|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IE, IMQ, MVE, CQ (Joint) [detail] |
2020-03-06 10:45 |
Fukuoka |
Kyushu Institute of Technology (Cancelled but technical report was issued) |
Emotion estimation from pose image with body movement Tomoyuki Nagase, Kohei Kishida, Yuukou Horita (Univ. of Toyama) IMQ2019-32 IE2019-114 MVE2019-53 |
It is said that there is a deep relationship between human emotion and physical movement. However, it seems that there i... [more] |
IMQ2019-32 IE2019-114 MVE2019-53 pp.85-88 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:55 |
Hokkaido |
|
An Efficient Certificate Management Method for Improving Traffic Flow of Certificates in Mobile Communications Norihito Yosaka, Tomoyuki Nagase (Hirosaki Univ.) ISEC2012-21 SITE2012-17 ICSS2012-23 EMM2012-13 |
[more] |
ISEC2012-21 SITE2012-17 ICSS2012-23 EMM2012-13 pp.83-90 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 14:35 |
Hokkaido |
|
TSP Solution Based on Clustering nodes in Ad-hoc networks XIiaoji Li (DLUT), Tomoyuki Nagase (Hirosaki Uni.) ISEC2012-22 SITE2012-18 ICSS2012-24 EMM2012-14 |
[more] |
ISEC2012-22 SITE2012-18 ICSS2012-24 EMM2012-14 pp.91-96 |
ICSS |
2011-03-25 11:10 |
Tokyo |
Suspended |
Security Level Evaluation of Quaternion Based Hash Function Tomohiro Suto, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-58 |
One of the security features for designing hash functions is collision resistance. It means that it is difficult to find... [more] |
ICSS2010-58 pp.11-16 |
ICSS |
2011-03-25 13:50 |
Tokyo |
Suspended |
Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions Norihito Yosaka, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-61 |
The development of today's wireless technology with its sophisticated devices and applications has attracted many users ... [more] |
ICSS2010-61 pp.29-34 |
ICSS |
2011-03-25 14:15 |
Tokyo |
Suspended |
Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Networks Iichiro Nishimura, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-62 |
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infr... [more] |
ICSS2010-62 pp.35-40 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|