Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ET |
2019-03-15 15:15 |
Tokushima |
Naruto University of Education |
Research the period should be gave activity details of a supporting system for research activities Shintaro Hiromura (Shinshu Univ.), Hisayoshi Kunimune (Chiba Inst. of Tech.), Masaaki Niimura (Shinshu Univ.) ET2018-104 |
We develop and operate a research activity support system to promote self-regulated research activities. This system man... [more] |
ET2018-104 pp.99-104 |
EA, SIP, SP |
2019-03-14 15:40 |
Nagasaki |
i+Land nagasaki (Nagasaki-shi) |
Estimation of rank-constrained spatial covariance model based on multivariate complex Student's t distribution for blind source separation Yuki Kubo, Norihiro Takamune (UTokyo), Daichi Kitamura (Kagawa NCIT), Hiroshi Saruwatari (UTokyo) EA2018-128 SIP2018-134 SP2018-90 |
In this paper, we generalize a generative model in estimation of rank-constrained spatial covariance model that separate... [more] |
EA2018-128 SIP2018-134 SP2018-90 pp.173-178 |
CAS, ICTSSL |
2019-01-24 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On automatic configuration and update of a transmittable area of information floating in a road network Keisuke Nakano, Kazuyuki Miyakita, Naoyuki Karasawa (Niigata Univ.) CAS2018-119 ICTSSL2018-38 |
By permitting mobile nodes to transmit information only in areas called Transmittable Areas (TAs), we can deliver inform... [more] |
CAS2018-119 ICTSSL2018-38 pp.17-20 |
NLP, NC (Joint) |
2019-01-24 15:20 |
Hokkaido |
The Centennial Hall, Hokkaido Univ. |
A New Method for Deriving Multiplicative Update Rules for NMF with Error Functions Containing Logarithm Akihiro Koso, Norikazu Takahashi (Okayama Univ.) NLP2018-122 |
Nonnegative Matrix Factorization (NMF) is an operation that decomposes a given nonnegative matrix X into two nonnegative... [more] |
NLP2018-122 pp.137-142 |
IN |
2019-01-21 13:15 |
Aichi |
WINC AICHI |
Cache Update Method Based on Content Update Dynamic Queries for Named Data Networking Takatoshi Miwa, Shigetomo Kimura (Univ. of Tsukuba) IN2018-72 |
In Named Data Networking (NDN), a client requests a content by its content identifier, instead of the server's IP addres... [more] |
IN2018-72 pp.1-6 |
IN, ICTSSL, NWS (Joint) [detail] |
2018-10-19 10:10 |
Kagawa |
Takamatsu Shoko Kaigisyo Kaikan |
On automatic configuration and update of a transmittable area in information floating Keisuke Nakano, Kazuyuki Miyakita (Niigata Univ.) ICTSSL2018-28 IN2018-45 |
In this report, we propose a method to automatically configure the size of a Transmittable Area (TA) for Information Flo... [more] |
ICTSSL2018-28 IN2018-45 pp.13-18 |
WBS, IT, ISEC |
2018-03-09 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-140 ISEC2017-128 WBS2017-121 |
A public-key encryption with keyword search (PEKS) scheme is applicable to safe cloud services as a user can search a ke... [more] |
IT2017-140 ISEC2017-128 WBS2017-121 pp.219-223 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Predicting Website Abuse Using Update Histories Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73 |
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more] |
ICSS2017-73 pp.133-138 |
ICM, CQ, NS, NV (Joint) |
2017-11-17 15:00 |
Kagawa |
|
[Encouragement Talk]
Reinforcement Learning based Automated Process Generation for Virtual Network Update Manabu Nakanoya (NEC) ICM2017-32 |
Spreading the network virtualization and softwarization technology using network function virtualization(NFV) and softwa... [more] |
ICM2017-32 pp.63-68 |
SS, DC |
2017-10-19 13:45 |
Kochi |
Kochi City Culture-plaza CUL-PORT |
A Direct Update Method for Compressed Data with Top Tree Suguru Nishimura, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2017-22 DC2017-21 |
This paper proposes a direct update method for a data compressed with top tree. For a given compressed data (top DAG) an... [more] |
SS2017-22 DC2017-21 pp.7-12 |
ISEC |
2017-05-12 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Key-Updatable Searchable Encryption
-- Applying Proxy Re-Encryption with Keyword Search -- Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1 |
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more] |
ISEC2017-1 pp.1-6 |
NLP |
2017-05-11 16:00 |
Okayama |
Okayama University of Science |
Multiplicative Update Rules for Nonnegative Matrix Factorization with Regularization Terms Akihiro Koso, Norikazu Takahashi (Okayama Univ.) NLP2017-13 |
Nonnegative Matrix Factorization (NMF) is an operation that decomposes a given nonnegative matrix into two nonnegative f... [more] |
NLP2017-13 pp.63-68 |
NS, CQ, ICM, NV (Joint) |
2016-11-25 14:20 |
Yamaguchi |
Shimonoseki Chember of Commerce and Industry |
Atutomated Change Planning for Network Device with Model-based Aproach Manabu Nakanoya, Takayuki Kuroda, Toshio Tonouchi (NEC) ICM2016-36 |
The configuration management automation tools, such as ansible and puppet, have been applied to network devices as well ... [more] |
ICM2016-36 pp.67-72 |
DC, SS |
2016-10-27 15:55 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
A Direct Update Method for XML Documents Including Data Values Compressed by Tree Grammars Ryunosuke Takayama, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) SS2016-27 DC2016-29 |
A tree grammar based compression is known as one of the compression methods for XML documents. Also, methods for updatin... [more] |
SS2016-27 DC2016-29 pp.55-60 |
CPSY, IPSJ-ARC |
2016-10-06 10:00 |
Chiba |
Makuhari-messe |
[Technology Exhibit]
Security technologies for non-volatile memory in IoT devices
-- Mechanisms for on-chip MCU and off-chip memory system -- Mikio Hashimoto, Yoshiyuki Amanuma, Kentaro Umesawa, Ryuichi Koike, Jun Kanai, Naoko Yamada (Toshiba) CPSY2016-51 |
Non-volatile memory content modification is serious issues on IoT appliances, since evil effects continue over power cyc... [more] |
CPSY2016-51 pp.37-42 |
BioX |
2016-08-19 09:00 |
Miyagi |
|
A Study on Authentication System using the Coordinates and Writing Speeds of Segments Extracted from Sign Strokes on Tablet Kazuya Tsubota, Keiko Masuda, Seiichirou Hangai (TUS) BioX2016-13 |
In recently, with the growth of the mobile terminals such as smart phone or tablet, if we can identify the individual wi... [more] |
BioX2016-13 pp.33-38 |
BioX |
2016-08-19 11:20 |
Miyagi |
|
A Study on Convenient Key Update for Public Biometrics Infrastructure Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi (Hitachi) BioX2016-15 |
Network society and e-government services are advanced, and the importance of personal authentication infrastructure inc... [more] |
BioX2016-15 pp.45-50 |
OCS, NS, PN (Joint) |
2016-06-24 08:30 |
Hokkaido |
Hokkaido University |
A method for updating a set of attractors in Yuragi-based virtual network topology control Koki Sakamoto, Toshihiko Ohba, Shin'ichi Arakawa, Masayuki Murata (Osaka Univ.) PN2016-10 |
Our research group has proposed a VNT control method based on attractor selection. Since the number of attractors compos... [more] |
PN2016-10 pp.27-32 |
ICTSSL |
2016-06-15 13:25 |
Miyagi |
Tohoku University |
A consideration on information renewal and power control in epidemic communication Naoki Kinoshita, Kazuyuki Miyakita, Keisuke Nakano (Niigata Univ.) ICTSSL2016-14 |
In epidemic communication, information is spread by direct wireless communications between mobile nodes and mobility of ... [more] |
ICTSSL2016-14 pp.79-84 |
LOIS |
2016-03-03 14:40 |
Okinawa |
Central Community Center, Miyakojima-City |
An Extension of Update Method without Decompression for Compressed Structured Documents and Its Experimental Evaluation Takeshi Goto, Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) LOIS2015-75 |
XML is a {it de facto} standard for data storage and exchange, and various compression methods for XML documents have be... [more] |
LOIS2015-75 pp.69-74 |