|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ET |
2007-01-26 14:20 |
Tokyo |
|
Implemention of e-Learning system with Project Management functions Daishuke Kawaguchi, Takeo Suzuki, Yorinori Kishimoto, Takeshi Tamura (KIC) |
[more] |
ET2006-91 pp.49-54 |
ET |
2006-06-17 13:30 |
Gifu |
|
Study for the environment of learning community by P2P communication Takeo Suzuki, Daishuke Kawaguchi, Takeshi Tamura, Yorinori Kishimoto (KIC) |
[more] |
ET2006-15 pp.19-24 |
ET |
2006-06-17 14:00 |
Gifu |
|
Development of e-Learning system with Project Management functions Daishuke Kawaguchi, Takeo Suzuki, Yorinori Kishimoto, Takeshi Tamura (KIC) |
[more] |
ET2006-16 pp.25-30 |
ET |
2006-03-04 17:15 |
Kagawa |
|
The penmanship (script learning) support system
-- Education effect of the animation model for pen strokes -- Noriaki Muranaka, Masataka Tokumaru (Kansai Univ.), Shigeru Imanishi (KIC) |
The virtual reality (VR) is one in the intelligence information communications technologies. As the application to the e... [more] |
ET2005-115 pp.17-22 |
CAS |
2006-01-13 11:15 |
Miyazaki |
|
Composition of Sequential Circuit Method Multipliers using Multiple-Valued Naohiro Nomura, Noriaki Muranaka (Kansai Univ.), Shigeru Imanishi (Kobe Institute of Computing/College of Information Technology), Masataka Tokumaru (Kansai Univ.) |
[more] |
CAS2005-90 pp.19-24 |
IT |
2005-09-27 16:40 |
Fukushima |
Aizu Univ. |
Unconditionally secure key agreement using BCH codes Kensuke Hirano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ), Hatsukazu Tanaka (KIC) |
Key agreement schemes using noise on the channel have been studied theoretically.Since these schemes require only an err... [more] |
IT2005-58 pp.43-47 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:50 |
Iwate |
Iwate Prefectural University |
Improvement of the Security against Photon Number Splitting Attacks Yoshifumi Nishida, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Institute of Computing) |
Since it is difficult for practical optical devices to output a single-photon pulse, a weak laser pulse is often substit... [more] |
ISEC2005-56 pp.93-99 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:25 |
Iwate |
Iwate Prefectural University |
A Secure Reversible Watermark Using Predictive Coding Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Inst. of Computing) |
The watermark that restores the exact original image from the watermarked one is called reversible watermark. Firstly, t... [more] |
ISEC2005-66 pp.161-166 |
IT |
2005-05-27 14:30 |
Overseas |
Univ. of Hawaii |
Visual Commitment Using the Trusted Initializer Hidenori Kuwakado (Kobe Univ.), Hatsukazu Tanaka (Kobe Inst. of Comp.) |
We introduce a new type of commitment schemes, called visual commitment schemes.
Since all data are printed as black an... [more] |
IT2005-31 pp.53-58 |
|
|
|
[Return to Top Page]
[Return to IEICE Web Page]
|