IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 95 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ET 2019-03-15
15:15
Tokushima Naruto University of Education Research the period should be gave activity details of a supporting system for research activities
Shintaro Hiromura (Shinshu Univ.), Hisayoshi Kunimune (Chiba Inst. of Tech.), Masaaki Niimura (Shinshu Univ.) ET2018-104
We develop and operate a research activity support system to promote self-regulated research activities. This system man... [more] ET2018-104
pp.99-104
EA, SIP, SP 2019-03-14
15:40
Nagasaki i+Land nagasaki (Nagasaki-shi) Estimation of rank-constrained spatial covariance model based on multivariate complex Student's t distribution for blind source separation
Yuki Kubo, Norihiro Takamune (UTokyo), Daichi Kitamura (Kagawa NCIT), Hiroshi Saruwatari (UTokyo) EA2018-128 SIP2018-134 SP2018-90
In this paper, we generalize a generative model in estimation of rank-constrained spatial covariance model that separate... [more] EA2018-128 SIP2018-134 SP2018-90
pp.173-178
CAS, ICTSSL 2019-01-24
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. On automatic configuration and update of a transmittable area of information floating in a road network
Keisuke Nakano, Kazuyuki Miyakita, Naoyuki Karasawa (Niigata Univ.) CAS2018-119 ICTSSL2018-38
By permitting mobile nodes to transmit information only in areas called Transmittable Areas (TAs), we can deliver inform... [more] CAS2018-119 ICTSSL2018-38
pp.17-20
NLP, NC
(Joint)
2019-01-24
15:20
Hokkaido The Centennial Hall, Hokkaido Univ. A New Method for Deriving Multiplicative Update Rules for NMF with Error Functions Containing Logarithm
Akihiro Koso, Norikazu Takahashi (Okayama Univ.) NLP2018-122
Nonnegative Matrix Factorization (NMF) is an operation that decomposes a given nonnegative matrix X into two nonnegative... [more] NLP2018-122
pp.137-142
IN 2019-01-21
13:15
Aichi WINC AICHI Cache Update Method Based on Content Update Dynamic Queries for Named Data Networking
Takatoshi Miwa, Shigetomo Kimura (Univ. of Tsukuba) IN2018-72
In Named Data Networking (NDN), a client requests a content by its content identifier, instead of the server's IP addres... [more] IN2018-72
pp.1-6
IN, ICTSSL, NWS
(Joint) [detail]
2018-10-19
10:10
Kagawa Takamatsu Shoko Kaigisyo Kaikan On automatic configuration and update of a transmittable area in information floating
Keisuke Nakano, Kazuyuki Miyakita (Niigata Univ.) ICTSSL2018-28 IN2018-45
In this report, we propose a method to automatically configure the size of a Transmittable Area (TA) for Information Flo... [more] ICTSSL2018-28 IN2018-45
pp.13-18
WBS, IT, ISEC 2018-03-09
09:25
Tokyo Katsusika Campas, Tokyo University of Science On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search
Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-140 ISEC2017-128 WBS2017-121
A public-key encryption with keyword search (PEKS) scheme is applicable to safe cloud services as a user can search a ke... [more] IT2017-140 ISEC2017-128 WBS2017-121
pp.219-223
ICSS, IPSJ-SPT 2018-03-08
11:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Predicting Website Abuse Using Update Histories
Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato (NTT), Shigeki Goto (Waseda Univ.) ICSS2017-73
Threats of abusing websites that webmasters abandoned updates has increased.
In this paper, we propose a method of pred... [more]
ICSS2017-73
pp.133-138
ICM, CQ, NS, NV
(Joint)
2017-11-17
15:00
Kagawa   [Encouragement Talk] Reinforcement Learning based Automated Process Generation for Virtual Network Update
Manabu Nakanoya (NEC) ICM2017-32
Spreading the network virtualization and softwarization technology using network function virtualization(NFV) and softwa... [more] ICM2017-32
pp.63-68
SS, DC 2017-10-19
13:45
Kochi Kochi City Culture-plaza CUL-PORT A Direct Update Method for Compressed Data with Top Tree
Suguru Nishimura, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2017-22 DC2017-21
This paper proposes a direct update method for a data compressed with top tree. For a given compressed data (top DAG) an... [more] SS2017-22 DC2017-21
pp.7-12
ISEC 2017-05-12
10:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Key-Updatable Searchable Encryption -- Applying Proxy Re-Encryption with Keyword Search --
Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more]
ISEC2017-1
pp.1-6
NLP 2017-05-11
16:00
Okayama Okayama University of Science Multiplicative Update Rules for Nonnegative Matrix Factorization with Regularization Terms
Akihiro Koso, Norikazu Takahashi (Okayama Univ.) NLP2017-13
Nonnegative Matrix Factorization (NMF) is an operation that decomposes a given nonnegative matrix into two nonnegative f... [more] NLP2017-13
pp.63-68
NS, CQ, ICM, NV
(Joint)
2016-11-25
14:20
Yamaguchi Shimonoseki Chember of Commerce and Industry Atutomated Change Planning for Network Device with Model-based Aproach
Manabu Nakanoya, Takayuki Kuroda, Toshio Tonouchi (NEC) ICM2016-36
The configuration management automation tools, such as ansible and puppet, have been applied to network devices as well ... [more] ICM2016-36
pp.67-72
DC, SS 2016-10-27
15:55
Shiga Hikone Kinro-Fukushi Kaikan Bldg. A Direct Update Method for XML Documents Including Data Values Compressed by Tree Grammars
Ryunosuke Takayama, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) SS2016-27 DC2016-29
A tree grammar based compression is known as one of the compression methods for XML documents. Also, methods for updatin... [more] SS2016-27 DC2016-29
pp.55-60
CPSY, IPSJ-ARC 2016-10-06
10:00
Chiba Makuhari-messe [Technology Exhibit] Security technologies for non-volatile memory in IoT devices -- Mechanisms for on-chip MCU and off-chip memory system --
Mikio Hashimoto, Yoshiyuki Amanuma, Kentaro Umesawa, Ryuichi Koike, Jun Kanai, Naoko Yamada (Toshiba) CPSY2016-51
Non-volatile memory content modification is serious issues on IoT appliances, since evil effects continue over power cyc... [more] CPSY2016-51
pp.37-42
BioX 2016-08-19
09:00
Miyagi   A Study on Authentication System using the Coordinates and Writing Speeds of Segments Extracted from Sign Strokes on Tablet
Kazuya Tsubota, Keiko Masuda, Seiichirou Hangai (TUS) BioX2016-13
In recently, with the growth of the mobile terminals such as smart phone or tablet, if we can identify the individual wi... [more] BioX2016-13
pp.33-38
BioX 2016-08-19
11:20
Miyagi   A Study on Convenient Key Update for Public Biometrics Infrastructure
Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi (Hitachi) BioX2016-15
Network society and e-government services are advanced, and the importance of personal authentication infrastructure inc... [more] BioX2016-15
pp.45-50
OCS, NS, PN
(Joint)
2016-06-24
08:30
Hokkaido Hokkaido University A method for updating a set of attractors in Yuragi-based virtual network topology control
Koki Sakamoto, Toshihiko Ohba, Shin'ichi Arakawa, Masayuki Murata (Osaka Univ.) PN2016-10
Our research group has proposed a VNT control method based on attractor selection. Since the number of attractors compos... [more] PN2016-10
pp.27-32
ICTSSL 2016-06-15
13:25
Miyagi Tohoku University A consideration on information renewal and power control in epidemic communication
Naoki Kinoshita, Kazuyuki Miyakita, Keisuke Nakano (Niigata Univ.) ICTSSL2016-14
In epidemic communication, information is spread by direct wireless communications between mobile nodes and mobility of ... [more] ICTSSL2016-14
pp.79-84
LOIS 2016-03-03
14:40
Okinawa Central Community Center, Miyakojima-City An Extension of Update Method without Decompression for Compressed Structured Documents and Its Experimental Evaluation
Takeshi Goto, Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) LOIS2015-75
XML is a {it de facto} standard for data storage and exchange, and various compression methods for XML documents have be... [more] LOIS2015-75
pp.69-74
 Results 21 - 40 of 95 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan