Journal: IEICE Transactions

Volume 96-A, Issue 6

1023 -- 0Hisashi Koga. Foreword
1024 -- 1031Akiko Manada, Navin Kashyap. On the Zeta Function of a Periodic-Finite-Type Shift
1032 -- 1035Shin-Ichi Nakano, Katsuhisa Yamanaka. A Compact Encoding of Rectangular Drawings with Edge Lengths
1036 -- 1043Masaki Kawabata, Takao Nishizeki. Partitioning Trees with Supply, Demand and Edge-Capacity
1044 -- 1050Tetsuo Asano, Revant Kumar. A Small-Space Algorithm for Removing Small Connected Components from a Binary Image
1051 -- 1058Hirotoshi Honma, Yoko Nakajima, Haruka Aoshima, Shigeru Masuyama. A Linear-Time Algorithm for Constructing a Spanning Tree on Circular Trapezoid Graphs
1059 -- 1065Ro-Yu Wu, Jou-Ming Chang, An-Hang Chen, Ming-Tat Ko. Ranking and Unranking of Non-regular Trees in Gray-Code Order
1066 -- 1071Matsuo Konagaya, Tetsuo Asano. Reporting All Segment Intersections Using an Arbitrary Sized Work Space
1072 -- 1080Tomoko Izumi, Taisuke Izumi, Sayaka Kamei, Fukuhito Ooshita. Time-Optimal Gathering Algorithm of Mobile Robots with Local Weak Multiplicity Detection in Rings
1081 -- 1087Ryuichi Harasawa, Yutaka Sueyoshi, Aichi Kudo. Root Computation in Finite Fields
1088 -- 1099Atsushi Fujioka. Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique
1100 -- 1111Manh Ha Nguyen, Kenji Yasunaga, Keisuke Tanaka. Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
1112 -- 1123Kazuki Yoneyama. Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles
1124 -- 1138Kazuki Yoneyama. One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
1139 -- 1155Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama. id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
1156 -- 1168Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote. Methods for Restricting Message Space in Public-Key Encryption
1169 -- 1170Bennian Dou. On the Security of the Verifiably Encrypted Signature Scheme of Boneh, Gentry, Lynn and Shacham Revisited
1171 -- 1172Bennian Dou. Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes
1173 -- 0Qi-Wei Ge. Foreword
1174 -- 1184Wei Zhong, Song Chen, Bo Huang, Takeshi Yoshimura, Satoshi Goto. Floorplanning and Topology Synthesis for Application-Specific Network-on-Chips
1185 -- 1194Yongqing Huo, Fan Yang, Vincent Brost, Bo Gu. LDR Image to HDR Image Mapping with Overexposure Preprocessing
1195 -- 1203Xinwei Xue, Xin Jin, Chenyuan Zhang, Satoshi Goto. Joint Feature Based Rain Detection and Removal from Videos
1204 -- 1213Jiu Xu, Ning Jiang, Satoshi Goto. Bidirectional Local Template Patterns: An Effective and Discriminative Feature for Pedestrian Detection
1214 -- 1221Mitsuji Muneyasu, Hiroshi Kudo, Takafumi Shono, Yoshiko Hanada. A Method of Data Embedding and Extracting for Information Retrieval Considering Mobile Devices
1222 -- 1235Hsuanchun Liao, Mochamad Asri, Tsuyoshi Isshiki, Dongju Li, Hiroaki Kunieda. A Design of High Performance Parallel Architecture and Communication for Multi-ASIP Based Image Processing Engine
1236 -- 1244Qian Zhao, Yukikazu Nakamoto, Shimpei Yamada, Koutaro Yamamura, Makoto Iwata, Masayoshi Kai. Sensor Scheduling Algorithms for Extending Battery Life in a Sensor Node
1245 -- 1252Shenchuan Liu, Masaaki Fujiyoshi, Hitoshi Kiya. An Image Trading System Using Amplitude-Only Images for Privacy- and Copyright-Protection
1253 -- 1263Lei Sun, Zhenyu Liu, Takeshi Ikenaga. A Drift-Constrained Frequency-Domain Ultra-Low-Delay H.264/SVC to H.264/AVC Transcoder with Medium-Grain Quality Scalability for Videoconferencing
1264 -- 1272Naoya Okada, Yuichi Nakamura, Shinji Kimura. Write Control Method for Nonvolatile Flip-Flops Based on State Transition Analysis
1273 -- 1282Sanchuan Guo, Zhenyu Liu, Guohong Li, Takeshi Ikenaga, Dongsheng Wang. Content-Aware Write Reduction Mechanism of 3D Stacked Phase-Change RAM Based Frame Store in H.264 Video Codec System
1283 -- 1292Masashi Tawada, Masao Yanagisawa, Nozomu Togawa. A High-Speed Trace-Driven Cache Configuration Simulator for Dual-Core Processor L1 Caches
1293 -- 1305Guohong Li, Zhenyu Liu, Sanchuan Guo, Dongsheng Wang. Bayesian Theory Based Adaptive Proximity Data Accessing for CMP Caches
1306 -- 1314Wenxin Yu, Weichen Wang, Minghui Wang, Satoshi Goto. An Integrated Hole-Filling Algorithm for View Synthesis
1315 -- 1322Hyunduk Kim, Sang-Heon Lee, Myoung-Kyu Sohn, Dong-Ju Kim, Byungmin Kim. Facial Image Super-Resolution Reconstruction Based on Separated Frequency Components
1323 -- 1330Wannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya. A Generation Method of Amplitude-Only Images with Low Intensity Ranges
1331 -- 1339Satoshi Taoka, Daisuke Takafuji, Toshimasa Watanabe. Computing-Based Performance Analysis of Approximation Algorithms for the Minimum Weight Vertex Cover Problem of Graphs
1340 -- 1347Shogo Fujita, Leonardo Lanante, Yuhei Nagao, Masayuki Kurosaki, Hiroshi Ochi. Novel THP Scheme with Minimum Noise Enhancement for Multi-User MIMO Systems
1348 -- 1356Syota Kuwabara, Yukihide Kohira, Yasuhiro Takashima. An Effective Overlap Removable Objective for Analytical Placement
1357 -- 1365Jienan Zhang, Shouyi Yin, Peng Ouyang, Leibo Liu, Shaojun Wei. Concurrent Detection and Recognition of Individual Object Based on Colour and p-SIFT Features
1366 -- 1375Muchen Li, Jinjia Zhou, Dajiang Zhou, Xiao Peng, Satoshi Goto. A Dual-Mode Deblocking Filter Design for HEVC and H.264/AVC
1376 -- 1383Takahiro Suzuki, Takeshi Ikenaga. Low Complexity Keypoint Extraction Based on SIFT Descriptor and Its Hardware Implementation for Full-HD 60 fps Video
1384 -- 1392Tatsuya Sakanushi, Jie Hu, Kou Yamada. Parameterization of All Stabilizing Two-Degrees-of-Freedom Simple Repetitive Controllers with Specified Frequency Characteristics
1393 -- 1402Peng Ouyang, Shouyi Yin, Hui Gao, Leibo Liu, Shaojun Wei. Parallelization of Computing-Intensive Tasks of SIFT Algorithm on a Reconfigurable Architecture System
1403 -- 1411Jirabhorn Chaiwongsai, Werapon Chiracharit, Kosin Chamnongthai, Yoshikazu Miyanaga, Kohji Higuchi. A Low Power Tone Recognition for Automatic Tonal Speech Recognizer
1412 -- 1420Sinuk Kang, Kil Hyun Kwon, Dae Gwan Lee. Recovery of Missing Samples from Oversampled Bandpass Signals and Its Stability
1421 -- 1428Yoshihiro Akeboshi, Seiichi Saito, Hideyuki Oh-Hashi. High Precision Analog Data Acquisition System with Signal Transformer Isolation Technique
1429 -- 1436Sangsu Yeh, Sangchul Won. Relaxed Stability Condition for T-S Fuzzy Systems Using a New Fuzzy Lyapunov Function
1437 -- 1444Hui Wang, Martin Hell, Thomas Johansson, Martin Ă…gren. Improved Key Recovery Attack on the BEAN Stream Cipher
1445 -- 1450Xing Liu, Daiyuan Peng, Xianhua Niu, Fang Liu. Lower Bounds on the Aperiodic Hamming Correlations of Frequency Hopping Sequences
1451 -- 1459Shoma Hisaka, Shunsuke Kamijo. Object Detection Using RSSI with Road Surface Reflection Model for Intersection Safety
1460 -- 1467Zhan Shi, Jinglu Hu. A Modified Pulse Coupled Neural Network with Anisotropic Synaptic Weight Matrix for Image Edge Detection
1468 -- 1477Makoto Nakashizuka, Yu Ashihara, Youji Iiguni. An Adaptation Method for Morphological Opening Filters with a Smoothness Penalty on Structuring Elements
1478 -- 1481Chao Dong, Li Gao, Ying Hong, Chengpeng Hao. Adaptive Feedback Cancellation on Improved DCD Algorithms
1482 -- 1487Seong-Eun Kim, Young-Seok Choi, Jae-Woo Lee, Woo-Jin Song. Partial-Update Normalized Sign LMS Algorithm Employing Sparse Updates
1488 -- 1491Gu-Min Jeong, Sang-Hoon Ji. Iterative Learning Control with Advanced Output Data Using an Estimation of the Impulse Response
1492 -- 1495Meiling Li, Anhong Wang. An Object Based Cooperative Spectrum Sensing Scheme with Best Relay
1496 -- 1500Jianzhang Chen, Wenguang Long, Bo Fu. M-Spotty Rosenbloom-Tsfasman Weight Enumerator of Linear Codes over Finite Ring
1501 -- 1504Chao Zhang, Keke Pang, Yaxin Zhang. Geometric Predicted Unscented Kalman Filtering in Rotate Magnetic Ranging