Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE, SC |
2019-11-09 10:45 |
Nagano |
Shinshu University |
Consideration of system assurance on real IT system development project Takuya Saruwatari, Misao Yano, Hiroshi Oyama (NTT DATA) KBSE2019-34 SC2019-31 |
Many individual considerations to assure the system are occurred in IT system development project. In this paper, we inv... [more] |
KBSE2019-34 SC2019-31 pp.65-70 |
CCS, NLP |
2019-06-07 15:45 |
Niigata |
machinaka campus nagaoka |
Computer Assisted Analysis of Exact Periodic Solutions for Delay Duffing Equation Shin'ichi Oishi (Waseda Univ.) NLP2019-25 CCS2019-8 |
(To be available after the conference date) [more] |
NLP2019-25 CCS2019-8 pp.37-42 |
NLP |
2019-05-10 17:15 |
Oita |
J:COM HoltoHALL OITA |
Computer Assisted Proof of Existence of Periodic Solutions for Forced Delay Duffing Equation Shin'ichi Oishi (Waseda Univ.) NLP2019-10 |
(To be available after the conference date) [more] |
NLP2019-10 pp.53-58 |
CS, CQ (Joint) |
2019-04-19 14:50 |
Osaka |
Osaka Univ. Library |
Delay Control Shaping for Latency Guaranteed Network Service Tatsuya Fukui, Yuki Sakaue, Katsuya Minami, Hiroyuki Furukawa (NTT) CQ2019-7 |
Since the use of two-way communicating applications/systems has been expanding,an communication service satisfying its s... [more] |
CQ2019-7 pp.35-40 |
PN |
2019-03-14 13:15 |
Okinawa |
Miyako Island Hirara Port Terminal Bldg. |
Failure Probability Estimation based on Observation Information of Individual Network Equipment Masahiro Matsuno, Shu Sekigawa (Keio Univ.), Eiji Ooki (Kyoto Univ.), Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2018-83 |
As the communication traffic increases due to the spread of IoT (Internet of Things) and the progress of
fifth generati... [more] |
PN2018-83 pp.1-7 |
EA, SIP, SP |
2019-03-14 15:15 |
Nagasaki |
i+Land nagasaki (Nagasaki-shi) |
Convergence-guaranteed independent positive semidefinite tensor analysis for blind source separation Kanta Fukushige, Norihiro Takamune (UTokyo), Daichi Kitamura (Kagawa-NICT), Hiroshi Saruwatari (UTokyo), Rintaro Ikeshita, Tomohiro Nakatani (NTT) EA2018-127 SIP2018-133 SP2018-89 |
This paper focuses on independent positive semidefinite tensor analysis (IPSDTA), which is a technique for over-determin... [more] |
EA2018-127 SIP2018-133 SP2018-89 pp.167-172 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:25 |
Hokkaido |
Sapporo Convention Center |
Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness Daisuke Suzuki (Hokuriku Univ.) ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24 |
The aim of this study is to clarify the educational effect of a penetration testing exercise aimed at raising cybersecur... [more] |
ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24 pp.131-136 |
KBSE |
2018-01-25 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal on Model Based Dependability using ArchiMate Shuichiro Yamamoto (Nagoya Univ.) KBSE2017-35 |
Traditional assurance approaches independently develop assurance cases for architecture diagrams. This paper proposes a ... [more] |
KBSE2017-35 pp.19-24 |
IN |
2018-01-23 09:55 |
Aichi |
WINC AICHI |
An Adaptive Bandwidth Reservation Method According to Content Request and Resource Utilization in Content Centric Network Tomoharu Endo, Satoshi Ohzahata, Ryo Yamamoto, Toshihiko Kato (UEC) IN2017-81 |
CCN (Content Centric-Network) has attracted attention as a new network architecture suitable for content distribution.
... [more] |
IN2017-81 pp.59-64 |
ET |
2017-11-11 16:40 |
Tokyo |
Sophia Univ. |
Analysis of Latent Needs for IT Consultation within a University using a Topic Model Yusuke Kometani, Takashi Satoh (The Univ. of Kitakyushu) ET2017-66 |
When trouble comes, we often try to implement a workaround as a temporal solution. This approach is generally useless to... [more] |
ET2017-66 pp.69-74 |
LOIS, ISEC, SITE |
2017-11-10 14:00 |
Kyoto |
|
Implementation Planning of Penetration Testing Exercises for Raising Cybersecurity Awareness Daisuke Suzuki (Hokuriku Univ.) ISEC2017-67 SITE2017-49 LOIS2017-44 |
In the information security class at the university, it is common to learn from the defender's perspective how to protec... [more] |
ISEC2017-67 SITE2017-49 LOIS2017-44 pp.103-106 |
NS |
2017-10-26 14:55 |
Osaka |
I-site nanba |
[Poster Presentation]
A Bandwidth Reservation Method According to User Request in Content Centric Network Tomoharu Endo, Satoshi Ohzahata, Ryo Yamamoto, Toshihiko Kato (UEC) NS2017-97 |
CCN (Content Centric-Network) has attracted attention as a new network architecture suitable for content distribution.
... [more] |
NS2017-97 pp.43-46 |
ICM, IPSJ-CSEC, IPSJ-IOT |
2017-05-25 15:50 |
Kochi |
|
[Encouragement Talk]
Bandwidth Assignment with Backhaul Virtualization for Multiple Services in Public WLANs Kazuki Ginnan (Osaka Univ.), Kazuhiko Kinoshita (Tokushima Univ.), Keita Kawano (Okayama Univ.), Hiroki Nakayama, Tsunemasa Hayashi (BOSCO), Takashi Watanabe (Osaka Univ.) ICM2017-1 |
In recent years, the amount of mobile data traffic is growing rapidly. Therefore, not only cellular networks but also pu... [more] |
ICM2017-1 pp.29-34 |
KBSE |
2017-01-24 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A GSN development approach for Feature models Hiroyuki Utsunomiya, Shuichiro Yamamoto (Nagoya Univ.) KBSE2016-34 |
The feature model was known to reuse components for developing similar embedded software. However, the assurance method ... [more] |
KBSE2016-34 pp.19-24 |
KBSE |
2017-01-24 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Trend and Issues on Assured Architecture Development Method for O-DA Shuichiro Yamamoto (Nagoya Univ.) KBSE2016-36 |
The O-DA (Open Dependability through Assuredness) is a The Open Group standard proposed by authors. O-DA standardizes ba... [more] |
KBSE2016-36 pp.31-36 |
HCGSYMPO (2nd) |
2016-12-07 - 2016-12-09 |
Kochi |
Kochi City Culture Plaza (CUL-PORT) |
Research on the diversity of universities' recognition of internal quality assurance system of teaching and learning Susumu Shibui, Nozomi Takahashi (NIAD-QE) |
Recent research indicates that main attention of quality assurance of higher education has been directed to the internal... [more] |
|
NS, CQ, ICM, NV (Joint) |
2016-11-25 10:20 |
Yamaguchi |
Shimonoseki Chember of Commerce and Industry |
Backhaul Virtualization for Bandwidth Guaranty in Public Wireless LANs Kazuki Ginnan (Osaka Univ.), Kazuhiko Kinoshita (Tokushima Univ.), Keita Kawano (Okayama Univ.), Hiroki Nakayama, Tsunemasa Hayashi (BOSCO), Takashi Watanabe (Osaka Univ.) ICM2016-30 |
In recent years, as higher performance terminal equipments are spread, the amount of mobile data traffic is growing rapi... [more] |
ICM2016-30 pp.31-35 |
CCS |
2016-08-10 11:00 |
Hokkaido |
Yoichi Chuo kominkan |
An Extension of Throughput Guarantee Method based on Media Access Control Method SP-MAC for Multi-Rate WLAN Yuuki Yamamoto, Hiroyasu Obata, Chisa Takano, Kenji Ishida, Shouitirou Nomura, Ryo Hamamoto (Hiroshima City Univ.) CCS2016-24 |
Wireless local area networks (WLANs) based on IEEE802.11 usually use CSMA/CA for a media access control.
In the CSMA/CA... [more] |
CCS2016-24 pp.41-46 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2016-03-08 11:40 |
Okinawa |
|
Bandwidth Allocation Methods for QoE Enhancement in Multi-View Video and Audio Transmission over Bandwidth Guaranteed IP Networks Keita Furukawa, Toshiro Nunome (Nagoya Inst.) CQ2015-143 |
In this report, we consider allocation methods of bandwidth for each video traffic in Multi-View Video and Audio IP tran... [more] |
CQ2015-143 pp.199-204 |
KBSE |
2016-03-04 13:10 |
Oita |
|
A Proposal on the Assurance case Capability Index Shuichiro Yamamoto (Nagoya Univ.) KBSE2015-63 |
The appropriate introduction of methods and education materials on the assurance case is difficult for the organizations... [more] |
KBSE2015-63 pp.85-90 |