A Mail Transfer System Selectively Restricting a Huge Amoount of E-mails, Workshop on Resilient Internet based Systems (REIS 2013), pp. 896-900, Dec. 2013.
  • Hiroki Okamoto, Ryosuke Matsumoto, Yasuo Okabe, Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network, IEEE 37th Annual International Computer Software and Applications Conference (COMPSAC2013), July 2013.
  • Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe, Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities Across Shibboleth SPs, The 7th International Workshop on Middleware Architecture in the Internet (MirArch2013) (Proc. IEEE COMPSAC2013 Workshops), July 2013.
  • Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji, Privacy Enhancing Proxies in Attribute Release:Two Approaches, The 7th International Workshop on Middleware Architecture in the Internet (MirArch2013) (Proc. IEEE COMPSAC2013 Workshops), July 2013.
  • Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe, Power Allocation Algorithms of PoE for on-Demand Power Supply The 1st IEEE International Workshop on Consumer Devices and Systems (CDS2013), (Proc. IEEE COMPSAC2013 Workshops), July 2013.
  • Yasuhiro Teramoto, Rei Atarashi, Yoshifumi Atarashi, Yasuo Okabe, Managing Networks Independently of the Physical Topology by Service Defined Network, The 1st IEEE International Workshop on Architecture, Design, Deployment and Management of Networks and Applications (ADMNET2013), (Proc. IEEE COMPSAC2013 Workshops), July 2013.

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

2012ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • ¾¾»³Î´»Ê¡¦²ÃÆ£¾æÏ¡¦ÄÍËܾ»É§¡¦Ã°¹¯Íº¡¦²¬Éô¼÷ÃË, ¥³¥ó¥·¥å¡¼¥Þ¤¬ÀÚ¤êÂ󤯥ǥ£¥¸¥¿¥ë²½¼Ò²ñ¤Î¿·¤·¤¤Ä¬Î®¡§2. ¥°¥ê¡¼¥óICT¤Ë¤è¤ë¥¹¥Þ¡¼¥È¤Ê¼Ò²ñ¤ÎÁϽР¾ðÊó½èÍý, 53(10), pp.1021-1027, 2012ǯ9·î

¹ñºÝɸ½à²½Äó°Æ

2011ǯÅÙ

ÏÀʸ»ïÏÀʸ

  • Å粬À¯´ð¡¦ÊÒ²¬½Ó¹¬¡¦Ã«ËÜÌÐÌÀ¡¦À¾Â¼·ò¡¦»³ÃÏ°ìÄ÷¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË, Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±Ç§¾Ú´ðÈ×UPKI¤Î¥¢¡¼¥­¥Æ¥¯¥Á¥ãÀ߷ס¡¡Ê¾·ÂÔÏÀʸ¡Ë, ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J94-B, No.10, pp.1246-1260, Oct. 2011.
  • ëËÜÌÐÌÀ¡¦Å粬À¯´ð¡¦ÊÒ²¬½Ó¹¬¡¦À¾Â¼·ò¡¦»³ÃÏ°ìÄ÷¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË, Âç³Ø´Öǧ¾ÚÏ¢·È¤Î¤¿¤á¤Î¥­¥ã¥ó¥Ñ¥¹PKI¶¦ÄÌ»ÅÍ͡ʸ¦µæ®Êó¡Ë, ÅŻҾðÊóÄÌ¿®³Ø²ñ, Vol.J94-B, No.10, pp.1383-1388, Oct. 2011.

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • °ñÌÚ½Ó½¨¡¦ÊÒ»³Å°¡¦Æ£½Å¸ç ´Æ½¤, ÂÀÅIJ÷¿Í¡¦¼ò°æ±Ñ¾¼¡¦¹â¶¶Ë­¡¦ÅÄÃæÍø¹¬¡¦±Ê»ý¿Î¡¦Ê¡Åç²íÉ× ÊÔ½¸, ¿ôÍý¹©³Ø»öŵ(µÜºê: 4.3 ʬ³äÅý¼£Ë¡, 4.4 ÍðÂò¥¢¥ë¥´¥ê¥º¥à¤òôÅö), Ä«ÁÒ½ñŹ, 2011ǯ11·î15Æü´©¹Ô.
  • ²¬Éô¼÷ÃË, ¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯, ¥·¥¹¥Æ¥à/À©¸æ/¾ðÊó Vol.55, No.6,¡Ö¥¨¥Í¥ë¥®¡¼¥·¥¹¥Æ¥à¤Î¿·Å¸³«¡ÝICT¤Ë¤è¤ë¾ÃÈñ¾ðÊó¤Î¼ý½¸¤ÈÍøÍÑ¡×Æý¸¹æ pp.221-226¡¤2011ǯ6·î

¤½¤Î¾

2010ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

2009ǯÅÙ

ÏÀʸ»ïÏÀʸ

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

  • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, A Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking, The 2009 International Workshop on Forensics for Future Generation Communication environments (F2GC), IEEE,pp.561--568, Jeju Korea,Dec 2009
  • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, Semi-Blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques, The 8th International Workshop on Digital Watermarking (IWDW09), LNCS 5703, pp.14--28, Guildford, UK, Aug 2009.
  • Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe, Competitive Buffer Management for Multi-Queue Switches in QoS Networks using Packet Buffering Algorithms, 21st ACM Symposium on Parallelism in Algorithms and Architectures (SPAA2009), pp.328-336, Calgary, Canada August 11 - 13, 2009.
  • Keita Shimizu, Shuichi Miyazaki, Yasuo Okabe, Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange The 2009 International Symposium on Applications and the Internet (SAINT2009), pp. 37-42, Seattle, USA, 20 - 24 July 2009.
  • Keiji Maekawa, Yasuo Okabe, An Enhanced Location Privacy Framework with Mobility Using Host Identity Protocol, The 2009 International Symposium on Applications and the Internet (SAINT2009), pp. 23-29, Seattle, USA, 20 - 24 July 2009.
  • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking, The Third Workshop on Middleware Architecture in the Internet (MidArc2009) (held as a part of SAINT2009), Seattle, USA, 20 - 24 July 2009.
  • Toshiyuki Kataoka, Takeshi Nishimura, Masaki Shimaoka, Kazutsuna Yamaji, Motonori Nakamura, Noboru Sonehara, Yasuo Okabe, Leveraging PKI in SAML2.0 Federation for Enhanced Discovery Service, The Third Workshop on Middleware Architecture in the Internet (MidArc2009) (held as a part of SAINT2009), Seattle, USA, 20 - 24 July 2009.

¸ýƬȯɽ¤Ê¤É

  • Æ£ËÜ·½¡¦¾®»³Íΰ졦²¬Éô¼÷ÃË, ÅÅÎÏ·ÐÏ©À©¸æ¤Ë¤ª¤±¤ëÅŸ»Â¦¼çƳ»ñ¸»Í½Ìó, ÅŻҾðÊóÄÌ¿®³Ø²ñ2010ǯÁí¹çÂç²ñ BS-8-2, 2010ǯ3·î.
  • ¼ÆÅÄÃε±¡¦Æ£ËÜ¡¡·½¡¦²¬Éô¼÷ÃË, ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤ÎÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á. ÅŻҾðÊóÄÌ¿®³Ø²ñ2010ǯÁí¹çÂç²ñ BS-8-3, 2010ǯ3·î.
  • ¿¹Ëܾ°Ç·¡¦µÜºê½¤°ì¡¦²¬Éô¼÷ÃË, 2Éô¥°¥é¥Õ¾å¤Ç¤Îʬô¶¡µë²Äǽ¤Ê³äÅö¤ÆÀ©¸ÂÉÕ¤­»ñ¸»ÇÛʬÌäÂê, ÅŻҾðÊóÄÌ¿®³Ø²ñ2010ǯÁí¹çÂç²ñ BS-8-11, 2010ǯ3·î.
  • ²¬Éô¼÷ÃË,¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¥×¥í¥¸¥§¥¯¥È¤Ë´Ø¤¹¤ëÁ´ÂÎÀâÌÀ, ¾ðÊó½èÍý³Ø²ñÁÏΩ50¼þǯµ­Ç°Á´¹ñÂç²ñ º£¥É¥­¥Ã¤ÎIT@¸æŲ¼µ­Ç°´Û2010Ÿ¼¨´ØÏ¢¹Ö±é, 2010ǯ3·î.
  • Æ£ËÜ·½,¼ÆÅÄÃε±,²¬Éô¼÷ÃË, ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤Î£Ñ£ï£Å£î(Quality of Energy¡Ë·ÐÏ©À©¸æ¤ÈÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á, ¾ðÊó½èÍý³Ø²ñÁÏΩ50¼þǯµ­Ç°Á´¹ñÂç²ñº£¥É¥­¥Ã¤ÎIT@¸æŲ¼µ­Ç°´Û2010Ÿ¼¨´ØÏ¢¹Ö±é, 2010ǯ3·î.
  • ¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË¡¦Ãæ¼ÁÇŵ, SAMLÏ¢·È¤òÍѤ¤¤Æ¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·¤ò¼é¤ëeduroam¥¢¥«¥¦¥ó¥ÈÍøÍÑÊý¼°, ¿®³Øµ»Êó, vol. 109, no. 438, IA2009-109, pp. 153-158, 2010ǯ3·î.
  • À¾Â¼·ò¡¦Å粬À¯´ð¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË, UPKI¾ÚÌÀ½ñ¼«Æ°È¯¹Ô¸¡¾Ú¥×¥í¥¸¥§¥¯¥È¤Î¥·¥¹¥Æ¥à°Ü¹Ô¤Ë¤ª¤±¤ë²ÝÂê¤ÈÂкö, ¿®³Øµ»Êó, vol. 109, no. 438, IA2009-113, pp. 225-228, 2010ǯ3·î.
  • Å粬À¯´ð¡¦À¾Â¼·ò¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË, UPKI¥µ¡¼¥Ð¾ÚÌÀ½ñ¥×¥í¥¸¥§¥¯¥È¤Ë¤ª¤±¤ë¾ÚÌÀ½ñ¼«Æ°È¯¹Ô»Ù±ç¥·¥¹¥Æ¥à¤Î³«È¯ ¿®³Øµ»Êó, vol. 109, no. 438, IA2009-114, pp. 229-234, 2010ǯ3·î.
  • ²¬Éô¼÷ÃË, ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½¥×¥í¥¸¥§¥¯¥È(Áí³ç), Âçºå¹ñºÝ¥µ¥¤¥¨¥ó¥¹¥¯¥é¥Ö Â裹´ü¶âÍË¥µ¥¤¥¨¥ó¥¹¥µ¥í¥ó¡Ö¥°¥ê¡¼¥óIT¡ÁIT/ICT¤È´Ä¶­¡Á¡×, 2010ǯ2·î.
  • ²¬Éô¼÷ÃË, ÄãúÁǼҲñ¤Î¼Â¸½¤Ë¤à¤±¤¿¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽤ˤĤ¤¤Æ, ¥¹¥Þ¡¼¥È¥»¥ó¥µ¡¼¥Õ¥©¡¼¥é¥à ÂèÏ»²ó¾¦¶È¶õ´Ö¥½¥ê¥å¡¼¥·¥ç¥ó¡Áµ»½Ñ¸¡Æ¤²ñ¡Á, 2010ǯ2·î.
  • ²¬Éô¼÷ÃË, ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¤Ë¤Ä¤¤¤Æ, £Ê£Ç£Î£²£ð£ì£õ£ó»Í¹ñÏ¢Íí¶¨µÄ²ñ¥»¥ß¥Ê¡¼inÆÁÅç¡Ê´ðÄ´¹Ö±é¡Ë,2010ǯ2·î.
  • º´¡¹ÌÚ,¼êÄÍ,Ëþ±ö,°¤Æ£,²¬Éô,ÅÄÃæ,¾¾±Ê,ÀÄÌÚ: ¥Ý¥ê¥·¡¼¡ÊJCAN¥Ó¥¸¥Í¥¹CP¡Ë¡Ê¥Ñ¥Í¥ë¡Ë, ÅÅ»Òǧ¾Ú¤Î̱´ÖÀ©ÅÙ¡¦´ðÈפγÎΩ¤Ë´Ø¤¹¤ë¥·¥ó¥Ý¥¸¥¦¥à,2010ǯ2·î.
  • Ê¡ÅĹä»Î, µÜºê½¤°ì, ²¬Éô¼÷ÃË, »Þ¥³¥¹¥È¤ËÀ©¸Â¤ò²Ã¤¨¤¿k-Canadian Traveler Problem¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ, ¿®³Øµ»Êó¡¤Vol.109, No. 391, COMP2009-39: (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ) pp.1-8, 2010ǯ1·î. (¶å½£Âç³Ø)
  • Kenji Ohira, Source Address Dependent Site External Route Advertisement for IPv6 Multihoming Site, The 14th JSPS/NRF Core University Program Seminar on Next Generation Internet, Jan. 2010.
  • Æ£ËÜ·½¡¤²¬Éô¼÷ÃË¡¤QoS¤ËÊï¤Ã¤¿EoD¥×¥í¥È¥³¥ë¤ÎÀ߷ס¤¤±¤¤¤Ï¤ó¤Ê¾ðÊóÄÌ¿®¥ª¡¼¥×¥ó¥é¥Ü¸¦µæ¿ä¿Ê¶¨µÄ²ñÂè3²ó¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽥¥­¥ó¥°¥°¥ë¡¼¥×¡¤2010ǯ1·î
  • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, A Web-based Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking, Consumer Communications & Networking Conference (IEEE-CCNC2010), Jan 2010.
  • Æ£ËÜ·½¡¦²¬Éô¼÷ÃË, ²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Ë¤ª¤±¤ë£Ñ£ï£Å£î¤ò¹Íθ¤·¤¿ÅÅÎÏÀ©¸æ¤ÎÄó°Æ, ¿®³Øµ»Êó, vol. 109, no. 299, IA2009-63, pp. 31-36, 2009ǯ11·î.
  • ÃæÅÄ·ò²ð¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË, IDS·ÙÊó¤Î²òÀϤˤè¤ëÂè»°¼Ôµ¡´Ø¤Ø¤Î¹¶·â¾õ¶·¤ÎÇÄ°®¼êË¡, ¿®³Øµ»Êó, vol. 109, no. 299, IA2009-62, pp. 25-30, 2009ǯ11·î.
  • ¾®ÌºÀµÆ»¡¦»ÍÊýÉÒÌÀ¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË, µþÅÔÂç³Ø¤Ë¤ª¤±¤ë̵ÀþLAN¥µ¡¼¥Ó¥¹¤ÎŸ³«, ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥óµÚ¤ÓSINET¥µ¡¼¥Ó¥¹ÀâÌÀ²ñ¡ÊµþÅÔ²ñ¾ì¡ËSINET3ÍøÍÑ»öÎã, 2009ǯ11·î.
  • À¾Â¼·ò¡¦Å粬À¯´ð¡¦ÊÂÌÚÅÐÈþ¹¬¡¦Èõ¸ý½¨¼ù¡¦Ãæ¼ÁÇŵ¡¦²¬Éô¼÷ÃË¡¦Á¾º¬¸¶ÅÐ, ¥µ¡¼¥Ð¾ÚÌÀ½ñ¥×¥í¥¸¥§¥¯¥È¤Ë¸«¤ë¶¦Æ±ÍøÍÑ´ðÈפι½ÃۤȰܹÔ, Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼¸¦µæ³«È¯ÏÀʸ½¸, No.31, pp.99-103, 2009ǯ11·î.
  • Yasuo Okabe, Kazumi Sakai, £Ñ£ï£Å£î (Quality of Energy) Routing toward Energy on Demand Service in the Future Internet, ¿®³Øµ»Êó, vol. 109, no. 262, IA2009-47, pp. 9-12, 2009ǯ10·î.
  • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, Privacy-Secure Image Sharing System for a Purchaser and Recorded Subjects Using Semi-Blind Fingerprinting, International Conference on Security Camera Network, Privacy Protection and Community Safety 2009 SPC2009, Kiryu, Japan, Oct, 2009
  • ²¬Éô¼÷ÃË, ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½ ¡½ ¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯, ¥°¥ê¡¼¥óETµ»½Ñ¼ÔÍÜÀ®¹ÖºÂ in ·§ËÜ, 2009ǯ10·î.
  • ßÀÅĹÀµ¤¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤ ºÇÂ祵¥¤¥ººÇÂç°ÂÄêÅ٥ޥåÁ¥ó¥°ÌäÂê¤ËÂФ¹¤ë¶á»÷²¼¸Â¤Î²þÎÉ, ¿®³Øµ»Êó¡¤Vol.109, No.235, COMP2009-37, (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ), pp.35-40, Oct., 2009. (ÅìËÌÂç³Ø¡¤ÀçÂæ»Ô)
  • µÜºê½¤°ì, °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤Ë´Ø¤¹¤ëºÇ¶á¤ÎÏÃÂê, ¿®³Øµ»Êó¡¤Vol.109, No.211, AI2009-12 (ÅŻҾðÊóÄÌ¿®³Ø²ñ¿Í¹©ÃÎǽ¤ÈÃμ±½èÍý¸¦µæ²ñ), pp.19-22, 2009ǯ9·î. (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
  • Yasuo Okabe, £Ñ£ï£Å£î (Quality of Energy) Routing toward Energy on Demand Service in the Future Internet, 2009 Asian Network Workshop, Aug. 2009.
  • Kenji Ohira, Hiroki Takakura, Yasuo Okabe, A Honeypot against Attacks Which Target Unknown Vulnerabilities, The 13th JSPS/NRF Core University Program Seminar on Next Generation Internet, Aug. 2009.
  • ²¬Éô¼÷ÃË¡¤°ú¸¶Î´»Î, ¡Ö¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¡×¤Ë¤Ä¤¤¤Æ, ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½¥·¥ó¥Ý¥¸¥¦¥à,2009ǯ7·î.
  • Tomotaka Maeda, Masahiro Kozuka, Yasuo Okabe, Reliable Streaming Transmission Using PR-SCTP, The 2009 International Symposium on Applications and the Internet (SAINT2009) student session, Seattle, USA, 20 - 24 July 2009.
  • Chia-Lung Hsieh, Privacy Disclosure: Personal Information and Images on Social Networking Sites in Taiwan, The 2009 International Symposium on Applications and the Internet (SAINT2009) student session, Seattle, USA, 20 - 24 July 2009.
  • ²¬Éô¼÷ÃË, µþÅÔÂç³Ø¤Ë¤ª¤±¤ëÂ絬ÌÏ¥µ¡¼¥ÐÅý¹ç¤Ë¤è¤ë´Ä¶­Éé²ÙÄ㸺¤Ø¤Î¼è¤êÁȤß, Âç³ØNUA Ê¿À®21ǯÅÙ Âè19²óÁí²ñ¡¦Âè32²ó¸¦µæ²ñ, 2009ǯ7·î.
  • ßÀÅĹÀµ¤¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤ ÇÛ°¿Í¿ô²¼¸ÂÉÕ¤­¸¦½¤°åÇÛ°ÌäÂê, µþÅÔÂç³Ø¿ôÍý²òÀϸ¦µæ½ê¹ÖµæÏ¿1649 ¡ÖÍýÏÀ·×»»µ¡²Ê³Ø¤Î¿¼²½¤È±þÍÑ¡×(ÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à), pp. 73-80, May, 2009 (ȯɽ¤Ï2009ǯ2·î). (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
  • Shuichi Miyazaki, Naoyuki Morimoto and Yasuo Okabe, An Optimal Online Algorithm for the Graph Exploration Problem on Unweighted Graphs, Proc. 2nd Asian Association for Algorithms and Computation (AAAC), p.45, Hangzhou, China, April 11-12, 2009.
  • Àî¸Åë͵ʿ, ½©»³Ëþ¾¼, ÀÄÌÚ°ì»Ë, °ËÆ£¸÷¶³, ¹âÁÒ¹°´î, ¥¹¥Ñ¥à¥á¡¼¥ë¤Ëµ¯°ø¤¹¤ëWeb·¿¼õÆ°¹¶·â¤Î¼ÂÂÖÄ´ºº, ¿®³Øµ»Êó, vol. 109, no. 33, ICSS2009-5, pp. 21-26, 2009ǯ5·î.

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • µÜºê½¤°ì, ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ¤ÎºÇÁ°Àþ --- °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤Î¸¦µæÆ°¸þ ---, ÅŻҾðÊóÄÌ¿®³Ø²ñ ¾ðÊ󡦥·¥¹¥Æ¥à¥½¥µ¥¤¥¨¥Æ¥£»ï Âè14´¬ Âè2¹æ, pp. 6-7, August 2009.

2008ǯÅÙ

ÏÀʸ»ïÏÀʸ

  • Naoyuki Kamiyama, Yuuki Kiyonari, Eiji Miyano, Shuichi Miyazaki, and Katsuhisa Yamanaka, Computational Complexities of University Interview Timetabling, IEICE TRANSACTIONS on Information and Systems, Volume E92-D, No.2, pp.130-140, Feb. 2009.
  • Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe, A Tight Upper Bound on Online Buffer Management for Multi-Queue Switches with Bicodal Buffers, IEICE Transactions on Information and System, Vol.E91-D, No.12, pp.2757-2769, Dec. 2008.
  • ´Ý»³¿­, ¾®ÄÍ¿¿·¼, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, ¥¢¥É¥ì¥¹¾ðÊó¤ÎÊѹ¹ÄÌÃΤò½¸Ìó¤Ç¤­¤ë¤è¤¦¤Ë¤¹¤ëSCTP ADD-IPµ¡Ç½¤Î²þÎÉ, ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J91-B, No.10, pp.1231-1233¡Ê¥ì¥¿¡¼¡Ë,2008ǯ10·î
  • Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe, A Tight Bound on Online Buffer Management for Two- port Shared-Memory Switches, IEICE Transactions on Information and System, Vol.E91-D,No.8,pp.2105-2114, Aug. 2008.
  • Iwama, K., Miyazaki, S. and Yamauchi, N., A (2-c 1 / \sqrt{N})-Approximation Algorithm for the Stable Marriage Problem, Algorithmica, Volume 51, Number 3, pp. 902-914, July 2008.
  • Jungsuk Song, Kenji Ohira, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon, A Clustering Method for Improving Performance of Anomaly-based Intrusion Detection System, IEICE Transactions on Information and Systems (Special Section on Information and Communication System Security), Vol.E91-D, No.5, pp.1282-1291, May. 2008.
  • Mitsuo Okada, Hiroaki Kikuchi, and Yasuo Okabe, Multi-bit Embedding for Asymmetric Digital Watermarking without Exposing Secret, IEICE Transactions on Information and Systems (Special Section on Information and Communication System Security), Vol.E91-D, No.5, pp.1348-1358, May. 2008.

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

  • Miyazaki, S. and Okamoto, K., Improving the Competitive Ratio of the Online OVSF Code Assignment Problem, Proc. 19th International Symposium on Algorithms and Computation (ISAAC 2008) (Lecture Notes in Computer Science 5369), pp. 64-76, Dec., 2008. (Gold Coast, Australia)
  • Jungsuk Song, Hiroki Takakura and Yasuo Okabe, Cooperation of Intelligent Honeypots to Detect Unknown Malicious Codes, WOMBAT Workshop on Information Security Threat Data Collection and Sharing (WISTDCS 2008), Amsterdam, Netherlands, 21-22 April 2008.
  • Jungsuk Song, Hiroki Takakura and Yongjin Kwon, A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts, The 2008 International Symposium on Applications and the Internet(SAINT2008), Turku, FINLAND, 28 July - 1 Aug. 2008.
  • Toshihiro Takagi, Takaaki Komura, Shuichi Miyazaki and Yasuo Okabe, Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols, SAINT2008 Workshop on Middleware Architecture in the Internet, pp. 293-296, Turku, FINLAND, 28 July - 1 Aug. 2008.

¸ýƬȯɽ¤Ê¤É

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • Iwama, K. and Miyazaki, S., Stable Marriage with Ties and Incomplete Lists, Encyclopedia of Algorithms, Springer, pp. 883-885, June 2008.

¤½¤Î¾

  • ²¬ÅĿλÖÊÔÃø, ¥Ò¥«¥ê¡õ¤Ä¤Ð¤µ¤Î¾ðÊ󥻥­¥å¥ê¥Æ¥££³Âò¶µ¼¼ ¡Ê²¬Éô¡§Â裱£°ÏÃôÅö¡Ë, ¹ñΩ¾ðÊó³Ø¸¦µæ½ê¡¡ISBN978-4-86049-048-5, 2009ǯ3·î.

2007ǯÅÙ

ÏÀʸ»ïÏÀʸ

  • Halldorsson, M. M., Iwama, K., Miyazaki, S. and Yanagisawa, H., Improved Approximation Results for the Stable Marriage Problem, ACM Transactions on Algorithms, Vol. 3, Issue 3, Article No. 30, August 2007.

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

¸ýƬȯɽ¤Ê¤É

  • ëËÜÌÐÌÀ¡¦Å粬À¯´ð¡¦ÊÒ²¬½Ó¹¬¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,UPKI¶¦ÄÌ»ÅÍÍ¡Ê¥¢¥¦¥È¥½¡¼¥¹¥â¥Ç¥ë¡Ë¤ÎÄó°Æ,ÅŻҾðÊóÄÌ¿®³Ø²ñ2008ǯÁí¹çÂç²ñ BS-8-2, 2008ǯ3·î.
  • Å粬À¯´ð¡¦Ã«ËÜÌÐÌÀ¡¦ÊÒ²¬½Ó¹¬¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,UPKI¥×¥í¥¸¥§¥¯¥È¤Ë¤ª¤±¤ë¥ª¡¼¥×¥ó¥É¥á¥¤¥ó¥µ¡¼¥Ð¾ÚÌÀ½ñȯ¹Ô¡¦Æ³Æþ,ÅŻҾðÊóÄÌ¿®³Ø²ñ2008ǯÁí¹çÂç²ñ BS-8-2, 2008ǯ3·î.
  • Yanagisawa, H., Miyazaki, S., and Iwama, K. Approximation Algorithms for the Sex-Equal Stable Marriage Problem, ¿®³Øµ»Êó¡¤Vol.107, No.537, COMP2007-55, (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ), pp. 1--8, 2008ǯ3·î. (ÆüËÜIBM Åìµþ´ðÁø¦µæ½ê¡¤¿ÀÆàÀÂçÏ»Ô)
  • ¹âÌÚ½Ó¹¨¡¦¸Å¼δÌÀ¡¦µÜºê½¤°ì¡¦²¬Éô¼÷ÃË,¥Þ¥¸¥Ã¥¯¥×¥í¥È¥³¥ëÍøÍѤˤè¤ë¥×¥é¥¤¥Ð¥·¡¼¤ËÇÛθ¤·¤¿Shibboleth°À­¸ò´¹¤Î³ÈÄ¥,Âè48²óʬ»¶¥·¥¹¥Æ¥à¡¿¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¡¦Âè26²ó¹âÉʼÁ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¹çƱ¸¦µæȯɽ²ñ,2008ǯ3·î
  • Yasuo Okabe,Wireless Network Security for Future Internet, AsiaFI School on Mobile & Wireless Networks,¡¡Feb. 2008.
  • Iwama, K. and Miyazaki, S. A Survey of the Stable Marriage Problem and Its Variants, Proc. International Conference on Informatics Education and Research for Knowledge-Circulating Society (ICKS'08), pp. 131-136, Jan. 2008. (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
  • Á°ÅÄÊþ¹§¡¦¾®ÄÍ¿¿·¼¡¦´Ý»³¡¡¿­¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË,PR-SCTP¤ò¤â¤Á¤¤¤¿¥ê¥¢¥ë¥¿¥¤¥à±ÇÁüÅÁÁ÷¤Ë¤ª¤±¤ë·ÐÏ©ÀÚ¤êÂؤ¨,¿®³Øµ»Êó, vol. 107, no. 449, IA2007-49, pp. 51-55,2008ǯ1·î
  • Toshihiro TAKAGI, Takaaki KOMURA, Shuichi MIYAZAKI, Yasuo OKABE, Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols, 25th APAN Meeting in Hawaii, Jan. 2008.
  • ´Ý»³ ¿­, ¾®ÄÍ ¿¿·¼, Ãæ¼ ÁÇŵ, ²¬Éô ¼÷ÃË,SCTP ¤ÎIP¥¢¥É¥ì¥¹¼«Æ°¹¹¿·µ¡Ç½¤Ë¤ª¤±¤ë¥¢¥É¥ì¥¹¼è¼ÎÁªÂòµ¡¹½,¾ðÊó½èÍý³Ø²ñ Âè12²óʬ»¶¥·¥¹¥Æ¥à/¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à ¡½½À¤é¤«¤Ê¥µ¡¼¥Ó¥¹¤ò»Ù¤¨¤ëµ»½Ñ¡½, 2007ǯ12·î.
  • ²¬Éô¼÷ÃË,Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈסʣգУˣɡˤθ½¾õ¤Èº£¸å,CAUAÂ裶²ó¹çƱ¸¦µæʬ²Ê²ñ¡Ê´ðÄ´¹Ö±é¡Ë,2007ǯ11·î.
  • ²¬Éô¼÷ÃË,¾ðÊ󵻽Ѥ¬¤â¤¿¤é¤¹¼Ò²ñÊѳ×,µþÅÔ½÷»ÒÂç³Ø¸½Âå¼Ò²ñ³ØÉô¸ø³«¹ÖºÂ¡¦¾ðÊ󵻽Ѥȸ½Âå¼Ò²ñ¡½µ»½Ñ¤Î¸½ºß¡¢¼Ò²ñ¤Î¤æ¤¯¤¨¡½,2007ǯ11·î.
  • ¹âÌÚ½Ó¹¨, ºâ»ºÈæ¤Ù¥×¥í¥È¥³¥ë¤òÍøÍѤ·¤¿Shibboleth¤Îǧ²Ä·èÄê¥â¥Ç¥ë¤ÎÄó°Æ, ITRC22³ØÀ¸¥»¥Ã¥·¥ç¥ó,2007ǯ11·î
  • Á°ÅÄÊþ¹§, SCTP¤òÍѤ¤¤¿¥ê¥¢¥ë¥¿¥¤¥à·¿¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤Î¹½ÃÛ,ITRC22³ØÀ¸¥»¥Ã¥·¥ç¥ó,2007ǯ11·î
  • ²¬ÅÄËþͺ, Information Sharing Web Service,ITRC22³ØÀ¸¥»¥Ã¥·¥ç¥ó,2007ǯ11·î
  • ²¬Éô¼÷ÃË,IPv6¤Ë¤è¤ë¥æ¥Ó¥­¥¿¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼Â¸½,V6¥×¥ì¥ß¥¢¥à¥Õ¥©¡¼¥é¥àÂ裲²ó¥Ñ¡¼¥È¥Ê¡¼¥·¥Ã¥×²ñµÄ,2007ǯ10·î.
  • ²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤ 3¿ÍÉô²°°ÂÄê¥ë¡¼¥à¥á¥¤¥ÈÌäÂê¤ÎNP´°Á´À­, ¿®³Øµ»Êó¡¤Vol.107, No.258, COMP2007-41 (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ) pp.1-6, 2007ǯ10·î. (ÅìËÌÂç³Ø¡¤ÀçÂæ»Ô)
  • Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Data Mining and Visualization of IDS Alerts to Extract Malicious Activities, 9th Core University Program Seminar on Next Generation Internet Technologies, Oct. 2007.
  • ²¬Éô¼÷ÃË,ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯¤È¤·¤Æ¤Î¸ø½°ÌµÀþ£Ì£Á£Î¤Ø¤Î´üÂÔ,¥Þ¥ë¥Á¥á¥Ç¥£¥¢¿ä¿Ê¥Õ¥©¡¼¥é¥à¡¦Ê¿À®19ǯÂè26²ó¡Ö¤¢¤é¤¿¤Ê¡Ø¸ø½°ÌµÀþLAN¡Ù¤Î»þÂ夬ÅþÍè¡×,2007ǯ9·î.
  • ¿¹Ëܾ°Ç·, µÜºê½¤°ì, ²¬Éô¼÷ÃË¡¤ ¥µ¥¤¥¯¥ë¾å¤Ç¤Î¥°¥é¥Õõº÷ÌäÂê¤ËÂФ¹¤ëºÇŬ¤Ê¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à, ¿®³Øµ»Êó¡¤Vol.107, No. 219, COMP2007-39: (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ) pp.51-57, 2007ǯ9·î. (Ë­¶¶µ»½Ñ²Ê³ØÂç³Ø)
  • À¶À®Íªµ®¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤ »îÌäͽÄêɽºîÀ®ÌäÂê¤ÎÀ©ÌóÉÕ¤­¥â¥Ç¥ë¤ËÂФ¹¤ëNPº¤ÆñÀ­, Ê¿À®19ǯÅÙ Âè60²óÅŵ¤´Ø·¸³Ø²ñ¶å½£»ÙÉôÏ¢¹çÂç²ñ, 09-1A-04, p.87, 2007ǯ9·î.¡ÊΰµåÂç³Ø¡Ë
  • Yasuo OKABE, Introduction to UPKI Project in Japan, TERENA 9th TF-EMC2 Meeting Prague, Sept. 2007.
  • Yasuo OKABE, MIAKO.net Public Wireless Internet Service in Kyoto, 24th APAN Meeting in Xi'an, Aug. 2007.
  • Yasuo OKABE, Japanese University PKI (UPKI) Update, 24th APAN Meeting in Xi'an, Aug. 2007.
  • ¿¹Ëܾ°Ç·, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ¥µ¥¤¥¯¥ë¥°¥é¥Õ¾å¤Ç¤ÎÃÏ¿ÞºîÀ®ÌäÂê¤ËÂФ¹¤ëºÇŬ¤Ê¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à, 2007ǯÅٲƤÎLA¥·¥ó¥Ý¥¸¥¦¥à, [9], July 2007.
  • ¾®ÎÓ¹ÀÆ󡤵ܺ꽤°ì¡¤²¬Éô¼÷ÃË¡¤ A Tight Upper Bound on Online Buffer Management for Two-port Shared-Memory Switches, ¿®³Øµ»Êó¡¤Vol.107, No.127, COMP2007-26: (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ) pp.63-70, 2007ǯ6·î. (Ë̳¤Æ»Âç³Ø¡¤»¥ËÚ»Ô)
  • ´Ý»³¿­¡¦¾®ÄÍ¿¿·¼¡¦²¬Éô¼÷ÃË, SCTP¤Ë¤ª¤±¤ë¥¢¥É¥ì¥¹ÁªÂò¥Ý¥ê¥·¡¼¤òÄêµÁ¤Ç¤­¤ëIP¥¢¥É¥ì¥¹¼«Æ°¹¹¿·µ¡Ç½¤ÎÀß·×, ¿®³Øµ»Êó, vol. 107, no. 74, IA2007-1, pp. 1-3, 2007ǯ5·î.
  • Jungsuk Song, Hiroki Takakura, Yasuo Okabe, A Proposal of New Benchmark Data to Evaluate Mining Algorithms for Intrusion Detection, 23th APAN Meeting in Manila, Jan. 2007.

