Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
A Method of Fingerprint Authentication Using KSS(I) Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2010-121 ISEC2010-125 WBS2010-100 |
We propose a method of fingerprint authentication using KSS(I). KSS(I)
requires to recover user's biometric sample corr... [more] |
IT2010-121 ISEC2010-125 WBS2010-100 pp.353-360 |
SITE |
2010-12-09 15:20 |
Kyoto |
Campus plaza Kyoto |
Study on Use and Protection of Mobile Phone-based Lifelog Hideki Yoshii, Masato Takahashi (SBTM), Hayato Shirai, Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda) SITE2010-46 |
[more] |
SITE2010-46 pp.21-26 |
NS, ICM, CQ (Joint) |
2010-11-19 11:15 |
Kyoto |
Katsura Campus, Kyoto Univ. |
A Study on the Internet Traffic Classification Method using LPC cepstrum Hiroaki Maeda, Kentaro Hoshi, Masatsugu Ichino, Naohisa Komatsu (Waseda Univ.), Kei Takeshita, Haruhisa Hasegawa (NTT) CQ2010-60 |
Network Traffic has increased rapidly by spreading high-speed internet. Moreover, the services provided over the interne... [more] |
CQ2010-60 pp.67-72 |
CQ, NS, ICM (Joint) |
2009-11-13 16:40 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
A study on service classification using time-series traffic data Takeshi Yamashita, Kentaro Hoshi, Masatsugu Ichino, Naohisa Komatsu (Waseda Univ.), Kei Takeshita, Masayuki Tsujino (NTT Corp.) CQ2009-54 |
Network Traffic has increased rapidly by spreading high-speed internet.
In order to offer quality of each service, netw... [more] |
CQ2009-54 pp.85-90 |
LOIS, IPSJ-CN |
2009-05-21 16:15 |
Tokyo |
Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg |
Application of Biometric Encryption to Electric Near-field Communication System Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Hideki Kawabe, Yasuhiro Hosoda (NTT) LOIS2009-5 |
Conventional electric near-field communication systems authenticate users only with card devices. If devices are lossed,... [more] |
LOIS2009-5 pp.79-84 |
NS |
2009-05-22 11:25 |
Hiroshima |
Hiroshima City University (Hiroshima) |
A Study on the ApplicationClassification Method Using the Flow-Group Information Kei Takeshita, Takeshi Kurosawa, Masayuki Tsujino, Motoi Iwashita (NTT), Masatsugu Ichino, Naohisa Komatsu (Waseda Univ) NS2009-28 |
The Internet treats many kinds of applications as a same QoS level. In such a network, there are the cases that users ar... [more] |
NS2009-28 pp.67-71 |
NS |
2009-05-22 11:50 |
Hiroshima |
Hiroshima City University (Hiroshima) |
A study on service classification of traffic pattern Takeshi Yamashita, Kentaro Hoshi, Masatsugu Ichino, Naohisa Komatsu (Waseda Univ.), Kei Takeshita, Masayuki Tsujino (NTT) NS2009-29 |
[more] |
NS2009-29 pp.73-78 |
LOIS, IPSJ-CN |
2009-05-22 11:10 |
Tokyo |
Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg |
A Study on analyzing GPS-based Location Data Using Segment Velocity Technique Hideki Yoshii (Softbank Telecom Corp.), Hayato Shirai, Shunichiro Butsuen, Naohisa Komatsu (Waseda Univ.) LOIS2009-7 |
[more] |
LOIS2009-7 pp.109-112 |
IN, NS (Joint) |
2009-03-04 14:40 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Visualization Technology for IT System Operation and Management
-- Transaction Visualization using Bayesian Estimation -- Takuro Hiraoka, Motomitsu Adachi, Naohisa Komatsu (Waseda Univ.) NS2008-220 |
Recently, IT systems become a vital part of the social infrastructure and the importance rises more. On the other hand, ... [more] |
NS2008-220 pp.433-438 |
IN, NS (Joint) |
2009-03-04 15:40 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Network Bandwidth Measurement Technology for IT System Operation Yasuhiro Hashimoto, Motomitsu Adachi, Ryo Kubota, Naohisa Komatsu (Waseda Univ.) NS2008-223 |
Recently, IT system supports the base of life as the Internet spreads. Therefore, the achievement of the communication t... [more] |
NS2008-223 pp.451-456 |
ICM, LOIS (Joint) |
2009-01-22 15:55 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
A study on developing Trajectory-Maps using P-type Fourier Discriptor Shunichiro Butsuen (Waseda Univ.), Hideki Yoshii (SoftBank Telecom), Naohisa Komatsu (Waseda Univ.) OIS2008-66 |
In this paper we propose a new method of analyzing pedestrian traffic data with location accuracy free and route free. P... [more] |
OIS2008-66 pp.7-12 |
ICM, CQ, NS (Joint) |
2008-11-13 18:50 |
Fukushima |
Nihon University |
Performance Evaluation for the GI/GI/1 Round-Robin System Kentaro Hoshi, Sumito Iijima, Yoshitaka Takahashi, Naohisa Komatsu (Waseda Univ.) CQ2008-53 |
The round-robin (RR) scheduling algorithm is one of the widely used operating system scheduling algorithms for informati... [more] |
CQ2008-53 pp.45-49 |
CS, IN, NS (Joint) |
2008-09-11 10:20 |
Miyagi |
Tohoku University |
A Diffusion Process Approximation for the GI/G/1 Round-Robin System Kentaro Hoshi, Sumito Iijima, Yoshitaka Takahashi, Naohisa Komatsu (Waseda Univ.) IN2008-44 |
As Kleinrock has pointed out, perhaps the most well-known and widely used scheduling for sharing a CPU or server is the ... [more] |
IN2008-44 p.7 |
CS, CQ (Joint) |
2008-04-25 11:20 |
Aomori |
Hirosaki University |
A Traffic Characteristic Analysis for Queuing System with Time-out Scheme
-- Approach of Markov -- Sumito Iijima, Kentaro Hoshi, Yoshitaka Takahashi, Naohisa Komatsu (Waseda University) CQ2008-10 |
We consider a M/M/c/K queuing system with time-out scheme. We try approach of Markov for non-Markov model and present it... [more] |
CQ2008-10 pp.53-58 |
CS, CQ (Joint) |
2008-04-25 11:45 |
Aomori |
Hirosaki University |
A Stochastic Approach for Deriving the Parameters an Arising out of a Diffusion Model Kentaro Hoshi, Yoshitaka Takahashi, Naohisa Komatsu (Wsseda Univ.) CQ2008-11 |
Diffusion models are frequently and widely applied for performance evaluation of recently developed computer communicati... [more] |
CQ2008-11 pp.59-64 |
NS, IN (Joint) |
2008-03-07 09:55 |
Okinawa |
Bankoku Shinryokan |
ANALYZING METHOD OF SERVER STATUS USING PROBING PACKET Motomitsu Adachi, Toshinori Nishimura, Hidenori Nakazato, Naohisa Komatsu (Waseda Univ.) IN2007-195 |
Recently QoS and Service Level Agreement are introduced into network service management because
service quality, such a... [more] |
IN2007-195 pp.217-222 |
USN, CQ, MoNA (Joint) |
2008-01-24 17:20 |
Shizuoka |
Kenshu Kouryu Center, Actcity Hamamatsu (Shizuoka) |
[Invited Talk]
Biometric Person Authentication
-- Issue on Biometric System Security -- Naohisa Komatsu (Waseda Univ.) CQ2007-91 MoMuC2007-72 USN2007-63 |
Researches and Developments of biometric authentication systems have been carrying on along with standardization activit... [more] |
CQ2007-91 MoMuC2007-72 USN2007-63 pp.61-66(CQ), pp.43-48(MoMuC), pp.49-54(USN) |
IN |
2007-12-13 15:25 |
Hiroshima |
Hiroshima City University |
Tele-traffic Analysis of a Single-server Queuing System with Time-out Scheme Kentaro Hoshi, Sumito Iijima, Yoshitaka Takahashi, Naohisa Komatsu (Waseda Univ) IN2007-103 |
We consider a renewal input, general service time, single-server, infinite-capacity queuing system with generally distri... [more] |
IN2007-103 pp.25-30 |
ISEC, LOIS |
2007-11-21 16:40 |
Hyogo |
Kobe University |
A study on implementation of mobile-phone with speaker verification function Yutaka Hamano, Masatsugu Ichino (Waseda Univ), Yasushi Yamazaki (The University of Kitakyushu), Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda Univ) ISEC2007-96 OIS2007-68 |
In this paper we propose a speaker verification method based on CELP (Code Excited Linear Prediction) speech coding sche... [more] |
ISEC2007-96 OIS2007-68 pp.51-56 |
ISEC, LOIS |
2007-11-21 17:05 |
Hyogo |
Kobe University |
Template Protection using Biometric Encryption for CELP Speaker Verification Shinya Takayama, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (The Univ. of Kitakyushu), Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-97 OIS2007-69 |
As the application of biometric authentication technique has been advanced, countermeasures against threat, that the tem... [more] |
ISEC2007-97 OIS2007-69 pp.57-62 |