- -Çî»Î³Ø°ÌÏÀʸ¡¦½¤»ÎÏÀʸ
- -Ìܼ¡
- ----
- *2022ǯÅÙ [#y800e0f8]
- **¸ýƬȯɽ¤Ê¤É [#ra3e067a]
- - ¿åë¹äÂç, ¾®Ã«ÂçÍ´, ²¬Éô¼÷ÃË, '¥À¡¼¥¯¥Í¥Ã¥È¤Ë¤ª¤±¤ë¥¢¥É¥ì¥¹¶õ´Öµ¬ÌϤÎÊѲ½¤Ëȼ¤¦²Ä»ëÀ¤ÎÊѲ½', ¾ðÊó½èÍý³Ø²ñÂè84²óÁ´¹ñÂç²ñ 1ZD-01, 2022ǯ3·î.
- *2021ǯÅÙ [#jdaa1e19]
- **ÏÀʸ»ïÏÀʸ [#v5955acd]
- - Toshiya Itoh, Shuichi Miyazaki, Makoto Satake,
- Competitive Analysis for Two Variants of Online Metric Matching Problem, Discrete Mathematics, Algorithms and Applications, Vol. 13, No. 06, 2150156, December 2021.
- - Satsuki Nishioka, Yasuo Okabe,
- Centralized Control of Account Migration at Single Sign-On in Shibboleth,
- Journal of Information Processing, 2021, Volume 29, Pages 769-777.
- - Amelie Gyrard, Kasia Tabeau, Laura Fiorini, Antonio Kung, Eloise Senges, Marleen De Mul, Francesco Giuliani, Delphine Lefebvre, Hiroshi Hoshino, Isabelle Fabbricotti, Daniele Sancarlo, Grazia D¡ÇOnofrio, Filippo Cavallo, Denis Guiot, Estibaliz Arzoz-Fernandez, Yasuo Okabe, Masahiko Tsukamoto,
- Knowledge Engineering Framework for IoT Robotics Applied to Smart Healthcare and Emotional Well-Being,
- Int J of Soc Robotics (2021).
- - Koki Hamada, Shuichi Miyazaki, Kazuya Okamoto, Strongly Stable and Maximum Weakly Stable Noncrossing Matchings, Algorithmica, Volume 83, Issue 9, pp. 2678-2696, September 2021.
- - ÅÄÃæ Âî, ÎÏÀÐ ¹À¹§, ÅÄÃæ ·Ã»Ò, ºÙ¸« Îá¹á, »°±º ·¼Êå,ÅÅÎÏÊÑÆ°´Æ»ë¤Ë¤è¤ë¥Þ¥ë¥¦¥§¥¢¸¡½ÐÊýË¡, ¥×¥é¥º¥Þ³ËÍ»¹ç³Ø²ñ»ï, 2021ǯ4·î, Âè 97 ´¬,Âè 4 ¹æ, pp. 238-239
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#le081ece]
- -S. Nishioka and Y. Okabe,
- Mutual Secrecy of Attributes and Authorization Policies in Identity Federation,
- 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC2021 SDIM Workshop), July 2021, pp. 1202-1209.
- -T. Urimoto, D. Kotani and Y. Okabe,
- Analysis of Inter-regional Relationship among Regional Tier-1 ASes in the Internet,
- 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC2021 ADMNET Workshop), July 2021, pp. 1417-1422.
- -D. Kotani, T. Tanaka and Y. Okabe,
- QoS Network Control for Elderly Support Services,
- 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC2021 CDS Workshop), July 2021, pp. 1639-1644.
- **¸ýƬȯɽ¤Ê¤É [#m037b92b]
- - ¾®ÎÓ²íµ¨, ¾âËÜÍÌ, ¾®Ã«ÂçÍ´, ²¬Éô¼÷ÃË, ÀȼåÀ¤Î³µÇ°¼Â¾Ú¥³¡¼¥É¤ËÂФ¹¤ëÌÖÍåŪ¤Ê¹¶·â¥Ñ¥±¥Ã¥ÈÀ¸À®¤òÍѤ¤¤¿¿¯Æþ¸¡ÃÎ¥·¥¹¥Æ¥à¤Î¥·¥°¥Í¥Á¥ã¼«Æ°À¸À®, ÅŻҾðÊóÄÌ¿®³Ø²ñ °Å¹æ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à2022 (SCIS2022), 2022ǯ1·î
- - È«»³¹·Âç, ¾®Ã«ÂçÍ´, ²¬Éô¼÷ÃË,¸ø³«¸°Ç§¾Ú¤Ë¤ª¤±¤ë½êͼԸ¡¾Ú¤Ë´ð¤Å¤¤¤¿Ê£¿ôǧ¾Ú´ï¤Î¥·¡¼¥à¥ì¥¹¤ÊÅÐÏ¿, ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥àÏÀʸ½¸2021,pp89-90, 2021ǯ11·î
- -ßÀÅĹÀµ¤¡¤µÜºê½¤°ì¡¤ÃÏ°è¾å¸Â¤òƳÆþ¤·¤¿¸¦½¤°åÇÛ°ÌäÂê¤ËÂФ¹¤ë·×»»Ê£»¨À, ¿®³Øµ»Êó¡¤Vol.121, No.218, COMP2021-14 (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ), pp.7-10, 2021ǯ10·î. (¥ª¥ó¥é¥¤¥ó)
- - ¾¾ËÜ Ä¾¼ù, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË,
- Capability¥â¥Ç¥ë¤Ë´ð¤Å¤¯¥¹¥Þ¡¼¥È¥Û¡¼¥à¥Ç¥Ð¥¤¥¹¤Î¥Í¥Ã¥È¥ï¡¼¥¯¥¢¥¯¥»¥¹À©¸æ,
- ¾ðÊó½èÍý³Ø²ñ ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2021)¥·¥ó¥Ý¥¸¥¦¥à,
- 2021ǯ6·î.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#fcd364ca]
- -Ëöåô ¹ãµ±¡¤µÜºê ½¤°ì, ÊÔ½¸¸åµ¡ÖÁȹ礻¥²¡¼¥àÍýÏÀ¡×Æý¸¹æ¤ò´ë²è¤·¤Æ, ¥·¥¹¥Æ¥àÀ©¸æ¾ðÊó³Ø²ñ»ï, Âè65´¬ Âè10¹æ, p. 425, 2021ǯ10·î¹æ.
- *2020ǯÅÙ [#sb23f8a3]
- **ÏÀʸ»ïÏÀʸ [#le119eaa]
- - ¶âë µÈÀ®, ÈÓÅÄ ¾¡µÈ, ¾®Ã« ÂçÍ´, ¥»¥¥å¥ê¥Æ¥£¿Íºà°éÀ®¤Ë¤ª¤±¤ë¥»¥¥å¥ê¥Æ¥£¥Þ¥¤¥ó¥É¶µ°é¤Î¶µºà³«È¯¤È¼ÂÁ©, ¥³¥ó¥Ô¥å¡¼¥¿¥½¥Õ¥È¥¦¥§¥¢, 2021, 38 ´¬, 1 ¹æ, pp. 1_38-1_44
- - ÄÚÆâ ͤ¼ù, Ïƺä Ä«¿Í, ßÀÅÄ ·ò, ¾¾ÌÚ ²í¹¬, ¾®ÎÓ Î´¹À, °¤Éô Çî, ¾¾ËÜ Î¼²ð, HeteroTSDB: °Û¼ïʬ»¶KVS´Ö¤Î¼«Æ°³¬Áز½¤Ë¤è¤ë¹âÀǽ¤Ê»þ·ÏÎó¥Ç¡¼¥¿¥Ù¡¼¥¹, ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, Vol.62, No.3, pp.818-828, Mar. 2021.
- - Yuki Matsuyama and Shuichi Miyazaki, Hardness of Instance Generation with Optimal Solutions for the Stable Marriage Problem, Journal of Information Processing, Vol. 29, pp. 166-173, Feb. 2021.
- - ¾âËÜ ÍÌ, ÀÄÌÚ °ì»Ë, »°¹¥ ½á, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË, HIDS¥¢¥é¡¼¥ÈÄ´ºº¤Î¤¿¤á¤ÎHTTP¥ê¥¯¥¨¥¹¥È¤È¥Û¥¹¥È¥¤¥Ù¥ó¥È¤Î´ØÏ¢ÉÕ¤±¼êË¡, ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, Vol.61, No.5, pp.1080-1091, May 2020.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#l3ff66ee]
- - Koudai Hatakeyama, Daisuke Kotani and Yasuo Okabe, Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation, The 2021 International Workshop on Pervasive Information Flow (PerFlow 2021), pp. 514-519, March 2021.
- - Yu Takabatake, Yasuo Okabe,
- An Anonymous Distributed Electronic Voting System Using Zerocoin,
- the 35th International Conference on Information Networking (ICOIN2021),
- pp.163-168
- January 2021.
- - Tsuyoshi Arai, Yasuo Okabe, Yoshinori Matsumoto,
- Precursory Analysis of Attack-Log Time Series by Machine Learning for Detecting Bots in CAPTCHA,
- the 35th International Conference on Information Networking (ICOIN2021),
- pp.295-300,
- January 2021.
- - Toshiya Itoh, Shuichi Miyazaki, and Makoto Satake, Competitive Analysis for Two Variants of Online Metric Matching Problem, Proc. the 14th Annual International Conference on Combinatorial Optimization and Applications (COCOA 2020), (Lecture Notes in Computer Science 12577), pp. 486-498, December 2020.
- - Dongyang Li, Daisuke Kotani, Yasuo Okabe,
- Improving Attack Detection Performance in NIDS Using GAN,
- Proc. 2020 IEEE 44th Annual Computers, Software and Applications Conference (COMPSAC2020 Symposia), pp. 801-809, July 2020.
- - Satsuki Nishioka, Yasuo Okabe,
- Centralized Control of Account Migration at Single Sign-On in Shibboleth,
- Proc. 2020 IEEE 44th Annual Computers, Software and Applications Conference (COMPSAC2020 SDIM Workshop), pp. 1572-1578, July 2020.
- - Koki Hamada, Shuichi Miyazaki and Kazuya Okamoto, Strongly Stable and Maximum Weakly Stable Noncrossing Matchings, Proc. the 31st International Workshop on Combinatorial Algorithms (IWOCA 2020), (Lecture Notes in Computer Science 12126), pp. 304-315, June 2020.
- **¸ýƬȯɽ¤Ê¤É [#ufe96c70]
- - ²¬Éô¼÷ÃË,
- Âè82²óÁ´¹ñÂç²ñ¤Î¶ÛµÞ¥ª¥ó¥é¥¤¥ó³«ºÅ¤ò¿¶¤êÊ֤äÆ,
- ¾ðÊó½èÍý³Ø²ñÂè83²óÁ´¹ñÂç²ñ ¡ÔNew Normal¤Ë¤ª¤±¤ë³Ø²ñ³èÆ°ºß¤êÊý¥Ç¥¶¥¤¥ó¡Õ,
- 2021ǯ3·î.
- - »ûÅÄ·òÂÀ¡¤²¬Éô¼÷ÃË¡¤¾¾Ëܱٵ¹¡¤
- ¥¯¥é¥¦¥É·¿CAPTCHA¤ËÂФ¹¤ëbot¤Ë¤è¤ë¥¢¥¯¥»¥¹¤ÎʬÀÏ,
- ¾ðÊó½èÍý³Ø²ñÂè83²óÁ´¹ñÂç²ñ, 4X-05,
- 2021ǯ3·î.
- - À¾²¬¹¬Í衦²¬Éô¼÷ÃË, ǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë°ÀÃͤÈǧ²Ä¾ò·ï¤ÎÁê¸ßÈëÆ¿, ¿®³Øµ»Êó, vol. 120, no. 381, IA2020-49, pp. 93-100, 2021ǯ3·î.
- - ¾¾ËÜľ¼ù¡¦¾®Ã«ÂçÍ´¡¦²¬Éô¼÷ÃË, ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ëCapability¤Ë´ð¤Å¤¯¥æ¡¼¥¶¡¼¼çÂΤÎǧ²ÄµÚ¤Ó¥¢¥¯¥»¥¹À©¸æ, ¿®³Øµ»Êó, vol. 120, no. 381, IA2020-48, pp. 85-92, 2021ǯ3·î.
- - º´ÃÝÀ¿, µÜºê½¤°ì, ¥ª¥ó¥é¥¤¥ó¥á¥È¥ê¥Ã¥¯¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¥¢¥ë¥´¥ê¥º¥àÀ߷פȶ¥¹çÈæ²òÀÏ, Âè15²óµþÅÔÂç³ØICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2021ǯ2·î.
- - ÅÄÃæÂî, ÅÄÃæ·Ã»Ò, ºÙ¸«Îá¹á, »°±º·¼Êå, ÎÏÀйÀ¹§, ÅÅήÊÑÆ°´Æ»ë¤Ë¤è¤ë¥Þ¥ë¥¦¥§¥¢¸¡½ÐÊýË¡, Âè15²óµþÅÔÂç³ØICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2021ǯ2·î.
- - µÜºê½¤°ì, °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¥¢¥ë¥´¥ê¥º¥àÀ߷פȷ׻»Ê£»¨À¤Î¸¦µæ, Âè15²óµþÅÔÂç³ØICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2021ǯ2·î.
- - °ËÆ£ ²í»Î, µÜºê ½¤°ì, ÃæÅè ¿¸ºî, ¾®Ìî עδ, Âç´Ü ÍÛÂÀ, ½Å¤ßÉÕ¤ÌÚ¤ËÂФ¹¤ëÎã³°ÉÕ¤½àÊ¿Åùʬ³ä¤Î·×»»ÎÌ, ÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à¡ÊȯɽÈÖ¹æ S2¡Ë, 2021ǯ2·î.
- - ÂçÀ¾·ûÂÀϺ¡¦¾®Ã«ÂçÍ´¡¦»Ô¸¶Íµ»Ë¡¦¶â´ÝÍÎÊ¿¡¦²¬Éô¼÷ÃË,
- ¥¯¥é¥¦¥É´ðÈפˤª¤±¤ëWorkload¤ÎIdentity¤òÍѤ¤¤¿¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¤È¥Ñ¥±¥Ã¥È¥Õ¥£¥ë¥¿¥ê¥ó¥°¤Ø¤ÎŬÍÑ,
- ¿®³Øµ»Êó, vol. 120, no. 294, IA2020-30, pp. 22-29, 2020ǯ12·î.
- - ÄÚÆâͤ¼ù, ÄáÅÄÇîʸ, ¸ÅÀî²íÂç, TSifter: ¥Þ¥¤¥¯¥í¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ëÀǽ°Û¾ï¤Î¿×®¤Ê¿ÇÃǤ˸þ¤¤¤¿»þ·ÏÎó¥Ç¡¼¥¿¤Î¼¡¸µºï¸º¼êË¡, ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥àÏÀʸ½¸, 2020, 9-16 (2020-11-26), 2020ǯ12·î.
- - ¾®Ã« ÂçÍ´, Workload¤ÎIdentity¤òÍøÍѤ·¤¿¥Í¥Ã¥È¥ï¡¼¥¯¥¢¥¯¥»¥¹À©¸æ, LINE DEVELOPER DAY 2020, 2020ǯ11·î.
- - ¾®Ã« ÂçÍ´, ¾ðÊ󥻥¥å¥ê¥Æ¥£±é½¬¤Î¥Ï¥¤¥Ö¥ê¥Ã¥É±é½¬²½, Âè16²óµþÅÔÂç³Ø¹©³ØÉô¶µ°é¥·¥ó¥Ý¥¸¥¦¥à, 2020ǯ11·î.
- - ¾®ÎÓ ²íµ¨, ¾âËÜ ÍÌ, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË, Metasploit¹¶·â¥³¡¼¥É¤ËÂФ¹¤ëÌÖÍåŪ¤Ê¹¶·â¥Ñ¥±¥Ã¥ÈÀ¸À®¤Ë¤è¤ë¿¯Æþ¸¡ÃÎ¥·¥¹¥Æ¥à¤Î¥·¥°¥Í¥Á¥ã¼«Æ°À¸À®, ¾ðÊó½èÍý³Ø²ñ ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à2020 (CSS2020), pp. 101-108, 2020ǯ10·î¡¥
- -Yoshinari Kanaya, Daisuke Kotani, Katsuyoshi Iida, Hideaki Sone, Ethical Education on Information Security Mind for Practical Security Learning, IEICE Tech. Rep., vol. 120, no. 177, IA2020-2, pp. 6-9, Oct. 2020.
- - È«»³ ¹·Âç, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË,
- ¥¼¥í¥È¥é¥¹¥Èǧ¾Úǧ²ÄÏ¢·È¤Ë¤ª¤±¤ë¥æ¡¼¥¶Æ±°ÕÉÕ¤¥³¥ó¥Æ¥¥¹¥È¶¦Í,
- ¾ðÊó½èÍý³Ø²ñ ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2020)¥·¥ó¥Ý¥¸¥¦¥à,
- 2020ǯ6·î.
- - ÂçÊ¿·ò»Ê¡¤²¬Éô¼÷ÃË¡¤²¬Â¼¹ÌÆ󡤹âÁÒ¹°´î¡¤Á¾º¬½¨¾¼¡¤À¾Â¼¹ÀÆ󡤾¾±ºÃλˡ¤Æî¹°À¬,
- ¤ß¤ó¤Ê¤Ç¹Í¤¨¤è¤¦!¡Ö¿·¤·¤¤À¸³èÍͼ°¡×¤Ë´Ø¤¹¤ë¥»¥¥å¥ê¥Æ¥£Âкö,
- ¹ñΩ¾ðÊó³Ø¸¦µæ½ê³Ø½Ñ¾ðÊó´ðÈ×¥ª¡¼¥×¥ó¥Õ¥©¡¼¥é¥à2020¥»¥¥å¥ê¥Æ¥£¥È¥é¥Ã¥¯¡Ê¥Ñ¥Í¥ë¥Ç¥£¥¹¥«¥Ã¥·¥ç¥ó¡Ë, 2020ǯ6·î.
- - ²¬Éô ¼÷ÃË,
- Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö¤È¿Íºà°éÀ®¤Î¼è¤êÁȤß,
- Âè134²ó¥»¥ó¥µ¡¼¥Í¥Ã¥È¥ï¡¼¥¯¸¦µæ²ñ, 2020ǯ5·î.
- - Çðºê ÎéÀ¸, ºäº¬ ±Éºî, ¹þ»³ ͪ²ð, µÜºê ½ã, ÃæÂô ¼Â, ²¬Éô ¼÷ÃË,
- COVID-19¤Îή¹Ô¤ËÂФ¹¤ë»²²Ã¼Ô¿ô500¿ÍĶµé¤Î³Ø²ñ¥¤¥Ù¥ó¥È¤Î¥ª¥ó¥é¥¤¥ó³«ºÅ¤ÎÃ챶¦Í
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¡ÊIOT¡Ë, 2020-IOT-49(7), pp.1-8, 2188-8787, 2020ǯ5·î.
- -Èøºê ÂóϺ, ÅèÅÄ ÁÏ, Çðºê ÎéÀ¸, ²¬Éô ¼÷ÃË, Ë̸ý Á±ÌÀ,
- COVID-19¤¬Ì¢±ä¤·¤Æ¤ß¤¿¤éCIO¤è¤ê¾å¼ê¤ËDX¤¬¿Ê²½¤·¤¿·ï,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¡ÊIOT¡Ë ,
- 2020-IOT-49(4), p.1 (2020-05-07) , 2188-8787, 2020ǯ5·î.
- -²¬Éô¼÷ÃË,
- 5G»þÂå¤Î¥¼¥í¥¨¥ß¥Ã¥·¥ç¥óÇÀ¶È ¡Á¥¢¥Õ¥¿¡¼¥³¥í¥Ê¤Î¥¹¥Þ¡¼¥È¼Ò²ñ¤Ë¸þ¤±¤Æ¡Á,
- Âè4²ó¥°¥ê¡¼¥ó¥¨¥Í¥ë¥®¡¼¥Õ¥¡¡¼¥à»º³Ø¶¦Áϥѡ¼¥È¥Ê¡¼¥·¥Ã¥×¡ÊGEFP¡Ë¸¦µæ²ñ, 2020ǯ4·î.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#k9271d52]
- -µÜºê½¤°ì, The 31st International Workshop on Combinatorial Algorithms (IWOCA 2020) »²²ÃÊó¹ð, ¥·¥¹¥Æ¥àÀ©¸æ¾ðÊó³Ø²ñ»ï, Âè64´¬ Âè12¹æ, p. 498, 2020ǯ12·î.
- -²¬Éô ¼÷ÃË, ÃæÂô ¼Â,
- ¾ðÊó½èÍý³Ø²ñÂè82²óÁ´¹ñÂç²ñ¡¡¼ÂÏ¿ ¶ÛµÞ¥ª¥ó¥é¥¤¥ó³«ºÅ,
- ¾ðÊó½èÍý, 61(6), 548-551, 2020ǯ5·î.
- *2019ǯÅÙ [#g8c2a3b1]
- **ÏÀʸ»ïÏÀʸ [#x3b243d6]
- -Yoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Manabu Okamoto, Identifying Link Layer Home Network Topologies Using HTIP,
- IEICE TRANSACTIONS on Information and Systems, Vol. E103-D, No. 03, pp. 566-577, Mar. 2020.
- -Takumu Shirayama, Takuto Shigemura, Yota Otachi, Shuichi Miyazaki, Ryuhei Uehara, On Computational Complexity of Pipe Puzzles, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E102-A, No. 9, pp. 1134-1141, Sep. 2019.
- - Huawei Huang, Song Guo, Weifa Liang, Kun Wang, Yasuo Okabe,
- Coflow-like Online Data Acquisition from Low-Earth-Orbit Datacenters,
- IEEE Transactions on Mobile Computing ( Early Access ), 20 August 2019.
- -Shuichi Miyazaki, Kazuya Okamoto, Jointly Stable Matchings, Journal of Combinatorial Optimization, Volume 38, Issue 2, pp. 646-665, August 2019.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#ee164b0a]
- -Tsuyoshi Arai, Yasuo Okabe, Yoshinori Matsumoto, Koji Kawamura,
- Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning,
- Proc. 34th International Conference on Information Networking (ICOIN 2020), pp.584-589, Jan. 2020.
- -Kaku Sawada, Daisuke Kotani, Yasuo Okabe,
- Network Routing Optimization Based on Machine Learning Using Graph Networks Robust against Topology Change,
- Proc. 34th International Conference on Information Networking (ICOIN 2020), pp.608-615, Jan. 2020.
- -Kei Wakabayashi, Daisuke Kotani, Yasuo Okabe,
- Traffic-aware Access Control List Reconstruction,
- Proc. 34th International Conference on Information Networking (ICOIN 2020), pp.615-626, Jan. 2020.
- - Koki Hamada, Shuichi Miyazaki and Hiroki Yanagisawa, Strategy-Proof Approximation Algorithms for the Stable Marriage Problem with Ties and Incomplete Lists, Proc. 30th International Symposium on Algorithms and Computation (ISAAC 2019), pp. 9:1-9:14, December 2019.
- - Yasuaki Kobayashi, Yusuke Kobayashi, Shuichi Miyazaki, Suguru Tamaki,
- An Improved Fixed-Parameter Algorithm for Max-Cut Parameterized by Crossing Number,
- Proc. the 30th International Workshop on Combinatorial Algorithms (IWOCA 2019), (Lecture Notes in Computer Science 11638), pp. 327-338, July 2019.
- - Yo Kanemoto, Kazufumi Aoki, Makoto Iwamura, Jun Miyoshi, Daisuke Kotani, Hiroki Takakura, Yasuo Okabe,
- Detecting Successful Attacks from IDS Alerts Based on Emulation of Remote Shellcodes:2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC),
- Proc. 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Vol.2, pp.471-476, July 2019.
- **¸ýƬȯɽ¤Ê¤É [#a125c3f3]
- - º´ÃÝÀ¿, µÜºê½¤°ì, ľÀþ¾å¤Î2¥µ¡¼¥Ð¡¼¥ª¥ó¥é¥¤¥ó¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ëìÅÍߥ¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ²òÀÏ, ¾ðÊó½èÍý³Ø²ñÂè82²óÁ´¹ñÂç²ñ 7L-01, 2020ǯ3·î.
- - ÅÄÃæ Âî, ²¬Éô ¼÷ÃË, ¾®Ã« ÂçÍ´, ¾å¸¶ °¡Ìð,
- ¹âÎð¼Ô»Ù±ç¥µ¡¼¥Ó¥¹¤Ë¸þ¤±¤¿QoS¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¥·¥¹¥Æ¥à¤Î¼ÂÁõ,
- Âè14²óµþÅÔÂç³ØICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2020ǯ2·î.
- - µÜºê½¤°ì,
- °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¥¢¥ë¥´¥ê¥º¥à¸¦µæ,
- Âè14²óµþÅÔÂç³ØICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2020ǯ2·î.
- - ²¬Éô ¼÷ÃË, ¾®Ã« ÂçÍ´, ¾å¸¶ °¡Ìð, ÅÄÃæ Âî,
- ¹âÎð¼Ô»Ù±ç¥µ¡¼¥Ó¥¹¤Ë¸þ¤±¤¿¥Í¥Ã¥È¥ï¡¼¥¯¤ÎQoSÀ©¸æ,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð¥³¥ó¥·¥å¡¼¥Þ¡¦¥Ç¥Ð¥¤¥¹¡õ¥·¥¹¥Æ¥à¡ÊCDS¡Ë,
- 2020-CDS-27, 7, 1-6, 2020ǯ1·î.
- - ²¬Éô¼÷ÃË,
- REST API¤Ë¤è¤ëQoS¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¥·¥¹¥Æ¥à,
- ÅìËÌÂç³ØÅŵ¤ÄÌ¿®¸¦µæ½ê¶¦Æ±¥×¥í¥¸¥§¥¯¥È20¼þǯµÇ°¸¦µæ²ñ, 2019ǯ11·î.
- - ²¬Éô¼÷ÃË, ¾®Ã«ÂçÍ´, ÅÄÃæÂî, ¾å¸¶°¡Ìð,
- ¹âÎð¼Ô»Ù±ç¥µ¡¼¥Ó¥¹¤Ë¸þ¤±¤¿QoS¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¥·¥¹¥Æ¥à¤Î¼ÂÁõ,
- ÆüËܳؽѿ¶¶½²ñ»º³Ø¶¨Îϸ¦µæ°Ñ°÷²ñ¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñÂè46²ó¸¦µæ²ñ¥Ç¥â¾Ò²ð¥»¥Ã¥·¥ç¥óȯɽ, 2019ǯ11·î.
- - ²¬Éô¼÷ÃË,
- Society 5.0¡ÊĶ¥¹¥Þ¡¼¥È¼Ò²ñ¡Ë¤Î¼Â¸½¤Ë¸þ¤±¤Æ¤ÎIoT¤ÎÌò³ä,
- Âè5²ó¥¹¥Þ¡¼¥È¥¨¥Í¥ë¥®¡¼¥Þ¥Í¥¸¥á¥ó¥È¥·¥ó¥Ý¥¸¥¦¥à, 2019ǯ10·î.
- - ¹Ó°æ µ£, ²¬Éô ¼÷ÃË, ¾¾ËÜ ±Ùµ¹, Àî¼ ¹ä»Ê,
- ¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ëµ¡³£³Ø½¬¤òÍѤ¤¤¿¥Ü¥Ã¥È¤Î¸¡ÃÎ,
- Computer Security Symposium 2019 in Nagasaki, 1C3-4, 2019ǯ10·î.
- - Yasuo Okabe, Network platform technology for assistive robots for the elderly by agile co-creation,
- Internet of Intelligent Robotic Things for Healthy Living and Active Ageing: Where we are and Future Trends, The 28th IEEE International Conference on Robot and Human Interactive Communication, Oct. 2019.
- - ¾¾»³Í´µ®¡¤µÜºê½¤°ì, °ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëºÇŬ²òÉÕ¤ÎãÂêÀ¸À®¤Îº¤ÆñÀ, 2019ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ, G-38, 2019ǯ9·î.
- - Kyosuke Futami, Yutaka Yanagisawa, Hiroshi Hoshino, Aiko Matsumori, Masahiko Tsukamoto, Daisuke Kotani, Yasuo Okabe,
- Data Distribution Infrastructure and Applications for Robotic Therapy for Blind Elderly,
- UbiComp2019 (Poster), Sept. 2019.
- - µÜºê½¤°ì, °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¥¢¥ë¥´¥ê¥º¥à¸¦µæ, ÆüËÜOR³Ø²ñÃæÉô»ÙÉô ¼ã¼ê¸¦µæ¼Ô¤Î¤¿¤á¤Î¥Á¥å¡¼¥È¥ê¥¢¥ë¥·¥ó¥Ý¥¸¥¦¥à, 2019ǯ8·î30Æü.
- - Takuya Urimoto, Daisuke Kotani, Yasuo Okabe,
- Analysis of Inter-regional Relationship among Regional Tier-1 ASes in the Internet,
- 14th International Conference on Future Internet Technologies (CFI2019)/15th Asian Internet Engineering Conference (AINTEC2019) Joint Poster session, Aug. 2019.
- - ±»ËÜÂóÌé, ¾®Ã«ÂçÍ´, ²¬Éô¼÷ÃË, ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Ë¤ª¤±¤ë°Û¤Ê¤ëÃÏ°è¤ÎRegional Tier-1 ASƱ»Î¤ÎÀܳ´Ø·¸¤ÎʬÀÏ, ¾ðÊó½èÍý³Ø²ñ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¢Ê¬»¶¡¢¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2019)¥·¥ó¥Ý¥¸¥¦¥à, pp.462-469, 2019ǯ7·î.
- - ¾¾¿¹Íõ»Ò, À±Ìî´², Áи«µþ²ð, ÄÍËܾ»É§, ¾®Ã«ÂçÍ´, ²¬Éô¼÷ÃË,
- ACCRA¥·¥¹¥Æ¥à¤Î²ð¸î»ÜÀßÍøÍѤΤ¿¤á¤Î¥í¥Ü¥Ã¥ÈÂÐÏÃ¥·¥Ê¥ê¥ª,
- DICOMO2019 Ê»Àߥǥ¸¥¿¥ë¥³¥ó¥Æ¥ó¥ÄÀ©ºîȯɽ²ñ, 2019ǯ7·î.
- - Laura Fiorini, Alessandra Sorrentino, Daisuke Kotani, Hiroshi Hoshino, Estibaliz Arzoz Fernandez, Yasuo Okabe, Masahiko Tsukamoto, Yutaka Yanagisawa, Kyosuke Futami, Delphine Lefebvre, and Filippo Cavallo,
- Toward a Internet of Robotic Things architecture to support citizens in mobility, daily-life and socialization applications: a case study,
- IEEE ICRA Workshop Advances and Challenges on the Development, Testing and Assessment of Internet of Robotic Things (IoRT): Experiences from Engineering and Human Science Research, May 2019.
- - Koki Hamada, Shuichi Miyazaki and Hiroki Yanagisawa,
- Strategy-Proof Approximation Algorithms for the Stable Marriage Problem with Ties and Incomplete Lists,
- 5th International Workshop on Matching Under Preferences (MACTH-UP 2019), May 2019.
- - ²¬Éô ¼÷ÃË,
- Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö ¡½¤³¤ì¤Þ¤Ç¤È¤³¤ì¤«¤é¡½,
- Âç³ØICT¿ä¿Ê¶¨µÄ²ñ2019ǯÅÙÄ̾ïÁí²ñCIO¸þ¤±¹Ö±é²ñ, 2019ǯ5·î.
- - ¾®Ã« ÂçÍ´, IaaS ¤ò³èÍѤ·¤¿¾ðÊ󥻥¥å¥ê¥Æ¥£±é½¬´Ä¶¤ÎÀ߷פȼÂÁõ, Âè45²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ¸¦µæ²ñ (ITRC meet45), 2019ǯ5·î.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#oba54613]
- - ²¬Éô¼÷ÃË,
- ²Ê¸¦Èñ¤Ë¤ª¤±¤ë¼ã¼ê¸¦µæ¼Ô»Ù±ç,
- ±þÍÑʪÍý, Vol.88, No.8, pp.547-549, 2019ǯ8·î.
- - ²¬Éô¼÷ÃË, ÄÍËܾ»É§, À±Ìî´², Antonio Kung, Laula Fiorini, Delphine Lefebvre,
- Horizon 2020¤Ë¤è¤ëÆü²¤¶¦Æ±¸¦µæ³«È¯ACCRA¥×¥í¥¸¥§¥¯¥È,
- ¥í¥Ü¥Ã¥È, No.248, pp.4-10, 2019ǯ5·î.
- **¤½¤Î¾ [#dc69e497]
- - µÜºê½¤°ì, ¥¢¥ë¥´¥ê¥º¥àÍýÏÀ¤Î´ðÁÃ, ¿¹Ë̽ÐÈdzô¼°²ñ¼Ò, 2019ǯ8·î.
- *2018ǯÅÙ [#w38a19fb]
- **ÏÀʸ»ïÏÀʸ [#m454bd5c]
- - Jose C. Nacher, Masayuki Ishitsuka, Shuichi Miyazaki, Tatsuya Akutsu, Finding and analysing the minimum set of driver nodes required to control multilayer networks, Scientific Reports, volume 9, Article number: 576, January 2019.
- - Grazia D¡ÇOnofrio, Laura Fiorini, Hiroshi Hoshino, Aiko Matsumori, Yasuo Okabe, Masahiko Tsukamoto, Raffaele Limosani, Alessandra Vitanza, Francesca Greco, Antonio Greco, Francesco Giuliani, Filippo Cavallo, Daniele Sancarlo,
- Assistive robots for socialization in elderly people: results pertaining to the needs of the users,
- Aging Clin Exp Res (2018) pp 1–17, Dec. 2018.
- - Grazia D¡ÇOnofrio, Laura Fiorini, Marleen de Mul, Isabelle Fabbricotti, Yasuo Okabe, Hiroshi Hoshino, Raffaele Limosani, Alessandra Vitanza, Francesca Greco, Francesco Giuliani, Denis Guiot, Eloïse Senges, Antonio Kung, Filippo Cavallo, Daniele Sancarlo, Antonio Greco,
- Agile Co-Creation for Robots and Aging (ACCRA) Project: new technological solutions for older people,
- European Geriatric Medicine, Volume 9, Issue 6, pp 795–800,
- December 2018.
- - À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²£ÅÄ ¸»Ë, ²¬Éô ¼÷ÃË,
- Åý¹çID¤Ë´ð¤Å¤¯¸úΨŪ¤Ê¸¢¸Â°Ü¾ù¤¬²Äǽ¤Ê¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à,
- ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï¥³¥ó¥·¥å¡¼¥Þ¡¦¥Ç¥Ð¥¤¥¹¡õ¥·¥¹¥Æ¥à¡ÊCDS¡Ë, Vol. 8, No. 3, pp.20-31,
- 2018ǯ10·î.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#q88c112b]
- - Daisuke Kotani, An Architecture of a Network Controller for QoS Management in Home Networks with Lots of IoT Devices and Services, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), January 2019.
- - Keitaro Yamazaki, Daisuke Kotani, Yasuo Okabe, Xilara: An XSS Filter Based on HTML Template Restoration, The 4th EAI International Conference on Security and Privacy in Communication Networks (SecureComm2018), August 2018.
- - Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe, Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet, The 8th IEEE International Workshop on Network Technologies for Security, Administration and Protection, in Proc. IEEE 42th Annual Computer Software and Applications Conference (COMPSAC2018), Vol. 2, pp.658-663, July 2018.
- - Tsubasa Munemitsu, Daisuke Kotani, Yasuo Okabe, A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering Schemes, The 2nd IEEE International Workshop on Future Internet Technologies, in Proc. IEEE 42th Annual Computer Software and Applications Conference (COMPSAC2018), Vol. 2, pp.769-776, July 2018.
- - Hiroki Nakano, Yasuo Okabe,
- A Design of Network for Packets with Information and Energy,
- 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW),
- May 2018.
- **¸ýƬȯɽ¤Ê¤É [#e79ba0e1]
- - ²ÃÆ£¾æÏ¡¦²¬Éô¼÷ÃË,
- ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽡§10ǯ´Ö¤Î³èÆ°¤Èº£¸å¤ÎŸ˾,
- Âè4²ó¥¹¥Þ¡¼¥È¥¨¥Í¥ë¥®¡¼¥Þ¥Í¥¸¥á¥ó¥È¥·¥ó¥Ý¥¸¥¦¥à, 2019ǯ3·î.
- - ²¬Éô¼÷ÃË,
- JST¡Ö»º³Ø¶¦ÁÏ¥×¥é¥Ã¥È¥Õ¥©¡¼¥à¶¦Æ±¸¦µæ¿ä¿Ê¥×¥í¥°¥é¥à¡×¡ÊOPERA¡Ë¤ÈĶ¥¹¥Þ¡¼¥È¥¨¥Í¥ë¥®¡¼¼Ò²ñ´ðÈ×µ»½Ñ¶¦ÁÏ¥³¥ó¥½¡¼¥·¥¢¥à¤Ë¤Ä¤¤¤Æ,
- Âè4²ó¥¹¥Þ¡¼¥È¥¨¥Í¥ë¥®¡¼¥Þ¥Í¥¸¥á¥ó¥È¥·¥ó¥Ý¥¸¥¦¥à, 2019ǯ3·î.
- - ß·ÅÄ¡¡³Ê¡¤²¬Éô¼÷ÃË¡¤¾®Ã«ÂçÍ´,
- Graph Network¤òÍøÍѤ·¤¿µ¡³£³Ø½¬¤Ë¤è¤ë¡¤¥È¥Ý¥í¥¸¡¼ÊѲ½¤ËÂбþ¤Ç¤¤ë¥ë¡¼¥Æ¥£¥ó¥°ºÇŬ²½,
- ¾ðÊó½èÍý³Ø²ñÂè81²óÁ´¹ñÂç²ñ 2W-06, 2019ǯ3·î.
- - ¼ãÎÓ¡¡·Ä¡¤²¬Éô¼÷ÃË¡¤¾®Ã«ÂçÍ´,
- ¥È¥é¥Õ¥£¥Ã¥¯·¹¸þ¤Ë´ð¤Å¤¤¤¿¥Ñ¥±¥Ã¥È¥Õ¥£¥ë¥¿·¿¥Õ¥¡¥¤¥¢¥¦¥©¡¼¥ë¥ë¡¼¥ë·²¤ÎºÆ¹½ÃÛ,
- ¾ðÊó½èÍý³Ø²ñÂè81²óÁ´¹ñÂç²ñ 5ZA-06, 2019ǯ3·î.
- - ¹Ó°æ¡¡µ£¡¤²¬Éô¼÷ÃË¡¤²¬ÅÄËþͺ¡¤ÅÏÊÕ¹§¿®¡¤¾¾Ëܱٵ¹,
- ¥¯¥é¥¦¥É·¿CAPTCHA¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ëµ¡³£³Ø½¬¤òÍѤ¤¤¿¥Ü¥Ã¥È¤Î¸¡½Ð,
- ¾ðÊó½èÍý³Ø²ñÂè81²óÁ´¹ñÂç²ñ 5ZA-08, 2019ǯ3·î.
- - À¾²¬¹¬Í衤²¬Éô¼÷ÃË,
- Shibboleth¤Ç¤Î¥·¥ó¥°¥ë¥µ¥¤¥ó¥ª¥ó¤Ë¤ª¤±¤ë¥¢¥«¥¦¥ó¥È°ÜÆ°¤Î°ì³çÀ©¸æ,
- ¾ðÊó½èÍý³Ø²ñÂè81²óÁ´¹ñÂç²ñ¹Ö±éÏÀʸ½¸, pp.499-500, 2019ǯ3·î.
- - µÜºê½¤°ì,
- °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¥¢¥ë¥´¥ê¥º¥à¸¦µæ,
- Âè13²óµþÅÔÂç³ØICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2019ǯ2·î
- - ²¬Éô¼÷ÃË¡¦µÜºê½¤°ì¡¦¾®Ã«ÂçÍ´,
- ¼ÂÁ©Åª¥»¥¥å¥ê¥Æ¥£¿Íºà°éÀ®¥×¥í¥°¥é¥àBasic SecCapÉÔÀµ¥¢¥¯¥»¥¹²òÀϱ齬,
- Âè13²óµþÅÔÂç³ØICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2019ǯ2·î
- - HUANG Huawei¡¦¾®Ã«ÂçÍ´¡¦²¬Éô¼÷ÃË,
- ¹âÎð¼Ô»Ù±ç¥µ¡¼¥Ó¥¹¤Ë¸þ¤±¤¿¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¥·¥¹¥Æ¥à¤Î¼ÂÁõ,
- Âè13²óµþÅÔÂç³ØICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2019ǯ2·î
- - ²¬Éô¼÷ÃË¡¦Èø·ÁÀ¶°ì,
- ¡ÖĶ¥¹¥Þ¡¼¥È¼Ò²ñ¼Â¸½¤Î¥«¥®¤ò°®¤ë³×¿·ÅªÈ¾Æ³Âε»½Ñ¤ò´ðÈפȤ·¤¿¥¨¥Í¥ë¥®¡¼¥¤¥Î¥Ù¡¼¥·¥ç¥ó¤ÎÁϽС׸¦µæ³«È¯²ÝÂꣶ¤Î¾Ò²ð,
- Ķ¥¹¥Þ¡¼¥È¥¨¥Í¥ë¥®¡¼¼Ò²ñ´ðÈ×µ»½Ñ¶¦ÁÏ¥³¥ó¥½¡¼¥·¥¢¥à ¸ø³«¥¥Ã¥¯¥ª¥Õ¥·¥ó¥Ý¥¸¥¦¥à, 2019ǯ2·î.
- - Yasuo Okabe,
- Information Processing Society of Japan and its international collaborative acctivities,
- Korea Software Congress 2018 (KSC2018), Dec. 2018 (Invited Talk).
- - ²¬Éô ¼÷ÃË,
- ¾Íè¤Î¾ðÊ󥻥¥å¥ê¥Æ¥£¿Íºà¤Î°éÀ®¤Ë¤Ä¤¤¤Æ,
- µþÅÔÉÜΩµþÅÔ¤¹¤Ð¤ë¹â¹»Ê¿À®30ǯÅÙ¥¹¡¼¥Ñ¡¼¡¦¥×¥í¥Õ¥§¥Ã¥·¥ç¥Ê¥ë¡¦¥Ï¥¤¥¹¥¯¡¼¥ë(SPH)À®²Ìȯɽ²ñ¡Ê°ÍÍê¹Ö±é¡Ë, 2018ǯ12·î.
- - Antonio Kung, Yasuo Okabe,
- ACCRA: Agile Co-Creation of Robots for Ageing,
- 7th EU-Japan Symposium on ICT Research and Innovation,
- Dec. 2018.
- - ²« ²Ú°Ò¡¦¾®Ã« ÂçÍ´¡¦²¬Éô ¼÷ÃË,
- ACCRA ¥Í¥Ã¥È¥ï¡¼¥¯À©¸æ¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ,
- ÅìËÌ⼤³ØÅŵ¤ÄÌ¿®¸¦µæ½ê¥×¥í¥¸¥§¥¯¥È¹çƱ¸¦µæ²ñ,
- 2018ǯ11·î.
- - Yasuo Okabe, ATM: Another Technical Mistake,
- ´ØÀ¾¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÏ·¿Í²ñLightning Talk, 2018ǯ10·î.
- - ¾âËÜ ÍÌ, ÀÄÌÚ °ì»Ë, ´ä¼ À¿, »°¹¥ ½á, ¾®Ã« ÂçÍ´, ¹âÁÒ ¹°´î, ²¬Éô ¼÷ÃË, ¥ê¥â¡¼¥È·¿¥·¥§¥ë¥³¡¼¥É¤Î¥¨¥ß¥å¥ì¡¼¥·¥ç¥ó¤Ë¤è¤ë¹¶·âÀ®ÈÝȽÄê¼êË¡, ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à2018, Vol. 2018, No.2, pp. 425-432, 2018ǯ10·î.
- - ¾®Ã« ÂçÍ´, Basic SecCap ¤Î¾Ò²ð¤ÈµþÅÔÂç³ØÄ󶡡־ðÊ󥻥¥å¥ê¥Æ¥£±é½¬¡×¤ÎÀ߷פȼÂÁõ, ¾ðÊó½èÍý³Ø²ñ¥×¥í¥°¥é¥ß¥ó¥°¥·¥ó¥Ý¥¸¥¦¥à°Ñ°÷²ñÂè51²ó¾ðÊó²Ê³Ø¼ã¼ê¤Î²ñ, 2018ǯ10·î.
- - ²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤Ê£¿ô´õ˾¥ê¥¹¥È°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ëNP´°Á´À¤Î²þÎÉ,
- 2018ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ G-03, 2018ǯ9·î.(ÂæÉ÷¤Î¤¿¤á¹Ö±é¤ÏÃæ»ß)
- - ¾®Ã« ÂçÍ´, Basic SecCap ¤Î±é½¬´Ä¶¤Ë¤ª¤±¤ë¥¯¥é¥¦¥É¤Î³èÍÑ, RICC-NII¹ç½É 2018 in Âçºå, 2018ǯ9·î
- - ¾®Ã« ÂçÍ´, ¹âµ¡Ç½¤Ê¥Í¥Ã¥È¥ï¡¼¥¯¤ÎÁê¸ßÏ¢·È¤Ë´Ø¤¹¤ë¸¡Æ¤, RICC-NII¹ç½É 2018 in Âçºå, 2018ǯ9·î
- - ¾®Ã« ÂçÍ´, ¹âÎð¼Ô»Ù±ç¥µ¡¼¥Ó¥¹¤òÍøÍѤ¹¤ë¥Û¡¼¥à/¾®µ¬Ìϥͥåȥ¥¯¤Ë¤ª¤±¤ë¥Í¥Ã¥È¥ï¡¼¥¯¥×¥é¥Ã¥È¥Õ¥©¡¼¥à, RICC-NII¹ç½É 2018 in Âçºå, 2018ǯ9·î
- - ²¬Éô ¼÷ÃË, ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽡¼ÅÅÎϥͥåȥ¥¯¤È¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¤ÎÅý¹ç¤òÌܻؤ·¤Æ¡¼,
- ¾ðÊó½èÍý³Ø²ñ»Í¹ñ»ÙÉô30¼þǯµÇ°¹Ö±é²ñ,
- 2018ǯ9·î.
- - ²¬Éô ¼÷ÃË,
- ²Ê¸¦Èñ¿³ºº¥·¥¹¥Æ¥à²þ³×2018¤Ë¤Ä¤¤¤Æ,
- ¡Ê¸ø¼Ò¡ËÇÀ¶ÈÇÀ¼¹©³Ø²ñÊ¿À®30ǯÅÙÂç²ñ¹Ö±é²ñ ÆÃÊÌ¥»¥Ã¥·¥ç¥ó¡Ö²Ê¸¦Èñ¤Î¸½¾õ¤È¡¢³Ø²ñ¤«¤é¤ÎÄó¸À¡×,2018ǯ9·î.
- - ²¬Éô ¼÷ÃË,
- µþÅÔÂç³ØÂç³Ø±¡¾ðÊó³Ø¸¦µæ²Ê¥á¥Ç¥£¥¢±þÍѹֺ¥ͥåȥ¥¯¥á¥Ç¥£¥¢Ê¬Ìî¤Î¾Ò²ð,
- Âè113²ó¥»¥ó¥µ¡¼¥Í¥Ã¥È¥ï¡¼¥¯¸¦µæ²ñ(U2A), 2018ǯ8·î.
- - ¹Ó°æ µ£, ²¬Éô ¼÷ÃË, ²¬ÅÄ Ëþͺ, ÅÏÊÕ ¹§¿®,
- ¥¯¥é¥¦¥É·¿ CAPTCHA ¥µ¡¼¥Ó¥¹¤Ë¤ª¤±¤ë¥ê¥¹¥¯¥Ù¡¼¥¹Ç§¾Úµ»½Ñ¤ÎÍøÍÑ,
- ¾ðÊó½èÍý³Ø²ñ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2018)¥·¥ó¥Ý¥¸¥¦¥à,
- pp. 694 - 702, 2018ǯ7·î.
- - ¾®Ã« ÂçÍ´, ACCRA¥×¥í¥¸¥§¥¯¥È¤Î¤³¤ì¤Þ¤Ç¤ÎÀ®²Ì¤ÈACCRA¥Í¥Ã¥È¥ï¡¼¥¯¥×¥é¥Ã¥È¥Õ¥©¡¼¥à, Âè43²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ¸¦µæ²ñ (ITRC meet43), 2018ǯ6·î.
- - ²¬Éô ¼÷ÃË,
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
- Ê¿À®30ǯÅÙ ¾ðÍì²ñÁí²ñÆÃÊֱ̹é, 2018ǯ4·î.
- **¤½¤Î¾ [#de39dd28]
- -µÜºê½¤°ì, °ÂÄê¥Þ¥Ã¥Á¥ó¥°¤Î¿ôÍý¤È¥¢¥ë¥´¥ê¥º¥à ¡Á¥È¥é¥Ö¥ë¤Î¤Ê¤¤ÇÛ°¤òµá¤á¤Æ¡Á, ¸½Âå¿ô³Ø¼Ò, 2018ǯ5·î.
- *2017ǯÅÙ [#zf5c8dd1]
- **ÏÀʸ»ïÏÀʸ [#r049938f]
- -¾¾ËÜμ²ð, ·ªÎÓ·òÂÀϺ, ²¬Éô¼÷ÃË,
- ¥ê¥¯¥¨¥¹¥Èñ°Ì¤Ç²¾ÁÛŪ¤Ë¥Ï¡¼¥É¥¦¥§¥¢¥ê¥½¡¼¥¹¤òʬΥ¤¹¤ëWeb¥µ¡¼¥Ð¤Î¥ê¥½¡¼¥¹À©¸æ¥¢¡¼¥¥Æ¥¯¥Á¥ã,
- ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, Vol.59, No.3, pp.1016-1025, 2018ǯ3·î.
- -¾¾ËÜμ²ð, ·ªÎÓ·òÂÀϺ, ²¬Éô¼÷ÃË,
- Web¥µ¡¼¥Ð¤Î¹â½¸ÀÑ¥Þ¥ë¥Á¥Æ¥Ê¥ó¥È¥¢¡¼¥¥Æ¥¯¥Á¥ã¤È±¿Íѵ»½Ñ,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï B, Vol.J101-B, No.1, pp.16-30,
- 2018ǯ1·î.
- -Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura,
- User Identification of Pseudonyms without Identity Information Exposure - A Scenario in Access Federations,
- Journal of Information Processing, Vol. 25 (2017) pp. 788-795
- -Koji M. Kobayashi, Shuichi Miyazaki, and Yasuo Okabe,
- Competitive Buffer Management for Multi-queue Switches in QoS Networks Using Packet Buffering Algorithms,
- Theoretical Computer Science, Vol. 675, pp. 27-42,
- May, 2017.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#s9aee534]
- - Shuichi Miyazaki and Kazuya Okamoto, Jointly Stable Matchings, Proc. 28th International Symposium on Algorithms and Computation (ISAAC 2017), pp. 56:1-56:12, December 2017.
- - Kazuma Matsumoto, and Yasuo Okabe, A Collusion-resilient Hybrid P2P Framework for Massively Multiplayer Online Games, The 5th IEEE International COMPSAC Workshop on Consumer Devices and Systems (CDS), in Proc. IEEE 41th Annual Computer Software and Applications Conference (COMPSAC2017), Vol. 2, pp.342-347, July 2017.
- - Tomohiro Ito, Daisuke Kotani, and Yasuo Okabe, A Threshold-based Authentication System Which Provides Attributes Using Secret Sharing, The 3rd IEEE International COMPSAC Workshop on Secure Identity Management in the Cloud Environment (SIMICE), in Proc. IEEE 41th Annual Computer Software and Applications Conference (COMPSAC2017), Vol. 2, pp.730-735, July 2017.
- - Hiroki Nakano, Yasuo Okabe, Toward Implementing Power Packet Networks,
- Proc. 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW), pp.201-202, June 2017.
- **¸ýƬȯɽ¤Ê¤É [#k6f1c51f]
- -²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤Ê£¿ô¤Î´õ˾¥ê¥¹¥È¤ò»ý¤Ä°ÂÄê·ëº§ÌäÂê, ÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à¡ÊȯɽÈÖ¹æ15¡Ë, 2018ǯ2·î.
- -»³ºê ·¼ÂÀϺ, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË, Xilara: XSS audItor using htmL templAte restoRAtion, ¿®³Øµ»Êó, vol. 117, no. 299, IA2017-49, pp. 89-94, 2017ǯ11·î.
- -²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤´õ˾¥ê¥¹¥È¤òÊ£¿ô»ý¤Ä°ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê, ¾ð½è¸¦Êó¡¤Vol.2017-AL-165, No.15 (¾ðÊó½èÍý³Ø²ñ¥¢¥ë¥´¥ê¥º¥à¸¦µæ²ñ), pp.1-8, 2017ǯ11·î.
- -¾®´ä ¹îµ±, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË, HTTP/2¤ËÂФ¹¤ë̤ÃΤι¶·â¼êË¡¤òÃΤ뤿¤á¤ÎÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤Î¹½ÃÛ, ¿®³Øµ»Êó, vol.117, no.294, IA2017-26, pp.19-23, 2017ǯ11·î.
- -½©µÈ μ, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË, ÄãÂÐÏ÷¿¥Ï¥Ë¡¼¥Ý¥Ã¥È¤È¥À¡¼¥¯¥Í¥Ã¥È¤Î´ØÏ¢ÉÕ¤±¤Ë¤è¤ë¿·¤¿¤Ê¥¹¥¥ã¥ó³èÆ°¤Î¸¡ÃμêË¡¤Î¸¡Æ¤, ¿®³Øµ»Êó, vol.117, no.294, IA2017-25, pp.13-18, 2017ǯ11·î.
- -½¡¸÷ Íã, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË, ¥È¥ó¥Í¥ê¥ó¥°¤Ë¤è¤ë¥È¥é¥Õ¥£¥Ã¥¯¥¨¥ó¥¸¥Ë¥¢¥ê¥ó¥°¤Îº®¹çÀ°¿ô·×²èË¡¤È¤·¤Æ¤ÎÄê¼°²½, ¿®³Øµ»Êó, vol.117, no.294, IA2017-27, pp.25-30, 2017ǯ11·î.
- - ÃæÌîÇî¼ù¡¤²¬Éô¼÷ÃË¡¤
- ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥×¥í¥È¥³¥ë¤ÎÀ߷פȼÂÁõ,
- Ê¿À®29ǯÅÙ¡¡µþÅÔÃϰ襹¡¼¥Ñ¡¼¥¯¥é¥¹¥¿¡¼¥×¥í¥°¥é¥à¡ÖÂè2²ó ²óÏ©¡¦¥·¥¹¥Æ¥à¸¦µæ³«È¯¥°¥ë¡¼¥×¸¦µæ²ñ¡Ý¹â¼þÇÈ¥¹¥¤¥Ã¥Á¥ó¥°²óÏ©µ»½Ñ³«È¯¤È¤½¤Î±þÍÑ¡Ý¡×, 2017ǯ11·î.
- - ¾®Ã« ÂçÍ´, CDN »ö¶È¼Ô¤Î Egress ¥È¥é¥Õ¥£¥Ã¥¯¥¨¥ó¥¸¥Ë¥¢¥ê¥ó¥° – SIGCOMM2017ȯɽ¤«¤é –, Âè 42 ²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè 163 °Ñ°÷²ñ¸¦µæ²ñ (ITRC meet42), 2017ǯ11·î.
- - ¾®Ã« ÂçÍ´, ´äÀ® ãºÈ, ¹õºê Í¥ÂÀ, ¹â¶¶ ¿¿Æà²Ø, ¾ðÊó²Ê³Ø¼ã¼ê¤Î²ñ¤Î50ǯ, Âè50²ó¾ðÊó²Ê³Ø¼ã¼ê¤Î²ñ, 2017ǯ10·î.
- - ²¬Éô¼÷ÃË, ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
- Âè87²óµþÅÔÂç³Ø´Ý¤ÎÆ⥻¥ß¥Ê¡¼,
- 2017ǯ10·î.
- - ²¬Éô¼÷ÃË¡¤²Ê¸¦Èñ¤ÎÉñÂæ΢, ÅŻҾðÊóÄÌ¿®³Ø²ñ2017ǯ¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ, BK-1, 2017ǯ9·î.
- - ÃæÌîÇî¼ù, ²¬Éô¼÷ÃË, ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥×¥í¥È¥³¥ë¤ÎÀ߷פȼÂÁõ, JST¥Õ¥§¥¢2017, J18-16, 2017ǯ9·î.
- - ÃæÌîÇî¼ù, ²¬Éô¼÷ÃË, ÅÅÎϥѥ±¥Ã¥È¥ë¡¼¥¿¤ÎÀ߷פȼÂÁõ, ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2017)¥·¥ó¥Ý¥¸¥¦¥à, DS-12, pp. 1875 - 1880, 2017ǯ6·î.
- - ¾¾ËÜÏÂÇÏ, ²¬Éô¼÷ÃË, ¥æ¡¼¥¶¤Î·ëÂ÷¤Ë¤è¤ëÉÔÀµ¤Ë¶¯¤¤¥Ï¥¤¥Ö¥ê¥Ã¥ÉP2P·¿MMO¥²¡¼¥à¥Õ¥ì¡¼¥à¥ï¡¼¥¯, ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2017)¥·¥ó¥Ý¥¸¥¦¥à, 2D-2, pp. 340 - 346, 2017ǯ6·î.
- - ¾®Ã«ÂçÍ´, ²¬Éô¼÷ÃË, »ûÅÄÅØ, ÄÍËܾ»É§, À±Ìî´², ¥í¥Ü¥Ã¥È¤ò³èÍѤ·¤¿¹âÎð¼Ô»Ù±ç¥µ¡¼¥Ó¥¹Íѥͥåȥ¥¯¥×¥é¥Ã¥È¥Õ¥©¡¼¥àµ»½Ñ¤Î¸¦µæ³«È¯, ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2017)¥·¥ó¥Ý¥¸¥¦¥à, pp. 392 - 395, 2017ǯ6·î.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#l22f346c]
- - ²¬Éô¼÷ÃË, ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
- ²Ê³Øµ»½Ñ̤ÍèÀïά¥ï¡¼¥¯¥·¥ç¥Ã¥×Êó¹ð½ñ¡Ö̤Í襨¥Í¥ë¥®¡¼¥Í¥Ã¥È¥ï¡¼¥¯¤È¼ûÍ×²Ê³Ø ¡Á2050ǯĶ¤Î°ìÈ̲ÈÄí¤Ç¤Î¥¨¥Í¥ë¥®¡¼¼ûÍ×¹½Â¤¤ÎÊѳ׻þÂåÅþÍè¤Ë¸þ¤±¤Æ¡Á¡×, pp.12-21,
- 2017ǯ6·î.
- **¤½¤Î¾ [#y80dbeae]
- -µÜºê½¤°ì, ¥³¥ó¥Ô¥å¡¼¥¿¥µ¥¤¥¨¥ó¥¹¤Î¿ô³Ø¡¡¡Á¥¢¥ë¥´¥ê¥º¥àÍýÏÀ¡¢°ÂÄê·ëº§ÌäÂê¡¢P¡âNPͽÁÛ¡Á, µþÅÔÂç³Ø¥µ¥Þ¡¼¥¹¥¯¡¼¥ë2017, 2017ǯ8·î11Æü
- -ÀÐÅÄÊݵ±, µÜºê½¤°ì, ¥¢¥ë¥´¥ê¥º¥à¿Þ´Õ ¡Á³¨¤Ç¸«¤Æ¤ï¤«¤ë26¤Î¥¢¥ë¥´¥ê¥º¥à¡Á, æƱ˼Ò, 2017ǯ6·î
- ----
- *2016ǯÅÙ [#tf4a2e77]
- **ÏÀʸ»ïÏÀʸ [#o8082b6f]
- -Jun Kawahara, Koji M. Kobayashi, and Shuichi Miyazaki,
- Better Bounds for Online k-frame Throughput Maximization in Network Switches,
- Theoretical Computer Science, Vol. 657, pp. 173-190, January, 2017.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#r1dd5765]
- -Yoshiharu Tsuzaki, Yasuo Okabe,
- Reactive Configuration Updating for Intent-Based Networking,
- The 31st International Conference on Information Networking (ICOIN2017),
- Jan. 2017.
- -Yoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Okamoto Manabu,
- Identifying Link Layer Home Network Topologies Using HTIP,
- 14th Annual IEEE Consumer Communications & Networking Conference,
- pp. 892-899, Jan. 2017.
- -Sushmita Gupta, Kazuo Iwama, and Shuichi Miyazaki, Total Stability in Stable Matching Games, Proc. the 15th Scandinavian Symposium and Workshops on Algorithm Theory, (SWAT 2016), pp. 23:1-23:12, June 2016.
- -Sato Hiroyuki, Yasuo Okabe, Nakamura Motonori,
- User Identification of Pseudonyms without Identity Information Exposure in Access Federations,
- Proc. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC2016), Vol. 1, pp.487-492, June 2016.
- -Yasuo Okabe, Takaaki Komura, Hiroyuki Sato, Kazutsuna Yamaji, Motonori Nakamura,
- An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other,
- Second IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking (MidCCI2016),
- in Proc. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC2016), Vol. 2, pp.202-207, June 2016.
- -Teruhisa Tajima, Yasuo Okabe,
- Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN,
- The 4th IEEE International Workshop on Consumer Devices and Systems (CDS),
- in Proc. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC2016), Vol. 2, pp.312-318, June 2016.
- **¸ýƬȯɽ¤Ê¤É [#g940d75d]
- - »³ºê·¼ÂÀϺ, ¾®Ã«ÂçÍ´, ²¬Éô¼÷ÃË, HTML¤Î¥Æ¥ó¥×¥ì¡¼¥ÈÉü¸µ¤òÍøÍѤ·¤¿XSS¥Õ¥£¥ë¥¿, ÅŻҾðÊóÄÌ¿®³Ø²ñ2017ǯÁí¹çÂç²ñ BS-5-10, 2017ǯ3·î.
- -¾®Ã«ÂçÍ´
- ¥¢¥¸¥ã¥¤¥ë·¿¶¦ÁϤˤè¤ë¹âÎð¼ÔÊä½õ¥í¥Ü¥Ã¥ÈÍѥͥåȥ¥¯¥×¥é¥Ã¥È¥Õ¥©¡¼¥àµ»½Ñ¤Î¸¦µæ³«È¯,
- Âè11²óÃÏ°è´Ö¥¤¥ó¥¿¡¼¥¯¥é¥¦¥É¥ï¡¼¥¯¥·¥ç¥Ã¥×,
- 2017ǯ3·î.
- -µÜºê½¤°ì,
- °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤òÍøÍѤ·¤¿ÇÛ°¥¢¥ë¥´¥ê¥º¥à¤Î¸¦µæ,
- µþÅÔÂç³ØÂè11²óICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2017ǯ2·î.
- -²¬Éô¼÷ÃË
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
- ²Ê³Øµ»½Ñ̤ÍèÀïά¥ï¡¼¥¯¥·¥ç¥Ã¥×¡Ö̤Í襨¥Í¥ë¥®¡¼¥Í¥Ã¥È¥ï¡¼¥¯¤È¼ûÍײʳء×,
- 2017ǯ1·î.
- -²¬Éô¼÷ÃË
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
- Âè°ì²ó¥¹¥Þ¡¼¥È¥¨¥Í¥ë¥®¡¼¥Þ¥Í¥¸¥á¥ó¥È¥·¥ó¥Ý¥¸¥¦¥à ¡Á³×¿·ÅªÅÅÎϥޥͥ¸¥á¥ó¥È¥·¥¹¥Æ¥à¤Î¹½ÃÛ¤òÌܻؤ·¤Æ¡Á,
- 2016ǯ12·î.
- -Antonio Kung, Yasuo Okabe,
- ACCRA: Agile £ÃoCreation of Robots for Ageing,
- Global Innovation Forum on Active and Healthy Ageing,
- Dec. 2016.
- -·¬¸¶ µ®ÌÀ, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË, ¥½¥Õ¥È¥¦¥§¥¢¥ë¡¼¥¿¤Ë¤ª¤±¤ëºÙγÅÙ¤ÎÂÓ°èÀ©¸æ, ¿®³Øµ»Êó, vol.116, no.292, IA2016-60, pp.23-28, 2016ǯ11·î.
- -°ËÆ£ ͧ¹À, ¾®Ã« ÂçÍ´, ²¬Éô ¼÷ÃË, °À¾ðÊó¤òÈë̩ʬ»¶¤·¤¿ïçÃÍ·¿Ç§¾Ú¥·¥¹¥Æ¥à¤ÎÀß·×, ¿®³Øµ»Êó, vol.116, no.292, IA2016-57, pp.7-12, 2016ǯ11·î.
- -Yu Takabatake, Daisuke Kotani, and Yasuo Okabe, An anonymous distributed electronic voting system using Zerocoin, IEICE Tech. Rep., vol.116, no. 282, IA2016-54, pp. 127-131, Nov. 2016.
- -Äźê Á±À², ²¬Éô ¼÷ÃË, Intent-Based Networking¤Ë¤ª¤±¤ë¥ê¥¢¥¯¥Æ¥£¥Ö¤ÊÀßÄêÊѹ¹, ¿®³Øµ»Êó, vol.116, no.247, IA2016-22, pp.1-6, 2016ǯ10·î.
