default search action
Journal of Information Processing, Volume 16
Volume 16, April-December 2008
- Koji Ara, Naoto Kanehira, Daniel Olguín Olguín, Benjamin N. Waber, Taemie Kim, Akshay Mohan, Peter A. Gloor, Rob Laubacher, Daniel Oster, Alex Pentland, Kazuo Yano:
Sensible Organizations: Changing Our Businesses and Work Styles through Sensor Data. 1-12 - Naoshi Uchihira, Yuji Kyoya, Sun K. Kim, Katsuhiro Maeda, Masanori Ozawa, Kosuke Ishii:
Analysis and Design Methodology for Recognizing Opportunities and Difficulties for Product-based Services. 13-26 - Weihua Sun, Junya Fukumoto, Hirozumi Yamaguchi, Shinji Kusumoto, Teruo Higashino:
A Contact-based Hybrid Routing Protocol for Mobile Ad Hoc Networks. 27-37 - Ben Yan, Masahide Nakamura, Lydie du Bousquet, Ken-ichi Matsumoto:
Validating Safety for the Integrated Services of the Home Network System Using JML. 38-49 - Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Analysis of Probabilistic Trapezoid Protocol for Data Replication. 50-63 - Toshihiko Sasama, Hiroshi Masuyama, Kazuya Murakami:
Algorithms for Energy-Efficient Broad- and Multi-Casting in Wireless Networks. 64-67 - Maike Erdmann, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:
Extraction of Bilingual Terminology from a Multilingual Web-based Encyclopedia. 68-79 - Satoshi Matsuura, Kazutoshi Fujikawa, Hideki Sunahara:
Implementation Methodology of Geographical Overlay Network Suitable for Ubiquitous Sensing Environment. 80-92 - Toshihiko Yamakami:
A Stream-mining Oriented User Identification Algorithm Based on a Day Scale Click Regularity Assumption in Mobile Clickstreams. 93-99 - Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi:
Estimation of Increase of Scanners Based on ISDAS Distributed Sensors. 100-109 - Toru Nakanishi, Nobuo Funabiki:
Efficient Revocable Group Signature Schemes Using Primes. 110-121 - Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka:
Extending Bleichenbacher's Forgery Attack. 122-129 - Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. 130-141 - Yi Yin, Yoshiaki Katayama, Naohisa Takahashi:
Detection of Conflicts Caused by a Combination of Filters Based on Spatial Relationships. 142-156 - Takeshi Okuda, Suguru Yamaguchi:
Lightweight Vulnerability Management System. 157-164 - Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew:
Automated Port-scan Classification with Decision Tree and Distributed Sensors. 165-175 - Atsuko Miyaji, Kenji Mizosoe:
Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point. 176-189 - Zhenbao Liu, Jun Mitani, Yukio Fukui, Seiichi Nishihara:
A New 3D Shape Retrieval Method Using Spherical Healpix. 190-200 - Masayoshi Shimamura, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs. 201-218
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.