|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2020-03-06 15:30 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
A Cache Placement and Replacement Algorithm for Information-Centric Networks Ryohei Sato, Hidetoshi Kawaguchi, Yuichi Nakatani (NTT) NS2019-257 |
[more] |
NS2019-257 pp.455-460 |
NS, NWS (Joint) |
2020-01-23 14:20 |
Okinawa |
|
Application of machine learning in IDS/IPS signature classification Hidetoshi Kawaguchi, Yuichi Nakatani (NTT) NS2019-163 |
[more] |
NS2019-163 pp.13-18 |
IN, NS (Joint) |
2019-03-05 11:30 |
Okinawa |
Okinawa Convention Center |
A study on Maliciousness Measurement in Cyber Threat Intelligence Using Graph Convolutional Networks Yuta Kazato, Yoshihide Nakagawa, Yuichi Nakatani (NTT) IN2018-128 |
Cyber threat information (CTI) sharing is one of the important functions to protect end-users and services from cyber-at... [more] |
IN2018-128 pp.265-270 |
IA, IN (Joint) |
2017-12-15 14:10 |
Hiroshima |
Hiroshima City Univ. |
A study of gini importance-based header feature selection methods for cyber attack detection Yuta Kazato, Yuichi Nakatani, Takeshi Okamoto, Akira Shibata (NTT) IN2017-61 |
Growing the expansion of network services and IoT devices, the risk of cyber attacks is increased by high-frequency and ... [more] |
IN2017-61 pp.91-96 |
PRMU |
2014-06-20 13:00 |
Tokyo |
|
Pupil contour detection from low resolution infrared images using intensity distribution around local maxima of edges Yuichi Nakata, Naoki Tanaka, Takashi Nagamatsu (Kobe Univ.) PRMU2014-31 |
Extraction of pupil position is used in many gaze-tracking system.There are, however, obstractive objects like an eyelid... [more] |
PRMU2014-31 pp.55-60 |
IN |
2014-04-17 13:00 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
Elastic and strict load balancing via consistent hashing Yuichi Nakatani, Hiroyuki Kurita, Naoki Takada, Takao Yamashita (NTT) IN2014-1 |
Load balancing is a key function constructing massively distributed systems. Stateful services like SIP and distributed ... [more] |
IN2014-1 pp.1-6 |
CS, IN, NS (Joint) |
2005-09-16 10:45 |
Miyagi |
Tohoku Univ. |
Proposal of a method for hiding classified information on blog Yuichi Nakatani, Tetsuro Tokunaga, Hitoshi Yamaguchi, Tadashi Itoh (NTT) |
Recently, the number of blog users increases rapidly, and blogs are expected to be new information-publish tools based o... [more] |
NS2005-90 IN2005-78 CS2005-36 pp.67-70(NS), pp.103-106(IN), pp.115-118(CS) |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|