Journal: JIP

Volume 24, Issue 6

834 -- 0Yasuyuki Sumi. Editorial Preface to the Special Issue on Ubiquitous Computing Systems V
835 -- 842Hiroyuki Manabe, Hiroshi Inamura. Implementation of Input Functionality Using Energy Source for Further Miniaturization of Small Devices
843 -- 852Kensuke Sawada, Yuichi Hanada, Shin-ichiro Mori. User-installable Indoor Positioning System Using a Wi-Fi Beacon and PDR Module
853 -- 866Sozo Inoue, Naonori Ueda, Yasunobu Nohara, Naoki Nakashima. Recognizing and Understanding Nursing Activities for a Whole Day with a Big Dataset
867 -- 877Li Jiang, Hideyuki Kawashima, Osamu Tatebe. Efficient Window Aggregate Method on Array Database System
878 -- 886Jingtao Sun, Ichiro Satoh. Theory and Implementation of an Adaptive Middleware for Ubiquitous Computing Systems
887 -- 896Yusuke Sakumoto, Masaki Aida, Hideyuki Shimonishi. Adaptive Function to Ensure Robustness of MCMC-based Autonomous Decentralized Control Mechanism against Changing Environment
897 -- 907Yuta Tsunematsu, Norihiko Kawai, Tomokazu Sato, Naokazu Yokoya. Texture Transfer Based on Energy Minimization for Painterly Rendering
908 -- 916Yasusi Kanada. Method for Procedural 3D Printing Using a Python Library
917 -- 927Tim Felgentreff, Robert Hirschfeld, Maria Graber, Alan Borning, Hidehiko Masuhara. Declaring Constraints on Object-oriented Collections
928 -- 936Chong Li, Le-Duc Tung, Xiaodong Meng, Zhenjiang Hu. Let High-level Graph Queries Be Parallel Efficient: An Approach Over Structural Recursion On Pregel
937 -- 945Thinh Minh Do, Yasuko Matsubara, Yasushi Sakurai. Non-linear Time-series Analysis of Social Influence
946 -- 955Annisa, Asif Zaman, Yasuhiko Morimoto. Area Skyline Query for Selecting Good Locations in a Map

Volume 24, Issue 5

750 -- 0Eiichi Hayakawa. Editor's Message to Special Issue on Embedded Systems Engineering
751 -- 761Jaeyong Rho, Takuya Azumi, Akihiro Yamaguchi, Kenya Sato, Nobuhiko Nishio. Reservation-Based Scheduling for Automotive DSMS under High Overload Condition
762 -- 763Masayuki Terada. Editor's Message to Special Issue of Security and Privacy Challenges in Supporting the Digital Social Revolution
764 -- 771Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto. Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability
772 -- 780Kouya Tochikubo. New General Secret Sharing Scheme Based on Unauthorized Subsets: Improvement of Information Rates for Specified Participants
781 -- 792Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi. Design of Function for Tracing Diffusion of Classified Information for IPC on KVM
793 -- 801Yuya Takeuchi, Takuro Yoshida, Ryotaro Kobayashi, Masahiko Kato, Hiroyuki Kishimoto. Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name
802 -- 815Ryotaro Kobayashi, Genki Otani, Takuro Yoshida, Masahiko Kato. Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity
816 -- 823Hiroaki Kikuchi, Katsumi Takahashi. Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data
824 -- 833Fuyumasa Takatsu, Kohei Hiraga, Osamu Tatebe. Design of Object Storage Using OpenNVM for High-performance Distributed File System

Volume 24, Issue 4

597 -- 0Hiroyuki Sato. Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2015
598 -- 608Md. Kamrul Hasan, Golam Mushih Tanimul Ahsan, Sheikh Iqbal Ahamed, Richard Love, Reza Salim. Pain Level Detection From Facial Image Captured by Smartphone
609 -- 619Takeshi Nishimura, Eisaku Sakane, Kazutsuna Yamaji, Motonori Nakamura, Kento Aida, Nate Klingenstein. Virtual Organization Platform Interoperability Provides the Long Tail an eScience Environment
620 -- 634YungYu Zhuang, Shigeru Chiba. Expanding Event Systems to Support Signals by Enabling the Automation of Handler Bindings
635 -- 646Toyokazu Akiyama, Yuuichi Teranishi, Ryohei Banno, Katsuyoshi Iida, Yukiko Kawai. Scalable Pub/Sub System Using OpenFlow Control
647 -- 659Agussalim, Masato Tsuru. Spray Router with Node Location Dependent Remaining-TTL Message Scheduling in DTNs
660 -- 668Yusuke Sakumoto, Hiroyuki Ohsaki. Fluid-Based Analysis for Understanding TCP Performance on Scale-Free Structure
669 -- 679Sho Kawahara, Kenichi Kourai. Virtual Machine Co-migration for Out-of-band Remote Management
680 -- 689Yohei Watanabe 0001, Junji Shikata. Information-theoretically Secure Timed-release Secret Sharing Schemes
690 -- 699Yoshiyuki Yamashita. Implementing a Rasterization Framework for a Black Hole Spacetime
700 -- 710Yuki Ono, Kouhei Sakurai, Satoshi Yamane. LogChamber: Inferring Source Code Locations Corresponding to Mobile Applications Run-time Logs
711 -- 720Masahiro Sato, Jacques Garrigue. ω
721 -- 731Meng Zhao, Hiroaki Ohshima, Katsumi Tanaka. Paraphrasing Sentential Queries by Incorporating Coordinate Relationship
732 -- 739Valentina Dagiene, Gabriele Stupuriene. Informatics Concepts and Computational Thinking in K-12 Education: A Lithuanian Perspective
740 -- 749Madura Prabhani Pitigala Liyanage, K. S. Lasith Gunawardena, Masahito Hirakawa. Detecting Learning Styles in Learning Management Systems Using Data Mining

Volume 24, Issue 3

450 -- 0Asako Kimura. Editor's Message to Special Issue of Understanding, Technology, and Application of Interaction
451 -- 459Yusuke Manabe, Keisuke Matsumoto, Kenji Sugawara. Multi-angle Gait Recognition Based on Skeletal Tracking Data
460 -- 468Kazuhiko Yamamoto, Takeo Igarashi. LiVo: Sing a Song with a Vowel Keyboard
469 -- 0Shigeyuki Hirai. Editor's Message to Special Issue on Extensions and Advances in Music Information Processing
470 -- 482Hideyuki Tachibana, Yuu Mizuno, Nobutaka Ono, Shigeki Sagayama. A Real-time Audio-to-audio Karaoke Generation System for Monaural Recordings Based on Singing Voice Suppression and Key Conversion Techniques
483 -- 491Hiroki Nishino, Ryohei Nakatsu. Performing STFT and ISTFT in the Microsound Synthesis Framework of the LC Computer Music Programming Language
492 -- 503Ryotaro Kobayashi, Kaoru Saito, Hajime Shimada. Energy Reduction of BTB by Focusing on Number of Branches per Cache Line
504 -- 511Bui Duc Binh, Tomohiro Hirano, Hiroki Mikami, Hideo Yamamoto, Keiji Kimura, Hironori Kasahara. Android Video Processing System Combined with Automatically Parallelized and Power Optimized Code by OSCAR Compiler
512 -- 521Kazuya Murao, Tsutomu Terada. A Combined-activity Recognition Method with Accelerometers
522 -- 533Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow. IoTPOT: A Novel Honeypot for Revealing Current IoT Threats
534 -- 539Tetsushi Ohdaira. Study of the Evolution of Cooperation Based on an Alternative Notion of Punishment "Sanction with Jealousy"
540 -- 553Dain Kaplan, Takenobu Tokunaga, Simone Teufel. Citation Block Determination Using Textual Coherence
554 -- 564Thaer M. Dieb, Masaharu Yoshioka, Shinjiroh Hara. NaDev: An Annotated Corpus to Support Information Extraction from Research Papers on Nanocrystal Devices
565 -- 572Taro Tezuka. Dictionary learning by Normalized Bilateral Projection
573 -- 582Takeshi Yoshimura, Kenji Kono. A Case for Static Analysis of Linux to Find Faults in Interrupt Request Handlers
583 -- 596Shigeki Akiyama, Kenjiro Taura. Scalable Work Stealing of Native Threads on an x86-64 Infiniband Cluster

Volume 24, Issue 2

182 -- 0Kazuhiko Kushima. Editor's Message to Special Issue on Network Services and Distributed Processing
183 -- 194Yukio Tsuruoka. Cloud Computing - Current Status and Future Directions
195 -- 202Keiichi Yasumoto, Hirozumi Yamaguchi, Hiroshi Shigeno. Survey of Real-time Processing Technologies of IoT Data Streams
203 -- 210Akira Masuda, Kun Zhang, Takuya Maekawa. Sonic Home: Environmental Sound Collection Game for Human Activity Recognition
211 -- 216Fumiaki Sato. A Reputation System that Resists a Collusive Attack Focused on a Specific Target
217 -- 226Satomi Saito, Koji Maruhashi, Masahiko Takenaka, Satoru Torii. TOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs
227 -- 236Masafumi Kosugi, Tsuyoshi Suzuki, Osamu Uchida, Hiroaki Kikuchi. SWIPASS: Image-Based User Authentication for Touch Screen Devices
237 -- 246Akira Masuda, Takuya Maekawa. Estimating Physical Characteristics with Body-worn Accelerometers Based on Activity Similarities
247 -- 254Sophon Mongkolluksamee, Vasaka Visoottiviseth, Kensuke Fukuda. Combining Communication Patterns & Traffic Patterns to Enhance Mobile Traffic Identification Performance
255 -- 0Takaaki Tateishi. Editor's Meesage to Special Issue on Software Engineering
256 -- 264Tetsuro Matsumura, Kimio Kuramitsu. A Declarative Extension of Parsing Expression Grammars for Recognizing Most Programming Languages
265 -- 0Kentaro Inui. Editor's Message to Special Issue on Student and Young Researcher Papers
266 -- 274Sakai Takeshi, Masaru Fukushi. A Reliable Volunteer Computing System with Credibility-based Voting
275 -- 291Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto. Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions
292 -- 301Hiroaki Yokose, Koji Nitta, Satoshi Ohzahata, Toshihiko Kato. A Practical and Efficient Overhearing Strategy for Reliable Content Distribution over a Single Hop Ad Hoc Network
302 -- 313Joseph Korpela, Ryosuke Miyaji, Takuya Maekawa, Kazunori Nozaki, Hiroo Tamagawa. Toothbrushing Performance Evaluation Using Smartphone Audio Based on Hybrid HMM-recognition/SVM-regression Model
314 -- 319Bang Hai Le, Kazuki Mori, Ruck Thawonmas. An Extension for Bounded-SVD - A Matrix Factorization Method with Bound Constraints for Recommender Systems
320 -- 329Chunhua Dong, Yen-Wei Chen, Lanfen Lin, Hongjie Hu, Chongwu Jin, Huajun Yu, Xian-Hua Han, Tomoko Tateyama. Simultaneous Segmentation of Multiple Organs Using Random Walks
330 -- 338Yosuke Nozue, Tomo Miyazaki, Yoshihiro Sugaya, Shinichiro Omachi. Efficient Coding for Video Including Text Using Image Generation
339 -- 348Kazuhiro Yamashita, Yasutaka Kamei, Shane McIntosh, Ahmed E. Hassan, Naoyasu Ubayashi. Magnet or Sticky? Measuring Project Characteristics from the Perspective of Developer Attraction and Retention
349 -- 357Hiroki Moizumi, Yoshihiro Sugaya, Masako Omachi, Shinichiro Omachi. Traffic Light Detection Considering Color Saturation Using In-Vehicle Stereo Camera
358 -- 369Irwan Alnarus Kautsar, Shin-Ichiro Kubota, Yasuo Musashi, Kenichi Sugitani. Lecturer Based Supportive Tool Development and Approaches for Learning Material Sharing under Bandwidth Limitation
370 -- 0Motonori Nakamura. Editor's Message to Special Issue of Internet and Operation Technologies in the Era of Cloud
371 -- 380Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi. Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing
381 -- 389Takaki Nakamura, Shinya Matsumoto, Masaru Tezuka, Satoru Izumi, Hiroaki Muraoka. Comparison of Distance Limiting Methods for Risk-aware Data Replication in Urban and Suburban Area
390 -- 394Toshihiko Takahashi. The Simplest and Smallest Network on Which the Ford-Fulkerson Maximum Flow Procedure May Fail to Terminate
395 -- 406Daisuke Kotani, Kazuya Suzuki, Hideyuki Shimonishi. A Multicast Tree Management Method Supporting Fast Failure Recovery and Dynamic Group Membership Changes in OpenFlow Networks
407 -- 415Takuji Shimamawari, Koji Eguchi, Atsuhiro Takasu. Bayesian Non-parametric Inference of Multimodal Topic Hierarchies
416 -- 424Kento Yamashita, Tomio Kamada. Introducing a Multithread and Multistage Mechanism for the Global Load Balancing Library of X10
425 -- 438Wei Hao, Kiminori Matsuzaki. A Partial-tree-based Approach for XPath Query on Large XML Trees
439 -- 449Tasuku Hiraishi, Shingo Okuno, Masahiro Yasugi. An Implementation of Exception Handling with Collateral Task Abortion

Volume 24, Issue 1

1 -- 0Ayako Komatsu. Editor's Message to Special Issue on Security and Privacy considering Human Factor
2 -- 8Makoto Sato, Masami Mohri, Hiroshi Doi, Yoshiaki Shiraishi. Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking
9 -- 19Kazuki Yoneyama. One-Round Authenticated Key Exchange without Implementation Tricks
20 -- 28Nor Athiyah Abdullah, Dai Nishioka, Yuko Murayama. Questionnaire Testing: Identifying Twitter User's Information Sharing Behavior during Disasters
29 -- 30Masashi Saito. Editor's Message to Special Issue of Intelligent Transportation Systems and Mobile Communication toward Smart Communities
31 -- 38Yutaka Arakawa, Yuki Matsuda. Gamification Mechanism for Enhancing a Participatory Urban Sensing: Survey and Practical Results
39 -- 48Hiroki Ohashi, Phong Xuan Nguyen, Takayuki Akiyama, Masaaki Yamamoto, Akiko Sato. Trip-Extraction Method Based on Characteristics of Sensors and Human-Travel Behavior for Sensor-Based Travel Survey
49 -- 63Yanming Wang, Jiguang Yue, Yanchao Dong, Zhencheng Hu. Review on Kernel based Target Tracking for Autonomous Driving
64 -- 71Takumi Sanada, Xuejun Tian, Qian Zhao, Takashi Okuda, Tetsuo Ideguchi. Dynamically Estimating the Number of WLAN to Improve the Throughput and Fairness
72 -- 0Minoru Kobayashi. Editor's Message to Collaboration Support and Network Services for Creative Society
73 -- 82Pasinee Apisakmontri, Ekawit Nantajeewarawat, Mitsuru Ikeda, Marut Buranarach. An Ontology-based Framework for Semantic Reconciliation in Humanitarian Aid in Emergency Information Systems
83 -- 87Eishi Chiba. On the Redundancy of Delivery Time in an In-Line Machine Model
88 -- 98Si-Mohamed Lamraoui, Shin Nakajima. A Formula-based Approach for Automatic Fault Localization of Multi-fault Programs
99 -- 108Marat Zhanikeev. Performance Management of Cloud Populations via Cloud Probing
109 -- 122Yasuhito Utsunomiya, Kentaroh Toyoda, Iwao Sasase. k-NN Search
123 -- 131Kimio Kuramitsu. Fast, Flexible, and Declarative Construction of Abstract Syntax Trees with PEGs
132 -- 140Izumi Asakura, Hidehiko Masuhara, Tomoyuki Aotani. Proof of Soundness of Concurrent Separation Logic for GPGPU in Coq
141 -- 151Katsuhiro Ueno, Atsushi Ohori. A Type Safe Access to Key-value Stores from Functional Languages
152 -- 163Tingting Dong, Yoshiharu Ishikawa, Chuan Xiao. k Similarity Search over Gaussian Distributions Based on KL-Divergence
164 -- 172Hiroto Imachi, Takeo Hoshi. Hybrid Numerical Solvers for Massively Parallel Eigenvalue Computations and Their Benchmark with Electronic Structure Calculations
173 -- 181Koji Hasebe, Takumi Sawada, Kazuhiko Kato. A Game Theoretic Approach to Power Reduction in Distributed Storage Systems