


Остановите войну!
for scientists:


default search action
IEICE Transactions on Information & Systems, Volume 92-D
Volume 92-D, Number 1, January 2009
- Shigero Sasaki, Atsuhiro Tanaka:
Cluster System Capacity Improvement by Transferring Load in Virtual Node Distance Order. 1-9 - Jung-Ja Kim, Heetaek Ceong, Yonggwan Won:
Weighted Association Rule Mining for Item Groups with Different Properties and Risk Assessment for Networked Systems. 10-15 - Marat Zhanikeev
, Yoshiaki Tanaka:
A Framework for Detection of Traffic Anomalies Based on IP Aggregation. 16-23 - Jong-In Lee, Hojung Bang, Tai Hyo Kim, Sung Deok Cha:
Visualization and Formalization of User Constraints for Tight Estimation of Worst-Case Execution Time. 24-31 - Takanori Isobe, Toshihiro Ohigashi
, Hidenori Kuwakado, Masakatu Morii:
A Chosen-IV Key Recovery Attack on Py and Pypy. 32-40 - Jaehoon Kim, Seog Park:
RDFacl: A Secure Access Control Model Based on RDF Triple. 41-50 - Hiroyuki Narita, Yasumasa Sawamura, Akira Hayashi:
DTW-Distance Based Kernel for Time Series Data. 51-58 - Ju Liu, Hua Yan, Jiande Sun:
Regularization Super-Resolution with Inaccurate Image Registration. 59-68 - Dae Hyun Kim, Myoung-Jun Kim:
A New Cubic B-Splines Design Method for Pen Input Environment. 69-77 - Hongwei Dai, Yu Yang, Cunhua Li, Jun Shi, Shangce Gao
, Zheng Tang:
Quantum Interference Crossover-Based Clonal Selection Algorithm and Its Application to Traveling Salesman Problem. 78-85 - Woohyung Lim, Chang Woo Han, Nam Soo Kim:
Computationally Efficient Cepstral Domain Feature Compensation. 86-89 - Fa-Xin Yu, Zhe-Ming Lu, Zhen Li, Hao Luo:
Global Motion Representation of Video Shot Based on Vector Quantization Index Histogram. 90-92 - Cheon Seog Kim, Hosik Sohn, Wesley De Neve
, Yong Man Ro
:
An Objective Perceptual Quality-Based ADTE for Adapting Mobile SVC Video Content. 93-96 - Dongil Han, Hak-Sung Lee, Chan Im
, Seong Joon Yoo:
Real-Time Color Correction Method for a Low-Cost Still/Video Camera. 97-101
Volume 92-D, Number 2, February 2009
- Hirotsugu Kakugawa:
Foreword. 107 - Toshimitsu Masuzawa:
Self-Stabilization in Dynamic Networks. 108-115 - Hirotatsu Kobayashi, Tomomi Matsui
:
Successful Manipulation in Stable Marriage Model with Complete Preference Lists. 116-119 - Hitoshi Yamasaki, Takayoshi Shoudai:
A Polynomial Time Algorithm for Finding a Minimally Generalized Linear Interval Graph Pattern. 120-129 - Naoyuki Kamiyama, Yuuki Kiyonari, Eiji Miyano
, Shuichi Miyazaki, Katsuhisa Yamanaka:
Computational Complexities of University Interview Timetabling. 130-140 - Hirotoshi Honma, Saki Honma, Shigeru Masuyama:
An Optimal Parallel Algorithm for Constructing a Spanning Tree on Circular Permutation Graphs. 141-148 - Ryoso Hamane, Toshiya Itoh, Kouhei Tomita:
Approximation Preserving Reductions among Item Pricing Problems. 149-157 - Hiroshi Sakamoto, Shirou Maruyama, Takuya Kida, Shinichi Shimozono:
A Space-Saving Approximation Algorithm for Grammar-Based Compression. 158-165 - Sung Kwon Kim, Jung-Sik Cho, Soo-Cheol Kim:
Path Maximum Query and Path Maximum Sum Query in a Tree. 166-171 - Hirotaka Kato, Satoshi Matsumoto, Tetsuhiro Miyahara:
Learning of Elementary Formal Systems with Two Clauses Using Queries. 172-180 - Ryoji Takami, Yusuke Suzuki, Tomoyuki Uchida, Takayoshi Shoudai:
Polynomial Time Inductive Inference of TTSP Graph Languages from Positive Data. 181-190 - Seiichiro Tani
, Masaki Nakanishi, Shigeru Yamashita:
Multi-Party Quantum Communication Complexity with Routed Messages. 191-199 - Yoshiaki Takata, Hiroyuki Seki:
Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation. 200-210 - Yoshiharu Asakura, Yukikazu Nakamoto:
Extending a Role Graph for Role-Based Access Control. 211-219 - Haruhiko Sato, Masahito Kurihara, Sarah Winkler, Aart Middeldorp
:
Constraint-Based Multi-Completion Procedures for Term Rewriting Systems. 220-234 - Keiichirou Kusakari, Masahiko Sakai:
Static Dependency Pair Method for Simply-Typed Term Rewriting and Related Techniques. 235-247 - Akio Fujiyoshi:
Linear-Time Recognizable Classes of Tree Languages by Deterministic Linear Pushdown Tree Automata. 248-254 - Naonori Tanimoto, Katsunobu Imai, Chuzo Iwamoto
, Kenichi Morita
:
On the Non-existance of Rotation-Symmetric von Neumann Neighbor Number-Conserving Cellular Automata of Which the State Number is Less than Four. 255-257
- Yu Wu, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
A Message-Efficient Peer-to-Peer Search Protocol Based on Adaptive Index Dissemination. 258-268 - Kazuteru Namba, Hideo Ito:
Test Compression for Robust Testable Path Delay Fault Testing Using Interleaving and Statistical Coding. 269-282 - Muhammad Anwaar Manzar, Tanweer Ahmad Cheema, Abdul Jalil, Ijaz Mansoor Qureshi:
Visual Aerial Navigation through Adaptive Prediction and Hyper-Space Image Matching. 283-297 - I Gusti Bagus Baskara Nugraha
, Hiroyoshi Morita:
Transcoding-after-Smoothing System for VBR MPEG Video Streaming. 298-309 - Mohamed Ghoneim, Norimichi Tsumura, Toshiya Nakaguchi, Takashi Yahagi, Yoichi Miyake:
A Fast Block Matching Algorithm Based on Motion Vector Correlation and Integral Projections. 310-318 - Achyut Sapkota, Kazuo Ohmi:
A Neural Network Based Algorithm for Particle Pairing Problem of PIV Measurements. 319-326 - Young-Chang Kim
, Jae-Woo Chang:
A New Similar Trajectory Search Algorithm Based on Spatio-Temporal Similarity Measure for Moving Objects in Road Networks. 327-331 - Moonju Park:
Schedulability Analysis on Generalized Quantum-Based Fixed Priority Scheduling. 332-335 - Kentaroh Katoh, Kazuteru Namba, Hideo Ito:
Design for Delay Fault Testability of 2-Rail Logic Circuits. 336-341 - Takashi Watanabe, Kenji Kurosawa, Makoto Yoshizawa:
An Effective Method on Applying Feedback Error Learning Scheme to Functional Electrical Stimulation Controller. 342-345 - Trung-Nghia Vu
, Syng-Yup Ohn:
A Filter Method for Feature Selection for SELDI-TOF Mass Spectrum. 346-348 - Deok-Su Na, Myung-Jin Bae
:
A Variable Break Prediction Method Using CART in a Japanese Text-to-Speech System. 349-352 - Min-Woo Park
, Jong-Tae Park, Gwang Hoon Park, Doug Young Suh:
Chrominance Compensation for Multi-View Video Coding. 353-356 - Yingjun Tang, De Xu, Guanghua Gu, Shuoyan Liu:
Category Constrained Learning Model for Scene Classification. 357-360 - Ning Li, De Xu:
Action Recognition Using Visual-Neuron Feature. 361-364 - Jiying Wu, Qiuqi Ruan, Gaoyun An:
An Illumination Invariant Bimodal Method Employing Discriminant Features for Face Recognition. 365-368 - Chang Ha Lee, Youngmin Kim, Amitabh Varshney:
Saliency-Guided Lighting. 369-373
Volume 92-D, Number 3, March 2009
- Chien-Liang Chen, Suey Wang, Hsu-Chun Yen:
Reachability Analysis of Variants of Communication-Free Petri Nets. 377-388 - Cherng Chin, Tien-Hsiung Weng, Lih-Hsing Hsu, Shang-Chia Chiou:
The Spanning Connectivity of the Burnt Pancake Graphs. 389-400 - Takaaki Goto, Kenji Ruise, Takeo Yaku, Kensei Tsuchida:
Visual Software Development Environment Based on Graph Grammars. 401-412 - Deok-Hwan Kim:
Image Recommendation Algorithm Using Feature-Based Collaborative Filtering. 413-421 - Shu-Ling Shieh, I-En Liao, Kuo-Feng Hwang, Heng-Yu Chen:
An Efficient Initialization Scheme for SOM Algorithm Based on Reference Point and Filters. 422-432 - Kentaroh Katoh, Kazuteru Namba, Hideo Ito:
Design for Delay Fault Testability of Dual Circuits Using Master and Slave Scan Paths. 433-442 - Hirokazu Ozaki, Atsushi Kara, Zixue Cheng:
User-Perceived Reliability of M-for-N (M: N) Shared Protection Systems. 443-450 - Yukiko Yamauchi, Sayaka Kamei
, Fukuhito Ooshita, Yoshiaki Katayama, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
Hierarchical Composition of Self-Stabilizing Protocols Preserving the Fault-Containment Property. 451-459 - Prakasith Kayasith, Thanaruk Theeramunkong:
Speech Clarity Index (Psi): A Distance-Based Speech Quality Indicator and Recognition Rate Prediction for Dysarthric Speakers with Cerebral Palsy. 460-468 - Kenta Niwa, Takanori Nishino, Kazuya Takeda:
Selective Listening Point Audio Based on Blind Signal Separation and Stereophonic Technology. 469-476 - Chiori Hori, Bing Zhao, Stephan Vogel, Alex Waibel, Hideki Kashioka, Satoshi Nakamura:
Consolidation-Based Speech Translation and Evaluation Approach. 477-488 - Takashi Nose, Makoto Tachibana, Takao Kobayashi:
HMM-Based Style Control for Expressive Speech Synthesis with Arbitrary Speaker's Voice Using Model Adaptation. 489-497 - Hamed Akbari
, Yukio Kosugi, Kazuyuki Kojima:
Segmentation of Arteries in Minimally Invasive Surgery Using Change Detection. 498-505 - Keiji Yasuda, Hirofumi Yamamoto, Eiichiro Sumita:
Training Set Selection for Building Compact and Efficient Language Models. 506-511 - Hai Vu
, Tomio Echigo, Ryusuke Sagawa, Keiko Yagi, Masatsugu Shiba, Kazuhide Higuchi, Tetsuo Arakawa, Yasushi Yagi:
Controlling the Display of Capsule Endoscopy Video for Diagnostic Assistance. 512-528 - Fausto Lucena, Allan Kardec Barros
, Yoshinori Takeuchi, Noboru Ohnishi:
Heart Instantaneous Frequency Based Estimation of HRV from Blood Pressure Waveforms. 529-537 - Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng:
Pre-Allocation Based Flow Control Scheme for Networks-On-Chip. 538-540 - Yang-Sae Moon, Jinho Kim:
Hybrid Lower-Dimensional Transformation for Similar Sequence Matching. 541-544 - Yoonjeong Kim, Seong Yong Ohm, Kang Yi:
Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm. 545-547 - Hyung Chan Kim, Angelos D. Keromytis:
On the Deployment of Dynamic Taint Analysis for Application Communities. 548-551 - Gwanggil Jeon
, Min Young Jung, Jechang Jeong, Sung Han Park, Il Hong Suh:
Weighted Interpolation Scheme for Robust Video Deinterlacing. 552-554 - Jingjing Zhong, Siwei Luo, Qi Zou:
Visual Attention Guided Multi-Scale Boundary Detection in Natural Images for Contour Grouping. 555-558
Volume 92-D, Number 4, April 2009
- Yu Wu, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
Distributed Construction Protocols of Probabilistic Degree-Weighted Peer-to-Peer Overlays. 563-574 - Daihan Wang, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano:
A Link Removal Methodology for Application-Specific Networks-on-Chip on FPGAs. 575-583 - Vladimir V. Stankovic, Nebojsa Z. Milenkovic:
DRAM Controller with a Complete Predictor. 584-593 - Nobutaka Suzuki, Yuji Fukushima:
An XML Transformation Algorithm Inferred from an Update Script between DTDs. 594-607 - Pao Sriprasertsuk, Wataru Kameyama:
Information Distribution Analysis Based on Human's Behavior State Model and the Small-World Network. 608-619 - Dongseung Shin, Dongkyun Kim:
3DMRP: 3-Directional Zone-Disjoint Multipath Routing Protocol. 620-629 - Tomoko Kojiri, Yosuke Murase, Toyohide Watanabe:
Diagram-Based Support for Collaborative Learning in Mathematical Exercise. 630-641 - Lina
, Tomokazu Takahashi, Ichiro Ide
, Hiroshi Murase:
Incremental Unsupervised-Learning of Appearance Manifold with View-Dependent Covariance Matrix for Face Recognition from Video Sequences. 642-652 - Hyun-Il Choi, Jin Hyung Kim:
Probabilistic Synthesis of Personal-Style Handwriting. 653-661 - Yasunari Obuchi, Nobuo Hataoka:
Multi-Input Feature Combination in the Cepstral Domain for Practical Speech Recognition Systems. 662-670 - Mohammad Nurul Huda, Hiroaki Kawashima, Tsuneo Nitta:
Distinctive Phonetic Feature (DPF) Extraction Based on MLNs and Inhibition/Enhancement Network. 671-680 - Chia-Cheng Lo, Ying-Jhong Zeng, Ming-Der Shieh:
Design of a High-Throughput CABAC Encoder. 681-688 - Hasan S. M. Al-Khaffaf
, Abdullah Zawawi Talib, Rosalina Abdul Salam
:
Enhancing Salt-and-Pepper Noise Removal in Binary Images of Engineering Drawing. 689-704 - Kyoungsik Kim, Hiroyuki Kambara, Duk Shin, Yasuharu Koike
:
Learning and Control Model of the Arm for Loading. 705-716 - Jun Hasegawa, Kenji Kobayashi:
Genesis of the Mechanical Heart Valves' Ultrasonic Closing Clicks. 717-722 - Wan Yeon Lee, Kyungwoo Lee, Kyong Hoon Kim, Young Woong Ko:
Processor-Minimum Scheduling of Real-Time Parallel Tasks. 723-726 - Dong Kim, Kwanhu Bang, Seung-Hwan Ha, Chanik Park, Sung Woo Chung, Eui-Young Chung:
Solid-State Disk with Double Data Rate DRAM Interface for High-Performance PCs. 727-731 - Chul-Woong Yang, Ki Yong Lee, Yon Dohn Chung, Myoung-Ho Kim, Yoon-Joon Lee:
An Effective Self-Adaptive Admission Control Algorithm for Large Web Caches. 732-735 - Jung-Tae Lee, Young-In Song, Hae-Chang Rim:
Computing Word Semantic Relatedness for Question Retrieval in Community Question Answering. 736-739 - Weijia Yang:
Privacy Protection by Matrix Transformation. 740-741 - Taejin Ahn, Taejoon Park:
A Bio-Inspired Approach to Alarm Malware Attacks in Mobile Handsets. 742-745 - Xiang Zhang, Hongbin Suo, Qingwei Zhao, Yonghong Yan:
Using a Kind of Novel Phonotactic Information for SVM Based Speaker Recognition. 746-749 - Young-Joe Yoo, Seyoon Jeong
, Jong-Ki Han
:
Adaptive Scan Pattern for Quantized Coefficients in Intra Coding of H.264. 750-752 - Congyan Lang, De Xu, Shuoyan Liu, Ning Li:
Adaptive Non-linear Intensity Mapping Based Salient Region Extraction. 753-756 - Young-Kyu Choi, Eun-Jin Park:
HSWIS: Hierarchical Shrink-Wrapped Iso-Surface Algorithm. 757-760
Volume 92-D, Number 5, May 2009
- Kouichi Sakurai:
Foreword. 765 - Heung Youl Youm:
Extensible Authentication Protocol Overview and Its Applications. 766-776 - Hsiao-Chien Tsai, Nai-Wei Lo, Tzong-Chen Wu:
A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks. 777-786 - Koji Nakao, Daisuke Inoue, Masashi Eto
, Katsunari Yoshioka
:
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring. 787-798 - Yong Tang, Jiaqing Luo, Bin Xiao
, Guiyi Wei:
Concept, Characteristics and Defending Mechanism of Worms. 799-809 - Youngho Park, Kyung Hyune Rhee:
An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET. 810-817 - Tae Dempsey, Gokhan Sahin
, Yu T. Morton:
Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks. 818-825 - Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga
, Yoshiaki Hori:
Development of Single Sign-On System with Hardware Token and Key Management Server. 826-835 - Sachiko Yoshihama, Takaaki Tateishi, Naoshi Tabuchi, Tsutomu Matsumoto:
Information-Flow-Based Access Control for Web Browsers. 836-850 - Su-Wan Park, Sang-Uk Shin:
An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding. 851-858 - Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka
, Hideki Imai:
A Trade-off Traitor Tracing Scheme. 859-875 - Shuhui Hou, Tetsutaro Uehara
, Takashi Satoh, Yoshitaka Morimura, Michihiko Minoh:
Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs. 876-887 - Rui Zhang, Hideki Imai:
Combining Public Key Encryption with Keyword Search and Public Key Encryption. 888-896 - Kouichi Itoh, Dai Yamamoto, Jun Yajima
, Wakaha Ogata:
Collision-Based Power Attack for RSA with Small Public Exponent. 897-908 - Masaaki Shirase, Yukinori Miyazaki, Tsuyoshi Takagi, Dong-Guk Han, Dooho Choi:
Efficient Implementation of Pairing-Based Cryptography on a Sensor Node. 909-917 - Seog Chung Seo, Dong-Guk Han, Seokhie Hong:
TinyECCK16: An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes. 918-928 - Ping Du, Shunji Abe, Yusheng Ji, Seisho Sato, Makio Ishiguro:
A Traffic Decomposition and Prediction Method for Detecting and Tracing Network-Wide Anomalies. 929-936 - Jun Bi
:
A Trust Ranking Method to Prevent IM Spam. 937-944 - Daisuke Inoue, Katsunari Yoshioka
, Masashi Eto
, Yuji Hoshizawa, Koji Nakao:
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities. 945-954 - Katsunari Yoshioka
, Daisuke Inoue, Masashi Eto
, Yuji Hoshizawa, Hiroki Nogawa, Koji Nakao:
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation. 955-966 - Yang Cui, Goichiro Hanaoka
, Hideki Imai:
CCA-Secure Public Key Encryption without Group-Dependent Hash Functions. 967-970