1 | -- | 0 | Akinori Ito. Foreword |
2 | -- | 12 | Isao Echizen, Tateo Ogane. BiometricJammer: Method to Prevent Acquisition of Biometric Information by Surreptitious Photography on Fingerprints |
13 | -- | 19 | Kenta Iida, Hitoshi Kiya. Robust Image Identification without Visible Information for JPEG Images |
20 | -- | 27 | Hong Yang, Linbo Qing, Xiaohai He, Shuhua Xiong. Scalable Distributed Video Coding for Wireless Video Sensor Networks |
28 | -- | 36 | Huyen T. T. Tran, Cuong T. Pham, Nam Pham Ngoc, Anh T. Pham, Truong Cong Thang. A Study on Quality Metrics for 360 Video Communications |
37 | -- | 44 | Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya. On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks |
45 | -- | 52 | So Higashikawa, Tomoaki Kosugi, Shogo Kitajima, Masahiro Mambo. Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern Lock |
53 | -- | 63 | Ryouichi Nishimura, Seigo Enomoto, Hiroaki Kato. Speech Privacy for Sound Surveillance Using Super-Resolution Based on Maximum Likelihood and Bayesian Linear Regression |
64 | -- | 67 | Jin S. Seo. A Local Feature Aggregation Method for Music Retrieval |
68 | -- | 71 | Harumi Murata, Akio Ogihara, Shigetoshi Hayashi. Tolerance Evaluation of Audio Watermarking Method Based on Modification of Sound Pressure Level between Channels |
72 | -- | 0 | Takahiro Kawamura. Foreword |
73 | -- | 81 | Masatoshi Suzuki, Koji Matsuda, Satoshi Sekine, Naoaki Okazaki, Kentaro Inui. A Joint Neural Model for Fine-Grained Named Entity Classification of Wikipedia Articles |
82 | -- | 89 | Thanyalak Rattanasawad, Marut Buranarach, Kanda Runapongsa Saikaew, Thepchai Supnithi. A Comparative Study of Rule-Based Inference Engines for the Semantic Web |
90 | -- | 98 | Natthawut Kertkeidkachorn, Ryutaro Ichise. An Automatic Knowledge Graph Creation Framework from Natural Language Text |
99 | -- | 107 | Semih Yumusak, Erdogan Dogdu, Halife Kodaz. Classification of Linked Data Sources Using Semantic Scoring |
108 | -- | 115 | Kattiuscia Bitencourt, Frederico Araujo Durão, Manoel G. Mendonça, Lassion Laique Bomfim de Souza Santana. An Ontological Model for Fire Emergency Situations |
116 | -- | 129 | Shusaku Egami, Takahiro Kawamura, Akihiko Ohsuga. Temporal and Spatial Expansion of Urban LOD for Solving Illegally Parked Bicycles in Tokyo |
130 | -- | 141 | Reishi Yokomori, Norihiro Yoshida, Masami Noro, Katsuro Inoue. Changes of Evaluation Values on Component Rank Model by Taking Code Clones into Consideration |
142 | -- | 151 | Yuki Yamagishi, Kazuo Aoyama, Kazumi Saito, Tetsuo Ikeda. Pivot Generation Algorithm with a Complete Binary Tree for Efficient Exact Similarity Search |
152 | -- | 170 | Tomohiro Yoshihara, Dai Kobayashi, Haruo Yokota. Concurrency Control Protocol for Parallel B-Tree Structures That Improves the Efficiency of Request Transfers and SMOs within a Node |
171 | -- | 180 | Daisuke Yamamoto, Masaki Murase, Naohisa Takahashi. Fisheye Map Using Stroke-Based Generalization for Web Map Services |
181 | -- | 192 | Sheng Hu, Chuan Xiao, Yoshiharu Ishikawa. An Efficient Algorithm for Location-Aware Query Autocompletion |
193 | -- | 204 | Xueting Wang, Kensho Hara, Yu Enokibori, Takatsugu Hirayama, Kenji Mase. Personal Viewpoint Navigation Based on Object Trajectory Distribution for Multi-View Videos |
205 | -- | 214 | Michael Heck, Sakriani Sakti, Satoshi Nakamura 0001. Learning Supervised Feature Transformations on Zero Resources for Improved Acoustic Unit Discovery |
215 | -- | 224 | Yuqiang Cao, Weiguo Gong, Bo Zhang, Fanxin Zeng, Sen Bai. Optimal Permutation Based Block Compressed Sensing for Image Compression Applications |
225 | -- | 233 | Wenpeng Lu, Hao Wu, Ping Jian, Yonggang Huang, Heyan Huang. An Empirical Study of Classifier Combination Based Word Sense Disambiguation |
234 | -- | 238 | Yi Gao, Jianxin Luo, HangPing Qiu, Bin Tang, Bo Wu, Weiwei Duan. A GPU-Based Rasterization Algorithm for Boolean Operations on Polygons |
239 | -- | 243 | Young-Kyoon Suh. SEDONA: A Novel Protocol for Identifying Infrequent, Long-Running Daemons on a Linux System |
244 | -- | 248 | Sang-Chul Lee, Sang-Wook Kim, Sunju Park, Dong-Kyu Chae. An Approach to Effective Recommendation Considering User Preference and Diversity Simultaneously |
249 | -- | 252 | Seungkwang Lee. A White-Box Cryptographic Implementation for Protecting against Power Analysis |
253 | -- | 256 | Seon-Ho Shin, HyunBong Kim, MyungKeun Yoon. q-Grams |
257 | -- | 260 | Jun Wang, Guoqing Wang, Zaiyu Pan. Gender Attribute Mining with Hand-Dorsa Vein Image Based on Unsupervised Sparse Feature Learning |
261 | -- | 264 | Li Wang, Xiaoan Tang, Junda Zhang, Dongdong Guan. Statistical Property Guided Feature Extraction for Volume Data |
265 | -- | 268 | Ruisheng Ran, Bin Fang, Xue Gang Wu, Shougui Zhang. A Simple and Effective Generalization of Exponential Matrix Discriminant Analysis and Its Application to Face Recognition |
269 | -- | 272 | Seong-Hyeon Shin, Woo-Jin Jang, Ho-Won Yun, Hochong Park. Encoding Detection and Bit Rate Classification of AMR-Coded Speech Based on Deep Neural Network |
273 | -- | 276 | Nuo Xu, Chunlei Huo. Learning Deep Relationship for Object Detection |