Journal: IEICE Transactions

Volume 92-D, Issue 9

1609 -- 1619Kengo Terasawa, Yuzuru Tanaka. Approximate Nearest Neighbor Search for a Dataset of Normalized Vectors
1620 -- 1627Shuichi Miyazaki, Naoyuki Morimoto, Yasuo Okabe. The Online Graph Exploration Problem on Restricted Graphs
1628 -- 1638Amir Sabbagh Molahosseini, Chitra Dadkhah, Keivan Navi, Mohammad Eshghi. Efficient MRC-Based Residue to Binary Converters for the New Moduli Sets {2:::2::::n:::::::, 2:::::::n::::::: -1, 2:::::::n::::+1::: -1} and {2:::2::::n:::::::, 2:::::::n::::::: -1, 2:::::::n::::-1::: -1}
1639 -- 1649Junkil Ryu, Chanik Park. Effects of Data Scrubbing on Reliability in Storage Systems
1650 -- 1656Iver Stubdal, Arda Karaduman, Hideharu Amano. Code Compression with Split Echo Instructions
1657 -- 1667Jianfeng Xu, Haruhisa Kato, Akio Yoneyama. Content-Based Retrieval of Motion Capture Data Using Short-Term Feature Extraction
1668 -- 1674Shu-Ling Shieh, I-En Liao. A New Clustering Validity Index for Cluster Analysis Based on a Two-Level SOM
1675 -- 1682Yun Ge, Guojun Wang, Qing Zhang, Minyi Guo. Multipath Routing with Reliable Nodes in Large-Scale Mobile Ad-Hoc Networks
1683 -- 1691Xiaolei Zhou, Xiangshi Ren. A Comparison of Pressure and Tilt Input Techniques for Cursor Control
1692 -- 1701Wen-Bing Horng, Chun-Wen Chen. Revision of Using Eigenvalues of Covariance Matrices in Boundary-Based Corner Detection
1702 -- 1715Yoichiro Baba, Akira Hirose. Spectral Fluctuation Method: A Texture-Based Method to Extract Text Regions in General Scene Images
1716 -- 1724Changliang Liu, Fuping Pan, Fengpei Ge, Bin Dong, Hongbin Suo, YongHong Yan. An LVCSR Based Reading Miscue Detection System Using Knowledge of Reference and Error Patterns
1725 -- 1735Bing-Fei Wu, Chuan-Tsai Lin, Yen-Lin Chen. Range and Size Estimation Based on a Coordinate Transformation Model for Driving Assistance Systems
1736 -- 1744Mehdi Chehel Amirani, Ali Asghar Beheshti Shirazi. A New Approach to Rotation Invariant Texture Analysis Based on Radon Transform
1745 -- 1751Masaki Yamazaki, Sidney Fels. Local Image Descriptors Using Supervised Kernel ICA
1752 -- 1761Hayato Kobayashi, Tsugutoyo Osaki, Tetsuro Okuyama, Joshua Gramm, Akira Ishino, Ayumi Shinohara. Development of an Interactive Augmented Environment and Its Application to Autonomous Learning for Quadruped Robots
1762 -- 1770Hirofumi Yamamoto, Hideo Okuma, Eiichiro Sumita. Imposing Constraints from the Source Tree on ITG Constraints for SMT
1771 -- 1782Ryuichiro Higashinaka, Mikio Nakano. Ranking Multiple Dialogue States by Corpus Statistics to Improve Discourse Understanding in Spoken Dialogue Systems
1783 -- 1786Sang-Hyuk Lee, Keun Ho Ryu, Gyoyong Sohn. Study on Entropy and Similarity Measure for Fuzzy Set
1787 -- 1790Hyeon Gyu Kim, Woo-Lam Kang, Yoon-Joon Lee, Myoung-Ho Kim. Efficient Predicate Matching over Continuous Data Streams
1791 -- 1793Byounghee Son, Youngchoong Park, Euiseok Nahm. Implementation of Both High-Speed Transmission and Quality of System for Internet Protocol Multicasting Services
1794 -- 1797Kihyeon Kim, Hanseok Ko. Robust Relative Transfer Function Estimation for Dual Microphone-Based Generalized Sidelobe Canceller
1798 -- 1802Xiang Xiao, Xiang Zhang, Haipeng Wang, Hongbin Suo, QingWei Zhao, YongHong Yan. Approximate Decision Function and Optimization for GMM-UBM Based Speaker Verification
1803 -- 1806Zhen Sun, Zhe-Ming Lu, Hao Luo. Color Image Retrieval Based on Distance-Weighted Boundary Predictive Vector Quantization Index Histograms
1807 -- 1810Chang Sik Son, Suk Tae Seo, In Keun Lee, Hye Cheun Jeong, Soon Hak Kwon. Threshold Selection Based on Interval-Valued Fuzzy Sets
1811 -- 1814Yingjun Tang, De Xu, Xu Yang, Qifang Liu. Natural Scene Classification Based on Integrated Topic Simplex
1815 -- 1818Li Lu, Pengfei Shi. Fusion of Multiple Facial Features for Age Estimation

Volume 92-D, Issue 8

1515 -- 1522Tatjana Kapus. Using Mobile TLA as a Logic for Dynamic I/O Automata
1523 -- 1533Junbo Chen, Bo Zhou, Xinyu Wang, Yiqun Ding, Lu Chen. Mining Noise-Tolerant Frequent Closed Itemsets in Very Large Database
1534 -- 1541Shuangyu Ruan, Kazuteru Namba, Hideo Ito. Construction of Soft-Error-Tolerant FF with Wide Error Pulse Detecting Capability
1542 -- 1550Vera Sheinman, Takenobu Tokunaga. AdjScales: Visualizing Differences between Adjectives for Language Learners
1551 -- 1560Mitsuru Kakimoto, Hisaaki Hatano, Yosoko Nishizawa. Forecasting the View of Mt. Fuji Using Earth Observation Data
1561 -- 1569Mehdi Ezoji, Karim Faez. Illumination-Robust Face Recognition from a Single Image per Person Using Matrix Polar Decomposition
1570 -- 1573Masahiro Kimoto, Tatsuhiro Tsuchiya, Tohru Kikuno. On the Time Complexity of Dijkstra s Three-State Mutual Exclusion Algorithm
1574 -- 1576Hae Young Lee, Tae Ho Cho. Fuzzy-Based Path Selection Method for Improving the Detection of False Reports in Sensor Networks
1577 -- 1579Itaru Kataoka, Tetsuo Moriya. d-Primitive Words and D(1)-Concatenated Words
1580 -- 1583Kai-Jie Zheng, Ji-Gen Peng, Shi-Hui Ying. A New Approach to Weighted Graph Matching
1584 -- 1587Tacksung Choi, Sunkuk Moon, Young-Cheol Park, Dae Hee Youn, Seokpil Lee. A GMM-Based Feature Selection Algorithm for Multi-Class Classification
1588 -- 1591Shigang Li, Ying Hai. Fast Generation of View-Direction-Free Perspective Display from Distorted Fisheye Image
1592 -- 1595Yimin Zhou, Ling Tian. Coding Complexity Prediction for H.264/AVC Rate Control
1596 -- 1600Chuan Cao, Ming Li, Xiao Wu, Hongbin Suo, Jian Liu, YongHong Yan. Automatic Singing Performance Evaluation for Untrained Singers

Volume 92-D, Issue 7

1337 -- 0Takio Kurita. Foreword
1338 -- 1353Hisashi Kashima, Tsuyoshi Idé, Tsuyoshi Kato, Masashi Sugiyama. Recent Advances and Trends in Large-Scale Kernel Methods
1354 -- 1361Keisuke Kameyama. Particle Swarm Optimization - A Survey
1362 -- 1368Kazuho Watanabe, Hiroyuki Tanaka, Keiji Miura, Masato Okada. Transfer Matrix Method for Instantaneous Spike Rate Estimation
1369 -- 1381Chowdhury Farhan Ahmed, Syed Khairuzzaman Tanbeer, Byeong-Soo Jeong, Young-Koo Lee. An Efficient Algorithm for Sliding Window-Based Weighted Frequent Pattern Mining over Data Streams
1382 -- 1387Shin ya Nakano, Tomoyuki Higuchi. Estimation of a Long-Term Variation of a Magnetic-Storm Index Using the Merging Particle Filter
1388 -- 1396Takashi Ohkubo, Kazuhiro Tokunaga, Tetsuo Furukawa. RBF×SOM: An Efficient Algorithm for Large-Scale Multi-System Learning
1397 -- 1400Jiancheng Sun, Chongxun Zheng, Xiaohe Li. Distance between Two Classes: A Novel Kernel Class Separability Criterion
1401 -- 1411Masaki Nakamura, Kazuhiro Ogata, Kokichi Futatsugi. User-Defined On-Demand Matching
1412 -- 1420Shan Ding, Hiroyuki Tomiyama, Hiroaki Takada. Effective Scheduling Algorithms for I/O Blocking with a Multi-Frame Task Model
1421 -- 1428Hong Kyu Park, Won Suk Lee. Adaptive Continuous Query Reoptimization over Data Streams
1429 -- 1434Tae-Hyung Kwon, Hyeon Gyu Kim, Myoung-Ho Kim, Jin Hyun Son. AMJoin: An Advanced Join Algorithm for Multiple Data Streams Using a Bit-Vector Hash Table
1435 -- 1441Eonpyo Hong, Eun-Gu Jung, Junhee Hong, Jaewon Yim, Dongsoo Har. Parallel Parity Checksum and Syndrome Generation for Digital Video and Audio Transmission over Cable Channel
1442 -- 1452Yuichi Taguchi, Keita Takahashi, Takeshi Naemura. Design and Implementation of a Real-Time Video-Based Rendering System Using a Network Camera Array
1453 -- 1461Keita Fukuda, Tetsuya Takiguchi, Yasuo Ariki. Graph Cuts Segmentation by Using Local Texture Features of Multiresolution Analysis
1462 -- 1465YongJoon Kim, Myung-Hoon Yang, Jaeseok Park, Eunsei Park, Sungho Kang. Grouped Scan Slice Repetition Method for Reducing Test Data Volume and Test Application Time
1466 -- 1469Shan Guo Quan, Young Yong Kim. Optimal Number of Active Users for Minimizing Average Data Delivery Delay in People-Centric Urban Sensing
1470 -- 1474Kewang Zhang, Deyun Zhang. A Reliable and Efficient Broadcasting Scheme for Mobile Ad Hoc Networks
1475 -- 1478Jong Hyeon Yun, Yong Hun Park, Dong Min Seo, Seok Jae Lee, Jae Soo Yoo. Design and Implementation of a Metadata Management Scheme for Large Distributed File Systems
1479 -- 1483Chano Kim, SeungJae Shin, Chanil Park, Hyunsoo Yoon. A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks
1484 -- 1487Kazuki Kondo, Seiji Hotta. Color Image Classification Using Block Matching and Learning
1488 -- 1490Hwai-Tsu Hu, Chu Yu. Combining HMM and Weighted Deviation Linear Transformation for Highband Speech Parameter Estimation
1491 -- 1495Kye-Hwan Lee, Joon-Hyuk Chang. Acoustic Environment Classification Based on SMV Speech Codec Parameters for Context-Aware Mobile Phone
1496 -- 1499Yiwei Jiang, De Xu, Na Liu, Congyan Lang. Moving Object Completion on the Compressed Domain
1500 -- 1502Daewoong Kim, Kilhyung Cha, Soo-Ik Chae. Adaptive Scanline Filling Algorithm for OpenVG 2D Vector Graphics Accelerator
1503 -- 1506Jun Inagaki, Toshitada Mizuno, Tomoaki Shirakawa, Tetsuo Shimono. A General-Purpose Path Generation Method Using Genetic Algorithms
1507 -- 1510Takashi Watanabe, Tomoya Masuko, Achmad Arifin. Preliminary Tests of a Practical Fuzzy FES Controller Based on Cycle-to-Cycle Control in the Knee Flexion and Extension Control

Volume 92-D, Issue 6

1225 -- 1231Kazuya Matsumoto, Stanislav G. Sedukhin. A Solution of the All-Pairs Shortest Paths Problem on the Cell Broadband Engine Processor
1232 -- 1239Makoto Yasuda, Takeshi Furuhashi. Fuzzy Entropy Based Fuzzy c-Means Clustering with Deterministic and Simulated Annealing Methods
1240 -- 1249Jae-Woo Chang, Jung-Ho Um. A New Signature-Based Indexing Scheme for Efficient Trajectory Retrieval in Spatial Networks
1250 -- 1259Takafumi Matsuo, Tatsuhiro Tsuchiya, Tohru Kikuno. Feature Interaction Verification Using Unbounded Model Checking with Interpolation
1260 -- 1267Chan-Gun Lee, Aloysius K. Mok, Prabhudev Konana. Online Timing Correlation of Streaming Data with Uncertain Timestamps
1268 -- 1279Takamichi Saito. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
1280 -- 1288Naoko Nitta, Noboru Babaguchi. User and Device Adaptation in Summarizing Sports Videos
1289 -- 1295Pablo Garcia Trigo, Henry Johan, Takashi Imagire, Tomoyuki Nishita. Interactive Region Matching for 2D Animation Coloring Based on Feature s Variation
1296 -- 1303Ruiqi Guo, Shinichiro Omachi, Hirotomo Aso. Segmenting Shape Using Deformation Information
1304 -- 1311Alexis Andre, Suguru Saito, Masayuki Nakajima. Single-View Sketch Based Surface Modeling
1312 -- 1315Mitsuharu Matsumoto, Shuji Hashimoto. Estimation of Optimal Parameter in epsilon-Filter Based on Signal-Noise Decorrelation
1316 -- 1319Choonhwa Lee, Seungjae Lee, Eunsam Kim, Wonjun Lee. Cross-Domain Service Composition in OSGi Environments
1320 -- 1323Kihyeon Kim, Hanseok Ko. Optimal Gain Filter Design for Perceptual Acoustic Echo Suppressor
1324 -- 1327Shih-Hsuan Yang, Bo-Yuan Chen, Kuo-Hsin Wang. H.264 Fast Inter-Mode Selection Based on Coded Block Patterns
1328 -- 1330Yuka Minegishi, Takashi Watanabe, Makoto Yoshizawa. A Basic Study on Stimulation Pulse Width Determination for Dynamic Presentation of Electrocutaneous Sensation Patterns

Volume 92-D, Issue 5

765 -- 0Kouichi Sakurai. Foreword
766 -- 776Heung-Youl Youm. Extensible Authentication Protocol Overview and Its Applications
777 -- 786Hsiao-Chien Tsai, Nai-Wei Lo, Tzong-Chen Wu. A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks
787 -- 798Koji Nakao, Daisuke Inoue, Masashi Eto, Katsunari Yoshioka. Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
799 -- 809Yong Tang, Jiaqing Luo, Bin Xiao, Guiyi Wei. Concept, Characteristics and Defending Mechanism of Worms
810 -- 817Youngho Park, Kyung Hyune Rhee. An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET
818 -- 825Tae Dempsey, Gokhan Sahin, Yu T. Morton. Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks
826 -- 835Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori. Development of Single Sign-On System with Hardware Token and Key Management Server
836 -- 850Sachiko Yoshihama, Takaaki Tateishi, Naoshi Tabuchi, Tsutomu Matsumoto. Information-Flow-Based Access Control for Web Browsers
851 -- 858Su-Wan Park, Sang Uk Shin. An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding
859 -- 875Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai. A Trade-off Traitor Tracing Scheme
876 -- 887Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshitaka Morimura, Michihiko Minoh. Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs
888 -- 896Rui Zhang 0002, Hideki Imai. Combining Public Key Encryption with Keyword Search and Public Key Encryption
897 -- 908Kouichi Itoh, Dai Yamamoto, Jun Yajima, Wakaha Ogata. Collision-Based Power Attack for RSA with Small Public Exponent
909 -- 917Masaaki Shirase, Yukinori Miyazaki, Tsuyoshi Takagi, Dong-Guk Han, Dooho Choi. Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
918 -- 928Seog Chung Seo, Dong-Guk Han, Seokhie Hong. TinyECCK16: An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes
929 -- 936Ping Du, Shunji Abe, Yusheng Ji, Seisho Sato, Makio Ishiguro. A Traffic Decomposition and Prediction Method for Detecting and Tracing Network-Wide Anomalies
937 -- 944Jun Bi. A Trust Ranking Method to Prevent IM Spam
945 -- 954Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao. Automated Malware Analysis System and Its Sandbox for Revealing Malware s Internal and External Activities
955 -- 966Katsunari Yoshioka, Daisuke Inoue, Masashi Eto, Yuji Hoshizawa, Hiroki Nogawa, Koji Nakao. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
967 -- 970Yang Cui, Goichiro Hanaoka, Hideki Imai. CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
971 -- 0Yukiyoshi Kameyama. Foreword
972 -- 984Tasuku Nishihara, Takeshi Matsumoto, Masahiro Fujita. Word-Level Equivalence Checking in Bit-Level Accuracy by Synthesizing Designs onto Identical Datapath
985 -- 994Bijan Alizadeh, Masahiro Fujita. A Unified Framework for Equivalence Verification of Datapath Oriented Applications
995 -- 1002Yoshinori Tanabe, Toshifusa Sekizawa, Yoshifumi Yuasa, Koichi Takahashi. Pre- and Post-Conditions Expressed in Variants of the Modal µ-Calculus
1003 -- 1011Toshifusa Sekizawa, Tatsuhiro Tsuchiya, Koichi Takahashi, Tohru Kikuno. Probabilistic Model Checking of the One-Dimensional Ising Model
1012 -- 1021Masaki Nakamura, Takahiro Seino. Generating Test Cases for Invariant Properties from Proof Scores in the OTS/CafeOBJ Method
1022 -- 1032Kenji Hashimoto, Kimihide Sakano, Fumikazu Takasuka, Yasunori Ishihara, Toru Fujiwara. Verification of the Security against Inference Attacks on XML Databases
1033 -- 1036Yoshiaki Takata, Hiroyuki Seki. Comparison of the Expressive Power of Language-Based Access Control Models
1037 -- 1048Behrooz Safarinejadian, Mohammad B. Menhaj, Mehdi Karrari. A Distributed Variational Bayesian Algorithm for Density Estimation in Sensor Networks
1049 -- 1061Thinh Ngoc Tran, Surin Kittitornkun, Shigenori Tomiyama. PAMELA: Pattern Matching Engine with Limited-Time Update for NIDS/NIPS
1062 -- 1078M. M. Hafizur Rahman, Yasushi Inoguchi, Yukinori Sato, Susumu Horiguchi. TTN: A High Performance Hierarchical Interconnection Network for Massively Parallel Computers
1079 -- 1092Umaporn Supasitthimethee, Toshiyuki Shimizu, Masatoshi Yoshikawa, Kriengkrai Porkaew. XSemantic: An Extension of LCA Based XML Semantic Search
1093 -- 1102Yoichi Yamada, Ken-ichi Hirotani, Kenji Satou, Ken-ichiro Muramoto. An Identification Method of Data-Specific GO Terms from a Microarray Data Set
1103 -- 1124Yi Wang, Liang Dong, Taotao Liang, Xinyu Yang, Deyun Zhang. Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks
1125 -- 1136Tomoko Izumi, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa. A Biologically Inspired Self-Adaptation of Replica Density Control
1137 -- 1145Dongwen Ying, Masashi Unoki, Xugang Lu, Jianwu Dang. Speech Enhancement Based on Noise Eigenspace Projection
1146 -- 1158Umapada Pal, Kaushik Roy, Fumitaka Kimura. A Lexicon-Driven Handwritten City-Name Recognition Scheme for Indian Postal Automation
1159 -- 1167Ali M. Fotouhi, Abolghasem Raie. An Efficient Local Stereo Matching Algorithm for Dense Disparity Map Estimation Based on More Effective Use of Intensity Information and Matching Constraints
1168 -- 1176Hiroto Nagayoshi, Yoshitaka Hiramatsu, Hiroshi Sako, Mitsutoshi Himaga, Satoshi Kato. Detection of Fundus Lesions Using Classifier Selection
1177 -- 1180Choonhwa Lee, Sunghoon Ko, Eunsam Kim, Wonjun Lee. Enriching OSGi Service Composition with Web Services
1181 -- 1185Chul-Woong Yang, Ki Yong Lee, Myoung-Ho Kim, Yoon-Joon Lee. Dynamic Forest: An Efficient Index Structure for NAND Flash Memory
1186 -- 1189Yong Zhang, Shensheng Zhang, Songqiao Han. A Fuzzy Control-Based Service Configuration Approach for Ubiquitous Computing Applications
1190 -- 1193Do Hyun Kim, Kyoung-Ho Choi, Kyeong Tae Kim, Ki-Joune Li. A Feasibility Study on Crash Avoidance at Four-Way Stop-Sign-Controlled Intersections Using Wireless Sensor Networks
1194 -- 1196Helena Rifà-Pous, Jordi Herrera-Joancomartí. Cryptographic Energy Costs Are Assumable in Ad Hoc Networks
1197 -- 1199Teng Lin, Jianhua Feng, Dunshan Yu. Application-Dependent Interconnect Testing of Xilinx FPGAs Based on Line Branches Partitioning
1200 -- 1203Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong-Hoon Lee. Searchable Encryption with ::::Keyword-Recoverability::::
1204 -- 1208Masashi Sugiyama. On Computational Issues of Semi-Supervised Local Fisher Discriminant Analysis
1209 -- 1212Yihang Bo, Siwei Luo, Qi Zou. Salient Edge Detection in Natural Images
1213 -- 1217Jeunghyun Byun, So-Young Park, Seung Wook Lee, Hae-Chang Rim. Three-Phase Text Error Correction Model for Korean SMS Messages
1218 -- 1221Aamir Saeed Malik, Tae-Sun Choi. Differentiating Honeycombed Images from Normal HRCT Lung Images

Volume 92-D, Issue 4

563 -- 574Yu Wu, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa. Distributed Construction Protocols of Probabilistic Degree-Weighted Peer-to-Peer Overlays
575 -- 583Daihan Wang, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano. A Link Removal Methodology for Application-Specific Networks-on-Chip on FPGAs
584 -- 593Vladimir V. Stankovic, Nebojsa Z. Milenkovic. DRAM Controller with a Complete Predictor
594 -- 607Nobutaka Suzuki, Yuji Fukushima. An XML Transformation Algorithm Inferred from an Update Script between DTDs
608 -- 619Pao Sriprasertsuk, Wataru Kameyama. Information Distribution Analysis Based on Human s Behavior State Model and the Small-World Network
620 -- 629Dongseung Shin, Dongkyun Kim. 3DMRP: 3-Directional Zone-Disjoint Multipath Routing Protocol
630 -- 641Tomoko Kojiri, Yosuke Murase, Toyohide Watanabe. Diagram-Based Support for Collaborative Learning in Mathematical Exercise
642 -- 652Lina, Tomokazu Takahashi, Ichiro Ide, Hiroshi Murase. Incremental Unsupervised-Learning of Appearance Manifold with View-Dependent Covariance Matrix for Face Recognition from Video Sequences
653 -- 661Hyun-Il Choi, Jin Hyung Kim. Probabilistic Synthesis of Personal-Style Handwriting
662 -- 670Yasunari Obuchi, Nobuo Hataoka. Multi-Input Feature Combination in the Cepstral Domain for Practical Speech Recognition Systems
671 -- 680Mohammad Nurul Huda, Hiroaki Kawashima, Tsuneo Nitta. Distinctive Phonetic Feature (DPF) Extraction Based on MLNs and Inhibition/Enhancement Network
681 -- 688Chia-Cheng Lo, Ying-Jhong Zeng, Ming-Der Shieh. Design of a High-Throughput CABAC Encoder
689 -- 704Hasan S. M. Al-Khaffaf, Abdullah Zawawi Talib, Rosalina Abdul Salam. Enhancing Salt-and-Pepper Noise Removal in Binary Images of Engineering Drawing
705 -- 716Kyoungsik Kim, Hiroyuki Kambara, Duk Shin, Yasuharu Koike. Learning and Control Model of the Arm for Loading
717 -- 722Jun Hasegawa, Kenji Kobayashi. Genesis of the Mechanical Heart Valves Ultrasonic Closing Clicks
723 -- 726Wan Yeon Lee, Kyungwoo Lee, Kyong Hoon Kim, Young Woong Ko. Processor-Minimum Scheduling of Real-Time Parallel Tasks
727 -- 731Dong Kim, Kwanhu Bang, Seung-Hwan Ha, Chanik Park, Sung Woo Chung, Eui-Young Chung. Solid-State Disk with Double Data Rate DRAM Interface for High-Performance PCs
732 -- 735Chul-Woong Yang, Ki Yong Lee, Yon Dohn Chung, Myoung-Ho Kim, Yoon-Joon Lee. An Effective Self-Adaptive Admission Control Algorithm for Large Web Caches
736 -- 739Jung-Tae Lee, Young-In Song, Hae-Chang Rim. Computing Word Semantic Relatedness for Question Retrieval in Community Question Answering
740 -- 741Weijia Yang. Privacy Protection by Matrix Transformation
742 -- 745Taejin Ahn, Taejoon Park. A Bio-Inspired Approach to Alarm Malware Attacks in Mobile Handsets
746 -- 749Xiang Zhang, Hongbin Suo, QingWei Zhao, YongHong Yan. Using a Kind of Novel Phonotactic Information for SVM Based Speaker Recognition
750 -- 752Young-Joe Yoo, Seyoon Jeong, Jong-Ki Han. Adaptive Scan Pattern for Quantized Coefficients in Intra Coding of H.264
753 -- 756Congyan Lang, De Xu, Shuoyan Liu, Ning Li. Adaptive Non-linear Intensity Mapping Based Salient Region Extraction
757 -- 760Young Kyu Choi, Eun-Jin Park. HSWIS: Hierarchical Shrink-Wrapped Iso-Surface Algorithm

Volume 92-D, Issue 3

377 -- 388Chien-Liang Chen, Suey Wang, Hsu-Chun Yen. Reachability Analysis of Variants of Communication-Free Petri Nets
389 -- 400Cherng Chin, Tien-hsiung Weng, Lih-Hsing Hsu, Shang-Chia Chiou. The Spanning Connectivity of the Burnt Pancake Graphs
401 -- 412Takaaki Goto, Kenji Ruise, Takeo Yaku, Kensei Tsuchida. Visual Software Development Environment Based on Graph Grammars
413 -- 421Deok-Hwan Kim. Image Recommendation Algorithm Using Feature-Based Collaborative Filtering
422 -- 432Shu-Ling Shieh, I-En Liao, Kuo-Feng Hwang, Heng-Yu Chen. An Efficient Initialization Scheme for SOM Algorithm Based on Reference Point and Filters
433 -- 442Kentaroh Katoh, Kazuteru Namba, Hideo Ito. Design for Delay Fault Testability of Dual Circuits Using Master and Slave Scan Paths
443 -- 450Hirokazu Ozaki, Atsushi Kara, Zixue Cheng. User-Perceived Reliability of M-for-N (M: N) Shared Protection Systems
451 -- 459Yukiko Yamauchi, Sayaka Kamei, Fukuhito Ooshita, Yoshiaki Katayama, Hirotsugu Kakugawa, Toshimitsu Masuzawa. Hierarchical Composition of Self-Stabilizing Protocols Preserving the Fault-Containment Property
460 -- 468Prakasith Kayasith, Thanaruk Theeramunkong. Speech Clarity Index (Psi): A Distance-Based Speech Quality Indicator and Recognition Rate Prediction for Dysarthric Speakers with Cerebral Palsy
469 -- 476Kenta Niwa, Takanori Nishino, Kazuya Takeda. Selective Listening Point Audio Based on Blind Signal Separation and Stereophonic Technology
477 -- 488Chiori Hori, Bing Zhao, Stephan Vogel, Alex Waibel, Hideki Kashioka, Satoshi Nakamura. Consolidation-Based Speech Translation and Evaluation Approach
489 -- 497Takashi Nose, Makoto Tachibana, Takao Kobayashi. HMM-Based Style Control for Expressive Speech Synthesis with Arbitrary Speaker s Voice Using Model Adaptation
498 -- 505Hamed Akbari, Yukio Kosugi, Kazuyuki Kojima. Segmentation of Arteries in Minimally Invasive Surgery Using Change Detection
506 -- 511Keiji Yasuda, Hirofumi Yamamoto, Eiichiro Sumita. Training Set Selection for Building Compact and Efficient Language Models
512 -- 528Hai Vu, Tomio Echigo, Ryusuke Sagawa, Keiko Yagi, Masatsugu Shiba, Kazuhide Higuchi, Tetsuo Arakawa, Yasushi Yagi. Controlling the Display of Capsule Endoscopy Video for Diagnostic Assistance
529 -- 537Fausto Lucena, Allan Kardec Barros, Yoshinori Takeuchi, Noboru Ohnishi. Heart Instantaneous Frequency Based Estimation of HRV from Blood Pressure Waveforms
538 -- 540Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng. Pre-Allocation Based Flow Control Scheme for Networks-On-Chip
541 -- 544Yang-Sae Moon, Jinho Kim. Hybrid Lower-Dimensional Transformation for Similar Sequence Matching
545 -- 547Yoonjeong Kim, Seong Yong Ohm, Kang Yi. Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
548 -- 551Hyung Chan Kim, Angelos D. Keromytis. On the Deployment of Dynamic Taint Analysis for Application Communities
552 -- 554Gwanggil Jeon, Min Young Jung, Jechang Jeong, Sung-Han Park, Il Hong Suh. Weighted Interpolation Scheme for Robust Video Deinterlacing
555 -- 558Jingjing Zhong, Siwei Luo, Qi Zou. Visual Attention Guided Multi-Scale Boundary Detection in Natural Images for Contour Grouping

Volume 92-D, Issue 2

107 -- 0Hirotsugu Kakugawa. Foreword
108 -- 115Toshimitsu Masuzawa. Self-Stabilization in Dynamic Networks
116 -- 119Hirotatsu Kobayashi, Tomomi Matsui. Successful Manipulation in Stable Marriage Model with Complete Preference Lists
120 -- 129Hitoshi Yamasaki, Takayoshi Shoudai. A Polynomial Time Algorithm for Finding a Minimally Generalized Linear Interval Graph Pattern
130 -- 140Naoyuki Kamiyama, Yuuki Kiyonari, Eiji Miyano, Shuichi Miyazaki, Katsuhisa Yamanaka. Computational Complexities of University Interview Timetabling
141 -- 148Hirotoshi Honma, Saki Honma, Shigeru Masuyama. An Optimal Parallel Algorithm for Constructing a Spanning Tree on Circular Permutation Graphs
149 -- 157Ryoso Hamane, Toshiya Itoh, Kouhei Tomita. Approximation Preserving Reductions among Item Pricing Problems
158 -- 165Hiroshi Sakamoto, Shirou Maruyama, Takuya Kida, Shinichi Shimozono. A Space-Saving Approximation Algorithm for Grammar-Based Compression
166 -- 171Sung Kwon Kim, Jung-Sik Cho, Soo-Cheol Kim. Path Maximum Query and Path Maximum Sum Query in a Tree
172 -- 180Hirotaka Kato, Satoshi Matsumoto, Tetsuhiro Miyahara. Learning of Elementary Formal Systems with Two Clauses Using Queries
181 -- 190Ryoji Takami, Yusuke Suzuki, Tomoyuki Uchida, Takayoshi Shoudai. Polynomial Time Inductive Inference of TTSP Graph Languages from Positive Data
191 -- 199Seiichiro Tani, Masaki Nakanishi, Shigeru Yamashita. Multi-Party Quantum Communication Complexity with Routed Messages
200 -- 210Yoshiaki Takata, Hiroyuki Seki. Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation
211 -- 219Yoshiharu Asakura, Yukikazu Nakamoto. Extending a Role Graph for Role-Based Access Control
220 -- 234Haruhiko Sato, Masahito Kurihara, Sarah Winkler, Aart Middeldorp. Constraint-Based Multi-Completion Procedures for Term Rewriting Systems
235 -- 247Keiichirou Kusakari, Masahiko Sakai. Static Dependency Pair Method for Simply-Typed Term Rewriting and Related Techniques
248 -- 254Akio Fujiyoshi. Linear-Time Recognizable Classes of Tree Languages by Deterministic Linear Pushdown Tree Automata
255 -- 257Naonori Tanimoto, Katsunobu Imai, Chuzo Iwamoto, Kenichi Morita. On the Non-existance of Rotation-Symmetric von Neumann Neighbor Number-Conserving Cellular Automata of Which the State Number is Less than Four
258 -- 268Yu Wu, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa. A Message-Efficient Peer-to-Peer Search Protocol Based on Adaptive Index Dissemination
269 -- 282Kazuteru Namba, Hideo Ito. Test Compression for Robust Testable Path Delay Fault Testing Using Interleaving and Statistical Coding
283 -- 297Muhammad Anwaar Manzar, Tanweer Ahmad Cheema, Abdul Jalil, Ijaz Mansoor Qureshi. Visual Aerial Navigation through Adaptive Prediction and Hyper-Space Image Matching
298 -- 309I Gusti Bagus Baskara Nugraha, Hiroyoshi Morita. Transcoding-after-Smoothing System for VBR MPEG Video Streaming
310 -- 318Mohamed Ghoneim, Norimichi Tsumura, Toshiya Nakaguchi, Takashi Yahagi, Yoichi Miyake. A Fast Block Matching Algorithm Based on Motion Vector Correlation and Integral Projections
319 -- 326Achyut Sapkota, Kazuo Ohmi. A Neural Network Based Algorithm for Particle Pairing Problem of PIV Measurements
327 -- 331Young-Chang Kim, Jae-Woo Chang. A New Similar Trajectory Search Algorithm Based on Spatio-Temporal Similarity Measure for Moving Objects in Road Networks
332 -- 335Moonju Park. Schedulability Analysis on Generalized Quantum-Based Fixed Priority Scheduling
336 -- 341Kentaroh Katoh, Kazuteru Namba, Hideo Ito. Design for Delay Fault Testability of 2-Rail Logic Circuits
342 -- 345Takashi Watanabe, Kenji Kurosawa, Makoto Yoshizawa. An Effective Method on Applying Feedback Error Learning Scheme to Functional Electrical Stimulation Controller
346 -- 348Trung-Nghia Vu, Syng-Yup Ohn. A Filter Method for Feature Selection for SELDI-TOF Mass Spectrum
349 -- 352Deok-Su Na, Myung-Jin Bae 0001. A Variable Break Prediction Method Using CART in a Japanese Text-to-Speech System
353 -- 356Min Woo Park, Jong-Tae Park, Gwang Hoon Park, Doug-Young Suh. Chrominance Compensation for Multi-View Video Coding
357 -- 360Yingjun Tang, De Xu, Guanghua Gu, Shuoyan Liu. Category Constrained Learning Model for Scene Classification
361 -- 364Ning Li, De Xu. Action Recognition Using Visual-Neuron Feature
365 -- 368Jiying Wu, Qiuqi Ruan, GaoYun An. An Illumination Invariant Bimodal Method Employing Discriminant Features for Face Recognition
369 -- 373Chang Ha Lee, Youngmin Kim, Amitabh Varshney. Saliency-Guided Lighting

Volume 92-D, Issue 12

2297 -- 0Naomi Inoue. Foreword
2298 -- 2305Canasai Kruengkrai, Kiyotaka Uchimoto, Jun ichi Kazama, Yiou Wang, Kentaro Torisawa, Hitoshi Isahara. Joint Chinese Word Segmentation and POS Tagging Using an Error-Driven Word-Character Hybrid Model
2306 -- 2312Yoshihide Kato, Shigeki Matsubara. Incremental Parsing with Adjoining Operation
2313 -- 2320Tomohisa Sano, Shiho Hoshi Nobesawa, Hiroyuki Okamoto, Hiroya Susuki, Masaki Matsubara, Hiroaki Saito. Robust Toponym Resolution Based on Surface Statistics
2321 -- 2333Jakkrit TeCho, Cholwich Nattee, Thanaruk Theeramunkong. A Corpus-Based Approach for Automatic Thai Unknown Word Recognition Using Boosting Techniques
2334 -- 2340Koichi Takeuchi, Hideyuki Takahashi. Co-clustering with Recursive Elimination for Verb Synonym Extraction from Large Text Corpus
2341 -- 2350Hiroyuki Sakai, Shigeru Masuyama. Assigning Polarity to Causal Information in Financial Articles on Business Performance of Companies
2351 -- 2359Michiko Yasukawa, Hui Tian Lim, Hidetoshi Yokoo. Stemming Malay Text and Its Application in Automatic Text Categorization
2360 -- 2368Heum Park, Hyuk-Chul Kwon. Extended Relief-F Algorithm for Nominal Attribute Estimation in Small-Document Classification
2369 -- 2377Katsuya Masuda, Jun-ichi Tsujii. Tag-Annotated Text Search Using Extended Region Algebra
2378 -- 2385Michael Paul, Karunesh Arora, Eiichiro Sumita. Translation of Untranslatable Words -- Integration of Lexical Approximation and Phrase-Table Extension Techniques into Statistical Machine Translation
2386 -- 2393Kei Hashimoto, Hirofumi Yamamoto, Hideo Okuma, Eiichiro Sumita, Keiichi Tokuda. A Reordering Model Using a Source-Side Parse-Tree for Statistical Machine Translation
2394 -- 2401Pawel Dybala, Michal Ptaszynski, Rafal Rzepka, Kenji Araki. Activating Humans with Humor -- A Dialogue System That Users Want to Interact with
2402 -- 2415Kei Ohnishi, Kaori Yoshida, Yuji Oie. Folksonomical P2P File Sharing Networks Using Vectorized KANSEI Information as Search Tags
2416 -- 2421Yasuyuki Kawamura, Akira Matsubayashi. Randomized Online File Allocation on Uniform Cactus Graphs
2422 -- 2429Youhui Zhang, Weimin Zheng. Codec-on-Demand Based on User-Level Virtualization
2430 -- 2438Unil Yun. On Identifying Useful Patterns to Analyze Products in Retail Transaction Databases
2439 -- 2444Masato Kitakami, Teruki Kawasaki. Burst Error Recovery Method for LZSS Coding
2445 -- 2453Daisuke Iwai, Kosuke Sato. CrossOverlayDesktop: Dynamic Overlay of Desktop Graphics between Co-located Computers for Multi-User Interaction
2454 -- 2461Yizhong Xin, Xiangshi Ren. A Study of Inherent Pen Input Modalities for Precision Parameter Manipulations during Trajectory Tasks
2462 -- 2468Hongcui Wang, Tatsuya Kawahara. Effective Prediction of Errors by Non-native Speakers Using Decision Tree for Speech Recognition-Based CALL System
2469 -- 2477Andrew M. Finch, Eiichiro Sumita, Satoshi Nakamura. Class-Dependent Modeling for Dialog Translation
2478 -- 2486Abdellah Kaddai, Mohammed Halimi. Low-Complexity Wideband LSF Quantization Using Algebraic Trellis VQ
2487 -- 2497Jinhua Wang, De Xu, Bing Li. A Novel Tone Mapping Based on Double-Anchoring Theory for Displaying HDR Images
2498 -- 2507Shangce Gao, Rong Long Wang, Hiroki Tamura, Zheng Tang. A Multi-Layered Immune System for Graph Planarization Problem
2508 -- 2511Youngkyu Park, Jaeseok Park, Taewoo Han, Sungho Kang. An Effective Programmable Memory BIST for Embedded Memory
2512 -- 2515Hyo J. Lee, In Hwan Doh, Eunsam Kim, Sam H. Noh. RPP: Reference Pattern Based Kernel Prefetching Controller
2516 -- 2519Min Young Jung, Sung-Han Park. Video Retrieval System for Bridging the Semantic Gap
2520 -- 2523Taek-Young Youn, Young-Ho Park, Jongin Lim. Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties
2524 -- 2526Haechul Choi, Ho Chul Shin, Si-Woong Lee, Yun-Ho Ko. Moments Added Statistical Shape Model for Boundary Extraction
2527 -- 2530Sheng Li, Yong-Fang Yao, Xiao-Yuan Jing, Heng Chang, Shi-Qiang Gao, David Zhang, Jing-yu Yang. Face Recognition Based on Nonlinear DCT Discriminant Feature Extraction Using Improved Kernel DCV
2531 -- 2534Jingjing Zhong, Siwei Luo, Jiao Wang. Contour Grouping and Object-Based Attention with Saliency Maps
2535 -- 2539Jae-Seong Lee, Chang-Joon Lee, Young-Cheol Park, Dae Hee Youn. Efficient FFT Algorithm for Psychoacoustic Model of the MPEG-4 AAC
2540 -- 2544Young Han Lee, Deok Su Kim, Hong Kook Kim, Jongmo Sung, Mi Suk Lee, Hyun Joo Bae. Bandwidth-Scalable Stereo Audio Coding Based on a Layered Structure
2545 -- 2547Tae-Kyoung Kim, Jeong-Hwan Boo, Sang Ju Park. Fast Mode Decision on the Enhancement Layer in H.264 Scalable Extension
2548 -- 2552Hyunjin Yoo, Kang Y. Kim, Kwan H. Lee. Color Calibration of HDR Image under a Known Illumination for Measuring Reflectance Property of Materials
2553 -- 2556Gum-Won Hong, Jeong-Hoon Lee, Young-In Song, Do-Gil Lee, Hae-Chang Rim. Utilizing the Web for Automatic Word Spacing

Volume 92-D, Issue 11

2179 -- 2185Marta R. Costa-Jussà, José A. R. Fonollosa. State-of-the-Art Word Reordering Approaches in Statistical Machine Translation: A Survey
2186 -- 2195Kazunaga Hyodo, Kengo Iwamoto, Hideki Ando. Energy-Efficient Pre-Execution Techniques in Two-Step Physical Register Deallocation
2196 -- 2206Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono, Takahiro Shinagawa. Reducing Security Policy Size for Internet Servers in Secure Operating Systems
2207 -- 2217Seungmin Lee, Tae-Jun Park, Donghyeok Lee, Taekyong Nam, Sehun Kim. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases
2218 -- 2234Yi-Reun Kim, Kyu-Young Whang, Min-Soo Kim 0002, Il-Yeol Song. A Logical Model and Data Placement Strategies for MEMS Storage Devices
2235 -- 2243Walaa Aly, Seiichi Uchida, Masakazu Suzuki. Automatic Classification of Spatial Relationships among Mathematical Symbols Using Geometric Features
2244 -- 2252Tetsuji Ogawa, Tetsunori Kobayashi. Influence of Lombard Effect: Accuracy Analysis of Simulation-Based Assessments of Noisy Speech Recognition Systems for Various Recognition Conditions
2253 -- 2263Mahdieh Khanmohammadi, Reza Aghaeizadeh Zoroofi, Takashi Nishii, Hisashi Tanaka, Yoshinobu Sato. A Hybrid Technique for Thickness-Map Visualization of the Hip Cartilages in MRI
2264 -- 2271Akara Sopharak, Bunyarit Uyyanonvara, Sarah Barman, Thomas Williamson. Comparative Analysis of Automatic Exudate Detection between Machine Learning and Traditional Approaches
2272 -- 2274Depeng Jin, Shijun Lin, Li Su, Lieguang Zeng. Study-Based Error Recovery Scheme for Networks-on-Chip
2275 -- 2278Ning Li, De Xu. 2D Log-Gabor Wavelet Based Action Recognition
2279 -- 2282Ning Wang, De Xu, Bing Li. Edge-Based Color Constancy via Support Vector Regression
2283 -- 2286Won Seong, June-Sik Cho, Seung-Moo Noh, Jong Won Park. Computer-Aided Diagnosis of Splenic Enlargement Using Wave Pattern of Spleen in Abdominal CT Images: Initial Observations
2287 -- 2290Febriliyan Samopa, Akira Asano, Akira Taguchi. Automatic Molar Extraction from Dental Panoramic Radiographs for Forensic Personal Identification

Volume 92-D, Issue 10

1825 -- 0Katsuyuki Yamazaki. Foreword
1826 -- 1835Ping Wang, Fuqiang Liu. An Active Multicasting Mechanism for Mobile Hosts in Wireless Networking Environments
1836 -- 1846Khalid Mahmood, Xiaodong Lu, Yuji Horikoshi, Kinji Mori. Autonomous Pull-Push Community Construction Technology for High-Assurance
1847 -- 1856Muhammad Niswar, Shigeru Kashihara, Kazuya Tsukamoto, Youki Kadobayashi, Suguru Yamaguchi. Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries
1857 -- 1866Hyunku Jeong, Seungryoul Maeng, Youngsu Chae. HIMIPv6: An Efficient IP Mobility Management Protocol for Broadband Wireless Networks
1867 -- 1876Yuzo Taenaka, Shigeru Kashihara, Kazuya Tsukamoto, Suguru Yamaguchi, Yuji Oie. Proactive AP Selection Method Considering the Radio Interference Environment
1877 -- 1887Mio Suzuki, Hiroaki Hazeyama, Daisuke Miyamoto, Shinsuke Miwa, Youki Kadobayashi. Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set
1888 -- 1896Sergio Carrilho, Hiroshi Esaki. A Pub/Sub Message Distribution Architecture for Disruption Tolerant Networks
1897 -- 1904Sho Fujita, Keiichi Shima, Yojiro Uo, Hiroshi Esaki. A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks
1905 -- 1914Rong gang Bai, Yusheng Ji, Zhi-Ting Lin, Qing-Hua Wang, Xiao-Fang Zhou, Yugui Qu, Baohua Zhao. Cross-Layer Protocol Combining Tree Routing and TDMA Slotting in Wireless Sensor Networks
1915 -- 1922Pi-Chung Wang. Efficient Packet Classification with a Hybrid Algorithm
1923 -- 1933Ryota Kawashima, Yusheng Ji, Katsumi Maruyama. FreeNA: A Multi-Platform Framework for Inserting Upper-Layer Network Services
1934 -- 1944Jun Nishioka, Satoru Yamano. Routing Scheme for Bandwidth Guaranteed Traffic in AMC-Enabled Wireless Mesh Networks
1945 -- 1948Wook Kim, Heungwoo Nam, Sunshin An. Traffic Adaptive Contention Differentiation Scheme for LR-WPANs
1949 -- 1952Yuki Sakai, Masato Uchida, Masato Tsuru, Yuji Oie. Impact of Censoring on Estimation of Flow Duration Distribution and Its Mitigation Using Kaplan-Meier-Based Method
1953 -- 1960Shuzhuang Zhang, Hao Luo, Binxing Fang, Xiao-chun Yun. Fast and Memory-Efficient Regular Expression Matching Using Transition Sharing
1961 -- 1970Akira Yamada, Ayumu Kubota, Yutaka Miyake, Kazuo Hashimoto. Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation
1971 -- 1978Sunghyun Kim, Heejo Lee. Reducing Payload Inspection Cost Using Rule Classification for Fast Attack Signature Matching
1979 -- 1982Ilsun You, Kouichi Sakurai, Yoshiaki Hori. An Enhanced Security Protocol for Fast Mobile IPv6
1983 -- 1985Byung-Rae Lee. Content Sharing in User Binding DRM
1986 -- 1998Hojoong Kim, Seungryoul Maeng. Partially Eager Update Propagation and Freshness-Based Read Relaxation for Replicated Internet Services
1999 -- 2006Yusuke Doi, Shirou Wakayama, Satoshi Ozaki. Data Recovery of Distributed Hash Table with Distributed-to-Distributed Data Copy
2007 -- 2015Keiichirou Kusakari, Yasuo Isogai, Masahiko Sakai, Frédéric Blanqui. Static Dependency Pair Method Based on Strong Computability for Higher-Order Rewrite Systems
2016 -- 2024Gen Nishikawa, Tomoko Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa. A Self-Adaptive Routing Protocol in Wireless LANs Based on Attractor Selection
2025 -- 2033Joong Chae Na, Ji Eun Kim, Kunsoo Park, Dong Kyue Kim. Fast Computation of Rank and Select Functions for Succinct Representation
2034 -- 2042Anh Tuan Hoang, Katsuhiro Yamazaki, Shigeru Oyanagi. Pipelining a Multi-Mode SHA-384/512 Core with High Area Performance Rate
2043 -- 2052Iván García-Magariño, Rubén Fuentes-Fernández. A Technique for Defining Metamodel Translations
2053 -- 2063Yangwoo Roh, JaeSub Kim, Kyu Ho Park. A Phase-Adaptive Garbage Collector Using Dynamic Heap Partitioning and Opportunistic Collection
2064 -- 2072Hisashi Kurasawa, Atsuhiro Takasu, Jun Adachi. Load Balancing Scheme on the Basis of Huffman Coding for P2P Information Retrieval
2073 -- 2081Yi Wan, Takuya Asaka, Tatsuro Takahashi. On the Design of the Peer-Assisted UGC VoD System
2082 -- 2093Mi-Young Park, Sang-Hwa Chung, Prasanthi Sreekumari. End-to-End Loss Differentiation Algorithm Based on Estimation of Queue Usage in Multi-Hop Wireless Networks
2094 -- 2102Ukrit Watchareeruetai, Tetsuya Matsumoto, Noboru Ohnishi, Hiroaki Kudo, Yoshinori Takeuchi. Acceleration of Genetic Programming by Hierarchical Structure Learning: A Case Study on Image Recognition Program Synthesis
2103 -- 2111Wen-Bing Horng, Chun-Wen Chen. Optimizing Region of Support for Boundary-Based Corner Detection: A Statistic Approach
2112 -- 2121Dipankar Das, Yoshinori Kobayashi, Yoshinori Kuno. Multiple Object Category Detection and Localization Using Generative and Discriminative Models
2122 -- 2136Sutee Sudprasert, Asanee Kawtrakul, Christian Boitet, Vincent Berment. Dependency Parsing with Lattice Structures for Resource-Poor Languages
2137 -- 2151Mohammad Hosntalab, Reza Aghaeizadeh Zoroofi, Ali Abbaspour Tehrani-Fard, Gholamreza Shirani, Mohammad Reza Asharif. A Hybrid Segmentation Framework for Computer-Assisted Dental Procedures
2152 -- 2155Moonju Park, Jinseok Chae. Utilization Bound of Non-preemptive Fixed Priority Schedulers
2156 -- 2158Ki-Woong Seong, Eui-Sung Jung, Hyung-Gyu Lim, Jang-Woo Lee, Min Woo Kim, Sang Hyo Woo, Jung-Hyun Lee, Il-Yong Park, Jin-Ho Cho. Vibration Analysis of Human Middle Ear with Differential Floating Mass Transducer Using Electrical Model
2159 -- 2162Makoto Yamada, Masashi Sugiyama. Direct Importance Estimation with Gaussian Mixture Models
2163 -- 2166Miki Haseyama, Makoto Takizawa, Takashi Yamamoto. Video Frame Interpolation by Image Morphing Including Fully Automatic Correspondence Setting
2167 -- 2170Suk Tae Seo, Hye Cheun Jeong, In Keun Lee, Chang Sik Son, Soon Hak Kwon. Plausibility-Based Approach to Image Thresholding
2171 -- 2174Haohao Song. Contourlet Based Adaptive Watermarking for Color Images

Volume 92-D, Issue 1

1 -- 9Shigero Sasaki, Atsuhiro Tanaka. Cluster System Capacity Improvement by Transferring Load in Virtual Node Distance Order
10 -- 15Jung-Ja Kim, Heetaek Ceong, Yonggwan Won. Weighted Association Rule Mining for Item Groups with Different Properties and Risk Assessment for Networked Systems
16 -- 23Marat Zhanikeev, Yoshiaki Tanaka. A Framework for Detection of Traffic Anomalies Based on IP Aggregation
24 -- 31Jong-In Lee, Hojung Bang, Tai Hyo Kim, Sung Deok Cha. Visualization and Formalization of User Constraints for Tight Estimation of Worst-Case Execution Time
32 -- 40Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii. A Chosen-IV Key Recovery Attack on Py and Pypy
41 -- 50Jaehoon Kim, Seog Park. RDFacl: A Secure Access Control Model Based on RDF Triple
51 -- 58Hiroyuki Narita, Yasumasa Sawamura, Akira Hayashi. DTW-Distance Based Kernel for Time Series Data
59 -- 68Ju Liu, Hua Yan, Jiande Sun. Regularization Super-Resolution with Inaccurate Image Registration
69 -- 77Dae-Hyun Kim, Myoung-Jun Kim. A New Cubic ::::B-Splines:::: Design Method for Pen Input Environment
78 -- 85Hongwei Dai, Yu Yang, Cunhua Li, Jun Shi, Shangce Gao, Zheng Tang. Quantum Interference Crossover-Based Clonal Selection Algorithm and Its Application to Traveling Salesman Problem
86 -- 89Woohyung Lim, Chang Woo Han, Nam Soo Kim. Computationally Efficient Cepstral Domain Feature Compensation
90 -- 92Fa-Xin Yu, Zhe-Ming Lu, Zhen Li, Hao Luo. Global Motion Representation of Video Shot Based on Vector Quantization Index Histogram
93 -- 96Cheon Seog Kim, Hosik Sohn, Wesley De Neve, Yong Man Ro. An Objective Perceptual Quality-Based ADTE for Adapting Mobile SVC Video Content
97 -- 101Dongil Han, Hak-Sung Lee, Chan Im, Seong-Joon Yoo. Real-Time Color Correction Method for a Low-Cost Still/Video Camera