default search action
IEICE Transactions on Information & Systems, Volume 93-D
Volume 93-D, Number 1, January 2010
- Kazumi Hatayama, Tsuyoshi Shinogi:
Foreword. 1 - Kohei Miyase, Xiaoqing Wen, Hiroshi Furukawa, Yuta Yamato, Seiji Kajihara, Patrick Girard, Laung-Terng Wang, Mohammad Tehranipoor:
High Launch Switching Activity Reduction in At-Speed Scan Testing Using CTX: A Clock-Gating-Based Test Relaxation and X-Filling Scheme. 2-9 - Hiroyuki Yotsuyanagi, Masayuki Yamamoto, Masaki Hashizume:
Scan Chain Ordering to Reduce Test Data for BIST-Aided Scan Test Using Compatible Scan Flip-Flops. 10-16 - Anis Uzzaman, Brion L. Keller, Brian Foutz, Sandeep Bhatia, Thomas Bartenstein, Masayuki Arai, Kazuhiko Iwasaki:
Reduction of Test Data Volume and Improvement of Diagnosability Using Hybrid Compression. 17-23 - Ryoichi Inoue, Toshinori Hosokawa, Hideo Fujiwara:
A Fault Dependent Test Generation Method for State-Observable FSMs to Increase Defect Coverage under the Test Length Constraint. 24-32 - Wimol San-Um, Masayoshi Tachibana:
A Fault Signature Characterization Based Analog Circuit Testing Scheme and the Extension of IEEE 1149.4 Standard. 33-42
- Mutsumi Komuro, Norihisa Komoda:
A Model to Explain Quality Improvement Effect of Peer Reviews. 43-49 - Changchun Xu, Yanyi Xu, Gan Liu, Kezhong Liu:
Voice Communications over 802.11 Ad Hoc Networks: Modeling, Optimization and Call Admission Control. 50-58 - Xiang Fu, Huawei Li, Xiaowei Li:
Testable Critical Path Selection Considering Process Variation. 59-67 - Cheng-Min Lin:
Reliability Analysis and Modeling of ZigBee Networks. 68-78 - Cong Nguyen Bui, Hae-Yeoun Lee, Jeong-Chun Joo, Heung-Kyu Lee:
Secure Bit-Plane Based Steganography for Secret Communication. 79-86 - Mehdi Fallahpour, David Megías:
Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification. 87-93 - Jia Hao, Tadashi Shibata:
An Ego-Motion Detection System Employing Directional-Edge-Based Motion Field Representations. 94-106 - Yusuke Ijima, Takashi Nose, Makoto Tachibana, Takao Kobayashi:
A Rapid Model Adaptation Technique for Emotional Speech Recognition with Style Estimation Based on Multiple-Regression HMM. 107-115 - Takashi Nose, Takao Kobayashi:
A Technique for Estimating Intensity of Emotional Expressions and Speaking Styles in Speech Based on Multiple-Regression HSMM. 116-124 - Minoru Mori, Minako Sawaki, Junji Yamato:
Robust Character Recognition Using Adaptive Feature Extraction Method. 125-133 - Ryo Ohtera, Takahiko Horiuchi, Hiroaki Kotera:
Eyegaze Detection from Monocular Camera Image for Eyegaze Communication System. 134-143 - Kenichi Kanatani:
Geometric BIC. 144-151 - Trung Ngo Thanh, Yuichiro Kojima, Hajime Nagahara, Ryusuke Sagawa, Yasuhiro Mukaigawa, Masahiko Yachida, Yasushi Yagi:
Real-Time Estimation of Fast Egomotion with Feature Classification Using Compound Omnidirectional Vision Sensor. 152-166 - Junghoon Kwon, Jeongin Lee, Harksu Kim, Gilsoo Jang, Young-Ho Chai:
Deforming NURBS Surfaces to Target Curves for Immersive VR Sketching. 167-175 - Miao Song, Keizo Shinomori, Shiyong Zhang:
The Influence of a Low-Level Color or Figure Adaptation on a High-Level Face Perception. 176-184 - Lixin Jia, Bo Yang, Suchang Guo, Dong Ho Park:
Software Reliability Modeling Considering Fault Correction Process. 185-188 - Jae-Sung Lee, Dae-Won Kim:
Classifying Categorical Data Based on Adoptive Hamming Distance. 189-192 - YongJoon Kim, Jaeseok Park, Sungho Kang:
A Selective Scan Chain Activation Technique for Minimizing Average and Peak Power Consumption. 193-196 - Bong-Jin Lee, Chi-Sang Jung, Jeung-Yoon Choi, Hong-Goo Kang:
On the Importance of Transition Regions for Automatic Speaker Recognition. 197-200 - Joo-Young Lee, Young-In Song, Hae-Chang Rim, Kyoung-Soo Han:
Incorporating Frame Information to Semantic Role Labeling. 201-204
Volume 93-D, Number 2, February 2010
