IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 64 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
DE 2015-09-25
15:10
Kanagawa   A Study on Hierarchical Food Classification
Hokuto Kagaya, Shota Horiguchi (The Univ. of Tokyo), Sosuke Amano (foo.log), Kiyoharu Aizawa (The Univ. of Tokyo), Makoto Ogawa (foo.log) DE2015-30
Automatic food recognition or classification is very challenging task. One of the reason is that the number of food item... [more] DE2015-30
pp.59-64
CPSY, DC, IPSJ-ARC
(Joint) [detail]
2015-08-05
17:30
Oita B-Con Plaza (Beppu) A Cache Hierarchy in Kernel and NIC for NOSQL Acceleration
Yuta Tokusashi, Hiroki Matsutani (Keio Univ.) CPSY2015-34
(To be available after the conference date) [more] CPSY2015-34
pp.185-190
RECONF 2015-06-20
09:55
Kyoto Kyoto University A Near-memory Processing Architecture on FPGAs for Data Movement Intensive Applications
Vu Hoang Gia, Tran Thi Hong, Shinya Takamaeda, Yasuhiko Nakashima (NAIST) RECONF2015-15
Memory latency is the most serious design concern in computing centric architectures integrated with cache levels as a d... [more] RECONF2015-15
pp.79-84
EMM, IT 2015-05-22
10:00
Kyoto Kyoto International Community House On the Computational Complexity of Information Flow Problem with Hierarchy Constraint
Yuki Takeda, Yuichi Kaji, Minoru Ito (NAIST) IT2015-11 EMM2015-11
An information flow problem discusses how to distribute information over a complicated network. It is known that the te... [more] IT2015-11 EMM2015-11
pp.57-62
ISEC, IT, WBS 2015-03-02
14:05
Fukuoka The University of Kitakyushu On the Limit of Security Proof for Homomorphic Encryption
Daiki Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2014-67 ISEC2014-80 WBS2014-59
In this paper, we explore on the limitation of security proofs for homomorphic encryptions.
We consider the computation... [more]
IT2014-67 ISEC2014-80 WBS2014-59
pp.33-38
EMM, EA 2014-11-21
11:10
Fukuoka   Hierarchy of Correlation among Different Media of Audiovisual System in Educational Technology and Some Fusion -- A Step for Fusion of Literature and Science and Its Higher Level Progress in e-Learning and Blended Learning --
Yoshifumi Fujita (Onomichi City Univ.), Mitsuo Ohta (Emeritus Prof. of Hiroshima Univ.) EA2014-33 EMM2014-61
In this report, especially based on the standpoints of ”Relationism-First”, some methodological (particularly statistica... [more] EA2014-33 EMM2014-61
pp.31-36
COMP, IPSJ-AL 2014-06-14
09:25
Ehime Matsuyama, Ehime Computational Complexity of Irredundancy of Local Hamiltonian
Ryo Kawasaki, Harumichi Nishimura (Nagoya Univ.) COMP2014-11
Gharibian and Kempe [ICALP2012] introduced a problem on irredundancy of local Hamiltonians, named as QIRR, which asks wh... [more] COMP2014-11
pp.69-76
SRW 2013-10-21
11:35
Kanagawa NICT@YRP A Study on Fundamental Performance of Hierarchical Mesh-Tree Routing (HMTR) Protocol for Efficient Multi-Hop Data Collection
Verotiana H. Rabarijaona, Fumihide Kojima, Hiroshi Harada (NICT) SRW2013-33
This paper proposes a new routing protocol named Hierarchical Mesh-Tree Routing (HMTR) for efficient multi-hop data coll... [more] SRW2013-33
pp.31-36
NS, CS, IN
(Joint)
2013-09-12
10:45
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan Proposal of a Method for Building Virtual OpenFlow Networks on Wide-Area Physical Networks
Hiroaki Yamanaka, Eiji Kawai, Shuji Ishii, Shinji Shimojo (NICT) NS2013-72
Multi-tenancy in software defined networking (SDN) environment (e.g.OpenFlow) enables to accommodate networks customized... [more] NS2013-72
pp.7-12
COMP 2013-09-03
11:20
Tottori   Oracle Pushdown Automata, Nondeterministic Reducibilities, and the Hierarchy over the Family of Context-Free Languages -- (Preliminary Version) --
Tomoyuki Yamakami (Univ. of Fukui) COMP2013-27
We impose various oracle mechanisms on nondeterministic pushdown automata, which naturally induce nondeterministic reduc... [more] COMP2013-27
pp.17-24
PN 2013-08-08
13:50
Hokkaido Hokkaido University Analyzing the evolution of the Internet topology from a hierarchical flow perspective
Yu Nakata, Shin'ichi Arakawa, Masayuki Murata (Osaka Univ.) PN2013-10
The scale of topology in the Internet is becoming larger corresponding to increase of traffic demand. Understanding how ... [more] PN2013-10
pp.13-18
ICD 2013-04-11
13:30
Ibaraki Advanced Industrial Science and Technology (AIST) [Invited Talk] Restructuring of Memory Hierarchy in Computing System with Spintronics-Based Technologies
Tetsuo Endoh (Tohoku Univ.) ICD2013-5
In the memory hierarchy of current computer systems, the trade-off between their performance and power consumption is be... [more] ICD2013-5
pp.21-26
NS, IN
(Joint)
2013-03-08
13:00
Okinawa Okinawa Zanpamisaki Royal Hotel Analyzing the evolution of the Internet topology focusing on containment hierarchy
Yu Nakata, Shin'ichi Arakawa, Masayuki Murata (Osaka Univ.) NS2012-249
The scale of topology in the Internet is becoming larger corresponding to increase of traffic demand. Understanding how ... [more] NS2012-249
pp.489-494
ET 2012-11-17
10:55
Saga   Evaluation of an ipad application for botanical data retrieval by teachers in elementary and junior high schools
Tomoko Kajiyama (Aoyama Gakuin Univ.) ET2012-54
We constructed an ipad application for botanical data retrieval applying our proposed search interface ‘Concentric Ring ... [more] ET2012-54
pp.7-11
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:00
Hokkaido   Evaluation of a Visualization System to Assess the Risk of Websites
Tomoko Kajiyama (Aoyama Gakuin Univ.), Isao Echizen (NII) ISEC2012-16 SITE2012-12 ICSS2012-18 EMM2012-8
A prototype visualization system for helping children learn to assess website features and use them to identify risky we... [more] ISEC2012-16 SITE2012-12 ICSS2012-18 EMM2012-8
pp.51-57
ICD, IPSJ-ARC 2012-01-19
16:20
Tokyo   [Panel Discussion] Challenges and Opportunities for Normally-Off Computing
Hiroshi Nakamura (Univ. of Tokyo) ICD2011-138
Computer systems are utilized almost everywhere in the world and further contribution of these systems to our society is... [more] ICD2011-138
p.35
HCGSYMPO
(2nd)
2011-12-07
- 2011-12-09
Kagawa Sun Port Hall Takamatsu Image authentication by hand shape recognition -- Stress comparison among biometric authentications --
Yoshiaki Nakamura, Kazuhiro Notomi (KAIT), Keiichi Saito (International University of Health and Welfare)
It is Important consideration at biometrics authentication to improve convenience and reduce burden on users. In this ar... [more]
EMM 2011-11-15
13:15
Miyagi   A Visualization Method for Helping Children Assess the Risk of Websites
Tomoko Kajiyama (Aoyama Gakuin Univ.), Isao Echizen (NII) EMM2011-51
Since children cannot live in a safe cyberspace environment forever, setting up filtering or using educational materials... [more] EMM2011-51
pp.65-70
IBISML 2011-11-10
15:45
Nara Nara Womens Univ. Generation of Language among Learning Machines -- Modelling Natural Language Generation --
Seisuke Yanagawa (Optid) IBISML2011-82
First, connect 2 Learning Machines. Send messages from one side to another side and each machines learn the message that... [more] IBISML2011-82
pp.271-276
AI, JSAI-KBS, IPSJ-ICS, JSAI-SAI 2011-03-09
10:00
Nagano Laforet Club Hotel Hakubahappo .....
Yumi Tadano, Hidenori Kawamura, Keiji Suzuki (Hokkaido Univ.) AI2010-63
The analytic hierarchy process (AHP) proposed by T.L.Saaty is a method for decision making that takes into consideration... [more] AI2010-63
pp.27-31
 Results 21 - 40 of 64 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan