IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2018-01-26
12:10
Tokyo Kikai-Shinko-Kaikan Bldg. On Effective Strategy of Information Exchange among Mobile Nodes without Wide Area Communication Service
Yusuke Sakumoto (Tokyo Metropolitan Univ.), Hiroyuki Ohisaki (Kwansei Gakuin Univ.) IA2017-68
In order to exchange information among persons without wide area communication service, each person searches everywhere ... [more] IA2017-68
pp.17-22
NS, CS, IN
(Joint)
2013-09-12
10:20
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan A distributed method for measuring available bandwidth in overlay networks exploiting path overlap
Dinh Tien Hoang, Go Hasegawa, Masayuki Murata (Osaka Univ.) NS2013-71
The estimation of available bandwidth is crucial for many overlay network applications. However, measuring available ban... [more] NS2013-71
pp.1-6
TL 2012-07-21
13:00
Yamagata Yamagata University A child is a little but smart translator -- From the viewpoint of the basic mechanism of linguistic information exchange --
Morihiko Iwagaki TL2012-10
New born babies have already learned that the world is composed of both space (containing shapes) and time (which is sym... [more] TL2012-10
pp.1-5
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
13:05
Hokkaido   A Study on Cybersecurity Information Discovery Mechanisms over the Internet
Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
This paper prposes a scheme that links assorted structured cybersecurity information over networks and discovers them in... [more] ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11
pp.71-76
ICSS 2010-11-05
13:50
Hiroshima Hiroshima City University Ontological Approach toward Cybersecurity in Cloud Computing
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ICSS2010-49
Following the immense development of cloud computing, various standardization activities have been taken place.
However... [more]
ICSS2010-49
pp.29-34
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
14:15
Aomori Hirosaki University Building Ontology of Cybersecurity Operational Information
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ISEC2010-20 SITE2010-16 ICSS2010-26
Cyber threats come beyond the border of countries. However, most organizations are currently coping with them individual... [more] ISEC2010-20 SITE2010-16 ICSS2010-26
pp.87-91
LOIS, IPSJ-CN 2008-05-23
09:50
Chiba Keyaki Bldg, Chiba University A Method of Information Exchange Considering User's Locality
Masahiro Ohnishi, Hideyuki Takada (Ritsumeikan Univ.)
This paper proposes a method that enables information exchange among people who visit the same place using RFID tags. Us... [more] OIS2008-3
pp.13-18
SITE 2008-02-20
11:25
Tokyo   Privacy Protection Issues after e-claim deployment
Daisuke Yamakata, Hiroki Nogawa, Hiroshi Tanaka (TMD) SITE2007-53
Japanese Government decided to deploy on-line medical claims from medical supplier to insurers from 2011. On-line claim ... [more] SITE2007-53
pp.13-18
LOIS, IPSJ-DC 2007-07-27
10:40
Hokkaido Future University-Hakodate Multibyte character encodings in legacy Tibetan Fonts and Auto Detection
Toshiya Suzuki (Hiroshima Univ.), Dai Sato (Tohoku Univ. Hosp.)
For Brahmic scripts used in India, Central and South East Asia,
ISO/IEC 10646 defines the character sets by phonetic de... [more]
OIS2007-20
pp.37-42
DE 2007-07-04
08:25
Miyagi Akiu hot springs (Sendai) A Data Model for Traceable Information Distribution over P2P Network
Fengrong Li, Yoshiharu Ishikawa (Nagoya Univ.) DE2007-99
Information exchange on P2P networks is very prosperous in recent years.
However, it is not easy to trace how data is c... [more]
DE2007-99
pp.461-466
ITS 2007-05-24
16:15
Kanagawa Yokosuka Research Park Evaluation of the Collision Avoidance Vehicle Information-exchange with Anchored Relay (CAVIAR) Flooding Protocol using Intersection Position Prediction method
Kunimitsu Arai, Kouji Kashima, Shigeyuki Asami (JRC), Eiji Niwa, Yoshichika Konishi (AISIN SEIKI) ITS2007-6
For exchanging vehicular information (position, speed, etc) packets over the vehicular broadcast network, It is importan... [more] ITS2007-6
pp.31-36
WBS 2004-10-26
11:45
Miyagi Hotel Crescent, Akiu Resort, Sendai Convergence of Iterative Demapping/Decoding on Coded UWB-IR Systems
Kenichi Takizawa, Ryuji Kohno (NICT)
We discuss the convergence behavior of iterative demapping and decoding in coded M-ary biorthogonal keying direct sequen... [more] WBS2004-43
pp.31-36
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan