default search action
Journal of Information Processing, Volume 28
Volume 28, 2020
- Masashi Saito:
Editor's Message to Special Issue of Intelligent Transportation Systems and Mobile Communication for Realizing Smart Cities. 1-2 - Tomoya Kitani:
Bikeinformatics: An Introduction of Informatics to the Motorcycle Researches and the Development of New Generation Motorcycle-based Personal Vehicles. 3-15 - Yusuke Fukazawa, Naoki Yamamoto, Takashi Hamatani, Keiichi Ochiai, Akira Uchiyama, Ken Ohta:
Smartphone-based Mental State Estimation: A Survey from a Machine Learning Perspective. 16-30 - Tetsushi Matsuda, Susumu Ishihara:
Bandwidth Control Method and Available Bandwidth Estimation Method for Aggregated Traffic. 31-43 - Kosuke Yotsuya, Katsuhiro Naito, Naoya Chujo, Tadanori Mizuno, Katsuhiko Kaji:
Method to Improve Accuracy of Indoor PDR Trajectories Using a Large Number of Trajectories. 44-54 - Yusuke Hara, Ryosuke Hasegawa, Akira Uchiyama, Takaaki Umedu, Teruo Higashino:
FlowScan: Estimating People Flows on Sidewalks Using Dashboard Cameras Based on Deep Learning. 55-64 - Jun Yajima, Yasuhiko Abe, Takayuki Hasebe, Takao Okubo:
Anomaly Detection Method "Cumulative Sum Detection" for In-Vehicle Networks. 65-74 - Yusuke Sakumoto, Ittetsu Taniguchi:
Fast Directional Energy Interchange Used in MCMC-based Autonomous Decentralized Mechanism toward a Resilient Microgrid. 75-85 - Akihito Kitadai:
Editor's Message to Special Issue of Computer and Humanities. 86 - Takeshi Miura, Katsubumi Tajima:
Development of a Point Location Conversion Approach for Distance Cartogram Construction. 87-90 - Tatsuki Sekino:
Data Description and Retrieval Using Periods Represented by Uncertain Time Intervals. 91-99 - Keiichi Yasumoto:
Editor's Message to Special Issue of Network Services and Distributed Processing. 100-101 - Hiroko Nagashima, Yuka Kato:
Recommendation of Imputing Value for Sensor Data based on Programming by Example. 102-111 - Hikaru Ichise, Yong Jin, Katsuyoshi Iida, Yoshiaki Takai:
NS record History Based Abnormal DNS traffic Detection Considering Adaptive Botnet Communication Blocking. 112-122 - Hironori Nakajo:
Editor's Message to Special Issue on Embedded Systems Engineering. 123 - Shuichi Sato, Shogo Hattori, Hiroyuki Seki, Yutaka Inamori, Shoji Yuen:
Automating Time-series Safety Analysis for Automotive Control Systems Using Weighted Partial Max-SMT. 124-135 - Takehiro Wakabayashi, Shuji Morisaki, Norimitsu Kasai, Noritoshi Atsumi, Shuichiro Yamamoto:
Tool Supported Detection of Omissions by Comparing Words between Requirements and Design Document. 136-149 - Hideki Takase, Tomoya Mori, Kazuyoshi Takagi, Naofumi Takagi:
mROS: A Lightweight Runtime Environment of ROS 1 nodes for Embedded Devices. 150-160 - Neda Gholami, Mohammad Mahdi Dehshibi, Andrew Adamatzky, Antonio Rueda-Toicen, Hector Zenil, Mahmood Fazlali, David Masip:
A Novel Method for Reconstructing CT Images in GATE/GEANT4 with Application in Medical Imaging: A Complexity Analysis Approach. 161-168 - Tomoharu Ugawa, Taiki Fujimoto:
Finding Errors in Registrations of Local Variables Using Coccinelle for Accurate Garbage Collection. 169-177 - Renzhi Wang, Mizuho Iwaihara:
Detection of Mergeable Wikipedia Articles Utilizing Multiple Similarity Measures. 178-191 - Rin-Ichiro Taniguchi:
Editor's Message to Special Issue of Young Researchers' Papers. 192 - Nattaon Techasarntikul, Photchara Ratsamee, Jason Orlosky, Tomohiro Mashita, Yuki Uranishi, Kiyoshi Kiyokawa, Haruo Takemura:
Guidance and Visualization of Optimized Packing Solutions. 193-202 - Takashi Imaizumi:
Editor's Message to Special Issue of the Internet and Operation Technologies for Utilization of IoT. 203 - Takashi Yamanoue:
Monitoring of Servers and Server Rooms by IoT System that Can Configure and Control its Terminal Sensors Behind a NAT Using a Wiki Page on the Internet. 204-213 - Motoyuki Ohmori, Koji Okamura:
The Equal Deepest Vertex First Reboot: Rebooting Network Edge Switches in a Campus Network. 214-221 - Sanouphab Phomkeona, Koji Okamura:
Zero-day Malicious Email Investigation and Detection Using Features with Deep-learning Approach. 222-229 - Ariel Rodríguez, Koji Okamura:
Social Media Data Mining for Proactive Cyber Defense. 230-238 - Masato Yamashita, Minoru Nakazawa, Yukinobu Nishikawa, Noriyuki Abe:
Examination and It's Evaluation of Preprocessing Method for Individual Identification in EEG. 239-246 - Tetsuro Kitahara:
Editor's Message to Special Issue of Increasingly Developing Music Informatics. 247 - Kosuke Nakamura, Takashi Nose, Yuya Chiba, Akinori Ito:
A Symbol-level Melody Completion Based on a Convolutional Neural Network with Generative Adversarial Learning. 248-257 - Christoph M. Wilk, Shigeki Sagayama:
A Parameterized Harmony Model for Automatic Music Completion. 258-266 - Takashi Ishio:
Editor's Message to Special Issue of Software Engineering. 267 - Haruto Tanno, Yu Adachi, Yu Yoshimura, Katsuyuki Natsukawa, Hideya Iwasaki:
Region-based Detection of Essential Differences in Image-based Visual Regression Testing. 268-278 - Peraphon Sophatsathit:
Software Analytics for Manual Activities using Developer Work Elements. 279-291 - Hideo Nishimura, Yoshihiko Omori, Takao Yamashita:
Secure Authentication Key Sharing between Personal Mobile Devices Based on Owner Identity. 292-301 - Junji Fukuhara, Munehiro Takimoto:
Branch Divergence Reduction Based on Code Motion. 302-309 - Ryuichi Saito, Shinichiro Haruyama:
High Speed Error Log Control Method in In-memory Cluster Computing Platform. 310-319 - Jun-Li Lu, Makoto P. Kato, Takehiro Yamamoto, Katsumi Tanaka:
Searching for Microblogs Referring to Events by Deep Dynamic Query Strategies. 320-332 - Thinh Minh Do, Yasuko Matsubara, Yasushi Sakurai:
Real-time Forecasting of Non-linear Competing Online Activities. 333-342 - Akitoshi Okumura, Susumu Handa, Takamichi Hoshino, Naoki Tokunaga, Masami Kanda:
Improving Face Recognition for Identity Verification by Managing Facial Directions and Eye Contact of Event Attendees. 343-353 - Teruji Sugaya, Masaaki Nishino, Norihito Yasuda, Shin-ichi Minato:
Tree Decomposition-based Approach for Compiling Independent Sets. 354-368 - Asraa Abdulrazak Ali Mardan, Kenji Kono:
When the Virtual Machine Wins over the Container: DBMS Performance and Isolation in Virtualized Environments. 369-377 - Kazunari Irie, Hideaki Goto:
Automatic Roaming Consortium Discovery and Routing for Inter-federation Wireless LAN Roaming System. 378-386 - Yoshihiro Hirohashi, Tsuyoshi Kato:
Learning Weighted Top-k Support Vector Machine. 387-393 - Hironori Nakajo:
Editor's Message to Special Issue on Embedded Systems Engineering. 394 - Tetsuo Miyauchi, Kiyofumi Tanaka:
Building Fine-Grained Configurable ITRON Based RTOS. 395-405 - Natsumi Shimada, Natsuki Yamazaki, Yuichi Takano:
