Journal: JIP

Volume 23, Issue 5

531 -- 0Masato Edahiro. Editor's Message to Special Issue of Embedded Systems Engineering
532 -- 541Yuki Ando, Shinya Honda, Hiroaki Takada, Masato Edahiro. System-level Design Method for Control Systems with Hardware-implemented Interrupt Handler
542 -- 552Kiyofumi Tanaka. Real-Time Scheduling for Reducing Jitters of Periodic Tasks
553 -- 0Masahiro Mambo. Editor's Message to Special issue of Computer Security Technologies to be Indispensable to the Society
554 -- 561Reihaneh Safavi-Naini, Pengwei Wang. A Model for Adversarial Wiretap Channels and its Applications
562 -- 569Koji Tomida, Hiroshi Doi, Masami Mohri, Yoshiaki Shiraishi. Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search
570 -- 578Kouya Tochikubo. New Secret Sharing Schemes Realizing General Access Structures
579 -- 588Mitsuhiro Hatada, Mitsuaki Akiyama, Takahiro Matsuki, Takahiro Kasama. Empowering Anti-malware Research in Japan by Sharing the MWS Datasets
589 -- 602Kale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato. Reducing Congestion in the Tor Network with Circuit Switching
603 -- 612Masatsugu Ichino, Kenji Kawamoto, Toru Iwano, Mitsuhiro Hatada, Hiroshi Yoshiura. Evaluating Header Information Features for Malware Infection Detection
613 -- 622Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto. METRO: Measurement of End-to-End Route Trust
623 -- 632Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto. Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses
633 -- 645Hisao Sakazaki, Yasuko Fukuzawa. Study on the Feasibility of Smart-Banknotes
646 -- 654Fei Feng, Kanta Matsuura. Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models
655 -- 663Mizuki Watanabe, Ryotaro Kobayashi, Masahiko Kato. HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources
664 -- 672Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi. Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems
673 -- 682Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi. Process Hiding by Virtual Machine Monitor for Attack Avoidance
683 -- 692Marat Zhanikeev. DiffHub: An Efficient Cloud Sync Technology based on Binary Diffs
693 -- 703Masahide Kawai, Tomoyori Iwao, Akinobu Maejima, Shigeo Morishima. Automatic Generation of Photorealistic 3D Inner Mouth Animation only from Frontal Images
704 -- 707Takeshi Miura, Takaaki Kaiga, Katsubumi Tajima, Takeshi Shibata, Hideo Tamamoto. Sensor Number Reduction in Skeleton Estimation from Magnetic Motion Capture Data
708 -- 715Toshiyuki Hagiya, Tsuneo Kato. Probabilistic Touchscreen Text Entry Method Incorporating Gaze Point Information
716 -- 729Seiji Umatani, Tomoharu Ugawa, Masahiro Yasugi. Design and Implementation of a Java Bytecode Manipulation Library for Clojure
730 -- 743Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa. Relaxing Heavy Congestion by State Propagation