Top/Çî»Î³Ø°ÌÏÀʸ¡¦½¤»ÎÏÀʸ

Çî»Î³Ø°ÌÏÀʸ

2021ǯÅÙ

2022ǯ3·î

  • ´Ø¸ýδ¾¼, ¥«¡¼¥Ê¥Ó¥²¡¼¥·¥ç¥ó¤Î¤¿¤á¤ÎÃÏÍý¶õ´Ö¾ðÊó¤ÎÅÁã¤Ë´Ø¤¹¤ë¸¦µæ
  • Koki Hamada, Algorithms for Stable Matching Problems toward Real-World Applications

2019ǯÅÙ

2020ǯ3·î

  • ¾âËÜÍÌ, Web¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤ËÂФ¹¤ë¥µ¥¤¥Ð¡¼¹¶·â¤Î¸úΨŪ¤Ê¸¡ÃÎ

2018ǯÅÙ

2019ǯ3·î

  • »û²¬½¨ÉÒ, ¥Í¥Ã¥È¥ï¡¼¥¯Àܳ¤µ¤ì¤¿Áȹþ¤ß¥·¥¹¥Æ¥à¤Î³ÈÄ¥À­¤Ë´Ø¤¹¤ë¸¦µæ

2018ǯ11·î

  • À¶¿å¤µ¤ä»Ò, Âç³Ø¤Ë¤ª¤±¤ë¥¢¥¯¥»¥¹¥Þ¥Í¥¸¥á¥ó¥È¤Ë´Ø¤¹¤ë¸¦µæ

2017ǯÅÙ

2017ǯ5·î

  • ¾¾ËÜμ²ð, Web¥µ¡¼¥Ð¤Î¹â½¸ÀÑ¥Þ¥ë¥Á¥Æ¥Ê¥ó¥È¥¢¡¼¥­¥Æ¥¯¥Á¥ã¤Ë´Ø¤¹¤ë¸¦µæ

2016ǯÅÙ

2017ǯ3·î

  • Èþ¸¶µÁ¹Ô, ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍýµ»½Ñ¤È±þÍÑ¥µ¡¼¥Ó¥¹¤Ë´Ø¤¹¤ë¸¦µæ

2015ǯÅÙ

2016ǯ3·î

  • Daisuke Kotani, Stability and Robustness of Control Planes in OpenFlow Networks

2014ǯÅÙ

2014ǯ7·î

  • Naoyuki Morimoto, Design and Analysis of Algorithms for Graph Exploration and Resource Allocation Problems and Their Application to Energy Management

2011ǯÅÙ

2011ǯ7·î

  • Mitsuo Okada, Asymmetric and Pseudo-Blind Digital Watermarking for Fair and Privacy-Secure Digital Content Trading

2010ǯÅÙ

2011ǯ3·î

  • Kazuya Suzuki, Studies on Network Monitoring Systems to Reveal Suspicious Activities

2010ǯ7·î

  • ÂçÊ¿·ò»Ê, ¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÀܳ¤ÎÄã´ÉÍý¥³¥¹¥È¤Ê±¿ÍѤ˴ؤ¹¤ë¸¦µæ
  • ´Ý»³¿­, ʬ»¶²½¡¦¾éĹ²½¤òÍѤ¤¤¿¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à¤Î¹â¿®Íê²½¤Ë´Ø¤¹¤ë¸¦µæ

2008ǯÅÙ

2009ǯ3·î

  • Koji Kobayashi, Competitive Analysis of Online Problems on Networks
  • Jungsuk Song, Studies on High-Performance Network Intrusion Detection System Based on Unsupervised Machine Learning

½¤»ÎÏÀʸ

2023ǯÅÙ

  • ¹¾Ê¿ ÃÒÇ·, Distributed Tracing for Cascading Changes of Objects in the Kubernetes Control Plane Kubernetes À©¸æ¥×¥ì¡¼¥ó¤Ë¤ª¤±¤ë¥ª¥Ö¥¸¥§¥¯¥È¤ÎÏ¢º¿ÅªÊѹ¹¤Îʬ»¶¥È¥ì¡¼¥·¥ó¥°¼êË¡¡Ë
  • Ê¿°æ ²í¿Í, Putting Authorization Serverson User-owned Devices in User-Managed Access ¡ÊUser-Managed Access¤Ë¤ª¤±¤ë¥æ¡¼¥¶½êÍ­¤ÎüËö¤Îǧ²Ä¥µ¡¼¥Ð²½¡Ë
  • üâÅè °ì¼ù, DDoS Attack Information Sharing Among CDNs Interconnected Through CDNI ¡ÊCDNI ¤òÄ̤·¤ÆÁê¸ßÀܳ¤µ¤ì¤¿ CDN ´Ö¤ÇÍ­¸ú¤ÊDDoS ¹¶·â¾ðÊó¶¦Í­¼êË¡¡Ë
  • ¼»³ ·òÂÀ, Detection of Communication Quality Degradation Based on Similarity Among Time Series Data of TCP Flows Using Passive Measurement ¡Ê¥Ñ¥Ã¥·¥Ö·×¬¤òÍѤ¤¤¿ TCP ¥Õ¥í¡¼¤Î»þ·ÏÎó¥Ç¡¼¥¿´Ö¤ÎÎà»÷Å٤˴ð¤Ä゙¤¯ÄÌ¿®ÉʼÁÎô²½¤Î¸¡ÃΡË

2022ǯÅÙ

  • »ûÅÄ ·òÂÀ, Breaking Puzzle-Based CAPTCHAs by CNN ¡Ê¥Ñ¥º¥ë·¿CAPTCHA¤ËÂФ¹¤ëCNN¤Ë¤è¤ëÆÍÇË¡Ë
  • ßÀÅç ·½Í¤, Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents ¡Ê¥Þ¥ë¥¦¥§¥¢Æ°Åª²òÀϤˤª¤±¤ë¥Õ¥¡¥¤¥ëÆâÍƤòÈëÆ¿¤·¤¿ÉôʬŪ¤Ê³°Éô°ÑÂ÷¡Ë
  • ¾¾ËÜ Ä¾¼ù, Reducing Data Transfer with Binary Delta Encoding in Container Image Updating ¡Ê¥³¥ó¥Æ¥Ê¥¤¥á¡¼¥¸¹¹¿·¤Ë¤ª¤±¤ë¥Ð¥¤¥Ê¥êº¹Ê¬Éä¹æ¤Ë´ð¤Å¤¯¥Ç¡¼¥¿Å¾Á÷Î̺︺¡Ë
  • ¿åë ¹äÂç Visibility of Attack-related Traffic Trends in Sparsely Populated Darknets ¡Ê¾®µ¬ÌÏ¥À¡¼¥¯¥Í¥Ã¥È·²¤òÍѤ¤¤¿¹¶·â´ØÏ¢¥È¥é¥Õ¥£¥Ã¥¯¤Î·¹¸þ¤Î²Ä»ëÀ­¡Ë

2021ǯÅÙ

  • ¾®ÎÓ²íµ¨, Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities ¡ÊÀȼåÀ­¤ÎPoC¥³¡¼¥É¤Ë¤ª¤±¤ëÌÖÍåŪ¤Ê¼Â¹Ô¥Ñ¥¹Ãµº÷¤Ë¤è¤ëIDS ¤Î¥·¥°¥Í¥Á¥ãÀ¸À®¡Ë
  • º´ÃÝÀ¿, Competitive Analysis for the Online Facility Assignment Problem on a Line ¡ÊľÀþ¾å¤Î¥ª¥ó¥é¥¤¥ó»ÜÀß³äÅöÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ¡Ë
  • È«»³¹·Âç, Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication ¡Ê¸ø³«¸°Ç§¾Ú¤Ë¤ª¤±¤ëÊ£¿ôǧ¾Ú´ï¤Î½êÍ­¼Ô¤Ë´ð¤Å¤¯¸°´ÉÍý¡Ë

2020ǯÅÙ

  • ±»ËÜÂóÌé, Analysis of AS-Level Maps of the Internet Focusing on Placement of Vantage Points ¡ÊVantage Point¤ÎÇÛÃÖ¤ËÃå⽬¤·¤¿AS¥ì¥Ù¥ë¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥Þ¥Ã¥×¤Î²òÀÏ¡Ë
  • ÂçÀ¾·ûÂÀϺ, Network Control in a Cloud Platform Using Identities of Workloads ¡Ê¥¯¥é¥¦¥É´ðÈפˤª¤±¤ëWorkload ¤ÎIdentity ¤òÍѤ¤¤¿¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¡Ë
  • À¾²¬¹¬Íè, Mutual Secrecy of Attributes and Authorization Policies in Identity Federation ¡Êǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë°À­ÃͤÈǧ²Ä¾ò·ï¤ÎÁê¸ßÈëÆ¿¡Ë

2019ǯÅÙ

  • ¹Ó°æµ£, Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning ¡Ê¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ëµ¡³£³Ø½¬¤òÍѤ¤¤¿¥Ü¥Ã¥È¤Î¸¡ÃΡË
  • ¾¾»³Í´µ®, Generating Stable Marriage Instances with Optimal Solutions ¡Ê°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëºÇŬ²òÉÕ¤­ÎãÂêÀ¸À®¡Ë
  • ÍûÅìÍÛ, Improving Attack Detection Performance in NIDS Using GAN ¡ÊŨÂÐŪÀ¸À®¥Í¥Ã¥È¥ï¡¼¥¯(GAN)¤òÍѤ¤¤¿¥Í¥Ã¥È¥ï¡¼¥¯¿¯Æþ¸¡ÃÎ¥·¥¹¥Æ¥à(NIDS) ¤Î¹¶·â¸¡ÃÎÀ­Ç½²þÁ±¡Ë

2018ǯÅÙ

  • ß·ÅijÊ, Network Routing Optimization Based on Machine Learning Using Graph Networks Robust against Topology Change ¡Ê¥È¥Ý¥í¥¸¡¼ÊѲ½¤ËÂбþ¤Ç¤­¤ë¥°¥é¥Õ¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿µ¡³£³Ø½¬¤Ë´ð¤Å¤¯¥Í¥Ã¥È¥ï¡¼¥¯·ÐÏ©ºÇŬ²½¡Ë

2017ǯÅÙ

  • ½©µÈμ, Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet ¡ÊÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤È¥À¡¼¥¯¥Í¥Ã¥È¤Î´ØÏ¢ÉÕ¤±¤Ë¤è¤ë¿·¤¿¤ÊÂ絬ÌÏ¥¹¥­¥ã¥ó³èÆ°¤Î¸¡ÃΡË
  • ¾®´ä¹îµ±, A Low-Interaction Honeypot Observing Attacks against HTTP/2 ¡ÊHTTP/2¤ËÂФ¹¤ë¹¶·â¤ò´Ñ¬¤¹¤ëÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤Î¹½ÃÛ¡Ë
  • ½¡¸÷Íã, Tunneling-based Network Traffic Engineering Using Mixed Integer Programming ¡Êº®¹çÀ°¿ô·×²èË¡¤òÍøÍѤ·¤¿¥È¥ó¥Í¥ê¥ó¥°¤Ë¤è¤ë¥È¥é¥Õ¥£¥Ã¥¯¥¨¥ó¥¸¥Ë¥¢¥ê¥ó¥°¡Ë
  • »³ºê·¼ÂÀϺ, Xilara: An XSS Filter Based on HTML Template Restoration ¡ÊXilara: HTML¥Æ¥ó¥×¥ì¡¼¥È¤ÎÉü¸µ¤òÍѤ¤¤ëXSS¥Õ¥£¥ë¥¿¡Ë

2016ǯÅÙ

  • °Ëƣͧ¹À, A Threshold-based Authentication System Which Provides Attributes Using Secret Sharing ¡Ê°À­¾ðÊó¤òÈë̩ʬ»¶¤·¤¿ïçÃÍ·¿Ç§¾Ú¥·¥¹¥Æ¥à¡Ë
  • ·¬¸¶µ®ÌÀ, Mitigating Flooding DDoS Attacks with Per-Service Bandwidth Control at Firewalls ¡Ê¥Õ¥¡¥¤¥¢¥¦¥©¡¼¥ë¤Ë¤ª¤±¤ë¥µ¡¼¥Ó¥¹Ã±°Ì¤ÎÂÓ°èÀ©¸æ¤Ë¤è¤ë¥Õ¥é¥Ã¥É·¿DDoS ¹¶·â¤Ø¤ÎÂкö¡Ë
  • ¹âȫͪ, An Anonymous Distributed Electronic Voting System Using Zerocoin, ¡ÊZerocoin ¤òÍøÍѤ·¤¿Æ¿Ì¾Ê¬»¶·¿ÅÅ»ÒÅêɼ¥·¥¹¥Æ¥à¡Ë

2014ǯÅÙ

  • ÅÄÅç¾Èµ×, Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN ¡Ê̵ÀþLAN¤Ë¤ª¤±¤ëWebÂδ¶ÉʼÁ¸þ¾å¤Î¤¿¤á¤Î¥Ñ¥±¥Ã¥ÈÁ÷¿®À©¸æºÇŬ²½¡Ë
  • ÄÔÈø¾°¼ù, A Traceable and Pseudonymous P2P Information Distribution System ¡Êȯ¿®¼ÔÄÉÀײÄǽ¤Ê²¾Ì¾·¿ P2P ¾ðÊóȯ¿®¥·¥¹¥Æ¥à¡Ë
  • Andrew Lee, The Minimum Diameter Multiple Steiner Tree Problem for Embedding Multiple VLANs ¡ÊÊ£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎºÇ¾®Ä¾·ÂÊ£¿ô¥¹¥¿¥¤¥Ê¡¼ÌÚÌäÂê¡Ë

2013ǯÅÙ

  • ÄÛÆâ¾­Ç·, Digital Watermarking Method on Executable Files for Tracking Illegal Uploaders ¡Ê¥½¥Õ¥È¥¦¥§¥¢ÉÔÀµ¥¢¥Ã¥×¥í¡¼¥É¼ÔÄÉÀפΤ¿¤á¤Î¼Â¹Ô·Á¼°¥Õ¥¡¥¤¥ë¤Ø¤ÎÅÅ»ÒÆ©¤«¤·ÁÞÆþ¡Ë

2012ǯÅÙ

2013ǯ3·î

  • ²¬ËÜÂç¼ù, Cooperative Load Distribution for Addressing Flash Crowds Using PsP File Sharing Network ¡ÊP2P¥Õ¥¡¥¤¥ë¶¦Í­¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿¥Õ¥é¥Ã¥·¥å¥¯¥é¥¦¥ÉÂÑÀ­¤Î¤¢¤ë¶¨Ä´·¿Éé²Ùʬ»¶¼êË¡¡Ë
  • »ûËÜÂÙÂç, Managing networks independently of the physical topology by Service Defined Network ¡ÊService Defined Network¡Ê£Ó£ö£Ä£Î¡Ë¤Ë¤è¤ëʪÍý¹½À®¤Ë°Í¸¤·¤Ê¤¤¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍý¡Ë
  • ²£È«À¿Ìé, An Extension and Evaluation of Power over Ethernet for on-Demand Power Supply ¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¤Î¤¿¤á¤ÎPower over Ethernet¤Î³ÈÄ¥¡Ë

2012ǯ9·î

  • ¾®Ã«ÂçÍ´, Stable handling of heavy flows in OpenFlow networks ¡Ê£Ï£ð£å£î£Æ£ì£ï£÷¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¹â¥È¥é¥Õ¥£¥Ã¥¯¤Ê¥Õ¥í¡¼¤Î°ÂÄêŪ¤Ê½èÍý¡Ë

2011ǯÅÙ

  • Âç¿À¾Ä, Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation ¡Ê¥»¥­¥å¥¢¤ÊID ÊÑ´¹¤Ë¤è¤ëSAMLÏ¢·È¤Ë¤ª¤±¤ë¸Ä¿Í¾ðÊó¤ÎµÕή½Ð¤Ë ÂФ¹¤ë²¾Ì¾À­Êݸî¡Ë
  • ¹â¶¶¶Ç¹°, Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol ¡ÊHost Identity Protocol¤òÍѤ¤¤¿¥»¥­¥å¥¢¤Ê¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹¥â¥Ç¥ë¤ÎÀ߷פȼÂÁõ¡Ë
  • µÜËÜÂöÌé, A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking ¡Ê²ÈÄíÆ⥪¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤Ë¤ª¤±¤ëGMPLS·¿ÅÅÎÏ»ñ¸»Í½Ìó¥·¥¹¥Æ¥à¡Ë

2010ǯÅÙ

  • Àж¶Áï, Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate Authority ¡Ê¿®Íê¤Ç¤­¤ëÃç²ð¼Ô¤òɬÍפȤ·¤Ê¤¤ÅÅ»Òʸ½ñÇÛã¾ÚÌÀ¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ¡Ë
  • ¼ÆÅÄÃε±, The Design and Implementation of an Energy On-Demand DC Grid in Home ¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâľήÁ÷ÅÅÌÖ¤ÎÀ߷פȼÂÁõ¡Ë
  • ÀÐÅÄÊݵ±, High-Performance Intrusion Detection Using OptiGrid and Grid-Based Labelling ¡ÊOptiGrid¥¯¥é¥¹¥¿¥ê¥ó¥°¤È¥°¥ê¥Ã¥É¤òÍøÍѤ·¤¿¥é¥Ù¥ê¥ó¥°¤Ë¤è¤ë¹âÀºÅ٤ʰ۾︡ÃΡË

2009ǯÅÙ

  • ÃæÅÄ·ò²ð, An Analysis of Network IDS Alerts to Grasp Attack Situation ¡Ê¥Í¥Ã¥È¥ï¡¼¥¯·¿IDS¤Î¥¢¥é¡¼¥È²òÀϤˤè¤ë¹¶·â¾õ¶·¤ÎÇÄ°®¼êË¡¡Ë
  • Ê¡ÅĹä»Î, Online Algorithms for the k-Canadian Traveller Problem on Restricted Graphs ¡ÊÀ©¸Â¤µ¤ì¤¿¥°¥é¥Õ¾å¤Ç¤Îk-Canadian Traveller Problem¤ËÂФ¹¤ë¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à¡Ë
  • Æ£ËÜ·½, £Ñ£ï£Å£î(Quality of Energy)Power Routing toward Energy-on-Demand Home Network ¡Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤Î£Ñ£ï£Å£î(¥¨¥Í¥ë¥®¡¼ÉʼÁ)¤ò¹Íθ¤·¤¿·ÐÏ©À©¸æ¡Ë

2008ǯÅÙ

  • À¶¿å·ÉÂÀ, Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange ¡ÊƱ»þÈëÌ©¸ò´¹¤òÍøÍѤ·¤¿ÇÛãÆâÍƾÚÌÀ¤¬²Äǽ¤ÊÅŻҥ᡼¥ë¥·¥¹¥Æ¥à¤ÎÀ߷פª¤è¤Ó¼ÂÁõ¡Ë
  • Á°Àî·Ä»Ê, A Location Privacy Protection Framework with Mobility Using Host Identity Protocol ¡ÊHost Identity Protocol¤òÍѤ¤¤¿°ÜÆ°ÄÌ¿®¤Î¤¿¤á¤Î¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·Êݸî¥Õ¥ì¡¼¥à¥ï¡¼¥¯¡Ë

2007ǯÅÙ

  • ¹âÌÚ½Ó¹¨, Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols ¡Ê¥Þ¥¸¥Ã¥¯¥×¥í¥È¥³¥ëÍøÍѤˤè¤ë¥×¥é¥¤¥Ð¥·¡¼¤ËÇÛθ¤·¤¿Shibboleth°À­¸ò´¹¤Î³ÈÄ¥¡Ë
  • Á°ÅÄÊþ¹§, Path Alternation in Real-Time Video Streaming using PR-SCTP ¡ÊPR-SCTP¤ò¤â¤Á¤¤¤¿¥ê¥¢¥ë¥¿¥¤¥à±ÇÁüÅÁÁ÷¤Ë¤ª¤±¤ë·ÐÏ©ÀÚ¤êÂؤ¨¡Ë
  • ¿¹Ëܾ°Ç·, Improving Competitive Ratios for the Online Graph Exploration Problem ¡Ê¥ª¥ó¥é¥¤¥ó¥°¥é¥Õõº÷ÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ¤Î²þÎÉ¡Ë

2006ǯÅÙ

  • ÂçÄíÈ»¿Í, Analysis of IDS Data over Large Scaled Open Networks and Its Visualization Utilizing Machine Learning ¡Ê³«Êü·¿Â絬Ìϥͥåȥ¥¯¤Ë¤ª¤±¤ëIDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤȵ¡³£³Ø½¬¤òÍѤ¤¤¿²Ä»ë²½¡Ë
  • Æ£¸¶æÆ°ìϯ, A Privacy Enhanced Extension of Attribute Exchange in the SAML Framework and its Application to Shibboleth Authorization ¡ÊSAML¥Õ¥ì¡¼¥à¥ï¡¼¥¯¤Ë¤ª¤±¤ë°À­¸ò´¹¤Î¥×¥é¥¤¥Ð¥·¡¼¤ò¶¯²½¤·¤¿³ÈÄ¥¤ª¤è¤Ó¤½¤ÎShibbolethǧ²Ä¤Ø¤ÎŬÍÑ¡Ë
  • ÅÏÊÕ°ê·Ã, Design and Implementation of TCP-Friendly Multi-Path Streaming System ¡ÊÊ£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ¡Ë

2005ǯÅÙ

  • ¾®ÎÓ¹ÀÆó, Improving Competitive Ratios of Online Buffer Management for Shared-Memory Switches and Multi-Queue Switches ¡Ê¶¦Í­¥á¥â¥ê·¿¥¹¥¤¥Ã¥Á¤È¥Þ¥ë¥Á¥­¥å¡¼¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ¡Ë
  • ÃæÌîË­, Analysis for Topological Properties of Networks Feeding Netnews ¡Ê¥Í¥Ã¥È¥Ë¥å¡¼¥¹ÇÛÁ÷ÌÖ¤Î¥È¥Ý¥í¥¸¡¼¤Ë¤ª¤±¤ë½ôÀ­¼Á¤Î²òÀÏ¡Ë

2004ǯÅÙ

  • À¾Â¼Í´²ð, P2P¥Í¥Ã¥È¥ï¡¼¥¯¾å¤Ç¤Î¥ª¥ó¥é¥¤¥ó¥²¡¼¥à¤Î°ÂÁ´¤Ê¼Â¹Ô
  • ²«±Ï, Secure Models of Autonomous Distributed Public Wireless Internet Access Services ¡Ê¼«Î§Ê¬»¶·¿¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¢¥¯¥»¥¹¥µ¡¼¥Ó¥¹¤Î¥»¥­¥å¥ê¥Æ¥£¥â¥Ç¥ë¡Ë

2003ǯÅÙ

  • ÂçÊ¿·ò»Ê, Address Assignment and Route Selection for IPv6 End-to-End Site Multihoming¡ÊIPv6¤Ë¤ª¤±¤ë¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥µ¥¤¥È¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¼Â¸½¤Î¤¿¤á¤Î¥¢¥É¥ì¥¹³äÅö¤È·ÐÏ©ÁªÂò¡Ë
  • ½ïÊý¾¡Ìé, Mobility Support for RSVP with IPv6 End-to-End Multihoming ¡ÊIPv6¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¤Ë¤è¤ëRSVP¤Î¥â¥Ð¥¤¥ëÂбþ¡Ë
  • ²ÃÆ£½Óºö, Cheat-Proof Serverless Network Games¡ÊÉÔÀµ¤òµö¤µ¤Ê¤¤¥µ¡¼¥Ð¥ì¥¹¥Í¥Ã¥È¥ï¡¼¥¯¥²¡¼¥à¡Ë
  • ¾¾Ëܸ»Ë, Design and Implementation of End-to-End Mutihoming Systems ¡Ê¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°Êý¼°¤ÎÀ߷פȼÂÁõ¡Ë

2001ǯÅÙ

  • ¾åÅijٻË, ²èÁü¤Î¸õÊä¤ò¹Ê¤ê¹þ¤àÊ£¿ô¤Î´ð½à¤Î¼«Æ°À¸À®¤È¤½¤ÎÁªÂò¤Ë´ð¤Å¤¯²èÁüõº÷
  • ËÌÀîÂóϺ, NOTASIP¤Ë´ð¤Å¤¤¤¿¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÅÅÏÃ¥·¥¹¥Æ¥à
  • º´¡¹ÌÚ´ðÀ², ³¬Áز½QoS¥ë¡¼¥Æ¥£¥ó¥°¥×¥í¥È¥³¥ë¤Ë¤ª¤±¤ë¥ê¥ó¥¯¾ðÊó¹­¹ð¼êË¡
  • À¹°Ò, QoSÊݾڥޥë¥Á¥­¥ã¥¹¥ÈÂбþIP¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë²Ý¶â¥×¥í¥È¥³¥ë¤ÎÀ߷פȼÂÁõ

¹©³ØÉô¾ðÊó³Ø²Ê·×»»µ¡²Ê³Ø¥³¡¼¥¹ÆÃÊ̸¦µæÊó¹ð½ñ

2023ǯÅÙ

  • ¾åÅÄÁó°ìϯ, unikernel ¤òÍѤ¤¤¿³ÖÎ¥À­¡¦²ÄÈÂÀ­¤Î¹â¤¤WebAssembly ¤Î¼Â¹Ô´Ä¶­
  • ÊÒ²¬ËêÇ·²ð, ¥Í¥Ã¥È¥ï¡¼¥¯µóÆ°¾ðÊó¤òÍøÍѤ·¤¿SPA¥Ù¡¼¥¹¤ÎưŪ¥¢¥¯¥»¥¹À©¸æ
  • ½Õ̾·òÂÀϺ, P4¤Ç¤ÎXor Filter¤ò⽤¤¤¤¿¥á¥â¥ê¸úΨ¤Î⾼¤¤¥É¥á¥¤¥ó¥Ö¥í¥Ã¥¯¥ê¥¹¥È

2022ǯÅÙ

  • ÀÄ»³ ÂçÚð, TLS¥»¥Ã¥·¥ç¥ó¥ê¥µ¥ó¥×¥·¥ç¥ó¤òÍøÍѤ·¤¿¥¯¥é¥¦¥É´ÉÍýIoT¥Ç¥Ð¥¤¥¹¤Î¾ÚÌÀ½ñ¼º¸ú¸å¤ÎÉüµìÍÑÄÌ¿®Ï©¤Î³ÎÊÝ
  • Èø¾å ´²Ìï, Ê£¿ô´Ä¶­¤Ç¥Þ¥¤¥¯¥í¥µ¡¼¥Ó¥¹¤ò¶¦ÍѤ¹¤ë¤¿¤á¤Î¥×¥í¥È¥³¥ëÈó°Í¸¤Ê¥³¥ó¥Æ¥¯¥¹¥ÈÅÁÇÅ
  • ²¼ÅÄ ¹¯À¤, ¥¢¥Ê¥í¥°¡¦¥Ç¥£¥¸¥¿¥ëÊ»ÍѤΰۼï¾éĹ¤Ê·×¬·Ï¤Ë¤è¤ë¥Ç¡¼¥¿´°Á´À­¤È²ÄÍÑÀ­¤ÎÊݸî

2021ǯÅÙ

  • ¹¾Ê¿ÃÒÇ·, KubernetesÀ©¸æ¥×¥ì¡¼¥ó¤Ë¤ª¤±¤ë½¾Â°¥ê¥½¡¼¥¹¤ÎÏ¢º¿ÅªÊѹ¹¤Î´Æ»ë
  • Ê¿°æ²í¿Í, ¥¼¥í¥È¥é¥¹¥Èǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë°Û¤Ê¤ë¥Ç¡¼¥¿¥½¡¼¥¹´Ö¤Î¥³¥ó¥Æ¥­¥¹¥È¤Îɳ¤Å¤±
  • ¼»³·òÂÀ, Ê£¿ô¤ÎTCP¥Õ¥í¡¼¤Î¥Ñ¥Ã¥·¥Ö·×¬¤Ë¤è¤ë¾åή¥Í¥Ã¥È¥ï¡¼¥¯¤Î¾õÂÖ¿äÄê

2020ǯÅÙ

  • »ûÅÄ·òÂÀ, ¥¯¥é¥¦¥É·¿CAPTCHA¤ËÂФ¹¤ëbot¤Ë¤è¤ë¥¢¥¯¥»¥¹¤ÎʬÀÏ
  • ßÀÅç ·½Í¤, ÂÐÏÃŪ¤ËÄÌ¿®À©¸æ¤¬²Äǽ¤Ê¥Þ¥ë¥¦¥§¥¢²òÀÏ¥·¥¹¥Æ¥à
  • ¾¾ËÜľ¼ù, ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¥±¥¤¥Ñ¥Ó¥ê¥Æ¥£¤Ë´ð¤Å¤¯¥æ¡¼¥¶¡¼¼çÂΤÎǧ²ÄµÚ¤Ó¥¢¥¯¥»¥¹À©¸æ

2019ǯÅÙ

  • ¾®ÎÓ²íµ¨, À©¸æ¥Ñ¥¹¤ÎÁ´Îóµó¤Ë¤è¤ëMetasploit¹¶·â¥³¡¼¥É¤¬½ÐÎϤ¹¤ë¹¶·â¥Ñ¥±¥Ã¥È¤ÎÌÖÍåŪÀ¸À®
  • È«»³¹·Âç, ¥¼¥í¥È¥é¥¹¥Èǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë¥æ¡¼¥¶Æ±°ÕÉÕ¤­¥³¥ó¥Æ¥­¥¹¥È¶¦Í­
  • º´ÃÝÀ¿, À©¸Â¤µ¤ì¤¿¥ª¥ó¥é¥¤¥óÆóÉô¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ

2018ǯÅÙ

  • ±»ËÜÂóÌé, ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Ë¤ª¤±¤ë°Û¤Ê¤ëÃÏ°è¤ÎTier2¤ÎASƱ»Î¤ÎÀܳ´Ø·¸¤ÎʬÀÏ
  • ÎÓϹ¬, ¥µ¥¤¥Ð¡¼¶¼°Ò¾ðÊó¤Ë´ð¤Å¤¯¥¤¥ó¥·¥Ç¥ó¥ÈȯÀ¸·¹¸þ¤Îͽ¬
  • À¾²¬¹¬Íè, Shibboleth¤Ç¤Î¥·¥ó¥°¥ë¥µ¥¤¥ó¥ª¥ó¤Ë¤ª¤±¤ë¥¢¥«¥¦¥ó¥È°ÜÆ°¤Î°ì³çÀ©¸æ
  • ¼ãÎÓ·Ä, ¥È¥é¥Õ¥£¥Ã¥¯·¹¸þ¤Ë´ð¤Å¤¤¤¿Access Control List¤ÎºÆ¹½ÃÛ

2017ǯÅÙ

  • ¹Ó°æµ£, ¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ë¥ê¥¹¥¯¥Ù¡¼¥¹Ç§¾Úµ»½Ñ¤ÎÍøÍÑ
  • ¾¾»³Í´µ®, ºÇÂ祵¥¤¥º°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëºÇŬ²ò¤¬´ûÃΤÎÎãÂêÀ¸À®

2001ǯÅÙ

  • ³Þ¾¾·ò°ì, ¥³¥Þ¥ó¥É¥Ñ¥¤¥×¥é¥¤¥ó¤Ë¤è¤ë¥Þ¥ë¥Á¥á¥Ç¥£¥¢¥¹¥È¥ê¡¼¥à½èÍý
  • ¾¾Ëܸ»Ë, ¥â¥Ð¥¤¥ë¥Í¥Ã¥È¥ï¡¼¥¯¥¢¡¼¥­¥Æ¥¯¥Á¥ãLIN6¤Î¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°Âбþ

ÏÀʸ

Last-modified: 2024-07-14 (Æü) 18:34:13