default search action
Journal of Information Processing, Volume 23
Volume 23, Number 1, January 2015
- Takeshi Ito:
Editor's Message to Special Issue on Game Programming. 1 - Tung Duc Nguyen, Kien Quang Nguyen, Ruck Thawonmas:
Heuristic Search Exploiting Non-additive and Unit Properties for RTS-game Unit Micromanagement. 2-8 - Akira Ura, Yoshimasa Tsuruoka, Takashi Chikayama:
Dynamic Prediction of Minimal Trees in Large-Scale Parallel Game Tree Search. 9-19
- Noriaki Saito:
Editor's Message to Special Issue on Collaboration Technologies and Network Services that Concentrate Wisdom toward Future Society. 20-21 - Yu Suzuki:
Quality Assessment of Wikipedia Articles Using h-index. 22-30 - Nor Athiyah Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama:
User's Action and Decision Making of Retweet Messages towards Reducing Misinformation Spread during Disaster. 31-40
- Aurélio Akira Mello Matsui, Hitoshi Aida:
A DSL for Contract-centric Compatibility Assessment in Distributed Services. 41-57 - Yoji Yamato, Yukihisa Nishizawa, Masahito Muroi, Kentaro Tanaka:
Development of resource management server for production IaaS services based on OpenStack. 58-66 - Masaharu Fukase, Kenji Kashiwabara:
An Accelerated Algorithm for Solving SVP Based on Statistical Analysis. 67-80 - Kentaroh Toyoda, Iwao Sasase:
Unsupervised Clustering-based SPITters Detection Scheme. 81-92
Volume 23, Number 2, March 2015
- Sadao Obana:
Editor's Message to Special Issue on Network Services and Distributed Processing. 93 - Takamasa Higuchi, Hirozumi Yamaguchi, Teruo Higashino:
Mobile Devices as an Infrastructure: A Survey of Opportunistic Sensing Technology. 94-104 - Ryohei Banno, Susumu Takeuchi, Michiharu Takemoto, Tetsuo Kawano, Takashi Kambayashi, Masato Matsuo:
Designing Overlay Networks for Handling Exhaust Data in a Distributed Topic-based Pub/Sub Architecture. 105-116
- Masato Edahiro:
Editor's Message to Special Issue on Embedded Systems Engineering. 117 - Surachai Thongkaew, Tsuyoshi Isshiki, Dongju Li, Hiroaki Kunieda:
Dalvik Bytecode Acceleration Using Fetch/Decode Hardware Extension. 118-130
- Takeshi Sakurada:
Editor's Message to Special Issue on Information Security or Operation Technology in the Age of Virtualization. 131 - Yoshihiro Oyama, Yudai Kawasaki, Kazushi Takahashi:
Checkpointing an Operating System Using a Parapass-through Hypervisor. 132-141
- Yasuo Okabe:
Editor's Message to Special Issue of "Students' and Young Researchers' Papers". 142 - Eric Shun Fukuda, Hiroaki Inoue, Takashi Takenaka, Dahoo Kim, Tsunaki Sadahisa, Tetsuya Asai, Masato Motomura:
Enhancing Memcached by Caching Its Data and Functionalities at Network Interface. 143-152 - Takaaki Miyajima, David B. Thomas, Hideharu Amano:
A Toolchain for Dynamic Function Off-load on CPU-FPGA Platforms. 153-162 - Aye Thida Hlaing, Tin Nilar Win, Htoo Htoo, Yutaka Ohsawa:
RkNN Query on Road Network Distances. 163-170 - Kohei Matsushita, Hiroyasu Hamada:
A Fast Computation of 3 × 3 Matrix Exponentials and its Application in CG. 171-175 - Rafik Hadfi, Takayuki Ito:
Low-Complexity Exploration in Utility Hypergraphs. 176-184 - Veluchamy Glory, Sandanam Domnic:
Compressing Inverted Index Using Optimal FastPFOR. 185-191 - Shaymaa E. Sorour, Tsunenori Mine, Kazumasa Goda, Sachio Hirokawa:
A Predictive Model to Evaluate Student Performance. 192-201
- Minseon Lee, Shuichi Miyazaki, Kazuo Iwama:
Finding Witnesses for Stability in the Hospitals/Residents Problem. 202-209 - Kaoru Katayama, Ernest Weke Maina:
Indexing Method for Hierarchical Graphs based on Relation among Interlacing Sequences of Eigenvalues. 210-220 - Hiromichi Kanaoka, Takuya Yoshihiro:
Combining Local Channel Selection with Routing Metrics in Multi-channel Wireless Mesh Networks. 221-228 - Hiroshi Kobayashi, Kaoru Sano, Osamu Moriya:
Performance Evaluation of Synchronous Variable-multiple Collision Avoidance Systems. 229-237
Volume 23, Number 3, May 2015
- Hiro Ito:
Editor's Message for Special Issue on Recreational Discrete Mathematics. 238 - Aaron B. Adcock, Erik D. Demaine, Martin L. Demaine, Michael P. O'Brien, Felix Reidl, Fernando Sánchez Villaamil, Blair D. Sullivan:
Zig-Zag Numberlink is NP-Complete. 239-245 - Jin Akiyama, Hyunwoo Seong:
Pentadral Complices. 246-251 - Kazuyuki Amano, Shin-Ichi Nakano, Koichi Yamazaki:
Anti-Slide. 252-257 - Sebastian Böcker:
Ten Times Eighteen. 258-264 - Jean Cardinal, Sébastien Collette, Hiro Ito, Matias Korman, Stefan Langerman, Hikaru Sakaidani, Perouz Taslakian:
Cannibal Animal Games: a new variant of Tic-Tac-Toe. 265-271 - Emily Rita Berger, Alexander Dubbs:
Winning Strategies in Multimove Chess (i, j). 272-275 - Kazuya Haraguchi, Hirotaka Ono:
How Simple Algorithms Can Solve Latin Square Completion-Type Puzzles Approximately. 276-283 - Michael Lampis, Valia Mitsou, Karolina Soltys:
Scrabble is PSPACE-Complete. 284-292 - Erik D. Demaine, Fermi Ma, Matthew Susskind, Erik Waingarten:
You Should Be Scared of German Ghost. 293-298 - Yoshifumi Manabe, Risako Otsuka, Tatsuaki Okamoto:
A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus. 299-304 - Yasuhiko Takenaga, Narutoshi Tanaka, Takahiro Habara:
Number of Three-point Tilings with Triangle Tiles. 305-309 - Akihiro Uejima, Hiroaki Suzuki:
Fillmat is NP-Complete and ASP-Complete. 310-316
- Michinori Hatayama:
Editor's Message to Special Issue on Information Systems for Creation of a New Society. 317 - Akio Ida, Shigeo Kaneda:
Applying Multidimensional Scaling for Responsibility Distribution between Objects - - Linking Conceptual Activity Model and Class Diagram. 318-326 - Maike Erdmann, Tomoya Takeyoshi, Kazushi Ikeda, Gen Hattori, Chihiro Ono, Yasuhiro Takishima:
Assigning Keywords to Automatically Extracted Personal Cliques from Social Networks. 327-334
- Oyuntungalag Chagnaadorj, Jiro Tanaka:
Accumulative Secure Group Association in an Ad-hoc and Ubiquitous Network (Version 3.0). 335-343 - Juan Luo, Yves Lepage:
Extraction of Potentially Useful Phrase Pairs for Statistical Machine Translation. 344-352 - Hiroki Mizumoto, Nobutaka Suzuki:
An XSLT Transformation Method for Distributed XML. 353-365 - Akihiro Ida, Takeshi Iwashita, Makiko Ohtani, Kazuro Hirahara:
Improvement of Hierarchical Matrices with Adaptive Cross Approximation for Large-scale Simulation. 366-372
- Nuttapoom Amornpashara, Yutaka Arakawa, Morihiko Tamai, Keiichi Yasumoto:
Phorec: Context-Aware Photography Support System Based on Social Data Analysis. 373-380
Volume 23, Number 4, July 2015
- Nariyoshi Yamai:
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2014. 381 - Michael Wisely, Sahra Sedigh Sarvestani, Ali R. Hurson:
Public Data Dissemination via Broadcasting. 382-391 - Marwa Elsayed, Mohammad Zulkernine:
