Thu, Jul 26 PM 13:00 - 15:50 |
(1) |
13:00-13:40 |
Implementation and Evaluation of Metadata Schema Integration Mechanism Based on Museum Information |
Ryoji Akimoto, Wataru Kameyama (Waseda Univ.) |
(2) |
13:40-14:20 |
A new system to navigate a blog of prosperity by blog visualization |
Katsunori Kawaguchi, Akio Yokoo, Hidenori Okuda (NTT) |
|
14:20-14:30 |
Break ( 10 min. ) |
(3) |
14:30-15:10 |
A Study on Information Visualization through Document Culture |
Kunio Ohno (Polytechnic Univ.) |
(4) |
15:10-15:50 |
Web-GIS based Real Estate Navigation System "Kamo-Navi"
-- Improvement of Data Management Functions and Interfaces -- |
Tomoya Hamada, Satoshi Taoka, Toshimasa Watanabe (Hiroshima Univ.) |
|
15:50-16:00 |
Break ( 10 min. ) |
Thu, Jul 26 PM 16:00 - 17:00 |
(5) |
16:00-17:00 |
|
Fri, Jul 27 AM 09:10 - 12:00 |
(6) |
09:10-09:50 |
An Essay on "Parallel Narratology"
-- from the view point of mutual refarence on hypertext system -- |
Tatsuo Kobayashi (DCRC), Taku Yamaguchi (JSI) |
(7) |
09:50-10:30 |
Word Processing: The Next Generation
-- The Challenge of CrossConcept and Template It! -- |
Taku Yamaguchi (JustSystems) |
|
10:30-10:40 |
Break ( 10 min. ) |
(8) |
10:40-11:20 |
Multibyte character encodings in legacy Tibetan Fonts and Auto Detection |
Toshiya Suzuki (Hiroshima Univ.), Dai Sato (Tohoku Univ. Hosp.) |
(9) |
11:20-12:00 |
A proposal of the guideline for designing mobile phone web pages |
Harumi Saito, Yoko Asano (NTT) |
Fri, Jul 27 PM 13:10 - 16:45 |
(10) |
13:10-13:50 |
Evaluating a method of constructing network community intended for distributed video |
Shozo Azuma, Isao Kondo, Satoshi Shimada, Yukinobu Taniguchi (NTT), Masashi Morimoto (NTT Resonant) |
(11) |
13:50-14:30 |
Problem of policy transmission in End-to-End security |
Michitaka Aramoto (Ad-Sol Nissin) |
(12) |
14:30-15:10 |
A Proposal of server type Multi-homing VPN service architecture |
Shigeaki Tanimoto (NTT) |
|
15:10-15:25 |
Break ( 15 min. ) |
(13) |
15:25-16:05 |
Database Security Technologies for Internal Control |
Yutaka Matsunaga (TED), Michiko Oba (Hitachi) |
(14) |
16:05-16:45 |
A Method for Generating a Post-Encryption Schema for a Schema Validation of Encrypted XML Data |
Kojiro Nakayama, Michiko Oba (Hitachi), Norihisa Komoda (Osaka Univ.) |