Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2018-01-26 12:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Effective Strategy of Information Exchange among Mobile Nodes without Wide Area Communication Service Yusuke Sakumoto (Tokyo Metropolitan Univ.), Hiroyuki Ohisaki (Kwansei Gakuin Univ.) IA2017-68 |
In order to exchange information among persons without wide area communication service, each person searches everywhere ... [more] |
IA2017-68 pp.17-22 |
NS, CS, IN (Joint) |
2013-09-12 10:20 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
A distributed method for measuring available bandwidth in overlay networks exploiting path overlap Dinh Tien Hoang, Go Hasegawa, Masayuki Murata (Osaka Univ.) NS2013-71 |
The estimation of available bandwidth is crucial for many overlay network applications. However, measuring available ban... [more] |
NS2013-71 pp.1-6 |
TL |
2012-07-21 13:00 |
Yamagata |
Yamagata University |
A child is a little but smart translator
-- From the viewpoint of the basic mechanism of linguistic information exchange -- Morihiko Iwagaki TL2012-10 |
New born babies have already learned that the world is composed of both space (containing shapes) and time (which is sym... [more] |
TL2012-10 pp.1-5 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:05 |
Hokkaido |
|
A Study on Cybersecurity Information Discovery Mechanisms over the Internet Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11 |
This paper prposes a scheme that links assorted structured cybersecurity information over networks and discovers them in... [more] |
ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11 pp.71-76 |
ICSS |
2010-11-05 13:50 |
Hiroshima |
Hiroshima City University |
Ontological Approach toward Cybersecurity in Cloud Computing Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ICSS2010-49 |
Following the immense development of cloud computing, various standardization activities have been taken place.
However... [more] |
ICSS2010-49 pp.29-34 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 14:15 |
Aomori |
Hirosaki University |
Building Ontology of Cybersecurity Operational Information Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ISEC2010-20 SITE2010-16 ICSS2010-26 |
Cyber threats come beyond the border of countries. However, most organizations are currently coping with them individual... [more] |
ISEC2010-20 SITE2010-16 ICSS2010-26 pp.87-91 |
LOIS, IPSJ-CN |
2008-05-23 09:50 |
Chiba |
Keyaki Bldg, Chiba University |
A Method of Information Exchange Considering User's Locality Masahiro Ohnishi, Hideyuki Takada (Ritsumeikan Univ.) |
This paper proposes a method that enables information exchange among people who visit the same place using RFID tags. Us... [more] |
OIS2008-3 pp.13-18 |
SITE |
2008-02-20 11:25 |
Tokyo |
|
Privacy Protection Issues after e-claim deployment Daisuke Yamakata, Hiroki Nogawa, Hiroshi Tanaka (TMD) SITE2007-53 |
Japanese Government decided to deploy on-line medical claims from medical supplier to insurers from 2011. On-line claim ... [more] |
SITE2007-53 pp.13-18 |
LOIS, IPSJ-DC |
2007-07-27 10:40 |
Hokkaido |
Future University-Hakodate |
Multibyte character encodings in legacy Tibetan Fonts and Auto Detection Toshiya Suzuki (Hiroshima Univ.), Dai Sato (Tohoku Univ. Hosp.) |
For Brahmic scripts used in India, Central and South East Asia,
ISO/IEC 10646 defines the character sets by phonetic de... [more] |
OIS2007-20 pp.37-42 |
DE |
2007-07-04 08:25 |
Miyagi |
Akiu hot springs (Sendai) |
A Data Model for Traceable Information Distribution over P2P Network Fengrong Li, Yoshiharu Ishikawa (Nagoya Univ.) DE2007-99 |
Information exchange on P2P networks is very prosperous in recent years.
However, it is not easy to trace how data is c... [more] |
DE2007-99 pp.461-466 |
ITS |
2007-05-24 16:15 |
Kanagawa |
Yokosuka Research Park |
Evaluation of the Collision Avoidance Vehicle Information-exchange with Anchored Relay (CAVIAR) Flooding Protocol using Intersection Position Prediction method Kunimitsu Arai, Kouji Kashima, Shigeyuki Asami (JRC), Eiji Niwa, Yoshichika Konishi (AISIN SEIKI) ITS2007-6 |
For exchanging vehicular information (position, speed, etc) packets over the vehicular broadcast network, It is importan... [more] |
ITS2007-6 pp.31-36 |
WBS |
2004-10-26 11:45 |
Miyagi |
Hotel Crescent, Akiu Resort, Sendai |
Convergence of Iterative Demapping/Decoding on Coded UWB-IR Systems Kenichi Takizawa, Ryuji Kohno (NICT) |
We discuss the convergence behavior of iterative demapping and decoding in coded M-ary biorthogonal keying direct sequen... [more] |
WBS2004-43 pp.31-36 |