• *2016ǯÅÙ [#x7e1ab0d]
  • **ÏÀʸ»ïÏÀʸ [#e7cd72c0]
    • Jun Kawahara, Koji M. Kobayashi, and Shuichi Miyazaki,
  • Better Bounds for Online k-frame Throughput Maximization in Network Switches,
  • Theoretical Computer Science, Vol. 657, pp. 173-190, January, 2017.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#xb93737a]
    • Yoshiharu Tsuzaki, Yasuo Okabe,
  • Reactive Configuration Updating for Intent-Based Networking,
  • The 31st International Conference on Information Networking (ICOIN2017),
  • Jan. 2017.
    • Yoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Okamoto Manabu,
  • Identifying Link Layer Home Network Topologies Using HTIP,
  • 14th Annual IEEE Consumer Communications & Networking Conference,
  • pp. 892-899, Jan. 2017.
  • User Identification of Pseudonyms without Identity Information Exposure in Access Federations,
  • Proc. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC2016), Vol. 1, pp.487-492, June 2016.
    • Yasuo Okabe, Takaaki Komura, Hiroyuki Sato, Kazutsuna Yamaji, Motonori Nakamura,
  • An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other,
  • Second IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking (MidCCI2016),
  • in Proc. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC2016), Vol. 2, pp.202-207, June 2016.
    • Teruhisa Tajima, Yasuo Okabe,
  • Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN,
  • The 4th IEEE International Workshop on Consumer Devices and Systems (CDS),
  • in Proc. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC2016), Vol. 2, pp.312-318, June 2016.
  • **¸ýƬȯɽ¤Ê¤É [#c193ab26]
    • »³ºê·¼ÂÀϺ, ¾®Ã«ÂçÍ´, ²¬Éô¼÷ÃË, HTML¤Î¥Æ¥ó¥×¥ì¡¼¥ÈÉü¸µ¤òÍøÍѤ·¤¿XSS¥Õ¥£¥ë¥¿, ÅŻҾðÊóÄÌ¿®³Ø²ñ2017ǯÁí¹çÂç²ñ BS-5-10, 2017ǯ3·î.
    • ¾®Ã«ÂçÍ´
  • ¥¢¥¸¥ã¥¤¥ë·¿¶¦ÁϤˤè¤ë¹âÎð¼ÔÊä½õ¥í¥Ü¥Ã¥ÈÍѥͥåȥ¥¯¥×¥é¥Ã¥È¥Õ¥©¡¼¥àµ»½Ñ¤Î¸¦µæ³«È¯,
  • Âè11²óÃÏ°è´Ö¥¤¥ó¥¿¡¼¥¯¥é¥¦¥É¥ï¡¼¥¯¥·¥ç¥Ã¥×,
  • 2017ǯ3·î.
    • µÜºê½¤°ì,
  • °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤òÍøÍѤ·¤¿ÇÛ°¥¢¥ë¥´¥ê¥º¥à¤Î¸¦µæ,
  • µþÅÔÂç³ØÂè11²óICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2017ǯ2·î.
    • ²¬Éô¼÷ÃË
  • ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
  • ²Ê³Øµ»½Ñ̤ÍèÀïά¥ï¡¼¥¯¥·¥ç¥Ã¥×¡Ö̤Í襨¥Í¥ë¥®¡¼¥Í¥Ã¥È¥ï¡¼¥¯¤È¼ûÍײʳء×,
  • 2017ǯ1·î.
    • ²¬Éô¼÷ÃË
  • ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
  • Âè°ì²ó¥¹¥Þ¡¼¥È¥¨¥Í¥ë¥®¡¼¥Þ¥Í¥¸¥á¥ó¥È¥·¥ó¥Ý¥¸¥¦¥à ¡Á³×¿·ÅªÅÅÎϥޥͥ¸¥á¥ó¥È¥·¥¹¥Æ¥à¤Î¹½ÃÛ¤òÌܻؤ·¤Æ¡Á,
  • 2016ǯ12·î.
    • Antonio Kung, Yasuo Okabe,
  • ACCRA: Agile £ÃoCreation of Robots for Ageing,
  • Global Innovation Forum on Active and Healthy Ageing,
  • Dec. 2016.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#e3b68fd9]
  • **¤½¤Î¾ [#g885138e]
    • µÜºê½¤°ì, ¥³¥ó¥Ô¥å¡¼¥¿¥µ¥¤¥¨¥ó¥¹¤Î¿ô³Ø¡¡¡Á¥¢¥ë¥´¥ê¥º¥àÍýÏÀ¡¢°ÂÄê·ëº§ÌäÂê¡¢P¡âNPͽÁÛ¡Á, µþÅÔÂç³Ø¥µ¥Þ¡¼¥¹¥¯¡¼¥ë2016, 2016ǯ8·î19Æü
  • *2015ǯÅÙ [#ncb48501]
  • **ÏÀʸ»ïÏÀʸ [#v2584e06]
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#udb3096b]
    • Daisuke Kotani, Yasuo Okabe, Fast Failure Detection of OpenFlow? Channels, Proc. The 11th Asian Internet Engineering Conference (AINTEC 2015), November 18-20, 2015.
    • Chien-Chung Huang, Kazuo Iwama, Shuichi Miyazaki, Hiroki Yanagisawa,
  • A Tight Approximation Bound for the Stable Marriage Problem with Restricted Ties, Proc. 18th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX 2015), pp. 361-380, August 24-26, 2015. (KURENAI)
    • Naoki Tsujio, Yasuo Okabe,
  • A Traceable and Psudonymous P2P Information Distribution System,
  • The 1st IEEE International Workshop on Middleware for Cyber Security, Cloud
  • Computing and Internetworking (MidCCI2015),
  • in Proc. 39th Annual International Computers, Software & Applications Conference (COMPSAC2015),
  • Taichung, Taiwan, pp.67-72, July 1-5, 2015.
    • Tomotaka Maeda, Hiroki Nakano, Naoyuki Morimoto, Kazumi Sakai, Yasuo Okabe,
  • Design and Implementation of an On-demand Home Power Management System based on a Hierarchial Protocol,
  • The 3rd IEEE International Workshop on Consumer Devices and Systems (CDS2015),
  • in Proc. 39th Annual International Computers, Software & Applications Conference (COMPSAC2015),
  • Taichung, Taiwan, pp.188-193, July 1-5, 2015.
    • Shuichi Miyazaki, Naoyuki Morimoto, Yasuo Okabe,
  • Approximability of Two Variants of Multiple Knapsack Problems,
  • Proc. 9th International Conference on Algorithms and Complexity (CIAC 2015) (Lecture Notes in Computer Science 9079), pp. 365-376, May 20-22, 2015.
  • **¸ýƬȯɽ¤Ê¤É [#uc73a6a9]
  • ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥×¥í¥È¥³¥ë¤ÎÀß·×,
  • µþÅÔÂç³ØÂè10²óICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2016ǯ2·î.
    • µÜºê½¤°ì,
  • °ÂÄê¥Þ¥Ã¥Á¥ó¥°¤òÍøÍѤ·¤¿ÇÛ°¥·¥¹¥Æ¥à¤Î¸¦µæ,
  • µþÅÔÂç³ØÂè10²óICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2016ǯ2·î.
    • ²¬Éô¼÷ÃË,
  • ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
  • Âè18²óµþÅÔÂç³Ø-NTT IMC¸¦µæ²ñ, 2016ǯ1·î.
    • ²¬Éô¼÷ÃË,
  • ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎÏÇÛÁ÷¤ÈÅÅÎϤΥѥ±¥Ã¥È²½,
  • ÅìËÌÂç³ØÅŵ¤ÄÌ¿®¸¦µæ½êÊ¿À®27ǯÅÙ¶¦Æ±¥×¥í¥¸¥§¥¯¥È¸¦µæ¹çƱȯɽ²ñ, 2015ǯ11·î.
    • ºä°æ°ìÈþ, ÃæÌîÇî¼ù, ²¬Éô¼÷ÃË,
  • ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥×¥í¥È¥³¥ë¤ÎÀß·×,
  • Âè38²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¸¦µæ²ñŸ¼¨¥Ç¥â¾Ò²ð¥»¥Ã¥·¥ç¥ó¡¤2015ǯ11·î.
  • EduroamShib?: a privacy-aware eduroam account issuing system based on the GakuNin? Shibboleth federation,
  • IAM (Identity and Access Management ) WG, 40th Asia Pacific Advanced Network Meeting,
  • Aug. 2015.
    • º´Æ£¼þ¹Ô¡¦²¬Éô¼÷ÃË¡¦Ãæ¼ÁÇŵ,
  • ǧ¾ÚÏ¢·È¤Ë¤ª¤±¤ë²¾Ì¾À­¤òôÊݤ·¤¿¥æ¡¼¥¶Æ±°ìÀ­¤Î³Îǧ,
  • ¾ðÊó½èÍý³Ø²ñ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2015)¥·¥ó¥Ý¥¸¥¦¥àÏÀʸ½¸ [¾ðÊó½èÍý³Ø²ñ¥·¥ó¥Ý¥¸¥¦¥à¥·¥ê¡¼¥º], Vol.2015, No.1, pp.890-895, 2015ǯ7·î.
    • ²¬Éô¼÷ÃË, Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£Âкö¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¤Î¿»Æ©
  • ¡Ê´ðÄ´¹Ö±é¡Ë,
  • CAUA FORUM 2015 Âç³Ø¤Ë¤ª¤±¤ë¥µ¥¤¥Ð¡¼¥»¥­¥å¥ê¥Æ¥£¤Î¤³¤ì¤«¤é, 2015ǯ6·î.
    • ²¬Éô¼÷ÃË,
  • ¾ðÊóή¤ò°·¤¦¾å¤Ç¤Î¥»¥­¥å¥ê¥Æ¥£¤È¥×¥é¥¤¥Ð¥·¡¼¤Î²ÝÂê,
  • Âè2²ó¾ðÊóή¥·¥ó¥Ý¥¸¥¦¥à, 2015ǯ5·î30Æü.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#a70846f9]
    • ²¬Éô¼÷ÃË,
  • Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£Âкö¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¤Î¿»Æ©,
  • View Point, Âè16¹æ, pp.10-15, Mar. 2016.
    • ¹â¶¶Å°¡¦ÉÛÌÜÉÒϺ¡¦²¬Éô¼÷ÃË,
  • ³Ø½Ñ³èÆ°¤Ë¤Ä¤¤¤Æ,
  • ¡Ú²òÀâ¡ÛÅŻҾðÊóÄÌ¿®³Ø²ñ¤Ã¤Æ²¿¤ò¤·¤Æ¤¤¤ë¤Î¡©¡½¶ñÂÎŪ¤Ê³èÆ°¤òÃÎ¤í¤¦¡½,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÄÌ¿®¥½¥µ¥¤¥¨¥Æ¥£¥Þ¥¬¥¸¥ó, 2016ǯ½Õ¹æ¡ÊÂè36¹æ¡Ë, pp.208-211, 2016ǯ3·î1Æü.
    • ²¬Éô¼÷ÃË,
  • ¡ÚÄÌ¿®¤¬¤ß¤¨¤ë°ìËç¤Î¼Ì¿¿¡Û¥¬¥á¥é¥ì¡¼¥À,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÄÌ¿®¥½¥µ¥¤¥¨¥Æ¥£¥Þ¥¬¥¸¥ó, 2015ǯ²Æ¹æ(Âè33¹æ¡Ë, ɽ3, 2015ǯ6·î1Æü.
  • **¤½¤Î¾ [#dbb25b67]
  • *2014ǯÅÙ [#e35b9b65]
  • **ÏÀʸ»ïÏÀʸ [#t65c2241]
  • On the advice complexity of online bipartite matching and online stable marriage,
  • Information Processing Letters, Vol.114, Issue 12, pp. 714-717, December 2014.
    • ¾¾ËÜ Î¼²ð¡¦²¬Éô ¼÷ÃË,
  • mod_mruby¡§¥¹¥¯¥ê¥×¥È¸À¸ì¤Ç¹â®¤«¤Ä¾Ê¥á¥â¥ê¤Ë³ÈÄ¥²Äǽ¤ÊWeb¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½ ,
  • ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, Vol.55, No.11, pp.2451-2460, 2014ǯ11·î
    • Hiroyuki Sato, Yasuo Okabe, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura,
  • Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach,
  • Journal of Information Processing, Vol. 22, No. 3 pp. 464-471, July 2014.
    • Takeshi Nishimura, Motonori Nakamura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe,
  • Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding,
  • Journal of Information Processing Vol. 22, No. 3 pp. 472-479, July 2014.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#x06488f9]
    • Yoshiharu Tsuzaki, Yasuo Okabe, Ray Atarashi, Tatsuya Hayashi, Development of an Automatic Managing System of Wide-area Distributed Networks with Defined Network Specification, 1st International Workshop on Management of SDN and NFV Systems (ManSDN/NFV 2014), November 2014.
    • Daisuke Kotani, Yasuo Okabe,
  • A Packet-In Message Filtering Mechanism for Protection of Control Plane in OpenFlow? Networks, The 10th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS2014), pp.29-40, October 2014.
    • Masayuki Tsubouchi, Tomotaka Maeda, Yasuo Okabe,
  • Digital Fingerprinting on Executable File for Tracking Illegal Uploaders,
  • 6th IEEE International Workshop on Computer Forensics in Software Engineering (CFSE2014), (Proc. IEEE COMPSAC2014 Workshops), pp.325-330, July 2014.
  • **¸ýƬȯɽ¤Ê¤É [#m3ce790d]
    • Andrew Lee, µÜºê½¤°ì, ²¬Éô¼÷ÃË,
  • Ê£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎºÇ¾®Ä¾·ÂÊ£¿ô¥¹¥¿¥¤¥Ê¡¼ÌÚÌäÂê,
  • ¾ðÊó½èÍý³Ø²ñÂè77²óÁ´¹ñÂç²ñ, 4W-09, 2015ǯ3·î.
    • ÄÔÈø¾°¼ù, ²¬Éô¼÷ÃË,
  • ȯ¿®¼ÔÄÉÀײÄǽ¤«¤Ä²¾Ì¾·¿¤ÎP2P¾ðÊóȯ¿®¥·¥¹¥Æ¥à,
  • ¾ðÊó½èÍý³Ø²ñÂè77²óÁ´¹ñÂç²ñ, 4X-02, 2015ǯ3·î.
    • ÅÄÅç¾Èµ×, ²¬Éô¼÷ÃË,
  • Web¥Ö¥é¥¦¥¸¥ó¥°¹â®²½¤Î¤¿¤á¤ÎTCP¥Ø¥Ã¥À¤Ë´ð¤Å¤¯802.11̵ÀþÄÌ¿®ºÇŬ²½,
  • ¾ðÊó½èÍý³Ø²ñÂè77²óÁ´¹ñÂç²ñ, 3X-06, 2015ǯ3·î, ³ØÀ¸¾©Îå¾Þ¼õ¾Þ.
    • Andrew Lee, µÜºê½¤°ì, ²¬Éô¼÷ÃË,
  • Ê£¿ôVLANËä¤á¹þ¤ß¤Î¤¿¤á¤ÎìÅÍߥ¢¥ë¥´¥ê¥º¥à¤Îɾ²Á,
  • ¿®³Øµ»Êó, vol. 114, no. 495, IA2014-105, pp. 143-147, 2015ǯ3·î.
    • ºä°æ°ìÈþ, ²¬Éô¼÷ÃË, ÃæÌîÇî¼ù,
  • ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥·¥ß¥å¥ì¡¼¥¿,
  • µþÅÔÂç³ØÂè9²óICT¥¤¥Î¥Ù¡¼¥·¥ç¥ó, 2015ǯ3·î.
    • À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²¬Éô ¼÷ÃË,
  • ¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à¤Ë¤ª¤±¤ë¥°¥ë¡¼¥×´ÉÍý¼Ô¤Î¸úΨŪ´ÉÍý,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, 2015-IOT-28, 35, pp.1-6, 2015ǯ2·î.
    • ²¬Éô¼÷ÃË,
  • Energy on DemandÅÅÎÏÀ©¸æ¤Î¤¿¤á¤ÎÅÅÎϼûÍ×ͽ¬¤È¥×¥é¥¤¥Ð¥·¡¼,
  • ÅìËÌÂç³ØÅŵ¤ÄÌ¿®¸¦µæ½êÊ¿À®26ǯÅÙ¶¦Æ±¥×¥í¥¸¥§¥¯¥È¸¦µæ¡Ö¾ðÊó¤Îή¤ì¤ËÃåÌܤ·¤¿¿·À¤Âå¾ðÊó½èÍý´ðÈ×µ»½Ñ¤Ë´Ø¤¹¤ë¸¦µæ¡×ȯɽ²ñ, 2014ǯ12·î.
    • ÄźêÁ±À², ²¬Éô¼÷ÃË, ¿·Îï, ÎÓãÌé, ²¬ÅĹ̻Ê, ÎëÌÚÌкÈ, Ãæ¼½¤, LACCOONS:¥Í¥Ã¥È¥ï¡¼¥¯»ÅÍÍÄêµÁ¤Ë¤è¤ë¹­°èʬ»¶¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°±¿ÍÑ´ÉÍý¥·¥¹¥Æ¥à,
  • Âè36²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¸¦µæ²ñCISʬ²Ê²ñ¡¤2014ǯ11·î.
    • ºä°æ°ìÈþ, ²¬Éô¼÷ÃË, ÅÅÎϥѥ±¥Ã¥ÈÇÛÁ÷¥×¥í¥È¥³¥ë¤Î¸¡Æ¤,
  • Âè36²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¸¦µæ²ñ¥Ç¥â¾Ò²ð¥»¥Ã¥·¥ç¥ó¡¤2014ǯ11·î.
    • ÄÔÈø¾°¼ù,²¬Éô¼÷ÃË,
  • ¼«¼£¤¬²Äǽ¤ÊP2P·¿Æ¿Ì¾Publish/Subscribe¥·¥¹¥Æ¥à,
  • ¿®³Øµ»Êó, Vol. 114, No. 335, IA2014-63, pp.13-27, 2014ǯ11·î.
    • ÅÄÅç¾Èµ×,²¬Éô¼÷ÃË,
  • 802.11̵ÀþLAN¤Ë¤ª¤±¤ë¥Ð¥Ã¥¯¥ª¥Õ»þ´Ö¤ÎÀ©¸æ¤È¥¢¥¯¥»¥¹¥Ý¥¤¥ó¥È¤Î¥Ð¥Ã¥Õ¥¡ºÇŬ²½¤Ë¤è¤ëÄãÃÙ±ä̵Àþ¤ÎÄó°Æ,
  • ¿®³Øµ»Êó, Vol. 114, No. 335, IA2014-65, pp.25-27, 2014ǯ11·î.
    • ¾¾ËÜμ²ð,
  • mod_mruby: ¥¹¥¯¥ê¥×¥È¸À¸ì¤Ç¹â®¤«¤Ä¾Ê¥á¥â¥ê¤Ë³ÈÄ¥²Äǽ¤ÊWeb ¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½,
  • Embedded Technology 2014¥¹¥Ú¥·¥ã¥ë¥»¥Ã¥·¥ç¥óC-2, 2014ǯ11·î.
    • À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²¬Éô ¼÷ÃË:
  • ´ÉÍý¸¢¸Â¤ò°ìÈ̥桼¥¶¤Ë¤â°Ü¾ù¤Ç¤­¤ë¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð, 2014-IOT-27, 18, pp.1-6, 2014ǯ10·î.
  • ¾ðÊóή ¡ß IoT¡Ê¥Ñ¥Í¥ëƤÏÀ¡Ë,
  • FIT2014 ¾ðÊó¤Îή¤ì¤ËÃåÌܤ·¤¿¼Â»þ´Öʬ»¶½èÍý´ðÈ× - IoT¤È¥¯¥é¥¦¥É¥½¡¼¥·¥ó¥°¤Î´ÑÅÀ¤«¤é -, 2014ǯ9·î.
    • ÊÒ»³·òÂÀϺ, µÆÃÓÀµ»Ë, »³ÅÄÀ», ÂçÄÍÈ»¿Í, ²¬ÅĹ̻Ê, ²¬Éô¼÷ÃË, ÄÅùõÁ±À², ¿·Îï, ÎÓãÌé, ¥Í¥Ã¥È¥ï¡¼¥¯»ÅÍÍÄêµÁ¤Ë¤è¤ë¹­°èʬ»¶¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°±¿ÍÑ´ÉÍý¥·¥¹¥Æ¥à¤Î³«È¯, Âè6²ó¿·À¤Âå¥Í¥Ã¥È¥ï¡¼¥¯¥·¥ó¥Ý¥¸¥¦¥à, 2014ǯ7·î
    • À¶¿å ¤µ¤ä»Ò, ¸ÍÅÄ ¾¡Á±, ²¬Éô ¼÷ÃË,
  • Åý¹çID¤È°À­¤òÍѤ¤¤¿¥°¥ë¡¼¥×¤ÎÂηϲ½,
  • ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2014)¥·¥ó¥Ý¥¸¥¦¥à 3G-4, 2014ǯ7·î.
    • ¾¾ËÜμ²ð, º£¤É¤­¤ÎWEB¥Û¥¹¥Æ¥£¥ó¥°¤Î¹âÉé²ÙÂкö, Hosting Casual Talks #1 at ³ô¼°²ñ¼Ò¤Ï¤Æ¤Ê, 2014ǯ6·î.
    • ÄÅùõÁ±À², Ʊ°ì¤ÎÁ÷¼õ¿®¥¢¥É¥ì¥¹¤ò»ý¤ÄÂçÎ̥᡼¥ë¤Î ¸úΨŪȽÄê¼êË¡, Hosting Casual Talks #1 at ³ô¼°²ñ¼Ò¤Ï¤Æ¤Ê, 2014ǯ6·î.
    • ¾®ÎÓ¹ÀÆó¡¤À½ã¡¤µÜºê½¤°ì¡¤¥ª¥ó¥é¥¤¥ó¥Õ¥ì¡¼¥àžÁ÷Î̺ÇÂç²½ÌäÂê¤Ë¤ª¤±¤ë¶¥¹çÈæ¤Î²þÎÉ, ¿®³Øµ»Êó¡¤Vol.114, No.19, COMP2014-6 (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ), pp.37-44, 2014ǯ4·î.
    • µÜºê½¤°ì¡¤¶á»÷¥¢¥ë¥´¥ê¥º¥à¤È°ÂÄê¥Þ¥Ã¥Á¥ó¥°¡¤µþÅÔÂç³Ø·ÐºÑ¸¦µæ½ê ¥ß¥¯¥í¡¦¥²¡¼¥àÍýÏÀ¸¦µæ²ñ¡¤2014ǯ4·î3Æü.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#c5caaedb]
    • ²¬Éô¼÷ÃË,
  • ¡ÚÄÌ¿®¤¬¤ß¤¨¤ë°ìËç¤Î¼Ì¿¿¡Û¾Ý¤ÎÝ£¡ÊºßÆüÊÆ·³»Ð¾ÂÄÌ¿®½êWullenweber¼°¥¢¥ó¥Æ¥Ê¡Ë,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÄÌ¿®¥½¥µ¥¤¥¨¥Æ¥£¥Þ¥¬¥¸¥ó, 2015ǯ½Õ¹æ(Âè32¹æ¡Ë, ɽ3, 2015ǯ3·î1Æü.
    • ¾¾ËÜμ²ð,
  • ³Ú¤·¤â¤¦OSS³«È¯ mruby¤Ç³Ø¤ó¤À¹×¸¥¤Îήµ·¤È¾ðÇ®,
  • WEB+DB PRESS Vol.85,
  • pp.98-107, µ»½ÑɾÏÀ¼Ò, 2015ǯ2·î24Æü.
  • **¹ñºÝɸ½à²½Äó°Æ [#qcb14dd8]
  • *2013ǯÅÙ [#oc9f0ac3]
  • **ÏÀʸ»ïÏÀʸ [#f04e6399]
    • Kazuo Iwama, Shuichi Miyazaki, and Hiroki Yanagisawa,
  • A 25/17-Approximation Algorithm for the Stable Marriage Problem with One-Sided Ties,
  • Algorithmica, Volume 68, Issue 3, pp. 758-775, March 2014.
    • ¾¾ËÜμ²ð, ²¬Éô¼÷ÃË,
  • ¥¹¥ì¥Ã¥Éñ°Ì¤Ç¸¢¸ÂʬΥ¤ò¹Ô¤¦Web¥µ¡¼¥Ð¤Î¥¢¥¯¥»¥¹À©¸æ¥¢¡¼¥­¥Æ¥¯¥Á¥ã,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï Vol.J96-B, No.10, pp.1122-1130, Oct 2013.
    • À¾Â¼ ·ò, Ãæ¼ ÁÇŵ, »³ÃÏ °ìÄ÷, º´Æ£ ¼þ¹Ô, Âçë À¿, ²¬Éô ¼÷ÃË, Á¾º¬¸¶ ÅÐ,
  • ¿Íͤʥݥꥷ¡¼¤òÈ¿±Ç²Äǽ¤Êǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥óµ¡¹½¤Î¼Â¸½¡Ê¾·ÂÔÏÀʸ¡Ë,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ïD Vol.J96-D No.6 pp.1400-1412, June 2013.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#t2c7bdda]
    • Jun Kawahara, Koji M. Kobayashi, Shuichi Miyazaki, Better Bounds for Online k-Frame Throughput Maximization in Network Switches, Proc. 24th International Symposium on Algorithms and Computation (ISAAC 2013) (Lecture Notes in Computer Science 8283), pp. 218-228, Dec., 2013.
    • Yoshiharu Tsuzaki, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, Yasuo Okabe,
  • A Mail Transfer System Selectively Restricting a Huge Amoount of E-mails,
  • Workshop on Resilient Internet based Systems (REIS 2013), pp. 896-900, Dec. 2013.
    • Hiroki Okamoto, Ryosuke Matsumoto, Yasuo Okabe,
  • Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network,
  • IEEE 37th Annual International Computer Software and Applications Conference (COMPSAC2013), July 2013.
    • Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe,
  • Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities Across Shibboleth SPs,
  • The 7th International Workshop on Middleware Architecture in the Internet (MirArch2013) (Proc. IEEE COMPSAC2013 Workshops), July 2013.
    • Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji,
  • Privacy Enhancing Proxies in Attribute Release:Two Approaches,
  • The 7th International Workshop on Middleware Architecture in the Internet (MirArch2013) (Proc. IEEE COMPSAC2013 Workshops), July 2013.
    • Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe,
  • Power Allocation Algorithms of PoE for on-Demand Power Supply
  • The 1st IEEE International Workshop on Consumer Devices and Systems (CDS2013),
  • (Proc. IEEE COMPSAC2013 Workshops), July 2013.
    • Yasuhiro Teramoto, Rei Atarashi, Yoshifumi Atarashi, Yasuo Okabe,
  • Managing Networks Independently of the Physical Topology by Service Defined Network,
  • The 1st IEEE International Workshop on Architecture, Design, Deployment and Management of
  • Networks and Applications (ADMNET2013),
  • (Proc. IEEE COMPSAC2013 Workshops), July 2013.
  • **¸ýƬȯɽ¤Ê¤É [#b6c06807]
    • ²¬Éô¼÷ÃË,
  • ¾ðÊóή¤È¥»¥­¥å¥ê¥Æ¥£,
  • Â裱²ó¾ðÊóή¥·¥ó¥Ý¥¸¥¦¥à,
  • 2014ǯ3·î.
    • Á°ÅÄÊþ¹§¡¦²¬Ëܶǹ­¡¦¾®»³Íΰ졦ÃæÌîÇî¼ù¡¦À±Ìî ´²¡¦Â¼¾å¿­ÂÀϺ¡¦¿¹Ëܾ°Ç·¡¦ºä°æ°ìÈþ¡¦²¬Éô¼÷ÃË,
  • Ê£¿ô²ÈÄí¤Ë¤ª¤±¤ë¥×¥í¥È¥³¥ë³¬Áؤò»ý¤Ä¥ª¥ó¥Ç¥Þ¥ó¥ÉÅÅÎÏ´ÉÍý¥·¥¹¥Æ¥à¤ÎÀß·×,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2014ǯÁí¹çÂç²ñ BS-4-3,
  • 2014ǯ3·î18Æü.
    • ÅÄÅç¾Èµ×¡¦²¬Éô¼÷ÃË,
  • 802.11̵ÀþLAN¤Ë¤ª¤±¤ëTCP¤ÎRTT¤ËÃåÌܤ·¤¿ ¥Ñ¥±¥Ã¥ÈÁ÷¿®¥¿¥¤¥ß¥ó¥°À©¸æ¤Ë¤è¤ë¾×ÆͲóÈò¤ÎÄó°Æ,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2014ǯÁí¹çÂç²ñ B-16-6,
  • 2014ǯ3·î18Æü.
    • ¾¾ËÜμ²ð,
  • ¡Ömod_mruby ¡ß ngx_mruby¡× ¥¹¥¯¥ê¥×¥È¸À¸ì¤Ç¹â®¤«¤Ä¾Ê¥á¥â¥ê¤Ë³ÈÄ¥²Äǽ¤ÊWeb¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½¡ÊÍ¥½¨¾Þ¼õ¾Þ¡Ë,
  • Âè6²ó¥Õ¥¯¥ª¥«RubyÂç¾Þ, 2014ǯ2·î.
    • ¾®Ã«ÂçÍ´¡¦²¬Éô¼÷ÃË,
  • £Ï£ð£å£î£Æ£ì£ï£÷¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ï¥¤¥ë¥É¥«¡¼¥É¥Ø¥Ã¥À¤ò¹Íθ¤·¤¿Packet-In¥á¥Ã¥»¡¼¥¸¤ÎÀ©¸æ¼êË¡,
  • ¿®³Øµ»Êó, vol. 113, no. 443, IA2013-86, pp. 43-48, 2014ǯ2·î.
    • ÄÅùõÁ±À²¡¦¾¾ËÜμ²ð¡¦¾®Ã«ÂçÍ´¡¦µÜºê½¤°ì¡¦²¬Éô¼÷ÃË,
  • Ʊ°ì¤ÎÁ÷¼õ¿®¥¢¥É¥ì¥¹¤ò»ý¤ÄÂçÎ̥᡼¥ë¤Î¸úΨŪȽÄê¼êË¡,
  • ¿®³Øµ»Êó, vol. 113, no. 443, IA2013-87, pp. 61-66, 2014ǯ2·î.
    • ²¬Éô¼÷ÃË¡¦¸Å¼δÌÀ¡¦º´Æ£¼þ¹Ô¡¦»³ÃÏ°ìÄ÷¡¦Ãæ¼ÁÇŵ,
  • °À­¾ðÊó¤Èǧ²Ä¾ò·ï¤òÁê¸ß¤ËÈëÆ¿¤¹¤ëǧ¾ÚÏ¢·È¥×¥í¥­¥·,
  • ¿®³Øµ»Êó, vol. 113, no. 443, IA2013-88, pp. 67-72, 2014ǯ2·î.
    • ÄÛÆâ¾­Ç·¡¦²¬Éô¼÷ÃË,
  • ¥½¥Õ¥È¥¦¥§¥¢ÉÔÀµ¥¢¥Ã¥×¥í¡¼¥É¼ÔÄÉÀפΤ¿¤á¤Î¼Â¹Ô·Á¼°¥Õ¥¡¥¤¥ë¤Ø¤ÎÅÅ»ÒÆ©¤«¤·ÁÞÆþ,
  • ¿®³Øµ»Êó, vol. 113, no. 442, SITE2013-74, pp. 189-193, 2014ǯ2·î.
    • µÜ²¼ ¹äÊå , ·ªÎÓ ·òÂÀϺ , ¾¾ËÜ Î¼²ð
  • serverspec: Àë¸ÀŪµ­½Ò¤Ç¥µ¡¼¥Ð¤Î¾õÂÖ¤ò¥Æ¥¹¥È²Äǽ¤ÊÈÆÍÑÀ­¤Î¹â¤¤¥Æ¥¹¥È¥Õ¥ì¡¼¥à¥ï¡¼¥¯,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¡ÊIOT¡Ë,2014-IOT-24(15),1-6 (2014-02-20)
    • Ãæ¼ ÁÇŵ , À¾Â¼ ·ò , »³ÃÏ °ìÄ÷ , ²¬Éô ¼÷ÃË,
  • ǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¤ËÂбþ¤·¤¿¥Æ¥ì¥Ó²ñµÄMCUͽÌó¥·¥¹¥Æ¥àFaMCUs¤Î³«È¯,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¡ÊIOT¡Ë,2014-IOT-24(4),1-6 (2014-02-20)
    • ¿¹Ëܾ°Ç·¡¤µÜºê½¤°ì¡¤²¬Éô¼÷ÃË¡¤
  • ÍÆÎÌÀ©Ìó¤ò»ý¤Ä³äÅöÀ©¸ÂÉÕ¤­Ê£¿ô¥Ê¥Ã¥×¥¶¥Ã¥¯ÌäÂꡤ2013ǯÅÙÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à [17]¡¤2014ǯ1·î¡¥
    • Á°ÅÄ Êþ¹§ , ²¬ËÜ ¶Ç¹­ , ¾®»³ Íΰì , ÃæÌî Çî¼ù , À±Ìî ´² , ¼¾å ¿­ÂÀϺ , ¿¹ËÜ ¾°Ç· , ºä°æ °ìÈþ , ²¬Éô ¼÷ÃË,
  • ¥×¥í¥È¥³¥ë³¬Áؤò»ý¤Ä²ÈÄíÆ⥪¥ó¥Ç¥Þ¥ó¥ÉÅÅÎÏ´ÉÍý¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð ¥³¥ó¥·¥å¡¼¥Þ¡¦¥Ç¥Ð¥¤¥¹¡õ¥·¥¹¥Æ¥à¡ÊCDS¡Ë,2014-CDS-9(20),1-8 (2014-01-16)
    • ²¬Éô¼÷ÃË¡¦ÄźêÁ±À²¡¦¿·¡¡ÎÎÓ¡¡Ã£Ìé,
  • ¥Í¥Ã¥È¥ï¡¼¥¯»ÅÍÍÄêµÁ¤Ë¤è¤ë¹­°èʬ»¶¥Í¥Ã¥È¥ï¡¼¥¯¤Î±¿ÍÑ´ÉÍý,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½ÑÊó¹ð2013-12-IN-IA, 2013ǯ12·î.
    • À¶¿å¤µ¤ä»Ò¡¤¸ÍÅľ¡Á±¡¤²¬Éô¼÷ÃË,
  • Ǥ°Õ¤Î¥°¥ë¡¼¥×¤ÈÅý¹çID¤ò»È¤Ã¤¿¥á¥ó¥Ð¤Î´ÉÍý¤ò¹Ô¤¦¥°¥ë¡¼¥×´ÉÍý¥·¥¹¥Æ¥à¤Î¼ÂÁõ,
  • ¾ðÊó½èÍý³Ø²ñÂè6²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à, 2013ǯ12·î.
    • ¾¾ËÜμ²ð¡¤²¬Éô ¼÷ÃË,
  • mod_mruby: ¥¹¥¯¥ê¥×¥È¸À¸ì¤Ç¹â®¤«¤Ä¾Ê¥á¥â¥ê¤Ë³ÈÄ¥²Äǽ¤ÊWeb¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½,
  • ¾ðÊó½èÍý³Ø²ñÂè6²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à, 2013ǯ12·î.
    • ²¬Éô¼÷ÃË,
  • ¥â¥Ð¥¤¥ëWiMAX¥­¥ã¥ó¥Ñ¥¹¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ,
  • MCPC¥â¥Ð¥¤¥ë¥½¥ê¥å¡¼¥·¥ç¥ó¥Õ¥§¥¢2013, 2013ǯ11·î.
    • Yasuo Okabe,
  • Some Considerations on Security and Scalability Issues of Software Defined Networking (Invited Talk),
  • Global Future Internet Summit 2013, Seoul, Korea, Nov. 2013.
    • µÜºê½¤°ì¡¤°ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤ËÂФ¹¤ë¶á»÷¥¢¥ë¥´¥ê¥º¥à(¾·ÂÔ¹Ö±é), Âè25²óRAMP¥·¥ó¥Ý¥¸¥¦¥àÏÀʸ½¸, pp. 30-45, 2013ǯ10·î29Æü¡¥(¼¯»ùÅçÂç³Ø¡¤¼¯»ùÅç»Ô).
    • ¾¾ËÜμ²ð, ²¬Éô¼÷ÃË,
  • ¥ê¥¯¥¨¥¹¥Èñ°Ì¤Ç²¾ÁÛŪ¤Ë¥³¥ó¥Ô¥å¡¼¥¿¥ê¥½¡¼¥¹¤òʬΥ¤¹¤ëWeb¥µ¡¼¥Ð¤Î¥ê¥½¡¼¥¹À©¸æ¥¢¡¼¥­¥Æ¥¯¥Á¥ã,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð Vol.2013-IOT-23, No.4, 2013ǯ9·î.
    • ²¬Éô¼÷ÃË,
  • µþÅÔÂç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£Âкö¤Î¤³¤ì¤Þ¤Ç¤È¤³¤ì¤«¤é,
  • Ê¿À®25ǯÅÙTOPIC¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ,
  • 2013ǯ9·î
  • Åý¹çID´ÉÍý¤Ë¤ª¤±¤ë¥á¥ó¥Ð°À­¤òÍѤ¤¤¿³ÈÄ¥²Äǽ¤Ê¥°¥ë¡¼¥×´ÉÍý,
  • ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2013)¥·¥ó¥Ý¥¸¥¦¥à 8F-5,
  • 2013ǯ7·î.
    • Ãæ¼ÁÇŵ, À¾Â¼·ò, »³ÃÏ°ìÄ÷, º´Æ£¼þ¹Ô, ²¬Éô¼÷ÃË, »³ºê¿òÀ¸, ºê¼²Æɧ,
  • ¾ðÊóήÄÌÏ¢·È¤Î¤¿¤á¤Î¥ª¡¼¥×¥ó¤ÊIDÏ¢·È¥×¥é¥Ã¥È¥Õ¥©¡¼¥à¤Ë¤ª¤±¤ë¥×¥é¥¤¥Ð¥·¡¼Êݸǽ¤Î¹âÅÙ²½,
  • ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2013)¥·¥ó¥Ý¥¸¥¦¥à 8F-4,
  • 2013ǯ7·î.
    • ²¬Éô¼÷ÃË, º´Æ£¼þ¹Ô, À¾Â¼·ò, »³ÃÏ°ìÄ÷, Ãæ¼ÁÇŵ,
  • °À­Ä󶡥µ¡¼¥Ð¤ËÂФ·¤Æ¥µ¡¼¥Ó¥¹Ä󶡥µ¡¼¥Ð¤òÈëÆ¿¤¹¤ëƿ̾²½¥×¥í¥­¥·,
  • ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2013)¥·¥ó¥Ý¥¸¥¦¥à 8F-2,
  • 2013ǯ7·î.
    • Á°ÅÄ Êþ¹§, ²£È« À¿Ìé, ²¬Éô ¼÷ÃË,
  • ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ëÅÅÎÏʬÇÛ¥¢¥ë¥´¥ê¥º¥à¤ÎÄó°Æ,
  • ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2013)¥·¥ó¥Ý¥¸¥¦¥à 7F-4, 2013ǯ7·î.
    • ²¬Éô¼÷ÃË¡Ê¥³¡¼¥Ç¥£¥Í¡¼¥¿¡Ë¡¦Ã«Ïƹ¯É§¡¦·ËÅIJÂÂå»Ò¡¦¹­À¥¾÷¼£¡¦¿·ÀîãϺ¡¦µÈÅÄ·½¸ã¡Ê¥Ñ¥Í¥ê¥¹¥È¡Ë,
  • »ö¶È¤ËÌòΩ¤ÄÃ諤òƳ½Ð¤¹¤ë¥Ó¥Ã¥°¥Ç¡¼¥¿¡¦¥ª¡¼¥×¥ó¥Ç¡¼¥¿¡Ê¥Ñ¥Í¥ë¥Ç¥£¥¹¥«¥Ã¥·¥ç¥ó¡Ë,
  • Ê¿À®25ǯÅÙÂè1²ó¶áµ¦¾ðÊóÄÌ¿®¹ÖºÂ,
  • 2013ǯ7·î.
    • Ãæ¼ÁÇŵ¡¢À¾Â¼·ò¡¢»³ÃÏ°ìÄ÷¡¢º´Æ£¼þ¹Ô¡¢²¬Éô¼÷ÃË¡¢Æî ¹ä»Ö¡¢»³ºê¿òÀ¸¡¢ºê¼²Æɧ,
  • PEOFIAMP: ¾ðÊóήÄÌÏ¢·È¤Î¤¿¤á¤Î¥ª¡¼¥×¥ó¤ÊIDÏ¢·È¥×¥é¥Ã¥È¥Õ¥©¡¼¥à ¤Ë¤ª¤±¤ë¥×¥é¥¤¥Ð¥·¡¼Êݸǽ¤Î¹âÅÙ²½
  • ÆüËܳؽѿ¶¶½²ñ»º³Ø¶¨Îϸ¦µæ°Ñ°÷²ñ¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñÂè33²ó¸¦µæ²ñ(ITRC meet33) ,
  • 2013ǯ5·î.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#t18981c7]
  • //**¹ñºÝɸ½à²½Äó°Æ
  • *2012ǯÅÙ [#jec9eee2]
  • **ÏÀʸ»ïÏÀʸ [#jd8f37c7]
    • À¶¿å¤µ¤ä»Ò¡¦²¬Éô¼÷ÃË¡¦µÈÅļ¡Ïº,
  • °ìÈÌ¥«¡¼¥É¤ò»È¤Ã¤¿°ì»þÍøÍѼԸþ¤±Ç§¾Ú¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ,
  • ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï¥³¥ó¥·¥å¡¼¥Þ¡¦¥Ç¥Ð¥¤¥¹¡õ¥·¥¹¥Æ¥à¡ÊCDS¡Ë, Vol.3, No.1, pp.34-45:, Mar. 2013.
    • ÂçÊ¿·ò»Ê¡¦²¬Éô¼÷ÃË, Ê£¿ôPA¥¢¥É¥ì¥¹·¿IPv6¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¥µ¥¤¥È¤Ë¤ª¤±¤ëÁ÷¿®¸µ¥¢¥É¥ì¥¹°Í¸ưŪ·ÐÏ©À©¸æ, ¥·¥¹¥Æ¥àÀ©¸æ¾ðÊó³Ø²ñÏÀʸ»ï, Âè25´¬Âè9¹æ, pp. 230-238, Sep. 2012.
    • Å粬À¯´ð¡¦À¾Â¼·ò¡¦¸Å¼δÌÀ¡¦Ãæ¼ÁÇŵ¡¦º´Æ£¼þ¹Ô¡¦²¬Éô¼÷ÃË¡¦Á¾º¬¸¶ÅÐ,
  • ³Ø½Ñµ¡´Ø¤Î¤¿¤á¤Î¥µ¡¼¥Ð¾ÚÌÀ½ñȯ¹Ô¥Õ¥ì¡¼¥à¥ï¡¼¥¯,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J95-B,No.07,pp.871-882, Jul. 2012.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#m3abdb83]
    • Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe,
  • An Extension of the Link Layer Discovery Protocol for On-Demand Power Supply Network by PoE,
  • First International WorkShop on Energy-Aware Systems, Communications and Security (EASyCoSe 2013) (In conjunction with IEEE AINA-2013), pp.1612-1616, March 2013.
    • Toyokazu Akiyama, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura, Yasuo Okabe,
  • Design and Implementation of a Functional Extension Framework for Authn ¡õ Authz Federation Infrastructure Using Web Browser Add-on,
  • 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), pp.389-396, March 2013.
    • Daisuke Kotani, Yasuo Okabe,
  • Packet-In Message Control for Reducing CPU Load and Control Traffic in OpenFlow? Switches,
  • European Workshop on Software Defined Networks, pp.42-47, October, 2012.
    • Wataru Oogami, Takaaki Komura, Yasuo Okabe,
  • Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation,
  • Proc. 2012 IEEE 36th International Conference on Computer Software and Applications Workshops (6th IEEE International Workshop on Middleware Architecture in the Internet
  • (MidArch? 2012)), pp.64-69, July 2012.
    • Takuya Miyamoto, Youichi Koyama, Kazumi Sakai, Yasuo Okabe,
  • A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking,
  • The 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2012), pp.138-147, July 2012.
    • Akihiro Takahashi, Tomotaka Maeda, Yasuo Okabe,
  • Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol,
  • The 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2012), pp.19-28, July 2012.
    • Ryosuke Matsumoto, Yasuo Okabe,
  • Access Control Architecture Separating Privilege by a Thread on a Web Server,
  • The 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT2012), pp.178-183, July 2012.
    • Daisuke Kotani, Kazuya Suzuki, Hideyuki Shimonishi,
  • A design and implementation of OpenFlow? Controller handling IP multicast with Fast Tree Switching, The 12th IEEE/IPSJ International Symposium on Applications and the Internet(SAINT2012), pp.60-67, July 2012.
  • **¸ýƬȯɽ¤Ê¤É [#m85a36f1]
    • ²£È«À¿Ì顦²¬Éô¼÷ÃË¡¦Á°ÅÄÊþ¹§
  • ÅÅÎϲ£¼è¤ê²Äǽ¤Ê¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¤Î¤¿¤á¤ÎPower over Ethernet¤Î³ÈÄ¥,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2013ǯÁí¹çÂç²ñ BS-6-2, 2013ǯ3·î21Æü.
    • Á°ÅÄÊþ¹§¡¦¿¹Ëܾ°Ç·¡¦²¬Éô¼÷ÃË,
  • ¥¨¥³½»Âð¤Ë¤ª¤±¤ë²ÈÅŵ¡´ï¤Î¾ÃÈñ¥¨¥Í¥ë¥®¡¼Â¬Äê´Ä¶­¤Î¹½ÃÛ,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2013ǯÁí¹çÂç²ñ BS-6-4, 2013ǯ3·î21Æü.
    • °æ²¼µ®Íº¡¦Robert W. Irving¡¦µÜºê½¤°ì¡¦´ä´Ö°ìͺ¡¦±ÊÀ¥¹â»Ö, ´õ˾¥ê¥¹¥ÈÊѹ¹¤Ë¤è¤ëÃËÀ­ºÇÎÉ°ÂÄê¥Þ¥Ã¥Á¥ó¥°¤Î²þÁ±, ÅŻҾðÊóÄÌ¿®³Ø²ñ2013ǯÁí¹çÂç²ñ DS-1-1, 2013ǯ3·î19Æü.
    • ²¬Éô¼÷ÃË,
  • ¥µ¡¼¥Ó¥¹ÄêµÁ¤È¹½À®¾ðÊó¥Ç¡¼¥¿¥Ù¡¼¥¹¤Ë´ð¤Å¤¯¥Í¥Ã¥È¥ï¡¼¥¯ÀßÄê¤Î¼«Æ°²½,
  • ¾ðÊó½èÍý³Ø²ñÂè75²óÁ´¹ñÂç²ñ ¥¤¥Ù¥ó¥È´ë²è¡Ö¥Ó¥Ã¥°¥Ç¡¼¥¿¤ò»Ù¤¨¤ë¥¯¥é¥¦¥É´ðÈס×, 2013ǯ3·î8Æü.
    • Ãæ¼ÁÇŵ, ºê¼²Æɧ, À¾Â¼·ò, º´Æ£¼þ¹Ô, ²¬Éô¼÷ÃË,
  • SAML¡¢OpenIDÏ¢·È¥×¥í¥¸¥§¥¯¥È,
  • Japan Identity and Cloud Summit 2013, 2013ǯ3·î5Æü.
    • ²¬Éô¼÷ÃË,
  • ¥»¥­¥å¥ê¥Æ¥£e-learning¥³¥ó¥Æ¥ó¥Ä¤È³Øǧ¤Ë¤Ä¤¤¤Æ,
  • ³Ø½Ñ¾ðÊó´ðÈ×¥ª¡¼¥×¥ó¥Õ¥©¡¼¥é¥à¡ÖÂç³Ø¤Î¥¯¥é¥¦¥É³èÍѤˤª¤±¤ë¡¢¸¡¾Ú¤È²ÝÂê¤ÈÂкö¡×, 2013ǯ2·î8Æü.
    • ¾åÅĹÀ¡¦Ãæ¼ÁÇŵ¡¦²¬Éô¼÷ÃË¡¦¸Å¼δÌÀ¡¦Á¾º¬½¨¾¼¡¦À¾Â¼·ò¡¦»³ÃÏ°ìÄ÷¡¦¥­¡¼¥¹¥Ù¥¢¥ê¡¼
  • ¡¦ËÒ¸¶¸ù¡¦µ×ÊƸ¶±É,
  • ÎÑÎÑɱ¥×¥í¥¸¥§¥¯¥Èon³Øǧ¡§Â¿¸À¸ì¾ðÊóÎÑÍýe¥é¡¼¥Ë¥ó¥°¥³¥ó¥Æ¥ó¥Ä¤Î¶¦Í­,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð¡¦¶µ°é³Ø½¬»Ù±ç¾ðÊó¥·¥¹¥Æ¥à¡ÊCLE¡Ë, Vol.2013-CLE-9, No.14, pp.1-6, 2013ǯ1·î25Æü.
    • À¶¿å ¤µ¤ä»Ò¡¤²¬Éô ¼÷ÃË¡¤µÈÅÄ ¼¡Ïº¡¤¸ÍÅÄ ¾¡Á±¡¤
  • °ìÈÌ¥«¡¼¥É¤òÍѤ¤¤¿Ç§¾Ú¥·¥¹¥Æ¥à¤Ë¤ª¤±¤ë¥Ï¥Ã¥·¥å´Ø¿ô¤òÍѤ¤¤¿PIN¥³¡¼¥ÉÀ¸À®Êý¼°, Âè5²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à, 2012ǯ12·î.
    • ²¬ËÜÂç¼ù¡¤²¬Éô¼÷ÃË¡¤
  • P2P¥Õ¥¡¥¤¥ë¶¦Í­¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿¥Õ¥é¥Ã¥·¥å¥¯¥é¥¦¥ÉÂÑÀ­¤Î¤¢¤ë¶¨Ä´·¿Éé²Ùʬ»¶¼êË¡, Âè5²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à, 2012ǯ12·î.
    • ²¬Éô¼÷ÃË¡¦¾åÅĹÀ¡¦¹âÁÒ¹°´î¡¦´Ý»³Ëþɧ¡¦º´Æ£·Ä¹À¡¦Ãæ¼ÁÇŵ,
  • ¾ðÊ󥻥­¥å¥ê¥Æ¥£·¼È¯¤È¥¤¥ó¥·¥Ç¥ó¥ÈÂбþ¡Ê¥Ñ¥Í¥ë¥Ç¥£¥¹¥«¥Ã¥·¥ç¥ó¡Ë,
  • ³Ø½Ñ¾ðÊó´ðÈ×¥ª¡¼¥×¥ó¥Õ¥©¡¼¥é¥à in µþÅÔ¡ÖÂç³Ø¤Ë¤ª¤±¤ë¥½¡¼¥·¥ã¥ë¥á¥Ç¥£¥¢¤ÎÍø³èÍѤȾðÊ󥻥­¥å¥ê¥Æ¥£¶µ°é¡¦¥ê¥¹¥¯´ÉÍý¡×,
  • 2012ǯ11·î29Æü.
    • ¹â¸«¹¥ÃË¡¤Ê¿Åĸ÷±Ñ¡¤ÉÙ±º²íͺ¡¤À¾Â¼Ãλҡ¤»ÍÊýÉÒÌÀ¡¤µÜºê½¤°ì¡¤¸Å¼δÌÀ¡¤²¬Éô¼÷ÃË¡¤
  • µþÅÔÂç³Ø³Ø½Ñ¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥àÀܳµ¡´ï´ÉÍý¥·¥¹¥Æ¥à¡ÖKUINS-DB¡×¤Î¹¹¿·¡¤
  • Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼ ¸¦µæ³«È¯ÏÀʸ½¸¡¤No.34
  • pp.53-57, 2012ǯ11·î.
    • Takuya Miyamoto, Youichi Koyama, Kazumi Sakai, Yasuo Okabe,
  • A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking,
  • The 1st Kyoto University and Saudi Universities Research Collaboration Workshop, Kyoto University Clock Tower Centennial Hall, November 7-8, 2012.
    • ²¬Éô¼÷ÃË,
  • SINET¥¯¥é¥¦¥ÉÀܳ¥µ¡¼¥Ó¥¹¤È³Øǧ¤Î³èÍѤˤè¤ë¥â¥Ð¥¤¥ëWiMAXÌÖ¤«¤é³ØÆâLAN¤Ø¤Î¥»¥­¥å¥¢¤Ç´ÊÊؤÊÀܳ,
  • Ê¿À®24ǯÅÙTOPIC¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ, 2012ǯ9·î
    • ²¬Éô¼÷ÃË,
  • ³Øǧ¤Î¸½¾õ¤È¾ðÊ󥻥­¥å¥ê¥Æ¥£ e-learningSP ¤Ë¤Ä¤¤¤Æ,
  • Ê¿À®24ǯÅÙTOPIC¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ, 2012ǯ9·î
    • ¾®Ã«ÂçÍ´¡¦²¬Éô¼÷ÃË,
  • £Ï£ð£å£î£Æ£ì£ï£÷¥¹¥¤¥Ã¥Á¤ÎÉé²Ù¤ÈÀ©¸æ¥Í¥Ã¥È¥ï¡¼¥¯¤ÎÄÌ¿®¤òºï¸º¤¹¤ë¤¿¤á¤ÎPacket-In¥á¥Ã¥»¡¼¥¸¤ÎÀ©¸æ¼êË¡,
  • ¿®³Øµ»Êó, vol. 112, no. 212, IA2012-17, pp. 31-36, 2012ǯ9·î.
    • ¿·Î¶âÅĹî¸Ê¡¦²ÃÆ£²íɧ¡¦¿Ü²ìÍ´¼£¡¦²¬Éô¼÷ÃË,
  • IaaS/HaaS¤Ø¤ÎService Defined Infrastructure(SvDI)ŬÍѤθ¡Æ¤,
  • ¿®³Øµ»Êó, vol. 112, no. 212, IA2012-18, pp. 37-42, 2012ǯ9·î
    • ²¬ËÜÂç¼ù¡¦²¬Éô¼÷ÃË,
  • P2P¥Õ¥¡¥¤¥ë¶¦Í­¥Í¥Ã¥È¥ï¡¼¥¯¤òÍøÍѤ·¤¿¥Õ¥é¥Ã¥·¥å¥¯¥é¥¦¥ÉÂÑÀ­¤Î¤¢¤ë¶¨Ä´·¿Éé²Ùʬ»¶¼êË¡,
  • Ê¿À®24ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ
  • D-03, 2012ǯ9·î
    • ²£È«À¿Ì顦Á°ÅÄÊþ¹§¡¦²¬Éô¼÷ÃË,
  • PoE¤Ë¤ª¤±¤ë¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎ϶¡µë¤Î¤¿¤á¤Î¥ê¥ó¥¯ÁØõº÷¥×¥í¥È¥³¥ë¤Î³ÈÄ¥,
  • Ê¿À®24ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ
  • E-18, 2012ǯ9·î
    • »ûËÜÂÙÂ硦²¬Éô¼÷ÃË¡¦¿·Îï,
  • Service Defined Network (SvDN) ¤Ë¤è¤ëL2¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°ÀßÄê,
  • Ê¿À®24ǯÅÙ¾ðÊó½èÍý³Ø²ñ´ØÀ¾»ÙÉô»ÙÉôÂç²ñ
  • E-21, 2012ǯ9·î
    • ²¬Éô¼÷ÃË,
  • ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¥¹¥Þ¡¼¥È¤Ê¥¨¥Í¥ë¥®¡¼´ÉÍý¤Î¸¦µæÆ°¸þ,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2012ǯ¥½¥µ¥¤¥¨¥Æ¥£Âç²ñ
  • BP-4-3, 2012ǯ9·î.
    • ²¬Éô¼÷ÃË,
  • ¥â¥Ð¥¤¥ë¥Ç¥Ð¥¤¥¹¤Î¥»¥­¥å¥ê¥Æ¥£,
  • JCAN¥Õ¥§¥¢2012 September ¡Á¥â¥Ð¥¤¥ë¥Ç¥Ð¥¤¥¹¤È¥»¥­¥å¥ê¥Æ¥£¡Á,
  • 2012ǯ9·î.
    • Hiroki Okamoto, Yasuo Okabe, Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network, AsiaFI 2012 Summer School, Aug. 2012.
    • Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe, Link Layer Discovery Protocol Extension for on-Demand PoE Network, AsiaFI 2012 Summer School, Aug. 2012.
    • ²¬Éô¼÷ÃË,
  • ¼Ò²ñŪ£É£Ô¥ê¥¹¥¯·Ú¸º¤ò»º³Ø¤Ç¿Ê¤á¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£µ»½Ñ¼Ô¡¦¼Â̳¼Ô°éÀ®¥×¥í¥°¥é¥à(IT Keys)¤ÎÁÀ¤¤,
  • ǧ¼±¤ÎÂçž´¹¤òÇ÷¤é¤ì¤ë´ë¶È¤Ë¤ª¤±¤ë¥»¥­¥å¥ê¥Æ¥£ÂкöinµþÅÔ¡Ê¥¯¥í¡¼¥¸¥ó¥°´ðÄ´¹Ö±é¡Ë, 2012ǯ7·î.
    • À¶¿å¤µ¤ä»Ò¡¦²¬Éô¼÷ÃË¡¦µÈÅļ¡Ïº,
  • °ìÈÌ¥«¡¼¥É¤ò»È¤Ã¤¿°ì»þÍøÍѼԸþ¤±Ç§¾Ú¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ,
  • ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¤Ê¬»¶¡¤¶¨Ä´¤È¥â¥Ð¥¤¥ë(DICOMO2012)¥·¥ó¥Ý¥¸¥¦¥à, pp.675-683, 2012ǯ7·î.
    • ²¬Éô¼÷ÃË,
  • WIMAXÌÖ¤ò³èÍѤ·¡¢¥»¥­¥å¥¢¤Ë³ØÆâLAN¤ËÀܳ¤¹¤ë¼è¤êÁȤß,
  • ¹ñΩ¾ðÊó³Ø¸¦µæ½ê Ê¿À®24ǯÅÙÂè1²ó³Ø½Ñ¾ðÊó´ðÈ×¥ª¡¼¥×¥ó¥Õ¥©¡¼¥é¥à¡ÖÂç³Ø¤Ë¤ª¤±¤ë¥â¥Ð¥¤¥ë¾ðÊóüËö¤Î³èÍѤȥ»¥­¥å¥ê¥Æ¥£¡×, 2012ǯ7·î.
    • ¾¾ËÜμ²ð¡¦²¬Éô¼÷ÃË,
  • ÁȤ߹þ¤ß¥¹¥¯¥ê¥×¥È¸À¸ìmruby¤òÍøÍѤ·¤¿Web¥µ¡¼¥Ð¤Îµ¡Ç½³ÈÄ¥»Ù±çµ¡¹½,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð Vol.2012-IOT-18, No.6, 2012ǯ6·î.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#ac17ab88]
    • ¾¾»³Î´»Ê¡¦²ÃÆ£¾æÏ¡¦ÄÍËܾ»É§¡¦Ã°¹¯Íº¡¦²¬Éô¼÷ÃË,
  • ¥³¥ó¥·¥å¡¼¥Þ¤¬ÀÚ¤êÂ󤯥ǥ£¥¸¥¿¥ë²½¼Ò²ñ¤Î¿·¤·¤¤Ä¬Î®¡§2.
  • ¥°¥ê¡¼¥óICT¤Ë¤è¤ë¥¹¥Þ¡¼¥È¤Ê¼Ò²ñ¤ÎÁϽÐ
  • ¾ðÊó½èÍý, 53(10), pp.1021-1027, 2012ǯ9·î
  • **¹ñºÝɸ½à²½Äó°Æ [#tac1fc80]
    • Y. Teramoto, R. Atarashi, Y. Atarashi, Y. Okabe,
  • Experience of Designing Network Management System,
  • IETF Internet-Draft, Feb. 2013.
  • *2011ǯÅÙ [#n723a468]
  • **ÏÀʸ»ïÏÀʸ [#vf5ba478]
    • Å粬À¯´ð¡¦ÊÒ²¬½Ó¹¬¡¦Ã«ËÜÌÐÌÀ¡¦À¾Â¼·ò¡¦»³ÃÏ°ìÄ÷¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,
  • Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±Ç§¾Ú´ðÈ×UPKI¤Î¥¢¡¼¥­¥Æ¥¯¥Á¥ãÀ߷ס¡¡Ê¾·ÂÔÏÀʸ¡Ë,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J94-B, No.10, pp.1246-1260, Oct. 2011.
    • ëËÜÌÐÌÀ¡¦Å粬À¯´ð¡¦ÊÒ²¬½Ó¹¬¡¦À¾Â¼·ò¡¦»³ÃÏ°ìÄ÷¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,
  • Âç³Ø´Öǧ¾ÚÏ¢·È¤Î¤¿¤á¤Î¥­¥ã¥ó¥Ñ¥¹PKI¶¦ÄÌ»ÅÍ͡ʸ¦µæ®Êó¡Ë,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ, Vol.J94-B, No.10, pp.1383-1388, Oct. 2011.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#yc9e1c93]
    • Akihiro Takahashi, Yasuo Okabe,
  • Providing Ubiquitous Networks Securely Using Host Identity Protocol,
  • Asia Workshop on Future Internet Technologies (AWFIT2011)
  • (In Conjunction with AINTEC 2011, Bangkok, Thailand),
  • Nov. 2011.
    • Hamada, K., Iwama, K. and Miyazaki, S.,
  • The Hospitals/Residents Problem with Quota Lower Bounds,
  • Proceedings of the 19th Annual European Symposium on Algorithms (ESA 2011)
  • (Lecture Notes in Computer Science 6942)
  • pp. 180-191, Sep., 2011. (Saarbrucken, Germany)
  • Improved Approximation Bounds for the Student-Project Allocation Problem with Preferences over Projects, Proceedings of the 8th Annual Conference on Theory and Applications of Models of Computation (TAMC 2011),
  • Lecture Notes in Computer Science 6648, pp. 440-451, May 2011. (Tokyo, Japan)
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao,
  • Statistical Analysis of Honeypot Data and Building of Kyoto2006+ Dataset for NIDS Evaluation,
  • BADGERS 2011, April 2011.
  • **¸ýƬȯɽ¤Ê¤É [#u91e291f]
    • ²£È«À¿Ì顦²¬Éô¼÷ÃË, ¥ª¥ó¥Ç¥Þ¥ó¥É·¿PoEÅÅÎ϶¡µë¥Í¥Ã¥È¥ï¡¼¥¯¤Î¤¿¤á¤Î¥ê¥ó¥¯ÁØõº÷¥×¥í¥È¥³¥ë¤Ë¤è¤ëÅÅÎÏÍ×µá, ÅŻҾðÊóÄÌ¿®³Ø²ñ2012ǯÁí¹çÂç²ñ BS-7-1, 2012ǯ3·î.
    • ²¬Éô¼÷ÃË,
  • Âç³Ø¤Ë¤è¤ë¥Õ¥ê¡¼¥á¡¼¥ë¥µ¡¼¥Ó¥¹ÍøÍÑ»þ¤Î¸¡Æ¤»ö¹à,
  • ¹ñΩ¾ðÊó³Ø¸¦µæ½êÊ¿À®23ǯÅÙÂè3²ó³Ø½Ñ¾ðÊó´ðÈ×¥ª¡¼¥×¥ó¥Õ¥©¡¼¥é¥à¡ÖÂç³Ø¤Î¥¯¥é¥¦¥ÉÍøÍѤˤª¤±¤ë¥»¥­¥å¥ê¥Æ¥£¤Î²¡¤µ¤¨¤É¤³¤í¡×, 2012ǯ3·î.
    • ¿·Á±Ê¸¡¦¿·¡¡Î²¬Éô¼÷ÃË,
  • Service Defined Infrastructure (SvDI)¤Î¼ÂÁõÊýË¡¤È±þÍѤθ¡Æ¤,
  • ¿®³Øµ»Êó, vol. 111, no. 485, IA2011-95, pp. 167-172, 2012ǯ3·î.
  • ¥È¥Ý¥í¥¸¡¼¥Ç¡¼¥¿¥Ù¡¼¥¹¤òÍøÍѤ·¤¿¥Í¥Ã¥È¥ï¡¼¥¯¤Î¼«Æ°ÀßÄêÊѹ¹,
  • ¿®³Øµ»Êó, vol. 111, no. 375, IA2011-58, pp. 21-26, 2012ǯ1·î.
    • À¾Â¼¡¡·ò¡¦Ãæ¼ÁÇŵ¡¦»³ÃÏ°ìÄ÷¡¦Âçë¡¡À¿¡¦²¬Éô¼÷ÃË¡¦Á¾º¬¸¶¡¡ÅÐ,
  • ÆüËܤˤª¤±¤ë³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¤È¤½¤ÎÌò³ä¤ª¤è¤Ó¸ú²Ì,
  • ¿®³Øµ»Êó, vol. 111, no. 375, IA2011-55, pp. 5-8, 2012ǯ1·î.
    • º£À¥¡¡¿¿¡¦ÀÄÌڹ̰ìϺ¡¦ÂÀÅÄÀ¶´î¡¦óîƣ͵¹°¡¦ÊÂÀî´à¡Ê¥³¥á¥ó¥Æ¡¼¥¿¡¼¡Ë¡¤²¬Éô¼÷ÃË¡Ê¥³¡¼¥Ç¥£¥Í¡¼¥¿¡¼¡Ë,
  • ¶áµ¦¾ðÊóÄÌ¿®¹ÖºÂ¡Ö¥æ¥Ó¥­¥¿¥¹¥Í¥Ã¥È¼Ò²ñ¤Î¡Ø¤¤¤Þ¡Ù¤È¡Ø¤³¤ì¤«¤é¡Ù¤ò¹Í¤¨¤ë¡× ¹ÖºÂ¡Ê2¡Ë¥¢¥ó¥±¡¼¥ÈÄ´ºº·ë²Ì¤«¤é¸«¤¨¤Æ¤¯¤ë¤³¤È,
  • 2012ǯ1·î.
    • À¾Â¼ ·ò, Ãæ¼ ÁÇŵ, »³ÃÏ °ìÄ÷, Âçë À¿, ²¬Éô ¼÷ÃË, Á¾º¬¸¶ ÅÐ,
  • ÆüËܤˤª¤±¤ë³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¡È³Øǧ¡É¤ÎŸ³«,
  • Âç³ØICT¿ä¿Ê¶¨µÄ²ñ2011ǯÅÙǯ¼¡Âç²ñ, 2011ǯ12·î.
    • ¾åÅÄ ¹À, ¾å¸¶ ůÂÀϺ, ¿¢ÌÚ Å°, ³°Â¼ ¹§°ìϺ, Àаæ ÎÉÏÂ, ¿¹ ¿®²ð, ¸Å¼ δÌÀ, ¿ËÌÚ ¹ä, ²¬Éô ¼÷ÃË,
  • µþÅÔÂç³Ø¤Ë¤ª¤±¤ë¥¯¥é¥¦¥É¥á¡¼¥ë¥µ¡¼¥Ó¥¹¤Î±¿ÍÑ,
  • Âç³ØICT¿ä¿Ê¶¨µÄ²ñ2011ǯÅÙǯ¼¡Âç²ñ, 2011ǯ12·î.
    • Yasuo Okabe, The University PKI Architecture in Japan and the LoA,
  • Tao of Attributes Workshop, Kyoto, Dec. 2011.
    • Yasuo Okabe, How Trust Framework Works for Cyberspace Issues (Moderator of Panel Discussion),
  • OpenID Summit Tokyo 2011, Dec. 2011.
    • ²¬Éô¼÷ÃË,
  • ¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑʬÌî¤Î¼¡À¤Âå°éÀ®¡Î¥Ñ¥Í¥ëƤÏÀ¡Ï,
  • ¿®³Øµ»Êó, vol. 111, no. 321, IA2011-40, pp. 31-32, 2011ǯ11·î.
    • Âç¿À¾Ä¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË,
  • ¥×¥é¥¤¥Ð¥·¾ðÊóµÕή½Ð¤ËÂФ¹¤ëSAML/Shibboleth¤Î²¾Ì¾À­¶¯²½¼êË¡,
  • ¿®³Øµ»Êó, vol. 111, no. 321, IA2011-35, pp. 7-12, 2011ǯ11·î.
    • ¹â¶¶¶Ç¹°¡¦Á°ÅÄÊþ¹§¡¦²¬Éô¼÷ÃË,
  • Host Identity Protocol¤òÍѤ¤¤¿¡¤¥æ¥Ó¥­¥¿¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Î¥»¥­¥å¥¢¤ÊÄó¶¡ÊýË¡,
  • ¿®³Øµ»Êó, vol. 111, no. 321, IA2011-36, pp. 13-18, 2011ǯ11·î.
    • ²¬Éô¼÷ÃË,
  • Âç³Ø¤Ë¤ª¤±¤ë¥»¥­¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¤Î¥¯¥é¥¦¥ÉÂбþ¤Ë¤Ä¤¤¤Æ,
  • 2011ǯÅÙ¡Ö¥¯¥é¥¦¥É¥µ¡¼¥Ó¥¹¤Î¤¿¤á¤ÎSINETµÚ¤Ó³ØǧÀâÌÀ²ñ¡×¡ÊÊ¡²¬²ñ¾ì¡Ë,
  • 2011ǯ11·î.
    • ÅÏÊÕ·ò¼¡,²¬Éô¼÷ÃË,
  • ³Øǧ¤Î¸½¾õ¤Èº£¸å¤ÎŸ˾,
  • 2011ǯÅÙ¡Ö¥¯¥é¥¦¥É¥µ¡¼¥Ó¥¹¤Î¤¿¤á¤ÎSINETµÚ¤Ó³ØǧÀâÌÀ²ñ¡×¡ÊÊ¡²¬²ñ¾ì¡Ë,
  • 2011ǯ11·î.
    • ²¬Éô ¼÷ÃË,
  • NICT°ÑÂ÷¸¦µæ¡Ö¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¡×¸¦µæ¾õ¶·¤ÎÊó¹ð,
  • ¥»¥ó¥µ¡¼¥Í¥Ã¥È¥ï¡¼¥¯¸¦µæ²ñ¡ÊU2A Project¡Ë Âè42²óÄêÎ㸦µæ²ñ, 2011ǯ11·î.
  • Providing Ubiquitous Networks Securely using Host Identity Protocol (HIP),
  • AsiaFI, 2011 Summer School, August 2011.
    • Wataru Oogami, Takaaki Komura, Yasuo Okabe,
  • Toward Robust Pseudonymity in Shibboleth/SAML Federation against Backflow of Personal Information,
  • AsiaFI, 2011 Summer School, August 2011.
  • Improving Man-Optimal Stable Matchings by Minimum Change of Preference Lists,
  • Proceedings of the 7th Hungarian-Japanese Symposium on Discrete Mathematics and Its Applications (HJ 2011),
  • pp. 309-313, May-June, 2011. (Kyoto, Japan)
    • ²¬Éô¼÷ÃË,¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½ - ¾ðÊóÄÌ¿®¤È¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ -,
  • SCI'11 Âè55²ó¥·¥¹¥Æ¥àÀ©¸æ¾ðÊó³Ø²ñ¸¦µæȯɽ¹Ö±é²ñ¡Ê¾·ÂÔ¹Ö±é¡Ë, 2011ǯ5·î.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#v6961f7f]
    • °ñÌÚ½Ó½¨¡¦ÊÒ»³Å°¡¦Æ£½Å¸ç ´Æ½¤, ÂÀÅIJ÷¿Í¡¦¼ò°æ±Ñ¾¼¡¦¹â¶¶Ë­¡¦ÅÄÃæÍø¹¬¡¦±Ê»ý¿Î¡¦Ê¡Åç²íÉ× ÊÔ½¸, ¿ôÍý¹©³Ø»öŵ(µÜºê: 4.3 ʬ³äÅý¼£Ë¡, 4.4 ÍðÂò¥¢¥ë¥´¥ê¥º¥à¤òôÅö), Ä«ÁÒ½ñŹ, 2011ǯ11·î15Æü´©¹Ô.
    • ²¬Éô¼÷ÃË,
  • ¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯, ¥·¥¹¥Æ¥à/À©¸æ/¾ðÊó Vol.55, No.6,¡Ö¥¨¥Í¥ë¥®¡¼¥·¥¹¥Æ¥à¤Î¿·Å¸³«¡ÝICT¤Ë¤è¤ë¾ÃÈñ¾ðÊó¤Î¼ý½¸¤ÈÍøÍÑ¡×Æý¸¹æ pp.221-226¡¤2011ǯ6·î
  • **¤½¤Î¾ [#j853dbb1]
    • ÇòĻ§Ϻ¡¡´Æ½¤,
  • ¾ðÊó¥Í¥Ã¥È¥ï¡¼¥¯
  • ¡Ê²¬Éô¼÷ÃË¡§£µ¾Ï¡¤£¶¾Ï¡¤£±£²¾ÏôÅö¡Ë
  • ¶¦Î©½ÐÈÇ
  • ¡Ê̤Íè¤Ø¤Ä¤Ê¤° ¥Ç¥¸¥¿¥ë¥·¥ê¡¼¥º¡¡3¡Ë,
  • ISBN978-4-320-12303-8,
  • 2011ǯ11·î.
  • *2010ǯÅÙ [#cf7fb2ba]
  • **ÏÀʸ»ïÏÀʸ [#q04e05df]
    • Iwama, K., Miyazaki, S. and Yanagisawa, H.,
  • Approximation Algorithms for the Sex-Equal Stable Marriage Problem,
  • ACM Transactions on Algorithms,
  • Vol. 7, Issue 1, Article No. 2, November 2010.
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao,
  • A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data,
  • IEICE Transactions on Information and Systems, Vol.E93-D,No.9,pp.2544-2554,Sep. 2010.
    • ÎëÌÚÏÂÌ顦ÇϾì½ÓÊ塦ÏÂÅıÑɧ¡¦ÃæÈø¹¯Æ󡦹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
  • ¾õ¶·ÇÄ°®¤Î¤¿¤á¤Î¥È¥é¥Ò¥Ã¥¯¿¶¤ëÉñ¤¤Ê¬Îॷ¥¹¥Æ¥à¤Î¹½ÃÛ¤Èɾ²Á,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, VolJ93-B, No.7¡Ê¥·¥¹¥Æ¥à³«È¯¡¦¥½¥Õ¥È¥¦¥§¥¢³«È¯ÏÀʸÆý¸¹æ¡Ë,pp.916-927, 2010ǯ7·î.
    • ÂçÊ¿·ò»Ê¡¤Á×Ãæ¼â¡¤¹âÁÒ¹°´î¡¤²¬Éô¼÷ÃË,ÍÍ¡¹¤Ê¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Ø¤Î¹¶·â³èÆ°¤ò»¡ÃΤ¹¤ëÈÆÍÑÀ­¤Î¹â¤¤¥Ï¥Ë¡¼¥Ý¥Ã¥È¥·¥¹¥Æ¥à¤Î¹½Ãۤȱ¿ÍÑ,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J93-D, No.7¡Ê¥·¥¹¥Æ¥à³«È¯ÏÀʸÆý¸¹æ¡Ë, pp.1125-1134, 2010ǯ7·î.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#xdd1c1fc]
    • Kenji Ohira, Yasuo Okabe,
  • Host-Centric Site-Exit Router Selection in IPv6 Site Multihoming Environment,
  • 1st International Workshop on Protocols and Applications with Multi-Homing Support (PAMS 2011),
  • //(In conjunction with the 25th International Conference on Advanced Information Networking and Applications (AINA))
  • Singapore, pp. 696-703,
  • March 22-25, 2011.
    • Shin Maruyama, Masahiro Kozuka, Yasuo Okabe, Motonori Nakamura,
  • Policy-based IP Address Selection in SCTP Automatic Address Reconfiguration,
  • 1st International Workshop on Protocols and Applications with Multi-Homing Support (PAMS 2011),
  • //(In conjunction with the 25th International Conference on Advanced Information Networking and Applications (AINA)),
  • Singapore, pp. 704-707,
  • March 22-25, 2011.
    • Kazumi Sakai, Yasuo Okabe,
  • Quality-aware Energy Routing toward On-demand Home Energy Networking,
  • Proc. IEEE Consumer Communications and Networking Conference (CCNC) 2011
  • (Special Session on Ecological Home Network), pp.822-825,
  • Jan. 2011.
    • Miyazaki, S. and Okamoto, K.,
  • Improving the Competitive Ratios of the Seat Reservation Problem,
  • Proceedings of the 6th IFIP TC1/WG2.2, International Conference (IFIP/TCS 2010),
  • pp. 328-339, Sep., 2010. (Brisbane, Australia)
    • Iwama, K., Miyazaki, S. and Yanagisawa, H.,
  • A 25/17-Approximation Algorithm for the Stable Marriage Problem with One-Sided Ties,
  • Proceedings of the 18th Annual European Symposium on Algorithms (ESA 2010),
  • (Lecture Notes in Computer Science 6347)
  • pp. 135-146, Sep., 2010. (Liverpool, UK)
  • **¸ýƬȯɽ¤Ê¤É [#w626e34f]
    • ¼ÆÅÄÃε±¡¦ºä°æ°ìÈþ¡¦²¬Éô¼÷ÃË,¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâľήÁ÷ÅÅÌÖ¤ÎÀ߷פȼÂÁõ,ÅŻҾðÊóÄÌ¿®³Ø²ñ2011ǯÁí¹çÂç²ñ BS-10-5, 2011ǯ3·î.
    • ²¬Éô¼÷ÃË, µþÅÔÎϷ뽸¥¨¥³½»Âð¤Ë¤ª¤±¤ë²óÀþ¸ò´¹·¿¥ª¥ó¥Ç¥Þ¥ó¥ÉľήÇÛÅŤμÂÁõ, ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½WG Ê¿À®22ǯÅÙÂè2²óWG²ñ¹ç, 2011ǯ1·î.
    • Tomoaki Shibata, Kazumi Sakai, Yasuo Okabe,
  • Power Routing Switches toward Energy-on-Demand Home Networking,
  • IEEE Consumer Communications and Networking Conference (CCNC) 2011 Demonstration,
  • Jan. 2011.
    • ²¬Éô¼÷ÃË,
  • ¿®Íê¤Î¤ª¤±¤ë¥¢¥¤¥Ç¥ó¥Æ¥£¥Æ¥£Ï¢·È¤Î³ÎΩ¤Ë¸þ¤±¤Æ¡§³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¡Ö³Øǧ¡×,
  • Security Day 2010,2010ǯ12·î.
    • ²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤
  • ºÂÀÊͽÌóÌäÂê¤Ë¤ª¤±¤ë¶¥¹çÈæ¤Î¾å²¼¸Â¤Î²þÎÉ,
  • ¿®³Øµ»Êó¡¤Vol.110, No.325, COMP2010-45 (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ) pp.45-51, Dec., 2010. (¶å½£¹©¶ÈÂç³Ø Kyutech¥×¥é¥¶¡¤Ê¡²¬»Ô)
    • µÜºê½¤°ì,
  • µþÅÔÂç³Ø¤Ë¤ª¤±¤ë±ó³ÖÃÏÀܳ¤Ë¤Ä¤¤¤Æ,
  • 2010ǯÅÙ¡ÖSINET¡õ³ØǧÀâÌÀ²ñ¡×¡ÊµþÅÔ¡Ë,2010ǯ12·î
    • ²¬Éô¼÷ÃË¡¦¸Å¼δÌÀ,
  • ¾¦ÍѸø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹¤Î¥­¥ã¥ó¥Ñ¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Ø¤ÎŸ³«,
  • ÆüËܳؽѿ¶¶½²ñ»º³Ø¶¨Îϸ¦µæ°Ñ°÷²ñ¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ(ITRC)¡¡Âè28²ó¸¦µæ²ñ, 2010ǯ11·î.
    • ÀÐÅÄÊݵ±¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
  • ¹âÀºÅ٤ʥͥåȥ¥¯¿¯Æþ¸¡ÃÎ¥·¥¹¥Æ¥à¤Î¹½ÃÛ,
  • ¿®³Øµ»Êó, vol. 110, no. 304, IA2010-56, pp. 31-36, 2010ǯ11·î.
    • ¼ÆÅÄÃε±¡¦ºä°æ°ìÈþ¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË,
  • ¥ª¥ó¥Ç¥Þ¥ó¥É·¿ÅÅÎϥͥåȥ¥¯¤ÎÀ߷פȼÂÁõ,
  • ¿®³Øµ»Êó, vol. 110, no. 304, IA2010-55, pp. 25-30, 2010ǯ11·î.
    • Àж¶ÁµÜºê½¤°ì¡¦²¬Éô¼÷ÃË,
  • Âè»°¼Ôµ¡´Ø¤ÎÃç²ð¤òɬÍפȤ·¤Ê¤¤ÇÛã¾ÚÌÀÉÕ¤­ÅŻҥ᡼¥ë¥·¥¹¥Æ¥à¤ÎÀß·×,
  • ¿®³Øµ»Êó, vol. 110, no. 304, IA2010-54, pp. 19-24, 2010ǯ11·î.
    • »ÍÊýÉÒÌÀ¡¦¶áÆ£¹ÀÇ·¡¦²¬Éô¼÷ÃË,
  • ±ÒÀ±¥Ö¥í¡¼¥É¥Ð¥ó¥É¥·¥¹¥Æ¥à¤òÍøÍѤ·¤¿±ó³ÖÃÏÀܳ¼Â¾Ú¼Â¸³,
  • Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼¸¦µæ³«È¯ÏÀʸ½¸, Vol.32, pp.49-54, 2010ǯ11·î.
    • Kei Fujimoto¡¦Kazumi Sakai¡¦Yasuo Okabe,
  • GMPLS-based Electricity Routing for Energy on Demand Service in Home Networks,
  • ¿®³Øµ»Êó, vol. 110, no. 260, IA2010-41, pp. 11-16, 2010ǯ10·î.
    • ÃöËóÆØÉס¤¾¾±ºÃλˡ¤ÌçÎÓͺ´ð¡¤Æ£ÀîÏÂÍø¡¤²ÎÂåÏÂÀµ¡¤»³¸ý±Ñ¡¤º½¸¶½¨¼ù¡¤ÅìÌîµ±Éס¤ÃæÌîÇîδ¡¤²¬Â¼¿¿¸ã¡¤ÉÍÊÕ¿ò¡¤²¬Éô¼÷ÃË¡¤¾å¸¶Å¯ÂÀϺ¡¤ÂçÊ¿·ò»Ê¡¤¼ÄÅÄÍ۰졤µÜÃϽ¼»Ò¡¤ÌÌÏÂÀ®,
  • IT Keys: IT ¥ê¥¹¥¯·Ú¸º¤Î¤¿¤á¤Î¾ðÊ󥻥­¥å¥ê¥Æ¥£µ»½Ñ¼Ô¡¦´ÉÍý¼Ô°éÀ®,
  • ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à 2010, 2010ǯ10·î.
    • Ãæ¼ÁÇŵ, »³°æÀ®ÎÉ, Æ£ÀîÏÂÍø, ÂçºêÇîÇ·, µÈÅÄ·ò°ì, ²¬Éô¼÷ÃË, º½¸¶½¨¼ù, »³ºê¹îÇ·,
  • ¹ñºÝ²ñµÄSAINT¤Î³«ºÅÊó¹ð,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð -¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤È±¿Íѵ»½Ñ¡ÊIOT¡Ë,¡¡Vol.2010-IOT-11 No.6, 2010ǯ10·î.
    • ²¬Éô¼÷ÃË,
  • ¿·»þÂå¤ÎÈÆÍÑ¥³¥ó¥Ô¥å¡¼¥¿¥µ¡¼¥Ó¥¹ ¡Á¾ÊÅÅÎϤ˸þ¤±¤Æ¤ÎÁ´³ØŪ¤Ê¥µ¡¼¥ÐÅý¹ç¡Á,
  • Ê¿À®22ǯÅÙTOPIC ¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ,
  • 2010ǯ9·î.
    • ²¬Éô¼÷ÃË,
  • NICT¡Ö¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¡×¤ÎÀ®²Ì³µÍ×,
  • ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½£×£ÇÁÏÀߣ±¼þǯµ­Ç°¥·¥ó¥Ý¥¸¥¦¥à,
  • 2010ǯ9·î.
    • Yasuo Okabe,
  • Cross-layer Support for Multihoming toward Truly Resilient Future Internet,
  • 2010 Northeastern Asian Symposium on ICT: Next Generation Network and Network Security (Xi'an,China), Sept. 2010.
    • Naoyuki Morimoto,
  • Resource Allocation Problems on Future Power Networks,
  • The 15th Core University Program Seminar on Next Generation Internet Technologies,
  • Buyeo Lotte Resort, Korea, Sept. 2010.
    • Naoyuki Morimoto, Resource Allocation Problems on Bipartite Graphs with Assignment Restrictions,
  • AsiaFI Summer School 2010, Aug. 2010.
    • Tomotaka Maeda, Reliable Streaming Transmission Translator System Using PR-SCTP,
  • AsiaFI Summer School 2010, Aug. 2010.
    • Yasuo Okabe,
  • IT Keys University Collaboration on Education,
  • IT3 Workshop 2010, Aug. 2010.
    • Tomoki Shibata, Kazumi Sakai, Yasuo Okabe,
  • ICE-IT ¡½ Integration Technology of Information Communication and Energy,
  • SAINT2010 Exhibition, Jul. 2010.
    • ¼ÆÅÄÃε±¡¦Æ£ËÜ·½¡¦ºä°æ°ìÈþ¡¦¾®»³Íΰ졦²¬Éô¼÷ÃË,
  • ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤ÎÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á.
  • DICOMO2010¡¤2010ǯ7·î
    • Ìøß·¹°´ø¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
  • ÊÒÊý¤Î¤ß¤¬¥¿¥¤¤ò»ý¤Ä°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë25/17-¶á»÷¥¢¥ë¥´¥ê¥º¥à,
  • µþÅÔÂç³Ø¿ôÍý²òÀϸ¦µæ½ê¹ÖµæÏ¿1691 ¡Ö¥¢¥ë¥´¥ê¥º¥à¤È·×»»µ¡²Ê³Ø¤Î¿ôÍýŪ´ðÈפȤ½¤Î±þÍÑ¡×(ÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à)
  • pp. 136-141, 2010ǯ6·î (ȯɽ¤Ï2010ǯ2·î). (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
    • ²¬Éô¼÷ÃË,
  • ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽤ˤĤ¤¤Æ,
  • IT¥³¥ó¥½¡¼¥·¥¢¥àµþÅÔÂ裵²óÁí²ñ¡¦¹Ö±é²ñ,
  • 2010ǯ6·î.
    • ¼ÆÅÄÃε±¡¦²¬Éô¼÷ÃË,
  • ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤ÎÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á.
  • Âè27²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ¡Ê£É£Ô£Ò£Ã¡Ë¸¦µæ²ñ¥Ç¥âŸ¼¨¡¤2010ǯ5·î.
    • »³ÃÏ°ìÄ÷¡¤Ãæ¼ÁÇŵ¡¤ÊÒ²¬½Ó¹¬¡¤À¾Â¼·ò¡¤Tananun Orawiwattanakul¡¤Á¾º¬¸¶ÅС¤²¬Éô¼÷ÃË,
  • ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥óGakunin¤ÎËܳʱ¿ÍÑ,
  • Âè27²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ¡Ê£É£Ô£Ò£Ã¡Ë¸¦µæ²ñCISʬ²Ê²ñ¡¤2010ǯ5·î.
    • Ãæ¼ÁÇŵ¡¤»³ÃÏ°ìÄ÷¡¤ÊÒ²¬½Ó¹¬¡¤À¾Â¼·ò, ¾±»ÊͦÌÚ¡¤¸Å¼δÌÀ, ²¬Éô¼÷ÃË,
  • ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¤ò³èÍѤ¹¤ë¥µ¡¼¥Ó¥¹¤ÎŸ³«,
  • Âè27²ó¥¤¥ó¥¿¡¼¥Í¥Ã¥Èµ»½ÑÂè163°Ñ°÷²ñ¡Ê£É£Ô£Ò£Ã¡Ë¸¦µæ²ñCISʬ²Ê²ñ¡¤2010ǯ5·î.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#laea10df]
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon,
  • Correlation Analysis Between Honeypot Data and IDS Alerts Using One-class SVM,
  • Intrusion Detection Systems (Edited by: Pawel Skrobanek), pp.173-192, InTech?,
  • ISBN 978-953-307-167-1 (Mar. 2011).
    • ²¬Éô¼÷ÃË,
  • ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½ ¡½IT¤Ë¤è¤ëÅÅÎϥޥͥ¸¥á¥ó¥È¡½¡§ 4. ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤ÎQoEn?¡Ê¥¨¥Í¥ë¥®¡¼ÉʼÁ¡Ë¤ò¹Íθ¤·¤¿·ÐÏ©À©¸æ,
  • ¾ðÊó½èÍý Vol.51, No.8, pp.951-958, 2010ǯ8·î¹æ¡¤2010ǯ8·î.
    • °ËÆ£Âçͺ, ±§Ìî͵Ƿ ÊÔÃø, Î¥»¶¿ô³Ø¤Î¤¹¤¹¤á(µÜºê¡§Âè17¾Ï¤òôÅö), ¸½Âå¿ô³Ø¼Ò, 2010ǯ5·î15Æü´©¹Ô.
  • *2009ǯÅÙ [#w83b91d0]
  • **ÏÀʸ»ïÏÀʸ [#s6b4c5c4]
    • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara,
  • Privacy-Secure Image Sharing System for a Purchaser and Recorded Subjects Using Semi-Blind Fingerprinting,
  • Procedia - Social and Behavioral Sciences, Vol.2, Issue 1, pp.137-142, Mar. 2010.
    • Asahiro, Y., Miyano, E., Miyazaki, S. and Yoshimuta, T., Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles, Information Processing Letters, Vol.110, Issue 3, pp. 93-98, January 2010.
    • ÎëÌÚÏÂÌ顤ÇϾì½ÓÊ塤ÏÂÅıÑɧ¡¤ÃæÈø¹¯Æ󡤹âÁÒ¹°´î¡¤²¬Éô¼÷ÃË,
  • Ê£¿ô¼êË¡¤Ë¤è¤ë¥ê¥¢¥ë¥¿¥¤¥à²òÀϤò»Ù±ç¤¹¤ë¥È¥é¥Ò¥Ã¥¯¥Ç¡¼¥¿ÇÛÁ÷¥·¥¹¥Æ¥à¤Î¼ÂÁõ¤Èɾ²Á,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J92-B, No.10¡Ê¥»¥­¥å¥¢¤Ç¥µ¥¹¥Æ¥¤¥Ê¥Ö¥ë¤Ê¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¢¡¼¥­¥Æ¥¯¥Á¥ãÆý¸¹æ¡Ë, pp.1619-1630, 2009ǯ10·î.
    • Shuichi Miyazaki, Naoyuki Morimoto and Yasuo Okabe, The Online Graph Exploration Problem on Restricted Graphs,
  • IEICE Transactions on Information and Systems, Vol.E92-D,No.9,pp.1620-1627, Sep. 2009.
    • Hamada, K., Iwama, K. and Miyazaki, S., An Improved Approximation Lower Bound for Finding Almost Stable Maximum Matchings, Information Processing Letters, Vol.109, Issue 18, pp. 1036-1040, August 2009.
    • Shuichi Miyazaki and Kazuya Okamoto, Improving the Competitive Ratio of the Online OVSF Code Assignment Problem, MDPI Algorithms, Vol. 2, Issue 3, pp. 953-972, July 2009.
    • ÎëÌÚÏÂÌé, ÇϾì½ÓÊå, ÏÂÅıÑɧ, ÃæÈø¹¯Æó, ¹âÁÒ¹°´î, ²¬Éô¼÷ÃË,
  • ¿×®¤Ê¾ã³²Âбþ¤ò»Ù±ç¤¹¤ë¥È¥é¥Ò¥Ã¥¯²Ä»ë²½¥·¥¹¥Æ¥à¤Î¹½ÃÛ¤Èɾ²Á,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J92-B, No.7 ¡Ê¥·¥¹¥Æ¥à³«È¯¡¦¥½¥Õ¥È¥¦¥§¥¢³«È¯ÏÀʸÆý¸¹æ¡Ë, pp.1072-1083,¡¡2009ǯ7·î.
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon,
  • Unsupervised Anomaly Detection Based on Clustering and Multiple One-class SVM,
  • IEICE Transactions on Communications,Vol.E92-B, No.6, pp.1981-1990, Jun. 2009.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#k82d0e6a]
    • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, A Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking, The 2009 International Workshop on Forensics for Future Generation Communication environments (F2GC), IEEE,pp.561--568, Jeju Korea,Dec 2009
    • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, Semi-Blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques, The 8th International Workshop on Digital Watermarking (IWDW09), LNCS 5703, pp.14--28, Guildford, UK, Aug 2009.
    • Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe,
  • Competitive Buffer Management for Multi-Queue Switches in QoS Networks using Packet Buffering Algorithms,
  • 21st ACM Symposium on Parallelism in Algorithms and Architectures (SPAA2009), pp.328-336, Calgary, Canada
  • August 11 - 13, 2009.
    • Keita Shimizu, Shuichi Miyazaki, Yasuo Okabe,
  • Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange
  • The 2009 International Symposium on Applications and the Internet (SAINT2009), pp. 37-42, Seattle, USA, 20 - 24 July 2009.
    • Keiji Maekawa, Yasuo Okabe,
  • An Enhanced Location Privacy Framework with Mobility Using Host Identity Protocol,
  • The 2009 International Symposium on Applications and the Internet (SAINT2009), pp. 23-29, Seattle, USA, 20 - 24 July 2009.
    • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara,
  • Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking,
  • The Third Workshop on Middleware
  • Architecture in the Internet (MidArc2009)
  • (held as a part of
  • SAINT2009),
  • Seattle, USA, 20 - 24 July 2009.
    • Toshiyuki Kataoka, Takeshi Nishimura, Masaki Shimaoka, Kazutsuna Yamaji,
  • Motonori Nakamura, Noboru Sonehara, Yasuo Okabe,
  • Leveraging PKI in SAML2.0 Federation for Enhanced Discovery Service,
  • The Third Workshop on Middleware
  • Architecture in the Internet (MidArc2009)
  • (held as a part of
  • SAINT2009),
  • Seattle, USA, 20 - 24 July 2009.
  • **¸ýƬȯɽ¤Ê¤É [#zff1cc24]
    • Æ£ËÜ·½¡¦¾®»³Íΰ졦²¬Éô¼÷ÃË,
  • ÅÅÎÏ·ÐÏ©À©¸æ¤Ë¤ª¤±¤ëÅŸ»Â¦¼çƳ»ñ¸»Í½Ìó,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2010ǯÁí¹çÂç²ñ BS-8-2, 2010ǯ3·î.
    • ¼ÆÅÄÃε±¡¦Æ£ËÜ¡¡·½¡¦²¬Éô¼÷ÃË,
  • ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤ÎÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á.
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2010ǯÁí¹çÂç²ñ BS-8-3, 2010ǯ3·î.
    • ¿¹Ëܾ°Ç·¡¦µÜºê½¤°ì¡¦²¬Éô¼÷ÃË,
  • 2Éô¥°¥é¥Õ¾å¤Ç¤Îʬô¶¡µë²Äǽ¤Ê³äÅö¤ÆÀ©¸ÂÉÕ¤­»ñ¸»ÇÛʬÌäÂê,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2010ǯÁí¹çÂç²ñ BS-8-11, 2010ǯ3·î.
    • ²¬Éô¼÷ÃË,¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¥×¥í¥¸¥§¥¯¥È¤Ë´Ø¤¹¤ëÁ´ÂÎÀâÌÀ, ¾ðÊó½èÍý³Ø²ñÁÏΩ50¼þǯµ­Ç°Á´¹ñÂç²ñ º£¥É¥­¥Ã¤ÎIT@¸æŲ¼µ­Ç°´Û2010Ÿ¼¨´ØÏ¢¹Ö±é, 2010ǯ3·î.
    • Æ£ËÜ·½,¼ÆÅÄÃε±,²¬Éô¼÷ÃË, ¥ª¥ó¥Ç¥Þ¥ó¥É·¿²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Î¤¿¤á¤Î£Ñ£ï£Å£î(Quality of Energy¡Ë·ÐÏ©À©¸æ¤ÈÅÅÎϥ롼¥Æ¥£¥ó¥°¥¹¥¤¥Ã¥Á, ¾ðÊó½èÍý³Ø²ñÁÏΩ50¼þǯµ­Ç°Á´¹ñÂç²ñº£¥É¥­¥Ã¤ÎIT@¸æŲ¼µ­Ç°´Û2010Ÿ¼¨´ØÏ¢¹Ö±é, 2010ǯ3·î.
    • ¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË¡¦Ãæ¼ÁÇŵ,
  • SAMLÏ¢·È¤òÍѤ¤¤Æ¥í¥±¡¼¥·¥ç¥ó¥×¥é¥¤¥Ð¥·¤ò¼é¤ëeduroam¥¢¥«¥¦¥ó¥ÈÍøÍÑÊý¼°,
  • ¿®³Øµ»Êó, vol. 109, no. 438, IA2009-109, pp. 153-158, 2010ǯ3·î.
    • À¾Â¼·ò¡¦Å粬À¯´ð¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,
  • UPKI¾ÚÌÀ½ñ¼«Æ°È¯¹Ô¸¡¾Ú¥×¥í¥¸¥§¥¯¥È¤Î¥·¥¹¥Æ¥à°Ü¹Ô¤Ë¤ª¤±¤ë²ÝÂê¤ÈÂкö,
  • ¿®³Øµ»Êó, vol. 109, no. 438, IA2009-113, pp. 225-228, 2010ǯ3·î.
    • Å粬À¯´ð¡¦À¾Â¼·ò¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,
  • UPKI¥µ¡¼¥Ð¾ÚÌÀ½ñ¥×¥í¥¸¥§¥¯¥È¤Ë¤ª¤±¤ë¾ÚÌÀ½ñ¼«Æ°È¯¹Ô»Ù±ç¥·¥¹¥Æ¥à¤Î³«È¯
  • ¿®³Øµ»Êó, vol. 109, no. 438, IA2009-114, pp. 229-234, 2010ǯ3·î.
    • ²¬Éô¼÷ÃË, ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½¥×¥í¥¸¥§¥¯¥È(Áí³ç),
  • Âçºå¹ñºÝ¥µ¥¤¥¨¥ó¥¹¥¯¥é¥Ö Â裹´ü¶âÍË¥µ¥¤¥¨¥ó¥¹¥µ¥í¥ó¡Ö¥°¥ê¡¼¥óIT¡ÁIT/ICT¤È´Ä¶­¡Á¡×, 2010ǯ2·î.
    • ²¬Éô¼÷ÃË, ÄãúÁǼҲñ¤Î¼Â¸½¤Ë¤à¤±¤¿¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽤ˤĤ¤¤Æ,
  • ¥¹¥Þ¡¼¥È¥»¥ó¥µ¡¼¥Õ¥©¡¼¥é¥à ÂèÏ»²ó¾¦¶È¶õ´Ö¥½¥ê¥å¡¼¥·¥ç¥ó¡Áµ»½Ñ¸¡Æ¤²ñ¡Á, 2010ǯ2·î.
    • ²¬Éô¼÷ÃË,
  • ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥ó¤Ë¤Ä¤¤¤Æ,
  • £Ê£Ç£Î£²£ð£ì£õ£ó»Í¹ñÏ¢Íí¶¨µÄ²ñ¥»¥ß¥Ê¡¼inÆÁÅç¡Ê´ðÄ´¹Ö±é¡Ë,2010ǯ2·î.
    • º´¡¹ÌÚ,¼êÄÍ,Ëþ±ö,°¤Æ£,²¬Éô,ÅÄÃæ,¾¾±Ê,ÀÄÌÚ:
  • ¥Ý¥ê¥·¡¼¡ÊJCAN¥Ó¥¸¥Í¥¹CP¡Ë¡Ê¥Ñ¥Í¥ë¡Ë,
  • ÅÅ»Òǧ¾Ú¤Î̱´ÖÀ©ÅÙ¡¦´ðÈפγÎΩ¤Ë´Ø¤¹¤ë¥·¥ó¥Ý¥¸¥¦¥à,2010ǯ2·î.
    • Ê¡ÅĹä»Î, µÜºê½¤°ì, ²¬Éô¼÷ÃË,
  • »Þ¥³¥¹¥È¤ËÀ©¸Â¤ò²Ã¤¨¤¿k-Canadian Traveler Problem¤ËÂФ¹¤ë¶¥¹çÈæ²òÀÏ,
  • ¿®³Øµ»Êó¡¤Vol.109, No. 391, COMP2009-39: (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ) pp.1-8, 2010ǯ1·î. (¶å½£Âç³Ø)
    • Kenji Ohira, Source Address Dependent Site External Route Advertisement for IPv6 Multihoming Site,
  • The 14th JSPS/NRF Core University Program Seminar on Next Generation Internet,
  • Jan. 2010.
    • Æ£ËÜ·½¡¤²¬Éô¼÷ÃË¡¤QoS¤ËÊï¤Ã¤¿EoD¥×¥í¥È¥³¥ë¤ÎÀ߷ס¤¤±¤¤¤Ï¤ó¤Ê¾ðÊóÄÌ¿®¥ª¡¼¥×¥ó¥é¥Ü¸¦µæ¿ä¿Ê¶¨µÄ²ñÂè3²ó¥¨¥Í¥ë¥®¡¼¤Î¾ðÊ󲽥¥­¥ó¥°¥°¥ë¡¼¥×¡¤2010ǯ1·î
    • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, A Web-based Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking, Consumer Communications & Networking Conference (IEEE-CCNC2010), Jan 2010.
    • Æ£ËÜ·½¡¦²¬Éô¼÷ÃË,
  • ²ÈÄíÆâÅÅÎϥͥåȥ¥¯¤Ë¤ª¤±¤ë£Ñ£ï£Å£î¤ò¹Íθ¤·¤¿ÅÅÎÏÀ©¸æ¤ÎÄó°Æ,
  • ¿®³Øµ»Êó, vol. 109, no. 299, IA2009-63, pp. 31-36, 2009ǯ11·î.
    • ÃæÅÄ·ò²ð¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
  • IDS·ÙÊó¤Î²òÀϤˤè¤ëÂè»°¼Ôµ¡´Ø¤Ø¤Î¹¶·â¾õ¶·¤ÎÇÄ°®¼êË¡,
  • ¿®³Øµ»Êó, vol. 109, no. 299, IA2009-62, pp. 25-30, 2009ǯ11·î.
    • ¾®ÌºÀµÆ»¡¦»ÍÊýÉÒÌÀ¡¦¸Å¼δÌÀ¡¦²¬Éô¼÷ÃË,
  • µþÅÔÂç³Ø¤Ë¤ª¤±¤ë̵ÀþLAN¥µ¡¼¥Ó¥¹¤ÎŸ³«,
  • ³Ø½Ñǧ¾Ú¥Õ¥§¥Ç¥ì¡¼¥·¥ç¥óµÚ¤ÓSINET¥µ¡¼¥Ó¥¹ÀâÌÀ²ñ¡ÊµþÅÔ²ñ¾ì¡ËSINET3ÍøÍÑ»öÎã,
  • 2009ǯ11·î.
    • À¾Â¼·ò¡¦Å粬À¯´ð¡¦ÊÂÌÚÅÐÈþ¹¬¡¦Èõ¸ý½¨¼ù¡¦Ãæ¼ÁÇŵ¡¦²¬Éô¼÷ÃË¡¦Á¾º¬¸¶ÅÐ,
  • ¥µ¡¼¥Ð¾ÚÌÀ½ñ¥×¥í¥¸¥§¥¯¥È¤Ë¸«¤ë¶¦Æ±ÍøÍÑ´ðÈפι½ÃۤȰܹÔ,
  • Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼¸¦µæ³«È¯ÏÀʸ½¸, No.31, pp.99-103, 2009ǯ11·î.
    • Yasuo Okabe, Kazumi Sakai,
  • £Ñ£ï£Å£î (Quality of Energy) Routing toward Energy on Demand Service in the Future Internet,
  • ¿®³Øµ»Êó, vol. 109, no. 262, IA2009-47, pp. 9-12, 2009ǯ10·î.
    • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara, Privacy-Secure Image Sharing System for a Purchaser and Recorded Subjects Using Semi-Blind Fingerprinting,
  • International Conference on Security Camera Network, Privacy Protection and Community Safety 2009 SPC2009, Kiryu, Japan, Oct, 2009
    • ²¬Éô¼÷ÃË,
  • ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½ ¡½ ¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯,
  • ¥°¥ê¡¼¥óETµ»½Ñ¼ÔÍÜÀ®¹ÖºÂ in ·§ËÜ, 2009ǯ10·î.
    • ßÀÅĹÀµ¤¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
  • ºÇÂ祵¥¤¥ººÇÂç°ÂÄêÅ٥ޥåÁ¥ó¥°ÌäÂê¤ËÂФ¹¤ë¶á»÷²¼¸Â¤Î²þÎÉ,
  • ¿®³Øµ»Êó¡¤Vol.109, No.235, COMP2009-37,
  • (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ),
  • pp.35-40, Oct., 2009. (ÅìËÌÂç³Ø¡¤ÀçÂæ»Ô)
    • µÜºê½¤°ì,
  • °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤Ë´Ø¤¹¤ëºÇ¶á¤ÎÏÃÂê,
  • ¿®³Øµ»Êó¡¤Vol.109, No.211, AI2009-12
  • (ÅŻҾðÊóÄÌ¿®³Ø²ñ¿Í¹©ÃÎǽ¤ÈÃμ±½èÍý¸¦µæ²ñ),
  • pp.19-22, 2009ǯ9·î. (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
    • Yasuo Okabe,
  • £Ñ£ï£Å£î (Quality of Energy) Routing toward Energy on Demand Service in the Future Internet,
  • 2009 Asian Network Workshop, Aug. 2009.
    • Kenji Ohira, Hiroki Takakura, Yasuo Okabe, A Honeypot against Attacks Which Target Unknown Vulnerabilities,
  • The 13th JSPS/NRF Core University Program Seminar on Next Generation Internet,
  • //http://docs.google.com/View?id=ddd2ffq2_6dp6d92fk
  • Aug. 2009.
    • ²¬Éô¼÷ÃË¡¤°ú¸¶Î´»Î, ¡Ö¾ðÊóÄÌ¿®¡¦¥¨¥Í¥ë¥®¡¼Åý¹çµ»½Ñ¤Î¸¦µæ³«È¯¡×¤Ë¤Ä¤¤¤Æ,
  • ¥¨¥Í¥ë¥®¡¼¤Î¾ðÊó²½¥·¥ó¥Ý¥¸¥¦¥à,2009ǯ7·î.
    • Tomotaka Maeda, Masahiro Kozuka, Yasuo Okabe,
  • Reliable Streaming Transmission Using PR-SCTP,
  • The 2009 International Symposium on Applications and the Internet (SAINT2009) student session, Seattle, USA, 20 - 24 July 2009.
    • Chia-Lung Hsieh,
  • Privacy Disclosure: Personal Information and Images on Social Networking Sites in Taiwan,
  • The 2009 International Symposium on Applications and the Internet (SAINT2009) student session, Seattle, USA, 20 - 24 July 2009.
    • ²¬Éô¼÷ÃË,
  • µþÅÔÂç³Ø¤Ë¤ª¤±¤ëÂ絬ÌÏ¥µ¡¼¥ÐÅý¹ç¤Ë¤è¤ë´Ä¶­Éé²ÙÄ㸺¤Ø¤Î¼è¤êÁȤß,
  • Âç³ØNUA Ê¿À®21ǯÅÙ Âè19²óÁí²ñ¡¦Âè32²ó¸¦µæ²ñ, 2009ǯ7·î.
    • ßÀÅĹÀµ¤¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
  • ÇÛ°¿Í¿ô²¼¸ÂÉÕ¤­¸¦½¤°åÇÛ°ÌäÂê,
  • µþÅÔÂç³Ø¿ôÍý²òÀϸ¦µæ½ê¹ÖµæÏ¿1649 ¡ÖÍýÏÀ·×»»µ¡²Ê³Ø¤Î¿¼²½¤È±þÍÑ¡×(ÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à),
  • pp. 73-80, May, 2009 (ȯɽ¤Ï2009ǯ2·î). (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
    • Shuichi Miyazaki, Naoyuki Morimoto and Yasuo Okabe,
  • An Optimal Online Algorithm for the Graph Exploration Problem on Unweighted Graphs, Proc. 2nd
  • Asian Association for Algorithms and Computation (AAAC), p.45,
  • Hangzhou, China, April 11-12, 2009.
    • Àî¸Åë͵ʿ, ½©»³Ëþ¾¼, ÀÄÌÚ°ì»Ë, °ËÆ£¸÷¶³, ¹âÁÒ¹°´î,
  • ¥¹¥Ñ¥à¥á¡¼¥ë¤Ëµ¯°ø¤¹¤ëWeb·¿¼õÆ°¹¶·â¤Î¼ÂÂÖÄ´ºº,
  • ¿®³Øµ»Êó, vol. 109, no. 33, ICSS2009-5, pp. 21-26, 2009ǯ5·î.
  • //Vol. IEICE-109, No. IEICE-ICSS-33, pp.21-26, 2009ǯ5·î
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#sfb20789]
    • µÜºê½¤°ì, ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ¤ÎºÇÁ°Àþ --- °ÂÄê¥Þ¥Ã¥Á¥ó¥°ÌäÂê¤Î¸¦µæÆ°¸þ ---, ÅŻҾðÊóÄÌ¿®³Ø²ñ ¾ðÊ󡦥·¥¹¥Æ¥à¥½¥µ¥¤¥¨¥Æ¥£»ï Âè14´¬ Âè2¹æ, pp. 6-7, August 2009.
  • *2008ǯÅÙ [#t345ae2d]
  • **ÏÀʸ»ïÏÀʸ [#g90fb650]
    • Naoyuki Kamiyama, Yuuki Kiyonari, Eiji Miyano, Shuichi Miyazaki, and Katsuhisa Yamanaka, Computational Complexities of University Interview Timetabling,
  • IEICE TRANSACTIONS on Information and Systems, Volume E92-D, No.2,
  • pp.130-140, Feb. 2009.
    • Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe,
  • A Tight Upper Bound on Online Buffer Management for Multi-Queue Switches with Bicodal Buffers,
  • IEICE Transactions on Information and System, Vol.E91-D, No.12, pp.2757-2769, Dec. 2008.
    • ´Ý»³¿­, ¾®ÄÍ¿¿·¼, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË,
  • ¥¢¥É¥ì¥¹¾ðÊó¤ÎÊѹ¹ÄÌÃΤò½¸Ìó¤Ç¤­¤ë¤è¤¦¤Ë¤¹¤ëSCTP ADD-IPµ¡Ç½¤Î²þÎÉ,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï, Vol.J91-B, No.10, pp.1231-1233¡Ê¥ì¥¿¡¼¡Ë,2008ǯ10·î
    • Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe,
  • A Tight Bound on Online Buffer Management for Two- port Shared-Memory Switches,
  • IEICE Transactions on Information and System,
  • Vol.E91-D,No.8,pp.2105-2114, Aug. 2008.
    • Iwama, K., Miyazaki, S. and Yamauchi, N.,
  • A (2-c 1 / \sqrt{N})-Approximation Algorithm for the Stable Marriage Problem,
  • Algorithmica, Volume 51, Number 3, pp. 902-914, July 2008.
    • Jungsuk Song, Kenji Ohira, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon,
  • A Clustering Method for Improving Performance of Anomaly-based Intrusion Detection System,
  • IEICE Transactions on Information and Systems
  • (Special Section on Information and Communication System Security),
  • Vol.E91-D, No.5, pp.1282-1291, May. 2008.
    • Mitsuo Okada, Hiroaki Kikuchi, and Yasuo Okabe,
  • Multi-bit Embedding for Asymmetric Digital Watermarking without Exposing Secret,
  • IEICE Transactions on Information and Systems
  • (Special Section on Information and Communication System Security),
  • Vol.E91-D, No.5, pp.1348-1358, May. 2008.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#tcfc87fb]
    • Miyazaki, S. and Okamoto, K.,
  • Improving the Competitive Ratio of the Online OVSF Code Assignment Problem,
  • Proc. 19th International Symposium on Algorithms and Computation (ISAAC 2008)
  • (Lecture Notes in Computer Science 5369),
  • pp. 64-76, Dec., 2008. (Gold Coast, Australia)
    • Jungsuk Song, Hiroki Takakura and Yasuo Okabe,
  • Cooperation of Intelligent Honeypots to Detect Unknown Malicious Codes,
  • WOMBAT Workshop on Information Security Threat Data Collection and Sharing (WISTDCS 2008), Amsterdam, Netherlands, 21-22 April 2008.
    • Jungsuk Song, Hiroki Takakura and Yongjin Kwon,
  • A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts,
  • The 2008 International Symposium on Applications and the Internet(SAINT2008), Turku, FINLAND, 28 July - 1 Aug. 2008.
    • Toshihiro Takagi, Takaaki Komura, Shuichi Miyazaki and Yasuo Okabe,
  • Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols,
  • SAINT2008 Workshop on Middleware Architecture in the Internet, pp. 293-296, Turku, FINLAND, 28 July - 1 Aug. 2008.
  • **¸ýƬȯɽ¤Ê¤É [#ie46aeec]
    • ²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤¥ª¥ó¥é¥¤¥óOVSFÉä¹ç³äÅöÌäÂê¤Ë¤ª¤±¤ë¶¥¹çÈæ¤Î¾å²¼¸Â¤Î²þÎÉ,ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ DS-1-6, 2009ǯ3·î.
    • Ä«°æÀéÈÁ, ¾å¸¶Å¯ÂÀϺ, ¿¹¡¡´´É§, ÄÔ¡¡¹âÌÀ, ÂçÊ¿·ò»Ê, ÃÓÅÄ¡¡¿´, ´î¿¡¡°ì, ¿·³Ø½¬»ØƳÍ×ÎΤˤª¤±¤ë¾ðÊó¥â¥é¥ë¶µ°é¤Î°ÌÃ֤Ť±¤È¾ðÊóÎÑÍý¶µºà, ¿®³Øµ»Êó, vol. 108, no. 460, IA2008-116, pp. 289-294, 2009ǯ3·î.
    • Á°ÅÄÊþ¹§¡¦¾®ÄÍ¿¿·¼¡¦²¬Éô¼÷ÃË, PR-SCTP¤òÍѤ¤¤¿¹â¿®ÍêÀ­¥¹¥È¥ê¡¼¥ß¥ó¥°ÅÁÁ÷, ¿®³Øµ»Êó, vol. 108, no. 460, IA2008-74, pp. 43-47, 2009ǯ3·î.
    • Toshiyuki Kataoka, Motonori Nakamura, Yasuo Okabe, On UPKI-Federation based on Shibboleth,
  • 27th APAN meeting in Kaohsiung, Mar. 2009.
    • ²¬Éô¼÷ÃË, UPKIÁ´ÂÎÊó¹ð, ¹ñΩ¾ðÊó³Ø¸¦µæ½êUPKI¥·¥ó¥Ý¥¸¥¦¥à2009, 2009ǯ2·î.
    • Kenji Ohira, Source Address Dependent Site External Route Advertising Protocol for IPv6 Multihoming Site, 12th Core University Program Seminar on Next Generation Internet Technologies, Beppu, Japan, Feb. 2009.
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
  • A Network Intrusion Detection System Based on Clustering and Multiple One-class SVM,
  • 12th Core University Program Seminar on Next Generation Internet Technologies, Beppu, Japan, Feb. 2009.
    • Tomotaka Maeda, Yasuo Okabe,
  • Reliable Streaming Transmission Using PR-SCTP,
  • 12th Core University Program Seminar on Next Generation Internet Technologies, Beppu, Japan, Feb. 2009.
    • ²¬Éô¼÷ÃË,
  • ¾ðÊ󥻥­¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¡ÊÂкö¡Ë¤ò¿»Æ©¤µ¤»¤ë¤Ë¤Ï,
  • ʸÉô²Ê³Ø¾ÊÊ¿À®20ǯÅÙ¾ðÊ󥻥­¥å¥ê¥Æ¥£¥»¥ß¥Ê¡¼, 2009ǯ2·î.
    • ²¬Éô¼÷ÃË,
  • »ä¤Ïï¡©¡ÝÁÈ¿¥¡¢¤½¤·¤Æ¥µ¡¼¥Ó¥¹¤«¤é¸«¤¿Ç§¾Ú¤ÈUPKI¡Ý,
  • ¥µ¥¤¥¨¥ó¥Æ¥£¥Õ¥£¥Ã¥¯¡¦¥·¥¹¥Æ¥à¸¦µæ²ñ ¥·¥¹¥Æ¥àµ»½Ñʬ²Ê²ñ 2008ǯÅÙÂè2²ó²ñ¹ç¡ÖÁÈ¿¥¤Èǧ¾Ú¡¡¡Áï¤òǧ¾Ú¤¹¤Ù¤­¤«¡Á¡×¥Á¥å¡¼¥È¥ê¥¢¥ë, 2009ǯ1·î.
    • Yasuo Okabe,
  • Inter-University Single Sign-On Architecture Based on UPKI Federation,
  • The AEARU Workshop on Collaboration among Universities in the Ubiquitous World ¡½Building a Digital Bridge for the Collaboration among AEARU Members¡½ (keynote), Nanjing, Dec. 2008
    • Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara,
  • A Privacy Enhanced Image Sharing System on the Sensing Web Based on a Fingerprinting Technique, Proc. International Workshop on ¡ÈSensing Web¡É, pp.51-57, Dec. 2008.
    • Yasuo Okabe, On the UPKI trial, 12th TERENA TF-EMC2 Meeting, Dec. 2008
    • ²¬Éô¼÷ÃË, ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤ò³èÍѤ·¤¿¾Ê¥¨¥Í¤Î²ÄǽÀ­, Âè10²óSCCJµþÅÔ¸¦µæ²ñ, 2008ǯ11·î
    • ¾®ÌºÀµÆ»¡¤Áê³Ú¿¿ÂÀϺ¡¤²ÏÌîŵ¡¤»ÍÊýÉÒÌÀ¡¤¸Å¼δÌÀ¡¤²¬Éô¼÷ÃË¡¤µþÅÔÂç³Ø¤Ë¤ª¤±¤ë̵ÀþLAN´ðÃ϶ɤΟ³«¡¤Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼¸¦µæ³«È¯ÏÀʸ½¸¡¤No.30, pp.55-59, 2008ǯ11·î.
    • ²ÆÌÜ¡¤Èõ¸ý¡¤ÁáÀ¥¡¤²¬ÅÄ¡¤»³ÃÏ¡¤Å粬¡¤ÊÒ²¬¡¤Ã«ËÜ¡¤Ã漡¤²¬Éô¡¤Á¾º¬¸¶¡¤
  • Á´¹ñÂç³Ø¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¤ÎÀ®²Ì¤È¿ÊĽÊó¹ð,
  • Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼¸¦µæ³«È¯ÏÀʸ½¸¡¤No.30, pp.92-96, 2008ǯ11·î.
    • À¶¿å·ÉÂÀ, µÜºê½¤°ì, ²¬Éô¼÷ÃË, Ãʳ¬ÅªÈëÌ©¸ò´¹¥×¥í¥È¥³¥ë¤òÍøÍѤ·¤¿ÇÛãÆâÍƾÚÌÀ¤¬²Äǽ¤ÊÅŻҥ᡼¥ë¥×¥í¥È¥³¥ë¤ÎÀß·×¾å¤Î¸¡Æ¤,
  • ¿®³Øµ»Êó, vol. 108, no. 275, IA2008-42, pp. 7-12, 2008ǯ11·î.
  • A Network Management Model to Maintain Secure Campus Network,
  • AsiaFI Joint Workshops with CERNET and CK Workshop, QingDao?, Oct. 2008.
  • ÅÅ»ÒÆ©¤«¤·¤òÍѤ¤¤¿¥×¥é¥¤¥Ð¥·Êݸî¥×¥í¥È¥³¥ë¤Ë¤è¤ë´Æ»ë¥«¥á¥é²èÁü¶¦Í­¥·¥¹¥Æ¥à,
  • ¾ðÊó½èÍý³Ø²ñ¥³¥ó¥Ô¥å¡¼¥¿¥»¥­¥å¥ê¥Æ¥£¥·¥ó¥Ý¥¸¥¦¥à2008 (CSS2008) ÏÀʸ½¸¡¤Âè2ʬºý, pp.899-904¡¤2008ǯ10·î.
  • Ê¿À®20ǯÅÙTOPIC¥Í¥Ã¥È¥ï¡¼¥¯Ã´Åö¿¦°÷¸¦½¤²ñ, 2008ǯ9·î.
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
  • Performance Evaluation of Unsupervised Machine Learning Techniques for Intrusion Detection,
  • 11th Core University Program Seminar on Next Generation Internet Technologies, Busan, Korea, Aug. 2008.
    • Hamada, K., Iwama, K. and Miyazaki, S.,
  • The Hospitals/Residents Problem with Quota Lower Bounds,
  • MATCH-UP (Satellite workshop of ICALP 2008), pp. 55-66, July 2008 (Reykjavik University, Iceland).
  • Á´¹ñÂç³ØÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¤È¤½¤ÎÀè¤Ë¤¢¤ë¤â¤Î,
  • JNSA PKIÁê¸ß±¿Íѵ»½ÑWG¼çºÅ¥»¥ß¥Ê¡¼ PKI Day 2008¡Ý¡ã£Ð£Ë£É¤Îɸ½à¤«¤é¼ÂÁõ¤Þ¤ÇºÇ¿·Æ°¸þ¡ä ¡Ê´ðÄ´¹Ö±é¡Ë,
  • 2008ǯ7·î.
    • ²¬Éô¼÷ÃË,
  • Âç³Ø¤Ë¤ª¤±¤ëTrust Management¤È²¤ÊÆÆ°¸þ,
  • Âè11²óISS¥¹¥¯¥¨¥¢¿åÊ¿¥ï¡¼¥¯¥·¥ç¥Ã¥×, 2008ǯ5·î.
    • Shuichi Miyazaki, Naoyuki Morimoto and Yasuo Okabe,
  • An Optimal Online Algorithm for the Graph Exploration Problem on Cycles, Proc. 1st
  • Asian Association for Algorithms and Computation (AAAC), p.42,
  • Pokfulam, Hong Kong, April 26-27, 2008.
    • Iwama, K., Miyazaki, S. and Okamoto, K.,
  • Inapproximability of Stable Roommates Problem with Triple Rooms, Proc. 1st
  • Asian Association for Algorithms and Computation (AAAC), p.30,
  • Pokfulam, Hong Kong, April 26-27, 2008.
    • Yasuhiro NAGAI, Takaaki KOMURA, Yasuo OKABE,
  • Authentication and Authorization using Single Sign-on and Electric Certificates,
  • The 8th AEARU Web Technology and Computer Science Workshop, April 2008.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#ib4abddf]
    • Iwama, K. and Miyazaki, S.,
  • Stable Marriage with Ties and Incomplete Lists,
  • Encyclopedia of Algorithms, Springer, pp. 883-885, June 2008.
  • **¤½¤Î¾ [#n138dcf1]
    • ²¬ÅĿλÖÊÔÃø, ¥Ò¥«¥ê¡õ¤Ä¤Ð¤µ¤Î¾ðÊ󥻥­¥å¥ê¥Æ¥££³Âò¶µ¼¼
  • ¡Ê²¬Éô¡§Â裱£°ÏÃôÅö¡Ë,
  • ¹ñΩ¾ðÊó³Ø¸¦µæ½ê¡¡ISBN978-4-86049-048-5, 2009ǯ3·î.
  • //** ¹ñºÝɸ½à²½Äó°Æ
  • *2007ǯÅÙ [#yc092f49]
  • **ÏÀʸ»ïÏÀʸ [#d7fc68d7]
    • Halldorsson, M. M., Iwama, K., Miyazaki, S. and Yanagisawa, H.,
  • Improved Approximation Results for the Stable Marriage Problem,
  • ACM Transactions on Algorithms,
  • Vol. 3, Issue 3, Article No. 30, August 2007.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#rb71c933]
    • Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira and Yongjin Kwon,
  • A Comprehensive Approach to Detect Unknown Attacks via Intrusion Detection Alerts,
  • The twelfth Asian Computing Science Conference(ASIAN2007) Focusing on Computer and Network Security, LNCS 4846,
  • Doha, Qatar, December 9-11, 2007.
    • Koji Kobayashi and Kazuya Okamoto,
  • Improved Upper Bounds on the Competitive Ratio for Online Realtime Scheduling,
  • 15th Annual European Symposium on Algorithms (ESA2007),
  • Eilat, Israel, October 8-10, 2007.
    • Manami Kikuchi, Takayuki Ito, Hiroki Takakura,
  • A Visualization Technique for Monitoring of Network Flow Data,
  • The First International Symposium on Information and Computer Elements ISICE 2007, Sept. 12-14, 2007.
    • Iwama, K., Miyazaki, S. and Yanagisawa, H.,
  • Approximation Algorithms for the Sex-Equal Stable Marriage Problem,
  • Proc. 10th Workshop on Algorithms and Data Structures (WADS 2007), (Lecture Notes in Computer Science 4619), pp. 201-213, August, 2007. (Halifax, Canada)
    • Iwama, K., Miyazaki, S. and Okamoto, K.,
  • Stable Roommates Problem with Triple Rooms,
  • Proc. 10th KOREA-JAPAN Joint Workshop on Algorithms and Computation (WAAC 2007), pp. 105-112, August, 2007. (Chonnam National University, Gwangju, Korea)
    • Koji Kobayashi, Shuichi Miyazaki, Yasuo Okabe,
  • A Tight Bound on Online Buffer Management for two-port Shared-Memory Switches,
  • 19th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA2007), pp. 358-364, June 2007.
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon,
  • A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-based Intrusion Detection System,
  • Proc. 12th International Conference on Database Systems for Advanced Applications (DASFAA2007),(Lecture Notes in Computer Science 4443), pp. 140-151, April 2007.(Bangkok, Thailand)
  • **¸ýƬȯɽ¤Ê¤É [#scecbdf3]
    • ëËÜÌÐÌÀ¡¦Å粬À¯´ð¡¦ÊÒ²¬½Ó¹¬¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,UPKI¶¦ÄÌ»ÅÍÍ¡Ê¥¢¥¦¥È¥½¡¼¥¹¥â¥Ç¥ë¡Ë¤ÎÄó°Æ,ÅŻҾðÊóÄÌ¿®³Ø²ñ2008ǯÁí¹çÂç²ñ BS-8-2, 2008ǯ3·î.
    • Å粬À¯´ð¡¦Ã«ËÜÌÐÌÀ¡¦ÊÒ²¬½Ó¹¬¡¦Ãæ¼ÁÇŵ¡¦Á¾º¬¸¶ÅС¦²¬Éô¼÷ÃË,UPKI¥×¥í¥¸¥§¥¯¥È¤Ë¤ª¤±¤ë¥ª¡¼¥×¥ó¥É¥á¥¤¥ó¥µ¡¼¥Ð¾ÚÌÀ½ñȯ¹Ô¡¦Æ³Æþ,ÅŻҾðÊóÄÌ¿®³Ø²ñ2008ǯÁí¹çÂç²ñ BS-8-2, 2008ǯ3·î.
    • Yanagisawa, H., Miyazaki, S., and Iwama, K.
  • Approximation Algorithms for the Sex-Equal Stable Marriage Problem,
  • ¿®³Øµ»Êó¡¤Vol.107, No.537, COMP2007-55,
  • (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ),
  • pp. 1--8, 2008ǯ3·î. (ÆüËÜIBM Åìµþ´ðÁø¦µæ½ê¡¤¿ÀÆàÀÂçÏ»Ô)
  • A Survey of the Stable Marriage Problem and Its Variants,
  • Proc. International Conference on Informatics Education and Research for Knowledge-Circulating Society (ICKS'08),
  • pp. 131-136, Jan. 2008. (µþÅÔÂç³Ø¡¤µþÅÔ»Ô)
  • 3¿ÍÉô²°°ÂÄê¥ë¡¼¥à¥á¥¤¥ÈÌäÂê¤ÎNP´°Á´À­,
  • ¿®³Øµ»Êó¡¤Vol.107, No.258, COMP2007-41
  • (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
  • pp.1-6, 2007ǯ10·î. (ÅìËÌÂç³Ø¡¤ÀçÂæ»Ô)
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
  • Data Mining and Visualization of IDS Alerts to Extract Malicious Activities,
  • 9th Core University Program Seminar on Next Generation Internet Technologies,
  • Oct. 2007.
    • ²¬Éô¼÷ÃË,ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯¤È¤·¤Æ¤Î¸ø½°ÌµÀþ£Ì£Á£Î¤Ø¤Î´üÂÔ,¥Þ¥ë¥Á¥á¥Ç¥£¥¢¿ä¿Ê¥Õ¥©¡¼¥é¥à¡¦Ê¿À®19ǯÂè26²ó¡Ö¤¢¤é¤¿¤Ê¡Ø¸ø½°ÌµÀþLAN¡Ù¤Î»þÂ夬ÅþÍè¡×,2007ǯ9·î.
    • ¿¹Ëܾ°Ç·, µÜºê½¤°ì, ²¬Éô¼÷ÃË¡¤
  • ¥µ¥¤¥¯¥ë¾å¤Ç¤Î¥°¥é¥Õõº÷ÌäÂê¤ËÂФ¹¤ëºÇŬ¤Ê¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à,
  • ¿®³Øµ»Êó¡¤Vol.107, No. 219, COMP2007-39:
  • (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
  • pp.51-57, 2007ǯ9·î. (Ë­¶¶µ»½Ñ²Ê³ØÂç³Ø)
    • À¶À®Íªµ®¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤
  • »îÌäͽÄêɽºîÀ®ÌäÂê¤ÎÀ©ÌóÉÕ¤­¥â¥Ç¥ë¤ËÂФ¹¤ëNPº¤ÆñÀ­,
  • Ê¿À®19ǯÅÙ Âè60²óÅŵ¤´Ø·¸³Ø²ñ¶å½£»ÙÉôÏ¢¹çÂç²ñ, 09-1A-04, p.87, 2007ǯ9·î.¡ÊΰµåÂç³Ø¡Ë
    • Yasuo OKABE,
  • Introduction to UPKI Project in Japan,
  • TERENA 9th TF-EMC2 Meeting Prague,
  • Sept. 2007.
    • Yasuo OKABE,
  • MIAKO.net Public Wireless Internet Service in Kyoto, 24th APAN Meeting in Xi'an, Aug. 2007.
    • Yasuo OKABE,
  • Japanese University PKI (UPKI) Update, 24th APAN Meeting in Xi'an, Aug. 2007.
    • ¿¹Ëܾ°Ç·, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ¥µ¥¤¥¯¥ë¥°¥é¥Õ¾å¤Ç¤ÎÃÏ¿ÞºîÀ®ÌäÂê¤ËÂФ¹¤ëºÇŬ¤Ê¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à, 2007ǯÅٲƤÎLA¥·¥ó¥Ý¥¸¥¦¥à, [9], July 2007.
    • ¾®ÎÓ¹ÀÆ󡤵ܺ꽤°ì¡¤²¬Éô¼÷ÃË¡¤
  • A Tight Upper Bound on Online Buffer Management for Two-port Shared-Memory Switches,
  • ¿®³Øµ»Êó¡¤Vol.107, No.127, COMP2007-26:
  • (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
  • pp.63-70, 2007ǯ6·î. (Ë̳¤Æ»Âç³Ø¡¤»¥ËÚ»Ô)
    • ´Ý»³¿­¡¦¾®ÄÍ¿¿·¼¡¦²¬Éô¼÷ÃË,
  • SCTP¤Ë¤ª¤±¤ë¥¢¥É¥ì¥¹ÁªÂò¥Ý¥ê¥·¡¼¤òÄêµÁ¤Ç¤­¤ëIP¥¢¥É¥ì¥¹¼«Æ°¹¹¿·µ¡Ç½¤ÎÀß·×,
  • ¿®³Øµ»Êó, vol. 107, no. 74, IA2007-1, pp. 1-3, 2007ǯ5·î.
    • Jungsuk Song, Hiroki Takakura, Yasuo Okabe,
  • A Proposal of New Benchmark Data to Evaluate Mining Algorithms for Intrusion Detection, 23th APAN Meeting in Manila, Jan. 2007.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#g7c12af6]
    • ²¬Éô¼÷ÃË,
  • Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¤Î¸½¾õ¤Èº£¸å,
  • View Point, Âè8¹æ, pp.67-72, Mar. 2008.
    • µÜºê½¤°ì, Î¥»¶¿ô³Ø¤Î¤¹¤¹¤á Âè6²ó ¡Ö°ÂÄê·ëº§ÌäÂê¡×, Íý·Ï¤Ø¤Î¿ô³Ø(¸½Âå¿ô³Ø¼Ò), pp. 49-54, 2007ǯ9·î¹æ.
  • ** ¹ñºÝɸ½à²½Äó°Æ [#ieaab813]
  • *2006ǯÅÙ [#g20a3f44]
  • **ÏÀʸ»ïÏÀʸ [#j3e1c6fb]
    • Iwama, K., Miyazaki, S. and Okamoto, K.,
  • A (2-c log N/N)-Approximation Algorithm for the Stable Marriage Problem,
  • IEICE TRANSACTIONS on Information and Systems, Volume E89-D No.8, pp.2380-2387, August 2006.
    • ¼°æ¶Ñ, ²¬Éô¼÷ÃË,
  • NAS Parallel Benchmarks¤Ë¤è¤ëHPF¤Îɾ²Á,
  • ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï¡§¥³¥ó¥Ô¥å¡¼¥Æ¥£¥ó¥°¥·¥¹¥Æ¥à Vol.47, No.SIG7(ACS14), pp.137-151 (2006).
    • ´Ý»³¿­, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, »³°æÀ®ÎÉ, ²¬»³À»É§, µÜ²¼ÂîÌé,
  • ưŪ¤Ë±þÅú¤òÊѤ¨¤ëDNS¤òÍøÍѤ·¤¿ÅŻҥ᡼¥ë¼õ¿®¤ÎÍ¥ÀèÀ©¸æ,
  • ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï Vol.47, No.4, pp.1021-1030 (2006).
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#d8231153]
    • Asahiro, Y., Miyano, E., Miyazaki, S. and Yoshimuta, T., Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles,
  • Proc. 33rd Conference on Current Trends in Theory and Practice of Informatics (SOFSEM 2007), (Lecture Notes in Computer Science 4362),
  • pp. 164-175, Jan., 2007. (Harrachov, Czech Republic)
    • Iwama, K., Miyazaki, S. and Yamauchi, N., A 1.875-Approximation Algorithm for the Stable Marriage Problem, Proc. 18th ACM-SIAM Symposium on Discrete Algorithms (SODA 2007), pp. 288-297, Jan., 2007. (New Orleans, USA)
    • Yutaka Nakano, Motonori Nakamura, Yasuo Okabe, Analysis for Topological Properties of the Network Feeding Usenet News, SAINT2007, Jan. 2007.
    • Shoichiro Fujiwara, Takaaki Komura, Yasuo Okabe, A Privacy Oriented Extension of Attribute Exchange in Shibboleth, SAINT2007 Workshop on Middleware Architecture in the Internet, Jan. 2007.
    • »³°æÀ®ÎÉ¡¦Îú°ìÊ¿¡¦²¬»³À»É§¡¦²ÏÌî·½ÂÀ¡¦Ãæ¼ÁÇŵ¡¦´Ý»³¿­¡¦µÜ²¼ÂîÌé,
  • SMTP¥»¥Ã¥·¥ç¥ó¤Î¶¯À©ÀÚÃǤˤè¤ëspam¥á¡¼¥ëÂкö¼êË¡,
  • FIT 2006 Âè5²ó¾ðÊó²Ê³Øµ»½Ñ¥Õ¥©¡¼¥é¥à¡ÊÁ¥°æ¥Ù¥¹¥È¥Ú¡¼¥Ñ¡¼¾Þ¡Ë,
  • 2006ǯ9·î.
    • Kiyonari, Y., Miyano, E. and Miyazaki, S.,
  • Computational Complexity Issues in University Interview Timetabling,
  • Proc. of The 6th International Conference on the Practice and Theory of Automated Timetabling (PATAT 2006),
  • pp. 448-453, August 2006. (Brno, Czech Republic)
    • Kato, S., Miyazaki, S., Nishimura, Y. and Okabe, Y.,
  • Cheat-proof Serverless Network Games,
  • 5th International Conference on Computers and Games (CG 2006), (Lecture Notes in Computer Science 4630), pp. 234-243,
  • May 2006. (Turin, Italy)
  • **¸ýƬȯɽ¤Ê¤É [#a24d933c]
    • ²¬Éô¼÷ÃË,
  • ǧ¾Ú±¿ÍÑÎΰè,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2007ǯÁí¹çÂç²ñ TK-2 Âç³ØÅù¤Ë¤ª¤±¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£Âкö¤Î¤¿¤á¤ÎÀ©ÅÙ¡¦ÂÎÀ© ¡ÁÀ¯Éܵ¡´ØÅý°ì´ð½à¤òÈ¿±Ç¤·¤¿¥µ¥ó¥×¥ëµ¬Äø½¸¤ÎÊó¹ð¡Á, 2007ǯ3·î.
    • »³ÆâľºÈ¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤
  • °ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë1.8-¶á»÷¥¢¥ë¥´¥ê¥º¥à,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ DS-1-3, 2007ǯ3·î.
    • ²¬Éô¼÷ÃË,
  • Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¹½ÃÛ»ö¶È¤Î³µÍ×,
  • Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£µÚ¤ÓÅÅ»Òǧ¾Ú´ðÈפ˴ؤ¹¤ë¥ï¡¼¥¯¥·¥ç¥Ã¥×, 2007ǯ2·î.
    • ²¬Éô¼÷ÃË,
  • ¡Ö¹ñΩÂç³ØË¡¿Í¸þ¤±¾ðÊ󥻥­¥å¥ê¥Æ¥£¥Ý¥ê¥·¡¼¡×¤ÎºöÄê¡Áǧ¾Ú±¿ÍÑÎΰè,
  • Âç³Ø¤Ë¤ª¤±¤ë¾ðÊ󥻥­¥å¥ê¥Æ¥£µÚ¤ÓÅÅ»Òǧ¾Ú´ðÈפ˴ؤ¹¤ë¥ï¡¼¥¯¥·¥ç¥Ã¥×, 2007ǯ2·î.
    • ²¬Éô¼÷ÃË,
  • Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈסÊUPKI¡Ë¤ÈUPKI¥¤¥Ë¥·¥¢¥Æ¥£¥Ö¤Ë¤Ä¤¤¤Æ,
  • Ê¿À®18ǯÅÙ¹âÀ­Ç½¥³¥ó¥Ô¥å¡¼¥Æ¥£¥ó¥°ÍøÍѵ»½Ñ¤Ë´Ø¤¹¤ëÁí¹ç¥·¥ó¥Ý¥¸¥¦¥à¡Ö²¾Áۼ¸³¤ÈÂ絬ÌÏ¥·¥ß¥å¥ì¡¼¥·¥ç¥ó¤ÇÂó¤¯Àèü²Ê³Ø2007¡×¡Ê¥Ý¥¹¥¿¡¼¡Ë, 2007ǯ2·î.
    • Kenji Ohira, Ying Huang, Takaaki Komura, Yasuo Okabe,
  • Loosely Trusted Yet Secure Roaming Architecture for Public Wireless Internet Service,
  • Proc. 2nd International Conference on Informatics Research for Development of Knowledge Society Infrastructure 2007,
  • Jan. 2007.
    • Shoichirou FUJIWARA, Takaaki KOMURA, Yasuo OKABE,
  • A Privacy Oriented Attribute Exchange in Shibboleth, 23rd APAN Meeting in Manila, Jan. 2007.
    • ÅÏÉô°ê·Ã¡¦²¬Éô¼÷ÃË¡¦Ãæ¼ÁÇŵ,
  • Ê£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÀ߷פȼÂÁõ
  • ¿®³Øµ»Êó, vol. 106, no. 465, IA2006-37, pp. 37-42, 2007ǯ1·î.
    • ÂçÄíÈ»¿Í¡¦Áס¡Ãæ¼â¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
  • µ¡³£³Ø½¬¤Ë¤è¤ë¥Í¥Ã¥È¥ï¡¼¥¯IDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤª¤è¤Ó²Ä»ë²½
  • ¿®³Øµ»Êó, vol. 106, no. 465, IA2006-36, pp. 31-36, 2007ǯ1·î.
    • ¸Å¼δÌÀ,
  • µþÅԤǤÎÁð¤Îº¬ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥ÈÉáµÚ³èÆ°,
  • InternetWeek 2006 ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯BoF, 2006ǯ12·î.
  • °ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë1.875-¶á»÷¥¢¥ë¥´¥ê¥º¥à,
  • ¿®³Øµ»Êó, vol. 106, no. 405, COMP2006-48, pp. 49-56, 2006ǯ12·î.
    • īעͺ°ì¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤µÈ̶ÅÄÂóϯ¡¤
  • ¥µ¥¤¥¯¥ë¥°¥é¥Õ¾å¤Ç¤ÎÃÏ¿ÞºîÀ®ÌäÂê¤ËÂФ¹¤ë½Å¤ßÉÕ¤­ºÇ¶á˵¥¢¥ë¥´¥ê¥º¥à,
  • ¿®³Øµ»Êó, vol. 106, no. 405, COMP2006-43, pp. 15-22, 2006ǯ12·î.
  • //- ´Ý»³ ¿­, SCTP¤òÍѤ¤¤¿¥·¥ó¥°¥ë¥¤¥ó¥¿¥Õ¥§¥¤¥¹¤Ç¤Î¥Ï¥ó¥É¥ª¡¼¥Ð¡¼¼Â¸³ (Work In Progress ¸ýƬȯɽ), Internet Conference 2006, Oct. 2006
    • ´Ý»³ ¿­, ¾®ÄÍ ¿¿·¼, ¾®Ìî Í´²ð, ËÜ¿ ÎÑÉ×, SCTP¤òÍѤ¤¤¿¥·¥ó¥°¥ë¥¤¥ó¥¿¥Õ¥§¥¤¥¹¤Ç¤Î¥Ï¥ó¥É¥ª¡¼¥Ð¡¼¼Â¸³ (Work In Progress ¥Ç¥â¥»¥Ã¥·¥ç¥ó¡Ë, Internet Conference 2006, 2006ǯ10·î.
    • Æ£¸¶æÆ°ìϯ¡¤¸Å¼δÌÀ¡¤²¬Éô¼÷ÃË¡¤
  • ¥×¥é¥¤¥Ð¥·¡¼Êݸî¤ËÇÛθ¤·¤¿Shibboleth¤Ë¤ª¤±¤ë°À­¸ò´¹¤Î³ÈÄ¥¡¤
  • ¿®³Øµ»Êó¡¤vol. 106, no. 309, IA2006-20, pp. 1-6¡¤
  • 2006ǯ10·î¡¥
    • Yasuo Okabe,
  • Introduction of UPKI Project in Japan,
  • 2nd APGrid PMA Meeting
  • (ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
  • pp.51-57, 2007ǯ9·î. (Ë­¶¶µ»½Ñ²Ê³ØÂç³Ø)
    • À¶À®Íªµ®¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤
  • »îÌäͽÄêɽºîÀ®ÌäÂê¤ÎÀ©ÌóÉÕ¤­¥â¥Ç¥ë¤ËÂФ¹¤ëNPº¤ÆñÀ­,
  • Ê¿À®19ǯÅÙ Âè60²óÅŵ¤´Ø·¸³Ø²ñ¶å½£»ÙÉôÏ¢¹çÂç²ñ, 09-1A-04, p.87, 2007ǯ9·î.¡ÊΰµåÂç³Ø¡Ë
    • Yasuo OKABE,
  • Introduction to UPKI Project in Japan,
  • TERENA 9th TF-EMC2 Meeting Prague,
  • Sept. 2007.
    • Yasuo OKABE,
  • MIAKO.net Public Wireless Internet Service in Kyoto, 24th APAN Meeting in Xi'an, Aug. 2007.
    • Yasuo OKABE,
  • Japanese University PKI (UPKI) Update, 24th APAN Meeting in Xi'an, Aug. 2007.
    • ¿¹Ëܾ°Ç·, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ¥µ¥¤¥¯¥ë¥°¥é¥Õ¾å¤Ç¤ÎÃÏ¿ÞºîÀ®ÌäÂê¤ËÂФ¹¤ëºÇŬ¤Ê¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à, 2007ǯÅٲƤÎLA¥·¥ó¥Ý¥¸¥¦¥à, [9], July 2007.
    • ¾®ÎÓ¹ÀÆ󡤵ܺ꽤°ì¡¤²¬Éô¼÷ÃË¡¤
  • A Tight Upper Bound on Online Buffer Management for Two-port Shared-Memory Switches,
  • ¿®³Øµ»Êó¡¤Vol.107, No.127, COMP2007-26: (invited talk), Oct. 2006.
    • ÂçÄíÈ»¿Í, ¥­¥ã¥ó¥Ñ¥¹¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ëIDS¥í¥°¥Ç¡¼¥¿¤Î²òÀϤȲĻ벽, ITRC20³ØÀ¸¥»¥Ã¥·¥ç¥ó, 2006ǯ10·î.
    • ÅÏÉô°ê·Ã, Ê£¿ô·ÐÏ©¤ò³èÍѤ·¤¿TCP-Friendly¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à¤ÎÄó°Æ, ITRC20³ØÀ¸¥»¥Ã¥·¥ç¥ó, 2006ǯ10·î.
    • ¾®ÄÍ¿¿·¼, SCTP¤È»ä, ITRC20 ³ØÀ¸¥»¥Ã¥·¥ç¥ó, 2006ǯ10·î.
    • ¸Å¼δÌÀ¡¤Æ£À¼£¡¤²¬Éô¼÷ÃË,¤ß¤¢¤³¥Í¥Ã¥È¼Â¾Ú¼Â¸³¤ÎÁí³ç¤È¤³¤ì¤«¤é,ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯Ï¢·È¥·¥ó¥Ý¥¸¥¦¥à 2006 in ÂÓ¹­, 2006ǯ9·î.
    • µÈ̶ÅÄÂóϯ¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤
  • ¥ª¥ó¥é¥¤¥óTSP¥¢¥ë¥´¥ê¥º¥à¤ËÂФ¹¤ë²¼¸Â¤Ë¤Ä¤¤¤Æ,
  • Ê¿À®18ǯÅÙ Âè59²óÅŵ¤´Ø·¸³Ø²ñ¶å½£»ÙÉôÏ¢¹çÂç²ñ, 10-2A-07, Sep. 2006.
    • Hiroki Takakura,
  • Privacy Issues on Network Monitoring and Its Information Sharing,
  • 7th Core University Program Seminar on Next Generation Internet Technologies,
  • Aug. 2006.
    • Yasuo Okabe,
  • WLAN Roaming Architecture for True Ubiquitous Networking,
  • 7th Core University Program Seminar on Next Generation Internet Technologies,
  • Aug. 2006.
    • ´Ý»³¿­¡¦¾®ÄÍ¿¿·¼¡¦Ãæ¼ÁÇŵ¡¦²¬Éô¼÷ÃË,
  • ¥¢¥É¥ì¥¹¾ðÊó¤ÎÊѹ¹ÄÌÃΤò½¸Ì󤷤ƺÆÁ÷¤Ç¤­¤ë¤è¤¦¤Ë¤¹¤ë mSCTP³ÈÄ¥,
  • ¿®³Øµ»Êó,
  • 2006ǯ7·î
    • À¶À®Íªµ®¡¤µÜÌî±Ñ¼¡¡¤µÜºê½¤°ì¡¤
  • »îÌäͽÄêɽºîÀ®ÌäÂê¤Î·×»»Ê£»¨¤µ,
  • ¿®³Øµ»Êó, vol. 106, no. 128, COMP2006-18, pp. 7-14, 2006ǯ6·î.
  • //(ÅŻҾðÊóÄÌ¿®³Ø²ñ¥³¥ó¥Ô¥å¥Æ¡¼¥·¥ç¥ó¸¦µæ²ñ)
  • //pp.7-14, June, 2006. (ºë¶ÌÂç³Ø¡¤¤µ¤¤¤¿¤Þ»Ô)
    • ÂçÊ¿·ò»Ê¡¦Áס¡Ãæ¼â¡¦¹âÁÒ¹°´î¡¦²¬Éô¼÷ÃË,
  • ̤ÃΤι¶·â¥³¡¼¥É¤ò°ÂÁ´¤Ë¼ý½¸¤¹¤ë¤¿¤á¤ÎÄêÅÀ´Ñ¬ÁõÃ֤ι½ÃÛ¼êË¡,
  • //ÅŻҾðÊóÄÌ¿®³Ø²ñIA¸¦µæ²ñ¡ÊȯɽͽÄê¡Ë
  • ¿®³Øµ»Êó, vol. 106, no. 62, IA2006-1, pp. 1-6, 2006ǯ5·î.
    • Å粬À¯´ð¡¦Ã«ËÜÌÐÌÀ¡¦ÊÒ²¬½Ó¹¬¡¦Ê÷Èø¿¿°ì¡¦Á¾º¬¸¶ÅС¦»ûÀ¾Íµ°ì¡¦ÈÓÅľ¡µÈ¡¦²¬Éô¼÷ÃË,
  • Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×UPKI¤Ë¤ª¤±¤ëǧ¾ÚÏ¢·ÈÊý¼°¤Î¸¡Æ¤,
  • //ÅŻҾðÊóÄÌ¿®³Ø²ñIA¸¦µæ²ñ¡ÊȯɽͽÄê¡Ë
  • ¿®³Øµ»Êó, vol. 106, no. 62, IA2006-3, pp. 13-18, 2006ǯ5·î.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#ca6f9548]
    • Yasuo Okabe, Koji Okamura, Kenji Fujikawa, Tomohiro Otani,
  • Internet Architecture (IA) Technical Committee,
  • IEICE Communications Society Global Newsletter, Vol.19, pp.2-3, Mar. 2007.
    • ²¬Éô¼÷ÃË,
  • ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Î¥ë¡¼¥Á¥ó¥°¥¢¥ë¥´¥ê¥º¥à¤È¤Õ¤¯¤½¤¦À©¸æ¥¢¥ë¥´¥ê¥º¥à,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ»ï Vol.89, No.4, pp.294-298 (2006)
    • µÜºê½¤°ì,
  • ¥ë¡¼¥¿¾å¤Î¥Ð¥Ã¥Õ¥¡´ÉÍýÌäÂê¤ËÂФ¹¤ë¥ª¥ó¥é¥¤¥ó¥¢¥ë¥´¥ê¥º¥à,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ»ï Vol.89, No.4, pp.299-303 (2006)
  • ** ¹ñºÝɸ½à²½Äó°Æ [#h192b368]
  • *2005ǯÅÙ [#s5955b64]
  • **ÏÀʸ»ïÏÀʸ [#xeae5339]
    • ´Ý»³¿­, ºÇÅÄ·ò°ì, ¾®ÄÍ¿¿·¼, Àж¶Í³»Ò, ÃÓÅÄ¿´, ¿¹´´É§, ´î¿°ì,
  • Virtual Machine¤ò³èÍѤ·¤¿Â絬Ì϶µ°éÍÑ·×»»µ¡¥·¥¹¥Æ¥à¤Î¹½ÃÛµ»½Ñ¤È¹Í»¡,
  • ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï,Vol.46, No.4 pp. 949-964(2005)
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#pc50c210]
    • Shin Maruyama, Motonori Nakamura, Yasuo Okabe, Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita, Priority Control in Receiving E-mails by Giving a Separate Response to Each DNS Query, SAINT2006, pp.90-93, Jan. 2006.
    • Iwama, K., Miyazaki, S. and Yamauchi, N.,
  • A (2-c 1 / ?sqrt{N})-Approximation Algorithm for the Stable Marriage Problem,
  • Proc. 16th International Symposium on Algorithms and Computation (ISAAC 2005)
  • (Lecture Notes in Computer Science 3827),
  • pp. 902-914, Dec., 2005. (Sanya, Hainan, China)
    • K. Ohira, Y. Huang, Y. Okabe, K. Fujikawa, M. Nakamura, Security Analysis on Public Wireless Internet Service Models, WMASH2005, pp. 107-110, Sept. 2005(¥Ý¥¹¥¿¡¼)
    • H. Murai, Y. Okabe, Pipeline Parallelization in HPF programs on the Earth Simulator, HPF international Workshop: Experiences and Progress 2006 (HiWEP2005), Lecture Notes in Computer Science, Vol. 4759, pp.365-373, Sept. 2005
    • K. Ohira, Y. Koyama, K. Fujikawa, Y. Okabe, Automatic Address Assignment for IPv6 End-to-End Multihoming Sites, ICITA2005, Vol II, pp. 755-758, July 2005(¥Ý¥¹¥¿¡¼)
  • **¸ýƬȯɽ [#bfbc07cc]
    • Yasuo Okabe,
  • UPKI ¡½ Japanese National Academic Authentication and Authorization Platform for Cyber Science Infrastructure,
  • NII International Workshop on Cyber Science Infrastructure,
  • Mar. 2006.
    • ÃæÌîË­, ²¬Éô¼÷ÃË, Ãæ¼ÁÇŵ, ¥Í¥Ã¥È¥Ë¥å¡¼¥¹¥µ¡¼¥Ð·²¤Î¥È¥Ý¥í¥¸¡¼¤Ë¤ª¤±¤ë½ôÀ­¼Á¤ÎʬÀÏ, ¾ðÊó½èÍý³Ø²ñÂ裲²ó¥Í¥Ã¥È¥ï¡¼¥¯À¸Âֳإ·¥ó¥Ý¥¸¥¦¥à, Mar. 2006¡Ê¥Ý¥¹¥¿¡¼¡Ë
    • ´ä²¼±Ñ½Ó, ²¬Éô¼÷ÃË, ¿ùºêͳŵ, ÀÄÌÚÀµ¼ù, LINPACK¤ÈFFT¤Ë¤è¤ëHPF¥³¥ó¥Ñ¥¤¥éfhpf¤ÎÀ¸»ºÀ­¤Îɾ²Á, ¾ð½è¸¦Êó, Vol.2006, No.20, HPC-105, pp.67-72, Feb. 2006.
    • ²¬Éô¼÷ÃË, Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¹½ÃۤˤĤ¤¤Æ,
  • Ê¿À®17ǯÅÙITBLµ»½ÑÉáµÚ¡¦ÍøÍѤ˴ؤ¹¤ëÁí¹ç¥·¥ó¥Ý¥¸¥¦¥à¡Ö²¾Áۼ¸³¤ÈÂ絬ÌÏ¥·¥ß¥å¥ì¡¼¥·¥ç¥ó¤ÇÂó¤¯Àèü²Ê³Ø2006¡×, Feb.2006.
    • ²¬Éô¼÷ÃË,
  • Âç³Ø´ÖÏ¢·È¤Î¤¿¤á¤ÎÁ´¹ñ¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈ×(UPKI)¹½ÃÛ»ö¶È,
  • Âç³ØÅÅ»Òǧ¾Ú´ðÈ×¥·¥ó¥Ý¥¸¥¦¥à¡ÝºÇÀèü³Ø½Ñ¾ðÊó´ðÈסÊCSI¡Ë¤Î¼Â¸½¤Ë¸þ¤±¤¿Á´¹ñÂç³Ø¶¦Æ±ÅÅ»Òǧ¾Ú´ðÈסÊUPKI¡Ë¤Î¹½ÃÛ¡Ý,2006ǯ2·î.
    • ¾®ÎÓ¹ÀÆó, µÜºê½¤°ì, ²¬Éô¼÷ÃË, ¥Þ¥ë¥Á¥­¥å¡¼¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ, 2005ǯÅÙÅߤÎLA¥·¥ó¥Ý¥¸¥¦¥à, [14], Jan. 2006.
    • ´Ý»³¿­, ¾®ÄÍ¿¿·¼, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, Ê£¿ô¥¢¥É¥ì¥¹Âбþ¤Î¤¿¤á¤ÎSocket API ³ÈÄ¥, ¿®³Øµ»Êó, vol. 105, no. 530, IA2005-27, pp. 49-54, 2006ǯ1·î.
    • ÎëÌÚÏÂÌé, ÇϾì½ÓÊå, ¹âÁÒ¹°´î,
  • ̤ÍøÍÑ¥¢¥É¥ì¥¹¥Ö¥í¥Ã¥¯¤ËÅþ㤹¤ë¥È¥é¥Õ¥£¥Ã¥¯¤Î²òÀÏ,
  • ¿®³Øµ»Êó, vol. 105, no. 530, IA2005-23, pp. 25-30, 2006ǯ1·î.
  • 3rd AEARU Workshop on Network Education (Keynote Speech), Dec. 2005.
    • S. Miyazaki and Y. Okabe, Cheat-proof Serverless Network Games, Proc. 4th International Symposium on Computing and Media Studies, pp. 94-101, Jan. 2006.
    • µÜºê½¤°ì¡¤µ×ÊݹÀ»Ë¡¤¹â¸«¹¥ÃË¡¤»ÍÊýÉÒÌÀ¡¤Ý¯°æ¹±Àµ¡¤»³¸µ¿­¹¬¡¤²ÏÌîŵ¡¤¹¾¸¶¹¯À¸¡¤¹âÁÒ¹°´î¡¤ÂôÅÄÆƻˡ¤Ãæ¼ÁÇŵ¡¤²¬Éô¼÷ÃË¡¤ËÌÌîÀµÍº¡¤
  • KUINSÀܳµ¡´ïÅÐÏ¿¥Ç¡¼¥¿¥Ù¡¼¥¹¤Î³µÍס¤
  • Á´¹ñ¶¦Æ±ÍøÍѾðÊó´ðÈ×¥»¥ó¥¿¡¼ ¸¦µæ³«È¯ÏÀʸ½¸¡¤No.27
  • pp.47-51, Oct. 2005.
    • ÃæÌîË­, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË,
  • ¥Í¥Ã¥È¥Ë¥å¡¼¥¹¥µ¡¼¥Ð·²¤Î¥È¥Ý¥í¥¸¡¼¤¬»ý¤Ä¥¹¥±¡¼¥ë¥Õ¥ê¡¼À­¤Ê¤É¤ÎÅý·×ŪÀ­¼Á,
  • ¿®³Øµ»Êó, vol. 105, no. 377, IA2005-14, pp. 13-18, 2005ǯ10·î.
    • ´Ý»³ ¿­, ¾®ÄÍ ¿¿·¼,
  • Ê£¿ô¥¢¥É¥ì¥¹¤ËÂбþ¤¹¤ë¤¿¤á¤Î Socket API ³ÈÄ¥,
  • ITRC18, Oct. 2005.
    • Yasuo Okabe, UPKI ¡½ Interuniversity Authentication and Authorization Platform for Japanese Cyber-Science Infrastructure,20th APAN Meeting¡§Advanced Network Conference in Taipei, Aug. 2005.
    • »³ÆâľºÈ¡¤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë¶É½êõº÷¶á»÷¥¢¥ë¥´¥ê¥º¥à¤Î²þÎÉ, ¿®³Øµ»Êó¡¤Vol.105, No.72, COMP2005-15, pp.45-51, May, 2005.
    • ¾®ÎÓ¹ÀÆ󡦵ܺ꽤°ì¡¦²¬Éô¼÷ÃË, ¶¦Í­¥á¥â¥ê·¿¥¹¥¤¥Ã¥Á¤Ë¤ª¤±¤ë¥ª¥ó¥é¥¤¥ó¥Ð¥Ã¥Õ¥¡´ÉÍý¥¢¥ë¥´¥ê¥º¥à¤Î¶¥¹çÈæ¤Î²þÎÉ, ¿®³Øµ»Êó, Vol.105, No.144, COMP2005-21, pp.17-22, June 2005.
    • J. Song, H. Takakura, Y. Okabe, Y. Kwon, A Study on Accuracy Improvement of Intrusion Detection System Based on Data Mining, In Proceedings of KISS (Korea Information Science Society) Korea Computer Congress 2005 , Vol.32, No.1, pp.208-210, July 6-8, 2005.
    • Îú°ìÊ¿, »³°æÀ®ÎÉ, ²¬»³À»É§, µÜ²¼ÂîÌé, ´Ý»³¿­, Ãæ¼ÁÇŵ, °¸ÀèÉÔÌÀ¥á¡¼¥ë¤òÍøÍѤ·¤¿Ê¬»¶¶¨Ä´·¿spam¥Õ¥£¥ë¥¿¤Îǧ¼±Î¨¸þ¾å, ¾ðÊó½èÍý³Ø²ñDSM¸¦µæ²ñ, 2005ǯ5·î
  • //**¹ñºÝɸ½à²½Äó°Æ
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#lbc53815]
    • ²¬Éô¼÷ÃË, ¼é¤ê¤«¤é¹¶¤á¤Ø:¥»¥­¥å¥ê¥Æ¥£¤È¥×¥é¥¤¥Ð¥·¡¼¤Î¥Ñ¥é¥À¥¤¥à¥·¥Õ¥È, ´¬Æ¬¸À, R&D News Kansai, No.429,Nov.2005.
  • //**Æõö¡¦¼ÂÍÑ¿·°Æ
  • *2004ǯÅÙ [#l12a1e99]
  • **ÏÀʸ»ïÏÀʸ [#m4969e37]
    • H. Ito, K. Iwama, Y. Okabe, T. Yoshihiro,
  • Single backup table schemes for shortest-path routing,
  • Theoretical Computer Science, 333, pp. 347-353, 2005
    • A. Ishtiaq, Y. Okabe, M. Kanazawa,
  • Management of parallel UBR flows over TCP in congested ATM networks,
  • Computer Communications, 27, 801-808,
  • 2004.
    • Halldorsson, M., Iwama, K., Miyazaki, S. and Yanagisawa, H.,
  • Randomized approximation of the stable marriage problem,
  • Theoretical Computer Science, Vol. 325, No. 3, pp. 439-465, Oct. 2004.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#g6811fa6]
    • Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita, Shin Maruyama, Motonori Nakamura,
  • Protection Method against Massive Error Mails Caused by Sender Spoofed Spam Mails,
  • SAINT2005, Jan. 2005.
    • A. Ishtiaq, Y. Okabe, M. Kanazawa,
  • Issues of Multihoming Implementation using SCTP,
  • IASTED International Conference on Communication Systems and Applications (CSA2004), 422-162, July 2004.
    • Iwama, K., Miyazaki, S. and Okamoto, K., A (2-c log N/N)-Approximation Algorithm for the Stable Marriage Problem, Proceedings of the 9th Scandinavian Workshop on Algorithm Theory (SWAT 2004), (LNCS 3111), pp. 349-361, July 2004. (Humlebaek, Denmark)
    • ¼°æ¶Ñ,²¬Éô¼÷ÃË,Ãϵ奷¥ß¥å¥ì¡¼¥¿¾å¤ÎHPF¤Ë¤è¤ëNAS Parallel Benchmarks¤Î¼ÂÁõ¤Èɾ²Á, SACSIS2004¡½Àè¿ÊŪ·×»»´ðÈ×¥·¥¹¥Æ¥à¥·¥ó¥Ý¥¸¥¦¥à, May 2004.
  • **¸ýƬȯɽ [#p91fecdf]
    • ²ÃÆ£¿¿Î¤, ¾®À¾Îɾ°, ÀÄ»³»°»Þ»Ò, ÀÄÌÚ·ÃÈþ»Ò, Æ£ËöË®À¯, º£Â¼¸µ°ì, ²¬Éô¼÷ÃË, µþÅÔ¤¹¤Ð¤ë¹â¹»IT¿Íºà°éÀ®¥×¥í¥¸¥§¥¯¥È¤Ë¤Ä¤¤¤Æ, µþÅÔÂç³Ø³Ø½Ñ¾ðÊó¥á¥Ç¥£¥¢¥»¥ó¥¿¡¼¸¦µæ³«È¯Éô¥·¥ó¥Ý¥¸¥¦¥à, Mar. 2005.
    • ÅÏÉô°ê·Ã, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, ÈþǻƳɧ,
  • Ê£¿ô·ÐÏ©¤ò³èÍѤ·¤¿¥Ð¡¼¥¹¥È¥Ñ¥±¥Ã¥È¥í¥¹¤Ë¶¯¤¤¥¹¥È¥ê¡¼¥ß¥ó¥°¥·¥¹¥Æ¥à,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ2005ǯÁí¹çÂç²ñ¥Ý¥¹¥¿¡¼¥»¥Ã¥·¥ç¥ó, Mar. 2005.
    • ¸Å¼δÌÀ, Ë̸¶Î¼, Æ£À¼£, ¾å¸¶Å¯ÂÀϺ, ²¬Éô¼÷ÃË,
  • ¤ß¤¢¤³¥Í¥Ã¥È¤Ç¤Î¼Â»þ´ÖÆ°²èÁü¥Þ¥ë¥Á¥­¥ã¥¹¥È¼Â¸³
  • ÅŻҾðÊóÄÌ¿®³Ø²ñµ»½ÑÊó¹ð, NS2004-199, pp.101-106, Feb. 2005.
    • Y. Huang, K. Ohira, K. Fujikawa, Y. Okabe, Secure Models of Autonomous Distributed Public Wireless Internet Access, DPS, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 2005-DPS-122&2005-CSEC-28 pp. 187-192, Mar 2005.
    • ¹âÌÚ¼£É×,²¬Éô¼÷ÃË,Æ£À¼£,¸Å¼δÌÀ,Ë̲¬Í­´î,¡Ø¤ß¤¢¤³¥Í¥Ã¥ÈÊý¼°¡Ù¤Ç¼Â¸½¡½°Â¿´¡¦°ÂÁ´¤òÀ¸¤à¶¦Í­ºâ¤È¤·¤Æ¤Î̵ÀþLAN,
  • ÃÏ°è¥Í¥Ã¥È¥ï¡¼¥¯Ï¢·È¥ï¡¼¥¯¥·¥ç¥Ã¥×inµþÅÔ2004, Jul 2004.
    • ÂçÊ¿·ò»Ê,¾®»³Íΰì,Æ£À¼£,²¬Éô¼÷ÃË, IPv6¥¨¥ó¥É¥Ä¡¼¥¨¥ó¥É¥Þ¥ë¥Á¥Û¡¼¥ß¥ó¥°¤Î¤¿¤á¤Î¥¢¥É¥ì¥¹³äÅö¤ÈÁ÷¿®¸µ¥¢¥É¥ì¥¹¤ò¹Íθ¤·¤¿·ÐÏ©À©¸æ,
  • ¿®³Øµ»Êó, vol. 104, no. 173, IA2004-11, pp. 25-30,2004ǯ7·î.
  • //QAI, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 2004-QAI-12 pp.25-30, Jul 2004.
    • Ãæ¼ÁÇŵ,ȬÌÚ·¼²ð,²¬Éô¼÷ÃË,
  • IIDC 1394 Digital Camera over IP ¤Ë¤è¤ë±ó³Ö¹ÖµÁÍѹâÉʰ̱ÇÁüÅÁÁ÷¥·¥¹¥Æ¥à¤Î¼ÂÁõ¤È¥×¥í¥È¥³¥ë,
  • ITRC15, May 2004.
    • Æ£À¼£,¾¾Ëܸ»Ë,¾®ÄÍ¿¿·¼,²¬Éô¼÷ÃË,
  • TCP ¥Þ¥ë¥Á¥Û¡¼¥à¥ª¥×¥·¥ç¥ó¤Î¼ÂÁõ¤È SOCKS ¥µ¡¼¥Ð¤Ø¤Î±þÍÑ,
  • ITRC15, May 2004.
    • ÂçÊ¿·ò»Ê,¾®ÄÍ¿¿·¼,¾®»³Íΰì,Æ£À¼£,²¬Éô¼÷ÃË,Hop-by-Hop Address Assignment and Source Address Based Routing for IPv6 End-to-End Multihoming, ITRC15, May 2004.
    • ²«±Ï,Ãæ¼ÁÇŵ,²¬Éô ¼÷ÃË,¸ø³«¸°°Å¹æ¤Ë¤è¤ëÅŻҽð̾¤òÍѤ¤¤¿¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥¢¥¯¥»¥¹Êý¼°¤ÎÄó°Æ,ITRC15,May 2004.
  • //-¸Å¼δÌÀ,¤ß¤¢¤³¥­¥ã¥¹¥È¤Î¾Ò²ð ¡Á¤ß¤¢¤³¥Í¥Ã¥È¤Ç¤Î̵Àþ¥Þ¥ë¥Á¥­¥ã¥¹¥È¼Â¸³¡Á,ITRC15, May 2004.
    • ²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤¶É½êõº÷Ë¡¤Ë¤è¤ë°ÂÄê·ëº§ÌäÂê¤Î¶á»÷,¿®³Øµ»Êó¡¤Vol.104, No.16, COMP2004-8,pp.53-60, April, 2004.
    • »³°æÀ®ÎÉ¡¦ÈËÅÄŸ»Ë¡¦²¬»³À»É§¡¦µÜ²¼ÂîÌ顦´Ý»³¡¡¿­¡¦Ãæ¼ÁÇŵ, ȯ¿®¼Ôº¾¾Îspam ¥á¡¼¥ë¤Ëµ¯°ø¤¹¤ë¥¨¥é¡¼¥á¡¼¥ë½¸Ãæ¤Ø¤ÎÂкö¼êË¡, ¾ðÊó½èÍý³Ø²ñ FIT2004 Âè3²ó¾ðÊó²Ê³Øµ»½Ñ¥Õ¥©¡¼¥é¥à, 2004ǯ9·î
  • //**¹ñºÝɸ½à²½Äó°Æ
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#b8e69e9c]
    • ¸Å¼δÌÀ,ÂçÊ¿·ò»Ê,Æ£À¼£,²¬Éô¡¡¼÷ÃË,
  • //''̵ÀþLANµ»½Ñ¤òÍøÍѤ·¤¿¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Î¹½ÃÛ:4.̵ÀþLAN¤Ë¤è¤ë°ÜÆ°ÂÎÄÌ¿®¤Î»öÎã4.3
  • ̵ÀþLAN¤Ë¤è¤ë¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥µ¡¼¥Ó¥¹ ¤ß¤¢¤³¥Í¥Ã¥È
  • ¾ðÊó½èÍý³Ø²ñ»ï, Vol.45 No.8, 831-835, Aug 2004.
    • ²¬Éô¼÷ÃË,ËåÈøµÁ¼ù,´ä²¼±Ñ½Ó,
  • ¼¡À¤Â女¥ó¥Ô¥å¡¼¥¿¤Ë¸þ¤±¤¿µ»½ÑŸ˾¤È¾­Íè¤Ø¤Î´üÂÔ,
  • ¥×¥é¥º¥Þ¡¦³ËÍ»¹ç³Ø²ñ»ï, Âè80´¬Âè5¹æ, 382-389, May 2004.
    • µÜºê½¤°ì, °ÂÄê·ëº§ÌäÂê, ÅŻҾðÊóÄÌ¿®³Ø²ñ²ñ»ï, Vol.88, No.3, pp. 195-199, March 2005.
  • //**Æõö¡¦¼ÂÍÑ¿·°Æ
  • *2003ǯÅÙ [#q8424c0c]
  • **ÏÀʸ»ïÏÀʸ [#a7e107c8]
    • ¹âÁÒ¹°´î¡¤¹¾¸¶¹¯À¸¡¤µÜºê½¤°ì¡¤ÂôÅÄÆƻˡ¤Ãæ¼ÁÇŵ¡¤²¬Éô¼÷ÃË¡¤°ÂÁ´¤Ê¥®¥¬¥Ó¥Ã¥È¥Í¥Ã¥È¥ï¡¼¥¯¥·¥¹¥Æ¥à KUINS-III ¤Î¹½À®¤È¥»¥­¥å¥ê¥Æ¥£Âкö, ÅŻҾðÊóÄÌ¿®³Ø²ñÏÀʸ»ï Vol.J86-B No.8 ,pp. 1494-1501, Aug. 2003.
    • ÂôÅÄ ÆÆ»Ë, ¹âÁÒ ¹°´î, ²¬Éô ¼÷ÃË,
  • ³«Êü·¿Â絬Ìϥͥåȥ¥¯¤Î¤¿¤á¤ÎIDS¥í¥°´Æ»ë»Ù±ç¥·¥¹¥Æ¥à,
  • ¾ðÊó½èÍý³Ø²ñÏÀʸ»ï, Vol.44, No.8, pp.1861-1871, Aug. 2003.
    • Halldorsson, M., Irving, R., Iwama, K., Manlove, D., Miyazaki, S., Morita, Y. and Scott, S. Approximability Results for Stable Marriage Problems with Ties, Theoretical Computer Science, Vol. 306, pp. 431-447, Sept. 2003.
    • Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro,
  • Avoiding Routing Loops in the Internet,
  • Theory of Computing Systems, 36, 597-609, 2003.
  • **¹ñºÝ²ñµÄÅùȯɽ¡ÊººÆÉÉÕ¡Ë [#bdddcfbd]
    • Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro,
  • Polynomial-Time Computable Backup Tables for Shortest-Path Routing,
  • The 10th International Colloquium on Structural Information and
  • Communication Complexity (SIROCCO 2003), pp.163-177, June 2003.
    • Halldorsson, M., Iwama, K., Miyazaki, S. and Yanagisawa, H. Randomized Approximation of the Stable Marriage Problem, Proceedings of the ninth Annual International Computing and Combinatorics Conference (COCOON 2003), (LNCS 2697), pp. 339-350, July 2003. (Big Sky, USA)
    • Komura, T., Fujikawa, K., and Okabe, Y., The MIAKO.NET Public Wireless Internet Service in Kyoto, Proc. of the First ACM International Workshop on Wireless Mobile Applications and WLAN Hotspots (WMASH2003), September 2003.
    • Halldorsson, M., Iwama, K., Miyazaki, S. and Yanagisawa, H., Improved Approximation of the Stable Marriage Problem, Proceedings of the 11th Annual European Symposium on Algorithms (ESA 2003), (LNCS 2832), pp. 266-277, Sep. 2003. (Budapest, Hungary)
    • Komura, T., Kosuga, M., Fujikawa, K., and Okabe, Y., Design and Implementation of the MIAKO.phone Peer-to-peer Mobile IP Phone System, 5th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT2003), November 2003.
  • **¸ýƬȯɽ [#fb544771]
    • ½ïÊý ¾¡Ìé, ÂçÊ¿ ·ò»Ê, ¸Å¼ δÌÀ, ¤ß¤¢¤³¥Í¥Ã¥È¤Î¥Í¥Ã¥È¥ï¡¼¥¯¹½À®¤ÈIPv6Âбþ, Âè13²ó ITRCÁí²ñ¡¦¸¦µæ²ñ, May 2003.
    • ÂçÊ¿ ·ò»Ê, ½ïÊý ¾¡Ìé, ¾¾ËÜ Â¸»Ë, Æ£Àî ¸­¼£, ²¬Éô ¼÷ÃË, End-to-End¥Þ¥ë¥Á¥Û¡¼¥à¤Î¤¿¤á¤ÎIPv6¥¢¥É¥ì¥·¥ó¥°¥¢¡¼¥­¥Æ¥¯¥Á¥ã, Âè13²ó ITRCÁí²ñ¡¦¸¦µæ²ñ, May 2003.
    • ¾¾ËÜ Â¸»Ë, Æ£Àî ¸­¼£, ²¬Éô ¼÷ÃË, End-to-End¥Þ¥ë¥Á¥Û¡¼¥àÂбþTCP¤ÎÀ߷פȳ«È¯, ITRC2003 ,21 May, 2003.
    • ÂçÊ¿·ò»Ê, ½ïÊý¾¡Ìé, ¾¾Ëܸ»Ë, Æ£À¼£, ²¬Éô¼÷ÃË, End-to-End ¥Þ¥ë¥Á¥Û¡¼¥à¤Î¤¿¤á¤ÎIPv6¥¢¥É¥ì¥·¥ó¥°¥¢¡¼¥­¥Æ¥¯¥Á¥ã, ¾ðÊó½èÍý³Ø²ñ ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¦Ê¬»¶¡¦¶¨Ä´¤È¥â¡¼¥Ð¥¤¥ë(DICOMO2003)¥·¥ó¥Ý¥¸¥¦¥à, Jun 2003.
    • ²«±Ï,¿¼¯ÍÛ²ð,Ãæ¼ÁÇŵ,ÈþǻƳɧ, ¥Û¡¼¥à¥Í¥Ã¥È¥ï¡¼¥¯¤Ë¤ª¤±¤ë¥¢¥×¥é¥¤¥¢¥ó¥¹¤ÎÁêÂаÌÃÖ¤ÈÍøÍÑÍúÎò¤ò³èÍѤ·¤¿¥µ¡¼¥Ó¥¹¤ÎÄó¼¨Êý¼°, ¾ðÊó½èÍý³Ø²ñ ¥Þ¥ë¥Á¥á¥Ç¥£¥¢¡¦Ê¬»¶¡¦¶¨Ä´¤È¥â¡¼¥Ð¥¤¥ë(DICOMO2003)¥·¥ó¥Ý¥¸¥¦¥à, Jun 2003.
    • ½ïÊý¾¡Ìé, ÂçÊ¿·ò»Ê, Æ£À¼£, ²¬Éô¼÷ÃË, IPv6 end-to-end multihoming¤Ë¤è¤ëRSVP¤Î¥â¥Ð¥¤¥ëÂбþ, ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 03-QAI, October 2003.
    • Æ£À¼£, ¸Å¼δÌÀ, ²¬Éô¼÷ÃË, µþÅÔ̵Àþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥×¥í¥¸¥§¥¯¥È ¤ß¤¢¤³¥Í¥Ã¥È, Ê¿À®15ǯÅŵ¤´Ø·¸³Ø²ñ´ØÀ¾»ÙÉôÏ¢¹çÂç²ñ S8-3 Nobember 2003.
    • K. Ohira, K. Ogata, A. Matsumoto, K. Fujikawa, Y. Okabe, IPv6 Address Assignment and Route Selection for End-to-End Multihoming, Âè14²ó ITRCÁí²ñ¡¦¸¦µæ²ñ, November 2003.
    • ²ÃÆ£½Óºö¡¤µÜºê½¤°ì¡¤²¬Éô¼÷ÃË,ÉÔÀµ¤ò¸¡½Ð¤Ç¤­¤ë¥Í¥Ã¥È¥ï¡¼¥¯·³¿Í¾­´ý, ¿®³Øµ»Êó¡¤ Vol.103, No.499, ISEC2003-84,pp.1-6, Dec., 2003.
    • A. Matsumoto, M. Kozuka, K. Fujikawa, Y. Okabe, TCP Multi-Home Options, WIT2003, 5 Nov, 2003.
    • ÀîÀ¾ÃÒÌé, Ãæ¼ÁÇŵ, ²¬Éô¼÷ÃË, ÈþÇ» Ƴɧ,
  • FEC¤ÈPath-Diversity¤òÍøÍѤ·¤¿²óÉü²Äǽ¤Ê¥¹¥È¥ê¡¼¥ß¥ó¥°,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 2003-DPS 116-014, Jan. 2004.
    • ¸Å¼δÌÀ, ÂçÊ¿·ò»Ê, Æ£À¼£, ²¬Éô¼÷ÃË, ¸ø½°ÌµÀþ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¥×¥í¥¸¥§¥¯¥È¡Ö¤ß¤¢¤³¥Í¥Ã¥È¡×¤Î±¿Íѵ»½Ñ, ¾ðÊó½èÍý³Ø²ñʬ»¶¥·¥¹¥Æ¥à/¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à2004 (DSM2004), February 2004.
    • FUJIKAWA Kenji, KOMURA Takaaki, OKABE Yasuo, The MIAKO.NET Public Wireless Internet Service in Kyoto, Proceedings of International Conference on Informatics Research for Development of Knowledge Society Infrastructure 2004, March 2004.
    • ²¬ËÜÏÂÌ顤µÜºê½¤°ì¡¤´ä´Ö°ìͺ¡¤°ÂÄê·ëº§ÌäÂê¤ËÂФ¹¤ë¶É½êõº÷¶á»÷¥¢¥ë¥´¥ê¥º¥à,ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ2004 D-1-2, March 2004.
    • ²¬Éô¼÷ÃË,
  • ¥¤¥ó¥¿¡¼¥Í¥Ã¥È¤Î´ðÁà ¡½¥¢¥ë¥´¥ê¥º¥à¤ÎΩ¾ì¤«¤é¡½,
  • ÅŻҾðÊóÄÌ¿®³Ø²ñ Áí¹çÂç²ñ2004 TD-1-1, March 2004.
    • ´Ý»³¿­, Ãæ¼ ÁÇŵ, ²¬Éô¼÷ÃË, »³°æÀ®ÎÉ,
  • ưŪ¤Ë±þÅú¤¬ÊѲ½¤¹¤ë¥Í¡¼¥à¥µ¡¼¥Ð¡¼µ»½Ñ¤Î¥á¡¼¥ëÇÛÁ÷¥¨¡¼¥¸¥§¥ó¥È¤Ø¤Î±þÍÑ,
  • ¾ðÊó½èÍý³Ø²ñ¸¦µæÊó¹ð 03-DSM, 032-014, March 2004.
    • Îú¡¡°ìÊ¿¡¦»³°æÀ®ÎÉ¡¦²¬»³À»É§¡¦µÜ²¼ÂîÌ顦´Ý»³¡¡¿­¡¦Ãæ¼ÁÇŵ, ÃÙ±äɾ²Á¤Ë¤è¤ëʬ»¶¶¨Ä´·¿spam ¥Õ¥£¥ë¥¿¤Î¸¡½ÐΨ¸þ¾å, Ê¿À®15ǯÅÙCSEC¸¦µæȯɽ²ñ Âè24²ó, 2004ǯ3·î
    • ´Ý»³ ¿­¡¦ºÇÅÄ·ò°ì¡¦¾®ÄÍ¿¿·¼¡¦Àж¶Í³»Ò¡¦ÃÓÅÄ¿´¡¦¿¹´´É§¡¦´î¿°ì, Virtual Machine ¤ò³èÍѤ·¤¿Ê¬»¶½èÍý¥·¥¹¥Æ¥à¹½ÃÛ¡¦±¿Íѵ»½Ñ¡¿¥¤¥ó¥¿¡¼¥Í¥Ã¥È±¿Íѵ»½Ñ¥·¥ó¥Ý¥¸¥¦¥à2004, 2004ǯ1·î
  • **¹ñºÝɸ½à²½Äó°Æ [#fe90b7ec]
    • Arifumi Matsumoto, Kenji Fujikawa, Yasuo, Okabe, Basic Socket API Extension for LIN6 End-to-End Multi-home, IETF Internet-Draft, 23 June 2003.
    • Arifumi Matsumoto, Masahiro, Kozuka, Kenji Fujikawa, Yasuo Okabe, TCP Multi-Home Options, IETF Internet-Draft, 7 Oct 2003.
    • Arifumi Matsumoto, Masahiro, Kozuka, Kenji Fujikawa, Yasuo Okabe, TLC-FM, IETF Internet-Draft, 7 Oct 2003.
    • K. Ohira, K. Ogata, A. Matsumoto, K. Fujikawa, Y. Okabe, IPv6 Address Assingment and Route Selection for End-to-End Multihoming, IETF Internet-Draft, November 2003.
  • **³Ø²ñ»ï¡¦¾¦¶È»ïÅù²òÀâ [#lf0dd109]
    • ²¬Éô¼÷ÃË,
  • µþÅԤˤª¤±¤ëIT¤ò³èÍѤ·¤¿Âç³Ø¤ÎÃϰ趵°é¹×¸¥,
  • View Point, Âè4¹æ, 10-15, Mar. 2004.
  • //**Æõö¡¦¼ÂÍÑ¿·°Æ
  1. - Top
  2. - (English)
  3. //- ¿·Ãå¾ðÊó
  4. - ¸¦µæ¼¼¾Ò²ð
  5. - ¥á¥ó¥Ð¡¼
  6. - ¸¦µæ¥×¥í¥¸¥§¥¯¥È
  7. - ÏÀʸ
  8. - ¼õ¾Þ
  9. - ¥Ö¥í¥° (¥«¥ì¡¼)
  10. - ¥Ö¥í¥° (¥«¥ì¡¼°Ê³°)
  11. - Ï¢ÍíÀè
  12. - ¥¢¥¯¥»¥¹
  13. //- ¥¹¥±¥¸¥å¡¼¥ë
  14. - ¹ÖµÁ¾ðÊó
  15. - ¼«¼ç¥¼¥ß
  16. //- ¥Ö¥í¥°
  17. - Tips
  18. - ¥í¡¼¥«¥ë¾ðÊó
  19. - ¥ê¥ó¥¯