|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:55 |
Kochi |
Kochi University of Technology |
Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki) ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48 |
Rapid malware detection is very important because malware causes serious damage to the modern society based on the Inter... [more] |
ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48 pp.293-298 |
WIT, SP |
2018-10-28 11:20 |
Fukuoka |
Kyushu Institute of Technology(Kitakyushu) |
Criterion for detection process of ocular misalignment Konomi Hirata (Univ. of Miyazaki), Noriyuki Uchida (KUHW), Asami Matsumoto, Masaya Kawakami, Kayoko Takatuka, Masayuki Mukunoki, Naonobu Okazaki (Univ. of Miyazaki) SP2018-45 WIT2018-33 |
(To be available after the conference date) [more] |
SP2018-45 WIT2018-33 pp.67-72 |
MBE, BioX, NC |
2015-10-25 11:30 |
Osaka |
Osaka Electro-Communication University |
A Study of the Judging Methods using the Machine Learning in Authentication System using the Mouse Operation Trajectory Akito Itakura, Yoshihiro Kita (Tokyo Univ. of Tech.), Mirang Park (Kanagawa Institute of Tech.), Naonobu Okazaki (Univ. of Miyazaki) BioX2015-29 MBE2015-40 NC2015-24 |
The authentication systems using operation trajectory by the mouse are reported. These methods have the low authenticati... [more] |
BioX2015-29 MBE2015-40 NC2015-24 pp.43-46 |
BioX, ITE-ME, ITE-IST [detail] |
2014-06-16 13:00 |
Ishikawa |
Kanazawa University, Kakuma Campus |
A Study of Recording Attack Resistance of the Puzzle Authentication Yoshihiro Kita, Mirang Park (KAIT), Naonobu Okazaki (Univ. of Miyazaki) BioX2014-1 |
Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile terminals store severa... [more] |
BioX2014-1 pp.1-5 |
OCS, PN, CS (Joint) |
2007-06-14 15:25 |
Hokkaido |
Chitose Inst. of Science and Technology |
An Effective Lightpath Setup Scheme for Dynamic Traffic in Multi-ring Wavelength-routed networks Mirang Park, Yoshimasa Baba, Shoichiro Seno (Mitsubishi), Naonobu Okazaki (Miyazaki Univ) PN2007-1 |
In this paper, the multi-ring network system model is targeted, in which two or more WDM ring networks are connected by ... [more] |
PN2007-1 pp.1-6 |
MoNA, IPSJ-MBL |
2007-05-18 14:10 |
Okinawa |
Okinawa-seinen-kaikan |
A new routing protocol for data-centric sensor networks Yusuke Sato (Univ. Miyazaki), Kentaro Aburada (Pref. Univ. Kumamoto), Naonobu Okazaki, Shigeyuki Tomita (Univ. Miyazaki), Mirang Park (Mitsubishi Elec. Co.) |
For sensor networks consisting of battery-powered sensor nodes, power saving is significant challenge. It is effective t... [more] |
MoMuC2007-24 pp.125-130 |
MoNA, IPSJ-MBL |
2006-05-19 12:40 |
Okinawa |
|
* Kentaro Aburada (Prefectural Univ. Kumamoto), Kanako Morita, Naonobu Okazaki, Shigeyuki Tomita (Univ. Miyazaki), Mirang Park (Mitsubishi Elec. Corp.) |
[more] |
MoMuC2006-22 pp.119-124 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|