IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 9 of 9  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NLC 2022-09-13
13:20
Kanagawa Keio Univ. Yagami Campus.
(Primary: On-site, Secondary: Online)
Estimation of related keywords based on distributed representation of words and semantic vector operations
Osamu Segawa (Chubu Electric Power), Kazuhiko Murakami (Chuden CTI) NLC2022-4
Formerly, in a text-mining task, several methods based on distribution of words using co-occurrence in observation windo... [more] NLC2022-4
pp.1-4
NLC 2012-08-31
10:00
Kanagawa Fuji Xerox A study on extraction of related terms and their visualization from trouble incident reports
Osamu Segawa (CEPCO), Kazuhiko Murakami, Munehiro Furusato (Chuden CTI) NLC2012-17
We have developed a analysis method for trouble incident reports on our intra-system using text mining technique. These ... [more] NLC2012-17
pp.41-44
NLC 2011-07-07
15:00
Tokyo IBM Japan, Ltd. Visualization method for text classification to assist interpretation of the results
Osamu Segawa (CEPCO), Kazuhiko Murakami, Masaki Mizuno, Munehiro Furusato (Chuden CTI) NLC2011-5
We have developed a visualization technique for text classification and clustering. First, in this paper, we propose a v... [more] NLC2011-5
pp.21-24
LOIS 2009-03-05
13:00
Okinawa Okinawa-seinen-kaikan Efficiency of Authentication Network Construction on Organization LAN
Takeshi Miyake (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-78
IEEE802.1X port base authentication is e ective to an illegal connected prevention on the LAN, How-ever, when the system... [more] OIS2008-78
pp.19-24
LOIS 2009-03-05
13:30
Okinawa Okinawa-seinen-kaikan Method of Logical Network Construction Focusing on Information Resources
Kazutoshi Sakamoto (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-79
The necessity of the access control to information resources has risen.The method of setting the access control on the i... [more] OIS2008-79
pp.25-30
LOIS 2009-03-05
14:00
Okinawa Okinawa-seinen-kaikan Anomaly Detection by monitoring information of ARP Tables
Sho Saito (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-80
ARP is a protocol used for communication in the same sabnet.Information of ARP is stored in an ARP Table.ARP is normally... [more] OIS2008-80
pp.31-36
ISEC, SITE, IPSJ-CSEC 2007-07-19
14:15
Hokkaido Future University-Hakodate A method of excluding disapproval connection on authentication network
Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT)
IEEE802.1X is a technology to construct the network authentication system on LAN. The IEEE802.1X authentication system w... [more] ISEC2007-32 SITE2007-26
pp.113-118
ISEC, SITE, IPSJ-CSEC 2007-07-19
14:40
Hokkaido Future University-Hakodate An authentication network system using virtual authenticatior module
Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT)
The IEEE802.1X authentication network system is effective to an illegal, connected prevention to the LAN . However, the ... [more] ISEC2007-33 SITE2007-27
pp.119-124
ISEC, SITE, IPSJ-CSEC 2007-07-19
15:45
Hokkaido Future University-Hakodate A composition method of network-independent dynamic authentication VLAN
Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT)
Virtual Private Network (VPN) is a technology that constructs a private network between bases geographically away. OpenV... [more] ISEC2007-40 SITE2007-34
pp.171-176
 Results 1 - 9 of 9  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan