{"id":71,"date":"2017-10-11T16:20:48","date_gmt":"2017-10-11T07:20:48","guid":{"rendered":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/?page_id=71"},"modified":"2020-12-04T17:50:39","modified_gmt":"2020-12-04T08:50:39","slug":"program","status":"publish","type":"page","link":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/program\/","title":{"rendered":"Program"},"content":{"rendered":"\n<p class=\"has-large-font-size\">6\/15\u3000Thu.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td>9:00-<\/td><td><strong>Registration<\/strong><\/td><\/tr><tr><td>10:20-10:30<\/td><td><strong>Openning<\/strong><br>\u3000Session Chair: \u3000<span style=\"color:#9b51e0\" class=\"tadv-color\">Koji Okamura<\/span> \u3000and\u00a0\u3000<span style=\"color:#9b51e0\" class=\"tadv-color\">Keisuke Uehara<\/span><\/td><\/tr><tr><td>10:30-12:00<\/td><td><strong>CFI I (Long x 2 + Short x 1):<\/strong>\u00a0<strong>Measurement and Analysis<\/strong><br>Session Chair: <span style=\"color:#9b51e0\" class=\"tadv-color\">\u00a0Keisuke Uehara<\/span> \u00a0<br><br>\u30fb[03] On the Delay Scaling Laws of Cache Networks, Boram Jin, Deawoo Kim, Se-Young Yun, Jinwoo Shin, Seongik Hong, Byoung-Joon Lee and Yung Yi. \u00a0(Long)<br>\u30fb[04] Adaptive Sampling for OpenFlow Network Measurement Methods, Guang Cheng and Jun Yu. \u00a0(Long)<br>\u30fb[05] Latency Monitoring in Software-Defined Networks, Alaa Allakany and Koji Okamura. \u00a0(Short)<\/td><\/tr><tr><td>12:00-13:00<\/td><td>\u22d8\u3000\u22d8\u3000\u22d8\u3000\u00a0Lunch\u3000\u22d9\u3000\u22d9\u3000\u22d9<\/td><\/tr><tr><td>13:00-14:00<\/td><td><strong>CJK\/AsiaFI\/CFI Keynote I :\u00a0<\/strong>Prof. <span style=\"color:#9b51e0\" class=\"tadv-color\">Akira Nakao<\/span> (Tokyo University)<br>Session Chair: \u00a0<span style=\"color:#9b51e0\" class=\"tadv-color\">Keisuke Uehara<\/span><\/td><\/tr><tr><td>14:00-15:00<\/td><td><strong>CFI II (Long x 2):<\/strong>\u00a0<strong>Protocol and Operation<\/strong><br>Session Chair: \u00a0<span style=\"color:#9b51e0\" class=\"tadv-color\">Ruidong Li \u00a0<\/span><br><br>\u30fb[01] Exploring HTTP\/2 Header Compression, Kazuhiko Yamamoto, Tatsuhiro Tsujikawa and Kazuho Oku. \u00a0(Long)<br>\u30fb[14] Spatio-Temporal Modeling of BGP Routing Table Evolution, Motomu Utsumi, Hirochika Asai and Hiroshi Esaki. (Long)<\/td><\/tr><tr><td>15:00-15:30<\/td><td>\u22d8\u3000\u22d8\u3000\u22d8\u3000Break\u3000\u22d9\u3000\u22d9\u3000\u22d9<\/td><\/tr><tr><td>15:30-17:00<\/td><td><strong>Extended abstract session<\/strong><br>Session Chair: <span style=\"color:#9b51e0\" class=\"tadv-color\">\u00a0Kosuke Kaneko<\/span> \u00a0<br><br>\u30fbURL Classification using BoF of URL bitstream,\u00a0Keiichi Shima, Hiroshi Abe, Daisuke Miyamoto, Tomohiro Ishihara, Kazuya Okada and Yuji Sekiya<br>\u30fbComputer Security Incident Response System Using Software Defined Network Approach,\u00a0Motoyuki Ohmori and Kiyoyuki Nakashima<br>A Flow-based Multi-Constrained Routing Protocol with Local Repair in Wireless Mesh Networks,\u00a0Byounghean Shin and Dongman Lee<br>Research on attack detection for network applications,\u00a0Hiroshi Koide and Kento Nomiyama<\/td><\/tr><tr><td>\u00a0(17:00-18:00)<\/td><td><strong>\u00a0(AsiaFI Meeting)<\/strong><\/td><\/tr><tr><td>18:30-<\/td><td>\u22d8\u3000\u22d8\u3000\u22d8\u3000Dinner\u3000\u22d9\u3000\u22d9\u3000\u22d9<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"vk_spacer\"><div class=\"vk_spacer-display-pc\" style=\"height:40px\"><\/div><div class=\"vk_spacer-display-tablet\" style=\"height:30px\"><\/div><div class=\"vk_spacer-display-mobile\" style=\"height:20px\"><\/div><\/div>\n\n\n\n<p class=\"has-large-font-size\">6\/16\u3000Fri.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td>9:00-<\/td><td><strong>Registration<\/strong><\/td><\/tr><tr><td>10:00-12:00<\/td><td><strong>Poster session with Lightning talk (Poster Board size:\u00a0W900mm \u00d7\u00a0H2100mm)<\/strong><br>Session Chair:<span style=\"color:#9b51e0\" class=\"tadv-color\"> Keiichi SHIMA \u00a0<\/span><br><br>\u30fbSDN controller placement and assignment: minimum weight matching of Bipartite Graph,\u00a0Tingting Yuan and Xiaohong Huang<br>\u30fbA Study on Resilient and Dynamic Service Function Chaining,\u00a0Youngho Kim, Sol Han and Sangheon Pack<br>\u30fbAnalysis on Network Monitoring Technologies via Programmable Data Planes,\u00a0Youngho Kim, Sol Han and Sangheon Pack<br>\u30fbCountry-based Flow Classification for Detecting Network Anomalies\u3000Kohei Suzuki and Keisuke Uehara<br>\u30fbSuspicious Email and Zero-day Attack Malware Analysis,\u00a0Sanouphab Phomkeona, Koji Okamura, Kristan Edwards and Yoshitatsu Ban<br>\u30fbA Method to Detect SMTP Flood Attacks using FlowIDS Framework,\u00a0Mohd Zafran Bin Abdul Aziz and Koji Okamura<br>\u30fbDetecting BGP Inconsistencies,\u00a0Yutaro Nomura, Romain Fontugne, Emile Aben, Hideya Ochiai and Hiroshi Esaki<\/td><\/tr><tr><td>12:00-13:00<\/td><td>\u22d8\u3000\u22d8\u3000\u22d8\u3000\u00a0Lunch\u3000\u22d9\u3000\u22d9\u3000\u22d9<\/td><\/tr><tr><td>13:00-14:00<\/td><td><strong>CJK\/AsiaFI\/CFI Keynote II :<\/strong>\u00a0Prof. <span style=\"color:#9b51e0\" class=\"tadv-color\">Song chong<\/span> (KAIST)<br>Session Chair: <span style=\"color:#9b51e0\" class=\"tadv-color\">Sangheon Pack<\/span><\/td><\/tr><tr><td>14:00-15:30<\/td><td><strong>CFI III (Long x 2 + Short x 1):<\/strong>\u00a0<strong>Applications<\/strong><br>Session Chair: <span style=\"color:#9b51e0\" class=\"tadv-color\">Koji Okamura <\/span>\u00a0<br><br>\u30fb[02] Hayabusa: A Simple and Fast Full-Text Search Engine for Massive System Log Data, Hiroshi Abe, Keiichi Shima, Yuji Sekiya, Daisuke Miyamoto, Tomohiro Ishihara and Kazuya Okada. (Long)<br>\u30fb[12] Multilevel IoT Model for Smart Cities Resilience, Amir Modarresi and James Sterbenz. \u00a0(Long)<br>\u30fb[06] Design of SaaS OverCloud for 3-tier SaaS Compatibility over Cloud-based Multiple boxes, Jungsu Han and Jongwon Kim. (Short)<\/td><\/tr><tr><td>15:30-<\/td><td><strong>Closing<\/strong><br>Session Chair: <span style=\"color:#9b51e0\" class=\"tadv-color\">Koji Okamura<\/span><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n","protected":false},"excerpt":{"rendered":"<p>6\/15\u3000Thu. 9:00- Registration 10:20-10:30 Openning\u3000Session Chair: \u3000Koji Okamura \u3000and\u00a0\u3000Keisuke Uehara 10:30-12:00 CFI I (Long x 2 + Short x 1):\u00a0Measurement and AnalysisSession Chair: \u00a0Keisuke Uehara \u00a0 \u30fb[03] On the Delay Scaling Laws of Cache Networks, Boram Jin, Deawoo Kim, Se-Young Yun, Jinwoo Shin, Seongik Hong, Byoung-Joon Lee and Yung Yi. \u00a0(Long)\u30fb[04] Adaptive Sampling for OpenFlow [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_locale":"","_original_post":""},"_links":{"self":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/wp-json\/wp\/v2\/pages\/71"}],"collection":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":2,"href":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/wp-json\/wp\/v2\/pages\/71\/revisions"}],"predecessor-version":[{"id":189,"href":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/wp-json\/wp\/v2\/pages\/71\/revisions\/189"}],"wp:attachment":[{"href":"https:\/\/cs.kyushu-u.ac.jp\/cfi2017\/wp-json\/wp\/v2\/media?parent=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}