Journal: JIP

Volume 20, Issue 4

806 -- 813Hong Cheng, Jeffrey Xu Yu. Clustering Large Attributed Graph
814 -- 822Ryôichi Sasaki. Considerations on Risk Communication for IT Systems and Development of Support Systems
823 -- 0Satoru Torii. Editor's Message to Special Issue on Computer Security Technology Achieving Smart Society
824 -- 834Terry Benzel, John Wroclawski. The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation
835 -- 845Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao. Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
846 -- 853Ruan Na, Takashi Nishide, Yoshiaki Hori. Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
854 -- 860Hidenori Kuwakado. Length-preserving CBC Enciphering Scheme and Its Security Analysis
861 -- 870Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura. Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation
871 -- 882Isao Goto, Masao Utiyama, Takashi Onishi, Eiichiro Sumita. An Empirical Comparison of Parsers in Constraining Reordering for E-J Patent Machine Translation

Volume 20, Issue 3

525 -- 530Hark-Jin Lee, Young-Sung Son, Jun-Hee Park, Kyeong-Deok Moon, Jae-Cheol Ryou. General Middleware Bridge to Support Device Interoperability on Different Middlewares
531 -- 536Futoshi Sugimoto, Makoto Murakami, Chieko Kato. A Method to Synthesize Three Dimensional Face Models by Mapping from a Word Space to a Physical Model Space and the Inspection of the Mapping Function
537 -- 547Masaharu Hirota, Naoki Fukuta, Shohei Yokoyama, Hiroshi Ishikawa. A Robust Clustering Method for Missing Metadata in Image Search Results
548 -- 558Yuichi Murakami, Shingo Nakamura, Shuji Hashimoto. An Article Kansei Retrieval System Combining Recommendation Function and Interaction Design
559 -- 569Yuki Hasegawa, Yoshinao Isobe, Kazuhito Ohmaki, Hideki Mori, Kensei Tsuchida, Yasunori Shiono. Implementation and Verification of Concurrent Sorting Algorithms with CSP based Architecture
570 -- 577Haruhisa Hasegawa, Noriaki Kamiyama, Hideaki Yoshino. Traffic Management Scheme to Control Content Distribution with Cloud-based Architecture
578 -- 584Takuya Nishikawa, Satoshi Fujita. A Reputation Management Scheme for Peer-to-Peer Networks based on the EigenTrust Trust Management Algorithm
585 -- 591Akiya Inoue, Yuuki Takano, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimatsu. Mobile-carrier Choice Modeling Framework Under Competitive Conditions
592 -- 598Jasmine A. Malinao, Richelle Ann B. Juayong, Rona May U. Tadlas, Jhoirene B. Clemente, Erlo Robert F. Oquendo, John Boaz Lee, Ma. Sheilah Gaabucayan-Napalang, Jose Regin F. Regidor, Henry N. Adorna. A Quantitative Analysis-based Algorithm for Optimal Data Signature Construction of Traffic Data Sets
599 -- 606Tomoo Sumida, Yasunori Shiono, Takaaki Goto, Katsuyoshi Ito, Kensei Tsuchida. Highly Efficient Transport Protocol for Large Capacity Data Files and its details
607 -- 613Naoki Fukuta. A Mobile Agent Approach for P2P-based Semantic File Retrieval
614 -- 621Hiroki Nakagawa, Akihiko Nagai, Takayuki Ito. A Middle-Agent Framework Focused on the Role of Distributors
622 -- 632Yasunori Shiono, Tomokazu Arita, Youzou Miyadera, Kimio Sugita, Takeo Yaku, Kensei Tsuchida. Automatic Generation of XML Files and Their Database Registration from Tabular Form Specifications
633 -- 639Ippei Torii, Kaoruko Ohtani, Takahito Niwa, Naohiro Ishii. Information Visualization System For Activation of Shotengai
640 -- 648Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai. Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement
649 -- 654Satoshi Takahashi, Tokuro Matsuo. A Decision Method in B2B E-Commerce Model based on Multi-Items Auction
655 -- 666Shohei Hido, Shoko Suzuki, Risa Nishiyama, Takashi Imamichi, Rikiya Takahashi, Tetsuya Nasukawa, Tsuyoshi Idé, Yusuke Kanehira, Rinju Yohda, Takeshi Ueno, Akira Tajima, Toshiya Watanabe. Modeling Patent Quality: A System for Large-scale Patentability Analysis using Text Mining
667 -- 671Hideki Tsuiki, Yohei Yokota. Enumerating 3D-Sudoku Solutions over Cubic Prefractal Objects
672 -- 679Shane Dye, Nicola Ward Petty. Rogo, a TSP-based Paper Puzzle: Optimization Approaches
680 -- 685Sascha Kurz. Squaring the Square with Integer Linear Programming
686 -- 693Yoshifumi Manabe, Tatsuaki Okamoto. Meta-envy-free Cake-cutting and Pie-cutting Protocols
694 -- 706Jonas Kölker. Kurodoko is NP-Complete
707 -- 708Jonas Kölker. The Magnets Puzzle is NP-Complete
709 -- 712Jonas Kölker. Selected Slither Link Variants are NP-complete
713 -- 718Tetsuo Asano, Erik D. Demaine, Martin L. Demaine, Ryuhei Uehara. NP-completeness of generalized Kaboozle
719 -- 722Kevin Buchin, Maike Buchin. Rolling Block Mazes are PSPACE-complete
723 -- 726Kenichiro Nakai, Yasuhiko Takenaga. NP-Completeness of Pandemic
727 -- 737Kazuya Haraguchi, Yasutaka Abe, Akira Maruoka. How to Produce BlockSum Instances with Various Levels of Difficulty
738 -- 748Daisuke Asai, Jarrod Orszulak, Richard Myrick, Chaiwoo Lee, Lisa A. D'Ambrosio, Kathryn M. Godfrey, Joseph F. Coughlin, Olivier L. de Weck. Enhance Communication between Parents and Mature Children by Sharing Medication Information
749 -- 756Mingmei Li, Naoki Imai, Kiyohito Yoshihara. An Integration Method for Wireless Location Using Built-in Sensors of Mobile Phones and TDOA Landmarks
757 -- 766Nobuharu Kami, Teruyuki Baba, Satoshi Ikeda, Takashi Yoshikawa, Hiroyuki Morikawa. Detecting Significant Locations from Raw GPS Data Using Random Space Partitioning
767 -- 773Takuro Kutsuna, Shuichi Sato, Naoya Chujo. Efficient Root Cause Detection in Complex Embedded Systems with Abstract Model-based Diagnosis
774 -- 784Amang Sudarsono, Toru Nakanishi, Nobuo Funabiki. A Pairing-Based Anonymous Credential System with Efficient Attribute Proofs
785 -- 795Masaharu Fukase, Kazunori Yamaguchi. Finding a Very Short Lattice Vector in the Extended Search Space
796 -- 805Sho Tsugawa, Hiroyuki Ohsaki, Makoto Imase. Estimating Message Importance Using Inferred Inter-recipient Trust for Supporting Email Triage

Volume 20, Issue 2

340 -- 346Yusuke Wada, Shigeru Kusakabe. Performance Evaluation of A Testing Framework Using QuickCheck and Hadoop
347 -- 357Achmad Basuki, Achmad Husni Thamrin, Hitoshi Asaeda, Jun Murai. ODMT: On-demand Inter-domain Multicast Tunneling
358 -- 365Hironao Takahashi, Khalid Mahmood, Kinji Mori. Autonomous L3 Cache Technolgy for High Responsiveness
366 -- 377Sherihan Abu Elenin, Masato Kitakami. Proposal of Grid Monitoring System with Fault Tolerance
378 -- 385Ervianto Abdullah, Satoshi Fujita. Prevent Contents Leaking in P2P CDNs with Robust and Quick Detection of Colluders
386 -- 395Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura. An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks
396 -- 405Masatoshi Sekine, Kurato Maeno. Activity Recognition Using Radio Doppler Effect for Human Monitoring Service
406 -- 418Koji Ara, Tomoaki Akitomi, Nobuo Sato, Kunio Takahashi, Hideyuki Maeda, Kazuo Yano, Masao Yanagisawa. Integrating Wearable Sensor Technology into Project-management Process
419 -- 425Mohammed Sahli, Tetsuo Shibuya. Max-Shift BM and Max-Shift Horspool: Practical Fast Exact String Matching Algorithms
426 -- 434Satoshi Fujita, Yang Yang. Efficient Shape Recognition of Dynamic Event Regions Using Wireless Sensor Networks
435 -- 437Chuzo Iwamoto, Junichi Kishi, Kenichi Morita. Lower Bound of Face Guards of Polyhedral Terrains
438 -- 450Shelly Sachdeva, Subhash Bhalla. Visual Query Language for Archetype-Based Electronic Health Records Databases
451 -- 462Yang Chen, Ryo Kurachi, Gang Zeng, Hiroaki Takada. The Worst-Case Response Time Analysis for FIFO-based Offset Assigned CAN Messages
463 -- 471Ting Ting Qin, Qi Cao, Qi Ying Wei, Satoshi Fujita. A Tag-Based Scheme to Realize Real-Time File Search in Hierarchical Peer-to-Peer Systems
472 -- 479Tao Xu, Masahiro Watanabe, Masaki Bandai, Takashi Watanabe. An RSSI-Based Cross Layer Protocol for Directional Ad Hoc Networks and Its Implementation
480 -- 490Tetsuya Arita, Fumio Teraoka. PNEMO: A Network-Based Localized Mobility Management Protocol for Mobile Networks
491 -- 495Kotaro Ishitani, Hiroshi Yamamoto, Maki Yamamoto, Katsuyuki Yamazaki. Development and Evaluation of Ecotourism Support System using One-seg Broadcasting with Mobile Networks
496 -- 507Mitsuhiro Hattori, Nori Matsuda, Takashi Ito, Yoichi Shibata, Katsuyuki Takashima, Takeshi Yoneda. Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation
508 -- 511Tetsuo Iijima. A Decision Making Model and Its Application to Airplane Accidents
512 -- 523Graham Neubig, Taro Watanabe, Eiichiro Sumita, Shinsuke Mori, Tatsuya Kawahara. Joint Phrase Alignment and Extraction for Statistical Machine Translation

