Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SeMI, IPSJ-MBL, IPSJ-UBI [detail] |
2021-03-02 10:50 |
Online |
Online |
A Proposal for Location Predictive V2V Routing Considering Link Quality Masahiro Nishioka, Michiko Harayama (Gifu Univ) SeMI2020-64 |
VANETs, the automotive IoT networks, are currently drawing attention to reducing accidents and improving vehicle conveni... [more] |
SeMI2020-64 pp.35-40 |
NS, NWS (Joint) |
2020-01-24 16:40 |
Okinawa |
|
Congestion control method based on contents priority in Information-centric networking Yuki Inoue, Osamu Mizuno (Kogakuin Univ.) NS2019-176 |
Information-Centric Networking (ICN) is a new network architecture designed to cope with increasing network traffic. In ... [more] |
NS2019-176 pp.91-96 |
SRW, SeMI, CNR (Joint) |
2019-11-06 16:15 |
Tokyo |
Kozo Keisaku Engineering Inc. |
BDLP: A Blockchain-based Data Lifecycle Protection Framework for Information-Centric Network Ruidong Li, Hitoshi Asaeda (NICT) SeMI2019-95 |
Information-centric networking (ICN) is an emerging architecture with the support of pervasive in-network caching, which... [more] |
SeMI2019-95 pp.127-131 |
ICD, CPSY, CAS |
2018-12-21 15:05 |
Okinawa |
|
A Consideration of Method of Information Sources Terminals' Moving with Covering Problem on Epidemic Communication Mamoru Takano, Atsushi Kashiwabara, Hiroshi Tamura (Chuo Univ.), Keisuke Nakano (Niigata Univ.), Masakazu Sengoku (Graduate Institute for Entrepreneurial Studies) CAS2018-82 ICD2018-66 CPSY2018-48 |
There is a study about location problem of information sources terminals, which is one of the previous studies on epidem... [more] |
CAS2018-82 ICD2018-66 CPSY2018-48 pp.21-23 |
IT |
2017-07-14 10:50 |
Chiba |
Chiba University |
Variable-Length Intrinsic Randomness Problem Allowing Non-Vanishing Underflow Probability Jun Yoshizawa, Shota Saito, Toshiyasu Matsushima (Waseda Univ.) IT2017-29 |
This paper deals with the variable-length intrinsic randomness problem for general sources. Previous study adopts the me... [more] |
IT2017-29 pp.73-78 |
ISEC, WBS, IT |
2017-03-10 12:10 |
Tokyo |
TOKAI University |
Overflow Probability of Variable-Length Codes Allowing Non-Vanishing Error Probability Ryo Nomura (Senshu Univ.), Hideki Yagi (Univ. of Electro-Comm.) IT2016-126 ISEC2016-116 WBS2016-102 |
We consider the variable-length coding allowing the error probability up to some constant. The optimum mean codeword len... [more] |
IT2016-126 ISEC2016-116 WBS2016-102 pp.173-178 |
CQ |
2016-08-30 10:55 |
Ibaraki |
Tsukubasan |
Evaluation of the Communication System of Vehicle Location Information for Cooperative ITS via 4G/5G Mobile Network Makoto Fujinami, Yasuhiro Mizukoshi (NEC) CQ2016-62 |
In recent years, Vehicle to Vehicle (V2V) communication technology based on the Wi-Fi technology has been used for vehic... [more] |
CQ2016-62 pp.77-81 |
EMM, IT |
2015-05-22 10:00 |
Kyoto |
Kyoto International Community House |
On the Computational Complexity of Information Flow Problem with Hierarchy Constraint Yuki Takeda, Yuichi Kaji, Minoru Ito (NAIST) IT2015-11 EMM2015-11 |
An information flow problem discusses how to distribute information over a complicated network. It is known that the te... [more] |
IT2015-11 EMM2015-11 pp.57-62 |
IT |
2014-07-17 17:40 |
Hyogo |
Kobe University |
[Invited Talk]
How to Observe Probability Distribution of Self-Information
-- as viewed under different resolutions of $n^{-1}$ and $n^{-1/2}$ -- Toshiyasu Matsushima (Waseda Univ.) IT2014-26 |
Several problems in Information Theory are investigated by asymptotic approximations of the probability of self-informat... [more] |
IT2014-26 pp.83-88 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 09:30 |
Ishikawa |
Hotel Rurikoh |
Formulation of Guideline for the Filming/Storing and Viewing/Sharing of Elementary and Junior High Schools Classroom Video/Audio Data Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi International Univ.) SITE2013-65 IA2013-90 |
We have discussed legal and ethical problems concerning video/audio recording, digital archiving and online delivery (co... [more] |
SITE2013-65 IA2013-90 pp.103-108 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 09:35 |
Hokkaido |
|
Optimization and Information Hiding Techniques of PDF files for Electronic Display Devices Toshio Modegi (DNP) ISEC2013-23 SITE2013-18 ICSS2013-28 EMM2013-25 |
These days, reading on an electronic display device such as a tablet computer is popular. One of the typical document fo... [more] |
ISEC2013-23 SITE2013-18 ICSS2013-28 EMM2013-25 pp.173-180 |
IN, NS (Joint) |
2011-03-04 14:10 |
Okinawa |
Okinawa Convention Center |
A Proposal of Trustworthy Information Oriented Network (TION) Ruidong Li, Masugi Inoue (NICT) IN2010-190 |
The current Internet architecture is designed for host-to-host communications, while information dissemination and retri... [more] |
IN2010-190 pp.277-282 |
IN |
2011-01-21 15:45 |
Osaka |
Osaka Univ. |
A Comparative Survey on Information-Centric Network Ruidong Li, Masugi Inoue (NICT) IN2010-139 |
The current Internet architecture is designed for host-to-host communications, where hosts interconnect with each other ... [more] |
IN2010-139 pp.121-126 |
NS, IN (Joint) |
2010-03-05 08:30 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Study on Distributed Information and Communication Processing Architecture for Next Generation Cloud System Michitaka Okuno, Daisuke Ito, Hiroki Miyamoto, Hidetaka Aoki, Yuji Tsushima, Takeki Yazaki (Hitachi, Ltd.,) NS2009-204 |
Next-generation cloud computing system has to solve not only the problem of security but also problems of short-time res... [more] |
NS2009-204 pp.241-246 |
IA, SITE, IPSJ-IOT [detail] |
2010-03-02 15:25 |
Miyagi |
|
About A Semantics for Multi-Agent System to Control Information Flows Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd.), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-70 IA2009-122 |
We describe a system which controls information flows and prevents the information leakages and the information falsific... [more] |
SITE2009-70 IA2009-122 pp.283-288 |
CPSY |
2009-10-20 10:30 |
Tokyo |
212, 1F, Bldg.E-2, The University of Tokyo |
A Platform for Preventing Information Leakage Yuki Yokota, Ryota Shioya, Masahiro Goshima, Shuichi Sakai (Univ. of Tokyo.) CPSY2009-28 |
Today, people get big advantages from recent rapid development of information technology. On the other way, however, man... [more] |
CPSY2009-28 pp.7-12 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Information Leakage Prevention Function of host based for P2P File Exchange Environment Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
Recently, there are many incidents to which the classified information of the individual or the organization flows out i... [more] |
ISEC2008-32 SITE2008-26 pp.115-122 |
KBSE |
2007-11-19 17:10 |
Fukuoka |
Kyushu Sangyo University |
A Case Study and Discussion on a Requirement Analysis Method of Unexpected Obstacles in Embedded Software by Combining Information Flow Diagram with Analysis Matrix Masaki Tanimoto, Toshiro Mise, Yasufumi Shinyashiki, Masaaki Hashimoto (KIT), Takako Nakatani (TUS), Naoyasu Ubayashi, Keiichi Katamine (KIT) KBSE2007-32 |
This paper describes a case study and discussion on a requirement analysis method of unexpected obstacles in embedded so... [more] |
KBSE2007-32 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:15 |
Hokkaido |
Future University-Hakodate |
Study on Information Transparency and Trust from the view point of Web innovation Noriaki Yoshikai (Nihon Univ.), Toshio Yamagishi (Hokkaido Univ.) ISEC2007-27 SITE2007-21 |
In the flow of the globalization and the networking, the profit or the loss which you can get in the network business de... [more] |
ISEC2007-27 SITE2007-21 pp.79-86 |
SS |
2006-02-02 13:30 |
Fukuoka |
Fukuoka Laboratory for Emerging and Enabling Technology of SoC |
An analysis method of unexpected obstacles in embedded software by Information Flow Diagram Hidehiro Kametani (KIT), Yasufumi Shinyashiki, Toshiro Mise (MEW), Masaaki Hashimoto, Naoyasu Ubayashi, Keiichi Katamine (KIT), Takako Nakatani (S-Lagoon) |
This paper proposes an analysis method of unexpected obstacles in embedded software by using diagrams on which informati... [more] |
SS2005-76 pp.1-6 |