Track |
¹ßÇ¥½Ã°£ |
¹ßÇ¥
¹øÈ£ |
Session |
ÁÂÀå /¹ßÇ¥ÀÚ |
¼Ò¼Ó |
2007³â 6¿ù 28ÀÏ(¸ñ) |
A |
RFID/Sensor
Network |
9:30-11:30 |
A1 |
UHF RFID Global Standardization & Regulation Trends |
½Å»óö |
NIA |
9:30-10:10 |
A1-1 |
Global Standardization Trends with Considering RFID Dense Environments |
¼ºÁ¾Áø |
TTA |
10:10-10:50 |
A1-2 |
Domestic Issues on the UHF RFID Standardization |
À¯»ó±Ù |
ETRI |
10:50-11:30 |
A1-3 |
Revised Regulation Trends on Proliferation of the UHF RFID in Korea |
¹ÚÁؼ® |
±¹¹Î´ë |
13:00-15:00 |
A2 |
Case Studies on Advanced RFID/USN Projects |
±èÁسâ |
Áß¾Ó´ë |
13:00-13:40 |
A2-1 |
¡®Mobion¡¯, It¡¯s Great Start Up |
À±ÁøÈñ |
SKT |
13:40-14:20 |
A2-2 |
Current Status of u-City Testbed and its Prospectives |
Á¤ºÎ¸¸ |
NIA |
14:20-15:00 |
A2-3 |
Seamless Tracking the All-things thru the Gate |
¼¼®±â |
LGÈ÷´ÙÂî |
15:30-17:30 |
A3 |
Sensor Technologies |
È«ÁøÇ¥ |
Çѱ¹¿Ü´ë |
15:30-16:10 |
A3-1 |
IP over Low-Power WPAN |
±è±âÇü |
¾ÆÁÖ´ë |
16:10-16:50 |
A3-2 |
Technology for Sensor Network Platform |
ÀÌÀç¿ë |
¿¬¼¼´ë |
16:50-17:30 |
A3-3 |
Trend on BAN with Bio-Sensor for Early Detection |
À庴ÁØ |
±¹¹Î´ë |
B |
Network
Convergence
BcN/NGN |
9:30-11:30 |
B1 |
Enhanced BcN/NGN Architecture/Protocols |
Á¤±¤¼ö |
±¤¿î´ë |
9:30-10:10 |
B1-1 |
Evolution of BcN/NGN Architecture for Future Ubiquitous Networking |
À̱Ըí |
ICU |
10:10-10:50 |
B1-2 |
QoS Control and Management for BcN/NGN |
ÃÖÅ»ó |
ETRI |
10:50-11:30 |
B1-3 |
Network Attachment Control for BcN/NGN |
±èÁ¤À± |
ETRI |
13:00-15:00 |
B2 |
Wired/Wireless Interworking |
±èÄ¡ÇÏ |
Æ÷Ç×°ø´ë |
13:00-13:40 |
B2-1 |
Seamless Mobility: Current State & Evolution Scheme for u-Mobile Realization |
ÃÖ¼º°ï |
ÃæºÏ´ë |
13:40-14:20 |
B2-2 |
Deployment of Handover Technology in IPv6 Mobility |
¿ÀÁ¦ÈÖ |
¸ð´ÙÁ¤º¸Åë½Å |
14:20-15:00 |
B2-3 |
QoS Management for the Integrated Wired/Wireless Network |
½Å¼±¿µ |
NIA |
15:30-17:30 |
B3 |
Converged Network Services |
°Çö±¹ |
°í·Á´ë |
15:30-16:10 |
B3-1 |
BcN/NGN-based IPTV/VoD Services |
Á¶±â¼º |
ETRI |
16:10-16:50 |
B3-2 |
BcN/NGN-based Mobile IPTV Services |
ȲöÁÖ |
»ï¼ºÀüÀÚ |
16:50-17:30 |
B3-3 |
BcN/NGN-based VoIP/MoIP Services |
°½Å°¢ |
ETRI |
C |
Digital Home |
9:30-11:30 |
C1 |
Tutorials on Digital Home Technology |
¹Ú±¤·Î |
ETRI |
9:30-10:30 |
C1-1 |
Tutorial I : Context-aware User Interaction Technology in ubiComp Environment |
¿ì¿îÅà |
±¤ÁÖ°ú±â¿ø |
10:30-11:30 |
C1-2 |
Tutorial II : Millimeter Wave WPAN Technology |
ÀÌ¿ì¿ë |
ETRI |
13:00-15:00 |
C2 |
Digital Home Platform Technology |
À̵¿È£ |
±¤¿î´ë |
13:00-13:40 |
C2-1 |
IPTV Service Networking Technology |
Á¤ÀÏ¿µ |
Çѱ¹¿Ü´ë |
13:40-14:20 |
C2-2 |
Middleware Technology for Converged Telecom/Broadcasting Network |
ÀÌÁøÈ£ |
¾ËƼij½ºÆ® |
14:20-15:00 |
C2-3 |
PLC based Wired/Wireless Interface Bridge |
¹®°æ´ö |
ETRI |
15:30-17:30 |
C3 |
Wireless Home Networking Technology |
¾È¼ø½Å |
°í·Á´ë |
15:30-16:10 |
C3-1 |
ZigBee Based Home Control |
¿Õ¼ºÈ£ |
·¹À̵ð¿ÀÆÞ½º |
16:10-16:50 |
C3-2 |
802.11 based QoS Video Streaming |
¼´ö¿µ |
°æÈñ´ë |
16:50-17:30 |
C3-3 |
Wireless Mesh Networking |
¹®ÀÏ¿µ |
Çѱ¹±â¼ú ±³À°´ë |
D |
u-Management
and Internet
Governance |
9:30-11:30 |
D1 |
u-Management for Next Generation Internet |
ÇѼ±¿µ |
°Ç±¹´ë |
9:30-10:10 |
D1-1 |
Development Prospect and Policy of Internet |
±èÁ¾È£ |
MIC |
10:10-10:50 |
D1-2 |
Traffic Measurement for Next-Generation Internet |
ÀÌ¿µ¼® |
Ãæ³²´ë |
10:50-11:30 |
D1-3 |
Network Management Issues on WiBro |
ÀÌ¿µ¿ì |
KT |
13:00-15:00 |
D2 |
International Research Collaboration thru Networking |
±è ¿ø |
NIDA |
13:00-13:40 |
D2-1 |
Institute of Ambient Intelligence in Interactive Computer Graphics |
À̺´±¹ |
µ¿¼´ë |
13:40-14:20 |
D2-2 |
Future Internet |
ÃÖ¾çÈñ |
¼¿ï´ë |
14:20-15:00 |
D2-3 |
Applications on APII/TEIN and TEIN Organization |
±èº´±Ô |
KISDI |
15:30-17:30 |
D3 |
Internet Governance in u-Society |
¹Ú±â½Ä |
ETRI |
15:30-16:10 |
D3-1 |
Current Issues on IPv6 Deployment |
°¼±¹« |
NIA |
16:10-16:50 |
D3-2 |
Roles of ICANN and Global Internet Governance |
°Çý¿µ |
NIDA |
16:50-17:30 |
D3-3 |
Activities in Asia Pacific Region: APAN |
±è´ë¿µ |
Ãæ³²´ë |
E¡¡ |
Tutorial:
Network Practice I |
9:30-11:30 13:00-14:00 |
E1-1 |
Semantic Web and Beyond |
¹Ú¿µÅà |
¼þ½Ç´ë |
14:00-15:00 15:30-17:30 |
E2-1 |
Evolution of Internet Service Architecture, and Web 2.0 |
¼ÛÁØÈ |
KAIST |
2007³â 6¿ù 29ÀÏ(±Ý) |
F |
Web2.0 Insight |
9:30-11:30 |
F1 |
Web2.0 Vision & Trends |
Á¶±¹Çö |
±¤¿î´ë |
9:30-10:10 |
F1-1 |
Web2.0 Paradigm |
Á¶»ê±¸ |
KTH |
10:10-10:50 |
F1-2 |
UCC We Media |
¿ìº´Çö |
ű׽ºÅ丮 |
10:50-11:30 |
F1-3 |
New Opportunity and Challenge of Social Computing |
ÇÑ»ó±â |
¿ÀÇdzÊƼ |
13:00-15:00 |
F2 |
Web2.0 Technologies |
ÃÖÁ¾¿ø |
¼÷¸í¿©´ë |
13:00-13:40 |
F2-1 |
Web2.0 Technology Trends |
ÇÑÀç¼± |
³Ø½º¾Ë |
13:40-14:20 |
F2-2 |
Mobile Web 2.0 |
À̽ÂÀ± |
ETRI |
14:20-15:00 |
F2-3 |
The Future of Video |
ÀÌÇü±¸ |
CDNetworks |
15:30-17:30 |
F3 |
Web2.0 Business |
ÀÌ»óÈ« |
KT |
15:30-16:10 |
F3-1 |
Web2.0 Business Models and Strategies |
ÃÖº´¹Î |
¿ÀǺ£ÀÌ |
16:10-16:50 |
F3-2 |
Advertising 2.0 |
À±¼¼¿õ |
OPMS |
16:50-17:30 |
F3-3 |
Launch Pad: Introduction to New Web2.0 Companies |
¡¡ |
KTH et. al |
G |
WiBro/4G |
9:30-11:30 |
G1 |
Standardization for IMT-Advanced |
Áøº´¹® |
TTA |
9:30-10:10 |
G1-1 |
Service Vision for Next Generation Mobile Convergence |
±èµµ°æ |
KTF |
10:10-10:50 |
G1-2 |
Network Evolution for IMT-Advanced |
À念¹Î |
±¹¹Î´ë |
10:50-11:30 |
G1-3 |
Air Interface Trends for IMT-Advanced |
Á¤Çö±Ô |
ETRI |
13:00-15:00 |
G2 |
3GPP LTE Technology |
±èÀ±°ü |
TTA |
13:00-13:40 |
G2-1 |
3GPP LTE |
¿À¹Î¼® |
LGÀüÀÚ |
13:40-14:20 |
G2-2 |
3GPP RAN Technology |
¼ÛÆòÁß |
ETRI |
14:20-15:00 |
G2-3 |
Advances to IMS for Network Convergence |
·ù ¿ø |
ETRI |
15:30-17:30 |
G3 |
WiBro Evolution |
ÀÓ°æ½Ä |
°æºÏ´ë |
15:30-16:10 |
G3-1 |
WiBro Evolution for IMT-Advanced |
Á¶¹ÎÈñ |
»ï¼ºÀüÀÚ |
16:10-16:50 |
G3-2 |
Mobile Multi-hop Relay for WiBro System |
À̱ÔÇÏ |
»ï¼ºÅ»·¹½º |
16:50-17:30 |
G3-3 |
A Survey on the Structure of WiMAX Convergence Devices |
½Å¿µÁ¾ |
LGÀüÀÚ |
H |
Ubiquitous
Networking |
9:30-11:30 |
H1 |
Ubiquitous Network Issues |
¾È»óÇö |
¼¿ï½Ã¸³´ë |
9:30-10:10 |
H1-1 |
Scalability Issues in Sensor Networks |
ÀÓÀ¯Áø |
¼ö¿ø´ë |
10:10-10:50 |
H1-2 |
Cross-Layer Design in MANET |
¹Ú¼¼¿õ |
¼¿ï´ë |
10:50-11:30 |
H1-3 |
Channel Assignment and Routing in Wireless Mesh Networks |
Á¶À¯Á¦ |
°æºÏ´ë |
13:00-15:00 |
H2 |
Ubiquitous Network Realization |
ÀÌÀç¿ë |
¿¬¼¼´ë |
13:00-13:40 |
H2-1 |
ID Management in Ubiquitous Networks |
Á¤¼öȯ |
¼þ½Ç´ë |
13:40-14:20 |
H2-2 |
Vehicle Communication Network |
ÀÌ»ó¼± |
ÇѾç´ë |
14:20-15:00 |
H2-3 |
Sensor Network Testbed Implementation |
±è´ë¿µ |
ICU |
15:30-17:30 |
H3 |
Internet Mobility Support Technology |
ÀÌÇüÈ£ |
ETRI |
15:30-16:10 |
H3-1 |
Proxy MIPv6 |
ÇÑ¿¬Èñ |
Çѱ¹±â¼ú ±³À°´ë |
16:10-16:50 |
H3-2 |
MANEMO |
½Å¸í±â |
ETRI |
16:50-17:30 |
H3-3 |
MONAMI6: Multihoming with Mobility Support |
¹éÀº°æ |
KT |
I |
Security
/Privacy |
9:30-11:30 |
I1 |
Network Security |
Á¤°æÈ£ |
KISA |
9:30-10:10 |
I1-1 |
DDoS Attack and Defense Technologies |
ÀÌÈñÁ¶ |
°í·Á´ë |
10:10-10:50 |
I1-2 |
Security Issues on BcN |
±èÈ£¼º |
KISA |
10:50-11:30 |
I1-3 |
Visualizing Network Security |
Àå¹üȯ |
ETRI |
13:00-15:00 |
I2 |
Service Security |
ÀÌ°è»ó |
µ¿ÀÇ´ë |
13:00-13:40 |
I2-1 |
Threats and Protection Technology for VoIP Spam |
¿øÀ¯Àç |
KISA |
13:40-14:20 |
I2-2 |
Security for Multicast of IPTV Service |
À±¹Ì¿¬ |
KISA |
14:20-15:00 |
I2-3 |
Web Service Security |
ÀÓäȣ |
NHN |
15:30-17:30 |
I3 |
Privacy Protection & Forensics |
ÀåÁ¾¼ö |
ETRI |
15:30-16:10 |
I3-1 |
Digital Forensics Technologies |
È«µµ¿ø |
ETRI |
16:10-16:50 |
I3-2 |
Technology for Privacy Protection and Strong Anonimity |
¾ç´ëÇå |
ÀÎÇÏ´ë |
16:50-17:30 |
I3-3 |
Digital Identity Management Technology |
Áø½ÂÇå |
ETRI |
J |
Tutorial: Network Practice II |
9:30-11:30 13:00-17:00 |
J1-1 |
How to Use NS2 Simulator |
À¯ÀçÇÊ |
°Ç±¹´ë |