A Classification of Intrusion Detection Systems in the Cloud. 392-401 - Sho Tsugawa, Hiroyuki Ohsaki:
Community Structure and Interaction Locality in Social Networks. 402-410 - Shinobu Saito, Jun Hagiwara, Tomoki Yagasaki, Katsuyuki Natsukawa:
ReVAMP: Requirements Validation Approach using Models and Prototyping - Practical Cases of Requirements Engineering in End-User Computing. 411-419 - Hiroshi Yamamoto, Shigehiro Ano, Katsuyuki Yamazaki:
Modeling of Dynamic Latency Variations Using Auto-Regressive Model and Markov Regime Switching for Mobile Network Access on Trains. 420-429 - Hiroshi Yamamoto, Tatsuya Takahashi, Norihiro Fukumoto, Shigehiro Ano, Katsuyuki Yamazaki:
Development and Evaluation of Congestion Detection System Using Complex Event Processing for Mobile Networks. 430-440 - Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
Design and Implementation of Optimal Route Selection Mechanism for Outbound Connections on IPv6 Multihoming Environment. 441-448 - Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira:
Strict Application Execution Control with Hierarchical Group Management Using Digital Certificates on Educational Windows PCs. 449-457 - Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki:
Dripcast - Architecture and Implementation of Server-less Java Programming Framework for Billions of IoT Devices. 458-464 - Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms. 465-475 - Yuichi Sei, Akihiko Ohsuga:
Malicious Node Detection in Mobile Wireless Sensor Networks. 476-487
- Weihua Sun, Naoki Shibata, Masahiro Kenmotsu, Keiichi Yasumoto, Minoru Ito:
A Method for Navigating Cars in Multilevel Parking Facility. 488-496 - Yuya Kaneda, Yan Pei, Qiangfu Zhao, Yong Liu:
Improving the Performance of the Decision Boundary Making Algorithm via Outlier Detection. 497-504
- Kimio Kuramitsu:
Packrat Parsing with Elastic Sliding Window. 505-512 - Yusuke Takamatsu, Kenji Kono:
Detection of Visual Clickjacking Vulnerabilities in Incomplete Defenses. 513-524
- Masami Hagiya:
Defining Informatics across Bun-kei and Ri-kei. 525-530
Volume 23, Number 5, September 2015
- Masato Edahiro:
Editor's Message to Special Issue of Embedded Systems Engineering. 531 - Yuki Ando, Shinya Honda, Hiroaki Takada, Masato Edahiro:
System-level Design Method for Control Systems with Hardware-implemented Interrupt Handler. 532-541 - Kiyofumi Tanaka:
Real-Time Scheduling for Reducing Jitters of Periodic Tasks. 542-552
- Masahiro Mambo:
Editor's Message to Special issue of Computer Security Technologies to be Indispensable to the Society. 553 - Reihaneh Safavi-Naini, Pengwei Wang:
A Model for Adversarial Wiretap Channels and its Applications. 554-561 - Koji Tomida, Hiroshi Doi, Masami Mohri, Yoshiaki Shiraishi:
Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search. 562-569 - Kouya Tochikubo:
New Secret Sharing Schemes Realizing General Access Structures. 570-578 - Mitsuhiro Hatada, Mitsuaki Akiyama, Takahiro Matsuki, Takahiro Kasama:
Empowering Anti-malware Research in Japan by Sharing the MWS Datasets. 579-588 - Kale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato:
Reducing Congestion in the Tor Network with Circuit Switching. 589-602 - Masatsugu Ichino, Kenji Kawamoto, Toru Iwano, Mitsuhiro Hatada, Hiroshi Yoshiura:
Evaluating Header Information Features for Malware Infection Detection. 603-612 - Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:
