|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ET |
2018-03-03 14:25 |
Kochi |
Kochi University of Technology (Eikokuji Campus) |
Construction of Latent Needs Visualization Agent Based on a Hierarchical Topic Model Yusuke Kometani (Kagawa Univ.), Takashi Satoh (The Univ. of Kitakyushu) ET2017-98 |
In troubleshooting process it is effective to make visible the root cause and its corresponding solution of problems tha... [more] |
ET2017-98 pp.53-58 |
ET |
2018-01-27 14:50 |
Hyogo |
Kobe Univ. |
Development of Latent Needs Visualization Agent for Supporting IT Troubleshooting Process within a University Yusuke Kometani (Kagawa Univ.), Takashi Satoh (The Univ. of Kitakyushu) ET2017-85 |
In troubleshooting process it is effective to make visible the root cause and its corresponding solution of problems tha... [more] |
ET2017-85 pp.31-36 |
ET |
2017-11-11 16:40 |
Tokyo |
Sophia Univ. |
Analysis of Latent Needs for IT Consultation within a University using a Topic Model Yusuke Kometani, Takashi Satoh (The Univ. of Kitakyushu) ET2017-66 |
When trouble comes, we often try to implement a workaround as a temporal solution. This approach is generally useless to... [more] |
ET2017-66 pp.69-74 |
ISEC |
2014-12-19 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Space-Time Encoding Schemes with No False Positives Ryosuke Shiraishi, Takashi Satoh, Masaki Shimoizumi (Univ. Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-71 |
IP traceback is a technique to detect attackers in denial of service (DoS) and distributed DoS (DDoS) attacks. We consid... [more] |
ISEC2014-71 pp.11-15 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:15 |
Hokkaido |
San-Refure Hakodate |
DDoS Attack Path Reconstruction in Space-Time Encoding Schemes Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 |
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] |
ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 pp.315-319 |
ICSS |
2010-03-26 13:55 |
Fukuoka |
The University of Kitakyushu |
An Efficient Key Establishment Scheme through Intermediaries for Sensor Networks Tomonori Kubo, Takashi Satoh (Univ. Kitakyushu) ICSS2009-63 |
Establishing shared keys is a fundamental issue to provide secure communications among nodes in sensor networks. We prop... [more] |
ICSS2009-63 pp.7-11 |
ISEC |
2008-05-16 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12 |
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] |
ISEC2008-12 pp.77-84 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:10 |
Hokkaido |
Future University-Hakodate |
Group Key Based Revocation Schemes with Shorter Message Header Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu) ISEC2007-36 SITE2007-30 |
[more] |
ISEC2007-36 SITE2007-30 pp.139-143 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|