default search action
IEICE Transactions on Information & Systems, Volume 98-D
Volume 98-D, Number 1, January 2015
- Isao Echizen:
Foreword. 1 - Noboru Babaguchi, Yuta Nakashima:
Protection and Utilization of Privacy Information via Sensing. 2-9 - Koichi Kise, Shinichiro Omachi, Seiichi Uchida, Masakazu Iwamura, Marcus Liwicki:
Data Embedding into Characters. 10-20 - Toshihiro Sakano, Yosuke Kobayashi, Kazuhiro Kondo:
A Speech Intelligibility Estimation Method Using a Non-reference Feature Set. 21-28 - Shengbei Wang, Masashi Unoki:
Speech Watermarking Method Based on Formant Tuning. 29-37 - Masashi Unoki, Ryota Miyauchi:
Robust, Blindly-Detectable, and Semi-Reversible Technique of Audio Watermarking Based on Cochlear Delay Characteristics. 38-48 - Kenji Ozawa, Shota Tsukahara, Yuichiro Kinoshita, Masanori Morise:
Instantaneous Evaluation of the Sense of Presence in Audio-Visual Content. 49-57 - Maki Yoshida, Kazuya Ohkita, Toru Fujiwara:
Individual Restoration of Tampered Pixels for Statistical Fragile Watermarking. 58-64 - Dong Wang, Hiroyuki Mitsuhara, Masami Shishibori:
Nearest Neighbor Search with the Revised TLAESA. 65-77 - Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen:
Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information. 78-88 - Harumi Murata, Akio Ogihara, Masaki Uesaka:
Sound Quality Evaluation for Audio Watermarking Based on Phase Shift Keying Using BCH Code. 89-94 - Sangwook Lee, Ji Eun Song, Wan Yeon Lee, Young Woong Ko, Heejo Lee:
Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations. 95-97 - Shigeyuki Komuro, Shigeru Kuriyama, Takao Jinno:
Mimetic Code Using Successive Additive Color Mixture. 98-102
- Sung Kwon Kim:
Algorithm for the Length-Constrained Maximum-Density Path Problem in a Tree with Uniform Edge Lengths. 103-107 - Kazuyuki Amano, Atsushi Saito:
A Satisfiability Algorithm for Some Class of Dense Depth Two Threshold Circuits. 108-118 - Yu Kashima, Takashi Ishio, Katsuro Inoue:
Comparison of Backward Slicing Techniques for Java. 119-130 - Jie Ren, Ling Gao, Hai Wang, Yan Chen:
A Method of Power Aware Large Data Download on Smartphone. 131-139 - Jing Xun, Ke-Ping Li, Yuan Cao:
An Optimization Approach for Real-Time Headway Control of Railway Traffic. 140-147 - Xiaoyun Wang, Jinsong Zhang, Masafumi Nishida, Seiichi Yamamoto:
Phoneme Set Design for Speech Recognition of English by Japanese. 148-156 - Yusuke Ijima, Hideyuki Mizuno:
Similar Speaker Selection Technique Based on Distance Metric Learning Using Highly Correlated Acoustic Features with Perceptual Voice Quality Similarity. 157-165 - Do Hang Nga, Keiji Yanai:
VisualTextualRank: An Extension of VisualRank to Large-Scale Video Shot Extraction Exploiting Tag Co-occurrence. 166-172 - Ho-Gun Ha, Dae-Chul Kim, Wang-Jun Kyung, Yeong-Ho Ha:
Color Improvement Based on Local Color Transfer in Digital Intermediate of Digital Cinema. 173-179 - Lu Tian, Shengjin Wang:
Person Re-Identification as Image Retrieval Using Bag of Ensemble Colors. 180-188 - Hong Wang, Yue-Hua Li, Ben-Qing Wang:
High-Order Bi-orthogonal Fourier Transform and Its Applications in Non-stability Signal Analysis. 189-192 - Sang Hyuck Bae, DoYoung Jung, CheolSe Kim, KyoungMoon Lim, Yong-Surk Lee:
Real-Time Touch Controller with High-Speed Touch Accelerator for Large-Sized Touch Screens. 193-196 - Hyunki Lim, Jae-Sung Lee, Dae-Won Kim:
Multi-Label Learning Using Mathematical Programming. 197-200 - Yinhui Zhang, Zifen He, Changyu Liu:
Robust Segmentation of Highly Dynamic Scene with Missing Data. 201-205 - Tomohiro Takahashi, Kazunori Uruma, Katsumi Konishi, Toshihiro Furukawa:
Block Adaptive Algorithm for Signal Declipping Based on Null Space Alternating Optimization. 206-209 - Hanhoon Park, Kwang-Seok Moon:
Fast Feature Matching by Coarse-to-Fine Comparison of Rearranged SURF Descriptors. 210-213 - Takuya Takasu, Yoshiki Kumagai, Gosuke Ohashi:
Object Extraction Using an Edge-Based Feature for Query-by-Sketch Image Retrieval. 214-217
Volume 98-D, Number 2, February 2015
- Tetsuo Hironaka:
Foreword. 219 - Kei Kinoshita, Yoshiki Yamaguchi, Daisuke Takano, Tomoyuki Okamura, Tetsuhiko Yao:
Energy Efficiency Improvement by Dynamic Reconfiguration for Embedded Systems. 220-229 - Yu Peng, Shouyi Yin, Leibo Liu, Shaojun Wei:
Battery-Aware Loop Nests Mapping for CGRAs. 230-242 - Bing Xu, Shouyi Yin, Leibo Liu, Shaojun Wei:
Low-Power Loop Parallelization onto CGRA Utilizing Variable Dual VDD. 243-251 - Motoki Amagasaki, Qian Zhao, Masahiro Iida, Morihiro Kuga, Toshinori Sueyoshi:
Fault-Tolerant FPGA: Architectures and Design for Programmable Logic Intellectual Property Core in SoC. 252-261 - Hiroki Nakahara, Tsutomu Sasao, Munehiro Matsuura, Hisashi Iwamoto, Yasuhiro Terao:
A Memory-Based IPv6 Lookup Architecture Using Parallel Index Generation Units. 262-271 - Hao Xiao, Ning Wu, Fen Ge, Guanyu Zhu, Lei Zhou:
Distributed Synchronization for Message-Passing Based Embedded Multiprocessors. 272-275 - Rui Shi, Shouyi Yin, Leibo Liu, Qiongbing Liu, Shuang Liang, Shaojun Wei:
The Implementation of Texture-Based Video Up-Scaling on Coarse-Grained Reconfigurable Architecture. 276-287 - Stewart Denholm, Hiroaki Inoue, Takashi Takenaka, Tobias Becker, Wayne Luk:
Network-Level FPGA Acceleration of Low Latency Market Data Feed Arbitration. 288-297 - Keisuke Dohi, Koji Okina, Rie Soejima, Yuichiro Shibata, Kiyoshi Oguri:
Performance Modeling of Stencil Computing on a Stream-Based FPGA Accelerator for Efficient Design Space Exploration. 298-308 - Hitoshi Ukawa, Tetsu Narumi:
Acceleration of the Fast Multipole Method on FPGA Devices. 309-312
- Jiang Li, Yusuke Atsumari, Hiromasa Kubo, Yuichi Ogishima, Satoru Yokota, Hakaru Tamukoh, Masatoshi Sekine:
A Multidimensional Configurable Processor Array - Vocalise. 313-324 - Eunjong Choi, Norihiro Yoshida, Yoshiki Higo, Katsuro Inoue:
Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files. 325-333 - Xi Chang, Zhuo Zhang, Yan Lei, Jianjun Zhao:
Biped: Bidirectional Prediction of Order Violations. 334-345 - Yusheng Li, Meina Song, Haihong E:
Recommender System Using Implicit Social Information. 346-354 - Nagayoshi Yamashita, Masayuki Numao, Ryutaro Ichise:
Predicting Research Trends Identified by Research Histories via Breakthrough Researches. 355-362 - Zhuo Jiang, Junhao Wen, Jun Zeng, Yihao Zhang, Xibin Wang, Sachio Hirokawa:
Dynamic Macro-Based Heuristic Planning through Action Relationship Analysis. 363-371 - Dongkyu Jeon, Wooju Kim:
Random Forest Algorithm for Linked Data Using a Parallel Processing Environment. 372-380 - Keiko Taguchi, Andrew M. Finch, Seiichi Yamamoto, Eiichiro Sumita:
Automatic Induction of Romanization Systems from Bilingual Corpora. 381-393 - Jigisha N. Patel, Jerin Jose, Suprava Patnaik:
Application of Content Specific Dictionaries in Still Image Coding. 394-403 - Xiaoxiong Xing, Yoshinori Dobashi, Tsuyoshi Yamamoto, Yosuke Katsura, Ken Anjyo:
Efficient Hair Rendering under Dynamic, Low-Frequency Environmental Light Using Spherical Harmonics. 404-411 - Haoyan Guo, Changyong Guo, Yuanzhi Cheng, Shinichi Tamura:
A Novel Method for Boundary Detection and Thickness Measurement of Two Adjacent Thin Structures from 3-D MR Images. 412-428 - Chuzo Iwamoto, Yuta Matsui:
Computational Complexity of Generalized Forty Thieves. 429-432 - Chen Chen, Kai Lu, Xiaoping Wang, Xu Zhou, Zhendong Wu:
A Load-Balanced Deterministic Runtime for Pipeline Parallelism. 433-436 - Keehang Kwon, Kyunghwan Park, Mi-Young Park:
Towards Interactive Object-Oriented Programming. 437-438 - Ki-Seong Lee, Chan-Gun Lee:
Comparative Analysis of Modularity Metrics for Evaluating Evolutionary Software. 439-443 - Woo-Lam Kang, Hyeon Gyu Kim, Yoon-Joon Lee:
Reducing I/O Cost in OLAP Query Processing with MapReduce. 444-447 - Cheng Zhang, Yuzhang Gu, Zhengmin Zhang, Yunlong Zhan:
Multi-Orientation Log-Gabor Local Binary Pattern for Face Representation and Recognition. 448-452 - Javad Rahimipour Anaraki, Mahdi Eftekhari, Chang Wook Ahn:
Novel Improvements on the Fuzzy-Rough QuickReduct Algorithm. 453-456 - Lifeng He, Bin Yao, Xiao Zhao, Yun Yang, Yuyan Chao, Atsushi Ohta:
A Graph-Theory-Based Algorithm for Euler Number Computing. 457-461 - Jiangfeng Yang, Zheng Ma:
Action Recognition Using Weighted Locality-Constrained Linear Coding. 462-466 - Mengmeng Zhang, Yang Zhang, Huihui Bai:
Fast CU Splitting in HEVC Intra Coding for Screen Content Coding. 467-470 - Shujuan Gao, Insuk Kim, Seong Tae Jhang:
Infrared Target Tracking Using Naïve-Bayes-Nearest-Neighbor. 471-474 - Inseong Hwang, Seungwoo Jeon, Beobkeun Cho, Yoonsik Choe:
Efficient Cloth Pattern Recognition Using Random Ferns. 475-478 - Jungwon Kang, Myung Jin Chung:
Fast Online Motion Segmentation through Multi-Temporal Interval Motion Analysis. 479-484
Volume 98-D, Number 3, March 2015
- Yushi Uno:
Foreword. 485 - Kazuyuki Amano, Kyaw May Oo, Yota Otachi, Ryuhei Uehara:
Secure Sets and Defensive Alliances in Graphs: A Faster Algorithm and Improved Bounds. 486-489 - Taisuke Izumi, Daisuke Suzuki:
Faster Enumeration of All Maximal Cliques in Unit Disk Graphs Using Geometric Structure. 490-496 - Hideaki Otsuki, Tomio Hirata:
The Biclique Cover Problem and the Modified Galois Lattice. 497-502 - Masataka Ikeda, Hiroshi Nagamochi:
Some Reduction Procedure for Computing Pathwidth of Undirected Graphs. 503-511 - Kazuki Miyahara, Kenji Hashimoto, Hiroyuki Seki:
Node Query Preservation for Deterministic Linear Top-Down Tree Transducers. 512-523 - Kenya Ueno:
Candidate Boolean Functions towards Super-Quadratic Formula Size. 524-531 - Akinori Kawachi, Ikko Yamane:
A Fourier-Analytic Approach to List-Decoding for Sparse Random Linear Codes. 532-540 - Chuzo Iwamoto:
Computational Complexity of Generalized Golf Solitaire. 541-544
- Yusheng Ji:
Foreword. 545 - Shigeo Urushidani, Shunji Abe, Kenjiro Yamanaka, Kento Aida, Shigetoshi Yokoyama, Hiroshi Yamada, Motonori Nakamura, Kensuke Fukuda, Michihiro Koibuchi, Shigeki Yamada:
New Directions for a Japanese Academic Backbone Network. 546-556 - Hiroshi Shimizu, Hitoshi Asaeda, Masahiro Jibiki, Nozomu Nishinaga:
Local Tree Hunting: Finding Closest Contents from In-Network Cache. 557-564 - Satoshi Imai, Kenji Leibnitz, Masayuki Murata:
Adaptive TTL Control to Minimize Resource Cost in Hierarchical Caching Networks. 565-577
- Masafumi Kinoshita, Osamu Takada, Izumi Mizutani, Takafumi Koike, Kenji Leibnitz, Masayuki Murata:
Improved Resilience through Extended KVS-Based Messaging System. 578-587
- Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies. 588-595 - Manyi Wang, Zhonglei Wang, Enjie Ding, Yun Yang:
Dual-Band Sensor Network for Accurate Device-Free Localization in Indoor Environment with WiFi Interference. 596-606
- Yuichi Sudo, Toshimitsu Masuzawa, Gen Motoyoshi, Tutomu Murase:
Pseudo Polynomial Time Algorithms for Optimal Longcut Route Selection. 607-616 - Chunyan Hou, Chen Chen, Jinsong Wang, Kai Shi:
A Scenario-Based Reliability Analysis Approach for Component-Based Software. 617-626 - Yuki Kashiwabara, Takashi Ishio, Hideaki Hata, Katsuro Inoue:
Method Verb Recommendation Using Association Rule Mining in a Set of Existing Projects. 627-636 - Yoon-Ho Choi, Han-You Jeong, Seung-Woo Seo:
A Quantitative Model for Evaluating the Efficiency of Proactive and Reactive Security Countermeasures. 637-648 - Chae Chang Lee, Ji Won Yoon:
A Novel Statistical Approach to Detect Card Frauds Using Transaction Patterns. 649-660 - Ahmed Shalaby, Ikki Fujiwara, Michihiro Koibuchi:
The Case for Network Coding for Collective Communication on HPC Interconnection Networks. 661-670 - Shinichi Shirakawa:
Multiple Binary Codes for Fast Approximate Similarity Search. 671-680 - Min Yao, Hiroshi Nagahashi:
Analysis of Noteworthy Issues in Illumination Processing for Face Recognition. 681-691 - Sukritta Paripurana, Werapon Chiracharit, Kosin Chamnongthai, Hideo Saito:
Extraction of Blood Vessels in Retinal Images Using Resampling High-Order Background Estimation. 692-703 - Yuko Ozasa, Mikio Nakano, Yasuo Ariki, Naoto Iwahashi:
Discriminating Unknown Objects from Known Objects Using Image and Speech Information. 704-711 - Ki-Seong Lee, Byung-Woo Hong, Youngmin Kim, Jaeyeop Ahn, Chan-Gun Lee:
Split-Jaccard Distance of Hierarchical Decompositions for Software Architecture. 712-716 - Meixu Song, Jielin Pan, Qingwei Zhao, Yonghong Yan:
Discriminative Pronunciation Modeling Using the MPE Criterion. 717-720 - Hanhoon Park:
Making Joint-Histogram-Based Weighted Median Filter Much Faster. 721-725 - Pei-Chen Wu, Chang-Hong Lin:
A Uniformity-Approximated Histogram Equalization Algorithm for Image Enhancement. 726-727 - Hanhoon Park:
No-Reference Blur Strength Estimation Based on Spectral Analysis of Blurred Images. 728-732 - Deokmin Haam, Hyeon Gyu Kim, Myoung-Ho Kim:
An Efficient Filtering Method for Scalable Face Image Retrieval. 733-736 - Jong-Seung Park, Seung-Ho Lee:
Automatic Mura Detection for Display Film Using Mask Filtering in Wavelet Transform. 737-740 - Sungchul Jung, Chang Ha Lee:
Displacement Mapping with an Augmented Patch Mesh. 741-744 - Xingri Quan, Jongwon Seok, Keunsung Bae:
Detection of S1/S2 Components with Extraction of Murmurs from Phonocardiogram. 745-748
Volume 98-D, Number 4, April 2015
- Naoto Sone:
Foreword. 749 - Hung-Yu Chien, Tzong-Chen Wu, Chien-Lung Hsu:
RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model. 750-759 - Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga:
A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection. 760-768 - Yuling Liu, Xinxin Qu, Guojiang Xin, Peng Liu:
ROI-Based Reversible Data Hiding Scheme for Medical Images with Tamper Detection. 769-774 - Mitsuaki Akiyama, Takeshi Yagi, Youki Kadobayashi, Takeo Hariu, Suguru Yamaguchi:
Client Honeypot Multiplication with High Performance and Precise Detection. 775-787 - Masashi Eto, Tomohide Tanaka, Koei Suzuki, Mio Suzuki, Daisuke Inoue, Koji Nakao:
GHOST Sensor: A Proactive Cyber Attack Monitoring Platform. 788-795 - Da Xiao, Lvyin Yang, Chuanyi Liu, Bin Sun, Shihui Zheng:
Efficient Data Possession Auditing for Real-World Cloud Storage Environments. 796-806 - Jing Yu, Toshihiro Yamauchi:
Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS. 807-811
- Dafei Huang, Changqing Xun, Nan Wu, Mei Wen, Chunyuan Zhang, Xing Cai, Qianming Yang:
Enabling a Uniform OpenCL Device View for Heterogeneous Platforms. 812-823 - Asahi Takaoka, Satoshi Tayu, Shuichi Ueno:
OBDD Representation of Intersection Graphs. 824-834 - Yonghwan Kim, Tadashi Araragi, Junya Nakamura, Toshimitsu Masuzawa:
A Distributed and Cooperative NameNode Cluster for a Highly-Available Hadoop Distributed File System. 835-851 - Ryosuke Tsuchiya, Hironori Washizaki, Yoshiaki Fukazawa, Tadahisa Kato, Masumi Kawakami, Kentaro Yoshimura:
Recovering Traceability Links between Requirements and Source Code Using the Configuration Management Log. 852-862 - Jaehoon Kim:
Authorization Conflict Problems in Combining RIF Rules with RDF Data. 863-871 - Asami Higai, Atsuko Takefusa, Hidemoto Nakada, Masato Oguchi:
A Study of Effective Replica Reconstruction Schemes for the Hadoop Distributed File System. 872-882 - Ryoichi Isawa, Daisuke Inoue, Koji Nakao:
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking. 883-893 - Wei-Chi Ku, Yu-Chang Yeh, Bo-Ren Cheng, Chia-Ju Chang:
A Sector-Based Graphical Password Scheme with Resistance to Login-Recording Attacks. 894-901 - Tinghuai Ma, Jinjuan Zhou, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Sungyoung Lee:
Social Network and Tag Sources Based Augmenting Collaborative Recommender System. 902-910 - Jihyun Lee, Sungwon Kang:
Techniques for Measuring Business Process Based on Business Values. 911-921 - Tetsuya Watanabe, Toshimitsu Yamaguchi, Kazunori Minatani:
Advantages and Drawbacks of Smartphones and Tablets for Visually Impaired People - - Analysis of ICT User Survey Results - -. 922-929 - Kosei Kurisu, Nobuo Suematsu, Kazunori Iwata, Akira Hayashi:
A Spatially Correlated Mixture Model for Image Segmentation. 930-937