Mon, Nov 7 PM 13:00 - 14:15 |
(1) |
13:00-13:25 |
"Duration of Riken-no-ken (view from a distance)", about the system and ethics |
Tetsuya Morizumi (KU) |
(2) |
13:25-13:50 |
Institutional Matters on the Access and Storage of One's Own Fostering Records
-- Some agenda for the records management beneficial to Care Leavers -- |
Akiyoshi Kabeya (Chiba Univ.) |
(3) |
13:50-14:15 |
An essay on evaluation of quality and value of information
-- Proposal of quali-informatics in the age of yotta byte scale -- |
Mariko Nihei, Hiroaki Muraoka (Tohoku Univ.) |
|
14:15-14:30 |
Break ( 15 min. ) |
Mon, Nov 7 PM 14:30 - 16:10 |
(4) |
14:30-14:55 |
Applications of Card-Based Cryptography to Education |
Takaaki Mizuki (Tohoku Univ.) |
(5) |
14:55-15:20 |
Factorization of Composite Numbers having a Prime of Special Form with Elliptic Curve Method |
Masaaki Shirase (FUN) |
(6) |
15:20-15:45 |
Sequential Hashing with Minimum Padding |
Shoichi Hirose (Fukui Univ.) |
(7) |
15:45-16:10 |
Application of the Method for Similarity Search of Time-Series Data to User Authentication |
Satoshi Hiraiwa, Masahiro Mambo (Kanazawa Univ.) |
|
16:10-16:25 |
Break ( 15 min. ) |
Mon, Nov 7 PM 16:25 - 17:40 |
(8) |
16:25-16:50 |
Study of Comprehensive Emergency Management Support System
-- Application to Emergency Management of Cyber-attack -- |
Naoko Kosaka, Koji Kishi, Tsuneko Kura, Yuji Maeda (NTT) |
(9) |
16:50-17:15 |
A Study of Voice Guidance for Visually Impaired People by Portable Terminal |
Tatsuaki Ito, Yukihiro Nakamura, Masafumi Suzuki, Misa Hirao, Nobukatsu Hojo, Manabu Okamoto, Hirohisa Tezuka (NTT) |
(10) |
17:15-17:40 |
Proposal of Vocabulary Foundation for Construction of Tourism Ontology |
Toshitaka Maki, Kazuki Takahashi, Toshihiko Wakahara, Akihiro Yamaguchi (FIT), Akihisa Kodate (Tsuda), Toru Kobayashi (Nagasaki Univ), Noboru Sonehara (NII) |
Tue, Nov 8 AM 10:00 - 11:15 |
(11) |
10:00-10:25 |
Risks of approval in the SNS using the OAuth authentication |
Tatsuzi Yoshida, Yoshiaki Seki (Tokyo City Univ) |
(12) |
10:25-10:50 |
An Evaluation of the System to Identify the Measured Person using Bio-Signal |
Haruka Suzuki, Gen Takahashi, Kaori Fujimura, Toru Nakamura, Yukiyoshi Ota (NTT) |
(13) |
10:50-11:15 |
An Efficient Decryption Control Method for the Smart Device Manegement System with Functional Encryption |
Sakurako Tamura, Makiko Aoyagi, Sakae Chikara, Hiroaki Isaka (NTT) |
|
11:15-11:30 |
Break ( 15 min. ) |
Tue, Nov 8 11:30 - 12:30 |
(14) |
11:30-12:30 |
[Invited Talk]
Threat of Electromagnetic Information Leakage and Countermeasures |
Yu-ichi Hayashi (Tohoku Gakuin Univ.) |
|
12:30-13:30 |
Lunch Break ( 60 min. ) |
Tue, Nov 8 PM 13:30 - 14:45 |
(15) |
13:30-13:55 |
Can AI solve the trolley problem? |
Yuko Murakami (Tohoku U) |
(16) |
13:55-14:20 |
Effect of Country-of-origin Image on the Perception of Foreign Online Stores |
Vanessa Bracamonte, Hitoshi Okada (NII) |
(17) |
14:20-14:45 |
Privacy and the Freedom of Speech and Thought
-- Rethinking on Privacy as the basis of Free Speech and Thought -- |
Takushi Otani (Kibi International Univ.) |
|
14:45-15:00 |
Break ( 15 min. ) |
Tue, Nov 8 PM 15:00 - 16:15 |
(18) |
15:00-15:25 |
Data Output UI Specification Extraction using Differences of Texts in HTML Documents |
Daisuke Tashiro, Ryota Mibe (Hitachi) |
(19) |
15:25-15:50 |
Work element estimation in warehouse work probe system |
Toshimasa Aso, Hisayuki Kurokawa (Tokyo Univ. of Marine Science and Technology), Shikato Kamimura (Josai Univ.) |
(20) |
15:50-16:15 |
Design of Excess Inventory Monitoring Tool for Manufacturing |
Naoaki Yokoi (Hitachi) |