ITE Technical Group Submission System
Conference Schedule |
Online Proceedings
[Sign in]
|
|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BCT, IEICE-CS, IPSJ-AVM, IEICE-IE [detail] |
2020-11-26 14:10 |
Online |
Online |
Desigining of ThingVisor Factory Controller for efficient IoT service deployment and its latency evaluations Keisuke Takahashi, Hidenori Nakazato, Kenji Kanai (Waseda Univ.) |
[more] |
|
BCT, IEICE-CS, IPSJ-AVM, IEICE-IE [detail] |
2020-11-27 15:00 |
Online |
Online |
Comparative Study of Channel Estimation using Deep-learning based Super-resolution Daiki Maruyama, Kenji Kanai, Jiro Katto (Waseda Univ.) |
[more] |
|
IPSJ-AVM, IEICE-CS, IEICE-IE, BCT [detail] |
2013-12-06 10:45 |
Kyoto |
60th Anniversary Hall, Kyoto Institute of Technology |
Development and Evaluation of Regional Information Platform and Information Distribution System
-- For Tourism Promotion and Disaster Prevention -- Tadashi Miyosawa, Hiroo Hirose, Takeshi Tsuchiya (TUS Suwa), Wataru Kameyama, Keiichi Koyanagi (Waseda), Hisashi Yamamoto (Machiken), Hideyasu Karasawa, Hidenaga Karasawa (DCB), Kenichi Masuzawa (LCV) |
As the main focus of this research, we constructed an experimental website for the communication broadcasting cooperativ... [more] |
BCT2013-108 pp.135-140 |
IEICE-MRIS, MMS |
2011-11-18 16:30 |
Tokyo |
Waseda Univ. |
Development of ordered-array using FePt nanoparticles for bit-patterned media Wataru Sato, Takuma Hachisu, Atsushi Sugiyama, Jun Mizuno, Shuichi Shoji, Tetsuya Osaka (Waseda Univ.) |
[more] |
|
ME, IEICE-BS |
2009-12-04 11:20 |
Nagano |
Nagano Prefecture General Industrial Technology Center |
A Study on the framework of Biometric Cryptosystem using a Common Template Kohei Shukuzawa, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (Kitakyushu Univ.), Naohisa Komatsu (Waseda Univ.) |
In personal authentication that uses biometric cryptosystem, there is a risk of leakage of biometric information by the ... [more] |
ME2009-226 pp.49-52 |
|
|
|
[Return to Top Page]
[Return to ITE Web Page]
|