


default search action
Journal of Information Processing, Volume 26
Volume 26, January 2018
- Sadao Obana:

Editor's Message to Special Issue on Intelligent Transportation Systems and Mobile Communication toward Super Smart Society. 1 - Katsuya Matsumoto, Susumu Ishihara

:
Data Uploading Control Method Based on Exchange of Metadata in VANET for On-demand Onboard Camera Picture Sharing System. 2-10 - Le Tien Trien, Koichi Adachi, Yasushi Yamao:

Efficient CSMA/CA Packet Relay-Assisted Scheme with Payload Combining for ITS V2V Communication. 11-19 - Nurul Ain Binti Adnan, Shigeru Yamashita

:
Logical Qubit Layout Problem for ICM Representation. 20-28 - Takahiko Kato, Masaki Bandai

:
Avoiding Excessive Rate Reduction in Rate Based Congestion Control for Named Data Networking. 29-37 - Hiroshi Yamada, Kazuya Murao

, Tsutomu Terada, Masahiko Tsukamoto:
A Method for Determining the Moment of Touching a Card Using Wrist-worn Sensor in Competitive Karuta. 38-47 - Izumi Asakura, Hidehiko Masuhara, Takuya Matsumoto, Kiminori Matsuzaki:

Identification and Elimination of the Overhead of Accelerate with a Super-resolution Application. 48-53 - Akira Tanaka, Reynald Affeldt

, Jacques Garrigue:
Safe Low-level Code Generation in Coq Using Monomorphization and Monadification. 54-72 - Tatsuki Sekino:

Editor's Message to Special Issue of Computer and Humanities. 73 - Takeshi Miura, Takaaki Kaiga, Takeshi Shibata, Madoka Uemura, Katsubumi Tajima, Hideo Tamamoto:

Development of a Visualization Method for Motion-characteristic Distribution of Japanese Folk Dances - A Case Study of the Bon Odori Dance. 74-84 - Yuuichi Teranishi:

Editor's Message to Special issue on Network Services and Distributed Processing. 85-86 - Hiroyuki Tanaka, Masahiro Yoshida, Koya Mori, Noriyuki Takahashi:

Multi-access Edge Computing: A Survey. 87-97 - Babatunde Ojetunde

, Naoki Shibata
, Juntao Gao:
Monitoring-Based Method for Securing Link State Routing against Byzantine Attacks in Wireless Networks. 98-110 - Arif Herusetyo Wicaksono, Kazuhide Aikoh:

Identifier-first Multi-datacenter Synchronization for In-Memory State Management. 111-115 - Kiyotaka Kaji, Takuya Yoshihiro:

Building Detour Paths to Avoid Local Congestion in MANETs. 116-123 - Yuria Oigawa, Fumiaki Sato:

Improvement in IntErzone Routing Protocol of ZRP Based on Bloom Filter. 124-131 - Ushio Yamamoto:

GLGR: Grid Landmark-based Geographic Routing for Ad-hoc Wireless Networks. 132-139 - Akihiro Fujimoto, Yukari Masui, Takuya Yoshihiro:

Scheduling Beacon Transmission to Improve Delay for Receiver-initiated-MAC Based Wireless Sensor Networks. 140-147 - Jun Liu, Kensuke Fukuda:

An Evaluation of Darknet Traffic Taxonomy. 148-157 - Ei Khaing Win, Tomoki Yoshihisa, Yoshimasa Ishi, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo

:
A Lost Data Recovery Scheme for Sensor Data Stream Multicasting. 158-168 - Tomoo Inoue:

Editor's Message to Special Issue of Advances in Collaboration Technologies. 169 - Stephen J. H. Yang

, Owen H. T. Lu
, Anna Y. Q. Huang, Jeff C. H. Huang, Hiroaki Ogata, Albert J. Q. Lin:
Predicting Students' Academic Performance Using Multiple Linear Regression and Principal Component Analysis. 170-176 - Bektur Ryskeldiev, Michael Cohen

, Jens Herder:
StreamSpace: Pervasive Mixed Reality Telepresence for Remote Collaboration on Mobile Devices. 177-185 - Jesús Omar Álvarez Márquez, Jürgen Ziegler:

Negotiation and Reconciliation of Preferences in a Group Recommender System. 186-200 - Eiichi Hayakawa:

Editor's Message to Special Issue of Embedded Systems Engineering. 201 - Hiroyuki Chishiro:

Multiprocessor Semi-fixed-priority Scheduling. 202-211 - Bo Sun, Xiapu Luo

, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
:
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store. 212-223 - Hayato Yamana

:
Editor's Message to Special Issue of Young Researchers' Papers. 224 - Yixiao Li

, Yutaka Matsubara
, Hiroaki Takada
:
A Comparative Analysis of RTOS and Linux Scalability on an Embedded Many-core Processor. 225-236 - Jiachao Zhang, Shinji Fukuma, Shin-ichiro Mori:

Silk Road: A Framework for Distributed Collaborative Simulation. 237-246 - Isakwisa Gaddy Tende, Shin-Ichiro Kubota, Hisaaki Yamaba, Kentaro Aburada, Naonobu Okazaki:

Evaluation of Farmers Market Information System to Connect with Some Social Stakeholders. 247-256 - Shotaro Usuzaki, Yuki Arikawa, Hisaaki Yamaba, Kentaro Aburada, Shin-Ichiro Kubota, Mirang Park, Naonobu Okazaki:

A Proposal of Highly Responsive Distributed Denial-of-Service Attacks Detection Using Real-Time Burst Detection Method. 257-266 - Yo Ehara, Issei Sato, Hidekazu Oiwa, Hiroshi Nakagawa:

Mining Words in the Minds of Second Language Learners for Learner-specific Word Difficulty. 267-275 - Tatsunori Hirai, Hironori Doi, Shigeo Morishima

:
Latent Topic Similarity for Music Retrieval and Its Application to a System that Supports DJ Performance. 276-284 - Marimo Kumaki, Yoshinari Takegawa, Keiji Hirata:

Design and Implementation of a Positioning Learning Support System for Violin Beginners, Using True, Vague and False Information. 285-293 - Mari Ito, Masatake Hirao, Hiroki Hamahara:

A Support System for Nursery Staff Shift Scheduling - A Case Study at a Nursery School. 294-300 - Jiachao Zhang, Shin-ichiro Mori, Shinji Tomita:

Evaluation of Three Quads Using Matrix Transpose. 301-305 - Takuya Kuwahara, Yukino Baba, Hisashi Kashima, Takeshi Kishikawa, Jun'ichi Tsurumi, Tomoyuki Haga, Yoshihiro Ujiie, Takamitsu Sasaki, Hideki Matsushima:

Supervised and Unsupervised Intrusion Detection Based on CAN Message Frequencies for In-vehicle Network. 306-313 - Kosuke Matsumoto, Tomoharu Ugawa, Tatsuya Abe

:
Improvement of a Library for Model Checking under Weakly Ordered Memory Model with SPIN. 314-326 - Wei Zhang, Shigeru Chiba:

Call-trail Dependent Inline Caching for a Scoping Mechanism of Class Extensions. 327-334 - Yuta Sugimoto, Atusi Maeda:

Implementation of C Library for Constructing Packrat Parser with Statically Allocated Memory. 335-344 - Kô Sakai, Yutaka Sato:

A Method for Constructing a Gray Map for a Group Based on Its Semidirect-product Structure. 345-349 - Keisuke Furumoto, Masakatu Morii:

Recognition Accuracy Improvement of Obfuscated QR Code by Using Reliability Information and GMD Decoding. 350-357 - Chuzo Iwamoto, Tatsuaki Ibusuki:

Dosun-Fuwari is NP-complete. 358-361 - Toshiyuki Hagiya, Toshiharu Horiuchi

, Tomonori Yazaki, Tatsuya Kawahara
:
Typing Tutor: Individualized Tutoring in Text Entry for Older Adults Based on Statistical Input Stumble Detection. 362-374 - Hidemi Fukada:

