|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2023-03-14 16:55 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Automatic Dataset Collection and Formatting Techniques for Machine Learning Systems Takako Kawaguchi, Toshiyuki Kurabayashi, Haruto Tanno (former NTT) SS2022-57 |
In recent years, as machine learning models have become larger and larger, the scale of data required for training has a... [more] |
SS2022-57 pp.61-66 |
NC, MBE (Joint) |
2019-03-06 13:50 |
Tokyo |
University of Electro Communications |
NC2018-80 |
An octopus has eight flexible long arms and each arm has an elaborate peripheral nervous system. In order to understand ... [more] |
NC2018-80 pp.199-204 |
HCGSYMPO (2nd) |
|
Mie |
Sinfonia Technology Hibiki Hall Ise |
Research of clawling induction by optical flow effect in the infant Rina Hosoda (Kochi Univ.), Yasuhiro Kawahara (Univ.), Hiroshi Yoshida (NTT) |
The visual change by optical flow lets a baby cause a visual illusion, and it is reported that it spills over into physi... [more] |
|
NLC |
2014-06-14 13:55 |
Fukuoka |
Kyushu Institute of Technology |
Reverse Engineering Twitter Hashtag Algorithm Marat Zhanikeev (Kyushu Inst. of Tech.) NLC2014-3 |
Twitter today markets itself through neat infographics where it explains how its main features -- specifically, the hash... [more] |
NLC2014-3 pp.13-16 |
PRMU |
2013-10-04 14:00 |
Chiba |
|
NICT Science Cloud
-- Data Collection, Database and Data Processing of Global Earth and Space Observation Networks -- Ken T. Murata (NICT), Fusako Isoda (Science Service), Hidenobu Watanabe (NICT), Kentaro Ukawa, Kazuya Muranaga, Yutaka Suzuki (SEC), Takashi Kurosawa (HSEJ), Eizen Kimura (Ehime Univ.), Osamu Tatebe, Masahiro Tanaka (Tsukuba Univ.), Kazunori Yamamoto, Tsutomu Nagatsuma, Takuya Tsugawa, Shinsuke Satoh, Yasuko Kasai (NICT) PRMU2013-61 |
This paper is devoted to present an operation system to acquire, to transfer and to storage data for world-wide observat... [more] |
PRMU2013-61 pp.23-28 |
NS |
2010-10-22 10:25 |
Osaka |
Osaka Univ. |
[Encouragement Talk]
Topology-aware Traffic Control System for P2P Networks Pratama Putra, Akihiro Nakao (Univ. of Tokyo) NS2010-85 |
Copyright infringement is considered a significant issue in P2P network communications. Index and content poisoning have... [more] |
NS2010-85 pp.87-92 |
IA, ICSS |
2009-06-18 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A proposal for autonomous crawling client honeypot Yuji Hoshizawa, Kazuo Kawamorita, Tsuyoshi Tachikawa, Masaki Kamizono (SecureBrain Corp.) IA2009-3 ICSS2009-11 |
In recent years, the trend in attack techniques of malware is changing from active attack targeting vulnerabilities, to ... [more] |
IA2009-3 ICSS2009-11 pp.13-17 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|