IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 40  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
PRMU 2016-10-21
10:00
Miyazaki   A Study of Bases Definition in Sparse Representation based Classification for Face Recognition
Hideaki Watanabe (Tohoku Univ.), Yuji Waizumi (Nihon Univ.), Shun Kataoka, Kazuyuki Tanaka (Tohoku Univ.) PRMU2016-98
Recognizing human faces from camera images by computer is challenging problem for application to many things such as cri... [more] PRMU2016-98
pp.43-48
PRMU, BioX 2015-03-19
11:00
Kanagawa   A Study on Efficient Pedestrian Detection by Combining CNN and SVM.
Takuma Saito, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) BioX2014-46 PRMU2014-166
Detecting pedestrian in real time is challenging problem for application to road safety. For high-accuracy and high-spee... [more] BioX2014-46 PRMU2014-166
pp.41-46
PRMU 2013-12-12
10:10
Mie   Character recognition using statistical evaluation of surrounding information
Naoki Uchida, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) PRMU2013-70
Scene text recognition methods often consist of text extraction step and recognition step. Recognition accuracy of this ... [more] PRMU2013-70
pp.11-16
NS, CS, IN
(Joint)
2013-09-13
11:35
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan A Web Application Identification Based on Network Traffic Analysis
Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) CS2013-40
 [more] CS2013-40
pp.61-66
MBE, NC
(Joint)
2012-11-17
13:30
Miyagi Tohoku University Composite likelihood estimation for bipartite Boltzmann machines
Takashi Asari, Muneki Yasuda, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) NC2012-68
The recent development of information technology has enabled us to obtain and to storage huge information data.
Because... [more]
NC2012-68
pp.39-44
IN, NS, CS
(Joint)
2012-09-21
15:55
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan A Study on Web Application Identification based on Communication Characteristics
Shoki Matsuo, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) CS2012-60
Recently, websites which offer various Web Applications, such as Web Mail, Video Sharing, and so on, has been increasing... [more] CS2012-60
pp.61-66
IBISML 2012-03-13
11:00
Tokyo The Institute of Statistical Mathematics A Study on Decision Boundary Stability in Active Learning with Support Vector Machine
Takeru Takahashi, Yuji Waizumi, Kazuo Hashimoto (Tohoku Univ.) IBISML2011-101
Studies on active learning have advanced in order to improve the performance of supervised learning machines
efficientl... [more]
IBISML2011-101
pp.97-101
IBISML 2011-11-09
15:45
Nara Nara Womens Univ. Gaussian FoE model with correlations among color components
Ryuta Murayama, Muneki Yasuda, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) IBISML2011-58
Color images consist of some color components such as RGB, YCbCr. They have been often treated independently in usual im... [more] IBISML2011-58
pp.105-111
MBE, NC
(Joint)
2010-11-18
13:55
Miyagi Tohoku University Network Application Identification using Observation Probability of Payload Length
Yuji Waizumi, Tsuyoshi Sato, Kazuyuki Tanaka (Tohoku Univ.) NC2010-53
 [more] NC2010-53
pp.7-12
IA 2010-08-06
14:25
Tokyo IIJ Kanda Jinbocho Bldg. Network Application Identification using Sequential Transition Patterns of Payload Length
Tsuyoshi Sato, Yuji Waizumi, Kazuyuki Tanaka (Tohoku Univ.) IA2010-23
Recently, increasing of information leakages caused by illegal use of network applications have been reported.To prevent... [more] IA2010-23
pp.41-46
CS, CQ
(Joint)
2010-04-27
09:55
Aomori Oirase Keiryu Hotel An Image Transfer System using Multiple Cellular Phone Line
Yuji Waizumi (Tohoku Univ.), Kouichi Abe (MagickWorX), Kaoru Miyauchi (K&C), Hiroki Nishiyama (Tohoku Univ.), Hiroshi Tsunoda, Hidehisa Nakayama (Tohoku Inst. of Tech.), Takuya Kitamura (Fudoki), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2010-8
 [more] CS2010-8
pp.41-46
IN, NS, CS
(Joint)
2009-09-10
13:50
Miyagi Tohoku University (Miyagi) Network Application Identification based on Characteristics of Message Transmission
Yuji Waizumi, Yuya Tsukabe (Tohoku Univ.), Hiroshi Tsunoda (Tohoku Inst. of Tech.), Yoshiaki Nemoto (Tohoku Univ.) CS2009-35
A person-to-person imformation sharing is easily realized by P2P networks that serves are unnecessary
to do so. Leakage... [more]
CS2009-35
pp.13-18
IN, NS, CS
(Joint)
2009-09-10
14:15
Miyagi Tohoku University (Miyagi) Efficient Log Transfer based on Priority Queuing and Message Aggregation for Logging over Wireless Networks
Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Mashimo, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2009-36
 [more] CS2009-36
pp.19-24
CQ, CS
(Joint)
2009-04-16
10:50
Okinawa Okinawaken Seinen Kaikan Experiments of WLAN based Activity Monitoring System for Real-time Simultaneous Utilization
Hidehisa Nakayama, Hiroshi Tsunoda (Tohoku Inst. of Tech.), Kohei Ohta (Cyber Solutions Inc.), Akihiro Suzuki (I.T.Research Co.,Ltd), Hiroki Nishiyama, Ryoichi Nagatomi, Kazuo Hashimoto, Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto, Nei Kato (Tohoku Univ.) CS2009-1
 [more] CS2009-1
pp.1-6
CS, SIP, CAS 2008-03-06
14:45
Yamaguchi Yamaguchi University Priority-based Adaptive Transmission Control for Efficient Log Transfer
Hiroshi Tsunoda, Takafumi Maruyama, Satoru Abe (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto (Tohoku Univ.) CAS2007-113 SIP2007-188 CS2007-78
Logs generated by operating systems and application programs provide important information to a network administrator. L... [more] CAS2007-113 SIP2007-188 CS2007-78
pp.27-32
CS, SIP, CAS 2008-03-06
15:35
Yamaguchi Yamaguchi University Generating Appropriate Templates for Efficient Application Identification
Akihito Funaki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) CAS2007-115 SIP2007-190 CS2007-80
Recently, damages of information leakage caused by
illegal use of network applications have been reported.
To prevent ... [more]
CAS2007-115 SIP2007-190 CS2007-80
pp.39-44
IN 2007-12-14
13:30
Hiroshima Hiroshima City University A Multi-stage Worm Detection System by Flow-wise and Packet-wise Analysis on the Similarity of Payloads
Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-114
Internet worms are one of the most serious threats in the Internet. For accurately detecting newly created worms, we hav... [more] IN2007-114
pp.91-96
IN 2007-12-14
13:55
Hiroshima Hiroshima City University Classifying Network Anomaly Events Using the Occurence Probability of Correlation Coefficients
Hiroaki Meguro, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ) IN2007-115
For taking effective countermeasures against network anomaly events,the classification of detected anomaly events is req... [more] IN2007-115
pp.97-102
NS, ICM, CQ
(Joint)
2007-11-15
16:25
Fukuoka Institute of System LSI Design Industry, Fukuoka [Encouragement Talk] An evaluation of transition pattern of payload legnth for network application identification
Shinnosuke Yagi, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto (Tohoku Univ.) TM2007-34
Recently, increasing of information leakages caused by illegal use of network applications have been reported. To preven... [more] TM2007-34
pp.1-6
NS, CS, IN
(Joint)
2007-09-21
13:20
Miyagi Tohoku University Detector Selection Method for Detecting Malicious Nodes in Wireless Sensor Networks
Hiroshi Tsunoda (Tohoku Univ.), Ake Olbert, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2007-18
 [more] CS2007-18
pp.9-14
 Results 1 - 20 of 40  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan