Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
TL |
2023-03-11 14:15 |
Online |
Online |
Emergent Inference in Grammatical Machineries
-- Acquisition of Associative Knowledge into Deductive Systems -- Yasunari Harada (Waseda Univ.) TL2022-39 |
The essence of linguistic communication lies in "exchange of meanings" and "meaningful exchanges of messages." In recent... [more] |
TL2022-39 pp.30-35 |
CS |
2022-07-14 11:30 |
Kagoshima |
Yakushima Environmental and Cultural Village Center (Primary: On-site, Secondary: Online) |
Two ray model approximation of radio propagation for drone link Yuga Hashimoto, Satoshi Takahashi (Hiroshima City Univ.) CS2022-16 |
It is considered that the radio wave propagation in the remote control line channel of the unmanned aerial vehicle drone... [more] |
CS2022-16 pp.28-29 |
ICSS, IPSJ-SPT |
2021-03-01 11:30 |
Online |
Online |
Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31 |
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] |
ICSS2020-31 pp.31-36 |
WPT, AP (Joint) |
2021-01-21 13:30 |
Online |
Online |
[Invited Lecture]
[Invited Lecture]Proposal of a simple outdoor to indoor penetration propagation loss model considering horizontal and vertical incident angles in the 0.9/2.3/5.1GHz band Yuta Mizuno, Kentaro Nishimori, Ryotaro Taniguchi, Yuki Igarashi (Niigata Univ.) AP2020-104 |
Recently, the next generation (5-th generation: 5G) mobile communication systems have been actively investigated all ove... [more] |
AP2020-104 pp.7-12 |
ET |
2020-03-07 13:50 |
Kagawa |
National Institute of Technology, Kagawa Collage (Cancelled but technical report was issued) |
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92 |
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] |
ET2019-92 pp.93-98 |
AP, WPT (Joint) |
2020-01-24 15:10 |
Kagawa |
Sunport Hall Takamatsu |
[Invited Lecture]
A comparison of outdoor to indoor penetration path loss characteristics considering horizontal incident angle at 0.9/2.4/5.1GHz band Yuta Mizuno, Kentaro Nishimori, Ryotaro Taniguchi (Niigata Univ.) AP2019-176 |
Recently, the next generation (5-th generation: 5G) mobile communication systems have been actively investigated all ove... [more] |
AP2019-176 pp.141-146 |
MVE |
2019-08-30 16:05 |
Aichi |
|
The Effects of Speaker-following Subtitles on Memory Retention of Video-based Vocabulary Learning Content Keita Kuki, Ryuki Kamikubo, Kenchi Sou (UTokyo), Shogo Fukushima (UTokyo/JST), Takeshi Naemura (UTokyo) MVE2019-20 |
English is widely learned using movie. We believe that the Japanese translation can be recalled through the scenes by en... [more] |
MVE2019-20 pp.79-84 |
SITE, ISEC, LOIS |
2018-11-04 11:00 |
Fukuoka |
|
Development of named entity recognition and polarity analysis function for security incidents. Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS) ISEC2018-74 SITE2018-52 LOIS2018-34 |
The authors focused on analyzing the information related to security incidents from articles on news sites published on ... [more] |
ISEC2018-74 SITE2018-52 LOIS2018-34 pp.57-62 |
SSS |
2018-09-25 14:10 |
Tokyo |
|
Neural network based cause reclassification of incidents at dispensing in pharmacies. Yoshiki Kobari (SIT), Masaomi Kimura (Shibaura Inst. of Tech.) SSS2018-21 |
Incidents in pharmacies are the cases whose causes are common with medical accidents. Most of the root cause of incident... [more] |
SSS2018-21 pp.9-12 |
CQ, MVE, IE, IMQ (Joint) [detail] |
2018-03-08 11:40 |
Okinawa |
Okinawa Industry Support Center |
Incidental Second Language Vocabulary Learning Method with Location-Based Audio Takeo Hamada (UTokyo), Shogo Fukushima (JST/AIST), Ari Hautasaari (UTokyo) IMQ2017-29 IE2017-121 MVE2017-71 |
In this work, we present a learning method that allows beginner-level L2 learners to leverage their dead time, such as w... [more] |
IMQ2017-29 IE2017-121 MVE2017-71 pp.29-33 |
KBSE |
2018-03-02 16:30 |
Okinawa |
|
Analysis of “Hiyari-Hatto” Incidents Reported by Maintenance Service Engineers Nobuhiko Mizusawa (Fujitsu Fsas), Takako Nakatani (OUJ) KBSE2017-63 |
The purpose of the research is to reduce “Hiyari-Hatto” incidents of hardware maintenance service engineers (hereinafter... [more] |
KBSE2017-63 pp.145-150 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-05 10:25 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
Discussion on Operation of Emergency Management Support System for Information sharing and interorganizational collaboration Naoko Kosaka, Akira Koyama, Tsuneko Kura, Yoshihiro Yoshida, Koji Kishi (NTT), Tadayoshi Maruyama, Koichi Takamatsu (Organising Committee) LOIS2017-20 IE2017-41 EMM2017-49 |
In an organization involved in incident response, it is difficult to know the situation of other groups involved in the ... [more] |
LOIS2017-20 IE2017-41 EMM2017-49 pp.57-62 |
ICTSSL |
2017-07-13 14:50 |
Kagawa |
Kagawa Univ. |
Establishment of incident response system and operation of information sharing system for large scale international sports events
-- Efforts of Joint Experiment on incident response in SAPPORO Asian Winter Games -- Akira Koyama, Naoko Kosaka, Tsuneko Kura, Yoshihiro Yoshida, Koji Kishi (NTT), Tadayoshi Maruyama, Koichi Takamatsu (SAWGOC) ICTSSL2017-21 |
Ahead of the 2020Tokyo Olympic Games&Paralympics, various crises such as terrorism, cyber attacks and natural disasters ... [more] |
ICTSSL2017-21 pp.21-26 |
ICTSSL |
2017-07-13 15:40 |
Kagawa |
Kagawa Univ. |
A think of Correspondence Exercise Management at the Multiple Organizations' Emergency Management of Widespread Cyber-attack using information sharing system
-- Application of Comprehensive Emergency Management Support System,"KADAN(R)" -- Yoshihiro Yoshida, Koji Kishi, Tsuneko Kura, Naoko Kosaka (NTT) ICTSSL2017-23 |
In crisis response work in the cyber field of large scale and multiple organizations, efficient information gathering an... [more] |
ICTSSL2017-23 pp.33-38 |
MoNA, LOIS, IPSJ-DC |
2017-07-06 14:30 |
Tokyo |
|
Information sharing and interorganizational collaboration on management of large-scale international sports tournaments and incident response Naoko Kosaka, Akira Koyama, Tsuneko Kura, Koji Kishi (NTT), Tadayoshi Maruyama, Koichi Takamatsu (Organising Committee) MoNA2017-11 LOIS2017-9 |
Various risks are assumed at large international sporting events depending on the environment of the venue. The main tas... [more] |
MoNA2017-11 LOIS2017-9 pp.21-26 |
ICSS, IPSJ-SPT |
2017-03-13 13:25 |
Nagasaki |
University of Nagasaki |
Modeling of Attack Activity for Integrated Analysis of Threat Information Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47 |
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] |
ICSS2016-47 pp.7-12 |
KBSE |
2017-03-04 13:20 |
Ishikawa |
|
Analysis and Consideration on Human Errors Using Text-Mining Techniques Based on Reported Incidents Nobuhiko Mizusawa (Fujitsu Fsas/OUJ), Takeo Tatsumi (OUJ), Yuko Murakami (Tohoku Univ.), Takako Nakatani (OUJ) KBSE2016-48 |
Recently, information systems as part of important social infrastructure used to support human lives are highly complexe... [more] |
KBSE2016-48 pp.55-60 |
LOIS |
2017-03-03 14:55 |
Okinawa |
N.Ohama Memorial Hall |
Study of Comprehensive Emergency Management Support System for Multiple Organizations
-- Application to Emergency Management of Widespread Cyber-attack -- Yoshihiro Yoshida, Koji Kishi, Naoko Kosaka, Tsuneko Kura, Yuji Maeda (NTT) LOIS2016-98 |
In response to the crisis response business in response to natural disasters in local governments and crisis response wo... [more] |
LOIS2016-98 pp.201-204 |
EA |
2010-10-22 10:45 |
Ishikawa |
Kanazawa-city Omi-cho Koryu Plaza |
A study on the incident direction of sound sources with a little influence of pinna shape. Keisi Fukunaga, Haruhide Hokari, Shoji Shimada (Nagaoka Univ. of Tech.), Kiyoshi Sugiyama (Shibaura Inst. of Tech.) EA2010-73 |
Many researchers have used several kinds of earphones to study out–of–head sound localization. Several
stud... [more] |
EA2010-73 pp.91-96 |
IA, ICSS |
2010-06-17 13:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A data screening technique for network log data by frequent sequential pattern mining Hisashi Tsuruta, Takayoshi Shoudai, Jun'ichi Takeuchi (Kyushu Univ./ISIT) IA2010-2 ICSS2010-2 |
To early detect and defend the threats in the Internet caused by botnet,
darknet monitoring is very important to unders... [more] |
IA2010-2 ICSS2010-2 pp.7-12 |