Journal: IEICE Transactions

Volume 102-D, Issue 9

1606 -- 0Noriyasu Yamamoto. Foreword
1607 -- 1616Noboru Sonehara, Takahisa Suzuki, Akihisa Kodate, Toshihiko Wakahara, Yoshinori Sakai, Yu Ichifuji, Hideo Fujii, Hideki Yoshii. Data-Driven Decision-Making in Cyber-Physical Integrated Society
1617 -- 1624Hiroyuki Sato, Noriyasu Yamamoto. Elastic Trust Model for Dynamically Evolving Trust Frameworks
1625 -- 1634Chaima Dhahri, Kazunori Matsumoto, Keiichiro Hoashi. Upcoming Mood Prediction Using Public Online Social Networks Data: Analysis over Cyber-Social-Physical Dimension
1635 -- 1643Maya Okawa, Yusuke Tanaka 0002, Takeshi Kurashima, Hiroyuki Toda, Tomohiro Yamada. Marked Temporal Point Processes for Trip Demand Prediction in Bike Sharing Systems
1644 -- 1652Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki. Latent Variable Based Anomaly Detection in Network System Logs
1653 -- 1664Haiyan Tian, Yoshiaki Shiraishi, Masami Mohri, Masakatu Morii. CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments
1665 -- 1672Tatsuya Nagai, Masaki Kamizono, Yoshiaki Shiraishi, Kelin Xia, Masami Mohri, Yasuhiro Takano, Masakatu Morii. A Malicious Web Site Identification Technique Using Web Structure Clustering
1673 -- 1675Shigeki Takeda, Kenichi Kagoshima, Masahiro Umehira. A Feasibility Study on the Safety Confirmation System Using NFC and UHF Band RFID Tags
1676 -- 1678Toshiki Tsuchida, Makoto Takita, Yoshiaki Shiraishi, Masami Mohri, Yasuhiro Takano, Masakatu Morii. Authentication Scheme Using Pre-Registered Information on Blockchain
1679 -- 1682Shunta Nakagawa, Tatsuya Nagai, Hideaki Kanehara, Keisuke Furumoto, Makoto Takita, Yoshiaki Shiraishi, Takeshi Takahashi 0001, Masami Mohri, Yasuhiro Takano, Masakatu Morii. Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description
1683 -- 1685Tao Ban, Ryoichi Isawa, Shin-Ying Huang, Katsunari Yoshioka, Daisuke Inoue. A Cross-Platform Study on Emerging Malicious Programs Targeting IoT Devices
1686 -- 1688Kouhei Nagata, Yoshiaki Seki. A Method for Smartphone Theft Prevention When the Owner Dozes Off
1689 -- 1692Toru Kobayashi, Fukuyoshi Kimura, Tetsuo Imai, Kenichi Arai. Smart Ambulance Approach Alarm System Using Smartphone
1693 -- 1695Ryo Ishizuka, Naohiko Tsuda, Hironori Washizaki, Yoshiaki Fukazawa, Shunsuke Sugimura, Yuichiro Yasuda. Effects of Software Modifications and Development After an Organizational Change on Software Metrics Value
1696 -- 1706Daisuke Oku, Kotaro Terada, Masato Hayashi, Masanao Yamaoka, Shu Tanaka, Nozomu Togawa. A Fully-Connected Ising Model Embedding Method and Its Evaluation for CMOS Annealing Machines
1707 -- 1714Satoshi Fujita. Multi-Tree-Based Peer-to-Peer Video Streaming with a Guaranteed Latency
1715 -- 1730Kazuichi Oe, Takeshi Nanri, Koji Okamura. Hybrid Storage System Consisting of Cache Drive and Multi-Tier SSD for Improved IO Access when IO is Concentrated
1731 -- 1739Zhisheng Huo, Limin Xiao, Zhenxue He, Xiaoling Rong, Bing Wei. Dynamic Throughput Allocation among Multiple Servers for Heterogeneous Storage System
1740 -- 1749Satoshi Imamura, Eiji Yoshida, Kazuichi Oe. Reducing CPU Power Consumption with Device Utilization-Aware DVFS for Low-Latency SSDs
1750 -- 1760Ryosuke Tsuchiya, Kazuki Nishikawa, Hironori Washizaki, Yoshiaki Fukazawa, Yuya Shinohara, Keishi Oshima, Ryota Mibe. Recovering Transitive Traceability Links among Various Software Artifacts for Developers
1761 -- 1772Jung-Been Lee, Taek Lee, Hoh Peter In. Automatic Stop Word Generation for Mining Software Artifact Using Topic Model with Pointwise Mutual Information
1773 -- 1783Zhixiao Wang, Mengnan Hou, Guan Yuan, Jing He, Jingjing Cui, Mingjun Zhu. Hierarchical Community Detection in Social Networks Based on Micro-Community and Minimum Spanning Tree
1784 -- 1796Minh Quan Ngo, Ryo Yamamoto, Satoshi Ohzahata, Toshihiko Kato. Proposal and Performance Evaluation of Hybrid Routing Mechanism for NDN Ad Hoc Networks Combining Proactive and Reactive Approaches
1797 -- 1807Yuto Kitagawa, Tasuku Ishigooka, Takuya Azumi. Anomaly Prediction Based on Machine Learning for Memory-Constrained Devices
1808 -- 1818Kentaro Takashima, Hitomi Yokoyama, Kinya Fujita. Analysis of Observation Behavior of Shared Interruptibility Information among Distributed Offices: Case Study in a University Laboratory
1819 -- 1832Hongwei Han, Ke Guo, Maozhi Wang, Tingbin Zhang, Shuang Zhang. Fast Hyperspectral Unmixing via Reweighted Sparse Regression
1833 -- 1841Duhu Man, Mark W. Jones, Danrong Li, Honglong Zhang, Zhan Song. Calibration of Turntable Based 3D Scanning Systems
1842 -- 1850Xinyu He, Lishuang Li, Xingchen Song, Degen Huang, Fuji Ren. Multi-Level Attention Based BLSTM Neural Network for Biomedical Event Extraction
1851 -- 1859Ryo Kazama, Kazuki Sekine, Satoshi Ito. Compressed Sensing in Magnetic Resonance Imaging Using Non-Randomly Under-Sampled Signal in Cartesian Coordinates
1860 -- 1864Zhuo Zhang, Yan Lei, Jianjun Xu, Xiaoguang Mao, Xi Chang. TFIDF-FL: Localizing Faults Using Term Frequency-Inverse Document Frequency and Deep Learning
1865 -- 1869Yingxun Fu, Junyi Guo, Li Ma, Jianyong Duan. Single Failure Recovery Method for Erasure Coded Storage System with Heterogeneous Devices
1870 -- 1873Yuehang Ding, Hongtao Yu, Jianpeng Zhang, Huanruo Li, Yunjie Gu. A Knowledge Representation Based User-Driven Ontology Summarization Method
1874 -- 1877Youngjoo Shin. Cross-VM Cache Timing Attacks on Virtualized Network Functions
1878 -- 1881Duc Tiep Vu, Kyungbaek Kim. Gradual Switch Clustering Based Virtual Middlebox Placement for Improving Service Chain Performance
1882 -- 1886WeiJun Lu, Chao Geng, Dunshan Yu. A New Method for Futures Price Trends Forecasting Based on BPNN and Structuring Data
1887 -- 1889Haeyoung Lee. APS: Audience Presentation System Using Mobile Devices

Volume 102-D, Issue 8

1438 -- 0Toshiaki Aoki. Foreword
1439 -- 1448Cheng Shi, Kazuki Yoneyama. Verification of LINE Encryption Version 1.0 Using ProVerif
1449 -- 1461Hoang Viet Tran, Pham Ngoc Hung, Viet Ha Nguyen. On Locally Minimum and Strongest Assumption Generation Method for Component-Based Software Verification
1462 -- 1477Shinnosuke Saruwatari, Fuyuki Ishikawa, Tsutomu Kobayashi, Shinichi Honiden. Change Impact Analysis for Refinement-Based Formal Specification
1478 -- 1488Eun Sung Jung, Si Liu, Rajkumar Kettimuthu, Sungwook Chung. High-Performance End-to-End Integrity Verification on Big Data Transfer
1489 -- 1497Weijie Chen, Ming Cai, Xiaojun Tan, Bo Wei. Parameter Identification and State-of-Charge Estimation for Li-Ion Batteries Using an Improved Tree Seed Algorithm
1498 -- 1505Kozo Okano, Satoshi Harauchi, Toshifusa Sekizawa, Shinpei Ogata, Shin Nakajima 0001. Consistency Checking between Java Equals and hashCode Methods Using Software Analysis Workbench
1506 -- 1516Huibin Wang, Chunqiang Li, Jianyi Meng, Xiaoyan Xiang. SCSE: Boosting Symbolic Execution via State Concretization
1517 -- 1525Meng Ting Xiong, Yong Feng, Ting Wu, Jiaxing Shang, Baohua Qiang, Yanan Wang. TDCTFIC: A Novel Recommendation Framework Fusing Temporal Dynamics, CNN-Based Text Features and Item Correlation
1526 -- 1536Di Yang, Songjiang Li, Zhou Peng, Peng Wang, Junhui Wang, Huamin Yang. MF-CNN: Traffic Flow Prediction Using Convolutional Neural Network and Multi-Features Fusion
1537 -- 1545Yuichiro Wada, Siqiang Su, Wataru Kumagai, Takafumi Kanamori. k-Nearest Neighbor in Online Semi-Supervised Learning
1546 -- 1553Kentaro Sone, Toru Nakashika. Pre-Training of DNN-Based Speech Synthesis Based on Bidirectional Conversion between Text and Speech
1554 -- 1564Nam Tuan Ly, Kha Cong Nguyen, Cuong Tuan Nguyen, Masaki Nakagawa. Recognition of Anomalously Deformed Kana Sequences in Japanese Historical Documents
1565 -- 1568Pilsung Kang 0003. OpenACC Parallelization of Stochastic Simulations on GPUs
1569 -- 1571Cheolgi Kim, Daechul Lee, JaeHyun Lee, Jaehwan Lee 0001. An Efficient Block Assignment Policy in Hadoop Distributed File System for Multimedia Data Processing
1572 -- 1575Seok-Oh Yun, Jung Hoon Lee, Jin Lee, Choul-Young Kim. Implementation of Smart Dressing Systems Based on Flexible pH Sensors Using PET Films
1576 -- 1580Yongju Song, Sungkyun Lee, Dong-Hyun Kang, Young Ik Eom. NVRAM-Aware Mapping Table Management for Flash Storage Devices
1581 -- 1585Binglin Zhao, Fudong Liu, Zheng Shan, Yihang Chen, Jian Liu. Graph Similarity Metric Using Graph Convolutional Network: Application to Malware Similarity Match
1586 -- 1589Zhihao Liu, Hui Yin, Hua Huang. Iterative Adversarial Inference with Re-Inference Chain for Deep Graphical Models
1590 -- 1593Kazuma Takahashi, Tatsumi Hattori, Keisuke Doman, Yasutomo Kawanishi, Takatsugu Hirayama, Ichiro Ide, Daisuke Deguchi, Hiroshi Murase. Estimation of the Attractiveness of Food Photography Based on Image Features
1594 -- 1597Hochong Park, Yong-Shik Shin, Seong-Hyeon Shin. Speech Quality Enhancement for In-Ear Microphone Based on Neural Network
1598 -- 1601Soo-Yeon Shin, Dong Myung Kim, Jae-Won Suh. Image Denoiser Using Convolutional Neural Network with Deconvolution and Modified Residual Network
1602 -- 1605Yinwei Zhan, Yaodong Li, Zhuo Yang, Yao Zhao, Huaiyu Wu. Saccade Information Based Directional Heat Map Generation for Gaze Data Visualization

Volume 102-D, Issue 7

1228 -- 1229Ichiro Ide, Yoko Yamakata. Foreword
1230 -- 1239Wataru Shimoda, Keiji Yanai. Webly-Supervised Food Detection with Foodness Proposal
1240 -- 1246Takumi Ege, Keiji Yanai. Simultaneous Estimation of Dish Locations and Calories with Multi-Task Learning
1247 -- 1256Takuya Kojima, Hideharu Amano. A Fine-Grained Multicasting of Configuration Data for Coarse-Grained Reconfigurable Architectures
1257 -- 1270Chun Hung Cheng, Ying-Wen Bai. Dynamic Performance Adjustment of CPU and GPU in a Gaming Notebook at the Battery Mode
1271 -- 1279Kanghee Kim, Wooseok Lee, Sangbang Choi. PMOP: Efficient Per-Page Most-Offset Prefetcher
1280 -- 1295Nhat-Hoa Tran, Yuki Chiba, Toshiaki Aoki. Model Checking in the Presence of Schedulers Using a Domain-Specific Language for Scheduling Policies
1296 -- 1301Haiqiang Liu, Gang Hua 0002, Hongsheng Yin, Aichun Zhu, Ran Cui. A Simple Deterministic Measurement Matrix Based on GMW Pseudorandom Sequence
1302 -- 1309Di Zhou, Ping Fu, Hongtao Yin, Wei Xie, Shou Feng. A Study of Online State-of-Health Estimation Method for In-Use Electric Vehicles Based on Charge Data
1310 -- 1320Takanobu Baba, Shinpei Watanabe, Boaz Jessie Jackin, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota, Yoshio Hayasaki, Toyohiko Yatagai. Fast Computation with Efficient Object Data Distribution for Large-Scale Hologram Generation on a Multi-GPU Cluster
1321 -- 1331Fei Guo, Yuan Yang 0006, Yang Xiao, Yong Gao, Ningmei Yu. Recognition of Moving Object in High Dynamic Scene for Visual Prosthesis
1332 -- 1341Chun-Yu Liu, Shu-Nung Yao, Ying-Jen Chen. lcyanalysis: An R Package for Technical Analysis in Stock Markets
1342 -- 1348Chi-Chia Sun, Ming-Hwa Sheu, Jui-Yang Chi, Yan-Kai Huang. A Fast Non-Overlapping Multi-Camera People Re-Identification Algorithm and Tracking Based on Visual Channel Model
1349 -- 1361Chengcheng Jiang, Xinyu Zhu, Chao Li, Gengsheng Chen. A Robust Tracking with Low-Dimensional Target-Specific Feature Extraction
1362 -- 1373Onur Keklik, Tugkan Tuglular, Selma Tekir. Rule-Based Automatic Question Generation Using Semantic Role Labeling
1374 -- 1383Chi-Hua Chen, Feng-Jang Hwang, Hsu-Yang Kung. Travel Time Prediction System Based on Data Clustering for Waste Collection Vehicles
1384 -- 1395Bumshik Lee, Waqas Ellahi, Jae Young Choi. Using Deep CNN with Data Permutation Scheme for Classification of Alzheimer's Disease in Structural Magnetic Resonance Imaging (sMRI)
1396 -- 1399Haomo Liang, Zhixue Wang, Yi Liu. A New Hybrid Ant Colony Optimization Based on Brain Storm Optimization for Feature Selection
1400 -- 1403Yuehang Ding, Hongtao Yu, Jianpeng Zhang, Yunjie Gu, Ruiyang Huang, Shize Kang. Super-Node Based Detection of Redundant Ontology Relations
1404 -- 1407Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Kazuto Sasai, Gen Kitagata, Takeshi Ikenaga. Clustering Malicious DNS Queries for Blacklist-Based Detection
1408 -- 1411Linjie Zhu, Bin Wu, Zhiwei Wei, Yu Tang. A Novel Frame Aggregation Scheduler to Solve the Head-of-Line Blocking Problem for Real-Time UDP Traffic in Aggregation-Enabled WLANs
1412 -- 1416Chun Gun Park, Hyun Ahn. Temporal Outlier Detection and Correlation Analysis of Business Process Executions
1417 -- 1421Lingyan Li, Xiaoyan Zhou, Yuan Zong, Wenming Zheng, Xiuzhen Chen, Jingang Shi, Peng Song. Unsupervised Cross-Database Micro-Expression Recognition Using Target-Adapted Least-Squares Regression
1422 -- 1425Asera Wayne Asera, Masayoshi Aritsugi. Weber Centralized Binary Fusion Descriptor for Fingerprint Liveness Detection
1426 -- 1429Yue Xie, Ruiyu Liang, Zhenlin Liang, Li Zhao 0003. Attention-Based Dense LSTM for Speech Emotion Recognition
1430 -- 1433Song Liang, Leida Li, Bo Hu, Jianying Zhang. Quality Index for Benchmarking Image Inpainting Algorithms with Guided Regional Statistics
1434 -- 1437Karthikeyan Panjappagounder Rajamanickam, Sakthivel Periyasamy. Entropy Based Illumination-Invariant Foreground Detection

