|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, IN, NV (Joint) |
2019-05-16 16:10 |
Kanagawa |
Keio University (Kanagawa) |
[Invited Talk]
SINR Statistics of a VFDM Cognitive Spectrum Sharing System K. Denia Kanellopoulou (Univ. of Athens), Kostas P. Peppas (Univ. of Peloponnese), P. Takis Mathiopoulos (Univ. of Athens) IN2019-8 RCS2019-29 |
[more] |
IN2019-8 RCS2019-29 p.29(IN), p.41(RCS) |
CS |
2018-07-12 10:56 |
Okinawa |
Eef Information Plaza (Kumejima Is.) (Okinawa) |
An Energy Efficient Target Specific Code Dissemination Scheme with RPL-based Forwarder Selection Algorithm Hiromu Asahina, Kentaroh Toyoda, Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (UoA), Hisao Yamamoto (TCU) CS2018-23 |
In order to fix a bug or install a new application, disseminating a code to specific target sensors is an important mana... [more] |
CS2018-23 pp.61-66 |
CS |
2017-07-27 09:48 |
Nagasaki |
Fukue Bunka Kaikan (Nagasaki) |
Code Dissemination based on RPL with Scope Selection and Code Acquisition in Wireless Sensor Networks Hiromu Asahina, Iwao Sasase (Keio Univ.), Hisao Yamamoto (Tokyo City Univ.), P. Takis Mathiopoulos (UoA) CS2017-18 |
In this paper, we propose RPL based code dissemination with scope selection and code acquisition.
The scope selection ... [more] |
CS2017-18 pp.29-34 |
ICSS, IPSJ-SPT |
2017-03-13 14:25 |
Nagasaki |
University of Nagasaki (Nagasaki) |
Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA) ICSS2016-49 |
As recent research has revealed, Bitcoin is used as fraudulent activities such as HYIP (High Yield Investment Programs).... [more] |
ICSS2016-49 pp.31-36 |
ICSS, IPSJ-SPT |
2017-03-14 12:20 |
Nagasaki |
University of Nagasaki (Nagasaki) |
Vibration-based Key Exchange among Multiple Smart Devices on the Desk Alisa Arno, Kentaroh Toyoda (Keio Univ.), Yuji Watanabe (IBM Japan), Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (Athens Univ.) ICSS2016-71 |
The man-in-the-middle attack is a real concern in mobile Near Filed Communication payment and data sharing applications.... [more] |
ICSS2016-71 pp.189-194 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|