IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2015-03-04
11:15
Okinawa Meio Univiersity A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis
Shuta Morishima, Takuya Tsutsumi, Rui Tanabe, Yusuke Takahashi, Masaaki Kobayashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-81
The integrated malware detection service is a web service that analyzes suspicious files, domains and URLs which are pos... [more] ICSS2014-81
pp.109-114
RCS, NS
(Joint)
2014-12-19
10:50
Mie Iseshi-Kanko-Bunka-Kaikan (Mie) Distributed Transmission Power Control Method Based on Soft FFR for Cellular Downlink
Yusuke Takahashi (Tokyo Univ. of Science), Yasuaki Yuda, Masayuki Hoshino (Panasonic), Kenichi Higuchi (Tokyo Univ. of Science) RCS2014-255
We propose a distributed adaptive transmission power control method based on soft fractional frequency reuse (SFR) for c... [more] RCS2014-255
pp.207-212
RCS 2014-06-18
10:13
Okinawa Okinawa-ken Seinenkaikan (Naha) Investigations on Adaptive Transmission Power Control Based on Soft FFR for Downlink OFDMA
Yusuke Takahashi, Kenichi Higuchi (Tokyo Univ. of Science) RCS2014-65
We propose an adaptive transmission power control method based on soft fractional frequency reuse (SFR) for cellular dow... [more] RCS2014-65
pp.191-196
ICSS 2013-03-25
14:55
Kanagawa Yokohama National University Network-based classification of remote exploit attacks focusing on UUID
Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-65
Remote exploit attacks, which target vulnerabilities of network services, is the class of most common attacks utilized i... [more] ICSS2012-65
pp.49-54
CQ, NS, ICM
(Joint)
2006-11-17
12:50
Tottori Tottori Univ. of Environmental Studies [Encouragement Talk] A Proposal of Deterministic Decay Bloom Filter in P2P Network and its Evaluation
Yusuke Takahashi (Osaka Univ.), Taisuke Izumi (Nagoya Inst. of Tech.), Toshimitsu Masuzawa (Osaka Univ.) NS2006-133
A bloom filter is a representation of data item indexes, which achives small memory requirement by allowing one-sided er... [more] NS2006-133
pp.55-60
NS 2006-05-18
13:30
Kyoto Kyoto University Clock Tower Centenial Hall An Improvement of Bloom-Filter-Based Index Dissemination in P2P Networks
Yusuke Takahashi, Taisuke Izumi, Toshimitsu Masuzawa (Osaka Univ.) NS2006-21
A bloom filter is representation of data item indexes,
which achives small memory requirement
by allowing one-sided er... [more]
NS2006-21
pp.1-4
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan