|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT |
2018-12-18 16:35 |
Fukushima |
Spa Resort Hawaiians |
[Invited Talk]
Construction and Decoding of Codes over Symbol-Pair Read Channels Masanori Hirotomo (Saga Univ.), Makoto Takita, Masakatu Morii (Kobe Univ.) IT2018-34 |
In this paper, we explain construction and decoding of codes over symbol-pair red channels. [more] |
IT2018-34 pp.19-24 |
ICSS |
2018-11-21 15:40 |
Kagoshima |
|
ICSS2018-58 |
(To be available after the conference date) [more] |
ICSS2018-58 pp.31-36 |
ICSS |
2018-11-22 10:25 |
Kagoshima |
|
ICSS2018-61 |
(To be available after the conference date) [more] |
ICSS2018-61 pp.45-48 |
ICSS |
2018-11-22 13:30 |
Kagoshima |
|
ICSS2018-64 |
(To be available after the conference date) [more] |
ICSS2018-64 pp.61-66 |
ICSS |
2018-11-22 14:45 |
Kagoshima |
|
ICSS2018-67 |
(To be available after the conference date) [more] |
ICSS2018-67 pp.79-84 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 12:10 |
Hokkaido |
Sapporo Convention Center |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 |
This paper addresses the problem of encrypted packet classification based on SSH encrypted network traffic. The objectiv... [more] |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 pp.305-310 |
ICSS, IA |
2018-06-25 13:00 |
Ehime |
Ehime University |
A Study on the structure and Its Classification Naoya Nitta, Masakatu Morii (Kobe Univ.) IA2018-1 ICSS2018-1 |
[more] |
IA2018-1 ICSS2018-1 pp.1-6 |
ICSS, IA |
2018-06-25 13:50 |
Ehime |
Ehime University |
Malware Classification Based on Data Compression Algorithm and Its Evaluation Sohei Takechi, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ) IA2018-3 ICSS2018-3 |
[more] |
IA2018-3 ICSS2018-3 pp.13-18 |
ICSS, IA |
2018-06-25 15:25 |
Ehime |
Ehime University |
The Existence of the QR Code Guiding to a Malicious Web Site and a Counterfeit Attack Using It Okuma Hiroya, Makoto Takita, Masakatu Morii (Kobe Univ.) IA2018-6 ICSS2018-6 |
(To be available after the conference date) [more] |
IA2018-6 ICSS2018-6 pp.33-38 |
ICSS, IA |
2018-06-25 15:50 |
Ehime |
Ehime University |
IA2018-7 ICSS2018-7 |
[more] |
IA2018-7 ICSS2018-7 pp.39-45 |
ICSS, IA |
2018-06-26 09:00 |
Ehime |
Ehime University |
IA2018-8 ICSS2018-8 |
(To be available after the conference date) [more] |
IA2018-8 ICSS2018-8 pp.47-54 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-64 |
[more] |
ICSS2017-64 pp.79-84 |
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-75 |
[more] |
ICSS2017-75 pp.145-150 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-76 |
[more] |
ICSS2017-76 pp.151-156 |
SIP, IT, RCS |
2018-01-23 16:25 |
Kagawa |
Sunport Hall Takamatsu |
Evaluation of Coded Caching Scheme in Multi-rate Wireless Network Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2017-102 SIP2017-110 RCS2017-316 |
The network load is increasing due to the spread of content distribution services.
Caching is known as a technique to r... [more] |
IT2017-102 SIP2017-110 RCS2017-316 pp.273-278 |
IA, IN (Joint) |
2017-12-14 15:10 |
Hiroshima |
Hiroshima City Univ. |
Implementation and Evaluation of Coded Caching by Network Simulator Tomoe Hatanaka, Makoto Takita, Hiroya Okuma, Masakatu Morii (Kobe Univ.) IN2017-52 |
[more] |
IN2017-52 pp.37-42 |
ICSS |
2017-11-21 09:30 |
Oita |
Beppu International Convention Center |
ICSS2017-42 |
[more] |
ICSS2017-42 pp.23-27 |
ICSS |
2017-11-21 10:55 |
Oita |
Beppu International Convention Center |
Subspecies Classification for Malwares based on Visualization of Dynamic Analysis result Taiki Gouda, Korehito Kashiki, Keisuke Furumoto, Masakatu Morii (Kobe Univ.) ICSS2017-45 |
Along with the activation of malware infection activity, the appearance frequency of new subspecies also tends to increa... [more] |
ICSS2017-45 pp.41-45 |
ICSS |
2017-11-21 11:20 |
Oita |
Beppu International Convention Center |
A Study on the structure and Its Classification Naoya Nitta, Masakatu Morii (Kobe Univ.) ICSS2017-46 |
[more] |
ICSS2017-46 pp.47-51 |
ICSS |
2017-11-21 14:00 |
Oita |
Beppu International Convention Center |
ICSS2017-50 |
[more] |
ICSS2017-50 pp.71-76 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|