Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2021-11-29 13:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Current status, issues, and research trends of user authentication in mobile networks Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46 |
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] |
ICSS2021-46 pp.1-6 |
ICSS, IPSJ-SPT |
2021-03-02 10:25 |
Online |
Online |
Consideration on the mechanism of identifying and tracking Bitcoin users Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2020-44 |
The use of CryptoAssets for money laundering and settlement of fraudulent and illegal transactions due to strong anonymi... [more] |
ICSS2020-44 pp.108-113 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:15 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Attribute-Based Two-Tier Signatures Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more] |
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 pp.1-8 |
MI |
2012-10-29 15:30 |
Yamaguchi |
Yamaguchi Univ. |
The measurement of the oxygen saturation of retinal area using dual-wavelength spectroscopic analysis in capillary Yukiyasu Yoshinaga, Daisuke Nakamura, Tatsuo Okada, Hiroshi Enaida, Tatsuro Ishibashi (Kyushu Univ.) MI2012-61 |
We made the measurement system of the oxygen saturation of retina using dual-wavelength spectroscopic analysis. This sys... [more] |
MI2012-61 pp.67-71 |
RCS |
2012-04-19 14:10 |
Kyoto |
Kyoto Univ. |
A Study on Nonlinear Equalization for Constant Envelop Modulation Receiver Affected by Quantization Error Kohei Kotera, Osamu Muta, Hiroshi Furukawa (Kyushu Univ.) RCS2012-4 |
The authors have proposed constant envelope modulation (CEM) systems with a low resolution ADC.
The proposed CEM system... [more] |
RCS2012-4 pp.19-24 |
ITS, IEE-ITS |
2012-03-15 15:15 |
Tokyo |
|
The Effect of Car-Mounted Visual Stimulus Information System for Pedestrian's Safety Naoki Yamamoto, Akira Utsumi, Masahiro Tada (ATR), Kazunori Shidoji (Kyushu Univ.), Noriyoshi Matsuo (Fuji Heavy Industries) ITS2011-59 |
Car-pedestrian accidents were mainly caused by inattention and lack of risk perception of both drivers and pedestrians. ... [more] |
ITS2011-59 pp.27-32 |
OME, EID |
2009-03-06 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Derivation of Equation for Electrical Conduction in Organic Semiconductor using Device Simulation Reiji Hattori, Sang-Gun Lee (Kyushu Univ.) EID2008-89 OME2008-100 |
The theoretical equations for I-V characteristics in an organic semiconductor was derived according to the internal carr... [more] |
EID2008-89 OME2008-100 pp.33-36 |
SS |
2008-10-16 13:50 |
Yamanashi |
University of Yamanashi, Kofu Campus |
RAS Based Representation of core Assets for Software Product Line Yusuke Hattori (Fukuoka IST), Go Hirakawa, Shuichi Ashihara (NAL), Tsuneo Nakanishi (Kyushu Univ.), Teruaki Kitasuka (Kumamoto Univ.), Shigeaki Tagashira, Akira Fukuda (Kyushu Univ.) SS2008-28 |
Product line, or PL, is a development method eases software development for more kinds and less quantity software by req... [more] |
SS2008-28 pp.7-12 |
MoNA, IPSJ-AVM, ITE-CE, ITE-ME |
2008-07-24 11:00 |
Tokyo |
Shibaura Institute of Technology |
A Cache Consistency Protocol for Ubiquitous Environment Yutaka Kaminishi, Hiroshi Hayakawa, Shigeaki Tagashira, Tsuneo Nakanishi, Akira Fukuda (Kyushu Univ.) MoMuC2008-40 |
In this paper, we consider power-saving techniques for mobile terminals in ubiquitous environment. As a means for realiz... [more] |
MoMuC2008-40 pp.81-86 |
MoNA, IPSJ-AVM, ITE-CE, ITE-ME |
2008-07-24 11:30 |
Tokyo |
Shibaura Institute of Technology |
A Location Correction Technique Applying Geographical Locality in Estimation Errors for wikiLocation Yuhei Kanekiyo, Hiroshi Hayakawa, Shigeaki Tagashira, Tsuneo Nakanishi, Akira Fukuda (Kyushu Univ.) MoMuC2008-41 |
This paper describes an efficient mechanism for correcting
estimation errors inherent in existing WLAN-based localizati... [more] |
MoMuC2008-41 pp.87-92 |
CPSY |
2007-10-26 10:20 |
Kumamoto |
Kumamoto University |
PSI-NSIM: A Parallel Interconnection Network Simulator for Performance Analysis of Large-scale Parallel Systems Hidetomo Shibamura (ISIT), Ryutaro Susukita (Fukuoka IST), Hiroaki Honda, Yuichi Inadomi, Yunqing Yu, Koji Inoue, Mutsumi Aoyagi (Kyushu Univ.) CPSY2007-32 |
This paper presents an interconnection network simulator, PSI-NSIM, toward designing and performance analysis of large-s... [more] |
CPSY2007-32 pp.45-50 |
LQE |
2007-05-25 10:20 |
Toyama |
Kanazawa Univ. |
Improvement and integration of waveguide dye-film lasers
-- Pen-drawing Fabrication and DFB/DBR Laser by Surface-relief Grating -- Yuji Oki (ISEE, Kyushu Univ.), Masamitsu Tanaka (Seiko Electric), Tsuyoshi Obuchi (Toyota), Hirofumi Watanabe (ISEE, Kyushu Univ.), Mitsuo Maeda (Kurume-nct) LQE2007-3 |
File-dye-lasers as waveguided and integrable tunable source were studied. A novel fabrication technique, name Pen-Drawin... [more] |
LQE2007-3 pp.9-12 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 11:35 |
Okayama |
Okayama Univ. |
Visualization Technologies of nicter Incident Analysis System Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE) |
The authors have been working on the R&D activities of nicter, an Internet security incident analysis center investigati... [more] |
ISEC2006-51 pp.83-89 |
NLP |
2006-05-11 13:45 |
Kumamoto |
Kumamoto Univ. |
A Sufficient Condition for 1-D CNNs with Antisymmetric Templates to Perform Connected Component Detection Ken Ishitobi, Norikazu Takahashi (Kyushu Univ.), Tetsuo Nishi (Waseda Univ.) |
We consider conditions for one-dimensional cellular neural networks(1-D CNNs) with the antisymmetric template A=[s,p,-s]... [more] |
NLP2006-4 pp.15-20 |
WBS, IT, ISEC |
2006-03-17 10:20 |
Aichi |
Nagoya Univ. |
Realization of the ID-based encryption scheme based on symmetric-key technique with Device characteristic value Hiromi Fukaya (Pastel), Kouichi Sakurai (CSCE) |
[more] |
IT2005-111 ISEC2005-168 WBS2005-125 pp.97-102 |
ISEC |
2005-12-16 16:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Report on the 4th International Workshop on Digital Watermarking (IWDW 2005) Tatsuya Toyofuku, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-120 pp.61-68 |
NS |
2005-10-21 10:25 |
Niigata |
|
A Consideration of Processing and Interpretation of Contexts for Adapting to Various Environments Tomonari Nakamura (Kyushu Univ.), Kenji Hisazumi (JST), Teruaki Kitasuka, Akira Fukuda (Kyushu Univ.) |
The application used in the ubiquitous computing environment should be context-aware. The context-aware application auto... [more] |
NS2005-107 pp.33-36 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 16:10 |
Iwate |
Iwate Prefectural University |
A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2005-38 SITE2005-36 pp.213-220 |
DE |
2005-07-14 13:00 |
Aomori |
OIRASE |
* Hideaki Kido, Akifumi Makinouchi (Kyushu Univ.) |
[more] |
DE2005-89 pp.139-144 |
DE |
2005-07-15 09:10 |
Aomori |
OIRASE |
* , Akifumi Makinouchi (Kyushu Univ.) |
[more] |
DE2005-112 pp.31-36 |