Journal: IEICE Transactions

Volume 97-D, Issue 3

391 -- 0Hirotaka Ono. Foreword
392 -- 398Kazuki Teraoka, Kohei Hatano, Eiji Takimoto. Efficient Sampling Method for Monte Carlo Tree Search Problem
399 -- 405Satoshi Fujita. k-Cover Problem
406 -- 412Masaki Kawabata, Takao Nishizeki. Spanning Distribution Trees of Graphs
413 -- 420Kazuyuki Miura. Convex Grid Drawings of Plane Graphs with Pentagonal Contours
421 -- 430Kunihiro Wasa, Yusaku Kaneta, Takeaki Uno, Hiroki Arimura. k Nodes in a Tree
431 -- 441Koji Nakano. Asynchronous Memory Machine Models with Barrier Synchronization
442 -- 447Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya. On the Complexity of Computing Discrete Logarithms over Algebraic Tori
448 -- 454Shuichi Inokuchi, Takahiro Ito, Mitsuhiko Fujio, Yoshihiro Mizoguchi. A Formulation of Composition for Cellular Automata on Groups
455 -- 468Qing Liu, Tomohiro Odaka, Jousuke Kuroiwa, Haruhiko Shirai, Hisakazu Ogura. A New Artificial Fish Swarm Algorithm for the Multiple Knapsack Problem
469 -- 479Hiroshi Yamada, Shuntaro Tonosaki, Kenji Kono. Efficient Update Activation for Virtual Machines in IaaS Cloud Computing Environments
480 -- 487Min-Seok Lee, Cheol-Hoon Lee. Enhanced Cycle-Conserving Dynamic Voltage Scaling for Low-Power Real-Time Operating Systems
488 -- 496Yingxu Lai, Wenwen Zhang, Zhen Yang. Research on Software Trust Analysis Based on Behavior
497 -- 509Yong Song, Kyu Ho Park. UStore: STT-MRAM Based Light-Weight User-Level Storage for Enhancing Performance of Accessing Persistent Data
510 -- 523Takao Murakami, Kenta Takahashi, Kanta Matsuura. A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification
524 -- 532Jiu-jun Cheng, Shangce Gao, Catherine Vairappan, Rong Long Wang, Antti Ylä-Jääski. A Buffer Overflow Based Algorithm to Conceal Software Watermarking Trigger Behavior
533 -- 540Wenpo Zhang, Kazuteru Namba, Hideo Ito. Scan Shift Time Reduction Using Test Compaction for On-Chip Delay Measurement
541 -- 553Trung Ngo Thanh, Yasushi Makihara, Hajime Nagahara, Yasuhiro Mukaigawa, Yasushi Yagi. Orientation-Compensative Signal Registration for Owner Authentication Using an Accelerometer
554 -- 561Haiyang Li, Tieran Zheng, Guibin Zheng, Jiqing Han. Confidence Measure Based on Context Consistency Using Word Occurrence Probability and Topic Adaptation for Spoken Term Detection
562 -- 572Sinwook Lee, Euee S. Jang. Bitstream-Level Film Noise Cancellation for Damaged Video Playback
573 -- 582Yoichi Tomioka, Ryota Takasu, Takashi Aoki, Eiichi Hosoya, Hitoshi Kitazawa. FPGA Implementation of Exclusive Block Matching for Robust Moving Object Extraction and Tracking
583 -- 588Qian Guo, Haibin Kan. An Average-Case Efficient Algorithm on Testing the Identity of Boolean Functions in Trace Representation
589 -- 592Vladimir V. Stankovic, Nebojsa Z. Milenkovic, Oliver M. Vojinovic. Implementation of the Complete Predictor for DDR3 SDRAM
593 -- 596Takeshi Kumaki, Kei Nakao, Kohei Hozumi, Takeshi Ogura, Takeshi Fujino. Development of Compression Tolerable and Highly Implementable Watermarking Method for Mobile Devices
597 -- 600He Li, Kyoung Soo Bok, Jaesoo Yoo. P2P Based Social Network over Mobile Ad-Hoc Networks
601 -- 605Donghai Tian, Xuanya Li, Mo Chen, Changzhen Hu. iCruiser: An Improved Approach for Concurrent Heap Buffer Overflow Monitoring
606 -- 609Mingfu Xue, Wei Liu, Aiqun Hu, Youdong Wang. Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique
610 -- 613Jingjie Yan, Wenming Zheng, Minghai Xin, Jingwei Yan. Integrating Facial Expression and Body Gesture in Videos for Emotion Recognition
614 -- 617Changhong Chen, Shunqing Yang, Zongliang Gan. Topic-Based Knowledge Transfer Algorithm for Cross-View Action Recognition
618 -- 621Trung Hieu Bui, Takeshi Saitoh, Eitaku Nobuyama. Vanishing Point-Based Road Detection for General Road Images
622 -- 625Hyun-Tae Kim, Jinung An, Chang Wook Ahn. A New Evolutionary Approach to Recommender Systems