IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 2803  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
AP 2024-06-13
14:30
Tokyo Kikai-Shinko-Kaikan Bldg.
(Primary: On-site, Secondary: Online)
A Consideration on Reducing the Influence of Array Errors in DOA Estimation Using Compressed Sensing
Nobuyoshi Kikuma, Kokoa Nakano, Kunio Sakakibara, Yoshiki Sugimoto (NITech)
(To be available after the conference date) [more]
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] 2024-06-06
14:35
Niigata Nigata University (Ekinan-Campus "TOKIMATE") Out of date numerical algorithms such as DFT
Fumihiko Ishiyama (NTT)
(To be available after the conference date) [more]
EA 2024-05-22
13:50
Online Online Determined BSS based on the proximal average of IVA and DNNs
Kazuki Matsumoto (Waseda Univ.), Koki Yamada, Kohei Yatabe (TUAT)
(To be available after the conference date) [more]
SeMI, IPSJ-ITS, IPSJ-MBL, IPSJ-DPS 2024-05-17
09:50
Okinawa   Hierarchical ArUco Marker Array for Coarse-to-Fine Phase Identification
Leo Miyashita, Satoshi Tabata, Masatoshi Ishikawa (TUS)
(To be available after the conference date) [more]
NLP 2024-05-10
10:30
Kagawa Kagawa Prefecture Social Welfare Center Federated Learning Algorithms based on Decentralized Spanning Tree Generation and Step-by-Step Consensus
Yuki Mori, Tatsuya Kayatani, Tsuyoshi Migita, Norikazu Takahashi (Okayama Univ.) NLP2024-11
(To be available after the conference date) [more] NLP2024-11
pp.52-57
ICD 2024-04-11
10:45
Kanagawa
(Primary: On-site, Secondary: Online)
[Invited Lecture] An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience
Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.) ICD2024-2
Strong physically unclonable function (Strong PUF) is a hardware-security circuit that generates response outputs corres... [more] ICD2024-2
p.7
CCS 2024-03-27
16:50
Hokkaido RUSUTSU RESORT JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography
Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] CCS2023-50
pp.64-69
PN 2024-03-14
14:50
Kagoshima
(Primary: On-site, Secondary: Online)
[Invited Lecture] Cut-set Analysis based Capacity estimation for Elastic Optical Path Networks with Distance-Adaptive Modulation
Kenji Cruzado, Yojiro Mori, Hiroshi Hasegawa (Nagoya Univ.) PN2023-74
Reinforcement learning (RL) has been attracting much more attention as a promising approach to realize RSA/RWA. However,... [more] PN2023-74
pp.27-31
SIS 2024-03-14
15:30
Kanagawa Kanagawa Institute of Technology
(Primary: On-site, Secondary: Online)
Analytical Development Method for Object Detection Dataset
Akihiro Suzuki, Naoki Yamaguchi, Mizuho Shimoda, Hakaru Tamukoh (KYUTECH) SIS2023-52
We propose an automatic dataset generation method which creates image with analyzing image,
in order to yield a datase... [more]
SIS2023-52
pp.39-44
RCC, ISEC, IT, WBS 2024-03-13
11:10
Osaka Osaka Univ. (Suita Campus) Revisiting the Soundness of 5-Pass Identification Scheme
Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC) IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64
We observe that mostly, the security of 5-pass identification schemes
have only been analyzed in a emph{rough} way as f... [more]
IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64
pp.44-51
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Quantum Insertion Correcting Algorithm for Quantum Deletion Correcting Codes Based on Quantum Reed-Solomon Codes
Koki Sasaki, Takayuki Nozaki (Yamaguchi Univ.) IT2023-91 ISEC2023-90 WBS2023-79 RCC2023-73
Research on quantum insertion or deletion error correcting codes has become active in recent years.In 2023, Hagiwara con... [more] IT2023-91 ISEC2023-90 WBS2023-79 RCC2023-73
pp.102-107
IE, MVE, CQ, IMQ
(Joint) [detail]
2024-03-13
10:00
Okinawa Okinawa Sangyo Shien Center
(Primary: On-site, Secondary: Online)
A Study on Word Selection Considering Pronunciation for Automatic Lyric Translation
Kotaro Ikeda, Chihaya Matsuhira, Hirotaka Kato (Nagoya Univ.), Takatsugu Hirayama (Univ. of Human Environments), Takahiro Komamizu, Ichiro Ide (Nagoya Univ.) IMQ2023-25 IE2023-80 MVE2023-54
Unlike general translation, lyric translation requires considering various factors other than meaning, such as number of... [more] IMQ2023-25 IE2023-80 MVE2023-54
pp.69-74
RCC, ISEC, IT, WBS 2024-03-14
09:55
Osaka Osaka Univ. (Suita Campus) A generalization of ISD algorithm for Syndrome Decoding Problem
Asuka Wakasugi (EAGLYS), Tada Mitsuru (Chiba Univ.) IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88
The Information Set Decoding (ISD) algorithm is the best-known decoding algorithm for the syndrome decoding problem, whi... [more] IT2023-106 ISEC2023-105 WBS2023-94 RCC2023-88
pp.205-211
RCC, ISEC, IT, WBS 2024-03-14
16:35
Osaka Osaka Univ. (Suita Campus) Integral Attack with Bit-Based Division Property on Block Cipher LBC
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
pp.350-357
RCC, ISEC, IT, WBS 2024-03-14
17:00
Osaka Osaka Univ. (Suita Campus) Reconstruction of Boyer quantum algorithm and its application to hash puzzles
Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
pp.358-365
NLP, MSS 2024-03-14
11:15
Misc. Kikai-Shinko-Kaikan Bldg. Parallelization of a Search Algorithm for Regular Graphs with Minimum Average Shortest Path Length
Taku Hirayama, Tsuyoshi Migita, Norikazu Takahashi (Okayama Univ.) MSS2023-89 NLP2023-141
Computer networks in data centers are modeled as regular graphs, and the average shortest path length (ASPL) of such a g... [more] MSS2023-89 NLP2023-141
pp.87-92
IA, SITE, IPSJ-IOT [detail] 2024-03-13
10:45
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Development and Analysis of MaaS Mileage Calculation Method for User-Attracted Low-Latency MaaS Platforms
Hideto Yano (Osaka Univ.), Tomoki Yoshihisa (Shiga Univ.), Ryuta Yamaguchi, Yukiko Kawai (Kyoto Sangyo Univ.), Keisuke Murashige, Satoru Matsumoto (Osaka Univ.), Yoshiyuki Kido (Okayama Univ. of Science), Shinji Shimojo (Aomori Univ.) SITE2023-89 IA2023-95
Mobility as a Service (MaaS), which has been the focus of attention in recent years, can be utilized to solve social cha... [more] SITE2023-89 IA2023-95
pp.130-135
SS 2024-03-07
13:30
Okinawa
(Primary: On-site, Secondary: Online)
Zone-Based Reachability Analysis of Nested Timed Automata
Seiichiro Tachi (Nagoya Univ), Mizuhito Ogawa (JAIST), Shoji Yuen (Nagoya Univ) SS2023-53
We present a zone-based reachability analysis for Nested Timed Automata (NeTA).
NeTA is a timed pushdown automaton that... [more]
SS2023-53
pp.25-30
SS 2024-03-09
13:55
Okinawa
(Primary: On-site, Secondary: Online)
A Study on Cloud-Based Image Generation Using Spot Instances
Kippei Kasai, Daisuke Katayama, Takahiro Koita (Doshisha Univ.) SS2023-83
Recently, cloud computing has become an important service in the IT industry. However, there is a challenge for organiza... [more] SS2023-83
pp.202-206
SIP, SP, EA, IPSJ-SLP [detail] 2024-02-29
09:50
Okinawa
(Primary: On-site, Secondary: Online)
Derivation of Direct Update Rule for Back-Projected Separation Matrix
Yui Kuriki, Taishi Nakashima, Nobutaka Ono (TMU) EA2023-66 SIP2023-113 SP2023-48
Blind source separation (BSS) is a widely used technique for separating mixed signals originating from multiple sources.... [more] EA2023-66 SIP2023-113 SP2023-48
pp.31-36
 Results 1 - 20 of 2803  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan