Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2023-03-02 13:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Performance of scheduling model for simultaneous update of multiple service function chains guaranteeing state consistency Tomoki Takahashi, Takehiro Sato, Eiji Oki (Kyoto Univ.) |
(To be available after the conference date) [more] |
|
IN, NS (Joint) |
2023-03-02 13:50 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Scheduling Model for Virtualized Network Update with Congestion Freedom Takehiro Sato (Kyoto Univ.), Takashi Kurimoto, Shigeo Urushidani (NII), Eiji Oki (Kyoto Univ.) |
(To be available after the conference date) [more] |
|
SIS |
2022-12-05 14:10 |
Osaka |
(Primary: On-site, Secondary: Online) |
A Study on Image Decoloring Method Using Sequentially Updated Signed Color Distance Daichi Hiroe, Go Tanaka (Nagoya City Univ.) SIS2022-25 |
In recent years, color removal methods considering differences of colors in an input color image have been investigated.... [more] |
SIS2022-25 pp.11-14 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-28 16:55 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Development of ontology for a chatbot with frequently updated knowledge Shigenori Takeda, Takako Nakatani (OUJ) SS2022-5 KBSE2022-15 |
If we implement frequently updated knowledge in an instance model ontology, the ontology should be updated according to ... [more] |
SS2022-5 KBSE2022-15 pp.25-30 |
ICSS, IPSJ-SPT |
2022-03-08 15:10 |
Online |
Online |
Proposal of a lattice-based accumulator with efficient update function Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji (Osaka Univ) ICSS2021-80 |
In recent years, as the digitization of various information and assets continues, the technology of proving the ownershi... [more] |
ICSS2021-80 pp.129-134 |
HCGSYMPO (2nd) |
2021-12-15 - 2021-12-17 |
Online |
Online |
Analysis and generalization of anchoring effects using a Bayesian update model Tomoaki Hamada, Takashi Takekawa, Isao Ozawa (KUTE-TOKYO) |
In recent years, the Bayesian brain hypothesis has been proposed in the field of neuroscience that Bayesian updates are ... [more] |
|
MSS, CAS, IPSJ-AL [detail] |
2020-11-25 17:00 |
Online |
Online |
Distributed Algorithms based on Multiplicative Update Rules for Nonnegative Matrix Factorization Yohei Domen, Tsuyoshi Migita, Norikazu Takahashi (Okayama Univ.) CAS2020-24 MSS2020-16 |
Nonnegative matrix factorization (NMF) is a multivariate method that approximates a given nonnegative matrix by the prod... [more] |
CAS2020-24 MSS2020-16 pp.28-33 |
EA |
2019-12-13 13:25 |
Fukuoka |
Kyushu Inst. Tech. |
Rank-constrained spatial covariance matrix estimation based on multivariate complex generalized Gaussian distribution and its acceleration for blind speech extraction Yuki Kubo, Norihiro Takamune (UTokyo), Daichi Kitamura (NIT, Kagawa), Hiroshi Saruwatari (UTokyo) EA2019-78 |
In this paper, we generalize a generative model in rank-constrained spatial covariance matrix estimation that separates ... [more] |
EA2019-78 pp.85-92 |
ICM |
2019-07-12 09:00 |
Hokkaido |
|
An effective automated planning method for large-scale ICT system updates with high symmetry Takuya Kuwahara (NEC), Yutaro Tsunekawa, Ryoto Saito, Kazunori Ueda (Waseda Univ.) ICM2019-15 |
Declarative system update is devalopped as a promising technique to reduce burden for system operators updating their sy... [more] |
ICM2019-15 pp.53-58 |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-11 13:00 |
Osaka |
I-Site Nanba(Osaka) |
[Invited Lecture]
* Takeshi Ogawa (Tokyo Denki Univ.) RCC2019-37 NS2019-73 RCS2019-130 SR2019-49 SeMI2019-46 |
The cloud is expected to realize advanced IoT services by using IoT machines such as many sensors installed outdoors. Al... [more] |
RCC2019-37 NS2019-73 RCS2019-130 SR2019-49 SeMI2019-46 pp.125-126(RCC), pp.151-152(NS), pp.147-148(RCS), pp.157-158(SR), pp.139-140(SeMI) |
CS |
2019-07-04 09:00 |
Kagoshima |
Amami City Social Welfare Center |
A Novel Visual Similarity-based Phishing Detection Methodology Using Hue Information with Auto Updating Database Shuichiro Haruta, Fumitaka Yamazaki, Hiromu Asahina, Iwao Sasase (Keio Univ.) CS2019-14 |
In this paper, we propose a novel visual similarity-based phishing detection methodology using hue information with aut... [more] |
CS2019-14 pp.7-12 |
ET |
2019-03-15 15:15 |
Tokushima |
Naruto University of Education |
Research the period should be gave activity details of a supporting system for research activities Shintaro Hiromura (Shinshu Univ.), Hisayoshi Kunimune (Chiba Inst. of Tech.), Masaaki Niimura (Shinshu Univ.) ET2018-104 |
We develop and operate a research activity support system to promote self-regulated research activities. This system man... [more] |
ET2018-104 pp.99-104 |
EA, SIP, SP |
2019-03-14 15:40 |
Nagasaki |
i+Land nagasaki (Nagasaki-shi) |
Estimation of rank-constrained spatial covariance model based on multivariate complex Student's t distribution for blind source separation Yuki Kubo, Norihiro Takamune (UTokyo), Daichi Kitamura (Kagawa NCIT), Hiroshi Saruwatari (UTokyo) EA2018-128 SIP2018-134 SP2018-90 |
In this paper, we generalize a generative model in estimation of rank-constrained spatial covariance model that separate... [more] |
EA2018-128 SIP2018-134 SP2018-90 pp.173-178 |
CAS, ICTSSL |
2019-01-24 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On automatic configuration and update of a transmittable area of information floating in a road network Keisuke Nakano, Kazuyuki Miyakita, Naoyuki Karasawa (Niigata Univ.) CAS2018-119 ICTSSL2018-38 |
By permitting mobile nodes to transmit information only in areas called Transmittable Areas (TAs), we can deliver inform... [more] |
CAS2018-119 ICTSSL2018-38 pp.17-20 |
NLP, NC (Joint) |
2019-01-24 15:20 |
Hokkaido |
The Centennial Hall, Hokkaido Univ. |
A New Method for Deriving Multiplicative Update Rules for NMF with Error Functions Containing Logarithm Akihiro Koso, Norikazu Takahashi (Okayama Univ.) NLP2018-122 |
Nonnegative Matrix Factorization (NMF) is an operation that decomposes a given nonnegative matrix X into two nonnegative... [more] |
NLP2018-122 pp.137-142 |
IN |
2019-01-21 13:15 |
Aichi |
WINC AICHI |
Cache Update Method Based on Content Update Dynamic Queries for Named Data Networking Takatoshi Miwa, Shigetomo Kimura (Univ. of Tsukuba) IN2018-72 |
In Named Data Networking (NDN), a client requests a content by its content identifier, instead of the server's IP addres... [more] |
IN2018-72 pp.1-6 |
IN, ICTSSL, NWS (Joint) [detail] |
2018-10-19 10:10 |
Kagawa |
Takamatsu Shoko Kaigisyo Kaikan |
On automatic configuration and update of a transmittable area in information floating Keisuke Nakano, Kazuyuki Miyakita (Niigata Univ.) ICTSSL2018-28 IN2018-45 |
In this report, we propose a method to automatically configure the size of a Transmittable Area (TA) for Information Flo... [more] |
ICTSSL2018-28 IN2018-45 pp.13-18 |
IA |
2018-09-04 15:40 |
Hokkaido |
Hokkaido Univ. Conference Hall |
The Equal Longest Path First Reboot
-- Rebooting Network Edge Switches in a Campus Network -- Motoyuki Ohmori, Masayuki Higashino (Tottori Univ.) IA2018-29 |
Even in the era of Software Defined Network (SDN) or Software Defined Infrastructure (SDI), network edge switches still ... [more] |
IA2018-29 pp.83-89 |
SRW |
2018-08-20 12:45 |
Okayama |
Okayama Univ. |
Implementations of System Software Update and User Authentication Functions in Elastic Wireless Local-Area Network System Md. Manowarul Islam, Nobuo Funabiki, Minoru Kuribayashi, Rahardhita Widyatra Sudibyo, Kwenga Ismael Munene (Okayama Univ.) SRW2018-14 |
Nowadays, the wireless local-area network (WLAN) has become common for the Internet access due to a low-cost solution us... [more] |
SRW2018-14 pp.31-36 |
WBS, IT, ISEC |
2018-03-09 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-140 ISEC2017-128 WBS2017-121 |
A public-key encryption with keyword search (PEKS) scheme is applicable to safe cloud services as a user can search a ke... [more] |
IT2017-140 ISEC2017-128 WBS2017-121 pp.219-223 |