paper

Size: px
Start display at page:

Download "paper"

Transcription

1 WISS2013 EpisoPass:. / EpisoPass EpisoPass / 1 [21] [8] Florêncio % [5] [23] [1][3][12] [18] Copyright is held by the author(s). Toshiyuki Masui, [25] [2][19] EpisoPass 2 EpisoPass 2.1 EpisoPass EpisoPass

2 WISS EpisoPass twitter EpisoPass 1 1 Twitter Mfveabn / PassWord123!@# JSON JSON & Facebook Twitter. 2. FaceBook Masui [1][3][12] [18] EpisoPass

3 EpisoPass: Android Web JavaScript Android Android Android Android 4 4. Android. Android EpisoPass Android EpisoPass EpisoPass Google Play 2 EpisoPass.com 2 pitecan.episo pass 2.3 MD EpisoPass EpisoPass EpisoPass EpisoPass EpisoPass EpisoPass EpisoPass SuperGenPass[18]

4 WISS [7][11] EpisoPass EpisoPass (10 8 ) pmvixuzq 20 [14] 10 [6]?? [15] [10][16] EpisoPass 3.3 EpisoPass ( ) ( ) Web [17][24] 40?

5 EpisoPass: Web [2][9][19] (Cognometric ) (Locimetric ) (Drawmetric ) [2][9] EpisoPass 1 URL Cognometric Locimetric [4] Drawmetric [13] EpisoPass [22] 5.org[20] / EpisoPass EpisoPass [1] AgileBits Inc. 1Password. onepassword. [2] R. Biddle, S. Chiasson, and P. Van Oorschot. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv., 44(4):19:1 19:41, Sept [3] Dashlane, Inc. Dashlane. com/. [4] A. E. Dirik, N. Memon, and J.-C. Birget. Modeling user choice in the PassPoints graphical password scheme. In Proceedings of the 3rd symposium on Usable privacy and security, SOUPS 07, pp , [5] D. Florêncio and C. Herley. A large-scale study of web password habits. In Proceedings of the 16th international conference on World Wide Web, WWW 07, pp , [6] D. Florêncio, C. Herley, and B. Coskun. Do strong web passwords accomplish anything? In Proceedings of the 2nd USENIX workshop on Hot topics in security, HOTSEC 07, pp. 10:1 10:6, Berkeley, CA, USA, USENIX Association. [7] E. Hayashi and J. Hong. A diary study of password usage in daily life. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 11, pp , [8] C. Herley, P. C. Oorschot, and A. S. Patrick. Passwords: If We re So Smart, Why Are We Still Using Them? In R. Dingledine and P. Golle eds., Financial Cryptography and Data Security, pp Springer-Verlag,

6 WISS 2013 [9] Internet Safety Project. Graphical Passwords. wiki/graphical-passwords. [10] M. Just and D. Aspinall. Personal choice and challenge questions: a security and usability assessment. In Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 09, pp. 8:1 8:11, [11] S. Komanduri, R. Shay, P. G. Kelley, M. L. Mazurek, L. Bauer, N. Christin, L. F. Cranor, and S. Egelman. Of passwords and people: measuring the effect of password-composition policies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 11, pp , [12] LastPass.com. LastPass. [13] D. Nali and J. Thorp. Analyzing user choice in graphical passwords. Technical Report TR-04-01, School of Computer Science, Carleton University, Ottawa, [14] National Institute of Standards and Technology. Electronic Authentication Guideline. NIST Special Publication publications/nistpubs/ /sp pdf, [15] A. Rabkin. Personal knowledge questions for fallback authentication: security questions in the era of Facebook. In Proceedings of the 4th symposium on Usable privacy and security, SOUPS 08, pp , [16] S. Schechter, A. J. B. Brush, and S. Egelman. It s No Secret. Measuring the Security and Reliability of Authentication via Secret Questions. In Proceedings of the th IEEE Symposium on Security and Privacy, SP 09, pp , [17] R. C. Wang and W. W. Cohen. Language- Independent Set Expansion of Named Entities Using the Web. In Proceedings of the 2007 Seventh IEEE International Conference on Data Mining, ICDM 07, pp , [18] C. Zarate. SuperGenPass. com/. [19],,.., 47(5): , May [20]. :. 2005, pp , February [21].. Unix Magazine, 21(3), March UnixMagazine/PDF/if0603.pdf. [22] , [23]. ID. news/2012/ html, February [24],,. Web.., 47(19):98 112, December [25],... ISEC,, 111(285): , November : A f N () B f N () f N (x) = (10 + N x) mod 10 N N =5f 5 (x) = (10+5 x) mod 10 x f 5 (x) f 5 (0) = 5 f 5 (1) = 4... f 5 (8) = 7 f 5 (9) = 6 f N () N N f N () N N EpisoPass f N () 1. S 2. S MD5 M(16 32 ) 3. k M (k 1) 4 (k 1) 4+3 (16 4 ) N M x1234 = f 4660 (x)

WISS EpisoPass EpisoPass twitter EpisoPass 1 1 Twitter Mfveabn Twitter. JSON

WISS EpisoPass EpisoPass twitter EpisoPass 1 1 Twitter Mfveabn Twitter. JSON WISS2013 EpisoPass: EpisoPass: Password Management based on Episodic Memories Summary. / EpisoPass EpisoPass / 1 [29] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [32] [1][3][12][14][18][21][24]

More information

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji

(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake

More information

IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum

IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum 1 2 1 3 PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fumio Sugai, 1 Masami Ikeda, 2 Naonobu Okazaki 1 and Mi RangPark 3 In recent years,

More information

IPSJ SIG Technical Report Vol.2014-MBL-70 No.20 Vol.2014-UBI-41 No /3/14 1,a) Yuko Hirabe 1,a) Mai Tsuda 1 Yutaka Arakawa 1 Keiichi Yasum

IPSJ SIG Technical Report Vol.2014-MBL-70 No.20 Vol.2014-UBI-41 No /3/14 1,a) Yuko Hirabe 1,a) Mai Tsuda 1 Yutaka Arakawa 1 Keiichi Yasum 1,a) 1 1 1 Yuko Hirabe 1,a) Mai Tsuda 1 Yutaka Arakawa 1 Keiichi Yasumoto 1 1. A) B) C) [1] 3 A) B) GPS (Global Positioning System) GPS 1 Nara Institute of Science and Technology 8916-5, Takayama, Ikoma,

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

Web Web Web Web i

Web Web Web Web i 28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3 36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there

More information

ディスプレイと携帯端末間の通信を実現する映像媒介通信技術

ディスプレイと携帯端末間の通信を実現する映像媒介通信技術 Data Transfer Technology to Enable Communication between Displays and Smart Devices 倉木健介 中潟昌平 田中竜太 阿南泰三 あらまし Abstract Recently, the chance to see videos in various places has increased due to the speedup

More information

GUI(Graphical User Interface) GUI CLI(Command Line Interface) GUI

GUI(Graphical User Interface) GUI CLI(Command Line Interface) GUI 24 GUI(Graphical User Interface) GUI CLI(Command Line Interface) GUI 1 1 1.1 GUI................................... 1 1.2 GUI.................... 1 1.2.1.......................... 1 1.2.2...........................

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

Lyra 2 2 2 X Y X Y ivis Designer Lyra ivisdesigner Lyra ivisdesigner 2 ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) (1) (2) (3) (4) (5) Iv Studio [8] 3 (5) (4) (1) (

Lyra 2 2 2 X Y X Y ivis Designer Lyra ivisdesigner Lyra ivisdesigner 2 ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) (1) (2) (3) (4) (5) Iv Studio [8] 3 (5) (4) (1) ( 1,a) 2,b) 2,c) 1. Web [1][2][3][4] [5] 1 2 a) ito@iplab.cs.tsukuba.ac.jp b) misue@cs.tsukuba.ac.jp c) jiro@cs.tsukuba.ac.jp [6] Lyra[5] ivisdesigner[6] [7] 2 Lyra ivisdesigner c 2012 Information Processing

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

WISS 2008 [2] PowerPoint[7] KeyNote[8] ZUI(Zooming User Interface) ZUI 1. : Pad[9] CounterPoint[10] KidPad[11] ( ); ( ). [12] 3 4 [12] 5 3 TabletPC 2

WISS 2008 [2] PowerPoint[7] KeyNote[8] ZUI(Zooming User Interface) ZUI 1. : Pad[9] CounterPoint[10] KidPad[11] ( ); ( ). [12] 3 4 [12] 5 3 TabletPC 2 WISS2008 An Augmented Dining System for Cooking Optical Decorations and Storytelling Summary. 1 [1] 1 [2] 1 1 Flash Copyright is held by the author(s). Maki Mori,, Kazutaka Kurihara, /, Tsukada Koji,,

More information

( ) ATR

( ) ATR NAIST-IS-MT1151006 2013 2 7 ( ) ATR ,,,,, NAIST-IS-MT1151006, 2013 2 7. i Communication Robot for Expressing User s Physically Aggressive Behavior Maiko Adachi Abstract This thesis investigates how to

More information

untitled

untitled 22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

HASC2012corpus HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus

HASC2012corpus HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus HASC2012corpus 1 1 1 1 1 1 2 2 3 4 5 6 7 HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus: Human Activity Corpus and Its Application Nobuo KAWAGUCHI,

More information

ipod touch 1 2 Apple ipod touch ipod touch 3 ( ) ipod touch ( 1 ) Apple ( 2 ) Web 1),2) 3. ipod touch 1 2 ipod touch x y z i

ipod touch 1 2 Apple ipod touch ipod touch 3 ( ) ipod touch ( 1 ) Apple ( 2 ) Web 1),2) 3. ipod touch 1 2 ipod touch x y z i ipod touch 1 1 ipod touch. 1) 6 2) 3) A library for detecting movements of an ipod touch by 3D acceleration Akira Kotaki 1 and Mariko Sasakura 1 The aim of this study is to develop a library for detecting

More information

untitled

untitled IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)

More information

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor 独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that

More information

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU 1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale

More information

Vol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a

Vol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a 1,a) 2012 6 1, 2012 12 20 A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a) Received: June 1, 2012, Accepted: December 20, 2012 Abstract: On the disasters, the

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL

2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL 1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita

More information

科技表紙PDF200602

科技表紙PDF200602 Science & Technology Trends February 2006 1 1 Science & Technology Trends February 2006 11 2 12 3 Science & Technology Trends February 2006 13 14 4 Science & Technology Trends February 2006 15 16 Science

More information

25

25 25 Android 1 1 1.1............................ 1 1.2.................... 1 1.3................... 2 1.4................................... 3 1.5............................... 3 1.6...................................

More information

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( ) 1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose

More information

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect Using a Human-Shaped Input Device for Remote Pose Instruction Yuki Tayama 1,a) Yoshiaki Ando 2,b) Misaki Hagino 2,c) Ken-ichi Okada 1,d) Abstract: There

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

MORALITY LEARNING AMBITION 2 KASUMIGAOKA

MORALITY LEARNING AMBITION 2 KASUMIGAOKA KASUMIGAOKA MORALITY LEARNING AMBITION 2 KASUMIGAOKA KASUMIGAOKA 3 4 KASUMIGAOKA KASUMIGAOKA 5 Super Science High School 6 KASUMIGAOKA School Life 4 April 5 May 6 June 7 July 8 August 9 September 10 October

More information

BOK body of knowledge, BOK BOK BOK 1 CC2001 computing curricula 2001 [1] BOK IT BOK 2008 ITBOK [2] social infomatics SI BOK BOK BOK WikiBOK BO

BOK body of knowledge, BOK BOK BOK 1 CC2001 computing curricula 2001 [1] BOK IT BOK 2008 ITBOK [2] social infomatics SI BOK BOK BOK WikiBOK BO DEIM Forum 2012 C8-5 WikiBOK 252 5258 5 10 1 E-mail: shunsuke.shibuya@gmail.com, {kaz,masunaga}@si.aoyama.ac.jp, {yabuki,sakuta}@it.aoyama.ac.jp Body Of Knowledge, BOK BOK BOK BOK BOK, BOK Abstract Extention

More information

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twitter Ustream 1 Graduate School of Information Science and Technology, Osaka University, Japan 2 Cybermedia Center, Osaka University,

More information

fiš„v5.dvi

fiš„v5.dvi (2001) 49 2 293 303 VRML 1 2 3 2001 4 12 2001 10 16 Web Java VRML (Virtual Reality Modeling Language) VRML Web VRML VRML VRML VRML Web VRML VRML, 3D 1. WWW (World Wide Web) WWW Mittag (2000) Web CGI Java

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S

60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S 1,a) 1 1,b) 1,c) 1,d) Interaction Design for Communication Between Older Adults and Their Families Using Channel-Oriented Interface Takeda Keigo 1,a) Ishiwata Norihiro 1 Nakano Teppei 1,b) Akabane Makoto

More information

1 Web Web 1,,,, Web, Web : - i -

1 Web Web 1,,,, Web, Web : - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数

Firefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数 Computer Security Symposium 2014 22-24 October 2014 Firefox 182-8585 1-5-1 takaken@ol.inf.uec.ac.jp {kazushi, oyama}@inf.uec.ac.jp Web Firefox Firefox Firefox Investigation on Attack and Stealth Methods

More information

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Interactive Recommendation System 1 1 1 1 LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Shun ichi Tano 1 1 Graduate School of Information Systems, The University of Electro-Communications Abstract: The

More information

27 28 2 15 14350922 1 4 1.1.................................... 4 1.2........................... 5 1.3......................... 6 1.4...................................... 7 2 9 2.1..........................

More information

FIT2014( 第 13 回情報科学技術フォーラム ) RD-002 Web SNS Yuanyuan Wang Gouki Yasui Yuji Hosokawa Yukiko Kawai Toyokazu Akiyama Kazutoshi Sumiya 1. Twitter 1 Facebo

FIT2014( 第 13 回情報科学技術フォーラム ) RD-002 Web SNS Yuanyuan Wang Gouki Yasui Yuji Hosokawa Yukiko Kawai Toyokazu Akiyama Kazutoshi Sumiya 1. Twitter 1 Facebo RD-002 Web SNS Yuanyuan Wang Gouki Yasui Yuji Hosokawa Yukiko Kawai Toyokazu Akiyama Kazutoshi Sumiya 1. Twitter 1 Facebook 2 SNS SNS SNS Twitter SNS [1] SNS [2] Twitter Web Web Web Web SNS Web Web 2 Web

More information

1986 NHK 2000 2004 NTT NTT CONTENTS 01 03 05 07 09 11 4 1 13 2 14 34 15 17 19 21 SNS 1 4 12 34 4 23 25 1 26 27 29 01 School of Information and Communi

1986 NHK 2000 2004 NTT NTT CONTENTS 01 03 05 07 09 11 4 1 13 2 14 34 15 17 19 21 SNS 1 4 12 34 4 23 25 1 26 27 29 01 School of Information and Communi 1986 NHK 2000 2004 NTT NTT CONTENTS 01 03 05 07 09 11 4 1 13 2 14 34 15 17 19 21 SNS 1 4 12 34 4 23 25 1 26 27 29 01 School of Information and Communication 02 Point 1 P.1112 2011 Point 2 P.1316 Point

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat 1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2

More information

A Japanese Word Dependency Corpus ÆüËܸì¤Îñ¸ì·¸¤ê¼õ¤±¥³¡¼¥Ñ¥¹

A Japanese Word Dependency Corpus   ÆüËܸì¤Îñ¸ì·¸¤ê¼õ¤±¥³¡¼¥Ñ¥¹ A Japanese Word Dependency Corpus 2015 3 18 Special thanks to NTT CS, 1 /27 Bunsetsu? What is it? ( ) Cf. CoNLL Multilingual Dependency Parsing [Buchholz+ 2006] (, Penn Treebank [Marcus 93]) 2 /27 1. 2.

