Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PRMU |
2013-03-14 16:30 |
Tokyo |
|
Learning Process Visualization of LVQ and Learning Observation at Place where Turning Point Exists Yoshiaki Kurosawa (Toshiab Solutions) PRMU2012-198 |
LVQ is one of the basic learning methods in the field of pattern recognition and it can be described by probabilistic de... [more] |
PRMU2012-198 pp.105-110 |
TL |
2011-06-24 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Detection of Inconsistent/Overlapping Descriptions in Japanese Business Documents Mikito Kobayashi, Masahisa Shinozaki, Toshiyuki Kano, Yoshimi Saito (Toshiba Solutions Corp.) TL2011-1 |
A large amount of documents are revised by several authors. They are forced to revise other affected documents to keep c... [more] |
TL2011-1 pp.1-5 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 14:15 |
Aomori |
Hirosaki University |
An Optimization of AES Decryption Using the Bitslice Technique Fumihiko Sano (Toshiba Solutions Corporation) ISEC2010-15 SITE2010-11 ICSS2010-21 |
We implemented a decryption process of AES with new bitslice technique by K\"{a}sper et al. for encryption. In conventio... [more] |
ISEC2010-15 SITE2010-11 ICSS2010-21 pp.35-39 |
AI |
2010-06-25 10:30 |
Tokyo |
|
Semantic Relation Extraction from Documents Using Technical Term Extraction Shinichi Nagano (Toshiba Corp.), Masumi Inaba (Toshiba Solutions Corp.), Takahiro Kawamura (Toshiba Corp.) AI2010-2 |
[more] |
AI2010-2 pp.7-11 |
KBSE, SS |
2010-05-27 12:00 |
Kyoto |
Doshisha University, Imadegawa Campus |
Goal-oriented modeling method for security requirements Masue Shiba, Naokazu Sasaki (Toshiba Solutions Corp.), Kenji Taguchi (AIST), Nobukazu Yoshioka (NII) SS2010-3 KBSE2010-3 |
In the upper process of the system development, it is important to set the problem of security, and to define the securi... [more] |
SS2010-3 KBSE2010-3 pp.15-20 |
PRMU |
2010-02-19 13:45 |
Tokyo |
Tokyo Univ. of Agriculture and Technology |
Experiment and Investigation on Incremental Output Beam Search Algorithm for Character Segmentation Yoshiaki Kurosawa (Toshiba Solutions Corp.) PRMU2009-224 |
The beam search algorithm presented in this paper was proposed to be applied to the character segmentation in a characte... [more] |
PRMU2009-224 pp.99-104 |
KBSE |
2010-01-26 15:55 |
Tokyo |
Univ. of Tsukuba, Tokyo |
REBOK (Requirements Engineering Body Of Knowledge) Initiative Mikio Aoyama (Nanzan Univ.), Takako Nakatani (Uni. of Tsukuba.), Shinobu Saito (NTT DATA Corp.), Naohiko Murata (Toshiba Solutions), Mikio Suzuki (TIS), Ritsuo Suzuki (JISA) KBSE2009-58 |
This article reports on the initiative of REBOK(Requirements Engineering Body Of Knowledge). We explain the motivation, ... [more] |
KBSE2009-58 pp.59-64 |
KBSE |
2009-07-24 10:15 |
Hokkaido |
Muroran Institute of Technology |
Requirements Measurement Guideline for the PRINCE Model Takako Nakatani, Narihito Kondo (Univ. Tsukuba), Mari Inoki (Toshiba Solutions Corp.), Michio Tsuda (Osaka Univ.), Shozo Hori (Yaskawa Information Systems Corp.), Keiichi Katamine (KyuTech) KBSE2009-16 |
If we elicit all requirements in the early phase of the project development, the project may not fail.
However, most pr... [more] |
KBSE2009-16 pp.25-30 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Best Match Security
-- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. -- Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST) |
The importance of security measures are considerably increasing in the recent information society. The service providers... [more] |
ISEC2008-53 pp.133-138 |
SSS |
2008-03-27 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Comparison of rsik identification method of internal control and HAZOP Tetsuya Ichikawa (TSOL) SSS2007-35 |
[more] |
SSS2007-35 pp.13-16 |
COMP |
2007-10-16 16:05 |
Miyagi |
Tohoku Univ. |
A polynomial-time algorithm for checking the equivalence of real-time strict deterministic restricted one-counter transducers Kazushi Seino (UEC/TSOL), Etsuji Tomita, Mitsuo Wakatsuki (UEC) COMP2007-47 |
[more] |
COMP2007-47 pp.41-48 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:50 |
Hokkaido |
Future University-Hakodate |
A Method to Limit Appriciation of Content Takehisa Kato (Toshiba Solutions Corp.) |
Free content delivery service spreads worldwide as the network spreads, and the number of users increases rapidly. Howev... [more] |
ISEC2007-31 SITE2007-25 pp.107-112 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 15:45 |
Hokkaido |
Future University-Hakodate |
Efficient Group Signature Scheme based on the DDH Problem Takuya Yoshida, Koji Okada (Toshiba Solutions) ISEC2007-66 |
We propose an efficient group signature scheme, which is based on the DDH problem. A group signature scheme can be used ... [more] |
ISEC2007-66 pp.141-146 |
PRMU, MI |
2007-05-24 11:10 |
Mie |
Mie Univ. |
A Binarization Method Suitable for Recognition of Images with Continuous and Discontinuous Difference of Brightness Tomohisa Suzuki, Naoaki Kodaira, Hiroyuki Mizutani (Toshiba Solutions), Hiroaki Nakai, Yasuo Shinohara (Toshiba) PRMU2007-6 MI2007-6 |
In this paper, we introduce a binarization method suitable for recognition of images under influence of spatially contin... [more] |
PRMU2007-6 MI2007-6 pp.29-34 |
ISEC |
2007-05-18 11:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
(k,n) Threshold Secret Sharing Schemes Using XOR Operations Yoshihiro Fujii (TOSHIBA SOLUTIONS), Kouya Tochikubo (Nihon Univ.), Norikazu Hosaka, Minako Tada, Takehisa Kato (TOSHIBA SOLUTIONS) ISEC2007-5 |
We propose a fast $(k, n)$-threshold scheme using EXCLUSIVE-OR operations. The proposed scheme is ideal and the size of ... [more] |
ISEC2007-5 pp.31-38 |
PRMU |
2007-03-16 13:15 |
Okayama |
|
Filter Mask Learning for Feature Extraction in Similar Pattern Discrimination Yoshiaki Kurosawa (Toshiba Solutions) |
Similar pattern discrimination is an important subject in the pattern recognition field. The experiments for this subjec... [more] |
PRMU2006-267 pp.73-78 |
PRMU |
2006-12-14 16:15 |
Fukui |
|
[Special Talk]
Probabilistic Descent Applied to Character Recognition Yoshiaki Kurosawa (Toshiba Solutions Corp.) |
This report describes the application of MCE/GPD in the character recognition field. Firstly, as conventional methods, L... [more] |
PRMU2006-169 pp.49-54 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 09:30 |
Okayama |
Okayama Univ. |
On the Standardization of Information Security
-- Report on the Madrid Meeting in May, 2006 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba) |
[more] |
ISEC2006-46 pp.43-52 |
PRMU, TL |
2006-02-23 09:30 |
Ibaraki |
|
Form layout analysis using size invariant features Tomohisa Suzuki, Akihiro Uda, Hiroyuki Mizutani (Toshiba Solutions) |
One of the important requirements of the character recognition for printed forms is to find locations of fields to be re... [more] |
TL2005-49 PRMU2005-184 pp.1-6 |