Journal: IEICE Transactions

Volume 95-D, Issue 6

1565 -- 1576Adnan, Mitsuhisa Sato. Dynamic Multiple Work Stealing Strategy for Flexible Load Balancing
1577 -- 1589Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic. A New Cloud Architecture of Virtual Trusted Platform Modules
1590 -- 1602Akihiro Inokuchi, Takashi Washio. FRISSMiner: Mining Frequent Graph Sequence Patterns Induced by Vertices
1603 -- 1609Latsamy Saysourinhong, Bilan Zhu, Masaki Nakagawa. Online Handwritten Lao Character Recognition by MRF
1610 -- 1618Shang Cai, Yeming Xiao, Jielin Pan, QingWei Zhao, YongHong Yan. Noise Robust Feature Scheme for Automatic Speech Recognition Based on Auditory Perceptual Mechanisms
1619 -- 1627Yasuhiro Ohkawa, Kazuhiro Fukui. Hand-Shape Recognition Using the Distributions of Multi-Viewpoint Image Sets
1628 -- 1635Jong-Min Lee, Whoi-Yul Kim. A New Shape Description Method Using Angular Radial Transform
1636 -- 1645Yuanqi Su, Yuehu Liu, Xiao Huang. Circle Detection Based on Voting for Maximum Compatibility
1646 -- 1655Jianfeng Xu, Koichi Takagi, Shigeyuki Sakazawa. Efficient Generation of Dancing Animation Synchronizing with Music Based on Meta Motion Graphs
1656 -- 1667Takashi Nagamatsu, Yukina Iwamoto, Ryuichi Sugano, Junzo Kamahara, Naoki Tanaka, Michiya Yamamoto. Gaze Estimation Method Involving Corneal Reflection-Based Modeling of the Eye as a General Surface of Revolution about the Optical Axis of the Eye
1668 -- 1675Chooi-Ling Goh, Taro Watanabe, Eiichiro Sumita. Japanese Argument Reordering Based on Dependency Structure for Statistical Machine Translation
1676 -- 1679Young-Sik Eom, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon. Throttling Capacity Sharing Using Life Time and Reuse Time Prediction in Private L2 Caches of Chip Multiprocessors
1680 -- 1683Guangchun Luo, Ying Ma, Ke Qin. Active Learning for Software Defect Prediction
1684 -- 1686Eun-Jun Yoon, Kee-Young Yoo. On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
1687 -- 1689Eun-Jun Yoon, Kee-Young Yoo. Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
1690 -- 1693Ying Sun, Yong Yu, Yi Mu. Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
1694 -- 1697Mingfu Xue, Aiqun Hu, Chunlong He. Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy
1698 -- 1701Lili Pan, Mei Xie, Ling Mao. Iris Image Blur Detection with Multiple Kernel Learning
1702 -- 1706Lin-bo Luo, Jong-Wha Chong. A Low-Cost Imaging Method to Avoid Hand Shake Blur for Cell Phone Cameras
1707 -- 1712Cagatay Karabat, Hakan Erdogan. Error-Correcting Output Codes Guided Quantization for Biometric Hashing
1713 -- 1716Shigang Li. Edge Point Grouping for Line Detection