IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 8 of 8  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
QIT
(2nd)
2023-05-29
16:30
Kyoto Katsura Campus, Kyoto University [Poster Presentation] A Sequential Optimization Method using Ising Machines for Constrained Combinatorial Optimization Problems
Masashi Yamashita, Shu Tanaka (Keio Univ.)
 [more]
MBE, MICT 2021-01-28
17:05
Online Online Investigation by Etest® heterotrophic bacteria isolated from purified water production line
Masakazu Sueyoshi, Tomokazu Indo, Hisae Shimizu, Masashi Yamashita, Toshitugu Sugawara, Kazuyuki Kimura (HUS) MICT2020-30 MBE2020-35
Currently, the number of dialysis patients in Japan exceeds 300,000, and nearly 30% of them are treated by a method onli... [more] MICT2020-30 MBE2020-35
pp.42-46
CQ, CBE
(Joint)
2021-01-22
14:00
Online Online [Invited Lecture] A Study on Correlation between Automatic Speech Recognition Accuracy and Speech QoE
Masashi Yamashita, Hiroshi Matsunaga, Toyota Nishi (DOCOMO Technology) CQ2020-99
In recent years, as the quality of mobile networks has improved, it has become more critical to maintain and improve the... [more] CQ2020-99
pp.145-148
NS 2009-12-11
15:05
Ehime Ehime University (Ehime) A Study of Malware Spreading Detection in Mobile P2P Networks.
Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-141
Since the evolution of mobile devices, the risk of malware spreading in mobile peer to peer (P2P) networks increased. It... [more] NS2009-141
pp.115-118
IN, NS, CS
(Joint)
2009-09-10
16:10
Miyagi Tohoku University (Miyagi) An Approach to Suppress Malware Spreading in Mobile Ad Hoc Networks.
Masashi Yamashita, Keisuke Nakano, Masakazu Sengoku (Niigata Univ.) NS2009-67
Since the evolution of mobile devices, the risk of malware spreading in mobile ad hoc networks increased. Mobile Ad Hoc ... [more] NS2009-67
pp.43-46
NS 2006-10-25
15:45
Gunma Kiryu City Performing Arts Center [Encouragement Talk] Analysis of Malicious Traffic in the mobile network
Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) NS2006-111
As the mobile network evolutes to be “ubiquitous”, we have faced a paradigm shift: the interfaces of the mobile terminal... [more] NS2006-111
pp.69-72
NS 2006-04-21
10:25
Kochi   A Study on botnet detection and protection of the mobile network.
Masashi Yamashita, Yuji Chikahiro, Kazuo Sugiyama (NTT DoCoMo) NS2006-13
As the mobile network evolutes to be “ubiquitous”, we acknowledge a paradigm shift: the interfaces of the mobile termin... [more] NS2006-13
pp.49-52
RCS, IN
(Joint)
2005-05-27
14:20
Tokyo Kikai-Shinko-Kaikan Bldg. A study and proposal on a control for annoying communications
Takeshi Sugiyama, Masashi Yamashita, Youji Ohsako, Kazuo Sugiyama (NTT DoCoMo)
In this article, begining with targeted risks considerations, we try to arrange network control for reducing annoying fe... [more] IN2005-13
pp.67-72
 Results 1 - 8 of 8  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan