|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NLC |
2022-09-13 13:20 |
Kanagawa |
Keio Univ. Yagami Campus. (Primary: On-site, Secondary: Online) |
Estimation of related keywords based on distributed representation of words and semantic vector operations Osamu Segawa (Chubu Electric Power), Kazuhiko Murakami (Chuden CTI) NLC2022-4 |
Formerly, in a text-mining task, several methods based on distribution of words using co-occurrence in observation windo... [more] |
NLC2022-4 pp.1-4 |
NLC |
2012-08-31 10:00 |
Kanagawa |
Fuji Xerox |
A study on extraction of related terms and their visualization from trouble incident reports Osamu Segawa (CEPCO), Kazuhiko Murakami, Munehiro Furusato (Chuden CTI) NLC2012-17 |
We have developed a analysis method for trouble incident reports on our intra-system using text mining technique. These ... [more] |
NLC2012-17 pp.41-44 |
NLC |
2011-07-07 15:00 |
Tokyo |
IBM Japan, Ltd. |
Visualization method for text classification to assist interpretation of the results Osamu Segawa (CEPCO), Kazuhiko Murakami, Masaki Mizuno, Munehiro Furusato (Chuden CTI) NLC2011-5 |
We have developed a visualization technique for text classification and clustering. First, in this paper, we propose a v... [more] |
NLC2011-5 pp.21-24 |
LOIS |
2009-03-05 13:00 |
Okinawa |
Okinawa-seinen-kaikan |
Efficiency of Authentication Network Construction on Organization LAN Takeshi Miyake (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-78 |
IEEE802.1X port base authentication is eective to an illegal connected prevention on the LAN, How-ever, when the system... [more] |
OIS2008-78 pp.19-24 |
LOIS |
2009-03-05 13:30 |
Okinawa |
Okinawa-seinen-kaikan |
Method of Logical Network Construction Focusing on Information Resources Kazutoshi Sakamoto (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-79 |
The necessity of the access control to information resources has risen.The method of setting the access control on the i... [more] |
OIS2008-79 pp.25-30 |
LOIS |
2009-03-05 14:00 |
Okinawa |
Okinawa-seinen-kaikan |
Anomaly Detection by monitoring information of ARP Tables Sho Saito (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-80 |
ARP is a protocol used for communication in the same sabnet.Information of ARP is stored in an ARP Table.ARP is normally... [more] |
OIS2008-80 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:15 |
Hokkaido |
Future University-Hakodate |
A method of excluding disapproval connection on authentication network Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT) |
IEEE802.1X is a technology to construct the network authentication system on LAN. The IEEE802.1X authentication system w... [more] |
ISEC2007-32 SITE2007-26 pp.113-118 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:40 |
Hokkaido |
Future University-Hakodate |
An authentication network system using virtual authenticatior module Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT) |
The IEEE802.1X authentication network system is effective to an illegal, connected prevention to the LAN . However, the ... [more] |
ISEC2007-33 SITE2007-27 pp.119-124 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:45 |
Hokkaido |
Future University-Hakodate |
A composition method of network-independent dynamic authentication VLAN Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT) |
Virtual Private Network (VPN) is a technology that constructs a private network between bases geographically away. OpenV... [more] |
ISEC2007-40 SITE2007-34 pp.171-176 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|