IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

A: Engineering Sciences Society  (Searched in: 2005)

In Tohoku Region

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 162 of 162  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NLP 2005-05-17
13:00
Yamagata Yamagata Univ (Yonezawa) Approximation and Analysis of Non-linear Equations Based on Moment Vector Equations
Hideki Satoh (Future Univ. Hakodate)
Moment vector equations (MVEs) are presented in this report to approximate and analyze multi-dimensional non-linear disc... [more] NLP2005-1
pp.1-6
NLP 2005-05-17
13:25
Yamagata Yamagata Univ (Yonezawa) Bifurcation and Chaos in an H-Bridge Inverter
Koji Sakamoto, Takuji Kousaka (Fukuyama Univ.), Yue Ma, Tetsushi Ueta (Tokushima Univ.)
In this paper, we discuss a bifurcation and chaos in a H-Bridge Inverter. At first, we show a H-bridge inverter with PWM... [more] NLP2005-2
pp.7-12
NLP 2005-05-17
13:50
Yamagata Yamagata Univ (Yonezawa) A study of developed thermal turbulence by the measurement of the velocity field
Takashi Mashiko, Masaki Sano (Univ. of Tokyo), Yoshiyuki Tsuji (Nagoya Univ.)
 [more] NLP2005-3
pp.13-16
NLP 2005-05-17
14:30
Yamagata Yamagata Univ (Yonezawa) Basic Property of a Quantum Neural Network Composed of Kane's Qubits
Yuuki Nakamiya, Mitsunaga Kinjo, Osamu Takahashi, Shigeo Sato, Koji Nakajima (R.I.E.C., Tohoku Univ.)
 [more] NLP2005-4
pp.17-21
NLP 2005-05-17
14:55
Yamagata Yamagata Univ (Yonezawa) Lossless High Dynamic Range Image Coding based on Lifting Scheme using Nonlinear Interpolative Effect of Discrete-Time Cellular Neural Networks
Hisashi Aomori, Kohei Kawakami (Sophia Univ.), Tsuyoshi Otake (Tamagawa Univ.), Nobuaki Takahashi (IBM Japan, Ltd.), Masayuki Yamauchi, Mamoru Tanaka (Sophia Univ.)
The lifting scheme is a flexible method for the construction of linear and nonlinear wavelet transforms. In this paper, ... [more] NLP2005-5
pp.23-28
NLP 2005-05-17
15:20
Yamagata Yamagata Univ (Yonezawa) Discrete ID model for optimization problems
Hirokazu Nagashima, Yoshihiro Hayakawa, Koji Nakajima (RIEC Tohoku Univ.)
 [more] NLP2005-6
pp.29-34
NLP 2005-05-17
15:45
Yamagata Yamagata Univ (Yonezawa) Parameter dependence on performance of ID model for optimization problems
Akari Sato, Yoshihiro Hayakawa, Koji Nakajima (R.I.E.C., Tohoku Univ.)
Inverse Function Delayed model used in out reserch has high performance of seaeching answer of optimization problems. Th... [more] NLP2005-7
pp.35-39
NLP 2005-05-17
16:25
Yamagata Yamagata Univ (Yonezawa) Two-layer neural field model for working memory task with intervening stimulus
Shigeru Kubota (Yamagata Univ.), Tsuyoshi Okamoto (ERATO), Kosuke Hamaguchi (RIKEN), Kazuyuki Aihara (Tokyo Univ.), Tatsuo Kitajima (Yamgata Univ.)
Electrophysiological experiments of working memory task in the presence of intervening stimuli has shown that the delay ... [more] NLP2005-8
pp.41-46
NLP 2005-05-17
16:50
Yamagata Yamagata Univ (Yonezawa) Role of NMDA receptor channels and GABA receptor channels in working memory
Tatsuo Kitajima, Satomi Nakui (Yamagata Univ.)
 [more] NLP2005-9
pp.47-52
NLP 2005-05-18
09:30
Yamagata Yamagata Univ (Yonezawa) The demand effect of cyclic bus using multiagent method
Satoshi Kitada, Atsushi Tanaka (Yamagata Univ.)
 [more] NLP2005-10
pp.1-4
NLP 2005-05-18
09:55
Yamagata Yamagata Univ (Yonezawa) Intellectual fazzy clustering using multiagent method
Kenji Shimizu, Atsushi Tsuya, Atsushi Tanaka (Yamagata Univ.)
 [more] NLP2005-11
pp.5-8
NLP 2005-05-18
10:20
Yamagata Yamagata Univ (Yonezawa) Methods of information communication using self-similar properties
Kazuto Sasaki, Atsushi Tanaka (Yamagata Univ.)
 [more] NLP2005-12
pp.9-12
NLP 2005-05-18
11:00
Yamagata Yamagata Univ (Yonezawa) A proposal of love affair model using multiagent and its evaluation
Tadahiro Nagai, Atsushi Tsuya, Atsushi Tanaka (Yamagata Univ.)
 [more] NLP2005-13
pp.13-17
NLP 2005-05-18
11:25
Yamagata Yamagata Univ (Yonezawa) Internal Structure and External Interactions of a rural village of South Kanto in the last days of the Tokugawa shogunate
Miki Matsuo, Nanami Toishi (Univ. of Tokyo)
We study a rural village, Kaminaguri-Kogumi, which was in South Kanto in Japan in the last days of the Tokugawa shogunat... [more] NLP2005-14
pp.19-23
NLP 2005-05-18
11:50
Yamagata Yamagata Univ (Yonezawa) Temporal asynchrony in human visual information processing --- an experimental approach
Hiro-Fumi Yanai, Chisa Mishima (Ibaraki Univ.)
In human visual information processing, not only that object's color, shape, and motion are analyzed in different cortic... [more] NLP2005-15
pp.25-28
CAS, SIP, VLD 2005-06-27
09:30
Miyagi Tohoku University Performance improvement for Adaptive Array Antenna using Alias Free Subband Adaptive Filters
Kota Endo, Kiyoshi Nishikawa, Hitoshi Kiya (Tokyo Metropolitan Univ.)
An adaptive array antenna is commonly used to compensate frequency selective fading in mobile communication system.Two a... [more] CAS2005-1 VLD2005-12 SIP2005-25
pp.1-6
CAS, SIP, VLD 2005-06-27
09:55
Miyagi Tohoku University Theory and applications of set theoretic adaptive filtering with multiple a-priori convex constraints -- Part II: Proof of convergence theorem --
Konstantinos Slavakis, Isao Yamada (Tokyo Inst. of Tech.), Nobuhiko Ogura (Musashi Inst. of Tech.)
Recently, the Adaptive Projected Subgradient Method (APSM) over multiple
closed convex constraints has been proposed in... [more]
CAS2005-2 VLD2005-13 SIP2005-26
pp.7-12
CAS, SIP, VLD 2005-06-27
10:20
Miyagi Tohoku University A Technique for Active Noise Control Systems with Online Secondary Path Modeling Using Additive Noise Power Scheduling
Muhammad Tahir Akhtar, Masahide Abe, Masayuki Kawamata (Tohoku Univ.)
This paper proposes a new method for active noise control (ANC) systems with online secondary path modeling. Here the co... [more] CAS2005-3 VLD2005-14 SIP2005-27
pp.13-18
CAS, SIP, VLD 2005-06-27
10:45
Miyagi Tohoku University Independent Component Analysis of Signals using Local Exponential Nonlinearities
Muhammad Tufail, Masahide Abe, Masayuki Kawamata (Tohoku Univ.)
In this paper we propose exponential type nonlinearities in order to blindly separate instantaneous mixtures of signals ... [more] CAS2005-4 VLD2005-15 SIP2005-28
pp.19-23
CAS, SIP, VLD 2005-06-27
11:10
Miyagi Tohoku University Analysis of Signal Separation and Signal Distortion in Feedforward and Feedback Blind Source Separation Based on Source Spectra
Akihide Horita, Kenji Nakayama, Akihiro Hirano (Kanazawa Univ.)
Source separation and signal distortion in three kinds of blind soure separation (BSS) systems with convolutive mixture ... [more] CAS2005-5 VLD2005-16 SIP2005-29
pp.25-30
CAS, SIP, VLD 2005-06-27
13:00
Miyagi Tohoku University Several Approaches to The Optimum Discrete Approximation of FIR Filterbanks
Yuichi Kida (Ohu Univ.), Takuro Kida (Nihon Univ.)
 [more] CAS2005-6 VLD2005-17 SIP2005-30
pp.31-36
CAS, SIP, VLD 2005-06-27
13:25
Miyagi Tohoku University On the Design of a Differential Filter using FIR Narrow Band Filters
Yasuo Tachibana (KAIT)
The processing of FFT for the sequence weighted by the extended Hanning window is equivalent to many narrow band FIR fil... [more] CAS2005-7 VLD2005-18 SIP2005-31
pp.37-42
CAS, SIP, VLD 2005-06-27
13:50
Miyagi Tohoku University The Property of the Second-Order Modes of Linear Discrete-Time Systems under Variable Transformation of Bounded-Real Function
Shunsuke Koshita, Masahide Abe, Masayuki Kawamata (Tohoku Univ.)
This paper discusses the property of the second-order modes of discrete-time systems under variable transformation. Mull... [more] CAS2005-8 VLD2005-19 SIP2005-32
pp.43-48
CAS, SIP, VLD 2005-06-27
14:30
Miyagi Tohoku University High Accuracy WaDi Image Interpolation with Local Gradient Features
Shuai Yuan, Masahide Abe (Tohoku Univ.), Akira Taguchi (Musashi Inst. of Tech.), Masayuki Kawamata (Tohoku Univ.)
In this paper, we propose a new computational method of the warped distance (WaDi) for digital image interpolation. The ... [more] CAS2005-9 VLD2005-20 SIP2005-33
pp.49-54
CAS, SIP, VLD 2005-06-27
14:55
Miyagi Tohoku University A Hardware Oriented Design for Weighted Median Filters. (口頭発表)
Anitha govindarajan (Post graduate student)
Median and rank order filters are very important types of filters in image processing well known for their ability in re... [more]
CAS, SIP, VLD 2005-06-27
15:20
Miyagi Tohoku University A New Multirate Processing Scheme for The Conversions of Image Resolution Based on Integer/Fractional Sampling Filter Banks
Fumio Itami (Saitama Inst. of Tech.), Eiji Watanabe (Shibaura Inst. of Tech.), Akinori Nishihara (Tokyo Inst. of Tech.)
This paper proposes a new multirate processing scheme for the conversion of image resolution by using integer or fractio... [more] CAS2005-10 VLD2005-21 SIP2005-34
pp.55-60
CAS, SIP, VLD 2005-06-27
16:00
Miyagi Tohoku University A Fingerprint Matching Algorithm Based on Phase-Only Correlation and Its Evaluation
Koichi Ito, Ayumi Morita, Takafumi Aoki (Tohoku Univ.), Tatsuo Higuchi (Tohoku Institute of Technology), Hiroshi Nakajima, Koji Kobayashi (Yamatake Corp.)
A major approach for fingerprint recognition today is to extract minutiae from fingerprint images and to perform fingerp... [more] CAS2005-11 VLD2005-22 SIP2005-35
pp.61-66
CAS, SIP, VLD 2005-06-27
16:25
Miyagi Tohoku University High Accuracy Stereo Vision System Based on Phase-Only Correlation and Its Application to 3D Face Matching
Naohide Uchida, Takuma Shibahara, Takafumi Aoki (Tohoku Univ.), Hiroshi Nakajima, Koji Kobayashi (Yamatake)
This paper proposes a face recognition system using passive stereo
vision to capture three-dimensional (3D) facial info... [more]
CAS2005-12 VLD2005-23 SIP2005-36
pp.67-71
CAS, SIP, VLD 2005-06-27
16:50
Miyagi Tohoku University High Accuracy Stereo Vision System Based on Phase-Only Correlation and Its Application to Metal Component Inspection
Takuma Shibahara, Takafumi Aoki (Tohoku Univ.), Yoshihiro Yamage, Masakazu Ono (Suzuki Motor Corp.)
 [more] CAS2005-13 VLD2005-24 SIP2005-37
pp.73-78
CAS, SIP, VLD 2005-06-27
17:15
Miyagi Tohoku University An Image Watermarking Method using the Lifting Wavelet Transform
Fumihiro Uchiyama (Kyushu Univ.), Akio Miyazaki (Kyushu Sangyo Univ.)
In this paper, we propose a new watermarking method for images using the lifting wavelet transform. Utilizing the waterm... [more] CAS2005-14 VLD2005-25 SIP2005-38
pp.79-84
CAS, SIP, VLD 2005-06-28
10:00
Miyagi Tohoku University Development of All-weather Realtime Player Tracing System by Adaptive Background Renewal
Munehiro Tokikura, Akinori Nishihara (TIT)
 [more] CAS2005-15 VLD2005-26 SIP2005-39
pp.1-6
CAS, SIP, VLD 2005-06-28
10:25
Miyagi Tohoku University High Accuracy Motion Estimation for Video Sequences Based on Phase-Only Correlation
Norihito Numa, Loy Hui Chien, Takafumi Aoki (Tohoku Univ.), Satoshi Kondo (Matsushita Electric Industrial Co., Ltd.)
In this paper, we present a high-accuracy Phase-Only Correlation (POC)-based motion estimation method for video sequence... [more] CAS2005-16 VLD2005-27 SIP2005-40
pp.7-12
CAS, SIP, VLD 2005-06-28
10:50
Miyagi Tohoku University Fast Image Identification for Coded Images with Different Compression Ratio
Ikue Iizuka, Fitri Arnia, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.)
This paper proposes a fast image identification scheme for lossy coded images. The proposed scheme identify two images w... [more] CAS2005-17 VLD2005-28 SIP2005-41
pp.13-18
CAS, SIP, VLD 2005-06-28
11:15
Miyagi Tohoku University A Scale Estimation Algorithm Based on Phase-Only Correlation for Electron Microscope Images
Sei Nagashima, Takafumi Aoki (Tohoku Univ.), Ruriko Tsuneta (Hitachi, Ltd., Central Reserch Laboratry)
This paper presents a scale estimation algorithm based on Phase-Only Correlation (POC) for electron microscope images. T... [more] CAS2005-18 VLD2005-29 SIP2005-42
pp.19-24
CAS, SIP, VLD 2005-06-28
13:00
Miyagi Tohoku University A compiler framework to combine multiple code optimization methods
Yuhei Kaneko, Nobuhiko Sugino (Tokyo Institute of Tech.)
 [more] CAS2005-19 VLD2005-30 SIP2005-43
pp.25-29
CAS, SIP, VLD 2005-06-28
13:25
Miyagi Tohoku University Optimal Design of Limited Carry-Propagation Adders Based on Redundant Number Systems
Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Tatsuo Higuchi (Tohtech)
 [more] CAS2005-20 VLD2005-31 SIP2005-44
pp.31-36
CAS, SIP, VLD 2005-06-28
13:50
Miyagi Tohoku University Formal Design of Arithmetic Circuits with Arithmetic Description Language: ARITH
Yuki Watanabe, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Tatsuo Higuchi (Tohtech)
This paper presents a design of parallel multipliers based on arithmetic description language called ARITH. The multipli... [more] CAS2005-21 VLD2005-32 SIP2005-45
pp.37-42
CAS, SIP, VLD 2005-06-28
14:15
Miyagi Tohoku University A Memory-Reduction Method for Partially-Parallel LDPC Decoder Based on Min-Sum Algorithm
Tatsuyuki Ishikawa, Kazunori Shimizu, Takeshi Ikenaga, Satoshi Goto (Waseda Univ.)
