Journal: JIP

Volume 23, Issue 6

744 -- 0Tsunenori Mine. Editor's Message to Special Issue on E-Service and Knowledge Management toward Smart Computing Society
745 -- 752Takanobu Otsuka, Yoshitaka Torii, Takayuki Ito. Anomaly Weather Information Detection Using Wireless Pressure-sensor Grid
753 -- 758Hisato Fujimagari, Katsuhide Fujita. Detecting Research Fronts Using Neural Network Model for Weighted Citation Network Analysis
759 -- 766Yuji Yamagata, Naoki Fukuta. An Approach to Dynamic Query Classification and Approximation on an Inference-enabled SPARQL Endpoint
767 -- 775Alexis Vallet, Hiroyasu Sakamoto. A Multi-Label Convolutional Neural Network for Automatic Image Annotation
776 -- 783Kengo Yoshimizu, Noriko Takemura, Yoshio Iwai, Kosuke Sato. Multi-sensor-based Ambient Sensing System for the Estimation of Comfort/Discomfort to Lighting Condition During Desk Work
784 -- 794Shaymaa E. Sorour, Kazumasa Goda, Tsunenori Mine. Evaluation of Effectiveness of Time-Series Comments by Using Machine Learning Techniques
795 -- 803Toru Kobayashi. An Application Framework for Trend Surfing System based on Multi-aspect, Multi-screen and Multimodal User Interface
804 -- 813Xiao Cong, Tatsuya Akutsu. Matrix Network: A New Data Structure for Efficient Enumeration of Microstates of a Genetic Regulatory Network
814 -- 826Shotaro Sano, Takuma Otsuka, Katsutoshi Itoyama, Hiroshi G. Okuno. HMM-based Attacks on Google's ReCAPTCHA with Continuous Visual and Audio Symbols
827 -- 834Ryosuke Sato, Kazuyuki Asada, Naoki Kobayashi 0001. Refinement Type Checking via Assertion Checking
835 -- 844Wei Wei, Akihiro Nakamata, Yoshihiro Kawahara, Tohru Asami. Food Recognition via Monitoring Power Leakage from a Microwave Oven

Volume 23, Issue 5

531 -- 0Masato Edahiro. Editor's Message to Special Issue of Embedded Systems Engineering
532 -- 541Yuki Ando, Shinya Honda, Hiroaki Takada, Masato Edahiro. System-level Design Method for Control Systems with Hardware-implemented Interrupt Handler
542 -- 552Kiyofumi Tanaka. Real-Time Scheduling for Reducing Jitters of Periodic Tasks
553 -- 0Masahiro Mambo. Editor's Message to Special issue of Computer Security Technologies to be Indispensable to the Society
554 -- 561Reihaneh Safavi-Naini, Pengwei Wang. A Model for Adversarial Wiretap Channels and its Applications
562 -- 569Koji Tomida, Hiroshi Doi, Masami Mohri, Yoshiaki Shiraishi. Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search
570 -- 578Kouya Tochikubo. New Secret Sharing Schemes Realizing General Access Structures
579 -- 588Mitsuhiro Hatada, Mitsuaki Akiyama, Takahiro Matsuki, Takahiro Kasama. Empowering Anti-malware Research in Japan by Sharing the MWS Datasets
589 -- 602Kale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato. Reducing Congestion in the Tor Network with Circuit Switching
603 -- 612Masatsugu Ichino, Kenji Kawamoto, Toru Iwano, Mitsuhiro Hatada, Hiroshi Yoshiura. Evaluating Header Information Features for Malware Infection Detection
613 -- 622Nasato Goto, Akira Kanaoka, Masayuki Okada, Eiji Okamoto. METRO: Measurement of End-to-End Route Trust
623 -- 632Yin Minn Pa Pa, Katsunari Yoshioka, Tsutomu Matsumoto. Detecting Malicious Domains and Authoritative Name Servers Based on Their Distinct Mappings to IP Addresses
633 -- 645Hisao Sakazaki, Yasuko Fukuzawa. Study on the Feasibility of Smart-Banknotes
646 -- 654Fei Feng, Kanta Matsuura. Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models
655 -- 663Mizuki Watanabe, Ryotaro Kobayashi, Masahiko Kato. HTTP-GET Flood Prevention Method by Dynamically Controlling Multiple Types of Virtual Machine Resources
664 -- 672Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Yamauchi. Reducing Resource Consumption of SELinux for Embedded Systems with Contributions to Open-Source Ecosystems
673 -- 682Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi. Process Hiding by Virtual Machine Monitor for Attack Avoidance
683 -- 692Marat Zhanikeev. DiffHub: An Efficient Cloud Sync Technology based on Binary Diffs
693 -- 703Masahide Kawai, Tomoyori Iwao, Akinobu Maejima, Shigeo Morishima. Automatic Generation of Photorealistic 3D Inner Mouth Animation only from Frontal Images
704 -- 707Takeshi Miura, Takaaki Kaiga, Katsubumi Tajima, Takeshi Shibata, Hideo Tamamoto. Sensor Number Reduction in Skeleton Estimation from Magnetic Motion Capture Data
708 -- 715Toshiyuki Hagiya, Tsuneo Kato. Probabilistic Touchscreen Text Entry Method Incorporating Gaze Point Information
716 -- 729Seiji Umatani, Tomoharu Ugawa, Masahiro Yasugi. Design and Implementation of a Java Bytecode Manipulation Library for Clojure
730 -- 743Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa. Relaxing Heavy Congestion by State Propagation

Volume 23, Issue 4

381 -- 0Nariyoshi Yamai. Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2014
382 -- 391Michael Wisely, Sahra Sedigh Sarvestani, Ali R. Hurson. Public Data Dissemination via Broadcasting
392 -- 401Marwa Elsayed, Mohammad Zulkernine. A Classification of Intrusion Detection Systems in the Cloud
402 -- 410Sho Tsugawa, Hiroyuki Ohsaki. Community Structure and Interaction Locality in Social Networks
411 -- 419Shinobu Saito, Jun Hagiwara, Tomoki Yagasaki, Katsuyuki Natsukawa. ReVAMP: Requirements Validation Approach using Models and Prototyping - Practical Cases of Requirements Engineering in End-User Computing
420 -- 429Hiroshi Yamamoto, Shigehiro Ano, Katsuyuki Yamazaki. Modeling of Dynamic Latency Variations Using Auto-Regressive Model and Markov Regime Switching for Mobile Network Access on Trains
430 -- 440Hiroshi Yamamoto, Tatsuya Takahashi, Norihiro Fukumoto, Shigehiro Ano, Katsuyuki Yamazaki. Development and Evaluation of Congestion Detection System Using Complex Event Processing for Mobile Networks
441 -- 448Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura. Design and Implementation of Optimal Route Selection Mechanism for Outbound Connections on IPv6 Multihoming Environment
449 -- 457Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira. Strict Application Execution Control with Hierarchical Group Management Using Digital Certificates on Educational Windows PCs
458 -- 464Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki. Dripcast - Architecture and Implementation of Server-less Java Programming Framework for Billions of IoT Devices
465 -- 475Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi. Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms
476 -- 487Yuichi Sei, Akihiko Ohsuga. Malicious Node Detection in Mobile Wireless Sensor Networks
488 -- 496Weihua Sun, Naoki Shibata, Masahiro Kenmotsu, Keiichi Yasumoto, Minoru Ito. A Method for Navigating Cars in Multilevel Parking Facility
497 -- 504Yuya Kaneda, Yan Pei, Qiangfu Zhao, Yong Liu. Improving the Performance of the Decision Boundary Making Algorithm via Outlier Detection
505 -- 512Kimio Kuramitsu. Packrat Parsing with Elastic Sliding Window
513 -- 524Yusuke Takamatsu, Kenji Kono. Detection of Visual Clickjacking Vulnerabilities in Incomplete Defenses
525 -- 530Masami Hagiya. Defining Informatics across Bun-kei and Ri-kei

Volume 23, Issue 3

238 -- 0Hiro Ito. Editor's Message for Special Issue on Recreational Discrete Mathematics
239 -- 245Aaron B. Adcock, Erik D. Demaine, Martin L. Demaine, Michael P. O'Brien, Felix Reidl, Fernando Sanchez Villaamil, Blair D. Sullivan. Zig-Zag Numberlink is NP-Complete
246 -- 251Jin Akiyama, Hyunwoo Seong. Pentadral Complices
252 -- 257Kazuyuki Amano, Shin-Ichi Nakano, Koichi Yamazaki. Anti-Slide
258 -- 264Sebastian Böcker. Ten Times Eighteen
265 -- 271Jean Cardinal, Sébastien Collette, Hiro Ito, Matias Korman, Stefan Langerman, Hikaru Sakaidani, Perouz Taslakian. Cannibal Animal Games: a new variant of Tic-Tac-Toe
272 -- 275Emily Rita Berger, Alexander Dubbs. j)
276 -- 283Kazuya Haraguchi, Hirotaka Ono. How Simple Algorithms Can Solve Latin Square Completion-Type Puzzles Approximately
284 -- 292Michael Lampis, Valia Mitsou, Karolina Soltys. Scrabble is PSPACE-Complete
293 -- 298Erik D. Demaine, Fermi Ma, Matthew Susskind, Erik Waingarten. You Should Be Scared of German Ghost
299 -- 304Yoshifumi Manabe, Risako Otsuka, Tatsuaki Okamoto. A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus
305 -- 309Yasuhiko Takenaga, Narutoshi Tanaka, Takahiro Habara. Number of Three-point Tilings with Triangle Tiles
310 -- 316Akihiro Uejima, Hiroaki Suzuki. Fillmat is NP-Complete and ASP-Complete
317 -- 0Michinori Hatayama. Editor's Message to Special Issue on Information Systems for Creation of a New Society
318 -- 326Akio Ida, Shigeo Kaneda. Applying Multidimensional Scaling for Responsibility Distribution between Objects - - Linking Conceptual Activity Model and Class Diagram
327 -- 334Maike Erdmann, Tomoya Takeyoshi, Kazushi Ikeda, Gen Hattori, Chihiro Ono, Yasuhiro Takishima. Assigning Keywords to Automatically Extracted Personal Cliques from Social Networks
335 -- 343Oyuntungalag Chagnaadorj, Jiro Tanaka. Accumulative Secure Group Association in an Ad-hoc and Ubiquitous Network (Version 3.0)
344 -- 352Juan Luo, Yves Lepage. Extraction of Potentially Useful Phrase Pairs for Statistical Machine Translation
353 -- 365Hiroki Mizumoto, Nobutaka Suzuki. An XSLT Transformation Method for Distributed XML
366 -- 372Akihiro Ida, Takeshi Iwashita, Makiko Ohtani, Kazuro Hirahara. Improvement of Hierarchical Matrices with Adaptive Cross Approximation for Large-scale Simulation
373 -- 380Nuttapoom Amornpashara, Yutaka Arakawa, Morihiko Tamai, Keiichi Yasumoto. Phorec: Context-Aware Photography Support System Based on Social Data Analysis

Volume 23, Issue 2

93 -- 0Sadao Obana. Editor's Message to Special Issue on Network Services and Distributed Processing
94 -- 104Takamasa Higuchi, Hirozumi Yamaguchi, Teruo Higashino. Mobile Devices as an Infrastructure: A Survey of Opportunistic Sensing Technology
105 -- 116Ryohei Banno, Susumu Takeuchi, Michiharu Takemoto, Tetsuo Kawano, Takashi Kambayashi, Masato Matsuo. Designing Overlay Networks for Handling Exhaust Data in a Distributed Topic-based Pub/Sub Architecture
117 -- 0Masato Edahiro. Editor's Message to Special Issue on Embedded Systems Engineering
118 -- 130Surachai Thongkaew, Tsuyoshi Isshiki, Dongju Li, Hiroaki Kunieda. Dalvik Bytecode Acceleration Using Fetch/Decode Hardware Extension
131 -- 0Takeshi Sakurada. Editor's Message to Special Issue on Information Security or Operation Technology in the Age of Virtualization
132 -- 141Yoshihiro Oyama, Yudai Kawasaki, Kazushi Takahashi. Checkpointing an Operating System Using a Parapass-through Hypervisor
142 -- 0Yasuo Okabe. Editor's Message to Special Issue of "Students' and Young Researchers' Papers"
143 -- 152Eric Shun Fukuda, Hiroaki Inoue, Takashi Takenaka, Dahoo Kim, Tsunaki Sadahisa, Tetsuya Asai, Masato Motomura. Enhancing Memcached by Caching Its Data and Functionalities at Network Interface
153 -- 162Takaaki Miyajima, David B. Thomas, Hideharu Amano. A Toolchain for Dynamic Function Off-load on CPU-FPGA Platforms
163 -- 170Aye Thida Hlaing, Tin Nilar Win, Htoo Htoo, Yutaka Ohsawa. kNN Query on Road Network Distances
171 -- 175Kohei Matsushita, Hiroyasu Hamada. A Fast Computation of 3 × 3 Matrix Exponentials and its Application in CG
176 -- 184Rafik Hadfi, Takayuki Ito. Low-Complexity Exploration in Utility Hypergraphs
185 -- 191Veluchamy Glory, Sandanam Domnic. Compressing Inverted Index Using Optimal FastPFOR
192 -- 201Shaymaa E. Sorour, Tsunenori Mine, Kazumasa Goda, Sachio Hirokawa. A Predictive Model to Evaluate Student Performance
202 -- 209Minseon Lee, Shuichi Miyazaki, Kazuo Iwama. Finding Witnesses for Stability in the Hospitals/Residents Problem
210 -- 220Kaoru Katayama, Ernest Weke Maina. Indexing Method for Hierarchical Graphs based on Relation among Interlacing Sequences of Eigenvalues
221 -- 228Hiromichi Kanaoka, Takuya Yoshihiro. Combining Local Channel Selection with Routing Metrics in Multi-channel Wireless Mesh Networks
229 -- 237Hiroshi Kobayashi, Kaoru Sano, Osamu Moriya. Performance Evaluation of Synchronous Variable-multiple Collision Avoidance Systems

Volume 23, Issue 1

1 -- 0Takeshi Ito. Editor's Message to Special Issue on Game Programming
2 -- 8Tung Duc Nguyen, Kien Quang Nguyen, Ruck Thawonmas. Heuristic Search Exploiting Non-additive and Unit Properties for RTS-game Unit Micromanagement
9 -- 19Akira Ura, Yoshimasa Tsuruoka, Takashi Chikayama. Dynamic Prediction of Minimal Trees in Large-Scale Parallel Game Tree Search
20 -- 21Noriaki Saito. Editor's Message to Special Issue on Collaboration Technologies and Network Services that Concentrate Wisdom toward Future Society
22 -- 30Yu Suzuki. h-index
31 -- 40Nor Athiyah Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama. User's Action and Decision Making of Retweet Messages towards Reducing Misinformation Spread during Disaster
41 -- 57Aurélio Akira Mello Matsui, Hitoshi Aida. A DSL for Contract-centric Compatibility Assessment in Distributed Services
58 -- 66Yoji Yamato, Yukihisa Nishizawa, Masahito Muroi, Kentaro Tanaka. Development of resource management server for production IaaS services based on OpenStack
67 -- 80Masaharu Fukase, Kenji Kashiwabara. An Accelerated Algorithm for Solving SVP Based on Statistical Analysis
81 -- 92Kentaroh Toyoda, Iwao Sasase. Unsupervised Clustering-based SPITters Detection Scheme