Journal: IEICE Transactions

Volume 99-D, Issue 9

2200 -- 2201Tadashi Iijima. Foreword
2202 -- 2209Eiji Shiota, Atsushi Ohnishi. Scenario Retrieval Method Using Differential Scenario
2210 -- 2218Satoshi Masuda, Tohru Matsuodani, Kazuhiko Tsuda. Detecting Logical Inconsistencies by Clustering Technique in Natural Language Requirements
2219 -- 2228Takanobu Kobori, Hironori Washizaki, Yoshiaki Fukazawa, Daisuke Hirabayashi, Katsutoshi Shintani, Yasuko Okazaki, Yasuhiro Kikushima. Exhaustive and Efficient Identification of Rationales Using GQM+Strategies with Stakeholder Relationship Analysis
2229 -- 2238Hiroyuki Nakagawa, Tatsuhiro Tsuchiya. A Search-Based Constraint Elicitation in Test Design
2239 -- 2247Yan Zhang, Hongyan Mao. CCP-Based Plant-Wide Optimization and Application to the Walking-Beam-Type Reheating Furnace
2248 -- 2258Aseffa Dereje Tekilu, Chin-Hsien Wu. A Virtualization-Based Hybrid Storage System for a Map-Reduce Framework
2259 -- 2268Hiroaki Akutsu, Kazunori Ueda, Takeru Chiba, Tomohiro Kawaguchi, Norio Shimozono. Reliability and Failure Impact Analysis of Distributed Storage Systems with Dynamic Refuging
2269 -- 2282Xianqiang Bao, Nong Xiao, Yutong Lu, Zhiguang Chen. A Configuration Management Study to Fast Massive Writing for Distributed NoSQL System
2283 -- 2294Khalid Mahmood, Mazen Alobaidi, Hironao Takahashi. Autonomous Decentralized Semantic Based Traceability Link Recovery Framework
2295 -- 2305Jun-Li Lu, Makoto P. Kato, Takehiro Yamamoto, Katsumi Tanaka. Entity Identification on Microblogs by CRF Model with Adaptive Dependency
2306 -- 2319Chaiyaporn Panyindee, Chuchart Pintavirooj. Optimal Gaussian Weight Predictor and Sorting Using Genetic Algorithm for Reversible Watermarking Based on PEE and HS
2320 -- 2331Masaya Murata, Hidehisa Nagano, Kaoru Hiramatsu, Kunio Kashino, Shin'ichi Satoh. Bayesian Exponential Inverse Document Frequency and Region-of-Interest Effect for Enhancing Instance Search Accuracy
2332 -- 2340Chao Zhang, Haitian Sun, Takuya Akashi. Robust Non-Parametric Template Matching with Local Rigidity Constraints
2341 -- 2350Chao Zhang, Takuya Akashi. Robust Projective Template Matching
2351 -- 2359SeungJong Noh, Moongu Jeon. Vehicle Detection Using Local Size-Specific Classifiers
2360 -- 2367Motohiro Nakamura, Shinnosuke Oya, Takahiro Okabe, Hendrik P. A. Lensch. Acquiring 4D Light Fields of Self-Luminous Extended Light Sources Using Programmable Filter
2368 -- 2376Yoshihide Kato, Shigeki Matsubara. Incremental Semantic Construction Based on Combinatory Categorial Grammar
2377 -- 2380Byungnam Lim, Yeeun Shim, Yon Dohn Chung. 2PTS: A Two-Phase Task Scheduling Algorithm for MapReduce
2381 -- 2384Yong Zhang, Wanqiu Zhang, Dunwei Gong, Yi-Nan Guo, Leida Li. An Improved PSO Algorithm for Interval Multi-Objective Optimization Systems
2385 -- 2389Hongzhe Li, Jaesang Oh, Heejo Lee. Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code
2390 -- 2394Dae Hyun Yum. Mathematical Analysis of Secrecy Amplification in Key Infection
2395 -- 2399Xiao-Fan Chen, Shunzheng Yu. A Collaborative Intrusion Detection System against DDoS for SDN
2400 -- 2403Gyuyeong Kim, Wonjun Lee. Tardy Flow Scheduling in Data Center Networks
2404 -- 2409Woo Hyun Ahn, Sang-Hyeon Park, Jaewon Oh, Seung Ho Lim. Inishing: A UI Phishing Attack to Exploit the Vulnerability of Inotify in Android Smartphones
2410 -- 2412Yong-Jo Ahn, Xiangjian Wu, Donggyu Sim, Woo-Jin Han. Fast Intra Mode Decision for Screen Contents Coding in HEVC
2413 -- 2416Mahmoud Emam, Qi Han, Liyang Yu, Hongli Zhang. A Keypoint-Based Region Duplication Forgery Detection Algorithm
2417 -- 2421Katsuto Nakajima, Azusa Mama, Yuki Morimoto. Energy-Based Tree Illustration System: ETIS

Volume 99-D, Issue 8

1964 -- 1965Guojun Wang. Foreword
1966 -- 1973Huaqun Wang, Keqiu Li, Kaoru Ota, Jian Shen. Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things
1974 -- 1981Remi Ando, Shigeyoshi Shima, Toshihiko Takemura. Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment
1982 -- 1990Licheng Wang, Jing Li, Haseeb Ahmad. Challenges of Fully Homomorphic Encryptions for the Internet of Things
1991 -- 2001Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu, Shen Su. Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense
2002 -- 2009Jinli Rao, Zhangqing He, Shu Xu, Kui Dai, Xuecheng Zou. BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
2010 -- 2018Anfeng Liu, Xiao Liu, He Li, Jun Long. MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs
2019 -- 2026Guangquan Xu, Yuanyuan Ren, Yuanbin Han, Xiaohong Li, Zhiyong Feng. Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems
2027 -- 2035Kai Fan, Zhao Du, Yuanyuan Gong, Yue Wang, Tongjiang Yan, Hui Li 0006, Yintang Yang. A Secure RFID Application Revocation Scheme for IoT
2036 -- 2043Lu Shen, Shifang Feng, Jinjin Sun, Zhongwei Li, Ming Su, Gang Wang, Xiaoguang Liu. CloudS: A Multi-Cloud Storage System with Multi-Level Security
2044 -- 2055Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin. A Matrix Based ORAM: Design, Implementation and Experimental Analysis
2056 -- 2060Toshifumi Nishinaga, Masahiro Mambo. Implementation of µNaCl on 32-bit ARM Cortex-M0
2061 -- 2068GuanJun Liu, Changjun Jiang. Behavioral Equivalence of Security-Oriented Interactive Systems
2069 -- 2078Mohammad Rasool Sarrafi Aghdam, Noboru Sonehara. Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model
2079 -- 2089Yoshinori Aono, Takuya Hayashi 0001, Le Trieu Phong, Lihua Wang. Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption
2090 -- 2099Min Shao, Min Sik Kim, Victor C. Valgenti, Jungkeun Park. Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems
2100 -- 2108Komang Oka Saputra, Wei-Chung Teng, Takaaki Nara. Hough Transform-Based Clock Skew Measurement by Dynamically Locating the Region of Offset Majority
2109 -- 2120Jessada Karnjana, Masashi Unoki, Pakinee Aimmanee, Chai Wutiwiwatchai. Singular-Spectrum Analysis for Digital Audio Watermarking with Automatic Parameterization and Parameter Estimation
2121 -- 2130Hyeongboo Baek, Jaewoo Lee, Yongjae Lee, Hyunsoo Yoon. Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems
2131 -- 2139Shutchon Premchaisawatt, Nararat Ruangchaijatupon. The Novel Performance Evaluation Method of the Fingerprinting-Based Indoor Positioning
2140 -- 2150Sila Chunwijitra, Chanchai Junlouchai, Sitdhibong Laokok, Pornchai Tummarattananont, Kamthorn Krairaksa, Chai Wutiwiwatchai. An Interoperability Framework of Open Educational Resources and Massive Open Online Courses for Sustainable e-Learning Platform
2151 -- 2160Tetsuya Watanabe, Kosuke Araki, Toshimitsu Yamaguchi, Kazunori Minatani. Development of Tactile Graph Generation Web Application Using R Statistics Software Environment
2161 -- 2171Chien-Quang Le, Sang Phan, Thanh Duc Ngo, Duy-Dinh Le, Shin'ichi Satoh, Duc Anh Duong. Human Action Recognition from Depth Videos Using Pool of Multiple Projections with Greedy Selection
2172 -- 2176So Jin Ahn, Dae-Yon Hwang, Miyoung Kang, Jin-Young Choi. Hierarchical System Schedulability Analysis Framework Using UPPAAL
2177 -- 2181Duc Tiep Vu, Kyungbaek Kim. Flow Clustering Based Efficient Consolidated Middlebox Positioning Approach for SDN/NFV-Enabled Network
2182 -- 2185Hideo Fujiwara, Katsuya Fujiwara. Realization of SR-Equivalents Using Generalized Shift Registers for Secure Scan Design
2186 -- 2189Huawei Tao, Ruiyu Liang, Cheng Zha, Xinran Zhang, Li Zhao. Spectral Features Based on Local Hu Moments of Gabor Spectrograms for Speech Emotion Recognition
2190 -- 2193Guohao Lyu, Hui Yin, Xinyan Yu, Siwei Luo. A Local Characteristic Image Restoration Based on Convolutional Neural Network
2194 -- 2198Jun-Sang Yoo, Ji-Hoon Choi, Kang-Sun Choi, Dae Yeol Lee, Hui-Yong Kim, Jong-Ok Kim. Fast Search of a Similar Patch for Self-Similarity Based Image Super Resolution

Volume 99-D, Issue 7

1733 -- 1741Chien-Min Chen, Min-Sheng Lin. Computing Terminal Reliability of Multi-Tolerance Graphs
1742 -- 1752Wa Si, Xun Pan, Harutoshi Ogai, Katsumi Hirai. A Novel Lambertian-RBFNN for Office Light Modeling
1753 -- 1761Wa Si, Xun Pan, Harutoshi Ogai, Katsumi Hirai. LP Guided PSO Algorithm for Office Lighting Control
1762 -- 1775Jie Zou, Ling Xu, Mengning Yang, Xiaohong Zhang, Jun Zeng, Sachio Hirokawa. Automated Duplicate Bug Report Detection Using Multi-Factor Analysis
1776 -- 1785Youngsub Han, Dong-hyun Lee, Byoungju Choi, Mike Hinchey, Hoh Peter In. Value-Driven V-Model: From Requirements Analysis to Acceptance Testing
1786 -- 1795Natthawut Kertkeidkachorn, Ryutaro Ichise. A Heuristic Expansion Framework for Mapping Instances to Linked Open Data
1796 -- 1809Balgeun Yoo, Seongjin Lee, Youjip Won. Power Consumption Signature: Characterizing an SSD
1810 -- 1821Aslihan Akyol, Mehmet Hacibeyoglu, Bekir Karlik. Design of Multilevel Hybrid Classifier with Variant Feature Sets for Intrusion Detection System
1822 -- 1835Junbeom Hur, Mengxue Guo, Younsoo Park, Chan-Gun Lee, Ho-Hyun Park. Reputation-Based Collusion Detection with Majority of Colluders
1836 -- 1851Donghoon Lee, Dongwoo Kang, Younsung Choi, Jiye Kim, Dongho Won. API-Based Software Birthmarking Method Using Fuzzy Hashing
1852 -- 1861Haeyoung Lee. SmartUI: Resource-Saving and Editable Smartphone User Interface for Fast Remote PC Control
1862 -- 1870Seokhee Jeon. Haptic Rendering of Curved Surface by Bending an Encountered-Type Flexible Plate
1871 -- 1876Yinhui Zhang, Zifen He. Large Displacement Dynamic Scene Segmentation through Multiscale Saliency Flow
1877 -- 1884Masanori Morise, Fumiya Yokomori, Kenji Ozawa. WORLD: A Vocoder-Based High-Quality Speech Synthesis System for Real-Time Applications
1885 -- 1894Mauricio Kugler, Teemu Tossavainen, Miku Nakatsu, Susumu Kuroyanagi, Akira Iwata. Real-Time Hardware Implementation of a Sound Recognition System with In-Field Learning
1895 -- 1902Jiatian Pi, Keli Hu, Yuzhang Gu, Lei Qu, Fengrong Li, Xiaolin Zhang, Yunlong Zhan. Robust Scale Adaptive and Real-Time Visual Tracking with Correlation Filters
1903 -- 1909Wenbo Yuan, Zhiqiang Cao, Min Tan, hongkai Chen. Multiple-Object Tracking in Large-Scale Scene
1910 -- 1919Yu Liu, Changwen Zheng. Adaptive Rendering Using a Best Matching Patch
1920 -- 1927Eiji Uchino, Ryosuke Kubota, Takanori Koga, Hideaki Misawa, Noriaki Suetake. Multiple k-Nearest Neighbor Classifier and Its Application to Tissue Characterization of Coronary Plaque
1928 -- 1932Seon Hwan Kim, Ju Hee Choi, Jong Wook Kwak. PBGC: Proxy Block-Based Garbage Collection for Index Structures in NAND Flash Memory
1933 -- 1936Seunghwan Park, Dong-Hoon Lee. Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
1937 -- 1940Hyun-Tae Kim, Hyun-Kyu Kang, Chang Wook Ahn. A Conditional Dependency Based Probabilistic Model Building Grammatical Evolution
1941 -- 1944Zhen Liu, Jun-an Yang, Hui Liu, Jian Liu. Learning from Multiple Sources via Multiple Domain Relationship
1945 -- 1948Gihyoun Lee, Sung Dae Na, Ki-Woong Seong, Jin-Ho Cho, Myoung Nam Kim. Speech Enhancement Algorithm Using Recursive Wavelet Shrinkage
1949 -- 1952Byonghwa Lee, Kwang-Ki Kim, Minsoo Hahn. Efficient Residual Coding Method of Spatial Audio Object Coding with Two-Step Coding Structure for Interactive Audio Services
1953 -- 1956Tao Fan, Guozhong Wang, Xiwu Shang. Fast Coding Unit Size Decision in HEVC Intra Coding
1957 -- 1960Bong-Soo Sohn. Design and Comparison of Immersive Gesture Interfaces for HMD Based Virtual World Navigation

Volume 99-D, Issue 6

1409 -- 0Yoshinobu Kawabe. Foreword
1410 -- 1419Kazuki Miyahara, Kenji Hashimoto, Hiroyuki Seki. Query Rewriting for Nondeterministic Tree Transducers
1420 -- 1427Toshiyuki Miyamoto. Choreography Realization by Re-Constructible Decomposition of Acyclic Relations
1428 -- 1435Sasinee Pruekprasert, Toshimitsu Ushio. Optimal Stabilizing Controller for the Region of Weak Attraction under the Influence of Disturbances
1436 -- 0Hideki Kashioka. Foreword
1437 -- 1446Hayato Maki, Tomoki Toda, Sakriani Sakti, Graham Neubig, Satoshi Nakamura. Enhancing Event-Related Potentials Based on Maximum a Posteriori Estimation with a Spatial Correlation Prior
1447 -- 1454Liang-Bi Chen, Wan-Jung Chang, Kuen-Min Lee, Chi-Wei Huang, Katherine Shu-Min Li. A Comprehensive Medicine Management System with Multiple Sources in a Nursing Home in Taiwan
1455 -- 1461Yugo Hayashi. Lexical Network Analysis on an Online Explanation Task: Effects of Affect and Embodiment of a Pedagogical Agent
1462 -- 1473Shogo Okada, Mi Hang, Katsumi Nitta. Predicting Performance of Collaborative Storytelling Using Multimodal Analysis
1474 -- 1481Lei Zhang, Leijun Liu, Wen Li. Sparse Trajectory Prediction Method Based on Entropy Estimation
1482 -- 1484Yoshitaka Otani, Osamu Aoki, Tomohiro Hirota, Hiroshi Ando. Lower Trunk Acceleration Signals Reflect Fall Risk During Walking
1485 -- 1501Fagui Liu, Yingyi Yang. D-Paxos: Building Hierarchical Replicated State Machine for Cloud Environments
1502 -- 1511Dongchul Park, Biplob K. Debnath, David H. C. Du. A Dynamic Switching Flash Translation Layer Based on Page-Level Mapping
1512 -- 1520Tinghuai Ma, Limin Guo, Meili Tang, Yuan Tian, Mznah Al-Rodhaan, Abdullah Al-Dhelaan. A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness
1521 -- 1530Khai Nguyen, Ryutaro Ichise. Linked Data Entity Resolution System Enhanced by Configuration Learning Algorithm
1531 -- 1540Zhili Zhou, Ching-Nung Yang, Beijing Chen, Xingming Sun, Qi Liu, Q. M. Jonathan Wu. Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation
1541 -- 1552Antonio Cedillo-Hernandez, Manuel Cedillo-Hernandez, Francisco J. García-Ugalde, Mariko Nakano-Miyatake, Héctor Pérez-Meana. A Visible Watermarking with Automated Location Technique for Copyright Protection of Portrait Images
1553 -- 1562Kenji Fujikawa, Hiroaki Harai, Motoyuki Ohmori, Masataka Ohta. Quickly Converging Renumbering in Network with Hierarchical Link-State Routing Protocol
1563 -- 1575Seokjoon Hong, Ducsun Lim, Inwhee Joe. Extended Dual Virtual Paths Algorithm Considering the Timing Requirements of IEC61850 Substation Message Types
1576 -- 1584Cong Minh Dinh, Hyung Jeong Yang, Gueesang Lee, Soo-Hyung Kim. Fast Lyric Area Extraction from Images of Printed Korean Music Scores
1585 -- 1594Antoine Trouvé, Arnaldo J. Cruz, Kazuaki J. Murakami, Masaki Arai, Tadashi Nakahira, Eiji Yamanaka. Guide Automatic Vectorization by means of Machine Learning: A Case Study of Tensor Contraction Kernels
1595 -- 1602Xiaolei Liu, Xiaosong Zhang, Yiqi Jiang, Qingxin Zhu. Modified t-Distribution Evolutionary Algorithm for Dynamic Deployment of Wireless Sensor Networks
1603 -- 1614Bima Sena Bayu Dewantara, Jun Miura. Estimating Head Orientation Using a Combination of Multiple Cues
1615 -- 1625Hangyu Li, Hajime Kira, Shinobu Hasegawa. Cultivating Listening Skills for Academic English Based on Strategy Object Mashups Approach
1626 -- 1634Hideki Nakayama, Tomoya Tsuda. Efficient Two-Step Middle-Level Part Feature Extraction for Fine-Grained Visual Categorization
1635 -- 1644Hamed Eslami, Abolghasem A. Raie, Karim Faez. Precise Vehicle Speed Measurement Based on a Hierarchical Homographic Transform Estimation for Law Enforcement Applications
1645 -- 1652Hao Wu, Heyan Huang. Sentence Similarity Computational Model Based on Information Content
1653 -- 1662Yali Li, Hongma Liu, Shengjin Wang. Exploiting EEG Channel Correlations in P300 Speller Paradigm for Brain-Computer Interface
1663 -- 1670Hyun-chong Cho, Lubomir M. Hadjiiski, Berkman Sahiner, Heang-Ping Chan, Chintana Paramagul, Mark A. Helvie, Alexis V. Nees, Hyun Chin Cho. A Similarity Study of Interactive Content-Based Image Retrieval Scheme for Classification of Breast Lesions
1671 -- 1677Yibing Li, Wei Nie, Fang Ye. A Robust Algorithm for Extracting Signals with Temporal Structure
1678 -- 1681Wenzhu Wang, Kun Jiang, Yusong Tan, Qingbo Wu. Dominant Fairness Fairness: Hierarchical Scheduling for Multiple Resources in Heterogeneous Datacenters
1682 -- 1685Rui Li, Liang Tao. Fast Algorithm for Computing Analysis Windows in Real-Valued Discrete Gabor Transform
1686 -- 1689Zhihong Liu, Aimal Khan, Peixin Chen, Yaping Liu, Zhenghu Gong. DynamicAdjust: Dynamic Resource Adjustment for Mitigating Skew in MapReduce
1690 -- 1693Zhaofeng Wu, Guyu Hu, Fenglin Jin, Yinjin Fu, Jianxin Luo, Tingting Zhang. The Stability-Featured Dynamic Multi-Path Routing
1694 -- 1697Ping Lu, Wenming Zheng, Ziyan Wang, Qiang Li, Yuan Zong, Minghai Xin, Lenan Wu. Micro-Expression Recognition by Regression Model and Group Sparse Spatio-Temporal Feature Learning
1698 -- 1701Jaeyong Ju, Taeyup Song, Bonhwa Ku, Hanseok Ko. Key Frame Extraction Based on Chaos Theory and Color Information for Video Summarization
1702 -- 1706Jin Xu, Yuansong Qiao, Zhizhong Fu. Adaptive Perceptual Block Compressive Sensing for Image Compression
1707 -- 1710Hyun Chul Choi. Non-Linear Extension of Generalized Hyperplane Approximation
1711 -- 1715Atsushi Tatsuma, Masaki Aono. Food Image Recognition Using Covariance of Convolutional Layer Feature Maps
1716 -- 1719Shigang Li, Hiroya Funaki. Discrete Spherical Laplacian Operator
1720 -- 1723Jiatian Pi, Keli Hu, Xiaolin Zhang, Yuzhang Gu, Yunlong Zhan. Robust Object Tracking with Compressive Sensing and Patches Matching
1724 -- 1728Toru Hiraoka, Kiichi Urahama. Generation of Oil-Film-Like Images by Bilateral Infra-Envelope Filter
1729 -- 1732Jaeyong Ju, Murray Loew, Bonhwa Ku, Hanseok Ko. Hybrid Retinal Image Registration Using Mutual Information and Salient Features

Volume 99-D, Issue 5

1275 -- 1284Thao-Nguyen Truong, Khanh-Van Nguyen, Ikki Fujiwara, Michihiro Koibuchi. Layout-Conscious Expandable Topology for Low-Degree Interconnection Networks
1285 -- 1295Leibo Liu, Dong Wang, Yingjie Chen, Min Zhu, Shouyi Yin, Shaojun Wei. An Implementation of Multiple-Standard Video Decoder on a Mixed-Grained Reconfigurable Computing Platform
1296 -- 1303Hung-Cheng Chang, Kuei-Chung Chang, Ying-Dar Lin, Yuan-Cheng Lai. Application Performance Profiling in Android Dalvik Virtual Machines
1304 -- 1315Saya Onoue, Hideaki Hata, Akito Monden, Ken-ichi Matsumoto. Investigating and Projecting Population Structures in Open Source Software Projects: A Case Study of Projects in GitHub
1316 -- 1325Tong Yuan, Zhijing Liu, Hui Liu. Optimizing Hash Join with MapReduce on Multi-Core CPUs
1326 -- 1336Tien-Khoi Phan, HaRim Jung, Hee Yong Youn, Ung-Mo Kim. Efficient Evaluation of Maximizing Range Sum Queries in a Road Network
1337 -- 1344Yasuyuki Kobayashi. Effects of Numerical Errors on Sample Mahalanobis Distances
1345 -- 1352Takashi Watanabe, Yuta Karasawa. Comparison of Muscle Stimulation Groups for Simplified Practical FES Cycling Control with Cycling Wheelchair: An Experimental Test with Healthy Subjects
1353 -- 1363Yoshikazu Washizawa. Learning Subspace Classification Using Subset Approximated Kernel Principal Component Analysis
1364 -- 1374Yang Lei, Zhanjie Song, Qiwei Song. Non-Convex Low-Rank Approximation for Image Denoising and Deblurring
1375 -- 1383Katsuyuki Tanaka, Tetsuya Takiguchi, Yasuo Ariki. k-Farthest Neighbours
1384 -- 1387Huiseong Heo, Cheongjin Ahn, Deok-Hwan Kim. Parity Data De-Duplication in All Flash Array-Based OpenStack Cloud Block Storage
1388 -- 1391Rana Asif Rehman, Byung-Seo Kim. Location-Aware Forwarding and Caching in CCN-Based Mobile Ad Hoc Networks
1392 -- 1395Vladimir V. Stankovic, Mladen P. Tasic. Computer Application for Mastering Memorizing Numbers
1396 -- 1399Hyunki Lim, Jae Sung Lee, Dae Won Kim. Accelerating Multi-Label Feature Selection Based on Low-Rank Approximation
1400 -- 1403Chao Liang, Wenming Yang, Fei Zhou, Qingmin Liao. Reflection and Rotation Invariant Uniform Patterns for Texture Classification
1404 -- 1407Bin Tang, Jianxin Luo, Guiqiang Ni, Weiwei Duan, Yi Gao. VdPAs: An Intermediate Data Source for Rendering Dynamic Vectors on Height Field

Volume 99-D, Issue 4

785 -- 786Toshihiro Yamauchi. Foreword
787 -- 795Kazukuni Kobara. Cyber Physical Security for Industrial Control Systems and IoT
796 -- 804Rashed Mazumder, Atsuko Miyaji. A New Scheme of Blockcipher Hash
805 -- 815Yasuyuki Nogami, Hiroto Kagotani, Kengo Iokibe, Hiroyuki Miyatake, Takashi Narita. FPGA Implementation of Various Elliptic Curve Pairings over Odd Characteristic Field with Non Supersingular Curves
816 -- 829Kazumasa Omote, Tran Thao Phuong. D2-POR: Direct Repair and Dynamic Operations in Network Coding-Based Proof of Retrievability
830 -- 838Shoichiro Yamasaki, Tomoko K. Matsushima. A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission
839 -- 849Rui Wang, Qiaoyan Wen, Hua Zhang 0001, Xuelei Li. A Novel Protocol-Feature Attack against Tor's Hidden Service
850 -- 859Xiulei Wang, Ming Chen 0003, Chang-you Xing, Tingting Zhang. Defending DDoS Attacks in Software-Defined Networking Based on Legitimate Source and Destination IP Address Database
860 -- 872Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto. MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks
873 -- 882Bo Sun, Mitsuaki Akiyama, Takeshi Yagi, Mitsuhiro Hatada, Tatsuya Mori. Automating URL Blacklist Generation with Similarity Search Approach
883 -- 890Hyoung-Kee Choi, Ki-Eun Shin, Hyoungshick Kim. A Healthcare Information System for Secure Delivery and Remote Management of Medical Records
891 -- 894Hyunsu Mun, Youngseok Lee. Examining Privacy Leakage from Online Used Markets in Korea
895 -- 0Toshiyuki Amagasa. Foreword
896 -- 905Huifeng Guo, Dian-Hui Chu, Yunming Ye, Xutao Li, Xixian Fan. BLM-Rank: A Bayesian Linear Method for Learning to Rank and Its GPU Implementation
906 -- 917Keisuke Kiritoshi, Qiang Ma 0001. Named Entity Oriented Difference Analysis of News Articles and Its Application
918 -- 926Hongyeon Kim, Sungmin Kang, Seok-Joo Lee, Jun-Ki Min. The Efficient Algorithms for Constructing Enhanced Quadtrees Using MapReduce
927 -- 935Nan Jiang, Wenge Rong, Baolin Peng, Yifan Nie, Zhang Xiong. Modeling Joint Representation with Tri-Modal Deep Belief Networks for Query and Question Matching
936 -- 943Chooi-Ling Goh, Shigetoshi Nakatake. A Sensor-Based Data Visualization System for Training Blood Pressure Measurement by Auscultatory Method
944 -- 958Nobutaka Suzuki, Kosetsu Ikeda, Yeondae Kwon. An Algorithm for All-Pairs Regular Path Problem on External Memory Graphs
959 -- 968Yongyos Kaewpitakkun, Kiyoaki Shirai. Incorporation of Target Specific Knowledge for Sentiment Analysis on Microblogging
969 -- 978Md-Mizanur Rahoman, Ryutaro Ichise. Automatic Erroneous Data Detection over Type-Annotated Linked Data
979 -- 988Shunsuke Ohashi, Giovanni Yoko Kristianto, Goran Topic, Akiko Aizawa. Efficient Algorithm for Math Formula Semantic Search
989 -- 999Masafumi Makino, Tatsuo Tsuji, Ken Higuchi. History-Pattern Encoding for Large-Scale Dynamic Multidimensional Datasets and Its Evaluations
1000 -- 1009Ryosuke Koyanagi, Ryo Furukawa, Tsubasa Takahashi, Takuya Mori, Toshiyuki Amagasa, Hiroyuki Kitagawa. k-Concealment Anonymization
1010 -- 1018Marie Katsurai, Ikki Ohmukai, Hideaki Takeda 0001. Topic Representation of Researchers' Interests in a Large-Scale Academic Database and Its Application to Author Disambiguation
1019 -- 1022Kyoungman Bae, Youngjoong Ko. How to Combine Translation Probabilities and Question Expansion for Question Classification in cQA Services
1023 -- 0Masayuki Nakajima. Foreword
1024 -- 1031Asako Soga, Bin Umino, Yuho Yazaki, Motoko Hirayama. Body-Part Motion Synthesis System and Its Evaluation for Discovery Learning of Dance
1032 -- 1037Chung-Liang Lai, Chien-Ming Tseng, D. Erdenetsogt, Tzu-Kuan Liao, Ya-Ling Huang, Yung-fu Chen. A Kinect-Based System for Balance Rehabilitation of Stroke Patients
1038 -- 1051Isao Miyagawa, Yukinobu Taniguchi. Dense Light Transport for Relighting Computation Using Orthogonal Illumination Based on Walsh-Hadamard Matrix
1052 -- 1061Shohei Kakei, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii. SSL Client Authentication with TPM
1062 -- 1070Wei Zhang, Huan Ren, Qingshan Jiang. Application of Feature Engineering for Phishing Detection
1071 -- 1080Hyunjoo Kim, Jong-Hyun Kim, Jung-Tai Kim, Ikkyun Kim, Tai-Myung Chung. Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call
1081 -- 1091Bumsoon Jang, Seokjoo Doo, Soojin Lee, Hyunsoo Yoon. Hybrid Recovery-Based Intrusion Tolerant System for Practical Cyber-Defense
1092 -- 1107Ryota Shioya, Ryo Takami, Masahiro Goshima, Hideki Ando. FXA: Executing Instructions in Front-End for Energy Efficiency
1108 -- 1116Chun Hung Cheng, Ying-Wen Bai. An Automatically Peak-Shift Control Design for Charging and Discharging of the Battery in an Ultrabook
1117 -- 1126Tomomi Hatano, Takashi Ishio, Joji Okada, Yuji Sakata, Katsuro Inoue. Dependency-Based Extraction of Conditional Statements for Understanding Business Rules
1127 -- 1138Masayoshi Shimamura, Hiroaki Yamanaka, Akira Nagata, Katsuyoshi Iida, Eiji Kawai, Masato Tsuru. Elastic and Adaptive Resource Orchestration Architecture on 3-Tier Network Virtualization Model
1139 -- 1152Iku Ohama, Hiromi Iida, Takuya Kida, Hiroki Arimura. The Relevance Dependent Infinite Relational Model for Discovering Co-Cluster Structure from Relationships with Structured Noise
1153 -- 1161Yusuke Iwasawa, Ikuko Eguchi Yairi, Yutaka Matsuo. Combining Human Action Sensing of Wheelchair Users and Machine Learning for Autonomous Accessibility Data Collection
1162 -- 1171Chao Xu 0008, Dongxiang Zhou, Tao Guan, Yongping Zhai, Yunhui Liu. Automatic Recognition of Mycobacterium Tuberculosis Based on Active Shape Model
1172 -- 1181Jianjuan Liang, Bilan Zhu, Taro Kumagai, Masaki Nakagawa. Character-Position-Free On-Line Handwritten Japanese Text Recognition by Two Segmentation Methods
1182 -- 1192Kheang Seng, Kouichi Katsurada, Yurie Iribe, Tsuneo Nitta. Using Reversed Sequences and Grapheme Generation Rules to Extend the Feasibility of a Phoneme Transition Network-Based Grapheme-to-Phoneme Conversion
1193 -- 1201Chihiro Tsutake, Yutaka Nakano, Toshiyuki Yoshida. Fast Mode Decision Technique for HEVC Intra Prediction Based on Reliability Metric for Motion Vectors
1202 -- 1211Fang Tian, Jie Guo, Bin Song, Haixiao Liu, Hao Qin. 1-Analysis Based Reconstruction
1212 -- 1220Yu Wang 0018, Jien Kato. Efficient Local Feature Encoding for Human Action Recognition with Approximate Sparse Coding
1221 -- 1233Yuta Nakashima, Noboru Babaguchi, Jianping Fan. Privacy Protection for Social Video via Background Estimation and CRF-Based Videographer's Intention Modeling
1234 -- 1241Nattapong Thammasan, Koichi Moriyama, Ken-ichi Fukui, Masayuki Numao. Continuous Music-Emotion Recognition Based on Electroencephalogram
1242 -- 1245Seon Hwan Kim, Ju Hee Choi, Jong Wook Kwak. HaWL: Hidden Cold Block-Aware Wear Leveling Using Bit-Set Threshold for NAND Flash Memory
1246 -- 1250Riham AlTawy, Ahmed Abdelkhalek 0001, Amr M. Youssef. b
1251 -- 1254Joonsang Baek, Ilsun You. Efficient Subversion of Symmetric Encryption with Random Initialization Vector
1255 -- 1258Hideo Fujiwara, Katsuya Fujiwara. Properties of Generalized Feedback Shift Registers for Secure Scan Design
1259 -- 1263Jianhong Wang, Pinzheng Zhang, Linmin Luo. Nonnegative Component Representation with Hierarchical Dictionary Learning Strategy for Action Recognition
1264 -- 1267Quan Miao, Chun Zhang, Long Meng. Feature-Based On-Line Object Tracking Combining Both Keypoints and Quasi-Keypoints Matching
1268 -- 1271Suofei Zhang, Zhixin Sun, Xu Cheng, Lin Zhou. Object Tracking with Embedded Deformable Parts in Dynamic Conditional Random Fields
1272 -- 1274YingJiang Wu, Benyong Liu. Spatial and Anatomical Regularization Based on Multiple Kernel Learning for Neuroimaging Classification

Volume 99-D, Issue 3

558 -- 0Keisuke Tanaka. Foreword
559 -- 566Hiroshi Fujiwara, Atsushi Matsuda, Toshihiro Fujito. Competitive Analysis for the Flat-Rate Problem
567 -- 574Hiroshi Fujiwara, Takahiro Seki, Toshihiro Fujito. Online Weight Balancing on the Unit Circle
575 -- 587Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki, Toru Fujiwara. Determinacy and Subsumption of Single-Valued Bottom-Up Tree Transducers
588 -- 597Shuichi Inokuchi, Hitoshi Furusawa, Toshikazu Ishida, Yasuo Kawahara. Cellular Automata Associated with Σ-Algebras
598 -- 606Takehiro Ito, Hiroyuki Nooka, Xiao Zhou. Reconfiguration of Vertex Covers in a Graph
607 -- 614Chuzo Iwamoto, Yusuke Kitagaki. Visibility Problems for Manhattan Towers
615 -- 623Morito Oomine, Hiroshi Nagamochi. Characterizing Output Locations of GSP Mechanisms to Obnoxious Facility Game in Trees
624 -- 629Katsuhisa Yamanaka, Shin-Ichi Nakano. Uniformly Random Generation of Floorplans
630 -- 640Ryota Shioya, Hideki Ando. Improvement of Renamed Trace Cache through the Reduction of Dependent Path Length for High Energy Efficiency
641 -- 649Hongda Wang, Jianchun Xing, Juelong Li, Qiliang Yang, Xuewei Zhang, Deshuai Han, Kai Li. Path Feasibility Analysis of BPEL Processes under Dead Path Elimination Semantics
650 -- 660Cong Liu, Jiujun Cheng, Yirui Wang, Shangce Gao. Time Performance Optimization and Resource Conflicts Resolution for Multiple Project Management
661 -- 670Xin Yang, Norihiro Yoshida, Raula Gaikovina Kula, Hajimu Iida. Peer Review Social Network (PeRSoN) in Open Source Projects
671 -- 687Katsuhisa Maruyama, Takayuki Omori, Shinpei Hayashi. Slicing Fine-Grained Code Change History
688 -- 694Halil Arslan, Sinan Tüncel. A New State-Based Connectivity Model for Peer-to-Peer Networks
695 -- 707Daisuke Kotani, Yasuo Okabe. A Packet-In Message Filtering Mechanism for Protection of Control Plane in OpenFlow Switches
708 -- 713David Kocik, Yuki Hirai, Keiichi Kaneko. Node-to-Set Disjoint Paths Problem in a Möbius Cube
714 -- 723Chendra Hadi Suryanto, Kazuhiro Fukui, Hideitsu Hino. Protein Fold Classification Using Large Margin Combination of Distance Metrics
724 -- 730Byung-Ok Kang, Oh-Wook Kwon. Combining Multiple Acoustic Models in GMM Spaces for Robust Speech Recognition
731 -- 738Li Tian, Qi Jia, Sei-ichiro Kamata. Integrating Multiple Global and Local Features by Product Sparse Coding for Image Retrieval
739 -- 746Tatsuro Orikasa, Takayuki Okatani. A Gaze-Reactive Display for Simulating Depth-of-Field of Eyes When Viewing Scenes with Multiple Depths
747 -- 750Seon-Ho Shin, Jooyoung Lee, Jong-Hyun Kim, Ikkyun Kim, MyungKeun Yoon. Hash Table with Expanded-Key for High-Speed Networking
751 -- 755Keehang Kwon, Jeongyoon Seo, Dae-Seong Kang. Bounded-Choice Statements for User Interaction in Imperative Programming
756 -- 759Jae-Chul Um, Ki-Seong Lee, Chan-Gun Lee. Adaptive Weighting of Structural Dependency and Textual Similarity in Software Architecture Recovery
760 -- 762Jaehyun Hwang, Cheol-Ho Hong, Hyo-Joong Suh. Dynamic Inbound Rate Adjustment Scheme for Virtualized Cloud Data Centers
763 -- 768Yasutaka Hatakeyama, Takahiro Ogawa, Hironori Ikeda, Miki Haseyama. A Most Resource-Consuming Disease Estimation Method from Electronic Claim Data Based on Labeled LDA
769 -- 772Yi-Jia Zhang, Zhong-Jian Kang, Xin-Ling Guo, Zhe-Ming Lu. The Structural Vulnerability Analysis of Power Grids Based on Overall Information Centrality
773 -- 776Leida Li, Yu Zhou, Jinjian Wu, Jiansheng Qian, Beijing Chen. Color-Enriched Gradient Similarity for Retouched Image Quality Evaluation
777 -- 780Soongi Hong, Yoonsik Choe, Yong-goo Kim. Efficient Motion Vector Re-Estimation Based on a Novel Cost Model for a H.264/AVC Transcoder
781 -- 784Yunlong Zhan, Yuzhang Gu, Xiaolin Zhang, Lei Qu, Jiatian Pi, Xiaoxia Huang, Yingguan Wang, Jufeng Luo, Yunzhou Qiu. Stereo Matching Based on Efficient Image-Guided Cost Aggregation

Volume 99-D, Issue 2

313 -- 323Lixin Wang, Yutong Lu, Wei Zhang, Yan Lei. Distributed and Scalable Directory Service in a Parallel File System
324 -- 331Hei-Chia Wang, Che-Tsung Yang. Enhanced Particle Swarm Optimization with Self-Adaptation on Entropy-Based Inertia Weight
332 -- 340Masaki Nakanishi, Miki Matsuyama, Yumi Yokoo. A Fast Quantum Computer Simulator Based on Register Reordering
341 -- 350Hideki Ando, Ryota Shioya. Performance of Dynamic Instruction Window Resizing for a Given Power Budget under DVFS Control
351 -- 359Ruijin Zhu, Yu-an Tan, Quan-Xin Zhang, Fei Wu, Jun Zheng, Yuan Xue. Determining Image Base of Firmware Files for ARM Devices
360 -- 369Dongwoo Lee, Changwoo Min, Young Ik Eom. vCanal: Paravirtual Socket Library towards Fast Networking in Virtualized Environment
370 -- 382Sejin Park, Chanik Park. Offline Selective Data Deduplication for Primary Storage Systems
383 -- 396Kamalas Udomlamlert, Takahiro Hara, Shojiro Nishio. Threshold-Based Distributed Continuous Top-k Query Processing for Minimizing Communication Overhead
397 -- 405Liang Chen, Chengcheng Shao, Peidong Zhu, Haoyang Zhu. Using Trust of Social Ties for Recommendation
406 -- 414Alberto Fernández-Isabel, Rubén Fuentes-Fernández. An Integrative Modelling Language for Agent-Based Simulation of Traffic
415 -- 423Xuan Sam Nguyen, Daehee Kim, Sunshin An. An Adaptive Relay Transmission Scheme for Reliable Data Forwarding in Wireless Body Area Networks
424 -- 434Haeyoung Lee. A Practical System for Instant 3D Games Using Quizzes
435 -- 442Yuhu Cheng, Xue Qiao, Xuesong Wang. An Improved Indirect Attribute Weighted Prediction Model for Zero-Shot Image Classification
443 -- 453Chao Wang, Xuanqin Mou, Lei Zhang 0006. QP Selection Optimization for Intra-Frame Encoding Based on Constant Perceptual Quality
454 -- 466Siriwat Kasamwattanarote, Yusuke Uchida, Shin'ichi Satoh. Query Bootstrapping: A Visual Mining Based Query Expansion
467 -- 474Yinhui Zhang, Mohamed Abdel-Mottaleb, Zifen He. Nonlinear Regression of Saliency Guided Proposals for Unsupervised Segmentation of Dynamic Scenes
475 -- 487Meng Zhang, Tinghuan Chen, Xuchao Shi, Peng Cao. Image Arbitrary-Ratio Down- and Up-Sampling Scheme Exploiting DCT Low Frequency Components and Sparsity in High Frequency Components
488 -- 495Peijiang Kuang, Zhiheng Zhou, Dongcheng Wu. Improved Edge Boxes with Object Saliency and Location Awards
496 -- 504Chun Fui Liew, Takehisa Yairi. Robust Face Alignment with Random Forest: Analysis of Initialization, Landmarks Regression, and Shape Regularization Methods
505 -- 513Xun Pan, Wa Si, Harutoshi Ogai. Fast Vanishing Point Estimation Based on Particle Swarm Optimization
514 -- 524Yoko Nakajima, Michal Ptaszynski, Hirotoshi Honma, Fumito Masui. A Method for Extraction of Future Reference Sentences Based on Semantic Role Labeling
525 -- 528Eishi Chiba, Shinji Imahori. Maximizing the Total Weight of Just-In-Time Jobs under Multi-Slot Conditions Is NP-Hard
529 -- 532Wei-Chi Ku, Bo-Ren Cheng, Yu-Chang Yeh, Chia-Ju Chang. A Simple Sector-Based Textual-Graphical Password Scheme with Resistance to Login-Recording Attacks
533 -- 536Jun Ma, Yonghong Zhang, Shengheng Liu. Improvement of Auctioneer's Revenue under Incomplete Information in Cognitive Radio Networks
537 -- 540Jinling Zhou, Xingchun Diao, Jianjun Cao, Zhisong Pan. An Optimization Strategy for CFDMiner: An Algorithm of Discovering Constant Conditional Functional Dependencies
541 -- 544Shijian Huang, Junyong Ye, TongQing Wang, Li Jiang, Changyuan Xing, Yang Li. Learning a Similarity Constrained Discriminative Kernel Dictionary from Concatenated Low-Rank Features for Action Recognition
545 -- 549Bin Yao, Lifeng He, Shiying Kang, Xiao Zhao, Yuyan Chao. A Further Improvement on Bit-Quad-Based Euler Number Computing Algorithm
550 -- 553Tae Gyoon Kang, Nam Soo Kim. DNN-Based Voice Activity Detection with Multi-Task Learning
554 -- 557Weina Zhou, Xiangyang Xue, Yun Chen. Low-Rank and Sparse Decomposition Based Frame Difference Method for Small Infrared Target Detection in Coastal Surveillance

Volume 99-D, Issue 12

2858 -- 2859Yasuhiko Nakashima. Foreword
2860 -- 2870Keisuke Mashita, Maya Tabuchi, Ryohei Yamada, Tomoaki Tsumura. A Waiting Mechanism with Conflict Prediction on Hardware Transactional Memory
2871 -- 2880Hiroshi Nakahara, Tomoya Ozaki, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano. Novel Chip Stacking Methods to Extend Both Horizontally and Vertically for Many-Core Architectures with ThrouChip Interface
2881 -- 2890Yuan He 0002, Masaaki Kondo, Takashi Nakada, Hiroshi Sasaki, Shinobu Miwa, Hiroshi Nakamura. A Runtime Optimization Selection Framework to Realize Energy Efficient Networks-on-Chip
2891 -- 2900Minseong Choi, Takashi Fukuda, Masahiro Goshima, Shuichi Sakai. An Inductive Method to Select Simulation Points
2901 -- 2910Tatsuya Kawamoto, Xin Zhou, Jacir Luiz Bordim, Yasuaki Ito, Koji Nakano. An FPGA Implementation for a Flexible-Length-Arithmetic Processor Employing the FDFM Processor Core Approach
2911 -- 2922Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa. Enhancing Entropy Throttling: New Classes of Injection Control in Interconnection Networks
2923 -- 2933Ryo Hamamoto, Chisa Takano, Hiroyasu Obata, Kenji Ishida. Improvement of Throughput Prediction Scheme Considering Terminal Distribution in Multi-Rate WLAN Considering Both CSMA/CA and Frame Collision
2934 -- 2942Mohiyeddin Mozaffari, Behrooz Safarinejadian. A Mobile Agent Based Distributed Variational Bayesian Algorithm for Flow and Speed Estimation in a Traffic System
2943 -- 2955Yuichi Nakamura, Akira Moriguchi, Masanori Irie, Taizo Kinoshita, Toshihiro Yamauchi. Rule-Based Sensor Data Aggregation System for M2M Gateways
2956 -- 2967Tatsuyuki Matsushita, Shinji Yamanaka, Fangming Zhao. A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage
2968 -- 2977Nannan Qiao, Jiali You, Yiqiang Sheng, Jinlin Wang, Haojiang Deng. An Efficient Algorithm of Discrete Particle Swarm Optimization for Multi-Objective Task Assignment
2978 -- 2985Yunkai Du, Naijie Gu, Xin Zhou. Accelerating Reachability Analysis on Petri Net for Mutual Exclusion-Based Deadlock Detection
2986 -- 2994Shunji Funasaka, Koji Nakano, Yasuaki Ito. Fully Parallelized LZW Decompression for CUDA-Enabled GPUs
2995 -- 3003Lucas Saad N. Nunes, Jacir Luiz Bordim, Yasuaki Ito, Koji Nakano. A Memory-Access-Efficient Implementation for Computing the Approximate String Matching Algorithm on GPUs
3004 -- 3012Takumi Honda, Yasuaki Ito, Koji Nakano. GPU-Accelerated Bulk Execution of Multiple-Length Multiplication with Warp-Synchronous Programming Technique
3013 -- 3023Atsushi Ohta, Ryota Kawashima, Hiroshi Matsuo. A Replication Protocol Supporting Multiple Consistency Models without Single Point of Failure
3024 -- 3034Soramichi Akiyama, Takahiro Hirofuchi, Ryousei Takano, Shinichi Honiden. Fast Live Migration for IO-Intensive VMs with Parallel and Adaptive Transfer of Page Cache via SAN
3035 -- 3046Lixin Wang, Yutong Lu, Wei Zhang, Yan Lei. RFS: An LSM-Tree-Based File System for Enhanced Microdata Performance
3047 -- 3052Chien-Min Chen, Min-Sheng Lin. Computing K-Terminal Reliability of Circular-Arc Graphs
3053 -- 3059Shengxiao Niu, Gengsheng Chen. The Improvement of the Processes of a Class of Graph-Cut-Based Image Segmentation Algorithms
3060 -- 3071Yuechao Lu, Fumihiko Ino, Kenichi Hagihara. Cache-Aware GPU Optimization for Out-of-Core Cone Beam CT Reconstruction of High-Resolution Volumes
3072 -- 3081Yuttakon Yuttakonkit, Shinya Takamaeda-Yamazaki, Yasuhiko Nakashima. Performance Optimization of Light-Field Applications on GPU
3082 -- 3089Masakazu Hioki, Hanpei Koike. Low Overhead Design of Power Reconfigurable FPGA with Fine-Grained Body Biasing on 65-nm SOTB CMOS Technology
3090 -- 3100Md Zia Ullah, Masaki Aono. A Bipartite Graph-Based Ranking Approach to Query Subtopics Diversification Focused on Word Embedding Features
3101 -- 3109Kamthorn Puntumapon, Thanawin Rakthanmanon, Kitsana Waiyamai. Cluster-Based Minority Over-Sampling for Imbalanced Datasets
3110 -- 3118Hai Dai Nguyen, Anh Duc Le, Masaki Nakagawa. Recognition of Online Handwritten Math Symbols Using Deep Neural Networks
3119 -- 3131Kei Sawada, Akira Tamamori, Kei Hashimoto, Yoshihiko Nankaku, Keiichi Tokuda. A Bayesian Approach to Image Recognition Based on Separable Lattice Hidden Markov Models
3132 -- 3139Yuji Oshima, Shinnosuke Takamichi, Tomoki Toda, Graham Neubig, Sakriani Sakti, Satoshi Nakamura. Non-Native Text-to-Speech Preserving Speaker Individuality Based on Partial Correction of Prosodic and Phonetic Characteristics
3140 -- 3153Bei Liu, Makoto P. Kato, Katsumi Tanaka. Cognition-Aware Summarization of Photos Representing Events
3154 -- 3164Wiennat Mongkulmann, Takahiro Okabe, Yoichi Sato. Auto-Radiometric Calibration in Photometric Stereo
3165 -- 3171Yuke Li, Weiming Shen. Inter-Person Occlusion Handling with Social Interaction for Online Multi-Pedestrian Tracking
3172 -- 3176Liyu Wang, Qiang Wang, Lan Chen, Xiaoran Hao. Fine-Grained Data Management for DRAM/SSD Hybrid Main Memory Architecture
3177 -- 3180Sang-Ho Hwang, Ju Hee Choi, Jong Wook Kwak. Migration Cost Sensitive Garbage Collection Technique for Non-Volatile Memory Systems
3181 -- 3184Peixin Chen, Yilun Wu, Jinshu Su, Xiaofeng Wang. Comparing Performance of Hierarchical Identity-Based Signature Schemes
3185 -- 3187Jaehwan Lee, Min Jae Jo, Ji Sun Shin. LigeroAV: A Light-Weight, Signature-Based Antivirus for Mobile Environment
3188 -- 3191Hao Liu, Hideaki Goto. Privacy-Enhanced Similarity Search Scheme for Cloud Image Databases
3192 -- 3196Hong Liu, Mengdi Yue, Jie Zhang. Bi-Direction Interaural Matching Filter and Decision Weighting Fusion for Sound Source Localization in Noisy Environments

Volume 99-D, Issue 11

2672 -- 2681Tian Chen, Dandan Shen, Xin Yi, Huaguo Liang, Xiaoqing Wen, Wei Wang. Reseeding-Oriented Test Power Reduction for Linear-Decompression-Based Test Compression Architectures
2682 -- 2693Mauricio Kugler, Teemu Tossavainen, Susumu Kuroyanagi, Akira Iwata. Design of a Compact Sound Localization Device on a Stand-Alone FPGA-Based Platform
2694 -- 2704Yao Hu, Ikki Fujiwara, Michihiro Koibuchi. Job Mapping and Scheduling on Free-Space Optical Networks
2705 -- 2715Kenta Serizawa, Sayaka Kamei, Syuhei Hayashi, Satoshi Fujita. Personalized Web Page Recommendation Based on Preference Footprint to Browsed Pages
2716 -- 2722Dongxu Cheng, Jianwei Liu, Zhenyu Guan, Tao Shang. A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks
2723 -- 2733Widianto, Masaki Hashizume, Shohei Suenaga, Hiroyuki Yotsuyanagi, Akira Ono, Shyue-Kung Lu, Zvi Roth. A Built-in Test Circuit for Electrical Interconnect Testing of Open Defects in Assembled PCBs
2734 -- 2744Akinori Hidaka, Takio Kurita. Optimum Nonlinear Discriminant Analysis and Discriminant Kernel Support Vector Machine
2745 -- 2758Hiroshi Matsuura. Multi-Agent Steiner Tree Algorithm Based on Branch-Based Multicast
2759 -- 2766Junichi Danjo, Sonoko Danjo, Yu Nakamura, Keiji Uchida, Hideyuki Sawada. Micro-Vibration Patterns Generated from Shape Memory Alloy Actuators and the Detection of an Asymptomatic Tactile Sensation Decrease in Diabetic Patients
2767 -- 2777Kazuhiro Kobayashi, Tomoki Toda, Tomoyasu Nakano, Masataka Goto, Satoshi Nakamura. Improvements of Voice Timbre Control Based on Perceived Age in Singing Voice Conversion
2778 -- 2787Chanho Jung, Sanghyun Joo, Do-Won Nam, Wonjun Kim. Revisiting the Regression between Raw Outputs of Image Quality Metrics and Ground Truth Measurements
2788 -- 2795Do Hang Nga, Keiji Yanai. Automatic Retrieval of Action Video Shots from the Web Using Density-Based Cluster Analysis and Outlier Detection
2796 -- 2808Kensho Hara, Takatsugu Hirayama, Kenji Mase. Vote Distribution Model for Hough-Based Action Detection
2809 -- 2813SeokJin Im, HeeJoung Hwang. An Index Based on Irregular Identifier Space Partition for Quick Multiple Data Access in Wireless Data Broadcasting
2814 -- 2816Jinwoo Lee, Jae Woo Seo, Kookrae Cho, Pil Joong Lee, Juneyeun Kim, Seung Hoon Choi, Dae Hyun Yum. A Visibility-Based Upper Bound for Android Unlock Patterns
2817 -- 2820Rui Wang, Qiaoyan Wen, Hua Zhang 0001, Su-Juan Qin, Wenmin Li. Transparent Discovery of Hidden Service
2821 -- 2823Antoine Bossard, Keiichi Kaneko. Set-to-Set Disjoint Paths Routing in Torus-Connected Cycles
2824 -- 2827Quan Miao, Chenbo Shi, Long Meng, Guang Cheng. On-Line Rigid Object Tracking via Discriminative Feature Classification
2828 -- 2831Chao Liang, Wenming Yang, Fei Zhou, Qingmin Liao. RBM-LBP: Joint Distribution of Multiple Local Binary Patterns for Texture Classification
2832 -- 2835Chao Xu 0008, Dongxiang Zhou, Yunhui Liu. An Algorithm of Connecting Broken Objects Based on the Skeletons
2836 -- 2839Xiantao Jiang, Tian Song, Wen Shi, Takafumi Katayama, Takashi Shimamoto, Lisheng Wang. Fast Coding Unit Size Decision Based on Probabilistic Graphical Model in High Efficiency Video Coding Inter Prediction
2840 -- 2842Yundong Li, Jiyue Zhang, Yubing Lin. Combining Fisher Criterion and Deep Learning for Patterned Fabric Defect Inspection
2843 -- 2846Zhenxin Yang, Miao Li, Lei Chen 0014, Kai Sun. A Morpheme-Based Weighting for Chinese-Mongolian Statistical Machine Translation
2847 -- 2850Chao Xu 0008, Dongxiang Zhou, Keju Peng, Weihong Fan, Yunhui Liu. Contrast Enhancement of Mycobacterium Tuberculosis Images Based on Improved Histogram Equalization
2851 -- 2855Eisuke Ito, Yusuke Tomaru, Akira Iizuka, Hirokazu Hirai, Tsuyoshi Kato. Adaptive Local Thresholding for Co-Localization Detection in Multi-Channel Fluorescence Microscopic Images

Volume 99-D, Issue 10

2422 -- 0Norihide Kitaoka. Foreword
2423 -- 2430Khe Chai Sim. Sensitivity-Characterised Activity Neurogram (SCAN) for Visualising and Understanding the Inner Workings of Deep Neural Network
2431 -- 2443Tsubasa Ochiai, Shigeki Matsuda, Hideyuki Watanabe, Xugang Lu, Chiori Hori, Hisashi Kawai, Shigeru Katagiri. Speaker Adaptive Training Localizing Speaker Modules in DNN for Hybrid DNN-HMM Speech Recognizers
2444 -- 2451Satoshi Tamura, Hiroshi Ninomiya, Norihide Kitaoka, Shin Osuga, Yurie Iribe, Kazuya Takeda, Satoru Hayamizu. Investigation of DNN-Based Audio-Visual Speech Recognition
2452 -- 2461Ryo Masumura, Taichi Asami, Takanobu Oba, Hirokazu Masataki, Sumitaka Sakauchi, Akinori Ito. Investigation of Combining Various Major Language Model Technologies including Data Expansion and Adaptation
2462 -- 2470Ryo Masumura, Taichi Asami, Takanobu Oba, Hirokazu Masataki, Sumitaka Sakauchi, Satoshi Takahashi. N-gram Approximation of Latent Words Language Models for Domain Robust Automatic Speech Recognition
2471 -- 2480Xin Wang, Shinji Takaki, Junichi Yamagishi. Investigation of Using Continuous Representation of Various Linguistic Units in Neural Network Based Text-to-Speech Synthesis
2481 -- 2489Yamato Ohtani, Masatsune Tamura, Masahiro Morita, Masami Akamine. Statistical Bandwidth Extension for Speech Synthesis Based on Gaussian Mixture Model with Sub-Band Basis Spectrum Model
2490 -- 2498Shinnosuke Takamichi, Tomoki Toda, Graham Neubig, Sakriani Sakti, Satoshi Nakamura. A Statistical Sample-Based Approach to GMM-Based Voice Conversion Using Tied-Covariance Acoustic Models
2499 -- 2507Hang Ren, QingWei Zhao, Yonghong Yan 0002. Policy Optimization for Spoken Dialog Management Using Genetic Algorithm
2508 -- 2517Lasguido Nio, Sakriani Sakti, Graham Neubig, Koichiro Yoshino, Satoshi Nakamura. Neural Network Approaches to Dialog Response Retrieval and Generation
2518 -- 2527Naoki Sawada, Hiromitsu Nishizaki. Re-Ranking Approach of Spoken Term Detection Using Conditional Random Fields-Based Triphone Detection
2528 -- 2538Kentaro Domoto, Takehito Utsuro, Naoki Sawada, Hiromitsu Nishizaki. Spoken Term Detection Using SVM-Based Classifier Trained with Pre-Indexed Keywords
2539 -- 2549Keisuke Imoto, Suehiro Shimauchi. Acoustic Scene Analysis Based on Hierarchical Generative Model of Acoustic Event Sequence
2550 -- 2553Xuyang Wang, Pengyuan Zhang, QingWei Zhao, Jielin Pan, Yonghong Yan 0002. Improved End-to-End Speech Recognition Using Adaptive Per-Dimensional Learning Rate Methods
2554 -- 2557Mengzhe Chen, Jielin Pan, QingWei Zhao, Yonghong Yan 0002. Multi-Task Learning in Deep Neural Networks for Mandarin-English Code-Mixing Speech Recognition
2558 -- 2561Anhao Xing, QingWei Zhao, Yonghong Yan 0002. Speeding up Deep Neural Networks in Speech Recognition with Piecewise Quantized Sigmoidal Activation Function
2562 -- 2565Chenglong Ma, QingWei Zhao, Jielin Pan, Yonghong Yan 0002. Short Text Classification Based on Distributional Representations of Words
2566 -- 2573Biao Sun, Hui Feng, Xinxin Xu. HISTORY: An Efficient and Robust Algorithm for Noisy 1-Bit Compressed Sensing
2574 -- 2584Shin-ichi Nakayama, Shigeru Masuyama. NT on Cographs
2585 -- 2590Qi Wei, Xuehou Tan, Bo Jiang. Competitive Strategies for Evacuating from an Unknown Affected Area
2591 -- 2599Gian Mayuga, Yuta Yamato, Tomokazu Yoneda, Yasuo Sato, Michiko Inoue. Reliability-Enhanced ECC-Based Memory Architecture Using In-Field Self-Repair
2600 -- 2611Wentao Li, Min Gao, Hua Li, Jun Zeng, Qingyu Xiong, Sachio Hirokawa. Shilling Attack Detection in Recommender Systems via Selecting Patterns Analysis
2612 -- 2618Ding Xiao, Rui Wang, Lingling Wu. Latent Attribute Inference of Users in Social Media with Very Small Labeled Dataset
2619 -- 2628Cuong Tuan Nguyen, Bilan Zhu, Masaki Nakagawa. Semi-Incremental Recognition of On-Line Handwritten Japanese Text
2629 -- 2632Jingsong Shan, Jianxin Luo, Guiqiang Ni, Yinjin Fu, Zhaofeng Wu. LRU-LC: Fast Estimating Cardinality of Flows over Sliding Windows
2633 -- 2637Liyu Wang, Lan Chen, Xiaoran Hao. LAB-LRU: A Life-Aware Buffer Management Algorithm for NAND Flash Memory
2638 -- 2642Yilun Wu, Xinye Lin, Xicheng Lu, Jinshu Su, Peixin Chen. A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor
2643 -- 2646Yinan Liu, Qingbo Wu, Linfeng Xu, Bo Wu. Mining Spatial Temporal Saliency Structure for Action Recognition
2647 -- 2650Peng Song, Shifeng Ou, Xinran Zhang, Yun Jin, Wenming Zheng, Jinglei Liu, Yanwei Yu. Transfer Semi-Supervised Non-Negative Matrix Factorization for Speech Emotion Recognition
2651 -- 2655Mengmeng Zhang, Ang Zhu, Zhi Liu. Fast Coding-Mode Selection and CU-Depth Prediction Algorithm Based on Text-Block Recognition for Screen Content Coding
2656 -- 2660Go Irie, Yukito Watanabe, Takayuki Kurozumi, Tetsuya Kinebuchi. Local Multi-Coordinate System for Object Retrieval
2661 -- 2663Wonjun Kim. Illumination-Invariant Face Representation via Normalized Structural Information
2664 -- 2667Bo Wu, Yurui Xie, Wang Luo. Robust and Adaptive Object Tracking via Correspondence Clustering
2668 -- 2671Wenming Yang, Wenyang Ji, Fei Zhou, Qingmin Liao. Robust Hybrid Finger Pattern Identification Using Intersection Enhanced Gabor Based Direction Coding

Volume 99-D, Issue 1

1 -- 0Toyokazu Akiyama. Foreword
2 -- 9Wasin Passornpakorn, Sinchai Kamolphiwong. Ontology Based Framework for Interactive Self-Assessment of e-Health Applications
10 -- 20Takumi Sanada, Xuejun Tian, Takashi Okuda, Tetsuo Ideguchi. Estimating the Number of Nodes in WLANs to Improve Throughput and QoS
21 -- 29Shimin Sun, Li Han, Sunyoung Han. GRMR: Greedy Regional Multicast Routing for Wireless Sensor Networks
30 -- 39Chao-Wen Tseng, Yu-Chang Chen, Chua-Huang Huang. A Design of GS1 EPCglobal Application Level Events Extension for IoT Applications
40 -- 0Isao Echizen. Foreword
41 -- 49Jorge Trevino, Shuichi Sakamoto, Junfeng Li, Yôiti Suzuki. Enhancing Stereo Signals with High-Order Ambisonics Spatial Information
50 -- 59Minoru Kuribayashi. Simple Countermeasure to Non-Linear Collusion Attacks Targeted for Spread-Spectrum Fingerprinting Scheme
60 -- 68Ibuki Nakamura, Yoshihide Tonomura, Hitoshi Kiya. 2-norm Minimization Problems
69 -- 82Kazuto Ogawa, Go Ohtake. Application Authentication System with Efficiently Updatable Signature
83 -- 91Akira Nishimura. Reversible Audio Data Hiding Based on Variable Error-Expansion of Linear Prediction for Segmental Audio and G.711 Speech
92 -- 101Nhut Minh Ngo, Masashi Unoki. Method of Audio Watermarking Based on Adaptive Phase Modulation
102 -- 110Taichi Ueno, Tomoko Kajiyama, Noritomo Ouchi. A Method for Creating Package Images that Reflect Consumer Taste Impressions
111 -- 119Vanessa R. Bracamonte Lesma, Hitoshi Okada. Evaluating the Influence of Country-Related Pictures on the Perception of a Foreign Online Store
120 -- 127Kenji Ozawa, Shota Tsukahara, Yuichiro Kinoshita, Masanori Morise. Development of an Estimation Model for Instantaneous Presence in Audio-Visual Content
128 -- 137Yuta Ohwatari, Takahiro Kawamura, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga. Estimation of Interpersonal Relationships in Movies
138 -- 140Soyoung Chung, Min Gyo Chung. An Image Quality Assessment Using Mean-Centered Weber Ratio and Saliency Map
141 -- 150Xiaojuan Liao, Hui Zhang, Miyuki Koshimura. Reconstructing AES Key Schedule Images with SAT and MaxSAT
151 -- 162Passakorn Phannachitta, Akito Monden, Jacky W. Keung, Ken-ichi Matsumoto. LSA-X: Exploiting Productivity Factors in Linear Size Adaptation for Analogy-Based Software Effort Estimation
163 -- 175Yang Cao, Masatoshi Yoshikawa. Differentially Private Real-Time Data Publishing over Infinite Trajectory Streams
176 -- 186Hideko Kawakubo, Marthinus Christoffel du Plessis, Masashi Sugiyama. Computationally Efficient Class-Prior Estimation under Class Balance Change Using Energy Distance
187 -- 196Truc Hung Ngo, Yen-Wei Chen, Naoki Matsushiro, Masataka Seo. Quantitative Assessment of Facial Paralysis Based on Spatiotemporal Features
197 -- 207Yuechan Hao, Bilan Zhu, Masaki Nakagawa. A Line-Direction-Free and Character-Orientation-Free On-Line Handwritten Japanese Text Recognition System
208 -- 218Ran Li, Hongbing Liu, Jie Chen, Zongliang Gan. Wavelet Pyramid Based Multi-Resolution Bilateral Motion Estimation for Frame Rate Up-Conversion
219 -- 227Huimin Lu, Yujie Li, Shota Nakashima, Seiichi Serikawa. Turbidity Underwater Image Restoration Using Spectral Properties and Light Compensation
228 -- 235Ryo Matsuoka, Tomohiro Yamauchi, Tatsuya Baba, Masahiro Okuda. Weight Optimization for Multiple Image Integration and Its Applications
236 -- 247Kazuhiro Tashiro, Takahiro Kawamura, Yuichi Sei, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga. Iterative Improvement of Human Pose Classification Using Guide Ontology
248 -- 256Norimichi Ukita. Part-Segment Features with Optimized Shape Priors for Articulated Pose Estimation
257 -- 264Zhen Guo, Yujie Zhang, Chen Su, Jinan Xu, Hitoshi Isahara. Character-Level Dependency Model for Joint Word Segmentation, POS Tagging, and Dependency Parsing in Chinese
265 -- 269Yan Lei, Min Zhang, Bixin Li, Jingan Ren, Yinhua Jiang. The Impact of Information Richness on Fault Localization
270 -- 274Chen Chen, Chunyan Hou, Jiakun Xiao, Xiaojie Yuan. Purchase Behavior Prediction in E-Commerce with Factorization Machines
275 -- 278Raissa Relator, Nozomi Nagano, Tsuyoshi Kato. Using Bregmann Divergence Regularized Machine for Comparison of Molecular Local Structures
279 -- 282Yi-Jia Zhang, Zhong-Jian Kang, Xin-Feng Li, Zhe-Ming Lu. The Controllability of Power Grids in Comparison with Classical Complex Network Models
283 -- 287M. Shahidur Rahman, Tetsuya Shimamura. Pitch Determination from Bone Conducted Speech
288 -- 291Xia Wang, Ruiyu Liang, Qingyun Wang, Li Zhao, Cairong Zou. An Effective Acoustic Feedback Cancellation Algorithm Based on the Normalized Sub-Band Adaptive Filter
292 -- 295Qingyun Wang, Ruiyu Liang, Li Jing, Cairong Zou, Li Zhao. Sub-Band Noise Reduction in Multi-Channel Digital Hearing Aid
296 -- 299Meng Sun, Hugo Van Hamme, Yimin Wang, Xiongwei Zhang. Unsupervised Learning of Continuous Density HMM for Variable-Length Spoken Unit Discovery
300 -- 304Jae-Hee Jun, Ji-Hoon Choi, Jong-Ok Kim. Middle-Frequency Based Refinement for Image Super-Resolution
305 -- 308Zifen He, Yinhui Zhang. Digital Halftoning through Approximate Optimization of Scale-Related Perceived Error Metric
309 -- 312Keun Chang Kwak. A Design of Incremental Granular Model Using Context-Based Interval Type-2 Fuzzy C-Means Clustering Algorithm