Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS, CQ (Joint) |
2023-05-19 15:40 |
Kagawa |
Rexxam Hall (Kagawa Kenmin Hall) (Primary: On-site, Secondary: Online) |
A Study on Traffic Aggregation Control for Base Station Power Saving by Optical-Wireless Cooperative Control Karin Umeda, Kenji Miyamoto, Yoshihito Sakai, Tatsuya Shimada, Tomoaki Yoshida (NTT) CS2023-15 |
While 6G requires more stringent performance requirements, efforts to reduce greenhouse gases are underway to carbon neu... [more] |
CS2023-15 pp.41-46 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Access Control Method with Privacy Preservation in NDN Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] |
NS2022-221 pp.310-315 |
IN, NS (Joint) |
2023-03-03 12:00 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Proposal of Applying Blockchain Technology to IoT Data Distribution Method Hayato Kumazaki, Takafumi Taya, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ.) IN2022-110 |
We have proposed Ticket-based Access Control, an access control system with a token called a ticket and Tag ID, which is... [more] |
IN2022-110 pp.265-270 |
RCS, SR, SRW (Joint) |
2023-03-02 09:25 |
Tokyo |
Tokyo Institute of Technology, and Online (Primary: On-site, Secondary: Online) |
A Study on Deep Reinforcement Learning based Transmit Power Control for Uplink NOMA Kaito Sawada, Xiaoyan Wang, Zhou Hang (Ibaraki Univ.), Masahiro Umehira (Nansan Univ.) SRW2022-48 |
Non-Orthogonal Multiple Access (NOMA) technology has attracted much attention in order to improve frequency utilization ... [more] |
SRW2022-48 pp.25-30 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
SeMI, SeMI (Joint) |
2023-01-20 10:30 |
Tokushima |
Naruto grand hotel (Primary: On-site, Secondary: Online) |
Design of the basic architecture of a quasi-narrow band wireless communication system, DR-IoT Susumu Ishihara, Shinka Asano, Ryosuke Umemoto (Shizuoka Univ.), Arata Kato, Shugo Kajita (スペースタイムエンジニアリング), Hiroshi Yamamoto (Ritsumeikan Univ.), Tetsushi Ikegami (Meiji Univ.), Mineo Takai (Osaka Univ.) SeMI2022-97 |
We have proposed DR-IoT (Diversified-Range/Disaster-Response IoT), a VHF-band wireless communication system using small ... [more] |
SeMI2022-97 pp.119-124 |
RCS, NS (Joint) |
2022-12-15 15:00 |
Aichi |
Nagoya Institute of Technology, and Online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Multi-Radio Proactive Control Technologies (Cradio) Kenichi Kawamura, Motoharu Sasaki, Toshirou Nakahira, Naoki Shibuya, Daisuke Murayama, Takatsune Moriyama (NTT) NS2022-137 RCS2022-194 |
In the Beyond 5G/6G era, wireless access will require not only the evolution of individual wireless systems but also the... [more] |
NS2022-137 RCS2022-194 p.47(NS), p.50(RCS) |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
SRW, SeMI, CNR (Joint) |
2022-11-24 14:45 |
Tochigi |
Epinard Nasu (Primary: On-site, Secondary: Online) |
[Short Paper]
Estimation of RF Sensor DCRO Variability for Channel Allocation Acceleration in Backscatter Synchronous Streaming Systems Toma Kamata, Yuki Takazawa (KAIT), Haruhisa Ichikawa (Keio Univ.), Hiroshi Tanaka (KAIT), Jin Mitsugi (Keio Univ.), Yuusuke Kawakita (KAIT) SeMI2022-53 |
The authors are developing an extension of ISO/IEC 18000-63, an international RFID standard protocol, to realize synchro... [more] |
SeMI2022-53 p.19 |
ISEC, SITE, LOIS |
2022-11-18 15:55 |
Online |
Online |
Token-Controlled Token Circulation Ko Fujimura (Otsuma Univ.) ISEC2022-42 SITE2022-46 LOIS2022-26 |
This paper presents a general-purpose token circulating system for circulating various types of rights such as tickets, ... [more] |
ISEC2022-42 SITE2022-46 LOIS2022-26 pp.73-78 |
RCS |
2022-10-27 16:00 |
Ehime |
Ehime University, and online (Primary: On-site, Secondary: Online) |
Toward Improved Energy Fairness for CSMA-based LoRaWAN Chenglong Shao, Osamu Muta (Kyushu Univ.) RCS2022-139 |
This paper proposes a heterogeneous carrier-sense multiple access (CSMA) protocol named LoHEC as the first research atte... [more] |
RCS2022-139 pp.47-52 |
RCS |
2022-10-28 15:30 |
Ehime |
Ehime University, and online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
A Study on WLAN Media Access Control Based on the Model of Synchronization Phenomena of Coupled Oscillators Hiroyasu Obata, Chisa Takano, Kenji Ishida (Hiroshima City Univ.) RCS2022-154 |
The wireless LAN (WLAN) has become one of major access networks for connecting the Internet.
However, the problem of th... [more] |
RCS2022-154 pp.116-117 |
ED, IEE-BMS, IEE-MSS |
2022-08-18 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B3-2 (Primary: On-site, Secondary: Online) |
Neuromorphic computing using photo-induced current properties in ITO/Nb:SrTiO3 junction
-- For reservoir computing application -- Yutaro Yamazaki, Hiroyuki Kai, Kentaro Kinoshita (Tokyo Univ. of Sci.) ED2022-21 |
Recently, needs for edge computing have been increasing, and methods to reduce computational cost while maintaining high... [more] |
ED2022-21 pp.17-20 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 11:10 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
Construction of IoT System Based on Zero Trust Networks Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41 |
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] |
NS2022-41 pp.71-76 |
NS, IN (Joint) |
2022-03-11 10:10 |
Online |
Online |
Threshold Correction of Multi-Job Rejection Rate Optimal Control Method of MEC for Real Environment Application Hajime Yuda, Yoshiaki Kitaguchi, Katsunori Yamaoka (Tokyo Tech) IN2021-39 |
In MEC, there is a possibility that the processing time will increase or the blocking rate of jobs in the edge server wi... [more] |
IN2021-39 pp.49-54 |
IT, ISEC, RCC, WBS |
2022-03-11 17:05 |
Online |
Online |
A Proposal of UWB Channel Access Control Based on Pilot Narrow-Band Radio Sensing Huan-Bang Li, Takeshi Matsumura (NICT) IT2021-138 ISEC2021-103 WBS2021-106 RCC2021-113 |
We propose UWB channel access control based on pilot narrow-band radio sensing. In particular, we propose cooperative sc... [more] |
IT2021-138 ISEC2021-103 WBS2021-106 RCC2021-113 pp.319-324 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2022-03-10 12:05 |
Online |
Online |
Implementation and evaluation of decentralized information flow control system using container-based virtualization Ayato Tachibana, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2021-47 DC2021-81 |
Decentralized Information Flow Control(DIFC) is a method to prevent vulnerabilities more effectively than Mandatory Acce... [more] |
CPSY2021-47 DC2021-81 pp.14-19 |
CQ, IMQ, MVE, IE (Joint) [detail] |
2022-03-11 15:40 |
Online |
Online (Zoom) |
A Media Access Control Based on SP-MAC Considering Range of Synchronization in Wireless Multi-hop Environment Kazuki Nakamura, Hiroyasu Obata, Chisa Takano, Kenji Ishida (Hiroshima City Univ.) CQ2021-132 |
In recent years, the applications for collecting information in the event of an emergency disaster using wireless multih... [more] |
CQ2021-132 pp.170-175 |
EMM |
2022-03-07 16:35 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
Access Control of Vision Transformer models without performance degradation Ryota Iijima, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2021-104 |
In this paper, we propose a novel access control method to protect trained models from unauthorized access. Conventional... [more] |
EMM2021-104 pp.70-75 |
RCS, SR, SRW (Joint) |
2022-03-02 13:55 |
Online |
Online |
A Study on Cloud-Assisted Low-Speed Mobilities Using Post 5G Networks Tomofumi Hoshi, Ryoma Kondo, Yoshiki Okano, Yoshiaki Narusue, Hiroyuki Morikawa (The Univ. of Tokyo) RCS2021-266 |
In order to realize mobility services that contribute to solving social and community issues in Japan, we are investigat... [more] |
RCS2021-266 pp.80-84 |