Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [Japanese] / [English]
LOIS2013-54
Reading Characteristics of Two-dimensional Color Code
Damri Samretwit, Toshihiko Wakahara, Toshitaka Maki (Fukuoka Institue of tech.)
pp. 1 - 4
LOIS2013-55
Association of Japanese and English Papers by Time-serial Metadata Analysis
Toshitaka Maki, Toshihiko Wakahara (Fukuoka Inst. of Tech.)
pp. 5 - 10
LOIS2013-56
Estimation Method of User's Sense of Expectation for Future Events Focusing on Lifelogs and Vital Reaction
Yumiko Nagatake, Tomoyo Komatsu, Akihisa Kodate (Tsuda Coll.), Manabu Motegi, Atsushi Fukayama, Michio Shimomura (NTT)
pp. 11 - 16
LOIS2013-57
Latent Preference Estimation Method for Photo Viewers Using Vital Reaction
Tomoyo Komatsu, Yumiko Nagatake, Akihisa Kodate (Tsuda Coll.), Manabu Motegi, Atsushi Fukayama, Michio Shimomura (NTT)
pp. 17 - 22
LOIS2013-58
Source code navigation using code patterns
Ken Nakayama (Tsuda College), Eko Sakai (Otani Univ.)
pp. 23 - 28
LOIS2013-59
A development of a smart-device application for environmental sound collection based on crowdsourcing approach
Sunao Hara, Akinori Kasai, Masanobu Abe (Okayama Univ.), Noboru Sonehara (NII)
pp. 29 - 34
LOIS2013-60
Generation of Hand-written Font Reflecting User's Indibiduality
Koji Nakamura, Yasuhiko Higaki (Chiba Univ.)
pp. 35 - 40
LOIS2013-61
On Constructions of Secret Sharing System Realizing Perfect Privacy via a Physical RNG and Integrity via Hash Values
Miki Hosaka, Yasushi Takami, Tokutaro Yoshida (NTT)
pp. 41 - 46
LOIS2013-62
Responsive Visualization for Data Mining using three.js
Aya Suzuki, Natsumi Kugawa, Aimi Igarashi, Eri Tsunoda, Ko Fujimura (Otsuma Women's Univ.)
pp. 47 - 52
LOIS2013-63
A Life Cycle Model of "BA"
Hirohiko Suwa (Univ. of Electro-Comm.), Hitoshi Yamamoto (Rissho Univ.), Yuu Ihara (Okamura)
pp. 53 - 58
LOIS2013-64
Usability Study of Smartphone based FoodLog
Kiyoharu Aizawa, Kazuki Maeda (Univ. of Tokyo), Makoto Ogawa, Yohei Sato, Mayumi Kasamatsu (foo.log)
pp. 59 - 63
LOIS2013-65
Visualization using food distance and personal food intake based on log data
Yuji Udagawa, Kiyoharu Aizawa (Univ. of Tokyo), Makoto Ogawa (foo.log)
pp. 65 - 70
LOIS2013-66
Food Image Recognition Using Convolutional Neural Networks for Helping Food Record
Hokuto Kagaya, Kiyoharu Aizawa (Univ. of Tokyo), Makoto Ogawa (foo.log)
pp. 71 - 76
LOIS2013-67
The basic examination of relations with the passage pattern and damage of the Okinawa typhoon
Katsuyoshi Tanabe, Yoshiyuki Miyazato (Meio Univ.)
pp. 77 - 82
LOIS2013-68
Optimal Exercise Intensity Presentation System using a Smartphone and Heart Rate Monitor
Tatsuro Narumi, Ikuma Sato, Yuichi Fujino (Future Univ. Hakodate)
pp. 83 - 88
LOIS2013-69
Implementing Environment Context Reasoning with House Log in Home Network
Tetsuya Masuda, Yuichi Watanabe, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.)
pp. 89 - 94
LOIS2013-70
Considering Appliance Control Service in A Cloud-Enabled Home Network System
Satoshi Takatori, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.)
pp. 95 - 100
LOIS2013-71
Considering Common Data Model for Indoor Location-aware Services
Long Niu, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.)
pp. 101 - 106
LOIS2013-72
Support Method for a Fashion Coordination Service Based on Extraction Method of the Optimum Temperature of Clothes Using Clothes Life Logs
Takako Yamada, Kazumasa Takami (Soka Univ.)
pp. 107 - 112
LOIS2013-73
A Routing Method Considering the Remaining Battery Power for Multimedia Communications in MANET
Hiroyuki Todoroki, Kazumasa Takami (Soka Univ.)
pp. 113 - 118
LOIS2013-74
A Distributed Vacancy Management Method using Inter-Vehicle Communication
Shohei Yamashita, Kazumasa Takami (Soka Univ.)
pp. 119 - 124
LOIS2013-75
Risk Assessment of Information Leak in Twitter Use of Employee
-- Tweet Experience and Consciousness about Business --
Yoshiaki Seki, Naoko Chiba (NTT), Yoshiaki Hashimoto (Univ. of Tokyo)
pp. 125 - 130
LOIS2013-76
Risk Assessment of Information Leak in Twitter Use of Employee
-- The Actual Situation and Effectiveness of Company's Measures for Employee Tweets --
Naoko Chiba, Yoshiaki Seki (NTT), Yoshiaki Hashimoto (Univ. of Tokyo)
pp. 131 - 136
LOIS2013-77
Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.)
pp. 137 - 141
LOIS2013-78
Security and Usability of "Smilenet" (Information Sharing System for Home Medical Care and Nursing)
Masayuki Sassa, Jun Takeo, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.)
pp. 143 - 148
LOIS2013-79
Linkable System Using Encrypted Personal Identification Information for Clinical Research
Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.)
pp. 149 - 154
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.