Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SDM, ED (Workshop) |
2012-06-27 14:30 |
Okinawa |
Okinawa Seinen-kaikan |
A Novel CMOS-Based PNP BJT Structure for Analog Applications Seon-Man Hwang, Yi-Jung Jung, Hyuk-Min Kwon, Jae-Hyung Jang, Ho-Young Kwak, Sung-Kyu Kwon (Chungnam National Univ.), Yi-Sun Chung, Da-Soon Lee, Jong-Kon Lee (Magnachip Semiconductor Inc.), Hi-Deok Lee (Chungnam National Univ.) |
In this paper, a novel pnp bipolar junction transistor (BJT) structure based on CMOS technology is proposed to improve t... [more] |
|
EST |
2012-06-01 11:25 |
Tokyo |
Aoyama Gakuin University(Aoyama Campus) |
WEB Application for Calculating Transmission Line Parameters Tsugumichi Shibata (NTT) EST2012-2 |
A WEB application is presented, which generates transmission line parameters of various coplanar lines from their cross-... [more] |
EST2012-2 pp.7-13 |
EE, IEE-HCA |
2012-05-25 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Experimental Characteristics of An Instantaneous Resonant Current Phasor Controlled High-Frequency Soft Switching Inverter for Induction Heating Chikanori Takami, Tomokazu Mishima (Kobe Univ.), Mutsuo Nakaoka (Kyungnam Univ.) EE2012-3 |
This paper presents the primary experimental evaluation of a newly-proposed instantaneous resonant current phasor contro... [more] |
EE2012-3 pp.35-40 |
SS |
2012-05-11 09:30 |
Ehime |
Ehime Univ. |
Mining API Usage Patterns from Software Repositories by Categorizing Method Invocations Rizky Januar Akbar, Takayuki Omori, Katsuhisa Maruyama (Ritsumeikan Univ.) SS2012-6 |
Developers often have difficulties using APIs. To aid developers in efficiently using APIs, API usage patterns can be ex... [more] |
SS2012-6 pp.31-36 |
MoNA, AN, USN (Joint) |
2012-01-19 13:45 |
Mie |
Todaya (Toba) |
Performance Evaluation of Relay Peer Selection in P2P multicast considering Physical Network Centrality and Peer Distribution Tatsuya Onishi, Hiroaki Morino (Shibaura Inst. Tech.) MoMuC2011-38 |
Recently, P2P multicast tree construction considering physical network topology has been receiving attention. Basic tree... [more] |
MoMuC2011-38 pp.7-11 |
IN, NS (Joint) |
2011-03-03 09:40 |
Okinawa |
Okinawa Convention Center |
A study on service data transfer between ASs without service interruption Naoto Hidaka, Minoru Sakuma, Yoshiharu Koshiro (NTT Corp.) NS2010-176 |
To make Next Generation Network (NGN) prevail, many value-added services are needed. Many of these services will be impl... [more] |
NS2010-176 pp.75-80 |
MW, ED |
2011-01-14 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Stacked Metal-Insulator-Metal Capacitor for future InP-based ICs Applications Takuya Tsutsumi, Suehiro Sugitani, Kazumi Nishimura, Minoru Ida (NTT) ED2010-189 MW2010-149 |
Increasing the capacitance density would be a very effective way of making InP IC chips smaller because capacitors occup... [more] |
ED2010-189 MW2010-149 pp.75-80 |
DC |
2010-10-14 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Evaluation of Automated Testing Tools for Web Application Vulnerability Detection Ryosuke Nakai, Tatsuhiro Tsuchiya, Tohru Kikuno (Osaka Univ) DC2010-21 |
This paper reports an evaluation of some automatic testing tools for web
applications. These testing tools are intende... [more] |
DC2010-21 pp.19-23 |
NS, CS, IN (Joint) |
2010-09-03 15:45 |
Miyagi |
Tohoku University |
A Method of Application Identification from Encrypted Traffic based on Characteristic Changes by Encryption Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2010-64 |
Recent years, there are many studies on identification of application from the monitored traffic in the Internet where v... [more] |
IN2010-64 pp.121-126 |
IN |
2010-07-08 15:50 |
Hokkaido |
Hokkaido Univ. |
Analysis of Characteristic Changes by Encryption for Application Identification of Encrypted Traffic Yohei Okada, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI), Ikuo Oka (Osaka City Univ.) IN2010-30 |
In network management, application identification of traffic is important. However, since encrypted traffic has been inc... [more] |
IN2010-30 pp.43-48 |
LQE |
2010-05-28 11:35 |
Fukui |
Sougou Kenkyuu Tou I, Bunkyo Campus, Univ. of Fukui |
Fast Physical-Random Number Generation Using Frequency Noises of a Semiconductor Laser Shinya Maehara, Kohei Doi, Teturo Ushiki, Takashi Sato, Yasuo Ohdaira, Masashi Ohkawa (Niigata Univ.) LQE2010-6 |
Pseudo-random numbers’ periodicity renders them inappropriate for use in cryptographic applications, but, naturally-gene... [more] |
LQE2010-6 pp.23-26 |
IN, NS, CS (Joint) |
2009-09-10 13:50 |
Miyagi |
Tohoku University (Miyagi) |
Network Application Identification based on Characteristics of Message Transmission Yuji Waizumi, Yuya Tsukabe (Tohoku Univ.), Hiroshi Tsunoda (Tohoku Inst. of Tech.), Yoshiaki Nemoto (Tohoku Univ.) CS2009-35 |
A person-to-person imformation sharing is easily realized by P2P networks that serves are unnecessary
to do so. Leakage... [more] |
CS2009-35 pp.13-18 |
MBE |
2009-06-26 13:55 |
Hokkaido |
Hokkaido Univ. |
Study for availability of automatic patient detection in hospitalization ward by UHF band RFID tag Ryosuke Hosaka (Shonan Inst. of Tech.), Atsue Ishii, Sachiko Shimizu, Yuko Ohno (Osaka Univ.), Akiyo Higashimura (Saito Yukoukai Hospital) MBE2009-14 |
Spread of medical use RFID system has been started. High performance UHF band passive RFID tag is developed. Over 1000... [more] |
MBE2009-14 pp.5-10 |
IN, NS (Joint) |
2009-03-04 15:20 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
A study on AS coordination function of SIP server in NGN Yuichi Ishihara, Tsutomu Ito, Kenichiro Matsumoto, Hidehiro Arimitsu (NTT) NS2008-183 |
NTT is proceeding with implementation of the Next Generation Network (NGN) that is based on the Internet Protocol (IP) a... [more] |
NS2008-183 pp.229-232 |
IN, NS (Joint) |
2009-03-04 11:30 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Application Flow Based Route Setting, Its Metric and Effect on Network Quality Masashi Hashimoto, Tomihiro Utsumi, Ryota Takahashi, Mitsuhiro Ito, Aki Fukuda, Ken-ichi Yukimatsu (Akita Univ.) NS2008-193 |
QoS improvement by introducing a traffic control scheme
that uses application flows as identified by application infor... [more] |
NS2008-193 pp.283-288 |
IN |
2008-12-12 14:30 |
Hiroshima |
Hiroshima City University |
Study on Application Identification Method using Flow Behavior on The Client Side Yasuhiko Kondo, Yasuhiro Nakamura (National Defense Academy of Japan) IN2008-105 |
It emerges that increasing numbers of applications have functions of anonymity such as encrypted communications and vari... [more] |
IN2008-105 pp.115-120 |
EMCJ |
2008-06-20 11:50 |
Hokkaido |
Hokkaido Univ. |
An Estmation of the Optimal Location of Noise Sources Using Near-Field Magnetic Distribution Tomoya Maekawa, Hideki Iwaki, Toru Yamada, Koichi Ogawa (MEI) EMCJ2008-14 |
In portable equipments, noise generated from a digital circuit in the equipments is mixed into a receiver circuit, and t... [more] |
EMCJ2008-14 pp.41-46 |
AP |
2008-01-24 11:20 |
Okinawa |
Tyeruru.(Naha) |
Ray-tracing System for predicting propagation characteristics on World Wide Web Junpei Mizuno, Tetsuro Imai (NTT DoCoMo Inc.) AP2007-136 |
Predicting propagation characteristics by Ray-tracing method needs detail landform data and structure data and high-spec... [more] |
AP2007-136 pp.81-86 |
US |
2007-12-13 16:25 |
Kanagawa |
Tokyo Inst. of Tech. (Suzukake-dai) |
[Invited Talk]
[Invited Lecture] Researchs on High-Power Applications of Ultrasonics
-- High-Power Applications of Ultrasonics Using High Frequency and Complex Vibration -- Jiromaru Tsujino (Kanagawa Univ.) US2007-88 |
The author have engaged in researches on various high power ultrasonic applications from 1960 as a graduation thesis in ... [more] |
US2007-88 pp.35-40 |
SS, KBSE |
2007-04-20 09:40 |
Fukushima |
Univ. of Aizu |
A Method of Detecting Security Flaws in Web Sessions through Model Checking Ikuya Morikawa, Yuji Yamaoka, Yuko Nakayama (Fujitsu Labs.) SS2007-6 KBSE2007-6 |
We propose a method to find security flaws related to sessions in Web applications with model checking. In this method, ... [more] |
SS2007-6 KBSE2007-6 pp.29-34 |