Naohisa Komatsu

According to our database1, Naohisa Komatsu authored at least 34 papers between 1990 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Embedded Systems.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

2013
Security performance evaluation for biometric template protection techniques.
Int. J. Biom., 2013

A study on gait recognition using LPC cepstrum for mobile terminal.
Proceedings of the 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, 2013

2011
Secure Public-Key Encryption from Random Oracle Transformation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Public-Key Encryptions with Invariant Security Reductions in the Multi-User Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Mean Approximate Formulas for GI/G/1 Processor-Sharing System.
IEICE Trans. Commun., 2011

A Cost-Equation Analysis of General-Input General-Service Processor Sharing System.
Proceedings of the Operations Research Proceedings 2011, Selected Papers of the International Conference on Operations Research (OR 2011), August 30, 2011

Internet Traffic Classification Using LPC Cepstrum.
Proceedings of IEEE International Conference on Communications, 2011

2010
Accurate motion estimation for image of spatial periodic pattern.
Proceedings of the Picture Coding Symposium, 2010

A Further Remark on Diffusion Approximations with RB and ER Boundary Conditions.
Proceedings of the Operations Research Proceedings 2010, 2010

Speaker gender recognition using score level fusion by AdaBoost.
Proceedings of the 11th International Conference on Control, 2010

A metric of identification performance of biometrics based on information content.
Proceedings of the 11th International Conference on Control, 2010

Internet Traffic Classification Using Score Level Fusion of Multiple Classifier.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2009
Embedded Systems.
Proceedings of the Encyclopedia of Biometrics, 2009

Traffic performance for a time-out scheme communication system.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

Improving the safety and practicality of authorization technology using LOAF.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

2008
A Note on the Random Oracle Methodology.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Text-indicated speaker recognition using kernel mutual subspace method.
Proceedings of the 10th International Conference on Control, 2008

On biometric encryption using fingerprint and it's security evaluation.
Proceedings of the 10th International Conference on Control, 2008

2007
Multi-Server Loss System with T-Limited Service for Traffic Control in Information Networks.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

2006
Safety of templates in biometric person authentication using error-correcting code.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Multimodal Biometrics of Lip Movements and Voice using Kernel Fisher Discriminant Analysis.
Proceedings of the Ninth International Conference on Control, 2006

2005
A Study on Vulnerability in On-line Writer Verification System.
Proceedings of the Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August, 2005

2004
Digital watermarking based on process of speech production.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

CELP-based speaker verification: an evaluation under noisy conditions.
Proceedings of the 8th International Conference on Control, 2004

Speaker recognition using kernel mutual subspace method.
Proceedings of the 8th International Conference on Control, 2004

2003
Text-indicated Writer Verification Using Hidden Markov Models.
Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2003

2002
Dynamically weighted queueing for fair bandwidth allocation and its performance analysis.
Proceedings of the IEEE International Conference on Communications, 2002

1999
Text-indicated speaker verification method using PSI-CELP parameters.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Accurate estimation of optical flow for fully automated tracking of moving-objects within video streams.
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999

A Fully Automated Object Extraction from Video Stream: A Useful Tool for Distributed Object-Based Browsing and Content-Based Searching Systems.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Extraction of Personal Features from Stroke Shape, Writing Pressure and Pen Inclination in Ordinary Characters.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

1997
Proposal for a Text-Indicated Writer Verification Method.
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997

1990
A Motion Detection Method on Video Image by Using Hierarchical Pixels.
Syst. Comput. Jpn., 1990


  Loading...