- Yuichi Kaji:
Foreword. 207 - Tatsuya Akutsu:
Tree Edit Distance Problems: Algorithms and Applications to Bioinformatics. 208-218 - Shirou Maruyama, Youhei Tanaka, Hiroshi Sakamoto, Masayuki Takeda:
Context-Sensitive Grammar Transform: Compression and Pattern Matching. 219-226 - Kaoru Fujioka:
Refinement of Representation Theorems for Context-Free Languages. 227-232 - Yuichi Yoshida, Hiro Ito:
Query-Number Preserving Reductions and Linear Lower Bounds for Testing. 233-240 - Ruka Tanahashi, Zhi-Zhong Chen:
A Deterministic Approximation Algorithm for Maximum 2-Path Packing. 241-249 - Sung Kwon Kim:
Optimal Online and Offline Algorithms for Finding Longest and Shortest Subsequences with Length and Sum Constraints. 250-256 - Hiroki Morizumi, Genki Suzuki:
Negation-Limited Inverters of Linear Size. 257-262 - Toshiya Itoh, Yasuhiro Suzuki:
Improved Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length. 263-270 - Ngo Anh Vien, SeungGwan Lee, TaeChoong Chung:
Policy Gradient Based Semi-Markov Decision Problems: Approximation and Estimation Errors. 271-279 - Hideaki Fukuhara, Eiji Takimoto:
Lower Bounds on Quantum Query Complexity for Read-Once Formulas with XOR and MUX Operators. 280-289 - Hideaki Otsuki, Tomio Hirata:
Inapproximability of the Minimum Biclique Edge Partition Problem. 290-292
- Shi Wang, Hyongsuk Kim, Chun-Shin Lin, Hongxin Chen:
Accurate and Robust Surface Measurement Using Optimal Structured Light Tracking Method. 293-299 - Kazuhiro Nakamura, Masatoshi Yamamoto, Kazuyoshi Takagi, Naofumi Takagi:
A VLSI Architecture for Output Probability Computations of HMM-Based Recognition Systems with Store-Based Block Parallel Processing. 300-305 - Kan Watanabe, Masaru Fukushi, Susumu Horiguchi:
Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing. 306-314 - Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong, DaeHun Nyang:
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency. 315-325 - Kanji Tanaka, Kenichi Saeki, Mamoru Minami, Takeshi Ueda:
LSH-RANSAC: Incremental Matching of Large-Size Maps. 326-334 - Ryo Nagata, Jun'ichi Kakegawa, Yukiko Yabuta:
A Topic-Independent Method for Scoring Student Essay Content. 335-340 - Kun-Ching Wang:
An Adaptive Wavelet-Based Denoising Algorithm for Enhancing Speech in Non-stationary Noise Environment. 341-349 - Deng Zhang, Jegoon Ryu, Toshihiro Nishimura:
A Novel Modeling and Evaluating for RTS Noise on CMOS Image Sensor in Motion Picture. 350-358 - Jegoon Ryu, Toshihiro Nishimura:
Noise Reduction in CMOS Image Sensor Using Cellular Neural Networks with a Genetic Algorithm. 359-366 - Mitsuharu Matsumoto:
Band-Pass epsilon-Filter for Edge Enhancement and Noise Removal. 367-375 - Yong Cao, Qingxin Zhu:
The Software Reliability Model Based on Fractals. 376-379 - YongJoon Kim, Jaeseok Park, Sungho Kang:
Selective Scan Slice Grouping Technique for Efficient Test Data Compression. 380-383 - DongMing Tang, Qingxin Zhu, Yong Cao, Fan Yang:
An Efficient Clustering Algorithm for Irregularly Shaped Clusters. 384-387 - Hochong Park, Ho-Sang Sung:
Delay-Reduced MDCT for Scalable Speech Codec with Cascaded Transforms. 388-391 - Youngjoo Suh, Hoirin Kim:
Cepstral Domain Feature Extraction Utilizing Entropic Distance-Based Filterbank. 392-394 - Makoto Sakai, Norihide Kitaoka, Yuya Hattori, Seiichi Nakagawa, Kazuya Takeda:
Evaluation of Combinational Use of Discriminant Analysis-Based Acoustic Feature Transformation and Discriminative Training. 395-398 - Shih-Chieh Shie, Ji-Han Jiang, Long-Tai Chen, Zeng-Hui Huang:
Secret Image Transmission Scheme Using Secret Codebook. 399-402 - Zhe Wang, Siwei Luo, Liang Wang:
A Fast Algorithm for Learning the Overcomplete Image Prior. 403-406
Volume 93-D, Number 3, March 2010
- Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:
Foreword. 409-410 - Gang Yao, Jiannong Cao, Ye Yan, Yusheng Ji:
Secured Fast Handoff in 802.11-Based Wireless Mesh Networks for Pervasive Internet Access. 411-420 - Song Guo, An-Ni Shen, Minyi Guo:
A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks. 421-429 - Zhuo Ma, Jianfeng Ma, Sang-Jae Moon, Xinghua Li:
An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment. 430-437 - Yufeng Wang, Akihiro Nakao, Jianhua Ma:
HopRec: Hop-Based Recommendation Ability Enhanced Reputation Ranking in P2P Networks. 438-447 - Daigo Muramatsu:
Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks. 448-457 - Feilong Tang, Minyi Guo, Song Guo:
Tier-Based Scalable and Secure Routing for Wireless Sensor Networks with Mobile Sinks. 458-465 - Jingyu Feng, Yuqing Zhang, Hong Wang:
A Trust Management Model Based on Bi-evaluation in P2P Networks. 466-472 - Myoung Rak Lee, Byungsik Yoon, Hyogon Kim, Hoh Peter In:
A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks. 473-483 - Yahui Li, Jianfeng Ma, Sang-Jae Moon:
Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks. 484-490 - Ruixuan Li, Jianfeng Lu, Zhengding Lu, Xiaopu Ma:
Consistency Checking of Safety and Availability in Access Control. 491-502 - Xiaofeng Lu, Pan Hui, Don Towsley, Juhua Pu, Zhang Xiong:
LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network. 503-509 - Sancheng Peng, Weijia Jia, Guojun Wang, Jie Wu, Minyi Guo:
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks. 510-517 - Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro:
Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. 518-527 - Dang Nguyen Duc, Kwangjo Kim:
On the Security of RFID Group Scanning Protocols. 528-530 - Baokang Zhao, Dan Wang, Zili Shao, Jiannong Cao, Keith C. C. Chan, Jinshu Su:
An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming. 531-533
- Stanislav G. Sedukhin, Toshiaki Miyazaki, Kenichi Kuroda:
Orbital Systolic Algorithms and Array Processors for Solution of the Algebraic Path Problem. 534-541 - Hayato Yamaguchi, Hiroshi Nakajima, Kazuhiko Taniguchi, Syoji Kobashi, Yutaka Hata:
An Ultrasonic and Air Pressure Sensing System for Detection of Behavior before Getting out of Bed Aided by Fuzzy Theory. 542-549 - Seyed-Amin Hosseini-Seno, Tat Chee Wan, Rahmat Budiarto, Masashi Yamada:
Management of Energy Consumption on Cluster Based Routing Protocol for MANET. 550-559 - So Ryoung Park, Sanguk Noh:
Optimal Decision-Making of Countermeasures by Estimating Their Expected Utilities. 560-568 - Aram Kawewong, Yutaro Honda, Manabu Tsuboyama, Osamu Hasegawa:
Reasoning on the Self-Organizing Incremental Associative Memory for Online Robot Path Planning. 569-582 - Masashi Sugiyama, Ichiro Takeuchi, Taiji Suzuki, Takafumi Kanamori, Hirotaka Hachiya, Daisuke Okanohara:
Least-Squares Conditional Density Estimation. 583-594 - Keiichiro Oura, Heiga Zen, Yoshihiko Nankaku, Akinobu Lee, Keiichi Tokuda:
A Covariance-Tying Technique for HMM-Based Speech Synthesis. 595-601 - Zhong-Ho Chen, Alvin Wen-Yu Su:
A Fast and Memory Efficient SPIHT Image Encoder. 602-610 - Yingdi Xie, Jun Ohya:
Elliptical Object Detection by a Modified RANSAC with Sampling Constraint from Boundary Curves' Clustering. 611-623 - Youzheng Wu, Hideki Kashioka, Satoshi Nakamura:
An Unsupervised Model of Redundancy for Answer Validation. 624-634 - Hyeon Gyu Kim, Woo-Lam Kang, Myoung-Ho Kim:
Efficient Window Processing over Disordered Data Streams. 635-638 - Daekeun Moon, Jinho Park, Hagbae Kim:
An Autonomic Connection Scheme for High Service Availability. 639-642 - Youbean Kim, Jaewon Jang, Hyunwook Son, Sungho Kang:
Pattern Mapping Method for Low Power BIST Based on Transition Freezing Method. 643-646 - Suk-Bong Kwon, Hoirin Kim:
Utterance Verification Using State-Level Log-Likelihood Ratio with Frame and State Selection. 647-650 - Maciej Kretkowski, Ryszard Jablonski, Yoshifumi Shimodaira:
Development of an XYZ Digital Camera with Embedded Color Calibration System for Accurate Color Acquisition. 651-653 - Jung Ah Park, Doug Young Suh, Gwang Hoon Park:
Distributed Video Coding with Multiple Side Information Sets. 654-657 - Guan Pang, Guijin Wang, Xinggang Lin:
Real-Time Human Detection Using Hierarchical HOG Matrices. 658-661 - Fan Jiang, Guijin Wang, Chang Liu, Xinggang Lin, Weiguo Wu:
Robust Object Tracking via Combining Observation Models. 662-665 - Ken-ichi Sakaue, Youji Iiguni:
Moment Invariants of the Weighted Image. 666-670
Volume 93-D, Number 4, April 2010
- Atsushi Ohnishi:
Foreword. 677-678 - Noboru Hattori, Shuichiro Yamamoto, Tsuneo Ajisaka, Tsuyoshi Kitani:
Proposal for Requirement Validation Criteria and Method Based on Actor Interaction. 679-692 - Atsushi Ohnishi, Koji Kitamoto:
A Generation Method of Alternative Scenarios with a Normal Scenario. 693-701 - Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato, Akira Osada, Kenji Kaijiri:
Improving Reliability of Spectrum Analysis for Software Quality Requirements Using TCM. 702-712 - Takehiko Murakawa, Masaru Nakagawa:
Graphical Expression of SQL Statements Using Clamshell Diagram. 713-720 - Junko Shirogane, Takashi Mori, Hajime Iwata, Yoshiaki Fukazawa:
Accessibility Evaluation for GUI Software Using Source Programs and Its Evaluation. 721-732 - Teruyoshi Zenmyo, Takashi Kobayashi, Motoshi Saeki:
Deriving Framework Usages Based on Behavioral Models. 733-744 - Shouzo Hori, Takako Nakatani, Keiichi Katamine, Naoyasu Ubayashi, Masaaki Hashimoto:
Project Management Patterns to Prevent Schedule Delay Caused by Requirement Elicitation. 745-753 - Shinpei Hayashi, Yasuyuki Tsuda, Motoshi Saeki:
Search-Based Refactoring Detection from Source Code Revisions. 754-762 - Masao Okabe, Akiko Yoshioka, Keido Kobayashi, Takahira Yamaguchi:
Organizational Knowledge Transfer Using Ontologies and a Rule-Based System. 763-773 - Sameera Abar, Tetsuo Kinoshita:
A Knowledge-Based Strategy for the Automated Support to Network Management Tasks. 774-788 - Ichiro Satoh:
Design and Implementation of Context-Aware Musuem Guide Agents. 789-799
- Shigeto Tajima, Nobuo Funabiki, Teruo Higashino:
A WDS Clustering Algorithm for Wireless Mesh Networks. 800-810 - Shuang Zhao, Wenqing Lu, Xiaofang Zhou, Dian Zhou, Gerald E. Sobelman:
Implementations of FFT and STBD for MIMO-OFDM on a Reconfigurable Baseband Platform. 811-821 - Hiroshi Igaki, Masahide Nakamura:
Modeling and Detecting Feature Interactions among Integrated Services of Home Network Systems. 822-833 - Yuna Kim, Wan Yeon Lee, Kyong Hoon Kim, Jong Kim:
AdaFF: Adaptive Failure-Handling Framework for Composite Web Services. 834-842 - Lihong Ma, Dong Yu, Gang Wei, Jing Tian, Hanqing Lu:
Adaptive Spread-Transform Dither Modulation Using a New Perceptual Model for Color Image Watermarking. 843-857 - Xianzhi Ye, Lei Jing, Mizuo Kansen, Junbo Wang, Kaoru Ota, Zixue Cheng:
A Support Method with Changeable Training Strategies Based on Mutual Adaptation between a Ubiquitous Pet and a Learner. 858-872 - Chung-Lin Wen, Bing-Yu Chen, Yoichi Sato:
Video Segmentation with Motion Smoothness. 873-881 - Ahmed Afifi, Toshiya Nakaguchi, Norimichi Tsumura, Yoichi Miyake:
A Model Optimization Approach to the Automatic Segmentation of Medical Images. 882-890 - Ken-ichi Suzuki, Yoshiyuki Kaeriyama, Kazuhiko Komatsu, Ryusuke Egawa, Nobuyuki Ohba, Hiroaki Kobayashi:
A Fast Ray-Tracing Using Bounding Spheres and Frustum Rays for Dynamic Scene Rendering. 891-902 - Ayako Nishimura, Minoru Sakairi, Daisuke Suzuki:
Increasing the Strength of Odors Produced by an Odor-Emitting Technology Using Odor Capsules. 903-908 - Ithipan Methasate, Thanaruk Theeramunkong:
A Family-Based Evolutional Approach for Kernel Tree Selection in SVMs. 909-921 - Yu Gwang Jin, Nam Soo Kim:
On Detecting Target Acoustic Signals Based on Non-negative Matrix Factorization. 922-925