IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 154  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
A survey on suitable hook points for outbound packet monitoring using eBPF
Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] ICM2023-27
CPM 2023-07-31
(Primary: On-site, Secondary: Online)
Investigation of MIM structure with ZrN electrode as Resistive Random Access Memory
Toyoki Miura, Masaru Sato, Mayumi Takeyama (Kitami Institute) CPM2023-14
In the rapidly advancing information society, higher performance nonvolatile memories are demanded. In such a situation,... [more] CPM2023-14
Osaka Osaka University Nakanoshima Center + Online
(Primary: On-site, Secondary: Online)
[Invited Lecture] Research on UAV based smart wireless system
Gia Khanh Tran (Tokyo Tech) RCC2023-13 NS2023-31 RCS2023-83 SR2023-30 SeMI2023-24
In beyond 5G (B5G)/6G, mobile communication systems are expected to function as the basic infrastructure of society. On ... [more] RCC2023-13 NS2023-31 RCS2023-83 SR2023-30 SeMI2023-24
p.1(RCC), p.1(NS), p.25(RCS), p.25(SR), p.19(SeMI)
IA, ICSS 2023-06-21
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
A Proposal for Access Control Method based on File Relation Inference from Users Behavior
Yuki Kodaka (SOKENDAI), Hirokazu Hasegawa, Hiroki Takakura (NII) IA2023-8 ICSS2023-8
File access control is an effective method for protecting information from unauthorized access both within and outside a... [more] IA2023-8 ICSS2023-8
RCS 2023-06-14
Hokkaido Hokkaido University, and online
(Primary: On-site, Secondary: Online)
Bayesian Receiver Design for Grant-Free NOMA Based on Low-Density Structured OFDM
Kohei Ueda (UEC), Takanori Hara (Tokyo Univ. of Science), Koji Ishibashi (UEC) RCS2023-45
This paper studies a grant-free non-orthogonal multiple access (GF-NOMA) system using orthogonal frequency division mult... [more] RCS2023-45
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Proposal of Applying Blockchain Technology to IoT Data Distribution Method
Hayato Kumazaki, Takafumi Taya, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ.) IN2022-110
We have proposed Ticket-based Access Control, an access control system with a token called a ticket and Tag ID, which is... [more] IN2022-110
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
(Primary: On-site, Secondary: Online)
FPGA-based Accelerators System with Autonomous DMA Engine
Tomoya Yokono, Yoshiro Yamabe, Kenji Tanaka, Yuki Arikawa, Teruaki Ishizaki (NTT) VLD2022-28 ICD2022-45 DC2022-44 RECONF2022-51
Recently, computing systems have comprised specialized computing components such as FPGAs, GPUs, and various ASIC accele... [more] VLD2022-28 ICD2022-45 DC2022-44 RECONF2022-51
SR 2022-11-08
Fukuoka Fukuoka University
(Primary: On-site, Secondary: Online)
Adaptive selection of radio access technology for V2X with radio environment database
Atsuki Mukoda, Takeo Fujii (UEC) SR2022-58
With the development of automated driving systems, the day when autonomous driving vehicles and non-autonomous driving v... [more] SR2022-58
RCS 2022-06-17
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
A Study on Irregular Sparse Superposition Code for Massive NOMA Detection
Shinya Oishi, Shinsuke Ibi (Doshisha Univ.), Takumi Takahashi (Osaka Univ.), Hisato Iwai (Doshisha Univ.) RCS2022-58
Orthogonal multiple access (OMA) is finding it difficult to cope with the increase in wireless traffic due to the Intern... [more] RCS2022-58
MRIS, ITE-MMS 2022-06-09
Miyagi RIEC, Tohoku Univ.
(Primary: On-site, Secondary: Online)
Evaluation study of data access performance of distributed storage Ceph, using a brain neuronal structure visualization tool
Yuki Kawada, Yoichiro Tanaka (Tohoku Univ) MRIS2022-5
In the information society, data access performance has become an issue as storage systems grew in size. In this researc... [more] MRIS2022-5
CCS, NLP 2022-06-10
(Primary: On-site, Secondary: Online)
Application of pairing optimization algorithm to non-orthogonal multiple access
Naoki Fujita, Andre Roehm, Takatomo Mihana, Ryoichi Horisaki (The Univ. of Tokyo), Aohan Li (The Univ. of Electro-Communications), Mikio Hasegawa (Tokyo Univ. of Science), Makoto Naruse (The Univ. of Tokyo) NLP2022-25 CCS2022-25
Non-Orthogonal Multiple Access (NOMA) is a promising next-generation communication technology that enables multiple term... [more] NLP2022-25 CCS2022-25
IT, ISEC, RCC, WBS 2022-03-10
Online Online A New Necessary and Sufficient Condition for the Existence of a one-bit Secret Sharing Scheme and Its Applications
Ryo Okamura, Hiroki Koga (Univ. Tsukuba) IT2021-83 ISEC2021-48 WBS2021-51 RCC2021-58
In a secret sharing scheme, a dealer generates $n$ shares from a secret and distributes the $n$ shares to respective par... [more] IT2021-83 ISEC2021-48 WBS2021-51 RCC2021-58
IT, ISEC, RCC, WBS 2022-03-10
Online Online On the Optimal Construction of a Visual Cryptography Scheme with Multiple Access Structures
Raiki Ioki, Hiroki Koga (Tsukuba Univ.) IT2021-84 ISEC2021-49 WBS2021-52 RCC2021-59
A visual cryptography scheme (VCS) is a secret sharing scheme for digital images. In a VCS, two $n×m$ Boolean matrices, ... [more] IT2021-84 ISEC2021-49 WBS2021-52 RCC2021-59
EMM 2022-03-07
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
Access Control of Vision Transformer models without performance degradation
Ryota Iijima, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2021-104
In this paper, we propose a novel access control method to protect trained models from unauthorized access. Conventional... [more] EMM2021-104
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Evaluation of Processing Delay of Authentication and Authorization Infrastructure for IoT Data Distribution System Using Ticket-based Access Control
Masaki Yoshii, Ryohei Banno, Osamu Mizuno (Kogakuin Univ.) IA2021-39
We have proposed a new service model based on IoT data distribution using fog computing. It is expected that fog nodes i... [more] IA2021-39
CPM 2021-10-27
Online Online Characterization of HfO2 film for Resistive Random Access Memory
Yuki Kawai, Masaru Sato, Mayumi B Takeyama (Kitami Inst. of Tech.) CPM2021-31
In recent years, resistive random access memory has been attracting attention because it can operate faster and consume ... [more] CPM2021-31
RCS 2021-10-22
Online Online [Poster Presentation] Investigation of NOMA-Based Highly-Efficient Low-Latency Random Access
Kenichi Higuchi (Tokyo Univ. of Science) RCS2021-139
In this paper, we introduce some of our recent studies on highly-efficient low-latency random access that realize multi-... [more] RCS2021-139
RCS 2021-06-23
Online Online Efficient HARQ Method Using Hierarchically Structured Physical Channel Identifiers in NOMA-based Random Access for Multi-Packet Reception
Megumi Asada (Tokyo Univ. of Science), Nobuhide Nonaka (NTT DOCOMO), Kenichi Higuchi (Tokyo Univ. of Science) RCS2021-36
This paper proposes an efficient hybrid automatic repeat request (HARQ) method achieving both the packet combining and r... [more] RCS2021-36
ED, SDM, CPM 2021-05-27
Online Online Evaluation of I-V Characteristics of Zr/ZrOx/Pt Structure for Resistive Random Access Memory
Yuki Kawai, Masaru Sato, Mayumi B. Takeyama (Kitami Inst. of Tech.) ED2021-3 CPM2021-3 SDM2021-14
Resistive random access memory is attracting attention as the next generation non-volatile memory. However, there are v... [more] ED2021-3 CPM2021-3 SDM2021-14
WBS, IT, ISEC 2021-03-04
Online Online [Invited Talk] Management of Multiple Wireless Access for IOWN in the 6G era
Yasushi Takatori (NTT) IT2020-134 ISEC2020-64 WBS2020-53
Future networks are expected to provide high-speed, large-capacity communications that exceed the limits of conventional... [more] IT2020-134 ISEC2020-64 WBS2020-53
 Results 1 - 20 of 154  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan