Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NLP |
2005-05-17 13:00 |
Yamagata |
Yamagata Univ (Yonezawa) |
Approximation and Analysis of Non-linear Equations Based on Moment Vector Equations Hideki Satoh (Future Univ. Hakodate) |
Moment vector equations (MVEs) are presented in this report to approximate and analyze multi-dimensional non-linear disc... [more] |
NLP2005-1 pp.1-6 |
NLP |
2005-05-17 13:25 |
Yamagata |
Yamagata Univ (Yonezawa) |
Bifurcation and Chaos in an H-Bridge Inverter Koji Sakamoto, Takuji Kousaka (Fukuyama Univ.), Yue Ma, Tetsushi Ueta (Tokushima Univ.) |
In this paper, we discuss a bifurcation and chaos in a H-Bridge Inverter. At first, we show a H-bridge inverter with PWM... [more] |
NLP2005-2 pp.7-12 |
NLP |
2005-05-17 13:50 |
Yamagata |
Yamagata Univ (Yonezawa) |
A study of developed thermal turbulence by the measurement of the velocity field Takashi Mashiko, Masaki Sano (Univ. of Tokyo), Yoshiyuki Tsuji (Nagoya Univ.) |
[more] |
NLP2005-3 pp.13-16 |
NLP |
2005-05-17 14:30 |
Yamagata |
Yamagata Univ (Yonezawa) |
Basic Property of a Quantum Neural Network Composed of Kane's Qubits Yuuki Nakamiya, Mitsunaga Kinjo, Osamu Takahashi, Shigeo Sato, Koji Nakajima (R.I.E.C., Tohoku Univ.) |
[more] |
NLP2005-4 pp.17-21 |
NLP |
2005-05-17 14:55 |
Yamagata |
Yamagata Univ (Yonezawa) |
Lossless High Dynamic Range Image Coding based on Lifting Scheme using Nonlinear Interpolative Effect of Discrete-Time Cellular Neural Networks Hisashi Aomori, Kohei Kawakami (Sophia Univ.), Tsuyoshi Otake (Tamagawa Univ.), Nobuaki Takahashi (IBM Japan, Ltd.), Masayuki Yamauchi, Mamoru Tanaka (Sophia Univ.) |
The lifting scheme is a flexible method for the construction of linear and nonlinear wavelet transforms. In this paper, ... [more] |
NLP2005-5 pp.23-28 |
NLP |
2005-05-17 15:20 |
Yamagata |
Yamagata Univ (Yonezawa) |
Discrete ID model for optimization problems Hirokazu Nagashima, Yoshihiro Hayakawa, Koji Nakajima (RIEC Tohoku Univ.) |
[more] |
NLP2005-6 pp.29-34 |
NLP |
2005-05-17 15:45 |
Yamagata |
Yamagata Univ (Yonezawa) |
Parameter dependence on performance of ID model for optimization problems Akari Sato, Yoshihiro Hayakawa, Koji Nakajima (R.I.E.C., Tohoku Univ.) |
Inverse Function Delayed model used in out reserch has high performance of seaeching answer of optimization problems. Th... [more] |
NLP2005-7 pp.35-39 |
NLP |
2005-05-17 16:25 |
Yamagata |
Yamagata Univ (Yonezawa) |
Two-layer neural field model for working memory task with intervening stimulus Shigeru Kubota (Yamagata Univ.), Tsuyoshi Okamoto (ERATO), Kosuke Hamaguchi (RIKEN), Kazuyuki Aihara (Tokyo Univ.), Tatsuo Kitajima (Yamgata Univ.) |
Electrophysiological experiments of working memory task in the presence of intervening stimuli has shown that the delay ... [more] |
NLP2005-8 pp.41-46 |
NLP |
2005-05-17 16:50 |
Yamagata |
Yamagata Univ (Yonezawa) |
Role of NMDA receptor channels and GABA receptor channels in working memory Tatsuo Kitajima, Satomi Nakui (Yamagata Univ.) |
[more] |
NLP2005-9 pp.47-52 |
NLP |
2005-05-18 09:30 |
Yamagata |
Yamagata Univ (Yonezawa) |
The demand effect of cyclic bus using multiagent method Satoshi Kitada, Atsushi Tanaka (Yamagata Univ.) |
[more] |
NLP2005-10 pp.1-4 |
NLP |
2005-05-18 09:55 |
Yamagata |
Yamagata Univ (Yonezawa) |
Intellectual fazzy clustering using multiagent method Kenji Shimizu, Atsushi Tsuya, Atsushi Tanaka (Yamagata Univ.) |
[more] |
NLP2005-11 pp.5-8 |
NLP |
2005-05-18 10:20 |
Yamagata |
Yamagata Univ (Yonezawa) |
Methods of information communication using self-similar properties Kazuto Sasaki, Atsushi Tanaka (Yamagata Univ.) |
[more] |
NLP2005-12 pp.9-12 |
NLP |
2005-05-18 11:00 |
Yamagata |
Yamagata Univ (Yonezawa) |
A proposal of love affair model using multiagent and its evaluation Tadahiro Nagai, Atsushi Tsuya, Atsushi Tanaka (Yamagata Univ.) |
[more] |
NLP2005-13 pp.13-17 |
NLP |
2005-05-18 11:25 |
Yamagata |
Yamagata Univ (Yonezawa) |
Internal Structure and External Interactions of a rural village of South Kanto in the last days of the Tokugawa shogunate Miki Matsuo, Nanami Toishi (Univ. of Tokyo) |
We study a rural village, Kaminaguri-Kogumi, which was in South Kanto in Japan in the last days of the Tokugawa shogunat... [more] |
NLP2005-14 pp.19-23 |
NLP |
2005-05-18 11:50 |
Yamagata |
Yamagata Univ (Yonezawa) |
Temporal asynchrony in human visual information processing --- an experimental approach Hiro-Fumi Yanai, Chisa Mishima (Ibaraki Univ.) |
In human visual information processing, not only that object's color, shape, and motion are analyzed in different cortic... [more] |
NLP2005-15 pp.25-28 |
CAS, SIP, VLD |
2005-06-27 09:30 |
Miyagi |
Tohoku University |
Performance improvement for Adaptive Array Antenna using Alias Free Subband Adaptive Filters Kota Endo, Kiyoshi Nishikawa, Hitoshi Kiya (Tokyo Metropolitan Univ.) |
An adaptive array antenna is commonly used to compensate frequency selective fading in mobile communication system.Two a... [more] |
CAS2005-1 VLD2005-12 SIP2005-25 pp.1-6 |
CAS, SIP, VLD |
2005-06-27 09:55 |
Miyagi |
Tohoku University |
Theory and applications of set theoretic adaptive filtering with multiple a-priori convex constraints
-- Part II: Proof of convergence theorem -- Konstantinos Slavakis, Isao Yamada (Tokyo Inst. of Tech.), Nobuhiko Ogura (Musashi Inst. of Tech.) |
Recently, the Adaptive Projected Subgradient Method (APSM) over multiple
closed convex constraints has been proposed in... [more] |
CAS2005-2 VLD2005-13 SIP2005-26 pp.7-12 |
CAS, SIP, VLD |
2005-06-27 10:20 |
Miyagi |
Tohoku University |
A Technique for Active Noise Control Systems with Online Secondary Path Modeling Using Additive Noise Power Scheduling Muhammad Tahir Akhtar, Masahide Abe, Masayuki Kawamata (Tohoku Univ.) |
This paper proposes a new method for active noise control (ANC) systems with online secondary path modeling. Here the co... [more] |
CAS2005-3 VLD2005-14 SIP2005-27 pp.13-18 |
CAS, SIP, VLD |
2005-06-27 10:45 |
Miyagi |
Tohoku University |
Independent Component Analysis of Signals using Local Exponential Nonlinearities Muhammad Tufail, Masahide Abe, Masayuki Kawamata (Tohoku Univ.) |
In this paper we propose exponential type nonlinearities in order to blindly separate instantaneous mixtures of signals ... [more] |
CAS2005-4 VLD2005-15 SIP2005-28 pp.19-23 |
CAS, SIP, VLD |
2005-06-27 11:10 |
Miyagi |
Tohoku University |
Analysis of Signal Separation and Signal Distortion in Feedforward and Feedback Blind Source Separation Based on Source Spectra Akihide Horita, Kenji Nakayama, Akihiro Hirano (Kanazawa Univ.) |
Source separation and signal distortion in three kinds of blind soure separation (BSS) systems with convolutive mixture ... [more] |
CAS2005-5 VLD2005-16 SIP2005-29 pp.25-30 |
CAS, SIP, VLD |
2005-06-27 13:00 |
Miyagi |
Tohoku University |
Several Approaches to The Optimum Discrete Approximation of FIR Filterbanks Yuichi Kida (Ohu Univ.), Takuro Kida (Nihon Univ.) |
[more] |
CAS2005-6 VLD2005-17 SIP2005-30 pp.31-36 |
CAS, SIP, VLD |
2005-06-27 13:25 |
Miyagi |
Tohoku University |
On the Design of a Differential Filter using FIR Narrow Band Filters Yasuo Tachibana (KAIT) |
The processing of FFT for the sequence weighted by the extended Hanning window is equivalent to many narrow band FIR fil... [more] |
CAS2005-7 VLD2005-18 SIP2005-31 pp.37-42 |
CAS, SIP, VLD |
2005-06-27 13:50 |
Miyagi |
Tohoku University |
The Property of the Second-Order Modes of Linear Discrete-Time Systems under Variable Transformation of Bounded-Real Function Shunsuke Koshita, Masahide Abe, Masayuki Kawamata (Tohoku Univ.) |
This paper discusses the property of the second-order modes of discrete-time systems under variable transformation. Mull... [more] |
CAS2005-8 VLD2005-19 SIP2005-32 pp.43-48 |
CAS, SIP, VLD |
2005-06-27 14:30 |
Miyagi |
Tohoku University |
High Accuracy WaDi Image Interpolation with Local Gradient Features Shuai Yuan, Masahide Abe (Tohoku Univ.), Akira Taguchi (Musashi Inst. of Tech.), Masayuki Kawamata (Tohoku Univ.) |
In this paper, we propose a new computational method of the warped distance (WaDi) for digital image interpolation. The ... [more] |
CAS2005-9 VLD2005-20 SIP2005-33 pp.49-54 |
CAS, SIP, VLD |
2005-06-27 14:55 |
Miyagi |
Tohoku University |
A Hardware Oriented Design for Weighted Median Filters. (口頭発表) Anitha govindarajan (Post graduate student) |
Median and rank order filters are very important types of filters in image processing well known for their ability in re... [more] |
|
CAS, SIP, VLD |
2005-06-27 15:20 |
Miyagi |
Tohoku University |
A New Multirate Processing Scheme for The Conversions of Image Resolution Based on Integer/Fractional Sampling Filter Banks Fumio Itami (Saitama Inst. of Tech.), Eiji Watanabe (Shibaura Inst. of Tech.), Akinori Nishihara (Tokyo Inst. of Tech.) |
This paper proposes a new multirate processing scheme for the conversion of image resolution by using integer or fractio... [more] |
CAS2005-10 VLD2005-21 SIP2005-34 pp.55-60 |
CAS, SIP, VLD |
2005-06-27 16:00 |
Miyagi |
Tohoku University |
A Fingerprint Matching Algorithm Based on Phase-Only Correlation and Its Evaluation Koichi Ito, Ayumi Morita, Takafumi Aoki (Tohoku Univ.), Tatsuo Higuchi (Tohoku Institute of Technology), Hiroshi Nakajima, Koji Kobayashi (Yamatake Corp.) |
A major approach for fingerprint recognition today is to extract minutiae from fingerprint images and to perform fingerp... [more] |
CAS2005-11 VLD2005-22 SIP2005-35 pp.61-66 |
CAS, SIP, VLD |
2005-06-27 16:25 |
Miyagi |
Tohoku University |
High Accuracy Stereo Vision System Based on Phase-Only Correlation and Its Application to 3D Face Matching Naohide Uchida, Takuma Shibahara, Takafumi Aoki (Tohoku Univ.), Hiroshi Nakajima, Koji Kobayashi (Yamatake) |
This paper proposes a face recognition system using passive stereo
vision to capture three-dimensional (3D) facial info... [more] |
CAS2005-12 VLD2005-23 SIP2005-36 pp.67-71 |
CAS, SIP, VLD |
2005-06-27 16:50 |
Miyagi |
Tohoku University |
High Accuracy Stereo Vision System Based on Phase-Only Correlation and Its Application to Metal Component Inspection Takuma Shibahara, Takafumi Aoki (Tohoku Univ.), Yoshihiro Yamage, Masakazu Ono (Suzuki Motor Corp.) |
[more] |
CAS2005-13 VLD2005-24 SIP2005-37 pp.73-78 |
CAS, SIP, VLD |
2005-06-27 17:15 |
Miyagi |
Tohoku University |
An Image Watermarking Method using the Lifting Wavelet Transform Fumihiro Uchiyama (Kyushu Univ.), Akio Miyazaki (Kyushu Sangyo Univ.) |
In this paper, we propose a new watermarking method for images using the lifting wavelet transform. Utilizing the waterm... [more] |
CAS2005-14 VLD2005-25 SIP2005-38 pp.79-84 |
CAS, SIP, VLD |
2005-06-28 10:00 |
Miyagi |
Tohoku University |
Development of All-weather Realtime Player Tracing System by Adaptive Background Renewal Munehiro Tokikura, Akinori Nishihara (TIT) |
[more] |
CAS2005-15 VLD2005-26 SIP2005-39 pp.1-6 |
CAS, SIP, VLD |
2005-06-28 10:25 |
Miyagi |
Tohoku University |
High Accuracy Motion Estimation for Video Sequences Based on Phase-Only Correlation Norihito Numa, Loy Hui Chien, Takafumi Aoki (Tohoku Univ.), Satoshi Kondo (Matsushita Electric Industrial Co., Ltd.) |
In this paper, we present a high-accuracy Phase-Only Correlation (POC)-based motion estimation method for video sequence... [more] |
CAS2005-16 VLD2005-27 SIP2005-40 pp.7-12 |
CAS, SIP, VLD |
2005-06-28 10:50 |
Miyagi |
Tohoku University |
Fast Image Identification for Coded Images with Different Compression Ratio Ikue Iizuka, Fitri Arnia, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) |
This paper proposes a fast image identification scheme for lossy coded images. The proposed scheme identify two images w... [more] |
CAS2005-17 VLD2005-28 SIP2005-41 pp.13-18 |
CAS, SIP, VLD |
2005-06-28 11:15 |
Miyagi |
Tohoku University |
A Scale Estimation Algorithm Based on Phase-Only Correlation for Electron Microscope Images Sei Nagashima, Takafumi Aoki (Tohoku Univ.), Ruriko Tsuneta (Hitachi, Ltd., Central Reserch Laboratry) |
This paper presents a scale estimation algorithm based on Phase-Only Correlation (POC) for electron microscope images. T... [more] |
CAS2005-18 VLD2005-29 SIP2005-42 pp.19-24 |
CAS, SIP, VLD |
2005-06-28 13:00 |
Miyagi |
Tohoku University |
A compiler framework to combine multiple code optimization methods Yuhei Kaneko, Nobuhiko Sugino (Tokyo Institute of Tech.) |
[more] |
CAS2005-19 VLD2005-30 SIP2005-43 pp.25-29 |
CAS, SIP, VLD |
2005-06-28 13:25 |
Miyagi |
Tohoku University |
Optimal Design of Limited Carry-Propagation Adders Based on Redundant Number Systems Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Tatsuo Higuchi (Tohtech) |
[more] |
CAS2005-20 VLD2005-31 SIP2005-44 pp.31-36 |
CAS, SIP, VLD |
2005-06-28 13:50 |
Miyagi |
Tohoku University |
Formal Design of Arithmetic Circuits with Arithmetic Description Language: ARITH Yuki Watanabe, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Tatsuo Higuchi (Tohtech) |
This paper presents a design of parallel multipliers based on arithmetic description language called ARITH. The multipli... [more] |
CAS2005-21 VLD2005-32 SIP2005-45 pp.37-42 |
CAS, SIP, VLD |
2005-06-28 14:15 |
Miyagi |
Tohoku University |
A Memory-Reduction Method for Partially-Parallel LDPC Decoder Based on Min-Sum Algorithm Tatsuyuki Ishikawa, Kazunori Shimizu, Takeshi Ikenaga, Satoshi Goto (Waseda Univ.) |
In this paper, we propose a memory-reduction method for partially-parallel LDPC decoder based on min-sum algorithm. We ... [more] |
CAS2005-22 VLD2005-33 SIP2005-46 pp.43-48 |
CAS, SIP, VLD |
2005-06-28 14:00 |
Miyagi |
Tohoku University |
High Driving Capability by Lateral Unified CBiCMOS Inverter with Resister-Ratio Type Control Circuits Takashi Hamahata, Toshiro Akino (Kinki Univ.) |
[more] |
CAS2005-23 VLD2005-34 SIP2005-47 pp.49-54 |
CAS, SIP, VLD |
2005-06-28 14:25 |
Miyagi |
Tohoku University |
Design and Evaluation of a Bit-Parallel Magnitude-Comparison CAM Based on TMR Logic Kohei Shoji, Takahiro Hanyu (Tohoku Univ.) |
The paper presents a new circuit style called ``TMR logic" combining TMR(tunneling magnetoresistive) devices with connec... [more] |
CAS2005-24 VLD2005-35 SIP2005-48 pp.55-59 |
CAS, SIP, VLD |
2005-06-28 14:50 |
Miyagi |
Tohoku University |
Complementary Ferroelectric Capacitor Logic and its Application to Fully Parallel Arithmetic VLSI Shoun Matsunaga, Takahiro Hanyu (Tohoku Univ.) |
In this paper, we propose a Complementary Ferroelectric Capacitor Logic-in-Memory circuit that makes it possible easily ... [more] |
CAS2005-25 VLD2005-36 SIP2005-49 pp.61-65 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 09:30 |
Iwate |
Iwate Prefectural University |
A Proposal of Worm Detection System by Taking a Statistics of Series of Packets to Honeypot Maki Kataoka, Yumiko Ishige (NTT Data Corporation), Nobutaka Mantani, Humiharu Ohashi (National Police Agency) |
A worm detection system tells us when an unknown worm occurs as well as its attributes. In the proposed system, traffic ... [more] |
ISEC2005-9 SITE2005-7 pp.1-6 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 09:55 |
Iwate |
Iwate Prefectural University |
A Study on Implementation of the Worm Prevention System Following the Infection Process Shusuke Maeda, Tatsuya Baba, Hisamichi Ohtani, Masataka Kado, Tsutomu Inada (NTT DATA) |
The network incidents caused by Internet worms are increasing every year. Infection of worms that exploit the vulnerabil... [more] |
ISEC2005-10 SITE2005-8 pp.7-14 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 10:20 |
Iwate |
Iwate Prefectural University |
A Study on a Method for Malware Quarantine in a Multi-OS Environment Tatsuya Baba, Hiroshi Fujimoto, Masataka Kado, Tsutomu Inada (NTT Data) |
Recently, infections of malware such as Internet worms and spyware are becoming a serious problem. To prevent damage fro... [more] |
ISEC2005-11 SITE2005-9 pp.15-21 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 10:45 |
Iwate |
Iwate Prefectural University |
A Consideration of Spyware Detection using Traffic Analysis Akira Yonahara, Hisamichi Ohtani, Tatsuya Baba, Tsutomu Inada (NTT DATA) |
Currently, the damage of the spyware has expanded rapidly. However, countermeasures of spyware have not spread, because ... [more] |
ISEC2005-12 SITE2005-10 pp.23-29 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 11:10 |
Iwate |
Iwate Prefectural University |
Evaluation of the quarantine system using "in the wild" viruses Osamu Tanaka, Katsuya Uchida (IISEC) |
Computer virus such as CodeRed comes to widen infection on a large scale in a short time after 2001. The damage of such ... [more] |
ISEC2005-13 SITE2005-11 pp.31-36 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 11:35 |
Iwate |
Iwate Prefectural University |
A Note of Intrusion Detection using Alteration of Data Fumiaki Nagano, Kohei Tatara (Kyushu Univ.), Toshihiro Tabata (Okayama Univ), Kouichi Sakurai (Kyushu Univ.) |
These days, Attacks which alter data in memory illegally are one of the most serious security threats.Although a lot of ... [more] |
ISEC2005-14 SITE2005-12 pp.37-44 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 09:55 |
Iwate |
Iwate Prefectural University |
Comparison of Error Probabilities of The Miller-Rabin Test by Experimental Measurement Value and Theoretical Upper Bound Toshiya Nakajima (Fujitsu Labs.) |
We compare theoretical upper bounds of error probability of the Miller--Rabin test(probability that a strong probable pr... [more] |
ISEC2005-15 SITE2005-13 pp.45-50 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 10:20 |
Iwate |
Iwate Prefectural University |
On Security of Superelliptic Curves and Cab Curves Based Cryptosystems against GHS Weil Descent Attack Tsutomu Iijima, Mahoro Shimura, Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC) |
[more] |
ISEC2005-16 SITE2005-14 pp.51-58 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 10:45 |
Iwate |
Iwate Prefectural University |
Performance of Prime Order Elliptic Curve Generation based on y-twist Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
This paper proposes a new twist technique and then shows some necessary conditions for prime order curves in the form $y... [more] |
ISEC2005-17 SITE2005-15 pp.59-66 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 11:10 |
Iwate |
Iwate Prefectural University |
Defeating Simple Power Analysis on Koblitz Curves Katsuyuki Okeya (Hitachi), Tsuyoshi Takagi (Future Univ. of Hakodate), Camille Vuillaume (Hitachi) |
Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very effici... [more] |
ISEC2005-18 SITE2005-16 pp.67-74 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 11:35 |
Iwate |
Iwate Prefectural University |
Development of DPA evaluation platform for 32 bit processor Koichi Fujisaki, Hideo Shimizu, Atsushi Shimbo (Toshiba Corp.) |
[more] |
ISEC2005-19 SITE2005-17 pp.75-82 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:00 |
Iwate |
Iwate Prefectural University |
Researches on Incident Tendency Detection Method on Frequency Analysis Hirofumi Nakakoji, Masato Terada, Kenichi Sakamoto (Hitachi) |
It may have the periodic character in the virus, worm and unauthorized access, which form a threat on a network accordin... [more] |
ISEC2005-20 SITE2005-18 pp.83-88 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:25 |
Iwate |
Iwate Prefectural University |
Study on Host Profiling for Incident Analysis Kazuya Ohkouchi (NICT/HITACHI), Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI) |
[more] |
ISEC2005-21 SITE2005-19 pp.89-96 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:50 |
Iwate |
Iwate Prefectural University |
A Simulation-based UDP Traffic Analysis of DNSSEC Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI), Shinji Shimojo (Osaka Univ.), Hiroki Nogawa (Tokyo Medical and Dental Univ.) |
DNSSEC, an authentication method of DNS (Domain Name System), increases
the payload length of DNS answer datagrams by a... [more] |
ISEC2005-22 SITE2005-20 pp.97-104 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 14:15 |
Iwate |
Iwate Prefectural University |
Research on Epidemiologic Approach for Anti Computer Viruses - 2
-- Applying to the model of anti mass-mailing virus measure -- Satoshi Seki (Waseda Univ.), Ryoichi Sasaki (Tokyo Denki Univ.), Mitsuru Iwamura (Waseda Univ.), Hiroshi Motosugi (Tokyo Denki Univ.) |
[more] |
ISEC2005-23 SITE2005-21 pp.105-111 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 14:40 |
Iwate |
Iwate Prefectural University |
Extension and Evaluation of Check Function for Improper Sending of Personal Information in Encrypted Mail System Kenji Yasu (TDU), Yasuhiko Akabane (NSD), Masami Ozaki (HIN), Koji Semoto (DCS), Ryoichi Sasaki (TDU) |
[more] |
ISEC2005-24 SITE2005-22 pp.113-118 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 15:05 |
Iwate |
Iwate Prefectural University |
Guardian watch support system for the children's Web access Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.) |
[more] |
ISEC2005-25 SITE2005-23 pp.119-124 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 15:45 |
Iwate |
Iwate Prefectural University |
* Keiko Kinoshita, Yasuhiro Inazumi, Hirotsugu Kinoshita (Kanagawa Univ.), |
[more] |
ISEC2005-26 SITE2005-24 pp.125-130 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 16:10 |
Iwate |
Iwate Prefectural University |
Systematizing of Information Forensics Kouichi Mukouyama, Katsuya Uchida (IISEC) |
[more] |
ISEC2005-27 SITE2005-25 pp.131-137 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 16:35 |
Iwate |
Iwate Prefectural University |
Consideration about intellectual property rights in university graduation thesis and production created by students Ryoju Hamada (Tohoku Univ.), Norihisa Segawa, Yuko Murayama (Iwate-pu) |
[more] |
ISEC2005-28 SITE2005-26 pp.139-145 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:00 |
Iwate |
Iwate Prefectural University |
The Direction of Japan's CMVP II Yuichi Hagiwara (C4T), Travis Spann (InfoGard), Tatsuaki Takebe (Yokogawa) |
As Japan now has her own e-government recommended cipher list, is seeking the possibilities to have her own Cryptographi... [more] |
ISEC2005-29 SITE2005-27 pp.147-153 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:25 |
Iwate |
Iwate Prefectural University |
On the Standardization of Information Security
-- Report on the Vienna Meeting in April, 2005 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric), Toshio Tatsuta (IBM Japan), Akira Otsuka (IPA/AIST), Kan Yasuda (NTT) |
[more] |
ISEC2005-30 SITE2005-28 pp.155-164 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:00 |
Iwate |
Iwate Prefectural University |
Construction of Oblivious Signatures Nobuyuki Shiina, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) |
(To be available after the conference date) [more] |
ISEC2005-31 SITE2005-29 pp.165-171 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:25 |
Iwate |
Iwate Prefectural University |
Partially Blind Signatures with Traceability Koji Chida, Miyako Ohkubo, Osamu Shionoiri, Ichizo Nakamura, Atsushi Kanai (NTT) |
Until now, it is not sufficiently discussed about how to construct a provably secure ``partially blind signature with tr... [more] |
ISEC2005-32 SITE2005-30 pp.173-178 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:50 |
Iwate |
Iwate Prefectural University |
Proposal on Sumi coating method which can change the coating parts to protect against insider attacks Takanobu Masubuchi, Hajime Nakamura, Saneyuki Ishii, Noriko Ogawa, Hiroshi Kashimura, Ryoichi Sasaki (Tokyo Denki Univ) |
Digital signatures do not allow any alteration of a document. However, for some signed documents ”appropriate” alteratio... [more] |
ISEC2005-33 SITE2005-31 pp.179-186 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 14:15 |
Iwate |
Iwate Prefectural University |
Exact t-out-of-n Signer-Ambiguous Signature Eiichiro Fujisaki, Koutarou Suzuki (NTT) |
[more] |
ISEC2005-34 SITE2005-32 pp.187-194 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 14:40 |
Iwate |
Iwate Prefectural University |
An (N,K) Threshold Signature Scheme with Public Keys of Small Size Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Comm. Univ.) |
[more] |
ISEC2005-35 SITE2005-33 pp.195-200 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 15:05 |
Iwate |
Iwate Prefectural University |
Meta Ring Signature Hiroyuki Okazaki (KCG), Ryuichi Sakai (OECU), Masao Kasahara (OGU) |
In this paper, we propose a new concept ``Meta Ring Signature''.
Suppose that a signature text work as a public key,
... [more] |
ISEC2005-36 SITE2005-34 pp.201-204 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 15:45 |
Iwate |
Iwate Prefectural University |
An Information Hiding System for Word 2003 XML Documents Muneyuki Kitano, Hidetaka Masuda (TDU), Hiroshi Nakagawa (Univ. of Tokyo) |
We are considering an information hiding technique for the following
situation: 1) The original writer applies the digi... [more] |
ISEC2005-37 SITE2005-35 pp.205-212 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 16:10 |
Iwate |
Iwate Prefectural University |
A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-38 SITE2005-36 pp.213-220 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 16:35 |
Iwate |
Iwate Prefectural University |
A Text hiding by Visual Secret Sharing with Picture Images Takashi Miyaki, Kazuya Shioda (Shizuoka Univ.), Hideki Yoshida (NTT Data), Masaharu Ozawa (ChanceLab.), Masakatsu Nishigaki (Shizuoka Univ.) |
The information in a digital document can flow out easily by copy & paste, print out, etc. "Text Secret Sharing Scheme U... [more] |
ISEC2005-39 SITE2005-37 pp.221-228 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:00 |
Iwate |
Iwate Prefectural University |
Implementation and Evaluation of Memory Protection Methods for Multitask OSes
-- CMS for Resource-poor Platforms and Tampering Detection -- Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo) |
The authors have been proposing a method, called Cryptographic Memory System (CMS), to protect the data stored in the ad... [more] |
ISEC2005-40 SITE2005-38 pp.229-234 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:25 |
Iwate |
Iwate Prefectural University |
A description model for data access control in Salvia operating system Yoshimi Ichiyanagi, Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo (Ritsumeikan Univ.) |
[more] |
ISEC2005-41 SITE2005-39 pp.235-242 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:50 |
Iwate |
Iwate Prefectural University |
A Case Study of Gordon-Loeb Model on Optimal Security Investiments Kimio Kuramitsu (Yokohama National Univ.) |
Gordon and Loeb (2002) presented an economic model of characterizing an optimal investment in information security. The ... [more] |
ISEC2005-42 SITE2005-40 pp.243-248 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:30 |
Iwate |
Iwate Prefectural University |
A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications) |
This paper proposes an efficient model and the associated algorithm for the group key management in secure multicast. In... [more] |
ISEC2005-43 pp.1-8 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:55 |
Iwate |
Iwate Prefectural University |
Murakami-Kasahara ID-based Key Sharing Scheme Revisited
-- In Comparison With Maurer-Yacobi Scheme -- Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) |
In Sept.~1990, the present authors firstly discussed DLP over
composite number and presented an ID-based Key Sharing Sc... [more] |
ISEC2005-44 pp.9-16 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:20 |
Iwate |
Iwate Prefectural University |
Efficient N-Party Password-based Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo) |
In this paper, we propose an efficient N-party
password-authenticated key exchange (so-called {\sf N-PAKE})
protocol a... [more] |
ISEC2005-45 pp.17-23 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:45 |
Iwate |
Iwate Prefectural University |
Relations Among Notions of Security for Identity Based Encryption Schemes Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST) |
We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen ident... [more] |
ISEC2005-46 pp.25-32 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 11:10 |
Iwate |
Iwate Prefectural University |
On a secure circuit evaluation protocol using ElGamal encryption Tsuyoshi Yamamoto, Koji Chida, Anderson Nasciment, Koutarou Suzuki, Shigenori Uchiyama (NTT) |
[more] |
ISEC2005-47 pp.33-40 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 11:35 |
Iwate |
Iwate Prefectural University |
An efficiently-verifiable zero-knowledge argument for proofs of knowledge Tsuyoshi Yamamoto, Eiichiro Fujisaki, Masayuki Abe (NTT) |
[more] |
ISEC2005-48 pp.41-45 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:30 |
Iwate |
Iwate Prefectural University |
Development of a certificate path cache method for Certificate Validation Service Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Satoru Tezuka (Hitachi,Ltd.) |
Recently, many certification authorities (CAs) have been built as the base of an electronic commerce and an electronic a... [more] |
ISEC2005-49 pp.47-52 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:55 |
Iwate |
Iwate Prefectural University |
A Status Detection of Secure Communication in Secure Service Platform Osamu Takata, Yuko Sawai, Kazuyoshi Hoshino, Tadashi Kaji, Keisuke Takeuchi, Takahiro Fujishiro, Satoru Tezuka (Hitachi) |
SSP (Secure Service Platform) is a platform that mediate secure communication. The secure communication using SSP needs ... [more] |
ISEC2005-50 pp.53-58 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:20 |
Iwate |
Iwate Prefectural University |
Development of Combined Authentication System Shinji Hirata, Masahiro Mimura, Kenta Takahashi, Yoshiaki Isobe (Hitachi) |
[more] |
ISEC2005-51 pp.59-65 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:45 |
Iwate |
Iwate Prefectural University |
A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ.,ISIT) |
[more] |
ISEC2005-52 pp.67-72 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 11:10 |
Iwate |
Iwate Prefectural University |
On Shared Attribute Certification Tsutomu Matsumoto, Junji Shikata, Takenobu Seito, Takahiro Furue, Makiko Ueyama (Yokohama National Univ.) |
[more] |
ISEC2005-53 pp.73-80 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:00 |
Iwate |
Iwate Prefectural University |
Critical cryptoanalysis for Y-00 Kentaro Imafuku (AIST), Hideki Imai (Tokyo Univ.), Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka (Melco) |
[more] |
ISEC2005-54 pp.81-87 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:25 |
Iwate |
Iwate Prefectural University |
Cheater Identifiable Quantum Secret Sharing Schemes Yumiko Murakami (NAIST/JST-ERATO), Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST) |
In this paper, we show that there exists a cheater identifiable
$(k, n)$ threshold secret sharing scheme for a quantum ... [more] |
ISEC2005-55 pp.89-92 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:50 |
Iwate |
Iwate Prefectural University |
Improvement of the Security against Photon Number Splitting Attacks Yoshifumi Nishida, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Institute of Computing) |
Since it is difficult for practical optical devices to output a single-photon pulse, a weak laser pulse is often substit... [more] |
ISEC2005-56 pp.93-99 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 14:15 |
Iwate |
Iwate Prefectural University |
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices Tetsuya Izu (FUJITSU Lab./Univ. of Electro-Comm.), Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.), Takeshi Shimoyama (FUJITSU Lab.) |
Recently, dedicated factoring devices have attracted much attention since it might be a threat for a current RSA-based P... [more] |
ISEC2005-57 pp.101-107 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 14:40 |
Iwate |
Iwate Prefectural University |
Improved Collision Attack on MD4 with Probability Almost 1 Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta (UEC) |
In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang et. al..
Wang et. al. claimed that collision messeage... [more] |
ISEC2005-58 pp.109-116 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 15:20 |
Iwate |
Iwate Prefectural University |
1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-59 pp.117-122 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 15:45 |
Iwate |
Iwate Prefectural University |
How to send a return receipt on anonymous channel ? Shinji Yamanaka (TOSHIBA) |
Proof of delivery (or return receipt) is a certificate of reception on network transaction from message sender to messag... [more] |
ISEC2005-60 pp.123-128 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 16:10 |
Iwate |
Iwate Prefectural University |
Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.) |
A data retrieval protocol between a database server, who has a database,
and a user, who has an index, allows the user... [more] |
ISEC2005-61 pp.129-136 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 16:35 |
Iwate |
Iwate Prefectural University |
A note on cryptographic schemes using collision-resistant functions based on factoring Jumpei Wada, Hajime Kanzaki (Kyoto Univ.), Shoichi Hirose (Fukui Univ.), Susumu Yoshida (Kyoto Univ.) |
A many-to-one function is called collision-resistant if it is infeasible to find two distinct inputs which correspond to... [more] |
ISEC2005-62 pp.137-142 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 17:00 |
Iwate |
Iwate Prefectural University |
Security of DOM Knapsack PKC against Low-Density Attack by Computer Experiment Takeshi Nasako, Yasuyuki Murakami (OECU) |
The low-density attack(LDA) is an effective attack to the knapsack cryptosystems when the density is low.
We proposed t... [more] |
ISEC2005-63 pp.143-147 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 17:25 |
Iwate |
Iwate Prefectural University |
Improving the security of S boxes in DES using Genetic Algorithm Atsushi Koyama, Yasuyuki Murakami (OECU) |
As for the Feistel cipher, it is known that the security of DES depends on the strength of S-box. DES is broken with the... [more] |
ISEC2005-64 pp.149-154 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:00 |
Iwate |
Iwate Prefectural University |
Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
To use results of watermark detection, a detection error probability is
required to be low enough.
We have derived ... [more] |
ISEC2005-65 pp.155-160 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:25 |
Iwate |
Iwate Prefectural University |
A Secure Reversible Watermark Using Predictive Coding Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Inst. of Computing) |
The watermark that restores the exact original image from the watermarked one is called reversible watermark. Firstly, t... [more] |
ISEC2005-66 pp.161-166 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:50 |
Iwate |
Iwate Prefectural University |
An Enhanced Secure Detection of Asymmetric Patchwork Digital Watermarking Mitsuo Okada, Hiroaki Kikuchi (Tokai Univ) |
A new method of efficient multi-bit asymmetric watermark algorithm is proposed in this paper. Our methodology applies to... [more] |
ISEC2005-67 pp.167-173 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 14:15 |
Iwate |
Iwate Prefectural University |
Robust watermarking scheme for copied, rotated and clipped documents Kurato Maeno, Masayuki Suto (Oki) |
With the recent enactment of Privacy Protection Law in Japan, there has been an increasing interest in technologies for ... [more] |
ISEC2005-68 pp.175-182 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 14:40 |
Iwate |
Iwate Prefectural University |
An Implementation of Partial Integrity Assurance Method for Image Data Masahiko Takenaka, Takashi Yoshioka (FUJITSU LABS.) |
[more] |
ISEC2005-69 pp.183-188 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 15:20 |
Iwate |
Iwate Prefectural University |
Study on a Anti-Tracking RF-ID Tag System Atsushi Sakai, Masahiko Takenaka (FUJITSU LABS.) |
[more] |
ISEC2005-70 pp.189-194 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 15:45 |
Iwate |
Iwate Prefectural University |
Proposal and evaluation of digital forensic logging system using USB Device Yuki Ashino, Hiroto Kokawa, Tsukasa Sato, Ryoichi Sasaki (TDU) |
With development of Internet society, Digital Forensic which is the technology and the social structure to prepare digit... [more] |
ISEC2005-71 pp.195-202 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 16:10 |
Iwate |
Iwate Prefectural University |
A study of wireless location privacy protection considering communication quality Hiroshi Yamane, Leping Huang, Kanta Matsuura, Kaoru Sezaki (Tokyo Univ.) |
The advance of radio-based tracking systems extends the application of location-based services (LBS), but it also threat... [more] |
ISEC2005-72 pp.203-210 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 16:35 |
Iwate |
Iwate Prefectural University |
Personal Information Management System based on Linkability Control Yoshinori Sato, Akihiko Kawasaki, Toyohisa Morita, Takashi Fukumoto (Hitachi, Ltd.) |
This paper proposes a personal information management system based on linkability control which divides user data into t... [more] |
ISEC2005-73 pp.211-217 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 17:00 |
Iwate |
Iwate Prefectural University |
Identity Control Method Considering Privacy Hajime Morito, Akihiko Kawasaki, Toyohisa Morita, Kazuo Takaragi (Hitachi Ltd.) |
With the complete introduction of the law for protecting personal information in April 2005, the needs concerning protec... [more] |
ISEC2005-74 pp.219-223 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 17:25 |
Iwate |
Iwate Prefectural University |
A Report on the 4th Annual PKI R&D Workshop Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-75 pp.225-230 |
EA |
2005-08-18 13:30 |
Miyagi |
|
Accuracy Improvement in Estimation of Minute Change in Thickness of Arterial Wall by Determining Center Frequency of Ultrasonic Echo Hideyuki Hasegawa, Hiroshi Kanai (Tohoku Univ.) |
Noninvasive measurement of mechanical properties, such as elasticity, of
the arterial wall is useful for diagnosis of a... [more] |
EA2005-34 pp.1-6 |
EA |
2005-08-18 14:00 |
Miyagi |
|
Propagation of pulse vibration along heart wall caused by closure of aortic valve Hiroshi Kanai (Tohoku Univ.) |
Though myocardial viscoelasticity is essential in the evaluation of heart diastolic properties, it has never been noninv... [more] |
EA2005-35 pp.7-12 |
EA |
2005-08-18 14:30 |
Miyagi |
|
On the role of spectral transitions in the perception of concurrent speech Masashi Ito, Masafumi Yano (Tohoku Univ.) |
It is reasonable to focus on spectral transition of speech to investigate “cocktail party problem.” The result of a prev... [more] |
EA2005-36 pp.13-18 |
EA |
2005-08-18 15:30 |
Miyagi |
|
Auditory Estimation of a Moving Sound's Velocity Ryo Ogasawara, Yukio Iwaya, Yo-iti Suzuki (Tohoku Univ.) |
The ability to estimate velocity of a moving object in the auditory domain is important as well as in the visual domain ... [more] |
EA2005-37 pp.19-22 |
EA |
2005-08-18 16:00 |
Miyagi |
|
A study of relationship between head movement and delay of Auditory Display System Satoshi Yairi, Yukio Iwaya, Yo-iti Suzuki (Tohoku Univ.) |
As CPU power increases, it has been able to construct a Virtual Auditory Display (VAD) system without DSPs.
We develop... [more] |
EA2005-38 pp.23-28 |
EA |
2005-08-18 16:30 |
Miyagi |
|
Feature analysis of head-related transfer function for sound localization of nearby sources Akihiro Yoshida, Tomoya Matsumura, Nobuyuki Iwanaga (Osaka Univ.), Wataru Kobayashi (ARNIS), Takao Onoye (Osaka Univ.) |
Recent trend of 3D acoustics is to develop sound localization systems with the use of 2 channel stereo sound. In such ki... [more] |
EA2005-39 pp.29-34 |
EA |
2005-08-19 10:00 |
Miyagi |
|
The estimation of the direction of the indoor reflection sound comes by using the acoustic intensity method Tang Yong, Hiroshi Sato, Takeshi Aoki, Wakako Tanaka, Hideo Shibayama (S. I. T.) |
In this paper, the strength and the coming direction of the reverberant sound that recorded after the sound source stops... [more] |
EA2005-40 pp.1-6 |
EA |
2005-08-19 10:30 |
Miyagi |
|
Meeting reproduction system with microphone array and sound localization Junichi Miyauchi (Univ. of Tsukuba), Futoshi Asano (Aist), Takeshi Yamada, Nobuhiko Kitawaki (Univ. of Tsukuba) |
This paper describes a sound reproduction system for meeting data recorded with a microphone array and a camera array. ... [more] |
EA2005-41 pp.7-12 |
EA |
2005-08-19 11:00 |
Miyagi |
|
[Invited Talk]
Beamforming algorithm based on multiple constraints for binaural hearing Ryouichi Nishimura, Yo-iti Suzuki (Tohoku Univ.) |
A microphone array system for binaural hearing is a promising technique that can reduce the disturbance of distracting s... [more] |
EA2005-42 pp.13-18 |
EA |
2005-08-19 13:00 |
Miyagi |
|
A study on DOA estimation based on the weighted Wiener gain
-- Application to HRTF data -- Yoshifumi Nagata, Toyota Fujioka, Masato Abe (Iwate Univ.) |
We have already proposed a method to estimate directions of arrival(DOA) of sound sourcesbased on weighted Wiener gain i... [more] |
EA2005-43 pp.19-24 |
EA |
2005-08-19 13:30 |
Miyagi |
|
A Noise Reduction Method Based on a Generalized Subtractive Beamformer Junfeng Li, Masato Akagi (JAIST) |
Combating noise signals is still a very important and challenging research topic. Previously, we presented a subtractive... [more] |
EA2005-44 pp.25-30 |
IT |
2005-09-27 13:30 |
Fukushima |
Aizu Univ. |
A Fast Sub-Optimum search Algorithm for Good Binary Convolutional Codes The Cuong Dinh, Takeshi Hashimoto (Univ. of Electro Comm.) |
[more] |
IT2005-51 pp.1-6 |
IT |
2005-09-27 13:55 |
Fukushima |
Aizu Univ. |
A Study of Reliability Based Hybrid ARQ Schemes Using a Recursive Systematic Convolutional Code Naoto Kobayashi, Daiki Koizumi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) |
The Reliability Based Hybrid ARQ (RBH-ARQ) is one of hybrid ARQ schemes.
In the RBH-ARQ, the modified feedback is compo... [more] |
IT2005-52 pp.7-11 |
IT |
2005-09-27 14:20 |
Fukushima |
Aizu Univ. |
A Relation Between Erasure Correcting And Error Correcting of Low-Density Parity-Check Codes Gou Hosoya, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) |
[more] |
IT2005-53 pp.13-17 |
IT |
2005-09-27 14:45 |
Fukushima |
Aizu Univ. |
A consideration on maximum-likelihood decoding for Reed-Solomon codes Muneyuki Shotsu (Shinshu Univ.), Masazumi Kurihara (Univ. of Electro-Com.), Tatsuo Sugimura (Shinshu Univ.) |
In the report, the efficient method of maximum-likelihood decoding for Reed-Solomon(R-S) code is proposed. The maximum-l... [more] |
IT2005-54 pp.19-24 |
IT |
2005-09-27 15:10 |
Fukushima |
Aizu Univ. |
The Representation of typeII ONB by Self-reciprocal Transformation Shigeki Kobayashi (Shinshu Univ.), Yasuyuki Nogami (Okayama Univ.), Tatsuo Sugimura (Shinshu Univ.) |
This paper make relation of All One Polynomials and Irreducible
Polynomials with TypeIIONB clear, by using polynomial ... [more] |
IT2005-55 pp.25-30 |
IT |
2005-09-27 15:50 |
Fukushima |
Aizu Univ. |
Binary ZCZ Code from an M-sequence and Its Application to CS-CDMA/CP Nalin S. Weerasinghe, Takeshi Hashimoto (Univ. of Electro-Comm.) |
[more] |
IT2005-56 pp.31-36 |
IT |
2005-09-27 16:15 |
Fukushima |
Aizu Univ. |
On The Behavior in The Tail of Sphere Decoding's Computational Complexity Distribution Prabowo Wisnu Hari, Dianjun Chen, Takeshi Hashimoto (UEC) |
Recent reports on digital communications have shown that the use of Sphere Decoding(SD) in multiple antenna system can a... [more] |
IT2005-57 pp.37-42 |
IT |
2005-09-27 16:40 |
Fukushima |
Aizu Univ. |
Unconditionally secure key agreement using BCH codes Kensuke Hirano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ), Hatsukazu Tanaka (KIC) |
Key agreement schemes using noise on the channel have been studied theoretically.Since these schemes require only an err... [more] |
IT2005-58 pp.43-47 |
IT |
2005-09-27 17:05 |
Fukushima |
Aizu Univ. |
Development of certificate verification system for mobile services Katsuyuki Umezawa, Aya Takahashi, Hiroki Uchiyama, Mitsuhiro Oikawa, Hisao Sakazaki, Mitsuhiro Oikawa, Seiichi Susaki (Hitachi, Ltd.), Shigeichi Hirasawa (Waseda Univ.) |
It is indispensable to verify a public key certificate strictly in order to check a communication partner's justificatio... [more] |
IT2005-59 pp.49-54 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 09:00 |
Miyagi |
Ichinobo, Sakunami-Spa |
Measuring 3D Position Using Picture Angle Jumpei Akabane, Kenji Ohmori (Hosei Univ.) |
[more] |
SIP2005-96 ICD2005-115 IE2005-60 pp.1-6 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 09:20 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Study of Ray-Space Coding Using a Hybrid Disparity Compensation DCT Codec Kenji Yamamoto, Tomohiro Yendo, Toshiaki Fujii, Masayuki Tanimoto (Nagoya Univ.) |
This paper introduces how to adapt a hybrid DPCM/DCT Codec (HDDC) for ray information coding, based on the fact that the... [more] |
SIP2005-97 ICD2005-116 IE2005-61 pp.7-12 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 09:40 |
Miyagi |
Ichinobo, Sakunami-Spa |
Temporal Segmentation of 3D Videos Based on Numerical Features Toshihiko Yamasaki, Kiyoharu Aizawa (Univ. of Tokyo) |
3D video, which is generated from multi-viewpoint images, has been attracting increased attention because it can record ... [more] |
SIP2005-98 ICD2005-117 IE2005-62 pp.13-18 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 10:00 |
Miyagi |
Ichinobo, Sakunami-Spa |
Detection of Ringing Distortion in Encoded Image by Wavelet Transform Asako Toshihiro, Masashi Kameda (Iwate Prefectural Univ.) |
[more] |
SIP2005-99 ICD2005-118 IE2005-63 pp.19-24 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 10:20 |
Miyagi |
Ichinobo, Sakunami-Spa |
Studies of the Shoeprint Coding Based on the Ridgelet-Hough Transform
-- A Proposition of Coding and Comparisons with the Conventional Method -- Makoto Hasegawa, Kazumoto Tanaka, Seiji Ishihara, Byon-chol So, Masakazu Kanezashi (Kinki Univ.), Hiroshi Moriwaki (Hiroshima Information Symphony) |
A shoeprint coding based on the ridgelet transform is proposed. The method of pattern matching using the Hough transform... [more] |
SIP2005-100 ICD2005-119 IE2005-64 pp.25-30 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 10:50 |
Miyagi |
Ichinobo, Sakunami-Spa |
Analysis of low frequency component of signal by Generalized Harmonic Analysis (GHA) Ichiyoh Maehara, Yoshihiro Kanda, Teruo Muraoka (Mi-TECH) |
Generalized Harmonic Analysis (GHA) that starts from fixed book of N.Wiener is being put to practical use by the sinusoi... [more] |
SIP2005-101 ICD2005-120 IE2005-65 pp.31-36 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 11:10 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Learning Algorithm Reducing Signal Distortion for Frequency Domain Feedforward Blind Source Separation Yasuhiro Dejima, Akihide Horita, Kenji Nakayama, Akihiro Hirano (Kanazawa Univ.) |
[more] |
SIP2005-102 ICD2005-121 IE2005-66 pp.37-42 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 11:30 |
Miyagi |
Ichinobo, Sakunami-Spa |
An Ultra-low Complexity Motion Estimation Algorithm and its Implementation of Specific Processor Seiichiro Hiratsuka (Fukuoka IST), Satoshi Goto, Takeshi Ikenaga (Waseda Univ.) |
Motion estimation (ME) requires huge computation complexity. Many motion estimation algorithms have been proposed to red... [more] |
SIP2005-103 ICD2005-122 IE2005-67 pp.43-48 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 11:50 |
Miyagi |
Ichinobo, Sakunami-Spa |
High-Quality Background Sprite Generation Based on Phase-Only Correlation Norihito Numa, Takafumi Aoki (Tohoku Univ.), Satoshi Kondo (Matsushita Electric Industrial Co., Ltd.) |
A background sprite is an image composed of pixels belonging
to a video object visible throughout a video segment.
Thi... [more] |
SIP2005-104 ICD2005-123 IE2005-68 pp.49-54 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 13:00 |
Miyagi |
Ichinobo, Sakunami-Spa |
A 2.0μm Pixel Pitch MOS Image Sensor with an Amorphous Si Film Color Filter Masahiro Kasano, Yuichi Inaba, Mitsuyoshi Mori, Shigetaka Kasuga, Takahiko Murata, Takumi Yamaguchi (MEI) |
We have developed a 2.0 x 2.0 μm2 pixel size MOS image sensor with a high aperture ratio of 30%. The key technologies ar... [more] |
SIP2005-105 ICD2005-124 IE2005-69 pp.55-59 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 13:20 |
Miyagi |
Ichinobo, Sakunami-Spa |
Four-Pixel accuracy Motion Estimation Unit using Extended Templates for HDTV Encording Jin Kobayashi, Takahiro Hiramatsu, Takahiro Sasaki, Toshio Kondo (Mie Univ) |
This paper describes the design of a first-stage motion estimation unit using different extended templates for the hier... [more] |
SIP2005-106 ICD2005-125 IE2005-70 pp.61-66 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 13:40 |
Miyagi |
Ichinobo, Sakunami-Spa |
A low power H.264 motion estimation algorithm for mobile video applications Masaki Hamamoto, Kenichi Nagai (Kobe Univ.), Tetsuro Matsuno (Kanazawa Univ.), Yuichiro Murachi, Junichi Miyakoshi (Kobe Univ.), Masayuki Miyama (Kanazawa Univ.), Masahiko Yoshimoto (Kobe Univ.) |
H.264 employs variable block size motion compensation which supports 7 block sizes from 16x16 to 4x4. This feature enhan... [more] |
SIP2005-107 ICD2005-126 IE2005-71 pp.67-72 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 14:00 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Ray-Tracing Engine for Dynamic Scene Rendering Yoshiyuki Kaeriyama, Kenichi Suzuki, Tadao Nakamura (Tohoku Univ.) |
[more] |
SIP2005-108 ICD2005-127 IE2005-72 pp.73-78 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 14:30 |
Miyagi |
Ichinobo, Sakunami-Spa |
[Invited Talk]
A Psychologically-Inspired VLSI Brain Model System for Human-Like Image Recognition Tadashi Shibata (Univ. of Tokyo) |
[more] |
SIP2005-109 ICD2005-128 IE2005-73 pp.79-87 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 15:30 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Memory Controller that Reduces Latency of Cached SDRAM Seiji Miura, Satoru Akiyama (Hitachi,Ltd) |
The proposed controller has two main control schemes, address-alignment control and dummy-cache control scheme. These tw... [more] |
SIP2005-110 ICD2005-129 IE2005-74 pp.89-93 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 15:50 |
Miyagi |
Ichinobo, Sakunami-Spa |
DFT Technique for Memory Macro with Built-in ECC Keiichi Kushida, Nobuaki Otsuka, Osamu Hirabayashi, Yasuhisa Takeyama (Toshiba Co.) |
DFT techniques to implement ECC circuitry on
memory macro with no additional test cost are
proposed. New methodology t... [more] |
SIP2005-111 ICD2005-130 IE2005-75 pp.95-100 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 16:10 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Soft-Error-Immune TCAM Archiecture with Associated Embedded DRAM Yuji Yano, Hideyuki Noda, Katsumi Dosaka, Fukashi Morishita, Kazunari Inoue, Toshiyuki Ogawa, Kazutami Arimoto (Renesas) |
[more] |
SIP2005-112 ICD2005-131 IE2005-76 pp.101-105 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 16:30 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Capacitorless Twin-Transistor Random Access Memory (TTRAM) on SOI Takayuki Gyohten, Fukashi Morishita, Hideyuki Noda (Renesas Technology Corp.), Mako Okamoto (Daioh Electric Corp.), Takashi Ipposhi, Shigeto Maegawa, Katsumi Dosaka, Kazutami Arimoto (Renesas Technology Corp.) |
We propose a novel capacitorless twin-transistor random access memory (TTRAM). The 2Mb test device has been fabricated o... [more] |
SIP2005-113 ICD2005-132 IE2005-77 pp.107-112 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-20 16:50 |
Miyagi |
Ichinobo, Sakunami-Spa |
A 333MHz Random Cycle DRAM Using the Floating Body Cell Kosuke Hatsuda, Katsuyuki Fujita, Takashi Ohsawa (Toshiba Corp.) |
[more] |
SIP2005-114 ICD2005-133 IE2005-78 pp.113-118 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 09:00 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Phase Noise Minimization of CMOS LC-VCOs Over Wide Tuning Range and Large PVT Variations Daisuke Miyashita, Hiroki Ishikuro, Shouhei Kousai, Hiroyuki Kobayashi, Hideaki Majima, Kenichi Agawa, Mototsugu Hamada (Toshiba Corp.) |
An automatic amplitude control circuit to minimize the phase noise of a LC-VCO is proposed and implemented by a 0.18-μm ... [more] |
SIP2005-115 ICD2005-134 IE2005-79 pp.1-5 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 09:20 |
Miyagi |
Ichinobo, Sakunami-Spa |
Substrate Noise Reduction and Random Variability Neutralization with Self Adjusted Forward Body Bias Control Yoshihide Komatsu, Koichiro Ishibashi, Toshiro Tsukada, Masaharu Yamamoto (STARC), Kenji Shimazaki, Mitsuya Fukazawa, Makoto Nagata (Kobe Univ.) |
[more] |
SIP2005-116 ICD2005-135 IE2005-80 pp.7-12 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 09:40 |
Miyagi |
Ichinobo, Sakunami-Spa |
Thermal Analysis on Microprocessors Naoyuki Hasegawa, Mutsuo Ito, Ryusuke Egawa, Kenichi Suzuki, Tadao Nakamura (Tohoku Univ.) |
Recently, the advance in the semiconductor process technology and the modern microarchitectural techniques have enabled ... [more] |
SIP2005-117 ICD2005-136 IE2005-81 pp.13-18 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 10:10 |
Miyagi |
Ichinobo, Sakunami-Spa |
Development of an embedded processor core SH-X2 Takashi Okada (Hitachi), Tomoichi Hayashi, Takehiro Shimizu (Renesas), Fumio Arakawa, Tetsuya Yamada (Hitachi), Osamu Nishii, Toshihiro Hattori (Renesas) |
A {S}uper{H$^{\rm TM}$} embedded processor core, SH-X2 for consumer appliances, implemented in a 90-nm CMOS process runn... [more] |
SIP2005-118 ICD2005-137 IE2005-82 pp.19-24 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 10:30 |
Miyagi |
Ichinobo, Sakunami-Spa |
Single-Chip Multi-Processor Integrating Quadruple 8-Way VLIW Processors Atsushi Tanaka, Atsuhiro Suga, Fumihiko Hayakawa, Shinichiro Tago, Satoshi Imai (Fujitsu Lab) |
To realize the low power consumption and low-cost equipment needed to encode high-definition broadcasts, we have develo... [more] |
SIP2005-119 ICD2005-138 IE2005-83 pp.25-29 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 10:50 |
Miyagi |
Ichinobo, Sakunami-Spa |
Compaction of Arithmetic Unit with Bit-Level-Parallelism Jubee Tada (Yamagata Univ.), Ryusuke Egawa (Tohoku Univ.), Gensuke Goto (Yamagata Univ.), Tadao Nakamura (Tohoku Univ.) |
Aiming at reducing power consumption of VLSIs, we propose a fast and compact arithmetic unit. The arithmetic unit reduc... [more] |
SIP2005-120 ICD2005-139 IE2005-84 pp.31-35 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 11:20 |
Miyagi |
Ichinobo, Sakunami-Spa |
[Invited Talk]
Development of Image Recognition Processor Based on Configurable Processor Takashi Miyamori (Toshiba) |
We developed an image recognition processor, “Visconti,” based on a configurable processor. Three VLIW processors that e... [more] |
SIP2005-121 ICD2005-140 IE2005-85 pp.37-42 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 13:00 |
Miyagi |
Ichinobo, Sakunami-Spa |
[Invited Talk]
Technology for Embedded Processors Kunio Uchiyama (Hitachi) |
Embedded processors which are used in recent digital consumer appliances must satisfy the requirements of high-performan... [more] |
SIP2005-122 ICD2005-141 IE2005-86 pp.43-47 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 14:00 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Reliability Evaluation Technique for Soft-Error Susceptible Computer Systems Makoto Sugihara (ISIT), Tohru Ishihara (Kyushu Univ.), Koji Hashimoto (Fukuoka Univ.), Masanori Muroyama (Kyushu Univ.) |
As the feature size of integrated circuits shrinks, their voltage and noise margins are lowered and the soft error issue... [more] |
SIP2005-123 ICD2005-142 IE2005-87 pp.49-54 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 14:20 |
Miyagi |
Ichinobo, Sakunami-Spa |
A study for hardware optimization using a high level synthesis fron C Satoru Inoue, Tsuyoshi Kondo, Tomonori Izumi, Masahiro Fukui (Rits) |
Higher abstraction design has been highly required so that a human can focus on inspired part of design by making comput... [more] |
SIP2005-124 ICD2005-143 IE2005-88 pp.55-60 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 14:40 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Cache-Defect-Aware Code Placement Technique for Improving the Performance of Processor Tohru Ishihara (Kyushu Univ.), Farzan Fallah (FLA) |
[more] |
SIP2005-125 ICD2005-144 IE2005-89 pp.61-66 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 15:00 |
Miyagi |
Ichinobo, Sakunami-Spa |
A study for power and speed tradeoff estimation for behavior hardware model Noriyuki Inoue, Katsuhiro Oshikawa, Tomonori Izumi, Masahiro Fukui (Rits Univ.) |
Due to the increasing of the scale of systems, planning the design strategy based on the power estimation in early desig... [more] |
SIP2005-126 ICD2005-145 IE2005-90 pp.67-72 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 15:30 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Monitor Generation Method for Formal Monitor-based Verification Considering Input Constraints Yosuke Kakiuchi (Osaka Univ.), Akira Kitajima (Osaka Electro-Communication Univ.), Kiyoharu Hamaguchi, Toshinobu Kashiwabara (Osaka Univ.) |
In order to verify hardware module interfaces, various verification methods have been proposed. This paper focuses on fo... [more] |
SIP2005-127 ICD2005-146 IE2005-91 pp.73-78 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 15:50 |
Miyagi |
Ichinobo, Sakunami-Spa |
A cell library development methodology for character projection Makoto Sugihara (ISIT), Taiga Takata, Kenta Nakamura (Kyushu Univ.), Ryoichi Inanami (e-BEAM), Hiroaki Hayashi (Tokyo Electron), Katsumi Kishimoto (e-BEAM), Tetsuya Hasebe (Tokyo Electron), Yukihiro Kawano (e-BEAM), Yusuke Matsunaga, Kazuaki Murakami (Kyushu Univ.), Katsuya Okumura (Univ. of Tokyo) |
We propose a cell library development methodology for throughput enhancement of electron beam direct-write (EBDW) system... [more] |
SIP2005-128 ICD2005-147 IE2005-92 pp.79-84 |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 16:10 |
Miyagi |
Ichinobo, Sakunami-Spa |
A Study for Power Grid Optimization Taiki Harada, Kenji Kusano, Takayuki Shimada, Hironobu Ishijima, Masahiro Fukui (Rits Univ.) |
To the advent of super deep submicron age, stabilization of power supply system becomes more and more important against ... [more] |
SIP2005-129 ICD2005-148 IE2005-93 pp.85-90 |