- -²¬Éô ¼÷ÃË, µþÅÔÂç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö¤Î¤³¤ì¤Þ¤Ç¤È¤³¤ì¤«¤é, ÀŲ¬Âç³Ø¸Ä¿Í¾ðÊóÊݸîµÚ¤Ó¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö¹Ö±é²ñ, 2016ǯ10·î.
- -¾¾ËÜ ÏÂÇÏ, ²¬Éô ¼÷ÃË, ¥æ¡¼¥¶¤Î·ëÂ÷¤Ë¤è¤ëÉÔÀµ¤òËɤ°P2P·¿MMO¥²¡¼¥à¤Î¸¡Æ¤, ÅŻҾðÊóÄÌ¿®³Ø²ñ2016ǯ¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ B-6-9, 2016ǯ9·î.
- -°ËÆ£ ͧ¹À, ²¬Éô ¼÷ÃË, °À¾ðÊó¤òÈë̩ʬ»¶¤·¤¿ïçÃÍ·¿Ç§¾Ú¥·¥¹¥Æ¥à¤Î¸¡Æ¤, ÅŻҾðÊóÄÌ¿®³Ø²ñ2016ǯ¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ B-16-1, 2016ǯ9·î.
- -²¬Éô ¼÷ÃË, ÅÅÎϤΥѥ±¥Ã¥È²½, ¥»¥ó¥µ¡¼¥Í¥Ã¥È¥ï¡¼¥¯(U2A)¸¦µæ²ñ, 2016ǯ9·î.
- -²¬Éô ¼÷ÃË, µþÅÔÂç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö, Ê¿À®28ǯÅÙÅ纬Âç³Ø¸Ä¿Í¾ðÊóÊݸ¾ðÊ󥻥¥å¥ê¥Æ¥£¸¦½¤²ñ, 2016ǯ9·î.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#g4d74af0]
- -²¬Éô¼÷ÃË, ¡ÚÄÌ¿®¤¬¤ß¤¨¤ë°ìËç¤Î¼Ì¿¿¡ÛWeb¥Ö¥é¥¦¥¶Mosaic¤ÎµÇ°ÌÃÈÄ, ÅŻҾðÊóÄÌ¿®³Ø²ñÄÌ¿®¥½¥µ¥¤¥¨¥Æ¥£¥Þ¥¬¥¸¥ó, 2017ǯ½Õ¹æ(Âè40¹æ¡Ë, ɽ3, 2017ǯ3·î1Æü.
- -Iwama, K. and Miyazaki, S., Stable Marriage with Ties and Incomplete Lists, Encyclopedia of Algorithms (2nd Edition), Springer, pp. 2071-2075, May 2016.
- -²¬Éô¼÷ÃË, ¡ÚÄÌ¿®¤¬¤ß¤¨¤ë°ìËç¤Î¼Ì¿¿¡ÛºÇ½é´ü¤ÎWWW¥µ¡¼¥Ð, ÅŻҾðÊóÄÌ¿®³Ø²ñÄÌ¿®¥½¥µ¥¤¥¨¥Æ¥£¥Þ¥¬¥¸¥ó, 2016ǯ²Æ¹æ(Âè37¹æ¡Ë, ɽ3, 2016ǯ6·î1Æü.
- **¤½¤Î¾ [#hc3b64d3]
- -µÜºê½¤°ì, ¥³¥ó¥Ô¥å¡¼¥¿¥µ¥¤¥¨¥ó¥¹¤Î¿ô³Ø¡¡¡Á¥¢¥ë¥´¥ê¥º¥àÍýÏÀ¡¢°ÂÄê·ëº§ÌäÂê¡¢P¡âNPͽÁÛ¡Á, µþÅÔÂç³Ø¥µ¥Þ¡¼¥¹¥¯¡¼¥ë2016, 2016ǯ8·î19Æü
- *2015ǯÅÙ [#m01882d8]
- **ÏÀʸ»ïÏÀʸ [#kbb715d2]
- -Koki Hamada, Kazuo Iwama, and Shuichi Miyazaki, The Hospitals/Residents Problem with Lower Quotas, Algorithmica, Volume 74, Issue 1, pp. 440-465, January 2016.
- -Daisuke Kotani, Kazuya Suzuki, Hideyuki Shimonishi, A Multicast Tree Management Method Supporting Fast Failure Recovery and Dynamic Group Membership Changes in OpenFlow Networks, Journal of Information Processing, Vol.24, No.2, pp.395-406, March 2016.
- -Daisuke Kotani, Yasuo Okabe, A Packet-In Message Filtering Mechanism for Protection of Control Plane in OpenFlow Switches, IEICE Transactions on Information and Systems, Vol.E99-D, No.3, pp.695-707, Mar. 2016.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#he123dbb]
- -Daisuke Kotani, Yasuo Okabe, Fast Failure Detection of OpenFlow Channels, Proc. The 11th Asian Internet Engineering Conference (AINTEC 2015), November 18-20, 2015.
- -Chien-Chung Huang, Kazuo Iwama, Shuichi Miyazaki, Hiroki Yanagisawa,
- A Tight Approximation Bound for the Stable Marriage Problem with Restricted Ties, Proc. 18th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX 2015), pp. 361-380, August 24-26, 2015. (KURENAI)
- -Naoki Tsujio, Yasuo Okabe,
- A Traceable and Psudonymous P2P Information Distribution System,
- The 1st IEEE International Workshop on Middleware for Cyber Security, Cloud
- Computing and Internetworking (MidCCI2015),
- in Proc. 39th Annual International Computers, Software & Applications Conference (COMPSAC2015),
- Taichung, Taiwan, pp.67-72, July 1-5, 2015.
- -Tomotaka Maeda, Hiroki Nakano, Naoyuki Morimoto, Kazumi Sakai, Yasuo Okabe,
- Design and Implementation of an On-demand Home Power Management System based on a Hierarchial Protocol,
- The 3rd IEEE International Workshop on Consumer Devices and Systems (CDS2015),
- in Proc. 39th Annual International Computers, Software & Applications Conference (COMPSAC2015),
- Taichung, Taiwan, pp.188-193, July 1-5, 2015.
- -Shuichi Miyazaki, Naoyuki Morimoto, Yasuo Okabe,
- Approximability of Two Variants of Multiple Knapsack Problems,
- Proc. 9th International Conference on Algorithms and Complexity (CIAC 2015) (Lecture Notes in Computer Science 9079), pp. 365-376, May 20-22, 2015.
- **¸ýƬȯɽ¤Ê¤É [#c4b69807]
- -²¬Éô ¼÷ÃË, »³¸ý ¹°½ã, °ÂËÜ ·Ä°ì, ¾ðÊóήµ»½Ñ¤È¥¨¥Ã¥¸¥³¥ó¥Ô¥å¡¼¥Æ¥£¥ó¥°, ÅŻҾðÊóÄÌ¿®³Ø²ñ2016ǯÁí¹çÂç²ñ BP-3-3, 2016ǯ3·î.
- -úɸ¶ µ®ÌÀ, ²¬Éô ¼÷ÃË, DDoS¹¶·â¤òËɻߤ¹¤ë¥½¥Õ¥È¥¦¥§¥¢¥ë¡¼¥¿¤Ë¤Ä¤¤¤Æ, ÅŻҾðÊóÄÌ¿®³Ø²ñ2016ǯÁí¹çÂç²ñISSÆÃÊÌ´ë²è¡Ö³ØÀ¸¥Ý¥¹¥¿¡¼¥»¥Ã¥·¥ç¥ó¡× ISS-P-139, 2016ǯ3·î.
- -°ËÆ£ ͧ¹À, ²¬Éô ¼÷ÃË, Ê£¿ô¤ÎIdP¤òÍѤ¤¤¿¥·¥ó¥°¥ë¥µ¥¤¥ó¥ª¥ó¤ÎÄó°Æ¤È¼ÂÁõ, ÅŻҾðÊóÄÌ¿®³Ø²ñ2016ǯÁí¹çÂç²ñISSÆÃÊÌ´ë²è¡Ö³ØÀ¸¥Ý¥¹¥¿¡¼¥»¥Ã¥·¥ç¥ó¡× ISS-P-130, 2016ǯ3·î.
- -ÃæÌîÇî¼ù, ºä°æ°ìÈþ, ²¬Éô¼÷ÃË,
- ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥×¥í¥È¥³¥ë¤ÎÀß·×,
- µþÅÔÂç³ØÂè10²óICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2016ǯ2·î.
- -µÜºê½¤°ì,
- °ÂÄê¥Þ¥Ã¥Á¥ó¥°¤òÍøÍѤ·¤¿ÇÛ°¥·¥¹¥Æ¥à¤Î¸¦µæ,
- µþÅÔÂç³ØÂè10²óICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2016ǯ2·î.
- -²¬Éô¼÷ÃË,
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
- Âè18²óµþÅÔÂç³Ø-NTT IMC¸¦µæ²ñ, 2016ǯ1·î.
- -²¬Éô¼÷ÃË,
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎÏÇÛÁ÷¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
- ÅìËÌÂç³ØÅŵ¤ÄÌ¿®¸¦µæ½êÊ¿À®27ǯÅÙ¶¦Æ±¥×¥í¥¸¥§¥¯¥È¸¦µæ¹çƱȯɽ²ñ, 2015ǯ11·î.
- -ºä°æ°ìÈþ, ÃæÌîÇî¼ù, ²¬Éô¼÷ÃË,
- ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥×¥í¥È¥³¥ë¤ÎÀß·×,
- Âè38²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¸¦µæ²ñŸ¼¨¥Ç¥â¾Ò²ð¥»¥Ã¥·¥ç¥ó¡¤2015ǯ11·î.
- -Æ£°æ ³¤ÅÍ, ¿¹ËÜ ¾°Ç·, µÜºê ½¤°ì, ²¬Éô ¼÷ÃË, ³äÅöÀ©Ìó¤Ä¤Ê£¿ô¥Ê¥Ã¥×¥µ¥Ã¥¯ÌäÂê¤ËÂФ¹¤ë¶á»÷¥¢¥ë¥´¥ê¥º¥à¤Î¼Â¸³ÅªÉ¾²Á, Ê¿À®27ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ B-03, 2015ǯ9·î.
- -Âç·î ¿Î»Ö, ¿¹ËÜ ¾°Ç·, µÜºê ½¤°ì, ²¬Éô ¼÷ÃË, À°¿ô·×²è¤òÍѤ¤¤¿¥·¥å¥¿¥¤¥Ê¡¼Ìڵͤá¹þ¤ßÌäÂê¤Î²òË¡¤È¤½¤Î¼Â¸³ÅªÉ¾²Á, Ê¿À®27ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ B-02, 2015ǯ9·î.
- -Yasuo Okabe, Takaaki Komura, Motonori Nakamura,
- EduroamShib: a privacy-aware eduroam account issuing system based on the GakuNin Shibboleth federation,
- IAM (Identity and Access Management ) WG, 40th Asia Pacific Advanced Network Meeting,
- Aug. 2015.
- -º´Æ£¼þ¹Ô¡¦²¬Éô¼÷ÃË¡¦Ãæ¼ÁÇŵ,
- ǧ¾ÚÏ¢·È¤Ë¤ª¤±¤ë²¾Ì¾À¤òôÊݤ·¤¿¥æ¡¼¥¶Æ±°ìÀ¤Î³Îǧ,
- ¾ðÊó½èÍý³Ø²ñ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2015)¥·¥ó¥Ý¥¸¥¦¥àÏÀʸ½¸ [¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º], Vol.2015, No.1, pp.890-895, 2015ǯ7·î.
- -²¬Éô¼÷ÃË, Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¤Î¿»Æ©
- ¡Ê´ðÄ´¹Ö±é¡Ë,
- CAUA FORUM 2015 Âç³Ø¤Ë¤ª¤±¤ë¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¤Î¤³¤ì¤«¤é, 2015ǯ6·î.
- -²¬Éô¼÷ÃË,
- ¾ðÊóή¤ò°·¤¦¾å¤Ç¤Î¥»¥¥å¥ê¥Æ¥£¤È¥×¥é¥¤¥Ð¥·¡¼¤Î²ÝÂê,
- Âè2²ó¾ðÊóή¥·¥ó¥Ý¥¸¥¦¥à, 2015ǯ5·î30Æü.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#z24a6200]
- -²¬Éô¼÷ÃË,
- Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö¤È¾ðÊ󥻥¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¤Î¿»Æ©,
- View Point, Âè16¹æ, pp.10-15, Mar. 2016.
- -¹â¶¶Å°¡¦ÉÛÌÜÉÒϺ¡¦²¬Éô¼÷ÃË,
- ³Ø½Ñ³èÆ°¤Ë¤Ä¤¤¤Æ,
- ¡Ú²òÀâ¡ÛÅŻҾðÊóÄÌ¿®³Ø²ñ¤Ã¤Æ²¿¤ò¤·¤Æ¤¤¤ë¤Î¡©¡½¶ñÂÎŪ¤Ê³èÆ°¤òÃÎ¤í¤¦¡½,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÄÌ¿®¥½¥µ¥¤¥¨¥Æ¥£¥Þ¥¬¥¸¥ó, 2016ǯ½Õ¹æ¡ÊÂè36¹æ¡Ë, pp.208-211, 2016ǯ3·î1Æü.
- -²¬Éô¼÷ÃË,
- ¡ÚÄÌ¿®¤¬¤ß¤¨¤ë°ìËç¤Î¼Ì¿¿¡Û¥¬¥á¥é¥ì¡¼¥À,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÄÌ¿®¥½¥µ¥¤¥¨¥Æ¥£¥Þ¥¬¥¸¥ó, 2015ǯ²Æ¹æ(Âè33¹æ¡Ë, ɽ3, 2015ǯ6·î1Æü.
- **¤½¤Î¾ [#pa406f6a]
- -Shuichi Miyazaki, Stable Marriage Problem, Chapter 17 of Handbook of Graph Theory, Combinatorial Optimization, and Algorithms, Editted by Krishnaiyan "KT" Thulasiraman, Subramanian Arumugam, Andreas Brandstadt, and Takao Nishizeki, CRC Press, 2015.
- -µÜºê½¤°ì, ¥³¥ó¥Ô¥å¡¼¥¿¥µ¥¤¥¨¥ó¥¹¤Î¿ô³Ø¡¡¡Á¥¢¥ë¥´¥ê¥º¥àÍýÏÀ¡¢°ÂÄê·ëº§ÌäÂê¡¢P¡âNPͽÁÛ¡Á, µþÅÔÂç³Ø¥µ¥Þ¡¼¥¹¥¯¡¼¥ë2015, 2015ǯ8·î20Æü
- -µÜºê½¤°ì, ¥°¥é¥ÕÍýÏÀÆþÌç ¡Á´ðËܤȥ¢¥ë¥´¥ê¥º¥à¡Á, ¿¹Ë̽ÐÈdzô¼°²ñ¼Ò, 2015ǯ6·î
- *2014ǯÅÙ [#fc362793]
- **ÏÀʸ»ïÏÀʸ [#z9b2c4f4]
- -Minseon Lee, Shuichi Miyazaki, and Kazuo Iwama, Finding Witnesses for Stability in the Hospitals/Residents Problem, Journal of Information Processing, Vol. 23, No. 2, pp. 202-209, February 2015.
- -Shuichi Miyazaki,
- On the advice complexity of online bipartite matching and online stable marriage,
- Information Processing Letters, Vol.114, Issue 12, pp. 714-717, December 2014.
- -¾¾ËÜ Î¼²ð¡¦²¬Éô ¼÷ÃË,
- mod_mruby¡§¥¹¥¯¥ê¥×¥È¸À¸ì¤Ç¹â®¤«¤Ä¾Ê¥á¥â¥ê¤Ë³ÈÄ¥²Äǽ¤ÊWeb¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½ ,
- ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, Vol.55, No.11, pp.2451-2460, 2014ǯ11·î
- -Hiroyuki Sato, Yasuo Okabe, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura,
- Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach,
- Journal of Information Processing, Vol. 22, No. 3 pp. 464-471, July 2014.
- -Takeshi Nishimura, Motonori Nakamura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe,
- Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding,
- Journal of Information Processing Vol. 22, No. 3 pp. 472-479, July 2014.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#o49466ba]
- -Yoshiharu Tsuzaki, Yasuo Okabe, Ray Atarashi, Tatsuya Hayashi, Development of an Automatic Managing System of Wide-area Distributed Networks with Defined Network Specification, 1st International Workshop on Management of SDN and NFV Systems (ManSDN/NFV 2014), November 2014.
- -Daisuke Kotani, Yasuo Okabe,
- A Packet-In Message Filtering Mechanism for Protection of Control Plane in OpenFlow Networks, The 10th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS2014), pp.29-40, October 2014.
- -Masayuki Tsubouchi, Tomotaka Maeda, Yasuo Okabe,
- Digital Fingerprinting on Executable File for Tracking Illegal Uploaders,
- 6th IEEE International Workshop on Computer Forensics in Software Engineering (CFSE2014), (Proc. IEEE COMPSAC2014 Workshops), pp.325-330, July 2014.
- **¸ýƬȯɽ¤Ê¤É [#v540b7c8]
- -Andrew Lee, µÜºê½¤°ì, ²¬Éô¼÷ÃË,
- Ê£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎºÇ¾®Ä¾·ÂÊ£¿ô¥¹¥¿¥¤¥Ê¡¼ÌÚÌäÂê,
- ¾ðÊó½èÍý³Ø²ñÂè77²óÁ´¹ñÂç²ñ, 4W-09, 2015ǯ3·î.
- -ÄÔÈø¾°¼ù, ²¬Éô¼÷ÃË,
- ȯ¿®¼ÔÄÉÀײÄǽ¤«¤Ä²¾Ì¾·¿¤ÎP2P¾ðÊóȯ¿®¥·¥¹¥Æ¥à,
- ¾ðÊó½èÍý³Ø²ñÂè77²óÁ´¹ñÂç²ñ, 4X-02, 2015ǯ3·î.
- -ÅÄÅç¾Èµ×, ²¬Éô¼÷ÃË,
- Web¥Ö¥é¥¦¥¸¥ó¥°¹â®²½¤Î¤¿¤á¤ÎTCP¥Ø¥Ã¥À¤Ë´ð¤Å¤¯802.11̵ÀþÄÌ¿®ºÇŬ²½,
- ¾ðÊó½èÍý³Ø²ñÂè77²óÁ´¹ñÂç²ñ, 3X-06, 2015ǯ3·î, ³ØÀ¸¾©Îå¾Þ¼õ¾Þ.
- -Andrew Lee, µÜºê½¤°ì, ²¬Éô¼÷ÃË,
- Ê£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎìÅÍߥ¢¥ë¥´¥ê¥º¥à¤Îɾ²Á,
- ¿®³Øµ»Êó, vol. 114, no. 495, IA2014-105, pp. 143-147, 2015ǯ3·î.
- -ºä°æ°ìÈþ, ²¬Éô¼÷ÃË, ÃæÌîÇî¼ù,
- ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥·¥ß¥å¥ì¡¼¥¿,
- µþÅÔÂç³ØÂè9²óICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2015ǯ3·î.
- -À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²¬Éô ¼÷ÃË,
- ¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à¤Ë¤ª¤±¤ë¥°¥ë¡¼¥×´ÉÍý¼Ô¤Î¸úΨŪ´ÉÍý,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, 2015-IOT-28, 35, pp.1-6, 2015ǯ2·î.
- -²¬Éô¼÷ÃË,
- Energy on DemandÅÅÎÏÀ©¸æ¤Î¤¿¤á¤ÎÅÅÎϼûÍ×ͽ¬¤È¥×¥é¥¤¥Ð¥·¡¼,
- ÅìËÌÂç³ØÅŵ¤ÄÌ¿®¸¦µæ½êÊ¿À®26ǯÅÙ¶¦Æ±¥×¥í¥¸¥§¥¯¥È¸¦µæ¡Ö¾ðÊó¤Îή¤ì¤ËÃåÌܤ·¤¿¿·À¤Âå¾ðÊó½èÍý´ðÈ×µ»½Ñ¤Ë´Ø¤¹¤ë¸¦µæ¡×ȯɽ²ñ, 2014ǯ12·î.
- -ÄźêÁ±À², ²¬Éô¼÷ÃË, ¿·Îï, ÎÓãÌé, ²¬ÅĹ̻Ê, ÎëÌÚÌкÈ, Ãæ¼½¤, LACCOONS:¥Í¥Ã¥È¥ï¡¼¥¯»ÅÍÍÄêµÁ¤Ë¤è¤ë¹°èʬ»¶¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°±¿ÍÑ´ÉÍý¥·¥¹¥Æ¥à,
- Âè36²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¸¦µæ²ñCISʬ²Ê²ñ¡¤2014ǯ11·î.
- -ºä°æ°ìÈþ, ²¬Éô¼÷ÃË, ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥×¥í¥È¥³¥ë¤Î¸¡Æ¤,
- Âè36²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¸¦µæ²ñ¥Ç¥â¾Ò²ð¥»¥Ã¥·¥ç¥ó¡¤2014ǯ11·î.
- -ÄÔÈø¾°¼ù,²¬Éô¼÷ÃË,
- ¼«¼£¤¬²Äǽ¤ÊP2P·¿Æ¿Ì¾Publish/Subscribe¥·¥¹¥Æ¥à,
- ¿®³Øµ»Êó, Vol. 114, No. 335, IA2014-63, pp.13-27, 2014ǯ11·î.
- -ÅÄÅç¾Èµ×,²¬Éô¼÷ÃË,
- 802.11̵ÀþLAN¤Ë¤ª¤±¤ë¥Ð¥Ã¥¯¥ª¥Õ»þ´Ö¤ÎÀ©¸æ¤È¥¢¥¯¥»¥¹¥Ý¥¤¥ó¥È¤Î¥Ð¥Ã¥Õ¥¡ºÇŬ²½¤Ë¤è¤ëÄãÃÙ±ä̵Àþ¤ÎÄó°Æ,
- ¿®³Øµ»Êó, Vol. 114, No. 335, IA2014-65, pp.25-27, 2014ǯ11·î.
- -¾¾ËÜμ²ð,
- mod_mruby: ¥¹¥¯¥ê¥×¥È¸À¸ì¤Ç¹â®¤«¤Ä¾Ê¥á¥â¥ê¤Ë³ÈÄ¥²Äǽ¤ÊWeb ¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½,
- Embedded Technology 2014¥¹¥Ú¥·¥ã¥ë¥»¥Ã¥·¥ç¥óC-2, 2014ǯ11·î.
- -À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²¬Éô ¼÷ÃË:
- ´ÉÍý¸¢¸Â¤ò°ìÈ̥桼¥¶¤Ë¤â°Ü¾ù¤Ç¤¤ë¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, 2014-IOT-27, 18, pp.1-6, 2014ǯ10·î.
- -È«»³µ®¹Ô, µÜºê½¤°ì, ¥Þ¥¸¥Ã¥¯¥×¥í¥È¥³¥ë¤òÍѤ¤¤¿P2P´Ä¶¤Ç¤Î¸øÀµ¤Ê¥Í¥Ã¥È¥ï¡¼¥¯¥Ö¥é¥Ã¥¯¥¸¥ã¥Ã¥¯, Ê¿À®26ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ D-01, 2014ǯ9·î.
- -»³ºêÊþºÈ, µÜºê½¤°ì, ¸ø³«¸°°Å¹æ¤òÍѤ¤¤¿P2P·¿¥Í¥Ã¥È¥ï¡¼¥¯Ëã¿ý¾´ý, Ê¿À®26ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ D-02, 2014ǯ9·î.
- -ÅÄÅç¾Èµ×, ²¬Éô¼÷ÃË, 802.11̵ÀþLAN¤Ë¤ª¤±¤ëÊ£¿ôüËö¤ÎÁ÷¿®¥¿¥¤¥ß¥ó¥°À©¸æ¥·¥ß¥å¥ì¡¼¥·¥ç¥ó, Ê¿À®26ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ E-12, 2014ǯ9·î.
- -½ÅÌ²¬Éô¡¦²Ï¸ý¡¦ÄÍËÜ¡¦ÆÁÅÄ,
- ¾ðÊóή ¡ß IoT¡Ê¥Ñ¥Í¥ëƤÏÀ¡Ë,
- FIT2014 ¾ðÊó¤Îή¤ì¤ËÃåÌܤ·¤¿¼Â»þ´Öʬ»¶½èÍý´ðÈ× - IoT¤È¥¯¥é¥¦¥É¥½¡¼¥·¥ó¥°¤Î´ÑÅÀ¤«¤é -, 2014ǯ9·î.
- -ÊÒ»³·òÂÀϺ, µÆÃÓÀµ»Ë, »³ÅÄÀ», ÂçÄÍÈ»¿Í, ²¬ÅĹ̻Ê, ²¬Éô¼÷ÃË, ÄÅùõÁ±À², ¿·Îï, ÎÓãÌé, ¥Í¥Ã¥È¥ï¡¼¥¯»ÅÍÍÄêµÁ¤Ë¤è¤ë¹°èʬ»¶¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°±¿ÍÑ´ÉÍý¥·¥¹¥Æ¥à¤Î³«È¯, Âè6²ó¿·À¤Âå¥Í¥Ã¥È¥ï¡¼¥¯¥·¥ó¥Ý¥¸¥¦¥à, 2014ǯ7·î
- -À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²¬Éô ¼÷ÃË,
- Åý¹çID¤È°À¤òÍѤ¤¤¿¥°¥ë¡¼¥×¤ÎÂηϲ½,
- ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2014)¥·¥ó¥Ý¥¸¥¦¥à 3G-4, 2014ǯ7·î.
- -¾¾ËÜμ²ð, º£¤É¤¤ÎWEB¥Û¥¹¥Æ¥£¥ó¥°¤Î¹âÉé²ÙÂкö, Hosting Casual Talks #1 at ³ô¼°²ñ¼Ò¤Ï¤Æ¤Ê, 2014ǯ6·î.
- -ÄÅùõÁ±À², Ʊ°ì¤ÎÁ÷¼õ¿®¥¢¥É¥ì¥¹¤ò»ý¤ÄÂçÎ̥᡼¥ë¤Î¸úΨŪȽÄê¼êË¡, Hosting Casual Talks #1 at ³ô¼°²ñ¼Ò¤Ï¤Æ¤Ê, 2014ǯ6·î.
- -¾®ÎÓ¹ÀÆó¡¤À½ã¡¤µÜºê½¤°ì¡¤¥ª¥ó¥é¥¤¥ó¥Õ¥ì¡¼¥àžÁ÷Î̺ÇÂç²½ÌäÂê¤Ë¤ª¤±¤ë¶¥¹çÈæ¤Î²þÎÉ, ¿®³Øµ»Êó¡¤Vol.114, No.19, COMP2014-6 (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ), pp.37-44, 2014ǯ4·î.
- -µÜºê½¤°ì¡¤¶á»÷¥¢¥ë¥´¥ê¥º¥à¤È°ÂÄê¥Þ¥Ã¥Á¥ó¥°¡¤µþÅÔÂç³Ø·ÐºÑ¸¦µæ½ê ¥ß¥¯¥í¡¦¥²¡¼¥àÍýÏÀ¸¦µæ²ñ¡¤2014ǯ4·î3Æü.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#r3e40fc4]
- -²¬Éô¼÷ÃË,
- ¡ÚÄÌ¿®¤¬¤ß¤¨¤ë°ìËç¤Î¼Ì¿¿¡Û¾Ý¤ÎÝ£¡ÊºßÆüÊÆ·³»Ð¾ÂÄÌ¿®½êWullenweber¼°¥¢¥ó¥Æ¥Ê¡Ë,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÄÌ¿®¥½¥µ¥¤¥¨¥Æ¥£¥Þ¥¬¥¸¥ó, 2015ǯ½Õ¹æ(Âè32¹æ¡Ë, ɽ3, 2015ǯ3·î1Æü.
- -¾¾ËÜμ²ð,
- ³Ú¤·¤â¤¦OSS³«È¯ mruby¤Ç³Ø¤ó¤À¹×¸¥¤Îήµ·¤È¾ðÇ®,
- WEB+DB PRESS Vol.85,
- pp.98-107, µ»½ÑɾÏÀ¼Ò, 2015ǯ2·î24Æü.
- **¹ñºÝɸ½à²½Äó°Æ [#g43bd1e9]
- -Y. Tsuzaki, R. Atarashi, S. Suzuki, K. Mitsuya, K. Okada, Network configuration Web API for Bandwidth Reservation, IETF Internet-Draft, Mar. 2015.
- *2013ǯÅÙ [#f5f7b91b]
- **ÏÀʸ»ïÏÀʸ [#r3efd9a8]
- -Kazuo Iwama, Shuichi Miyazaki, and Hiroki Yanagisawa,
- A 25/17-Approximation Algorithm for the Stable Marriage Problem with One-Sided Ties,
- Algorithmica, Volume 68, Issue 3, pp. 758-775, March 2014.
- -¾¾ËÜμ²ð, ²¬Éô¼÷ÃË,
- ¥¹¥ì¥Ã¥Éñ°Ì¤Ç¸¢¸ÂʬΥ¤ò¹Ô¤¦Web¥µ¡¼¥Ð¤Î¥¢¥¯¥»¥¹À©¸æ¥¢¡¼¥¥Æ¥¯¥Á¥ã,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï Vol.J96-B, No.10, pp.1122-1130, Oct 2013.
- -À¾Â¼ ·ò, Ãæ¼ ÁÇŵ, »³ÃÏ °ìÄ÷, º´Æ£ ¼þ¹Ô, Âçë À¿, ²¬Éô ¼÷ÃË, Á¾º¬¸¶ ÅÐ,
- ¿Íͤʥݥꥷ¡¼¤òÈ¿±Ç²Äǽ¤Êǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥óµ¡¹½¤Î¼Â¸½¡Ê¾·ÂÔÏÀʸ¡Ë,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ïD Vol.J96-D No.6 pp.1400-1412, June 2013.
- -Takao Inoshita, Robert W. Irving, Kazuo Iwama, Shuichi Miyazaki, Takashi Nagase, Improving Man-Optimal Stable Matchings by Minimum Change of Preference Lists, MDPI Algorithms, Vol. 6, Issue 2, pp. 371-382, May 2013.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#oda7f119]
- -Jun Kawahara, Koji M. Kobayashi, Shuichi Miyazaki, Better Bounds for Online k-Frame Throughput Maximization in Network Switches, Proc. 24th International Symposium on Algorithms and Computation (ISAAC 2013) (Lecture Notes in Computer Science 8283), pp. 218-228, Dec., 2013.
- -Yoshiharu Tsuzaki, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, Yasuo Okabe,
- A Mail Transfer System Selectively Restricting a Huge Amoount of E-mails,
- Workshop on Resilient Internet based Systems (REIS 2013), pp. 896-900, Dec. 2013.
- -Hiroki Okamoto, Ryosuke Matsumoto, Yasuo Okabe,
- Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network,
- IEEE 37th Annual International Computer Software and Applications Conference (COMPSAC2013), July 2013.
- -Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe,
- Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities Across Shibboleth SPs,
- The 7th International Workshop on Middleware Architecture in the Internet (MirArch2013) (Proc. IEEE COMPSAC2013 Workshops), July 2013.
- -Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji,
- Privacy Enhancing Proxies in Attribute Release:Two Approaches,
- The 7th International Workshop on Middleware Architecture in the Internet (MirArch2013) (Proc. IEEE COMPSAC2013 Workshops), July 2013.
- -Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe,
- Power Allocation Algorithms of PoE for on-Demand Power Supply
- The 1st IEEE International Workshop on Consumer Devices and Systems (CDS2013),
- (Proc. IEEE COMPSAC2013 Workshops), July 2013.
- -Yasuhiro Teramoto, Rei Atarashi, Yoshifumi Atarashi, Yasuo Okabe,
- Managing Networks Independently of the Physical Topology by Service Defined Network,
- The 1st IEEE International Workshop on Architecture, Design, Deployment and Management of
- Networks and Applications (ADMNET2013),
- (Proc. IEEE COMPSAC2013 Workshops), July 2013.
- **¸ýƬȯɽ¤Ê¤É [#b3449d20]
- -²¬Éô¼÷ÃË,
- ¾ðÊóή¤È¥»¥¥å¥ê¥Æ¥£,
- Â裱²ó¾ðÊóή¥·¥ó¥Ý¥¸¥¦¥à,
- 2014ǯ3·î.
- -Á°ÅÄÊþ¹§¡¦²¬Ëܶǹ¡¦¾®»³Íΰ졦ÃæÌîÇî¼ù¡¦À±Ìî ´²¡¦Â¼¾å¿ÂÀϺ¡¦¿¹Ëܾ°Ç·¡¦ºä°æ°ìÈþ¡¦²¬Éô¼÷ÃË,
- Ê£¿ô²ÈÄí¤Ë¤ª¤±¤ë¥×¥í¥È¥³¥ë³¬Áؤò»ý¤Ä¥ª¥ó¥Ç¥Þ¥ó¥ÉÅÅÎÏ´ÉÍý¥·¥¹¥Æ¥à¤ÎÀß·×,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2014ǯÁí¹çÂç²ñ BS-4-3,
- 2014ǯ3·î18Æü.
- -ÅÄÅç¾Èµ×¡¦²¬Éô¼÷ÃË,
- 802.11̵ÀþLAN¤Ë¤ª¤±¤ëTCP¤ÎRTT¤ËÃåÌܤ·¤¿ ¥Ñ¥±¥Ã¥ÈÁ÷¿®¥¿¥¤¥ß¥ó¥°À©¸æ¤Ë¤è¤ë¾×ÆͲóÈò¤ÎÄó°Æ,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2014ǯÁí¹çÂç²ñ B-16-6,
- 2014ǯ3·î18Æü.
- -¾¾ËÜμ²ð,
- ¡Ömod_mruby ¡ß ngx_mruby¡× ¥¹¥¯¥ê¥×¥È¸À¸ì¤Ç¹â®¤«¤Ä¾Ê¥á¥â¥ê¤Ë³ÈÄ¥²Äǽ¤ÊWeb¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½¡ÊÍ¥½¨¾Þ¼õ¾Þ¡Ë,
- Âè6²ó¥Õ¥¯¥ª¥«RubyÂç¾Þ, 2014ǯ2·î.
- -¾®Ã«ÂçÍ´¡¦²¬Éô¼÷ÃË,
- £Ï£ð£å£î£Æ£ì£ï£÷¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ï¥¤¥ë¥É¥«¡¼¥É¥Ø¥Ã¥À¤ò¹Íθ¤·¤¿Packet-In¥á¥Ã¥»¡¼¥¸¤ÎÀ©¸æ¼êË¡,
- ¿®³Øµ»Êó, vol. 113, no. 443, IA2013-86, pp. 43-48, 2014ǯ2·î.
- -ÄÅùõÁ±À²¡¦¾¾ËÜμ²ð¡¦¾®Ã«ÂçÍ´¡¦µÜºê½¤°ì¡¦²¬Éô¼÷ÃË,
- Ʊ°ì¤ÎÁ÷¼õ¿®¥¢¥É¥ì¥¹¤ò»ý¤ÄÂçÎ̥᡼¥ë¤Î¸úΨŪȽÄê¼êË¡,
- ¿®³Øµ»Êó, vol. 113, no. 443, IA2013-87, pp. 61-66, 2014ǯ2·î.
- -²¬Éô¼÷ÃË¡¦¸Å¼δÌÀ¡¦º´Æ£¼þ¹Ô¡¦»³ÃÏ°ìÄ÷¡¦Ãæ¼ÁÇŵ,
- °À¾ðÊó¤Èǧ²Ä¾ò·ï¤òÁê¸ß¤ËÈëÆ¿¤¹¤ëǧ¾ÚÏ¢·È¥×¥í¥¥·,
- ¿®³Øµ»Êó, vol. 113, no. 443, IA2013-88, pp. 67-72, 2014ǯ2·î.
- -ÄÛÆâ¾Ç·¡¦²¬Éô¼÷ÃË,
- ¥½¥Õ¥È¥¦¥§¥¢ÉÔÀµ¥¢¥Ã¥×¥í¡¼¥É¼ÔÄÉÀפΤ¿¤á¤Î¼Â¹Ô·Á¼°¥Õ¥¡¥¤¥ë¤Ø¤ÎÅÅ»ÒÆ©¤«¤·ÁÞÆþ,
- ¿®³Øµ»Êó, vol. 113, no. 442, SITE2013-74, pp. 189-193, 2014ǯ2·î.
- -µÜ²¼ ¹äÊå , ·ªÎÓ ·òÂÀϺ , ¾¾ËÜ Î¼²ð
- serverspec: Àë¸ÀŪµ½Ò¤Ç¥µ¡¼¥Ð¤Î¾õÂÖ¤ò¥Æ¥¹¥È²Äǽ¤ÊÈÆÍÑÀ¤Î¹â¤¤¥Æ¥¹¥È¥Õ¥ì¡¼¥à¥ï¡¼¥¯,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¡ÊIOT¡Ë,2014-IOT-24(15),1-6 (2014-02-20)
- -Ãæ¼ ÁÇŵ , À¾Â¼ ·ò , »³ÃÏ °ìÄ÷ , ²¬Éô ¼÷ÃË,
- ǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¤ËÂбþ¤·¤¿¥Æ¥ì¥Ó²ñµÄMCUͽÌó¥·¥¹¥Æ¥àFaMCUs¤Î³«È¯,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¡ÊIOT¡Ë,2014-IOT-24(4),1-6 (2014-02-20)
- -¿¹Ëܾ°Ç·¡¤µÜºê½¤°ì¡¤²¬Éô¼÷ÃË¡¤
- ÍÆÎÌÀ©Ìó¤ò»ý¤Ä³äÅöÀ©¸ÂÉդʣ¿ô¥Ê¥Ã¥×¥¶¥Ã¥¯ÌäÂꡤ2013ǯÅÙÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à [17]¡¤2014ǯ1·î¡¥
- -Á°ÅÄ Êþ¹§ , ²¬ËÜ ¶Ç¹ , ¾®»³ Íΰì , ÃæÌî Çî¼ù , À±Ìî ´² , ¼¾å ¿ÂÀϺ , ¿¹ËÜ ¾°Ç· , ºä°æ °ìÈþ , ²¬Éô ¼÷ÃË,
- ¥×¥í¥È¥³¥ë³¬Áؤò»ý¤Ä²ÈÄíÆ⥪¥ó¥Ç¥Þ¥ó¥ÉÅÅÎÏ´ÉÍý¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð ¥³¥ó¥·¥å¡¼¥Þ¡¦¥Ç¥Ð¥¤¥¹¡õ¥·¥¹¥Æ¥à¡ÊCDS¡Ë,2014-CDS-9(20),1-8 (2014-01-16)
- -²¬Éô¼÷ÃË¡¦ÄźêÁ±À²¡¦¿·¡¡ÎÎÓ¡¡Ã£Ìé,
- ¥Í¥Ã¥È¥ï¡¼¥¯»ÅÍÍÄêµÁ¤Ë¤è¤ë¹°èʬ»¶¥Í¥Ã¥È¥ï¡¼¥¯¤Î±¿ÍÑ´ÉÍý,
- ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½ÑÊó¹ð2013-12-IN-IA, 2013ǯ12·î.
- -À¶¿å¤µ¤ä»Ò¡¤¸ÍÅľ¡Á±¡¤²¬Éô¼÷ÃË,
- Ǥ°Õ¤Î¥°¥ë¡¼¥×¤ÈÅý¹çID¤ò»È¤Ã¤¿¥á¥ó¥Ð¤Î´ÉÍý¤ò¹Ô¤¦¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à¤Î¼ÂÁõ,
- ¾ðÊó½èÍý³Ø²ñÂè6²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à, 2013ǯ12·î.
- -¾¾ËÜμ²ð¡¤²¬Éô ¼÷ÃË,
- mod_mruby: ¥¹¥¯¥ê¥×¥È¸À¸ì¤Ç¹â®¤«¤Ä¾Ê¥á¥â¥ê¤Ë³ÈÄ¥²Äǽ¤ÊWeb¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½,
- ¾ðÊó½èÍý³Ø²ñÂè6²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à, 2013ǯ12·î.
- -²¬Éô¼÷ÃË,
- ¥â¥Ð¥¤¥ëWiMAX¥¥ã¥ó¥Ñ¥¹¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ,
- MCPC¥â¥Ð¥¤¥ë¥½¥ê¥å¡¼¥·¥ç¥ó¥Õ¥§¥¢2013, 2013ǯ11·î.
- -Yasuo Okabe,
- Some Considerations on Security and Scalability Issues of Software Defined Networking (Invited Talk),
- Global Future Internet Summit 2013, Seoul, Korea, Nov. 2013.
- -µÜºê½¤°ì¡¤°ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¶á»÷¥¢¥ë¥´¥ê¥º¥à(¾·ÂÔ¹Ö±é), Âè25²óRAMP¥·¥ó¥Ý¥¸¥¦¥àÏÀʸ½¸, pp. 30-45, 2013ǯ10·î29Æü¡¥(¼¯»ùÅçÂç³Ø¡¤¼¯»ùÅç»Ô).
- -¾¾ËÜμ²ð, ²¬Éô¼÷ÃË,
- ¥ê¥¯¥¨¥¹¥Èñ°Ì¤Ç²¾ÁÛŪ¤Ë¥³¥ó¥Ô¥å¡¼¥¿¥ê¥½¡¼¥¹¤òʬΥ¤¹¤ëWeb¥µ¡¼¥Ð¤Î¥ê¥½¡¼¥¹À©¸æ¥¢¡¼¥¥Æ¥¯¥Á¥ã,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð Vol.2013-IOT-23, No.4, 2013ǯ9·î.
- -²¬Éô¼÷ÃË,
- µþÅÔÂç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö¤Î¤³¤ì¤Þ¤Ç¤È¤³¤ì¤«¤é,
- Ê¿À®25ǯÅÙTOPIC¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ,
- 2013ǯ9·î
- -ÄÛÆâ¾Ç·, ²¬Éô¼÷ÃË, ¥½¥Õ¥È¥¦¥§¥¢ÉÔÀµ¥¢¥Ã¥×¥í¡¼¥É¼ÔÄÉÀפΤ¿¤á¤Î¼Â¹Ô·Á¼°¥Õ¥¡¥¤¥ë¤Ø¤ÎÅÅ»ÒÆ©¤«¤·ÁÞÆþ, Ê¿À®25ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ E-16, 2013ǯ9·î.
- -ÄźêÁ±À², ¾¾ËÜμ²ð, ¾®Ã«ÂçÍ´, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ÅŻҥ᡼¥ë¤ÎÂçÎÌÁ÷¿®¤òÁªÂòŪ¤ËÀ©¸Â¤¹¤ëÃæ·Ñ¥·¥¹¥Æ¥à, Ê¿À®25ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ E-23, 2013ǯ9·î, ³ØÀ¸¾©Îå¾Þ¼õ¾Þ.
- -Minseon Lee, Shuichi Miyazaki, and Kazuo Iwama, Finding Witnesses for Stability in the Hospitals/Residents Problem, Ê¿À®25ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ B-02, 2013ǯ9·î, ³ØÀ¸¾©Îå¾Þ¼õ¾Þ.
- -µÜºê½¤°ì, °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¥¢¥ë¥´¥ê¥º¥àÏÀŪ¥¢¥×¥í¡¼¥Á(¾·ÂÔ¹Ö±é), Summer Workshop on Economic Theory (SWET 2013), 2013ǯ8·î9Æü. (¾®Ã®¾¦²ÊÂç³Ø »¥ËÚ¥µ¥Æ¥é¥¤¥ÈÂç¹ÖµÁ¼¼, »¥ËÚ)
- -Daisuke Kotani, Yasuo Okabe, A Packet-In Message Filter in OpenFlow Switches for Reducing Control Messages, AsiaFI 2013 Summer School, Aug. 2013.
- -À¶¿å¤µ¤ä»Ò, ¸ÍÅľ¡Á±, ²¬Éô¼÷ÃË,
- Åý¹çID´ÉÍý¤Ë¤ª¤±¤ë¥á¥ó¥Ð°À¤òÍѤ¤¤¿³ÈÄ¥²Äǽ¤Ê¥°¥ë¡¼¥×´ÉÍý,
- ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2013)¥·¥ó¥Ý¥¸¥¦¥à 8F-5,
- 2013ǯ7·î.
- -Ãæ¼ÁÇŵ, À¾Â¼·ò, »³ÃÏ°ìÄ÷, º´Æ£¼þ¹Ô, ²¬Éô¼÷ÃË, »³ºê¿òÀ¸, ºê¼²Æɧ,
- ¾ðÊóήÄÌÏ¢·È¤Î¤¿¤á¤Î¥ª¡¼¥×¥ó¤ÊIDÏ¢·È¥×¥é¥Ã¥È¥Õ¥©¡¼¥à¤Ë¤ª¤±¤ë¥×¥é¥¤¥Ð¥·¡¼Êݸǽ¤Î¹âÅÙ²½,
- ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2013)¥·¥ó¥Ý¥¸¥¦¥à 8F-4,
- 2013ǯ7·î.
- -²¬Éô¼÷ÃË, º´Æ£¼þ¹Ô, À¾Â¼·ò, »³ÃÏ°ìÄ÷, Ãæ¼ÁÇŵ,
- °ÀÄ󶡥µ¡¼¥Ð¤ËÂФ·¤Æ¥µ¡¼¥Ó¥¹Ä󶡥µ¡¼¥Ð¤òÈëÆ¿¤¹¤ëƿ̾²½¥×¥í¥¥·,
- ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2013)¥·¥ó¥Ý¥¸¥¦¥à 8F-2,
- 2013ǯ7·î.
- -Á°ÅÄ Êþ¹§, ²£È« À¿Ìé, ²¬Éô ¼÷ÃË,
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ëÅÅÎÏʬÇÛ¥¢¥ë¥´¥ê¥º¥à¤ÎÄó°Æ,
- ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2013)¥·¥ó¥Ý¥¸¥¦¥à 7F-4, 2013ǯ7·î.
- -²¬Éô¼÷ÃË¡Ê¥³¡¼¥Ç¥£¥Í¡¼¥¿¡Ë¡¦Ã«Ïƹ¯É§¡¦·ËÅIJÂÂå»Ò¡¦¹À¥¾÷¼£¡¦¿·ÀîãϺ¡¦µÈÅÄ·½¸ã¡Ê¥Ñ¥Í¥ê¥¹¥È¡Ë,
- »ö¶È¤ËÌòΩ¤ÄÃ諤òƳ½Ð¤¹¤ë¥Ó¥Ã¥°¥Ç¡¼¥¿¡¦¥ª¡¼¥×¥ó¥Ç¡¼¥¿¡Ê¥Ñ¥Í¥ë¥Ç¥£¥¹¥«¥Ã¥·¥ç¥ó¡Ë,
- Ê¿À®25ǯÅÙÂè1²ó¶áµ¦¾ðÊóÄÌ¿®¹ÖºÂ,
- 2013ǯ7·î.
- -Ãæ¼ÁÇŵ¡¢À¾Â¼·ò¡¢»³ÃÏ°ìÄ÷¡¢º´Æ£¼þ¹Ô¡¢²¬Éô¼÷ÃË¡¢Æî ¹ä»Ö¡¢»³ºê¿òÀ¸¡¢ºê¼²Æɧ,
- PEOFIAMP: ¾ðÊóήÄÌÏ¢·È¤Î¤¿¤á¤Î¥ª¡¼¥×¥ó¤ÊIDÏ¢·È¥×¥é¥Ã¥È¥Õ¥©¡¼¥à ¤Ë¤ª¤±¤ë¥×¥é¥¤¥Ð¥·¡¼Êݸǽ¤Î¹âÅÙ²½
- ÆüËܳؽѿ¶¶½²ñ»º³Ø¶¨Îϸ¦µæ°Ñ°÷²ñ¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñÂè33²ó¸¦µæ²ñ(ITRC meet33) ,
- 2013ǯ5·î.
- -Takao Inoshita, Robert W. Irving, Kazuo Iwama, Shuichi Miyazaki, Takashi Nagase, Improving Man-Optimal Stable Matchings by Minimum Change of Preference Lists, Proc. 6th Asian Association for Algorithms and Computation (AAAC), p.18, April 2013 (Matsushima, Japan).
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#va36d383]
- -µÜºê½¤°ì, °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê, ¾ðÊó½èÍý³Ø²ñ»ï, Vol.54, No.10, ÄÌ´¬583¹æ, pp. 1064-1071, 2013ǯ10·î¹æ.
- //**¹ñºÝɸ½à²½Äó°Æ
- *2012ǯÅÙ [#mced46ef]
- **ÏÀʸ»ïÏÀʸ [#ee674e14]
- -À¶¿å¤µ¤ä»Ò¡¦²¬Éô¼÷ÃË¡¦µÈÅļ¡Ïº,
- °ìÈÌ¥«¡¼¥É¤ò»È¤Ã¤¿°ì»þÍøÍѼԸþ¤±Ç§¾Ú¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ,
- ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï¥³¥ó¥·¥å¡¼¥Þ¡¦¥Ç¥Ð¥¤¥¹¡õ¥·¥¹¥Æ¥à¡ÊCDS¡Ë, Vol.3, No.1, pp.34-45:, Mar. 2013.
- -ÂçÊ¿·ò»Ê¡¦²¬Éô¼÷ÃË, Ê£¿ôPA¥¢¥É¥ì¥¹·¿IPv6¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¥µ¥¤¥È¤Ë¤ª¤±¤ëÁ÷¿®¸µ¥¢¥É¥ì¥¹°Í¸ưŪ·ÐÏ©À©¸æ, ¥·¥¹¥Æ¥àÀ©¸æ¾ðÊó³Ø²ñÏÀʸ»ï, Âè25´¬Âè9¹æ, pp. 230-238, Sep. 2012.
- -Å粬À¯´ð¡¦À¾Â¼·ò¡¦¸Å¼δÌÀ¡¦Ãæ¼ÁÇŵ¡¦º´Æ£¼þ¹Ô¡¦²¬Éô¼÷ÃË¡¦Á¾º¬¸¶ÅÐ,
- ³Ø½Ñµ¡´Ø¤Î¤¿¤á¤Î¥µ¡¼¥Ð¾ÚÌÀ½ñȯ¹Ô¥Õ¥ì¡¼¥à¥ï¡¼¥¯,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J95-B,No.07,pp.871-882, Jul. 2012.
- -Iwama, K., Miyazaki, S. and Yanagisawa, H., Improved Approximation Bounds for the Student-Project Allocation Problem with Preferences over Projects, Journal of Discrete Algorithms, Vol. 13, pp. 59-66, May 2012.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#rc1076a6]
- -Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe,
- An Extension of the Link Layer Discovery Protocol for On-Demand Power Supply Network by PoE,
- First International WorkShop on Energy-Aware Systems, Communications and Security (EASyCoSe 2013) (In conjunction with IEEE AINA-2013), pp.1612-1616, March 2013.
- -Toyokazu Akiyama, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura, Yasuo Okabe,
- Design and Implementation of a Functional Extension Framework for Authn ¡õ Authz Federation Infrastructure Using Web Browser Add-on,
- 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), pp.389-396, March 2013.
- - Daisuke Kotani, Yasuo Okabe,
- Packet-In Message Control for Reducing CPU Load and Control Traffic in OpenFlow Switches,
- European Workshop on Software Defined Networks, pp.42-47, October, 2012.
- -Wataru Oogami, Takaaki Komura, Yasuo Okabe,
- Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation,
- Proc. 2012 IEEE 36th International Conference on Computer Software and Applications Workshops (6th IEEE International Workshop on Middleware Architecture in the Internet
- (MidArch 2012)), pp.64-69, July 2012.
- -Takuya Miyamoto, Youichi Koyama, Kazumi Sakai, Yasuo Okabe,
- A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking,
- The 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2012), pp.138-147, July 2012.
- -Akihiro Takahashi, Tomotaka Maeda, Yasuo Okabe,
- Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol,
- The 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2012), pp.19-28, July 2012.
- -Ryosuke Matsumoto, Yasuo Okabe,
- Access Control Architecture Separating Privilege by a Thread on a Web Server,
- The 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2012), pp.178-183, July 2012.
- - Daisuke Kotani, Kazuya Suzuki, Hideyuki Shimonishi,
- A design and implementation of OpenFlow Controller handling IP multicast with Fast Tree Switching, The 12th IEEE/IPSJ International Symposium on Applications and the Internet(SAINT2012), pp.60-67, July 2012.
- **¸ýƬȯɽ¤Ê¤É [#z776008b]
- -²£È«À¿Ì顦²¬Éô¼÷ÃË¡¦Á°ÅÄÊþ¹§
- ÅÅÎϲ£¼è¤ê²Äǽ¤Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¤Î¤¿¤á¤ÎPower over Ethernet¤Î³ÈÄ¥,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2013ǯÁí¹çÂç²ñ BS-6-2, 2013ǯ3·î21Æü.
- -Á°ÅÄÊþ¹§¡¦¿¹Ëܾ°Ç·¡¦²¬Éô¼÷ÃË,
- ¥¨¥³½»Âð¤Ë¤ª¤±¤ë²ÈÅŵ¡´ï¤Î¾ÃÈñ¥¨¥Í¥ë¥®¡¼Â¬Äê´Ä¶¤Î¹½ÃÛ,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2013ǯÁí¹çÂç²ñ BS-6-4, 2013ǯ3·î21Æü.
- -°æ²¼µ®Íº¡¦Robert W. Irving¡¦µÜºê½¤°ì¡¦´ä´Ö°ìͺ¡¦±ÊÀ¥¹â»Ö, ´õ˾¥ê¥¹¥ÈÊѹ¹¤Ë¤è¤ëÃËÀºÇÎÉ°ÂÄê¥Þ¥Ã¥Á¥ó¥°¤Î²þÁ±, ÅŻҾðÊóÄÌ¿®³Ø²ñ2013ǯÁí¹çÂç²ñ DS-1-1, 2013ǯ3·î19Æü.
- -²¬Éô¼÷ÃË,
- ¥µ¡¼¥Ó¥¹ÄêµÁ¤È¹½À®¾ðÊó¥Ç¡¼¥¿¥Ù¡¼¥¹¤Ë´ð¤Å¤¯¥Í¥Ã¥È¥ï¡¼¥¯ÀßÄê¤Î¼«Æ°²½,
- ¾ðÊó½èÍý³Ø²ñÂè75²óÁ´¹ñÂç²ñ ¥¤¥Ù¥ó¥È´ë²è¡Ö¥Ó¥Ã¥°¥Ç¡¼¥¿¤ò»Ù¤¨¤ë¥¯¥é¥¦¥É´ðÈס×, 2013ǯ3·î8Æü.
- -Ãæ¼ÁÇŵ, ºê¼²Æɧ, À¾Â¼·ò, º´Æ£¼þ¹Ô, ²¬Éô¼÷ÃË,
- SAML¡¢OpenIDÏ¢·È¥×¥í¥¸¥§¥¯¥È,
- Japan Identity and Cloud Summit 2013, 2013ǯ3·î5Æü.
- -²¬Éô¼÷ÃË,
- ¥»¥¥å¥ê¥Æ¥£e-learning¥³¥ó¥Æ¥ó¥Ä¤È³Øǧ¤Ë¤Ä¤¤¤Æ,
- ³Ø½Ñ¾ðÊó´ðÈ×¥ª¡¼¥×¥ó¥Õ¥©¡¼¥é¥à¡ÖÂç³Ø¤Î¥¯¥é¥¦¥É³èÍѤˤª¤±¤ë¡¢¸¡¾Ú¤È²ÝÂê¤ÈÂкö¡×, 2013ǯ2·î8Æü.
- -¾åÅĹÀ¡¦Ãæ¼ÁÇŵ¡¦²¬Éô¼÷ÃË¡¦¸Å¼δÌÀ¡¦Á¾º¬½¨¾¼¡¦À¾Â¼·ò¡¦»³ÃÏ°ìÄ÷¡¦¥¡¼¥¹¥Ù¥¢¥ê¡¼
- ¡¦ËÒ¸¶¸ù¡¦µ×ÊƸ¶±É,
- ÎÑÎÑɱ¥×¥í¥¸¥§¥¯¥Èon³Øǧ¡§Â¿¸À¸ì¾ðÊóÎÑÍýe¥é¡¼¥Ë¥ó¥°¥³¥ó¥Æ¥ó¥Ä¤Î¶¦Í,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð¡¦¶µ°é³Ø½¬»Ù±ç¾ðÊó¥·¥¹¥Æ¥à¡ÊCLE¡Ë, Vol.2013-CLE-9, No.14, pp.1-6, 2013ǯ1·î25Æü.
- -À¶¿å ¤µ¤ä»Ò¡¤²¬Éô ¼÷ÃË¡¤µÈÅÄ ¼¡Ïº¡¤¸ÍÅÄ ¾¡Á±¡¤
- °ìÈÌ¥«¡¼¥É¤òÍѤ¤¤¿Ç§¾Ú¥·¥¹¥Æ¥à¤Ë¤ª¤±¤ë¥Ï¥Ã¥·¥å´Ø¿ô¤òÍѤ¤¤¿PIN¥³¡¼¥ÉÀ¸À®Êý¼°, Âè5²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à, 2012ǯ12·î.
- -²¬ËÜÂç¼ù¡¤²¬Éô¼÷ÃË¡¤
- P2P¥Õ¥¡¥¤¥ë¶¦Í¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿¥Õ¥é¥Ã¥·¥å¥¯¥é¥¦¥ÉÂÑÀ¤Î¤¢¤ë¶¨Ä´·¿Éé²Ùʬ»¶¼êË¡, Âè5²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à, 2012ǯ12·î.
- -²¬Éô¼÷ÃË¡¦¾åÅĹÀ¡¦¹âÁÒ¹°´î¡¦´Ý»³Ëþɧ¡¦º´Æ£·Ä¹À¡¦Ãæ¼ÁÇŵ,
- ¾ðÊ󥻥¥å¥ê¥Æ¥£·¼È¯¤È¥¤¥ó¥·¥Ç¥ó¥ÈÂбþ¡Ê¥Ñ¥Í¥ë¥Ç¥£¥¹¥«¥Ã¥·¥ç¥ó¡Ë,
- ³Ø½Ñ¾ðÊó´ðÈ×¥ª¡¼¥×¥ó¥Õ¥©¡¼¥é¥à in µþÅÔ¡ÖÂç³Ø¤Ë¤ª¤±¤ë¥½¡¼¥·¥ã¥ë¥á¥Ç¥£¥¢¤ÎÍø³èÍѤȾðÊ󥻥¥å¥ê¥Æ¥£¶µ°é¡¦¥ê¥¹¥¯´ÉÍý¡×,
- 2012ǯ11·î29Æü.
- -¹â¸«¹¥ÃË¡¤Ê¿Åĸ÷±Ñ¡¤ÉÙ±º²íͺ¡¤À¾Â¼Ãλҡ¤»ÍÊýÉÒÌÀ¡¤µÜºê½¤°ì¡¤¸Å¼δÌÀ¡¤²¬Éô¼÷ÃË¡¤
- µþÅÔÂç³Ø³Ø½Ñ¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥àÀܳµ¡´ï´ÉÍý¥·¥¹¥Æ¥à¡ÖKUINS-DB¡×¤Î¹¹¿·¡¤
- Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼ ¸¦µæ³«È¯ÏÀʸ½¸¡¤No.34
- pp.53-57, 2012ǯ11·î.
- -Takuya Miyamoto, Youichi Koyama, Kazumi Sakai, Yasuo Okabe,
- A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking,
- The 1st Kyoto University and Saudi Universities Research Collaboration Workshop, Kyoto University Clock Tower Centennial Hall, November 7-8, 2012.
- -²¬Éô¼÷ÃË,
- SINET¥¯¥é¥¦¥ÉÀܳ¥µ¡¼¥Ó¥¹¤È³Øǧ¤Î³èÍѤˤè¤ë¥â¥Ð¥¤¥ëWiMAXÌÖ¤«¤é³ØÆâLAN¤Ø¤Î¥»¥¥å¥¢¤Ç´ÊÊؤÊÀܳ,
- Ê¿À®24ǯÅÙTOPIC¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ, 2012ǯ9·î
- -²¬Éô¼÷ÃË,
- ³Øǧ¤Î¸½¾õ¤È¾ðÊ󥻥¥å¥ê¥Æ¥£ e-learningSP ¤Ë¤Ä¤¤¤Æ,
- Ê¿À®24ǯÅÙTOPIC¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ, 2012ǯ9·î
- -¾®Ã«ÂçÍ´¡¦²¬Éô¼÷ÃË,
- £Ï£ð£å£î£Æ£ì£ï£÷¥¹¥¤¥Ã¥Á¤ÎÉé²Ù¤ÈÀ©¸æ¥Í¥Ã¥È¥ï¡¼¥¯¤ÎÄÌ¿®¤òºï¸º¤¹¤ë¤¿¤á¤ÎPacket-In¥á¥Ã¥»¡¼¥¸¤ÎÀ©¸æ¼êË¡,
- ¿®³Øµ»Êó, vol. 112, no. 212, IA2012-17, pp. 31-36, 2012ǯ9·î.
- -¿·Î¶âÅĹî¸Ê¡¦²ÃÆ£²íɧ¡¦¿Ü²ìÍ´¼£¡¦²¬Éô¼÷ÃË,
- IaaS/HaaS¤Ø¤ÎService Defined Infrastructure(SvDI)ŬÍѤθ¡Æ¤,
- ¿®³Øµ»Êó, vol. 112, no. 212, IA2012-18, pp. 37-42, 2012ǯ9·î
- -²¬ËÜÂç¼ù¡¦²¬Éô¼÷ÃË,
- P2P¥Õ¥¡¥¤¥ë¶¦Í¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿¥Õ¥é¥Ã¥·¥å¥¯¥é¥¦¥ÉÂÑÀ¤Î¤¢¤ë¶¨Ä´·¿Éé²Ùʬ»¶¼êË¡,
- Ê¿À®24ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ
- D-03, 2012ǯ9·î
- -²£È«À¿Ì顦Á°ÅÄÊþ¹§¡¦²¬Éô¼÷ÃË,
- PoE¤Ë¤ª¤±¤ë¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¤Î¤¿¤á¤Î¥ê¥ó¥¯ÁØõº÷¥×¥í¥È¥³¥ë¤Î³ÈÄ¥,
- Ê¿À®24ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ
- E-18, 2012ǯ9·î
- -»ûËÜÂÙÂ硦²¬Éô¼÷ÃË¡¦¿·Îï,
- Service Defined Network (SvDN) ¤Ë¤è¤ëL2¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°ÀßÄê,
- Ê¿À®24ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ
- E-21, 2012ǯ9·î
- -²¬Éô¼÷ÃË,
- ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¥¹¥Þ¡¼¥È¤Ê¥¨¥Í¥ë¥®¡¼´ÉÍý¤Î¸¦µæÆ°¸þ,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2012ǯ¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ
- BP-4-3, 2012ǯ9·î.
- -²¬Éô¼÷ÃË,
- ¥â¥Ð¥¤¥ë¥Ç¥Ð¥¤¥¹¤Î¥»¥¥å¥ê¥Æ¥£,
- JCAN¥Õ¥§¥¢2012 September ¡Á¥â¥Ð¥¤¥ë¥Ç¥Ð¥¤¥¹¤È¥»¥¥å¥ê¥Æ¥£¡Á,
- 2012ǯ9·î.
- -Hiroki Okamoto, Yasuo Okabe, Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network, AsiaFI 2012 Summer School, Aug. 2012.
- -Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe, Link Layer Discovery Protocol Extension for on-Demand PoE Network, AsiaFI 2012 Summer School, Aug. 2012.
- -²¬Éô¼÷ÃË,
- ¼Ò²ñŪ£É£Ô¥ê¥¹¥¯·Ú¸º¤ò»º³Ø¤Ç¿Ê¤á¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£µ»½Ñ¼Ô¡¦¼Â̳¼Ô°éÀ®¥×¥í¥°¥é¥à(IT Keys)¤ÎÁÀ¤¤,
- ǧ¼±¤ÎÂçž´¹¤òÇ÷¤é¤ì¤ë´ë¶È¤Ë¤ª¤±¤ë¥»¥¥å¥ê¥Æ¥£ÂкöinµþÅÔ¡Ê¥¯¥í¡¼¥¸¥ó¥°´ðÄ´¹Ö±é¡Ë, 2012ǯ7·î.
- -À¶¿å¤µ¤ä»Ò¡¦²¬Éô¼÷ÃË¡¦µÈÅļ¡Ïº,
- °ìÈÌ¥«¡¼¥É¤ò»È¤Ã¤¿°ì»þÍøÍѼԸþ¤±Ç§¾Ú¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ,
- ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2012)¥·¥ó¥Ý¥¸¥¦¥à, pp.675-683, 2012ǯ7·î.
- -²¬Éô¼÷ÃË,
- WIMAXÌÖ¤ò³èÍѤ·¡¢¥»¥¥å¥¢¤Ë³ØÆâLAN¤ËÀܳ¤¹¤ë¼è¤êÁȤß,
- ¹ñΩ¾ðÊó³Ø¸¦µæ½ê Ê¿À®24ǯÅÙÂè1²ó³Ø½Ñ¾ðÊó´ðÈ×¥ª¡¼¥×¥ó¥Õ¥©¡¼¥é¥à¡ÖÂç³Ø¤Ë¤ª¤±¤ë¥â¥Ð¥¤¥ë¾ðÊóüËö¤Î³èÍѤȥ»¥¥å¥ê¥Æ¥£¡×, 2012ǯ7·î.
- -¾¾ËÜμ²ð¡¦²¬Éô¼÷ÃË,
- ÁȤ߹þ¤ß¥¹¥¯¥ê¥×¥È¸À¸ìmruby¤òÍøÍѤ·¤¿Web¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð Vol.2012-IOT-18, No.6, 2012ǯ6·î.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#p49c5453]
- -¾¾»³Î´»Ê¡¦²ÃÆ£¾æÏ¡¦ÄÍËܾ»É§¡¦Ã°¹¯Íº¡¦²¬Éô¼÷ÃË,
- ¥³¥ó¥·¥å¡¼¥Þ¤¬ÀÚ¤êÂ󤯥ǥ£¥¸¥¿¥ë²½¼Ò²ñ¤Î¿·¤·¤¤Ä¬Î®¡§2.
- ¥°¥ê¡¼¥óICT¤Ë¤è¤ë¥¹¥Þ¡¼¥È¤Ê¼Ò²ñ¤ÎÁϽÐ
- ¾ðÊó½èÍý, 53(10), pp.1021-1027, 2012ǯ9·î
- **¹ñºÝɸ½à²½Äó°Æ [#na4a009f]
- -Y. Teramoto, R. Atarashi, Y. Atarashi, Y. Okabe,
- Experience of Designing Network Management System,
- IETF Internet-Draft, Feb. 2013.
- *2011ǯÅÙ [#p931b5de]
- **ÏÀʸ»ïÏÀʸ [#d5a96d25]
- -Å粬À¯´ð¡¦ÊÒ²¬½Ó¹¬¡¦Ã«ËÜÌÐÌÀ¡¦À¾Â¼·ò¡¦»³ÃÏ°ìÄ÷¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,
- Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±Ç§¾Ú´ðÈ×UPKI¤Î¥¢¡¼¥¥Æ¥¯¥Á¥ãÀ߷ס¡¡Ê¾·ÂÔÏÀʸ¡Ë,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J94-B, No.10, pp.1246-1260, Oct. 2011.
- -ëËÜÌÐÌÀ¡¦Å粬À¯´ð¡¦ÊÒ²¬½Ó¹¬¡¦À¾Â¼·ò¡¦»³ÃÏ°ìÄ÷¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,
- Âç³Ø´Öǧ¾ÚÏ¢·È¤Î¤¿¤á¤Î¥¥ã¥ó¥Ñ¥¹PKI¶¦ÄÌ»ÅÍ͡ʸ¦µæ®Êó¡Ë,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ, Vol.J94-B, No.10, pp.1383-1388, Oct. 2011.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#ta9564c2]
- -Akihiro Takahashi, Yasuo Okabe,
- Providing Ubiquitous Networks Securely Using Host Identity Protocol,
- Asia Workshop on Future Internet Technologies (AWFIT2011)
- (In Conjunction with AINTEC 2011, Bangkok, Thailand),
- Nov. 2011.
- -Hamada, K., Iwama, K. and Miyazaki, S.,
- The Hospitals/Residents Problem with Quota Lower Bounds,
- Proceedings of the 19th Annual European Symposium on Algorithms (ESA 2011)
- (Lecture Notes in Computer Science 6942)
- pp. 180-191, Sep., 2011. (Saarbrucken, Germany)
- -Moriteru Ishida, Hiroki Takakura, and Yasuo Okabe, High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling, The 11th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2011), pp. 11-19, July 2011. (Munich, Germany)
- -Satoshi Ishibashi, Shuichi Miyazaki, and Yasuo Okabe, Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate Authority, The 11th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2011), pp. 20-26, July 2011. (Munich, Germany)
- -Tomoki Shibata, Kazumi Sakai, and Yasuo Okabe, The Design and Implementation of an On-demand DC Grid in Home, The 11th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2011), pp. 152-159, July 2011. (Munich, Germany)
- -Iwama, K., Miyazaki, S. and Yanagisawa, H.,
- Improved Approximation Bounds for the Student-Project Allocation Problem with Preferences over Projects, Proceedings of the 8th Annual Conference on Theory and Applications of Models of Computation (TAMC 2011),
- Lecture Notes in Computer Science 6648, pp. 440-451, May 2011. (Tokyo, Japan)
- -Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao,
- Statistical Analysis of Honeypot Data and Building of Kyoto2006+ Dataset for NIDS Evaluation,
- BADGERS 2011, April 2011.
- **¸ýƬȯɽ¤Ê¤É [#i59a0e0c]
- -²£È«À¿Ì顦²¬Éô¼÷ÃË, ¥ª¥ó¥Ç¥Þ¥ó¥É·¿PoEÅÅÎ϶¡µë¥Í¥Ã¥È¥ï¡¼¥¯¤Î¤¿¤á¤Î¥ê¥ó¥¯ÁØõº÷¥×¥í¥È¥³¥ë¤Ë¤è¤ëÅÅÎÏÍ×µá, ÅŻҾðÊóÄÌ¿®³Ø²ñ2012ǯÁí¹çÂç²ñ BS-7-1, 2012ǯ3·î.
- -²¬Éô¼÷ÃË,
- Âç³Ø¤Ë¤è¤ë¥Õ¥ê¡¼¥á¡¼¥ë¥µ¡¼¥Ó¥¹ÍøÍÑ»þ¤Î¸¡Æ¤»ö¹à,
- ¹ñΩ¾ðÊó³Ø¸¦µæ½êÊ¿À®23ǯÅÙÂè3²ó³Ø½Ñ¾ðÊó´ðÈ×¥ª¡¼¥×¥ó¥Õ¥©¡¼¥é¥à¡ÖÂç³Ø¤Î¥¯¥é¥¦¥ÉÍøÍѤˤª¤±¤ë¥»¥¥å¥ê¥Æ¥£¤Î²¡¤µ¤¨¤É¤³¤í¡×, 2012ǯ3·î.
- -¿·Á±Ê¸¡¦¿·¡¡Î²¬Éô¼÷ÃË,
- Service Defined Infrastructure (SvDI)¤Î¼ÂÁõÊýË¡¤È±þÍѤθ¡Æ¤,
- ¿®³Øµ»Êó, vol. 111, no. 485, IA2011-95, pp. 167-172, 2012ǯ3·î.
- -¾¾ËÜμ²ð¡¦²¬Éô¼÷ÃË, ¥¹¥ì¥Ã¥Éñ°Ì¤Ç¸¢¸ÂʬΥ¤ò¹Ô¤¦Web¥µ¡¼¥Ð¤Î¥¢¥¯¥»¥¹À©¸æ¥¢¡¼¥¥Æ¥¯¥Á¥ã, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð - ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¡ÊIOT¡Ë, Vol.2012-IOT-16 No.13, pp. 1-6, 2012ǯ3·î.
- -»ûËÜÂÙÂ硦²¬Éô¼÷ÃË¡¦¿·¡¡Îï,
- ¥È¥Ý¥í¥¸¡¼¥Ç¡¼¥¿¥Ù¡¼¥¹¤òÍøÍѤ·¤¿¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°ÀßÄêÊѹ¹,
- ¿®³Øµ»Êó, vol. 111, no. 375, IA2011-58, pp. 21-26, 2012ǯ1·î.
- -À¾Â¼¡¡·ò¡¦Ãæ¼ÁÇŵ¡¦»³ÃÏ°ìÄ÷¡¦Âçë¡¡À¿¡¦²¬Éô¼÷ÃË¡¦Á¾º¬¸¶¡¡ÅÐ,
- ÆüËܤˤª¤±¤ë³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¤È¤½¤ÎÌò³ä¤ª¤è¤Ó¸ú²Ì,
- ¿®³Øµ»Êó, vol. 111, no. 375, IA2011-55, pp. 5-8, 2012ǯ1·î.
- -º£À¥¡¡¿¿¡¦ÀÄÌڹ̰ìϺ¡¦ÂÀÅÄÀ¶´î¡¦óîƣ͵¹°¡¦ÊÂÀî´à¡Ê¥³¥á¥ó¥Æ¡¼¥¿¡¼¡Ë¡¤²¬Éô¼÷ÃË¡Ê¥³¡¼¥Ç¥£¥Í¡¼¥¿¡¼¡Ë,
- ¶áµ¦¾ðÊóÄÌ¿®¹ÖºÂ¡Ö¥æ¥Ó¥¥¿¥¹¥Í¥Ã¥È¼Ò²ñ¤Î¡Ø¤¤¤Þ¡Ù¤È¡Ø¤³¤ì¤«¤é¡Ù¤ò¹Í¤¨¤ë¡× ¹ÖºÂ¡Ê2¡Ë¥¢¥ó¥±¡¼¥ÈÄ´ºº·ë²Ì¤«¤é¸«¤¨¤Æ¤¯¤ë¤³¤È,
- 2012ǯ1·î.
- -À¾Â¼ ·ò, Ãæ¼ ÁÇŵ, »³ÃÏ °ìÄ÷, Âçë À¿, ²¬Éô ¼÷ÃË, Á¾º¬¸¶ ÅÐ,
- ÆüËܤˤª¤±¤ë³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¡È³Øǧ¡É¤ÎŸ³«,
- Âç³ØICT¿ä¿Ê¶¨µÄ²ñ2011ǯÅÙǯ¼¡Âç²ñ, 2011ǯ12·î.
- -¾åÅÄ ¹À, ¾å¸¶ ůÂÀϺ, ¿¢ÌÚ Å°, ³°Â¼ ¹§°ìϺ, Àаæ ÎÉÏÂ, ¿¹ ¿®²ð, ¸Å¼ δÌÀ, ¿ËÌÚ ¹ä, ²¬Éô ¼÷ÃË,
- µþÅÔÂç³Ø¤Ë¤ª¤±¤ë¥¯¥é¥¦¥É¥á¡¼¥ë¥µ¡¼¥Ó¥¹¤Î±¿ÍÑ,
- Âç³ØICT¿ä¿Ê¶¨µÄ²ñ2011ǯÅÙǯ¼¡Âç²ñ, 2011ǯ12·î.
- -Yasuo Okabe, The University PKI Architecture in Japan and the LoA,
- Tao of Attributes Workshop, Kyoto, Dec. 2011.
- -Yasuo Okabe, How Trust Framework Works for Cyberspace Issues (Moderator of Panel Discussion),
- OpenID Summit Tokyo 2011, Dec. 2011.
- -²¬Éô¼÷ÃË,
- ¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑʬÌî¤Î¼¡À¤Âå°éÀ®¡Î¥Ñ¥Í¥ëƤÏÀ¡Ï,
- ¿®³Øµ»Êó, vol. 111, no. 321, IA2011-40, pp. 31-32, 2011ǯ11·î.
- -Âç¿À¾Ä¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË,
- ¥×¥é¥¤¥Ð¥·¾ðÊóµÕή½Ð¤ËÂФ¹¤ëSAML/Shibboleth¤Î²¾Ì¾À¶¯²½¼êË¡,
- ¿®³Øµ»Êó, vol. 111, no. 321, IA2011-35, pp. 7-12, 2011ǯ11·î.
- -¹â¶¶¶Ç¹°¡¦Á°ÅÄÊþ¹§¡¦²¬Éô¼÷ÃË,
- Host Identity Protocol¤òÍѤ¤¤¿¡¤¥æ¥Ó¥¥¿¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Î¥»¥¥å¥¢¤ÊÄó¶¡ÊýË¡,
- ¿®³Øµ»Êó, vol. 111, no. 321, IA2011-36, pp. 13-18, 2011ǯ11·î.
- -²¬Éô¼÷ÃË,
- Âç³Ø¤Ë¤ª¤±¤ë¥»¥¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¤Î¥¯¥é¥¦¥ÉÂбþ¤Ë¤Ä¤¤¤Æ,
- 2011ǯÅÙ¡Ö¥¯¥é¥¦¥É¥µ¡¼¥Ó¥¹¤Î¤¿¤á¤ÎSINETµÚ¤Ó³ØǧÀâÌÀ²ñ¡×¡ÊÊ¡²¬²ñ¾ì¡Ë,
- 2011ǯ11·î.
- -ÅÏÊÕ·ò¼¡,²¬Éô¼÷ÃË,
- ³Øǧ¤Î¸½¾õ¤Èº£¸å¤ÎŸ˾,
- 2011ǯÅÙ¡Ö¥¯¥é¥¦¥É¥µ¡¼¥Ó¥¹¤Î¤¿¤á¤ÎSINETµÚ¤Ó³ØǧÀâÌÀ²ñ¡×¡ÊÊ¡²¬²ñ¾ì¡Ë,
- 2011ǯ11·î.
- -²¬Éô ¼÷ÃË,
- NICT°ÑÂ÷¸¦µæ¡Ö¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¡×¸¦µæ¾õ¶·¤ÎÊó¹ð,
- ¥»¥ó¥µ¡¼¥Í¥Ã¥È¥ï¡¼¥¯¸¦µæ²ñ¡ÊU2A Project¡Ë Âè42²óÄêÎ㸦µæ²ñ, 2011ǯ11·î.
- -Takuya MIYAMOTO, Kazumi SAKAI, Youichi KOYAMA, and Yasuo OKABE, A GMPLS-based Power Route Reservation System toward Energy-on-Demand Home Networking, IA2011 - Workshop on Internet Architecture 2011 at Dalian, China, Oct. 2011.
- -Shoji KAJITA, Yoshihiro OHTA, Kenji OHIRA, Hisnori TAJIMA, Satoshi ISHIGURO, Jun TOBITA, Hiroki TAKAKURA, and Yoshito ITOH, Current Status of Nagoya University Survivor Confirmation System and Lessons Learned from Great East Japan Earthquake, IA2011 - Workshop on Internet Architecture 2011 at Dalian, China, IEICE Technical Report, Vol. 111, No. 247, pp. 45-50, October 2011.
- -¹â¶¶¶Ç¹°¡¦Á°ÅÄÊþ¹§¡¦²¬Éô¼÷ÃË¡¤Host Identity Protocol¤òÍѤ¤¤¿¥æ¥Ó¥¥¿¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Î¥»¥¥å¥¢¤ÊÄó¶¡ÊýË¡, Ê¿À®23ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ, F-29, 2011ǯ9·î.
- -Âç¿À¾Ä¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË¡¤¥×¥é¥¤¥Ð¥·¾ðÊó¤ÎµÕή½Ð¤ËÂФ¹¤ëSAML/Shibboleth¤Î²¾Ì¾À¶¯²½¼êË¡, Ê¿À®23ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ, F-30, 2011ǯ9·î.
- -ÇöÅľ»¹¡¦¾å¸¶Å¯ÂÀϺ¡¤P2P¥Í¥Ã¥È¥ï¡¼¥¯¤Î¶¦Í¥Õ¥¡¥¤¥ë¸¡º÷¤Ë¤Ä¤¤¤Æ¤Î°ìÄó°Æ, Ê¿À®23ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ, F-28, 2011ǯ9·î.
- -¿¹Ëܾ°Ç·¡¦µÜºê½¤°ì¡¦²¬Éô¼÷ÃË, ʬ»¶·¿ÅŸ»¤ò»ý¤ÄÅÅÎϥͥåȥ¥¯¤Ë¤ª¤±¤ë»ñ¸»ÇÛʬÌäÂê, Ê¿À®23ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ, F-14, 2011ǯ9·î.
- -µÜËÜÂöÌ顦¾®»³Íΰ졦²¬Éô¼÷ÃË, ²ÈÄíÆ⥪¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤Ë¤ª¤±¤ëÅÅÎÏ·ÐÏ©»ñ¸»Í½Ìó¥×¥í¥È¥³¥ë, Ê¿À®23ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ, F-103, 2011ǯ9·î.
- -Takuya Miyamoto, Youichi Koyama, Yasuo Okabe, A Power Route Reservation System toward Energy-on-Demand Home Networking, AsiaFI 2011 Summer School, Aug. 2011.
- -Akihiro Takahashi, Yasuo Okabe,
- Providing Ubiquitous Networks Securely using Host Identity Protocol (HIP),
- AsiaFI, 2011 Summer School, August 2011.
- -Wataru Oogami, Takaaki Komura, Yasuo Okabe,
- Toward Robust Pseudonymity in Shibboleth/SAML Federation against Backflow of Personal Information,
- AsiaFI, 2011 Summer School, August 2011.
- -Chia-Lung Hsieh, Toward Better Recommender System by Collaborative Computation with Privacy Preserved, The 11th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2011), pp. 246-249, July 2011. (Munich, Germany)
- -Takao Inoshita, Robert W. Irving, Kazuo Iwama, Shuichi Miyazaki, and Takashi Nagase,
- Improving Man-Optimal Stable Matchings by Minimum Change of Preference Lists,
- Proceedings of the 7th Hungarian-Japanese Symposium on Discrete Mathematics and Its Applications (HJ 2011),
- pp. 309-313, May-June, 2011. (Kyoto, Japan)
- -²¬Éô¼÷ÃË,¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½ - ¾ðÊóÄÌ¿®¤È¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ -,
- SCI'11 Âè55²ó¥·¥¹¥Æ¥àÀ©¸æ¾ðÊó³Ø²ñ¸¦µæȯɽ¹Ö±é²ñ¡Ê¾·ÂÔ¹Ö±é¡Ë, 2011ǯ5·î.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#lcc7a5db]
- -°ñÌÚ½Ó½¨¡¦ÊÒ»³Å°¡¦Æ£½Å¸ç ´Æ½¤, ÂÀÅIJ÷¿Í¡¦¼ò°æ±Ñ¾¼¡¦¹â¶¶Ë¡¦ÅÄÃæÍø¹¬¡¦±Ê»ý¿Î¡¦Ê¡Åç²íÉ× ÊÔ½¸, ¿ôÍý¹©³Ø»öŵ(µÜºê: 4.3 ʬ³äÅý¼£Ë¡, 4.4 ÍðÂò¥¢¥ë¥´¥ê¥º¥à¤òôÅö), Ä«ÁÒ½ñŹ, 2011ǯ11·î15Æü´©¹Ô.
- -²¬Éô¼÷ÃË,
- ¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯, ¥·¥¹¥Æ¥à/À©¸æ/¾ðÊó Vol.55, No.6,¡Ö¥¨¥Í¥ë¥®¡¼¥·¥¹¥Æ¥à¤Î¿·Å¸³«¡ÝICT¤Ë¤è¤ë¾ÃÈñ¾ðÊó¤Î¼ý½¸¤ÈÍøÍÑ¡×Æý¸¹æ pp.221-226¡¤2011ǯ6·î
- **¤½¤Î¾ [#s719ad6c]
- -ÇòĻ§Ϻ¡¡´Æ½¤,
- ¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯
- ¡Ê²¬Éô¼÷ÃË¡§£µ¾Ï¡¤£¶¾Ï¡¤£±£²¾ÏôÅö¡Ë
- ¶¦Î©½ÐÈÇ
- ¡Ê̤Íè¤Ø¤Ä¤Ê¤° ¥Ç¥¸¥¿¥ë¥·¥ê¡¼¥º¡¡3¡Ë,
- ISBN978-4-320-12303-8,
- 2011ǯ11·î.
- *2010ǯÅÙ [#wdaf5bd7]
- **ÏÀʸ»ïÏÀʸ [#rc0c553a]
- -Iwama, K., Miyazaki, S. and Yanagisawa, H.,
- Approximation Algorithms for the Sex-Equal Stable Marriage Problem,
- ACM Transactions on Algorithms,
- Vol. 7, Issue 1, Article No. 2, November 2010.
- -Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao,
- A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data,
- IEICE Transactions on Information and Systems, Vol.E93-D,No.9,pp.2544-2554,Sep. 2010.
- -ÎëÌÚÏÂÌ顦ÇϾì½ÓÊ塦ÏÂÅıÑɧ¡¦ÃæÈø¹¯Æ󡦹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
- ¾õ¶·ÇÄ°®¤Î¤¿¤á¤Î¥È¥é¥Ò¥Ã¥¯¿¶¤ëÉñ¤¤Ê¬Îॷ¥¹¥Æ¥à¤Î¹½ÃÛ¤Èɾ²Á,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, VolJ93-B, No.7¡Ê¥·¥¹¥Æ¥à³«È¯¡¦¥½¥Õ¥È¥¦¥§¥¢³«È¯ÏÀʸÆý¸¹æ¡Ë,pp.916-927, 2010ǯ7·î.
- -ÂçÊ¿·ò»Ê¡¤Á×Ãæ¼â¡¤¹âÁÒ¹°´î¡¤²¬Éô¼÷ÃË,ÍÍ¡¹¤Ê¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Ø¤Î¹¶·â³èÆ°¤ò»¡ÃΤ¹¤ëÈÆÍÑÀ¤Î¹â¤¤¥Ï¥Ë¡¼¥Ý¥Ã¥È¥·¥¹¥Æ¥à¤Î¹½Ãۤȱ¿ÍÑ,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J93-D, No.7¡Ê¥·¥¹¥Æ¥à³«È¯ÏÀʸÆý¸¹æ¡Ë, pp.1125-1134, 2010ǯ7·î.
- -ÂçÊ¿·ò»Ê¡¤¶ù²¬Æػˡ¤Ë̲¬Í´î¡¤¸Å¼δÌÀ¡¤Æ£À£¡¤²¬Éô¼÷ÃË,¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÀܳ¥µ¡¼¥Ó¥¹¡Ö¤ß¤¢¤³¥Í¥Ã¥È¡×¤ÎÀ߷פȱ¿ÍÑ,ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J93-B, No.5, pp.759-768, 2010ǯ5·î.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#ke4cddc5]
- -Kenji Ohira, Yasuo Okabe,
- Host-Centric Site-Exit Router Selection in IPv6 Site Multihoming Environment,
- 1st International Workshop on Protocols and Applications with Multi-Homing Support (PAMS 2011),
- //(In conjunction with the 25th International Conference on Advanced Information Networking and Applications (AINA))
- Singapore, pp. 696-703,
- March 22-25, 2011.
- -Shin Maruyama, Masahiro Kozuka, Yasuo Okabe, Motonori Nakamura,
- Policy-based IP Address Selection in SCTP Automatic Address Reconfiguration,
- 1st International Workshop on Protocols and Applications with Multi-Homing Support (PAMS 2011),
- //(In conjunction with the 25th International Conference on Advanced Information Networking and Applications (AINA)),
- Singapore, pp. 704-707,
- March 22-25, 2011.
- -Kazumi Sakai, Yasuo Okabe,
- Quality-aware Energy Routing toward On-demand Home Energy Networking,
- Proc. IEEE Consumer Communications and Networking Conference (CCNC) 2011
- (Special Session on Ecological Home Network), pp.822-825,
- Jan. 2011.
- -Miyazaki, S. and Okamoto, K.,
- Improving the Competitive Ratios of the Seat Reservation Problem,
- Proceedings of the 6th IFIP TC1/WG2.2, International Conference (IFIP/TCS 2010),
- pp. 328-339, Sep., 2010. (Brisbane, Australia)
- -Iwama, K., Miyazaki, S. and Yanagisawa, H.,
- A 25/17-Approximation Algorithm for the Stable Marriage Problem with One-Sided Ties,
- Proceedings of the 18th Annual European Symposium on Algorithms (ESA 2010),
- (Lecture Notes in Computer Science 6347)
- pp. 135-146, Sep., 2010. (Liverpool, UK)
- **¸ýƬȯɽ¤Ê¤É [#w57fddd7]
- -¼ÆÅÄÃε±¡¦ºä°æ°ìÈþ¡¦²¬Éô¼÷ÃË,¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâľήÁ÷ÅÅÌÖ¤ÎÀ߷פȼÂÁõ,ÅŻҾðÊóÄÌ¿®³Ø²ñ2011ǯÁí¹çÂç²ñ BS-10-5, 2011ǯ3·î.
- -²¬Éô¼÷ÃË, µþÅÔÎϷ뽸¥¨¥³½»Âð¤Ë¤ª¤±¤ë²óÀþ¸ò´¹·¿¥ª¥ó¥Ç¥Þ¥ó¥ÉľήÇÛÅŤμÂÁõ, ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½WG Ê¿À®22ǯÅÙÂè2²óWG²ñ¹ç, 2011ǯ1·î.
- -Tomoaki Shibata, Kazumi Sakai, Yasuo Okabe,
- Power Routing Switches toward Energy-on-Demand Home Networking,
- IEEE Consumer Communications and Networking Conference (CCNC) 2011 Demonstration,
- Jan. 2011.
- -²¬Éô¼÷ÃË,
- ¿®Íê¤Î¤ª¤±¤ë¥¢¥¤¥Ç¥ó¥Æ¥£¥Æ¥£Ï¢·È¤Î³ÎΩ¤Ë¸þ¤±¤Æ¡§³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¡Ö³Øǧ¡×,
- Security Day 2010,2010ǯ12·î.
- -²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤
- ºÂÀÊͽÌóÌäÂê¤Ë¤ª¤±¤ë¶¥¹çÈæ¤Î¾å²¼¸Â¤Î²þÎÉ,
- ¿®³Øµ»Êó¡¤Vol.110, No.325, COMP2010-45 (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ) pp.45-51, Dec., 2010. (¶å½£¹©¶ÈÂç³Ø Kyutech¥×¥é¥¶¡¤Ê¡²¬»Ô)
- -µÜºê½¤°ì,
- µþÅÔÂç³Ø¤Ë¤ª¤±¤ë±ó³ÖÃÏÀܳ¤Ë¤Ä¤¤¤Æ,
- 2010ǯÅÙ¡ÖSINET¡õ³ØǧÀâÌÀ²ñ¡×¡ÊµþÅÔ¡Ë,2010ǯ12·î
- -²¬Éô¼÷ÃË¡¦¸Å¼δÌÀ,
- ¾¦ÍѸø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹¤Î¥¥ã¥ó¥Ñ¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Ø¤ÎŸ³«,
- ÆüËܳؽѿ¶¶½²ñ»º³Ø¶¨Îϸ¦µæ°Ñ°÷²ñ¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¡¡Âè28²ó¸¦µæ²ñ, 2010ǯ11·î.
- -ÀÐÅÄÊݵ±¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
- ¹âÀºÅ٤ʥͥåȥ¥¯¿¯Æþ¸¡ÃÎ¥·¥¹¥Æ¥à¤Î¹½ÃÛ,
- ¿®³Øµ»Êó, vol. 110, no. 304, IA2010-56, pp. 31-36, 2010ǯ11·î.
- -¼ÆÅÄÃε±¡¦ºä°æ°ìÈþ¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË,
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÎÀ߷פȼÂÁõ,
- ¿®³Øµ»Êó, vol. 110, no. 304, IA2010-55, pp. 25-30, 2010ǯ11·î.
- -Àж¶ÁµÜºê½¤°ì¡¦²¬Éô¼÷ÃË,
- Âè»°¼Ôµ¡´Ø¤ÎÃç²ð¤òɬÍפȤ·¤Ê¤¤ÇÛã¾ÚÌÀÉÕ¤ÅŻҥ᡼¥ë¥·¥¹¥Æ¥à¤ÎÀß·×,
- ¿®³Øµ»Êó, vol. 110, no. 304, IA2010-54, pp. 19-24, 2010ǯ11·î.
- -»ÍÊýÉÒÌÀ¡¦¶áÆ£¹ÀÇ·¡¦²¬Éô¼÷ÃË,
- ±ÒÀ±¥Ö¥í¡¼¥É¥Ð¥ó¥É¥·¥¹¥Æ¥à¤òÍøÍѤ·¤¿±ó³ÖÃÏÀܳ¼Â¾Ú¼Â¸³,
- Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼¸¦µæ³«È¯ÏÀʸ½¸, Vol.32, pp.49-54, 2010ǯ11·î.
- -Kei Fujimoto¡¦Kazumi Sakai¡¦Yasuo Okabe,
- GMPLS-based Electricity Routing for Energy on Demand Service in Home Networks,
- ¿®³Øµ»Êó, vol. 110, no. 260, IA2010-41, pp. 11-16, 2010ǯ10·î.
- -ÃöËóÆØÉס¤¾¾±ºÃλˡ¤ÌçÎÓͺ´ð¡¤Æ£ÀîÏÂÍø¡¤²ÎÂåÏÂÀµ¡¤»³¸ý±Ñ¡¤º½¸¶½¨¼ù¡¤ÅìÌîµ±Éס¤ÃæÌîÇîδ¡¤²¬Â¼¿¿¸ã¡¤ÉÍÊÕ¿ò¡¤²¬Éô¼÷ÃË¡¤¾å¸¶Å¯ÂÀϺ¡¤ÂçÊ¿·ò»Ê¡¤¼ÄÅÄÍ۰졤µÜÃϽ¼»Ò¡¤ÌÌÏÂÀ®,
- IT Keys: IT ¥ê¥¹¥¯·Ú¸º¤Î¤¿¤á¤Î¾ðÊ󥻥¥å¥ê¥Æ¥£µ»½Ñ¼Ô¡¦´ÉÍý¼Ô°éÀ®,
- ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2010, 2010ǯ10·î.
- -Ãæ¼ÁÇŵ, »³°æÀ®ÎÉ, Æ£ÀîÏÂÍø, ÂçºêÇîÇ·, µÈÅÄ·ò°ì, ²¬Éô¼÷ÃË, º½¸¶½¨¼ù, »³ºê¹îÇ·,
- ¹ñºÝ²ñµÄSAINT¤Î³«ºÅÊó¹ð,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð -¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¡ÊIOT¡Ë,¡¡Vol.2010-IOT-11 No.6, 2010ǯ10·î.
- -²¬Éô¼÷ÃË,
- ¿·»þÂå¤ÎÈÆÍÑ¥³¥ó¥Ô¥å¡¼¥¿¥µ¡¼¥Ó¥¹ ¡Á¾ÊÅÅÎϤ˸þ¤±¤Æ¤ÎÁ´³ØŪ¤Ê¥µ¡¼¥ÐÅý¹ç¡Á,
- Ê¿À®22ǯÅÙTOPIC ¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ,
- 2010ǯ9·î.
- -²¬Éô¼÷ÃË,
- NICT¡Ö¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¡×¤ÎÀ®²Ì³µÍ×,
- ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½£×£ÇÁÏÀߣ±¼þǯµÇ°¥·¥ó¥Ý¥¸¥¦¥à,
- 2010ǯ9·î.
- -Yasuo Okabe,
- Cross-layer Support for Multihoming toward Truly Resilient Future Internet,
- 2010 Northeastern Asian Symposium on ICT: Next Generation Network and Network Security (Xi'an,China), Sept. 2010.
- -Naoyuki Morimoto,
- Resource Allocation Problems on Future Power Networks,
- The 15th Core University Program Seminar on Next Generation Internet Technologies,
- Buyeo Lotte Resort, Korea, Sept. 2010.
- -Naoyuki Morimoto, Resource Allocation Problems on Bipartite Graphs with Assignment Restrictions,
- AsiaFI Summer School 2010, Aug. 2010.
- -Tomotaka Maeda, Reliable Streaming Transmission Translator System Using PR-SCTP,
- AsiaFI Summer School 2010, Aug. 2010.
- -Yasuo Okabe,
- IT Keys University Collaboration on Education,
- IT3 Workshop 2010, Aug. 2010.
- -Tomoki Shibata, Kazumi Sakai, Yasuo Okabe,
- ICE-IT ¡½ Integration Technology of Information Communication and Energy,
- SAINT2010 Exhibition, Jul. 2010.
- -¼ÆÅÄÃε±¡¦Æ£ËÜ·½¡¦ºä°æ°ìÈþ¡¦¾®»³Íΰ졦²¬Éô¼÷ÃË,
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤ÎÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á.
- DICOMO2010¡¤2010ǯ7·î
- -Ìøß·¹°´ø¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
- ÊÒÊý¤Î¤ß¤¬¥¿¥¤¤ò»ý¤Ä°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë25/17-¶á»÷¥¢¥ë¥´¥ê¥º¥à,
- µþÅÔÂç³Ø¿ôÍý²òÀϸ¦µæ½ê¹ÖµæÏ¿1691 ¡Ö¥¢¥ë¥´¥ê¥º¥à¤È·×»»µ¡²Ê³Ø¤Î¿ôÍýŪ´ðÈפȤ½¤Î±þÍÑ¡×(ÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à)
- pp. 136-141, 2010ǯ6·î (ȯɽ¤Ï2010ǯ2·î). (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
- -²¬Éô¼÷ÃË,
- ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽤ˤĤ¤¤Æ,
- IT¥³¥ó¥½¡¼¥·¥¢¥àµþÅÔÂ裵²óÁí²ñ¡¦¹Ö±é²ñ,
- 2010ǯ6·î.
- -¼ÆÅÄÃε±¡¦²¬Éô¼÷ÃË,
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤ÎÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á.
- Âè27²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ¡Ê£É£Ô£Ò£Ã¡Ë¸¦µæ²ñ¥Ç¥âŸ¼¨¡¤2010ǯ5·î.
- -»³ÃÏ°ìÄ÷¡¤Ãæ¼ÁÇŵ¡¤ÊÒ²¬½Ó¹¬¡¤À¾Â¼·ò¡¤Tananun Orawiwattanakul¡¤Á¾º¬¸¶ÅС¤²¬Éô¼÷ÃË,
- ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥óGakunin¤ÎËܳʱ¿ÍÑ,
- Âè27²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ¡Ê£É£Ô£Ò£Ã¡Ë¸¦µæ²ñCISʬ²Ê²ñ¡¤2010ǯ5·î.
- -Ãæ¼ÁÇŵ¡¤»³ÃÏ°ìÄ÷¡¤ÊÒ²¬½Ó¹¬¡¤À¾Â¼·ò, ¾±»ÊͦÌÚ¡¤¸Å¼δÌÀ, ²¬Éô¼÷ÃË,
- ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¤ò³èÍѤ¹¤ë¥µ¡¼¥Ó¥¹¤ÎŸ³«,
- Âè27²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ¡Ê£É£Ô£Ò£Ã¡Ë¸¦µæ²ñCISʬ²Ê²ñ¡¤2010ǯ5·î.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#g8db0f33]
- -Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon,
- Correlation Analysis Between Honeypot Data and IDS Alerts Using One-class SVM,
- Intrusion Detection Systems (Edited by: Pawel Skrobanek), pp.173-192, InTech,
- ISBN 978-953-307-167-1 (Mar. 2011).
- -²¬Éô¼÷ÃË,
- ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½ ¡½IT¤Ë¤è¤ëÅÅÎϥޥͥ¸¥á¥ó¥È¡½¡§ 4. ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤ÎQoEn¡Ê¥¨¥Í¥ë¥®¡¼ÉʼÁ¡Ë¤ò¹Íθ¤·¤¿·ÐÏ©À©¸æ,
- ¾ðÊó½èÍý Vol.51, No.8, pp.951-958, 2010ǯ8·î¹æ¡¤2010ǯ8·î.
- -°ËÆ£Âçͺ, ±§Ìî͵Ƿ ÊÔÃø, Î¥»¶¿ô³Ø¤Î¤¹¤¹¤á(µÜºê¡§Âè17¾Ï¤òôÅö), ¸½Âå¿ô³Ø¼Ò, 2010ǯ5·î15Æü´©¹Ô.
- *2009ǯÅÙ [#r385e09d]
- **ÏÀʸ»ïÏÀʸ [#s7619095]
- -Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara,
- Privacy-Secure Image Sharing System for a Purchaser and Recorded Subjects Using Semi-Blind Fingerprinting,
- Procedia - Social and Behavioral Sciences, Vol.2, Issue 1, pp.137-142, Mar. 2010.
- -Asahiro, Y., Miyano, E., Miyazaki, S. and Yoshimuta, T., Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles, Information Processing Letters, Vol.110, Issue 3, pp. 93-98, January 2010.
- -ÎëÌÚÏÂÌ顤ÇϾì½ÓÊ塤ÏÂÅıÑɧ¡¤ÃæÈø¹¯Æ󡤹âÁÒ¹°´î¡¤²¬Éô¼÷ÃË,
- Ê£¿ô¼êË¡¤Ë¤è¤ë¥ê¥¢¥ë¥¿¥¤¥à²òÀϤò»Ù±ç¤¹¤ë¥È¥é¥Ò¥Ã¥¯¥Ç¡¼¥¿ÇÛÁ÷¥·¥¹¥Æ¥à¤Î¼ÂÁõ¤Èɾ²Á,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J92-B, No.10¡Ê¥»¥¥å¥¢¤Ç¥µ¥¹¥Æ¥¤¥Ê¥Ö¥ë¤Ê¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¢¡¼¥¥Æ¥¯¥Á¥ãÆý¸¹æ¡Ë, pp.1619-1630, 2009ǯ10·î.
- -Shuichi Miyazaki, Naoyuki Morimoto and Yasuo Okabe, The Online Graph Exploration Problem on Restricted Graphs,
- IEICE Transactions on Information and Systems, Vol.E92-D,No.9,pp.1620-1627, Sep. 2009.
- -Hamada, K., Iwama, K. and Miyazaki, S., An Improved Approximation Lower Bound for Finding Almost Stable Maximum Matchings, Information Processing Letters, Vol.109, Issue 18, pp. 1036-1040, August 2009.
- -Shuichi Miyazaki and Kazuya Okamoto, Improving the Competitive Ratio of the Online OVSF Code Assignment Problem, MDPI Algorithms, Vol. 2, Issue 3, pp. 953-972, July 2009.
- -ÎëÌÚÏÂÌé, ÇϾì½ÓÊå, ÏÂÅıÑɧ, ÃæÈø¹¯Æó, ¹âÁÒ¹°´î, ²¬Éô¼÷ÃË,
- ¿×®¤Ê¾ã³²Âбþ¤ò»Ù±ç¤¹¤ë¥È¥é¥Ò¥Ã¥¯²Ä»ë²½¥·¥¹¥Æ¥à¤Î¹½ÃÛ¤Èɾ²Á,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J92-B, No.7 ¡Ê¥·¥¹¥Æ¥à³«È¯¡¦¥½¥Õ¥È¥¦¥§¥¢³«È¯ÏÀʸÆý¸¹æ¡Ë, pp.1072-1083,¡¡2009ǯ7·î.
- -Jungsuk Song, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon,
- Unsupervised Anomaly Detection Based on Clustering and Multiple One-class SVM,
- IEICE Transactions on Communications,Vol.E92-B, No.6, pp.1981-1990, Jun. 2009.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#o9c661b0]
- -Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, A Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking, The 2009 International Workshop on Forensics for Future Generation Communication environments (F2GC), IEEE,pp.561--568, Jeju Korea,Dec 2009
- -Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, Semi-Blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques, The 8th International Workshop on Digital Watermarking (IWDW09), LNCS 5703, pp.14--28, Guildford, UK, Aug 2009.
- -Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe,
- Competitive Buffer Management for Multi-Queue Switches in QoS Networks using Packet Buffering Algorithms,
- 21st ACM Symposium on Parallelism in Algorithms and Architectures (SPAA2009), pp.328-336, Calgary, Canada
- August 11 - 13, 2009.
- -Keita Shimizu, Shuichi Miyazaki, Yasuo Okabe,
- Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange
- The 2009 International Symposium on Applications and the Internet (SAINT2009), pp. 37-42, Seattle, USA, 20 - 24 July 2009.
- -Keiji Maekawa, Yasuo Okabe,
- An Enhanced Location Privacy Framework with Mobility Using Host Identity Protocol,
- The 2009 International Symposium on Applications and the Internet (SAINT2009), pp. 23-29, Seattle, USA, 20 - 24 July 2009.
- -Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara,
- Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking,
- The Third Workshop on Middleware
- Architecture in the Internet (MidArc2009)
- (held as a part of
- SAINT2009),
- Seattle, USA, 20 - 24 July 2009.
- -Toshiyuki Kataoka, Takeshi Nishimura, Masaki Shimaoka, Kazutsuna Yamaji,
- Motonori Nakamura, Noboru Sonehara, Yasuo Okabe,
- Leveraging PKI in SAML2.0 Federation for Enhanced Discovery Service,
- The Third Workshop on Middleware
- Architecture in the Internet (MidArc2009)
- (held as a part of
- SAINT2009),
- Seattle, USA, 20 - 24 July 2009.
- **¸ýƬȯɽ¤Ê¤É [#e0210389]
- -Æ£ËÜ·½¡¦¾®»³Íΰ졦²¬Éô¼÷ÃË,
- ÅÅÎÏ·ÐÏ©À©¸æ¤Ë¤ª¤±¤ëÅŸ»Â¦¼çƳ»ñ¸»Í½Ìó,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2010ǯÁí¹çÂç²ñ BS-8-2, 2010ǯ3·î.
- -¼ÆÅÄÃε±¡¦Æ£ËÜ¡¡·½¡¦²¬Éô¼÷ÃË,
- ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤ÎÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á.
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2010ǯÁí¹çÂç²ñ BS-8-3, 2010ǯ3·î.
- -¿¹Ëܾ°Ç·¡¦µÜºê½¤°ì¡¦²¬Éô¼÷ÃË,
- 2Éô¥°¥é¥Õ¾å¤Ç¤Îʬô¶¡µë²Äǽ¤Ê³äÅö¤ÆÀ©¸ÂÉÕ¤»ñ¸»ÇÛʬÌäÂê,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2010ǯÁí¹çÂç²ñ BS-8-11, 2010ǯ3·î.
- -²¬Éô¼÷ÃË,¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¥×¥í¥¸¥§¥¯¥È¤Ë´Ø¤¹¤ëÁ´ÂÎÀâÌÀ, ¾ðÊó½èÍý³Ø²ñÁÏΩ50¼þǯµÇ°Á´¹ñÂç²ñ º£¥É¥¥Ã¤ÎIT@¸æŲ¼µÇ°´Û2010Ÿ¼¨´ØÏ¢¹Ö±é, 2010ǯ3·î.
- -Æ£ËÜ·½,¼ÆÅÄÃε±,²¬Éô¼÷ÃË, ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤Î£Ñ£ï£Å£î(Quality of Energy¡Ë·ÐÏ©À©¸æ¤ÈÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á, ¾ðÊó½èÍý³Ø²ñÁÏΩ50¼þǯµÇ°Á´¹ñÂç²ñº£¥É¥¥Ã¤ÎIT@¸æŲ¼µÇ°´Û2010Ÿ¼¨´ØÏ¢¹Ö±é, 2010ǯ3·î.
- -¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË¡¦Ãæ¼ÁÇŵ,
- SAMLÏ¢·È¤òÍѤ¤¤Æ¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·¤ò¼é¤ëeduroam¥¢¥«¥¦¥ó¥ÈÍøÍÑÊý¼°,
- ¿®³Øµ»Êó, vol. 109, no. 438, IA2009-109, pp. 153-158, 2010ǯ3·î.
- -À¾Â¼·ò¡¦Å粬À¯´ð¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,
- UPKI¾ÚÌÀ½ñ¼«Æ°È¯¹Ô¸¡¾Ú¥×¥í¥¸¥§¥¯¥È¤Î¥·¥¹¥Æ¥à°Ü¹Ô¤Ë¤ª¤±¤ë²ÝÂê¤ÈÂкö,
- ¿®³Øµ»Êó, vol. 109, no. 438, IA2009-113, pp. 225-228, 2010ǯ3·î.
- -Å粬À¯´ð¡¦À¾Â¼·ò¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,
- UPKI¥µ¡¼¥Ð¾ÚÌÀ½ñ¥×¥í¥¸¥§¥¯¥È¤Ë¤ª¤±¤ë¾ÚÌÀ½ñ¼«Æ°È¯¹Ô»Ù±ç¥·¥¹¥Æ¥à¤Î³«È¯
- ¿®³Øµ»Êó, vol. 109, no. 438, IA2009-114, pp. 229-234, 2010ǯ3·î.
- -²¬Éô¼÷ÃË, ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½¥×¥í¥¸¥§¥¯¥È(Áí³ç),
- Âçºå¹ñºÝ¥µ¥¤¥¨¥ó¥¹¥¯¥é¥Ö Â裹´ü¶âÍË¥µ¥¤¥¨¥ó¥¹¥µ¥í¥ó¡Ö¥°¥ê¡¼¥óIT¡ÁIT/ICT¤È´Ä¶¡Á¡×, 2010ǯ2·î.
- -²¬Éô¼÷ÃË, ÄãúÁǼҲñ¤Î¼Â¸½¤Ë¤à¤±¤¿¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽤ˤĤ¤¤Æ,
- ¥¹¥Þ¡¼¥È¥»¥ó¥µ¡¼¥Õ¥©¡¼¥é¥à ÂèÏ»²ó¾¦¶È¶õ´Ö¥½¥ê¥å¡¼¥·¥ç¥ó¡Áµ»½Ñ¸¡Æ¤²ñ¡Á, 2010ǯ2·î.
- -²¬Éô¼÷ÃË,
- ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¤Ë¤Ä¤¤¤Æ,
- £Ê£Ç£Î£²£ð£ì£õ£ó»Í¹ñÏ¢Íí¶¨µÄ²ñ¥»¥ß¥Ê¡¼inÆÁÅç¡Ê´ðÄ´¹Ö±é¡Ë,2010ǯ2·î.
- -º´¡¹ÌÚ,¼êÄÍ,Ëþ±ö,°¤Æ£,²¬Éô,ÅÄÃæ,¾¾±Ê,ÀÄÌÚ:
- ¥Ý¥ê¥·¡¼¡ÊJCAN¥Ó¥¸¥Í¥¹CP¡Ë¡Ê¥Ñ¥Í¥ë¡Ë,
- ÅÅ»Òǧ¾Ú¤Î̱´ÖÀ©ÅÙ¡¦´ðÈפγÎΩ¤Ë´Ø¤¹¤ë¥·¥ó¥Ý¥¸¥¦¥à,2010ǯ2·î.
- -Ê¡ÅĹä»Î, µÜºê½¤°ì, ²¬Éô¼÷ÃË,
- »Þ¥³¥¹¥È¤ËÀ©¸Â¤ò²Ã¤¨¤¿k-Canadian Traveler Problem¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ,
- ¿®³Øµ»Êó¡¤Vol.109, No. 391, COMP2009-39: (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ) pp.1-8, 2010ǯ1·î. (¶å½£Âç³Ø)
- -Kenji Ohira, Source Address Dependent Site External Route Advertisement for IPv6 Multihoming Site,
- The 14th JSPS/NRF Core University Program Seminar on Next Generation Internet,
- Jan. 2010.
- -Æ£ËÜ·½¡¤²¬Éô¼÷ÃË¡¤QoS¤ËÊï¤Ã¤¿EoD¥×¥í¥È¥³¥ë¤ÎÀ߷ס¤¤±¤¤¤Ï¤ó¤Ê¾ðÊóÄÌ¿®¥ª¡¼¥×¥ó¥é¥Ü¸¦µæ¿ä¿Ê¶¨µÄ²ñÂè3²ó¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽥¥¥ó¥°¥°¥ë¡¼¥×¡¤2010ǯ1·î
- -Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, A Web-based Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking, Consumer Communications & Networking Conference (IEEE-CCNC2010), Jan 2010.
- -Æ£ËÜ·½¡¦²¬Éô¼÷ÃË,
- ²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Ë¤ª¤±¤ë£Ñ£ï£Å£î¤ò¹Íθ¤·¤¿ÅÅÎÏÀ©¸æ¤ÎÄó°Æ,
- ¿®³Øµ»Êó, vol. 109, no. 299, IA2009-63, pp. 31-36, 2009ǯ11·î.
- -ÃæÅÄ·ò²ð¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
- IDS·ÙÊó¤Î²òÀϤˤè¤ëÂè»°¼Ôµ¡´Ø¤Ø¤Î¹¶·â¾õ¶·¤ÎÇÄ°®¼êË¡,
- ¿®³Øµ»Êó, vol. 109, no. 299, IA2009-62, pp. 25-30, 2009ǯ11·î.
- -¾®ÌºÀµÆ»¡¦»ÍÊýÉÒÌÀ¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË,
- µþÅÔÂç³Ø¤Ë¤ª¤±¤ë̵ÀþLAN¥µ¡¼¥Ó¥¹¤ÎŸ³«,
- ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥óµÚ¤ÓSINET¥µ¡¼¥Ó¥¹ÀâÌÀ²ñ¡ÊµþÅÔ²ñ¾ì¡ËSINET3ÍøÍÑ»öÎã,
- 2009ǯ11·î.
- -À¾Â¼·ò¡¦Å粬À¯´ð¡¦ÊÂÌÚÅÐÈþ¹¬¡¦Èõ¸ý½¨¼ù¡¦Ãæ¼ÁÇŵ¡¦²¬Éô¼÷ÃË¡¦Á¾º¬¸¶ÅÐ,
- ¥µ¡¼¥Ð¾ÚÌÀ½ñ¥×¥í¥¸¥§¥¯¥È¤Ë¸«¤ë¶¦Æ±ÍøÍÑ´ðÈפι½ÃۤȰܹÔ,
- Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼¸¦µæ³«È¯ÏÀʸ½¸, No.31, pp.99-103, 2009ǯ11·î.
- -Yasuo Okabe, Kazumi Sakai,
- £Ñ£ï£Å£î (Quality of Energy) Routing toward Energy on Demand Service in the Future Internet,
- ¿®³Øµ»Êó, vol. 109, no. 262, IA2009-47, pp. 9-12, 2009ǯ10·î.
- -Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, Privacy-Secure Image Sharing System for a Purchaser and Recorded Subjects Using Semi-Blind Fingerprinting,
- International Conference on Security Camera Network, Privacy Protection and Community Safety 2009 SPC2009, Kiryu, Japan, Oct, 2009
- -²¬Éô¼÷ÃË,
- ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½ ¡½ ¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯,
- ¥°¥ê¡¼¥óETµ»½Ñ¼ÔÍÜÀ®¹ÖºÂ in ·§ËÜ, 2009ǯ10·î.
- -ßÀÅĹÀµ¤¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
- ºÇÂ祵¥¤¥ººÇÂç°ÂÄêÅ٥ޥåÁ¥ó¥°ÌäÂê¤ËÂФ¹¤ë¶á»÷²¼¸Â¤Î²þÎÉ,
- ¿®³Øµ»Êó¡¤Vol.109, No.235, COMP2009-37,
- (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ),
- pp.35-40, Oct., 2009. (ÅìËÌÂç³Ø¡¤ÀçÂæ»Ô)
- -µÜºê½¤°ì,
- °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤Ë´Ø¤¹¤ëºÇ¶á¤ÎÏÃÂê,
- ¿®³Øµ»Êó¡¤Vol.109, No.211, AI2009-12
- (ÅŻҾðÊóÄÌ¿®³Ø²ñ¿Í¹©ÃÎǽ¤ÈÃμ±½èÍý¸¦µæ²ñ),
- pp.19-22, 2009ǯ9·î. (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
- -Yasuo Okabe,
- £Ñ£ï£Å£î (Quality of Energy) Routing toward Energy on Demand Service in the Future Internet,
- 2009 Asian Network Workshop, Aug. 2009.
- -Kenji Ohira, Hiroki Takakura, Yasuo Okabe, A Honeypot against Attacks Which Target Unknown Vulnerabilities,
- The 13th JSPS/NRF Core University Program Seminar on Next Generation Internet,
- //http://docs.google.com/View?id=ddd2ffq2_6dp6d92fk
- Aug. 2009.
- -²¬Éô¼÷ÃË¡¤°ú¸¶Î´»Î, ¡Ö¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¡×¤Ë¤Ä¤¤¤Æ,
- ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½¥·¥ó¥Ý¥¸¥¦¥à,2009ǯ7·î.
- -Tomotaka Maeda, Masahiro Kozuka, Yasuo Okabe,
- Reliable Streaming Transmission Using PR-SCTP,
- The 2009 International Symposium on Applications and the Internet (SAINT2009) student session, Seattle, USA, 20 - 24 July 2009.
- -Chia-Lung Hsieh,
- Privacy Disclosure: Personal Information and Images on Social Networking Sites in Taiwan,
- The 2009 International Symposium on Applications and the Internet (SAINT2009) student session, Seattle, USA, 20 - 24 July 2009.
- -²¬Éô¼÷ÃË,
- µþÅÔÂç³Ø¤Ë¤ª¤±¤ëÂ絬ÌÏ¥µ¡¼¥ÐÅý¹ç¤Ë¤è¤ë´Ä¶Éé²ÙÄ㸺¤Ø¤Î¼è¤êÁȤß,
- Âç³ØNUA Ê¿À®21ǯÅÙ Âè19²óÁí²ñ¡¦Âè32²ó¸¦µæ²ñ, 2009ǯ7·î.
- -ßÀÅĹÀµ¤¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
- ÇÛ°¿Í¿ô²¼¸ÂÉÕ¤¸¦½¤°åÇÛ°ÌäÂê,
- µþÅÔÂç³Ø¿ôÍý²òÀϸ¦µæ½ê¹ÖµæÏ¿1649 ¡ÖÍýÏÀ·×»»µ¡²Ê³Ø¤Î¿¼²½¤È±þÍÑ¡×(ÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à),
- pp. 73-80, May, 2009 (ȯɽ¤Ï2009ǯ2·î). (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
- -Shuichi Miyazaki, Naoyuki Morimoto and Yasuo Okabe,
- An Optimal Online Algorithm for the Graph Exploration Problem on Unweighted Graphs, Proc. 2nd
- Asian Association for Algorithms and Computation (AAAC), p.45,
- Hangzhou, China, April 11-12, 2009.
- -Àî¸Åë͵ʿ, ½©»³Ëþ¾¼, ÀÄÌÚ°ì»Ë, °ËÆ£¸÷¶³, ¹âÁÒ¹°´î,
- ¥¹¥Ñ¥à¥á¡¼¥ë¤Ëµ¯°ø¤¹¤ëWeb·¿¼õÆ°¹¶·â¤Î¼ÂÂÖÄ´ºº,
- ¿®³Øµ»Êó, vol. 109, no. 33, ICSS2009-5, pp. 21-26, 2009ǯ5·î.
- //Vol. IEICE-109, No. IEICE-ICSS-33, pp.21-26, 2009ǯ5·î
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#zf6fbe5b]
- -µÜºê½¤°ì, ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ¤ÎºÇÁ°Àþ --- °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤Î¸¦µæÆ°¸þ ---, ÅŻҾðÊóÄÌ¿®³Ø²ñ ¾ðÊ󡦥·¥¹¥Æ¥à¥½¥µ¥¤¥¨¥Æ¥£»ï Âè14´¬ Âè2¹æ, pp. 6-7, August 2009.
- *2008ǯÅÙ [#n9445cc5]
- **ÏÀʸ»ïÏÀʸ [#q0041435]
- -Naoyuki Kamiyama, Yuuki Kiyonari, Eiji Miyano, Shuichi Miyazaki, and Katsuhisa Yamanaka, Computational Complexities of University Interview Timetabling,
- IEICE TRANSACTIONS on Information and Systems, Volume E92-D, No.2,
- pp.130-140, Feb. 2009.
- -Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe,
- A Tight Upper Bound on Online Buffer Management for Multi-Queue Switches with Bicodal Buffers,
- IEICE Transactions on Information and System, Vol.E91-D, No.12, pp.2757-2769, Dec. 2008.
- -´Ý»³¿, ¾®ÄÍ¿¿·¼, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË,
- ¥¢¥É¥ì¥¹¾ðÊó¤ÎÊѹ¹ÄÌÃΤò½¸Ìó¤Ç¤¤ë¤è¤¦¤Ë¤¹¤ëSCTP ADD-IPµ¡Ç½¤Î²þÎÉ,
- ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J91-B, No.10, pp.1231-1233¡Ê¥ì¥¿¡¼¡Ë,2008ǯ10·î
- -Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe,
- A Tight Bound on Online Buffer Management for Two- port Shared-Memory Switches,
- IEICE Transactions on Information and System,
- Vol.E91-D,No.8,pp.2105-2114, Aug. 2008.
- -Iwama, K., Miyazaki, S. and Yamauchi, N.,
- A (2-c 1 / \sqrt{N})-Approximation Algorithm for the Stable Marriage Problem,
- Algorithmica, Volume 51, Number 3, pp. 902-914, July 2008.
- -Jungsuk Song, Kenji Ohira, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon,
- A Clustering Method for Improving Performance of Anomaly-based Intrusion Detection System,
- IEICE Transactions on Information and Systems
- (Special Section on Information and Communication System Security),
- Vol.E91-D, No.5, pp.1282-1291, May. 2008.
- -Mitsuo Okada, Hiroaki Kikuchi, and Yasuo Okabe,
- Multi-bit Embedding for Asymmetric Digital Watermarking without Exposing Secret,
- IEICE Transactions on Information and Systems
- (Special Section on Information and Communication System Security),
- Vol.E91-D, No.5, pp.1348-1358, May. 2008.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#yc061c49]
- -Miyazaki, S. and Okamoto, K.,
- Improving the Competitive Ratio of the Online OVSF Code Assignment Problem,
- Proc. 19th International Symposium on Algorithms and Computation (ISAAC 2008)
- (Lecture Notes in Computer Science 5369),
- pp. 64-76, Dec., 2008. (Gold Coast, Australia)
- -Jungsuk Song, Hiroki Takakura and Yasuo Okabe,
- Cooperation of Intelligent Honeypots to Detect Unknown Malicious Codes,
- WOMBAT Workshop on Information Security Threat Data Collection and Sharing (WISTDCS 2008), Amsterdam, Netherlands, 21-22 April 2008.
- -Jungsuk Song, Hiroki Takakura and Yongjin Kwon,
- A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts,
- The 2008 International Symposium on Applications and the Internet(SAINT2008), Turku, FINLAND, 28 July - 1 Aug. 2008.
- -Toshihiro Takagi, Takaaki Komura, Shuichi Miyazaki and Yasuo Okabe,
- Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols,
- SAINT2008 Workshop on Middleware Architecture in the Internet, pp. 293-296, Turku, FINLAND, 28 July - 1 Aug. 2008.
- **¸ýƬȯɽ¤Ê¤É [#feeabcd7]
- -²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤¥ª¥ó¥é¥¤¥óOVSFÉä¹ç³äÅöÌäÂê¤Ë¤ª¤±¤ë¶¥¹çÈæ¤Î¾å²¼¸Â¤Î²þÎÉ,ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ DS-1-6, 2009ǯ3·î.
- -Ä«°æÀéÈÁ, ¾å¸¶Å¯ÂÀϺ, ¿¹¡¡´´É§, ÄÔ¡¡¹âÌÀ, ÂçÊ¿·ò»Ê, ÃÓÅÄ¡¡¿´, ´î¿¡¡°ì, ¿·³Ø½¬»ØƳÍ×ÎΤˤª¤±¤ë¾ðÊó¥â¥é¥ë¶µ°é¤Î°ÌÃ֤Ť±¤È¾ðÊóÎÑÍý¶µºà, ¿®³Øµ»Êó, vol. 108, no. 460, IA2008-116, pp. 289-294, 2009ǯ3·î.
- -Á°ÅÄÊþ¹§¡¦¾®ÄÍ¿¿·¼¡¦²¬Éô¼÷ÃË, PR-SCTP¤òÍѤ¤¤¿¹â¿®ÍêÀ¥¹¥È¥ê¡¼¥ß¥ó¥°ÅÁÁ÷, ¿®³Øµ»Êó, vol. 108, no. 460, IA2008-74, pp. 43-47, 2009ǯ3·î.
- -Toshiyuki Kataoka, Motonori Nakamura, Yasuo Okabe, On UPKI-Federation based on Shibboleth,
- 27th APAN meeting in Kaohsiung, Mar. 2009.
- -²¬Éô¼÷ÃË, UPKIÁ´ÂÎÊó¹ð, ¹ñΩ¾ðÊó³Ø¸¦µæ½êUPKI¥·¥ó¥Ý¥¸¥¦¥à2009, 2009ǯ2·î.
- -Kenji Ohira, Source Address Dependent Site External Route Advertising Protocol for IPv6 Multihoming Site, 12th Core University Program Seminar on Next Generation Internet Technologies, Beppu, Japan, Feb. 2009.
- -Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
- A Network Intrusion Detection System Based on Clustering and Multiple One-class SVM,
- 12th Core University Program Seminar on Next Generation Internet Technologies, Beppu, Japan, Feb. 2009.
- -Tomotaka Maeda, Yasuo Okabe,
- Reliable Streaming Transmission Using PR-SCTP,
- 12th Core University Program Seminar on Next Generation Internet Technologies, Beppu, Japan, Feb. 2009.
- -²¬Éô¼÷ÃË,
- ¾ðÊ󥻥¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¡ÊÂкö¡Ë¤ò¿»Æ©¤µ¤»¤ë¤Ë¤Ï,
- ʸÉô²Ê³Ø¾ÊÊ¿À®20ǯÅÙ¾ðÊ󥻥¥å¥ê¥Æ¥£¥»¥ß¥Ê¡¼, 2009ǯ2·î.
- -²¬Éô¼÷ÃË,
- »ä¤Ïï¡©¡ÝÁÈ¿¥¡¢¤½¤·¤Æ¥µ¡¼¥Ó¥¹¤«¤é¸«¤¿Ç§¾Ú¤ÈUPKI¡Ý,
- ¥µ¥¤¥¨¥ó¥Æ¥£¥Õ¥£¥Ã¥¯¡¦¥·¥¹¥Æ¥à¸¦µæ²ñ ¥·¥¹¥Æ¥àµ»½Ñʬ²Ê²ñ 2008ǯÅÙÂè2²ó²ñ¹ç¡ÖÁÈ¿¥¤Èǧ¾Ú¡¡¡Áï¤òǧ¾Ú¤¹¤Ù¤¤«¡Á¡×¥Á¥å¡¼¥È¥ê¥¢¥ë, 2009ǯ1·î.
- -Yasuo Okabe,
- Inter-University Single Sign-On Architecture Based on UPKI Federation,
- The AEARU Workshop on Collaboration among Universities in the Ubiquitous World ¡½Building a Digital Bridge for the Collaboration among AEARU Members¡½ (keynote), Nanjing, Dec. 2008
- -Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara,
- A Privacy Enhanced Image Sharing System on the Sensing Web Based on a Fingerprinting Technique, Proc. International Workshop on ¡ÈSensing Web¡É, pp.51-57, Dec. 2008.
- -Yasuo Okabe, On the UPKI trial, 12th TERENA TF-EMC2 Meeting, Dec. 2008
- -²¬Éô¼÷ÃË, ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤ò³èÍѤ·¤¿¾Ê¥¨¥Í¤Î²ÄǽÀ, Âè10²óSCCJµþÅÔ¸¦µæ²ñ, 2008ǯ11·î
- -¾®ÌºÀµÆ»¡¤Áê³Ú¿¿ÂÀϺ¡¤²ÏÌîŵ¡¤»ÍÊýÉÒÌÀ¡¤¸Å¼δÌÀ¡¤²¬Éô¼÷ÃË¡¤µþÅÔÂç³Ø¤Ë¤ª¤±¤ë̵ÀþLAN´ðÃ϶ɤΟ³«¡¤Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼¸¦µæ³«È¯ÏÀʸ½¸¡¤No.30, pp.55-59, 2008ǯ11·î.
- -²ÆÌÜ¡¤Èõ¸ý¡¤ÁáÀ¥¡¤²¬ÅÄ¡¤»³ÃÏ¡¤Å粬¡¤ÊÒ²¬¡¤Ã«ËÜ¡¤Ã漡¤²¬Éô¡¤Á¾º¬¸¶¡¤
- Á´¹ñÂç³Ø¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¤ÎÀ®²Ì¤È¿ÊĽÊó¹ð,
- Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼¸¦µæ³«È¯ÏÀʸ½¸¡¤No.30, pp.92-96, 2008ǯ11·î.
- -À¶¿å·ÉÂÀ, µÜºê½¤°ì, ²¬Éô¼÷ÃË, Ãʳ¬ÅªÈëÌ©¸ò´¹¥×¥í¥È¥³¥ë¤òÍøÍѤ·¤¿ÇÛãÆâÍƾÚÌÀ¤¬²Äǽ¤ÊÅŻҥ᡼¥ë¥×¥í¥È¥³¥ë¤ÎÀß·×¾å¤Î¸¡Æ¤,
- ¿®³Øµ»Êó, vol. 108, no. 275, IA2008-42, pp. 7-12, 2008ǯ11·î.
- -Á°Àî·Ä»Ê, ²¬Éô¼÷ÃË,Host Identity Protocol¤òÍѤ¤¤¿¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·¤òͤ¹¤ëƿ̾°ÜÆ°ÄÌ¿®,¿®³Øµ»Êó, vol. 108, no. 275, IA2008-43, pp. 13-17, 2008ǯ11·î.
- -Hiroki Takakura,
- A Network Management Model to Maintain Secure Campus Network,
- AsiaFI Joint Workshops with CERNET and CK Workshop, QingDao, Oct. 2008.
- -Á°ÅÄÊþ¹§¡¤¾®ÄÍ¿¿·¼¡¤´Ý»³¿¡¤¸Å¼δÌÀ¡¤²¬Éô¼÷ÃË¡¤Ãæ·Ñ¥Û¥¹¥È¤Ë¤ª¤¤¤ÆPR-SCTP¤òÍѤ¤¤¿DV±ÇÁüÅÁÁ÷¼êË¡¡¤¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô¡¡Ê¿À®20ǯÅÙ»ÙÉô²ñ¹Ö±éÏÀʸ½¸¡¤pp. 327-328¡¤2008ǯ10·î¡¥
- -¿¹Ëܾ°Ç·¡¤µÜºê½¤°ì¡¤²¬Éô¼÷ÃË¡¤ÆþÎϤËÀ©¸Â¤ò²Ã¤¨¤¿¥ª¥ó¥é¥¤¥ó¥°¥é¥Õõº÷ÌäÂꡤ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô¡¡Ê¿À®20ǯÅÙ»ÙÉôÂç²ñ¹Ö±éÏÀʸ½¸¡¤pp. 51-54¡¤2008ǯ10·î¡¥
- -²¬ÅÄËþͺ¡¤²¬Éô¼÷ÃË¡¤¾å¸¶Å¯ÂÀϺ,
- ÅÅ»ÒÆ©¤«¤·¤òÍѤ¤¤¿¥×¥é¥¤¥Ð¥·Êݸî¥×¥í¥È¥³¥ë¤Ë¤è¤ë´Æ»ë¥«¥á¥é²èÁü¶¦Í¥·¥¹¥Æ¥à,
- ¾ðÊó½èÍý³Ø²ñ¥³¥ó¥Ô¥å¡¼¥¿¥»¥¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à2008 (CSS2008) ÏÀʸ½¸¡¤Âè2ʬºý, pp.899-904¡¤2008ǯ10·î.
- -²¬Éô¼÷ÃË,UPKIǧ¾ÚÏ¢·È´ðÈפˤè¤ë¥·¥ó¥°¥ë¥µ¥¤¥ó¥ª¥ó¼Â¾Ú¼Â¸³¤Ë¤Ä¤¤¤Æ,
- Ê¿À®20ǯÅÙTOPIC¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ, 2008ǯ9·î.
- -Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
- Performance Evaluation of Unsupervised Machine Learning Techniques for Intrusion Detection,
- 11th Core University Program Seminar on Next Generation Internet Technologies, Busan, Korea, Aug. 2008.
- -Hamada, K., Iwama, K. and Miyazaki, S.,
- The Hospitals/Residents Problem with Quota Lower Bounds,
- MATCH-UP (Satellite workshop of ICALP 2008), pp. 55-66, July 2008 (Reykjavik University, Iceland).
- -Æ£À£, ÂçÊ¿·ò»Ê, ÂÀÅľ»¹§, ¥¢¥É¥ì¥¹¼«Æ°³äÉÕ¤âƱ»þ¤Ë¹Ô¤¦³¬Áز½QoS¥ë¡¼¥Æ¥£¥ó¥°¥×¥í¥È¥³¥ë¤Î¹Í»¡, ÅŻҾðÊóÄÌ¿®³Ø²ñIA¸¦µæ²ñ, 2008ǯ7·î.
- -¹âÁÒ¹°´î,¡¡Á×Ãæ¼â,¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Ë¤ª¤±¤ë̤Ãι¶·â¤Î¾õ¶·¤È¤½¤Î¸¡ÃμêË¡,¿Í¹©ÃÎǽ³Ø²ñ Âè70²ó ¿Í¹©ÃÎǽ´ðËÜÌäÂ긦µæ²ñ (SIG-FPAI) ¡½AI¤ò¿¼²½¤µ¤»¤ë¤¿¤á¤Î´ðËÜÌäÂ꡽, 2008ǯ7·î.
- -²¬Éô¼÷ÃË,
- Á´¹ñÂç³ØÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¤È¤½¤ÎÀè¤Ë¤¢¤ë¤â¤Î,
- JNSA PKIÁê¸ß±¿Íѵ»½ÑWG¼çºÅ¥»¥ß¥Ê¡¼ PKI Day 2008¡Ý¡ã£Ð£Ë£É¤Îɸ½à¤«¤é¼ÂÁõ¤Þ¤ÇºÇ¿·Æ°¸þ¡ä ¡Ê´ðÄ´¹Ö±é¡Ë,
- 2008ǯ7·î.
- -²¬Éô¼÷ÃË,
- Âç³Ø¤Ë¤ª¤±¤ëTrust Management¤È²¤ÊÆÆ°¸þ,
- Âè11²óISS¥¹¥¯¥¨¥¢¿åÊ¿¥ï¡¼¥¯¥·¥ç¥Ã¥×, 2008ǯ5·î.
- -Shuichi Miyazaki, Naoyuki Morimoto and Yasuo Okabe,
- An Optimal Online Algorithm for the Graph Exploration Problem on Cycles, Proc. 1st
- Asian Association for Algorithms and Computation (AAAC), p.42,
- Pokfulam, Hong Kong, April 26-27, 2008.
- -Iwama, K., Miyazaki, S. and Okamoto, K.,
- Inapproximability of Stable Roommates Problem with Triple Rooms, Proc. 1st
- Asian Association for Algorithms and Computation (AAAC), p.30,
- Pokfulam, Hong Kong, April 26-27, 2008.
- -Yasuhiro NAGAI, Takaaki KOMURA, Yasuo OKABE,
- Authentication and Authorization using Single Sign-on and Electric Certificates,
- The 8th AEARU Web Technology and Computer Science Workshop, April 2008.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#j23dd1de]
- -Iwama, K. and Miyazaki, S.,
- Stable Marriage with Ties and Incomplete Lists,
- Encyclopedia of Algorithms, Springer, pp. 883-885, June 2008.
- **¤½¤Î¾ [#lf0a5e2b]
- -²¬ÅĿλÖÊÔÃø, ¥Ò¥«¥ê¡õ¤Ä¤Ð¤µ¤Î¾ðÊ󥻥¥å¥ê¥Æ¥££³Âò¶µ¼¼
- ¡Ê²¬Éô¡§Â裱£°ÏÃôÅö¡Ë,
- ¹ñΩ¾ðÊó³Ø¸¦µæ½ê¡¡ISBN978-4-86049-048-5, 2009ǯ3·î.
- //** ¹ñºÝɸ½à²½Äó°Æ
- *2007ǯÅÙ [#p591e120]
- **ÏÀʸ»ïÏÀʸ [#t51fb769]
- -Halldorsson, M. M., Iwama, K., Miyazaki, S. and Yanagisawa, H.,
- Improved Approximation Results for the Stable Marriage Problem,
- ACM Transactions on Algorithms,
- Vol. 3, Issue 3, Article No. 30, August 2007.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#aac762db]
- -Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira and Yongjin Kwon,
- A Comprehensive Approach to Detect Unknown Attacks via Intrusion Detection Alerts,
- The twelfth Asian Computing Science Conference(ASIAN2007) Focusing on Computer and Network Security, LNCS 4846,
- Doha, Qatar, December 9-11, 2007.
- -Koji Kobayashi and Kazuya Okamoto,
- Improved Upper Bounds on the Competitive Ratio for Online Realtime Scheduling,
- 15th Annual European Symposium on Algorithms (ESA2007),
- Eilat, Israel, October 8-10, 2007.
- -Manami Kikuchi, Takayuki Ito, Hiroki Takakura,
- A Visualization Technique for Monitoring of Network Flow Data,
- The First International Symposium on Information and Computer Elements ISICE 2007, Sept. 12-14, 2007.
- -Iwama, K., Miyazaki, S. and Yanagisawa, H.,
- Approximation Algorithms for the Sex-Equal Stable Marriage Problem,
- Proc. 10th Workshop on Algorithms and Data Structures (WADS 2007), (Lecture Notes in Computer Science 4619), pp. 201-213, August, 2007. (Halifax, Canada)
- -Iwama, K., Miyazaki, S. and Okamoto, K.,
- Stable Roommates Problem with Triple Rooms,
- Proc. 10th KOREA-JAPAN Joint Workshop on Algorithms and Computation (WAAC 2007), pp. 105-112, August, 2007. (Chonnam National University, Gwangju, Korea)
- -Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe,
- A Tight Bound on Online Buffer Management for two-port Shared-Memory Switches,
- 19th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA2007), pp. 358-364, June 2007.
- -Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon,
- A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-based Intrusion Detection System,
- Proc. 12th International Conference on Database Systems for Advanced Applications (DASFAA2007),(Lecture Notes in Computer Science 4443), pp. 140-151, April 2007.(Bangkok, Thailand)
- **¸ýƬȯɽ¤Ê¤É [#zc6f7cd6]
- -ëËÜÌÐÌÀ¡¦Å粬À¯´ð¡¦ÊÒ²¬½Ó¹¬¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,UPKI¶¦ÄÌ»ÅÍÍ¡Ê¥¢¥¦¥È¥½¡¼¥¹¥â¥Ç¥ë¡Ë¤ÎÄó°Æ,ÅŻҾðÊóÄÌ¿®³Ø²ñ2008ǯÁí¹çÂç²ñ BS-8-2, 2008ǯ3·î.
- -Å粬À¯´ð¡¦Ã«ËÜÌÐÌÀ¡¦ÊÒ²¬½Ó¹¬¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,UPKI¥×¥í¥¸¥§¥¯¥È¤Ë¤ª¤±¤ë¥ª¡¼¥×¥ó¥É¥á¥¤¥ó¥µ¡¼¥Ð¾ÚÌÀ½ñȯ¹Ô¡¦Æ³Æþ,ÅŻҾðÊóÄÌ¿®³Ø²ñ2008ǯÁí¹çÂç²ñ BS-8-2, 2008ǯ3·î.
- -Yanagisawa, H., Miyazaki, S., and Iwama, K.
- Approximation Algorithms for the Sex-Equal Stable Marriage Problem,
- ¿®³Øµ»Êó¡¤Vol.107, No.537, COMP2007-55,
- (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ),
- pp. 1--8, 2008ǯ3·î. (ÆüËÜIBM Åìµþ´ðÁø¦µæ½ê¡¤¿ÀÆàÀÂçÏ»Ô)
- -¹âÌÚ½Ó¹¨¡¦¸Å¼δÌÀ¡¦µÜºê½¤°ì¡¦²¬Éô¼÷ÃË,¥Þ¥¸¥Ã¥¯¥×¥í¥È¥³¥ëÍøÍѤˤè¤ë¥×¥é¥¤¥Ð¥·¡¼¤ËÇÛθ¤·¤¿Shibboleth°À¸ò´¹¤Î³ÈÄ¥,Âè48²óʬ»¶¥·¥¹¥Æ¥à¡¿¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¡¦Âè26²ó¹âÉʼÁ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¹çƱ¸¦µæȯɽ²ñ,2008ǯ3·î
- -Yasuo Okabe,Wireless Network Security for Future Internet, AsiaFI School on Mobile & Wireless Networks,¡¡Feb. 2008.
- -Iwama, K. and Miyazaki, S.
- A Survey of the Stable Marriage Problem and Its Variants,
- Proc. International Conference on Informatics Education and Research for Knowledge-Circulating Society (ICKS'08),
- pp. 131-136, Jan. 2008. (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
- -Á°ÅÄÊþ¹§¡¦¾®ÄÍ¿¿·¼¡¦´Ý»³¡¡¿¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË,PR-SCTP¤ò¤â¤Á¤¤¤¿¥ê¥¢¥ë¥¿¥¤¥à±ÇÁüÅÁÁ÷¤Ë¤ª¤±¤ë·ÐÏ©ÀÚ¤êÂؤ¨,¿®³Øµ»Êó, vol. 107, no. 449, IA2007-49, pp. 51-55,2008ǯ1·î
- -Toshihiro TAKAGI, Takaaki KOMURA, Shuichi MIYAZAKI, Yasuo OKABE, Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols, 25th APAN Meeting in Hawaii, Jan. 2008.
- -´Ý»³ ¿, ¾®ÄÍ ¿¿·¼, Ãæ¼ ÁÇŵ, ²¬Éô ¼÷ÃË,SCTP ¤ÎIP¥¢¥É¥ì¥¹¼«Æ°¹¹¿·µ¡Ç½¤Ë¤ª¤±¤ë¥¢¥É¥ì¥¹¼è¼ÎÁªÂòµ¡¹½,¾ðÊó½èÍý³Ø²ñ Âè12²óʬ»¶¥·¥¹¥Æ¥à/¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à ¡½½À¤é¤«¤Ê¥µ¡¼¥Ó¥¹¤ò»Ù¤¨¤ëµ»½Ñ¡½, 2007ǯ12·î.
- -²¬Éô¼÷ÃË,Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈסʣգУˣɡˤθ½¾õ¤Èº£¸å,CAUAÂ裶²ó¹çƱ¸¦µæʬ²Ê²ñ¡Ê´ðÄ´¹Ö±é¡Ë,2007ǯ11·î.
- -²¬Éô¼÷ÃË,¾ðÊ󵻽Ѥ¬¤â¤¿¤é¤¹¼Ò²ñÊѳ×,µþÅÔ½÷»ÒÂç³Ø¸½Âå¼Ò²ñ³ØÉô¸ø³«¹ÖºÂ¡¦¾ðÊ󵻽Ѥȸ½Âå¼Ò²ñ¡½µ»½Ñ¤Î¸½ºß¡¢¼Ò²ñ¤Î¤æ¤¯¤¨¡½,2007ǯ11·î.
- -¹âÌÚ½Ó¹¨, ºâ»ºÈæ¤Ù¥×¥í¥È¥³¥ë¤òÍøÍѤ·¤¿Shibboleth¤Îǧ²Ä·èÄê¥â¥Ç¥ë¤ÎÄó°Æ, ITRC22³ØÀ¸¥»¥Ã¥·¥ç¥ó,2007ǯ11·î
- -Á°ÅÄÊþ¹§, SCTP¤òÍѤ¤¤¿¥ê¥¢¥ë¥¿¥¤¥à·¿¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤Î¹½ÃÛ,ITRC22³ØÀ¸¥»¥Ã¥·¥ç¥ó,2007ǯ11·î
- -²¬ÅÄËþͺ, Information Sharing Web Service,ITRC22³ØÀ¸¥»¥Ã¥·¥ç¥ó,2007ǯ11·î
- -²¬Éô¼÷ÃË,IPv6¤Ë¤è¤ë¥æ¥Ó¥¥¿¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼Â¸½,V6¥×¥ì¥ß¥¢¥à¥Õ¥©¡¼¥é¥àÂ裲²ó¥Ñ¡¼¥È¥Ê¡¼¥·¥Ã¥×²ñµÄ,2007ǯ10·î.
- -²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
- 3¿ÍÉô²°°ÂÄê¥ë¡¼¥à¥á¥¤¥ÈÌäÂê¤ÎNP´°Á´À,
- ¿®³Øµ»Êó¡¤Vol.107, No.258, COMP2007-41
- (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
- pp.1-6, 2007ǯ10·î. (ÅìËÌÂç³Ø¡¤ÀçÂæ»Ô)
- -Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
- Data Mining and Visualization of IDS Alerts to Extract Malicious Activities,
- 9th Core University Program Seminar on Next Generation Internet Technologies,
- Oct. 2007.
- -²¬Éô¼÷ÃË,ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯¤È¤·¤Æ¤Î¸ø½°ÌµÀþ£Ì£Á£Î¤Ø¤Î´üÂÔ,¥Þ¥ë¥Á¥á¥Ç¥£¥¢¿ä¿Ê¥Õ¥©¡¼¥é¥à¡¦Ê¿À®19ǯÂè26²ó¡Ö¤¢¤é¤¿¤Ê¡Ø¸ø½°ÌµÀþLAN¡Ù¤Î»þÂ夬ÅþÍè¡×,2007ǯ9·î.
- -¿¹Ëܾ°Ç·, µÜºê½¤°ì, ²¬Éô¼÷ÃË¡¤
- ¥µ¥¤¥¯¥ë¾å¤Ç¤Î¥°¥é¥Õõº÷ÌäÂê¤ËÂФ¹¤ëºÇŬ¤Ê¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à,
- ¿®³Øµ»Êó¡¤Vol.107, No. 219, COMP2007-39:
- (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
- pp.51-57, 2007ǯ9·î. (˶¶µ»½Ñ²Ê³ØÂç³Ø)
- -À¶À®Íªµ®¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤
- »îÌäͽÄêɽºîÀ®ÌäÂê¤ÎÀ©ÌóÉÕ¤¥â¥Ç¥ë¤ËÂФ¹¤ëNPº¤ÆñÀ,
- Ê¿À®19ǯÅÙ Âè60²óÅŵ¤´Ø·¸³Ø²ñ¶å½£»ÙÉôÏ¢¹çÂç²ñ, 09-1A-04, p.87, 2007ǯ9·î.¡ÊΰµåÂç³Ø¡Ë
- -Yasuo OKABE,
- Introduction to UPKI Project in Japan,
- TERENA 9th TF-EMC2 Meeting Prague,
- Sept. 2007.
- -Yasuo OKABE,
- MIAKO.net Public Wireless Internet Service in Kyoto, 24th APAN Meeting in Xi'an, Aug. 2007.
- -Yasuo OKABE,
- Japanese University PKI (UPKI) Update, 24th APAN Meeting in Xi'an, Aug. 2007.
- -¿¹Ëܾ°Ç·, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ¥µ¥¤¥¯¥ë¥°¥é¥Õ¾å¤Ç¤ÎÃÏ¿ÞºîÀ®ÌäÂê¤ËÂФ¹¤ëºÇŬ¤Ê¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à, 2007ǯÅٲƤÎLA¥·¥ó¥Ý¥¸¥¦¥à, [9], July 2007.
- -¾®ÎÓ¹ÀÆ󡤵ܺ꽤°ì¡¤²¬Éô¼÷ÃË¡¤
- A Tight Upper Bound on Online Buffer Management for Two-port Shared-Memory Switches,
- ¿®³Øµ»Êó¡¤Vol.107, No.127, COMP2007-26:
- (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
- pp.63-70, 2007ǯ6·î. (Ë̳¤Æ»Âç³Ø¡¤»¥ËÚ»Ô)
- -´Ý»³¿¡¦¾®ÄÍ¿¿·¼¡¦²¬Éô¼÷ÃË,
- SCTP¤Ë¤ª¤±¤ë¥¢¥É¥ì¥¹ÁªÂò¥Ý¥ê¥·¡¼¤òÄêµÁ¤Ç¤¤ëIP¥¢¥É¥ì¥¹¼«Æ°¹¹¿·µ¡Ç½¤ÎÀß·×,
- ¿®³Øµ»Êó, vol. 107, no. 74, IA2007-1, pp. 1-3, 2007ǯ5·î.
- -Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
- A Proposal of New Benchmark Data to Evaluate Mining Algorithms for Intrusion Detection, 23th APAN Meeting in Manila, Jan. 2007.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#ad75410c]
- --²¬Éô¼÷ÃË,
- Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¤Î¸½¾õ¤Èº£¸å,
- View Point, Âè8¹æ, pp.67-72, Mar. 2008.
- -µÜºê½¤°ì, Î¥»¶¿ô³Ø¤Î¤¹¤¹¤á Âè6²ó ¡Ö°ÂÄê·ëº§ÌäÂê¡×, Íý·Ï¤Ø¤Î¿ô³Ø(¸½Âå¿ô³Ø¼Ò), pp. 49-54, 2007ǯ9·î¹æ.
- ** ¹ñºÝɸ½à²½Äó°Æ [#d4e26767]
- -R. Stewart, Q. Xie, M. Tuexen, S. Maruyama, M. Kozuka, Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration, RFC 5061, Sept. 2007.
- *2006ǯÅÙ [#r2b102b0]
- **ÏÀʸ»ïÏÀʸ [#h163986e]
- -Iwama, K., Miyazaki, S. and Okamoto, K.,
- A (2-c log N/N)-Approximation Algorithm for the Stable Marriage Problem,
- IEICE TRANSACTIONS on Information and Systems, Volume E89-D No.8, pp.2380-2387, August 2006.
- -¼°æ¶Ñ, ²¬Éô¼÷ÃË,
- NAS Parallel Benchmarks¤Ë¤è¤ëHPF¤Îɾ²Á,
- ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï¡§¥³¥ó¥Ô¥å¡¼¥Æ¥£¥ó¥°¥·¥¹¥Æ¥à Vol.47, No.SIG7(ACS14), pp.137-151 (2006).
- -´Ý»³¿, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, »³°æÀ®ÎÉ, ²¬»³À»É§, µÜ²¼ÂîÌé,
- ưŪ¤Ë±þÅú¤òÊѤ¨¤ëDNS¤òÍøÍѤ·¤¿ÅŻҥ᡼¥ë¼õ¿®¤ÎÍ¥ÀèÀ©¸æ,
- ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï Vol.47, No.4, pp.1021-1030 (2006).
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#x7186c7d]
- -Asahiro, Y., Miyano, E., Miyazaki, S. and Yoshimuta, T., Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles,
- Proc. 33rd Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2007), (Lecture Notes in Computer Science 4362),
- pp. 164-175, Jan., 2007. (Harrachov, Czech Republic)
- -Iwama, K., Miyazaki, S. and Yamauchi, N., A 1.875-Approximation Algorithm for the Stable Marriage Problem, Proc. 18th ACM-SIAM Symposium on Discrete Algorithms (SODA 2007), pp. 288-297, Jan., 2007. (New Orleans, USA)
- -Yutaka Nakano, Motonori Nakamura, Yasuo Okabe, Analysis for Topological Properties of the Network Feeding Usenet News, SAINT2007, Jan. 2007.
- -Shoichiro Fujiwara, Takaaki Komura, Yasuo Okabe, A Privacy Oriented Extension of Attribute Exchange in Shibboleth, SAINT2007 Workshop on Middleware Architecture in the Internet, Jan. 2007.
- -»³°æÀ®ÎÉ¡¦Îú°ìÊ¿¡¦²¬»³À»É§¡¦²ÏÌî·½ÂÀ¡¦Ãæ¼ÁÇŵ¡¦´Ý»³¿¡¦µÜ²¼ÂîÌé,
- SMTP¥»¥Ã¥·¥ç¥ó¤Î¶¯À©ÀÚÃǤˤè¤ëspam¥á¡¼¥ëÂкö¼êË¡,
- FIT 2006 Âè5²ó¾ðÊó²Ê³Øµ»½Ñ¥Õ¥©¡¼¥é¥à¡ÊÁ¥°æ¥Ù¥¹¥È¥Ú¡¼¥Ñ¡¼¾Þ¡Ë,
- 2006ǯ9·î.
- -Kiyonari, Y., Miyano, E. and Miyazaki, S.,
- Computational Complexity Issues in University Interview Timetabling,
- Proc. of The 6th International Conference on the Practice and Theory of Automated Timetabling (PATAT 2006),
- pp. 448-453, August 2006. (Brno, Czech Republic)
- -Kato, S., Miyazaki, S., Nishimura, Y. and Okabe, Y.,
- Cheat-proof Serverless Network Games,
- 5th International Conference on Computers and Games (CG 2006), (Lecture Notes in Computer Science 4630), pp. 234-243,
- May 2006. (Turin, Italy)
- **¸ýƬȯɽ¤Ê¤É [#z62bf30b]
- -²¬Éô¼÷ÃË,
- ǧ¾Ú±¿ÍÑÎΰè,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2007ǯÁí¹çÂç²ñ TK-2 Âç³ØÅù¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£Âкö¤Î¤¿¤á¤ÎÀ©ÅÙ¡¦ÂÎÀ© ¡ÁÀ¯Éܵ¡´ØÅý°ì´ð½à¤òÈ¿±Ç¤·¤¿¥µ¥ó¥×¥ëµ¬Äø½¸¤ÎÊó¹ð¡Á, 2007ǯ3·î.
- -»³ÆâľºÈ¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
- °ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë1.8-¶á»÷¥¢¥ë¥´¥ê¥º¥à,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ DS-1-3, 2007ǯ3·î.
- -²¬Éô¼÷ÃË,
- Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¹½ÃÛ»ö¶È¤Î³µÍ×,
- Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£µÚ¤ÓÅÅ»Òǧ¾Ú´ðÈפ˴ؤ¹¤ë¥ï¡¼¥¯¥·¥ç¥Ã¥×, 2007ǯ2·î.
- -²¬Éô¼÷ÃË,
- ¡Ö¹ñΩÂç³ØË¡¿Í¸þ¤±¾ðÊ󥻥¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¡×¤ÎºöÄê¡Áǧ¾Ú±¿ÍÑÎΰè,
- Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥¥å¥ê¥Æ¥£µÚ¤ÓÅÅ»Òǧ¾Ú´ðÈפ˴ؤ¹¤ë¥ï¡¼¥¯¥·¥ç¥Ã¥×, 2007ǯ2·î.
- -²¬Éô¼÷ÃË,
- Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈסÊUPKI¡Ë¤ÈUPKI¥¤¥Ë¥·¥¢¥Æ¥£¥Ö¤Ë¤Ä¤¤¤Æ,
- Ê¿À®18ǯÅÙ¹âÀǽ¥³¥ó¥Ô¥å¡¼¥Æ¥£¥ó¥°ÍøÍѵ»½Ñ¤Ë´Ø¤¹¤ëÁí¹ç¥·¥ó¥Ý¥¸¥¦¥à¡Ö²¾Áۼ¸³¤ÈÂ絬ÌÏ¥·¥ß¥å¥ì¡¼¥·¥ç¥ó¤ÇÂó¤¯Àèü²Ê³Ø2007¡×¡Ê¥Ý¥¹¥¿¡¼¡Ë, 2007ǯ2·î.
- -Kenji Ohira, Ying Huang, Takaaki Komura, Yasuo Okabe,
- Loosely Trusted Yet Secure Roaming Architecture for Public Wireless Internet Service,
- Proc. 2nd International Conference on Informatics Research for Development of Knowledge Society Infrastructure 2007,
- Jan. 2007.
- -Shoichirou FUJIWARA, Takaaki KOMURA, Yasuo OKABE,
- A Privacy Oriented Attribute Exchange in Shibboleth, 23rd APAN Meeting in Manila, Jan. 2007.
- -ÅÏÉô°ê·Ã¡¦²¬Éô¼÷ÃË¡¦Ãæ¼ÁÇŵ,
- Ê£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ
- ¿®³Øµ»Êó, vol. 106, no. 465, IA2006-37, pp. 37-42, 2007ǯ1·î.
- -ÂçÄíÈ»¿Í¡¦Áס¡Ãæ¼â¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
- µ¡³£³Ø½¬¤Ë¤è¤ë¥Í¥Ã¥È¥ï¡¼¥¯IDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤª¤è¤Ó²Ä»ë²½
- ¿®³Øµ»Êó, vol. 106, no. 465, IA2006-36, pp. 31-36, 2007ǯ1·î.
- -¸Å¼δÌÀ,
- µþÅԤǤÎÁð¤Îº¬ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÉáµÚ³èÆ°,
- InternetWeek 2006 ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯BoF, 2006ǯ12·î.
- -Shoichiro Fujiwara, Takaaki Komura, Yasuo Okabe, Privacy Enhanced Attribute Exchange for Shibboleth/SAML based Authorization in Web Services, The 7th AEARU Workshop on Web Technology and Computer Science (WebTeCS ¡Æ06), Dec. 2006.
- -»³ÆâľºÈ¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
- °ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë1.875-¶á»÷¥¢¥ë¥´¥ê¥º¥à,
- ¿®³Øµ»Êó, vol. 106, no. 405, COMP2006-48, pp. 49-56, 2006ǯ12·î.
- -īעͺ°ì¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤µÈ̶ÅÄÂóϯ¡¤
- ¥µ¥¤¥¯¥ë¥°¥é¥Õ¾å¤Ç¤ÎÃÏ¿ÞºîÀ®ÌäÂê¤ËÂФ¹¤ë½Å¤ßÉÕ¤ºÇ¶á˵¥¢¥ë¥´¥ê¥º¥à,
- ¿®³Øµ»Êó, vol. 106, no. 405, COMP2006-43, pp. 15-22, 2006ǯ12·î.
- //- ´Ý»³ ¿, SCTP¤òÍѤ¤¤¿¥·¥ó¥°¥ë¥¤¥ó¥¿¥Õ¥§¥¤¥¹¤Ç¤Î¥Ï¥ó¥É¥ª¡¼¥Ð¡¼¼Â¸³ (Work In Progress ¸ýƬȯɽ), Internet Conference 2006, Oct. 2006
- -´Ý»³ ¿, ¾®ÄÍ ¿¿·¼, ¾®Ìî Í´²ð, ËÜ¿ ÎÑÉ×, SCTP¤òÍѤ¤¤¿¥·¥ó¥°¥ë¥¤¥ó¥¿¥Õ¥§¥¤¥¹¤Ç¤Î¥Ï¥ó¥É¥ª¡¼¥Ð¡¼¼Â¸³ (Work In Progress ¥Ç¥â¥»¥Ã¥·¥ç¥ó¡Ë, Internet Conference 2006, 2006ǯ10·î.
- -Æ£¸¶æÆ°ìϯ¡¤¸Å¼δÌÀ¡¤²¬Éô¼÷ÃË¡¤
- ¥×¥é¥¤¥Ð¥·¡¼Êݸî¤ËÇÛθ¤·¤¿Shibboleth¤Ë¤ª¤±¤ë°À¸ò´¹¤Î³ÈÄ¥¡¤
- ¿®³Øµ»Êó¡¤vol. 106, no. 309, IA2006-20, pp. 1-6¡¤
- 2006ǯ10·î¡¥
- -Yasuo Okabe,
- Introduction of UPKI Project in Japan,
- 2nd APGrid PMA Meeting
- (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
- pp.51-57, 2007ǯ9·î. (˶¶µ»½Ñ²Ê³ØÂç³Ø)
- -À¶À®Íªµ®¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤
- »îÌäͽÄêɽºîÀ®ÌäÂê¤ÎÀ©ÌóÉÕ¤¥â¥Ç¥ë¤ËÂФ¹¤ëNPº¤ÆñÀ,
- Ê¿À®19ǯÅÙ Âè60²óÅŵ¤´Ø·¸³Ø²ñ¶å½£»ÙÉôÏ¢¹çÂç²ñ, 09-1A-04, p.87, 2007ǯ9·î.¡ÊΰµåÂç³Ø¡Ë
- -Yasuo OKABE,
- Introduction to UPKI Project in Japan,
- TERENA 9th TF-EMC2 Meeting Prague,
- Sept. 2007.
- -Yasuo OKABE,
- MIAKO.net Public Wireless Internet Service in Kyoto, 24th APAN Meeting in Xi'an, Aug. 2007.
- -Yasuo OKABE,
- Japanese University PKI (UPKI) Update, 24th APAN Meeting in Xi'an, Aug. 2007.
- -¿¹Ëܾ°Ç·, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ¥µ¥¤¥¯¥ë¥°¥é¥Õ¾å¤Ç¤ÎÃÏ¿ÞºîÀ®ÌäÂê¤ËÂФ¹¤ëºÇŬ¤Ê¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à, 2007ǯÅٲƤÎLA¥·¥ó¥Ý¥¸¥¦¥à, [9], July 2007.
- -¾®ÎÓ¹ÀÆ󡤵ܺ꽤°ì¡¤²¬Éô¼÷ÃË¡¤
- A Tight Upper Bound on Online Buffer Management for Two-port Shared-Memory Switches,
- ¿®³Øµ»Êó¡¤Vol.107, No.127, COMP2007-26: (invited talk), Oct. 2006.
- -ÂçÄíÈ»¿Í, ¥¥ã¥ó¥Ñ¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ëIDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤȲĻ벽, ITRC20³ØÀ¸¥»¥Ã¥·¥ç¥ó, 2006ǯ10·î.
- -ÅÏÉô°ê·Ã, Ê£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÄó°Æ, ITRC20³ØÀ¸¥»¥Ã¥·¥ç¥ó, 2006ǯ10·î.
- -¾®ÄÍ¿¿·¼, SCTP¤È»ä, ITRC20 ³ØÀ¸¥»¥Ã¥·¥ç¥ó, 2006ǯ10·î.
- -¸Å¼δÌÀ¡¤Æ£À£¡¤²¬Éô¼÷ÃË,¤ß¤¢¤³¥Í¥Ã¥È¼Â¾Ú¼Â¸³¤ÎÁí³ç¤È¤³¤ì¤«¤é,ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯Ï¢·È¥·¥ó¥Ý¥¸¥¦¥à 2006 in ÂÓ¹, 2006ǯ9·î.
- -µÈ̶ÅÄÂóϯ¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤
- ¥ª¥ó¥é¥¤¥óTSP¥¢¥ë¥´¥ê¥º¥à¤ËÂФ¹¤ë²¼¸Â¤Ë¤Ä¤¤¤Æ,
- Ê¿À®18ǯÅÙ Âè59²óÅŵ¤´Ø·¸³Ø²ñ¶å½£»ÙÉôÏ¢¹çÂç²ñ, 10-2A-07, Sep. 2006.
- -Hiroki Takakura,
- Privacy Issues on Network Monitoring and Its Information Sharing,
- 7th Core University Program Seminar on Next Generation Internet Technologies,
- Aug. 2006.
- -Yasuo Okabe,
- WLAN Roaming Architecture for True Ubiquitous Networking,
- 7th Core University Program Seminar on Next Generation Internet Technologies,
- Aug. 2006.
- -´Ý»³¿¡¦¾®ÄÍ¿¿·¼¡¦Ãæ¼ÁÇŵ¡¦²¬Éô¼÷ÃË,
- ¥¢¥É¥ì¥¹¾ðÊó¤ÎÊѹ¹ÄÌÃΤò½¸Ì󤷤ƺÆÁ÷¤Ç¤¤ë¤è¤¦¤Ë¤¹¤ë mSCTP³ÈÄ¥,
- ¿®³Øµ»Êó,
- 2006ǯ7·î
- -À¶À®Íªµ®¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤
- »îÌäͽÄêɽºîÀ®ÌäÂê¤Î·×»»Ê£»¨¤µ,
- ¿®³Øµ»Êó, vol. 106, no. 128, COMP2006-18, pp. 7-14, 2006ǯ6·î.
- //(ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
- //pp.7-14, June, 2006. (ºë¶ÌÂç³Ø¡¤¤µ¤¤¤¿¤Þ»Ô)
- -ÂçÊ¿·ò»Ê¡¦Áס¡Ãæ¼â¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
- ̤ÃΤι¶·â¥³¡¼¥É¤ò°ÂÁ´¤Ë¼ý½¸¤¹¤ë¤¿¤á¤ÎÄêÅÀ´Ñ¬ÁõÃ֤ι½ÃÛ¼êË¡,
- //ÅŻҾðÊóÄÌ¿®³Ø²ñIA¸¦µæ²ñ¡ÊȯɽͽÄê¡Ë
- ¿®³Øµ»Êó, vol. 106, no. 62, IA2006-1, pp. 1-6, 2006ǯ5·î.
- -Å粬À¯´ð¡¦Ã«ËÜÌÐÌÀ¡¦ÊÒ²¬½Ó¹¬¡¦Ê÷Èø¿¿°ì¡¦Á¾º¬¸¶ÅС¦»ûÀ¾Íµ°ì¡¦ÈÓÅľ¡µÈ¡¦²¬Éô¼÷ÃË,
- Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×UPKI¤Ë¤ª¤±¤ëǧ¾ÚÏ¢·ÈÊý¼°¤Î¸¡Æ¤,
- //ÅŻҾðÊóÄÌ¿®³Ø²ñIA¸¦µæ²ñ¡ÊȯɽͽÄê¡Ë
- ¿®³Øµ»Êó, vol. 106, no. 62, IA2006-3, pp. 13-18, 2006ǯ5·î.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#g5c255a6]
- -Yasuo Okabe, Koji Okamura, Kenji Fujikawa, Tomohiro Otani,
- Internet Architecture (IA) Technical Committee,
- IEICE Communications Society Global Newsletter, Vol.19, pp.2-3, Mar. 2007.
- -²¬Éô¼÷ÃË,
- ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Î¥ë¡¼¥Á¥ó¥°¥¢¥ë¥´¥ê¥º¥à¤È¤Õ¤¯¤½¤¦À©¸æ¥¢¥ë¥´¥ê¥º¥à,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ»ï Vol.89, No.4, pp.294-298 (2006)
- -µÜºê½¤°ì,
- ¥ë¡¼¥¿¾å¤Î¥Ð¥Ã¥Õ¥¡´ÉÍýÌäÂê¤ËÂФ¹¤ë¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ»ï Vol.89, No.4, pp.299-303 (2006)
- ** ¹ñºÝɸ½à²½Äó°Æ [#u786a211]
- -R. Stewart, Q. Xie, M. Tuexen, S. Maruyama, M. Kozuka, Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration , IETF Internet-Draft, Nov. 2006
- -S. Maruyama, M. Kozuka, Stream Control Transmission Protocol (SCTP) Cumulative ASCONF chunk transmission extension, IETF Internet-Draft, June 2006
- *2005ǯÅÙ [#kf202dbe]
- **ÏÀʸ»ïÏÀʸ [#decf9e27]
- - ´Ý»³¿, ºÇÅÄ·ò°ì, ¾®ÄÍ¿¿·¼, Àж¶Í³»Ò, ÃÓÅÄ¿´, ¿¹´´É§, ´î¿°ì,
- Virtual Machine¤ò³èÍѤ·¤¿Â絬Ì϶µ°éÍÑ·×»»µ¡¥·¥¹¥Æ¥à¤Î¹½ÃÛµ»½Ñ¤È¹Í»¡,
- ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï,Vol.46, No.4 pp. 949-964(2005)
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#s07ef4e5]
- -Shin Maruyama, Motonori Nakamura, Yasuo Okabe, Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita, Priority Control in Receiving E-mails by Giving a Separate Response to Each DNS Query, SAINT2006, pp.90-93, Jan. 2006.
- -Iwama, K., Miyazaki, S. and Yamauchi, N.,
- A (2-c 1 / ?sqrt{N})-Approximation Algorithm for the Stable Marriage Problem,
- Proc. 16th International Symposium on Algorithms and Computation (ISAAC 2005)
- (Lecture Notes in Computer Science 3827),
- pp. 902-914, Dec., 2005. (Sanya, Hainan, China)
- -K. Ohira, Y. Huang, Y. Okabe, K. Fujikawa, M. Nakamura, Security Analysis on Public Wireless Internet Service Models, WMASH2005, pp. 107-110, Sept. 2005(¥Ý¥¹¥¿¡¼)
- -H. Murai, Y. Okabe, Pipeline Parallelization in HPF programs on the Earth Simulator, HPF international Workshop: Experiences and Progress 2006 (HiWEP2005), Lecture Notes in Computer Science, Vol. 4759, pp.365-373, Sept. 2005
- -K. Ohira, Y. Koyama, K. Fujikawa, Y. Okabe, Automatic Address Assignment for IPv6 End-to-End Multihoming Sites, ICITA2005, Vol II, pp. 755-758, July 2005(¥Ý¥¹¥¿¡¼)
- **¸ýƬȯɽ [#w5321852]
- -Yasuo Okabe,
- UPKI ¡½ Japanese National Academic Authentication and Authorization Platform for Cyber Science Infrastructure,
- NII International Workshop on Cyber Science Infrastructure,
- Mar. 2006.
- -ÃæÌîË, ²¬Éô¼÷ÃË, Ãæ¼ÁÇŵ, ¥Í¥Ã¥È¥Ë¥å¡¼¥¹¥µ¡¼¥Ð·²¤Î¥È¥Ý¥í¥¸¡¼¤Ë¤ª¤±¤ë½ôÀ¼Á¤ÎʬÀÏ, ¾ðÊó½èÍý³Ø²ñÂ裲²ó¥Í¥Ã¥È¥ï¡¼¥¯À¸Âֳإ·¥ó¥Ý¥¸¥¦¥à, Mar. 2006¡Ê¥Ý¥¹¥¿¡¼¡Ë
- -´ä²¼±Ñ½Ó, ²¬Éô¼÷ÃË, ¿ùºêͳŵ, ÀÄÌÚÀµ¼ù, LINPACK¤ÈFFT¤Ë¤è¤ëHPF¥³¥ó¥Ñ¥¤¥éfhpf¤ÎÀ¸»ºÀ¤Îɾ²Á, ¾ð½è¸¦Êó, Vol.2006, No.20, HPC-105, pp.67-72, Feb. 2006.
- -²¬Éô¼÷ÃË, Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¹½ÃۤˤĤ¤¤Æ,
- Ê¿À®17ǯÅÙITBLµ»½ÑÉáµÚ¡¦ÍøÍѤ˴ؤ¹¤ëÁí¹ç¥·¥ó¥Ý¥¸¥¦¥à¡Ö²¾Áۼ¸³¤ÈÂ絬ÌÏ¥·¥ß¥å¥ì¡¼¥·¥ç¥ó¤ÇÂó¤¯Àèü²Ê³Ø2006¡×, Feb.2006.
- -²¬Éô¼÷ÃË,
- Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¹½ÃÛ»ö¶È,
- Âç³ØÅÅ»Òǧ¾Ú´ðÈ×¥·¥ó¥Ý¥¸¥¦¥à¡ÝºÇÀèü³Ø½Ñ¾ðÊó´ðÈסÊCSI¡Ë¤Î¼Â¸½¤Ë¸þ¤±¤¿Á´¹ñÂç³Ø¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈסÊUPKI¡Ë¤Î¹½ÃÛ¡Ý,2006ǯ2·î.
- -¾®ÎÓ¹ÀÆó, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ¥Þ¥ë¥Á¥¥å¡¼¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ, 2005ǯÅÙÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à, [14], Jan. 2006.
- -´Ý»³¿, ¾®ÄÍ¿¿·¼, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, Ê£¿ô¥¢¥É¥ì¥¹Âбþ¤Î¤¿¤á¤ÎSocket API ³ÈÄ¥, ¿®³Øµ»Êó, vol. 105, no. 530, IA2005-27, pp. 49-54, 2006ǯ1·î.
- - ÎëÌÚÏÂÌé, ÇϾì½ÓÊå, ¹âÁÒ¹°´î,
- ̤ÍøÍÑ¥¢¥É¥ì¥¹¥Ö¥í¥Ã¥¯¤ËÅþ㤹¤ë¥È¥é¥Õ¥£¥Ã¥¯¤Î²òÀÏ,
- ¿®³Øµ»Êó, vol. 105, no. 530, IA2005-23, pp. 25-30, 2006ǯ1·î.
- -Yasuo Okabe, Cyberinfrastructure for e-Science, 21st APAN Meeting in Tokyo, Jan. 2006.
- -Yasuo Okabe, UPKI ¡½ Japanese National Academic Authentication and Authorization Platform for Interuniversity Collaboration and Federation,
- 3rd AEARU Workshop on Network Education (Keynote Speech), Dec. 2005.
- -S. Miyazaki and Y. Okabe, Cheat-proof Serverless Network Games, Proc. 4th International Symposium on Computing and Media Studies, pp. 94-101, Jan. 2006.
- -µÜºê½¤°ì¡¤µ×ÊݹÀ»Ë¡¤¹â¸«¹¥ÃË¡¤»ÍÊýÉÒÌÀ¡¤Ý¯°æ¹±Àµ¡¤»³¸µ¿¹¬¡¤²ÏÌîŵ¡¤¹¾¸¶¹¯À¸¡¤¹âÁÒ¹°´î¡¤ÂôÅÄÆƻˡ¤Ãæ¼ÁÇŵ¡¤²¬Éô¼÷ÃË¡¤ËÌÌîÀµÍº¡¤
- KUINSÀܳµ¡´ïÅÐÏ¿¥Ç¡¼¥¿¥Ù¡¼¥¹¤Î³µÍס¤
- Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼ ¸¦µæ³«È¯ÏÀʸ½¸¡¤No.27
- pp.47-51, Oct. 2005.
- -ÃæÌîË, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË,
- ¥Í¥Ã¥È¥Ë¥å¡¼¥¹¥µ¡¼¥Ð·²¤Î¥È¥Ý¥í¥¸¡¼¤¬»ý¤Ä¥¹¥±¡¼¥ë¥Õ¥ê¡¼À¤Ê¤É¤ÎÅý·×ŪÀ¼Á,
- ¿®³Øµ»Êó, vol. 105, no. 377, IA2005-14, pp. 13-18, 2005ǯ10·î.
- -´Ý»³ ¿, ¾®ÄÍ ¿¿·¼,
- Ê£¿ô¥¢¥É¥ì¥¹¤ËÂбþ¤¹¤ë¤¿¤á¤Î Socket API ³ÈÄ¥,
- ITRC18, Oct. 2005.
- -Yasuo Okabe, UPKI ¡½ Interuniversity Authentication and Authorization Platform for Japanese Cyber-Science Infrastructure,20th APAN Meeting¡§Advanced Network Conference in Taipei, Aug. 2005.
- -»³ÆâľºÈ¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë¶É½êõº÷¶á»÷¥¢¥ë¥´¥ê¥º¥à¤Î²þÎÉ, ¿®³Øµ»Êó¡¤Vol.105, No.72, COMP2005-15, pp.45-51, May, 2005.
- -¾®ÎÓ¹ÀÆ󡦵ܺ꽤°ì¡¦²¬Éô¼÷ÃË, ¶¦Í¥á¥â¥ê·¿¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ, ¿®³Øµ»Êó, Vol.105, No.144, COMP2005-21, pp.17-22, June 2005.
- -J. Song, H. Takakura, Y. Okabe, Y. Kwon, A Study on Accuracy Improvement of Intrusion Detection System Based on Data Mining, In Proceedings of KISS (Korea Information Science Society) Korea Computer Congress 2005 , Vol.32, No.1, pp.208-210, July 6-8, 2005.
- -Îú°ìÊ¿, »³°æÀ®ÎÉ, ²¬»³À»É§, µÜ²¼ÂîÌé, ´Ý»³¿, Ãæ¼ÁÇŵ, °¸ÀèÉÔÌÀ¥á¡¼¥ë¤òÍøÍѤ·¤¿Ê¬»¶¶¨Ä´·¿spam¥Õ¥£¥ë¥¿¤Îǧ¼±Î¨¸þ¾å, ¾ðÊó½èÍý³Ø²ñDSM¸¦µæ²ñ, 2005ǯ5·î
- //**¹ñºÝɸ½à²½Äó°Æ
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#i1e79a36]
- -²¬Éô¼÷ÃË, ¼é¤ê¤«¤é¹¶¤á¤Ø:¥»¥¥å¥ê¥Æ¥£¤È¥×¥é¥¤¥Ð¥·¡¼¤Î¥Ñ¥é¥À¥¤¥à¥·¥Õ¥È, ´¬Æ¬¸À, R&D News Kansai, No.429,Nov.2005.
- //**Æõö¡¦¼ÂÍÑ¿·°Æ
- *2004ǯÅÙ [#mfe522fd]
- **ÏÀʸ»ïÏÀʸ [#mbe00e96]
- -H. Ito, K. Iwama, Y. Okabe, T. Yoshihiro,
- Single backup table schemes for shortest-path routing,
- Theoretical Computer Science, 333, pp. 347-353, 2005
- -A. Ishtiaq, Y. Okabe, M. Kanazawa,
- Management of parallel UBR flows over TCP in congested ATM networks,
- Computer Communications, 27, 801-808,
- 2004.
- -Halldorsson, M., Iwama, K., Miyazaki, S. and Yanagisawa, H.,
- Randomized approximation of the stable marriage problem,
- Theoretical Computer Science, Vol. 325, No. 3, pp. 439-465, Oct. 2004.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#d250619f]
- -Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita, Shin Maruyama, Motonori Nakamura,
- Protection Method against Massive Error Mails Caused by Sender Spoofed Spam Mails,
- SAINT2005, Jan. 2005.
- -A. Ishtiaq, Y. Okabe, M. Kanazawa,
- Issues of Multihoming Implementation using SCTP,
- IASTED International Conference on Communication Systems and Applications (CSA2004), 422-162, July 2004.
- -Iwama, K., Miyazaki, S. and Okamoto, K., A (2-c log N/N)-Approximation Algorithm for the Stable Marriage Problem, Proceedings of the 9th Scandinavian Workshop on Algorithm Theory (SWAT 2004), (LNCS 3111), pp. 349-361, July 2004. (Humlebaek, Denmark)
- -¼°æ¶Ñ,²¬Éô¼÷ÃË,Ãϵ奷¥ß¥å¥ì¡¼¥¿¾å¤ÎHPF¤Ë¤è¤ëNAS Parallel Benchmarks¤Î¼ÂÁõ¤Èɾ²Á, SACSIS2004¡½Àè¿ÊŪ·×»»´ðÈ×¥·¥¹¥Æ¥à¥·¥ó¥Ý¥¸¥¦¥à, May 2004.
- **¸ýƬȯɽ [#h8181267]
- -²ÃÆ£¿¿Î¤, ¾®À¾Îɾ°, ÀÄ»³»°»Þ»Ò, ÀÄÌÚ·ÃÈþ»Ò, Æ£ËöË®À¯, º£Â¼¸µ°ì, ²¬Éô¼÷ÃË, µþÅÔ¤¹¤Ð¤ë¹â¹»IT¿Íºà°éÀ®¥×¥í¥¸¥§¥¯¥È¤Ë¤Ä¤¤¤Æ, µþÅÔÂç³Ø³Ø½Ñ¾ðÊó¥á¥Ç¥£¥¢¥»¥ó¥¿¡¼¸¦µæ³«È¯Éô¥·¥ó¥Ý¥¸¥¦¥à, Mar. 2005.
- -ÅÏÉô°ê·Ã, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, ÈþǻƳɧ,
- Ê£¿ô·ÐÏ©¤ò³èÍѤ·¤¿¥Ð¡¼¥¹¥È¥Ñ¥±¥Ã¥È¥í¥¹¤Ë¶¯¤¤¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ2005ǯÁí¹çÂç²ñ¥Ý¥¹¥¿¡¼¥»¥Ã¥·¥ç¥ó, Mar. 2005.
- -¸Å¼δÌÀ, Ë̸¶Î¼, Æ£À£, ¾å¸¶Å¯ÂÀϺ, ²¬Éô¼÷ÃË,
- ¤ß¤¢¤³¥Í¥Ã¥È¤Ç¤Î¼Â»þ´ÖÆ°²èÁü¥Þ¥ë¥Á¥¥ã¥¹¥È¼Â¸³
- ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½ÑÊó¹ð, NS2004-199, pp.101-106, Feb. 2005.
- -Y. Huang, K. Ohira, K. Fujikawa, Y. Okabe, Secure Models of Autonomous Distributed Public Wireless Internet Access, DPS, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 2005-DPS-122&2005-CSEC-28 pp. 187-192, Mar 2005.
- -¹âÌÚ¼£É×,²¬Éô¼÷ÃË,Æ£À£,¸Å¼δÌÀ,Ë̲¬Í´î,¡Ø¤ß¤¢¤³¥Í¥Ã¥ÈÊý¼°¡Ù¤Ç¼Â¸½¡½°Â¿´¡¦°ÂÁ´¤òÀ¸¤à¶¦Íºâ¤È¤·¤Æ¤Î̵ÀþLAN,
- ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯Ï¢·È¥ï¡¼¥¯¥·¥ç¥Ã¥×inµþÅÔ2004, Jul 2004.
- -ÂçÊ¿·ò»Ê,¾®»³Íΰì,Æ£À£,²¬Éô¼÷ÃË, IPv6¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¤Î¤¿¤á¤Î¥¢¥É¥ì¥¹³äÅö¤ÈÁ÷¿®¸µ¥¢¥É¥ì¥¹¤ò¹Íθ¤·¤¿·ÐÏ©À©¸æ,
- ¿®³Øµ»Êó, vol. 104, no. 173, IA2004-11, pp. 25-30,2004ǯ7·î.
- //QAI, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 2004-QAI-12 pp.25-30, Jul 2004.
- -Ãæ¼ÁÇŵ,ȬÌÚ·¼²ð,²¬Éô¼÷ÃË,
- IIDC 1394 Digital Camera over IP ¤Ë¤è¤ë±ó³Ö¹ÖµÁÍѹâÉʰ̱ÇÁüÅÁÁ÷¥·¥¹¥Æ¥à¤Î¼ÂÁõ¤È¥×¥í¥È¥³¥ë,
- ITRC15, May 2004.
- -Æ£À£,¾¾Ëܸ»Ë,¾®ÄÍ¿¿·¼,²¬Éô¼÷ÃË,
- TCP ¥Þ¥ë¥Á¥Û¡¼¥à¥ª¥×¥·¥ç¥ó¤Î¼ÂÁõ¤È SOCKS ¥µ¡¼¥Ð¤Ø¤Î±þÍÑ,
- ITRC15, May 2004.
- -ÂçÊ¿·ò»Ê,¾®ÄÍ¿¿·¼,¾®»³Íΰì,Æ£À£,²¬Éô¼÷ÃË,Hop-by-Hop Address Assignment and Source Address Based Routing for IPv6 End-to-End Multihoming, ITRC15, May 2004.
- -²«±Ï,Ãæ¼ÁÇŵ,²¬Éô ¼÷ÃË,¸ø³«¸°°Å¹æ¤Ë¤è¤ëÅŻҽð̾¤òÍѤ¤¤¿¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¢¥¯¥»¥¹Êý¼°¤ÎÄó°Æ,ITRC15,May 2004.
- //-¸Å¼δÌÀ,¤ß¤¢¤³¥¥ã¥¹¥È¤Î¾Ò²ð ¡Á¤ß¤¢¤³¥Í¥Ã¥È¤Ç¤Î̵Àþ¥Þ¥ë¥Á¥¥ã¥¹¥È¼Â¸³¡Á,ITRC15, May 2004.
- -²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤¶É½êõº÷Ë¡¤Ë¤è¤ë°ÂÄê·ëº§ÌäÂê¤Î¶á»÷,¿®³Øµ»Êó¡¤Vol.104, No.16, COMP2004-8,pp.53-60, April, 2004.
- -»³°æÀ®ÎÉ¡¦ÈËÅÄŸ»Ë¡¦²¬»³À»É§¡¦µÜ²¼ÂîÌ顦´Ý»³¡¡¿¡¦Ãæ¼ÁÇŵ, ȯ¿®¼Ôº¾¾Îspam ¥á¡¼¥ë¤Ëµ¯°ø¤¹¤ë¥¨¥é¡¼¥á¡¼¥ë½¸Ãæ¤Ø¤ÎÂкö¼êË¡, ¾ðÊó½èÍý³Ø²ñ FIT2004 Âè3²ó¾ðÊó²Ê³Øµ»½Ñ¥Õ¥©¡¼¥é¥à, 2004ǯ9·î
- //**¹ñºÝɸ½à²½Äó°Æ
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#w71cf1dd]
- -¸Å¼δÌÀ,ÂçÊ¿·ò»Ê,Æ£À£,²¬Éô¡¡¼÷ÃË,
- //''̵ÀþLANµ»½Ñ¤òÍøÍѤ·¤¿¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Î¹½ÃÛ:4.̵ÀþLAN¤Ë¤è¤ë°ÜÆ°ÂÎÄÌ¿®¤Î»öÎã4.3
- ̵ÀþLAN¤Ë¤è¤ë¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹ ¤ß¤¢¤³¥Í¥Ã¥È
- ¾ðÊó½èÍý³Ø²ñ»ï, Vol.45 No.8, 831-835, Aug 2004.
- -²¬Éô¼÷ÃË,ËåÈøµÁ¼ù,´ä²¼±Ñ½Ó,
- ¼¡À¤Â女¥ó¥Ô¥å¡¼¥¿¤Ë¸þ¤±¤¿µ»½ÑŸ˾¤È¾Íè¤Ø¤Î´üÂÔ,
- ¥×¥é¥º¥Þ¡¦³ËÍ»¹ç³Ø²ñ»ï, Âè80´¬Âè5¹æ, 382-389, May 2004.
- -µÜºê½¤°ì, °ÂÄê·ëº§ÌäÂê, ÅŻҾðÊóÄÌ¿®³Ø²ñ²ñ»ï, Vol.88, No.3, pp. 195-199, March 2005.
- //**Æõö¡¦¼ÂÍÑ¿·°Æ
- *2003ǯÅÙ [#c07cd76a]
- **ÏÀʸ»ïÏÀʸ [#z37d390e]
- -¹âÁÒ¹°´î¡¤¹¾¸¶¹¯À¸¡¤µÜºê½¤°ì¡¤ÂôÅÄÆƻˡ¤Ãæ¼ÁÇŵ¡¤²¬Éô¼÷ÃË¡¤°ÂÁ´¤Ê¥®¥¬¥Ó¥Ã¥È¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à KUINS-III ¤Î¹½À®¤È¥»¥¥å¥ê¥Æ¥£Âкö, ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï Vol.J86-B No.8 ,pp. 1494-1501, Aug. 2003.
- -ÂôÅÄ ÆÆ»Ë, ¹âÁÒ ¹°´î, ²¬Éô ¼÷ÃË,
- ³«Êü·¿Â絬Ìϥͥåȥ¥¯¤Î¤¿¤á¤ÎIDS¥í¥°´Æ»ë»Ù±ç¥·¥¹¥Æ¥à,
- ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, Vol.44, No.8, pp.1861-1871, Aug. 2003.
- -Halldorsson, M., Irving, R., Iwama, K., Manlove, D., Miyazaki, S., Morita, Y. and Scott, S. Approximability Results for Stable Marriage Problems with Ties, Theoretical Computer Science, Vol. 306, pp. 431-447, Sept. 2003.
- -Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro,
- Avoiding Routing Loops in the Internet,
- Theory of Computing Systems, 36, 597-609, 2003.
- **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#lfdcbdc1]
- -Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro,
- Polynomial-Time Computable Backup Tables for Shortest-Path Routing,
- The 10th International Colloquium on Structural Information and
- Communication Complexity (SIROCCO 2003), pp.163-177, June 2003.
- -Halldorsson, M., Iwama, K., Miyazaki, S. and Yanagisawa, H. Randomized Approximation of the Stable Marriage Problem, Proceedings of the ninth Annual International Computing and Combinatorics Conference (COCOON 2003), (LNCS 2697), pp. 339-350, July 2003. (Big Sky, USA)
- -Komura, T., Fujikawa, K., and Okabe, Y., The MIAKO.NET Public Wireless Internet Service in Kyoto, Proc. of the First ACM International Workshop on Wireless Mobile Applications and WLAN Hotspots (WMASH2003), September 2003.
- -Halldorsson, M., Iwama, K., Miyazaki, S. and Yanagisawa, H., Improved Approximation of the Stable Marriage Problem, Proceedings of the 11th Annual European Symposium on Algorithms (ESA 2003), (LNCS 2832), pp. 266-277, Sep. 2003. (Budapest, Hungary)
- -Komura, T., Kosuga, M., Fujikawa, K., and Okabe, Y., Design and Implementation of the MIAKO.phone Peer-to-peer Mobile IP Phone System, 5th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT2003), November 2003.
- **¸ýƬȯɽ [#n0a29547]
- -½ïÊý ¾¡Ìé, ÂçÊ¿ ·ò»Ê, ¸Å¼ δÌÀ, ¤ß¤¢¤³¥Í¥Ã¥È¤Î¥Í¥Ã¥È¥ï¡¼¥¯¹½À®¤ÈIPv6Âбþ, Âè13²ó ITRCÁí²ñ¡¦¸¦µæ²ñ, May 2003.
- -ÂçÊ¿ ·ò»Ê, ½ïÊý ¾¡Ìé, ¾¾ËÜ Â¸»Ë, Æ£Àî ¸¼£, ²¬Éô ¼÷ÃË, End-to-End¥Þ¥ë¥Á¥Û¡¼¥à¤Î¤¿¤á¤ÎIPv6¥¢¥É¥ì¥·¥ó¥°¥¢¡¼¥¥Æ¥¯¥Á¥ã, Âè13²ó ITRCÁí²ñ¡¦¸¦µæ²ñ, May 2003.
- -¾¾ËÜ Â¸»Ë, Æ£Àî ¸¼£, ²¬Éô ¼÷ÃË, End-to-End¥Þ¥ë¥Á¥Û¡¼¥àÂбþTCP¤ÎÀ߷פȳ«È¯, ITRC2003 ,21 May, 2003.
- -ÂçÊ¿·ò»Ê, ½ïÊý¾¡Ìé, ¾¾Ëܸ»Ë, Æ£À£, ²¬Éô¼÷ÃË, End-to-End ¥Þ¥ë¥Á¥Û¡¼¥à¤Î¤¿¤á¤ÎIPv6¥¢¥É¥ì¥·¥ó¥°¥¢¡¼¥¥Æ¥¯¥Á¥ã, ¾ðÊó½èÍý³Ø²ñ ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¦Ê¬»¶¡¦¶¨Ä´¤È¥â¡¼¥Ð¥¤¥ë(DICOMO2003)¥·¥ó¥Ý¥¸¥¦¥à, Jun 2003.
- -²«±Ï,¿¼¯ÍÛ²ð,Ãæ¼ÁÇŵ,ÈþǻƳɧ, ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¥¢¥×¥é¥¤¥¢¥ó¥¹¤ÎÁêÂаÌÃÖ¤ÈÍøÍÑÍúÎò¤ò³èÍѤ·¤¿¥µ¡¼¥Ó¥¹¤ÎÄó¼¨Êý¼°, ¾ðÊó½èÍý³Ø²ñ ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¦Ê¬»¶¡¦¶¨Ä´¤È¥â¡¼¥Ð¥¤¥ë(DICOMO2003)¥·¥ó¥Ý¥¸¥¦¥à, Jun 2003.
- -½ïÊý¾¡Ìé, ÂçÊ¿·ò»Ê, Æ£À£, ²¬Éô¼÷ÃË, IPv6 end-to-end multihoming¤Ë¤è¤ëRSVP¤Î¥â¥Ð¥¤¥ëÂбþ, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 03-QAI, October 2003.
- -Æ£À£, ¸Å¼δÌÀ, ²¬Éô¼÷ÃË, µþÅÔ̵Àþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥×¥í¥¸¥§¥¯¥È ¤ß¤¢¤³¥Í¥Ã¥È, Ê¿À®15ǯÅŵ¤´Ø·¸³Ø²ñ´ØÀ¾»ÙÉôÏ¢¹çÂç²ñ S8-3 Nobember 2003.
- -K. Ohira, K. Ogata, A. Matsumoto, K. Fujikawa, Y. Okabe, IPv6 Address Assignment and Route Selection for End-to-End Multihoming, Âè14²ó ITRCÁí²ñ¡¦¸¦µæ²ñ, November 2003.
- -²ÃÆ£½Óºö¡¤µÜºê½¤°ì¡¤²¬Éô¼÷ÃË,ÉÔÀµ¤ò¸¡½Ð¤Ç¤¤ë¥Í¥Ã¥È¥ï¡¼¥¯·³¿Í¾´ý, ¿®³Øµ»Êó¡¤ Vol.103, No.499, ISEC2003-84,pp.1-6, Dec., 2003.
- -A. Matsumoto, M. Kozuka, K. Fujikawa, Y. Okabe, TCP Multi-Home Options, WIT2003, 5 Nov, 2003.
- -ÀîÀ¾ÃÒÌé, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, ÈþÇ» Ƴɧ,
- FEC¤ÈPath-Diversity¤òÍøÍѤ·¤¿²óÉü²Äǽ¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 2003-DPS 116-014, Jan. 2004.
- -¸Å¼δÌÀ, ÂçÊ¿·ò»Ê, Æ£À£, ²¬Éô¼÷ÃË, ¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥×¥í¥¸¥§¥¯¥È¡Ö¤ß¤¢¤³¥Í¥Ã¥È¡×¤Î±¿Íѵ»½Ñ, ¾ðÊó½èÍý³Ø²ñʬ»¶¥·¥¹¥Æ¥à/¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à2004 (DSM2004), February 2004.
- -FUJIKAWA Kenji, KOMURA Takaaki, OKABE Yasuo, The MIAKO.NET Public Wireless Internet Service in Kyoto, Proceedings of International Conference on Informatics Research for Development of Knowledge Society Infrastructure 2004, March 2004.
- -²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë¶É½êõº÷¶á»÷¥¢¥ë¥´¥ê¥º¥à,ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ2004 D-1-2, March 2004.
- -²¬Éô¼÷ÃË,
- ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Î´ðÁà ¡½¥¢¥ë¥´¥ê¥º¥à¤ÎΩ¾ì¤«¤é¡½,
- ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ2004 TD-1-1, March 2004.
- -´Ý»³¿, Ãæ¼ ÁÇŵ, ²¬Éô¼÷ÃË, »³°æÀ®ÎÉ,
- ưŪ¤Ë±þÅú¤¬ÊѲ½¤¹¤ë¥Í¡¼¥à¥µ¡¼¥Ð¡¼µ»½Ñ¤Î¥á¡¼¥ëÇÛÁ÷¥¨¡¼¥¸¥§¥ó¥È¤Ø¤Î±þÍÑ,
- ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 03-DSM, 032-014, March 2004.
- -Îú¡¡°ìÊ¿¡¦»³°æÀ®ÎÉ¡¦²¬»³À»É§¡¦µÜ²¼ÂîÌ顦´Ý»³¡¡¿¡¦Ãæ¼ÁÇŵ, ÃÙ±äɾ²Á¤Ë¤è¤ëʬ»¶¶¨Ä´·¿spam ¥Õ¥£¥ë¥¿¤Î¸¡½ÐΨ¸þ¾å, Ê¿À®15ǯÅÙCSEC¸¦µæȯɽ²ñ Âè24²ó, 2004ǯ3·î
- -´Ý»³ ¿¡¦ºÇÅÄ·ò°ì¡¦¾®ÄÍ¿¿·¼¡¦Àж¶Í³»Ò¡¦ÃÓÅÄ¿´¡¦¿¹´´É§¡¦´î¿°ì, Virtual Machine ¤ò³èÍѤ·¤¿Ê¬»¶½èÍý¥·¥¹¥Æ¥à¹½ÃÛ¡¦±¿Íѵ»½Ñ¡¿¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à2004, 2004ǯ1·î
- **¹ñºÝɸ½à²½Äó°Æ [#b6da6a8c]
- -Arifumi Matsumoto, Kenji Fujikawa, Yasuo, Okabe, Basic Socket API Extension for LIN6 End-to-End Multi-home, IETF Internet-Draft, 23 June 2003.
- -Arifumi Matsumoto, Masahiro, Kozuka, Kenji Fujikawa, Yasuo Okabe, TCP Multi-Home Options, IETF Internet-Draft, 7 Oct 2003.
- -Arifumi Matsumoto, Masahiro, Kozuka, Kenji Fujikawa, Yasuo Okabe, TLC-FM, IETF Internet-Draft, 7 Oct 2003.
- -K. Ohira, K. Ogata, A. Matsumoto, K. Fujikawa, Y. Okabe, IPv6 Address Assingment and Route Selection for End-to-End Multihoming, IETF Internet-Draft, November 2003.
- **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#eba88f13]
- -²¬Éô¼÷ÃË,
- µþÅԤˤª¤±¤ëIT¤ò³èÍѤ·¤¿Âç³Ø¤ÎÃϰ趵°é¹×¸¥,
- View Point, Âè4¹æ, 10-15, Mar. 2004.
- //**Æõö¡¦¼ÂÍÑ¿·°Æ