Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, ICM |
2018-01-19 10:50 |
Kumamoto |
Sojo University |
Dissemination of Student Information Based on XML Schema Seikoh Nishita, Yuji Watanabe (Takushoku Univ.) ICM2017-45 LOIS2017-61 |
FOSTER2 is a student information system that aggregate fragments of student information provided by information servers ... [more] |
ICM2017-45 LOIS2017-61 pp.63-68 |
ICM, LOIS |
2017-01-19 13:50 |
Nagasaki |
The Nagasaki Chamber of Commerce & Industry |
Development of a Student Information System for Members of Faculty of Engineering in Takushoku University Seikoh Nishita, Yuji Watanabe (Takushoku Univ.) ICM2016-41 LOIS2016-50 |
Student information in a university is composed of students’ personal data and logs of on/off-campus activities. The stu... [more] |
ICM2016-41 LOIS2016-50 pp.13-18 |
NLC, IPSJ-NL, SP, IPSJ-SLP (Joint) [detail] |
2015-12-03 13:30 |
Aichi |
Nagoya Inst of Tech. |
[Poster Presentation]
Extracting Relationship of Meeting Minutes Generated By Speech Recognition System based on phonemes Motoki Ito, Seikoh Nishita (Takushoku Univ.) NLC2015-34 |
There was a study of a technique to extract relationship of minutes generated by speech recognition system using collect... [more] |
NLC2015-34 pp.1-5 |
NLC, TL [detail] |
2015-06-05 10:25 |
Tokushima |
The University of Tokushima |
Methods for Selecting Keywords and Calculating Similarities of Documents for Extracting Relationship of Meeting Minutes Generated by Speech Recognition. Motoki Ito, Seikoh Nishita (Takushoku Univ.) TL2015-9 NLC2015-9 |
There was a study of a technique to extract relationship of minutes generated by speech recognition system using collect... [more] |
TL2015-9 NLC2015-9 pp.49-54 |
NLC |
2015-02-06 09:55 |
Osaka |
T.O.G |
Extracting Relationship of Meeting Minutes Generated By Speech Recognition System using Collective Entity Resolution. Motoki Ito, Seikoh Nishita (Takushoku Univ.) NLC2014-49 |
Meeting minutes generation systems by speech recognition are used in various situations. In a case where generated texts... [more] |
NLC2014-49 pp.29-33 |
SS, KBSE |
2013-07-25 16:10 |
Hokkaido |
|
Finite State Automata Representing Character Appearance and Disappearance by Character Encoding Scheme Conversion Seikoh Nishita (Takushoku Univ.) SS2013-20 KBSE2013-20 |
Character encoding conversion involves character appearance and disappearance problem: the conver- sion sometimes create... [more] |
SS2013-20 KBSE2013-20 pp.43-48 |
KBSE, SS |
2011-07-30 10:30 |
Hokkaido |
Hokkaido Information University |
An Injection Vulnerability Analysis of Web Applications using String-Taint Analysis Tatsunori Houan, Seikoh Nishita (Takushoku Univ.) SS2011-24 KBSE2011-21 |
[more] |
SS2011-24 KBSE2011-21 pp.69-73 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 13:25 |
Shizuoka |
Shizuoka University |
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ) ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 |
Security holes (vulnerabilities) in web applications causes security
incidents like personal information leakage and vi... [more] |
ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21 pp.123-129 |
SS |
2010-12-14 17:00 |
Gunma |
Ikaho-Onsen Hotel Tenbo |
An Injection Vulnerability Analysis of Web Applications using String-Taint Analysis Tatsunori Houan, Kazuya Onai, Seikoh Nishita (Takushoku Univ.) SS2010-45 |
String analysis is a static analysis of dynamically generated
strings in a target program. This paper presents a method... [more] |
SS2010-45 pp.37-42 |
SS |
2009-12-17 15:20 |
Kagawa |
Kagawa Univ. |
Precise Analysis of Web Application for SQL Injection Vulnerability by an Analysis of Condition Expressions Tomonori Ohashi, Heng Li, Seikoh Nishita (Takushoku Univ.) SS2009-38 |
This paper proposes a method to extend an analysis of SQL Injection Vulnerability in Web application. This extension mak... [more] |
SS2009-38 pp.19-24 |
SS, KBSE |
2006-10-26 13:15 |
Ehime |
Ehime University |
Detecting Web Application Vulnerabilities with Static Analysis Seikoh Nishita (Takushoku Univ.) |
This paper describes a technique for detecting vulnerability of Web applications such as SQL injection and cross-site sc... [more] |
SS2006-40 KBSE2006-16 pp.1-6 |
ET |
2005-03-05 15:50 |
Tokushima |
|
Development of a CPU simulator for study of a logic design using the logic circuit design tool Motohiro Nakaguchi, Seikoh Nishita, Norio Harada (Takushoku Univ.) |
This paper describes a CPU simulator and an exercise class with the simulator and a logic circuit design tool. The goal ... [more] |
ET2004-129 pp.159-164 |