Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NC, MBE (Joint) |
2021-03-04 14:10 |
Online |
Online |
What characteristics are acquired in coding self-motion from visual motion?
-- Reconstruction of statistical relationship by neural network and its internal representation -- Daiki Nakamura, Hiroaki Gomi (NTT) NC2020-57 |
Efficient coding is a prevailing computational models of sensory coding in the brain. If the sensory information is tran... [more] |
NC2020-57 pp.83-88 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2015-12-03 10:50 |
Nagasaki |
Nagasaki Kinro Fukushi Kaikan |
Cache Energy Reduction by Switching between L1 High Power and Low Power Cache under DVFS Environment Kaoru Saito, Ryotaro Kobayashi (Toyohashi Univ of Tech), Hajime Shimada (Nagoya Univ.) CPSY2015-72 |
Current CPU utilizes cache memory for decreasing an access speed gap between CPU and main memory.
But the cache occupie... [more] |
CPSY2015-72 pp.63-68 |
EMM, IT |
2015-05-22 10:00 |
Kyoto |
Kyoto International Community House |
On the Computational Complexity of Information Flow Problem with Hierarchy Constraint Yuki Takeda, Yuichi Kaji, Minoru Ito (NAIST) IT2015-11 EMM2015-11 |
An information flow problem discusses how to distribute information over a complicated network. It is known that the te... [more] |
IT2015-11 EMM2015-11 pp.57-62 |
ISEC, IT, WBS |
2015-03-02 14:05 |
Fukuoka |
The University of Kitakyushu |
On the Limit of Security Proof for Homomorphic Encryption Daiki Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2014-67 ISEC2014-80 WBS2014-59 |
In this paper, we explore on the limitation of security proofs for homomorphic encryptions.
We consider the computation... [more] |
IT2014-67 ISEC2014-80 WBS2014-59 pp.33-38 |
NS, CS, IN (Joint) |
2013-09-12 10:45 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Proposal of a Method for Building Virtual OpenFlow Networks on Wide-Area Physical Networks Hiroaki Yamanaka, Eiji Kawai, Shuji Ishii, Shinji Shimojo (NICT) NS2013-72 |
Multi-tenancy in software defined networking (SDN) environment (e.g.OpenFlow) enables to accommodate networks customized... [more] |
NS2013-72 pp.7-12 |
PN |
2013-08-08 13:50 |
Hokkaido |
Hokkaido University |
Analyzing the evolution of the Internet topology from a hierarchical flow perspective Yu Nakata, Shin'ichi Arakawa, Masayuki Murata (Osaka Univ.) PN2013-10 |
The scale of topology in the Internet is becoming larger corresponding to increase of traffic demand. Understanding how ... [more] |
PN2013-10 pp.13-18 |
ICD |
2012-12-18 09:30 |
Tokyo |
Tokyo Tech Front |
A Hardware-Implementation-Friendly Algorithm Based on Hierarchical Models for Real-Time Human Action Recognition Kazumi Fukuda, Tadashi Shibata (Univ. of Tokyo) ICD2012-113 |
Naturally modeling the hierarchy and shared features of human actions such as running and jumping, we present a hardware... [more] |
ICD2012-113 pp.85-90 |
ICD, IPSJ-ARC |
2012-01-19 16:20 |
Tokyo |
|
[Panel Discussion]
Challenges and Opportunities for Normally-Off Computing Hiroshi Nakamura (Univ. of Tokyo) ICD2011-138 |
Computer systems are utilized almost everywhere in the world and further contribution of these systems to our society is... [more] |
ICD2011-138 p.35 |
ICD |
2005-12-15 15:15 |
Kochi |
|
Evaluation of energy consumption for High-Performance / Low-Leakage Caches based on Always Active line Reiko Komiya (Fukuoka Univ.), Koji Inoue, Kazuaki Murakami (Kyushu Univ.) |
So far we proposed a cache management technique to alleviate the negative effect of low-leakage caches. This technique m... [more] |
ICD2005-189 pp.37-42 |