Volume 102-D, Issue 6

1119 -- 1125Yuto Matsunaga, Tetsuya Kojima, Naofumi Aoki, Yoshinori Dobashi, Tsuyoshi Yamamoto. Some Evaluations on a Digital Watermarking Technique for Music Data Using Distortion Effect
1126 -- 1135Linna Wei, Xiaoxiao Song, Xiao Zheng, Xuangou Wu, Guan Gui. Boundary Node Identification in Three Dimensional Wireless Sensor Networks for Surface Coverage
1136 -- 1144Kyohei Osuge, Hiroya Kato, Shuichiro Haruta, Iwao Sasase. An Effective Feature Selection Scheme for Android ICC-Based Malware Detection Using the Gap of the Appearance Ratio
1145 -- 1153Eiji Konaka. A Unified Statistical Rating Method for Team Ball Games and Its Application to Predictions in the Olympic Games
1154 -- 1162Qi Zhang, Hiroaki Sasaki, Kazushi Ikeda. Direct Log-Density Gradient Estimation with Gaussian Mixture Models and Its Application to Clustering
1163 -- 1170Rachelle Rivero, Yuya Onuma, Tsuyoshi Kato. Threshold Auto-Tuning Metric Learning
1171 -- 1182Jungang Guan, Fengwei An, Xiangyu Zhang 0002, Lei Chen 0001, Hans Jürgen Mattausch. Energy-Efficient Hardware Implementation of Road-Lane Detection Based on Hough Transform with Parallelized Voting Procedure and Local Maximum Algorithm
1183 -- 1196Ming Li, Li Shi, Xudong Chen, Sidan Du, Yang Li. Using Temporal Correlation to Optimize Stereo Matching in Video Sequences
1197 -- 1205Tsuneo Kato, Atsushi Nagai, Naoki Noda, Jianming Wu, Seiichi Yamamoto. Utterance Intent Classification for Spoken Dialogue System with Data-Driven Untying of Recursive Autoencoders
1206 -- 1209Wenting Wei, Kun Wang 0001, Gu Ban, Keming Feng, Xuan Wang, Huaxi Gu. Topological Consistency-Based Virtual Network Embedding in Elastic Optical Networks
1210 -- 1214Wook Kim, Daehee Kim. High-Throughput Primary Cell Frequency Switching for Multi-RAT Carrier Aggregation
1215 -- 1217Guoqi Li. A Lightweight System to Achieve Proactive Risk Management for Household ASIC-Resistant Cryptocurrency Mining
1218 -- 1221Daiki Sekizawa, Shinnosuke Takamichi, Hiroshi Saruwatari. Prosody Correction Preserving Speaker Individuality for Chinese-Accented Japanese HMM-Based Text-to-Speech Synthesis
1222 -- 1226Minghao Tang, Yuan Zong, Wenming Zheng, Jisheng Dai, Jingang Shi, Peng Song. Micro-Expression Recognition by Leveraging Color Space Information

Volume 102-D, Issue 5

877 -- 0Tomoki Yoshihisa. Foreword
878 -- 887Yu-Hung Chen, Jiann-Liang Chen. AI@ntiPhish - Machine Learning Mechanisms for Cyber-Phishing Attack
888 -- 897Sornxayya Phetlasy, Satoshi Ohzahata, Celimuge Wu, Toshihito Kato. A Sequential Classifiers Combination Method to Reduce False Negative for Intrusion Detection System
898 -- 909Abu Hena Al Muktadir, Takaya Miyazawa, Pedro Martinez-Julia, Hiroaki Harai, Ved P. Kafle. Multi-Target Classification Based Automatic Virtual Resource Allocation Scheme
910 -- 919Chun-Xiang Chen, Kenichi Nagaoka. Analysis of the State of ECN on the Internet
920 -- 931Daiki Nobayashi, Yutaka Fukuda, Kazuya Tsukamoto, Takeshi Ikenaga. A Dynamic Channel Switching for ROD-SAN
932 -- 941Tomoya Kawakami, Tomoki Yoshihisa, Yuuichi Teranishi. A P2P Sensor Data Stream Delivery System That Guarantees the Specified Reachability under Churn Situations
942 -- 951Yansen Xu, Ved P. Kafle. A Mathematical Model and Dynamic Programming Based Scheme for Service Function Chain Placement in NFV
952 -- 962Akihito Taya, Takayuki Nishio, Masahiro Morikura, Koji Yamamoto. Concurrent Transmission Scheduling for Perceptual Data Sharing in mmWave Vehicular Networks
963 -- 973Yutaro Oda, Yosuke Tanigawa, Hideki Tode. Distributed Search for Exchangeable Service Chain Based on In-Network Guidance
974 -- 987Kimitoshi Takahashi, Kento Aida, Tomoya Tanjo, Jingtao Sun, Kazushige Saga. A Portable Load Balancer with ECMP Redundancy for Container Clusters
988 -- 997Xin Qi, Zheng Wen, Keping Yu, Kazunori Murata, Kouichi Shibata, Takuro Sato. Content-Oriented Disaster Network Utilizing Named Node Routing and Field Experiment Evaluation
998 -- 1001Yurino Sato, Yusuke Ito, Hiroyuki Koga. Hash-Based Cache Distribution and Search Schemes in Content-Centric Networking
1002 -- 0Masato Motomura. Foreword
1003 -- 1011Hiroki Nakahara, Haruyoshi Yonekawa, Tomoya Fujii, Masayuki Shimoda, Shimpei Sato. GUINNESS: A GUI Based Binarized Deep Neural Network Framework for Software Programmers
1012 -- 1019Takeshi Ohkawa, Kazushi Yamashina, Takuya Matsumoto, Kanemitsu Ootsu, Takashi Yokota. Automatic Generation Tool of FPGA Components for Robots
1020 -- 1028Masayuki Shimoda, Shimpei Sato, Hiroki Nakahara. Power Efficient Object Detector with an Event-Driven Camera for Moving Object Surveillance on an FPGA
1029 -- 1036Antoniette Mondigo, Tomohiro Ueno, Kentaro Sano, Hiroyuki Takizawa. Scalability Analysis of Deeply Pipelined Tsunami Simulation with Multiple FPGAs
1037 -- 1045Cheng Luo, Wei Cao 0002, Lingli Wang, Philip H. W. Leong. RNA: An Accurate Residual Network Accelerator for Quantized and Reconstructed Deep Neural Networks
1046 -- 1053Mizuho Naganuma, Yuichi Takano, Ryuhei Miyashiro. Feature Subset Selection for Ordered Logit Model via Tangent-Plane-Based Approximation
1054 -- 1064Ruicong Zhi, Hairui Xu, Ming Wan, Tingting Li. Combining 3D Convolutional Neural Networks with Transfer Learning by Supervised Pre-Training for Facial Micro-Expression Recognition
1065 -- 1072Ling Yang, Yuanqi Fu, Zhongke Wang, Xiaoqiong Zhen, Zhipeng Yang, Xingang Fan. An Optimized Level Set Method Based on QPSO and Fuzzy Clustering
1073 -- 1080Guodong Sun, Kai Lin, Junhao Wang, Yang Zhang. An Enhanced Affinity Graph for Image Segmentation
1081 -- 1084Jin-Taek Seong. Density of Pooling Matrices vs. Sparsity of Signals for Group Testing Problems
1085 -- 1088Tao Liu, Huaxi Gu, Yue Wang, Wei Zou. An Optimized Low-Power Optical Memory Access Network for Kilocore Systems
1089 -- 1092Sang-Su Lee, Sung Hyun You, Seok-Kyoon Kim. Robust Phase Estimation of a Hybrid Monte Carlo/Finite Memory Digital Phase-Locked Loop
1093 -- 1096Kyoungsoo Bok, Jonghyeon Yoon, Jongtae Lim, Jaesoo Yoo. Load Balancing Using Load Threshold Adjustment and Incentive Mechanism in Structured P2P Systems
1097 -- 1101Yu Huang, Zhiheng Zhou, Tianlei Wang, Qian Cao, Junchu Huang, Zirong Chen. A Part-Based Gaussian Reweighted Approach for Occluded Vehicle Detection
1102 -- 1105Wonjun Kim. Visibility Restoration via Smoothing Speed for Vein Recognition
1106 -- 1110Masamichi Kitagawa, Ikuko Shimizu. Memory Saving Feature Descriptor Using Scale and Rotation Invariant Patches around the Feature Ppoints
1111 -- 1114Kai Tan, Qingbo Wu, Fanman Meng, Linfeng Xu. Multi Information Fusion Network for Saliency Quality Assessment
1115 -- 1118Seok-Oh Yun, Jung Hoon Lee, Jin Lee, Choul-Young Kim. A Flexible Wireless Sensor Patch for Real-Time Monitoring of Heart Rate and Body Temperature

Volume 102-D, Issue 4

690 -- 0Yukihiko Yamashita. Foreword
691 -- 701Shigenobu Asada, Hiroyuki Kubo, Takuya Funatomi, Yasuhiro Mukaigawa. Simultaneous Reproduction of Reflectance and Transmittance of Ink Paintings
702 -- 714Shu Fujita, Keita Takahashi, Toshiaki Fujii. High-Quality Multi-View Image Extraction from a Light Field Camera Considering Its Physical Pixel Arrangement
715 -- 723Masahiro Kohjima, Tatsushi Matsubayashi, Hiroshi Sawada. Learning of Nonnegative Matrix Factorization Models for Inconsistent Resolution Dataset Analysis
724 -- 0Koji Eguchi. Foreword
725 -- 736Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Daiki Chiba 0001, Kunio Hato. Efficient Dynamic Malware Analysis for Collecting HTTP Requests using Deep Learning
737 -- 744Zhenyu Zhao, Ming Zhu, Yiqiang Sheng, Jinlin Wang 0001. A Top-N-Balanced Sequential Recommendation Based on Recurrent Network
745 -- 758A. K. M. Tauhidul Islam, Sakti Pramanik, Qiang Zhu 0001. The BINDS-Tree: A Space-Partitioning Based Indexing Scheme for Box Queries in Non-Ordered Discrete Data Spaces
759 -- 767Kun Niu, Haizhen Jiao, Cheng Cheng, Huiyang Zhang, Xiao Xu. NFRR: A Novel Family Relationship Recognition Algorithm Based on Telecom Social Network Spectrum
768 -- 776Yegang Du, Yuto Lim, Yasuo Tan. Activity Recognition Using RFID Phase Profiling in Smart Library
777 -- 787Kaoru Katayama, Wataru Sato. Subassembly Retrieval of 3D CAD Assembly Models with Different Layout of Components Based on Sinogram
788 -- 799Jing Zhao, Yoshiharu Ishikawa, Lei Chen, Chuan Xiao, Kento Sugiura. Building Hierarchical Spatial Histograms for Exploratory Analysis in Array DBMS
800 -- 809Wen-Lung Tsai, Yung-Chun Chan. Designing a Framework for Data Quality Validation of Meteorological Data System
810 -- 820Hiroyoshi Ito, Takahiro Komamizu, Toshiyuki Amagasa, Hiroyuki Kitagawa. Detecting Communities and Correlated Attribute Clusters on Multi-Attributed Graphs
821 -- 825Seksan Mathulaprangsan, Yuan-Shan Lee, Jia-Ching Wang. Locality Preserved Joint Nonnegative Matrix Factorization for Speech Emotion Recognition
826 -- 835Shin-ichi Nakayama, Shigeru Masuyama. NT on Series-Parallel Graphs
836 -- 844Jingxia Chen, Zijing Mao, Ru Zheng, Yufei Huang, Lifeng He. Feature Selection of Deep Learning Models for EEG-Based RSVP Target Detection
845 -- 855Jian Zhou, Chong Han, Lijuan Sun, Fu Xiao. Linguistic Multi-Criteria Group Decision-Making Method Combining Cloud Model and Evidence Theory
856 -- 858Jun Suk Kim, Chang Wook Ahn. Quantum Algorithm on Logistic Regression Problem
859 -- 862Xinqun Liu, Yingxiao Zhao. Wideband Radar Frequency Measurement Receiver Based on FPGA without Mixer
863 -- 866Yong Wang, Zhiqiu Huang, Yong Li, Rongcun Wang, Qiao Yu. Spectrum-Based Fault Localization Framework to Support Fault Understanding
867 -- 870Songbin Xu, Yang Xue, Yuqing Chen. Quantitative Analyses on Effects from Constraints in Air-Writing
871 -- 874Li Xu, Bing Luo, Mingming Kong, Bo Li 0054, Zheng Pei. Fast Superpixel Segmentation via Boundary Sampling and Interpolation

