Stop the war!
Остановите войну!
for scientists:
default search action
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume 107
Volume 107, Number 1, January 2024
- Eiji Konaka:
Foreword. 1-2 - Takumi Komori, Yutaka Masuda, Tohru Ishihara:
Virtualizing DVFS for Energy Minimization of Embedded Dual-OS Platform. 3-15 - Takahiro Fujita, Kazuyuki Wada, Kawori Sekine:
An Output Voltage Estimation and Regulation System Using Only the Primary-Side Electrical Parameters for Wireless Power Transfer Circuits. 16-24 - Kyohei Murakata, Koichi Kobayashi, Yuh Yamashita:
Multi-Agent Surveillance Based on Travel Cost Minimization. 25-30 - Keita Terashima, Koichi Kobayashi, Yuh Yamashita:
Reinforcement Learning for Multi-Agent Systems with Temporal Logic Specifications. 31-37 - Soma Kawakami, Yosuke Mukasa, Siya Bao, Dema Ba, Junya Arai, Satoshi Yagi, Junji Teramoto, Nozomu Togawa:
Ising-Machine-Based Solver for Constrained Graph Coloring Problems. 38-51 - Soma Kawakami, Kentaro Ohno, Dema Ba, Satoshi Yagi, Junji Teramoto, Nozomu Togawa:
Giving a Quasi-Initial Solution to Ising Machines by Controlling External Magnetic Field Coefficients. 52-62 - Ryotaro Negishi, Tatsuki Kurihara, Nozomu Togawa:
Hardware-Trojan Detection at Gate-Level Netlists Using a Gradient Boosting Decision Tree Model and Its Extension Using Trojan Probability Propagation. 63-74 - Kota Hisafuru, Kazunari Takasaki, Nozomu Togawa:
An Anomalous Behavior Detection Method Utilizing IoT Power Waveform Shapes. 75-86 - Koyo Kugiyama, Seiji Miyoshi:
Statistical-Mechanical Analysis of Adaptive Volterra Filter for Nonwhite Input Signals. 87-95 - Takuma Nagao, Tomoki Nakamura, Masuo Kajiyama, Makoto Eiki, Michiko Inoue, Michihiro Shintani:
Wafer-Level Characteristic Variation Modeling Considering Systematic Discontinuous Effects. 96-104 - Xingyu Wang, Ruilin Zhang, Hirofumi Shinohara:
A Single-Inverter-Based True Random Number Generator with On-Chip Clock-Tuning-Based Entropy Calibration Circuit. 105-113 - Fujihiko Matsumoto, Hinano Ohtsu:
Consideration of Integrated Low-Frequency Low-Pass Notch Filter Employing CCII Based Capacitance Multipliers. 114-118 - Wenhui Liu, Xiaoni Du, Xingbin Qiao:
Construction of a Class of Linear Codes with at Most Three-Weight and the Application. 119-124 - Yitu Wang, Takayuki Nakachi:
Network Traffic Anomaly Detection: A Revisiting to Gaussian Process and Sparse Representation. 125-133 - Jinguang Hao, Gang Wang, Honggang Wang, Lili Wang, Xuefeng Liu:
Low-Complexity Digital Channelizer Design for Software Defined Radio. 134-140 - Aorui Gou, Jingjing Liu, Xiaoxiang Chen, Xiaoyang Zeng, Yibo Fan:
CCTSS: The Combination of CNN and Transformer with Shared Sublayer for Detection and Classification. 141-156 - Nabilah Shabrina, Dongju Li, Tsuyoshi Isshiki:
High Precision Fingerprint Verification for Small Area Sensor Based on Deep Learning. 157-168 - Yifan Guo, Zhijun Wang, Wu Guan, Liping Liang, Xin Qiu:
An Efficient Signal Detection Method Based on Enhanced Quasi-Newton Iteration for Massive MIMO Systems. 169-173 - Yanyan Chang, Wei Zhang, Hao Wang, Lina Shi, Yanyan Liu:
Prime-Factor GFFT Architecture for Fast Frequency Domain Decoding of Cyclic Codes. 174-177 - Zhi Liu, Siyuan Zhang, Xiaohan Guan, Mengmeng Zhang:
A Fast Intra Mode Decision Algorithm in VVC Based on Feature Cross for Screen Content Videos. 178-181 - Chaorong Zhang, Yuyang Peng, Ming Yue, Fawaz Al-Hazemi:
A Simple Design of Reconfigurable Intelligent Surface-Assisted Index Modulation: Generalized Reflected Phase Modulation. 182-186
Volume 107, Number 2, 2024
- Qingping Yu, You Zhang, Renze Luo, Longye Wang, Xingwang Li:
Parity-Check Polarization-Adjusted Convolutional Coding. 187-191
Volume 107, Number 3, 2024
- Noboru Kunihiko:
Foreword. 192 - Rikuhiro Kojima, Jacob C. N. Schuldt, Goichiro Hanaoka:
A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation. 193-202 - Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai, Junji Shikata:
Designated Verifier Signature with Claimability. 203-217 - Hirotomo Shinoki, Koji Nuida:
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption. 218-233 - Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide:
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications. 234-247 - Kyoichi Asano, Keita Emura, Atsushi Takayasu:
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model. 248-259 - Keita Emura:
Generic Construction of Public-Key Authenticated Encryption with Keyword Search Revisited. 260-274 - Yasuhiko Ikematsu, Tsunekazu Saito:
Hilbert Series for Systems of UOV Polynomials. 275-282 - Keitaro Hiwatashi, Koji Nuida:
Correlated Randomness Reduction in Domain-Restricted Secure Two-Party Computation. 283-290 - Takayuki Sasaki, Mami Kawaguchi, Takuhiro Kumagai, Katsunari Yoshioka, Tsutomu Matsumoto:
Observation of Human-Operated Accesses Using Remote Management Device Honeypot. 291-305 - Ren Takeuchi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki:
Ensemble Malware Classifier Considering PE Section Information. 306-318 - Vu Trung Duong Le, Hoai-Luan Pham, Thi Hong Tran, Yasuhiko Nakashima:
Flexible and Energy-Efficient Crypto-Processor for Arbitrary Input Length Processing in Blockchain-Based IoT Applications. 319-330 - Hanae Nozaki, Kazukuni Kobara:
Power Analysis of Floating-Point Operations for Leakage Resistance Evaluation of Neural Network Model Parameters. 331-343 - Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino:
Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface. 344-354 - Shingo Yashiki, Chako Takahashi, Koutarou Suzuki:
Backdoor Attacks on Graph Neural Networks Trained with Data Augmentation. 355-358 - Yuichi Kaji:
Foreword. 359 - Mitsugu Iwamoto:
Information-Theoretic Perspectives for Simulation-Based Security in Multi-Party Computation. 360-372 - Shoichiro Yamasaki, Tomoko K. Matsushima, Kyohei Ono, Hirokazu Tanaka:
Variable-Length Orthogonal Codes over Finite Fields Realizing Data Multiplexing and Error Correction Coding Simultaneously. 373-383 - Sho Higuchi, Yuta Sakai:
A Fundamental Limit of Variable-Length Compression with Worst-Case Criteria in Terms of Side Information. 384-392 - Tomohiko Uyematsu, Tetsunao Matsuta:
Equivalences among Some Information Measures for Individual Sequences and Their Applications for Fixed-Length Coding Problems. 393-403 - Mikihiko Nishiara, Yuki Ito:
Proof of Achievability Part of Rate-Distortion Theorem without Random Coding. 404-408 - Takahiro Ota, Akiko Manada:
A Reconstruction of Circular Binary String Using Substrings and Minimal Absent Words. 409-416 - Kengo Hashimoto, Ken-ichi Iwata:
Properties of k-Bit Delay Decodable Codes. 417-447 - Koshi Shimada, Shota Saito, Toshiyasu Matsushima:
An Efficient Bayes Coding Algorithm for Changing Context Tree Model. 448-457 - Masaki Hori, Mikihiko Nishiara:
Channel Capacity with Cost Constraint Allowing Cost Overrun. 458-463 - Toru Nakanishi, Atsuki Iriboshi, Katsunobu Imai:
Short DL-Based Blacklistable Ring Signatures from DualRing. 464-475 - Daisuke Hibino, Tomoharu Shibuya:
Efficient Construction of Encoding Polynomials in a Distributed Coded Computing Scheme. 476-485 - Asahi Mizukoshi, Ayano Nakai-Kasai, Tadashi Wadayama:
PSOR-Jacobi Algorithm for Accelerated MMSE MIMO Detection. 486-492 - Ken Hisanaga, Motohiko Isaka:
Communication-Efficient Distributed Orthogonal Approximate Message Passing for Sparse Signal Recovery. 493-502 - Shota Saito:
Meta-Bound on Lower Bounds of Bayes Risk in Parameter Estimation. 503-509 - Jun Suzuki:
Bayesian Nagaoka-Hayashi Bound for Multiparameter Quantum-State Estimation Problem. 510-518 - Minami Sato, Sosuke Minamoto, Ryuichi Sakai, Yasuyuki Murakami:
High-Density Knapsack Cryptosystem Using Shifted-Odd and Super-Increasing Sequence. 519-522 - Yuta Nakahara, Toshiyasu Matsushima:
Batch Updating of a Posterior Tree Distribution Over a Meta-Tree. 523-525 - Shogo Chiwaki, Ryutaroh Matsumoto:
Performance Comparison of the Two Reconstruction Methods for Stabilizer-Based Quantum Secret Sharing. 526-529 - Nozomu Togawa:
Foreword. 530 - Masahiro Nishimura, Taito Manabe, Yuichiro Shibata:
Pipelined ADPCM Compression for HDR Synthesis on an FPGA. 531-539 - Jiaxuan Lu, Yutaka Masuda, Tohru Ishihara:
Identification of Redundant Flip-Flops Using Fault Injection for Low-Power Approximate Computing Circuits. 540-548 - Momoko Fukuda, Makoto Ikeda:
Template-Based Design Optimization for Selecting Pairing-Friendly Curve Parameters. 549-556 - Sohei Shimomai, Kei Ueda, Shinji Kimura:
Input Data Format for Sparse Matrix in Quantum Annealing Emulator. 557-565 - Ryosuke Matsuo, Shin-ichi Minato:
A Complete Library of Cross-Bar Gate Logic with Three Control Inputs. 566-574 - Kotaro Abe, Makoto Ikeda:
Template Attacks on ECDSA Hardware and Theoretical Estimation of the Success Rate. 575-582 - Masayoshi Yoshimura, Atsuya Tsujikawa, Toshinori Hosokawa:
CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer Level. 583-591 - Tomohiro Nishiguchi, Nobutaka Kuroki, Masahiro Numa:
Technology Remapping Approach Using Multi-Gate Reconfigurable Cells for Post-Mask Functional ECO. 592-599 - Yuya Ushioda, Mineo Kaneko:
ILP Based Approaches for Optimizing Early Decompute in Two Level Adiabatic Logic Circuits. 600-609
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.