Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SRW, SeMI, CNR (Joint) |
2022-11-25 09:00 |
Tochigi |
Epinard Nasu (Primary: On-site, Secondary: Online) |
[Short Paper]
A Wireless Power Transfer System for a Biologging Device to Measure the Streaked Shearwater Yuichi Masuda, Katsumasa Kosya, Hiroyuki Shinoda (UT) SRW2022-24 |
This paper shows a wireless charging system for a bio-logging terminal to measure the streaked shearwater. To record an ... [more] |
SRW2022-24 p.36 |
LOIS |
2022-03-03 13:50 |
Online |
Online |
Implementation and Evaluation of Gamification for Lifelogging Application Based on Motivation Subscales Aoi Nagatani, Sinan Chen, Masahide Nakamura (Kobe Univ.) LOIS2021-42 |
In lifelogging services, where people input their daily records, continuous input of data is important. However, whether... [more] |
LOIS2021-42 pp.14-21 |
NLC |
2021-02-18 16:05 |
Online |
Online |
Sarcasm Detection with Japanese Wikipedia Entity Vector Xu Xufei, Hiai Satoshi, Shimada Kazutaka (KIT) NLC2020-27 |
In recent years, the task of detecting sarcasm has been tackled in many studies. Sarcasm detection is important for unde... [more] |
NLC2020-27 pp.25-30 |
NLC, IPSJ-IFAT |
2019-02-07 14:20 |
Kyoto |
Ryukoku University Omiya Campus |
Knowledge Acquisition about Event Information from Twitter Kohei Yamamoto, Kazutaka Shimada (Kyutech) NLC2018-38 |
In this paper, we propose a knowledge acquisition method for non-task-oriented dialogue systems, Such dialogue systems n... [more] |
NLC2018-38 pp.15-20 |
NLC, IPSJ-DC |
2018-09-06 10:35 |
Tokyo |
Seikei University |
Target Detection for Sarcasm Identification Satoshi Hiai, Kazutaka Shimada (Kyutech) NLC2018-10 |
Sarcasm identification has been treated as a task that classifies text as sarcastic or non-sarcastic. Sarcasm identifica... [more] |
NLC2018-10 pp.7-11 |
ICM |
2017-03-09 11:20 |
Okinawa |
Miyakojima Marine Terminal Bldg. |
A proposal of solutions for an issue on tracking processing among multiple components in cloud computing systems Takashi Natsume, Hiroshi Sakai (NTT) ICM2016-58 |
OpenStack is an open source software for cloud computing systems. OpenStack consists of multiple components and they pro... [more] |
ICM2016-58 pp.31-36 |
IBISML |
2017-03-07 10:00 |
Tokyo |
Tokyo Institute of Technology |
Safe Pruning Rule for Predictive Sequential Pattern Mining and Its Application to Bio-logging Data Analysis Kaoru Kishimoto (NITech), Masayuki Karasuyama (NIT), Kazuya Nakagawa (NITech), Kotaro Kimura (Osaka Univ.), Ken Yoda (Nagoya Univ.), Yuta Umezu, Shinsuke Kajioka (NITech), Koji Tsuda (UTokyo), Ichiro Takeuchi (NITech) IBISML2016-105 |
Recently, the analysis for time-series logging data of animal behaviors, called bio-logging data, has attracted a wide a... [more] |
IBISML2016-105 pp.41-48 |
LOIS |
2017-03-03 09:00 |
Okinawa |
N.Ohama Memorial Hall |
The influence Analysis of Social Media on Tourism
-- Case Study of Instagram Posted Contents -- Ayami Tao, Akihisa Kodate (Tsuda College) LOIS2016-83 |
Sightseeing has become more diverse. The places where movies and TVdramas are filmed or the locations for animation stor... [more] |
LOIS2016-83 pp.117-122 |
HPB (2nd) |
2016-02-18 17:35 |
Tokyo |
Tokyo Denki University |
[Short Paper]
Web Services Enabling Real-time Visualization and Sharing for Information from Real-World Events Hiroto Takahashi, Masayuki Iwai (TDU) |
This paper presents, focused on real-time real-world events, organizing of trend analysis and events, share, and build a... [more] |
|
ED |
2014-10-21 15:30 |
Hokkaido |
Hokkaido Univ. (Faculty House Trillium) |
[Invited Talk]
Challenge to the ultimate of PMT
-- Development of the world's largest PMT and the world's smallest PMT, which applied MEMS technology -- Tsuyoshi Kodama, Hideki Shimoi, Takayuki Ohmura, Hiroyuki Kyushima (Hamamatsu Photonics) ED2014-66 |
The world's largest 20 inches Photomultiplier tube has been used in Super-Kamiokande as a water Cherenkov detector. Curr... [more] |
ED2014-66 pp.19-23 |
CS, NS, IN (Joint) |
2014-09-12 09:20 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Monitoring syslog Hiroshi Tsunoda (Tohoku Inst. of Tech.), Glenn Mansfield Keeni (Cyber Solutions) CS2014-49 |
Log messages are generated by operating systems and applications. These messages contain important information about th... [more] |
CS2014-49 pp.51-54 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:10 |
Hokkaido |
San-Refure Hakodate |
Forward-Secure Sequential Aggregate Message Authentication Revisited Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.) ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 |
The notion of forward-secure sequential aggregate message
authentication was introduced by Ma and Tsudik in 2007.
It i... [more] |
ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 pp.163-170 |
DE |
2014-06-21 16:15 |
Tokyo |
Ricoh IT Solutions |
Development and Performance Evaluation for Diffusion Analysis System on Social Media Miki Enoki (IBM/Ochanomizu Univ.), Masato Oguchi (Ochanomizu Univ.) DE2014-15 |
In a microblogging service like Twitter, many short messages are posted each day. Some of them represent replies or mess... [more] |
DE2014-15 pp.61-66 |
HCGSYMPO (2nd) |
2013-12-18 - 2013-12-20 |
Ehime |
Matsuyama Multi-Purpose Community Cente |
Visualizing Vocabulary Count of Children with Complex Communication Needs Based on Logging Data of STalk2 Hirofumi Tagawa, Tetsuya Hirotomi (Shimane Univ.) |
To understand complex communication needs, caregivers and therapists should observe a child. However, sharing their info... [more] |
|
IN, NS (Joint) |
2011-03-04 13:00 |
Okinawa |
Okinawa Convention Center |
Recording Overlay Network Structure Changing by Time Yusuke Doi (TOSHIBA Corp./Univ. of Tokyo) NS2010-252 |
Understanding behavior and structure of large and complex overlay networks is difficult. In this research, the author pr... [more] |
NS2010-252 pp.497-502 |
NLC |
2011-01-28 10:30 |
Ishikawa |
Kanazawa Univ. |
Estimation of Human Behavior of a User using Geotagging of Microblogging Tomohiro Sakamaki, Masayuki Iwai, Kaoru Sezaki (UT) NLC2010-37 |
Recently, the Microblogging services like Twitter are paid to attention. And they are researched in many fields especial... [more] |
NLC2010-37 pp.37-42 |
MVE |
2008-06-03 11:00 |
Tokyo |
Sanjo Conference Hall, the Univ. of Tokyo |
A Reviewing System of Autonomous Humanoid Behavior Experiment with Mixed Reality Kazuhiko Kobayashi (Canon), Koichi Nishiwaki (AIST), Shinji Uchiyama, Hiroyuki Yamamoto (Canon), Satoshi Kagami (AIST) MVE2008-17 |
We propose a review system to verification of actual machine behavior in the actual environment. The system is based on ... [more] |
MVE2008-17 pp.91-96 |
CS, SIP, CAS |
2008-03-06 14:45 |
Yamaguchi |
Yamaguchi University |
Priority-based Adaptive Transmission Control for Efficient Log Transfer Hiroshi Tsunoda, Takafumi Maruyama, Satoru Abe (Tohoku Univ.), Kohei Ohta (Cyber Solutions Inc.), Yuji Waizumi (Tohoku Univ.), Glenn Mansfield Keeni (Cyber Solutions Inc.), Yoshiaki Nemoto (Tohoku Univ.) CAS2007-113 SIP2007-188 CS2007-78 |
Logs generated by operating systems and application programs provide important information to a network administrator. L... [more] |
CAS2007-113 SIP2007-188 CS2007-78 pp.27-32 |
SITE, IPSJ-EIP |
2007-05-25 13:00 |
Tokyo |
|
Implementation of Facilities to Integrate AP/DB Logs for Deep Inspection Masakazu Yamanaka, Toshifumi Enomoto, Noburou Taniguchi, Masashi Yamamuro (NTT) |
The deep inspection of AP and DB logs in multiple business systems enables to validate the process in the system, and is... [more] |
SITE2007-1 pp.1-4 |
IT |
2005-05-25 16:30 |
Overseas |
Univ. of Hawaii |
An Effect of Migration Log Losses on the Searching Costs for Mobile Agents Ryo Nakanishi, Masayuki Ishii, Yoshikuni Onozato, Ken'ichi Kawanishi (Gunma Univ.) |
Mobile agents are autonomous programs that can travel across a network in order to accomplish given tasks. They are expe... [more] |
IT2005-12 pp.65-69 |