Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PRMU, MVE, VRSJ-SIG-MR, IPSJ-CVIM |
2024-01-26 10:54 |
Kanagawa |
Keio Univ. (Hiyoshi Campus) |
Effect Verification of Fatigue Perception and Training Motivation in Collaborative Muscle Training Using Avatars in VR Space Yuki Kurimoto, Masaya Nakayama, Takefumi Ogawa (The Univ. of Tokyo) MVE2023-38 |
This study investigated the effect of the Proteus phenomenon in virtual reality (VR) on enhancing strength training perf... [more] |
MVE2023-38 pp.31-36 |
IN |
2024-01-18 14:25 |
Aichi |
|
Load Balancing Effect of Access Control Method in NDN Using Relay Nodes Naoto Ohata, Masaya Nakayama (Tokyo Univ.) IN2023-52 |
In recent years, Information-Centric Networking (ICN), which has features such as in-network caching and routing by cont... [more] |
IN2023-52 pp.18-23 |
LOIS, IPSJ-DC |
2022-07-07 14:55 |
Online |
Online |
3s2sub: A Proposal of Data Segmentation Scheme for Fall Detection by Smartphone Built-in Accelerator Pengyu Guo, Masaya Nakayama (Uni.Tokyo) LOIS2022-7 |
A Fall is defined as an event which results in a person coming to rest inadvertently on the ground or floor or other low... [more] |
LOIS2022-7 pp.18-23 |
SeMI, IPSJ-MBL, IPSJ-UBI |
2022-03-08 10:00 |
Online |
Online |
A Study on Emergency Evacuation Algorithm Considering the Risk Degree of Exit Yusuke Iekushi, Masaya Nakayama (UTokyo) SeMI2021-88 |
In recent years, there has been increasing interest in emergency navigation from inside buildings using Wireless Sensor ... [more] |
SeMI2021-88 pp.29-34 |
IN, IA (Joint) |
2021-12-17 14:30 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Evaluating Prediction of the Access Counts of Videos Using Metadata as a Learning Parameter Gen Koujitani, Masaya Nakayama (Univ. Tokyo) IA2021-47 |
In order to predict the number of accesses to videos posted on video sharing services, we performed regression predictio... [more] |
IA2021-47 pp.77-84 |
SWIM, SC |
2021-08-27 09:35 |
Online |
Online |
Effective Combinatorial Search Method for Identifying Products in Receipts and Its Evaluation Rihito Iijima, Masaya Nakayama (The Univ. of Tokyo) SWIM2021-13 SC2021-11 |
To analyze receipt data, there is a problem that product names on receipts are not always consistent from store to store... [more] |
SWIM2021-13 SC2021-11 pp.1-6 |
LOIS, ICM |
2020-01-09 13:50 |
Nagasaki |
ARKAS SASEBO |
An Extension of Life Log to Massively Multiplayer Online Game Takaaki Sakuragi, Daisuke Miyamoto, Masaya Nakayama (UT) ICM2019-32 LOIS2019-47 |
Recently, many young people play games on a daily basis as part of their lives according to a report by National Hospita... [more] |
ICM2019-32 LOIS2019-47 pp.13-18 |
RCS, IN, NV (Joint) |
2017-05-11 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal and Evaluation of a New MAC Protocol with Higher Priority on Transmission by Access Point for Wireless LAN Hou Jiyuan, Masaya Nakayama, Yasushi Wakahara (The Univ. of Tokyo) IN2017-1 |
CSMA/CA based MAC protocol of wireless LAN has a problem of large ratio of management time to data transmission time esp... [more] |
IN2017-1 pp.1-6 |
MVE, IE, CQ, IMQ (Joint) [detail] |
2017-03-07 14:15 |
Fukuoka |
Kyusyu Univ. Ohashi Campus |
Proposal and Evaluation of a Text Entry Method Using Gaze Flick for Ultra Small Devices Hisanari Kume, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.) IMQ2016-52 IE2016-167 MVE2016-75 |
In recent years, ultra small devices such as smart watches and wearable devices have become widespread, many ultra small... [more] |
IMQ2016-52 IE2016-167 MVE2016-75 pp.187-192 |
NS, IN (Joint) |
2017-03-03 15:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Performance Evaluation of the Interference Aware Channel Utilization Method for Multi-Radio Software Defined WMN Toshiki Hamanaka, Yuzo Taenaka (UTokyo), Kazuya Tsukamoto (Kyutech), Masaya Nakayama (UTokyo) NS2016-245 |
Our previous study tried to effectively utilize multiple channels at respective hops by exploiting OpenFlow in Software ... [more] |
NS2016-245 pp.505-510 |
NS |
2016-10-20 14:25 |
Hyogo |
Himeji Nishi-Harima Area Jibasan Center |
[Poster Presentation]
A Study toward Interference Aware Channel Utilization Method in Multi-Channel Software Defined WMN Toshiki Hamanaka, Yuzo Taenaka (UTokyo), Kazuya Tsukamoto (Kyutech), Masaya Nakayama (UTokyo) NS2016-93 |
Our previous study tried to effectively utilize multiple channels by exploiting OpenFlow in Software Defined Wireless Me... [more] |
NS2016-93 pp.29-34 |
ICSS |
2015-03-04 10:25 |
Okinawa |
Meio Univiersity |
Estimation of Vulnerability Score based on Annual Analysis with Supervised Latent Dirichlet Allocation Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama (Tokyo Univ.) ICSS2014-79 |
This research purpose is to determine technical scores of vulnerability by using machine learning methods in order to ev... [more] |
ICSS2014-79 pp.97-102 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 16:50 |
Nara |
Todaiji Total Cultural Center |
Proposal and Evaluation of Priority Control Method on Per-Flow Basis Based on Bandwidth Utilization to Keep Response Time Within a Certain Threshold Keiya Ishikawa, Yuzo Taenaka, Masaya Nakayama (Univ. of Tokyo) SITE2012-59 IA2012-97 |
Multiple data flows sharing limited bandwidth cause communication delay in communication networks. In particular it is i... [more] |
SITE2012-59 IA2012-97 pp.127-132 |
IN, RCS (Joint) |
2012-05-18 15:40 |
Tokyo |
Kuramae-Kaikan, Tokyo Institute of Technology |
A Discussion about Improving the Quality of Communications in wireless LAN Environment with high Terminal Density Keiya Ishikawa, Yuzo Taenaka, Masaya Nakayama (Tokyo Univ.) IN2012-21 |
A wireless LAN with IEEE802.11g has become more popular. In a wireless LAN environment, a rapid increase in the communic... [more] |
IN2012-21 pp.55-60 |
IA |
2012-02-24 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Experimental results of IP multicast faunctionality with KIZUNA satellite Masaya Nakayama (Univ. of Tokyo), Sachiko Hozawa (JAXA) |
Recently, many people are widely using applications which need real-time behavior such as distance learing or video stre... [more] |
|
IA |
2010-12-17 15:50 |
Tokyo |
Room1, B3F, Kikai-Shinko-Kaikan Bldg |
UTMesh: An Evaluation Testbed for Wireless Networking - Development and Experiment Report Hideya Ochiai, Masaya Nakayama, Hiroshi Esaki (UT/NICT) IA2010-67 |
In the study of delay tolerant networks and mobile ad hoc networks as the basis of sensor networks, implementation and e... [more] |
IA2010-67 pp.55-60 |
IA |
2008-05-30 10:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Live E!:Sensing a Living Earth
-- Infrastructure to Share Environment Information of the Earth with Global Sensors -- Hideki Sunahara (Keio Univ.), Hiroshi Esaki, Masaya Nakayama (Univ. of Tokyo) IA2008-2 |
The Internet realize sharing several kinds of information in global scale. Recently, small nodes such as sensors are con... [more] |
IA2008-2 pp.7-10 |
IA |
2008-05-30 10:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Analysis of the Operating Status of Live E! Wide Area Sensor Network
-- the Operating Status in May 2008 -- Hideya Ochiai, Akihiro Sugiyama, Yusuke Sakamoto (Tokyo Univ.), Masato Yamanouchi (Keio Univ), Hiroki Isizuka (Tokyo Denki Univ.), Satoshi Matsuura (NAIST), Hideki Sunahara (Keio Univ.), Masaya Nakayama, Hiroshi Esaki (Tokyo Univ.) IA2008-3 |
In this paper, we analyze Live E! wide area sensor network and clarify the functionalities and properties that are requi... [more] |
IA2008-3 pp.11-16 |
NS, IN (Joint) |
2008-03-07 08:15 |
Okinawa |
Bankoku Shinryokan |
Evaluation of Manager-Based Architecture for Intrusion Detection System in Ad Hoc Networks Muhammad Arifin Ritonga, Masaya Nakayama (Univ. of Tokyo) NS2007-181 |
Ad hoc network faces more security problems that we need to deploy intrusion detection system in this network. However, ... [more] |
NS2007-181 pp.279-284 |
NS, IN (Joint) |
2008-03-07 13:10 |
Okinawa |
Bankoku Shinryokan |
Effect of Spoofed iTrace Packets and Its Countermeasure Tomonori Takada, Masaya Nakayama (The Univ. of Tokyo) NS2007-193 |
ICMP Traceback with Periodical Transmission (iTrace-PT) is an effective method to specify attackers of low rate DoS atta... [more] |
NS2007-193 pp.341-346 |