531 | -- | 0 | Masato Edahiro. Editor's Message to Special Issue of Embedded Systems Engineering |
532 | -- | 541 | Yuki Ando, Shinya Honda, Hiroaki Takada, Masato Edahiro. System-level Design Method for Control Systems with Hardware-implemented Interrupt Handler |
542 | -- | 552 | Kiyofumi Tanaka. Real-Time Scheduling for Reducing Jitters of Periodic Tasks |
553 | -- | 0 | Masahiro Mambo. Editor's Message to Special issue of Computer Security Technologies to be Indispensable to the Society |
554 | -- | 561 | Reihaneh Safavi-Naini, Pengwei Wang. A Model for Adversarial Wiretap Channels and its Applications |
562 | -- | 569 | Koji Tomida, Hiroshi Doi, Masami Mohri, Yoshiaki Shiraishi. Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search |
570 | -- | 578 | Kouya Tochikubo. New Secret Sharing Schemes Realizing General Access Structures |
579 | -- | 588 | Mitsuhiro Hatada, Mitsuaki Akiyama, Takahiro Matsuki, Takahiro Kasama. Empowering Anti-malware Research in Japan by Sharing the MWS Datasets |
589 | -- | 602 | Kale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato. Reducing Congestion in the Tor Network with Circuit Switching |
603 | -- | 612 | Masatsugu Ichino, Kenji Kawamoto, Toru Iwano, Mitsuhiro Hatada, Hiroshi Yoshiura. Evaluating Header Information Features for Malware Infection Detection |
613 | -- | 622 | Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto. METRO: Measurement of End-to-End Route Trust |
623 | -- | 632 | Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto. Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses |
633 | -- | 645 | Hisao Sakazaki, Yasuko Fukuzawa. Study on the Feasibility of Smart-Banknotes |
646 | -- | 654 | Fei Feng, Kanta Matsuura. Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models |
655 | -- | 663 | Mizuki Watanabe, Ryotaro Kobayashi, Masahiko Kato. HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources |
664 | -- | 672 | Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi. Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems |
673 | -- | 682 | Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi. Process Hiding by Virtual Machine Monitor for Attack Avoidance |
683 | -- | 692 | Marat Zhanikeev. DiffHub: An Efficient Cloud Sync Technology based on Binary Diffs |
693 | -- | 703 | Masahide Kawai, Tomoyori Iwao, Akinobu Maejima, Shigeo Morishima. Automatic Generation of Photorealistic 3D Inner Mouth Animation only from Frontal Images |
704 | -- | 707 | Takeshi Miura, Takaaki Kaiga, Katsubumi Tajima, Takeshi Shibata, Hideo Tamamoto. Sensor Number Reduction in Skeleton Estimation from Magnetic Motion Capture Data |
708 | -- | 715 | Toshiyuki Hagiya, Tsuneo Kato. Probabilistic Touchscreen Text Entry Method Incorporating Gaze Point Information |
716 | -- | 729 | Seiji Umatani, Tomoharu Ugawa, Masahiro Yasugi. Design and Implementation of a Java Bytecode Manipulation Library for Clojure |
730 | -- | 743 | Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa. Relaxing Heavy Congestion by State Propagation |