Journal: IEICE Transactions

Volume 93-D, Issue 9

2347 -- 0Takao Kobayashi. Foreword
2348 -- 2362Koichi Shinoda. Acoustic Model Adaptation for Speech Recognition
2363 -- 2369Tetsuo Kosaka, Yuui Takeda, Takashi Ito, Masaharu Katoh, Masaki Kohda. Unsupervised Speaker Adaptation Using Speaker-Class Models for Lecture Speech Recognition
2370 -- 2378Shoei Sato, Takahiro Oku, Shinichi Homma, Akio Kobayashi, Toru Imai. Learning Speech Variability in Discriminative Acoustic Model Adaptation
2379 -- 2387Yoo Rhee Oh, Hong Kook Kim. A Hybrid Acoustic and Pronunciation Model Adaptation Approach for Non-native Speech Recognition
2388 -- 2396Dessi Puji Lestari, Sadaoki Furui. Adaptation to Pronunciation Variations in Indonesian Spoken Query-Based Information Retrieval
2397 -- 2406Longbiao Wang, Kazue Minami, Kazumasa Yamamoto, Seiichi Nakagawa. Speaker Recognition by Combining MFCC and Phase Information in Noisy Conditions
2407 -- 2416Seongjun Hahm, Yuichi Ohkawa, Masashi Ito, Motoyuki Suzuki, Akinori Ito, Shozo Makino. Speech Recognition under Multiple Noise Environment Based on Multi-Mixture HMM and Weight Optimization by the Aspect Model
2417 -- 2430Yanqing Sun, Yu Zhou, QingWei Zhao, YongHong Yan. Acoustic Feature Optimization Based on ::::F::::-Ratio for Robust Speech Recognition
2431 -- 2439Yanqing Sun, Yu Zhou, QingWei Zhao, Pengyuan Zhang, Fuping Pan, YongHong Yan. Enhancing the Robustness of the Posterior-Based Confidence Measures Using Entropy Information for Speech Recognition
2440 -- 2450Yasunari Obuchi, Takashi Sumiyoshi. Intentional Voice Command Detection for Trigger-Free Speech Interface
2451 -- 2462Alberto Yoshihiro Nakano, Seiichi Nakagawa, Kazumasa Yamamoto. Distant Speech Recognition Using a Microphone Array Network
2463 -- 2471Kook Cho, Hajime Okumura, Takanobu Nishiura, Yoichi Yamashita. Multiple Sound Source Localization Based on Inter-Channel Correlation Using a Distributed Microphone System in a Real Environment
2472 -- 2482Hironori Doi, Keigo Nakamura, Tomoki Toda, Hiroshi Saruwatari, Kiyohiro Shikano. Esophageal Speech Enhancement Based on Statistical Voice Conversion with Gaussian Mixture Models
2483 -- 2490Takashi Nose, Yuhei Ota, Takao Kobayashi. HMM-Based Voice Conversion Using Quantized F0 Context
2491 -- 2499Yamato Ohtani, Tomoki Toda, Hiroshi Saruwatari, Kiyohiro Shikano. Improvements of the One-to-Many Eigenvoice Conversion System
2500 -- 2508Jeong Hun Kim, Suki Kim, Kwang-Hyun Baek. A Low Power SOC Architecture for the V2.0+EDR Bluetooth Using a Unified Verification Platform
2509 -- 2519Cheng-Min Lin. Nested Interrupt Analysis of Low Cost and High Performance Embedded Systems Using GSPN Framework
2520 -- 2533Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values
2534 -- 2543Cheng-Min Lin, Jyh-Horng Lin, Jen-Cheng Chiu. DIWSAN: Distributed Intelligent Wireless Sensor and Actuator Network for Heterogeneous Environment
2544 -- 2554Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao. A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data
2555 -- 2565Masashi Sugiyama, Hirotaka Hachiya, Hisashi Kashima, Tetsuro Morimura. Least Absolute Policy Iteration--A Robust Approach to Value Function Approximation
2566 -- 2576Takaaki Kamogawa. Structural Models that Manage IT Portfolio Affecting Business Value of Enterprise Architecture
2577 -- 2586Danni Ai, Xian-Hua Han, Xiang Ruan, Yen-Wei Chen. Color Independent Components Based SIFT Descriptors for Object/Scene Classification
2587 -- 2601Aram Kawewong, Sirinart Tangruamsub, Osamu Hasegawa. Position-Invariant Robust Features for Long-Term Recognition of Dynamic Outdoor Scenes
2602 -- 2613Cheng Wan, Jun Sato. Computing Spatio-Temporal Multiple View Geometry from Mutual Projections of Multiple Cameras
2614 -- 2625Ukrit Watchareeruetai, Tetsuya Matsumoto, Yoshinori Takeuchi, Hiroaki Kudo, Noboru Ohnishi. Multi-Objective Genetic Programming with Redundancy-Regulations for Automatic Construction of Image Feature Extractors
2626 -- 2634Junichi Hori, Kentarou Sunaga, Satoru Watanabe. Signal and Noise Covariance Estimation Based on ICA for High-Resolution Cortical Dipole Imaging
2635 -- 2638Vladimir V. Stankovic, Nebojsa Z. Milenkovic. DDR3 SDRAM with a Complete Predictor
2639 -- 2642Jongwan Kim, Dukshin Oh, Keecheon Kim. Indexing of Tagged Moving Objects over Localized Trajectory with Time Intervals in RFID Systems
2643 -- 2646Yuan Hu, Li Lu, Jingqi Yan, Zhi Liu, Pengfei Shi. Sexual Dimorphism Analysis and Gender Classification in 3D Human Face
2647 -- 2650Noriaki Suetake, Go Tanaka, Hayato Hashii, Eiji Uchino. Hellinger Distance-Based Parameter Tuning for epsilon-Filter
2651 -- 2655Nan Liu, Yao Zhao, Zhenfeng Zhu, Rongrong Ni. Commercial Shot Classification Based on Multiple Features Combination
2656 -- 2659Hui Cao, Koichiro Yamaguchi, Mitsuhiko Ohta, Takashi Naito, Yoshiki Ninomiya. Feature Interaction Descriptor for Pedestrian Detection
2660 -- 2663Yoshihide Kato, Shigeki Matsubara. Correcting Syntactic Annotation Errors Using a Synchronous Tree Substitution Grammar

Volume 93-D, Issue 8

2025 -- 0Michitaka Kameyama. Foreword
2026 -- 2035Tsutomu Sasao, Hiroki Nakahara, Munehiro Matsuura, Yoshifumi Kawamura, Jon T. Butler. A Quaternary Decision Diagram Machine: Optimization of Its Code
2036 -- 2039Koki Nishizawa. Multi-Valued Modal Fixed Point Logics for Model Checking
2040 -- 2047Noboru Takagi. A Delay Model of Multiple-Valued Logic Circuits Consisting of Min, Max, and Literal Operations
2048 -- 2058Hiroki Nakahara, Tsutomu Sasao, Munehiro Matsuura, Yoshifumi Kawamura. A Parallel Branching Program Machine for Sequential Circuits: Implementation and Evaluation
2059 -- 2067Shinobu Nagayama, Tsutomu Sasao, Jon T. Butler. A Systematic Design Method for Two-Variable Numeric Function Generators Using Multiple-Valued Decision Diagrams
2068 -- 2072Kwang-Jow Gan, Dong-Shong Liang, Yan-Wun Chen. Novel Multiple-Valued Logic Design Using BiCMOS-Based Negative Differential Resistance Circuit Biased by Two Current Sources
2073 -- 2079Motoi Inaba, Koichi Tanno, Hiroki Tamura, Okihiko Ishizuka. Optimization and Verification of Current-Mode Multiple-Valued Digit ORNS Arithmetic Circuits
2080 -- 2088Hirokatsu Shirahama, Takashi Matsuura, Masanori Natsui, Takahiro Hanyu. Energy-Aware Multiple-Valued Current-Mode Sequential Circuits Using a Completion-Detection Scheme
2089 -- 2099Naoya Onizawa, Takahiro Hanyu. Highly Reliable Multiple-Valued One-Phase Signalling for an Asynchronous On-Chip Communication Link
2100 -- 2108Liang-Bi Chen, Jiun-Cheng Ju, Chien-Chou Wang, Ing-Jer Huang. HPChecker: An AMBA AHB On-Chip Bus Protocol Checker with Efficient Verification Mechanisms
2109 -- 2116Yasushi Yuminaka, Yasunori Takahashi, Kenichi Henmi. Multiple-Valued Data Transmission Based on Time-Domain Pre-Emphasis Techniques
2117 -- 2125Naofumi Homma, Yuichi Baba, Atsushi Miyamoto, Takafumi Aoki. Multiple-Valued Constant-Power Adder and Its Application to Cryptographic Processor
2126 -- 2133Nobuaki Okada, Michitaka Kameyama. Logic-In-Control-Architecture-Based Reconfigurable VLSI Using Multiple-Valued Differential-Pair Circuits
2134 -- 2144Shota Ishihara, Noriaki Idobata, Masanori Hariyama, Michitaka Kameyama. A Switch Block Architecture for Multi-Context FPGAs Based on a Ferroelectric-Capacitor Functional Pass-Gate Using Multiple/Binary Valued Hybrid Signals
2145 -- 2161Chammika Mannakkara, Tomohiro Yoneda. Asynchronous Pipeline Controller Based on Early Acknowledgement Protocol
2162 -- 2171Sung-Rae Lee, Ser-Hoon Lee, Sun Young Hwang. A Concurrent Instruction Scheduling and Recoding Algorithm for Power Minimization in Embedded Systems
2172 -- 2181Pham Ngoc Hung, Viet Ha Nguyen, Toshiaki Aoki, Takuya Katayama. A Minimized Assumption Generation Method for Component-Based Software Verification
2182 -- 2189Takako Nakatani, Shouzo Hori, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto. A Case Study of Requirements Elicitation Process with Changes
2190 -- 2197Ricardo Martinho, Dulce Domingos, JoĂŁo VarajĂŁo. Concept Maps for the Modelling of Controlled Flexibility in Software Processes
2198 -- 2212Nobutaka Suzuki. An Algorithm for Inferring ::::K:::: Optimum Transformations of XML Document from Update Script to DTD
2213 -- 2222Achmad Basuki, Achmad Husni Thamrin, Hitoshi Asaeda, Jun Murai. Real-Time Monitoring of Multicast Group Information
2223 -- 2232Jun Liu, Yinhe Han, Xiaowei Li. Extended Selective Encoding of Scan Slices for Reducing Test Data and Test Power
2233 -- 2242Tae-Heon Yang, Sang-Youn Kim, Wayne J. Book, Dong-Soo Kwon. Tiny Feel: A New Miniature Tactile Module Using Elastic and Electromagnetic Force for Mobile Devices
2243 -- 2251Wei Chen, Gang Liu, Jun Guo, Shinichiro Omachi, Masako Omachi, Yujing Guo. Novel Confidence Feature Extraction Algorithm Based on Latent Topic Similarity
2252 -- 2261Sanaz Seyedin, Seyed Mohammad Ahadi. A New Subband-Weighted MVDR-Based Front-End for Robust Speech Recognition
2262 -- 2272Kyung-Yong Kim, Gwang Hoon Park, Doug-Young Suh. Adaptive Depth-Map Coding for 3D-Video
2273 -- 2280Jing-Xin Wang, Alvin Wen-Yu Su. Adaptive Zero-Coefficient Distribution Scan for Inter Block Mode Coding of H.264/AVC
2281 -- 2290Kong-Joo Lee, Jee-Eun Kim. Improving Automatic English Writing Assessment Using Regression Trees and Error-Weighting
2291 -- 2301Hyunjin Park, Alfred O. Hero III, Peyton H. Bland, Marc Kessler, Jongbum Seo, Charles R. Meyer. Construction of Abdominal Probabilistic Atlases and Their Value in Segmentation of Normal Organs in Abdominal CT Scans
2302 -- 2305In Hwan Doh, Myoung Sub Shim, Eunsam Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh. An Empirical Study of FTL Performance in Conjunction with File System Pursuing Data Integrity
2306 -- 2310Min Soo Kim 0001, Ju-Wan Kim, Myoung-Ho Kim. Hybrid Spatial Query Processing between a Server and a Wireless Sensor Network
2311 -- 2315Eun-Jun Yoon, Kee-Young Yoo. A Biometric Authenticated Key Agreement Protocol for Secure Token
2316 -- 2318Miyuki Koshimura, Hidetomo Nabeshima, Hiroshi Fujita, Ryuzo Hasegawa. Solving Open Job-Shop Scheduling Problems by SAT Encoding
2319 -- 2323Chang Sik Son, Yoon Nyun Kim, Kyung-Ri Park, Hee Joon Park. Design of Hierarchical Fuzzy Classification System Based on Statistical Characteristics of Data
2324 -- 2326Xia Mao, Lijiang Chen. Speech Emotion Recognition Based on Parametric Filter and Fractal Dimension
2327 -- 2330Sung-Soo Kim, Chang Woo Han, Nam Soo Kim. Study of Prominence Detection Based on Various Phone-Specific Features
2331 -- 2335Chang Woo Han, Shin Jae Kang, Nam Soo Kim. Estimation of Phone Mismatch Penalty Matricesfor Two-Stage Keyword Spotting
2336 -- 2338Do-Gil Lee, Gum-Won Hong, Seok Kee Lee, Hae-Chang Rim. Minimizing Human Intervention for Constructing Korean Part-of-Speech Tagged Corpus

Volume 93-D, Issue 7

1669 -- 0Ken-ichi Maeda. Foreword
1670 -- 1681Tomoyuki Shibata, Toshikazu Wada. K-D Decision Tree: An Accelerated and Memory Efficient Nearest Neighbor Classifier
1682 -- 1689Norimichi Ukita, Akira Makino, Masatsugu Kidode. Real-Time Uncharacteristic-Part Tracking with a Point Set
1690 -- 1699Gholamreza Akbarizadeh, Gholam Ali Rezai Rad, Shahriar Baradaran Shokouhi. A New Region-Based Active Contour Model with Skewness Wavelet Energy for Segmentation of SAR Images
1700 -- 1707Kentaro Yokoi. Probabilistic BPRRC: Robust Change Detection against Illumination Changes and Background Movements
1708 -- 1715Zhuo Yang, Sei-ichiro Kamata. Fast Polar and Spherical Fourier Descriptors for Feature Extraction
1716 -- 1726Shuijiong Wu, Peilin Liu, Yiqing Huang, Qin Liu, Takeshi Ikenaga. Constant Bit-Rate Multi-Stage Rate Control for Rate-Distortion Optimized H.264/AVC Encoders
1727 -- 1736Hideki Nakayama, Tatsuya Harada, Yasuo Kuniyoshi. Dense Sampling Low-Level Statistics of Local Features
1737 -- 1744Shaopeng Tang, Satoshi Goto. Histogram of Template for Pedestrian Detection
1745 -- 1753Il-Woong Jeong, Jin Choi, Kyusung Cho, Yongho Seo, Hyun Seung Yang. A Vision-Based Emergency Response System with a Paramedic Mobile Robot
1754 -- 1760Koichiro Enomoto, Masashi Toda, Yasuhiro Kuwahara. Extraction Method of Scallop Area in Gravel Seabed Images for Fishery Investigation
1761 -- 1772Dung Nghi Truong Cong, Louahdi Khoudour, Catherine Achard, Lounis Douadi. People Detection and Re-Identification in Complex Environments
1773 -- 1779Fan-Chieh Cheng, Shanq-Jang Ruan. Image Quality Analysis of a Novel Histogram Equalization Method for Image Contrast Enhancement
1780 -- 1787Romain Gallen, Nicolas Hautière, Eric Dumont. Static Estimation of the Meteorological Visibility Distance in Night Fog with Imagery
1788 -- 1797Tomohiko Ohtsuka, Daisuke Watanabe. Singular Candidate Method: Improvement of Extended Relational Graph Method for Reliable Detection of Fingerprint Singularity
1798 -- 1806Hiroyuki Goto. High-Speed Computation of the Kleene Star in Max-Plus Algebraic System Using a Cell Broadband Engine
1807 -- 1815Chih-Sheng Chen, Shen-Yi Lin, Min-Hsuan Fan, Chua-Huang Huang. A Novel Construction Method for ::::n::::-Dimensional Hilbert Space-Filling Curves
1816 -- 1823Toshiki Saitoh, Katsuhisa Yamanaka, Masashi Kiyomi, Ryuhei Uehara. Random Generation and Enumeration of Proper Interval Graphs
1824 -- 1831Yung-Kuei Lu, Ming-Der Shieh. High-Speed Low-Complexity Architecture for Reed-Solomon Decoders
1832 -- 1847Jeong-Hoon Lee, Kyu-Young Whang, Hyo-Sang Lim, Byung Suk Lee, Jun-Seok Heo. Progressive Processing of Continuous Range Queries in Hierarchical Wireless Sensor Networks
1848 -- 1856Meng Ge, Kwok-Yan Lam, Jian-Bin Li, Siu Leung Chung. Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network
1857 -- 1865Hiroshi Iwata, Satoshi Ohtake, Hideo Fujiwara. A Method of Path Mapping from RTL to Gate Level and Its Application to False Path Identification
1866 -- 1877Shi-Cho Cha. Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy
1878 -- 1888Osama Ouda, Norimichi Tsumura, Toshiya Nakaguchi. BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes
1889 -- 1899Jaehoon Kim, Seog Park. Decomposition Optimization for Minimizing Label Overflow in Prime Number Graph Labeling
1900 -- 1908Chen-Sung Chang. Approach to the Unit Maintenance Scheduling Decision Using Risk Assessment and Evolution Programming Techniques
1909 -- 1917Keigo Nakamura, Tomoki Toda, Hiroshi Saruwatari, Kiyohiro Shikano. Evaluation of Extremely Small Sound Source Signals Used in Speaking-Aid System with Statistical Voice Conversion
1918 -- 1926Wei Tang, Dongju Li, Tsuyoshi Isshiki, Hiroaki Kunieda. Orientation Field Estimation for Embedded Fingerprint Authentication System
1927 -- 1935Seongjun Hahm, Yuichi Ohkawa, Masashi Ito, Motoyuki Suzuki, Akinori Ito, Shozo Makino. Improved Reference Speaker Weighting Using Aspect Model
1936 -- 1943ChangCheng Wu, Chunyu Zhao, Dayue Chen. Improved Radiometric Based Method for Suppressing Impulse Noise from Corrupted Images
1944 -- 1956Giseok Choe, Jongho Nang. Tile-Image Merging and Delivering for Virtual Camera Services on Tiled-Display for Real-Time Remote Collaboration
1957 -- 1964Rodrigo SantamarĂ­a, Roberto TherĂłn. Visualization of Intersecting Groups Based on Hypergraphs
1965 -- 1975Yuyu Liu, Yoichi Sato. Segmentation of the Speaker s Face Region with Audiovisual Correlation
1976 -- 1983Chooi-Ling Goh, Taro Watanabe, Hirofumi Yamamoto, Eiichiro Sumita. Constraining a Generative Word Alignment Model with Discriminative Output
1984 -- 1986Hae Young Lee, Seung-Min Park, Tae Ho Cho. Simulation Modeling of SAM Fuzzy Logic Controllers
1987 -- 1990Yuanyuan Zhang, Shijun Lin, Li Su, Depeng Jin, Lieguang Zeng. A Dual-Port Access Structure of 3D Mesh-Based NoC
1991 -- 1994Gile Narcisse Fanzou Tchuissang, Ning Wang, Nathalie Cindy Kuicheu, François Siewe, De Xu, Shuoyan Liu. Predicting DataSpace Retrieval Using Probabilistic Hidden Information
1995 -- 1996Eun-Jun Yoon, Kee-Young Yoo. Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability
1997 -- 2000Jun-Cheol Park. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials
2001 -- 2004Youngshin Han, Soyoung Kim, Taekyu Kim, Jason J. Jung. Automatic Defect Classification System in Semiconductors EDS Test Based on System Entity Structure Methodology
2005 -- 2008Makoto Sakai, Norihide Kitaoka, Kazuya Takeda. Acoustic Feature Transformation Combining Average and Maximum Classification Error Minimization Criteria
2009 -- 2011Guoan Yang, Huub van de Wetering, Ming Hou, Chihiro Ikuta, Yuehu Liu. A Novel Design Approach for Contourlet Filter Banks
2012 -- 2015Do Quan, Yo-Sung Ho. Fast Intra Prediction Mode Decision for H.264/AVC
2016 -- 2019Xiaokan Wang, Xia Mao, Catalin-Daniel Caleanu. Nonlinear Shape-Texture Manifold Learning

Volume 93-D, Issue 6

1329 -- 0Masaru Kitsuregawa. Foreword
1330 -- 1342Lei Li, Bin Fu, Christos Faloutsos. Efficient Parallel Learning of Hidden Markov Chain Models on SMPs
1343 -- 1351Ting Wang, Ling Liu. Execution Assurance for Massive Computing Tasks
1352 -- 1360Matthias Rambow, Florian RohrmĂĽller, Omiros Kourakos, Drazen Brscic, Dirk Wollherr, Sandra Hirche, Martin Buss. A Framework for Information Distribution, Task Execution and Decision Making in Multi-Robot Systems
1361 -- 1368Ryohei Sasano, Daisuke Kawahara, Sadao Kurohashi. The Effect of Corpus Size on Case Frame Acquisition for Predicate-Argument Structure Analysis
1369 -- 1377Atsushi Fujii, Seiji Takegata. Question Answering for the Operation of Software Applications: A Document Retrieval Approach
1378 -- 1385Nobuyuki Shimizu, Masashi Sugiyama, Hiroshi Nakagawa. Spectral Methods for Thesaurus Construction
1386 -- 1393Xiao Sun, Degen Huang, Fuji Ren. Detecting New Words from Chinese Text Using Latent Semi-CRF Models
1394 -- 1402Zhenglu Yang, Lin Li, Masaru Kitsuregawa. Efficient Analyzing General Dominant Relationship Based on Partial Order Models
1403 -- 1413Tsubasa Takahashi, Hiroyuki Kitagawa, Keita Watanabe. Social Bookmarking Induced Active Page Ranking
1414 -- 1421Young-joo Chung, Masashi Toyoda, Masaru Kitsuregawa. Detecting Hijacked Sites by Web Spammer Using Link-Based Algorithms
1422 -- 1432Hisashi Kurasawa, Daiji Fukagawa, Atsuhiro Takasu, Jun Adachi. Margin-Based Pivot Selection for Similarity Search Indexes
1433 -- 1446Fengrong Li, Yoshiharu Ishikawa. Query Processing in a Traceable P2P Record Exchange Framework
1447 -- 1458Min Soo Kim 0001, Jin Hyun Son, Ju-Wan Kim, Myoung-Ho Kim. Energy-Efficient Distributed Spatial Join Processing in Wireless Sensor Networks
1459 -- 1469Takashi Hisamori, Toru Arikawa, Gosuke Ohashi. Query-by-Sketch Image Retrieval Using Similarity in Stroke Order
1470 -- 1478Takatsugu Hirayama, Jean-Baptiste Dodane, Hiroaki Kawashima, Takashi Matsuyama. Estimates of User Interest Using Timing Structures between Proactive Content-Display Updates and Eye Movements
1479 -- 1488Yuma Munekawa, Fumihiko Ino, Kenichi Hagihara. Accelerating Smith-Waterman Algorithm for Biological Database Search on CUDA-Compatible GPUs
1489 -- 1496Shigeru Ninagawa. Evolution of Cellular Automata toward a LIFE-Like Rule Guided by 1/::::f:::: Noise
1497 -- 1503Yong-Eun Kim, Kyung-Ju Cho, Jin-Gyun Chung, Xinming Huang. Fixed-Width Group CSD Multiplier Design
1504 -- 1511Cheng-Min Lin. Analysis and Modeling of a Priority Inversion Scheme for Starvation Free Controller Area Networks
1512 -- 1520Lung-Pin Chen, I.-Chen Wu, William C. Chu, Jhen-You Hong, Meng-Yuan Ho. Incremental Digital Content Object Delivering in Distributed Systems
1521 -- 1539Junbo Wang, Zixue Cheng, Lei Jing, Kaoru Ota, Mizuo Kansen. A Two-Stage Composition Method for Danger-Aware Services Based on Context Similarity
1540 -- 1548Fuminori Makikawa, Tatsuhiro Tsuchiya, Tohru Kikuno. Constructing Overlay Networks with Short Paths and Low Communication Cost
1549 -- 1559Tomokazu Yoneda, Akiko Shuto, Hideyuki Ichihara, Tomoo Inoue, Hideo Fujiwara. Design and Optimization of Transparency-Based TAM for SoC Test
1560 -- 1571Gicheol Wang, Kang-Suk Song, Gihwan Cho. DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks
1572 -- 1579Jianmei Guo, Yinglin Wang, Jian Cao. OWPA: An Ontology-Based Approach to Adaptable Workflow Participant Assignment
1580 -- 1588Shuoyan Liu, De Xu, Songhe Feng. Discriminating Semantic Visual Words for Scene Classification
1589 -- 1598Yamato Ohtani, Tomoki Toda, Hiroshi Saruwatari, Kiyohiro Shikano. Adaptive Training for Voice Conversion Based on Eigenvoices
1599 -- 1607Roghayeh Doost, Abolghasem Sayadiyan, Hossein Shamsi. A New Method for Low SNR Estimation of Noisy Speech Signals Using Fourth-Order Moments
1608 -- 1617Nasharuddin Zainal, Toshihisa Tanaka, Yukihiko Yamashita. Moving Picture Coding by Lapped Transform and Edge Adaptive Deblocking Filter with Zero Pruning SPIHT
1618 -- 1624Kazu Mishiba, Masaaki Ikehara. Image Interpolation Using Edge-Directed Smoothness Measure Filter
1625 -- 1635Sopon Phumeechanya, Charnchai Pluempitiwiriyawej, Saowapak Thongvigitmanee. Active Contour Using Local Regional Information on Extendable Search Lines (LRES) for Image Segmentation
1636 -- 1643Tomohiko Mukai, Ken-ichi Wakisaka, Shigeru Kuriyama. Generating Concise Rules for Human Motion Retrieval
1644 -- 1647Jaegeuk Kim, Jinho Seol, Seung Ryoul Maeng. A Buffer Management Issue in Designing SSDs for LFSs
1648 -- 1651Hea-Suk Kim, Yang-Sae Moon. Fourier Magnitude-Based Privacy-Preserving Clustering on Time-Series Data
1652 -- 1655Jong-Mo Kum, Joon-Hyuk Chang. Improved Global Soft Decision Incorporating Second-Order Conditional MAP in Speech Enhancement
1656 -- 1660Yuhwai Tseng, Chauchin Su, Chien-Nan Jimmy Liu. Measurement and Evaluation of the Bioelectrical Impedance of the Human Body by Deconvolution of a Square Wave

Volume 93-D, Issue 5

941 -- 0Hiroyuki Seki. Foreword
942 -- 952Haruhiko Sato, Masahito Kurihara. Multi-Context Rewriting Induction with Termination Checkers
953 -- 962Keita Uchiyama, Masahiko Sakai, Toshiki Sakabe. Decidability of Termination and Innermost Termination for Term Rewriting Systems with Right-Shallow Dependency Pairs
963 -- 973Yuki Chiba, Takahito Aoto, Yoshihito Toyama. Program Transformation Templates for Tupling Based on Term Rewriting
974 -- 984Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi. Towards Reliable E-Government Systems with the OTS/CafeOBJ Method
985 -- 993Chul-Joo Kim, Jeong-Han Yun, Seonggun Kim, Kwang-Moo Choe, Taisook Han. Over-Approximated Control Flow Graph Construction on Pure Esterel
994 -- 1005Takeshi Nagaoka, Kozo Okano, Shinji Kusumoto. An Abstraction Refinement Technique for Timed Automata Based on Counterexample-Guided Abstraction Refinement Loop
1006 -- 1017Satoshi Hattori. Computer Algebra System as Test Generation System
1018 -- 1019Hiroaki Kikuchi. Foreword
1020 -- 1030Yang Ou, Kyung Hyune Rhee. A Survey on Image Hashing for Image Authentication
1031 -- 1043Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai. Analysis of Existing Privacy-Preserving Protocols in Domain Name System
1044 -- 1052Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao. Time-Bound Hierarchical Key Assignment: An Overview
1053 -- 1061Sunghyun Kim, Heejo Lee. Abnormal Policy Detection and Correction Using Overlapping Transition
1062 -- 1069Masana Murase. Eliminating Cell Broadband Engine:::TM::: DMA Buffer Overflows
1070 -- 1079Chao Huang, Jianling Sun, Xinyu Wang, Di Wu. Inconsistency Resolution Method for RBAC Based Interoperation
1080 -- 1086Kazumasa Omote, Kazuhiko Kato. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
1087 -- 1095Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro. Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
1096 -- 1105Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
1106 -- 1116Masashi Eto, Kotaro Sonoda, Daisuke Inoue, Katsunari Yoshioka, Koji Nakao. Fine-Grain Feature Extraction from Malware s Scan Behavior Based on Spectrum Analysis
1117 -- 1126Chun-Liang Lee, Chia-Tai Chan, Pi-Chung Wang. Packet Classification with Hierarchical Cross-Producting
1127 -- 1136Md. Rakib Hassan, Md. Monirul Islam, Kazuyuki Murase. A New Local Search Based Ant Colony Optimization Algorithm for Solving Combinatorial Optimization Problems
1137 -- 1146In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh. NVFAT: A FAT-Compatible File System with NVRAM Write Cache for Its Metadata
1147 -- 1153Yong-Hee Kim, Myoung-Jo Jung, Cheol-Hoon Lee. Energy-Aware Real-Time Task Scheduling Exploiting Temporal Locality
1154 -- 1161Ing-Xiang Chen, Chien-Hung Li, Cheng-Zen Yang. Mining Co-location Relationships among Bug Reports to Localize Fault-Prone Modules
1162 -- 1174Yu Zhang, Binxing Fang, Hao Luo. Identifying High-Rate Flows Based on Sequential Sampling
1175 -- 1185Jianliang Gao, Yinhe Han, Xiaowei Li. A Novel Post-Silicon Debug Mechanism Based on Suspect Window
1186 -- 1196Hirotoshi Iwasaki, Nobuhiro Mizuno, Kousuke Hara, Yoichi Motomura. User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks
1197 -- 1204Keita Imada, Katsuhiko Nakamura. Search for Minimal and Semi-Minimal Rule Sets in Incremental Learning of Context-Free and Definite Clause Grammars
1205 -- 1213Yizhong Xin, Xiangshi Ren. An Investigation of Adaptive Pen Pressure Discretization Method Based on Personal Pen Pressure Use Profile
1214 -- 1224Jinyong Jo, JongWon Kim. imCast: Studio-Quality Digital Media Platform Exploiting Broadband IP Networks
1225 -- 1237Bing-Fei Wu, Hao-Yu Huang, Yen-Lin Chen, Hsin-Yuan Peng, Jia-Hsiung Huang. MPEG-2/4 Low-Complexity Advanced Audio Coding Optimization and Implementation on DSP
1238 -- 1243Fu-Kun Chen, Kuo-Bao Kuo. Complexity Scalability Design in the Internet Low Bit Rate Codec (iLBC) for Speech Coding
1244 -- 1252Makoto Sakai, Norihide Kitaoka, Kazuya Takeda. Acoustic Feature Transformation Based on Discriminant Analysis Preserving Local Structure for Speech Recognition
1253 -- 1262Keita Hirai, Jambal Tumurtogoo, Ayano Kikuchi, Norimichi Tsumura, Toshiya Nakaguchi, Yoichi Miyake. Video Quality Assessment Using Spatio-Velocity Contrast Sensitivity Function
1263 -- 1271Zhu Li, Kenichi Yabuta, Hitoshi Kitazawa. Exclusive Block Matching for Moving Object Extraction and Tracking
1272 -- 1281Takanobu Oba, Takaaki Hori, Atsushi Nakamura. Improved Sequential Dependency Analysis Integrating Labeling-Based Sentence Boundary Detection
1282 -- 1290Xia Mao, Zheng Li. Generating and Describing Affective Eye Behaviors
1291 -- 1293Kazuto Oshima. A Simple Procedure for Classical Signal-Processing in Cluster-State Quantum Computation
1294 -- 1296Kai-Jie Zheng, Ji-Gen Peng, Ke-Xue Li. A New Model for Graph Matching and Its Algorithm
1297 -- 1300Zhan Gao, Siwei Luo. A QoS-Enabled Double Auction Protocol for the Service Grid
1301 -- 1302Mohamed Rasslan, Amr Youssef. Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
1303 -- 1306Dae Hyun Yum, Jae Woo Seo, Kookrae Cho, Pil Joong Lee. Generalized Hash Chain Traversal with Selective Output
1307 -- 1308Kuo-Chen Hung, Yu-Wen Wou, Peterson Julian. Discussion on A Fuzzy Method for Medical Diagnosis of Headache
1309 -- 1312Jae-woong Jeong, Young-Cheol Park, Dae Hee Youn, Seok-Pil Lee. A Robust Room Inverse Filtering Algorithm for Speech Dereverberation Based on a Kurtosis Maximization
1313 -- 1316Suk Tae Seo, In Keun Lee, Hye Cheun Jeong, Soon Hak Kwon. Gaussian Kernel-Based Multi-Histogram Equalization
1317 -- 1320Quan Miao, Guijin Wang, Xinggang Lin. Kernel Based Image Registration Incorporating with Both Feature and Intensity Matching
1321 -- 1324Chang Liu, Guijin Wang, Fan Jiang, Xinggang Lin. Online HOG Method in Pedestrian Tracking