Editor's Message to Special Issue of Information Systems. 375 - Syunji Yazaki, Hideaki Tsuchiya, Hiroaki Ishihata:

Development of a Web-based Front-end Environment to Aid Programming Lectures on Unix-like Systems. 376-385 - Taku Itoh, Yusuke Fukazawa, Dandan Zhu, Jun Ota

:
Modeling Weather Context Dependent Food Choice Process. 386-395 - Naoki Kudo, Toshihiro Yamauchi

, Thomas H. Austin
:
Access Control Mechanism to Mitigate Cordova Plugin Attacks in Hybrid Applications. 396-405 - Raj Dabre, Fabien Cromierès, Sadao Kurohashi:

Exploiting Multilingual Corpora Simply and Efficiently in Neural Machine Translation. 406-415 - Masafumi Oyamada, Jianquan Liu, Shinji Ito, Kazuyo Narita, Takuya Araki, Hiroyuki Kitagawa

:
Compressed Vector Set: A Fast and Space-Efficient Data Mining Framework. 416-426 - Suppanut Pothirattanachaikul, Takehiro Yamamoto, Sumio Fujita, Akira Tajima, Katsumi Tanaka, Masatoshi Yoshikawa:

Mining Alternative Actions from Community Q&A Corpus. 427-438 - Takashi Isozaki, Satoshi Hasegawa, Hajime Anada:

MAX-MIN Ant System with Memory Considering New Solution Importance. 439-444 - Keita Doi, Ryota Shioya, Hideki Ando:

Performance Improvement Techniques in Tightly Coupled Multicore Architectures for Single-Thread Applications. 445-460 - Yoshihiro Oyama:

Investigation of the Diverse Sleep Behavior of Malware. 461-476 - Ryo Nojima, Hidenobu Oguri, Hiroaki Kikuchi, Hiroshi Nakagawa, Koki Hamada, Takao Murakami, Yuji Yamaoka, Chiemi Watanabe:

How to Handle Excessively Anonymized Datasets. 477-485 - Masato Hashimoto, Qiangfu Zhao:

A Privacy Preserving Protocol for Cloud-Based Implementation of Aware Agents. 486-496 - Yoshitatsu Matsuda, Takayuki Sekiya, Kazunori Yamaguchi

:
Curriculum Analysis of Computer Science Departments by Simplified, Supervised LDA. 497-508 - Ryusuke Mori, Masato Oguchi, Saneyasu Yamaguchi:

Promotion Condition Optimization based on Application Features in Generational GC of Android Application Runtime. 509-517 - Shintaro Oishi, Yoshihiro Shirakawa, Masatsugu Ichino, Hiroshi Yoshiura:

Personal Identification by Integrating a Number of Features from Iris and Periocular Region Using AdaBoost. 518-528 - Chenhui Chu, Raj Dabre, Sadao Kurohashi:

A Comprehensive Empirical Comparison of Domain Adaptation Methods for Neural Machine Translation. 529-538 - Hironori Nakajo:

Editor's Message to Special Issue on Embedded Systems Engineering. 539 - Zhongqi Ma, Ryo Kurachi, Gang Zeng, Hiroaki Takada:

Further Analysis with Linear Programming on Blocking Time Bounds for Partitioned Fixed Priority Multiprocessor Scheduling. 540-548 - Takuro Yamamoto, Takuma Hara, Takuya Ishikawa, Hiroshi Oyama, Hiroaki Takada, Takuya Azumi:

Component-Based mruby Platform for IoT Devices. 549-561 - Renzhi Wang, Mizuho Iwaihara:

Estimating Reference Scopes of Wikipedia Article Inner-links. 562-570 - Michiharu Takemoto:

Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2017. 571 - Fevzi Belli, Nevin Güler Dincer, Michael Linschulte, Tugkan Tuglular

:
Model-based Selective Layer-centric Testing. 572-589 - Shuji Sannomiya, Akira Sato, Kenichi Yoshida, Hiroaki Nishikawa:

Abnormal Traffic Detection Circuit with Real-time Cardinality Counter. 590-600 - Kenji Fujikawa, Ved P. Kafle

, Pedro Martinez-Julia
, Abu Hena Al Muktadir, Hiroaki Harai:
Automatic Construction of Name-Bound Virtual Networks for IoT and its Management. 601-611 - Ei Khaing Win, Tomoki Yoshihisa, Yoshimasa Ishi, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo

:
Lightweight and Secure Certificateless Multi-receiver Encryption based on ECC. 612-624 - Tomoka Azakami, Chihiro Shibata, Ryuya Uda:

Evaluation of Ergonomically Designed CAPTCHAs using Deep Learning Technology. 625-636 - Isao Echizen:

Editor's Message to Special Issue of Computer Security Technologies for a Super Smart Society. 637 - Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga

, Hiroki Matsui, Hideki Hashimoto
, Chun-I Fan:
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets. 638-647 - Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Fumio Omatsu, Rina Shimizu, Ye Wang:

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data. 648-661 - Chun-Jung Wu, Ying Tie, Satoshi Hara, Kazuki Tamiya, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto:

IoTProtect: Highly Deployable Whitelist-based Protection for Low-cost Internet-of-Things Devices. 662-672 - Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, Jun Miyoshi:

Stealth Loader: Trace-free Program Loading for Analysis Evasion. 673-686 - Yuichi Taguchi, Tsutomu Yoshinaga:

Assessment and Simulation of System Performance of a Cloud-based Data-protection System. 687-695 - Junji Yamada

, Ushio Jimbo, Ryota Shioya, Masahiro Goshima, Shuichi Sakai
:
Bank-Aware Instruction Scheduler for a Multibanked Register File. 696-705 - Tsutomu Terada:

Editor's Message to Special Issue of Ubiquitous Computing Systems (VII). 706 - Tatsuya Ishihara, Kris M. Kitani, Chieko Asakawa, Michitaka Hirose:

Deep Learning and Geometry-based Image Localization Enhanced by Bluetooth Signals. 707-717 - Yu Enokibori, Kenji Mase:

Data Augmentation to Build High Performance DNN for In-bed Posture Classification. 718-727 - Ren Ohmura, Kodai Yamamoto:

Practical Feedback Method for Mobile CPR Support Systems Considering Noise and User's Attention. 728-735 - Toru Kobayashi, Taishi Miyazaki, Rinsuke Uchida, Hiroe Tanaka, Kenichi Arai:

Social Media Agency Robot for Elderly People. 736-746 - Shu Kaneko, Eiichiro Chishiro:

Query Conversion for Aggregate Operations in Distributed SPARQL Query Processing Using Summary Information. 747-754 - Art Subpa-Asa, Ying Fu, Yinqiang Zheng

, Toshiyuki Amano, Imari Sato:
Separating the Direct and Global Components of a Single Image. 755-767 - Zhaohao Zeng, Cheng Luo, Lifeng Shang, Hang Li, Tetsuya Sakai:

Towards Automatic Evaluation of Customer-Helpdesk Dialogues. 768-778 - Akitoshi Okumura, Takamichi Hoshino, Susumu Handa, Eiko Yamada, Masahiro Tabuchi:

Identity Verification for Attendees of Large-scale Events Using Face Recognition of Selfies Taken with Smartphone Cameras. 779-788 - Kouichi Mouri:

Editor's Message to Special Issue of Toward Realizing Trusted Infrastructure by Security Technology and Human Resources for It. 789 - Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto:

Toward Collaborative Defense Across Organizations. 790-803 - Mamoru Mimura

, Hidema Tanaka:
Leaving All Proxy Server Logs to Paragraph Vector. 804-812 - Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi:

Taint-assisted IAT Reconstruction against Position Obfuscation. 813-824

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