Volume 102-D, Issue 3

415 -- 0Taisuke Izumi. Foreword
416 -- 422Koji Ouchi, Ryuhei Uehara. Efficient Enumeration of Flat-Foldable Single Vertex Crease Patterns
423 -- 429Tatsuhiko Hatanaka, Takehiro Ito, Xiao Zhou. The Coloring Reconfiguration Problem on Specific Graph Classes
430 -- 443Toshiki Shibahara, Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Masayuki Murata. Evasive Malicious Website Detection by Leveraging Redirection Subgraph Similarities
444 -- 453Masahiro Shibata, Daisuke Nakamura, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa. Partial Gathering of Mobile Agents in Arbitrary Networks
454 -- 463Hiroto Yasumi, Fukuhito Ooshita, Ken-ichi Yamaguchi, Michiko Inoue. Space-Optimal Population Protocols for Uniform Bipartition Under Global Fairness
464 -- 469Kunihiro Wasa, Katsuhisa Yamanaka, Hiroki Arimura. The Complexity of Induced Tree Reconfiguration Problems
470 -- 482Tomoyuki Uchida, Satoshi Matsumoto, Takayoshi Shoudai, Yusuke Suzuki, Tetsuhiro Miyahara. Exact Learning of Primitive Formal Systems Defining Labeled Ordered Tree Languages via Queries
483 -- 491Akinori Kawachi, Kenichi Kawano, Francois Le Gall, Suguru Tamaki. Quantum Query Complexity of Unitary Operator Discrimination
492 -- 498Akihiro Matsuura, Yoshiaki Shoji. The Explicit Formula of the Presumed Optimal Recurrence Relation for the Star Tower of Hanoi
499 -- 501Katsuhisa Yamanaka, Shogo Kawaragi, Takashi Hirayama. Exact Exponential Algorithm for Distance-3 Independent Set Problem
502 -- 504Joong Chae Na, Inbok Lee. A Simple Heuristic for Order-Preserving Matching
505 -- 511Zhengqiang Wang, Wenrui Xiao, Xiaoyu Wan, Zifu Fan. Price-Based Power Control Algorithm in Cognitive Radio Networks via Branch and Bound
512 -- 521David Aledo, Benjamin Carrión Schäfer, Félix Moreno. VHDL vs. SystemC: Design of Highly Parameterizable Artificial Neural Networks
522 -- 536Xiaoqiong Zhao, Shanping Li, Huan Yu, Ye Wang, Weiwei Qiu. Accurate Library Recommendation Using Combining Collaborative Filtering and Topic Model for Mobile Development
537 -- 549Lina Gong, Shujuan Jiang, Qiao Yu, Li Jiang. Unsupervised Deep Domain Adaptation for Heterogeneous Defect Prediction
550 -- 558Yutaro Hayakawa, Kenichi Yasukata, Jin Nakazawa, Michio Honda. Resilient Edge: A Scalable, Robust Network Function Backend
559 -- 567Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto. An ATM Security Measure for Smart Card Transactions to Prevent Unauthorized Cash Withdrawal
568 -- 578Xiaotao Cheng, Lixin Ji, Ruiyang Huang, Ruifei Cui. Network Embedding with Deep Metric Learning
579 -- 587Yukihiro Tagami. Recursive Nearest Neighbor Graph Partitioning for Extreme Multi-Label Learning
588 -- 597Cong Liu 0012, Qingtian Zeng, Hua Duan, Shangce Gao, Chanhong Zhou. Towards Comprehensive Support for Business Process Behavior Similarity Measure
598 -- 608Michael Hentschel, Marc Delcroix, Atsunori Ogawa, Tomoharu Iwata, Tomohiro Nakatani. Feature Based Domain Adaptation for Neural Network Language Models with Factorised Hidden Layers
609 -- 619Ying Cao, Lijuan Sun, Chong Han, Jian Guo. A Novel Completion Algorithm for Color Images and Videos Based on Tensor Train Rank
620 -- 627Xiaoxia Liu, Degen Huang, Zhangzhi Yin, Fuji Ren. Recognition of Collocation Frames from Sentences
628 -- 631Xilu Wang, Yongjun Sun, Huaxi Gu. BMM: A Binary Metaheuristic Mapping Algorithm for Mesh-Based Network-on-Chip
632 -- 636Hakbeom Jang, Jonghyun Bae, Tae Jun Ham, Jae W. Lee. Eager Memory Management for In-Memory Data Analytics
637 -- 639Chaman Wijesiriwardana, Prasad Wimalaratne. Software Engineering Data Analytics: A Framework Based on a Multi-Layered Abstraction Mechanism
640 -- 644Sangwook Bak, Young-Joo Suh. Designing and Implementing an Enhanced Bluetooth Low Energy Scanner with User-Level Channel Awareness and Simultaneous Channel Scanning
645 -- 649Muhammad Hataba, Ahmed El-Mahdy, Kazunori Ueda. Generation of Efficient Obfuscated Code through Just-in-Time Compilation
650 -- 654Siyu Chen, Ning Wang, Mengmeng Zhang. Mining Approximate Primary Functional Dependency on Web Tables
655 -- 658Yilu Ma, Yuehua Li. Millimeter-Wave InSAR Target Recognition with Deep Convolutional Neural Network
659 -- 662Fei Wu 0004, Xiwei Dong, Lu Han, Xiao-Yuan Jing, Yi-mu Ji. Multi-View Synthesis and Analysis Dictionaries Learning for Classification
663 -- 665Masanori Morise. Modification of Velvet Noise for Speech Waveform Generation by Using Vocoder-Based Speech Synthesizer
666 -- 669Zhi Liu, Cai Xu, Mengmeng Zhang, Wen Yue. Fast Intra Prediction and CU Partition Algorithm for Virtual Reality 360 Degree Video Coding
670 -- 674Zhenglong Yang, Guozhong Wang, Guowei Teng. A Foreground-Background-Based CTU λ Decision Algorithm for HEVC Rate Control of Surveillance Videos
675 -- 679Chunxiao Fan, Yang Li, Lei Tian 0002, Yong Li. Rectifying Transformation Networks for Transformation-Invariant Representations with Power Law
680 -- 683Suofei Zhang, Bin Kang, Lin Zhou 0001. Object Tracking by Unified Semantic Knowledge and Instance Features
684 -- 687Tiansa Zhang, Chunlei Huo, Zhiqiang Zhou, Bo Wang. Faster-ADNet for Visual Tracking
688 -- 689Yibo Jiang, Hui Bi, Hui Li, Zhihao Xu. Automatic and Accurate 3D Measurement Based on RGBD Saliency Detection

Volume 102-D, Issue 2

223 -- 238Chengcheng Ji, Masahito Kurihara, Haruhiko Sato. Multi-Context Automated Lemma Generation for Term Rewriting Induction with Divergence Detection
239 -- 246Satoshi Fujita. Cloud-Assisted Peer-to-Peer Video Streaming with Minimum Latency
247 -- 260Yao Hu, Michihiro Koibuchi. Optimizing Slot Utilization and Network Topology for Communication Pattern on Circuit-Switched Parallel Computing Systems
261 -- 268Satoshi Fujita. Flash Crowd Absorber for P2P Video Streaming
269 -- 279Naohiro Aota, Kenji Kono. File Systems are Hard to Test - Learning from Xfstests
280 -- 288Shohei Ikeda, Akinori Ihara, Raula Gaikovina Kula, Kenichi Matsumoto. An Empirical Study of README contents for JavaScript Packages
289 -- 298Minseok Lee, Jihoon An, Younghee Lee. Missing-Value Imputation of Continuous Missing Based on Deep Imputation Network Using Correlations among Multiple IoT Data Streams in a Smart Space
299 -- 306Yang Gao, Yongjuan Wang, Qing-jun Yuan, Tao Wang, Xiang-bin Wang. Probabilistic Analysis of Differential Fault Attack on MIBS
307 -- 318Na Wu, Decheng Zuo, Zhan Zhang, Peng Zhou, Yan Zhao. FSCRank: A Failure-Sensitive Structure-Based Component Ranking Approach for Cloud Applications
319 -- 330Longfei Chen, Yuichi Nakamura, Kazuaki Kondo, Walterio W. Mayol-Cuevas. Hotspot Modeling of Hand-Machine Interaction Experiences from a Head-Mounted RGB-D Camera
331 -- 345Hitomi Yokoyama, Masano Nakayama, Hiroaki Murata, Kinya Fujita. Development of Acoustic Nonverbal Information Estimation System for Unconstrained Long-Term Monitoring of Daily Office Activity
346 -- 354Shengyu Yao, Ruohua Zhou, Pengyuan Zhang. Speaker-Phonetic I-Vector Modeling for Text-Dependent Speaker Verification with Random Digit Strings
355 -- 363Gaofeng Cheng, Pengyuan Zhang, Ji Xu. Automatic Speech Recognition System with Output-Gate Projected Gated Recurrent Unit
364 -- 374Hiroshi Seki, Kazumasa Yamamoto, Tomoyosi Akiba, Seiichi Nakagawa. Discriminative Learning of Filterbank Layer within Deep Neural Network Based Speech Recognition for Speaker Adaptation
375 -- 382Huu-Anh Tran, Heyan Huang, Phuoc Tran, ShuMin Shi, Huu Nguyen. Preordering for Chinese-Vietnamese Statistical Machine Translation
383 -- 391Hiroki Watanabe, Hiroki Tanaka, Sakriani Sakti, Satoshi Nakamura 0001. Neural Oscillation-Based Classification of Japanese Spoken Sentences During Speech Perception
392 -- 395Yuliang Wei, Guodong Xin, Wei Wang, Fang Lv, BaiLing Wang. Personal Data Retrieval and Disambiguation in Web Person Search
396 -- 401Fang Wang, Zhe Wei. A Statistical Reputation Approach for Reliable Packet Routing in Ad-Hoc Sensor Networks
402 -- 405Seung Keun Yoo, Doo-Kwon Baik. Comprehensive Damage Assessment of Cyberattacks on Defense Mission Systems
406 -- 409Hanhoon Park. Robust Face Sketch Recognition Using Locality Sensitive Histograms
410 -- 414Masashi Anzawa, Sosuke Amano, Yoko Yamakata, Keiko Motonaga, Akiko Kamei, Kiyoharu Aizawa. Recognition of Multiple Food Items in A Single Photo for Use in A Buffet-Style Restaurant

Volume 102-D, Issue 12

2280 -- 0Michihiro Koibuchi. Foreword
2281 -- 2294Ryohei Banno, Jingyu Sun, Susumu Takeuchi, Kazuyuki Shudo. Interworking Layer of Distributed MQTT Brokers
2295 -- 2305Kasho Yamamoto, Masayuki Ikebe, Tetsuya Asai, Masato Motomura, Shinya Takamaeda-Yamazaki. FPGA-Based Annealing Processor with Time-Division Multiplexing
2306 -- 2316Marcus Wallden, Stefano Markidis, Masao Okita, Fumihiko Ino. Memory Efficient Load Balancing for Distributed Large-Scale Volume Rendering Using a Two-Layered Group Structure
2317 -- 2328Taku Yamazaki, Ryo Yamamoto, Genki Hosokawa, Tadahide Kunitachi, Yoshiaki Tanaka. Decentralized Local Scaling Factor Control for Backoff-Based Opportunistic Routing
2329 -- 2340Kazuro Kimura, Shinya Higa, Masao Okita, Fumihiko Ino. Accelerating the Held-Karp Algorithm for the Symmetric Traveling Salesman Problem
2341 -- 2353Kota Ando, Kodai Ueyoshi, Yuka Oba, Kazutoshi Hirose, Ryota Uematsu, Takumi Kudo, Masayuki Ikebe, Tetsuya Asai, Shinya Takamaeda-Yamazaki, Masato Motomura. Dither NN: Hardware/Algorithm Co-Design for Accurate Quantized Neural Networks
2354 -- 2365Soramichi Akiyama. A Lightweight Method to Evaluate Effect of Approximate Memory with Hardware Performance Monitors
2366 -- 2376Takuma Iwata, Kohei Nakamura, Yuta Tokusashi, Hiroki Matsutani. An FPGA-Based Change-Point Detection for 10Gbps Packet Stream
2377 -- 2388Atsushi Koshiba, Takahiro Hirofuchi, Ryousei Takano, Mitaro Namiki. A Software-based NVM Emulator Supporting Read/Write Asymmetric Latencies
2389 -- 2399Harunobu Daikoku, Hideyuki Kawashima, Osamu Tatebe. Skew-Aware Collective Communication for MapReduce Shuffling
2400 -- 2408Takahiro Nishimura, Jacir Luiz Bordim, Yasuaki Ito, Koji Nakano. Accelerating the Smith-Waterman Algorithm Using the Bitwise Parallel Bulk Computation Technique on the GPU
2409 -- 2412Yi Xian Yang, Kung-Jui Pai, Ruay Shiung Chang, Jou-Ming Chang. Constructing Two Completely Independent Spanning Trees in Balanced Hypercubes
2413 -- 0Hideaki Hata. Foreword
2414 -- 2422Hiroto Tanaka, Shinsuke Matsumoto, Shinji Kusumoto. A Study on the Current Status of Functional Idioms in Java
2423 -- 2432Toshiki Hirao, Raula Gaikovina Kula, Akinori Ihara, Kenichi Matsumoto. Understanding Developer Commenting in Code Reviews
2433 -- 2434Neunghoe Kim, Jongwook Jeong, ManSoo Hwang. Empirical Study on Improvements to Software Engineering Competences Using FLOSS
2435 -- 2440Kohei Yoshigami, Taishi Hayashi, Masateru Tsunoda, Hidetake Uwano, Shunichiro Sasaki, Kenichi Matsumoto. How Does Time Conscious Rule of Gamification Affect Coding and Review?
2441 -- 2450Dokeun Lee, Seongjin Lee, Youjip Won. CAWBT: NVM-Based B+Tree Index Structure Using Cache Line Sized Atomic Write
2451 -- 2460Taeho Hwang, Youjip Won. Copy-on-Write with Adaptive Differential Logging for Persistent Memory
2461 -- 2471Shuichiro Haruta, Hiromu Asahina, Fumitaka Yamazaki, Iwao Sasase. Hue Signature Auto Update System for Visual Similarity-Based Phishing Detection with Tolerance to Zero-Day Attack
2472 -- 2484Junjie Sun, Chenyi Zhuang, Qiang Ma 0001. User Transition Pattern Analysis for Travel Route Recommendation
2485 -- 2492Chao Zhang. m-Branched Enumeration for Generalized Linear Subspace Clustering
2493 -- 2503Umme Aymun Siddiqua, Abu Nowshed Chy, Masaki Aono. Tweet Stance Detection Using Multi-Kernel Convolution and Attentive LSTM Variants
2504 -- 2514Guodong Sun, Zhen Zhou, Yuan Gao, Yun Xu, Liang Xu, Song Lin. A Fast Fabric Defect Detection Framework for Multi-Layer Convolutional Neural Network Based on Histogram Back-Projection
2515 -- 2523Hirohito Shibata, Junko Ichino, Shun'ichi Tano, Tomonori Hashiyama. Rhythm Tap Technique for Cross-Device Interaction Enabling Uniform Operation for Various Devices
2524 -- 2534Hau-Dong Tsui. Trust, Perceived Useful, Attitude and Continuance Intention to Use E-Government Service: An Empirical Study in Taiwan
2535 -- 2546Yuki Hirose, Kazuaki Nakamura, Naoko Nitta, Noboru Babaguchi. Discrimination between Genuine and Cloned Gait Silhouette Videos via Autoencoder-Based Training Data Generation
2547 -- 2556Kazuya Ose, Kazunori Iwata 0002, Nobuo Suematsu. Sampling Shape Contours Using Optimization over a Geometric Graph
2557 -- 2567Ryo Masumura, Taichi Asami, Takanobu Oba, Sumitaka Sakauchi, Akinori Ito. Latent Words Recurrent Neural Network Language Models for Automatic Speech Recognition
2568 -- 2576Jinna Lv, Bin Wu, Yunlei Zhang, Yunpeng Xiao. Attentive Sequences Recurrent Network for Social Relation Recognition from Video
2577 -- 2586Dichao Liu, Yu Wang 0018, Jien Kato. Attention-Guided Spatial Transformer Networks for Fine-Grained Visual Recognition
2587 -- 2594Haitong Yang, Guangyou Zhou, Tingting He, Maoxi Li. Adversarial Domain Adaptation Network for Semantic Role Classification
2595 -- 2598Miao Tang, Juxiang Wang, Minjia Shi, Jing Liang. n
2599 -- 2602Dae Hyun Yum. Mathematical Analysis of Secrecy Amplification in Key Infection: The Whispering Mode
2603 -- 2606Tae-Gu Kang, Jinwoo Lee, Junyeng Kim, Dae Hyun Yum. + Verification
2607 -- 2610Wei Bai, Yuli Zhang, Meng Wang, Jin Chen, Han Jiang, Zhan Gao, Donglin Jiao. A Stackelberg Game-Theoretic Solution to Win-Win Situation: A Presale Mechanism in Spectrum Market
2611 -- 2614Yunjie Gu, Yuehang Ding, Yuxiang Hu. Joint Optimization of Delay Guarantees and Resource Allocation for Service Function Chaining
2615 -- 2618Kyungdeuk Ko, Jaihyun Park, David K. Han, Hanseok Ko. Channel and Frequency Attention Module for Diverse Animal Sound Classification
2619 -- 2623Yu Pan, Guyu Hu, Zhisong Pan, Shuaihui Wang, Dongsheng Shao. An Evolutionary Approach Based on Symmetric Nonnegative Matrix Factorization for Community Detection in Dynamic Networks
2624 -- 2627Lianqiang Li, Jie Zhu, Ming-Ting Sun. A Spectral Clustering Based Filter-Level Pruning Method for Convolutional Neural Networks
2628 -- 2631Jun Wang, Yulian Li, Zaiyu Pan. Hand-Dorsa Vein Recognition Based on Task-Specific Cross-Convolutional-Layer Pooling
2632 -- 2636Xiuzhen Chen, Xiaoyan Zhou, Cheng Lu, Yuan Zong, Wenming Zheng, Chuangao Tang. Target-Adapted Subspace Learning for Cross-Corpus Speech Emotion Recognition
2637 -- 2641Toan H. Vu, An Dang, Jia-Ching Wang. A Deep Neural Network for Real-Time Driver Drowsiness Detection
2642 -- 2645Toru Hiraoka, Kiichi Urahama. Acceleration Using Upper and Lower Smoothing Filters for Generating Oil-Film-Like Images
2646 -- 2650Jiannan Zhang, JiJun Zhou, Jianfeng Wu, Shengying Yang. SDChannelNets: Extremely Small and Efficient Convolutional Neural Networks

Volume 102-D, Issue 11

2082 -- 0Toshiaki Fujii. Foreword
2083 -- 2092Kazumi Takemura, Toshiyuki Yoshida. Depth from Defocus Technique Based on Cross Reblurring
2093 -- 2100Akira Kubota, Kazuya Kodama, Asami Ito. Cauchy Aperture and Perfect Reconstruction Filters for Extending Depth-of-Field from Focal Stack
2101 -- 2109Gou Houben, Shu Fujita, Keita Takahashi, Toshiaki Fujii. Fast and Robust Disparity Estimation from Noisy Light Fields Using 1-D Slanted Filters
2110 -- 2119Koji Komatsu, Kohei Isechi, Keita Takahashi, Toshiaki Fujii. Light Field Coding Using Weighted Binary Images
2120 -- 2126Qing Yu, Masashi Anzawa, Sosuke Amano, Kiyoharu Aizawa. Personalized Food Image Classifier Considering Time-Dependent and Item-Dependent Food Distribution
2127 -- 2134Wakaki Hattori, Shigeru Yamashita. Mapping a Quantum Circuit to 2D Nearest Neighbor Architecture by Changing the Gate Order
2135 -- 2147Xiaole Li, Hua Wang, Shanwen Yi, Linbo Zhai. Progressive Forwarding Disaster Backup among Cloud Datacenters
2148 -- 2158Xuan Wang, Bofeng Zhang, Mingqing Huang, Furong Chang, Zhuocheng Zhou. Improved LDA Model for Credibility Evaluation of Online Product Reviews
2159 -- 2175Yuan Zhou, Yuichi Goto, Jingde Cheng. QSL: A Specification Language for E-Questionnaire, E-Testing, and E-Voting Systems
2176 -- 2183Satoshi Fujita. Peer-to-Peer Video Streaming of Non-Uniform Bitrate with Guaranteed Delivery Hops
2184 -- 2194Yuki Taguchi, Ryota Kawashima, Hiroki Nakayama, Tsunemasa Hayashi, Hiroshi Matsuo. Fast Datapath Processing Based on Hop-by-Hop Packet Aggregation for Service Function Chaining
2195 -- 2204Mingu Kim, Seungwoo Hong, Il Hong Suh. Personalized Trip Planning Considering User Preferences and Environmental Variables with Uncertainty
2205 -- 2213Makoto Kirihata, Qiang Ma 0001. A Trend-Shift Model for Global Factor Analysis of Investment Products
2214 -- 2220Can Chen, Chao Zhou, Jian Liu, Dengyin Zhang. Multi-Hypothesis Prediction Scheme Based on the Joint Sparsity Model
2221 -- 2229Houari Sabirin, Hitoshi Nishimura, Sei Naito. Synchronized Tracking in Multiple Omnidirectional Cameras with Overlapping View
2230 -- 2237Yusheng Zhang, Zhiheng Zhou, Bo Li, Yu Huang, Junchu Huang, Zengqun Chen. Improving Slice-Based Model for Person Re-ID with Multi-Level Representation and Triplet-Center Loss
2238 -- 2248Xinbo Ren, Haiyuan Wu, Qian Chen, Toshiyuki Imai, Takashi Kubo, Takashi Akasaka. in-vivo Atherosclerotic Plaques in Intravascular Optical Coherence Tomography
2249 -- 2252Chen Chang, Jianjun Cao, Qin Feng, Nianfeng Weng, Yuling Shang. Truth Discovery of Multi-Source Text Data
2253 -- 2256Pilsung Kang 0003. Accelerating Stochastic Simulations on GPUs Using OpenCL
2257 -- 2260Zhengqiang Wang, Kunhao Huang, Xiaoyu Wan, Zi-fu Fan. Optimal Price-Based Power Allocation Algorithm with Quality of Service Constraints in Non-Orthogonal Multiple Access Networks
2261 -- 2264Ohmin Kwon, Hyun Kwon, Hyunsoo Yoon. Rootkit inside GPU Kernel Execution
2265 -- 2266Motohiro Takagi, Akito Sakurai, Masafumi Hagiwara. Discriminative Convolutional Neural Network for Image Quality Assessment with Fixed Convolution Filters
2267 -- 2271Zuopeng Zhao, Hongda Zhang, Yi Liu, Nana Zhou, Han Zheng, Shanyi Sun, Xiaoman Li, Sili Xia. Prediction-Based Scale Adaptive Correlation Filter Tracker
2272 -- 2275Menghan Jia, Feiteng Li, Zhijian Chen, Xiaoyan Xiang, Xiaolang Yan. High Noise Tolerant R-Peak Detection Method Based on Deep Convolution Neural Network
2276 -- 2279Seokjin Lee. Estimation of the Matrix Rank of Harmonic Components of a Spectrogram in a Piano Music Signal Based on the Stein's Unbiased Risk Estimator and Median Filter

Volume 102-D, Issue 10

1891 -- 1901Meijun Duan, Hongyu Yang, Bo Yang, Xiping Wu, Haijun Liang. Hybridizing Dragonfly Algorithm with Differential Evolution for Global Optimization
1902 -- 1915Hongyeon Kim, Jun-Ki Min. An Efficient Parallel Triangle Enumeration on the MapReduce Framework
1916 -- 1924Li Huang, Xiao Zheng, Shuai Ding, Zhi Liu, Jun Huang. Enhancing the Performance of Cuckoo Search Algorithm with Multi-Learning Strategies
1925 -- 1941Thiem Van Chu, Kenji Kise. LEF: An Effective Routing Algorithm for Two-Dimensional Meshes
1942 -- 1951Lianpeng Li, Jian Dong, Decheng Zuo, Yao Zhao, Tianyang Li. SLA-Aware and Energy-Efficient VM Consolidation in Cloud Data Centers Using Host State Binary Decision Tree Prediction Model
1952 -- 1965Bao Trung Chu, Kenji Hashimoto, Hiroyuki Seki. Quantifying Dynamic Leakage - Complexity Analysis and Model Counting-based Calculation -
1966 -- 1975Yiheng Jian, Xiao Yu, Zhou Xu, Ziyi Ma. A Hybrid Feature Selection Method for Software Fault Prediction
1976 -- 1992Taeho Kang, Sangwoo Ji, Hayoung Jeong, Bin Zhu, Jong Kim 0001. WearAuth: Wristwear-Assisted User Authentication for Smartphones Using Wavelet-Based Multi-Resolution Analysis
1993 -- 2003Qing Tong, Yunfei Guo, Hongchao Hu, Wenyan Liu, Guozhen Cheng, Ling-shu Li. A Diversity Metric Based Study on the Correlation between Diversity and Security
2004 -- 2012Hongcui Wang, Shanshan Liu, Di Jin, Lantian Li, Jianwu Dang. Scalable Community Identification with Manifold Learning on Speaker I-Vector Space
2013 -- 2024Zhiyu Shao, Juan Wu, Qiangqiang Ouyang. Analysis of Relevant Quality Metrics and Physical Parameters in Softness Perception and Assessment System
2025 -- 2032Ryo Abiko, Masaaki Ikehara. Fast Edge Preserving 2D Smoothing Filter Using Indicator Function
2033 -- 2042Bold Naranchimeg, Chao Zhang, Takuya Akashi. Cross-Domain Deep Feature Combination for Bird Species Classification with Audio-Visual Data
2043 -- 2046Jae Young Hur. Block Level TLB Coalescing for Buddy Memory Allocator
2047 -- 2050Jianfeng Wu, Huibin Qin, YongZhu Hua, LiHuan Shao, Ji Hu, Shengying Yang. Vector Quantization of High-Dimensional Speech Spectra Using Deep Neural Network
2051 -- 2054Se-Min Lim, Jooyoung Park, Hyeong-Cheol Oh. Low-Cost Method for Recognizing Table Tennis Activity
2055 -- 2058Yingwei Fu, Kele Xu, Haibo Mi, Qiuqiang Kong, Dezhi Wang, Huaimin Wang, Tie Hong. Multi Model-Based Distillation for Sound Event Detection
2059 -- 2063Yanfang Ding, Yang Xue. A Deep Learning Approach to Writer Identification Using Inertial Sensor Data of Air-Handwriting
2064 -- 2066Kazuki Kaya, Hiroki Mori. Effectiveness of Speech Mode Adaptation for Improving Dialogue Speech Synthesis
2067 -- 2071Peng Chen, Weijun Li, Linjun Sun, Xin-ning, Lina Yu, Liping Zhang. LGCN: Learnable Gabor Convolution Network for Human Gender Recognition in the Wild
2072 -- 2076Rui Sun 0004, Huihui Wang, Jun Zhang, Xudong Zhang. Attention-Guided Region Proposal Network for Pedestrian Detection
2077 -- 2081Haoyang Yu, Wei An, Ran Zhu, Ruibin Guo. A Hypergraph Matching Labeled Multi-Bernoulli Filter for Group Targets Tracking

Volume 102-D, Issue 1

1 -- 0Keiichi Iwamura. Foreword
2 -- 10Kenta Iida, Hitoshi Kiya. Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images
11 -- 18Tatsuya Chuman, Kenta Iida, Warit Sirichotedumrong, Hitoshi Kiya. Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems
19 -- 30Ippei Hamamoto, Masaki Kawamura. Image Watermarking Technique Using Embedder and Extractor Neural Networks
31 -- 40Hiroshi Ito, Tadashi Kasezawa. Permutation-Based Signature Generation for Spread-Spectrum Video Watermarking
41 -- 47Minoru Kuribayashi, Takuya Fukushima, Nobuo Funabiki. Robust and Secure Data Hiding for PDF Text Document
48 -- 51Duc V. Nguyen, Huyen T. T. Tran, Truong Cong Thang. Adaptive Tiling Selection for Viewport Adaptive Streaming of 360-degree Video
52 -- 74Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa. Accelerating Large-Scale Interconnection Network Simulation by Cellular Automata Concept
75 -- 84Haijin Ji, Song Huang, Xuewei Lv, Yaning Wu, Yuntian Feng. Empirical Studies of a Kernel Density Estimation Based Naive Bayes Method for Software Defect Prediction
85 -- 92Guo-chao Fan, Chunsheng Hu, Xue-en Zheng, Cheng-Dong Xu. A Semantic Management Method of Simulation Models in GNSS Distributed Simulation Environment
93 -- 103Daisuke Yamamoto, Masaki Murase, Naohisa Takahashi. On-Demand Generalization of Road Networks Based on Facility Search Results
104 -- 115Yasser F. O. Mohammad, Kazunori Matsumoto, Keiichiro Hoashi. Selecting Orientation-Insensitive Features for Activity Recognition from Accelerometers
116 -- 123Yeong-Mo Yeon, Seung Hee Kim. Design of High-Speed Easy-to-Expand CC-Link Parallel Communication Module Based on R-IN32M3
124 -- 132Amin Jamali, Seyed Mostafa Safavi Hemami, Mehdi Berenjkoub, Hossein Saidi, Masih Abedini. A High Throughput Device-to-Device Wireless Communication System
133 -- 146Juan Chen, Shen Su, Xianzhi Wang 0001. Towards Privacy-Preserving Location Sharing over Mobile Online Social Networks
147 -- 155ZhiMing Wu, Tao Lin, Ming Li. Automated Detection of Children at Risk of Chinese Handwriting Difficulties Using Handwriting Process Information: An Exploratory Study
156 -- 164Siyang Yu, Kazuaki Kondo, Yuichi Nakamura, Takayuki Nakajima, Hiroaki Nanjo, Masatake Dantsuji. Visual Emphasis of Lip Protrusion for Pronunciation Learning
165 -- 174Takuya Kamitani, Hiroki Yoshimura, Masashi Nishiyama, Yoshio Iwai. Temporal and Spatial Analysis of Local Body Sway Movements for the Identification of People
175 -- 184Chenggang Guo, Dongyi Chen, Zhiqi Huang. Real-Time Sparse Visual Tracking Using Circulant Reverse Lasso Model
185 -- 194Yotaro Fuse, Hiroshi Takenouchi, Masataka Tokumaru. A Robot Model That Obeys a Norm of a Human Group by Participating in the Group and Interacting with Its Members
195 -- 197Hyun-Chul Yi, Joon-Young Choi. Cycle Time Improvement of EtherCAT Networks with Embedded Linux-Based Master
198 -- 201Yan Sun, Guorui Feng, Yanli Ren. JPEG Steganalysis Based on Multi-Projection Ensemble Discriminant Clustering
202 -- 205Yilu Ma, Zhihui Ye, Yuehua Li. Millimeter-Wave Radar Target Recognition Algorithm Based on Collaborative Auto-Encoder
206 -- 209Tie Hong, Yuan Wei Li, Zhiying Wang. Real-Time Head Action Recognition Based on HOF and ELM
210 -- 213Jaihyun Park, Bonhwa Ku, Youngsaeng Jin, Hanseok Ko. Side Scan Sonar Image Super Resolution via Region-Selective Sparse Coding
214 -- 218Ruibin Guo, Dongxiang Zhou, Keju Peng, Yunhui Liu. Fast Visual Odometry Based Sparse Geometric Constraint for RGB-D Camera
219 -- 222Jun Ou, Yujian Li. Symmetric Decomposition of Convolution Kernels