Volume 93-D, Issue 4

677 -- 678Atsushi Ohnishi. Foreword
679 -- 692Noboru Hattori, Shuichiro Yamamoto, Tsuneo Ajisaka, Tsuyoshi Kitani. Proposal for Requirement Validation Criteria and Method Based on Actor Interaction
693 -- 701Atsushi Ohnishi, Koji Kitamoto. A Generation Method of Alternative Scenarios with a Normal Scenario
702 -- 712Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato, Akira Osada, Kenji Kaijiri. Improving Reliability of Spectrum Analysis for Software Quality Requirements Using TCM
713 -- 720Takehiko Murakawa, Masaru Nakagawa. Graphical Expression of SQL Statements Using Clamshell Diagram
721 -- 732Junko Shirogane, Takashi Mori, Hajime Iwata, Yoshiaki Fukazawa. Accessibility Evaluation for GUI Software Using Source Programs and Its Evaluation
733 -- 744Teruyoshi Zenmyo, Takashi Kobayashi, Motoshi Saeki. Deriving Framework Usages Based on Behavioral Models
745 -- 753Shouzo Hori, Takako Nakatani, Keiichi Katamine, Naoyasu Ubayashi, Masaaki Hashimoto. Project Management Patterns to Prevent Schedule Delay Caused by Requirement Elicitation
754 -- 762Shinpei Hayashi, Yasuyuki Tsuda, Motoshi Saeki. Search-Based Refactoring Detection from Source Code Revisions
763 -- 773Masao Okabe, Akiko Yoshioka, Keido Kobayashi, Takahira Yamaguchi. Organizational Knowledge Transfer Using Ontologies and a Rule-Based System
774 -- 788Sameera Abar, Tetsuo Kinoshita. A Knowledge-Based Strategy for the Automated Support to Network Management Tasks
789 -- 799Ichiro Satoh. Design and Implementation of Context-Aware Musuem Guide Agents
800 -- 810Shigeto Tajima, Nobuo Funabiki, Teruo Higashino. A WDS Clustering Algorithm for Wireless Mesh Networks
811 -- 821Shuang Zhao, Wenqing Lu, Xiaofang Zhou, Dian Zhou, Gerald E. Sobelman. Implementations of FFT and STBD for MIMO-OFDM on a Reconfigurable Baseband Platform
822 -- 833Hiroshi Igaki, Masahide Nakamura. Modeling and Detecting Feature Interactions among Integrated Services of Home Network Systems
834 -- 842Yuna Kim, Wan Yeon Lee, Kyong Hoon Kim, Jong Kim. AdaFF: Adaptive Failure-Handling Framework for Composite Web Services
843 -- 857Lihong Ma, Dong Yu, Gang Wei, Jing Tian, Hanqing Lu. Adaptive Spread-Transform Dither Modulation Using a New Perceptual Model for Color Image Watermarking
858 -- 872Xianzhi Ye, Lei Jing, Mizuo Kansen, Junbo Wang, Kaoru Ota, Zixue Cheng. A Support Method with Changeable Training Strategies Based on Mutual Adaptation between a Ubiquitous Pet and a Learner
873 -- 881Chung-Lin Wen, Bing-Yu Chen, Yoichi Sato. Video Segmentation with Motion Smoothness
882 -- 890Ahmed Afifi, Toshiya Nakaguchi, Norimichi Tsumura, Yoichi Miyake. A Model Optimization Approach to the Automatic Segmentation of Medical Images
891 -- 902Ken-ichi Suzuki, Yoshiyuki Kaeriyama, Kazuhiko Komatsu, Ryusuke Egawa, Nobuyuki Ohba, Hiroaki Kobayashi. A Fast Ray-Tracing Using Bounding Spheres and Frustum Rays for Dynamic Scene Rendering
903 -- 908Ayako Nishimura, Minoru Sakairi, Daisuke Suzuki. Increasing the Strength of Odors Produced by an Odor-Emitting Technology Using Odor Capsules
909 -- 921Ithipan Methasate, Thanaruk Theeramunkong. A Family-Based Evolutional Approach for Kernel Tree Selection in SVMs
922 -- 925Yu Gwang Jin, Nam Soo Kim. On Detecting Target Acoustic Signals Based on Non-negative Matrix Factorization
926 -- 929Jik-Han Jung, Hwal-Suk Lee, Dong-Jo Park. A Fast Block Matching Technique Using a Gradual Voting Strategy
930 -- 933Wenjie Xie, De Xu, Shuoyan Liu, Yingjun Tang. How the Number of Interest Points Affect Scene Classification
934 -- 937Sheng Li, Xiao-Yuan Jing, Lu-Sha Bian, Shi-Qiang Gao, Qian Liu, Yong-Fang Yao. Facial Image Recognition Based on a Statistical Uncorrelated Near Class Discriminant Approach

Volume 93-D, Issue 3

409 -- 410Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai. Foreword
411 -- 420Gang Yao, Jiannong Cao, Ye Yan, Yusheng Ji. Secured Fast Handoff in 802.11-Based Wireless Mesh Networks for Pervasive Internet Access
421 -- 429Song Guo, An-Ni Shen, Minyi Guo. A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks
430 -- 437Zhuo Ma, Jianfeng Ma, Sang-Jae Moon, Xinghua Li. An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment
438 -- 447Yufeng Wang, Akihiro Nakao, Jianhua Ma. HopRec: Hop-Based Recommendation Ability Enhanced Reputation Ranking in P2P Networks
448 -- 457Daigo Muramatsu. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks
458 -- 465Feilong Tang, Minyi Guo, Song Guo. Tier-Based Scalable and Secure Routing for Wireless Sensor Networks with Mobile Sinks
466 -- 472Jingyu Feng, Yuqing Zhang, Hong Wang. A Trust Management Model Based on Bi-evaluation in P2P Networks
473 -- 483Myoung Rak Lee, Byungsik Yoon, Hyogon Kim, Hoh Peter In. A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks
484 -- 490YaHui Li, Jianfeng Ma, Sang-Jae Moon. Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks
491 -- 502Ruixuan Li, Jianfeng Lu, Zhengding Lu, Xiaopu Ma. Consistency Checking of Safety and Availability in Access Control
503 -- 509Xiaofeng Lu, Pan Hui, Don Towsley, Juhua Pu, Zhang Xiong. LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network
510 -- 517Sancheng Peng, Weijia Jia, Guojun Wang, Jie Wu, Minyi Guo. Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks
518 -- 527Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro. Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard
528 -- 530Dang Nguyen Duc, Kwangjo Kim. On the Security of RFID Group Scanning Protocols
531 -- 533BaoKang Zhao, Dan Wang, Zili Shao, Jiannong Cao, Keith C. C. Chan, Jinshu Su. An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming
534 -- 541Stanislav G. Sedukhin, Toshiaki Miyazaki, Kenichi Kuroda. Orbital Systolic Algorithms and Array Processors for Solution of the Algebraic Path Problem
542 -- 549Hayato Yamaguchi, Hiroshi Nakajima, Kazuhiko Taniguchi, Syoji Kobashi, Yutaka Hata. An Ultrasonic and Air Pressure Sensing System for Detection of Behavior before Getting out of Bed Aided by Fuzzy Theory
550 -- 559Seyed-Amin Hosseini-Seno, Tat Chee Wan, Rahmat Budiarto, Masashi Yamada. Management of Energy Consumption on Cluster Based Routing Protocol for MANET
560 -- 568So Ryoung Park, Sanguk Noh. Optimal Decision-Making of Countermeasures by Estimating Their Expected Utilities
569 -- 582Aram Kawewong, Yutaro Honda, Manabu Tsuboyama, Osamu Hasegawa. Reasoning on the Self-Organizing Incremental Associative Memory for Online Robot Path Planning
583 -- 594Masashi Sugiyama, Ichiro Takeuchi, Taiji Suzuki, Takafumi Kanamori, Hirotaka Hachiya, Daisuke Okanohara. Least-Squares Conditional Density Estimation
595 -- 601Keiichiro Oura, Heiga Zen, Yoshihiko Nankaku, Akinobu Lee, Keiichi Tokuda. A Covariance-Tying Technique for HMM-Based Speech Synthesis
602 -- 610Zhong-Ho Chen, Alvin Wen-Yu Su. A Fast and Memory Efficient SPIHT Image Encoder
611 -- 623Yingdi Xie, Jun Ohya. Elliptical Object Detection by a Modified RANSAC with Sampling Constraint from Boundary Curves Clustering
624 -- 634Youzheng Wu, Hideki Kashioka, Satoshi Nakamura. An Unsupervised Model of Redundancy for Answer Validation
635 -- 638Hyeon Gyu Kim, Woo-Lam Kang, Myoung-Ho Kim. Efficient Window Processing over Disordered Data Streams
639 -- 642Daekeun Moon, Jinho Park, Hagbae Kim. An Autonomic Connection Scheme for High Service Availability
643 -- 646Youbean Kim, Jaewon Jang, Hyunwook Son, Sungho Kang. Pattern Mapping Method for Low Power BIST Based on Transition Freezing Method
647 -- 650Suk-Bong Kwon, Hoirin Kim. Utterance Verification Using State-Level Log-Likelihood Ratio with Frame and State Selection
651 -- 653Maciej Kretkowski, Ryszard Jablonski, Yoshifumi Shimodaira. Development of an XYZ Digital Camera with Embedded Color Calibration System for Accurate Color Acquisition
654 -- 657Jung Ah Park, Doug-Young Suh, Gwang Hoon Park. Distributed Video Coding with Multiple Side Information Sets
658 -- 661Guan Pang, Guijin Wang, Xinggang Lin. Real-Time Human Detection Using Hierarchical HOG Matrices
662 -- 665Fan Jiang, Guijin Wang, Chang Liu, Xinggang Lin, Weiguo Wu. Robust Object Tracking via Combining Observation Models
666 -- 670Ken-ichi Sakaue, Youji Iiguni. Moment Invariants of the Weighted Image

Volume 93-D, Issue 2

207 -- 0Yuichi Kaji. Foreword
208 -- 218Tatsuya Akutsu. Tree Edit Distance Problems: Algorithms and Applications to Bioinformatics
219 -- 226Shirou Maruyama, Youhei Tanaka, Hiroshi Sakamoto, Masayuki Takeda. Context-Sensitive Grammar Transform: Compression and Pattern Matching
227 -- 232Kaoru Fujioka. Refinement of Representation Theorems for Context-Free Languages
233 -- 240Yuichi Yoshida, Hiro Ito. Query-Number Preserving Reductions and Linear Lower Bounds for Testing
241 -- 249Ruka Tanahashi, Zhi-Zhong Chen. A Deterministic Approximation Algorithm for Maximum 2-Path Packing
250 -- 256Sung Kwon Kim. Optimal Online and Offline Algorithms for Finding Longest and Shortest Subsequences with Length and Sum Constraints
257 -- 262Hiroki Morizumi, Genki Suzuki. Negation-Limited Inverters of Linear Size
263 -- 270Toshiya Itoh, Yasuhiro Suzuki. Improved Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length
271 -- 279Ngo Anh Vien, SeungGwan Lee, TaeChoong Chung. Policy Gradient Based Semi-Markov Decision Problems: Approximation and Estimation Errors
280 -- 289Hideaki Fukuhara, Eiji Takimoto. Lower Bounds on Quantum Query Complexity for Read-Once Formulas with XOR and MUX Operators
290 -- 292Hideaki Otsuki, Tomio Hirata. Inapproximability of the Minimum Biclique Edge Partition Problem
293 -- 299Shi Wang, Hyongsuk Kim, Chun-Shin Lin, Hongxin Chen. Accurate and Robust Surface Measurement Using Optimal Structured Light Tracking Method
300 -- 305Kazuhiro Nakamura, Masatoshi Yamamoto, Kazuyoshi Takagi, Naofumi Takagi. A VLSI Architecture for Output Probability Computations of HMM-Based Recognition Systems with Store-Based Block Parallel Processing
306 -- 314Kan Watanabe, Masaru Fukushi, Susumu Horiguchi. Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing
315 -- 325Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong, DaeHun Nyang. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency
326 -- 334Kanji Tanaka, Kenichi Saeki, Mamoru Minami, Takeshi Ueda. LSH-RANSAC: Incremental Matching of Large-Size Maps
335 -- 340Ryo Nagata, Jun ichi Kakegawa, Yukiko Yabuta. A Topic-Independent Method for Scoring Student Essay Content
341 -- 349Kun-Ching Wang. An Adaptive Wavelet-Based Denoising Algorithm for Enhancing Speech in Non-stationary Noise Environment
350 -- 358Deng Zhang, Jegoon Ryu, Toshihiro Nishimura. A Novel Modeling and Evaluating for RTS Noise on CMOS Image Sensor in Motion Picture
359 -- 366Jegoon Ryu, Toshihiro Nishimura. Noise Reduction in CMOS Image Sensor Using Cellular Neural Networks with a Genetic Algorithm
367 -- 375Mitsuharu Matsumoto. Band-Pass epsilon-Filter for Edge Enhancement and Noise Removal
376 -- 379Yong Cao, Qingxin Zhu. The Software Reliability Model Based on Fractals
380 -- 383YongJoon Kim, Jaeseok Park, Sungho Kang. Selective Scan Slice Grouping Technique for Efficient Test Data Compression
384 -- 387DongMing Tang, Qingxin Zhu, Yong Cao, Fan Yang. An Efficient Clustering Algorithm for Irregularly Shaped Clusters
388 -- 391Hochong Park, Ho-Sang Sung. Delay-Reduced MDCT for Scalable Speech Codec with Cascaded Transforms
392 -- 394Youngjoo Suh, Hoirin Kim. Cepstral Domain Feature Extraction Utilizing Entropic Distance-Based Filterbank
395 -- 398Makoto Sakai, Norihide Kitaoka, Yuya Hattori, Seiichi Nakagawa, Kazuya Takeda. Evaluation of Combinational Use of Discriminant Analysis-Based Acoustic Feature Transformation and Discriminative Training
399 -- 402Shih-Chieh Shie, Ji-Han Jiang, Long-Tai Chen, Zeng-Hui Huang. Secret Image Transmission Scheme Using Secret Codebook
403 -- 406Zhe Wang, Siwei Luo, Liang Wang. A Fast Algorithm for Learning the Overcomplete Image Prior

Volume 93-D, Issue 12

3163 -- 0Satoshi Fujita. Foreword
3164 -- 3172Kan Watanabe, Masaru Fukushi. Generalized Spot-Checking for Reliable Volunteer Computing
3173 -- 3180Masaki Kohana, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura. Evaluation of a Dynamic Data Allocation Method for Web-Based Multi-Server MORPG System
3181 -- 3193Takeru Inoue, Hiroshi Asakura, Yukio Uematsu, Hiroshi Sato, Noriyuki Takahashi. Web API Database Systems for Rapid Web Application Development
3194 -- 3201Kyong Hoon Kim, Wan Yeon Lee, Jong Kim, Rajkumar Buyya. SLA-Based Scheduling of Bag-of-Tasks Applications on Power-Aware Cluster Systems
3202 -- 3210Min Zhu, Leibo Liu, Shouyi Yin, Chongyong Yin, Shaojun Wei. A Cycle-Accurate Simulator for a Reconfigurable Multi-Media System
3211 -- 3222Xiaomin Jia, Pingjing Lu, Caixia Sun, Minxuan Zhang. Dynamic Program Behavior Identification for High Performance CMPs with Private LLCs
3223 -- 3231Tongsheng Geng, Leibo Liu, Shouyi Yin, Min Zhu, Shaojun Wei. Parallelization of Computing-Intensive Tasks of the H.264 High Profile Decoding Algorithm on a Reconfigurable Multimedia System
3232 -- 3242Yi Tang, Junchen Jiang, Xiaofei Wang, Chengchen Hu, Bin Liu 0001, Zhijia Chen. Parallel DFA Architecture for Ultra High Throughput DFA-Based Pattern Matching
3243 -- 3250Jacir Luiz Bordim, Koji Nakano. Deafness Resilient MAC Protocol for Directional Communications
3251 -- 3259Koichi Nishide, Hiroyuki Kubo, Ryoichi Shinkuma, Tatsuro Takahashi. Virtual Multi-AP Access for Transport-Level Quality Improvement in Wireless Local Area Networks with Hidden Stations
3260 -- 3268Hiroyuki Kubo, Ryoichi Shinkuma, Tatsuro Takahashi. Social Network Based P2P Multicast Reducing Psychological Forwarding Cost in Mobile Networks
3269 -- 3272Kenji Yamada, Tsuyoshi Itokawa, Teruaki Kitasuka, Masayoshi Aritsugi. Redundant TC Message Senders in OLSR
3273 -- 3275Weiwei Yang, Yueming Cai, Lei Wang. Outage Performance of Decode-and-Forward Relay Systems Using Imperfect MRC Receiver over Nakagami-::::m:::: Fading Channels
3276 -- 3283Kazuya Yamashita, Mitsuru Sakai, Sadaki Hirose, Yasuaki Nishitani. The Firing Squad Synchronization Problems for Number Patterns on a Seven-Segment Display and Segment Arrays
3284 -- 3293Yoshiki Yunbe, Masayuki Miyama, Yoshio Matsuda. A VGA 30 fps Affine Motion Model Estimation VLSI for Real-Time Video Segmentation
3294 -- 3305Yusuke Tanaka, Hideki Ando. Register File Size Reduction through Instruction Pre-Execution Incorporating Value Prediction
3321 -- 3330Soonghwan Ro, Hanh Van Nguyen, WooChul Jung, Young Woo Pae, Jonathan P. Munson, Jinmyung Woo, Sibok Yu, Kisung Lee. A Usability Evaluation on the XVC Framework for In-Vehicle User Interfaces
3331 -- 3343Mi-Young Park, Sang-Hwa Chung. Detecting TCP Retransmission Timeouts Non-related to Congestion in Multi-Hop Wireless Networks
3344 -- 3351Karolina Nurzynska, Mamoru Kubo, Ken-ichiro Muramoto. 2D Feature Space for Snow Particle Classification into Snowflake and Graupel
3352 -- 3358Xu Yang, Huilin Xiong, Xin Yang. Optimal Gaussian Kernel Parameter Selection for SVM Classifier
3359 -- 3367Kazunori Komatani, Yuichiro Fukubayashi, Satoshi Ikeda, Tetsuya Ogata, Hiroshi G. Okuno. Selecting Help Messages by Using Robust Grammar Verification for Handling Out-of-Grammar Utterances in Spoken Dialogue Systems
3368 -- 3376Yusuke Takano, Kazuhiro Kondo. Estimation of Speech Intelligibility Using Speech Recognition Systems
3377 -- 3383Dong Yang, Paul R. Dixon, Sadaoki Furui. A New Hybrid Method for Machine Transliteration
3384 -- 3391Takahiro Ota, Hiroyoshi Morita. On-Line Electrocardiogram Lossless Compression Using Antidictionary Codes for a Finite Alphabet
3392 -- 3395Dongsu Kang, Chee-Yang Song, Doo-Kwon Baik. A Feature-Based Service Identification Method to Improve Productivity of Service-Oriented System
3396 -- 3399Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo. Improvement of the Efficient Secret Broadcast Scheme
3400 -- 3402Eun-Jun Yoon, Muhammad Khurram Khan, Kee-Young Yoo. Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
3403 -- 3406Kyungbaek Kim. Relative MTTF-Based Incentive Scheme for Availability-Based Replication in P2P Systems
3407 -- 3409Kazuteru Namba, Kengo Nakashima, Hideo Ito. Single-Event-Upset Tolerant RS Flip-Flop with Small Area
3410 -- 3413Hao Bai, Changzhen Hu, Gang Zhang, Xiao-chuan Jing, Ning Li. Binary Oriented Vulnerability Analyzer Based on Hidden Markov Model
3414 -- 3417Cheng Lu, Mrinal K. Mandal. Improved Demons Technique with Orthogonal Gradient Information for Medical Image Registration

Volume 93-D, Issue 11

2897 -- 0Fumio Teraoka. Foreword
2898 -- 2906Eun-Jun Yoon, Kee-Young Yoo. A Robust Security Mechanism for Mobile Commerce Transactions
2907 -- 2921Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang. Exploring Web Partition in DHT-Based Distributed Web Crawling
2922 -- 2931Shigeya Suzuki, Rodney Van Meter, Osamu Nakamura, Jun Murai. Otedama: A Relocatable RFID Information Repository Architecture
2932 -- 2943Mohammad Behdadfar, Hossein Saidi, Masoud Reza Hashemi, Ali Ghiasian, Hamid Alaei. IP Lookup Using the Novel Idea of Scalar Prefix Search with Fast Table Updates
2944 -- 2952Rentao Gu, Hongxiang Wang, Yongmei Sun, Yuefeng Ji. Fast Traffic Classification Using Joint Distribution of Packet Size and Estimated Protocol Processing Time
2953 -- 2961Heru Sukoco, Yoshiaki Hori, Hendrawan, Kouichi Sakurai. Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
2962 -- 2978Ichiro Mitsuhashi, Michio Oyamaguchi, Kunihiro Matsuura. The Unification Problem for Confluent Semi-Constructor TRSs
2979 -- 2988In-Cheol Park, Tae-Hwan Kim. Multiplier-less and Table-less Linear Approximation for Square-Related Functions
2989 -- 2994Sung Kwon Kim. Optimal Algorithms for Finding Density-Constrained Longest and Heaviest Paths in a Tree
2995 -- 3004Chuzo Iwamoto, Kento Sasaki, Kenji Nishio, Kenichi Morita. NP-Hard and ::::k::::-EXPSPACE-Hard Cast Puzzles
3005 -- 3016Malik Jahan Khan, Mian M. Awais, Shafay Shamail. Improving Efficiency of Self-Configurable Autonomic Systems Using Clustered CBR Approach
3017 -- 3026Young-Jin Kim, Jihong Kim, Jeong-Bae Lee, Kee-Wook Rim. PAW: A Pattern-Aware Write Policy for a Flash Non-volatile Cache
3027 -- 3037Masato Asahara, Kenji Kono, Toshinori Kojima, Ai Hayakawa. P2P-Based Approach to Finding Replica Server Locations for Alleviating Flash Crowds
3038 -- 3050Ana Erika Camargo Cruz, Koichiro Ochimizu. A UML Approximation of Three Chidamber-Kemerer Metrics and Their Ability to Predict Faulty Code across Software Projects
3051 -- 3058Tetsuo Imai, Atsushi Tanaka. A Game Theoretic Model for AS Topology Formation with the Scale-Free Property
3059 -- 3065Kuo-Chen Hung, Yuan-Cheng Tsai, Kuo-Ping Lin, Peterson Julian. A Novel Measured Function for MCDM Problem Based on Interval-Valued Intuitionistic Fuzzy Sets
3066 -- 3075Mitsuharu Matsumoto. Self-Quotient epsilon-Filter for Feature Extraction from Noise Corrupted Image
3076 -- 3087Gang Yeon Kim, Kwan H. Lee. A Reflectance Model for Metallic Paints Using a Two-Layer Structure Surface with Microfacet Distributions
3088 -- 3099Sven Forstmann, Jun Ohya. Efficient, High-Quality, GPU-Based Visualization of Voxelized Surface Data with Fine and Complicated Structures
3100 -- 3107Ching-Chi Chen, Wei-Yen Hsu, Shih-Hsuan Chiu, Yung-Nien Sun. An Efficient Algorithm for Point Set Registration Using Analytic Differential Approach
3108 -- 3111Kenji Tsuchie, Yoshiko Hanada, Seiji Miyoshi. Estimation of Distribution Algorithm Incorporating Switching
3112 -- 3115Heekwon Park, Seungjae Baek, Jongmoo Choi. Performance and Energy Efficiency Tradeoffs of Storage Class Memory
3116 -- 3119Yong Cao, Qingxin Zhu. The Software Reliability Model Using Hybrid Model of Fractals and ARIMA
3120 -- 3123Woong-Kee Loh, Yang-Sae Moon, Jun-Gyu Kang. A Data Cleansing Method for Clustering Large-Scale Transaction Databases
3124 -- 3127Jihwan Song, Xing Xie, Yoon-Joon Lee, Ji-Rong Wen. Estimating Mobile-Friendliness Scores of Web Pages
3128 -- 3131Suk Tae Seo, In Keun Lee, Seo Ho Son, Hyong Gun Lee, Soon Hak Kwon. Co-occurrence Matrix-Based Image Segmentation
3132 -- 3135Ju-Hyun Park, Young-Chul Kim, Hong-Sung Hoon. Edge-Based Motion Vector Processing for Frame Interpolation Based on Weighted Vector Median Filter
3136 -- 3139Yan Li, Siwei Luo, Qi Zou. Active Contour Model Based on Salient Boundary Point Image for Object Contour Detection in Natural Image
3140 -- 3143JunSeong Kim, JongSu Yi. Heuristic Designs of SAD Algorithm for a Platform-Based Vision System
3144 -- 3148Lv Guo, Yin Li, Jie Yang, Li Lu. Exploration into Single Image Super-Resolution via Self Similarity by Sparse Representation
3149 -- 3152Yuefei Zhang, Mei Xie, Ling Mao. Digital Image Stabilization Based on Correction for Basic Reference Frame Jitter
3153 -- 3157In Keun Lee, Soon Hak Kwon. Learning Rule for Time Delay in Fuzzy Cognitive Maps

Volume 93-D, Issue 10

2671 -- 0Masashi Sugiyama. Foreword
2672 -- 2679Hisashi Kashima, Satoshi Oyama, Yoshihiro Yamanishi, Koji Tsuda. Cartesian Kernel: An Efficient Alternative to the Pairwise Kernel
2680 -- 2689Yukito Iba, Shotaro Akaho. Gaussian Process Regression with Measurement Error
2690 -- 2701Masashi Sugiyama. Superfast-Trainable Multi-Class Probabilistic Classifier by Least-Squares Posterior Fitting
2702 -- 2708The Dung Luong, Tu Bao Ho. Privacy Preserving Frequency Mining in 2-Part Fully Distributed Setting
2709 -- 2716Md. Anisuzzaman Siddique, Yasuhiko Morimoto. Algorithm for Computing Convex Skyline Objectsets on Numerical Databases
2717 -- 2727Makoto Nakatsuji, Akimichi Tanaka, Takahiro Madokoro, Kenichiro Okamoto, Sumio Miyazaki, Tadasu Uchiyama. Extracting Know-Who/Know-How Using Development Project-Related Taxonomies
2728 -- 2736Shaopeng Tang, Satoshi Goto. Accurate Human Detection by Appearance and Motion
2737 -- 2746Tetsuo Yokoyama, Gang Zeng, Hiroyuki Tomiyama, Hiroaki Takada. Static Task Scheduling Algorithms Based on Greedy Heuristics for Battery-Powered DVS Systems
2747 -- 2762Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang. Efficient Distributed Web Crawling Utilizing Internet Resources
2763 -- 2775Jian Shen, Sangman Moh, Ilyong Chung. A Priority Routing Protocol Based on Location and Moving Direction in Delay Tolerant Networks
2776 -- 2782Hideyuki Ichihara, Kenta Sutoh, Yuki Yoshikawa, Tomoo Inoue. A Practical Threshold Test Generation for Error Tolerant Application
2783 -- 2791Nobutaka Kito, Kensuke Hanai, Naofumi Takagi. A C-Testable 4-2 Adder Tree for an Easily Testable High-Speed Multiplier
2792 -- 2804Akihiro Inokuchi, Takashi Washio. GTRACE: Mining Frequent Subsequences from Graph Sequences
2805 -- 2812Huimin Lu, Boqin Feng, Xi Chen. Visual Knowledge Structure Reasoning with Intelligent Topic Map
2813 -- 2821Yu Zhou, Junfeng Li, Yanqing Sun, Jianping Zhang, YongHong Yan, Masato Akagi. A Hybrid Speech Emotion Recognition System Based on Spectral and Prosodic Features
2822 -- 2835Sirikan Chucherd, Annupan Rodtook, Stanislav S. Makhanov. Phase Portrait Analysis for Multiresolution Generalized Gradient Vector Flow
2836 -- 2845Kenichi Kanatani, Yasuyuki Sugaya, Hirotaka Niitsuma. Optimization without Minimization Search: Constraint Satisfaction by Orthogonal Projection with Applications to Multiview Triangulation
2846 -- 2849Makoto Yamada, Masashi Sugiyama, Gordon Wichern, Jaak Simm. Direct Importance Estimation with a Mixture of Probabilistic Principal Component Analyzers
2850 -- 2853Masahiro Kimoto, Tatsuhiro Tsuchiya, Tohru Kikuno. The Time Complexity of Hsu and Huang s Self-Stabilizing Maximal Matching Algorithm
2854 -- 2857Dongook Seong, Junho Park, Myungho Yeo, Jaesoo Yoo. Energy Efficient Skyline Query Processing in Wireless Sensor Networks
2858 -- 2861Daekeun Moon, Kwangil Lee, Hagbae Kim. The Design of a Total Ship Service Framework Based on a Ship Area Network
2862 -- 2865Makio Ishihara, Yukio Ishihara. Calibrating Coordinates of a Tabletop Display with a Reflex in Eye-Hand Coordination
2866 -- 2869Na Duan, Soon Hak Kwon. Image Contrast Enhancement by Global and Local Adjustment of Gray Levels
2870 -- 2874Tetsu Matsukawa, Takio Kurita. Extraction of Combined Features from Global/Local Statistics of Visual Words Using Relevant Operations
2875 -- 2878Kazuya Ueki, Masashi Sugiyama, Yasuyuki Ihara. A Semi-Supervised Approach to Perceived Age Prediction from Face Images
2879 -- 2882Chang Wook Ahn, Yehoon Kim. Improving Proximity and Diversity in Multiobjective Evolutionary Algorithms
2883 -- 2886In Keun Lee, Soon Hak Kwon. Design of Sigmoid Activation Functions for Fuzzy Cognitive Maps via Lyapunov Stability Analysis

Volume 93-D, Issue 1

1 -- 0Kazumi Hatayama, Tsuyoshi Shinogi. Foreword
2 -- 9Kohei Miyase, Xiaoqing Wen, Hiroshi Furukawa, Yuta Yamato, Seiji Kajihara, Patrick Girard, Laung-Terng Wang, Mohammad Tehranipoor. High Launch Switching Activity Reduction in At-Speed Scan Testing Using CTX: A Clock-Gating-Based Test Relaxation and X-Filling Scheme
10 -- 16Hiroyuki Yotsuyanagi, Masayuki Yamamoto, Masaki Hashizume. Scan Chain Ordering to Reduce Test Data for BIST-Aided Scan Test Using Compatible Scan Flip-Flops
17 -- 23Anis Uzzaman, Brion L. Keller, Brian Foutz, Sandeep Bhatia, Thomas Bartenstein, Masayuki Arai, Kazuhiko Iwasaki. Reduction of Test Data Volume and Improvement of Diagnosability Using Hybrid Compression
24 -- 32Ryoichi Inoue, Toshinori Hosokawa, Hideo Fujiwara. A Fault Dependent Test Generation Method for State-Observable FSMs to Increase Defect Coverage under the Test Length Constraint
33 -- 42Wimol San-Um, Masayoshi Tachibana. A Fault Signature Characterization Based Analog Circuit Testing Scheme and the Extension of IEEE 1149.4 Standard
43 -- 49Mutsumi Komuro, Norihisa Komoda. A Model to Explain Quality Improvement Effect of Peer Reviews
50 -- 58Changchun Xu, Yanyi Xu, Gan Liu, Kezhong Liu. Voice Communications over 802.11 Ad Hoc Networks: Modeling, Optimization and Call Admission Control
59 -- 67Xiang Fu, Huawei Li, Xiaowei Li. Testable Critical Path Selection Considering Process Variation
68 -- 78Cheng-Min Lin. Reliability Analysis and Modeling of ZigBee Networks
79 -- 86Cong Nguyen Bui, Hae-Yeoun Lee, Jeong-Chun Joo, Heung-Kyu Lee. Secure Bit-Plane Based Steganography for Secret Communication
87 -- 93Mehdi Fallahpour, David MegĂ­as. Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification
94 -- 106Jia Hao, Tadashi Shibata. An Ego-Motion Detection System Employing Directional-Edge-Based Motion Field Representations
107 -- 115Yusuke Ijima, Takashi Nose, Makoto Tachibana, Takao Kobayashi. A Rapid Model Adaptation Technique for Emotional Speech Recognition with Style Estimation Based on Multiple-Regression HMM
116 -- 124Takashi Nose, Takao Kobayashi. A Technique for Estimating Intensity of Emotional Expressions and Speaking Styles in Speech Based on Multiple-Regression HSMM
125 -- 133Minoru Mori, Minako Sawaki, Junji Yamato. Robust Character Recognition Using Adaptive Feature Extraction Method
134 -- 143Ryo Ohtera, Takahiko Horiuchi, Hiroaki Kotera. Eyegaze Detection from Monocular Camera Image for Eyegaze Communication System
144 -- 151Kenichi Kanatani. Geometric BIC
152 -- 166Trung Ngo Thanh, Yuichiro Kojima, Hajime Nagahara, Ryusuke Sagawa, Yasuhiro Mukaigawa, Masahiko Yachida, Yasushi Yagi. Real-Time Estimation of Fast Egomotion with Feature Classification Using Compound Omnidirectional Vision Sensor
167 -- 175Junghoon Kwon, Jeongin Lee, Harksu Kim, Gilsoo Jang, Young-Ho Chai. Deforming NURBS Surfaces to Target Curves for Immersive VR Sketching
176 -- 184Miao Song 0002, Keizo Shinomori, Shiyong Zhang. The Influence of a Low-Level Color or Figure Adaptation on a High-Level Face Perception
185 -- 188Lixin Jia, Bo Yang, Suchang Guo, Dong Ho Park. Software Reliability Modeling Considering Fault Correction Process
193 -- 196YongJoon Kim, Jaeseok Park, Sungho Kang. A Selective Scan Chain Activation Technique for Minimizing Average and Peak Power Consumption
197 -- 200Bong-Jin Lee, Chi-Sang Jung, Jeung-Yoon Choi, Hong-Goo Kang. On the Importance of Transition Regions for Automatic Speaker Recognition
201 -- 204Joo-Young Lee, Young-In Song, Hae-Chang Rim, Kyoung-Soo Han. Incorporating Frame Information to Semantic Role Labeling