IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 115, Number 294

Social Implications of Technology and Information Ethics

Workshop Date : 2015-11-06 - 2015-11-07 / Issue Date : 2015-10-30

[PREV] [NEXT]

[TOP] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2015-23
Self Information Control as Identity Management -- Practical Problems of "Identity" leading to Information Ethics --
Akiyoshi Kabeya (Chiba Univ.)
pp. 1 - 6

SITE2015-24
An approach to assess the risk of information leakage by inference -- A pilot study of methods using a breadth first search in digraphs and mutual information --
Kazuhiro Suzuki, Shohei Kitamura, Noriki Hirai (Kochi Univ.)
pp. 7 - 10

SITE2015-25
A Pruning Method for the Decision Tree constructed on Run-Based Trie.
Takashi Harada, Ken Tanaka (Kanagawa Univ.), Kenji Mikawa (Niigata Univ.)
pp. 11 - 17

SITE2015-26
[Invited Talk] Design of Learning e-Portfolio System Based on User-centered design
Rieko Inaba (Tsuda Coll.), Norimichi Kobayashi, Miho Mohri, Yasunori Motomoura (Kansai Univ.)
pp. 19 - 24

SITE2015-27
[Invited Talk] Effective Utilization of Mobile Communication Technology for Life-Saving -- State Emergency Wireless System --
Noriyoshi Sonetaka (ICPS)
pp. 25 - 32

SITE2015-28
The Problems of "Consent" in the Big Data Context
Takushi Otani (Kibi International Univ.)
pp. 33 - 39

SITE2015-29
Social media guidelines for international students
Daisuke Suzuki (Hokuriku Univ.)
pp. 41 - 45

SITE2015-30
Input UI Specification Recovery using Web Operation Monitoring
Daisuke Tashiro, Katsuro Kikuchi, Ryota Mibe (Hitachi)
pp. 47 - 52

SITE2015-31
Proposal and Prototyping of a TV Content Providing System using Geolocation
Chigusa Yamamura, Hisayuki Ohmata, Michihiro Uehara (NHK)
pp. 53 - 58

SITE2015-32
The threshold value design of recognition score considering the prior probability in a quiz speech recognition system
Hiroyuki Nishi, Kimurra Yoshimasa, Kakinoki Toshio (Sojo Univ.)
pp. 59 - 65

SITE2015-33
A Feasibility Study of Autonomous Security Infrastructure in the Internet
Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU)
pp. 67 - 74

SITE2015-34
Reducing Authentication Time in Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ)
pp. 75 - 80

SITE2015-35
Postpaid electronic money to keep privacy and its implementation
Tatshuhiko Sukegawa, Mashu Sakai, Hikaru Morita (Kanagawa Univ.)
pp. 81 - 86

SITE2015-36
An Additionable Type ToDo List which Can Support Daily Activities
Noriaki Saito (NTT)
pp. 87 - 92

SITE2015-37
Evaluation of the Web System U-MOS for Supporting University Management Operation
Satoshi Taoka (Hiroshima Univ.)
pp. 93 - 97

SITE2015-38
Encryption and decryption system of composite cellular automata
Toshikazu Ishida (KSU)
pp. 99 - 102

SITE2015-39
Extension of NTRU Using Group Ring and Its Application
Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.)
pp. 103 - 109

SITE2015-40
A dynamic filtering method to reduce DDoS packets by using access tokens
Ryota Suzuki, Hikaru Morita (Kanagawa Univ.)
pp. 111 - 116

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan