Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]
SITE2016-40
"Duration of Riken-no-ken (view from a distance)", about the system and ethics
Tetsuya Morizumi (KU)
pp. 1 - 4
SITE2016-41
Institutional Matters on the Access and Storage of One's Own Fostering Records
-- Some agenda for the records management beneficial to Care Leavers --
Akiyoshi Kabeya (Chiba Univ.)
pp. 5 - 8
SITE2016-42
An essay on evaluation of quality and value of information
-- Proposal of quali-informatics in the age of yotta byte scale --
Mariko Nihei, Hiroaki Muraoka (Tohoku Univ.)
pp. 9 - 12
SITE2016-43
Applications of Card-Based Cryptography to Education
Takaaki Mizuki (Tohoku Univ.)
pp. 13 - 17
SITE2016-44
Factorization of Composite Numbers having a Prime of Special Form with Elliptic Curve Method
Masaaki Shirase (FUN)
pp. 19 - 26
SITE2016-45
Sequential Hashing with Minimum Padding
Shoichi Hirose (Fukui Univ.)
pp. 27 - 32
SITE2016-46
Application of the Method for Similarity Search of Time-Series Data to User Authentication
Satoshi Hiraiwa, Masahiro Mambo (Kanazawa Univ.)
pp. 33 - 38
SITE2016-47
Study of Comprehensive Emergency Management Support System
-- Application to Emergency Management of Cyber-attack --
Naoko Kosaka, Koji Kishi, Tsuneko Kura, Yuji Maeda (NTT)
pp. 39 - 44
SITE2016-48
A Study of Voice Guidance for Visually Impaired People by Portable Terminal
Tatsuaki Ito, Yukihiro Nakamura, Masafumi Suzuki, Misa Hirao, Nobukatsu Hojo, Manabu Okamoto, Hirohisa Tezuka (NTT)
pp. 45 - 50
SITE2016-49
Proposal of Vocabulary Foundation for Construction of Tourism Ontology
Toshitaka Maki, Kazuki Takahashi, Toshihiko Wakahara, Akihiro Yamaguchi (FIT), Akihisa Kodate (Tsuda), Toru Kobayashi (Nagasaki Univ), Noboru Sonehara (NII)
pp. 51 - 56
SITE2016-50
Risks of approval in the SNS using the OAuth authentication
Tatsuzi Yoshida, Yoshiaki Seki (Tokyo City Univ)
pp. 57 - 62
SITE2016-51
An Evaluation of the System to Identify the Measured Person using Bio-Signal
Haruka Suzuki, Gen Takahashi, Kaori Fujimura, Toru Nakamura, Yukiyoshi Ota (NTT)
pp. 63 - 68
SITE2016-52
An Efficient Decryption Control Method for the Smart Device Manegement System with Functional Encryption
Sakurako Tamura, Makiko Aoyagi, Sakae Chikara, Hiroaki Isaka (NTT)
pp. 69 - 74
SITE2016-53
[Invited Talk]
Threat of Electromagnetic Information Leakage and Countermeasures
Yu-ichi Hayashi (Tohoku Gakuin Univ.)
p. 75
SITE2016-54
Can AI solve the trolley problem?
Yuko Murakami (Tohoku U)
pp. 77 - 80
SITE2016-55
Effect of Country-of-origin Image on the Perception of Foreign Online Stores
Vanessa Bracamonte, Hitoshi Okada (NII)
pp. 81 - 84
SITE2016-56
Privacy and the Freedom of Speech and Thought
-- Rethinking on Privacy as the basis of Free Speech and Thought --
Takushi Otani (Kibi International Univ.)
pp. 85 - 88
SITE2016-57
Data Output UI Specification Extraction using Differences of Texts in HTML Documents
Daisuke Tashiro, Ryota Mibe (Hitachi)
pp. 89 - 94
SITE2016-58
Work element estimation in warehouse work probe system
Toshimasa Aso, Hisayuki Kurokawa (Tokyo Univ. of Marine Science and Technology), Shikato Kamimura (Josai Univ.)
pp. 95 - 100
SITE2016-59
Design of Excess Inventory Monitoring Tool for Manufacturing
Naoaki Yokoi (Hitachi)
pp. 101 - 106
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.