Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 10:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Study of keyword-based search method for IoT devices deployed at important facilities Mami Kawaguchi, Takayuki Sasaki, Kihara Momoka, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2023-86 |
IoT devices are increasingly deployed in various systems, including remote monitoring systems.Some of these IoT devices ... [more] |
ICSS2023-86 pp.123-128 |
NLC |
2023-09-07 10:20 |
Osaka |
Osaka Metropolitan University. Nakamozu Campus. (Primary: On-site, Secondary: Online) |
An Investigation of Suggested Keywords Generation Method for Search Behavior Analysis Using Large-Scale Language Model Yumeto Inaoka (Faber Company), Mitsuo Yoshida (Univ. Tsukuba) NLC2023-9 |
In content marketing, it is vital to produce beneficial content that fits with customer needs by utilizing the knowledge... [more] |
NLC2023-9 pp.47-50 |
ICTSSL |
2023-07-28 11:15 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Characteristic Analysis of Traffic Disruption Tweets Posted During Severe Snowfalls Toshihiro Rokuse, Keisuke Utsu, Osamu Uchida (Tokai Univ.) ICTSSL2023-22 |
Rapid and accurate information gathering and dissemination is essential to minimize damage in a large-scale disaster. Ag... [more] |
ICTSSL2023-22 pp.47-52 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
A Generic Construction of Outsider Anonymous Broadcast Encryption with Keyword Search Keita Emura (NICT), Kaisei Kajita, Go Ohtake (NHK) ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 |
Broadcast encryption with keyword search (BEKS) has been proposed (Attrapadung et al. at ASIACRYPT 2006/Chatterjee-Mukhe... [more] |
ISEC2023-22 SITE2023-16 BioX2023-25 HWS2023-22 ICSS2023-19 EMM2023-22 pp.52-59 |
IMQ, IE, MVE, CQ (Joint) [detail] |
2023-03-15 14:40 |
Okinawa |
Okinawaken Seinenkaikan (Naha-shi) (Primary: On-site, Secondary: Online) |
Development and Evaluation of a Tourist Information Recommendation System using Gaze Information Taiga Mori, Mitsuho Yamada (Tokai Univ.), Eriko Ishii (Kagoshima Prefectural College), Yuko Hoshino (Tokai Univ.) IMQ2022-45 IE2022-122 MVE2022-75 |
In recent years, the demand for recommendation systems has increased as more people gather information from web recommen... [more] |
IMQ2022-45 IE2022-122 MVE2022-75 pp.131-136 |
RCC, ISEC, IT, WBS |
2023-03-14 15:20 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Attribute-based encryption with keyword search Kotaro Amemiya, Toi Tomita, Junji Shikata (Yokohama National Univ.) IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 |
In this paper, we propose Attribute-Based Searchable Encryption (ABPEKS), which combines the functions of Public key Enc... [more] |
IT2022-94 ISEC2022-73 WBS2022-91 RCC2022-91 pp.163-170 |
ET |
2023-03-15 13:35 |
Tokushima |
Tokushima University (Primary: On-site, Secondary: Online) |
A Practical Evaluation of Visualization and Sharing Tools to Promote Structured Reading and Cross-Referencing in a Learning Community Hideo Funaoi (Soka Univ.), Shoko Matsumine (Koshoku Library of Chikuma City), Yoshihiko Kubota (Tamagawa Univ.), Hideyuki Suzuki (Ibaraki Univ.) ET2022-87 |
In recent years, an increasing number of students do not try to study individual classes in depth and stop only at earni... [more] |
ET2022-87 pp.172-177 |
AI |
2022-12-21 15:50 |
Fukuoka |
|
Generating Student Progress Reports in Cram School Based on Keywords Shumpei Kobashi, Tsunenori Mine (Kyushu Univ) AI2022-44 |
In many cram schools, instructors write reports on students' progress after each class. The generation of these reports ... [more] |
AI2022-44 pp.62-67 |
NLC |
2022-09-13 13:20 |
Kanagawa |
Keio Univ. Yagami Campus. (Primary: On-site, Secondary: Online) |
Estimation of related keywords based on distributed representation of words and semantic vector operations Osamu Segawa (Chubu Electric Power), Kazuhiko Murakami (Chuden CTI) NLC2022-4 |
Formerly, in a text-mining task, several methods based on distribution of words using co-occurrence in observation windo... [more] |
NLC2022-4 pp.1-4 |
NLC |
2022-09-13 13:45 |
Kanagawa |
Keio Univ. Yagami Campus. (Primary: On-site, Secondary: Online) |
A study on keyword extraction based on phrase-level context information acquisition Yumeto Inaoka (Faber Company), Mitsuo Yoshida (Univ. of Tsukuba) NLC2022-5 |
We study a method for extracting words and phrases that belong to the desired class (e.g. magazine name) as keywords fro... [more] |
NLC2022-5 pp.5-8 |
NLC |
2022-03-07 16:15 |
Online |
Online |
Program Information Extraction Using Gradient Boosting Hiroki Tanioka (Tokushima Univ.), Kenji Taniwaki (PLAT WORKS Corp.) NLC2021-37 |
Although video distribution services using the Internet have been launched one after another, the authors currently perf... [more] |
NLC2021-37 pp.54-55 |
LOIS |
2022-03-03 17:05 |
Online |
Online |
A Study of Features for Estimating Attitude of Participation in Discussion from Audio and Video Tsubasa Kanaoka, Sunao Hara, Masanobu Abe (Okayama Univ.) LOIS2021-49 |
The purpose of this report is to detect students who have poor engagement in class discussions.
In this paper, we recor... [more] |
LOIS2021-49 pp.57-62 |
AI |
2020-12-10 15:00 |
Shizuoka |
Online and HAMAMATSU ACT CITY (Primary: On-site, Secondary: Online) |
Realizing a Paper Title Generation System Using BERT for Keyword Extraction and Title Evaluation Kento Kaku, Tadachika Ozono, Toramatsu Shintani (NITech) AI2020-4 |
It is necessary to create a system that proposes appropriate titles in order to support the creation of titles that accu... [more] |
AI2020-4 pp.19-24 |
IN |
2020-01-23 13:50 |
Aichi |
WINC AICHI |
Manga Feature Tag Extraction from Reviews on the Web for e-Book Search Kazuya Murao, Komei Arasawa, Shun Hattori (Muroran Inst. of Tech.) IN2019-65 |
In recent years, the digitization of books has progressed, and the number of Web sites for selling e-book comics has inc... [more] |
IN2019-65 pp.1-6 |
EA, SIP, SP |
2019-03-15 13:30 |
Nagasaki |
i+Land nagasaki (Nagasaki-shi) |
[Poster Presentation]
Simultaneous Japanese Flexible-Keyword Detection and Speaker Recognition for Low-Resource Devices Hiroshi Fujimura (TOSHIBA) EA2018-157 SIP2018-163 SP2018-119 |
We propose a novel method of simultaneous keyword detection and speaker recognition for low resource devices in this stu... [more] |
EA2018-157 SIP2018-163 SP2018-119 pp.341-346 |
EMM |
2017-11-07 10:25 |
Kagoshima |
Kagoshima Univ. (Inamori Academy) |
A Simple Analysis on Data about EMM Technical Reports
-- from May 2011 to March 2017 -- Hirohisa Hioki (Kyoto Univ.) EMM2017-62 |
This report presents several results on analyses about presentations given at EMM technical group during the period from... [more] |
EMM2017-62 pp.39-44 |
DE |
2017-06-24 10:20 |
Tokyo |
|
Identification of keywords using Japanese wikipedia article Arashi noto, Nobuyuki Takahashi (FUN) DE2017-10 |
This paper describes how to make “mean tree” in use keywords that is extracted from Japanese wikipdia articles. In this ... [more] |
DE2017-10 pp.37-40 |
ET |
2017-05-27 13:45 |
Tokyo |
Soka Univ. |
Development and Practice of a Keyword-based e-portfolio System to Deepen Understanding of Learning Contents Through Association and Review Activities Kazumi Miyata (Tokyo Inst. of Tech.), Hideo Funaoi (Soka univ.), Masao Murota (Tokyo Inst. of Tech.) ET2017-6 |
Students are required to improve "bachelor's abilities". "Knowledge and understanding" are basic compornents of such abi... [more] |
ET2017-6 pp.31-36 |
ET |
2017-05-27 15:40 |
Tokyo |
Soka Univ. |
Automated Scoring of Short Written Answers
-- Backscratch -- Kimito Yanagi, Sumiyo Nishiguchi, Hiroki Watanabe (TUS) ET2017-10 |
Abstract Moodle has an automated scoring function, but it often regards the right answer as the wrong one. We need a p... [more] |
ET2017-10 pp.51-53 |
ISEC |
2017-05-12 10:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fully Secure Oblivious Keyword Search Kaoru Kurosawa, Yuuki Nemoto (Ibaraki Univ.) ISEC2017-2 |
Oblivious keyword search (OKS) is a secure two party protocol such that the server has ( Data={(x_i,m_i)} ), and the cli... [more] |
ISEC2017-2 pp.7-14 |