Search Results - IPSJ

Refine Results
  1. 1

    Proxy cooperative awareness message: an infrastructure-assisted V2V messaging by Kitazato, Tomoya, Tsukada, Manabu, Ochiai, Hideya, Esaki, Hiroshi

    “…Cooperative Intelligent Transportation Systems (CITS) are being developed to make road traffic safer and more efficient. Vehicle to vehicle (V2V) communication…”
    Get full text
    Conference Proceeding
  2. 2

    Approaching vehicle detection method with acoustic analysis using smartphone for elderly bicycle driver by Kawanaka, Shogo, Kashimoto, Yukitoshi, Firouzian, Aryan, Arakawa, Yutaka, Pulli, Petri, Yasumoto, Keiichi

    “…More than 60 percentage of fatal accidents while riding a bicycle is caused by elderly people over 65 years old. The main cause is the detection delay of…”
    Get full text
    Conference Proceeding
  3. 3

    Evaluating the spatio-temporal coverage of automotive sensing for smart cities by Chen, Yin, Yonezawa, Takuro, Nakazawa, Jin, Tokuda, Hideyuki

    “…Automotive sensing is a novel and appealing sensing technology in which sensors are installed into vehicles to utilize vehicles' mobility to conduct urban…”
    Get full text
    Conference Proceeding
  4. 4

    Compression method for ECU software updates by Onuma, Yutaka, Terashima, Yoshiaki, Sumika, Nakamura, Kiyohara, Ryozo

    “…Bugs in electrical control units (ECUs) in vehicles are increasing in accordance with the increasing complexity and scale of the ECU software. Thus,…”
    Get full text
    Conference Proceeding
  5. 5

    Post-quantum authentication in OpenSSL with hash-based signatures by Butin, Denis, Walde, Julian, Buchmann, Johannes

    “…Quantum computing is a major threat to contemporary security mechanisms. As standards bodies increasingly focus on post-quantum cryptography, hash-based…”
    Get full text
    Conference Proceeding
  6. 6

    Mixed public and secret-key cryptography for wireless sensor networks by Griotti, Mattia, Gandino, Filippo, Rebaudengo, Maurizio

    “…Wireless sensor networks normally employ symmetric cryptography in their security systems. The most important issue in this area is the establishment of…”
    Get full text
    Conference Proceeding
  7. 7

    An alternative approach to blockchain mining work for making blockchain technologies fit to ubiquitous and mobile computing environments by Kano, Yuki, Nakajima, Tatsuo

    “…The mining work concentration problem, whereby machine power is monopolized when supporting its operation, is becoming a serious problem in virtual currency…”
    Get full text
    Conference Proceeding
  8. 8

    Reliable wireless communications in battery management system of electric vehicles by Kumtachi, Tadahide, Kinoshita, Kazuhiko, Watanabe, Takashi

    “…Recent works on enhancing comfortability and convenience of vehicles reveal the appeal of information collections by various wireless sensor nodes due to their…”
    Get full text
    Conference Proceeding
  9. 9

    Cloud-based UAV data delivery over 4G network by Zhang, Yujie, Yuan, Zhenhui

    “…Drones generate heterogeneous data including flight status parameters, locations, video sequences and other IoT specific information depending on the sensors…”
    Get full text
    Conference Proceeding
  10. 10

    A Japanese input method using leap motion in virtual reality by Komiya, Kosuke, Nakajima, Tatsuo

    “…Various character input devices and methods have been proposed with the spread of VR. However, most of the techniques for character input suffer practical…”
    Get full text
    Conference Proceeding
  11. 11

    Analysis of random geometric graph for wireless network configuration by Ferrero, Renato, Gandino, Filippo

    “…Random geometric graphs are used to obtain a simple representation of wireless networks. Much recent research has analyzed the properties of these graphs…”
    Get full text
    Conference Proceeding
  12. 12

    Clash tanks: An investigation of virtual and augmented reality gaming experience by Ranade, Shubhankar, Zhang, Mingshu, Al-Sada, Mohammed, Urbani, Jaryd, Nakajima, Tatsuo

    “…Despite the popularity of Virtual and Augmented Reality (AR/VR) within gaming, the full potential of Virtual and Augmented Reality technologies is yet to be…”
    Get full text
    Conference Proceeding
  13. 13

    Design and implementation of a wireless network tap device for IEEE 802.11 wireless network emulation by Kato, Arata, Takai, Mineo, Ishihara, Susumu

    “…Network emulation environments are useful for evaluating network systems and applications. A network emulation environment abstracts a part of a network system…”
    Get full text
    Conference Proceeding
  14. 14

    Maximum weight packet scheduling scheme with retransmission in multi-hop wireless networks by Zhou, Jipeng, Chen, Xiaofeng, Deng, Yuhui, Cui, Lin, Wei, Kaimin, Zhong, Gang

    “…Retransmissions serve as the basic building block that communication protocols use it to achieve reliable data transmission. To reduce data loss,…”
    Get full text
    Conference Proceeding
  15. 15

    Detection of half-turn stairs from walking trajectories estimated by pedestrian dead reckoning by Yotsuya, Kosuke, Iwase, Haruka, Ito, Nobuyuki, Naito, Katsuhiro, Chujo, Naoya, Mizuno, Tadanori, Kaji, Katsuhiko

    “…This study detects half-turn stairs, a common building structure, from walking trajectories estimated using PDR from walking sensing data within a certain…”
    Get full text
    Conference Proceeding
  16. 16

    An automatic training system against advanced persistent threat by Iwata, Kazuki, Nakamura, Yoshitaka, Inamura, Hiroshi, Takahashi, Osamu

    “…In recent years, APT attack (Advanced Persistent Threat) puts out a lot of damage. There is method to train the "human" who received attack emails as a…”
    Get full text
    Conference Proceeding
  17. 17

    Accuracy improvement in sensor localization system utilizing heterogeneous wireless technologies by Yamamoto, Takahiro, Ishida, Shigemi, Izumi, Kousaku, Tagashira, Shigeaki, Fukuda, Akira

    “…Sensor localization is one of the big problems when building large scale indoor sensor networks because GPS (Global Positioning System) is unavailable in…”
    Get full text
    Conference Proceeding
  18. 18

    Utilizing mobile devices for evaluating body trunk coordination: Feasibility and preliminary results by Liang, Zilu, Nishimura, Takuichi, Iino, Nami, Yoshida, Yasuyuki, Nishimura, Satoshi

    “…Enhancing body trunk coordination is an important aspect in personal health, as week coordination ability of the body trunk is associated to increasing risk of…”
    Get full text
    Conference Proceeding
  19. 19

    Considering interpersonal differences in validating wearable sleep-tracking technologies by Liang, Zilu, Martell, Mario Alberto Chapa

    “…This study investigated an important yet usually neglected question in validating consumer sleep tracking devices: does interpersonal difference play a role in…”
    Get full text
    Conference Proceeding
  20. 20

    Estimating customer preference through store check-in histories and its use in visitor promotion by Doi, Chiaki, Katagiri, Masaji, Ishii, Akira, Konishi, Teppei, Araki, Takashi, Ohta, Ken, Ikeda, Daizo, Inamura, Hiroshi, Shigeno, Hiroshi

    “…This paper proposes a method to estimate the preference of customers based on store check-in histories. The proposed method can distinguish the preferences of…”
    Get full text
    Conference Proceeding