IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 43  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, RCS
(Joint)
2023-12-15
14:25
Fukuoka Kyushu Institute of Technology Tobata campus, and Online
(Primary: On-site, Secondary: Online)
Development of a Sensor Network MAC Protocol Verification System using Wireless Modems
Kenta Asahi, David Asano, Yasushi Fuwa (Shinshu Univ.) NS2023-147
Wireless sensor network systems have different specifications required depending on the environment and applications in ... [more] NS2023-147
pp.120-125
NS, RCS
(Joint)
2023-12-15
14:50
Fukuoka Kyushu Institute of Technology Tobata campus, and Online
(Primary: On-site, Secondary: Online)
Development of a Transition Diagram-Based MAC Protocol Design Environment for Sensor Network Verification Systems
Ryo Kobayashi, Asano David, Yasushi Fuwa (Shinshu Univ.) NS2023-148
Our wireless sensor network requires new communication protocols to be designed for each specific scenario. We have eval... [more] NS2023-148
pp.126-131
NS, RCS
(Joint)
2023-12-15
15:15
Fukuoka Kyushu Institute of Technology Tobata campus, and Online
(Primary: On-site, Secondary: Online)
Investigation on Shortening the Time to Fix Transmission Timing in Wireless Sensor Networks Using Reinforcement Learning
Kureha Ikeda, Yasushi Fuwa, David Asano (Shinshu Univ.) NS2023-149
This study proposes a novel approach to optimizing transmission timing in Wireless Sensor Networks (WSNs) by applying re... [more] NS2023-149
pp.132-137
RCC, ISEC, IT, WBS 2023-03-15
11:25
Yamaguchi
(Primary: On-site, Secondary: Online)
Constructions of the card-based protocol over a Likert scale that downgrades stages by restricting card input
Yuji Suga (IIJ) IT2022-115 ISEC2022-94 WBS2022-112 RCC2022-112
We consider card-based protocols in which the input is defined by a Likert scale and the output is only the closeness of... [more] IT2022-115 ISEC2022-94 WBS2022-112 RCC2022-112
pp.297-304
RCS, NS
(Joint)
2022-12-15
15:45
Aichi Nagoya Institute of Technology, and Online
(Primary: On-site, Secondary: Online)
A method to shorten the time to determine transmission timing at terminals and transponders in wireless sensor networks
Keiichiro Sonoda, Yasushi Fuwa, David Asano (Shinshu Univ.) NS2022-138
In a wireless sensor network system consisting of terminals that periodically transmit information and transponders that... [more] NS2022-138
pp.48-53
VLD, HWS [detail] 2022-03-08
09:30
Online Online A Study on Interface Circuits Using Click Element Between Synchronous-asynchronous Domains
Shogo Semba, Hiroshi Saito (UoA) VLD2021-91 HWS2021-68
In this paper, we propose interface circuits using Click Element between synchronous and asynchronous domains. The propo... [more] VLD2021-91 HWS2021-68
pp.81-86
ISEC 2021-05-19
10:00
Online Online Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] ISEC2021-1
pp.1-8
NS 2021-04-16
13:50
Online Online A Metamodel for Network Configuration Information
Nagi Arai, Hikofumi Suzuki, Shinpei Ogata, Kozo Okano (Shinshu Univ) NS2021-14
In terms of communication protocols and network device configuration information used at the Layer 3 level and above, it... [more] NS2021-14
pp.77-82
NS, ICM, CQ, NV
(Joint)
2019-11-22
11:15
Hyogo Rokkodai 2nd Campus, Kobe Univ. A Note on Routing Protocol Utilizing Drones in Delay Tolerant Networks
Katsuyuki Takenaka, Kazuya Sakai (TMU) NS2019-132
In Delay tolerant networks, many routing protocols only using nodes which have probabilistic behavior are proposed. Howe... [more] NS2019-132
pp.67-70
CS, CQ
(Joint)
2019-04-18
14:35
Osaka Osaka Univ. Library Revealing Benefits of Quality-based Routing
Aomi Jokoji (UVic), Takuto Kimura, Arifumi Matsumoto, Jun Okamoto (NTT) CQ2019-4
Current Internet backbone routing is topology-based, which selects routes with the shortest AS-path length. Therefore, c... [more] CQ2019-4
pp.19-24
IN, NS
(Joint)
2019-03-04
10:10
Okinawa Okinawa Convention Center Transmission Delay Evaluations of IoT Communication Protocols over IoT Networks
Hibiki Sekine, Kenji Kanai, Jiro Katto (Waseda Univ.) NS2018-213
In recent years, the era of Internet of Things (IoT) has been approaching, and massive IoT devices are connecting to the... [more] NS2018-213
pp.117-122
RCS, NS
(Joint)
2018-12-20
09:30
Hiroshima Onomichi City Hall An Autonomous Arbitration Protocol for the Transmission Timing of Terminals and Transponders in Wireless Sensor Networks
Satono Masuda, David Asano, Yasushi Fuwa (Shinshu Univ.), Mitsuru Komatsu (Okayama Univ.), Masato Futagawa (Shizuoka Univ.) RCS2018-216
At present, we are developing hiker monitoring system using LoRa as one type of system to protect regional security and ... [more] RCS2018-216
pp.1-6
IT 2018-12-18
15:50
Fukushima Spa Resort Hawaiians [Invited Talk] Secure Delegated Quantum Computation
Takeshi Koshiba (Waseda Univ.) IT2018-33
In this manuscript, we take secure delegated quantum computation (SDQC).
First, we explain the basics of measurement-ba... [more]
IT2018-33
pp.13-18
COMP 2018-09-18
13:00
Fukuoka Kyusyu Institute of Technology Mediated population protocols with a base station for line and ring construction
Yuumi Yoshikawa, Yuuichi Sudou (Osaka Univ.), Fukuhito Ooshita (NAIST), Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) COMP2018-12
A mediated population protocol model is a computational model that abstracts a wireless network composed of numerous low... [more] COMP2018-12
pp.23-27
ISEC 2018-05-16
11:30
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] The Minimum Number of Cards in Practical Card-Based Protocols (from ASIACRYPT 2017)
Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-4
In this invited talk, we introduce the paper ``The Minimum Number of Cards in Practical Card-Based Protocols'' by J. Kas... [more] ISEC2018-4
p.25
WBS, IT, ISEC 2018-03-08
13:00
Tokyo Katsusika Campas, Tokyo University of Science On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] IT2017-124 ISEC2017-112 WBS2017-105
pp.121-128
WBS, IT, ISEC 2018-03-08
13:25
Tokyo Katsusika Campas, Tokyo University of Science Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more]
IT2017-125 ISEC2017-113 WBS2017-106
pp.129-135
ISEC 2017-09-04
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] ISEC2017-42
pp.7-14
COMP, ISEC 2016-12-21
15:10
Hiroshima Hiroshima University A Loosely-Stabilizing Population Protocol for Maximal Independent Set
Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) ISEC2016-78 COMP2016-39
Self–stabilizing population protocols are impossible to design for some problems. For example, leader election on ... [more] ISEC2016-78 COMP2016-39
pp.43-49
CQ 2016-08-30
15:25
Ibaraki Tsukubasan Throughput Analysis of CSMA with Imperfect Collision Detection in WLAN Systems
Megumi Kaneko (NII), Tomoo Hirose (Kyoto Univ.) CQ2016-70
 [more] CQ2016-70
pp.117-121
 Results 1 - 20 of 43  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan