•½¬23”N“x î•ñ‰ÈŠwŒ¤‹†‰È@”ŽŽmŠwˆÊ˜_•¶Œö’®‰ï ƒvƒƒOƒ‰ƒ€


œ11ŒŽ16“úi…j
êŠFL3
ŽžŠÔ@@@@@ ”­•\ŽÒ		ŽåR¸—\’èˆÏˆõ     •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@@@	iŒhÌ—ªj@@@@  iŒhÌ—ªj
17:00-18:00    I Gede Puja Astawa    ‰ª“c@ŽÀ        ŠÖ_”V, ™–{Œª“ñ
@@@@@@@ An RF Signal Processing Based Diversity Scheme for MIMO-OFDM Systems 


œ12ŒŽ16“úi‹àj
êŠFL3
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
11:00-12:00    ”n@Žqé‡	‰ª“c@ŽÀ@@	ŠÖ@_”V, ™–{@Œª“ñ
@@@@@@@ Studies on Interference Suppression Methods for ISDB-T in Fast Fading Channels 


œ12ŒŽ19“úiŒŽj
êŠFL3
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
11:00-12:00    Asaad Ahmed	ˆÉ“¡@ŽÀ@@	ŠÖ@_”V, ˆÀ–{@Œcˆê
@@@@@@@ Methods for Efficient Service Replication and Information Gathering in Mobile Networks
15:20-16:20    —с@_•½	’r“c@˜aŽi	¼–{@—TŽ¡, “n•Ó@ˆê”¿
@@@@@@@ Generalization of Tensor Factorization and Applications 
16:30-17:30    —é–؁@ˆè”ü	¼–{@—TŽ¡@	’r“c@˜aŽi, V•Û@m
@@@@@@@ Statistical and graph-based approaches to small sample and high dimensional data


œ12ŒŽ20“úi‰Îj
êŠFL2
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
15:10-16:10    ‹g‘º@˜a_	’†“‡@N•F@	ˆäã@”ü’qŽq, “ˆ“c@‘n
@@@@@@@ ‚«”\‚Æ’áÁ”ï“d—Í‚ðŽÀŒ»‚·‚éƒvƒƒZƒbƒT‚ÉŠÖ‚·‚錤‹†

êŠFL3
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
15:10-16:10    ûüˆä@“w	™–{@Œª“ñ@	”Ñ“c@Œ³, –ì“c@Œ«
@@@@@@@ ƒvƒ‰ƒ“ƒgƒAƒ‰[ƒ€ƒ}ƒlƒWƒƒ“ƒg‚Ì‚½‚߂̃Aƒ‰[ƒ€ƒVƒXƒeƒ€‚̐«”\ŠÄŽ‹


œ12ŒŽ22“úi–؁j
êŠFL1
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
14:00-15:00    ‹v•Û@F•x	’r“c@˜aŽi	Ž­–ì@´G, ŒË“c@’qŠî, ‹g“c@³Ž÷i‘åã“d’Ê‘åj
@@@@@@@ ŠiŽqó“d‹É‚ð—p‚¢‚½ƒIƒgƒKƒC‰º•”‚©‚ç‚Ì•\–Ê‹Ø“d}Œv‘ª‚¨‚æ‚ѕꉹ”FŽ¯‚Ö‚Ì‚»‚̉ž—p
15:10-16:10    —с@G‘¾˜Y	”‹“c@‹I”Ž	¬Š}Œ´@Ži, ‰¡–î@’¼˜a, _Œ´@½”V
@@@@@@@ Œö‹¤‹óŠÔ‚É‚¨‚¯‚郍ƒ{ƒbƒg‚ªl‚É‘ã‚í‚Á‚čs‚¤ Communicative Tasks ‚ÉŠÖ‚·‚éŠî‘b“IŒ¤‹†

êŠFL2
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
 9:50-10:50    Š™“y@‹L—Ç	Ž­–ì@´G	’r“c@˜aŽi, ‰Ž“n@—m
@@@@@@@ Sound Field Reproduction Integrating Multi-point Sound Field Control and Wave Field Synthesis

êŠFL3
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
 9:50-10:50    •’å@ªF	–©@¬‘¾˜Y@	¬Š}Œ´@Ži, ™‰Y@’‰’j, ²“¡@“N‘å, Ô‘ê@‹v”üi‘åã“d‹C’ʐM‘åŠwj
@@@@@@@ ‰¡Šu–Œ‚ÌŽûk‹@”\‚ð•]‰¿‚·‚é‹Ø‰¹}‚ÌŒv‘ª‚ƉðÍ‚ÉŠÖ‚·‚錤‹†
11:00-12:00    ¼Œ´@—T‹M	‰Á“¡@”Žˆê	’†“‡@N•F, ‹{è@ƒ, —LŽŸ@³‹`iŒF–{‘åŠwj
@@@@@@@ CPUƒLƒƒƒbƒVƒ…‚Ì—˜—pŒø—¦‚ÌŒüã‚É‚æ‚鎞Œn—ñƒpƒ^[ƒ“ƒ}ƒCƒjƒ“ƒOƒAƒ‹ƒSƒŠƒYƒ€‚̍‚‘¬‰»Žè–@‚ÉŠÖ‚·‚錤‹†
14:00-15:00    BLANC GREGORY	ŽRŒû@‰p@@	ŠÖ@_”V, ˆÉ“¡@ŽÀ, –å—с@—YŠî, ¼Š_@³ŸiÃ‰ª‘åŠwj
@@@@@@@ Reversing Malicious Intents in Web Scripts: from Automating Deobfuscation to Assigning Concepts


œ12ŒŽ28“úi…j
êŠFL2
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
11:00-12:00    ˆÉŒ´@²‹I	¼–{@Œ’ˆê	ŠÖ@_”V, –å“c@‹Ål, ‘啽@‰ë—Y, ‰L—с@®–õi‹ãB‘åŠwj
@@@@@@@ OSS‚Ì•s‹ï‡C³ƒvƒƒZƒXŒø—¦‰»‚Ì‚½‚߂̃Rƒ~ƒbƒ^[„‘E‚Æ•s‹ï‡C³ŽžŠú‚Ì—\‘ª


œ1ŒŽ19“úi–؁j
êŠFL3
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
10:00-11:00    …–ì@~‘¾	¼–{@—TŽ¡	Ž­–ì@´G, V•Û@m
@@@@@@@ Organizing Information Based on Semantic Relation Recognition


œ1ŒŽ23“úiŒŽj
êŠFL3
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
10:30-11:30    Šâ—§@«˜a	¼–{@—TŽ¡	ŠÖ@_”V, V•Û@m, óŒ´@³Ki‘ŒêŒ¤‹†Šj
@@@@@@@ Development of Pairwise Comparison-based Japanese Dependency Parsers and Application to Corpus Annotation


œ1ŒŽ24“úi‰Îj
êŠFL3
ŽžŠÔ@@@@@ ”­•\ŽÒ	ŽåR¸—\’èˆÏˆõ    •›R¸—\’èˆÏˆõ
@@@@@@@@@@@@  iŒhÌ—ªj@@@@  iŒhÌ—ªj
16:30-17:30    ŽR”ö@«—²	’r“c@˜aŽi	–©@¬‘¾˜Y, ì‘º@—@ˆê, •ÊŠ@N‘SiƒoƒCƒIj, Îˆä@Mi‹ž‘åj
@@@@@@@ ŒvŽZ‹@‚ð—p‚¢‚½•¡”‚ÌŠK‘w‚ɂ킽‚é×–EˆÚ“®‚ÌŒ¤‹†


î•ñ‰ÈŠwŒ¤‹†‰È •›êU’·