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • ²¬Éô¼÷ÃË, Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¤Î¸½¾õ¤Èº£¸å, View Point, Âè8¹æ, pp.67-72, Mar. 2008.
  • µÜºê½¤°ì, Î¥»¶¿ô³Ø¤Î¤¹¤¹¤á Âè6²ó ¡Ö°ÂÄê·ëº§ÌäÂê¡×, Íý·Ï¤Ø¤Î¿ô³Ø(¸½Âå¿ô³Ø¼Ò), pp. 49-54, 2007ǯ9·î¹æ.

¹ñºÝɸ½à²½Äó°Æ

2006ǯÅÙ

ÏÀʸ»ïÏÀʸ

  • Iwama, K., Miyazaki, S. and Okamoto, K., A (2-c log N/N)-Approximation Algorithm for the Stable Marriage Problem, IEICE TRANSACTIONS on Information and Systems, Volume E89-D No.8, pp.2380-2387, August 2006.
  • ¼°æ¶Ñ, ²¬Éô¼÷ÃË, NAS Parallel Benchmarks¤Ë¤è¤ëHPF¤Îɾ²Á, ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï¡§¥³¥ó¥Ô¥å¡¼¥Æ¥£¥ó¥°¥·¥¹¥Æ¥à Vol.47, No.SIG7(ACS14), pp.137-151 (2006).
  • ´Ý»³¿­, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, »³°æÀ®ÎÉ, ²¬»³À»É§, µÜ²¼ÂîÌé, ưŪ¤Ë±þÅú¤òÊѤ¨¤ëDNS¤òÍøÍѤ·¤¿ÅŻҥ᡼¥ë¼õ¿®¤ÎÍ¥ÀèÀ©¸æ, ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï Vol.47, No.4, pp.1021-1030 (2006).

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

  • Asahiro, Y., Miyano, E., Miyazaki, S. and Yoshimuta, T., Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles, Proc. 33rd Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2007), (Lecture Notes in Computer Science 4362), pp. 164-175, Jan., 2007. (Harrachov, Czech Republic)
  • Iwama, K., Miyazaki, S. and Yamauchi, N., A 1.875-Approximation Algorithm for the Stable Marriage Problem, Proc. 18th ACM-SIAM Symposium on Discrete Algorithms (SODA 2007), pp. 288-297, Jan., 2007. (New Orleans, USA)
  • Yutaka Nakano, Motonori Nakamura, Yasuo Okabe, Analysis for Topological Properties of the Network Feeding Usenet News, SAINT2007, Jan. 2007.
  • Shoichiro Fujiwara, Takaaki Komura, Yasuo Okabe, A Privacy Oriented Extension of Attribute Exchange in Shibboleth, SAINT2007 Workshop on Middleware Architecture in the Internet, Jan. 2007.
  • »³°æÀ®ÎÉ¡¦Îú°ìÊ¿¡¦²¬»³À»É§¡¦²ÏÌî·½ÂÀ¡¦Ãæ¼ÁÇŵ¡¦´Ý»³¿­¡¦µÜ²¼ÂîÌé, SMTP¥»¥Ã¥·¥ç¥ó¤Î¶¯À©ÀÚÃǤˤè¤ëspam¥á¡¼¥ëÂкö¼êË¡, FIT 2006 Âè5²ó¾ðÊó²Ê³Øµ»½Ñ¥Õ¥©¡¼¥é¥à¡ÊÁ¥°æ¥Ù¥¹¥È¥Ú¡¼¥Ñ¡¼¾Þ¡Ë, 2006ǯ9·î.
  • Kiyonari, Y., Miyano, E. and Miyazaki, S., Computational Complexity Issues in University Interview Timetabling, Proc. of The 6th International Conference on the Practice and Theory of Automated Timetabling (PATAT 2006), pp. 448-453, August 2006. (Brno, Czech Republic)
  • Kato, S., Miyazaki, S., Nishimura, Y. and Okabe, Y., Cheat-proof Serverless Network Games, 5th International Conference on Computers and Games (CG 2006), (Lecture Notes in Computer Science 4630), pp. 234-243, May 2006. (Turin, Italy)

¸ýƬȯɽ¤Ê¤É

  • ²¬Éô¼÷ÃË, ǧ¾Ú±¿ÍÑÎΰè, ÅŻҾðÊóÄÌ¿®³Ø²ñ2007ǯÁí¹çÂç²ñ TK-2 Âç³ØÅù¤Ë¤ª¤±¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£Âкö¤Î¤¿¤á¤ÎÀ©ÅÙ¡¦ÂÎÀ© ¡ÁÀ¯Éܵ¡´ØÅý°ì´ð½à¤òÈ¿±Ç¤·¤¿¥µ¥ó¥×¥ëµ¬Äø½¸¤ÎÊó¹ð¡Á, 2007ǯ3·î.
  • »³ÆâľºÈ¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤ °ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë1.8-¶á»÷¥¢¥ë¥´¥ê¥º¥à, ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ DS-1-3, 2007ǯ3·î.
  • ²¬Éô¼÷ÃË, Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¹½ÃÛ»ö¶È¤Î³µÍ×, Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£µÚ¤ÓÅÅ»Òǧ¾Ú´ðÈפ˴ؤ¹¤ë¥ï¡¼¥¯¥·¥ç¥Ã¥×, 2007ǯ2·î.
  • ²¬Éô¼÷ÃË, ¡Ö¹ñΩÂç³ØË¡¿Í¸þ¤±¾ðÊ󥻥­¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¡×¤ÎºöÄê¡Áǧ¾Ú±¿ÍÑÎΰè, Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£µÚ¤ÓÅÅ»Òǧ¾Ú´ðÈפ˴ؤ¹¤ë¥ï¡¼¥¯¥·¥ç¥Ã¥×, 2007ǯ2·î.
  • ²¬Éô¼÷ÃË, Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈסÊUPKI¡Ë¤ÈUPKI¥¤¥Ë¥·¥¢¥Æ¥£¥Ö¤Ë¤Ä¤¤¤Æ, Ê¿À®18ǯÅÙ¹âÀ­Ç½¥³¥ó¥Ô¥å¡¼¥Æ¥£¥ó¥°ÍøÍѵ»½Ñ¤Ë´Ø¤¹¤ëÁí¹ç¥·¥ó¥Ý¥¸¥¦¥à¡Ö²¾Áۼ¸³¤ÈÂ絬ÌÏ¥·¥ß¥å¥ì¡¼¥·¥ç¥ó¤ÇÂó¤¯Àèü²Ê³Ø2007¡×¡Ê¥Ý¥¹¥¿¡¼¡Ë, 2007ǯ2·î.
  • Kenji Ohira, Ying Huang, Takaaki Komura, Yasuo Okabe, Loosely Trusted Yet Secure Roaming Architecture for Public Wireless Internet Service, Proc. 2nd International Conference on Informatics Research for Development of Knowledge Society Infrastructure 2007, Jan. 2007.
  • Shoichirou FUJIWARA, Takaaki KOMURA, Yasuo OKABE, A Privacy Oriented Attribute Exchange in Shibboleth, 23rd APAN Meeting in Manila, Jan. 2007.
  • ÅÏÉô°ê·Ã¡¦²¬Éô¼÷ÃË¡¦Ãæ¼ÁÇŵ, Ê£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ ¿®³Øµ»Êó, vol. 106, no. 465, IA2006-37, pp. 37-42, 2007ǯ1·î.
  • ÂçÄíÈ»¿Í¡¦Áס¡Ãæ¼â¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË, µ¡³£³Ø½¬¤Ë¤è¤ë¥Í¥Ã¥È¥ï¡¼¥¯IDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤª¤è¤Ó²Ä»ë²½ ¿®³Øµ»Êó, vol. 106, no. 465, IA2006-36, pp. 31-36, 2007ǯ1·î.
  • ¸Å¼δÌÀ, µþÅԤǤÎÁð¤Îº¬ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÉáµÚ³èÆ°, InternetWeek 2006 ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯BoF, 2006ǯ12·î.
  • Shoichiro Fujiwara, Takaaki Komura, Yasuo Okabe, Privacy Enhanced Attribute Exchange for Shibboleth/SAML based Authorization in Web Services, The 7th AEARU Workshop on Web Technology and Computer Science (WebTeCS ¡Æ06), Dec. 2006.
  • »³ÆâľºÈ¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤ °ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë1.875-¶á»÷¥¢¥ë¥´¥ê¥º¥à, ¿®³Øµ»Êó, vol. 106, no. 405, COMP2006-48, pp. 49-56, 2006ǯ12·î.
  • īעͺ°ì¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤µÈ̶ÅÄÂóϯ¡¤ ¥µ¥¤¥¯¥ë¥°¥é¥Õ¾å¤Ç¤ÎÃÏ¿ÞºîÀ®ÌäÂê¤ËÂФ¹¤ë½Å¤ßÉÕ¤­ºÇ¶á˵¥¢¥ë¥´¥ê¥º¥à, ¿®³Øµ»Êó, vol. 106, no. 405, COMP2006-43, pp. 15-22, 2006ǯ12·î.
  • ´Ý»³ ¿­, ¾®ÄÍ ¿¿·¼, ¾®Ìî Í´²ð, ËÜ¿ ÎÑÉ×, SCTP¤òÍѤ¤¤¿¥·¥ó¥°¥ë¥¤¥ó¥¿¥Õ¥§¥¤¥¹¤Ç¤Î¥Ï¥ó¥É¥ª¡¼¥Ð¡¼¼Â¸³ (Work In Progress ¥Ç¥â¥»¥Ã¥·¥ç¥ó¡Ë, Internet Conference 2006, 2006ǯ10·î.
  • Æ£¸¶æÆ°ìϯ¡¤¸Å¼δÌÀ¡¤²¬Éô¼÷ÃË¡¤ ¥×¥é¥¤¥Ð¥·¡¼Êݸî¤ËÇÛθ¤·¤¿Shibboleth¤Ë¤ª¤±¤ë°À­¸ò´¹¤Î³ÈÄ¥¡¤ ¿®³Øµ»Êó¡¤vol. 106, no. 309, IA2006-20, pp. 1-6¡¤ 2006ǯ10·î¡¥
  • Yasuo Okabe, Introduction of UPKI Project in Japan, 2nd APGrid PMA Meeting (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ) pp.51-57, 2007ǯ9·î. (Ë­¶¶µ»½Ñ²Ê³ØÂç³Ø)
  • À¶À®Íªµ®¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤ »îÌäͽÄêɽºîÀ®ÌäÂê¤ÎÀ©ÌóÉÕ¤­¥â¥Ç¥ë¤ËÂФ¹¤ëNPº¤ÆñÀ­, Ê¿À®19ǯÅÙ Âè60²óÅŵ¤´Ø·¸³Ø²ñ¶å½£»ÙÉôÏ¢¹çÂç²ñ, 09-1A-04, p.87, 2007ǯ9·î.¡ÊΰµåÂç³Ø¡Ë
  • Yasuo OKABE, Introduction to UPKI Project in Japan, TERENA 9th TF-EMC2 Meeting Prague, Sept. 2007.
  • Yasuo OKABE, MIAKO.net Public Wireless Internet Service in Kyoto, 24th APAN Meeting in Xi'an, Aug. 2007.
  • Yasuo OKABE, Japanese University PKI (UPKI) Update, 24th APAN Meeting in Xi'an, Aug. 2007.
  • ¿¹Ëܾ°Ç·, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ¥µ¥¤¥¯¥ë¥°¥é¥Õ¾å¤Ç¤ÎÃÏ¿ÞºîÀ®ÌäÂê¤ËÂФ¹¤ëºÇŬ¤Ê¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à, 2007ǯÅٲƤÎLA¥·¥ó¥Ý¥¸¥¦¥à, [9], July 2007.
  • ¾®ÎÓ¹ÀÆ󡤵ܺ꽤°ì¡¤²¬Éô¼÷ÃË¡¤ A Tight Upper Bound on Online Buffer Management for Two-port Shared-Memory Switches, ¿®³Øµ»Êó¡¤Vol.107, No.127, COMP2007-26: (invited talk), Oct. 2006.
  • ÂçÄíÈ»¿Í, ¥­¥ã¥ó¥Ñ¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ëIDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤȲĻ벽, ITRC20³ØÀ¸¥»¥Ã¥·¥ç¥ó, 2006ǯ10·î.
  • ÅÏÉô°ê·Ã, Ê£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÄó°Æ, ITRC20³ØÀ¸¥»¥Ã¥·¥ç¥ó, 2006ǯ10·î.
  • ¾®ÄÍ¿¿·¼, SCTP¤È»ä, ITRC20 ³ØÀ¸¥»¥Ã¥·¥ç¥ó, 2006ǯ10·î.
  • ¸Å¼δÌÀ¡¤Æ£À¼£¡¤²¬Éô¼÷ÃË,¤ß¤¢¤³¥Í¥Ã¥È¼Â¾Ú¼Â¸³¤ÎÁí³ç¤È¤³¤ì¤«¤é,ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯Ï¢·È¥·¥ó¥Ý¥¸¥¦¥à 2006 in ÂÓ¹­, 2006ǯ9·î.
  • µÈ̶ÅÄÂóϯ¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤ ¥ª¥ó¥é¥¤¥óTSP¥¢¥ë¥´¥ê¥º¥à¤ËÂФ¹¤ë²¼¸Â¤Ë¤Ä¤¤¤Æ, Ê¿À®18ǯÅÙ Âè59²óÅŵ¤´Ø·¸³Ø²ñ¶å½£»ÙÉôÏ¢¹çÂç²ñ, 10-2A-07, Sep. 2006.
  • Hiroki Takakura, Privacy Issues on Network Monitoring and Its Information Sharing, 7th Core University Program Seminar on Next Generation Internet Technologies, Aug. 2006.
  • Yasuo Okabe, WLAN Roaming Architecture for True Ubiquitous Networking, 7th Core University Program Seminar on Next Generation Internet Technologies, Aug. 2006.
  • ´Ý»³¿­¡¦¾®ÄÍ¿¿·¼¡¦Ãæ¼ÁÇŵ¡¦²¬Éô¼÷ÃË, ¥¢¥É¥ì¥¹¾ðÊó¤ÎÊѹ¹ÄÌÃΤò½¸Ì󤷤ƺÆÁ÷¤Ç¤­¤ë¤è¤¦¤Ë¤¹¤ë mSCTP³ÈÄ¥, ¿®³Øµ»Êó, 2006ǯ7·î
  • À¶À®Íªµ®¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤ »îÌäͽÄêɽºîÀ®ÌäÂê¤Î·×»»Ê£»¨¤µ, ¿®³Øµ»Êó, vol. 106, no. 128, COMP2006-18, pp. 7-14, 2006ǯ6·î.
  • ÂçÊ¿·ò»Ê¡¦Áס¡Ãæ¼â¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË, ̤ÃΤι¶·â¥³¡¼¥É¤ò°ÂÁ´¤Ë¼ý½¸¤¹¤ë¤¿¤á¤ÎÄêÅÀ´Ñ¬ÁõÃ֤ι½ÃÛ¼êË¡, ¿®³Øµ»Êó, vol. 106, no. 62, IA2006-1, pp. 1-6, 2006ǯ5·î.
  • Å粬À¯´ð¡¦Ã«ËÜÌÐÌÀ¡¦ÊÒ²¬½Ó¹¬¡¦Ê÷Èø¿¿°ì¡¦Á¾º¬¸¶ÅС¦»ûÀ¾Íµ°ì¡¦ÈÓÅľ¡µÈ¡¦²¬Éô¼÷ÃË, Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×UPKI¤Ë¤ª¤±¤ëǧ¾ÚÏ¢·ÈÊý¼°¤Î¸¡Æ¤, ¿®³Øµ»Êó, vol. 106, no. 62, IA2006-3, pp. 13-18, 2006ǯ5·î.

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • Yasuo Okabe, Koji Okamura, Kenji Fujikawa, Tomohiro Otani, Internet Architecture (IA) Technical Committee, IEICE Communications Society Global Newsletter, Vol.19, pp.2-3, Mar. 2007.
  • ²¬Éô¼÷ÃË, ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Î¥ë¡¼¥Á¥ó¥°¥¢¥ë¥´¥ê¥º¥à¤È¤Õ¤¯¤½¤¦À©¸æ¥¢¥ë¥´¥ê¥º¥à, ÅŻҾðÊóÄÌ¿®³Ø²ñ»ï Vol.89, No.4, pp.294-298 (2006)
  • µÜºê½¤°ì, ¥ë¡¼¥¿¾å¤Î¥Ð¥Ã¥Õ¥¡´ÉÍýÌäÂê¤ËÂФ¹¤ë¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à, ÅŻҾðÊóÄÌ¿®³Ø²ñ»ï Vol.89, No.4, pp.299-303 (2006)

¹ñºÝɸ½à²½Äó°Æ

2005ǯÅÙ

ÏÀʸ»ïÏÀʸ

  • ´Ý»³¿­, ºÇÅÄ·ò°ì, ¾®ÄÍ¿¿·¼, Àж¶Í³»Ò, ÃÓÅÄ¿´, ¿¹´´É§, ´î¿°ì, Virtual Machine¤ò³èÍѤ·¤¿Â絬Ì϶µ°éÍÑ·×»»µ¡¥·¥¹¥Æ¥à¤Î¹½ÃÛµ»½Ñ¤È¹Í»¡, ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï,Vol.46, No.4 pp. 949-964(2005)

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

  • Shin Maruyama, Motonori Nakamura, Yasuo Okabe, Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita, Priority Control in Receiving E-mails by Giving a Separate Response to Each DNS Query, SAINT2006, pp.90-93, Jan. 2006.
  • Iwama, K., Miyazaki, S. and Yamauchi, N., A (2-c 1 / ?sqrt{N})-Approximation Algorithm for the Stable Marriage Problem, Proc. 16th International Symposium on Algorithms and Computation (ISAAC 2005) (Lecture Notes in Computer Science 3827), pp. 902-914, Dec., 2005. (Sanya, Hainan, China)
  • K. Ohira, Y. Huang, Y. Okabe, K. Fujikawa, M. Nakamura, Security Analysis on Public Wireless Internet Service Models, WMASH2005, pp. 107-110, Sept. 2005(¥Ý¥¹¥¿¡¼)
  • H. Murai, Y. Okabe, Pipeline Parallelization in HPF programs on the Earth Simulator, HPF international Workshop: Experiences and Progress 2006 (HiWEP2005), Lecture Notes in Computer Science, Vol. 4759, pp.365-373, Sept. 2005
  • K. Ohira, Y. Koyama, K. Fujikawa, Y. Okabe, Automatic Address Assignment for IPv6 End-to-End Multihoming Sites, ICITA2005, Vol II, pp. 755-758, July 2005(¥Ý¥¹¥¿¡¼)

¸ýƬȯɽ

  • Yasuo Okabe, UPKI ¡½ Japanese National Academic Authentication and Authorization Platform for Cyber Science Infrastructure, NII International Workshop on Cyber Science Infrastructure, Mar. 2006.
  • ÃæÌîË­, ²¬Éô¼÷ÃË, Ãæ¼ÁÇŵ, ¥Í¥Ã¥È¥Ë¥å¡¼¥¹¥µ¡¼¥Ð·²¤Î¥È¥Ý¥í¥¸¡¼¤Ë¤ª¤±¤ë½ôÀ­¼Á¤ÎʬÀÏ, ¾ðÊó½èÍý³Ø²ñÂ裲²ó¥Í¥Ã¥È¥ï¡¼¥¯À¸Âֳإ·¥ó¥Ý¥¸¥¦¥à, Mar. 2006¡Ê¥Ý¥¹¥¿¡¼¡Ë
  • ´ä²¼±Ñ½Ó, ²¬Éô¼÷ÃË, ¿ùºêͳŵ, ÀÄÌÚÀµ¼ù, LINPACK¤ÈFFT¤Ë¤è¤ëHPF¥³¥ó¥Ñ¥¤¥éfhpf¤ÎÀ¸»ºÀ­¤Îɾ²Á, ¾ð½è¸¦Êó, Vol.2006, No.20, HPC-105, pp.67-72, Feb. 2006.
  • ²¬Éô¼÷ÃË, Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¹½ÃۤˤĤ¤¤Æ, Ê¿À®17ǯÅÙITBLµ»½ÑÉáµÚ¡¦ÍøÍѤ˴ؤ¹¤ëÁí¹ç¥·¥ó¥Ý¥¸¥¦¥à¡Ö²¾Áۼ¸³¤ÈÂ絬ÌÏ¥·¥ß¥å¥ì¡¼¥·¥ç¥ó¤ÇÂó¤¯Àèü²Ê³Ø2006¡×, Feb.2006.
  • ²¬Éô¼÷ÃË, Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¹½ÃÛ»ö¶È, Âç³ØÅÅ»Òǧ¾Ú´ðÈ×¥·¥ó¥Ý¥¸¥¦¥à¡ÝºÇÀèü³Ø½Ñ¾ðÊó´ðÈסÊCSI¡Ë¤Î¼Â¸½¤Ë¸þ¤±¤¿Á´¹ñÂç³Ø¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈסÊUPKI¡Ë¤Î¹½ÃÛ¡Ý,2006ǯ2·î.
  • ¾®ÎÓ¹ÀÆó, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ¥Þ¥ë¥Á¥­¥å¡¼¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ, 2005ǯÅÙÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à, [14], Jan. 2006.
  • ´Ý»³¿­, ¾®ÄÍ¿¿·¼, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, Ê£¿ô¥¢¥É¥ì¥¹Âбþ¤Î¤¿¤á¤ÎSocket API ³ÈÄ¥, ¿®³Øµ»Êó, vol. 105, no. 530, IA2005-27, pp. 49-54, 2006ǯ1·î.
  • ÎëÌÚÏÂÌé, ÇϾì½ÓÊå, ¹âÁÒ¹°´î, ̤ÍøÍÑ¥¢¥É¥ì¥¹¥Ö¥í¥Ã¥¯¤ËÅþ㤹¤ë¥È¥é¥Õ¥£¥Ã¥¯¤Î²òÀÏ, ¿®³Øµ»Êó, vol. 105, no. 530, IA2005-23, pp. 25-30, 2006ǯ1·î.
  • Yasuo Okabe, Cyberinfrastructure for e-Science, 21st APAN Meeting in Tokyo, Jan. 2006.
  • Yasuo Okabe, UPKI ¡½ Japanese National Academic Authentication and Authorization Platform for Interuniversity Collaboration and Federation, 3rd AEARU Workshop on Network Education (Keynote Speech), Dec. 2005.
  • S. Miyazaki and Y. Okabe, Cheat-proof Serverless Network Games, Proc. 4th International Symposium on Computing and Media Studies, pp. 94-101, Jan. 2006.
  • µÜºê½¤°ì¡¤µ×ÊݹÀ»Ë¡¤¹â¸«¹¥ÃË¡¤»ÍÊýÉÒÌÀ¡¤Ý¯°æ¹±Àµ¡¤»³¸µ¿­¹¬¡¤²ÏÌîŵ¡¤¹¾¸¶¹¯À¸¡¤¹âÁÒ¹°´î¡¤ÂôÅÄÆƻˡ¤Ãæ¼ÁÇŵ¡¤²¬Éô¼÷ÃË¡¤ËÌÌîÀµÍº¡¤ KUINSÀܳµ¡´ïÅÐÏ¿¥Ç¡¼¥¿¥Ù¡¼¥¹¤Î³µÍס¤ Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼ ¸¦µæ³«È¯ÏÀʸ½¸¡¤No.27 pp.47-51, Oct. 2005.
  • ÃæÌîË­, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, ¥Í¥Ã¥È¥Ë¥å¡¼¥¹¥µ¡¼¥Ð·²¤Î¥È¥Ý¥í¥¸¡¼¤¬»ý¤Ä¥¹¥±¡¼¥ë¥Õ¥ê¡¼À­¤Ê¤É¤ÎÅý·×ŪÀ­¼Á, ¿®³Øµ»Êó, vol. 105, no. 377, IA2005-14, pp. 13-18, 2005ǯ10·î.
  • ´Ý»³ ¿­, ¾®ÄÍ ¿¿·¼, Ê£¿ô¥¢¥É¥ì¥¹¤ËÂбþ¤¹¤ë¤¿¤á¤Î Socket API ³ÈÄ¥, ITRC18, Oct. 2005.
  • Yasuo Okabe, UPKI ¡½ Interuniversity Authentication and Authorization Platform for Japanese Cyber-Science Infrastructure,20th APAN Meeting¡§Advanced Network Conference in Taipei, Aug. 2005.
  • »³ÆâľºÈ¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë¶É½êõº÷¶á»÷¥¢¥ë¥´¥ê¥º¥à¤Î²þÎÉ, ¿®³Øµ»Êó¡¤Vol.105, No.72, COMP2005-15, pp.45-51, May, 2005.
  • ¾®ÎÓ¹ÀÆ󡦵ܺ꽤°ì¡¦²¬Éô¼÷ÃË, ¶¦Í­¥á¥â¥ê·¿¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ, ¿®³Øµ»Êó, Vol.105, No.144, COMP2005-21, pp.17-22, June 2005.
  • J. Song, H. Takakura, Y. Okabe, Y. Kwon, A Study on Accuracy Improvement of Intrusion Detection System Based on Data Mining, In Proceedings of KISS (Korea Information Science Society) Korea Computer Congress 2005 , Vol.32, No.1, pp.208-210, July 6-8, 2005.
  • Îú°ìÊ¿, »³°æÀ®ÎÉ, ²¬»³À»É§, µÜ²¼ÂîÌé, ´Ý»³¿­, Ãæ¼ÁÇŵ, °¸ÀèÉÔÌÀ¥á¡¼¥ë¤òÍøÍѤ·¤¿Ê¬»¶¶¨Ä´·¿spam¥Õ¥£¥ë¥¿¤Îǧ¼±Î¨¸þ¾å, ¾ðÊó½èÍý³Ø²ñDSM¸¦µæ²ñ, 2005ǯ5·î

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • ²¬Éô¼÷ÃË, ¼é¤ê¤«¤é¹¶¤á¤Ø:¥»¥­¥å¥ê¥Æ¥£¤È¥×¥é¥¤¥Ð¥·¡¼¤Î¥Ñ¥é¥À¥¤¥à¥·¥Õ¥È, ´¬Æ¬¸À, R&D News Kansai, No.429,Nov.2005.

2004ǯÅÙ

ÏÀʸ»ïÏÀʸ

  • H. Ito, K. Iwama, Y. Okabe, T. Yoshihiro, Single backup table schemes for shortest-path routing, Theoretical Computer Science, 333, pp. 347-353, 2005
  • A. Ishtiaq, Y. Okabe, M. Kanazawa, Management of parallel UBR flows over TCP in congested ATM networks, Computer Communications, 27, 801-808, 2004.
  • Halldorsson, M., Iwama, K., Miyazaki, S. and Yanagisawa, H., Randomized approximation of the stable marriage problem, Theoretical Computer Science, Vol. 325, No. 3, pp. 439-465, Oct. 2004.

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

  • Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita, Shin Maruyama, Motonori Nakamura, Protection Method against Massive Error Mails Caused by Sender Spoofed Spam Mails, SAINT2005, Jan. 2005.
  • A. Ishtiaq, Y. Okabe, M. Kanazawa, Issues of Multihoming Implementation using SCTP, IASTED International Conference on Communication Systems and Applications (CSA2004), 422-162, July 2004.
  • Iwama, K., Miyazaki, S. and Okamoto, K., A (2-c log N/N)-Approximation Algorithm for the Stable Marriage Problem, Proceedings of the 9th Scandinavian Workshop on Algorithm Theory (SWAT 2004), (LNCS 3111), pp. 349-361, July 2004. (Humlebaek, Denmark)
  • ¼°æ¶Ñ,²¬Éô¼÷ÃË,Ãϵ奷¥ß¥å¥ì¡¼¥¿¾å¤ÎHPF¤Ë¤è¤ëNAS Parallel Benchmarks¤Î¼ÂÁõ¤Èɾ²Á, SACSIS2004¡½Àè¿ÊŪ·×»»´ðÈ×¥·¥¹¥Æ¥à¥·¥ó¥Ý¥¸¥¦¥à, May 2004.

¸ýƬȯɽ

  • ²ÃÆ£¿¿Î¤, ¾®À¾Îɾ°, ÀÄ»³»°»Þ»Ò, ÀÄÌÚ·ÃÈþ»Ò, Æ£ËöË®À¯, º£Â¼¸µ°ì, ²¬Éô¼÷ÃË, µþÅÔ¤¹¤Ð¤ë¹â¹»IT¿Íºà°éÀ®¥×¥í¥¸¥§¥¯¥È¤Ë¤Ä¤¤¤Æ, µþÅÔÂç³Ø³Ø½Ñ¾ðÊó¥á¥Ç¥£¥¢¥»¥ó¥¿¡¼¸¦µæ³«È¯Éô¥·¥ó¥Ý¥¸¥¦¥à, Mar. 2005.
  • ÅÏÉô°ê·Ã, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, ÈþǻƳɧ, Ê£¿ô·ÐÏ©¤ò³èÍѤ·¤¿¥Ð¡¼¥¹¥È¥Ñ¥±¥Ã¥È¥í¥¹¤Ë¶¯¤¤¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à, ÅŻҾðÊóÄÌ¿®³Ø²ñ2005ǯÁí¹çÂç²ñ¥Ý¥¹¥¿¡¼¥»¥Ã¥·¥ç¥ó, Mar. 2005.
  • ¸Å¼δÌÀ, Ë̸¶Î¼, Æ£À¼£, ¾å¸¶Å¯ÂÀϺ, ²¬Éô¼÷ÃË, ¤ß¤¢¤³¥Í¥Ã¥È¤Ç¤Î¼Â»þ´ÖÆ°²èÁü¥Þ¥ë¥Á¥­¥ã¥¹¥È¼Â¸³ ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½ÑÊó¹ð, NS2004-199, pp.101-106, Feb. 2005.
  • Y. Huang, K. Ohira, K. Fujikawa, Y. Okabe, Secure Models of Autonomous Distributed Public Wireless Internet Access, DPS, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 2005-DPS-122&2005-CSEC-28 pp. 187-192, Mar 2005.
  • ¹âÌÚ¼£É×,²¬Éô¼÷ÃË,Æ£À¼£,¸Å¼δÌÀ,Ë̲¬Í­´î,¡Ø¤ß¤¢¤³¥Í¥Ã¥ÈÊý¼°¡Ù¤Ç¼Â¸½¡½°Â¿´¡¦°ÂÁ´¤òÀ¸¤à¶¦Í­ºâ¤È¤·¤Æ¤Î̵ÀþLAN, ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯Ï¢·È¥ï¡¼¥¯¥·¥ç¥Ã¥×inµþÅÔ2004, Jul 2004.
  • ÂçÊ¿·ò»Ê,¾®»³Íΰì,Æ£À¼£,²¬Éô¼÷ÃË, IPv6¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¤Î¤¿¤á¤Î¥¢¥É¥ì¥¹³äÅö¤ÈÁ÷¿®¸µ¥¢¥É¥ì¥¹¤ò¹Íθ¤·¤¿·ÐÏ©À©¸æ, ¿®³Øµ»Êó, vol. 104, no. 173, IA2004-11, pp. 25-30,2004ǯ7·î.
  • Ãæ¼ÁÇŵ,ȬÌÚ·¼²ð,²¬Éô¼÷ÃË, IIDC 1394 Digital Camera over IP ¤Ë¤è¤ë±ó³Ö¹ÖµÁÍѹâÉʰ̱ÇÁüÅÁÁ÷¥·¥¹¥Æ¥à¤Î¼ÂÁõ¤È¥×¥í¥È¥³¥ë, ITRC15, May 2004.
  • Æ£À¼£,¾¾Ëܸ»Ë,¾®ÄÍ¿¿·¼,²¬Éô¼÷ÃË, TCP ¥Þ¥ë¥Á¥Û¡¼¥à¥ª¥×¥·¥ç¥ó¤Î¼ÂÁõ¤È SOCKS ¥µ¡¼¥Ð¤Ø¤Î±þÍÑ, ITRC15, May 2004.
  • ÂçÊ¿·ò»Ê,¾®ÄÍ¿¿·¼,¾®»³Íΰì,Æ£À¼£,²¬Éô¼÷ÃË,Hop-by-Hop Address Assignment and Source Address Based Routing for IPv6 End-to-End Multihoming, ITRC15, May 2004.
  • ²«±Ï,Ãæ¼ÁÇŵ,²¬Éô ¼÷ÃË,¸ø³«¸°°Å¹æ¤Ë¤è¤ëÅŻҽð̾¤òÍѤ¤¤¿¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¢¥¯¥»¥¹Êý¼°¤ÎÄó°Æ,ITRC15,May 2004.
  • ²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤¶É½êõº÷Ë¡¤Ë¤è¤ë°ÂÄê·ëº§ÌäÂê¤Î¶á»÷,¿®³Øµ»Êó¡¤Vol.104, No.16, COMP2004-8,pp.53-60, April, 2004.
  • »³°æÀ®ÎÉ¡¦ÈËÅÄŸ»Ë¡¦²¬»³À»É§¡¦µÜ²¼ÂîÌ顦´Ý»³¡¡¿­¡¦Ãæ¼ÁÇŵ, ȯ¿®¼Ôº¾¾Îspam ¥á¡¼¥ë¤Ëµ¯°ø¤¹¤ë¥¨¥é¡¼¥á¡¼¥ë½¸Ãæ¤Ø¤ÎÂкö¼êË¡, ¾ðÊó½èÍý³Ø²ñ FIT2004 Âè3²ó¾ðÊó²Ê³Øµ»½Ñ¥Õ¥©¡¼¥é¥à, 2004ǯ9·î

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • ¸Å¼δÌÀ,ÂçÊ¿·ò»Ê,Æ£À¼£,²¬Éô¡¡¼÷ÃË, ̵ÀþLAN¤Ë¤è¤ë¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹ ¤ß¤¢¤³¥Í¥Ã¥È ¾ðÊó½èÍý³Ø²ñ»ï, Vol.45 No.8, 831-835, Aug 2004.
  • ²¬Éô¼÷ÃË,ËåÈøµÁ¼ù,´ä²¼±Ñ½Ó, ¼¡À¤Â女¥ó¥Ô¥å¡¼¥¿¤Ë¸þ¤±¤¿µ»½ÑŸ˾¤È¾­Íè¤Ø¤Î´üÂÔ, ¥×¥é¥º¥Þ¡¦³ËÍ»¹ç³Ø²ñ»ï, Âè80´¬Âè5¹æ, 382-389, May 2004.
  • µÜºê½¤°ì, °ÂÄê·ëº§ÌäÂê, ÅŻҾðÊóÄÌ¿®³Ø²ñ²ñ»ï, Vol.88, No.3, pp. 195-199, March 2005.

2003ǯÅÙ

ÏÀʸ»ïÏÀʸ

  • ¹âÁÒ¹°´î¡¤¹¾¸¶¹¯À¸¡¤µÜºê½¤°ì¡¤ÂôÅÄÆƻˡ¤Ãæ¼ÁÇŵ¡¤²¬Éô¼÷ÃË¡¤°ÂÁ´¤Ê¥®¥¬¥Ó¥Ã¥È¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à KUINS-III ¤Î¹½À®¤È¥»¥­¥å¥ê¥Æ¥£Âкö, ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï Vol.J86-B No.8 ,pp. 1494-1501, Aug. 2003.
  • ÂôÅÄ ÆÆ»Ë, ¹âÁÒ ¹°´î, ²¬Éô ¼÷ÃË, ³«Êü·¿Â絬Ìϥͥåȥ¥¯¤Î¤¿¤á¤ÎIDS¥í¥°´Æ»ë»Ù±ç¥·¥¹¥Æ¥à, ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, Vol.44, No.8, pp.1861-1871, Aug. 2003.
  • Halldorsson, M., Irving, R., Iwama, K., Manlove, D., Miyazaki, S., Morita, Y. and Scott, S. Approximability Results for Stable Marriage Problems with Ties, Theoretical Computer Science, Vol. 306, pp. 431-447, Sept. 2003.
  • Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro, Avoiding Routing Loops in the Internet, Theory of Computing Systems, 36, 597-609, 2003.

¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë

  • Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro, Polynomial-Time Computable Backup Tables for Shortest-Path Routing, The 10th International Colloquium on Structural Information and Communication Complexity (SIROCCO 2003), pp.163-177, June 2003.
  • Halldorsson, M., Iwama, K., Miyazaki, S. and Yanagisawa, H. Randomized Approximation of the Stable Marriage Problem, Proceedings of the ninth Annual International Computing and Combinatorics Conference (COCOON 2003), (LNCS 2697), pp. 339-350, July 2003. (Big Sky, USA)
  • Komura, T., Fujikawa, K., and Okabe, Y., The MIAKO.NET Public Wireless Internet Service in Kyoto, Proc. of the First ACM International Workshop on Wireless Mobile Applications and WLAN Hotspots (WMASH2003), September 2003.
  • Halldorsson, M., Iwama, K., Miyazaki, S. and Yanagisawa, H., Improved Approximation of the Stable Marriage Problem, Proceedings of the 11th Annual European Symposium on Algorithms (ESA 2003), (LNCS 2832), pp. 266-277, Sep. 2003. (Budapest, Hungary)
  • Komura, T., Kosuga, M., Fujikawa, K., and Okabe, Y., Design and Implementation of the MIAKO.phone Peer-to-peer Mobile IP Phone System, 5th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT2003), November 2003.

¸ýƬȯɽ

  • ½ïÊý ¾¡Ìé, ÂçÊ¿ ·ò»Ê, ¸Å¼ δÌÀ, ¤ß¤¢¤³¥Í¥Ã¥È¤Î¥Í¥Ã¥È¥ï¡¼¥¯¹½À®¤ÈIPv6Âбþ, Âè13²ó ITRCÁí²ñ¡¦¸¦µæ²ñ, May 2003.
  • ÂçÊ¿ ·ò»Ê, ½ïÊý ¾¡Ìé, ¾¾ËÜ Â¸»Ë, Æ£Àî ¸­¼£, ²¬Éô ¼÷ÃË, End-to-End¥Þ¥ë¥Á¥Û¡¼¥à¤Î¤¿¤á¤ÎIPv6¥¢¥É¥ì¥·¥ó¥°¥¢¡¼¥­¥Æ¥¯¥Á¥ã, Âè13²ó ITRCÁí²ñ¡¦¸¦µæ²ñ, May 2003.
  • ¾¾ËÜ Â¸»Ë, Æ£Àî ¸­¼£, ²¬Éô ¼÷ÃË, End-to-End¥Þ¥ë¥Á¥Û¡¼¥àÂбþTCP¤ÎÀ߷פȳ«È¯, ITRC2003 ,21 May, 2003.
  • ÂçÊ¿·ò»Ê, ½ïÊý¾¡Ìé, ¾¾Ëܸ»Ë, Æ£À¼£, ²¬Éô¼÷ÃË, End-to-End ¥Þ¥ë¥Á¥Û¡¼¥à¤Î¤¿¤á¤ÎIPv6¥¢¥É¥ì¥·¥ó¥°¥¢¡¼¥­¥Æ¥¯¥Á¥ã, ¾ðÊó½èÍý³Ø²ñ ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¦Ê¬»¶¡¦¶¨Ä´¤È¥â¡¼¥Ð¥¤¥ë(DICOMO2003)¥·¥ó¥Ý¥¸¥¦¥à, Jun 2003.
  • ²«±Ï,¿¼¯ÍÛ²ð,Ãæ¼ÁÇŵ,ÈþǻƳɧ, ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¥¢¥×¥é¥¤¥¢¥ó¥¹¤ÎÁêÂаÌÃÖ¤ÈÍøÍÑÍúÎò¤ò³èÍѤ·¤¿¥µ¡¼¥Ó¥¹¤ÎÄó¼¨Êý¼°, ¾ðÊó½èÍý³Ø²ñ ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¦Ê¬»¶¡¦¶¨Ä´¤È¥â¡¼¥Ð¥¤¥ë(DICOMO2003)¥·¥ó¥Ý¥¸¥¦¥à, Jun 2003.
  • ½ïÊý¾¡Ìé, ÂçÊ¿·ò»Ê, Æ£À¼£, ²¬Éô¼÷ÃË, IPv6 end-to-end multihoming¤Ë¤è¤ëRSVP¤Î¥â¥Ð¥¤¥ëÂбþ, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 03-QAI, October 2003.
  • Æ£À¼£, ¸Å¼δÌÀ, ²¬Éô¼÷ÃË, µþÅÔ̵Àþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥×¥í¥¸¥§¥¯¥È ¤ß¤¢¤³¥Í¥Ã¥È, Ê¿À®15ǯÅŵ¤´Ø·¸³Ø²ñ´ØÀ¾»ÙÉôÏ¢¹çÂç²ñ S8-3 Nobember 2003.
  • K. Ohira, K. Ogata, A. Matsumoto, K. Fujikawa, Y. Okabe, IPv6 Address Assignment and Route Selection for End-to-End Multihoming, Âè14²ó ITRCÁí²ñ¡¦¸¦µæ²ñ, November 2003.
  • ²ÃÆ£½Óºö¡¤µÜºê½¤°ì¡¤²¬Éô¼÷ÃË,ÉÔÀµ¤ò¸¡½Ð¤Ç¤­¤ë¥Í¥Ã¥È¥ï¡¼¥¯·³¿Í¾­´ý, ¿®³Øµ»Êó¡¤ Vol.103, No.499, ISEC2003-84,pp.1-6, Dec., 2003.
  • A. Matsumoto, M. Kozuka, K. Fujikawa, Y. Okabe, TCP Multi-Home Options, WIT2003, 5 Nov, 2003.
  • ÀîÀ¾ÃÒÌé, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, ÈþÇ» Ƴɧ, FEC¤ÈPath-Diversity¤òÍøÍѤ·¤¿²óÉü²Äǽ¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 2003-DPS 116-014, Jan. 2004.
  • ¸Å¼δÌÀ, ÂçÊ¿·ò»Ê, Æ£À¼£, ²¬Éô¼÷ÃË, ¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥×¥í¥¸¥§¥¯¥È¡Ö¤ß¤¢¤³¥Í¥Ã¥È¡×¤Î±¿Íѵ»½Ñ, ¾ðÊó½èÍý³Ø²ñʬ»¶¥·¥¹¥Æ¥à/¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à2004 (DSM2004), February 2004.
  • FUJIKAWA Kenji, KOMURA Takaaki, OKABE Yasuo, The MIAKO.NET Public Wireless Internet Service in Kyoto, Proceedings of International Conference on Informatics Research for Development of Knowledge Society Infrastructure 2004, March 2004.
  • ²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë¶É½êõº÷¶á»÷¥¢¥ë¥´¥ê¥º¥à,ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ2004 D-1-2, March 2004.
  • ²¬Éô¼÷ÃË, ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Î´ðÁà ¡½¥¢¥ë¥´¥ê¥º¥à¤ÎΩ¾ì¤«¤é¡½, ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ2004 TD-1-1, March 2004.
  • ´Ý»³¿­, Ãæ¼ ÁÇŵ, ²¬Éô¼÷ÃË, »³°æÀ®ÎÉ, ưŪ¤Ë±þÅú¤¬ÊѲ½¤¹¤ë¥Í¡¼¥à¥µ¡¼¥Ð¡¼µ»½Ñ¤Î¥á¡¼¥ëÇÛÁ÷¥¨¡¼¥¸¥§¥ó¥È¤Ø¤Î±þÍÑ, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 03-DSM, 032-014, March 2004.
  • Îú¡¡°ìÊ¿¡¦»³°æÀ®ÎÉ¡¦²¬»³À»É§¡¦µÜ²¼ÂîÌ顦´Ý»³¡¡¿­¡¦Ãæ¼ÁÇŵ, ÃÙ±äɾ²Á¤Ë¤è¤ëʬ»¶¶¨Ä´·¿spam ¥Õ¥£¥ë¥¿¤Î¸¡½ÐΨ¸þ¾å, Ê¿À®15ǯÅÙCSEC¸¦µæȯɽ²ñ Âè24²ó, 2004ǯ3·î
  • ´Ý»³ ¿­¡¦ºÇÅÄ·ò°ì¡¦¾®ÄÍ¿¿·¼¡¦Àж¶Í³»Ò¡¦ÃÓÅÄ¿´¡¦¿¹´´É§¡¦´î¿°ì, Virtual Machine ¤ò³èÍѤ·¤¿Ê¬»¶½èÍý¥·¥¹¥Æ¥à¹½ÃÛ¡¦±¿Íѵ»½Ñ¡¿¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à2004, 2004ǯ1·î

¹ñºÝɸ½à²½Äó°Æ

  • Arifumi Matsumoto, Kenji Fujikawa, Yasuo, Okabe, Basic Socket API Extension for LIN6 End-to-End Multi-home, IETF Internet-Draft, 23 June 2003.
  • Arifumi Matsumoto, Masahiro, Kozuka, Kenji Fujikawa, Yasuo Okabe, TCP Multi-Home Options, IETF Internet-Draft, 7 Oct 2003.
  • Arifumi Matsumoto, Masahiro, Kozuka, Kenji Fujikawa, Yasuo Okabe, TLC-FM, IETF Internet-Draft, 7 Oct 2003.
  • K. Ohira, K. Ogata, A. Matsumoto, K. Fujikawa, Y. Okabe, IPv6 Address Assingment and Route Selection for End-to-End Multihoming, IETF Internet-Draft, November 2003.

³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ

  • ²¬Éô¼÷ÃË, µþÅԤˤª¤±¤ëIT¤ò³èÍѤ·¤¿Âç³Ø¤ÎÃϰ趵°é¹×¸¥, View Point, Âè4¹æ, 10-15, Mar. 2004.
Last-modified: 2022-03-31 (Thu) 14:53:52