485 | -- | 0 | Yushi Uno. Foreword |
486 | -- | 489 | Kazuyuki Amano, Kyaw May Oo, Yota Otachi, Ryuhei Uehara. Secure Sets and Defensive Alliances in Graphs: A Faster Algorithm and Improved Bounds |
490 | -- | 496 | Taisuke Izumi, Daisuke Suzuki. Faster Enumeration of All Maximal Cliques in Unit Disk Graphs Using Geometric Structure |
497 | -- | 502 | Hideaki Otsuki, Tomio Hirata. The Biclique Cover Problem and the Modified Galois Lattice |
503 | -- | 511 | Masataka Ikeda, Hiroshi Nagamochi. Some Reduction Procedure for Computing Pathwidth of Undirected Graphs |
512 | -- | 523 | Kazuki Miyahara, Kenji Hashimoto, Hiroyuki Seki. Node Query Preservation for Deterministic Linear Top-Down Tree Transducers |
524 | -- | 531 | Kenya Ueno. Candidate Boolean Functions towards Super-Quadratic Formula Size |
532 | -- | 540 | Akinori Kawachi, Ikko Yamane. A Fourier-Analytic Approach to List-Decoding for Sparse Random Linear Codes |
541 | -- | 544 | Chuzo Iwamoto. Computational Complexity of Generalized Golf Solitaire |
545 | -- | 0 | Yusheng Ji. Foreword |
546 | -- | 556 | Shigeo Urushidani, Shunji Abe, Kenjiro Yamanaka, Kento Aida, Shigetoshi Yokoyama, Hiroshi Yamada, Motonori Nakamura, Kensuke Fukuda, Michihiro Koibuchi, Shigeki Yamada. New Directions for a Japanese Academic Backbone Network |
557 | -- | 564 | Hiroshi Shimizu, Hitoshi Asaeda, Masahiro Jibiki, Nozomu Nishinaga. Local Tree Hunting: Finding Closest Contents from In-Network Cache |
565 | -- | 577 | Satoshi Imai, Kenji Leibnitz, Masayuki Murata. Adaptive TTL Control to Minimize Resource Cost in Hierarchical Caching Networks |
578 | -- | 587 | Masafumi Kinoshita, Osamu Takada, Izumi Mizutani, Takafumi Koike, Kenji Leibnitz, Masayuki Murata. Improved Resilience through Extended KVS-Based Messaging System |
588 | -- | 595 | Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi. Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies |
596 | -- | 606 | ManYi Wang, Zhonglei Wang, Enjie Ding, Yun Yang. Dual-Band Sensor Network for Accurate Device-Free Localization in Indoor Environment with WiFi Interference |
607 | -- | 616 | Yuichi Sudo, Toshimitsu Masuzawa, Gen Motoyoshi, Tutomu Murase. Pseudo Polynomial Time Algorithms for Optimal Longcut Route Selection |
617 | -- | 626 | Chunyan Hou, Chen Chen, Jinsong Wang, Kai Shi. A Scenario-Based Reliability Analysis Approach for Component-Based Software |
627 | -- | 636 | Yuki Kashiwabara, Takashi Ishio, Hideaki Hata, Katsuro Inoue. Method Verb Recommendation Using Association Rule Mining in a Set of Existing Projects |
637 | -- | 648 | Yoon Ho Choi, Han-You Jeong, Seung-Woo Seo. A Quantitative Model for Evaluating the Efficiency of Proactive and Reactive Security Countermeasures |
649 | -- | 660 | Chae Chang Lee, Ji Won Yoon. A Novel Statistical Approach to Detect Card Frauds Using Transaction Patterns |
661 | -- | 670 | Ahmed Shalaby, Ikki Fujiwara, Michihiro Koibuchi. The Case for Network Coding for Collective Communication on HPC Interconnection Networks |
671 | -- | 680 | Shinichi Shirakawa. Multiple Binary Codes for Fast Approximate Similarity Search |
681 | -- | 691 | Min Yao, Hiroshi Nagahashi. Analysis of Noteworthy Issues in Illumination Processing for Face Recognition |
692 | -- | 703 | Sukritta Paripurana, Werapon Chiracharit, Kosin Chamnongthai, Hideo Saito. Extraction of Blood Vessels in Retinal Images Using Resampling High-Order Background Estimation |
704 | -- | 711 | Yuko Ozasa, Mikio Nakano, Yasuo Ariki, Naoto Iwahashi. Discriminating Unknown Objects from Known Objects Using Image and Speech Information |
712 | -- | 716 | Ki-Seong Lee, Byung-Woo Hong, Youngmin Kim, Jaeyeop Ahn, Chan-Gun Lee. Split-Jaccard Distance of Hierarchical Decompositions for Software Architecture |
717 | -- | 720 | Meixu Song, Jielin Pan, QingWei Zhao, Yonghong Yan 0002. Discriminative Pronunciation Modeling Using the MPE Criterion |
721 | -- | 725 | Hanhoon Park. Making Joint-Histogram-Based Weighted Median Filter Much Faster |
726 | -- | 727 | Pei-Chen Wu, Chang Hong Lin. A Uniformity-Approximated Histogram Equalization Algorithm for Image Enhancement |
728 | -- | 732 | Hanhoon Park. No-Reference Blur Strength Estimation Based on Spectral Analysis of Blurred Images |
733 | -- | 736 | Deokmin Haam, Hyeon Gyu Kim, Myoung-Ho Kim. An Efficient Filtering Method for Scalable Face Image Retrieval |
737 | -- | 740 | Jong Seung Park, Seung-Ho Lee. Automatic Mura Detection for Display Film Using Mask Filtering in Wavelet Transform |
741 | -- | 744 | SungChul Jung, Chang Ha Lee. Displacement Mapping with an Augmented Patch Mesh |
745 | -- | 748 | Xingri Quan, Jongwon Seok, Keunsung Bae. Detection of S1/S2 Components with Extraction of Murmurs from Phonocardiogram |