|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SC |
2015-03-27 15:55 |
Fukushima |
Aizu Univ. |
A method to bridge non-functional requirements and service design Sayaka Izukura, Shigeru Hosono, Hiroshi Sakaki, Eriko Numata (NEC) SC2014-27 |
[more] |
SC2014-27 pp.77-82 |
SC |
2014-05-23 14:10 |
Tokyo |
National Institute of Informatics |
A Method for System Design Supporting in Cloud Environments Sayaka Izukura, Kazuo Yanoo, Hiroshi Sakaki, Masato Kawatsu (NEC) SC2014-3 |
As for the service and system development on the cloud environments, it is relatively easy to change the system configur... [more] |
SC2014-3 pp.11-16 |
ISEC, LOIS |
2005-11-15 10:05 |
Fukuoka |
Kitakyushu Science and Research Park |
An Information Leakage Risk Evaluation Method Based n ecurity Configuration Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa, Itaru Hosomi (NEC) |
[more] |
ISEC2005-100 OIS2005-63 pp.15-22 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|