Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, IT |
2017-05-22 14:30 |
Yamagata |
Yamagata University(Yonezawa Campus) |
A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) IT2017-4 EMM2017-4 |
Due to the development of electrical system in organizations such as companies and government, the sensitive data such ... [more] |
IT2017-4 EMM2017-4 pp.19-24 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 10:45 |
Yamaguchi |
|
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 |
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and ... [more] |
ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 pp.129-136 |
RCC, ITS, WBS |
2015-12-18 14:50 |
Okinawa |
Okinawa Industry Support Center |
Secure Personal Attribute Message Authentication for Pedestrian-Friendly Intelligent Transport Systems Seiichiro Mizoguchi (KDDI R&D LABS), Daisuke Oshida, Hisataka Takagi (Renesas Electronics), Hideaki Kawabata, Keisuke Takemori, Ayumu Kubota (KDDI R&D LABS) WBS2015-78 ITS2015-50 RCC2015-80 |
In the case of providing safety services to pedestrians in the intelligent transport system (ITS), considering pedestria... [more] |
WBS2015-78 ITS2015-50 RCC2015-80 pp.221-226 |
MoNA, ASN, IPSJ-MBL, IPSJ-UBI (Joint) [detail] |
2015-03-02 15:40 |
Tokyo |
Shibaura Institute of Technology(Toyosu Campus) |
Proposal of a filtering method for pedestrian positioning using their attribute information Jun Ishii, Hisashi Kurasawa, Hiroshi Sato, Motonori Nakamura (NTT), Atsuhiro Takasu, Kenro Aihara, Jun Adachi (NII) ASN2014-167 |
High-accuracy position estimation systems are needed for providing a service customized for each person based on their p... [more] |
ASN2014-167 pp.181-186 |
ISEC |
2014-09-05 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Dual System Encryption via Doubly Selective Security
-- A Generic Framework for Fully-Secure Predicate Encryption -- Nuttapong Attrapadung (AIST) ISEC2014-54 |
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secur... [more] |
ISEC2014-54 p.47 |
RCS, IN (Joint) |
2013-05-17 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Name resolution based on a set of attribute-value pairs in real world information Ryoichi Kawahara, Hiroshi Saito (NTT) IN2013-23 |
It is expected that a huge number of various types
of objects such as sensor-devices, mobile terminals, and
home-app... [more] |
IN2013-23 pp.65-70 |
CNR |
2013-02-18 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Movement supports for humans and robots using time-varying spatial information Yaemi Teramoto, Kishiko Maruyama, Akiko Sato, Hitoshi Tomita (Hitachi) CNR2012-20 |
Based on a spatial master database, which provides indoor spatial information for supporting robot running and operation... [more] |
CNR2012-20 pp.13-16 |
AI |
2013-02-18 09:40 |
Osaka |
|
Surveying Multilingual Attributes extracted from Wikipedia Infoboxes Hu Yinjun, Yoshihiko Hayashi (Osaka Univ.) AI2012-22 |
Wikipedia has attracted many researchers trying to extract structured information from its resources.In this research, w... [more] |
AI2012-22 pp.5-10 |
NLC |
2011-01-28 13:30 |
Ishikawa |
Kanazawa Univ. |
Extraction method for fluctuation of concept attributes based on weblogs Yosuke Horiuchi, Osamu Uchida (Tokai Univ.) NLC2010-40 |
Concept-bases are composed of a collection of concept attributes and applied to information retrieval system recently. T... [more] |
NLC2010-40 pp.55-58 |
SS |
2010-12-14 17:30 |
Gunma |
Ikaho-Onsen Hotel Tenbo |
Secure User-Role Assignment in Cross-Organizational Role-Based Access Control Yuki Tomotani, Yuichi Kaji, Hiroyuki Seki (NAIST) SS2010-46 |
This paper proposes a mechanism for representing user-role assignments
of the role-based access control (RBAC) system. ... [more] |
SS2010-46 pp.43-48 |
HIP, ITE-HI, ITE-CE |
2010-10-15 11:50 |
Miyagi |
RIEC |
[Invited Talk]
The effects of additional stimulus modulation on visually induced self-motion perception Shinji Nakamura (Nihon Fukushi Univ.) HIP2010-56 |
Uniform motion of a visual stimulus which occupies larger area of observer’s visual field can induce illusory perception... [more] |
HIP2010-56 pp.79-84 |
AI |
2010-09-28 15:10 |
Kyoto |
Kyoto Univ. Clock Tower Centennial Hall |
An Implementation of A Public Space Design System based on Multi-Agent Automated Negotiation Mikoto Okumura, Nobuyasu Mizutani, Hiroki Nakagawa, Katsuhide Fujita, Takayuki Ito (NIT) AI2010-27 |
Recently, the discussion among the many people is increasing. In this paper, we propose a collaborative park-design supp... [more] |
AI2010-27 pp.31-36 |
DE |
2010-08-04 11:00 |
Tokyo |
Aoyama Gakuin University |
Utilizing Social Annotations for User's Privacy Policy Management Fan Zhongyi, Mizuho Iwaihara (waseda Univ.) DE2010-16 |
Social networking sites (SNSs) are recently becoming popular and SNSs help users to communicate with their friends. Peop... [more] |
DE2010-16 pp.13-18 |
NS, IN (Joint) |
2010-03-05 13:20 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
Design and Implementation of Address Management Mechanism for Providing Specific Service Addresses Keiichi Sakakima, Shingo Ata (Osaka City Univ.), Hiroshi Kitamura (NEC Corp./Univ. of Electro-Comm.) IN2009-213 |
We have proposed Unified Multiplex Communication Architecture that providing specific service addresses. The architectur... [more] |
IN2009-213 pp.411-416 |
USN, AN, MoNA (Joint) |
2010-01-21 11:10 |
Shizuoka |
Actcity Hamamatsu |
Autonomous Decision Method of Displayed Presence Messsages Miyuki Imada (NTT), Yuw Sato (Concordia), Sunyong Kim (NTT), Yuusuke Kawakita, Etsuko Suzuki, Haruhisa Ichikawa (Univ. of Electro-Comm.) USN2009-48 |
An important technique for communication supports for overcoming the physical distance for users is to put presence info... [more] |
USN2009-48 pp.7-12 |
SR, RCS, USN, AN (Joint) |
2008-10-22 15:15 |
Okinawa |
Okinawa industry support center |
Attribute-based Relay Control for Reduction of Latency in Duty-cycled Wireless Sensor Networks Noriyuki Hashimoto, Hiroaki Taka, Hideyuki Uehara, Takashi Ohira (Toyohashi Univ. of Tech.) USN2008-44 |
When an asynchronous MAC protocol is used in wireless sensor networks, it is hard for a sender node to know whether the ... [more] |
USN2008-44 pp.33-38 |
NS |
2008-05-16 10:30 |
Hokkaido |
Future University-Hakodate |
Information Delivery Methods Using User Attributes and Location Information Shigeru Kaneda, Daizou Ikeda, Hiroshi Kawakami, Noriteru Shinagawa (NTT DoCoMo) NS2008-12 |
Personal communications devices such as cellular phones are widely used. That could make it possible to delivery specifi... [more] |
NS2008-12 pp.67-72 |
KBSE |
2008-03-10 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. B3F-2 |
Reconstructing Attribute Dependencies and its Interpretation in Classification Problems
-- Experimental Results on Modeling Probabilistic Dependencies with Bayesian Network Classifiers -- Ken Ueno, Youichi Kitahara, Paul Topon Kumar, Ryohei Orihara (Toshiba Co.) KBSE2007-59 |
Recently, many researchers have been focusing on Bayesian Network Classifiers (BNC) as classifiers which can consider de... [more] |
KBSE2007-59 pp.31-36 |
NLC |
2008-02-07 13:00 |
Niigata |
Yuzawa Culture Center |
Reputation Retrieval Support System Using Relationship between Review and Score of Each Attribute Takayuki Yamada, Yoshiaki Yasumura, Kuniaki Uehara (Kobe Univ.) NLC2007-87 |
In this paper, we propose a reputation information retrieval support system which displays detailed reputation informati... [more] |
NLC2007-87 pp.1-6 |
IN |
2008-01-18 11:00 |
Aichi |
Nagoya Institute of Technology |
A Construction of Multi-Attribute-Aware Overlay Network by Index Exchange Hiromi Mizo, Shingo Ata, Ikuo Oka (Osaka City Univ.) IN2007-131 |
Recently, Peer-to-Peer (P2P) networks have been receiving increasing attention. Many studies on information have done so... [more] |
IN2007-131 pp.71-76 |