941 | -- | 0 | Hiroyuki Seki. Foreword |
942 | -- | 952 | Haruhiko Sato, Masahito Kurihara. Multi-Context Rewriting Induction with Termination Checkers |
953 | -- | 962 | Keita Uchiyama, Masahiko Sakai, Toshiki Sakabe. Decidability of Termination and Innermost Termination for Term Rewriting Systems with Right-Shallow Dependency Pairs |
963 | -- | 973 | Yuki Chiba, Takahito Aoto, Yoshihito Toyama. Program Transformation Templates for Tupling Based on Term Rewriting |
974 | -- | 984 | Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi. Towards Reliable E-Government Systems with the OTS/CafeOBJ Method |
985 | -- | 993 | Chul-Joo Kim, Jeong-Han Yun, Seonggun Kim, Kwang-Moo Choe, Taisook Han. Over-Approximated Control Flow Graph Construction on Pure Esterel |
994 | -- | 1005 | Takeshi Nagaoka, Kozo Okano, Shinji Kusumoto. An Abstraction Refinement Technique for Timed Automata Based on Counterexample-Guided Abstraction Refinement Loop |
1006 | -- | 1017 | Satoshi Hattori. Computer Algebra System as Test Generation System |
1018 | -- | 1019 | Hiroaki Kikuchi. Foreword |
1020 | -- | 1030 | Yang Ou, Kyung Hyune Rhee. A Survey on Image Hashing for Image Authentication |
1031 | -- | 1043 | Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai. Analysis of Existing Privacy-Preserving Protocols in Domain Name System |
1044 | -- | 1052 | Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao. Time-Bound Hierarchical Key Assignment: An Overview |
1053 | -- | 1061 | Sunghyun Kim, Heejo Lee. Abnormal Policy Detection and Correction Using Overlapping Transition |
1062 | -- | 1069 | Masana Murase. Eliminating Cell Broadband Engine:::TM::: DMA Buffer Overflows |
1070 | -- | 1079 | Chao Huang, Jianling Sun, Xinyu Wang, Di Wu. Inconsistency Resolution Method for RBAC Based Interoperation |
1080 | -- | 1086 | Kazumasa Omote, Kazuhiko Kato. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards |
1087 | -- | 1095 | Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro. Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC |
1096 | -- | 1105 | Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6 |
1106 | -- | 1116 | Masashi Eto, Kotaro Sonoda, Daisuke Inoue, Katsunari Yoshioka, Koji Nakao. Fine-Grain Feature Extraction from Malware s Scan Behavior Based on Spectrum Analysis |
1117 | -- | 1126 | Chun-Liang Lee, Chia-Tai Chan, Pi-Chung Wang. Packet Classification with Hierarchical Cross-Producting |
1127 | -- | 1136 | Md. Rakib Hassan, Md. Monirul Islam, Kazuyuki Murase. A New Local Search Based Ant Colony Optimization Algorithm for Solving Combinatorial Optimization Problems |
1137 | -- | 1146 | In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh. NVFAT: A FAT-Compatible File System with NVRAM Write Cache for Its Metadata |
1147 | -- | 1153 | Yong-Hee Kim, Myoung-Jo Jung, Cheol-Hoon Lee. Energy-Aware Real-Time Task Scheduling Exploiting Temporal Locality |
1154 | -- | 1161 | Ing-Xiang Chen, Chien-Hung Li, Cheng-Zen Yang. Mining Co-location Relationships among Bug Reports to Localize Fault-Prone Modules |
1162 | -- | 1174 | Yu Zhang, Binxing Fang, Hao Luo. Identifying High-Rate Flows Based on Sequential Sampling |
1175 | -- | 1185 | Jianliang Gao, Yinhe Han, Xiaowei Li. A Novel Post-Silicon Debug Mechanism Based on Suspect Window |
1186 | -- | 1196 | Hirotoshi Iwasaki, Nobuhiro Mizuno, Kousuke Hara, Yoichi Motomura. User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks |
1197 | -- | 1204 | Keita Imada, Katsuhiko Nakamura. Search for Minimal and Semi-Minimal Rule Sets in Incremental Learning of Context-Free and Definite Clause Grammars |
1205 | -- | 1213 | Yizhong Xin, Xiangshi Ren. An Investigation of Adaptive Pen Pressure Discretization Method Based on Personal Pen Pressure Use Profile |
1214 | -- | 1224 | Jinyong Jo, JongWon Kim. imCast: Studio-Quality Digital Media Platform Exploiting Broadband IP Networks |
1225 | -- | 1237 | Bing-Fei Wu, Hao-Yu Huang, Yen-Lin Chen, Hsin-Yuan Peng, Jia-Hsiung Huang. MPEG-2/4 Low-Complexity Advanced Audio Coding Optimization and Implementation on DSP |
1238 | -- | 1243 | Fu-Kun Chen, Kuo-Bao Kuo. Complexity Scalability Design in the Internet Low Bit Rate Codec (iLBC) for Speech Coding |
1244 | -- | 1252 | Makoto Sakai, Norihide Kitaoka, Kazuya Takeda. Acoustic Feature Transformation Based on Discriminant Analysis Preserving Local Structure for Speech Recognition |
1253 | -- | 1262 | Keita Hirai, Jambal Tumurtogoo, Ayano Kikuchi, Norimichi Tsumura, Toshiya Nakaguchi, Yoichi Miyake. Video Quality Assessment Using Spatio-Velocity Contrast Sensitivity Function |
1263 | -- | 1271 | Zhu Li, Kenichi Yabuta, Hitoshi Kitazawa. Exclusive Block Matching for Moving Object Extraction and Tracking |
1272 | -- | 1281 | Takanobu Oba, Takaaki Hori, Atsushi Nakamura. Improved Sequential Dependency Analysis Integrating Labeling-Based Sentence Boundary Detection |
1282 | -- | 1290 | Xia Mao, Zheng Li. Generating and Describing Affective Eye Behaviors |
1291 | -- | 1293 | Kazuto Oshima. A Simple Procedure for Classical Signal-Processing in Cluster-State Quantum Computation |
1294 | -- | 1296 | Kai-Jie Zheng, Ji-Gen Peng, Ke-Xue Li. A New Model for Graph Matching and Its Algorithm |
1297 | -- | 1300 | Zhan Gao, Siwei Luo. A QoS-Enabled Double Auction Protocol for the Service Grid |
1301 | -- | 1302 | Mohamed Rasslan, Amr Youssef. Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes |
1303 | -- | 1306 | Dae Hyun Yum, Jae Woo Seo, Kookrae Cho, Pil Joong Lee. Generalized Hash Chain Traversal with Selective Output |
1307 | -- | 1308 | Kuo-Chen Hung, Yu-Wen Wou, Peterson Julian. Discussion on A Fuzzy Method for Medical Diagnosis of Headache |
1309 | -- | 1312 | Jae-woong Jeong, Young-Cheol Park, Dae Hee Youn, Seok-Pil Lee. A Robust Room Inverse Filtering Algorithm for Speech Dereverberation Based on a Kurtosis Maximization |
1313 | -- | 1316 | Suk Tae Seo, In Keun Lee, Hye Cheun Jeong, Soon Hak Kwon. Gaussian Kernel-Based Multi-Histogram Equalization |
1317 | -- | 1320 | Quan Miao, Guijin Wang, Xinggang Lin. Kernel Based Image Registration Incorporating with Both Feature and Intensity Matching |
1321 | -- | 1324 | Chang Liu, Guijin Wang, Fan Jiang, Xinggang Lin. Online HOG Method in Pedestrian Tracking |