IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 19 of 19  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
PRMU 2013-03-14
16:30
Tokyo   Learning Process Visualization of LVQ and Learning Observation at Place where Turning Point Exists
Yoshiaki Kurosawa (Toshiab Solutions) PRMU2012-198
LVQ is one of the basic learning methods in the field of pattern recognition and it can be described by probabilistic de... [more] PRMU2012-198
pp.105-110
TL 2011-06-24
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Detection of Inconsistent/Overlapping Descriptions in Japanese Business Documents
Mikito Kobayashi, Masahisa Shinozaki, Toshiyuki Kano, Yoshimi Saito (Toshiba Solutions Corp.) TL2011-1
A large amount of documents are revised by several authors. They are forced to revise other affected documents to keep c... [more] TL2011-1
pp.1-5
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
14:15
Aomori Hirosaki University An Optimization of AES Decryption Using the Bitslice Technique
Fumihiko Sano (Toshiba Solutions Corporation) ISEC2010-15 SITE2010-11 ICSS2010-21
We implemented a decryption process of AES with new bitslice technique by K\"{a}sper et al. for encryption. In conventio... [more] ISEC2010-15 SITE2010-11 ICSS2010-21
pp.35-39
AI 2010-06-25
10:30
Tokyo   Semantic Relation Extraction from Documents Using Technical Term Extraction
Shinichi Nagano (Toshiba Corp.), Masumi Inaba (Toshiba Solutions Corp.), Takahiro Kawamura (Toshiba Corp.) AI2010-2
 [more] AI2010-2
pp.7-11
KBSE, SS 2010-05-27
12:00
Kyoto Doshisha University, Imadegawa Campus Goal-oriented modeling method for security requirements
Masue Shiba, Naokazu Sasaki (Toshiba Solutions Corp.), Kenji Taguchi (AIST), Nobukazu Yoshioka (NII) SS2010-3 KBSE2010-3
In the upper process of the system development, it is important to set the problem of security, and to define the securi... [more] SS2010-3 KBSE2010-3
pp.15-20
PRMU 2010-02-19
13:45
Tokyo Tokyo Univ. of Agriculture and Technology Experiment and Investigation on Incremental Output Beam Search Algorithm for Character Segmentation
Yoshiaki Kurosawa (Toshiba Solutions Corp.) PRMU2009-224
The beam search algorithm presented in this paper was proposed to be applied to the character segmentation in a characte... [more] PRMU2009-224
pp.99-104
KBSE 2010-01-26
15:55
Tokyo Univ. of Tsukuba, Tokyo REBOK (Requirements Engineering Body Of Knowledge) Initiative
Mikio Aoyama (Nanzan Univ.), Takako Nakatani (Uni. of Tsukuba.), Shinobu Saito (NTT DATA Corp.), Naohiko Murata (Toshiba Solutions), Mikio Suzuki (TIS), Ritsuo Suzuki (JISA) KBSE2009-58
This article reports on the initiative of REBOK(Requirements Engineering Body Of Knowledge). We explain the motivation, ... [more] KBSE2009-58
pp.59-64
KBSE 2009-07-24
10:15
Hokkaido Muroran Institute of Technology Requirements Measurement Guideline for the PRINCE Model
Takako Nakatani, Narihito Kondo (Univ. Tsukuba), Mari Inoki (Toshiba Solutions Corp.), Michio Tsuda (Osaka Univ.), Shozo Hori (Yaskawa Information Systems Corp.), Keiichi Katamine (KyuTech) KBSE2009-16
If we elicit all requirements in the early phase of the project development, the project may not fail.
However, most pr... [more]
KBSE2009-16
pp.25-30
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Best Match Security -- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. --
Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST)
The importance of security measures are considerably increasing in the recent information society. The service providers... [more] ISEC2008-53
pp.133-138
SSS 2008-03-27 Tokyo Kikai-Shinko-Kaikan Bldg Comparison of rsik identification method of internal control and HAZOP
Tetsuya Ichikawa (TSOL) SSS2007-35
 [more] SSS2007-35
pp.13-16
COMP 2007-10-16
16:05
Miyagi Tohoku Univ. A polynomial-time algorithm for checking the equivalence of real-time strict deterministic restricted one-counter transducers
Kazushi Seino (UEC/TSOL), Etsuji Tomita, Mitsuo Wakatsuki (UEC) COMP2007-47
 [more] COMP2007-47
pp.41-48
ISEC, SITE, IPSJ-CSEC 2007-07-19
13:50
Hokkaido Future University-Hakodate A Method to Limit Appriciation of Content
Takehisa Kato (Toshiba Solutions Corp.)
Free content delivery service spreads worldwide as the network spreads, and the number of users increases rapidly. Howev... [more] ISEC2007-31 SITE2007-25
pp.107-112
ISEC, SITE, IPSJ-CSEC 2007-07-20
15:45
Hokkaido Future University-Hakodate Efficient Group Signature Scheme based on the DDH Problem
Takuya Yoshida, Koji Okada (Toshiba Solutions) ISEC2007-66
We propose an efficient group signature scheme, which is based on the DDH problem. A group signature scheme can be used ... [more] ISEC2007-66
pp.141-146
PRMU, MI 2007-05-24
11:10
Mie Mie Univ. A Binarization Method Suitable for Recognition of Images with Continuous and Discontinuous Difference of Brightness
Tomohisa Suzuki, Naoaki Kodaira, Hiroyuki Mizutani (Toshiba Solutions), Hiroaki Nakai, Yasuo Shinohara (Toshiba) PRMU2007-6 MI2007-6
In this paper, we introduce a binarization method suitable for recognition of images under influence of spatially contin... [more] PRMU2007-6 MI2007-6
pp.29-34
ISEC 2007-05-18
11:25
Tokyo Kikai-Shinko-Kaikan Bldg. (k,n) Threshold Secret Sharing Schemes Using XOR Operations
Yoshihiro Fujii (TOSHIBA SOLUTIONS), Kouya Tochikubo (Nihon Univ.), Norikazu Hosaka, Minako Tada, Takehisa Kato (TOSHIBA SOLUTIONS) ISEC2007-5
We propose a fast $(k, n)$-threshold scheme using EXCLUSIVE-OR operations. The proposed scheme is ideal and the size of ... [more] ISEC2007-5
pp.31-38
PRMU 2007-03-16
13:15
Okayama   Filter Mask Learning for Feature Extraction in Similar Pattern Discrimination
Yoshiaki Kurosawa (Toshiba Solutions)
Similar pattern discrimination is an important subject in the pattern recognition field. The experiments for this subjec... [more] PRMU2006-267
pp.73-78
PRMU 2006-12-14
16:15
Fukui   [Special Talk] Probabilistic Descent Applied to Character Recognition
Yoshiaki Kurosawa (Toshiba Solutions Corp.)
This report describes the application of MCE/GPD in the character recognition field. Firstly, as conventional methods, L... [more] PRMU2006-169
pp.49-54
ISEC, SITE, IPSJ-CSEC 2006-07-21
09:30
Okayama Okayama Univ. On the Standardization of Information Security -- Report on the Madrid Meeting in May, 2006 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba)
 [more] ISEC2006-46
pp.43-52
PRMU, TL 2006-02-23
09:30
Ibaraki   Form layout analysis using size invariant features
Tomohisa Suzuki, Akihiro Uda, Hiroyuki Mizutani (Toshiba Solutions)
One of the important requirements of the character recognition for printed forms is to find locations of fields to be re... [more] TL2005-49 PRMU2005-184
pp.1-6
 Results 1 - 19 of 19  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan