Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2024-03-22 15:45 |
Nagasaki |
Ikinoshima Hall (Primary: On-site, Secondary: Online) |
Software Vulnerability Risk Growth Model for CVSS 4 Metrics Sora Okada, Takashi Minohara, Masaya Shimakawa (Takushoku Univ.) CPSY2023-47 DC2023-113 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2023-47 DC2023-113 pp.53-58 |
SS, DC |
2023-10-12 11:05 |
Nagano |
(Primary: On-site, Secondary: Online) |
Consistency checking of bidirectional transformations corresponding to selection and projection operations under functional dependencies Jun Ishida, Sota Sakai, Yasunori Ishihara (Nanzan University) SS2023-29 DC2023-35 |
A bidirectional transformation framework called BIRDS for relational data sharing can check whether every pair of source... [more] |
SS2023-29 DC2023-35 pp.44-49 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2023-03-24 09:00 |
Kagoshima |
Amagi Town Disaster Prevention Center (Tokunoshima) (Primary: On-site, Secondary: Online) |
A preliminary study on time-dependency of cyber security vulnerability assessment Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101 |
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] |
CPSY2022-42 DC2022-101 pp.49-54 |
AI |
2021-12-13 13:50 |
Fukuoka |
Aimattain Hakata station (Primary: On-site, Secondary: Online) |
Development of an Information Presentation Mechanism Based on Clause Structure for the Discussion Support System AIR-VAS Kazuki Ito, Mamoru Yoshizoe, Hiromitsu Hattori (Ritsumeikan Univ.) AI2021-7 |
The discussion support system, AIR-VAS, features a mechanism to stimulate discussion by exchanging information among mul... [more] |
AI2021-7 pp.35-39 |
SP, IPSJ-SLP, IPSJ-MUS |
2021-06-19 15:00 |
Online |
Online |
Neural speech synthesis using local phrase dependency structure information Nobuyoshi Kaiki, Sakriani Sakti, Satoshi Nakamura (NIST) SP2021-23 |
In order to synthesize Japanese speech with natural prosody, we introduce an end-to-end TTS with new prosodic symbol rep... [more] |
SP2021-23 pp.107-112 |
KBSE, SWIM |
2021-05-22 11:45 |
Online |
Online |
Systematic support for improving production systems
-- Production system modeling for identifying functions and attributes to be improved -- Toshinori Yasui (DENSO), Masanobu Umeda (Kyutech) KBSE2021-9 SWIM2021-9 |
Many companies, such as automotive parts suppliers, carry out many-kinds wide-area mass-production in the world. In suc... [more] |
KBSE2021-9 SWIM2021-9 pp.50-55 |
NS, IN (Joint) |
2017-03-02 11:40 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
A Study of Vulnerability of Campus-wide Information Communication Networks Considering Dependency on Power Distribution Networks Yukio Ogawa (Muroran IT), Go Hasegawa, Masayuki Murata (Osaka Univ.) IN2016-104 |
Information communication networks depend on power delivery from power distribution networks. We therefore evaluate vuln... [more] |
IN2016-104 pp.43-48 |
AI |
2016-12-09 10:05 |
Oita |
|
Extraction of Current Actual Status and Demand Expressions in Community Complaint Reports Yuta Sano, Tsunenori Mine (Kyushu Univ.) AI2016-12 |
Government 2.0 activities have become popular. Using the tools, anyone can share reports with other people on the Web. O... [more] |
AI2016-12 pp.1-6 |
TL |
2016-07-23 17:00 |
Tokyo |
Waseda Univ. (Nishi-Waseda Campus) |
Locality Effect on the Processing of Gap-Filler Dependency: An On-Line Study of Japanese Relative Clauses Shoko Yanagino (JustSystems), Hajime Ono (Tsuda College) TL2016-19 |
In Japanese, previous studies observed a lack of locality effects in integrating a referential NP and a verb (Nakatani a... [more] |
TL2016-19 pp.37-42 |
ET |
2016-03-05 11:10 |
Kagawa |
Kawaga Univ. (Saiwai-cho Campus) |
Co-Occurrence Corpus Based on Parsing of Phrase Structure and Dependency Structure for Second Language Writing Hou Riku, Yasuo Miyoshi (Kochi Univ.) ET2015-114 |
In this research, the example sentences that match the intended want to tell at the time of the second language writing ... [more] |
ET2015-114 pp.115-118 |
SS, MSS |
2016-01-26 11:05 |
Ishikawa |
Shiinoki-Geihin-Kan |
Transforming Constrained Dependency Pairs by Narrowing Tomohiro Sasano, Naoki Nishida, Masahiko Sakai (Nagoya Univ.) MSS2015-57 SS2015-66 |
The dependency pair framework, a method for proving termination of term rewriting systems, has been extended for constra... [more] |
MSS2015-57 SS2015-66 pp.123-128 |
VLD, IPSJ-SLDM |
2014-05-29 15:15 |
Fukuoka |
Kitakyushu International Conference Center |
An Automatic Nested Loop Pipelining Method and Its Evaluation Yusuke Nakatsuji, Masahiro Nambu, Takashi Kambe (Kinki Univ.) VLD2014-9 |
Nested loop pipelining with keeping data dependency is a key transformation in high-level synthesis tools as it helps ma... [more] |
VLD2014-9 pp.57-62 |
IBISML |
2013-11-12 15:45 |
Tokyo |
Tokyo Institute of Technology, Kuramae-Kaikan |
[Poster Presentation]
Performance Comparisons between Dependency Networks and Bayesian Networks Kazuya Takabatake, Shotaro Akaho (AIST) IBISML2013-41 |
Dependency networks are graphical models in which tasks of learning are done by totally local and simple algorithms of i... [more] |
IBISML2013-41 pp.39-44 |
TL |
2013-08-03 15:35 |
Osaka |
Kwansei Gakuin University, Osaka Umeda Campus |
[Poster Presentation]
Binding and Dependency Length in Gapless Relative Clauses Hajime Ono, Yu Ikemoto (Kinki Univ.) TL2013-29 |
Previous studies on Japanese relative clauses suggested that prediction makes an effect on the processing cost for the r... [more] |
TL2013-29 pp.87-92 |
VLD |
2013-03-05 10:00 |
Okinawa |
Okinawa Seinen Kaikan |
An Automatic Nested Loop Pipelining method from C level behavior description Masahiro Nambu, Takashi Kambe (Kinki Univ.) VLD2012-143 |
Nested loop pipelining with keeping deta dependency is a key transformation in high-level synthesis tools as it helps ma... [more] |
VLD2012-143 pp.43-48 |
NC |
2012-10-05 10:00 |
Fukuoka |
Kyushu Institute of Technology (Wakamatsu Campus) |
The modulation of long-term depression affecting distance-dependent synaptic weight distribution and directional spike propagation in a recurrent network Toshikazu Samura, Eriko Sugisaki, Yutaka Sakai (Tamagawa Univ.), Hatsuo Hayashi (KYUTECH), Takeshi Aihara (Tamagawa Univ.) NC2012-49 |
A recurrent network where excitatory and inhibitory neurons are mutually connected causes spike propagation when excitat... [more] |
NC2012-49 pp.73-78 |
PRMU, IBISML, IPSJ-CVIM (Joint) [detail] |
2012-09-03 15:30 |
Tokyo |
|
Group Activity Recognition by CRFs with Multiscale Dependency Takuhiro Kaneko, Masamichi Shimosaka, Shigeyuki Odashima, Rui Fukui, Tomomasa Sato (The Univ. of Tokyo) PRMU2012-49 IBISML2012-32 |
Group activity recognition has gained attention in computer vision community. Examples of group activities are queueing ... [more] |
PRMU2012-49 IBISML2012-32 pp.185-190 |
IT, ISEC, WBS |
2012-03-01 11:45 |
Kanagawa |
|
Analysis of interdependency of information security in Japan Ryouta Hishiki (Chuou Univ.), Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura (Tokyo Univ.), Hideki Imai (Chuou Univ.) IT2011-49 ISEC2011-76 WBS2011-50 |
In the economy, the activities of the Internet is essential in all
industrial sector.
Therefore, it is also necessar... [more] |
IT2011-49 ISEC2011-76 WBS2011-50 pp.23-29 |
KBSE |
2012-01-24 15:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The metamodel development showing the dependencies of the design specification using the templates of design specifications Atsushi Motoyama, Takako Nakatani (Univ. of Tsukuba) KBSE2011-68 |
Review of design specifications is one of the effective measures for improving software quality. Errors and omissions of... [more] |
KBSE2011-68 pp.91-96 |
SS |
2011-10-27 15:35 |
Ishikawa |
JAIST |
Development and Implementation of an Efficient Algorithm for Delta Mining Keishi Yamane, Naoya Nitta (Konan Univ.) SS2011-31 |
In an execution of an object-oriented program, a pre-executed feature often affects a post-executed feature.Therefore, i... [more] |
SS2011-31 pp.25-30 |