Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS |
2005-05-12 13:30 |
Kagawa |
Sunport Hall Takamatsu |
A Method of Synchronizing Voice Data with the Corresponding Texts Automatically and Results of Experiments with It Norihisa Inokura, Yukio Rikiso (Univ. of Hyogo) |
The digital talking books that comply with the
international standard DAISY specification are
less popular than trad... [more] |
OIS2005-1 pp.1-6 |
LOIS |
2005-05-12 14:00 |
Kagawa |
Sunport Hall Takamatsu |
A study on characteristics of keystroke dynamics and application to person authentication Yuki Kurahashi, Kazuya Yokoyama, Naohisa Komatsu (Waseda Univ.) |
keystroke based individual authentication algorithms realizes a simple individual authentication system, which is not a ... [more] |
OIS2005-2 pp.7-12 |
LOIS |
2005-05-12 14:30 |
Kagawa |
Sunport Hall Takamatsu |
Consideration of the contents construction technique to reflect the factors of sensitivity
-- To consider semantic content and time concept -- Yumi Tomioka, Kota Hidaka (NTT), Shinya Nakajima (NTT-IT), Norihiko Matsuura, Hisashi Ibaraki (NTT) |
[more] |
OIS2005-3 pp.13-18 |
LOIS |
2005-05-12 15:15 |
Kagawa |
Sunport Hall Takamatsu |
A method to control remote PC by cellular phone and its implementation Yasuyuki Mizuura (Univ. of Tokushima), Naoto Sone (Naruto Univ, of Edu.), Masami Mohri (Univ. of Tokushima), Masakatu Morii (Kobe Univ.) |
The remote access method is researched actively. It is the access control method to control the remotePC through the net... [more] |
OIS2005-4 pp.19-24 |
LOIS |
2005-05-12 15:45 |
Kagawa |
Sunport Hall Takamatsu |
* Toshiharu Morizumi, Goro Inomae, Hisashi Matsukawa, Norihiko Matsuura, Hisashi Ibaraki (NTT) |
[more] |
OIS2005-5 pp.25-30 |
LOIS |
2005-05-12 16:15 |
Kagawa |
Sunport Hall Takamatsu |
A study of browsing method using one-dimensional operation device Kenya Suzuki, Daisuke Takigawa, Takashi Hosobuchi, Hisashi Ibaraki (NTT) |
The browsing style of multimedia content by using an appliance becomes popular. However, only the limited resource (inpu... [more] |
OIS2005-6 pp.31-36 |
LOIS |
2005-05-13 09:00 |
Kagawa |
Sunport Hall Takamatsu |
Design and implementation of the system for supporting computer virus analysis Sachihiro Ichikawa (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.) |
This paper presents a design and implementation of automatic virus analysis support system. Shortening of virus analysis... [more] |
OIS2005-7 pp.1-6 |
LOIS |
2005-05-13 09:30 |
Kagawa |
Sunport Hall Takamatsu |
On constructing the virtual virus simulation system to analyze spreading and infection on wide network Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Naoto Sone (Naruto Univ. of Edu.), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.) |
This paper presents a simulator to analyze behavior of virus, such as spreading and infection, on wide network. Network ... [more] |
OIS2005-8 pp.7-11 |
LOIS |
2005-05-13 10:00 |
Kagawa |
Sunport Hall Takamatsu |
Definition and its description method of virtual virus for P2P type simulation system Atsuko Imose (The Univ. of Tokushima), Naoto Sone (Naruto Univ, of Edu.), Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.) |
It is important to know the behavior of computer virus on network from the point of view of Anti-Virus in order to keep ... [more] |
OIS2005-9 pp.13-18 |
LOIS |
2005-05-13 10:40 |
Kagawa |
Sunport Hall Takamatsu |
Proposal for Memorycard Secure FileSystem SAS Jun Kawashima, Nobuo Funabiki, Toru Nakanishi (Okayama Univ.), Junichi Takeuchi, Masayuki Ishizaki, Andre Caldas de Souza (Ba-Z Communication) |
Memorycard has weakness in assuring the safety of stored data when it is stolen or missing. Therefore, a secure filesyst... [more] |
OIS2005-10 pp.19-24 |
LOIS |
2005-05-13 11:10 |
Kagawa |
Sunport Hall Takamatsu |
A construction method for generalized extended codes, and its best codes Zheyu Li, Masami Mohri (The Univ. of Tokushima), Masakatu Morii (Kobe Univ.) |
[more] |
OIS2005-11 pp.25-30 |