Fri, Nov 6 AM 09:00 - 10:15 |
(1) |
09:00-09:25 |
Self Information Control as Identity Management
-- Practical Problems of "Identity" leading to Information Ethics -- |
Akiyoshi Kabeya (Chiba Univ.) |
(2) |
09:25-09:50 |
An approach to assess the risk of information leakage by inference
-- A pilot study of methods using a breadth first search in digraphs and mutual information -- |
Kazuhiro Suzuki, Shohei Kitamura, Noriki Hirai (Kochi Univ.) |
(3) |
09:50-10:15 |
A Pruning Method for the Decision Tree constructed on Run-Based Trie. |
Takashi Harada, Ken Tanaka (Kanagawa Univ.), Kenji Mikawa (Niigata Univ.) |
|
10:15-10:30 |
Break ( 15 min. ) |
Fri, Nov 6 AM 10:30 - 11:30 |
(4) |
10:30-11:30 |
[Invited Talk]
Design of Learning e-Portfolio System Based on User-centered design |
Rieko Inaba (Tsuda Coll.), Norimichi Kobayashi, Miho Mohri, Yasunori Motomoura (Kansai Univ.) |
|
11:30-12:45 |
Lunch Break ( 75 min. ) |
Fri, Nov 6 PM 12:45 - 13:45 |
(5) |
12:45-13:45 |
[Invited Talk]
Effective Utilization of Mobile Communication Technology for Life-Saving
-- State Emergency Wireless System -- |
Noriyoshi Sonetaka (ICPS) |
|
13:45-14:00 |
Break ( 15 min. ) |
Fri, Nov 6 PM 14:00 - 15:40 |
(6) |
14:00-14:25 |
The Problems of "Consent" in the Big Data Context |
Takushi Otani (Kibi International Univ.) |
(7) |
14:25-14:50 |
Social media guidelines for international students |
Daisuke Suzuki (Hokuriku Univ.) |
(8) |
14:50-15:15 |
Input UI Specification Recovery using Web Operation Monitoring |
Daisuke Tashiro, Katsuro Kikuchi, Ryota Mibe (Hitachi) |
(9) |
15:15-15:40 |
Proposal and Prototyping of a TV Content Providing System using Geolocation |
Chigusa Yamamura, Hisayuki Ohmata, Michihiro Uehara (NHK) |
|
15:40-15:55 |
Break ( 15 min. ) |
Fri, Nov 6 PM 15:55 - 17:35 |
(10) |
15:55-16:20 |
The threshold value design of recognition score considering the prior probability in a quiz speech recognition system |
Hiroyuki Nishi, Kimurra Yoshimasa, Kakinoki Toshio (Sojo Univ.) |
(11) |
16:20-16:45 |
A Feasibility Study of Autonomous Security Infrastructure in the Internet |
Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) |
(12) |
16:45-17:10 |
Reducing Authentication Time in Blacklistable Anonymous Credential System Using Accumulator |
Yuu Aikou, Toru Nakanishi (Hiroshima Univ) |
(13) |
17:10-17:35 |
Postpaid electronic money to keep privacy and its implementation |
Tatshuhiko Sukegawa, Mashu Sakai, Hikaru Morita (Kanagawa Univ.) |
Sat, Nov 7 AM 09:30 - 10:20 |
(14) |
09:30-09:55 |
An Additionable Type ToDo List which Can Support Daily Activities |
Noriaki Saito (NTT) |
(15) |
09:55-10:20 |
Evaluation of the Web System U-MOS for Supporting University Management Operation |
Satoshi Taoka (Hiroshima Univ.) |
|
10:20-10:30 |
Break ( 10 min. ) |
Sat, Nov 7 AM 10:30 - 11:45 |
(16) |
10:30-10:55 |
Encryption and decryption system of composite cellular automata |
Toshikazu Ishida (KSU) |
(17) |
10:55-11:20 |
Extension of NTRU Using Group Ring and Its Application |
Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) |
(18) |
11:20-11:45 |
A dynamic filtering method to reduce DDoS packets by using access tokens |
Ryota Suzuki, Hikaru Morita (Kanagawa Univ.) |