Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
R |
2017-07-28 16:50 |
Hokkaido |
Wakkanai Sun Hotel |
Software Reliability Assessment Based on a Discretized Model by Bayes' Theory Shinji Inoue (Kansai Univ.), Shigeru Yamada (Tottori Univ.) R2017-23 |
We discuss an interval estimation approach for model parameters and software reliability assessment measures of a discre... [more] |
R2017-23 pp.55-60 |
NS, ASN, RCC, RCS, SR (Joint) |
2017-07-21 14:10 |
Hokkaido |
Hokkaido Univ. |
Mixture of Half-duplex and Full-duplex Wireless Network Considering Hidden Terminal Problem Minh Dat Nguyen, Yuto Lim, Yasuo Tan (JAIST) RCC2017-48 NS2017-65 RCS2017-140 SR2017-63 ASN2017-56 |
The full-duplex (FD) wireless is one of the key drivers for realizing the 5G cellular systems, which can initiate the mi... [more] |
RCC2017-48 NS2017-65 RCS2017-140 SR2017-63 ASN2017-56 pp.191-196(RCC), pp.181-186(NS), pp.245-250(RCS), pp.203-208(SR), pp.217-222(ASN) |
NS, ASN, RCC, RCS, SR (Joint) |
2017-07-21 14:35 |
Hokkaido |
Hokkaido Univ. |
Throughput Analysis for String-Topology Full-Duplex Multi-hop Network Chikara Fujimura, Kosuke Sanada, Kazuo Mori (mie Univ) RCC2017-49 NS2017-66 RCS2017-141 SR2017-64 ASN2017-57 |
In wireless full-duplex communication, data-frame transmission and reception are performed simultaneously. Wireless mult... [more] |
RCC2017-49 NS2017-66 RCS2017-141 SR2017-64 ASN2017-57 pp.197-202(RCC), pp.187-192(NS), pp.251-256(RCS), pp.209-214(SR), pp.223-228(ASN) |
NS, ASN, RCC, RCS, SR (Joint) |
2017-07-21 15:00 |
Hokkaido |
Hokkaido Univ. |
Throughput Analysis of CSMA/CA-based MAC with Binary Backoff in Full Duplex WLAN Kosuke Sanada, Kazuo Mori (Mie Univ.) RCC2017-50 NS2017-67 RCS2017-142 SR2017-65 ASN2017-58 |
This paper proposes analytical expressions of carrier sense multiple access with collision avoidance (CSMA/CA) based med... [more] |
RCC2017-50 NS2017-67 RCS2017-142 SR2017-65 ASN2017-58 pp.203-208(RCC), pp.193-198(NS), pp.257-262(RCS), pp.215-220(SR), pp.229-234(ASN) |
IT |
2017-07-14 15:35 |
Chiba |
Chiba University |
Asymptotic Exponential Family of Markov Sources is Equivalent to Exponential Family of Markov Kernels Jun'ichi Takeuchi (Kyushu Univ.), Hiroshi Nagaoka (UEC) IT2017-36 |
For familes of Markov models, we prove that the notion of asymptotic exponential familly is equivalent to the notion of ... [more] |
IT2017-36 pp.115-119 |
PRMU, BioX |
2017-03-21 11:05 |
Aichi |
|
Co-Activity Detection from Multiple Videos Using Foreground Motion and Background Appearance Keisuke Kawamura, Kazuaki Nakamura, Naoko Nitta, Noboru Babaguchi (Osaka Univ.) BioX2016-58 PRMU2016-221 |
Today, there are a lot of videos annotated with text tags on the Internet. Although these tags coarsely represent the co... [more] |
BioX2016-58 PRMU2016-221 pp.149-154 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 09:50 |
Okinawa |
Kumejima Island |
A Note on Analytical Models for CANs Ryohei Satoh, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.), Masayuki Arai (Nihon Univ.), Mamoru Ohara (Tokyo Metropolitan Univ.) CPSY2016-145 DC2016-91 |
In recent years, the controller area networks (CANs), the industry standard of in-vehicle network protocol, have continu... [more] |
CPSY2016-145 DC2016-91 pp.297-301 |
KBSE |
2017-03-03 12:50 |
Ishikawa |
|
KBSE2016-40 |
Self-adaptive systems, which change their behaviors to adapt to their environmental changes, are focused on in recent ye... [more] |
KBSE2016-40 pp.7-12 |
IT |
2016-12-13 14:50 |
Gifu |
Takayama Green Hotel |
[Invited Talk]
Recent topics in Markov-chain Monte Carlo method Koji Hukushima (The Univ. of Tokyo) IT2016-43 |
Monte Carlo (MC) methods have been applied to a large class of problems as a
numerical tool for sampling from a high-d... [more] |
IT2016-43 pp.9-14 |
RCS, RCC, ASN, NS, SR (Joint) |
2016-07-21 13:20 |
Aichi |
|
[Encouragement Talk]
The Effect of Network Topology on the Spread of Self-Evolving Botnets Takanori Kudo (Setsunan Univ.), Tomotaka Kimura (Tokyo Univ. of Science), Yoshiaki Inoue (Osaka Univ.), Hirohisa Aman (Ehime Univ.), Kouji Hirata (Kansai Univ.) NS2016-63 |
As the previous work, we have proposed an epidemic model of new botnets
named self-evolving botnets that autonomously ... [more] |
NS2016-63 pp.69-74 |
OCS, NS, PN (Joint) |
2016-06-23 12:55 |
Hokkaido |
Hokkaido University |
Performance Analysis of Server Operation with Block Hiring Policy in Cloud Services Hiroki Morii, Yutaka Takahashi (Kyoto Univ.) NS2016-32 |
In server-hosting service with cloud computing, servers are hired and released depending on the number of jobs in the sy... [more] |
NS2016-32 pp.23-28 |
DC |
2016-06-20 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On State Assignment of Finite State Machines for Soft Error Resilient Stochastic Computing Motoi Fukuda, Hideyuki Ichihara, Tsuyoshi Iwagaki, Tomoo Inoue (Hiroshima City Univ.) DC2016-11 |
Stochastic computing (SC), which is an approximate computation with probabilities, has attracted at- tention owing to it... [more] |
DC2016-11 pp.7-12 |
VLD, CAS, MSS, SIP |
2016-06-16 10:30 |
Aomori |
Hirosaki Shiritsu Kanko-kan |
On random test pattern generation algorithm considering signal transition activities Yusuke Matsunaga (Kyushu Univ.) CAS2016-4 VLD2016-10 SIP2016-38 MSS2016-4 |
This paper presents a test pattern generation method with considering
signal transition activities using Markov chain... [more] |
CAS2016-4 VLD2016-10 SIP2016-38 MSS2016-4 pp.19-22 |
NLP |
2016-03-25 10:25 |
Kyoto |
Kyoto Sangyo Univ. |
Combinatorial Optimization of Swiss System Tournaments
-- Approximation Algorithms for Set Partitioning Problem -- Sho Osako, Masato Inoue (Waseda Univ.) NLP2015-151 |
In a Swiss system tournament, players are paired in every round and paired against opponents who have the same or simila... [more] |
NLP2015-151 pp.53-56 |
ICSS, IPSJ-SPT |
2016-03-04 10:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Static Detection of ROP Chain Based on Hidden Markov Model Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada (NTT) ICSS2015-59 |
Threats of targeted attacks have been widely observed. The targeted attacks generally utilize malicious documents that c... [more] |
ICSS2015-59 pp.71-76 |
DC, SS |
2015-10-13 15:00 |
Nara |
Todaiji Culture Center (Nara) |
The Dual System Consisting of Two Modules Which Depend on Each Other in State Recovery Phase Aromhack Saysanasongkham, Satoshi Fukumoto (Tokyo Metropolitan Univ.) SS2015-38 DC2015-28 |
This paper discusses the reliability evaluation for 1-out-of-2 system with two-stage repair modes, i.e., hardware restor... [more] |
SS2015-38 DC2015-28 pp.17-21 |
MI |
2015-09-08 14:00 |
Tokyo |
Univ. of Electro-communications |
Feature Selection for Diffuse Lung Disease using MCMC Method Makoto Koiwai (UEC), Maki Isogai (Info Techno Asahi), Hayaru Shouno (UEC), Shoji Kido (Yamaguchi Univ.) MI2015-52 |
(To be available after the conference date) [more] |
MI2015-52 pp.19-24 |
CQ |
2015-09-02 10:10 |
Kyoto |
Kyoto Institute of Technology |
A Study of IEEE 802.11 DCF with Successful Transmission Priority Daisuke Umehara (Kyoto Inst. of Tech.), Hidekazu Murata (Kyoto Univ.), Satoshi Denno (Okayama Univ.) CQ2015-60 |
In this manuscript, we propose a distributed coordination function with successful transmission priority (DCF-STP) based... [more] |
CQ2015-60 pp.119-124 |
NC, IPSJ-BIO, IBISML, IPSJ-MPS (Joint) [detail] |
2015-06-24 11:25 |
Okinawa |
Okinawa Institute of Science and Technology |
Repulsive parallel MCMC algorithm for discovering diverse motifs from large sequence sets. Hisaki Ikebata (SOKENDAI), Ryo Yoshida (ISM) IBISML2015-19 |
It is important to predict TFBSs (transcription factor binding sites) for the elucidation of the mechanism in gene regul... [more] |
IBISML2015-19 pp.143-147 |
DC |
2015-06-16 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Performance Evaluation of Dependability Improvement Methods for Multiple Core Systems based on Markov Models Masashi Imai (Hirosaki Univ.), Tomohiro Yoneda (NII) DC2015-20 |
In embedded systems, multiple core system is a promising architecture not only for performance improvement, but also for... [more] |
DC2015-20 pp.25-30 |