default search action
Journal of Information Processing, Volume 27
Volume 27, 2019
- Nobuo Kawaguchi:
Editor's Message to Special Issue of Pervasive System and Intelligent Transportation Systems for Future Life. 1 - Mineo Takai, Jay Martin, Shigeru Kaneda, Taka Maeno:
Scenargie as a Network Simulator and Beyond. 2-9 - Kosuke Watanabe, Kei Hiroi, Takeshi Kamiyama, Hiroyuki Sano, Masakatsu Tsukamoto, Masaji Katagiri, Daizo Ikeda, Katsuhiko Kaji, Nobuo Kawaguchi:
A Smartphone 3D Positioning Method using a Spinning Magnet Marker. 10-24 - Thongtat Oransirikul, Ian Piumarta, Hideyuki Takada:
Classifying Passenger and Non-passenger Signals in Public Transportation by Analysing Mobile Device Wi-Fi Activity. 25-32 - Bondan Suwandi, Teruaki Kitasuka, Masayoshi Aritsugi:
Vehicle Vibration Error Compensation on IMU-accelerometer Sensor Using Adaptive Filter and Low-pass Filter Approaches. 33-40 - Hidekazu Shiozawa:
Editor's Message to Special Issue of Collaboration Technologies and Network Services Towards the Society Connecting All People and Things. 41 - Yunosuke Higashi, Masao Ohira, Yutaro Kashiwa, Yuki Manabe:
Hierarchical Clustering of OSS License Statements toward Automatic Generation of License Rules. 42-50 - Yu Suzuki, Yoshitaka Matsuda, Satoshi Nakamura:
Additional Operations of Simple HITs on Microtask Crowdsourcing for Worker Quality Prediction. 51-60 - Abu Nowshed Chy, Md. Zia Ullah, Masaki Aono:
Query Expansion for Microblog Retrieval Focusing on an Ensemble of Features. 61-76 - Yoshihiko Kakutani, Yuito Murase, Yuichi Nishiwaki:
Dual-context Modal Logic as Left Adjoint of Fitch-style Modal Logic. 77-86 - Yuya Kono, Hideyuki Kawabata, Tetsuo Hironaka:
Resolving Ambiguous Types in Haskell by Checking Uniqueness of Type Variable Assignments under Type Class Constraints. 87-94 - Daisuke Sakamoto:
Editor's Message to Special Issue of Understanding, Technology, and Application of Interaction. 95 - Kentaro Ueda, Tsutomu Terada, Masahiko Tsukamoto:
Input Interface Using Wrinkles on Clothes for Wearable Computing. 96-105 - Ryosuke Takada, Toshiyuki Ando, Buntarou Shizuki, Shin Takahashi:
BaroTouch: A Technique for Touch Force Sensing Using a Waterproof Device's Built-in Barometer. 106-115 - Masashi Yamamuro:
Editor's Message to Special Issue of Network Services and Distributed Processing. 116 - Takahiro Noi, Takuya Yoshihiro:
A Scheduling for Slotted-CSMA-based Wireless Mesh Networks to Reduce Delivery Delay. 117-124 - Junji Takemasa, Yuki Koizumi, Toru Hasegawa:
Lightweight Cache Admission Algorithm for Fast NDN Software Routers. 125-134 - Hironori Nakajo:
Editor's Message to Special Issue on Embedded Systems Engineering. 135 - Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada:
Energy-Aware Task Allocation for Heterogeneous Multiprocessor Systems by Using Integer Linear Programming. 136-148 - Huatao Zhao, Jiongyao Ye, Takahiro Watanabe:
A Low-power Shared Cache Design with Modified PID Controller for Efficient Multicore Embedded Systems. 149-158 - Junko Takahashi, Masashi Tanaka, Hitoshi Fuji, Toshio Narita, Shunsuke Matsumoto, Hiroki Sato:
Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated Informative CAN Messages. 159-167 - Ryo Masumura, Taichi Asami, Takanobu Oba, Hirokazu Masataki, Sumitaka Sakauchi:
Viterbi Approximation of Latent Words Language Models for Automatic Speech Recognition. 168-176 - Masahiro Yasugi, Reichi Ikeuchi, Tasuku Hiraishi, Tsuneyasu Komiya:
Evaluating Portable Mechanisms for Legitimate Execution Stack Access with a Scheme Interpreter in an Extended SC Language. 177-189 - Chen Zhao, Bin Yang, Yu Hirate:
A Reward Optimization Model for Decision-making under Budget Constraint. 190-200 - Senxi Li, Takeshi Iwashita, Takeshi Fukaya:
Enhancement of Algebraic Block Multi-Color Ordering for ILU Preconditioning and Its Performance Evaluation in Preconditioned GMRES Solver. 201-210 - An Huynh, Christian Helm, Shintaro Iwasaki, Wataru Endo, Byambajav Namsraijav, Kenjiro Taura:
TP-PARSEC: A Task Parallel PARSEC Benchmark Suite. 211-220 - Shun Kurihara, Shoki Fukuda, Takeshi Kamiyama, Akira Fukuda, Masato Oguchi, Saneyasu Yamaguchi:
Estimation of Power Consumption of Each Application Considering Software Dependency in Android. 221-232 - Yoshiaki Kitaguchi:
Editor's Message to Special Issue of the Internet and Operation Technologies by Constructing Resilient Information Systems. 233 - Motoyuki Ohmori, Masayuki Higashino, Toshiya Kawato, Satoshi Fujio, Kiyoyuki Nakashima:
On-demand Suspicious Host Isolation Adopting Software Defined Network Approach on a Computer Security Incident Response. 234-243 - Etsuya Shibayama:
Editor's Message to Special Issue of Young Researchers' Papers. 244 - Thach V. Bui, Minoru Kuribayashi, Tetsuya Kojima, Roghayyeh Haghvirdinezhad, Isao Echizen:
Efficient (nonrandom) Construction and Decoding for Non-adaptive Group Testing. 245-256 - Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka:
Easy-going Development of Event-Driven Applications by Iterating a Search-Select-Superpose Loop. 257-267 - Tran Duy Linh, Masayuki Arai:
Two-stage Deep Neural Network for General Object Detection. 268-277 - Tatsunori Hirai, Shun Sawada:
Melody2Vec: Distributed Representations of Melodic Phrases based on Melody Segmentation. 278-286 - Hirotaka Suzuki, Haruhisa Ichikawa, Jin Mitsugi, Yuusuke Kawakita:
GNU Radio-based Cloud Development Environment for Software-defined Radio Users. 287-296 - Yuhei Kawakoya, Eitaro Shioji, Makoto Iwamura, Jun Miyoshi:
API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis. 297-314 - Kazuhiro Seki:
On Cross-Lingual Text Similarity Using Neural Translation Models. 315-321 - Mihiro Sonoyama, Takatsugu Ono, Haruichi Kanaya, Osamu Muta, Smruti R. Sarangi, Koji Inoue:
Radio Propagation Characteristics-based Spoofing Attack Prevention on Wireless Connected Devices. 322-334 - Yoshinao Ishii, Masaki Takanashi:
Low-cost Unsupervised Outlier Detection by Autoencoders with Robust Estimation. 335-339 - Naoki Kondo, Kiminori Matsuzaki:
Playing Game 2048 with Deep Convolutional Neural Networks Trained by Supervised Learning. 340-347 - Ayumi Ohnishi, Tsutomu Terada, Masahiko Tsukamoto:
A Method for Recognizing Postures and Gestures Using Foot Pressure Sensors. 348-358 - Yoshiaki Matsuzawa:
Editor's Message to Special Issue of Information Systems. 359 - Van Cu Pham, Yuto Lim, Antonio Sgorbissa, Yasuo Tan:
An Ontology-driven ECHONET Lite Adaptation Layer for Smart Homes. 360-368 - Wataru Aoyama, Hideya Iwasaki:
dajFS: A New File System with Per-directory Adaptive Journaling. 369-377 - Takeshi Miura, Takeshi Shibata, Madoka Uemura, Katsubumi Tajima, Hideo Tamamoto:
Development of a Cartogram Construction Method for Visualizing Japanese Folk Dance Distribution. 378-391 - Koji Kawamata, Kenta Oku:
Roadscape-based Route Recommender System Using Coarse-to-fine Route Search. 392-403 - Yu Suzuki:
Filtering Method for Twitter Streaming Data Using Human-in-the-Loop Machine Learning. 404-410 - Akimasa Morihata:
Using Algebraic Properties and Function Fusion to Evaluate Tree Accumulations in Parallel. 411-421 - Takayuki Miyazaki, Yasuhiko Minamide:
Derivatives of Regular Expressions with Lookahead. 422-430 - Keigo Imai, Jacques Garrigue:
Lightweight Linearly-typed Programming with Lenses and Monads. 431-444 - Nathavuth Kitbutrawat, Hirozumi Yamaguchi, Teruo Higashino:
EasyTrack: Zero-Calibration Smart-Home Tracking System. 445-455 - Tetsuro Kakeshita, Kosuke Ohta:
Student Log Analysis Functions for Web-based Programming Education Support Tool pgtracer. 456-468 - Sheng Hu, Chuan Xiao, Yoshiharu Ishikawa:
Scope-aware Code Completion with Discriminative Modeling. 469-478 - Tetsuro Yamazaki, Shigeru Chiba:
Buffered Garbage Collection: An Approach to Collecting Self-Created Garbage Objects. 479-488 - Kosuke Matsumoto, Tomoharu Ugawa:
Visualization of Counterexamples of Memory Model-aware Model Checking Using SPIN. 489-498 - Kazuaki Hanawa, Akira Sasaki, Naoaki Okazaki, Kentaro Inui:
Stance Detection Attending External Knowledge from Wikipedia. 499-506 - Shiho Moriai:
Editor's Message to Special Issue of Computer Security Technologies for Digital Transformation. 507 - Nasima Begum, Toru Nakanishi:
Efficiency Improvement in Group Signature Scheme with Probabilistic Revocation. 508-516 - Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. 517-524 - Tomofumi Nakamori, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records. 525-535 - Yuta Sawabe, Daiki Chiba, Mitsuaki Akiyama, Shigeki Goto:
Detection Method of Homograph Internationalized Domain Names with OCR. 536-544 - Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:
Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes. 545-554 - Mamoru Mimura, Hiroya Miura:
Detecting Unseen Malicious VBA Macros with NLP Techniques. 555-563 - Motoyuki Ohmori:
On Automation and Orchestration of an Initial Computer Security Incident Response by Introducing Centralized Incident Tracking System. 564-573 - Songpon Teerakanok, Tetsutaro Uehara:
A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection. 574-584 - Yuichi Komano, Hideo Shimizu, Hideyuki Miyake:
Integrative Acceleration of First-order Boolean Masking for Embedded IoT Devices. 585-592 - Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. 593-602 - Hironori Imai, Akira Kanaoka:
Chronological Analysis of Source Code Reuse Impact on Android Application Security. 603-612 - Kenichi Yoshida:
Editor's Message to Special Issue of "Applications and the Internet" in Conjunction with Main Topics of COMPSAC 2018. 613 - Yutaka Arakawa:
Sensing and Changing Human Behavior for Workplace Wellness. 614-623 - Nusrat Jahan Mozumder, Maitraye Das, Tanzima Hashem, Sharmin Afrose, Khandakar Ashrafi Akbar:
Towards Privacy-preserving Authenticated Disease Risk Queries. 624-642 - Kazuyuki Yamashita, Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:
Revisiting the Robustness of Complex Networks against Random Node Removal. 643-649 - Ryosuke Matsumoto, Kenji Rikitake, Kentaro Kuribayashi:
Large-scale Certificate Management on Multi-tenant Web Servers. 650-657 - Tomoya Nonaka, Tomoharu Ugawa:
Design and Implementation of Superinstructions for JavaScript Virtual Machine Generation System for Embedded Systems eJSTK. 658-670 - Tsubasa Murakami, Takeshi Kamiyama, Akira Fukuda, Masato Oguchi, Saneyasu Yamaguchi:
BET Estimation on Power Saving by Intermittent Disabling Network Interface on Android. 671-681 - Takayuki Kosaka:
Editor's Message to Special Issue of Entertainment Computing. 682 - Mina Shiraishi, Kozue Ogasawara, Tetsuro Kitahara:
HamoKara: A System that Enables Amateur Singers to Practice Backing Vocals for Karaoke. 683-692 - Christoph M. Wilk, Shigeki Sagayama:
Automatic Music Completion Based on Joint Optimization of Harmony Progression and Voicing. 693-700 - Chaxiong Yukonhiatou, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo:
A Method to Reduce Transaction Time for Real-time IoT Applications. 701-710 - Mamoru Mimura:
An Attempt to Read Network Traffic with Doc2vec. 711-719 - Masahiro Sato, Koki Nagatani, Takashi Sonoda, Qian Zhang, Tomoko Ohkuma:
Context Style Explanation for Recommender Systems. 720-729 - Phanucheep Chotnithi, Hong Van Le, Atsuhiro Takasu:
An Effective Parameter-free Comparison of NGS Short Reads for Phylogeny Reconstruction. 730-741 - Zhaohao Zeng, Ruihua Song, Pingping Lin, Tetsuya Sakai:
Attitude Detection for One-Round Conversation: Jointly Extracting Target-Polarity Pairs. 742-751 - Faith Wavinya Mutinda, Atsuhiro Nakashima, Koh Takeuchi, Yuya Sasaki, Makoto Onizuka:
Time Series Link Prediction Using NMF. 752-761 - Katsumi Takahashi:
Editor's Message to Special Issue of Usable Security. 762 - Tatsuya Midorikawa, Akihiro Tachikawa, Akira Kanaoka:
Helping Johnny to Search: Usable Encrypted Search on Webmail System. 763-772 - Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Youki Kadobayashi:
A Demographic Perspective of Smartphone Security and Its Redesigned Notifications. 773-786 - Toru Nakamura, Andrew A. Adams, Kiyoshi Murata, Shinsaku Kiyomoto, Nobuo Suzuki:
The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability. 787-801 - Tatsuya Nagai, Makoto Takita, Keisuke Furumoto, Yoshiaki Shiraishi, Kelin Xia, Yasuhiro Takano, Masami Mohri, Masakatu Morii:
Understanding Attack Trends from Security Blog Posts Using Guided-topic Model. 802-809 - Qizhen Zhu, Hitoshi Akama, Yasuhiko Minamide:
Solving String Constraints with Streaming String Transducers. 810-821 - Akihiro Fujii, Shigeo Kaneko, Teruo Tanaka, Takeshi Iwashita:
Time Segment Correction Method for Parallel Time Integration. 822-830 - Akihiro Ida, Hiroshi Nakashima, Tasuku Hiraishi, Ichitaro Yamazaki, Rio Yokota, Takeshi Iwashita:
QR Factorization of Block Low-rank Matrices with Weak Admissibility Condition. 831-839 - Zhengyang Bai, Tasuku Hiraishi, Hiroshi Nakashima, Akihiro Ida, Masahiro Yasugi:
Parallelization of Matrix Partitioning in Construction of Hierarchical Matrices using Task Parallel Languages. 840-851
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.