IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 61 - 80 of 111 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
R 2009-12-18
13:50
Tokyo   An Investigation of Reliability Evaluation of Networks with Layer Structure
Ayako Suzuki (Inst. of Information Security), Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Inst. of Information Security), Masaki Hanada (Tokyo Univ. of Science) R2009-48
There are many networks organized on an exist network by using appropriate network technologies. In these cases, the re... [more] R2009-48
pp.11-16
ISEC 2009-09-25
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Beijing Meeting in May, 2009 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corp/IPA) ISEC2009-45
 [more] ISEC2009-45
pp.35-43
EA 2009-03-27
10:30
Tokyo   Kalman Filter Based Robust Restoration Method with Colored Driving Source
Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci), Hideaki Matsue (Tokyo Univ. of Sci, Suwa.), Shigeo Tsujii (Inst. of Info Security) EA2008-136
This paper proposes a Kalman filter based robust restoration method with colored driving source for degraded images. The... [more] EA2008-136
pp.1-5
EA 2009-03-27
11:00
Tokyo   A Fast Noise Suppression Algorithm using Kalman filter with Colored Driving Source
Nari Tanabe, Yasuhiro Onozuka, Masataka Tabata (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci.), Shigeo Tsujii (Inst. of Information Security.) EA2008-137
 [more] EA2008-137
pp.7-11
WBS, IT, ISEC 2009-03-09
09:50
Hokkaido Hakodate Mirai Univ. Network Usage Control Based on Evaluation of User Security
Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] IT2008-45 ISEC2008-103 WBS2008-58
pp.15-22
WBS, IT, ISEC 2009-03-09
10:15
Hokkaido Hakodate Mirai Univ. Anomaly detection based on the machine learning of the human behavior on home network
Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] IT2008-46 ISEC2008-104 WBS2008-59
pp.23-28
WBS, IT, ISEC 2009-03-10
15:40
Hokkaido Hakodate Mirai Univ. A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement
Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] IT2008-91 ISEC2008-149 WBS2008-104
pp.307-314
ITE-BCT, IE, CS, IPSJ-AVM 2008-12-11
15:15
Aichi Nagoya University Kalman Filter Based Restoration Algorithm for Degraded Image
Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (nstitute of Information Security) CS2008-44 IE2008-108
We propose a Kalman filter based restoration algorithm for degraded images.The algorithm aims to achieve high quality im... [more] CS2008-44 IE2008-108
pp.29-34
EA 2008-11-21
11:15
Oita   Kalman filter based fast noise suppression algorithm
Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (Institute of Information Security) EA2008-94
 [more] EA2008-94
pp.57-62
ICM, CQ, NS
(Joint)
2008-11-13
18:00
Fukushima Nihon University A plan of the method of controlling the NGN route using an indivisual security policy
Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] CQ2008-51
pp.33-38
SITE 2008-10-17
14:20
Kanagawa   About the access rule of the integrated security model based on the intuitionistic logic -- The case of combining a conflict of interest attribute with a hierarchical attribute --
Tetsuya Morizumi (TNSi), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) SITE2008-31
 [more] SITE2008-31
pp.9-14
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry Design Policy of MPKC based on Piece in Hand Concept
Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.) ISEC2008-18 SITE2008-12
Design policy of multivariate public key cryptosystem based on Piece In Hand concept is proposed with focus on quantum c... [more] ISEC2008-18 SITE2008-12
pp.15-22
ISEC, SITE, IPSJ-CSEC 2008-07-24
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA) ISEC2008-20 SITE2008-14
 [more] ISEC2008-20 SITE2008-14
pp.27-36
ISEC, SITE, IPSJ-CSEC 2008-07-24
17:00
Fukuoka Fukuoka Institute of System LSI Design Industry Ontology and Epistemology in Semantic Network for Pluralistic Society -- From the Aspect of Access Control Agent for Social Systems --
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC) ISEC2008-29 SITE2008-23
This paper describes why philosophical consideration takes part in designing information filter agent built into "SNS co... [more] ISEC2008-29 SITE2008-23
pp.97-102
ISEC, SITE, IPSJ-CSEC 2008-07-24
17:25
Fukuoka Fukuoka Institute of System LSI Design Industry Study of method for expressing context
Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS) ISEC2008-30 SITE2008-24
In the contemporary society that overflows with information, it becomes difficult to treat the flood of information.
T... [more]
ISEC2008-30 SITE2008-24
pp.103-108
ISEC, SITE, IPSJ-CSEC 2008-07-25
11:10
Fukuoka Fukuoka Institute of System LSI Design Industry Examination of the issues in designing of electronic signature documentation system
Miyuki Takao, Koichiro Hayashi (IISEC) ISEC2008-38
Electronic signature and Digital timestamp are new technologies which provide high level integrity to digital data. But ... [more] ISEC2008-38
pp.23-30
R 2008-05-30
15:50
Hyogo Kobe Gakuin Univ. An investigation of reliability of systems with latent failures
Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Institute of Information Security) R2008-14
There are many systems with elements of which failures are not discovered immediately after their occurrences. In these... [more] R2008-14
pp.29-34
SP 2008-03-20
15:15
Tokyo Univ. Tokyo [Poster Presentation] Robust noise suppression algorithm using the only Kalman filter theory for white and colored noises
Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Shigeo Tsujii (Inst. of Information Security) SP2007-195
This paper presents a noise suppression algorithm using only the Kalman filter theory with canonical state space models:... [more] SP2007-195
pp.51-56
EA 2008-03-07
16:45
Tokyo NTT Musashino R&D Center Robust noise suppression algorithm using Kalman filter theory with colored driving source
Nari Tanabe (Tokyo Univ. of Science, Suwa), Takeshi Inoue, Katsuyuki Sueyoshi (Chiba Inst. of Tech.), Toshihiro Furukawa (Tokyo Univ. of Science), Hajime Kubota (Chiba Inst. of Tech.), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (Inst. of information Security) EA2007-125
 [more] EA2007-125
pp.79-84
RCS, SAT
(Joint)
2007-12-21
14:40
Oita   Affine Projection Type Blind Multiuser Detection with Desired Symbol Estimation
Nari Tanabe (Tokyo Univ. of Science, Suwa), Keigo Sakamoto (Tokyo Inst. of Tech.), Toshihiro Furukawa (Tokyo Univ. of Science), Shigeo Tsujii (Institute of infor. Security) RCS2007-132
 [more] RCS2007-132
pp.121-126
 Results 61 - 80 of 111 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan