Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2017-06-08 13:00 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Study of a Load Equalization Method Using Phase Shift for Distributed Sensor Data Stream Delivery Tomoya Kawakami (NAIST), Yoshimasa Ishi, Tomoki Yoshihisa (Osaka Univ.), Yuuichi Teranishi (NICT/Osaka Univ.) IA2017-1 ICSS2017-1 |
(To be available after the conference date) [more] |
IA2017-1 ICSS2017-1 pp.1-6 |
IA, ICSS |
2017-06-08 13:25 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Development and evaluation of wild bird identification system using audio sensing and machine learning Takemi Morimatsu (Nagoya Univ.), Hiroshi Yamamoto (Ritsumeikan Univ.) IA2017-2 ICSS2017-2 |
In recent years, prevention of damage to fishing or agriculture caused by wild animals becomes an important problem. Var... [more] |
IA2017-2 ICSS2017-2 pp.7-12 |
IA, ICSS |
2017-06-08 13:50 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Development and evaluation of victim detection system using autonomous UAV flight based on beacon radio sensing Seiji Andon, Hiroshi Yamamoto (Ritsumeikan Univ.) IA2017-3 ICSS2017-3 |
[more] |
IA2017-3 ICSS2017-3 pp.13-18 |
IA, ICSS |
2017-06-08 14:25 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
A First Trend Review of Runtime Packers for IoT Malware Ryoichi Isawa (NICT), Ying Tie (YNU), Katsunari Yoshioka (YNU/NICT), Tao Ban, Daisuke Inoue (NICT) IA2017-4 ICSS2017-4 |
Malicious software (malware) specimens that infect IoT (Internet of Things) devices rapidly increase. If those specimens... [more] |
IA2017-4 ICSS2017-4 pp.19-24 |
IA, ICSS |
2017-06-08 14:50 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Study on Email address harvesting by free service Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5 |
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] |
IA2017-5 ICSS2017-5 pp.25-29 |
IA, ICSS |
2017-06-08 15:15 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Digital Contract Protocols using Blockchain Atsumu Mishima, Takashi Nishide (Tsukuba Univ.) IA2017-6 ICSS2017-6 |
(To be available after the conference date) [more] |
IA2017-6 ICSS2017-6 pp.31-35 |
IA, ICSS |
2017-06-08 15:40 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7 |
[more] |
IA2017-7 ICSS2017-7 pp.37-42 |
IA, ICSS |
2017-06-08 16:15 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Training simulator for creating list of victims at the disaster medical base Keijiro Okamura (Excite), Sato Fumiya, Fukumoto masahiro (Kochi Univ.of Tech) IA2017-8 ICSS2017-8 |
As one of the disaster planning, the disaster base hospital is announced as a gath-ering place for the people. As a plac... [more] |
IA2017-8 ICSS2017-8 pp.43-46 |
IA, ICSS |
2017-06-08 16:40 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Raspberry Guardian: Security Management for IoT Environment using Social Network Systems Hiroyuki Ohno, Yoshiaki Kitaguchi (Kanazawa Univ), Hironobu Suzuki (Senshu Univ) |
[more] |
|
IA, ICSS |
2017-06-09 09:30 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Analysis of First Meeting Time of Two Random Walkers toward Understanding Information Dissemination and Gathering with Mobile users Yusuke Sakumoto (Tokyo Metropolitan Univ.), Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2017-9 ICSS2017-9 |
In this paper, we derive the the first meeting time formula of random walkers toward understanding information dissemina... [more] |
IA2017-9 ICSS2017-9 pp.47-52 |
IA, ICSS |
2017-06-09 09:55 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
A Solution for Minimum Link Flow Problem with Sparse Modeling Ryotaro Matsuo, Ryo Nakamura, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2017-10 ICSS2017-10 |
In recent years, a statistical approach for estimating unobserved model parameters from a small number of measurements u... [more] |
IA2017-10 ICSS2017-10 pp.53-58 |
IA, ICSS |
2017-06-09 10:30 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
[Invited Talk]
Applying AI for Cyber Security Jun'ichi Takeuchi (Kyushu Univ./NICT) |
[more] |
|
IA, ICSS |
2017-06-09 11:10 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
[Invited Talk]
WarpDrive: Web-based Attack Response with Practical and Deployable Research InitiatiVE Akira Yamada (KDDI Research) IA2017-11 ICSS2017-11 |
[more] |
IA2017-11 ICSS2017-11 p.59 |