IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 51 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SDM, ED
(Workshop)
2012-06-27
14:30
Okinawa Okinawa Seinen-kaikan A Novel CMOS-Based PNP BJT Structure for Analog Applications
Seon-Man Hwang, Yi-Jung Jung, Hyuk-Min Kwon, Jae-Hyung Jang, Ho-Young Kwak, Sung-Kyu Kwon (Chungnam National Univ.), Yi-Sun Chung, Da-Soon Lee, Jong-Kon Lee (Magnachip Semiconductor Inc.), Hi-Deok Lee (Chungnam National Univ.)
In this paper, a novel pnp bipolar junction transistor (BJT) structure based on CMOS technology is proposed to improve t... [more]
EST 2012-06-01
11:25
Tokyo Aoyama Gakuin University(Aoyama Campus) WEB Application for Calculating Transmission Line Parameters
Tsugumichi Shibata (NTT) EST2012-2
A WEB application is presented, which generates transmission line parameters of various coplanar lines from their cross-... [more] EST2012-2
pp.7-13
EE, IEE-HCA 2012-05-25
14:00
Tokyo Kikai-Shinko-Kaikan Bldg. Experimental Characteristics of An Instantaneous Resonant Current Phasor Controlled High-Frequency Soft Switching Inverter for Induction Heating
Chikanori Takami, Tomokazu Mishima (Kobe Univ.), Mutsuo Nakaoka (Kyungnam Univ.) EE2012-3
This paper presents the primary experimental evaluation of a newly-proposed instantaneous resonant current phasor contro... [more] EE2012-3
pp.35-40
SS 2012-05-11
09:30
Ehime Ehime Univ. Mining API Usage Patterns from Software Repositories by Categorizing Method Invocations
Rizky Januar Akbar, Takayuki Omori, Katsuhisa Maruyama (Ritsumeikan Univ.) SS2012-6
Developers often have difficulties using APIs. To aid developers in efficiently using APIs, API usage patterns can be ex... [more] SS2012-6
pp.31-36
MoNA, AN, USN
(Joint)
2012-01-19
13:45
Mie Todaya (Toba) Performance Evaluation of Relay Peer Selection in P2P multicast considering Physical Network Centrality and Peer Distribution
Tatsuya Onishi, Hiroaki Morino (Shibaura Inst. Tech.) MoMuC2011-38
Recently, P2P multicast tree construction considering physical network topology has been receiving attention. Basic tree... [more] MoMuC2011-38
pp.7-11
IN, NS
(Joint)
2011-03-03
09:40
Okinawa Okinawa Convention Center A study on service data transfer between ASs without service interruption
Naoto Hidaka, Minoru Sakuma, Yoshiharu Koshiro (NTT Corp.) NS2010-176
To make Next Generation Network (NGN) prevail, many value-added services are needed. Many of these services will be impl... [more] NS2010-176
pp.75-80
MW, ED 2011-01-14
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. New Stacked Metal-Insulator-Metal Capacitor for future InP-based ICs Applications
Takuya Tsutsumi, Suehiro Sugitani, Kazumi Nishimura, Minoru Ida (NTT) ED2010-189 MW2010-149
Increasing the capacitance density would be a very effective way of making InP IC chips smaller because capacitors occup... [more] ED2010-189 MW2010-149
pp.75-80
DC 2010-10-14
14:40
Tokyo Kikai-Shinko-Kaikan Bldg Evaluation of Automated Testing Tools for Web Application Vulnerability Detection
Ryosuke Nakai, Tatsuhiro Tsuchiya, Tohru Kikuno (Osaka Univ) DC2010-21
This paper reports an evaluation of some automatic testing tools for web
applications. These testing tools are intende... [more]
DC2010-21
pp.19-23
NS, CS, IN
(Joint)
2010-09-03
15:45
Miyagi Tohoku University A Method of Application Identification from Encrypted Traffic based on Characteristic Changes by Encryption
Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2010-64
Recent years, there are many studies on identification of application from the monitored traffic in the Internet where v... [more] IN2010-64
pp.121-126
IN 2010-07-08
15:50
Hokkaido Hokkaido Univ. Analysis of Characteristic Changes by Encryption for Application Identification of Encrypted Traffic
Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2010-30
In network management, application identification of traffic is important. However, since encrypted traffic has been inc... [more] IN2010-30
pp.43-48
LQE 2010-05-28
11:35
Fukui Sougou Kenkyuu Tou I, Bunkyo Campus, Univ. of Fukui Fast Physical-Random Number Generation Using Frequency Noises of a Semiconductor Laser
Shinya Maehara, Kohei Doi, Teturo Ushiki, Takashi Sato, Yasuo Ohdaira, Masashi Ohkawa (Niigata Univ.) LQE2010-6
Pseudo-random numbers’ periodicity renders them inappropriate for use in cryptographic applications, but, naturally-gene... [more] LQE2010-6
pp.23-26
IN, NS, CS
(Joint)
2009-09-10
13:50
Miyagi Tohoku University (Miyagi) Network Application Identification based on Characteristics of Message Transmission
Yuji Waizumi, Yuya Tsukabe (Tohoku Univ.), Hiroshi Tsunoda (Tohoku Inst. of Tech.), Yoshiaki Nemoto (Tohoku Univ.) CS2009-35
A person-to-person imformation sharing is easily realized by P2P networks that serves are unnecessary
to do so. Leakage... [more]
CS2009-35
pp.13-18
MBE 2009-06-26
13:55
Hokkaido Hokkaido Univ. Study for availability of automatic patient detection in hospitalization ward by UHF band RFID tag
Ryosuke Hosaka (Shonan Inst. of Tech.), Atsue Ishii, Sachiko Shimizu, Yuko Ohno (Osaka Univ.), Akiyo Higashimura (Saito Yukoukai Hospital) MBE2009-14
Spread of medical use RFID system has been started. High performance UHF band passive RFID tag is developed. Over 1000... [more] MBE2009-14
pp.5-10
IN, NS
(Joint)
2009-03-04
15:20
Okinawa Okinawa-Zanpamisaki Royal Hotel A study on AS coordination function of SIP server in NGN
Yuichi Ishihara, Tsutomu Ito, Kenichiro Matsumoto, Hidehiro Arimitsu (NTT) NS2008-183
NTT is proceeding with implementation of the Next Generation Network (NGN) that is based on the Internet Protocol (IP) a... [more] NS2008-183
pp.229-232
IN, NS
(Joint)
2009-03-04
11:30
Okinawa Okinawa-Zanpamisaki Royal Hotel Application Flow Based Route Setting, Its Metric and Effect on Network Quality
Masashi Hashimoto, Tomihiro Utsumi, Ryota Takahashi, Mitsuhiro Ito, Aki Fukuda, Ken-ichi Yukimatsu (Akita Univ.) NS2008-193
QoS improvement by introducing a traffic control scheme
that uses application flows as identified by application infor... [more]
NS2008-193
pp.283-288
IN 2008-12-12
14:30
Hiroshima Hiroshima City University Study on Application Identification Method using Flow Behavior on The Client Side
Yasuhiko Kondo, Yasuhiro Nakamura (National Defense Academy of Japan) IN2008-105
It emerges that increasing numbers of applications have functions of anonymity such as encrypted communications and vari... [more] IN2008-105
pp.115-120
EMCJ 2008-06-20
11:50
Hokkaido Hokkaido Univ. An Estmation of the Optimal Location of Noise Sources Using Near-Field Magnetic Distribution
Tomoya Maekawa, Hideki Iwaki, Toru Yamada, Koichi Ogawa (MEI) EMCJ2008-14
In portable equipments, noise generated from a digital circuit in the equipments is mixed into a receiver circuit, and t... [more] EMCJ2008-14
pp.41-46
AP 2008-01-24
11:20
Okinawa Tyeruru.(Naha) Ray-tracing System for predicting propagation characteristics on World Wide Web
Junpei Mizuno, Tetsuro Imai (NTT DoCoMo Inc.) AP2007-136
Predicting propagation characteristics by Ray-tracing method needs detail landform data and structure data and high-spec... [more] AP2007-136
pp.81-86
US 2007-12-13
16:25
Kanagawa Tokyo Inst. of Tech. (Suzukake-dai) [Invited Talk] [Invited Lecture] Researchs on High-Power Applications of Ultrasonics -- High-Power Applications of Ultrasonics Using High Frequency and Complex Vibration --
Jiromaru Tsujino (Kanagawa Univ.) US2007-88
The author have engaged in researches on various high power ultrasonic applications from 1960 as a graduation thesis in ... [more] US2007-88
pp.35-40
SS, KBSE 2007-04-20
09:40
Fukushima Univ. of Aizu A Method of Detecting Security Flaws in Web Sessions through Model Checking
Ikuya Morikawa, Yuji Yamaoka, Yuko Nakayama (Fujitsu Labs.) SS2007-6 KBSE2007-6
We propose a method to find security flaws related to sessions in Web applications with model checking. In this method, ... [more] SS2007-6 KBSE2007-6
pp.29-34
 Results 21 - 40 of 51 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan