(¥»¥å·¥ç¥óɽ¤Ø)

¥ޥë¥á¥ǥ£¥¢¡¤ʬ»¶¡¤¶¨Ĵ¤ȥâ¥Х¤¥ë(DICOMO2013)¥·¥ó¥ݥ¸¥¦¥à

¥»¥å·¥ç¥ó 1B  ºҳ²»þÄ̿®
Æü»þ: 2013ǯ7·î10Æü(¿å) 12:55 - 14:35
Éô²°: Ç𡦥ݥץé
ºÂĹ: Ãæ¼ ²Åδ (¸øΩ¤Ϥ³¤Æ̤ÍèÂç³Ø)

1B-1 (»þ´Ö: 12:55 - 13:15)
Âê̾ Â絬ÌϺҳ²»þ¤Σ³GÄ̿®ÉԲÄǽ¥¨¥ꥢ¤ˤª¤±¤ë¾ðÊóȯ¿®¤ª¤è¤Ӽý½¸¤ò²Äǽ¤Ȥ¹¤ëDTN¥١¼¥¹¥á¥å»¡¼¥¸Ãæ·Ñˡ¤ÎÄó°ƤÈɾ²Á
Ãø¼Ô ¾®»³ ͳ (ÆàÎÉÀèü²ʳص»½ÑÂç³ر¡Âç³Ø), *¿åËÜ °°ÍÎ (ÆàÎÉÀèü²ʳص»½ÑÂç³ر¡Âç³ء¤ÆüËܳؽѿ¶¶½²ñÆÃÊ̸¦µæ°÷£ģÃ), °ÂËÜ ·İì (ÆàÎÉÀèü²ʳص»½ÑÂç³ر¡Âç³Ø)
Page pp. 26 - 33
Keyword ºҳ²»þÄ̿®, DTN, Social Networking Service, ¤¹¤ì°㤤Ä̿®, ¥롼¥ƥ£¥ó¥°
Abstract ËܹƤǤϡ¤Â絬ÌϺҳ²ȯ¤ˤè¤ꥻ¥ë¥éÄ̿®¤¬ÍøÍÑÉԲÄǽ¤ˤʤä¿Ãϰè¤ˤª¤¤¤Ƥ⡤¥¹¥ޡ¼¥ȥե©¥ó¤òÍѤ¤¤ưÂÈݳÎǧ¾ðÊó¤ÎÁª¤è¤ӼèÆò²Äǽ¤ˤ¹¤ëDTN¡ÊDisruption/ Delay Tolerant Networking¡ˤ˴ð¤Ť¤¤¿¥á¥å»¡¼¥¸Ãæ·Ñˡ¤òÄó°Ƥ¹¤롥Äó°Ƽêˡ¤Ǥϳƥ桼¥¶¤Υ»¥ë¥éÄ̿®¾Ȼþ¹ï¤ò´ޤ᤿°ÜưÍúÎò¤˲䨡¤¾¥桼¥¶üËö¤ȤÎÁø¶øÍúÎò¤òµ­Ͽ¤··Ðϩɽ¤òºî¤¹¤롥¤³¤ηÐϩɽ¤òÍøÍѤ·¡¤¤è¤êû¤¤»þ´֤ÇÅþ㤹¤ë²Äǽ¤ι⤤¥桼¥¶¤إá¥å»¡¼¥¸¤òÃæ·Ѥ¹¤뤳¤Ȥǥ»¥ë¥éÄ̿®¤¬²Äǽ¤ʥ¨¥ꥢ¤ª¤è¤ÓÆÃÄê¥桼¥¶¤˸þ¤±¤ƸúΨ¤褯¥á¥å»¡¼¥¸¤òÇÛÁ롥¸½¼ÂŪ¤ʥޥåפª¤è¤ӥâ¥ӥê¥ƥ£¥â¥ǥë¤òÍѤ¤¤¿·׻»µ¡¥·¥ߥå¥졼¥·¥ç¥ó¤ò¹Ԥ¤¡¤¥á¥å»¡¼¥¸ÅþãΨ¤ʤɤ˴ؤ·¤ƥ¨¥ԥǥߥ寥롼¥ƥ£¥󥰤ÈÈæ³Ӥò¹Ԥä¿·ë²̡¤Ä̿®²Äǽ¤ʥ¨¥ꥢ¤ÈÄ̿®ÉԲÄǽ¤ʥ¨¥ꥢ¤Υ桼¥¶¤ؤΥá¥å»¡¼¥¸Ãæ·Ѥˤª¤¤¤ơ¤¤½¤줾¤ìÅþãΨ¤¬80%¡¤70%¤ȡ¤¥¨¥ԥǥߥ寥롼¥ƥ£¥󥰤ËɤŨ¤¹¤ëǽ¤ò㤷¤¿¾å¤ǡ¤¸򴹤µ¤줿Áí¥á¥å»¡¼¥¸¿ô¤򡤥¨¥ԥǥߥ寥롼¥ƥ£¥󥰤ËÈæ¤١¤¤½¤줾¤ì30%¡¤45%º︺¤¹¤뤳¤Ȥ¬¤Ǥ­¤¿¡¥

1B-2 (»þ´Ö: 13:15 - 13:35)
Âê̾ ÂѺҳ²NDN¥١¼¥¹ʬ»¶·¿¥¢¥ץꥱ¡¼¥·¥ç¥ó¤ξðÊóÅÁãǽ¤ËÂФ¹¤ë¥桼¥¶°Üư¥â¥ǥë¤αƶÁɾ²Á
Ãø¼Ô *¾®²ϸ¶ ·ò, À ·½Çî, Àõ¸« Ű (ÅìµþÂç³ØÂç³ر¡¾ðÊóÍý¹©³طϸ¦µæ²Ê)
Page pp. 34 - 42
Keyword P2P, Named Data Networking, ³¬Áط¿ID¥١¼¥¹°Źæ, ÂѺҳ²¥¢¥ץꥱ¡¼¥·¥ç¥ó
Abstract ºҳ²»þ¤ˤª¤¤¤Ƥϡ¤°ÂÈݳÎǧ¤äÈïºҾʤɼþ°ϾÎŪ³ΤÊÇİ®¤¬Èﳲ³ÈÂç¤òËɤ°¾å¤ǽÅÍפȤʤ롥¤·¤«¤·¤ʤ¬¤顤¤½¤Τ褦¤ʾðÊó¤ÎÅÁã¤òô¤¦·ÈÂÓÅÅÏÃÌ֤ʤɤÎÄ̿®¥¤¥ó¥եé¤ÏÂ絬ÌϤʺҳ²»þ¤ˤϵ¡ǽ¤·¤ʤ¤¤³¤Ȥ¬¿¤¤¡¥¤½¤θ¶°ø¤ΰì¤Ĥϡ¤¸½ºߤξðÊ󥤥ó¥եé¤ϡ¤¥µ¡¼¥ӥ¹¤òÄ󶡤ª¤è¤ӴÉÍý¤¹¤륵¡¼¥Ф¬ÍøÍѤǤ­¤ʤ¯¤ʤë¤ȡ¤´ðÃ϶ɤȤ¤¤ä¿ËöüÀßÈòºߤǤⵡǽ¤·¤ʤ¯¤ʤ롤¥»¥󥿡¼½¸Ã淿¤ι½¤¤ò¤ȤäƤ¤¤뤳¤ȤǤ¢¤롥Ëܸ¦µæ¤Ǥϡ¤ºҳ²»þ¤ËÃÇÀþ¤ʤɤˤè¤ꥵ¡¼¥ÐÎबÍøÍѤǤ­¤ʤ¯¤ʤ俾ì¹ç¤ˤ⡤´ðÃ϶ɤʤɻĸ¤·¤¿ÀßÈ÷¤òÍøÍѤ·¤ƶɽêŪ¤ʥͥåȥ¥¯¤ò¹½Ãۤ·¡¤¥µ¡¼¥ӥ¹¤ò·Ñ³¤µ¤»¤뤳¤ȤòÌܻؤ¹¡¥¤½¤Τ¿¤á¤ˡ¤Named Data Networking(NDN)¤ˤè¤꼫Ωʬ»¶·¿¥ͥåȥ¥¯¤ò¹½Ãۤ·¡¤Hierarchical ID-Based Encryption(HIDE)¤ˤè¤뼫Χǧ¾ڤò¹Ԥ¦¤³¤Ȥǡ¤ºҳ²»þ¤ˤâÄ̾ï»þƱÍͤËÍøÍѤǤ­¤륵¡¼¥ӥ¹¤ª¤è¤ӥ¢¥ץꥱ¡¼¥·¥ç¥ó¤ò¹½¤·¤¿¡¥ ËܹƤǤϡ¤¥桼¥¶¤ιÔư¥â¥ǥ뤬¥¢¥ץꥱ¡¼¥·¥ç¥ó¤ξðÊóÅÁãǽ¤ØͿ¤¨¤ë±ƶˤĤ¤¤ƥ·¥ߥå¥졼¥·¥ç¥ó¤ˤè¤êĴºº¤·¤¿¡¥

1B-3 (»þ´Ö: 13:35 - 13:55)
Âê̾ ºҳ²¤ˤè¤ë¥ͥåȥ¥¯ÉÔÀܳ»þ¤ÎDelay/Disruption Tolerant NetworkÀܳ¤òÍѤ¤¤¿°ÂÈݾðÊóÁ÷¿®ˡ
Ãø¼Ô *»³²¼ ÎÊÇÏ, ¹⸫ °ì (ÁϲÁÂç³Ø ¹©³ØÉô ¾ðÊ󥷥¹¥ƥ๩³زÊ)
Page pp. 43 - 48
Keyword Delay/Desruption Tolerant Network, ̵ÀþÄ̿®, ¾ðÊó±¿È¼Ô, ºҳ², °ÂÈݳÎǧ
Abstract ¹­°èºҳ²¤Ǥϡ¤ÀßÈ÷¾㳲¡¤ÅÅÎÏÉÔ­¤Τ¿¤á·ÈÂÓÅÅÏÃÅù¤θø¶¦¤ι⤤Ä̿®¤ϡ¤¤¤¤Ĥâ¤Τ褦¤ˤÏÍøÍѤǤ­¤ʤ¯¤ʤꡤÈïºÒÃϰèÆâ¤ΰÂÈݳÎǧ¤˻پã¤򤭤¿¤¹¤³¤Ȥ¬ͽÁۤµ¤ì¤롥ËܹƤǤϡ¤ÈïºҼԤ¬·ÈÂÓüËö¤òÊݻý¤·¤Ƥ¤¤뤳¤ȤòÁÛÄꤷ¡¤¤½¤ì¤é¤ÎüËö¤ȵ߽õ¼ԤηÈÂÓüËöµڤÓÈòÆñ½ꥵ¡¼¥Ф¬DTN(Delay/Disruption Tolerant Network)¤ò¹½Ãۤ·¡¤°ÂÈݾðÊó¤ò½¸Ì󤹤뤿¤á¤ÎÈïºҼԤȾðÊó±¿È¼ԤγÆüËö´ֵڤӾðÊó±¿È¼ԤÈÈòÆñ½ê¤ÎüËö¤ȥµ¡¼¥д֤γƥץí¥ȥ³¥ë¤òÌ⽤·¤¿¡¥¤ޤ¿¡¤¥ͥåȥ¥¯¥·¥ߥå¥졼¥¿¤ËÄó°ƥץí¥ȥ³¥ë¤ò¼ÂÁơ¤1. 2km2¤ÎÈïºÒÃϰè¤ËÈïºҼԤò¥é¥ó¥à¤ËʬÉۤµ¤»¤¿¥â¥ǥë¤ò¹½Ãۤ·¤¿¡¥ÈïºҼԿðÊó±¿È¼Կô¡¤Åù¤òÊѲ½¤µ¤»¡¤°ÂÈݾðÊó¤ÎÈòÆñ½ê¤ޤǤÎÅþãΨ¤ȥǡ¼¥¿½¸Ìó²áÄø¤òɾ²·¡¤ÈïºҼԿô¤Î1/5ÄøÅ٤ξðÊó±¿È¼ԤòÇÛÈì¤С¤°ÂÈݾðÊó¤ò95¡ó°ʾ彸Ìó¤Ǥ­¤뤳¤Ȥò³Îǧ¤·¤¿¡¥

1B-4 (»þ´Ö: 13:55 - 14:15)
Âê̾ ¸ÉΩLAN¤«¤é¤ÎHTTPÄ̿®¤ˤè¤륤¥󥿡¼¥ͥåÈÀܳ¤Τ¿¤á¤ÎMANETÃæ·ÑÊý¼°
Ãø¼Ô *¿å ÌÀ, Åù¡¹ÎÏ ¹¨Ƿ, ¹⸫ °ì (ÁϲÁÂç³Ø ¹©³ØÉô ¾ðÊ󥷥¹¥ƥ๩³زÊ)
Page pp. 49 - 55
Keyword MANET, ¸ÉΩLAN, HTTP, ¥롼¥ƥ£¥ó¥°, ¥¢¥ɥ쥹ÊѴ¹
Abstract ¶áǯ¡¤¸ÇÄꥤ¥ó¥եé¤òɬÍפȤ»¤º¡¤°ÜưüËöƱ»ΤÎľÀÜÄ̿®¤ˤè¤ꡤ°ì»þŪ¤˼«Χ·¿¤Υͥåȥ¥¯¤ò¹½¤¹¤ë¥â¥Х¤¥롦¥¢¥ɥۥ寡¦¥ͥåȥ¥¯(Mobile Ad-hoc Network : MANET)¤¬ÃíÌܤµ¤ì¤Ƥª¤ꡤºҳ²»þ¤ʤɤؤαþÍÑÊýˡ¤䡤MANET¤ȥ¤¥󥿡¼¥ͥåȤȤÎÁê¸ßÀܳ¤˴ؤ¹¤븡Ƥ¤â¹Ԥï¤ì¤Ƥ¤¤롥ËܹƤǤϡ¤ºҳ²»þ¤ι­°è¥ͥåȥ¥¯¾㳲¡¢Åù¤ˤè¤ꥤ¥󥿡¼¥ͥåȤËÀܳÉÔǽ¤ʾõÂ֤˴٤ä¿LAN(°ʲ¼¡¤¸ÉΩLAN)¤ò¡¤MANET¤ò·Ðͳ¤·¤ƥ¤¥󥿡¼¥ͥåȤËÀܳ¤¹¤뤿¤á¤νêÍ׵¡ǽ¤ˤĤ¤¤Ƹ¡Ƥ¤·¤¿¡¥¶ñÂÎŪ¤ˤϡ¤¸ÉΩLAN¤ȥ¤¥󥿡¼¥ͥåÈÀܳÅËMANET·Ðͳµ¡ǽ¤ò¶ñÈ¿¥¢¥¯¥»¥¹¥ݥ¤¥ó¥È(Access Point : AP)¤òÇÛÃ֤·¡¤MAC¥¢¥ɥ쥹¥롼¥ƥ£¥󥰡¤MAC/IP¥¢¥ɥ쥹ÊѴ¹¡¤AP´֥ե¸æ¤γƵ¡ǽ¤òÄó°Ƥ·¤¿¡¥¤ޤ¿¡¤MANET¥¨¥ߥå¥졼¥¿¤ËÄó°Ƶ¡ǽ¤ò¼ÂÁÆHTTPÄ̿®¤ˤè¤êÄó°Ƶ¡ǽ¤Îͭ¸ú¤òɾ²·¤¿¡¥