Fri, Mar 7 AM Session 1 10:00 - 12:05 |
(1) |
10:00-10:25 |
Reading Characteristics of Two-dimensional Color Code |
Damri Samretwit, Toshihiko Wakahara, Toshitaka Maki (Fukuoka Institue of tech.) |
(2) |
10:25-10:50 |
Association of Japanese and English Papers by Time-serial Metadata Analysis |
Toshitaka Maki, Toshihiko Wakahara (Fukuoka Inst. of Tech.) |
(3) |
10:50-11:15 |
Estimation Method of User's Sense of Expectation for Future Events Focusing on Lifelogs and Vital Reaction |
Yumiko Nagatake, Tomoyo Komatsu, Akihisa Kodate (Tsuda Coll.), Manabu Motegi, Atsushi Fukayama, Michio Shimomura (NTT) |
(4) |
11:15-11:40 |
Latent Preference Estimation Method for Photo Viewers Using Vital Reaction |
Tomoyo Komatsu, Yumiko Nagatake, Akihisa Kodate (Tsuda Coll.), Manabu Motegi, Atsushi Fukayama, Michio Shimomura (NTT) |
(5) |
11:40-12:05 |
Source code navigation using code patterns |
Ken Nakayama (Tsuda College), Eko Sakai (Otani Univ.) |
|
12:05-13:10 |
Lunch Break ( 65 min. ) |
Fri, Mar 7 PM Session 2 13:10 - 15:15 |
(6) |
13:10-13:35 |
A development of a smart-device application for environmental sound collection based on crowdsourcing approach |
Sunao Hara, Akinori Kasai, Masanobu Abe (Okayama Univ.), Noboru Sonehara (NII) |
(7) |
13:35-14:00 |
Generation of Hand-written Font Reflecting User's Indibiduality |
Koji Nakamura, Yasuhiko Higaki (Chiba Univ.) |
(8) |
14:00-14:25 |
On Constructions of Secret Sharing System Realizing Perfect Privacy via a Physical RNG and Integrity via Hash Values |
Miki Hosaka, Yasushi Takami, Tokutaro Yoshida (NTT) |
(9) |
14:25-14:50 |
Responsive Visualization for Data Mining using three.js |
Aya Suzuki, Natsumi Kugawa, Aimi Igarashi, Eri Tsunoda, Ko Fujimura (Otsuma Women's Univ.) |
(10) |
14:50-15:15 |
A Life Cycle Model of "BA" |
Hirohiko Suwa (Univ. of Electro-Comm.), Hitoshi Yamamoto (Rissho Univ.), Yuu Ihara (Okamura) |
|
15:15-15:30 |
Break ( 15 min. ) |
Fri, Mar 7 PM Session 3 15:30 - 16:45 |
(11) |
15:30-15:55 |
Usability Study of Smartphone based FoodLog |
Kiyoharu Aizawa, Kazuki Maeda (Univ. of Tokyo), Makoto Ogawa, Yohei Sato, Mayumi Kasamatsu (foo.log) |
(12) |
15:55-16:20 |
Visualization using food distance and personal food intake based on log data |
Yuji Udagawa, Kiyoharu Aizawa (Univ. of Tokyo), Makoto Ogawa (foo.log) |
(13) |
16:20-16:45 |
Food Image Recognition Using Convolutional Neural Networks for Helping Food Record |
Hokuto Kagaya, Kiyoharu Aizawa (Univ. of Tokyo), Makoto Ogawa (foo.log) |
Sat, Mar 8 AM Session 4 10:00 - 12:05 |
(14) |
10:00-10:25 |
The basic examination of relations with the passage pattern and damage of the Okinawa typhoon |
Katsuyoshi Tanabe, Yoshiyuki Miyazato (Meio Univ.) |
(15) |
10:25-10:50 |
Optimal Exercise Intensity Presentation System using a Smartphone and Heart Rate Monitor |
Tatsuro Narumi, Ikuma Sato, Yuichi Fujino (Future Univ. Hakodate) |
(16) |
10:50-11:15 |
Implementing Environment Context Reasoning with House Log in Home Network |
Tetsuya Masuda, Yuichi Watanabe, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.) |
(17) |
11:15-11:40 |
Considering Appliance Control Service in A Cloud-Enabled Home Network System |
Satoshi Takatori, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.) |
(18) |
11:40-12:05 |
Considering Common Data Model for Indoor Location-aware Services |
Long Niu, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.) |
|
12:05-13:10 |
Lunch Break ( 65 min. ) |
Sat, Mar 8 PM Session 5 13:10 - 15:15 |
(19) |
13:10-13:35 |
Support Method for a Fashion Coordination Service Based on Extraction Method of the Optimum Temperature of Clothes Using Clothes Life Logs |
Takako Yamada, Kazumasa Takami (Soka Univ.) |
(20) |
13:35-14:00 |
A Routing Method Considering the Remaining Battery Power for Multimedia Communications in MANET |
Hiroyuki Todoroki, Kazumasa Takami (Soka Univ.) |
(21) |
14:00-14:25 |
A Distributed Vacancy Management Method using Inter-Vehicle Communication |
Shohei Yamashita, Kazumasa Takami (Soka Univ.) |
(22) |
14:25-14:50 |
Risk Assessment of Information Leak in Twitter Use of Employee
-- Tweet Experience and Consciousness about Business -- |
Yoshiaki Seki, Naoko Chiba (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) |
(23) |
14:50-15:15 |
Risk Assessment of Information Leak in Twitter Use of Employee
-- The Actual Situation and Effectiveness of Company's Measures for Employee Tweets -- |
Naoko Chiba, Yoshiaki Seki (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) |
|
15:15-15:30 |
Break ( 15 min. ) |
Sat, Mar 8 PM Session 6 15:30 - 16:45 |
(24) |
15:30-15:55 |
Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation |
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) |
(25) |
15:55-16:20 |
Security and Usability of "Smilenet" (Information Sharing System for Home Medical Care and Nursing) |
Masayuki Sassa, Jun Takeo, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) |
(26) |
16:20-16:45 |
Linkable System Using Encrypted Personal Identification Information for Clinical Research |
Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) |