Volume 20, Issue 1

1 -- 10Gregory Hazelbeck, Hiroaki Saito. A Tool for Creating Glossed Japanese Reading Materials
11 -- 25Yuanyuan Wang, Kazutoshi Sumiya. A Browsing Method for Presentation Slides Based on Semantic Relations and Document Structure for e-Learning
26 -- 36Jiongyao Ye, Hongfeng Ding, Yingtao Hu, Takahiro Watanabe. A Behavior-based Adaptive Access-mode for Low-power Set-associative Caches in Embedded Systems
37 -- 44Norio Shiratori, Kenji Sugawara, Yusuke Manabe, Shigeru Fujita, Basabi Chakraborty. Symbiotic Computing Based Approach Towards Reducing User's Burden Due to Information Explosion
45 -- 53Hideyuki Tokuda, Jin Nakazawa. SenseCampus: Sensor enabled Cyber-Physical Coupling for Ubiquitous Services
54 -- 64Taye Mulugeta, Lei Shu, Manfred Hauswirth, ZhangBing Zhou, Shojiro Nishio. Secured Geographic Forwarding in Wireless Multimedia Sensor Networks
65 -- 76Gang Chen 0001, Ke Chen 0005, Dawei Jiang, Beng Chin Ooi, Lei Shi, Hoang Tam Vo, Sai Wu. E3: an Elastic Execution Engine for Scalable Data Processing
77 -- 88Zheng Liu, Jeffrey Xu Yu, Hong Cheng. Approximate Homogeneous Graph Summarization
89 -- 103Kentaro Hara, Kenjiro Taura. Half-process: A Process Partially Sharing Its Address Space with Other Processes
104 -- 113Kriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. Effective Node Deployment in Sparse Mobile Sensor Networks
114 -- 127Yanwei Xu, Yoshiharu Ishikawa, Jihong Guan. Efficient Continual Top-k Keyword Search in Relational Databases
128 -- 139Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani, Taiichi Yuasa. Parallel Graph Traversals using Work-Stealing Frameworks for Many-core Platforms
140 -- 153Kentaro Hara, Kenjiro Taura. Parallel Computational Reconfiguration Based on a PGAS Model
154 -- 166Tsuyoshi Hisamatsu, Hitoshi Asaeda. Adaptive Overlay Network for High-Bandwidth Streaming
167 -- 176Yoshiaki Taniguchi, Akimitsu Kanzaki, Naoki Wakamiya, Takahiro Hara. An Energy-Efficient Data Gathering Mechanism using Traveling Wave and Spatial Interpolation for Wireless Sensor Networks
177 -- 184Yuichi Hattori, Sozo Inoue. A Large Scale Gathering System for Activity Data using Mobile Devices
185 -- 195Kazuhisa Matsuzono, Hitoshi Asaeda, Jun Murai. DP-FEC: Dynamic Probing FEC for High-Performance Real-Time Interactive Video Streaming
196 -- 206Hidehito Gomi. Policy Provisioning and Its Access Control Beyond Administrative and Collaborative Domains
207 -- 215Hiroshi Ishii, Qiang Ma 0001, Masatoshi Yoshikawa. Incremental Construction of Causal Network from News Articles
216 -- 227Keiji Shinzato, Tomohide Shibata, Daisuke Kawahara, Sadao Kurohashi. TSUBAKI: An Open Search Engine Infrastructure for Developing Information Access Methodology
228 -- 237Naoki Yoshinaga 0001, Masaru Kitsuregawa. Efficient Classification with Conjunctive Features
238 -- 249Satoshi Yoshida, Takashi Uemura, Takuya Kida, Tatsuya Asai, Seishi Okamoto. Improving Parse Trees for Efficient Variable-to-Fixed Length Codes
250 -- 266Supheakmungkol Sarin, Michael Fahrmair, Matthias Wagner 0001, Wataru Kameyama. Leveraging Features from Background and Salient Regions for Automatic Image Annotation
267 -- 276Ryo Yonetani, Hiroaki Kawashima, Takatsugu Hirayama, Takashi Matsuyama. Mental Focus Analysis Using the Spatio-temporal Correlation between Visual Saliency and Eye Movements
277 -- 286Mamoun Nawahdah, Tomoo Inoue. Motion Adaptive Orientation Adjustment of a Virtual Teacher to Support Physical Task Learning
287 -- 296Chenhao Wang, Zhencheng Hu, Roland Chapuis. Predictive Lane Detection by Interaction with Digital Road Map
297 -- 307Quang Tran Minh, Eiji Kamioka. Adaptive Approaches in Mobile Phone Based Traffic State Estimation with Low Penetration Rate
308 -- 318Manabu Ito, Satoshi Komorita, Yoshinori Kitatsuji, Hidetoshi Yokota. IMS-based Fast Session Handover with Available Network Resources Discovery of Access Networks
319 -- 326XingPing He, Sayaka Kamei, Satoshi Fujita. Autonomous Multi-Source Multi-Sink Routing in Wireless Sensor Networks
327 -- 339Shelly Sachdeva, Aastha Madaan, Subhash Bhalla. Discovery of Patterns to Improve Usability of Electronic Health Record Systems