Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2016-03-04 11:35 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
A Proposal of Timeline-Based Event Log Management Method Takashi Tomine, Yu Tsuda (NICT), Akira Kato, Hideki Sunahara (Keio Univ.), Daisuke Inoue (NICT) SITE2015-74 IA2015-106 |
When a network trouble is happen, network operators are surveying information such as logs and statistics, from close ne... [more] |
SITE2015-74 IA2015-106 pp.227-232 |
EMM |
2016-03-02 14:30 |
Kagoshima |
Yakushima Environ. and Cultural Vill. Center |
[Poster Presentation]
A Study of Anonymity Index with Probability of Re-Identification Hiroko Akiyama (nnct), Akira Kato, Hideki Sunahara (Keio Univ.) EMM2015-76 |
For making valuable information or better services for individuals and society, Bigdata is very effective.
Bigdata has ... [more] |
EMM2015-76 pp.1-5 |
ICSS |
2015-03-03 14:15 |
Okinawa |
Meio Univiersity |
Implementation and Evaluation of Botnet Detection System with Temporal Locality of DGA Teppei Fukuda, Tomohiro Ishihara (UTokyo), Akira Kato (Keio Univ.) ICSS2014-66 |
In recent days, many botnet-based attacks are observed. In this thesis, our object is to detect the domain generation al... [more] |
ICSS2014-66 pp.19-24 |
ICSS, IPSJ-SPT |
2014-03-28 09:00 |
Okinawa |
Meio Univiersity |
A Study on the Formulation of Re-identification of Anonymized Personal Information Hiroko Akiyama, Akira Kato, Hideki Sunahara (Keio Univ.) ICSS2013-86 |
Anonymizing personal information is one way to preserve human's privacy.
But combination of anonymized information mig... [more] |
ICSS2013-86 pp.167-172 |
SDM, ICD |
2013-08-02 10:50 |
Ishikawa |
Kanazawa University |
A 123uW Standby Power Technique with EM-Tolerant 1.8V I/O NMOS Power Switch in 28nm HKMG Technology Kazuki Fukuoka, Ryo Mori, Akira Kato, Mitsuhiko Igarashi, Koji Shibutani, Takashi Yamaki, Koji Nii, Sadayuki Morita, Takao Koike (Renesas Electronics), Noriaki Sakamoto (Renesas Mobile) SDM2013-78 ICD2013-60 |
[more] |
SDM2013-78 ICD2013-60 pp.65-69 |
IA |
2013-02-15 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Formal approach for verification of routing protocols Tomoki Murota (Univ. of Tokyo), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) IA2012-86 |
[more] |
IA2012-86 pp.95-100 |
EMCJ |
2012-09-07 15:15 |
Hokkaido |
Hkkaido Univ. |
Analysis of conducted noise for LED lighting by using control model of IPD Akira Kato, Akira Minegishi, Kazuyuki Sakiyama, Yoshimitsu Hiratomo, Tomoyuki Kida (Panasonic) EMCJ2012-59 |
EMC countermeasure in early stages of development is effective in reducing the cost of development, and prediction of no... [more] |
EMCJ2012-59 pp.41-46 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 09:20 |
Hokkaido |
Hokkaido Univ. |
Design and Implementation of Network Covert Channel Validation Framework Takashi Tomine (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) SITE2011-47 IA2011-97 |
Network covert channels are communication channels or information transfer methods in networks which are not intended fo... [more] |
SITE2011-47 IA2011-97 pp.185-190 |
ICSS |
2011-03-25 13:25 |
Tokyo |
Suspended |
Consideration on hidden-communication channel in the Internet communication device. Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60 |
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more] |
ICSS2010-60 pp.23-28 |
CQ, MVE (Joint) |
2007-01-25 14:45 |
Fukuoka |
Asia-pacific Import Mart |
Hybrid type aoutonomic behabioral algorithm of moving relay station for MANET Akira Kato, Hisao Yamamoto (Musashi-tech) CQ2006-82 |
In Mobile Ad-hoc Network(MANET), route disconnection and route construction failure are often happen because of node mob... [more] |
CQ2006-82 pp.17-22 |
PRMU, MI |
2006-05-25 10:30 |
Aichi |
Aichi Prefectural University |
Examination of Winking Detection for Drivers with Glasses or Sunglasses Akira Kato, Keiichi Yamada, Tomoaki Nakano, Shin Yamamoto (Meijo Univ.) |
[more] |
PRMU2006-8 MI2006-8 pp.43-46 |
ICD |
2006-04-14 14:45 |
Oita |
Oita University |
An Internal Voltage Generation System of Flash Memory Module Jiro Ishikawa, Toshihiro Tanaka, Akira Kato, Takashi Yamaki, Yukiko Umemoto, Takeshi Shimozato, Isao Nakamura, Yutaka Shinagawa (Renesas Technology Corp.) |
We present a new internal voltage generation system of flash memory module embedded in a microcontroller. One of the fea... [more] |
ICD2006-20 pp.109-113 |
MVE, CQ, MoNA (Joint) |
2006-01-26 11:20 |
Oita |
Beppu Onsen Spring (Resorpia Beppu Hotel) |
Route stabilization scheme for MANET by using a network robot Akira Kato, Hisao Yamamoto (Musashi Institute of Tech.) |
(To be available after the conference date) [more] |
CQ2005-84 pp.31-36 |
PN |
2005-04-20 10:05 |
Tokyo |
Univ. of Electric-Commications |
[Invited Talk]
High-bandwidth TCP single-stream experiments on Long distance 10 Gbps Internet
-- Challenge to Internet2 Land Speed Record -- Kei Hiraki, Mary Inaba, Makoto Nakamura, , Ryo Nishimura, (Univ. of Tokyo), , (Chelsio Communications), , , , (Fujitsu Computer Technologies), Akira Kato, Seiichi Yamamoto, Katsuyuki Hasebe (WIDE Project) |
[more] |
PN2005-1 pp.1-6 |
COMP |
2005-03-18 14:10 |
Tokyo |
Tokyo Institute of Technology |
Algorithms for Finding Distance-Edge-Colorings of Graphs Takehiro Ito, Akira Kato, Xiao Zhou, Takao Nishizeki (Tohoku Univ.) |
For a given bounded nonnegative integer $\ell$, we wish to color all edges of a graph $G$ so that any two edges within d... [more] |
COMP2004-79 pp.49-55 |
AP |
2004-06-17 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A Proposal for a GA-Based Optimization Method with a Combination of the Decent Method and its Application to the Design of Yagi-Uda Array Antennas Akira Kato, Koichi Ogawa (Matsushita Electric Industrial) |
The Genetic Algorithm(GA) is a method for solving optimization problems. Since the GA searches the optimal solution in l... [more] |
AP2004-39 pp.19-24 |