In this paper, we propose a memory-reduction method for partially-parallel LDPC decoder based on min-sum algorithm. We ... [more] CAS2005-22 VLD2005-33 SIP2005-46
pp.43-48
CAS, SIP, VLD 2005-06-28
14:00
Miyagi Tohoku University High Driving Capability by Lateral Unified CBiCMOS Inverter with Resister-Ratio Type Control Circuits
Takashi Hamahata, Toshiro Akino (Kinki Univ.)
 [more] CAS2005-23 VLD2005-34 SIP2005-47
pp.49-54
CAS, SIP, VLD 2005-06-28
14:25
Miyagi Tohoku University Design and Evaluation of a Bit-Parallel Magnitude-Comparison CAM Based on TMR Logic
Kohei Shoji, Takahiro Hanyu (Tohoku Univ.)
The paper presents a new circuit style called ``TMR logic" combining TMR(tunneling magnetoresistive) devices with connec... [more] CAS2005-24 VLD2005-35 SIP2005-48
pp.55-59
CAS, SIP, VLD 2005-06-28
14:50
Miyagi Tohoku University Complementary Ferroelectric Capacitor Logic and its Application to Fully Parallel Arithmetic VLSI
Shoun Matsunaga, Takahiro Hanyu (Tohoku Univ.)
In this paper, we propose a Complementary Ferroelectric Capacitor Logic-in-Memory circuit that makes it possible easily ... [more] CAS2005-25 VLD2005-36 SIP2005-49
pp.61-65
ISEC, IPSJ-CSEC, SITE 2005-07-21
09:30
Iwate Iwate Prefectural University A Proposal of Worm Detection System by Taking a Statistics of Series of Packets to Honeypot
Maki Kataoka, Yumiko Ishige (NTT Data Corporation), Nobutaka Mantani, Humiharu Ohashi (National Police Agency)
A worm detection system tells us when an unknown worm occurs as well as its attributes. In the proposed system, traffic ... [more] ISEC2005-9 SITE2005-7
pp.1-6
ISEC, IPSJ-CSEC, SITE 2005-07-21
09:55
Iwate Iwate Prefectural University A Study on Implementation of the Worm Prevention System Following the Infection Process
Shusuke Maeda, Tatsuya Baba, Hisamichi Ohtani, Masataka Kado, Tsutomu Inada (NTT DATA)
The network incidents caused by Internet worms are increasing every year. Infection of worms that exploit the vulnerabil... [more] ISEC2005-10 SITE2005-8
pp.7-14
ISEC, IPSJ-CSEC, SITE 2005-07-21
10:20
Iwate Iwate Prefectural University A Study on a Method for Malware Quarantine in a Multi-OS Environment
Tatsuya Baba, Hiroshi Fujimoto, Masataka Kado, Tsutomu Inada (NTT Data)
Recently, infections of malware such as Internet worms and spyware are becoming a serious problem. To prevent damage fro... [more] ISEC2005-11 SITE2005-9
pp.15-21
ISEC, IPSJ-CSEC, SITE 2005-07-21
10:45
Iwate Iwate Prefectural University A Consideration of Spyware Detection using Traffic Analysis
Akira Yonahara, Hisamichi Ohtani, Tatsuya Baba, Tsutomu Inada (NTT DATA)
Currently, the damage of the spyware has expanded rapidly. However, countermeasures of spyware have not spread, because ... [more] ISEC2005-12 SITE2005-10
pp.23-29
ISEC, IPSJ-CSEC, SITE 2005-07-21
11:10
Iwate Iwate Prefectural University Evaluation of the quarantine system using "in the wild" viruses
Osamu Tanaka, Katsuya Uchida (IISEC)
Computer virus such as CodeRed comes to widen infection on a large scale in a short time after 2001. The damage of such ... [more] ISEC2005-13 SITE2005-11
pp.31-36
ISEC, IPSJ-CSEC, SITE 2005-07-21
11:35
Iwate Iwate Prefectural University A Note of Intrusion Detection using Alteration of Data
Fumiaki Nagano, Kohei Tatara (Kyushu Univ.), Toshihiro Tabata (Okayama Univ), Kouichi Sakurai (Kyushu Univ.)
These days, Attacks which alter data in memory illegally are one of the most serious security threats.Although a lot of ... [more] ISEC2005-14 SITE2005-12
pp.37-44
ISEC, IPSJ-CSEC, SITE 2005-07-21
09:55
Iwate Iwate Prefectural University Comparison of Error Probabilities of The Miller-Rabin Test by Experimental Measurement Value and Theoretical Upper Bound
Toshiya Nakajima (Fujitsu Labs.)
We compare theoretical upper bounds of error probability of the Miller--Rabin test(probability that a strong probable pr... [more] ISEC2005-15 SITE2005-13
pp.45-50
ISEC, IPSJ-CSEC, SITE 2005-07-21
10:20
Iwate Iwate Prefectural University On Security of Superelliptic Curves and Cab Curves Based Cryptosystems against GHS Weil Descent Attack
Tsutomu Iijima, Mahoro Shimura, Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC)
 [more] ISEC2005-16 SITE2005-14
pp.51-58
ISEC, IPSJ-CSEC, SITE 2005-07-21
10:45
Iwate Iwate Prefectural University Performance of Prime Order Elliptic Curve Generation based on y-twist
Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
This paper proposes a new twist technique and then shows some necessary conditions for prime order curves in the form $y... [more] ISEC2005-17 SITE2005-15
pp.59-66
ISEC, IPSJ-CSEC, SITE 2005-07-21
11:10
Iwate Iwate Prefectural University Defeating Simple Power Analysis on Koblitz Curves
Katsuyuki Okeya (Hitachi), Tsuyoshi Takagi (Future Univ. of Hakodate), Camille Vuillaume (Hitachi)
Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very effici... [more] ISEC2005-18 SITE2005-16
pp.67-74
ISEC, IPSJ-CSEC, SITE 2005-07-21
11:35
Iwate Iwate Prefectural University Development of DPA evaluation platform for 32 bit processor
Koichi Fujisaki, Hideo Shimizu, Atsushi Shimbo (Toshiba Corp.)
 [more] ISEC2005-19 SITE2005-17
pp.75-82
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:00
Iwate Iwate Prefectural University Researches on Incident Tendency Detection Method on Frequency Analysis
Hirofumi Nakakoji, Masato Terada, Kenichi Sakamoto (Hitachi)
It may have the periodic character in the virus, worm and unauthorized access, which form a threat on a network accordin... [more] ISEC2005-20 SITE2005-18
pp.83-88
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:25
Iwate Iwate Prefectural University Study on Host Profiling for Incident Analysis
Kazuya Ohkouchi (NICT/HITACHI), Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI)
 [more] ISEC2005-21 SITE2005-19
pp.89-96
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:50
Iwate Iwate Prefectural University A Simulation-based UDP Traffic Analysis of DNSSEC
Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI), Shinji Shimojo (Osaka Univ.), Hiroki Nogawa (Tokyo Medical and Dental Univ.)
DNSSEC, an authentication method of DNS (Domain Name System), increases
the payload length of DNS answer datagrams by a... [more]
ISEC2005-22 SITE2005-20
pp.97-104
ISEC, IPSJ-CSEC, SITE 2005-07-21
14:15
Iwate Iwate Prefectural University Research on Epidemiologic Approach for Anti Computer Viruses - 2 -- Applying to the model of anti mass-mailing virus measure --
Satoshi Seki (Waseda Univ.), Ryoichi Sasaki (Tokyo Denki Univ.), Mitsuru Iwamura (Waseda Univ.), Hiroshi Motosugi (Tokyo Denki Univ.)
 [more] ISEC2005-23 SITE2005-21
pp.105-111
ISEC, IPSJ-CSEC, SITE 2005-07-21
14:40
Iwate Iwate Prefectural University Extension and Evaluation of Check Function for Improper Sending of Personal Information in Encrypted Mail System
Kenji Yasu (TDU), Yasuhiko Akabane (NSD), Masami Ozaki (HIN), Koji Semoto (DCS), Ryoichi Sasaki (TDU)
 [more] ISEC2005-24 SITE2005-22
pp.113-118
ISEC, IPSJ-CSEC, SITE 2005-07-21
15:05
Iwate Iwate Prefectural University Guardian watch support system for the children's Web access
Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.)
 [more] ISEC2005-25 SITE2005-23
pp.119-124
ISEC, IPSJ-CSEC, SITE 2005-07-21
15:45
Iwate Iwate Prefectural University *
Keiko Kinoshita, Yasuhiro Inazumi, Hirotsugu Kinoshita (Kanagawa Univ.),
 [more] ISEC2005-26 SITE2005-24
pp.125-130
ISEC, IPSJ-CSEC, SITE 2005-07-21
16:10
Iwate Iwate Prefectural University Systematizing of Information Forensics
Kouichi Mukouyama, Katsuya Uchida (IISEC)
 [more] ISEC2005-27 SITE2005-25
pp.131-137
ISEC, IPSJ-CSEC, SITE 2005-07-21
16:35
Iwate Iwate Prefectural University Consideration about intellectual property rights in university graduation thesis and production created by students
Ryoju Hamada (Tohoku Univ.), Norihisa Segawa, Yuko Murayama (Iwate-pu)
 [more] ISEC2005-28 SITE2005-26
pp.139-145
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:00
Iwate Iwate Prefectural University The Direction of Japan's CMVP II
Yuichi Hagiwara (C4T), Travis Spann (InfoGard), Tatsuaki Takebe (Yokogawa)
As Japan now has her own e-government recommended cipher list, is seeking the possibilities to have her own Cryptographi... [more] ISEC2005-29 SITE2005-27
pp.147-153
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:25
Iwate Iwate Prefectural University On the Standardization of Information Security -- Report on the Vienna Meeting in April, 2005 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric), Toshio Tatsuta (IBM Japan), Akira Otsuka (IPA/AIST), Kan Yasuda (NTT)
 [more] ISEC2005-30 SITE2005-28
pp.155-164
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:00
Iwate Iwate Prefectural University Construction of Oblivious Signatures
Nobuyuki Shiina, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.)
(To be available after the conference date) [more] ISEC2005-31 SITE2005-29
pp.165-171
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:25
Iwate Iwate Prefectural University Partially Blind Signatures with Traceability
Koji Chida, Miyako Ohkubo, Osamu Shionoiri, Ichizo Nakamura, Atsushi Kanai (NTT)
Until now, it is not sufficiently discussed about how to construct a provably secure ``partially blind signature with tr... [more] ISEC2005-32 SITE2005-30
pp.173-178
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:50
Iwate Iwate Prefectural University Proposal on Sumi coating method which can change the coating parts to protect against insider attacks
Takanobu Masubuchi, Hajime Nakamura, Saneyuki Ishii, Noriko Ogawa, Hiroshi Kashimura, Ryoichi Sasaki (Tokyo Denki Univ)
Digital signatures do not allow any alteration of a document. However, for some signed documents ”appropriate” alteratio... [more] ISEC2005-33 SITE2005-31
pp.179-186
ISEC, IPSJ-CSEC, SITE 2005-07-21
14:15
Iwate Iwate Prefectural University Exact t-out-of-n Signer-Ambiguous Signature
Eiichiro Fujisaki, Koutarou Suzuki (NTT)
 [more] ISEC2005-34 SITE2005-32
pp.187-194
ISEC, IPSJ-CSEC, SITE 2005-07-21
14:40
Iwate Iwate Prefectural University An (N,K) Threshold Signature Scheme with Public Keys of Small Size
Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Comm. Univ.)
 [more] ISEC2005-35 SITE2005-33
pp.195-200
ISEC, IPSJ-CSEC, SITE 2005-07-21
15:05
Iwate Iwate Prefectural University Meta Ring Signature
Hiroyuki Okazaki (KCG), Ryuichi Sakai (OECU), Masao Kasahara (OGU)
In this paper, we propose a new concept ``Meta Ring Signature''.
Suppose that a signature text work as a public key,
... [more]
ISEC2005-36 SITE2005-34
pp.201-204
ISEC, IPSJ-CSEC, SITE 2005-07-21
15:45
Iwate Iwate Prefectural University An Information Hiding System for Word 2003 XML Documents
Muneyuki Kitano, Hidetaka Masuda (TDU), Hiroshi Nakagawa (Univ. of Tokyo)
We are considering an information hiding technique for the following
situation: 1) The original writer applies the digi... [more]
ISEC2005-37 SITE2005-35
pp.205-212
ISEC, IPSJ-CSEC, SITE 2005-07-21
16:10
Iwate Iwate Prefectural University A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow
Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-38 SITE2005-36
pp.213-220
ISEC, IPSJ-CSEC, SITE 2005-07-21
16:35
Iwate Iwate Prefectural University A Text hiding by Visual Secret Sharing with Picture Images
Takashi Miyaki, Kazuya Shioda (Shizuoka Univ.), Hideki Yoshida (NTT Data), Masaharu Ozawa (ChanceLab.), Masakatsu Nishigaki (Shizuoka Univ.)
The information in a digital document can flow out easily by copy & paste, print out, etc. "Text Secret Sharing Scheme U... [more] ISEC2005-39 SITE2005-37
pp.221-228
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:00
Iwate Iwate Prefectural University Implementation and Evaluation of Memory Protection Methods for Multitask OSes -- CMS for Resource-poor Platforms and Tampering Detection --
Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo)
The authors have been proposing a method, called Cryptographic Memory System (CMS), to protect the data stored in the ad... [more] ISEC2005-40 SITE2005-38
pp.229-234
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:25
Iwate Iwate Prefectural University A description model for data access control in Salvia operating system
Yoshimi Ichiyanagi, Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo (Ritsumeikan Univ.)
 [more] ISEC2005-41 SITE2005-39
pp.235-242
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:50
Iwate Iwate Prefectural University A Case Study of Gordon-Loeb Model on Optimal Security Investiments
Kimio Kuramitsu (Yokohama National Univ.)
Gordon and Loeb (2002) presented an economic model of characterizing an optimal investment in information security. The ... [more] ISEC2005-42 SITE2005-40
pp.243-248
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:30
Iwate Iwate Prefectural University A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation
Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications)
This paper proposes an efficient model and the associated algorithm for the group key management in secure multicast. In... [more] ISEC2005-43
pp.1-8
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:55
Iwate Iwate Prefectural University Murakami-Kasahara ID-based Key Sharing Scheme Revisited -- In Comparison With Maurer-Yacobi Scheme --
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)
In Sept.~1990, the present authors firstly discussed DLP over
composite number and presented an ID-based Key Sharing Sc... [more]
ISEC2005-44
pp.9-16
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:20
Iwate Iwate Prefectural University Efficient N-Party Password-based Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo)
In this paper, we propose an efficient N-party
password-authenticated key exchange (so-called {\sf N-PAKE})
protocol a... [more]
ISEC2005-45
pp.17-23
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:45
Iwate Iwate Prefectural University Relations Among Notions of Security for Identity Based Encryption Schemes
Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST)
We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen ident... [more] ISEC2005-46
pp.25-32
ISEC, IPSJ-CSEC, SITE 2005-07-22
11:10
Iwate Iwate Prefectural University On a secure circuit evaluation protocol using ElGamal encryption
Tsuyoshi Yamamoto, Koji Chida, Anderson Nasciment, Koutarou Suzuki, Shigenori Uchiyama (NTT)
 [more] ISEC2005-47
pp.33-40
ISEC, IPSJ-CSEC, SITE 2005-07-22
11:35
Iwate Iwate Prefectural University An efficiently-verifiable zero-knowledge argument for proofs of knowledge
Tsuyoshi Yamamoto, Eiichiro Fujisaki, Masayuki Abe (NTT)
 [more] ISEC2005-48
pp.41-45
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:30
Iwate Iwate Prefectural University Development of a certificate path cache method for Certificate Validation Service
Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Satoru Tezuka (Hitachi,Ltd.)
Recently, many certification authorities (CAs) have been built as the base of an electronic commerce and an electronic a... [more] ISEC2005-49
pp.47-52
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:55
Iwate Iwate Prefectural University A Status Detection of Secure Communication in Secure Service Platform
Osamu Takata, Yuko Sawai, Kazuyoshi Hoshino, Tadashi Kaji, Keisuke Takeuchi, Takahiro Fujishiro, Satoru Tezuka (Hitachi)
SSP (Secure Service Platform) is a platform that mediate secure communication. The secure communication using SSP needs ... [more] ISEC2005-50
pp.53-58
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:20
Iwate Iwate Prefectural University Development of Combined Authentication System
Shinji Hirata, Masahiro Mimura, Kenta Takahashi, Yoshiaki Isobe (Hitachi)
 [more] ISEC2005-51
pp.59-65
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:45
Iwate Iwate Prefectural University A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository
Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ.,ISIT)
 [more] ISEC2005-52
pp.67-72
ISEC, IPSJ-CSEC, SITE 2005-07-22
11:10
Iwate Iwate Prefectural University On Shared Attribute Certification
Tsutomu Matsumoto, Junji Shikata, Takenobu Seito, Takahiro Furue, Makiko Ueyama (Yokohama National Univ.)
 [more] ISEC2005-53
pp.73-80
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:00
Iwate Iwate Prefectural University Critical cryptoanalysis for Y-00
Kentaro Imafuku (AIST), Hideki Imai (Tokyo Univ.), Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka (Melco)
 [more] ISEC2005-54
pp.81-87
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:25
Iwate Iwate Prefectural University Cheater Identifiable Quantum Secret Sharing Schemes
Yumiko Murakami (NAIST/JST-ERATO), Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST)
In this paper, we show that there exists a cheater identifiable
$(k, n)$ threshold secret sharing scheme for a quantum ... [more]
ISEC2005-55
pp.89-92
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:50
Iwate Iwate Prefectural University Improvement of the Security against Photon Number Splitting Attacks
Yoshifumi Nishida, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Institute of Computing)
Since it is difficult for practical optical devices to output a single-photon pulse, a weak laser pulse is often substit... [more] ISEC2005-56
pp.93-99
ISEC, IPSJ-CSEC, SITE 2005-07-22
14:15
Iwate Iwate Prefectural University Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices
Tetsuya Izu (FUJITSU Lab./Univ. of Electro-Comm.), Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.), Takeshi Shimoyama (FUJITSU Lab.)
Recently, dedicated factoring devices have attracted much attention since it might be a threat for a current RSA-based P... [more] ISEC2005-57
pp.101-107
ISEC, IPSJ-CSEC, SITE 2005-07-22
14:40
Iwate Iwate Prefectural University Improved Collision Attack on MD4 with Probability Almost 1
Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta (UEC)
In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang et. al..
Wang et. al. claimed that collision messeage... [more]
ISEC2005-58
pp.109-116
ISEC, IPSJ-CSEC, SITE 2005-07-22
15:20
Iwate Iwate Prefectural University 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-59
pp.117-122
ISEC, IPSJ-CSEC, SITE 2005-07-22
15:45
Iwate Iwate Prefectural University How to send a return receipt on anonymous channel ?
Shinji Yamanaka (TOSHIBA)
Proof of delivery (or return receipt) is a certificate of reception on network transaction from message sender to messag... [more] ISEC2005-60
pp.123-128
ISEC, IPSJ-CSEC, SITE 2005-07-22
16:10
Iwate Iwate Prefectural University Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results
Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.)
A data retrieval protocol between a database server, who has a database,
and a user, who has an index, allows the user... [more]
ISEC2005-61
pp.129-136
ISEC, IPSJ-CSEC, SITE 2005-07-22
16:35
Iwate Iwate Prefectural University A note on cryptographic schemes using collision-resistant functions based on factoring
Jumpei Wada, Hajime Kanzaki (Kyoto Univ.), Shoichi Hirose (Fukui Univ.), Susumu Yoshida (Kyoto Univ.)
A many-to-one function is called collision-resistant if it is infeasible to find two distinct inputs which correspond to... [more] ISEC2005-62
pp.137-142
ISEC, IPSJ-CSEC, SITE 2005-07-22
17:00
Iwate Iwate Prefectural University Security of DOM Knapsack PKC against Low-Density Attack by Computer Experiment
Takeshi Nasako, Yasuyuki Murakami (OECU)
The low-density attack(LDA) is an effective attack to the knapsack cryptosystems when the density is low.
We proposed t... [more]
ISEC2005-63
pp.143-147
ISEC, IPSJ-CSEC, SITE 2005-07-22
17:25
Iwate Iwate Prefectural University Improving the security of S boxes in DES using Genetic Algorithm
Atsushi Koyama, Yasuyuki Murakami (OECU)
As for the Feistel cipher, it is known that the security of DES depends on the strength of S-box. DES is broken with the... [more] ISEC2005-64
pp.149-154
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:00
Iwate Iwate Prefectural University Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability
Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
To use results of watermark detection, a detection error probability is
required to be low enough.

We have derived ... [more]
ISEC2005-65
pp.155-160
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:25
Iwate Iwate Prefectural University A Secure Reversible Watermark Using Predictive Coding
Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Inst. of Computing)
The watermark that restores the exact original image from the watermarked one is called reversible watermark. Firstly, t... [more] ISEC2005-66
pp.161-166
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:50
Iwate Iwate Prefectural University An Enhanced Secure Detection of Asymmetric Patchwork Digital Watermarking
Mitsuo Okada, Hiroaki Kikuchi (Tokai Univ)
A new method of efficient multi-bit asymmetric watermark algorithm is proposed in this paper. Our methodology applies to... [more] ISEC2005-67
pp.167-173
ISEC, IPSJ-CSEC, SITE 2005-07-22
14:15
Iwate Iwate Prefectural University Robust watermarking scheme for copied, rotated and clipped documents
Kurato Maeno, Masayuki Suto (Oki)
With the recent enactment of Privacy Protection Law in Japan, there has been an increasing interest in technologies for ... [more] ISEC2005-68
pp.175-182
ISEC, IPSJ-CSEC, SITE 2005-07-22
14:40
Iwate Iwate Prefectural University An Implementation of Partial Integrity Assurance Method for Image Data
Masahiko Takenaka, Takashi Yoshioka (FUJITSU LABS.)
 [more] ISEC2005-69
pp.183-188
ISEC, IPSJ-CSEC, SITE 2005-07-22
15:20
Iwate Iwate Prefectural University Study on a Anti-Tracking RF-ID Tag System
Atsushi Sakai, Masahiko Takenaka (FUJITSU LABS.)
 [more] ISEC2005-70
pp.189-194
ISEC, IPSJ-CSEC, SITE 2005-07-22
15:45
Iwate Iwate Prefectural University Proposal and evaluation of digital forensic logging system using USB Device
Yuki Ashino, Hiroto Kokawa, Tsukasa Sato, Ryoichi Sasaki (TDU)
With development of Internet society, Digital Forensic which is the technology and the social structure to prepare digit... [more] ISEC2005-71
pp.195-202
ISEC, IPSJ-CSEC, SITE 2005-07-22
16:10
Iwate Iwate Prefectural University A study of wireless location privacy protection considering communication quality
Hiroshi Yamane, Leping Huang, Kanta Matsuura, Kaoru Sezaki (Tokyo Univ.)
The advance of radio-based tracking systems extends the application of location-based services (LBS), but it also threat... [more] ISEC2005-72
pp.203-210
ISEC, IPSJ-CSEC, SITE 2005-07-22
16:35
Iwate Iwate Prefectural University Personal Information Management System based on Linkability Control
Yoshinori Sato, Akihiko Kawasaki, Toyohisa Morita, Takashi Fukumoto (Hitachi, Ltd.)
This paper proposes a personal information management system based on linkability control which divides user data into t... [more] ISEC2005-73
pp.211-217
ISEC, IPSJ-CSEC, SITE 2005-07-22
17:00
Iwate Iwate Prefectural University Identity Control Method Considering Privacy
Hajime Morito, Akihiko Kawasaki, Toyohisa Morita, Kazuo Takaragi (Hitachi Ltd.)
With the complete introduction of the law for protecting personal information in April 2005, the needs concerning protec... [more] ISEC2005-74
pp.219-223
ISEC, IPSJ-CSEC, SITE 2005-07-22
17:25
Iwate Iwate Prefectural University A Report on the 4th Annual PKI R&D Workshop
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-75
pp.225-230
EA 2005-08-18
13:30
Miyagi   Accuracy Improvement in Estimation of Minute Change in Thickness of Arterial Wall by Determining Center Frequency of Ultrasonic Echo
Hideyuki Hasegawa, Hiroshi Kanai (Tohoku Univ.)
Noninvasive measurement of mechanical properties, such as elasticity, of
the arterial wall is useful for diagnosis of a... [more]
EA2005-34
pp.1-6
EA 2005-08-18
14:00
Miyagi   Propagation of pulse vibration along heart wall caused by closure of aortic valve
Hiroshi Kanai (Tohoku Univ.)
Though myocardial viscoelasticity is essential in the evaluation of heart diastolic properties, it has never been noninv... [more] EA2005-35
pp.7-12
EA 2005-08-18
14:30
Miyagi   On the role of spectral transitions in the perception of concurrent speech
Masashi Ito, Masafumi Yano (Tohoku Univ.)
It is reasonable to focus on spectral transition of speech to investigate “cocktail party problem.” The result of a prev... [more] EA2005-36
pp.13-18
EA 2005-08-18
15:30
Miyagi   Auditory Estimation of a Moving Sound's Velocity
Ryo Ogasawara, Yukio Iwaya, Yo-iti Suzuki (Tohoku Univ.)
The ability to estimate velocity of a moving object in the auditory domain is important as well as in the visual domain ... [more] EA2005-37
pp.19-22
EA 2005-08-18
16:00
Miyagi   A study of relationship between head movement and delay of Auditory Display System
Satoshi Yairi, Yukio Iwaya, Yo-iti Suzuki (Tohoku Univ.)
As CPU power increases, it has been able to construct a Virtual Auditory Display (VAD) system without DSPs.
We develop... [more]
EA2005-38
pp.23-28
EA 2005-08-18
16:30
Miyagi   Feature analysis of head-related transfer function for sound localization of nearby sources
Akihiro Yoshida, Tomoya Matsumura, Nobuyuki Iwanaga (Osaka Univ.), Wataru Kobayashi (ARNIS), Takao Onoye (Osaka Univ.)
Recent trend of 3D acoustics is to develop sound localization systems with the use of 2 channel stereo sound. In such ki... [more] EA2005-39
pp.29-34
EA 2005-08-19
10:00
Miyagi   The estimation of the direction of the indoor reflection sound comes by using the acoustic intensity method
Tang Yong, Hiroshi Sato, Takeshi Aoki, Wakako Tanaka, Hideo Shibayama (S. I. T.)
In this paper, the strength and the coming direction of the reverberant sound that recorded after the sound source stops... [more] EA2005-40
pp.1-6
EA 2005-08-19
10:30
Miyagi   Meeting reproduction system with microphone array and sound localization
Junichi Miyauchi (Univ. of Tsukuba), Futoshi Asano (Aist), Takeshi Yamada, Nobuhiko Kitawaki (Univ. of Tsukuba)
This paper describes a sound reproduction system for meeting data recorded with a microphone array and a camera array. ... [more] EA2005-41
pp.7-12
EA 2005-08-19
11:00
Miyagi   [Invited Talk] Beamforming algorithm based on multiple constraints for binaural hearing
Ryouichi Nishimura, Yo-iti Suzuki (Tohoku Univ.)
A microphone array system for binaural hearing is a promising technique that can reduce the disturbance of distracting s... [more] EA2005-42
pp.13-18
EA 2005-08-19
13:00
Miyagi   A study on DOA estimation based on the weighted Wiener gain -- Application to HRTF data --
Yoshifumi Nagata, Toyota Fujioka, Masato Abe (Iwate Univ.)
We have already proposed a method to estimate directions of arrival(DOA) of sound sourcesbased on weighted Wiener gain i... [more] EA2005-43
pp.19-24
EA 2005-08-19
13:30
Miyagi   A Noise Reduction Method Based on a Generalized Subtractive Beamformer
Junfeng Li, Masato Akagi (JAIST)
Combating noise signals is still a very important and challenging research topic. Previously, we presented a subtractive... [more] EA2005-44
pp.25-30
IT 2005-09-27
13:30
Fukushima Aizu Univ. A Fast Sub-Optimum search Algorithm for Good Binary Convolutional Codes
The Cuong Dinh, Takeshi Hashimoto (Univ. of Electro Comm.)
 [more] IT2005-51
pp.1-6
IT 2005-09-27
13:55
Fukushima Aizu Univ. A Study of Reliability Based Hybrid ARQ Schemes Using a Recursive Systematic Convolutional Code
Naoto Kobayashi, Daiki Koizumi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.)
The Reliability Based Hybrid ARQ (RBH-ARQ) is one of hybrid ARQ schemes.
In the RBH-ARQ, the modified feedback is compo... [more]
IT2005-52
pp.7-11
IT 2005-09-27
14:20
Fukushima Aizu Univ. A Relation Between Erasure Correcting And Error Correcting of Low-Density Parity-Check Codes
Gou Hosoya, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.)
 [more] IT2005-53
pp.13-17
IT 2005-09-27
14:45
Fukushima Aizu Univ. A consideration on maximum-likelihood decoding for Reed-Solomon codes
Muneyuki Shotsu (Shinshu Univ.), Masazumi Kurihara (Univ. of Electro-Com.), Tatsuo Sugimura (Shinshu Univ.)
In the report, the efficient method of maximum-likelihood decoding for Reed-Solomon(R-S) code is proposed. The maximum-l... [more] IT2005-54
pp.19-24
IT 2005-09-27
15:10
Fukushima Aizu Univ. The Representation of typeII ONB by Self-reciprocal Transformation
Shigeki Kobayashi (Shinshu Univ.), Yasuyuki Nogami (Okayama Univ.), Tatsuo Sugimura (Shinshu Univ.)
This paper make relation of All One Polynomials and Irreducible
Polynomials with TypeIIONB clear, by using polynomial ... [more]
IT2005-55
pp.25-30
IT 2005-09-27
15:50
Fukushima Aizu Univ. Binary ZCZ Code from an M-sequence and Its Application to CS-CDMA/CP
Nalin S. Weerasinghe, Takeshi Hashimoto (Univ. of Electro-Comm.)
 [more] IT2005-56
pp.31-36
IT 2005-09-27
16:15
Fukushima Aizu Univ. On The Behavior in The Tail of Sphere Decoding's Computational Complexity Distribution
Prabowo Wisnu Hari, Dianjun Chen, Takeshi Hashimoto (UEC)
Recent reports on digital communications have shown that the use of Sphere Decoding(SD) in multiple antenna system can a... [more] IT2005-57
pp.37-42
IT 2005-09-27
16:40
Fukushima Aizu Univ. Unconditionally secure key agreement using BCH codes
Kensuke Hirano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ), Hatsukazu Tanaka (KIC)
Key agreement schemes using noise on the channel have been studied theoretically.Since these schemes require only an err... [more] IT2005-58
pp.43-47
IT 2005-09-27
17:05
Fukushima Aizu Univ. Development of certificate verification system for mobile services
Katsuyuki Umezawa, Aya Takahashi, Hiroki Uchiyama, Mitsuhiro Oikawa, Hisao Sakazaki, Mitsuhiro Oikawa, Seiichi Susaki (Hitachi, Ltd.), Shigeichi Hirasawa (Waseda Univ.)
It is indispensable to verify a public key certificate strictly in order to check a communication partner's justificatio... [more] IT2005-59
pp.49-54
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
09:00
Miyagi Ichinobo, Sakunami-Spa Measuring 3D Position Using Picture Angle
Jumpei Akabane, Kenji Ohmori (Hosei Univ.)
 [more] SIP2005-96 ICD2005-115 IE2005-60
pp.1-6
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
09:20
Miyagi Ichinobo, Sakunami-Spa A Study of Ray-Space Coding Using a Hybrid Disparity Compensation DCT Codec
Kenji Yamamoto, Tomohiro Yendo, Toshiaki Fujii, Masayuki Tanimoto (Nagoya Univ.)
This paper introduces how to adapt a hybrid DPCM/DCT Codec (HDDC) for ray information coding, based on the fact that the... [more] SIP2005-97 ICD2005-116 IE2005-61
pp.7-12
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
09:40
Miyagi Ichinobo, Sakunami-Spa Temporal Segmentation of 3D Videos Based on Numerical Features
Toshihiko Yamasaki, Kiyoharu Aizawa (Univ. of Tokyo)
3D video, which is generated from multi-viewpoint images, has been attracting increased attention because it can record ... [more] SIP2005-98 ICD2005-117 IE2005-62
pp.13-18
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
10:00
Miyagi Ichinobo, Sakunami-Spa Detection of Ringing Distortion in Encoded Image by Wavelet Transform
Asako Toshihiro, Masashi Kameda (Iwate Prefectural Univ.)
 [more] SIP2005-99 ICD2005-118 IE2005-63
pp.19-24
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
10:20
Miyagi Ichinobo, Sakunami-Spa Studies of the Shoeprint Coding Based on the Ridgelet-Hough Transform -- A Proposition of Coding and Comparisons with the Conventional Method --
Makoto Hasegawa, Kazumoto Tanaka, Seiji Ishihara, Byon-chol So, Masakazu Kanezashi (Kinki Univ.), Hiroshi Moriwaki (Hiroshima Information Symphony)
A shoeprint coding based on the ridgelet transform is proposed. The method of pattern matching using the Hough transform... [more] SIP2005-100 ICD2005-119 IE2005-64
pp.25-30
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
10:50
Miyagi Ichinobo, Sakunami-Spa Analysis of low frequency component of signal by Generalized Harmonic Analysis (GHA)
Ichiyoh Maehara, Yoshihiro Kanda, Teruo Muraoka (Mi-TECH)
Generalized Harmonic Analysis (GHA) that starts from fixed book of N.Wiener is being put to practical use by the sinusoi... [more] SIP2005-101 ICD2005-120 IE2005-65
pp.31-36
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
11:10
Miyagi Ichinobo, Sakunami-Spa A Learning Algorithm Reducing Signal Distortion for Frequency Domain Feedforward Blind Source Separation
Yasuhiro Dejima, Akihide Horita, Kenji Nakayama, Akihiro Hirano (Kanazawa Univ.)
 [more] SIP2005-102 ICD2005-121 IE2005-66
pp.37-42
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
11:30
Miyagi Ichinobo, Sakunami-Spa An Ultra-low Complexity Motion Estimation Algorithm and its Implementation of Specific Processor
Seiichiro Hiratsuka (Fukuoka IST), Satoshi Goto, Takeshi Ikenaga (Waseda Univ.)
Motion estimation (ME) requires huge computation complexity. Many motion estimation algorithms have been proposed to red... [more] SIP2005-103 ICD2005-122 IE2005-67
pp.43-48
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
11:50
Miyagi Ichinobo, Sakunami-Spa High-Quality Background Sprite Generation Based on Phase-Only Correlation
Norihito Numa, Takafumi Aoki (Tohoku Univ.), Satoshi Kondo (Matsushita Electric Industrial Co., Ltd.)
A background sprite is an image composed of pixels belonging
to a video object visible throughout a video segment.
Thi... [more]
SIP2005-104 ICD2005-123 IE2005-68
pp.49-54
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
13:00
Miyagi Ichinobo, Sakunami-Spa A 2.0μm Pixel Pitch MOS Image Sensor with an Amorphous Si Film Color Filter
Masahiro Kasano, Yuichi Inaba, Mitsuyoshi Mori, Shigetaka Kasuga, Takahiko Murata, Takumi Yamaguchi (MEI)
We have developed a 2.0 x 2.0 μm2 pixel size MOS image sensor with a high aperture ratio of 30%. The key technologies ar... [more] SIP2005-105 ICD2005-124 IE2005-69
pp.55-59
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
13:20
Miyagi Ichinobo, Sakunami-Spa Four-Pixel accuracy Motion Estimation Unit using Extended Templates for HDTV Encording
Jin Kobayashi, Takahiro Hiramatsu, Takahiro Sasaki, Toshio Kondo (Mie Univ)
This paper describes the design of a first-stage motion estimation unit using different extended templates for the hier... [more] SIP2005-106 ICD2005-125 IE2005-70
pp.61-66
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
13:40
Miyagi Ichinobo, Sakunami-Spa A low power H.264 motion estimation algorithm for mobile video applications
Masaki Hamamoto, Kenichi Nagai (Kobe Univ.), Tetsuro Matsuno (Kanazawa Univ.), Yuichiro Murachi, Junichi Miyakoshi (Kobe Univ.), Masayuki Miyama (Kanazawa Univ.), Masahiko Yoshimoto (Kobe Univ.)
H.264 employs variable block size motion compensation which supports 7 block sizes from 16x16 to 4x4. This feature enhan... [more] SIP2005-107 ICD2005-126 IE2005-71
pp.67-72
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
14:00
Miyagi Ichinobo, Sakunami-Spa A Ray-Tracing Engine for Dynamic Scene Rendering
Yoshiyuki Kaeriyama, Kenichi Suzuki, Tadao Nakamura (Tohoku Univ.)
 [more] SIP2005-108 ICD2005-127 IE2005-72
pp.73-78
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
14:30
Miyagi Ichinobo, Sakunami-Spa [Invited Talk] A Psychologically-Inspired VLSI Brain Model System for Human-Like Image Recognition
Tadashi Shibata (Univ. of Tokyo)
 [more] SIP2005-109 ICD2005-128 IE2005-73
pp.79-87
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
15:30
Miyagi Ichinobo, Sakunami-Spa A Memory Controller that Reduces Latency of Cached SDRAM
Seiji Miura, Satoru Akiyama (Hitachi,Ltd)
The proposed controller has two main control schemes, address-alignment control and dummy-cache control scheme. These tw... [more] SIP2005-110 ICD2005-129 IE2005-74
pp.89-93
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
15:50
Miyagi Ichinobo, Sakunami-Spa DFT Technique for Memory Macro with Built-in ECC
Keiichi Kushida, Nobuaki Otsuka, Osamu Hirabayashi, Yasuhisa Takeyama (Toshiba Co.)
DFT techniques to implement ECC circuitry on
memory macro with no additional test cost are
proposed. New methodology t... [more]
SIP2005-111 ICD2005-130 IE2005-75
pp.95-100
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
16:10
Miyagi Ichinobo, Sakunami-Spa A Soft-Error-Immune TCAM Archiecture with Associated Embedded DRAM
Yuji Yano, Hideyuki Noda, Katsumi Dosaka, Fukashi Morishita, Kazunari Inoue, Toshiyuki Ogawa, Kazutami Arimoto (Renesas)
 [more] SIP2005-112 ICD2005-131 IE2005-76
pp.101-105
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
16:30
Miyagi Ichinobo, Sakunami-Spa A Capacitorless Twin-Transistor Random Access Memory (TTRAM) on SOI
Takayuki Gyohten, Fukashi Morishita, Hideyuki Noda (Renesas Technology Corp.), Mako Okamoto (Daioh Electric Corp.), Takashi Ipposhi, Shigeto Maegawa, Katsumi Dosaka, Kazutami Arimoto (Renesas Technology Corp.)
We propose a novel capacitorless twin-transistor random access memory (TTRAM). The 2Mb test device has been fabricated o... [more] SIP2005-113 ICD2005-132 IE2005-77
pp.107-112
SIP, ICD, IE, IPSJ-SLDM 2005-10-20
16:50
Miyagi Ichinobo, Sakunami-Spa A 333MHz Random Cycle DRAM Using the Floating Body Cell
Kosuke Hatsuda, Katsuyuki Fujita, Takashi Ohsawa (Toshiba Corp.)
 [more] SIP2005-114 ICD2005-133 IE2005-78
pp.113-118
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
09:00
Miyagi Ichinobo, Sakunami-Spa A Phase Noise Minimization of CMOS LC-VCOs Over Wide Tuning Range and Large PVT Variations
Daisuke Miyashita, Hiroki Ishikuro, Shouhei Kousai, Hiroyuki Kobayashi, Hideaki Majima, Kenichi Agawa, Mototsugu Hamada (Toshiba Corp.)
An automatic amplitude control circuit to minimize the phase noise of a LC-VCO is proposed and implemented by a 0.18-μm ... [more] SIP2005-115 ICD2005-134 IE2005-79
pp.1-5
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
09:20
Miyagi Ichinobo, Sakunami-Spa Substrate Noise Reduction and Random Variability Neutralization with Self Adjusted Forward Body Bias Control
Yoshihide Komatsu, Koichiro Ishibashi, Toshiro Tsukada, Masaharu Yamamoto (STARC), Kenji Shimazaki, Mitsuya Fukazawa, Makoto Nagata (Kobe Univ.)
 [more] SIP2005-116 ICD2005-135 IE2005-80
pp.7-12
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
09:40
Miyagi Ichinobo, Sakunami-Spa Thermal Analysis on Microprocessors
Naoyuki Hasegawa, Mutsuo Ito, Ryusuke Egawa, Kenichi Suzuki, Tadao Nakamura (Tohoku Univ.)
Recently, the advance in the semiconductor process technology and the modern microarchitectural techniques have enabled ... [more] SIP2005-117 ICD2005-136 IE2005-81
pp.13-18
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
10:10
Miyagi Ichinobo, Sakunami-Spa Development of an embedded processor core SH-X2
Takashi Okada (Hitachi), Tomoichi Hayashi, Takehiro Shimizu (Renesas), Fumio Arakawa, Tetsuya Yamada (Hitachi), Osamu Nishii, Toshihiro Hattori (Renesas)
A {S}uper{H$^{\rm TM}$} embedded processor core, SH-X2 for consumer appliances, implemented in a 90-nm CMOS process runn... [more] SIP2005-118 ICD2005-137 IE2005-82
pp.19-24
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
10:30
Miyagi Ichinobo, Sakunami-Spa Single-Chip Multi-Processor Integrating Quadruple 8-Way VLIW Processors
Atsushi Tanaka, Atsuhiro Suga, Fumihiko Hayakawa, Shinichiro Tago, Satoshi Imai (Fujitsu Lab)
To realize the low power consumption and low-cost equipment needed to encode high-definition broadcasts, we have develo... [more] SIP2005-119 ICD2005-138 IE2005-83
pp.25-29
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
10:50
Miyagi Ichinobo, Sakunami-Spa Compaction of Arithmetic Unit with Bit-Level-Parallelism
Jubee Tada (Yamagata Univ.), Ryusuke Egawa (Tohoku Univ.), Gensuke Goto (Yamagata Univ.), Tadao Nakamura (Tohoku Univ.)
Aiming at reducing power consumption of VLSIs, we propose a fast and compact arithmetic unit. The arithmetic unit reduc... [more] SIP2005-120 ICD2005-139 IE2005-84
pp.31-35
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
11:20
Miyagi Ichinobo, Sakunami-Spa [Invited Talk] Development of Image Recognition Processor Based on Configurable Processor
Takashi Miyamori (Toshiba)
We developed an image recognition processor, “Visconti,” based on a configurable processor. Three VLIW processors that e... [more] SIP2005-121 ICD2005-140 IE2005-85
pp.37-42
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
13:00
Miyagi Ichinobo, Sakunami-Spa [Invited Talk] Technology for Embedded Processors
Kunio Uchiyama (Hitachi)
Embedded processors which are used in recent digital consumer appliances must satisfy the requirements of high-performan... [more] SIP2005-122 ICD2005-141 IE2005-86
pp.43-47
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
14:00
Miyagi Ichinobo, Sakunami-Spa A Reliability Evaluation Technique for Soft-Error Susceptible Computer Systems
Makoto Sugihara (ISIT), Tohru Ishihara (Kyushu Univ.), Koji Hashimoto (Fukuoka Univ.), Masanori Muroyama (Kyushu Univ.)
As the feature size of integrated circuits shrinks, their voltage and noise margins are lowered and the soft error issue... [more] SIP2005-123 ICD2005-142 IE2005-87
pp.49-54
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
14:20
Miyagi Ichinobo, Sakunami-Spa A study for hardware optimization using a high level synthesis fron C
Satoru Inoue, Tsuyoshi Kondo, Tomonori Izumi, Masahiro Fukui (Rits)
Higher abstraction design has been highly required so that a human can focus on inspired part of design by making comput... [more] SIP2005-124 ICD2005-143 IE2005-88
pp.55-60
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
14:40
Miyagi Ichinobo, Sakunami-Spa A Cache-Defect-Aware Code Placement Technique for Improving the Performance of Processor
Tohru Ishihara (Kyushu Univ.), Farzan Fallah (FLA)
 [more] SIP2005-125 ICD2005-144 IE2005-89
pp.61-66
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
15:00
Miyagi Ichinobo, Sakunami-Spa A study for power and speed tradeoff estimation for behavior hardware model
Noriyuki Inoue, Katsuhiro Oshikawa, Tomonori Izumi, Masahiro Fukui (Rits Univ.)
Due to the increasing of the scale of systems, planning the design strategy based on the power estimation in early desig... [more] SIP2005-126 ICD2005-145 IE2005-90
pp.67-72
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
15:30
Miyagi Ichinobo, Sakunami-Spa A Monitor Generation Method for Formal Monitor-based Verification Considering Input Constraints
Yosuke Kakiuchi (Osaka Univ.), Akira Kitajima (Osaka Electro-Communication Univ.), Kiyoharu Hamaguchi, Toshinobu Kashiwabara (Osaka Univ.)
In order to verify hardware module interfaces, various verification methods have been proposed. This paper focuses on fo... [more] SIP2005-127 ICD2005-146 IE2005-91
pp.73-78
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
15:50
Miyagi Ichinobo, Sakunami-Spa A cell library development methodology for character projection
Makoto Sugihara (ISIT), Taiga Takata, Kenta Nakamura (Kyushu Univ.), Ryoichi Inanami (e-BEAM), Hiroaki Hayashi (Tokyo Electron), Katsumi Kishimoto (e-BEAM), Tetsuya Hasebe (Tokyo Electron), Yukihiro Kawano (e-BEAM), Yusuke Matsunaga, Kazuaki Murakami (Kyushu Univ.), Katsuya Okumura (Univ. of Tokyo)
We propose a cell library development methodology for throughput enhancement of electron beam direct-write (EBDW) system... [more] SIP2005-128 ICD2005-147 IE2005-92
pp.79-84
SIP, ICD, IE, IPSJ-SLDM 2005-10-21
16:10
Miyagi Ichinobo, Sakunami-Spa A Study for Power Grid Optimization
Taiki Harada, Kenji Kusano, Takayuki Shimada, Hironobu Ishijima, Masahiro Fukui (Rits Univ.)
To the advent of super deep submicron age, stabilization of power supply system becomes more and more important against ... [more] SIP2005-129 ICD2005-148 IE2005-93
pp.85-90
 Results 1 - 162 of 162  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan