default search action
Journal of Information Processing, Volume 26
Volume 26, January 2018
- Sadao Obana:
Editor's Message to Special Issue on Intelligent Transportation Systems and Mobile Communication toward Super Smart Society. 1 - Katsuya Matsumoto, Susumu Ishihara:
Data Uploading Control Method Based on Exchange of Metadata in VANET for On-demand Onboard Camera Picture Sharing System. 2-10 - Le Tien Trien, Koichi Adachi, Yasushi Yamao:
Efficient CSMA/CA Packet Relay-Assisted Scheme with Payload Combining for ITS V2V Communication. 11-19 - Nurul Ain Binti Adnan, Shigeru Yamashita:
Logical Qubit Layout Problem for ICM Representation. 20-28 - Takahiko Kato, Masaki Bandai:
Avoiding Excessive Rate Reduction in Rate Based Congestion Control for Named Data Networking. 29-37 - Hiroshi Yamada, Kazuya Murao, Tsutomu Terada, Masahiko Tsukamoto:
A Method for Determining the Moment of Touching a Card Using Wrist-worn Sensor in Competitive Karuta. 38-47 - Izumi Asakura, Hidehiko Masuhara, Takuya Matsumoto, Kiminori Matsuzaki:
Identification and Elimination of the Overhead of Accelerate with a Super-resolution Application. 48-53 - Akira Tanaka, Reynald Affeldt, Jacques Garrigue:
Safe Low-level Code Generation in Coq Using Monomorphization and Monadification. 54-72 - Tatsuki Sekino:
Editor's Message to Special Issue of Computer and Humanities. 73 - Takeshi Miura, Takaaki Kaiga, Takeshi Shibata, Madoka Uemura, Katsubumi Tajima, Hideo Tamamoto:
Development of a Visualization Method for Motion-characteristic Distribution of Japanese Folk Dances - A Case Study of the Bon Odori Dance. 74-84 - Yuuichi Teranishi:
Editor's Message to Special issue on Network Services and Distributed Processing. 85-86 - Hiroyuki Tanaka, Masahiro Yoshida, Koya Mori, Noriyuki Takahashi:
Multi-access Edge Computing: A Survey. 87-97 - Babatunde Ojetunde, Naoki Shibata, Juntao Gao:
Monitoring-Based Method for Securing Link State Routing against Byzantine Attacks in Wireless Networks. 98-110 - Arif Herusetyo Wicaksono, Kazuhide Aikoh:
Identifier-first Multi-datacenter Synchronization for In-Memory State Management. 111-115 - Kiyotaka Kaji, Takuya Yoshihiro:
Building Detour Paths to Avoid Local Congestion in MANETs. 116-123 - Yuria Oigawa, Fumiaki Sato:
Improvement in IntErzone Routing Protocol of ZRP Based on Bloom Filter. 124-131 - Ushio Yamamoto:
GLGR: Grid Landmark-based Geographic Routing for Ad-hoc Wireless Networks. 132-139 - Akihiro Fujimoto, Yukari Masui, Takuya Yoshihiro:
Scheduling Beacon Transmission to Improve Delay for Receiver-initiated-MAC Based Wireless Sensor Networks. 140-147 - Jun Liu, Kensuke Fukuda:
An Evaluation of Darknet Traffic Taxonomy. 148-157 - Ei Khaing Win, Tomoki Yoshihisa, Yoshimasa Ishi, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo:
A Lost Data Recovery Scheme for Sensor Data Stream Multicasting. 158-168 - Tomoo Inoue:
Editor's Message to Special Issue of Advances in Collaboration Technologies. 169 - Stephen J. H. Yang, Owen H. T. Lu, Anna Y. Q. Huang, Jeff C. H. Huang, Hiroaki Ogata, Albert J. Q. Lin:
Predicting Students' Academic Performance Using Multiple Linear Regression and Principal Component Analysis. 170-176 - Bektur Ryskeldiev, Michael Cohen, Jens Herder:
StreamSpace: Pervasive Mixed Reality Telepresence for Remote Collaboration on Mobile Devices. 177-185 - Jesús Omar Álvarez Márquez, Jürgen Ziegler:
Negotiation and Reconciliation of Preferences in a Group Recommender System. 186-200 - Eiichi Hayakawa:
Editor's Message to Special Issue of Embedded Systems Engineering. 201 - Hiroyuki Chishiro:
Multiprocessor Semi-fixed-priority Scheduling. 202-211 - Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori:
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store. 212-223 - Hayato Yamana:
Editor's Message to Special Issue of Young Researchers' Papers. 224 - Yixiao Li, Yutaka Matsubara, Hiroaki Takada:
A Comparative Analysis of RTOS and Linux Scalability on an Embedded Many-core Processor. 225-236 - Jiachao Zhang, Shinji Fukuma, Shin-ichiro Mori:
Silk Road: A Framework for Distributed Collaborative Simulation. 237-246 - Isakwisa Gaddy Tende, Shin-Ichiro Kubota, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:
Evaluation of Farmers Market Information System to Connect with Some Social Stakeholders. 247-256 - Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:
A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method. 257-266 - Yo Ehara, Issei Sato, Hidekazu Oiwa, Hiroshi Nakagawa:
Mining Words in the Minds of Second Language Learners for Learner-specific Word Difficulty. 267-275 - Tatsunori Hirai, Hironori Doi, Shigeo Morishima:
Latent Topic Similarity for Music Retrieval and Its Application to a System that Supports DJ Performance. 276-284 - Marimo Kumaki, Yoshinari Takegawa, Keiji Hirata:
Design and Implementation of a Positioning Learning Support System for Violin Beginners, Using True, Vague and False Information. 285-293 - Mari Ito, Masatake Hirao, Hiroki Hamahara:
A Support System for Nursery Staff Shift Scheduling - A Case Study at a Nursery School. 294-300 - Jiachao Zhang, Shin-ichiro Mori, Shinji Tomita:
Evaluation of Three Quads Using Matrix Transpose. 301-305 - Takuya Kuwahara, Yukino Baba, Hisashi Kashima, Takeshi Kishikawa, Jun'ichi Tsurumi, Tomoyuki Haga, Yoshihiro Ujiie, Takamitsu Sasaki, Hideki Matsushima:
Supervised and Unsupervised Intrusion Detection Based on CAN Message Frequencies for In-vehicle Network. 306-313 - Kosuke Matsumoto, Tomoharu Ugawa, Tatsuya Abe:
Improvement of a Library for Model Checking under Weakly Ordered Memory Model with SPIN. 314-326 - Wei Zhang, Shigeru Chiba:
Call-trail Dependent Inline Caching for a Scoping Mechanism of Class Extensions. 327-334 - Yuta Sugimoto, Atusi Maeda:
Implementation of C Library for Constructing Packrat Parser with Statically Allocated Memory. 335-344 - Kô Sakai, Yutaka Sato:
A Method for Constructing a Gray Map for a Group Based on Its Semidirect-product Structure. 345-349 - Keisuke Furumoto, Masakatu Morii:
Recognition Accuracy Improvement of Obfuscated QR Code by Using Reliability Information and GMD Decoding. 350-357 - Chuzo Iwamoto, Tatsuaki Ibusuki:
Dosun-Fuwari is NP-complete. 358-361 - Toshiyuki Hagiya, Toshiharu Horiuchi, Tomonori Yazaki, Tatsuya Kawahara:
Typing Tutor: Individualized Tutoring in Text Entry for Older Adults Based on Statistical Input Stumble Detection. 362-374 - Hidemi Fukada:
Editor's Message to Special Issue of Information Systems. 375 - Syunji Yazaki, Hideaki Tsuchiya, Hiroaki Ishihata:
Development of a Web-based Front-end Environment to Aid Programming Lectures on Unix-like Systems. 376-385 - Taku Itoh, Yusuke Fukazawa, Dandan Zhu, Jun Ota:
Modeling Weather Context Dependent Food Choice Process. 386-395 - Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin:
Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications. 396-405 - Raj Dabre, Fabien Cromierès, Sadao Kurohashi:
Exploiting Multilingual Corpora Simply and Efficiently in Neural Machine Translation. 406-415 - Masafumi Oyamada, Jianquan Liu, Shinji Ito, Kazuyo Narita, Takuya Araki, Hiroyuki Kitagawa:
Compressed Vector Set: A Fast and Space-Efficient Data Mining Framework. 416-426 - Suppanut Pothirattanachaikul, Takehiro Yamamoto, Sumio Fujita, Akira Tajima, Katsumi Tanaka, Masatoshi Yoshikawa:
Mining Alternative Actions from Community Q&A Corpus. 427-438 - Takashi Isozaki, Satoshi Hasegawa, Hajime Anada:
MAX-MIN Ant System with Memory Considering New Solution Importance. 439-444 - Keita Doi, Ryota Shioya, Hideki Ando:
Performance Improvement Techniques in Tightly Coupled Multicore Architectures for Single-Thread Applications. 445-460 - Yoshihiro Oyama:
Investigation of the Diverse Sleep Behavior of Malware. 461-476 - Ryo Nojima, Hidenobu Oguri, Hiroaki Kikuchi, Hiroshi Nakagawa, Koki Hamada, Takao Murakami, Yuji Yamaoka, Chiemi Watanabe:
How to Handle Excessively Anonymized Datasets. 477-485 - Masato Hashimoto, Qiangfu Zhao:
A Privacy Preserving Protocol for Cloud-Based Implementation of Aware Agents. 486-496 - Yoshitatsu Matsuda, Takayuki Sekiya, Kazunori Yamaguchi:
Curriculum Analysis of Computer Science Departments by Simplified, Supervised LDA. 497-508 - Ryusuke Mori, Masato Oguchi, Saneyasu Yamaguchi:
Promotion Condition Optimization based on Application Features in Generational GC of Android Application Runtime. 509-517 - Shintaro Oishi, Yoshihiro Shirakawa, Masatsugu Ichino, Hiroshi Yoshiura:
Personal Identification by Integrating a Number of Features from Iris and Periocular Region Using AdaBoost. 518-528 - Chenhui Chu, Raj Dabre, Sadao Kurohashi:
A Comprehensive Empirical Comparison of Domain Adaptation Methods for Neural Machine Translation. 529-538 - Hironori Nakajo:
Editor's Message to Special Issue on Embedded Systems Engineering. 539 - Zhongqi Ma, Ryo Kurachi, Gang Zeng, Hiroaki Takada:
Further Analysis with Linear Programming on Blocking Time Bounds for Partitioned Fixed Priority Multiprocessor Scheduling. 540-548 - Takuro Yamamoto, Takuma Hara, Takuya Ishikawa, Hiroshi Oyama, Hiroaki Takada, Takuya Azumi:
Component-Based mruby Platform for IoT Devices. 549-561 - Renzhi Wang, Mizuho Iwaihara:
Estimating Reference Scopes of Wikipedia Article Inner-links. 562-570 - Michiharu Takemoto:
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2017. 571 - Fevzi Belli, Nevin Güler Dincer, Michael Linschulte, Tugkan Tuglular:
Model-based Selective Layer-centric Testing. 572-589 - Shuji Sannomiya, Akira Sato, Kenichi Yoshida, Hiroaki Nishikawa:
Abnormal Traffic Detection Circuit with Real-time Cardinality Counter. 590-600 - Kenji Fujikawa, Ved P. Kafle, Pedro Martinez-Julia, Abu Hena Al Muktadir, Hiroaki Harai:
Automatic Construction of Name-Bound Virtual Networks for IoT and its Management. 601-611 - Ei Khaing Win, Tomoki Yoshihisa, Yoshimasa Ishi, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo:
Lightweight and Secure Certificateless Multi-receiver Encryption based on ECC. 612-624 - Tomoka Azakami, Chihiro Shibata, Ryuya Uda:
Evaluation of Ergonomically Designed CAPTCHAs using Deep Learning Technology. 625-636 - Isao Echizen:
Editor's Message to Special Issue of Computer Security Technologies for a Super Smart Society. 637 - Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto, Chun-I Fan:
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets. 638-647 - Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Fumio Omatsu, Rina Shimizu, Ye Wang:
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data. 648-661 - Chun-Jung Wu, Ying Tie, Satoshi Hara, Kazuki Tamiya, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto:
IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices. 662-672 - Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, Jun Miyoshi:
Stealth Loader: Trace-free Program Loading for Analysis Evasion. 673-686 - Yuichi Taguchi, Tsutomu Yoshinaga:
Assessment and Simulation of System Performance of a Cloud-based Data-protection System. 687-695 - Junji Yamada, Ushio Jimbo, Ryota Shioya, Masahiro Goshima, Shuichi Sakai:
Bank-Aware Instruction Scheduler for a Multibanked Register File. 696-705 - Tsutomu Terada:
Editor's Message to Special Issue of Ubiquitous Computing Systems (VII). 706 - Tatsuya Ishihara, Kris M. Kitani, Chieko Asakawa, Michitaka Hirose:
Deep Learning and Geometry-based Image Localization Enhanced by Bluetooth Signals. 707-717 - Yu Enokibori, Kenji Mase:
Data Augmentation to Build High Performance DNN for In-bed Posture Classification. 718-727 - Ren Ohmura, Kodai Yamamoto:
Practical Feedback Method for Mobile CPR Support Systems Considering Noise and User's Attention. 728-735 - Toru Kobayashi, Taishi Miyazaki, Rinsuke Uchida, Hiroe Tanaka, Kenichi Arai:
Social Media Agency Robot for Elderly People. 736-746 - Shu Kaneko, Eiichiro Chishiro:
Query Conversion for Aggregate Operations in Distributed SPARQL Query Processing Using Summary Information. 747-754 - Art Subpa-Asa, Ying Fu, Yinqiang Zheng, Toshiyuki Amano, Imari Sato:
Separating the Direct and Global Components of a Single Image. 755-767 - Zhaohao Zeng, Cheng Luo, Lifeng Shang, Hang Li, Tetsuya Sakai:
Towards Automatic Evaluation of Customer-Helpdesk Dialogues. 768-778 - Akitoshi Okumura, Takamichi Hoshino, Susumu Handa, Eiko Yamada, Masahiro Tabuchi:
Identity Verification for Attendees of Large-scale Events Using Face Recognition of Selfies Taken with Smartphone Cameras. 779-788 - Kouichi Mouri:
Editor's Message to Special Issue of Toward Realizing Trusted Infrastructure by Security Technology and Human Resources for It. 789 - Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto:
Toward Collaborative Defense Across Organizations. 790-803 - Mamoru Mimura, Hidema Tanaka:
Leaving All Proxy Server Logs to Paragraph Vector. 804-812 - Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi:
Taint-assisted IAT Reconstruction against Position Obfuscation. 813-824
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.