METRO: Measurement of End-to-End Route Trust. 613-622 - Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto:
Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses. 623-632 - Hisao Sakazaki, Yasuko Fukuzawa:
Study on the Feasibility of Smart-Banknotes. 633-645 - Fei Feng, Kanta Matsuura:
Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models. 646-654 - Mizuki Watanabe, Ryotaro Kobayashi, Masahiko Kato:
HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources. 655-663 - Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi:
Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems. 664-672 - Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Process Hiding by Virtual Machine Monitor for Attack Avoidance. 673-682
- Marat Zhanikeev:
DiffHub: An Efficient Cloud Sync Technology based on Binary Diffs. 683-692 - Masahide Kawai, Tomoyori Iwao, Akinobu Maejima, Shigeo Morishima:
Automatic Generation of Photorealistic 3D Inner Mouth Animation only from Frontal Images. 693-703 - Takeshi Miura, Takaaki Kaiga, Katsubumi Tajima, Takeshi Shibata, Hideo Tamamoto:
Sensor Number Reduction in Skeleton Estimation from Magnetic Motion Capture Data. 704-707 - Toshiyuki Hagiya, Tsuneo Kato:
Probabilistic Touchscreen Text Entry Method Incorporating Gaze Point Information. 708-715 - Seiji Umatani, Tomoharu Ugawa, Masahiro Yasugi:
Design and Implementation of a Java Bytecode Manipulation Library for Clojure. 716-729 - Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa:
Relaxing Heavy Congestion by State Propagation. 730-743
Volume 23, Number 6, November 2015
- Tsunenori Mine:
Editor's Message to Special Issue on E-Service and Knowledge Management toward Smart Computing Society. 744 - Takanobu Otsuka, Yoshitaka Torii, Takayuki Ito:
Anomaly Weather Information Detection Using Wireless Pressure-sensor Grid. 745-752 - Hisato Fujimagari, Katsuhide Fujita:
Detecting Research Fronts Using Neural Network Model for Weighted Citation Network Analysis. 753-758 - Yuji Yamagata, Naoki Fukuta:
An Approach to Dynamic Query Classification and Approximation on an Inference-enabled SPARQL Endpoint. 759-766 - Alexis Vallet, Hiroyasu Sakamoto:
A Multi-Label Convolutional Neural Network for Automatic Image Annotation. 767-775 - Kengo Yoshimizu, Noriko Takemura, Yoshio Iwai, Kosuke Sato:
Multi-sensor-based Ambient Sensing System for the Estimation of Comfort/Discomfort to Lighting Condition During Desk Work. 776-783 - Shaymaa E. Sorour, Kazumasa Goda, Tsunenori Mine:
Evaluation of Effectiveness of Time-Series Comments by Using Machine Learning Techniques. 784-794 - Toru Kobayashi:
An Application Framework for Trend Surfing System based on Multi-aspect, Multi-screen and Multimodal User Interface. 795-803
- Xiao Cong, Tatsuya Akutsu:
Matrix Network: A New Data Structure for Efficient Enumeration of Microstates of a Genetic Regulatory Network. 804-813 - Shotaro Sano, Takuma Otsuka, Katsutoshi Itoyama, Hiroshi G. Okuno:
HMM-based Attacks on Google's ReCAPTCHA with Continuous Visual and Audio Symbols. 814-826 - Ryosuke Sato, Kazuyuki Asada, Naoki Kobayashi:
Refinement Type Checking via Assertion Checking. 827-834 - Wei Wei, Akihiro Nakamata, Yoshihiro Kawahara, Tohru Asami:
Food Recognition via Monitoring Power Leakage from a Microwave Oven. 835-844
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.