IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 61 - 80 of 91 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SITE, IPSJ-EIP 2016-06-02
13:30
Kanagawa Institute of Information Security A detection method of man-in-the-middle attack based on the variance of the RTT
Hayato Sato, Sumiko Miyata, Norio Kashima (SIT) SITE2016-1
A man-in-the-middle (MITM) attack is one of the threats to information security.
In order to detect the MITM attack, a ... [more]
SITE2016-1
pp.23-28
IA, IPSJ-IOT, SITE [detail] 2015-03-06
13:30
Fukushima   Development of the folk implements database using the relational model and thesaurus for the digital archive
Toshihide Hanyu, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo NetSI), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-77 IA2014-109
In recent years, digitization of museum material information has been promoted. Some museums provide digital material in... [more] SITE2014-77 IA2014-109
pp.215-220
IA, IPSJ-IOT, SITE [detail] 2015-03-06
13:55
Fukushima   A search scheme considering the search process using ACO and search history
Shun Koizumi (Kanagawa Univ.), Sumiko Miyata (Kanagawa Univ), Tetsuya Morizumi (ToyoNSI), Hirotsugu Kinoshita (Kanagawa Univ) SITE2014-78 IA2014-110
Recent years, the spread of Internet reveals that we can search information easily.
However, it is difficult to find ac... [more]
SITE2014-78 IA2014-110
pp.221-226
IA, IPSJ-IOT, SITE [detail] 2015-03-06
14:45
Fukushima   Management of information resources using the Swarm Intelligence expressing the attraction and repulsion by similarity
Katsunori Ishida, Shun Koizumi, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (TNSi), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-80 IA2014-112
 [more] SITE2014-80 IA2014-112
pp.233-238
NS, IN
(Joint)
2015-03-03
16:20
Okinawa Okinawa Convention Center Applying Flow Admission Control Based on Equality to this Situation that Flows Have Multi Requested Bandwidth by Using the Threshold
Hiroshi Suka (Tokyo Tech), Sumiko Miyata (Kanagawa Univ), Katsunori Yamaoka (Tokyo Tech) NS2014-279
Flow-admission control based on
equality of heterogeneous traffic (hereafter called conventional CAC) have
been propo... [more]
NS2014-279
pp.601-606
ICM, CQ, NS, NV
(Joint)
2014-11-14
14:35
Kochi Kochi-City-Culture-Plaza CUL-PORT A Threshold Configuration Method of Emergency Trunk Reservation Control Considering Arriving Traffic Intensity
Kazuki Tanabe (Titech), Sumiko Miyata (Kanagawa Univ.), Ken-ichi Baba (Kogakuin Univ.), Katsunori Yamaoka (Titech) CQ2014-85
We propose a threshold configuration and holding time limitation for general telephone calls under trunk reservation con... [more] CQ2014-85
pp.83-88
CS 2014-11-07
08:30
Hokkaido Shiretoko (Hokkaido) Derivation of the mean packet delay using M/G/1 model in LR-PON
Sumiko Miyata (Kanagawa Univ), Ken-ichi Baba (Kogakuin Univ), Katsunori Yamaoka (Tokyo Tech), Hirotsugu Kinoshita (Kanagawa Univ) CS2014-63
Recently, LR-PON (Long Reach-Passive Optical Networks), in which the distance between OLT and ONUs is large, may become ... [more] CS2014-63
pp.55-60
CS, NS, IN
(Joint)
2014-09-12
15:25
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan EPON reservation interval allocation method for decreasing mean delay time
Sumiko Miyata (Kanagawa Univ.), Ken-ichi Baba (Kogakuin Univ.), Katsunori Yamaoka (Tokyo Inst. of Tech.), Hirotsugu Kinoshita (Kanagawa Univ.) CS2014-52
The packet transmission of upstream in EPON can be divided into data interval and reservation interval. In reservation i... [more] CS2014-52
pp.67-72
MoNA, CQ
(Joint)
2014-09-11
11:40
Miyagi   A Threshold Relaxation Method for Accepting More General Telephone Calls in Emergency Situation
Kazuki Tanabe (Titech), Sumiko Miyata (Kanagawa Univ.), Ken-ichi Baba (Kogakuin Univ.), Katsunori Yamaoka (Titech) MoNA2014-33
We propose a threshold relaxation and holding time limitation for general telephone calls under trunk reservation contro... [more] MoNA2014-33
pp.13-18
SITE, IPSJ-EIP, IPSJ-DCC 2014-05-14
15:15
Kanagawa Institute of Information Security Retrieval for the nonwritten-materials using Ontology
Toshihide Hanyu, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration Co., Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2014-4
In order to look for the material, we had to go to the museum directly. In recent years, Digitization
of the material i... [more]
SITE2014-4
pp.53-58
NS, IN
(Joint)
2014-03-07
14:30
Miyazaki Miyazaki Seagia Optimal cost sharing for the mobile tethering and coalition condition
Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) IN2013-204
A tethering function allows phones or tablets to share their Internet connections (bandwidth) with other devices such as... [more] IN2013-204
pp.355-360
IN, IA
(Joint)
2013-12-20
08:55
Hiroshima Hiroshima City Univ. A Study of Limiting Holding Time of General Telephone Calls and Threshold Control under Emergency Condition
Kazuki Tanabe (Titech), Sumiko Miyata (Kanagawa Univ.), Katsunori Yamaoka (Titech) IN2013-109
Under emergency conditions, a threshold control method, which reserves several telephone lines to accommodate emergency ... [more] IN2013-109
pp.59-64
SITE, IPSJ-CE, IPSJ-CLE 2013-12-15
13:25
Okinawa Ryukyu Univ. Dynamic Hybrid System of Honeypot and IDS for Network Security Analysis
Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-55
The development of information technology has come hand-in-hand with various security problems that are becoming increas... [more] SITE2013-55
pp.157-161
SITE, IPSJ-CE, IPSJ-CLE 2013-12-15
13:50
Okinawa Ryukyu Univ. A self-organizing management system for the information resources with the swarm intelligence
Katsunori Ishida, Shun Koizumi, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (TOYO NETWORKS & SYSTEM INTEGRATION), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-56
 [more] SITE2013-56
pp.163-168
SITE, IPSJ-CE, IPSJ-CLE 2013-12-15
14:15
Okinawa Ryukyu Univ. A search scheme with an emphasis on the search process using ACO
Shun Koizumi, Katsunori Ishida, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2013-57
When somebody tries to search some objects on the Internet, some level of results are got easily. But the qualities of r... [more] SITE2013-57
pp.169-173
IA, SITE, IPSJ-IOT [detail] 2013-03-15
13:25
Nara Todaiji Total Cultural Center Game theoretic analysis of the value exchange system
Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-66 IA2012-104
Recently, a local currency has been attracting attention for the purpose of circulating a thing and service in local com... [more] SITE2012-66 IA2012-104
pp.201-206
IA, SITE, IPSJ-IOT [detail] 2013-03-15
15:40
Nara Todaiji Total Cultural Center A watermarking method for the Bezier curve
Takafumi Kudo, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Faculty of Engineering, Toyo Networks and System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-70 IA2012-108
E-book that can read on your computer or mobile device began to come into wide use in the market. The comics have been d... [more] SITE2012-70 IA2012-108
pp.243-248
SITE 2012-12-12
13:00
Osaka   A value exchange system using the local currency value
Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-43
The value exchange systems-using the value of the local currency have been studied. A local currency has been attracting... [more] SITE2012-43
pp.1-6
SITE 2012-12-12
13:30
Osaka   A watermarking method for the free form curve
Takafumi Kudo, Sumiko Miyata (Kanagawa Univ), Tetsuya Morizumi (Faculty of Engineering, Toyo Networks and System Integration C), Hirotsugu Kinoshita (Kanagawa Univ) SITE2012-44
The number of sites on the Internet that are used to post cartoons and illustrations has been increased.
A lot of techn... [more]
SITE2012-44
pp.7-11
SITE 2012-12-12
14:00
Osaka   Trend and ethical problem of the honeypot
Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more]
SITE2012-45
pp.13-18
 Results 61 - 80 of 91 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan