


default search action
Journal of Information Processing, Volume 23
Volume 23, Number 1, January 2015
- Takeshi Ito:

Editor's Message to Special Issue on Game Programming. 1 - Tung Duc Nguyen, Kien Quang Nguyen, Ruck Thawonmas

:
Heuristic Search Exploiting Non-additive and Unit Properties for RTS-game Unit Micromanagement. 2-8 - Akira Ura, Yoshimasa Tsuruoka

, Takashi Chikayama:
Dynamic Prediction of Minimal Trees in Large-Scale Parallel Game Tree Search. 9-19
- Noriaki Saito:

Editor's Message to Special Issue on Collaboration Technologies and Network Services that Concentrate Wisdom toward Future Society. 20-21 - Yu Suzuki:

Quality Assessment of Wikipedia Articles Using h-index. 22-30 - Nor Athiyah Abdullah

, Dai Nishioka, Yuko Tanaka, Yuko Murayama:
User's Action and Decision Making of Retweet Messages towards Reducing Misinformation Spread during Disaster. 31-40
- Aurélio Akira Mello Matsui, Hitoshi Aida:

A DSL for Contract-centric Compatibility Assessment in Distributed Services. 41-57 - Yoji Yamato, Yukihisa Nishizawa, Masahito Muroi, Kentaro Tanaka:

Development of resource management server for production IaaS services based on OpenStack. 58-66 - Masaharu Fukase, Kenji Kashiwabara:

An Accelerated Algorithm for Solving SVP Based on Statistical Analysis. 67-80 - Kentaroh Toyoda

, Iwao Sasase:
Unsupervised Clustering-based SPITters Detection Scheme. 81-92
Volume 23, Number 2, March 2015
- Sadao Obana:

Editor's Message to Special Issue on Network Services and Distributed Processing. 93 - Takamasa Higuchi, Hirozumi Yamaguchi

, Teruo Higashino:
Mobile Devices as an Infrastructure: A Survey of Opportunistic Sensing Technology. 94-104 - Ryohei Banno

, Susumu Takeuchi, Michiharu Takemoto, Tetsuo Kawano, Takashi Kambayashi, Masato Matsuo:
Designing Overlay Networks for Handling Exhaust Data in a Distributed Topic-based Pub/Sub Architecture. 105-116
- Masato Edahiro:

Editor's Message to Special Issue on Embedded Systems Engineering. 117 - Surachai Thongkaew, Tsuyoshi Isshiki, Dongju Li, Hiroaki Kunieda:

Dalvik Bytecode Acceleration Using Fetch/Decode Hardware Extension. 118-130
- Takeshi Sakurada:

Editor's Message to Special Issue on Information Security or Operation Technology in the Age of Virtualization. 131 - Yoshihiro Oyama, Yudai Kawasaki, Kazushi Takahashi:

Checkpointing an Operating System Using a Parapass-through Hypervisor. 132-141
- Yasuo Okabe:

Editor's Message to Special Issue of "Students' and Young Researchers' Papers". 142 - Eric Shun Fukuda, Hiroaki Inoue, Takashi Takenaka, Dahoo Kim, Tsunaki Sadahisa, Tetsuya Asai

, Masato Motomura
:
Enhancing Memcached by Caching Its Data and Functionalities at Network Interface. 143-152 - Takaaki Miyajima, David B. Thomas, Hideharu Amano:

A Toolchain for Dynamic Function Off-load on CPU-FPGA Platforms. 153-162 - Aye Thida Hlaing, Tin Nilar Win, Htoo Htoo, Yutaka Ohsawa:

RkNN Query on Road Network Distances. 163-170 - Kohei Matsushita, Hiroyasu Hamada:

A Fast Computation of 3 × 3 Matrix Exponentials and its Application in CG. 171-175 - Rafik Hadfi

, Takayuki Ito
:
Low-Complexity Exploration in Utility Hypergraphs. 176-184 - Veluchamy Glory, Domnic Sandanam

:
Compressing Inverted Index Using Optimal FastPFOR. 185-191 - Shaymaa E. Sorour

, Tsunenori Mine, Kazumasa Goda, Sachio Hirokawa:
A Predictive Model to Evaluate Student Performance. 192-201
- Minseon Lee, Shuichi Miyazaki, Kazuo Iwama:

Finding Witnesses for Stability in the Hospitals/Residents Problem. 202-209 - Kaoru Katayama, Ernest Weke Maina:

Indexing Method for Hierarchical Graphs based on Relation among Interlacing Sequences of Eigenvalues. 210-220 - Hiromichi Kanaoka, Takuya Yoshihiro:

Combining Local Channel Selection with Routing Metrics in Multi-channel Wireless Mesh Networks. 221-228 - Hiroshi Kobayashi, Kaoru Sano, Osamu Moriya:

Performance Evaluation of Synchronous Variable-multiple Collision Avoidance Systems. 229-237
Volume 23, Number 3, May 2015
- Hiro Ito:

Editor's Message for Special Issue on Recreational Discrete Mathematics. 238 - Aaron B. Adcock, Erik D. Demaine, Martin L. Demaine, Michael P. O'Brien, Felix Reidl

, Fernando Sánchez Villaamil, Blair D. Sullivan
:
Zig-Zag Numberlink is NP-Complete. 239-245 - Jin Akiyama, Hyunwoo Seong:

Pentadral Complices. 246-251 - Kazuyuki Amano, Shin-Ichi Nakano, Koichi Yamazaki

:
Anti-Slide. 252-257 - Sebastian Böcker

:
Ten Times Eighteen. 258-264 - Jean Cardinal, Sébastien Collette, Hiro Ito, Matias Korman, Stefan Langerman

, Hikaru Sakaidani, Perouz Taslakian:
Cannibal Animal Games: a new variant of Tic-Tac-Toe. 265-271 - Emily Rita Berger, Alexander Dubbs:

Winning Strategies in Multimove Chess (i, j). 272-275 - Kazuya Haraguchi, Hirotaka Ono

:
How Simple Algorithms Can Solve Latin Square Completion-Type Puzzles Approximately. 276-283 - Michael Lampis, Valia Mitsou, Karolina Soltys:

Scrabble is PSPACE-Complete. 284-292 - Erik D. Demaine, Fermi Ma, Matthew Susskind, Erik Waingarten

:
You Should Be Scared of German Ghost. 293-298 - Yoshifumi Manabe, Risako Otsuka, Tatsuaki Okamoto:

A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus. 299-304 - Yasuhiko Takenaga, Narutoshi Tanaka, Takahiro Habara:

Number of Three-point Tilings with Triangle Tiles. 305-309 - Akihiro Uejima, Hiroaki Suzuki:

Fillmat is NP-Complete and ASP-Complete. 310-316
- Michinori Hatayama

:
Editor's Message to Special Issue on Information Systems for Creation of a New Society. 317 - Akio Ida, Shigeo Kaneda:

Applying Multidimensional Scaling for Responsibility Distribution between Objects - - Linking Conceptual Activity Model and Class Diagram. 318-326 - Maike Erdmann, Tomoya Takeyoshi, Kazushi Ikeda, Gen Hattori, Chihiro Ono, Yasuhiro Takishima

:
Assigning Keywords to Automatically Extracted Personal Cliques from Social Networks. 327-334
- Oyuntungalag Chagnaadorj, Jiro Tanaka:

Accumulative Secure Group Association in an Ad-hoc and Ubiquitous Network (Version 3.0). 335-343 - Juan Luo, Yves Lepage:

Extraction of Potentially Useful Phrase Pairs for Statistical Machine Translation. 344-352 - Hiroki Mizumoto, Nobutaka Suzuki:

An XSLT Transformation Method for Distributed XML. 353-365 - Akihiro Ida, Takeshi Iwashita, Makiko Ohtani

, Kazuro Hirahara
:
Improvement of Hierarchical Matrices with Adaptive Cross Approximation for Large-scale Simulation. 366-372
- Nuttapoom Amornpashara, Yutaka Arakawa

, Morihiko Tamai, Keiichi Yasumoto
:
Phorec: Context-Aware Photography Support System Based on Social Data Analysis. 373-380
Volume 23, Number 4, July 2015
- Nariyoshi Yamai

:
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2014. 381 - Michael Wisely, Sahra Sedigh Sarvestani

, Ali R. Hurson
:
Public Data Dissemination via Broadcasting. 382-391 - Marwa Elsayed

, Mohammad Zulkernine:
A Classification of Intrusion Detection Systems in the Cloud. 392-401 - Sho Tsugawa, Hiroyuki Ohsaki:

Community Structure and Interaction Locality in Social Networks. 402-410 - Shinobu Saito

, Jun Hagiwara, Tomoki Yagasaki, Katsuyuki Natsukawa:
ReVAMP: Requirements Validation Approach using Models and Prototyping - Practical Cases of Requirements Engineering in End-User Computing. 411-419 - Hiroshi Yamamoto, Shigehiro Ano, Katsuyuki Yamazaki:

Modeling of Dynamic Latency Variations Using Auto-Regressive Model and Markov Regime Switching for Mobile Network Access on Trains. 420-429 - Hiroshi Yamamoto, Tatsuya Takahashi, Norihiro Fukumoto, Shigehiro Ano, Katsuyuki Yamazaki:

Development and Evaluation of Congestion Detection System Using Complex Event Processing for Mobile Networks. 430-440 - Yong Jin, Nariyoshi Yamai

, Kiyohiko Okayama, Motonori Nakamura:
Design and Implementation of Optimal Route Selection Mechanism for Outbound Connections on IPv6 Multihoming Environment. 441-448 - Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai

, Tokumi Yokohira:
Strict Application Execution Control with Hierarchical Group Management Using Digital Certificates on Educational Windows PCs. 449-457 - Ikuo Nakagawa, Masahiro Hiji

, Hiroshi Esaki:
Dripcast - Architecture and Implementation of Server-less Java Programming Framework for Billions of IoT Devices. 458-464 - Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:

Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms. 465-475 - Yuichi Sei

, Akihiko Ohsuga:
Malicious Node Detection in Mobile Wireless Sensor Networks. 476-487
- Weihua Sun, Naoki Shibata

, Masahiro Kenmotsu, Keiichi Yasumoto
, Minoru Ito:
A Method for Navigating Cars in Multilevel Parking Facility. 488-496 - Yuya Kaneda, Yan Pei

, Qiangfu Zhao, Yong Liu:
Improving the Performance of the Decision Boundary Making Algorithm via Outlier Detection. 497-504
- Kimio Kuramitsu

:
Packrat Parsing with Elastic Sliding Window. 505-512 - Yusuke Takamatsu, Kenji Kono:

Detection of Visual Clickjacking Vulnerabilities in Incomplete Defenses. 513-524
- Masami Hagiya:

Defining Informatics across Bun-kei and Ri-kei. 525-530
Volume 23, Number 5, September 2015
- Masato Edahiro:

Editor's Message to Special Issue of Embedded Systems Engineering. 531 - Yuki Ando, Shinya Honda, Hiroaki Takada, Masato Edahiro:

System-level Design Method for Control Systems with Hardware-implemented Interrupt Handler. 532-541 - Kiyofumi Tanaka:

Real-Time Scheduling for Reducing Jitters of Periodic Tasks. 542-552
- Masahiro Mambo:

Editor's Message to Special issue of Computer Security Technologies to be Indispensable to the Society. 553 - Reihaneh Safavi-Naini, Pengwei Wang:

A Model for Adversarial Wiretap Channels and its Applications. 554-561 - Koji Tomida, Hiroshi Doi, Masami Mohri, Yoshiaki Shiraishi:

Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search. 562-569 - Kouya Tochikubo:

New Secret Sharing Schemes Realizing General Access Structures. 570-578 - Mitsuhiro Hatada, Mitsuaki Akiyama, Takahiro Matsuki, Takahiro Kasama:

Empowering Anti-malware Research in Japan by Sharing the MWS Datasets. 579-588 - Kale Timothy Girry, Satoshi Ohzahata, Celimuge Wu

, Toshihiko Kato:
Reducing Congestion in the Tor Network with Circuit Switching. 589-602 - Masatsugu Ichino, Kenji Kawamoto, Toru Iwano, Mitsuhiro Hatada, Hiroshi Yoshiura:

Evaluating Header Information Features for Malware Infection Detection. 603-612 - Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto:

METRO: Measurement of End-to-End Route Trust. 613-622 - Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto:

Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses. 623-632 - Hisao Sakazaki, Yasuko Fukuzawa:

Study on the Feasibility of Smart-Banknotes. 633-645 - Fei Feng, Kanta Matsuura

:
Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models. 646-654 - Mizuki Watanabe, Ryotaro Kobayashi, Masahiko Kato:

HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources. 655-663 - Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi

:
Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems. 664-672 - Masaya Sato, Toshihiro Yamauchi

, Hideo Taniguchi:
Process Hiding by Virtual Machine Monitor for Attack Avoidance. 673-682
- Marat Zhanikeev

:
DiffHub: An Efficient Cloud Sync Technology based on Binary Diffs. 683-692 - Masahide Kawai, Tomoyori Iwao, Akinobu Maejima, Shigeo Morishima

:
Automatic Generation of Photorealistic 3D Inner Mouth Animation only from Frontal Images. 693-703 - Takeshi Miura, Takaaki Kaiga, Katsubumi Tajima, Takeshi Shibata, Hideo Tamamoto:

Sensor Number Reduction in Skeleton Estimation from Magnetic Motion Capture Data. 704-707 - Toshiyuki Hagiya, Tsuneo Kato:

Probabilistic Touchscreen Text Entry Method Incorporating Gaze Point Information. 708-715 - Seiji Umatani, Tomoharu Ugawa, Masahiro Yasugi:

Design and Implementation of a Java Bytecode Manipulation Library for Clojure. 716-729 - Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa:

Relaxing Heavy Congestion by State Propagation. 730-743
Volume 23, Number 6, November 2015
- Tsunenori Mine:

Editor's Message to Special Issue on E-Service and Knowledge Management toward Smart Computing Society. 744 - Takanobu Otsuka, Yoshitaka Torii, Takayuki Ito

:
Anomaly Weather Information Detection Using Wireless Pressure-sensor Grid. 745-752 - Hisato Fujimagari, Katsuhide Fujita

:
Detecting Research Fronts Using Neural Network Model for Weighted Citation Network Analysis. 753-758 - Yuji Yamagata, Naoki Fukuta

:
An Approach to Dynamic Query Classification and Approximation on an Inference-enabled SPARQL Endpoint. 759-766 - Alexis Vallet, Hiroyasu Sakamoto:

A Multi-Label Convolutional Neural Network for Automatic Image Annotation. 767-775 - Kengo Yoshimizu, Noriko Takemura

, Yoshio Iwai
, Kosuke Sato:
Multi-sensor-based Ambient Sensing System for the Estimation of Comfort/Discomfort to Lighting Condition During Desk Work. 776-783 - Shaymaa E. Sorour

, Kazumasa Goda, Tsunenori Mine:
Evaluation of Effectiveness of Time-Series Comments by Using Machine Learning Techniques. 784-794 - Toru Kobayashi:

An Application Framework for Trend Surfing System based on Multi-aspect, Multi-screen and Multimodal User Interface. 795-803
- Xiao Cong, Tatsuya Akutsu

:
Matrix Network: A New Data Structure for Efficient Enumeration of Microstates of a Genetic Regulatory Network. 804-813 - Shotaro Sano, Takuma Otsuka, Katsutoshi Itoyama, Hiroshi G. Okuno

:
HMM-based Attacks on Google's ReCAPTCHA with Continuous Visual and Audio Symbols. 814-826 - Ryosuke Sato

, Kazuyuki Asada, Naoki Kobayashi
:
Refinement Type Checking via Assertion Checking. 827-834 - Wei Wei, Akihiro Nakamata, Yoshihiro Kawahara

, Tohru Asami:
Food Recognition via Monitoring Power Leakage from a Microwave Oven. 835-844

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














