Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ET |
2023-03-15 11:35 |
Tokushima |
Tokushima University (Primary: On-site, Secondary: Online) |
Development of a Teaching Strategy Switchable Viewing Support System with DTW Distance Ryota Tanaka, Naka Gotoda (Kagawa Univ), Mio Suzuki, Hirotake Kanisawa (SIT), Yuka Takai (OSU), Ryo Kanda, Yusuke Kometani, Rihito Yaegashi, Toshihiro Hayashi (Kagawa Univ) ET2022-85 |
In the practice of plastering, it is necessary to support achievement based on the setting of learning goals for skills ... [more] |
ET2022-85 pp.161-167 |
ICSS, IPSJ-SPT |
2020-03-02 11:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
A Technique for Issuing Security Alerts and Filtering Traffic based on Vulnerability Information Monitoring Takeshi Takahashi, Ryutaro Ushigome, Mio Suzuki, Daisuke Inoue (NICT) ICSS2019-93 |
[more] |
ICSS2019-93 pp.189-194 |
ICSS, IA |
2018-06-26 09:25 |
Ehime |
Ehime University |
A consideration on the possibility of automatic classifying for anomalous posts on Twitter Ryutaro Ushigome (NICT/Chuo Univ), Takeshi Matsuda (Univ of Nagasaki), Michio Sonoda, Takeshi Takahashi, Mio Suzuki (NICT), Jinhui Chao (Chuo Univ) IA2018-9 ICSS2018-9 |
A lot of information has been posted on the SNS, including not only erroneous information and inappropriate writing, but... [more] |
IA2018-9 ICSS2018-9 pp.55-60 |
ICSS |
2015-11-26 15:00 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
tkiwa: A Detection Tool for Packets with Characteristic Network Protocol Header Takashi Koide (Yokohama National Univ.), Daisuke Makita (Yokohama National Univ./NICT), Takahiro Kasama, Mio Suzuki, Daisuke Inoue, Koji Nakao (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2015-38 |
The packets from malware and network tools that have their own implementation of network stack may have character-istic ... [more] |
ICSS2015-38 pp.19-24 |
ICSS |
2015-03-04 11:40 |
Okinawa |
Meio Univiersity |
Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82 |
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] |
ICSS2014-82 pp.115-120 |
AP |
2014-02-06 15:40 |
Aichi |
Kojima Industries Corporation, Kojima Research Center |
[Invited Lecture]
An Experimental Study of the Proposed 2x2 MIMO System with Single Leaky Coaxial Cable Satoshi Tsukamoto, Takahiro Maeda, Yafei Hou, Susumu Ano, Hiroshi Ban, Masayuki Ariyoshi, Kiyoshi Kobayashi (ATR), Atsuhiko Niwa, Fumio Suzuki (Fujikura), Takeshi Higashino, Minoru Okada (NAIST) AP2013-175 |
Since the traffic by mobile phones and wireless LAN terminals is increasing day by day, we are faced with deficiency of ... [more] |
AP2013-175 pp.51-56 |
ICSS |
2011-03-25 16:25 |
Tokyo |
Suspended |
Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) ICSS2010-66 |
A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor network attacks such ... [more] |
ICSS2010-66 pp.59-64 |
IA |
2009-09-25 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration about the experiments of Overlay Network Applications on Network Emulation Testbeds Hiroaki Hazeyama, Masatoshi Enomoto (NAIST), Mio Suzuki (NICT) IA2009-39 |
In this paper, we summarize the experimentations about overlay applications on Network Emulation Testbeds (NET). Based o... [more] |
IA2009-39 pp.37-42 |
IA, ICSS |
2009-06-19 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Design and Evaluation of NGN/IPv6 Security Test System Kenji Rikitake, Masashi Eto, Mio Suzuki, Daisuke Inoue (NICT), Koji Nakao (NICT/KDDI), Satoshi Kobayashi, Suminobu Akiba (DIT) IA2009-18 ICSS2009-26 |
In this paper, we propose a system design methodology for performing
vulnerability tests of NGN and IPv6 protocol suite... [more] |
IA2009-18 ICSS2009-26 pp.97-102 |
EMCJ, MW |
2007-10-26 10:00 |
Miyagi |
Tohoku University |
Frequency Dependence Measurements of Complex Permittivity for Rod Samples Using Multiple TM0m0 Modes in a Circular Cavity Hiroshi Nakai, Yoshio Kobayashi (Saitama Univ.), Fumio Suzuki (Fujikura Ltd.), Zhewang Ma (Saitama Univ.) EMCJ2007-68 MW2007-115 |
To measure the complex permittivity of a dielectric bar inserted in the center of a TM0m0 mode cylindrical cavity, a con... [more] |
EMCJ2007-68 MW2007-115 pp.83-88 |
MW |
2007-05-21 15:25 |
Hyogo |
University of Hyogo |
Temperature Dependence Measurement of Complex Permittivity of Dielectric Bars Using TM0m0 Mode Cylindrical Cavity. Hiroshi Nakai, Yoshio Kobayashi (Saitama Univ.), Fumio Suzuki (Fujikura), Zhewang Ma (Saitama Univ.) MW2007-16 |
To measure the complex permittivity of a dielectric bar inserted in the center of a TM0m0 mode cylindrical cavity, a con... [more] |
MW2007-16 pp.23-27 |