default search action
IEICE Transactions on Information & Systems, Volume 105-D
Volume 105-D, Number 1, January 2022
- Shinpei Hayashi:
Foreword. 1 - Daniel Moritz Marutschke, Victor V. Kryssanov, Patricia Brockmann:
Balanced, Unbalances, and One-Sided Distributed Teams - An Empirical View on Global Software Engineering Education. 2-10 - Syful Islam, Dong Wang, Raula Gaikovina Kula, Takashi Ishio, Kenichi Matsumoto:
An Exploration of npm Package Co-Usage Examples from Stack Overflow: A Case Study. 11-18 - Bodin Chinthanet, Raula Gaikovina Kula, Rodrigo Eliza Zapata, Takashi Ishio, Kenichi Matsumoto, Akinori Ihara:
SōjiTantei: Function-Call Reachability Detection of Vulnerable Code for npm Packages. 19-20 - Yukasa Murakami, Masateru Tsunoda:
Replicated Study of Effectiveness Evaluation of Cutting-Edge Software Engineering. 21-25 - Jie Tan, Jianmin Pang, Cong Liu:
What Factors Affect the Performance of Software after Migration: A Case Study on Sunway TaihuLight Supercomputer. 26-30 - Keitaro Nakasai, Masateru Tsunoda, Kenichi Matsumoto:
Analyzing Web Search Strategy of Software Developers to Modify Source Codes. 31-36 - Masaki Kawamura:
Foreword. 37 - Kiyoharu Aizawa:
Movie Map for Virtual Exploration in a City. 38-45 - Tetsuya Kojima, Kento Akimoto:
A Visible Video Data Hiding Scheme Based on Fade-In and Fade-Out Effects Utilizing Barcodes. 46-53 - Rio Kurokawa, Kazuki Yamato, Madoka Hasegawa:
Near Hue-Preserving Reversible Contrast and Saturation Enhancement Using Histogram Shifting. 54-64 - Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen:
Effects of Image Processing Operations on Adversarial Noise and Their Use in Detecting and Correcting Adversarial Images. 65-77 - Isamu Hasegawa, Tomoyuki Yokogawa:
Formal Verification for Node-Based Visual Scripts Using Symbolic Model Checking. 78-91 - Kaiho Fukuchi, Hiroshi Yamada:
Leveraging Scale-Up Machines for Swift DBMS Replication on IaaS Platforms Using BalenaDB. 92-104 - Keigo Taga, Junjun Zheng, Koichi Mouri, Shoichi Saito, Eiji Takimoto:
Firewall Traversal Method by Pseudo-TCP Encapsulation. 105-115 - Akira Tanaka, Masanari Nakamura, Hideyuki Imai:
Kernel-Based Regressors Equivalent to Stochastic Affine Estimators. 116-122 - Isana Funahashi, Taichi Yoshida, Xi Zhang, Masahiro Iwahashi:
Image Adjustment for Multi-Exposure Images Based on Convolutional Neural Networks. 123-133 - Kenshiro Tamata, Tomohiro Mashita:
Feature Description with Feature Point Registration Error Using Local and Global Point Cloud Encoders. 134-140 - Kangbo Sun, Jie Zhu:
Searching and Learning Discriminative Regions for Fine-Grained Image Retrieval and Classification. 141-149 - Naohiro Tawara, Atsunori Ogawa, Tomoharu Iwata, Hiroto Ashikawa, Tetsunori Kobayashi, Tetsuji Ogawa:
Multi-Source Domain Generalization Using Domain Attributes for Recurrent Neural Network Language Models. 150-160 - Koji Kamma, Sarimu Inoue, Toshikazu Wada:
Pruning Ratio Optimization with Layer-Wise Pruning Method for Accelerating Convolutional Neural Networks. 161-169 - Hyun Kwon:
Multi-Model Selective Backdoor Attack with Different Trigger Positions. 170-174 - Zihao Song, Peng Song, Chao Sheng, Wenming Zheng, Wenjing Zhang, Shaokai Li:
A Novel Discriminative Virtual Label Regression Method for Unsupervised Feature Selection. 175-179 - Weiwei Luo, Wenpeng Zhou, Jinglong Fang, Lingyan Fan:
JPEG Image Steganalysis Using Weight Allocation from Block Evaluation. 180-183 - Wenjing Zhang, Peng Song, Wenming Zheng:
A Novel Transferable Sparse Regression Method for Cross-Database Facial Expression Recognition. 184-188 - Jiayi Li, Lin Yang, Junyan Yi, Haichuan Yang, Yuki Todo, Shangce Gao:
A Simple but Efficient Ranking-Based Differential Evolution. 189-192
Volume 105-D, Number 2, February 2022
- Guojun Wang, Yizhi Ren:
Foreword. 193-194 - Hao Wang, Zhe Liu, Chunpeng Ge, Kouichi Sakurai, Chunhua Su:
A Privacy-Preserving Data Feed Scheme for Smart Contracts. 195-204 - Naoya Okanami, Ryuya Nakamura, Takashi Nishide:
Load Balancing with In-Protocol/Wallet-Level Account Assignment in Sharded Blockchains. 205-214 - Tao Peng, Kejian Guan, Jierong Liu:
A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment. 215-226 - Shingo Fujimoto, Takuma Takeuchi, Yoshiki Higashikado:
Secure Blockchain Interworking Using Extended Smart Contract. 227-234 - Haoyang An, Jiageng Chen:
ExamChain: A Privacy-Preserving Onscreen Marking System Based on Consortium Blockchain. 235-247 - Takaki Asanuma, Takanori Isobe:
A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance. 248-255 - Zhuotao Lian, Weizheng Wang, Huakun Huang, Chunhua Su:
Layer-Based Communication-Efficient Federated Learning with Privacy Preservation. 256-263 - Tong Zhang, Yujue Wang, Yong Ding, Qianhong Wu, Hai Liang, Huiyong Wang:
Multi-Party Electronic Contract Signing Protocol Based on Blockchain. 264-271 - Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, Chunhua Su:
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. 272-279 - Yingxiao Xiang, Chao Li, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang:
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. 280-288 - Yizhi Ren, Zelong Li, Lifeng Yuan, Zhen Zhang, Chunhua Su, Yujuan Wang, Guohua Wu:
Semantic Shilling Attack against Heterogeneous Information Network Based Recommend Systems. 289-299 - Srinivas Koppu, Kumar K, Siva Rama Krishnan Somayaji, Iyapparaja Meenakshisundaram, Weizheng Wang, Chunhua Su:
Fusion of Blockchain, IoT and Artificial Intelligence - A Survey. 300-308 - Dhidhi Pambudi, Masaki Kawamura:
Novel Metaheuristic: Spy Algorithm. 309-319 - Yasutaka Matsuda, Ryota Shioya, Hideki Ando:
Reducing Energy Consumption of Wakeup Logic through Double-Stage Tag Comparison. 320-332 - Ryunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo:
Trail: An Architecture for Compact UTXO-Based Blockchain and Smart Contract. 333-343 - Meiming Fu, Qingyang Liu, Jiayi Liu, Xiang Wang, Hongyan Yang:
A Learning-Based Service Function Chain Early Fault Diagnosis Mechanism Based on In-Band Network Telemetry. 344-354 - Jianyong Duan, Liangcai Li, Mei Zhang, Hao Wang:
Hierarchical Preference Hash Network for News Recommendation. 355-363 - Hiroki Ishiguro, Takashi Ishida, Masashi Sugiyama:
Learning from Noisy Complementary Labels with Robust Loss Functions. 364-376 - Shuhei Yamamoto, Takeshi Kurashima, Hiroyuki Toda:
Classifying Near-Miss Traffic Incidents through Video, Sensor, and Object Features. 377-386 - Yuichiro Nomura, Takio Kurita:
Consistency Regularization on Clean Samples for Learning with Noisy Labels. 387-395 - Masayuki Hiromoto, Hisanao Akima, Teruo Ishihara, Takuji Yamamoto:
SimpleZSL: Extremely Simple and Fast Zero-Shot Learning with Nearest Neighbor Classifiers. 396-405 - Masayuki Miyama:
FPGA Implementation of 3-Bit Quantized Multi-Task CNN for Contour Detection and Disparity Estimation. 406-414 - Masashi Nishiyama, Michiko Inoue, Yoshio Iwai:
Gender Recognition Using a Gaze-Guided Self-Attention Mechanism Robust Against Background Bias in Training Samples. 415-426 - Young H. Oh, Yunho Jin, Tae Jun Ham, Jae W. Lee:
Layerweaver+: A QoS-Aware Layer-Wise DNN Scheduler for Multi-Tenant Neural Processing Units. 427-431 - Fei Wu, Xinhao Zheng, Ying Sun, Yang Gao, Xiao-Yuan Jing:
Joint Domain Adaption and Pseudo-Labeling for Cross-Project Defect Prediction. 432-435 - Kazuki Sato, Satoshi Nakata, Takashi Matsubara, Kuniaki Uehara:
Few-Shot Anomaly Detection Using Deep Generative Models for Grouped Data. 436-440 - Jie Zhu, Yuan Zong, Hongli Chang, Li Zhao, Chuangao Tang:
Joint Patch Weighting and Moment Matching for Unsupervised Domain Adaptation in Micro-Expression Recognition. 441-445 - Fairuz Safwan Mahad, Masakazu Iwamura, Koichi Kise:
Learning Pyramidal Feature Hierarchy for 3D Reconstruction. 446-449
Volume 105-D, Number 3, March 2022
- Masashi Kiyomi:
Foreword. 450 - Tatsuya Inoha, Kunihiko Sadakane, Yushi Uno, Yuma Yonebayashi:
Efficient Computation of Betweenness Centrality by Graph Decompositions and Their Applications to Real-World Networks. 451-458 - Tamami Okada, Ryuhei Uehara:
Research on Dissections of a Net of a Cube into Nets of Cubes. 459-465 - Taishu Ito, Yusuke Sano, Katsuhisa Yamanaka, Takashi Hirayama:
A Polynomial Delay Algorithm for Enumerating 2-Edge-Connected Induced Subgraphs. 466-473 - Hiroshi Fujiwara, Yuichi Shirai, Hiroaki Yamamoto:
The Huffman Tree Problem with Upper-Bounded Linear Functions. 474-480 - Tong Qin, Osamu Watanabe:
An Improvement of the Biased-PPSZ Algorithm for the 3SAT Problem. 481-490 - Yoshiaki Takahashi, Akira Ito:
Finite Automata with Colored Accepting States and Their Unmixedness Problems. 491-502 - Yasuaki Kobayashi, Shin-Ichi Nakano, Kei Uchizawa, Takeaki Uno, Yutaro Yamaguchi, Katsuhisa Yamanaka:
An O(n2)-Time Algorithm for Computing a Max-Min 3-Dispersion on a Point Set in Convex Position. 503-507 - Chuzo Iwamoto, Tatsuya Ide:
Five Cells and Tilepaint are NP-Complete. 508-516 - Tianfeng Feng, Leonie Ryvkin, Jérôme Urhausen, Giovanni Viglietta:
Complexity of Critter Crunch. 517-531 - Kwon Kham Sai, Giovanni Viglietta, Ryuhei Uehara:
Cyclic Shift Problems on Graphs. 532-540 - Jion Hirose, Junya Nakamura, Fukuhito Ooshita, Michiko Inoue:
Weakly Byzantine Gathering with a Strong Team. 541-555 - Masashi Komori:
Foreword. 556 - Yuta Suzumura, Jun-ichi Imai:
Effectiveness of "Neither-Good-Nor-Bad" Information on User's Trust in Agents in Presence of Numerous Options. 557-564 - Masatoshi Yamada, Masaki Ohata, Daisuke Kakoi:
A Study on Cognitive Transformation in the Process of Acquiring Movement Skills for Changing Running Direction. 565-577 - Takeshi Saga, Hiroki Tanaka, Hidemi Iwasaka, Satoshi Nakamura:
Multimodal Prediction of Social Responsiveness Score with BERT-Based Text Features. 578-586 - Shengzhou Yi, Junichiro Matsugami, Toshihiko Yamasaki:
Assessment System of Presentation Slide Design Using Visual and Structural Features. 587-596 - Ryota Eguchi, Naoki Kitamura, Taisuke Izumi:
Fast Neighborhood Rendezvous. 597-610 - Hiroki Nishimoto, Renyuan Zhang, Yasuhiko Nakashima:
GPGPU Implementation of Variational Bayesian Gaussian Mixture Models. 611-622 - Tianfeng Feng, Ryuhei Uehara, Giovanni Viglietta:
Bicolored Path Embedding Problems Inspired by Protein Folding Models. 623-633 - Naoki Kitamura, Taisuke Izumi:
A Subquadratic-Time Distributed Algorithm for Exact Maximum Matching. 634-645 - Esrat Farjana Rupu, Natthawut Kertkeidkachorn, Ryutaro Ichise:
Competent Triple Identification for Knowledge Graph Completion under the Open-World Assumption. 646-655 - Wenhao Fan, Dong Liu, Fan Wu, Bihua Tang, Yuan'an Liu:
Android Malware Detection Based on Functional Classification. 656-666 - Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide:
Latent Space Virtual Adversarial Training for Supervised and Semi-Supervised Learning. 667-678 - Ye Tian, Mei Han:
Adaptive Binarization for Vehicle State Images Based on Contrast Preserving Decolorization and Major Cluster Estimation. 679-688 - Yuki Monma, Kan Aro, Muneki Yasuda:
Hierarchical Gaussian Markov Random Field for Image Denoising. 689-699 - Yu Wang, Cong Cao, Jien Kato:
Discriminative Part CNN for Pedestrian Detection. 700-712 - Dichao Liu, Yu Wang, Kenji Mase, Jien Kato:
Recursive Multi-Scale Channel-Spatial Attention for Fine-Grained Image Classification. 713-726 - Eunsam Kim, Jinsung Kim, Hyoseop Shin:
Cooperative Recording to Increase Storage Efficiency in Networked Home Appliances. 727-731 - Masaki Takanashi, Shuichi Sato, Kentaro Indo, Nozomu Nishihara, Hiroki Hayashi, Toru Suzuki:
Anomaly Prediction for Wind Turbines Using an Autoencoder with Vibration Data Supported by Power-Curve Filtering. 732-735
Volume 105-D, Number 4, April 2022
- Jing Zhu, Song Huang, Yaqing Shi, Kaishun Wu, Yanqiu Wang:
A Method of K-Means Clustering Based on TF-IDF for Software Requirements Documents Written in Chinese Language. 736-754 - Yuma Masubuchi, Masaki Hashimoto, Akira Otsuka:
SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning. 755-765 - Jing Wang, Yiyu Luo, Weiming Yi, Xiang Xie:
Speaker-Independent Audio-Visual Speech Separation Based on Transformer in Multi-Talker Environments. 766-777 - Kazuhiko Murasaki, Shingo Ando, Jun Shimamura:
Semi-Supervised Representation Learning via Triplet Loss Based on Explicit Class Ratio of Unlabeled Data. 778-784 - Xiang Shen, Dezhi Han, Chin-Chen Chang, Liang Zong:
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering. 785-796 - Guoyi Miao, Yufeng Chen, Mingtong Liu, Jinan Xu, Yujie Zhang, Wenhe Feng:
Exploring Hypotactic Structure for Chinese-English Machine Translation with a Structure-Aware Encoder-Decoder Neural Model. 797-806 - Ying Zhang, Fandong Meng, Jinchao Zhang, Yufeng Chen, Jinan Xu, Jie Zhou:
MKGN: A Multi-Dimensional Knowledge Enhanced Graph Network for Multi-Hop Question and Answering. 807-819 - Saifeng Hou, Yuxiang Hu, Le Tian, Zhiguang Dang:
NFD.P4: NDN In-Networking Cache Implementation Scheme with P4. 820-823 - Jinho Choi, Taehwa Lee, Kwanwoo Kim, Minjae Seo, Jian Cui, Seungwon Shin:
Discovering Message Templates on Large Scale Bitcoin Abuse Reports Using a Two-Fold NLP-Based Clustering Method. 824-827 - Yuzhuo Liu, Hangting Chen, Qingwei Zhao, Pengyuan Zhang:
Master-Teacher-Student: A Weakly Labelled Semi-Supervised Framework for Audio Tagging and Sound Event Detection. 828-831 - Yaying Shen, Qun Li, Ding Xu, Ziyi Zhang, Rui Yang:
Triple Loss Based Framework for Generalized Zero-Shot Learning. 832-835
Volume 105-D, Number 5, May 2022
- Hiroyuki Nakagawa:
Foreword. 836 - Shinpei Hayashi, Keisuke Asano, Motoshi Saeki:
Automating Bad Smell Detection in Goal Refinement of Goal Models. 837-848 - Yotaro Seki, Shinpei Hayashi, Motoshi Saeki:
Cataloging Bad Smells in Use Case Descriptions and Automating Their Detection. 849-863 - Shiyao Ding, Donghui Lin:
Deep Coalitional Q-Learning for Dynamic Coalition Formation in Edge Computing. 864-872 - Rizal Setya Perdana, Yoshiteru Ishida:
Contextualized Language Generation on Visual-to-Language Storytelling. 873-886 - Shohei Yokoyama:
Foreword. 887 - Hideaki Ohashi, Toshiyuki Shimizu, Masatoshi Yoshikawa:
Does Student-Submission Allocation Affect Peer Assessment Accuracy? 888-897 - Tomohiro Yamazaki, Hisashi Koga:
Exact Algorithm to Solve Continuous Similarity Search for Evolving Queries and Its Variant. 898-908 - Yutaro Bessho, Yuto Hayamizu, Kazuo Goda, Masaru Kitsuregawa:
Dynamic Fault Tolerance for Multi-Node Query Processing. 909-919 - Da Li, Yuanyuan Wang, Rikuya Yamamoto, Yukiko Kawai, Kazutoshi Sumiya:
A Low-Cost High-Performance Semantic and Physical Distance Calculation Method Based on ZIP Code. 920-927 - Tomoya Hashiguchi, Takehiro Yamamoto, Sumio Fujita, Hiroaki Ohshima:
Toward Generating Robot-Robot Natural Counseling Dialogue. 928-935 - Shiyao Ding, Donghui Lin:
Multi-Agent Reinforcement Learning for Cooperative Task Offloading in Distributed Edge Cloud Computing. 936-945 - Kento Sugiura, Yoshiharu Ishikawa:
Implementation of a Multi-Word Compare-and-Swap Operation without Garbage Collection. 946-954 - Hiroshi Uehara, Yasuhiro Iuchi, Yusuke Fukazawa, Yoshihiro Kaneta:
Predicting A Growing Stage of Rice Plants Based on The Cropping Records over 25 Years - A Trial of Feature Engineering Incorporating Hidden Regional Characteristics -. 955-963 - Tongzhou Qu, Zibin Dai, Yanjiang Liu, Lin Chen, Xianzhao Xia:
A Performance Model for Reconfigurable Block Cipher Array Utilizing Amdahl's Law. 964-972 - Takashi Ishio, Naoto Maeda, Kensuke Shibuya, Kenho Iwamoto, Katsuro Inoue:
NCDSearch: Sliding Window-Based Code Clone Search Using Lempel-Ziv Jaccard Distance. 973-981 - Xudong Yang, Ling Gao, Yan Li, Jipeng Xu, Jie Zheng, Hai Wang, Quanli Gao:
A Semantic-Based Dual Location Privacy-Preserving Approach. 982-995 - Ruijun Ma, Stefan Holst, Xiaoqing Wen, Aibin Yan, Hui Xu:
Evaluation and Test of Production Defects in Hardened Latches. 996-1009 - Ryota Yoshimura, Ichiro Maruta, Kenji Fujimoto, Ken Sato, Yusuke Kobayashi:
Particle Filter Design Based on Reinforcement Learning and Its Application to Mobile Robot Localization. 1010-1023 - Fei Zhang, Peining Zhen, Dishan Jing, Xiaotang Tang, Hai-Bao Chen, Jie Yan:
SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature Selection. 1024-1038