IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 90 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM, LOIS 2016-01-21
16:45
Fukuoka Fukuoka Institute of Technology [Invited Talk] Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications
Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] ICM2015-33 LOIS2015-55
pp.41-46
TL 2015-12-13
12:00
Tokyo Room 303/304/305, Building #8, Waseda University The future possibility of a study of evaluation for the writing in Japanese -- A case of readers' evaluation for email --
Risa Kikuchi (JWU) TL2015-49
It’s an idea of a study of evaluation for e-mail written in Japanese. The purpose of the study is to make a contribution... [more] TL2015-49
pp.53-58
NC, MBE 2015-03-16
14:00
Tokyo Tamagawa University Spam E-Mail Filtering Using Gray SOM
Naoki Miyamoto, Jun Rokui (Shimane Univ.) MBE2014-165 NC2014-116
It has become an important issue that filtering of Ham-Mail or Spam-Mail as the Spam-Mail increase.
The vague Mail call... [more]
MBE2014-165 NC2014-116
pp.271-276
ICSS 2015-03-04
14:05
Okinawa Meio Univiersity Targeted Malware Detection Focused on Dummy Document Display
Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-89
In recent years, targeted attacks have become a bigger threat. Attackers usually try to intrude into targeted organizati... [more] ICSS2014-89
pp.157-161
ICSS, IA 2014-06-05
15:15
Hyogo Takikawa Memorial Hall, Kobe University [Invited Talk] Threat and Countermeasure Against the Targeted Attack
Satoru Torii (Fujitsu Labs.) IA2014-2 ICSS2014-2
A lot of incidents by crafty cyber-attacks such as a targeted attack are made public. To confront such novel cyber-attac... [more] IA2014-2 ICSS2014-2
pp.7-8
IA, IPSJ-IOT, SITE [detail] 2014-02-27
16:25
Ishikawa Hotel Rurikoh An Efficient Judging Method of a Large Amount of E-mails Having the Same Sender and Recipient Addresses
Yoshiharu Tsuzaki, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) SITE2013-62 IA2013-87
With the wide use of e-mail, it has become commonly expected that e-mails are delivered to recipients immediately. It is... [more] SITE2013-62 IA2013-87
pp.61-66
SITE, IPSJ-CE, IPSJ-CLE 2013-12-14
15:40
Okinawa Ryukyu Univ. The Circumstances and The Present Condition Of College Student's E-mail Use -- Case of Students of Economics and Engineering --
Hiroshi Nunokawa (Iwate Pref. Univ.), Hideaki Suzuki (North Asia Univ.), Kiwamu Sato, Naohito Ogasawara (Iwate Pref. Univ.) SITE2013-52
The E-mail has long history and it is widely spread media in the Internet. Therefore, in many cases, the education about... [more] SITE2013-52
pp.79-84
ET 2013-11-22
15:50
Fukushima Aizu University Design of Methods for Extracting the E-mail Discussion Processes Considering Diversity of Response Granularity
Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga (Fukushima Univ.), Youzou Miyadera, Setsuo Yokoyama (Tokyo Gakugei Univ.), Shoichi Nakamura (Fukushima Univ.) ET2013-67
Discussion using e-mail is frequently conducted in intelligent works such as research activity. Although it is important... [more] ET2013-67
pp.53-58
PRMU, IBISML, IPSJ-CVIM [detail] 2013-09-02
11:00
Tottori   Entropy and non-Additivity
Masaru Tanaka (Fukuoka Univ.) PRMU2013-39 IBISML2013-19
Here we give an entropy through a contraction of a renormalized $tau$-log-likelihood with $tau = 1 - s$ and a negative $... [more] PRMU2013-39 IBISML2013-19
pp.39-46
IA, ICSS 2013-06-20
16:50
Niigata Ao-re Nagaoka Operation and Issues of E-Mail System in Okayama University
Nariyoshi Yamai, Kiyohiko Okayama, Takaoki Fujiwara, Yoshihiro Ohsumi (Okayama Univ.) IA2013-8 ICSS2013-8
Okayama University has been operating student e-mail systems using Gmail since April 2009. As for teachers, we have sta... [more] IA2013-8 ICSS2013-8
pp.43-48
SANE, SAT
(Joint)
2013-02-22
11:20
Okinawa Youth Center of Okinawa prefecture Optimization of Monopulse Angle Accuracy Based on Cramer-Rao Lower Bound
Ryuhei Takahashi, Teruyuki Hara (Mitsubishi Electric Corp.) SANE2012-156
Monopulse angle estimation technique is widely used in phased array radar systems. Conventional monopulse angle accuracy... [more] SANE2012-156
pp.43-48
LOIS, IPSJ-CN, IPSJ-SPT 2012-05-17
14:30
Chiba Chiba Institute of Technology A Proposal for Adding a Memo Function to E-mail Systems
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo) LOIS2012-1
As is often the case with the office workers in, for example, the customer relations department, they need to share meta... [more] LOIS2012-1
pp.49-54
SSS 2012-03-16
15:40
Tokyo Meiji Univ. Targeted Email Attack
Takehiko Nakayama (National Police Agency) SSS2011-29
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] SSS2011-29
pp.17-18
MSS 2012-03-08
15:15
Tokyo JAIST Tokyo Satellite Effect of the improvement on classification performance of the filtering system based on Baysian and decision tree methods
Hiroyuki Yamaguchi, Manabu Sugii, Hiroshi Matsuno (Yamaguchi Univ.) MSS2011-76
Recent increase of spam mails is a serious problem in the Internet. bsfilter is one of the most well-used spam filters i... [more] MSS2011-76
pp.23-28
IN 2012-01-26
15:20
Hokkaido Asahikawa-Terminal-Hotel A Survey on Immediacy of Mail Transfers from Mobile-phones
Tohru Asami, Manabu Isomura, Wei Zhu, Yoshihiro Kawahara (Todai) IN2011-125
At the Tohoku Earthquake on 11 March 2011, mobile operators applied originator regurations from 70% to 90% to their pho... [more] IN2011-125
pp.29-34
ET 2011-11-04
14:15
Okinawa   Algorithms for Extracting Email-based Discussions Processes with Diverse Description Styles
Hiroki Nakayama, Ryo Onuma (Fukushima Univ.), Youzou Miyadera, Setsuo Yokoyama (Tokyo Gakugei Univ.), Shoichi Nakamura (Fukushima Univ.) ET2011-62
Discussion using e-mail is frequently conducted in intelligent works such as research activity. Although there have been... [more] ET2011-62
pp.37-42
WIT 2011-05-21
14:30
Niigata Niigata Univ. Development of a Route Guidance System for Blind Pedestrians
George Akiyama, Tetsuya Watanabe, Ken Watanabe, Toshimitsu Yamaguchi (Niigata Univ.), Kazunori Minatani (DNC), Manabi Miyagi (Tsukuba Univ. Tech.), Susumu Oouchi (NISE) WIT2011-18
We developed a route guidance automatic creating system to help blind people know their route by speech. The route guida... [more] WIT2011-18
pp.97-100
IN, NS
(Joint)
2011-03-04
08:50
Okinawa Okinawa Convention Center Encrypted E-mail sharing system with multi-forwarding
Fubuki Kubota, Taiichi Saito (Tokyo Denki Univ) NS2010-243
Proxy Re-Encryption scheme allows a proxy to transform a ciphertext computed with Alice's public key into one that can b... [more] NS2010-243
pp.445-448
ET 2010-11-26
10:55
Tokyo Tokyo Institute of Technology Development of a Support System for Grasping Discussion Processes from E-mails
Hiroki Nakayama (Fukushima Univ.), Youzou Miyadera, Setsuo Yokoyama (Tokyo Gakugei Univ.), Shoichi Nakamura (Fukushima Univ.) ET2010-52
This research aims to develop support methods for grasping discussion transition processes from e-mails. This paper main... [more] ET2010-52
pp.19-24
IA 2010-11-24
15:35
Yamanashi Seisen-Ryo Design of a Certified E-mail System without a Trusted Third Party
Satoshi Ishibashi, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) IA2010-54
These days, as e-mails become more and more important, the demand for certified e-mail is growing. Methods for certified... [more] IA2010-54
pp.19-24
 Results 21 - 40 of 90 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan