Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS |
2024-07-11 13:38 |
Nagasaki |
Center for Tsushima engagement |
A study on the potential of pipeline-based background removal for low-latency video communication Yudai Harada, Yoshiyuki Oshima, Takeo Kurosawa (Tsukuba Univ.), Yoshiki Yamaguchi (Tukuba Univ./Kumamoto Univ.), Ryouhei Tsugami, Toshihito Fujiwara, Tatsuya Fukui, Satoshi Narikawa (NTT) |
[more] |
|
MI |
2019-07-06 11:55 |
Hokkaido |
Future Univ. Hakodate |
[Poster Presentation]
Basic study of left atrial appendage segmentation from cardiac CT images Itaru Takayashiki, Doi Akio, Toru Kato, Hiroki Takahashi (Iwate Prefectural Univ.), Shoto Sekimura (ISP), Maiko Hozawa, Yoshihiro Morino (Iwate Medical Univ.) MI2019-30 |
In this study, we propose a method to automatically extract the left atrial appendage region from the cardiac CT image f... [more] |
MI2019-30 pp.43-48 |
EID, ITE-IDY, IEIJ-SSL, SID-JC, IEE-EDD [detail] |
2018-01-26 10:10 |
Shizuoka |
Shizuoka Univ., Hamamatsu |
Prototype of transparent OLED lighting indicator Yukinobu Masuda, Shim Chang-Hoon, Ryutaro Sugawara (Kyushu Univ.), Masayuki Yahiro (ISIT), Reiji Hattori (Kyushu Univ.) |
[more] |
|
OME |
2017-12-01 14:20 |
Saga |
Sun Messe Tosu |
[Invited Talk]
Solution-processed organic-inorganic perovskite field-effect transistors with high carrier mobility Toshinori Matsushima, Atula S. D. Sandanayaka, Chuanjiang Qin (Kyushu Univ.), Takashi Fujihara (ISIT), Chihaya Adachi (Kyushu Univ.) OME2017-45 |
Organic-inorganic perovskites are extremely promising as the semiconductor in field-effect transistors because of their ... [more] |
OME2017-45 pp.49-51 |
ICSS, IPSJ-SPT |
2017-03-14 12:20 |
Nagasaki |
University of Nagasaki |
Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.) ICSS2016-69 |
In recent years, cyber attacks are in various ways, and we must detect as many kinds of attacks as possible. Therefore, ... [more] |
ICSS2016-69 pp.177-182 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE (Joint) [detail] |
2016-11-29 13:00 |
Osaka |
Ritsumeikan University, Osaka Ibaraki Campus |
[Invited Talk]
FPGA Development using HLS for Software Engineers Kenichiro Mitsuda, Hiroshi Owada, Shinji Yamamoto (ISP) RECONF2016-48 |
[more] |
RECONF2016-48 p.47 |
RECONF |
2016-09-05 14:35 |
Toyama |
Univ. of Toyama |
The effect of the C ++ template meta-programming in high-level synthesis Kenichiro Mitsuda, Owada Hiroshi, Shinji Yamamoto (ISP) RECONF2016-27 |
In this talk, we introduce technique of high level synthesis using C++ template meta-programming. [more] |
RECONF2016-27 pp.15-17 |
ISEC |
2016-09-02 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Homomorphic Encryption based on some kind of Indeterminate Equations Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43 |
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] |
ISEC2016-43 pp.27-34 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 13:50 |
Yamaguchi |
|
On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.) ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42 |
There are no known quantum algorithms, performed in polynomial time, for solving the section finding problem on algebrai... [more] |
ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42 pp.185-191 |
ICSS, IA |
2016-06-07 09:55 |
Saga |
Saga University |
Report on the 2016 Network and Distributed System Security Symposium Shinichi Matsumoto (ISIT), Daiki Chiba (NTT), Kuniyasu Suzaki (AIST), Mirang Park (Kanagawa Institute of Technology) IA2016-8 ICSS2016-8 |
[more] |
IA2016-8 ICSS2016-8 pp.39-44 |
IT, ISEC, WBS |
2016-03-11 11:15 |
Tokyo |
The University of Electro-Communications |
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117 |
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] |
IT2015-134 ISEC2015-93 WBS2015-117 pp.205-210 |
ICSS, IPSJ-SPT |
2016-03-03 15:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Current Status and Issues of the Application of AI Technology for Digital Forensics Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.) |
[more] |
|
HCGSYMPO (2nd) |
2015-12-16 - 2015-12-18 |
Toyama |
Toyama International Conference Center |
Monitoring of dining based on mastication pattern analysis Misato Kita (Graduate School of Future Univ. Hakodate), Toshio Kawashima (Future Univ. Hakodate), Yuishi Mitsudo (ISIT) |
The meal has a close relationship with health. Therefore, the record of the meal is recorded as an important information... [more] |
|
LOIS, ISEC, SITE |
2015-11-07 10:55 |
Kanagawa |
Kanagawa Univ. |
Extension of NTRU Using Group Ring and Its Application Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2015-52 SITE2015-39 LOIS2015-46 |
[more] |
ISEC2015-52 SITE2015-39 LOIS2015-46 pp.103-109 |
WIT |
2015-10-26 09:00 |
Yamaguchi |
Kawatana Grand Hotel |
A Questionnaire Survey on ICT Environment Used by Visually Impaired Yoshihiko Kimuro, Takafumi Ienaga (FIT), Akito Teraoka (ISIT), Seiji Okimoto (Fukuoka Special Needs Education School for the Visually Impaired) WIT2015-58 |
In the information society, understanding of the basic principles of information technology is one of the common sense.... [more] |
WIT2015-58 pp.39-44 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:15 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Attribute-Based Two-Tier Signatures Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more] |
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 pp.1-8 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-03 10:40 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Report on Workshop on Cybersecurity in a Post-Quantum World Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.) ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30 |
[more] |
ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30 pp.135-136 |
IA, ICSS |
2015-06-11 13:05 |
Fukuoka |
Kyushu Institute of Technology Univ. |
[Invited Talk]
Recent trends in multivariate cryptography Takanori Yasuda (ISIT) IA2015-1 ICSS2015-1 |
[more] |
IA2015-1 ICSS2015-1 pp.1-2 |
IA, ICSS |
2015-06-11 16:25 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Report on the 23rd USENIX Security Symposium Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8 |
[more] |
IA2015-8 ICSS2015-8 pp.39-44 |
IA, ICSS |
2015-06-12 11:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
A Report on International Conference NDSS2015 Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST) IA2015-12 ICSS2015-12 |
International conference NDSS (Network and Distributed System Security Symposium) is one of the top conference of inform... [more] |
IA2015-12 ICSS2015-12 pp.63-68 |