Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BioX, ITE-ME, ITE-IST [detail] |
2019-06-07 13:30 |
Ishikawa |
Kanazawa University |
Verification of Residual Fingerprint in Grasping and Proposal on Use of Less Residual Finger Parts for Authentication Nobuyuki Nishiuchi, Yukino Kitaguchi (TMU) BioX2019-2 |
Fingerprint authentication is used in various situations, and is currently the leading method in biometrics. However, du... [more] |
BioX2019-2 pp.51-53 |
IA, SITE, IPSJ-IOT [detail] |
2019-03-08 10:45 |
Tokushima |
Grand XIV Naruto |
Development and evaluation of human friendly sandbox environment using virtual desktop to provide security and usability Kazuyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ.) SITE2018-81 IA2018-73 |
Sandboxed environment is widely used in computers to protect secret information from Marware. On the other hand, users m... [more] |
SITE2018-81 IA2018-73 pp.253-258 |
KBSE |
2019-03-02 10:00 |
Kyoto |
Doshisha University Kambaikan |
Effectiveness and efficiency evaluation based on operation logs of learned Web site Ryota Aoki, Shinpei Ogata, Kozo Okano (Shinshu Univ) KBSE2018-64 |
Web usability in business applications is crucial for enhancing productivity.
We have proposed an evaluation framework ... [more] |
KBSE2018-64 pp.63-68 |
IA, IN (Joint) |
2017-12-14 14:45 |
Hiroshima |
Hiroshima City Univ. |
A Study on WebQoE Improvement by Estimating Appropriate Transmission Rate for IEEE802.11g Wireless LAN Maya Tabuchi, Yoshihiro Ito (Nagoya Institute of Technology) IA2017-58 |
This paper proposes a method of estimating the most appropriate transmission rate of an IEEE 802.11g wireless LAN based ... [more] |
IA2017-58 pp.31-35 |
CQ (2nd) |
2017-08-27 13:50 |
Saitama |
Nippon Institute of Technology |
[Poster Presentation]
Estimation of user interface pattern using features in brain activity Mami Kitabata, Yasuhiro Inazumi, Tadanobu Misawa, Yuukou Horita (Univ. of Toyama), Osamu Sugimoto, Sei Naito (KDDI Research, Inc.) |
Heretofore, a subjective evaluation was used for evaluating the usability of a user interface (UI) such as a smartphone.... [more] |
|
CQ |
2017-07-27 13:50 |
Hyogo |
Kobe University |
Estimation of user interface by feature quantity of brain activity using NIRS Mami Kitabata, Yasuhiro Inazumi, Tadanobu Misawa, Yuukou Horita (Univ. of Toyama), Osamu Sugimoto, Sei Naito (KDDI Research, Inc.) CQ2017-37 |
When a user operates a smartphone, it is important to know usability. However, usability studies have relied on subjecti... [more] |
CQ2017-37 pp.49-54 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:20 |
Tokyo |
|
Considering Usability in the Discussions about Central Bank Issued Digital Currency Vanessa Bracamonte, Hitoshi Okada (NII) ISEC2017-25 SITE2017-17 ICSS2017-24 EMM2017-28 |
The use of blockchain technology has the potential to achieve virtual currency with characteristics similar to cash, suc... [more] |
ISEC2017-25 SITE2017-17 ICSS2017-24 EMM2017-28 pp.131-133 |
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2017-02-20 14:30 |
Hokkaido |
Hokkaido Univ. |
A Note on a Retrieval Method Using Hierarchical Structure of Web Video Groups
-- Effectiveness Evaluation through a Visualization Interface -- Daichi Takehara, Ryosuke Harakawa, Takahiro Ogawa, Miki Haseyama (Hokkaido Univ.) |
We have previously proposed a Web video retrieval method using hierarchical structure of Web video groups, which are set... [more] |
|
HCGSYMPO (2nd) |
2016-12-07 - 2016-12-09 |
Kochi |
Kochi City Culture Plaza (CUL-PORT) |
Complementary effect by Pair testing in behavior analysis Yukako Kawano, Noboru Nakamichi, Masayuki Tsuda (Fukuyama Univ.) |
Evaluation results by subjective evaluation method in usability test is depends on a participant's memory.
Therefore th... [more] |
|
HCGSYMPO (2nd) |
2016-12-07 - 2016-12-09 |
Kochi |
Kochi City Culture Plaza (CUL-PORT) |
Development and Utilization of Web Accessibility Automatic Analysis Software Hiroto Morokuma (UED inc), Atsushi Yamakura (UED inc.) |
The Act for Eliminating Discrimination against Persons with Disabilities which came into force in April 2016 requires ac... [more] |
|
HCS |
2016-08-20 16:40 |
Kyoto |
|
Development and Evaluation of Tsunami Evacuation Training Mobile Application "Nige-Tore"
-- A Case Study of Tsunami Evacuation Drill in Sakai City, Osaka Prefecture -- Takashi Sugiyama, Fuhsing Lee, Yingying Sun, Katsuya Yamori (Kyoto Univ.), Shingo Suzuki (NIED), Takahiro Nishino (R2 Media Solution), Kenshin Urabe (GK Kyoto) HCS2016-51 |
After the Great East Japan Earthquake, the needs of Tsunami evacuation drill has been increasing and a mobile applicatio... [more] |
HCS2016-51 pp.115-120 |
WIT |
2016-03-05 11:00 |
Ibaraki |
Tusukuba Univ. of Tech.(Tsukuba) |
Development and Evaluation of Restaurants Search System to Eliminate Barriers of Wheelchair Users Ayu Kato, Shoko Soma, Takayuki Watanabe (TWCU) WIT2015-101 |
We have developed a restaurant search system for wheelchair users and examined its effectiveness. At first, we carried o... [more] |
WIT2015-101 pp.71-76 |
KBSE |
2016-03-04 10:50 |
Oita |
|
A Support Method for Evaluating Usability with User-Operation Logs at Requirements Analysis Yugo Goto, Shinpei Ogata, Kozo Okano (Shinshu Univ.) KBSE2015-59 |
Usability of user error protection and operability is especially important to enterprise Web application, then one of th... [more] |
KBSE2015-59 pp.63-68 |
IA |
2015-11-12 14:10 |
Chiba |
NARITA VIEW HOTEL |
An Investigation of Security, Privacy, and Usability Issues of Personal Health Record Systems Phuwanai Thummavet, Sangsuree Vasupongayya, Sinchai Kamolphiwong (Prince of Songkla Univ.) IA2015-48 |
Personal Health Record (PHR) was recently introduced as an alternative approach to storing and sharing personal health i... [more] |
IA2015-48 pp.59-64 |
ICD, IE, VLD, IPSJ-SLDM [detail] |
2015-10-26 13:50 |
Miyagi |
|
[Invited Talk]
Human pattern recognition and humanics security Masakatsu Nishigaki (Shizuoka Univ.) VLD2015-28 ICD2015-41 IE2015-63 |
It is very important to achieve the security of ICT systems. As everybody knows, however, security and usability is trad... [more] |
VLD2015-28 ICD2015-41 IE2015-63 p.11 |
IN |
2015-10-15 15:20 |
Osaka |
Osaka University |
A Study of an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-55 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
IN2015-55 pp.13-18 |
KBSE |
2015-09-25 11:15 |
Osaka |
Bldg.A No.110, IST, Suita campus, Osaka University |
Towards Separation of Concerns in Screen Transition Modeling
-- Case of Business and Usability Features -- Shinpei Ogata, Shohei Kamimori (Shinshu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Kozo Okano (Shinshu Univ.) KBSE2015-33 |
For requirements analysis in business Web application development employing model driven development approaches, an appr... [more] |
KBSE2015-33 pp.33-38 |
MBE, NC (Joint) |
2015-07-18 15:00 |
Tokushima |
The University of Tokushima |
Usability Evaluation for Grip of Hammer Kiyoko Yokoyama, Reiji Yasui (Nagoya City Univ.), Kiyohisa Nishiyama (Nagoya Univ.), Michirou Fujiyama, Tatsuhiro Maeda (Maeda Shell Service Co.) MBE2015-22 |
Grip is one of the general operation interface of tools, devices, sporting goods and etc. The aim of this study are 1) t... [more] |
MBE2015-22 pp.13-18 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Usability Evaluation of Multi-Touch Actions Considering the Structure of Hand-Fingers and Its Constraints on Movement Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (OECU), Noboru Babaguchi (Osaka Univ.) EMM2014-93 |
In this paper, we evaluate the usability of multi-touch actions, which are actions using several fingers, in order to f... [more] |
EMM2014-93 pp.97-102 |
LOIS |
2015-03-05 15:40 |
Okinawa |
|
Resource search support method focusing on the task coherence Shota Maekawa, Yoshihiro Nakamura (Nihon Uni) LOIS2014-75 |
We are in the daily life, and apps, WEB pages, files, such as communication tools, are using a number of resources. Howe... [more] |
LOIS2014-75 pp.83-88 |