Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, SITE, ISEC |
2023-11-10 15:25 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Improvements for Enhancing the Reliability of NFTs
-- NFT Challenges and Solutions -- Yasushi Nakayama (SBI FERI) ISEC2023-72 SITE2023-66 LOIS2023-30 |
Non-Fungible Token (NFT) is a technology that enables the "one and only" nature of the target digital data, as well as p... [more] |
ISEC2023-72 SITE2023-66 LOIS2023-30 pp.114-118 |
ICSS |
2020-11-26 16:25 |
Online |
Online |
A Study on Anonymous Identifiers and its Applications Kazuomi Oishi (SIST) ICSS2020-25 |
As computer network spreads, identifiers with anonymity is required for privacy protection. IPv6 temporary addresses are... [more] |
ICSS2020-25 pp.32-37 |
DE, IPSJ-DBS |
2018-12-22 13:45 |
Tokyo |
National Institute of Informatics |
A Study on Detecting Anonymized Personal Identifiers including Multiple Individuals in Japanese Health Insurance Claims Data Jumpei Sato, Hiroyuki Yamada, Kazuo Goda, Kitsuregawa Masaru (Tokyo Univ.), Naohiro Mitsutake (IHEP) DE2018-27 |
Anonymization of medical data helps protect patient identities. However, with conventional anonymized personal identifie... [more] |
DE2018-27 pp.55-60 |
NS |
2018-04-20 09:55 |
Fukuoka |
Fukuoka Univ. |
Reduction of forwarding information using distributed assignment in CCN Kantaro Narita, Michihiro Aoki (AIT) NS2018-9 |
In recent years, the increase in content distribution volume on the network is explosive. CCN (Content Centric Networkin... [more] |
NS2018-9 pp.49-54 |
LOIS |
2017-03-02 16:40 |
Okinawa |
N.Ohama Memorial Hall |
Configuration Methods of Metadata for LOD Generation Toshitaka Maki, Kazuki Takahashi, Toshihiko Wakahara (FIT), Akihisa Kodate (Tsuda College), Toru Kobayashi (Nagasaki Univ), Noboru Sonehara (NII) LOIS2016-82 |
In recent years, the social structure of Japan has been changing drastically with the declining birthrate and the aging ... [more] |
LOIS2016-82 pp.111-116 |
SS |
2016-03-10 09:25 |
Okinawa |
|
Analysis on Semantic Orientation of Source Code Akihisa Yamada, Osamu Mizuno (Kyoto Inst. Tech.) SS2015-77 |
Sentiment analysis is becoming popular in research area of natural language processing. In this paper, we analyze relati... [more] |
SS2015-77 pp.7-12 |
PRMU, BioX |
2015-03-19 14:30 |
Kanagawa |
|
Personal authentication from Walking measured by Kinect in the night Takuya Toyama, Masanobu Yamamoto (Niigata Univ.) BioX2014-49 PRMU2014-169 |
For crimes that often occur at night, we identify a walking person from a skeletal movement of the body captured by Kine... [more] |
BioX2014-49 PRMU2014-169 pp.59-64 |
SS |
2015-03-09 16:35 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
An Approach for Abbreviated Identifier Expansion with Machine Learning Hideki Okajima, Osamu Mizuno (Kyoto Inst. Tech.) SS2014-68 |
The readability of source code is a crucial factor on software development and maintenance. Identifier is a essential cl... [more] |
SS2014-68 pp.79-84 |
SWIM |
2014-11-29 10:55 |
Tokyo |
Tokyo Polytechnic Univ. |
An Approach to Retrieving Structural Clones Using Sequence Mining Algorithms Yoshihisa Udagawa (Tokyo Polytechnic Univ.) SWIM2014-17 |
Several studies suggest that as much as 20—50% of large software in industry consist of copied fragments (clone co... [more] |
SWIM2014-17 pp.15-22 |
IN |
2014-06-26 16:40 |
Kagawa |
Kagawa Univ. |
[Invited Talk]
Identify user from traffic packet data
-- User identification information extraction from traffic reproduction -- Takayuki Sugiura (NetAgent) IN2014-23 |
The has been used conventionally as a method of specifying the user, it has to identify the user to identify the termina... [more] |
IN2014-23 pp.43-47 |
SWIM |
2014-05-23 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Approach to Mining Frequent Source Code Patterns Yoshihisa Udagawa (Tokyo Polytechnic Univ.) SWIM2014-3 |
This paper discusses a mining algorithm to explore program structure and the definition of a similarity measure that is ... [more] |
SWIM2014-3 pp.13-18 |
SWIM |
2013-11-29 13:20 |
Kanagawa |
Tokyo Polytechnic University |
On Retrieval Performance of a Sequence-based Retrieval Model Yoshihisa Udagawa (Tokyo Polytechnic University) SWIM2013-12 |
Retrieving similar source code is required in order to support the efficient program development and maintenance work. S... [more] |
SWIM2013-12 pp.1-8 |
SWIM, IEE-IS |
2013-05-24 11:00 |
Tokyo |
Kikai-Shinko-Kaikan |
A Sequence-Based Similarity Metric for Source Code Retrieval Yoshihisa Udagawa (Tokyo Polytechnic Univ.) SWIM2013-1 |
In this paper, we presented an approach that improves source code retrieval using the structural information of programs... [more] |
SWIM2013-1 pp.7-12 |
SWIM |
2012-11-30 14:35 |
Tokyo |
Tokai Univ. Takanawa Campus(Tokyo) |
An Approach to Retrieving Similar Source Codes by Control Structure and Method Identifiers Yoshihisa Udagawa (Tokyo Polytechnic University) SWIM2012-20 |
This paper discusses source code retrieval techniques using control statement structures and method identifiers. Our tec... [more] |
SWIM2012-20 pp.29-34 |
OFT |
2012-05-25 11:45 |
Gifu |
Hida, Earth Wisdom Center |
Required difference level between communication and identification light for optical fiber identification Kenichi Nakazawa, Yoshitaka Enomoto, Shigeki Sako (NTT) OFT2012-16 |
Field engineers have prevented incorrect cutting of optical fibers by receiving the identification light sent from a cen... [more] |
OFT2012-16 pp.73-76 |
NS |
2011-05-19 11:50 |
Tokyo |
Sophia University |
[Encouragement Talk]
An Evaluation Method for An Information Sharing Scheme Using Variable Identifiers in Mobile Ad-hoc Networks Kei Ohnishi, Kazuki Kume, Kazuya Tsukamoto (Kyushu Inst. of Tech.), Shinya Yamamura (Fujitsu Kyushu Network Technologies Limited), Akira Nagata (NAL), Masato Tsuru (Kyushu Inst. of Tech.) NS2011-22 |
In the present paper, we discuss an evaluation method for an information sharing scheme using variable identifiers in mo... [more] |
NS2011-22 pp.35-40 |
SS |
2010-08-06 11:00 |
Hokkaido |
Asahikawa Shimin-Bunka-Kaikan (Civic Culture Hall) |
Generating Descriptions of Nouns in Software from Program Comments Tetsuya Fujiki (Osaka Univ.), Yasuhiro Hayase (Toyo Univ.), Katsuro Inoue (Osaka Univ.) SS2010-27 |
Software developers surmise roles and workings of functions or variables for program comprehension judging from its iden... [more] |
SS2010-27 pp.65-69 |
NS, IN (Joint) |
2010-03-04 11:30 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
Information Sharing with Identifiers Representing Interest of Humans in Wireless Ad-hoc Networks Kei Ohnishi, Kazuya Tsukamoto (Kyushu Inst. of Tech.), Shinya Yamamura, Akira Nagata (NICT), Masato Tsuru (Kyushu Inst. of Tech./NICT) NS2009-176 |
This paper presents a method for information sharing in an ad-hoc network that is composed of people who move around wit... [more] |
NS2009-176 pp.83-88 |
OPE, OFT |
2010-02-26 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Optical Filter Checking Tool for Construction Work in Branced Optical fiber Regions Below an Optical Splitter in a PON Toshikazu Yamane, Noriyuki Araki, Hisashi Fujimoto (NTT) OFT2009-93 OPE2009-234 |
We propose a new function for construction work undertaken to install optical fiber lines for services in a passive opti... [more] |
OFT2009-93 OPE2009-234 pp.53-57 |
SANE |
2009-01-30 11:45 |
Nagasaki |
Nagasaki Prefectural Art Museum |
Preliminary Evaluation of SSR Mode S Interrogator Identifier Code Coordination Technique Tadashi Koga, Kazuhiko Uejima (ENRI) SANE2008-106 |
SSR Mode S is an air traffic control radar system with enhanced surveillance capability and datalink capability. Japan C... [more] |
SANE2008-106 pp.61-64 |