Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SWIM, KBSE |
2019-05-24 10:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Transfer Method of Project Management Technology by PMO
-- Knowledge Transfer to PM using PBL method -- Akihiro Hayashi (SIST) KBSE2019-1 SWIM2019-1 |
It is widely recognized that process improvement activities are important in organizations that develop systems. Using C... [more] |
KBSE2019-1 SWIM2019-1 pp.1-8 |
EA |
2018-10-11 15:20 |
Fukushima |
Iwaki business Innovation Center (Iwaki) |
Generation of Wavefront by High Density Electro-dynamic Multiplication Output Loudspeaker Array Using Multiple Inputs Delta-sigma Modulator Takeru Sonobe, Shigeto Takeoka (SIST) EA2018-56 |
It is known that in order to exactly reproduce the three-dimensional sound field, it is necessary to set a speaker for e... [more] |
EA2018-56 pp.13-19 |
ISEC, COMP |
2017-12-21 16:40 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36 |
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] |
ISEC2017-82 COMP2017-36 pp.67-74 |
EA, ASJ-H |
2017-12-01 16:40 |
Overseas |
University of Auckland (New Zealand) |
Matrix Driving Method for Multichannel Loudspeaker using Multiplication-output and Delta-sigma Modulator with Multiple inputs Shigeto Takeoka (Shizuoka Inst. of Science and Tech.) EA2017-83 |
A sound wave is a physical phenomenon in which three-dimensional vibrations are propagated, in principle. It is known th... [more] |
EA2017-83 pp.133-138 |
EMCJ, IEE-EMC |
2016-12-16 15:20 |
Aichi |
Nagoya Institute of Technology |
EMC Reduction Method with Combining Vectors for a Wireless Energy Transmission System Takeharu Kohri (SIST) EMCJ2016-107 |
I propose a leak electromagnetic wave reduction method with combining vectors for a Wireless Power Transmission/Transfer... [more] |
EMCJ2016-107 pp.43-48 |
WBS, RCC, ITS |
2016-12-02 09:40 |
Kagawa |
Sunport Hall Takamatsu |
Defect and its Improvement of Conventional General Signal Transmission Method based on BPF under the Impulse Noise
-- Communication in Electric Vehicles -- Takeharu Kohri (SIST) WBS2016-68 ITS2016-35 RCC2016-57 |
The electric car, a powerful impulsive noise from the inverter for switching a large current is generated.
Reduction me... [more] |
WBS2016-68 ITS2016-35 RCC2016-57 pp.119-123 |
ICSS |
2016-11-25 15:45 |
Kanagawa |
Institute of Information Security |
Report on WhibOx 2016 White-Box Cryptography and Obfuscation Kazuomi Oishi (SIST) ICSS2016-43 |
A report on WhibOx 2016 is presented. WhibOx 2016 is a one-time workshop on white-box cryptogra-phy and obfuscation. It ... [more] |
ICSS2016-43 pp.27-29 |
ISEC |
2016-09-02 14:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Tamper Resistant Software utilizing Data Memory Kazuomi Oishi (SIST) ISEC2016-45 |
We study a class of tamper resistant software that can work on a computer on which self-modifying code might not necessa... [more] |
ISEC2016-45 pp.43-48 |
EA |
2016-07-08 13:40 |
Shizuoka |
Yamaha, Toyooka Factory |
A Method of Driving Multi-channel System by Using Multiplication Outputs with Random Signals Shigeto Takeoka (SIST) EA2016-16 |
In this paper, we will discuss about a multichannel drive method which plays an arbitrary number of individual signals, ... [more] |
EA2016-16 pp.45-49 |
SWIM |
2016-05-20 17:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Implementation of Transaction Processing in MongoDB Tsukasa Kudo (SIST), Masahiko Ishino (Bunkyo Univ.), Kenji Saotome (Hosei Univ.), Nobuhiro Kataoka (Interprise Lab.) SWIM2016-5 |
As for the NoSQL databases, there is the problem that they cannot update the plural data with maintaining the ACID prope... [more] |
SWIM2016-5 pp.21-26 |
CPM, ED, SDM |
2016-05-20 11:30 |
Shizuoka |
Shizuoka University, Hamamatsu campus (Joint Research Lab.) |
Gravity effect on the properties of InxGa1-xSb ternary alloys grown at the International Space Station Velu NirmalKumar (Shizuoka Univ), Mukannan Arivanandhan (Anna Univ), Govindasamy Rajesh, Tadanobu Koyama, Yoshimi Momose (Shizuoka Univ), Kaoruho Sakata (Univ.Tokyo), Tetsuo Ozawa (Shizuoka Insti.Sci.&Tech.), Yasunori Okano (OsakaUniv.), Yuko Inatomi (JAXA), Yasuhiro Hayakawa (Shizuoka Univ) ED2016-25 CPM2016-13 SDM2016-30 |
[more] |
ED2016-25 CPM2016-13 SDM2016-30 pp.55-59 |
RCS |
2016-04-21 15:15 |
Aomori |
Romantopia, A Landscape of Forest and Stars, Hirosaki City |
Hybrid Automatic Operation of a Motor Vehicle with the Telecommunication Takeharu Kohri (SIST) RCS2016-4 |
Autonomous automatic operation with each sensor collects topics after Urban Challenge 2007 holding of DARPA sponsorship ... [more] |
RCS2016-4 pp.19-24 |
RCS |
2015-10-02 09:50 |
Kanagawa |
YRP (Yokosuka) |
A Multiple Simultaneous Communication
-- An area Information Transfer system -- Takeharu Kohri (SIST) RCS2015-178 |
Many of the communication is based on the mutual transmission of one-to-one. TCP-IP which many terminals are used in the... [more] |
RCS2015-178 pp.113-118 |
SWIM |
2015-08-20 14:40 |
Tokyo |
Interprise modeling, etc. |
A Lump-sum Update Method as Transaction for MongoDB Tsukasa Kudo (SIST), Masahiko Ishino (Bunkyo University), Kenji Saotome (Hosei Univ.), Nobuhiro Kataoka (Interprise Lab..) SWIM2015-8 |
Along with the progress of the cloud computing, the various NoSQL databases have been proposed and put to practical use.... [more] |
SWIM2015-8 pp.7-12 |
IA, ICSS |
2015-06-11 16:25 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Report on the 23rd USENIX Security Symposium Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8 |
[more] |
IA2015-8 ICSS2015-8 pp.39-44 |
ICSS |
2015-03-04 15:55 |
Okinawa |
Meio Univiersity |
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99 |
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more] |
ICSS2014-99 pp.217-222 |
SWIM |
2015-02-27 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Case Study of The Business Model Analysis Method Masahiko Ishino, Hiroshi Osada (Bunkyo Univ.), Tsukasa Kudo (SIST), Kenji Saotome (Hosei Univ.), Nobuhiro Kataoka (Interprise Labo.) SWIM2014-28 |
Business model mainly on the Internet business creates remarkably conspicuous innovation now in the ICT company growing ... [more] |
SWIM2014-28 pp.9-12 |
MoNA, CQ (Joint) |
2014-09-12 10:30 |
Miyagi |
|
Demand Responsive Transport System with Smartphone Takeharu Kohri (Sizuoka Inst. of Science and Tech.) MoNA2014-41 |
I have proposed a novel demand responsive transport system with the smart phone. As a means of transportation efficient ... [more] |
MoNA2014-41 pp.61-66 |
SWIM |
2014-08-21 13:55 |
Kyoto |
Ryukoku Univ.Ouniya Canvas |
How to design the web application in the cloud computing era Kenji Saotome (Hosei Univ.), Nobuhiro Kataoka (Tokai Univ.), Tsukasa Kudo (SIST), Masahiko Ishino (Bunkyo Univ.) SWIM2014-10 |
The cloud service PaaS has appeared that we can develop the Web application in non-programming. It will be spread in the... [more] |
SWIM2014-10 pp.13-16 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:30 |
Hokkaido |
San-Refure Hakodate |
Experimental Platform for CAN Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 |
Embedded systems are used for various purposes and are widely prevalent.
It turned out that embedded systems for which ... [more] |
ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 pp.81-87 |