IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 51 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IT, WBS 2011-03-04
10:50
Osaka Osaka University A Method of Fingerprint Authentication Using KSS(I)
Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2010-121 ISEC2010-125 WBS2010-100
We propose a method of fingerprint authentication using KSS(I). KSS(I)
requires to recover user's biometric sample corr... [more]
IT2010-121 ISEC2010-125 WBS2010-100
pp.353-360
SITE 2010-12-09
15:20
Kyoto Campus plaza Kyoto Study on Use and Protection of Mobile Phone-based Lifelog
Hideki Yoshii, Masato Takahashi (SBTM), Hayato Shirai, Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda) SITE2010-46
 [more] SITE2010-46
pp.21-26
NS, ICM, CQ
(Joint)
2010-11-19
11:15
Kyoto Katsura Campus, Kyoto Univ. A Study on the Internet Traffic Classification Method using LPC cepstrum
Hiroaki Maeda, Kentaro Hoshi, Masatsugu Ichino, Naohisa Komatsu (Waseda Univ.), Kei Takeshita, Haruhisa Hasegawa (NTT) CQ2010-60
Network Traffic has increased rapidly by spreading high-speed internet. Moreover, the services provided over the interne... [more] CQ2010-60
pp.67-72
CQ, NS, ICM
(Joint)
2009-11-13
16:40
Ishikawa Kanazawa Institute of Technology (Ishikawa) A study on service classification using time-series traffic data
Takeshi Yamashita, Kentaro Hoshi, Masatsugu Ichino, Naohisa Komatsu (Waseda Univ.), Kei Takeshita, Masayuki Tsujino (NTT Corp.) CQ2009-54
Network Traffic has increased rapidly by spreading high-speed internet.
In order to offer quality of each service, netw... [more]
CQ2009-54
pp.85-90
LOIS, IPSJ-CN 2009-05-21
16:15
Tokyo Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg Application of Biometric Encryption to Electric Near-field Communication System
Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Hideki Kawabe, Yasuhiro Hosoda (NTT) LOIS2009-5
Conventional electric near-field communication systems authenticate users only with card devices. If devices are lossed,... [more] LOIS2009-5
pp.79-84
NS 2009-05-22
11:25
Hiroshima Hiroshima City University (Hiroshima) A Study on the ApplicationClassification Method Using the Flow-Group Information
Kei Takeshita, Takeshi Kurosawa, Masayuki Tsujino, Motoi Iwashita (NTT), Masatsugu Ichino, Naohisa Komatsu (Waseda Univ) NS2009-28
The Internet treats many kinds of applications as a same QoS level. In such a network, there are the cases that users ar... [more] NS2009-28
pp.67-71
NS 2009-05-22
11:50
Hiroshima Hiroshima City University (Hiroshima) A study on service classification of traffic pattern
Takeshi Yamashita, Kentaro Hoshi, Masatsugu Ichino, Naohisa Komatsu (Waseda Univ.), Kei Takeshita, Masayuki Tsujino (NTT) NS2009-29
 [more] NS2009-29
pp.73-78
LOIS, IPSJ-CN 2009-05-22
11:10
Tokyo Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg A Study on analyzing GPS-based Location Data Using Segment Velocity Technique
Hideki Yoshii (Softbank Telecom Corp.), Hayato Shirai, Shunichiro Butsuen, Naohisa Komatsu (Waseda Univ.) LOIS2009-7
 [more] LOIS2009-7
pp.109-112
IN, NS
(Joint)
2009-03-04
14:40
Okinawa Okinawa-Zanpamisaki Royal Hotel Visualization Technology for IT System Operation and Management -- Transaction Visualization using Bayesian Estimation --
Takuro Hiraoka, Motomitsu Adachi, Naohisa Komatsu (Waseda Univ.) NS2008-220
Recently, IT systems become a vital part of the social infrastructure and the importance rises more. On the other hand, ... [more] NS2008-220
pp.433-438
IN, NS
(Joint)
2009-03-04
15:40
Okinawa Okinawa-Zanpamisaki Royal Hotel Network Bandwidth Measurement Technology for IT System Operation
Yasuhiro Hashimoto, Motomitsu Adachi, Ryo Kubota, Naohisa Komatsu (Waseda Univ.) NS2008-223
Recently, IT system supports the base of life as the Internet spreads. Therefore, the achievement of the communication t... [more] NS2008-223
pp.451-456
ICM, LOIS
(Joint)
2009-01-22
15:55
Yamaguchi Kaikyo Messe Shimonoseki A study on developing Trajectory-Maps using P-type Fourier Discriptor
Shunichiro Butsuen (Waseda Univ.), Hideki Yoshii (SoftBank Telecom), Naohisa Komatsu (Waseda Univ.) OIS2008-66
In this paper we propose a new method of analyzing pedestrian traffic data with location accuracy free and route free. P... [more] OIS2008-66
pp.7-12
ICM, CQ, NS
(Joint)
2008-11-13
18:50
Fukushima Nihon University Performance Evaluation for the GI/GI/1 Round-Robin System
Kentaro Hoshi, Sumito Iijima, Yoshitaka Takahashi, Naohisa Komatsu (Waseda Univ.) CQ2008-53
The round-robin (RR) scheduling algorithm is one of the widely used operating system scheduling algorithms for informati... [more] CQ2008-53
pp.45-49
CS, IN, NS
(Joint)
2008-09-11
10:20
Miyagi Tohoku University A Diffusion Process Approximation for the GI/G/1 Round-Robin System
Kentaro Hoshi, Sumito Iijima, Yoshitaka Takahashi, Naohisa Komatsu (Waseda Univ.) IN2008-44
As Kleinrock has pointed out, perhaps the most well-known and widely used scheduling for sharing a CPU or server is the ... [more] IN2008-44
p.7
CS, CQ
(Joint)
2008-04-25
11:20
Aomori Hirosaki University A Traffic Characteristic Analysis for Queuing System with Time-out Scheme -- Approach of Markov --
Sumito Iijima, Kentaro Hoshi, Yoshitaka Takahashi, Naohisa Komatsu (Waseda University) CQ2008-10
We consider a M/M/c/K queuing system with time-out scheme. We try approach of Markov for non-Markov model and present it... [more] CQ2008-10
pp.53-58
CS, CQ
(Joint)
2008-04-25
11:45
Aomori Hirosaki University A Stochastic Approach for Deriving the Parameters an Arising out of a Diffusion Model
Kentaro Hoshi, Yoshitaka Takahashi, Naohisa Komatsu (Wsseda Univ.) CQ2008-11
Diffusion models are frequently and widely applied for performance evaluation of recently developed computer communicati... [more] CQ2008-11
pp.59-64
NS, IN
(Joint)
2008-03-07
09:55
Okinawa Bankoku Shinryokan ANALYZING METHOD OF SERVER STATUS USING PROBING PACKET
Motomitsu Adachi, Toshinori Nishimura, Hidenori Nakazato, Naohisa Komatsu (Waseda Univ.) IN2007-195
Recently QoS and Service Level Agreement are introduced into network service management because
service quality, such a... [more]
IN2007-195
pp.217-222
USN, CQ, MoNA
(Joint)
2008-01-24
17:20
Shizuoka Kenshu Kouryu Center, Actcity Hamamatsu (Shizuoka) [Invited Talk] Biometric Person Authentication -- Issue on Biometric System Security --
Naohisa Komatsu (Waseda Univ.) CQ2007-91 MoMuC2007-72 USN2007-63
Researches and Developments of biometric authentication systems have been carrying on along with standardization activit... [more] CQ2007-91 MoMuC2007-72 USN2007-63
pp.61-66(CQ), pp.43-48(MoMuC), pp.49-54(USN)
IN 2007-12-13
15:25
Hiroshima Hiroshima City University Tele-traffic Analysis of a Single-server Queuing System with Time-out Scheme
Kentaro Hoshi, Sumito Iijima, Yoshitaka Takahashi, Naohisa Komatsu (Waseda Univ) IN2007-103
We consider a renewal input, general service time, single-server, infinite-capacity queuing system with generally distri... [more] IN2007-103
pp.25-30
ISEC, LOIS 2007-11-21
16:40
Hyogo Kobe University A study on implementation of mobile-phone with speaker verification function
Yutaka Hamano, Masatsugu Ichino (Waseda Univ), Yasushi Yamazaki (The University of Kitakyushu), Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda Univ) ISEC2007-96 OIS2007-68
In this paper we propose a speaker verification method based on CELP (Code Excited Linear Prediction) speech coding sche... [more] ISEC2007-96 OIS2007-68
pp.51-56
ISEC, LOIS 2007-11-21
17:05
Hyogo Kobe University Template Protection using Biometric Encryption for CELP Speaker Verification
Shinya Takayama, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (The Univ. of Kitakyushu), Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-97 OIS2007-69
As the application of biometric authentication technique has been advanced, countermeasures against threat, that the tem... [more] ISEC2007-97 OIS2007-69
pp.57-62
 Results 21 - 40 of 51 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan