|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
QIT (2nd) |
2023-05-29 16:30 |
Kyoto |
Katsura Campus, Kyoto University |
[Poster Presentation]
A Sequential Optimization Method using Ising Machines for Constrained Combinatorial Optimization Problems Masashi Yamashita, Shu Tanaka (Keio Univ.) |
[more] |
|
MBE, MICT |
2021-01-28 17:05 |
Online |
Online |
Investigation by Etest® heterotrophic bacteria isolated from purified water production line Masakazu Sueyoshi, Tomokazu Indo, Hisae Shimizu, Masashi Yamashita, Toshitugu Sugawara, Kazuyuki Kimura (HUS) MICT2020-30 MBE2020-35 |
Currently, the number of dialysis patients in Japan exceeds 300,000, and nearly 30% of them are treated by a method onli... [more] |
MICT2020-30 MBE2020-35 pp.42-46 |
CQ, CBE (Joint) |
2021-01-22 14:00 |
Online |
Online |
[Invited Lecture]
A Study on Correlation between Automatic Speech Recognition Accuracy and Speech QoE Masashi Yamashita, Hiroshi Matsunaga, Toyota Nishi (DOCOMO Technology) CQ2020-99 |
In recent years, as the quality of mobile networks has improved, it has become more critical to maintain and improve the... [more] |
CQ2020-99 pp.145-148 |
NS |
2009-12-11 15:05 |
Ehime |
Ehime University (Ehime) |
A Study of Malware Spreading Detection in Mobile P2P Networks. Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-141 |
Since the evolution of mobile devices, the risk of malware spreading in mobile peer to peer (P2P) networks increased. It... [more] |
NS2009-141 pp.115-118 |
IN, NS, CS (Joint) |
2009-09-10 16:10 |
Miyagi |
Tohoku University (Miyagi) |
An Approach to Suppress Malware Spreading in Mobile Ad Hoc Networks. Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-67 |
Since the evolution of mobile devices, the risk of malware spreading in mobile ad hoc networks increased. Mobile Ad Hoc ... [more] |
NS2009-67 pp.43-46 |
NS |
2006-10-25 15:45 |
Gunma |
Kiryu City Performing Arts Center |
[Encouragement Talk]
Analysis of Malicious Traffic in the mobile network Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) NS2006-111 |
As the mobile network evolutes to be “ubiquitous”, we have faced a paradigm shift: the interfaces of the mobile terminal... [more] |
NS2006-111 pp.69-72 |
NS |
2006-04-21 10:25 |
Kochi |
|
A Study on botnet detection and protection of the mobile network. Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) NS2006-13 |
As the mobile network evolutes to be “ubiquitous”, we acknowledge a paradigm shift: the interfaces of the mobile termin... [more] |
NS2006-13 pp.49-52 |
RCS, IN (Joint) |
2005-05-27 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A study and proposal on a control for annoying communications Takeshi Sugiyama, Masashi Yamashita, Youji Ohsako, Kazuo Sugiyama (NTT DoCoMo) |
In this article, begining with targeted risks considerations, we try to arrange network control for reducing annoying fe... [more] |
IN2005-13 pp.67-72 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|