IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 48 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2010-11-05
14:55
Hiroshima Hiroshima City University A Document Access Control Model Based on Role and Security Policy
Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) ICSS2010-51
With the rapid development of information technology, electronic document security issues have become increasingly promi... [more] ICSS2010-51
pp.41-46
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
14:40
Aomori Hirosaki University Access policy management architecture for virtual server consolidation systems
Ryuichi Ogawa, Masayuki Nakae, Yoshiharu Maeno, Yoichiro Morita, Fumio Machida, Kumiko Tadano (NEC) ISEC2010-21 SITE2010-17 ICSS2010-27
Recently virtual-machine based server consolidation systems have been rapidly adopted in the market. With these systems ... [more] ISEC2010-21 SITE2010-17 ICSS2010-27
pp.93-100
RCS, AN, MoNA, SR
(Joint)
2010-03-05
17:40
Kanagawa YRP Design and Implementation of a Large-scale and High-density Distributed Spectrum Sensing
Junichi Naganawa, Kosuke Nishimura, Hojun Kim, Shunsuke Saruwatari, Hisashi Onaga, Hiroyuki Morikawa (Univ. of Tokyo.) RCS2009-342
We are currently working on a distributed spectrum sensing system which achieves large-scale and high-density measuremen... [more] RCS2009-342
pp.497-502
R 2009-07-31
13:40
Hokkaido   Optimal Reorganization Time of Structural Database Deterioration
Syouji Nakamura (Kinjo Gakuin University), Toshio Nakagawa (AIT) R2009-24
The response time and the processing time are big problems in the processing time of various online and batch systems. E... [more] R2009-24
pp.11-15
NC, MBE
(Joint)
2009-03-11
16:35
Tokyo Tamagawa Univ. Learning CPG-based energy-efficient biped locomotion with a policy gradient method
Yoshiyuki Azuma, Tomohiro Shibata (Nara Inst. of Sci and Tech.) NC2008-125
Central Pattern Generator (CPG) has been applied to controlling multi-link/joint robots including
bipedal robots becaus... [more]
NC2008-125
pp.129-134
NC, MBE
(Joint)
2009-03-12
14:50
Tokyo Tamagawa Univ. Adaptive Importance Sampling with Automatic Model Selection in Reward Weighted Regression
Hirotaka Hachiya (Tokyo Inst. of Tech.), Jan Peters (Max Planck Inst. of Tech.), Masashi Sugiyama (Tokyo Inst. of Tech.) NC2008-145
Direct policy search is a useful framework of reinforcement learning in particular in continuous systems such as robot c... [more] NC2008-145
pp.249-254
IN, NS
(Joint)
2009-03-04
11:10
Okinawa Okinawa-Zanpamisaki Royal Hotel Performance evaluation of policy-based managed Email systems by using agent-based approach with user characteristics
Keiichi Kawaji, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefectural Univ.) IN2008-171
Email is an essential communications tool, but spam emails have a negative effect on email servers and users. For exampl... [more] IN2008-171
pp.231-236
IN, NS
(Joint)
2009-03-04
09:40
Okinawa Okinawa-Zanpamisaki Royal Hotel A Policy Management Architecture for Service-Oriented Traffic Quality Control in IMS Environments
Nobutaka Matsumoto, Takahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka (KDDI Labs.) NS2008-188
BPEL-driven policy manager designed to coordinate network resources with Web service interfaces for IMS environments is ... [more] NS2008-188
pp.257-262
ICM, CQ, NS
(Joint)
2008-11-13
18:00
Fukushima Nihon University A plan of the method of controlling the NGN route using an indivisual security policy
Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] CQ2008-51
pp.33-38
NS 2008-10-24
10:20
Osaka Kansai University The Implementation of DACS System
Kazuya Odagiri (UEC), Naohiro Ishii (Aichi Inst. of Tech.), Nao Tanoue (Nagoya Univ.), Rihito Yaegashi (Shibaura Inst. of Tech.), Masaharu Tadauchi (TTI) NS2008-84
In the university network, customers with different membership and position connect to the network and use network servi... [more] NS2008-84
pp.93-98
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:20
Fukuoka Fukuoka Institute of System LSI Design Industry A Lattice Model of the General Confidentiality Policies
Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.)
An information flow policy is defined as a set of information flow rules among security-classes. Implementations of such... [more] ISEC2008-41
pp.45-52
NC, NLP 2008-06-27
17:05
Okinawa University of the Ryukyus Self-organized Reinforcement Learning in Nonstationary Environment
Yu Hiei (NAIST), Takeshi Mori, Shin Ishii (Kyoto Univ.) NC2008-30
In real-world problems, the environment surrounding a controlled system is nonstationary, and the optimal control may ch... [more] NC2008-30
pp.97-101
NC, MBE
(Joint)
2008-03-13
14:10
Tokyo Tamagawa Univ Policy gradient method for a policy function with probabilistic parameters
Yutaka Nakamura (Osaka Univ.) NC2007-170
Stochastic policy gradient methods are a type of reinforcement learning method, where the parameter of the policy parame... [more] NC2007-170
pp.343-348
USN, CQ, MoNA
(Joint)
2008-01-25
14:40
Shizuoka Kenshu Kouryu Center, Actcity Hamamatsu (Shizuoka) Internet Access Policy Control Method
Keiko Ohkubo, Morihito Miyagi (Hitachi, Ltd.) USN2007-91
As a network infrastructure becomes substantial, the number of enterprise users who access to an intranet of an enterpri... [more] USN2007-91
pp.139-144
MBE, NC
(Joint)
2007-12-22
15:45
Aichi   Adaptive Importance Sampling with Automatic Model Selection in Value Function Approximation
Hirotaka Hachiya, Takayuki Akiyama, Masashi Sugiyama (Tokyo Inst. of Tech.) NC2007-84
Off-policy reinforcement learning is aimed at efficiently reusing data samples gathered in the past. A common approach i... [more] NC2007-84
pp.75-80
NS, CS, IN
(Joint)
2007-09-21
09:50
Miyagi Tohoku University A Practical Feasibility Study of a Network Control Method for Sharing DDoS-Attack Mitigation Devices
Takeshi Yagi, Takeshi Kuwahara, Junichi Murayama (NTT) IN2007-60
This paper reports results of feasibility study about dynamic traffic control methods to re-route traffic into DDoS-atta... [more] IN2007-60
pp.99-104
ISEC, SITE, IPSJ-CSEC 2007-07-20
17:00
Hokkaido Future University-Hakodate Capability-Based System for Distributed Environment
Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC)
This paper describes the use of operating system for the realization of distributed secure computing infrastructure. In ... [more] ISEC2007-73
pp.185-192
DE 2007-07-02
13:55
Miyagi Akiu hot springs (Sendai) A Role Distribution Method for RBAC and its Implementation to Smart Card Management
Seiichi Kondo (Mitsubishi Electric Corp./Kyoto Univ.), Mizuho Iwaihara, Masatoshi Yoshikawa (Kyoto Univ.), Takashi Komiya, Toshihisa Onuma, Koichi Yamada (Mitsubishi Electric Corp.) DE2007-23
Role-Bases Access Control has emerged as an implementation model for
users and access contol administration in enterpri... [more]
DE2007-23
pp.7-12
NS, IN
(Joint)
2007-03-08
10:30
Okinawa Okinawa Convention Center Network Defence Method Based on Aggregation of Users Security Policy
Katsuhiro Sebayashi, Osamu Akashi, Mitsuru Maruyama (NTT) IN2006-199
A network defense scheme for an Internet Service Provider (ISP) network is presented. In this scheme, the ISP cooperates... [more] IN2006-199
pp.113-118
IN, MoNA
(Joint)
2006-11-16
13:50
Kumamoto   A Study of Location Information Platform realising Self-Information Control
Satoko Natsubori, Masatoshi Kawarasaki (Tsukuba Univ.) IN2006-96
Owing to rapid progress in location resolution technologies using GPS and/or RFID sensors, location-based services and a... [more] IN2006-96
pp.43-48
 Results 21 - 40 of 48 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan