IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS, ICM 2018-01-19
10:50
Kumamoto Sojo University Dissemination of Student Information Based on XML Schema
Seikoh Nishita, Yuji Watanabe (Takushoku Univ.) ICM2017-45 LOIS2017-61
FOSTER2 is a student information system that aggregate fragments of student information provided by information servers ... [more] ICM2017-45 LOIS2017-61
pp.63-68
ICM, LOIS 2017-01-19
13:50
Nagasaki The Nagasaki Chamber of Commerce & Industry Development of a Student Information System for Members of Faculty of Engineering in Takushoku University
Seikoh Nishita, Yuji Watanabe (Takushoku Univ.) ICM2016-41 LOIS2016-50
Student information in a university is composed of students’ personal data and logs of on/off-campus activities. The stu... [more] ICM2016-41 LOIS2016-50
pp.13-18
NLC, IPSJ-NL, SP, IPSJ-SLP
(Joint) [detail]
2015-12-03
13:30
Aichi Nagoya Inst of Tech. [Poster Presentation] Extracting Relationship of Meeting Minutes Generated By Speech Recognition System based on phonemes
Motoki Ito, Seikoh Nishita (Takushoku Univ.) NLC2015-34
There was a study of a technique to extract relationship of minutes generated by speech recognition system using collect... [more] NLC2015-34
pp.1-5
NLC, TL [detail] 2015-06-05
10:25
Tokushima The University of Tokushima Methods for Selecting Keywords and Calculating Similarities of Documents for Extracting Relationship of Meeting Minutes Generated by Speech Recognition.
Motoki Ito, Seikoh Nishita (Takushoku Univ.) TL2015-9 NLC2015-9
There was a study of a technique to extract relationship of minutes generated by speech recognition system using collect... [more] TL2015-9 NLC2015-9
pp.49-54
NLC 2015-02-06
09:55
Osaka T.O.G Extracting Relationship of Meeting Minutes Generated By Speech Recognition System using Collective Entity Resolution.
Motoki Ito, Seikoh Nishita (Takushoku Univ.) NLC2014-49
Meeting minutes generation systems by speech recognition are used in various situations. In a case where generated texts... [more] NLC2014-49
pp.29-33
SS, KBSE 2013-07-25
16:10
Hokkaido   Finite State Automata Representing Character Appearance and Disappearance by Character Encoding Scheme Conversion
Seikoh Nishita (Takushoku Univ.) SS2013-20 KBSE2013-20
Character encoding conversion involves character appearance and disappearance problem: the conver- sion sometimes create... [more] SS2013-20 KBSE2013-20
pp.43-48
KBSE, SS 2011-07-30
10:30
Hokkaido Hokkaido Information University An Injection Vulnerability Analysis of Web Applications using String-Taint Analysis
Tatsunori Houan, Seikoh Nishita (Takushoku Univ.) SS2011-24 KBSE2011-21
 [more] SS2011-24 KBSE2011-21
pp.69-73
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
13:25
Shizuoka Shizuoka University On Usage of Practical Web Application Source Code for Learning Support on Secure Coding
Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ) ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21
Security holes (vulnerabilities) in web applications causes security
incidents like personal information leakage and vi... [more]
ISEC2011-22 SITE2011-19 ICSS2011-27 EMM2011-21
pp.123-129
SS 2010-12-14
17:00
Gunma Ikaho-Onsen Hotel Tenbo An Injection Vulnerability Analysis of Web Applications using String-Taint Analysis
Tatsunori Houan, Kazuya Onai, Seikoh Nishita (Takushoku Univ.) SS2010-45
String analysis is a static analysis of dynamically generated
strings in a target program. This paper presents a method... [more]
SS2010-45
pp.37-42
SS 2009-12-17
15:20
Kagawa Kagawa Univ. Precise Analysis of Web Application for SQL Injection Vulnerability by an Analysis of Condition Expressions
Tomonori Ohashi, Heng Li, Seikoh Nishita (Takushoku Univ.) SS2009-38
This paper proposes a method to extend an analysis of SQL Injection Vulnerability in Web application. This extension mak... [more] SS2009-38
pp.19-24
SS, KBSE 2006-10-26
13:15
Ehime Ehime University Detecting Web Application Vulnerabilities with Static Analysis
Seikoh Nishita (Takushoku Univ.)
This paper describes a technique for detecting vulnerability of Web applications such as SQL injection and cross-site sc... [more] SS2006-40 KBSE2006-16
pp.1-6
ET 2005-03-05
15:50
Tokushima   Development of a CPU simulator for study of a logic design using the logic circuit design tool
Motohiro Nakaguchi, Seikoh Nishita, Norio Harada (Takushoku Univ.)
This paper describes a CPU simulator and an exercise class with the simulator and a logic circuit design tool. The goal ... [more] ET2004-129
pp.159-164
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan