Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
COMP |
2019-12-13 14:35 |
Gunma |
Ikaho Seminar House, Gunma University |
On a formula for Boolean expressions of Conjunctive normal form and computational complexity Tomoya Machide (NII) COMP2019-37 |
An Boolean expression in conjunctive normal form, abbreviated as CNF, is used as a canonical normal form in Boolean logi... [more] |
COMP2019-37 pp.55-59 |
NS |
2019-04-19 13:00 |
Kagoshima |
Tenmonkan Vision Hall |
A Study on Network Monitoring Method using In-band Network Telemetry Takayuki Fujiwara, Masayuki Nishiki (NTT), Takashi Kurimoto, Shigeo Urushidani (NII) NS2019-15 |
In-band network telemetry (INT) is a method to monitor communication quality. INT is a technique of giving time stamp in... [more] |
NS2019-15 pp.85-90 |
EA, SIP, SP |
2019-03-14 13:30 |
Nagasaki |
i+Land nagasaki (Nagasaki-shi) |
[Poster Presentation]
Use and evaluation of Tacotron and context features in rakugo speech synthesis Shuhei Kato (SOKENDAI/NII), Shinji Takaki, Junichi Yamagishi (NII), Yusuke Yasuda (SOKENDAI/NII), Xin Wang (NII) EA2018-126 SIP2018-132 SP2018-88 |
We have been working on constructing rakugo (a traditional Japanese verbal entertainment) speech synthesis toward speech... [more] |
EA2018-126 SIP2018-132 SP2018-88 pp.161-166 |
IA |
2018-09-03 14:10 |
Hokkaido |
Hokkaido Univ. Conference Hall |
Collecting a large number of active IPv6 addresses Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2018-16 |
Due to wide deployment of IPv6, security issues in IPv6 network is becoming more and more important. Scanning all IP add... [more] |
IA2018-16 pp.1-8 |
IA |
2018-09-03 15:00 |
Hokkaido |
Hokkaido Univ. Conference Hall |
Network Log Template Generation from Open Source Software Yuya Yamashiro (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2018-18 |
System logs are commonly used for monitoring, recording, and managing systems in service. However there is no specific r... [more] |
IA2018-18 pp.15-22 |
NS |
2018-04-20 11:20 |
Fukuoka |
Fukuoka Univ. |
A study of Edge Architecture assuming increase of VPN usage in IoT era Takayuki Fujiwara, Satoshi Nishiyama, Masayuki Nishiki (NTT), Takashi Kurimoto, Shigeo Urushidani (NII) NS2018-12 |
Data coming from IoT equipment will increase in the future. Since these communications may include privacy of the user, ... [more] |
NS2018-12 pp.65-70 |
SC |
2016-01-15 14:55 |
Kyoto |
Kyoto University (Design Innovation Center) |
Interactive Service Composition under Uncertainty of Requirements Soran Nakamura (UEC), Fuyuki Ishikawa (NII) SC2015-19 |
Given the increasing number of available services, service composition is getting more and more significant that combine... [more] |
SC2015-19 pp.25-30 |
EMM |
2014-03-08 13:20 |
Ishikawa |
JAIST |
Mathematical Model and Evalution for Artificial Fiber Pattern Kenta Kawabata, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ of Science), Isao Echizen (NII) EMM2013-116 |
We have proposed so called “Artificial Fiber Pattern” which enables to embed information in the background of printed ma... [more] |
EMM2013-116 pp.99-104 |
TL |
2012-12-08 10:00 |
Tokyo |
WASEDA University |
Extraction of Q&A from Tweet Texts Hidekazu Nakawatase, Keizo Oyama (NII) TL2012-36 |
[more] |
TL2012-36 pp.13-16 |
KBSE |
2012-11-22 14:05 |
Ishikawa |
Kanazawa University |
A consideration for requirements volatilities from viewing of evolutionary social psychology Toshihiko Tsumaki (NII) KBSE2012-44 |
Software requirements are changed by various causes and a structure of the software is become poor by the requirements c... [more] |
KBSE2012-44 pp.37-42 |
AI |
2012-06-21 16:45 |
Tokyo |
|
Factor Extraction of Microblog Behavior Model with Panel data and Time line data Hidekazu Nakawatase, Keizo Oyama (NII) AI2012-6 |
(To be available after the conference date) [more] |
AI2012-6 pp.31-32 |
PRMU, HIP |
2012-03-29 11:10 |
Hyogo |
|
Model-based gaze estimation method with low-resolution RGB images of eyes Takashi Fukuda (Waseda Univ.), Hayato Yamana (Waseda Univ./NII) PRMU2011-245 HIP2011-73 |
[more] |
PRMU2011-245 HIP2011-73 pp.31-36 |
TL |
2012-02-04 11:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg (Room No. 2, B3 ) |
Survey on the Frequency Distribution of the Reduplicated Word in Newspaper Articles Hidekazu Nakawatase, Keizo Oyama (NII) TL2011-56 |
(To be available after the conference date) [more] |
TL2011-56 pp.13-16 |
KBSE |
2011-09-21 13:00 |
Overseas |
Ocean Grand Hotel Jeju |
Requirements Elicitationusing Abduction Toshihiko Tsumaki (NII) KBSE2011-27 |
Application of information system is rapidly spreading to various areas: the infrastructure of society, the saving of hu... [more] |
KBSE2011-27 pp.19-24 |
PRMU |
2011-02-18 13:00 |
Saitama |
|
Human motion recognition in crowded surveillance video sequences based on key-point trajectories Masaki Takahashi, Mahito Fujii, Masahide Naemura (NHKSTRL), Shin'ichi Satoh (NII) PRMU2010-225 |
There is a need for systems that can automatically detect specific human motions in a surveillance video. However, almos... [more] |
PRMU2010-225 pp.111-116 |
TL |
2011-02-04 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Basic Survey of Modification Structures of Web Search Queries Hidekazu Nakawatase, Keizo Oyama (NII) TL2010-54 |
(To be available after the conference date) [more] |
TL2010-54 pp.49-52 |
DC, CPSY |
2010-04-13 13:30 |
Tokyo |
|
[Invited Talk]
Increasing Dependability based on Asynchronous Computation Tomohiro Yoneda (NII/Tokyo Tech.) CPSY2010-1 DC2010-1 |
As semiconductor process technology scales and device dimensions shrink, new types of faults, such as slow transistors d... [more] |
CPSY2010-1 DC2010-1 p.1 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-UBI, IPSJ-MBL [detail] |
2010-03-27 15:20 |
Tokyo |
|
An Efficient Technique of Information Extraction Processing in Packet Data Management Infrastructure Shinichi Ishida, Shingo Harashima (Keio Univ.), Hideyuki Kawashima (Univ. of Tsukuba), Michihiro Koibuchi (NII), Hiroaki Nishi (Keio Univ.) CPSY2009-86 DC2009-83 |
We have proposed a service-oriented router (SoR), that supports not only packet transfer but also the collection of rich... [more] |
CPSY2009-86 DC2009-83 pp.309-314 |
SS |
2009-10-16 10:30 |
Nagano |
Shinshu University |
A Study of Model Transformation Method Between UML and Simulink Satoshi Yoshida, Yoshikazu Ueda (Ibaraki Univ.), Shin Nakajima (NII) SS2009-33 |
Simulink, widely used in the development of embedded systems, is able to generate code automatically and simulate system... [more] |
SS2009-33 pp.25-30 |
DE |
2007-07-03 15:50 |
Miyagi |
Akiu hot springs (Sendai) |
Quantitative Evaluation and Feature Analysis of Search Engine Rankings Yasuaki Yoshida, Takanori Ueda, Takashi Tashiro, Yu Hirate (Waseda Univ.), Hayato Yamana (Waseda Univ., NII) DE2007-95 |
Most people use search engines in order to retrieve documents on the web. In this way, the social influence of search en... [more] |
DE2007-95 pp.441-446 |