default search action
Journal of Information Processing, Volume 24
Volume 24, Number 1, January 2016
- Ayako Komatsu:
Editor's Message to Special Issue on Security and Privacy considering Human Factor. 1 - Makoto Sato, Masami Mohri, Hiroshi Doi, Yoshiaki Shiraishi:
Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking. 2-8 - Kazuki Yoneyama:
One-Round Authenticated Key Exchange without Implementation Tricks. 9-19 - Nor Athiyah Abdullah, Dai Nishioka, Yuko Murayama:
Questionnaire Testing: Identifying Twitter User's Information Sharing Behavior during Disasters. 20-28
- Masashi Saito:
Editor's Message to Special Issue of Intelligent Transportation Systems and Mobile Communication toward Smart Communities. 29-30 - Yutaka Arakawa, Yuki Matsuda:
Gamification Mechanism for Enhancing a Participatory Urban Sensing: Survey and Practical Results. 31-38 - Hiroki Ohashi, Phong Xuan Nguyen, Takayuki Akiyama, Masaaki Yamamoto, Akiko Sato:
Trip-Extraction Method Based on Characteristics of Sensors and Human-Travel Behavior for Sensor-Based Travel Survey. 39-48 - Yanming Wang, Jiguang Yue, Yanchao Dong, Zhencheng Hu:
Review on Kernel based Target Tracking for Autonomous Driving. 49-63 - Takumi Sanada, Xuejun Tian, Qian Zhao, Takashi Okuda, Tetsuo Ideguchi:
Dynamically Estimating the Number of WLAN to Improve the Throughput and Fairness. 64-71
- Minoru Kobayashi:
Editor's Message to Collaboration Support and Network Services for Creative Society. 72 - Pasinee Apisakmontri, Ekawit Nantajeewarawat, Mitsuru Ikeda, Marut Buranarach:
An Ontology-based Framework for Semantic Reconciliation in Humanitarian Aid in Emergency Information Systems. 73-82
- Eishi Chiba:
On the Redundancy of Delivery Time in an In-Line Machine Model. 83-87 - Si-Mohamed Lamraoui, Shin Nakajima:
A Formula-based Approach for Automatic Fault Localization of Multi-fault Programs. 88-98 - Marat Zhanikeev:
Performance Management of Cloud Populations via Cloud Probing. 99-108 - Yasuhito Utsunomiya, Kentaroh Toyoda, Iwao Sasase:
LPCQP: Lightweight Private Circular Query Protocol with Divided POI-table and Somewhat Homomorphic Encryption for Privacy-Preserving k-NN Search. 109-122 - Kimio Kuramitsu:
Fast, Flexible, and Declarative Construction of Abstract Syntax Trees with PEGs. 123-131 - Izumi Asakura, Hidehiko Masuhara, Tomoyuki Aotani:
Proof of Soundness of Concurrent Separation Logic for GPGPU in Coq. 132-140 - Katsuhiro Ueno, Atsushi Ohori:
A Type Safe Access to Key-value Stores from Functional Languages. 141-151 - Tingting Dong, Yoshiharu Ishikawa, Chuan Xiao:
Top-k Similarity Search over Gaussian Distributions Based on KL-Divergence. 152-163 - Hiroto Imachi, Takeo Hoshi:
Hybrid Numerical Solvers for Massively Parallel Eigenvalue Computations and Their Benchmark with Electronic Structure Calculations. 164-172 - Koji Hasebe, Takumi Sawada, Kazuhiko Kato:
A Game Theoretic Approach to Power Reduction in Distributed Storage Systems. 173-181
Volume 24, Number 2, March 2016
- Kazuhiko Kushima:
Editor's Message to Special Issue on Network Services and Distributed Processing. 182 - Yukio Tsuruoka:
Cloud Computing - Current Status and Future Directions. 183-194 - Keiichi Yasumoto, Hirozumi Yamaguchi, Hiroshi Shigeno:
Survey of Real-time Processing Technologies of IoT Data Streams. 195-202 - Akira Masuda, Kun Zhang, Takuya Maekawa:
Sonic Home: Environmental Sound Collection Game for Human Activity Recognition. 203-210 - Fumiaki Sato:
A Reputation System that Resists a Collusive Attack Focused on a Specific Target. 211-216 - Satomi Saito, Koji Maruhashi, Masahiko Takenaka, Satoru Torii:
TOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs. 217-226 - Masafumi Kosugi, Tsuyoshi Suzuki, Osamu Uchida, Hiroaki Kikuchi:
SWIPASS: Image-Based User Authentication for Touch Screen Devices. 227-236 - Akira Masuda, Takuya Maekawa:
Estimating Physical Characteristics with Body-worn Accelerometers Based on Activity Similarities. 237-246 - Sophon Mongkolluksamee, Vasaka Visoottiviseth, Kensuke Fukuda:
Combining Communication Patterns & Traffic Patterns to Enhance Mobile Traffic Identification Performance. 247-254
- Takaaki Tateishi:
Editor's Meesage to Special Issue on Software Engineering. 255 - Tetsuro Matsumura, Kimio Kuramitsu:
A Declarative Extension of Parsing Expression Grammars for Recognizing Most Programming Languages. 256-264
- Kentaro Inui:
Editor's Message to Special Issue on Student and Young Researcher Papers. 265 - Sakai Takeshi, Masaru Fukushi:
A Reliable Volunteer Computing System with Credibility-based Voting. 266-274 - Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions. 275-291 - Hiroaki Yokose, Koji Nitta, Satoshi Ohzahata, Toshihiko Kato:
A Practical and Efficient Overhearing Strategy for Reliable Content Distribution over a Single Hop Ad Hoc Network. 292-301 - Joseph Korpela, Ryosuke Miyaji, Takuya Maekawa, Kazunori Nozaki, Hiroo Tamagawa:
Toothbrushing Performance Evaluation Using Smartphone Audio Based on Hybrid HMM-recognition/SVM-regression Model. 302-313 - Bang Hai Le, Kazuki Mori, Ruck Thawonmas:
An Extension for Bounded-SVD - A Matrix Factorization Method with Bound Constraints for Recommender Systems. 314-319 - Chunhua Dong, Yen-Wei Chen, Lanfen Lin, Hongjie Hu, Chongwu Jin, Huajun Yu, Xian-Hua Han, Tomoko Tateyama:
Simultaneous Segmentation of Multiple Organs Using Random Walks. 320-329 - Yosuke Nozue, Tomo Miyazaki, Yoshihiro Sugaya, Shinichiro Omachi:
Efficient Coding for Video Including Text Using Image Generation. 330-338 - Kazuhiro Yamashita, Yasutaka Kamei, Shane McIntosh, Ahmed E. Hassan, Naoyasu Ubayashi:
Magnet or Sticky? Measuring Project Characteristics from the Perspective of Developer Attraction and Retention. 339-348 - Hiroki Moizumi, Yoshihiro Sugaya, Masako Omachi, Shinichiro Omachi:
Traffic Light Detection Considering Color Saturation Using In-Vehicle Stereo Camera. 349-357 - Irwan Alnarus Kautsar, Shin-Ichiro Kubota, Yasuo Musashi, Kenichi Sugitani:
Lecturer Based Supportive Tool Development and Approaches for Learning Material Sharing under Bandwidth Limitation. 358-369
- Motonori Nakamura:
Editor's Message to Special Issue of Internet and Operation Technologies in the Era of Cloud. 370 - Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing. 371-380 - Takaki Nakamura, Shinya Matsumoto, Masaru Tezuka, Satoru Izumi, Hiroaki Muraoka:
Comparison of Distance Limiting Methods for Risk-aware Data Replication in Urban and Suburban Area. 381-389
- Toshihiko Takahashi:
The Simplest and Smallest Network on Which the Ford-Fulkerson Maximum Flow Procedure May Fail to Terminate. 390-394 - Daisuke Kotani, Kazuya Suzuki, Hideyuki Shimonishi:
A Multicast Tree Management Method Supporting Fast Failure Recovery and Dynamic Group Membership Changes in OpenFlow Networks. 395-406 - Takuji Shimamawari, Koji Eguchi, Atsuhiro Takasu:
Bayesian Non-parametric Inference of Multimodal Topic Hierarchies. 407-415 - Kento Yamashita, Tomio Kamada:
Introducing a Multithread and Multistage Mechanism for the Global Load Balancing Library of X10. 416-424 - Wei Hao, Kiminori Matsuzaki:
A Partial-tree-based Approach for XPath Query on Large XML Trees. 425-438 - Tasuku Hiraishi, Shingo Okuno, Masahiro Yasugi:
An Implementation of Exception Handling with Collateral Task Abortion. 439-449
Volume 24, Number 3, May 2016
- Asako Kimura:
Editor's Message to Special Issue of Understanding, Technology, and Application of Interaction. 450 - Yusuke Manabe, Keisuke Matsumoto, Kenji Sugawara:
Multi-angle Gait Recognition Based on Skeletal Tracking Data. 451-459 - Kazuhiko Yamamoto, Takeo Igarashi:
LiVo: Sing a Song with a Vowel Keyboard. 460-468
- Shigeyuki Hirai:
Editor's Message to Special Issue on Extensions and Advances in Music Information Processing. 469 - Hideyuki Tachibana, Yuu Mizuno, Nobutaka Ono, Shigeki Sagayama:
A Real-time Audio-to-audio Karaoke Generation System for Monaural Recordings Based on Singing Voice Suppression and Key Conversion Techniques. 470-482 - Hiroki Nishino, Ryohei Nakatsu:
Performing STFT and ISTFT in the Microsound Synthesis Framework of the LC Computer Music Programming Language. 483-491
- Ryotaro Kobayashi, Kaoru Saito, Hajime Shimada:
Energy Reduction of BTB by Focusing on Number of Branches per Cache Line. 492-503 - Bui Duc Binh, Tomohiro Hirano, Hiroki Mikami, Hideo Yamamoto, Keiji Kimura, Hironori Kasahara:
Android Video Processing System Combined with Automatically Parallelized and Power Optimized Code by OSCAR Compiler. 504-511 - Kazuya Murao, Tsutomu Terada:
A Combined-activity Recognition Method with Accelerometers. 512-521 - Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow:
IoTPOT: A Novel Honeypot for Revealing Current IoT Threats. 522-533 - Tetsushi Ohdaira:
Study of the Evolution of Cooperation Based on an Alternative Notion of Punishment "Sanction with Jealousy". 534-539 - Dain Kaplan, Takenobu Tokunaga, Simone Teufel:
Citation Block Determination Using Textual Coherence. 540-553 - Thaer M. Dieb, Masaharu Yoshioka, Shinjiroh Hara:
NaDev: An Annotated Corpus to Support Information Extraction from Research Papers on Nanocrystal Devices. 554-564 - Taro Tezuka:
Dictionary learning by Normalized Bilateral Projection. 565-572 - Takeshi Yoshimura, Kenji Kono:
A Case for Static Analysis of Linux to Find Faults in Interrupt Request Handlers. 573-582 - Shigeki Akiyama, Kenjiro Taura:
Scalable Work Stealing of Native Threads on an x86-64 Infiniband Cluster. 583-596
Volume 24, Number 4, July 2016
- Hiroyuki Sato:
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2015. 597 - Md. Kamrul Hasan, Golam Mushih Tanimul Ahsan, Sheikh Iqbal Ahamed, Richard Love, Reza Salim:
Pain Level Detection From Facial Image Captured by Smartphone. 598-608 - Takeshi Nishimura, Eisaku Sakane, Kazutsuna Yamaji, Motonori Nakamura, Kento Aida, Nate Klingenstein:
Virtual Organization Platform Interoperability Provides the Long Tail an eScience Environment. 609-619 - YungYu Zhuang, Shigeru Chiba:
Expanding Event Systems to Support Signals by Enabling the Automation of Handler Bindings. 620-634 - Toyokazu Akiyama, Yuuichi Teranishi, Ryohei Banno, Katsuyoshi Iida, Yukiko Kawai:
Scalable Pub/Sub System Using OpenFlow Control. 635-646 - Agussalim, Masato Tsuru:
Spray Router with Node Location Dependent Remaining-TTL Message Scheduling in DTNs. 647-659 - Yusuke Sakumoto, Hiroyuki Ohsaki:
Fluid-Based Analysis for Understanding TCP Performance on Scale-Free Structure. 660-668
- Sho Kawahara, Kenichi Kourai:
Virtual Machine Co-migration for Out-of-band Remote Management. 669-679 - Yohei Watanabe, Junji Shikata:
Information-theoretically Secure Timed-release Secret Sharing Schemes. 680-689 - Yoshiyuki Yamashita:
Implementing a Rasterization Framework for a Black Hole Spacetime. 690-699 - Yuki Ono, Kouhei Sakurai, Satoshi Yamane:
LogChamber: Inferring Source Code Locations Corresponding to Mobile Applications Run-time Logs. 700-710 - Masahiro Sato, Jacques Garrigue:
An Intuitionistic Set-theoretical Model of CCω. 711-720 - Meng Zhao, Hiroaki Ohshima, Katsumi Tanaka:
Paraphrasing Sentential Queries by Incorporating Coordinate Relationship. 721-731 - Valentina Dagiene, Gabriele Stupuriene:
Informatics Concepts and Computational Thinking in K-12 Education: A Lithuanian Perspective. 732-739 - Madura Prabhani Pitigala Liyanage, K. S. Lasith Gunawardena, Masahito Hirakawa:
Detecting Learning Styles in Learning Management Systems Using Data Mining. 740-749
Volume 24, Number 5, September 2016
- Eiichi Hayakawa:
Editor's Message to Special Issue on Embedded Systems Engineering. 750 - Jaeyong Rho, Takuya Azumi, Akihiro Yamaguchi, Kenya Sato, Nobuhiko Nishio:
Reservation-Based Scheduling for Automotive DSMS under High Overload Condition. 751-761
- Masayuki Terada:
Editor's Message to Special Issue of Security and Privacy Challenges in Supporting the Digital Social Revolution. 762-763 - Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability. 764-771 - Kouya Tochikubo:
New General Secret Sharing Scheme Based on Unauthorized Subsets: Improvement of Information Rates for Specified Participants. 772-780 - Shota Fujii, Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi:
Design of Function for Tracing Diffusion of Classified Information for IPC on KVM. 781-792 - Yuya Takeuchi, Takuro Yoshida, Ryotaro Kobayashi, Masahiko Kato, Hiroyuki Kishimoto:
Detection of the DNS Water Torture Attack by Analyzing Features of the Subdomain Name. 793-801 - Ryotaro Kobayashi, Genki Otani, Takuro Yoshida, Masahiko Kato:
Defense Method of HTTP GET Flood Attack by Adaptively Controlling Server Resources Depending on Different Attack Intensity. 802-815 - Hiroaki Kikuchi, Katsumi Takahashi:
Zipf Distribution Model for Quantifying Risk of Re-identification from Trajectory Data. 816-823
- Fuyumasa Takatsu, Kohei Hiraga, Osamu Tatebe:
Design of Object Storage Using OpenNVM for High-performance Distributed File System. 824-833
Volume 24, Number 6, November 2016
- Yasuyuki Sumi:
Editorial Preface to the Special Issue on Ubiquitous Computing Systems V. 834 - Hiroyuki Manabe, Hiroshi Inamura:
Implementation of Input Functionality Using Energy Source for Further Miniaturization of Small Devices. 835-842 - Kensuke Sawada, Yuichi Hanada, Shin-ichiro Mori:
User-installable Indoor Positioning System Using a Wi-Fi Beacon and PDR Module. 843-852 - Sozo Inoue, Naonori Ueda, Yasunobu Nohara, Naoki Nakashima:
Recognizing and Understanding Nursing Activities for a Whole Day with a Big Dataset. 853-866 - Li Jiang, Hideyuki Kawashima, Osamu Tatebe:
Efficient Window Aggregate Method on Array Database System. 867-877 - Jingtao Sun, Ichiro Satoh:
Theory and Implementation of an Adaptive Middleware for Ubiquitous Computing Systems. 878-886
- Yusuke Sakumoto, Masaki Aida, Hideyuki Shimonishi:
Adaptive Function to Ensure Robustness of MCMC-based Autonomous Decentralized Control Mechanism against Changing Environment. 887-896 - Yuta Tsunematsu, Norihiko Kawai, Tomokazu Sato, Naokazu Yokoya:
Texture Transfer Based on Energy Minimization for Painterly Rendering. 897-907 - Yasusi Kanada:
Method for Procedural 3D Printing Using a Python Library. 908-916 - Tim Felgentreff, Robert Hirschfeld, Maria Graber, Alan Borning, Hidehiko Masuhara:
Declaring Constraints on Object-oriented Collections. 917-927 - Chong Li, Le-Duc Tung, Xiaodong Meng, Zhenjiang Hu:
Let High-level Graph Queries Be Parallel Efficient: An Approach Over Structural Recursion On Pregel. 928-936 - Thinh Minh Do, Yasuko Matsubara, Yasushi Sakurai:
Non-linear Time-series Analysis of Social Influence. 937-945 - Annisa, Asif Zaman, Yasuhiko Morimoto:
Area Skyline Query for Selecting Good Locations in a Map. 946-955
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.