More information

JAIST Reposi Title 既存曲に合わせて口す さまれる即興歌唱を利用した 音楽創作支援手法に関する研究 Author(s) 柳, 卓知 Citation Issue Date Type Thesis or Dissertation Te

JAIST Reposi   Title 既存曲に合わせて口す さまれる即興歌唱を利用した 音楽創作支援手法に関する研究 Author(s) 柳, 卓知 Citation Issue Date Type Thesis or Dissertation Te JAIST Reposi https://dspace.j Title 既存曲に合わせて口す さまれる即興歌唱を利用した 音楽創作支援手法に関する研究 Author(s) 柳, 卓知 Citation Issue Date 2017-03 Type Thesis or Dissertation Text version author URL http://hdl.handle.net/10119/14119

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

Web 1 q q 2 1 2 Step1) Twitter Step2) (w i, w j ) S(w i, w j ) Step3) q 2 2 2.1 I Twitter MeCab[6] URL http:// @ 2.2 (w i, w j ) S(w i, w j ) I w i w

Web 1 q q 2 1 2 Step1) Twitter Step2) (w i, w j ) S(w i, w j ) Step3) q 2 2 2.1 I Twitter MeCab[6] URL http:// @ 2.2 (w i, w j ) S(w i, w j ) I w i w ARG WI2 No.6, 2015 a b b 565-0871 2-1 a) yoshitake@nanase.comm.eng.osaka-u.ac.jp b) {naoko, babaguchi}@comm.eng.osaka-u.ac.jp 1 Citizen Sensor [1] Twitter 140 Twitter Sakaki [2] [3] Massoudi [4] [5] Copyright

More information

Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3. Form Cookie...6 2.4....7 2.5. HTTP...7 3. STEPS Web...8 3.1....8

Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3. Form Cookie...6 2.4....7 2.5. HTTP...7 3. STEPS Web...8 3.1....8 2001/1/11 Web Simplified Techniques for Econometric Plannings & Simulations for WWW Fujiwara Takamichi 97-5075 N-23 Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3.

More information

untitled

untitled Copyright 2008 IPAAll Rights Reserved 1 1. 2. 3. Copyright 2008 IPAAll Rights Reserved 2 IT IT IT Copyright 2008 IPAAll Rights Reserved http://www.jitec.jp/1_00topic/topic_20071225_shinseido.html 3 URL

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

JST05-11.indd

JST05-11.indd JST News Vol.2/No.8 2005/November 11 What is JST? Japan Science and Technology Agency 03 04 08 10 12 14 16 People Special Report R & D Product Local Technology Literacy Entertainment 3 People JST News

More information

IPSJ SIG Technical Report Vol.2010-SLDM-144 No.50 Vol.2010-EMB-16 No.50 Vol.2010-MBL-53 No.50 Vol.2010-UBI-25 No /3/27 Twitter IME Twitte

IPSJ SIG Technical Report Vol.2010-SLDM-144 No.50 Vol.2010-EMB-16 No.50 Vol.2010-MBL-53 No.50 Vol.2010-UBI-25 No /3/27 Twitter IME Twitte Twitter 1 1 1 IME Twitter 2009 12 15 2010 2 1 13590 4.83% 8.16% 2 3 Web 10 45% Relational Analysis between User Context and Input Word on Twitter Yutaka Arakawa, 1 Shigeaki Tagashira 1 and Akira Fukuda

More information

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP LSM OS 700-8530 3 1 1 matsuda@swlab.it.okayama-u.ac.jp tabata@cs.okayama-u.ac.jp 242-8502 1623 14 munetoh@jp.ibm.com OS Linux 2.6 Linux Security Modules LSM LSM Linux 4 OS OS LSM An Evaluation of Performance

More information

( 1) 3. Hilliges 1 Fig. 1 Overview image of the system 3) PhotoTOC 5) 1993 DigitalDesk 7) DigitalDesk Koike 2) Microsoft J.Kim 4). 2 c 2010

( 1) 3. Hilliges 1 Fig. 1 Overview image of the system 3) PhotoTOC 5) 1993 DigitalDesk 7) DigitalDesk Koike 2) Microsoft J.Kim 4). 2 c 2010 1 2 2 Automatic Tagging System through Discussing Photos Kazuma Mishimagi, 1 Masashi Toda 2 and Toshio Kawashima 2 Many media forms can be stored easily at present. Photographs, for example, can be easily

More information

posttruth-mod.key

posttruth-mod.key POST-TRUTH 2017-02-12 11:00-12:00 http://www.louvre.fr/en/oeuvre-notices/archaic-writing-tablets http://www.flickr.com/photos/usnavy/5522861353/ Oxford Dictionaries Word of the Year 2016

More information

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i -

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN C (PR ) Group Name GroupC (PR) /Project No.

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

2011_73_05_Cover_W_fin.pdf

2011_73_05_Cover_W_fin.pdf Sapporo Campus 2 from HOKKAIDO to the WORLD 21 21 3 8 1631 SAPPORO 2 4 3 02 Department of Human Science and Informatics 03 Department of Human Science and Informatics School of Biological Science and Engineering

More information

LMS LMS 2014 LMS 2 Moodle 2. LMS LMS e-learning Web LMS MOOC Moodle LMS ( 1 ) ( 2 ) ( 3 ) 24 ( 4 ) ( 5 ) ( 6 ) 1 LMS Web CS LMS Instructu

LMS LMS 2014 LMS 2 Moodle 2. LMS LMS e-learning Web LMS MOOC Moodle LMS ( 1 ) ( 2 ) ( 3 ) 24 ( 4 ) ( 5 ) ( 6 ) 1 LMS Web CS LMS Instructu LMS 1 2 2 LMS Blended-Learning CS PC Web LMS MOOC CS PC LMS LMS Requested Features for Mobile Learning Application dedicated to LMS Toshiyuki Kamada 1 Yasushi Kodama 2 Yuki Terawaki 2 Abstract: The blended-learning

More information

IPSJ SIG Technical Report Vol.2009-HCI-134 No /7/17 1. RDB Wiki Wiki RDB SQL Wiki Wiki RDB Wiki RDB Wiki A Wiki System Enhanced by Visibl

IPSJ SIG Technical Report Vol.2009-HCI-134 No /7/17 1. RDB Wiki Wiki RDB SQL Wiki Wiki RDB Wiki RDB Wiki A Wiki System Enhanced by Visibl 1. RDB Wiki 1 1 2 Wiki RDB SQL Wiki Wiki RDB Wiki RDB Wiki A Wiki System Enhanced by Visible RDB Operations Toshiya Okumura, 1 Minoru Terada 1 and Kazutaka Maruyama 2 Although Wiki systems can easily be

More information

WISS 2013 1. BGM BGM N 1 1 N N 2 N N N 1 N YouTube N BGM 1

WISS 2013 1. BGM BGM N 1 1 N N 2 N N N 1 N YouTube N BGM 1 WISS2013. N N 1 YouTube 1 2 YouTube 2012 1 1 1 3 2012 11 20 [1] 1 5500 1 47 YouTube 2012 1 1 40 2012 2 1 1 786 102.5 4 N [2, 3] N VOCALOID N Copyright is held by the author(s)., JST CREST, JST CREST 1

More information

fiš„v8.dvi

fiš„v8.dvi (2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp

More information

1. [1, 2, 3] (PDF ) [4] API API [5] ( ) PDF Web Web Annotate[6] Digital Library for Earth System Education(DLESE)[7] Web PDF Text, Link, FreeTe

1. [1, 2, 3] (PDF ) [4] API API [5] ( ) PDF Web Web Annotate[6] Digital Library for Earth System Education(DLESE)[7] Web PDF Text, Link, FreeTe aoyama@info.suzuka-ct.ac.jp yamaji@nii.ac.jp Sharing system of annotation for paper publication Toshihiro AOYAMA Department of Electronic and Information Engineering, Suzuka National College of Technology

More information

Web Web ID Web 16 Web Web i

Web Web ID Web 16 Web Web i 24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro

More information

dsample.dvi

dsample.dvi 1 1 1 2009 2 ( ) 600 1 2 1 2 RFID PC Practical Verification of Evacuation Guidance Based on Pedestrian Traffic Measurement Tomohisa Yamashita, 1 Shunsuke Soeda 1 and Noda Itsuki 1 In this paper, we report

More information

石井.PDF

石井.PDF 1 2 5 11 15 20 2 copyright copyright 17 18 3 18 19 2 10 4 5 50 50 WIPO 17 15 6 1995 CD PC PP 7 CD 59 CD CD 8 9 10 11 12 20 13 14 WWWWorld Wide Web 15 WWW Netscape Navigator Internet Explorer Web 16 17

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information

Linux Activities for Promoting Desktop Linux Utilization Jun Iio Research Center for Information Technology, Mitsubish

Linux Activities for Promoting Desktop Linux Utilization Jun Iio Research Center for Information Technology, Mitsubish Linux Activities for Promoting Desktop Linux Utilization Jun Iio iiojun@mri.co.jp 100-8141 2-3-6 Research Center for Information Technology, Mitsubishi Research Institute, Inc. 2-3-6 Otemachi, Chiyoda-ku,

More information

untitled

untitled 2010 58 1 39 59 c 2010 20 2009 11 30 2010 6 24 6 25 1 1953 12 2008 III 1. 5, 1961, 1970, 1975, 1982, 1992 12 2008 2008 226 0015 32 40 58 1 2010 III 2., 2009 3 #3.xx #3.1 #3.2 1 1953 2 1958 12 2008 1 2

More information

Tya-net Thirteen Rules of Use Tya-net Don't violate the intended use of Tya-net. Tya-net Don't let anyone know your passwords. Use strong passwords. M

Tya-net Thirteen Rules of Use Tya-net Don't violate the intended use of Tya-net. Tya-net Don't let anyone know your passwords. Use strong passwords. M (Tya-net) Tya-net Thirteen Rules of Use Tya-net Don't violate the intended use of Tya-net. Tya-net Don't let anyone know your passwords. Use strong passwords. Make regular backup of critical data. Don't

More information

1: ( 1) 3 : 1 2 4

1: ( 1) 3 : 1 2 4 RippleDesk Using Ripples to Represent Conversational Noise on Internet Shigaku Iwabuchi Takaomi Hisamatsu Shin Takahashi Buntarou Shizuki Kazuo Misue Jiro Tanaka Department of Comupter Science, University

More information

Vol. 28 No. 2 Apr. 2011 173 1. 1 Web Twitter/Facebook UI 4 1. 2. 3. 4. Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2

Vol. 28 No. 2 Apr. 2011 173 1. 1 Web Twitter/Facebook UI 4 1. 2. 3. 4. Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2 172 SNS Web Web As social web sites such as blog and SNS(Social Network System) became popular, many people have communicated with their friends on the Web. Meanwhile, several problems of social web sites

More information

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3) (MIRU2012) 2012 8 820-8502 680-4 E-mail: {d kouno,shimada,endo}@pluto.ai.kyutech.ac.jp (1) (2) (3) (4) 4 AdaBoost 1. Kanade [6] CLAFIC [12] EigenFace [10] 1 1 2 1 [7] 3 2 2 (1) (2) (3) (4) 4 4 AdaBoost

More information

本体/05‐進悦子

本体/05‐進悦子 * A Report on the science craft class Let s make your original pop-up Christmas cards and send them to your good friends and dear family members Etsuko Shin A Pop-up card is a three-dimension card made

More information

IT,, i

IT,, i 22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki

More information

一部の論文は web 非掲載です Journal of International Student Advisors and Educators Volume 18 / 2015 3 7 13 19 31 45 57 71 85 111 115 101 123 124 126 135 131 132 146 Vol.18 pp.3 Vol.18 3 4 Vol.18 Vol.18 5 6 Vol.18

More information

2reN-A14.dvi

2reN-A14.dvi 340 30 1 SP2-N 2015 Onomatoperori : Ranking Cooking Recipes by using Onomatopoeias which Express their Tastes and Textures Chiemi Watanabe Satoshi Nakamura Graduate School of Systems and Information Engineering,

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

ワンクライカンウォン中・高等学校(タイ国フアヒン)における遠隔教育プロジェクトと教授メディア-特に衛星放送による外国語教育の授業について-

ワンクライカンウォン中・高等学校(タイ国フアヒン)における遠隔教育プロジェクトと教授メディア-特に衛星放送による外国語教育の授業について- NAOSITE: Nagasaki University's Ac Title Author(s ワンクライカンウォン中 高等学校 ( タイ国フアヒン における遠隔教育プロジェクトと教授メディア - 特に衛星放送による外国語教育の授業について - 大作, 勝 Citation 教育メディア研究 2003, 10(1, p. 39-52 Issue Date 2003 URL http://hdl.handle.net/10069/16697

More information

RTM RTM Risk terrain terrain RTM RTM 48

RTM RTM Risk terrain terrain RTM RTM 48 Risk Terrain Model I Risk Terrain Model RTM,,, 47 RTM RTM Risk terrain terrain RTM RTM 48 II, RTM CSV,,, RTM Caplan and Kennedy RTM Risk Terrain Modeling Diagnostics RTMDx RTMDx RTMDx III 49 - SNS 50 0

More information

emarketer SNS / SNS 2009 SNS 15 64

emarketer SNS / SNS 2009 SNS 15 64 Relationship of Creative Thinking and Feeling Shared Communication by Social media MORISAWA Yukihiro Social media has been shared content that is created by the CGM (consumer generated media) via the Internet.

More information

知能と情報, Vol.29, No.6, pp

知能と情報, Vol.29, No.6, pp 36 知能と情報知能と情報 ( 日本知能情報ファジィ学会誌 ( ))Vol.29, No.6, pp.226-230(2017) 会告 Zadeh( ザデー ) 先生を偲ぶ会 のご案内 Zadeh( ) とと と 日 2018 1 20 日 ( ) 15:00 17:30(14:30 18:00 ) 2F ( ) 530-8310 1-1-35 TEL: 06-6372-5101 https://www.hankyu-hotel.com/hotel/osakashh/index.html

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

3_23.dvi

3_23.dvi Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems

More information

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St

IPSJ SIG Technical Report Vol.2011-MUS-91 No /7/ , 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical St 1 2 1, 3 1 Design and Implementation on a System for Learning Songs by Presenting Musical Structures based on Phrase Similarity Yuma Ito, 1 Yoshinari Takegawa, 2 Tsutomu Terada 1, 3 and Masahiko Tsukamoto

More information

main.dvi

main.dvi DEIM Forum 2018 J7-3 305-8573 1-1-1 305-8573 1-1-1 305-8573 1-1-1 () 151-0053 1-3-15 6F URL SVM Identifying Know-How Sites basedonatopicmodelandclassifierlearning Jiaqi LI,ChenZHAO, Youchao LIN, Ding YI,ShutoKAWABATA,

More information

情報科学研究 第19号

情報科学研究 第19号 Research on Organizational Information Security Management and Privacy Protection of Personal Data in the Digital Surveillance Society Tadaaki Nemoto, Yoshihito Hattori, Ken-ichi Sato p. Mark Weiser 4.

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

05_藤田先生_責

05_藤田先生_責 This report shows innovation of competency of our faculty of social welfare. The aim of evaluation competency is improvement in the Social welfare education effects, by understanding of studentʼs development

More information

科技表紙PDF200603

科技表紙PDF200603 2 1 2 18 Science & Technology Trends March 2006 19 20 3 Science & Technology Trends March 2006 21 4 22 5 Science & Technology Trends March 2006 23 6 24 Science & Technology Trends March 2006 25 26 Science

More information

クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応

クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応 E-mail: masashi.une@boj.or.jp E-mail: masataka.suzuki@boj.or.jp E-mail: sachikoy@jp.ibm.com / /2011.1 227 1. 1 1 2010 1 2 2 3 1 2010 2010 2 1 1 3 multi-tenancy 228 /2011.1 SaaS 4 Vamosi [2008] 1 CPU CPU

More information

日本感性工学会論文誌

日本感性工学会論文誌 pp.343-351 2013 Changes in Three Attributes of Color by Reproduction of Memorized Colors Hiroaki MIYAKE, Takeshi KINOSHITA and Atsushi OSA Graduate School of Science and Engineering, Yamaguchi University,

More information