Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MI, MICT [detail] |
2019-11-05 15:30 |
Ibaraki |
Univ. of Tsukuba |
Preliminary study on coordinate system setting for videofluorography using template matching Naoyuki Kurita, Ayano Fujinaka (Univ. of Tsukuba), Kojirou Mekata (KRCH), Hotaka Takizawa, Hiroyuki Kudo (Univ. of Tsukuba) MICT2019-35 MI2019-62 |
[more] |
MICT2019-35 MI2019-62 pp.51-52 |
CNR |
2019-06-14 09:30 |
Tokyo |
|
Effects of Mirroring with Interactive Robot by Estimating of Gestures Yuki Kurita, Shogo Nishimura (NAIST), Wataru Sato (Kyoto Univ.), Alexander Plopski, Yuitiro Fujimoto, Masayuki Kanbara, Hirokazu Kato (NAIST) CNR2019-10 |
This paper implements a mirroring function to interactive robots in order to build rapport between human and robot. Mirr... [more] |
CNR2019-10 pp.49-53 |
CNR |
2018-08-21 15:35 |
Hokkaido |
|
Enthusiasm analysis and verification for TV chat robots Yuki Kurita, Daiki Kimata, Nishimura Shogo, Masayuki Kanbara (NAIST), Norihiro Hagita (ATR/NAIST) CNR2018-16 |
(To be available after the conference date) [more] |
CNR2018-16 pp.25-31 |
NS |
2016-01-22 12:25 |
Fukuoka |
|
A server resource allocation method considering combination of NW functions on NFV
-- NetroSphere: Towards the Transformation of Carrier Networks -- Hiroyuki Kurita, Hiroyuki Nakamura (NTT) NS2015-158 |
Carriers are now considering application of NFV to their networks. Towards NFV, transport functions such as firewall and... [more] |
NS2015-158 pp.69-74 |
IN |
2014-04-17 13:00 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
Elastic and strict load balancing via consistent hashing Yuichi Nakatani, Hiroyuki Kurita, Naoki Takada, Takao Yamashita (NTT) IN2014-1 |
Load balancing is a key function constructing massively distributed systems. Stateful services like SIP and distributed ... [more] |
IN2014-1 pp.1-6 |
NS |
2014-04-17 12:55 |
Okinawa |
Ishigaki-City-Hall |
Access Methods for Distributed Key-Value Stores with Highly SkewedAccess Distribution of Keys Hiroyuki Kurita, Naoki Takada, Takao Yamashita, Tomoharu Motono (NTT) NS2014-6 |
Distributed Key-Value Stores are becoming applicable to various applications, such as not only Web applications but auth... [more] |
NS2014-6 pp.27-32 |
NS |
2014-04-17 13:20 |
Okinawa |
Ishigaki-City-Hall |
Comparison of Load Balancing Designed for Requests Following Zipfian Distribution and Hybrid Load Balancer Using Round-Robin and Consistent Hashing Takao Yamashita, Hiroyuki Kurita, Naoki Takada, Kenji Ota (NTT) NS2014-7 |
In this paper, we evaluate, by simulation, how much amount of memory a load balancing method we previously proposed to p... [more] |
NS2014-7 pp.33-38 |
ED |
2013-12-17 14:10 |
Miyagi |
Research Institute of Electrical Communication Tohoku University |
Ultrahigh Sensitive and Frequency-Tunable Terahertz Detection by Asymmetric Dual-Grating-Gate HEMTs Tetsuya Kawasaki, Shinya Hatakeyama, Yuki Kurita (Tohoku Univ.), Guillaume Ducournau (IEMN), Dominique Coquillat (Univ. Montpellier 2 & CNRS), Kengo Kobayashi, Akira Satou (Tohoku Univ.), Yahya M. Meziani (Univ. Salamanca), Vyacheslav. V. Popov (Kotelnikov Inst. Radio Eng. Electron), Wojciech Knap (Univ. Montpellier 2 & CNRS), Tetsuya Suemitsu, Taiichi Otsuji (Tohoku Univ.) ED2013-107 |
We report on ultrahigh sensitive and frequency-tunable terahertz (THz) detectors by our original asymmetric dual-grating... [more] |
ED2013-107 pp.97-100 |
NS, IN (Joint) |
2013-03-08 09:00 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Load Balancing and Approximate Memory Minimization in Scale-Out System Architecture for Processing Requests That Follow Zipfian Distribution Takao Yamashita, Hiroyuki Kurita, Naoki Takada, Takuya Minami, Kenji Ota (NTT) IN2012-177 |
In this paper, we propose a load balancing method to process requests that follow a Zipfian distribution, which has extr... [more] |
IN2012-177 pp.137-142 |
ED |
2012-12-17 15:40 |
Miyagi |
Tohoku University |
Terahertz Population Inversion in Graphene by Optical Pulse Excitation Akira Satou, Victor Ryzhii, Yuki Kurita, Taiichi Otsuji (Tohoku Univ.) ED2012-98 |
We theoretically studied the nonequilibrium carrier relaxation dynamics and the terahertz population inversion in intrin... [more] |
ED2012-98 pp.29-33 |
ED |
2012-07-27 11:50 |
Fukui |
Fukui University |
Graphene FET with Diamondlike Carbon Dielectrics Susumu Takabayashi, Meng Yang, Shuichi Ogawa, Hiroyuki Hayashi, Yuki Kurita, Yuji Takakuwa, Tetsuya Suemitsu, Taiichi Otsuji (Tohoku Univ.) ED2012-53 |
A graphene-channel field effect transistor with a diamondlike carbon (DLC) top-gate dielectric film is presented (DLC-GF... [more] |
ED2012-53 pp.67-72 |
IN |
2012-04-12 13:55 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
Load Balancing Methods for Distribution Contains a Few Frequently Requested Keys and Many Rarely Requested Keys Hiroyuki Kurita, Naoki Takada, Takuya Minami, Takao Yamashita, Yuji Agawa (NTT) IN2012-2 |
The consistent hash method is known as a load balancing method for the case where a large number of requests are to be h... [more] |
IN2012-2 pp.7-12 |
IN |
2010-10-14 16:00 |
Aichi |
Nagoya Institute of Technology |
[Invited Talk]
The authentication platform for VPN services Kenichi Matsui, Kenji Ota, Hiroyuki Kurita (NTT) IN2010-69 |
VPN (Virtual Private Network) services are widely used especially for corporate users to connect remote networks. Becaus... [more] |
IN2010-69 pp.25-30 |
CS, IN, NS (Joint) |
2008-09-12 11:20 |
Miyagi |
Tohoku University |
Relay method for VPN connection with a proxy-box intervening between terminal device and VPN gateway Jun-ya Kato, Hiroyuki Kurita (NTT) IN2008-58 |
We have proposed the SIP dial-up method controlling IKE/IPsec connection with SIP signaling for establishing remote acce... [more] |
IN2008-58 pp.87-92 |
NS, IN (Joint) |
2008-03-07 14:10 |
Okinawa |
Bankoku Shinryokan |
Implementation and evaluation report of mobile VPN method with SIP mobility Jun-ya Kato, Masahisa Kawashima, Hiroyuki Kurita (NTT) IN2007-205 |
This paper presents an implementation of a SIP-based remote VPN method, which we proposed, and the result of its perform... [more] |
IN2007-205 pp.277-282 |
MoNA, IN (Joint) |
2007-11-16 10:00 |
Fukuoka |
Fukuoka Institute of Technology |
An authentication method for an early deployment of nomadic IMS services Hirokazu Kitami, Yoshihito Oshima, Masahisa Kawashima, Jun-ya Kato, Hiroyuki Kurita (NTT) MoMuC2007-57 |
[more] |
MoMuC2007-57 pp.7-12 |
MoNA, IN (Joint) |
2007-11-16 10:25 |
Fukuoka |
Fukuoka Institute of Technology |
NW Attachment Control Scheme for Onymous IP Terminals in Nomadic Services Hiroyuki Kurita, Jun-ya Kato, Masahisa Kawashima (NTT) MoMuC2007-58 |
[more] |
MoMuC2007-58 pp.13-18 |
CPSY, DC |
2006-04-14 15:10 |
Tokyo |
Takeda Hall |
A Microarchitectural Framework for Flawless Dependablity Hidetsugu Irie (JST/Tokyo Univ.), Ken Ogino, Satoshi Katsunuma, Kazuto Shimizu, Hiroyuki Kurita, Masahiro Goshima, Shuichi Sakai (Tokyo Univ.) |
The dependability of computer system has become hard to maintain because it is achieved with various techniques through ... [more] |
CPSY2006-9 DC2006-9 pp.49-54 |
MoNA |
2005-05-25 14:20 |
Tokyo |
Kagaku-Kaikan |
Resource Management for Session Layer Architecture Hiroyuki Kurita, Kunitake Kaneko, Hiroyuki Morikawa, Tomonori Aoyama (Univ. of Tokyo) |
[more] |
MoMuC2005-6 pp.31-36 |