Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, NS, CQ, NV (Joint) |
2023-11-22 09:50 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
A survey on suitable hook points for outbound packet monitoring using eBPF Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27 |
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] |
ICM2023-27 pp.26-31 |
CPM |
2023-07-31 15:10 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Investigation of MIM structure with ZrN electrode as Resistive Random Access Memory Toyoki Miura, Masaru Sato, Mayumi Takeyama (Kitami Institute) CPM2023-14 |
In the rapidly advancing information society, higher performance nonvolatile memories are demanded. In such a situation,... [more] |
CPM2023-14 pp.11-12 |
SeMI, RCS, RCC, NS, SR (Joint) |
2023-07-12 14:40 |
Osaka |
Osaka University Nakanoshima Center + Online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Research on UAV based smart wireless system Gia Khanh Tran (Tokyo Tech) RCC2023-13 NS2023-31 RCS2023-83 SR2023-30 SeMI2023-24 |
In beyond 5G (B5G)/6G, mobile communication systems are expected to function as the basic infrastructure of society. On ... [more] |
RCC2023-13 NS2023-31 RCS2023-83 SR2023-30 SeMI2023-24 p.1(RCC), p.1(NS), p.25(RCS), p.25(SR), p.19(SeMI) |
IA, ICSS |
2023-06-21 09:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Proposal for Access Control Method based on File Relation Inference from Users Behavior Yuki Kodaka (SOKENDAI), Hirokazu Hasegawa, Hiroki Takakura (NII) IA2023-8 ICSS2023-8 |
File access control is an effective method for protecting information from unauthorized access both within and outside a... [more] |
IA2023-8 ICSS2023-8 pp.40-47 |
RCS |
2023-06-14 17:30 |
Hokkaido |
Hokkaido University, and online (Primary: On-site, Secondary: Online) |
Bayesian Receiver Design for Grant-Free NOMA Based on Low-Density Structured OFDM Kohei Ueda (UEC), Takanori Hara (Tokyo Univ. of Science), Koji Ishibashi (UEC) RCS2023-45 |
This paper studies a grant-free non-orthogonal multiple access (GF-NOMA) system using orthogonal frequency division mult... [more] |
RCS2023-45 pp.99-104 |
IN, NS (Joint) |
2023-03-03 12:00 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Proposal of Applying Blockchain Technology to IoT Data Distribution Method Hayato Kumazaki, Takafumi Taya, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ.) IN2022-110 |
We have proposed Ticket-based Access Control, an access control system with a token called a ticket and Tag ID, which is... [more] |
IN2022-110 pp.265-270 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 10:45 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
FPGA-based Accelerators System with Autonomous DMA Engine Tomoya Yokono, Yoshiro Yamabe, Kenji Tanaka, Yuki Arikawa, Teruaki Ishizaki (NTT) VLD2022-28 ICD2022-45 DC2022-44 RECONF2022-51 |
Recently, computing systems have comprised specialized computing components such as FPGAs, GPUs, and various ASIC accele... [more] |
VLD2022-28 ICD2022-45 DC2022-44 RECONF2022-51 pp.55-60 |
SR |
2022-11-08 09:55 |
Fukuoka |
Fukuoka University (Primary: On-site, Secondary: Online) |
Adaptive selection of radio access technology for V2X with radio environment database Atsuki Mukoda, Takeo Fujii (UEC) SR2022-58 |
With the development of automated driving systems, the day when autonomous driving vehicles and non-autonomous driving v... [more] |
SR2022-58 pp.71-77 |
RCS |
2022-06-17 10:05 |
Okinawa |
University of the Ryukyus, Senbaru Campus and online (Primary: On-site, Secondary: Online) |
A Study on Irregular Sparse Superposition Code for Massive NOMA Detection Shinya Oishi, Shinsuke Ibi (Doshisha Univ.), Takumi Takahashi (Osaka Univ.), Hisato Iwai (Doshisha Univ.) RCS2022-58 |
Orthogonal multiple access (OMA) is finding it difficult to cope with the increase in wireless traffic due to the Intern... [more] |
RCS2022-58 pp.200-205 |
MRIS, ITE-MMS |
2022-06-09 15:50 |
Miyagi |
RIEC, Tohoku Univ. (Primary: On-site, Secondary: Online) |
Evaluation study of data access performance of distributed storage Ceph, using a brain neuronal structure visualization tool Yuki Kawada, Yoichiro Tanaka (Tohoku Univ) MRIS2022-5 |
In the information society, data access performance has become an issue as storage systems grew in size. In this researc... [more] |
MRIS2022-5 pp.24-29 |
CCS, NLP |
2022-06-10 17:10 |
Osaka |
(Primary: On-site, Secondary: Online) |
Application of pairing optimization algorithm to non-orthogonal multiple access Naoki Fujita, Andre Roehm, Takatomo Mihana, Ryoichi Horisaki (The Univ. of Tokyo), Aohan Li (The Univ. of Electro-Communications), Mikio Hasegawa (Tokyo Univ. of Science), Makoto Naruse (The Univ. of Tokyo) NLP2022-25 CCS2022-25 |
Non-Orthogonal Multiple Access (NOMA) is a promising next-generation communication technology that enables multiple term... [more] |
NLP2022-25 CCS2022-25 pp.129-134 |
IT, ISEC, RCC, WBS |
2022-03-10 09:40 |
Online |
Online |
A New Necessary and Sufficient Condition for the Existence of a one-bit Secret Sharing Scheme and Its Applications Ryo Okamura, Hiroki Koga (Univ. Tsukuba) IT2021-83 ISEC2021-48 WBS2021-51 RCC2021-58 |
In a secret sharing scheme, a dealer generates $n$ shares from a secret and distributes the $n$ shares to respective par... [more] |
IT2021-83 ISEC2021-48 WBS2021-51 RCC2021-58 pp.1-6 |
IT, ISEC, RCC, WBS |
2022-03-10 10:05 |
Online |
Online |
On the Optimal Construction of a Visual Cryptography Scheme with Multiple Access Structures Raiki Ioki, Hiroki Koga (Tsukuba Univ.) IT2021-84 ISEC2021-49 WBS2021-52 RCC2021-59 |
A visual cryptography scheme (VCS) is a secret sharing scheme for digital images. In a VCS, two $n×m$ Boolean matrices, ... [more] |
IT2021-84 ISEC2021-49 WBS2021-52 RCC2021-59 pp.7-12 |
EMM |
2022-03-07 16:35 |
Online |
(Primary: Online, Secondary: On-site) (Primary: Online, Secondary: On-site) |
Access Control of Vision Transformer models without performance degradation Ryota Iijima, Yuma Kinoshita, Hitoshi Kiya (Tokyo Metro. Univ.) EMM2021-104 |
In this paper, we propose a novel access control method to protect trained models from unauthorized access. Conventional... [more] |
EMM2021-104 pp.70-75 |
IN, IA (Joint) |
2021-12-16 17:05 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Evaluation of Processing Delay of Authentication and Authorization Infrastructure for IoT Data Distribution System Using Ticket-based Access Control Masaki Yoshii, Ryohei Banno, Osamu Mizuno (Kogakuin Univ.) IA2021-39 |
We have proposed a new service model based on IoT data distribution using fog computing. It is expected that fog nodes i... [more] |
IA2021-39 pp.44-49 |
CPM |
2021-10-27 15:10 |
Online |
Online |
Characterization of HfO2 film for Resistive Random Access Memory Yuki Kawai, Masaru Sato, Mayumi B Takeyama (Kitami Inst. of Tech.) CPM2021-31 |
In recent years, resistive random access memory has been attracting attention because it can operate faster and consume ... [more] |
CPM2021-31 pp.43-45 |
RCS |
2021-10-22 15:00 |
Online |
Online |
[Poster Presentation]
Investigation of NOMA-Based Highly-Efficient Low-Latency Random Access Kenichi Higuchi (Tokyo Univ. of Science) RCS2021-139 |
In this paper, we introduce some of our recent studies on highly-efficient low-latency random access that realize multi-... [more] |
RCS2021-139 pp.112-119 |
RCS |
2021-06-23 13:00 |
Online |
Online |
Efficient HARQ Method Using Hierarchically Structured Physical Channel Identifiers in NOMA-based Random Access for Multi-Packet Reception Megumi Asada (Tokyo Univ. of Science), Nobuhide Nonaka (NTT DOCOMO), Kenichi Higuchi (Tokyo Univ. of Science) RCS2021-36 |
This paper proposes an efficient hybrid automatic repeat request (HARQ) method achieving both the packet combining and r... [more] |
RCS2021-36 pp.43-48 |
ED, SDM, CPM |
2021-05-27 14:10 |
Online |
Online |
Evaluation of I-V Characteristics of Zr/ZrOx/Pt Structure for Resistive Random Access Memory Yuki Kawai, Masaru Sato, Mayumi B. Takeyama (Kitami Inst. of Tech.) ED2021-3 CPM2021-3 SDM2021-14 |
Resistive random access memory is attracting attention as the next generation non-volatile memory. However, there are v... [more] |
ED2021-3 CPM2021-3 SDM2021-14 pp.11-14 |
WBS, IT, ISEC |
2021-03-04 16:25 |
Online |
Online |
[Invited Talk]
Management of Multiple Wireless Access for IOWN in the 6G era Yasushi Takatori (NTT) IT2020-134 ISEC2020-64 WBS2020-53 |
Future networks are expected to provide high-speed, large-capacity communications that exceed the limits of conventional... [more] |
IT2020-134 ISEC2020-64 WBS2020-53 pp.134-138 |