IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
HCS, CNR 2023-11-05
11:15
Tokyo Kogakuin University
(Primary: On-site, Secondary: Online)
Proposal and Evaluation of Recommendation Acceptance Tendency Scale for Overtrust Awareness
Yoshinori Hijikata, Reika Miwa, Aika Tsuchida (KGU), Masahiro Hamasaki, Masataka Goto (AIST) CNR2023-10 HCS2023-72
As services providing recommendations or judgments of AI (artificial intelligence) become popular, the problem of "recom... [more] CNR2023-10 HCS2023-72
pp.15-20
HCS 2022-01-28
09:40
Online Online Proposal of an Overtrust Scale of Users in Recommender Systems
Aika Tsuchida, Reika Miwa, Yoshinori Hijikata (KGU), Masahiro Hamasaki, Masataka Goto (AIST) HCS2021-43
Recommender systems have been used in many online services, and people have been exposed to such recommendations frequen... [more] HCS2021-43
pp.1-6
SWIM 2020-11-28
14:10
Online Online Governance and accessment of the use of IT and AI for sustainable development
Hiroyuki Ogura (Nihon Univ.), Yonosuke Harada (Inst. of Information Security), Shunsuke Managi (Kyushu Univ.) SWIM2020-8
It is required that the management of everything surrounding the organization becomes smarter and that it is transformed... [more] SWIM2020-8
pp.10-17
ISEC 2020-05-20
15:30
Online Online An Anonymous Trust-Marking Scheme on NEM Blockchain Systems
Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] ISEC2020-11
pp.47-54
CS 2019-07-04
09:00
Kagoshima Amami City Social Welfare Center Trust-based Verification Attack Prevention Scheme using Tendency of Contents Request on NDN
Hironori Nakano, Hiroya Kato, Shuichiro Haruta, Masashi Yoshida, Iwao Sasase (Keio Univ.) CS2019-13
In this paper, we propose a trust-based verification attack prevention scheme using tendency of contents request on NDN.... [more] CS2019-13
pp.1-6
CS 2017-07-27
09:36
Nagasaki Fukue Bunka Kaikan Low Cost Dummy Generation using Non-Trusted LBS
Sanghun Choi, Shuichiro Haruta, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2017-14
Although LBS(Location Based Service) is quite convenient and usually used these days, The location privacy of the user i... [more] CS2017-14
pp.7-12
SC 2016-08-26
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. B2F Room No.2 Improvement of Trust Value Prediction Using Text Mining for Recommender System
Incheon Paik, Tomoya Maemori (UoA) SC2016-12
Recommender system will help to provide a list of items information that users are interested in. And with growth of soc... [more] SC2016-12
pp.7-11
DC, CPSY
(Joint)
2012-08-02
14:30
Tottori Torigin Bunka Kaikan Application Authentication System on Untrusted OS
Tsuyoshi Yamada, Masahiro Goshima, Shuichi Sakai (UT) CPSY2012-11
In order to prevent the information which an application deal from leakage, it is necessary to verify that following thr... [more] CPSY2012-11
pp.13-18
NS 2011-05-19
13:10
Tokyo Sophia University Trust-value management considering second infection for P2P file sharing networks
Yuki Yamashita, Kenji Yokota (Kyoto Univ.), Takuya Asaka (Tokyo Metropolitan Univ.), Tatsuro Takahashi (Kyoto Univ.) NS2011-23
In recent years, malwares in P2P networks are a major problem. As one of the virus prevention methods, DTM (Dynamic trus... [more] NS2011-23
pp.41-46
SSS 2009-07-24
00:40
Tokyo   [Keynote Address] Psychology on Risk, Safety and Peace of Mind -- The Determinants of Social Trust --
Kazuya Nakayachi (Doshisha Univ.) SSS2009-7
In this presentation the relationship between safety and peace of mind is discussed. The safety level of our society has... [more] SSS2009-7
pp.5-8
AI 2007-11-26
10:00
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus Proposal of noise diffusion Secure Eigen Trust Algorithm(ndSET)
Yukio Okada, Youki Kadobayashi (NAIST) AI2007-11
In overlay Network, Secure Eigen TrustAlgorithm( SET ) is proposed as an algorithm to check trust values. It ranks files... [more] AI2007-11
pp.1-3
VLD, CPSY, RECONF, DC, IPSJ-SLDM, IPSJ-ARC
(Joint) [detail]
2007-11-21
13:00
Fukuoka Kitakyushu International Conference Center [Fellow Memorial Lecture] Social Information Infrastructure and Dependable VLSI
Hiroto Yasuura (Kyushu Univ.) VLD2007-82 DC2007-37 RECONF2007-36
Our daily lives heavily depends on the social information infrastructure, which includes a huge numbers of VLSI chips. V... [more] VLD2007-82 DC2007-37 RECONF2007-36
pp.1-6
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan