Journal: IEICE Transactions

Volume 93-D, Issue 5

941 -- 0Hiroyuki Seki. Foreword
942 -- 952Haruhiko Sato, Masahito Kurihara. Multi-Context Rewriting Induction with Termination Checkers
953 -- 962Keita Uchiyama, Masahiko Sakai, Toshiki Sakabe. Decidability of Termination and Innermost Termination for Term Rewriting Systems with Right-Shallow Dependency Pairs
963 -- 973Yuki Chiba, Takahito Aoto, Yoshihito Toyama. Program Transformation Templates for Tupling Based on Term Rewriting
974 -- 984Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi. Towards Reliable E-Government Systems with the OTS/CafeOBJ Method
985 -- 993Chul-Joo Kim, Jeong-Han Yun, Seonggun Kim, Kwang-Moo Choe, Taisook Han. Over-Approximated Control Flow Graph Construction on Pure Esterel
994 -- 1005Takeshi Nagaoka, Kozo Okano, Shinji Kusumoto. An Abstraction Refinement Technique for Timed Automata Based on Counterexample-Guided Abstraction Refinement Loop
1006 -- 1017Satoshi Hattori. Computer Algebra System as Test Generation System
1018 -- 1019Hiroaki Kikuchi. Foreword
1020 -- 1030Yang Ou, Kyung Hyune Rhee. A Survey on Image Hashing for Image Authentication
1031 -- 1043Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai. Analysis of Existing Privacy-Preserving Protocols in Domain Name System
1044 -- 1052Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao. Time-Bound Hierarchical Key Assignment: An Overview
1053 -- 1061Sunghyun Kim, Heejo Lee. Abnormal Policy Detection and Correction Using Overlapping Transition
1062 -- 1069Masana Murase. Eliminating Cell Broadband Engine:::TM::: DMA Buffer Overflows
1070 -- 1079Chao Huang, Jianling Sun, Xinyu Wang, Di Wu. Inconsistency Resolution Method for RBAC Based Interoperation
1080 -- 1086Kazumasa Omote, Kazuhiko Kato. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
1087 -- 1095Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro. Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
1096 -- 1105Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
1106 -- 1116Masashi Eto, Kotaro Sonoda, Daisuke Inoue, Katsunari Yoshioka, Koji Nakao. Fine-Grain Feature Extraction from Malware s Scan Behavior Based on Spectrum Analysis
1117 -- 1126Chun-Liang Lee, Chia-Tai Chan, Pi-Chung Wang. Packet Classification with Hierarchical Cross-Producting
1127 -- 1136Md. Rakib Hassan, Md. Monirul Islam, Kazuyuki Murase. A New Local Search Based Ant Colony Optimization Algorithm for Solving Combinatorial Optimization Problems
1137 -- 1146In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh. NVFAT: A FAT-Compatible File System with NVRAM Write Cache for Its Metadata
1147 -- 1153Yong-Hee Kim, Myoung-Jo Jung, Cheol-Hoon Lee. Energy-Aware Real-Time Task Scheduling Exploiting Temporal Locality
1154 -- 1161Ing-Xiang Chen, Chien-Hung Li, Cheng-Zen Yang. Mining Co-location Relationships among Bug Reports to Localize Fault-Prone Modules
1162 -- 1174Yu Zhang, Binxing Fang, Hao Luo. Identifying High-Rate Flows Based on Sequential Sampling
1175 -- 1185Jianliang Gao, Yinhe Han, Xiaowei Li. A Novel Post-Silicon Debug Mechanism Based on Suspect Window
1186 -- 1196Hirotoshi Iwasaki, Nobuhiro Mizuno, Kousuke Hara, Yoichi Motomura. User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks
1197 -- 1204Keita Imada, Katsuhiko Nakamura. Search for Minimal and Semi-Minimal Rule Sets in Incremental Learning of Context-Free and Definite Clause Grammars
1205 -- 1213Yizhong Xin, Xiangshi Ren. An Investigation of Adaptive Pen Pressure Discretization Method Based on Personal Pen Pressure Use Profile
1214 -- 1224Jinyong Jo, JongWon Kim. imCast: Studio-Quality Digital Media Platform Exploiting Broadband IP Networks
1225 -- 1237Bing-Fei Wu, Hao-Yu Huang, Yen-Lin Chen, Hsin-Yuan Peng, Jia-Hsiung Huang. MPEG-2/4 Low-Complexity Advanced Audio Coding Optimization and Implementation on DSP
1238 -- 1243Fu-Kun Chen, Kuo-Bao Kuo. Complexity Scalability Design in the Internet Low Bit Rate Codec (iLBC) for Speech Coding
1244 -- 1252Makoto Sakai, Norihide Kitaoka, Kazuya Takeda. Acoustic Feature Transformation Based on Discriminant Analysis Preserving Local Structure for Speech Recognition
1253 -- 1262Keita Hirai, Jambal Tumurtogoo, Ayano Kikuchi, Norimichi Tsumura, Toshiya Nakaguchi, Yoichi Miyake. Video Quality Assessment Using Spatio-Velocity Contrast Sensitivity Function
1263 -- 1271Zhu Li, Kenichi Yabuta, Hitoshi Kitazawa. Exclusive Block Matching for Moving Object Extraction and Tracking
1272 -- 1281Takanobu Oba, Takaaki Hori, Atsushi Nakamura. Improved Sequential Dependency Analysis Integrating Labeling-Based Sentence Boundary Detection
1282 -- 1290Xia Mao, Zheng Li. Generating and Describing Affective Eye Behaviors
1291 -- 1293Kazuto Oshima. A Simple Procedure for Classical Signal-Processing in Cluster-State Quantum Computation
1294 -- 1296Kai-Jie Zheng, Ji-Gen Peng, Ke-Xue Li. A New Model for Graph Matching and Its Algorithm
1297 -- 1300Zhan Gao, Siwei Luo. A QoS-Enabled Double Auction Protocol for the Service Grid
1301 -- 1302Mohamed Rasslan, Amr Youssef. Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
1303 -- 1306Dae Hyun Yum, Jae Woo Seo, Kookrae Cho, Pil Joong Lee. Generalized Hash Chain Traversal with Selective Output
1307 -- 1308Kuo-Chen Hung, Yu-Wen Wou, Peterson Julian. Discussion on A Fuzzy Method for Medical Diagnosis of Headache
1309 -- 1312Jae-woong Jeong, Young-Cheol Park, Dae Hee Youn, Seok-Pil Lee. A Robust Room Inverse Filtering Algorithm for Speech Dereverberation Based on a Kurtosis Maximization
1313 -- 1316Suk Tae Seo, In Keun Lee, Hye Cheun Jeong, Soon Hak Kwon. Gaussian Kernel-Based Multi-Histogram Equalization
1317 -- 1320Quan Miao, Guijin Wang, Xinggang Lin. Kernel Based Image Registration Incorporating with Both Feature and Intensity Matching
1321 -- 1324Chang Liu, Guijin Wang, Fan Jiang, Xinggang Lin. Online HOG Method in Pedestrian Tracking