DSpace Repository

Browsing 国際会議発表論文 / Proceedings by Submit Date

Browsing 国際会議発表論文 / Proceedings by Submit Date

Sort by: Order: Results:

  • Kula, Raula Gaikovina; Roover, Coen De; German, Daniel M.; Ishio, Takashi; Inoue, Katsuro (IEEE, 2018)
    The popularity of super repositories such as Maven Central and the CRAN is a testament to software reuse activities in both open-source and commercial projects alike. However, several studies have highlighted the risks and ...
  • Ueda, Yuki; Ihara, Akinori; Ishio, Takashi; Matsumoto, Kenichi (IEEE, 2018)
    Code review is key to ensuring the absence of potential issues in source code. Code review is changing from a costly manual check by reviewer to a cost-efficient automatic check by coding style checkers. So that patch ...
  • Okada, Joji; Ishio, Takashi; Sakata, Yuji; Inoue, Katsuro (IEEE, 2019)
    Legacy systems are important in business but difficult to maintain. One of the causes of the difficulties is a large number of code clones in the systems; Those clones implement similar functionalities using common loop ...
  • Ueda, Yuki; Ishio, Takashi; Ihara, Akinori; Matsumoto, Kenichi (IEEE, 2019)
    Code review is key to ensuring the absence of potential issues in source code. Code reviewers spend a large amount of time to manually check submitted patches based on their knowledge. Since a number of patches sometimes ...
  • Oku, Kenta; Nakajima, Shinsuke; Miyazaki, Jun; Uemura, Shunsuke; Kato, Hirokazu; Hattori, Fumio (CARS-2010, 2010)
    This paper proposes a recommendation system considering users' past / current / future contexts. We define users' contexts as “users' situations and conditions that influence their preference in their information choice. ...
  • Yamamoto, Goshiro; Asghar, Zeeshan; Uranishi, Yuki; Taketomi, Takafumi; Sandor, Christian; Kuroda, Tomohiro; Pulli, Petri; Kato, Hirokazu (ICDVRAT and the University of Reading., 2014)
    We propose a grid-pattern indicating interface to provide instructions remotely from remote site to support independent daily life of senior citizens. Our aim is to realize smooth and easy telecommunication between supported ...
  • Ikeda, Sei; Tanaka, Hiroki; Manabe, Yoshitsugu; Kato, Hirokazu (VTT, 2011)
    This paper reports an evaluation experiment using our prototype system which dynamically projects ruled lines on a sheet of paper to support a user in layout design. The system projects lines at proper positions depending ...
  • Keyaki, Atsushi; Miyazaki, Jun; Hatano, Kenji; Yamamoto, Goshiro; Taketomi, Takafumi; Kato, Hirokazu (National Institute of Informatics, 2013)
    In this paper, we try to apply an approach of XML element retrieval to 1CLICK-2. The aim of XML element retrieval is to identify key points in structured documents, and propose them to system users. We believe that the aim ...
  • Plopski, Alexander; Nitschke, Christian; Kiyokawa, Kiyoshi; Schmalstieg, Dieter; Takemura, Haruo (Eurographics Association, 2015)
    Passive eye-pose estimation methods that recover the eye-pose from natural images generally suffer from low accuracy, the result of a static eye model, and the recovery of the eye model from the estimated iris contour. ...
  • Terai, Genki; Arai, Ismail; Fujikawa, Kazutoshi (MobiCASE STUDENT WORKSHOP (MCSW2018), 2018-12-28)
    Fingerprinting requires sensor data map to estimate a user’s location by comparing the map with sensor data of the user’s device. Although it is assumed that the sensor data does not change, it is considered that the premise ...
  • Nakashima, Hayato; Arai, Ismail; Fujikawa, Kazutoshi (MobiCASE STUDENT WORKSHOP (MCSW2018), 2018-12-28)
    In this paper, we investigated the method of counting the number of people getting on/off the bus. As a result, there are currently research and products that estimate the number of people getting on/off using dedicated ...
  • Taguchi, Katsuya; Aramaki, Eiji (UISTDA '18, 2018)
    In recent years, the protection of personal information has drawn much attention, requiring an advanced technology on de-identification to remove personal information from data. Among various personal information such as ...
  • Casani, Paolo; Iso, Hayate; Wakamiya, Shoko; Aramaki, Eiji (IEEE, 2018)
    Sophisticated data science techniques have recently been applied to social networks data to study social phenomena and people. Recognizing that social psychology research has witnessed a renewed interest in the notion of ...
  • Abdul Ghani, Abdul Rahman; Koganti, Nishanth; Solano, Alfredo; Iwasawa, Yusuke; Nakayama, Kotaro; Matsuo, Yutaka (ICLR 2018, 2018)
    Human vision is capable of focusing on subtle visual cues at high resolution by relying on a foveal view coupled with an attention mechanism. Recently, there have been several studies that proposed deep reinforcement ...
  • Koganti, Nishanth; Abdul Ghani, Abdul Rahman; Iwasawa, Yusuke; Nakayama, Kotaro; Matsuo, Yutaka (ACM, 2018)
    Learning from Demonstration (LfD) is a paradigm where humans demonstrate the procedure to perform complex tasks which can be used to train autonomous agents. However, the performance of LfD is highly sensitive to the quality ...
  • Duong, Quang-Thang; Okada, Minoru (The Institute of Electronics, Information and Communication Engineers, 2018-10-01)
    This paper investigates receive power control for multiuser inductive power transfer (IPT) systems with a single-frequency coil array. The primary task is to optimize the transmit coil currents to minimize the total input ...
  • Todorov, Boris; Kula, Raula Gaikovina; Ishio, Takashi; Inoue, Katsuro (IEEE, 2017)
    In software development, software reuse has become a pivotal factor in creating and providing high-quality software at a reduced cost. The reuse of a code creates dependencies, which as they increase over time become ...
  • Nakamura, Masahide; Monden, Akito; Itoh, Tomoaki; Matsumoto, Ken-ichi; Kanzaki, Yuichiro; Satoh, Hirotsugu (IEEE, 2003)
    We present a method to estimate the cost of mental (hand) simulation of programs. In mental simulation, human short term memory is extensively used to recall and memorize values of variables. When the simulation reaches a ...
  • Kanzaki, Yuichiro; Monden, Akito; Nakamura, Masahide; Matsumoto, Ken-ichi (IEEE, 2003)
    In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to ...
  • Igaki, Hiroshi; Nakamura, Masahide; Matsumoto, Ken-ichi (IEEE, 2005)
    In the next-generation home network systems (HNS), interoperability among multi-vendor appliances is a challenging issue to implement value-added integrated services. This paper presents a service-oriented framework to ...

Search DSpace


Advanced Search

Browse

My Account