Multi-objective Optimization Models for Many-to-one Matching Problems. 406-412 - Chenhui Chu, Rui Wang:
A Survey of Domain Adaptation for Machine Translation. 413-426 - Seiji Maekawa, Koh Takeuchi, Makoto Onizuka:
New Attributed Graph Clustering by Bridging Attribute and Topology Spaces. 427-435 - Kazuki Nakajima, Kazuyuki Shudo:
Estimating High Betweenness Centrality Nodes via Random walk in Social Networks. 436-444 - Yuya Ogawa, Koh Takeuchi, Yuya Sasaki, Makoto Onizuka:
Proximity Preserving Nonnegative Matrix Factorization. 445-452 - Kotaro Yamazaki, Shohei Matsugu, Hiroaki Shiokawa, Hiroyuki Kitagawa:
Fast and Parallel RankClus Algorithm based on Dynamic Rank Score Tracking. 453-461 - Yuji Suga:
Editor's Message to Special Issue of Real World Cryptography, Security and Privacy. 462-463 - Yaoan Jin, Atsuko Miyaji:
Compact Elliptic Curve Scalar Multiplication with a Secure Generality. 464-472 - Tsutomu Matsumoto, Ryo Miyachi, Junichi Sakamoto, Manami Suzuki, Dai Watanabe, Naoki Yoshida:
RAM Encryption Mechanism without Hardware Support. 473-480 - Chun-Jung Wu, Katsunari Yoshioka, Tsutomu Matsumoto:
ThingGate: A Gateway for Managing Traffic of Bare-metal IoT Honeypot. 481-492 - Mamoru Mimura, Taro Ohminami:
Using LSI to Detect Unknown Malicious VBA Macros. 493-501 - Kazuki Tamiya, Aamir H. Bokhari, Yuta Ezawa, Sou Nakayama, Ying Tie, Rui Tanabe, Akira Fujita, Katsunari Yoshioka, Tsutomu Matsumoto:
Dangers of IP Camera - An Observational Study on Peeping. 502-510 - Satoshi Ito, Reo Harada, Hiroaki Kikuchi:
De-identification for Transaction Data Secure against Re-identification Risk Based on Payment Records. 511-519 - Nori Matsuda, Takato Hirano, Yutaka Kawai, Takashi Ito, Mitsuhiro Hattori, Tadakazu Yamanaka, Masakatsu Nishigaki:
Public-key Searchable Encryption with Index Generation for Shared Database. 520-536 - Nariyoshi Yamai:
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2019. 537 - Yongyi Xian, Yan Liu, Chuanfei Xu, Sameh Elnikety, Elie Neghawi:
Parallel Discovery of Trajectory Companion Pattern and System Evaluation. 538-550 - Kazuyuki Yamashita, Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:
Predictability of Network Robustness from Spectral Measures. 551-561 - Kenichi Yoshida, Kazunori Fujiwara, Akira Sato, Shuji Sannomiya:
Spread of IP Anycast and GSLB. 562-569 - Ryo Nakamura, Hiroyuki Ohsaki:
On the Optimality of Shortest-path Routing in Information-Centric Networking. 570-576 - Yuki Kurauchi, Naoto Abe, Osamu Matsuda, Hitoshi Seshimo:
Barrier Detection Using Sensor Data from Multiple Transportation Modes. 577-587 - Giorgio Forcina, Ali Sedaghatbaf, Stephan Baumgart, Ali Jafari, Ehsan Khamespanah, Pavle Mrvaljevic, Marjan Sirjani:
Safe Design of Flow Management Systems Using Rebeca. 588-598 - Shintaro Ishihara, Toyokazu Akiyama:
Towards a Dataflow Platform in a Hierarchical Network: A Proposal for a Dataflow Component Management Method. 599-610 - Araya Kibrom Desta, Shuji Ohira, Ismail Arai, Kazutoshi Fujikawa:
Long Short-Term Memory Networks for In-Vehicle Networks Intrusion Detection Using Reverse Engineered Automotive Packets. 611-622 - Otgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Enkhbold Bataa:
Identification of Cybersecurity Specific Content Using Different Language Models. 623-632 - Geeta Yadav, Kolin Paul, Alaa M. Allakany, Koji Okamura:
IoT-PEN: An E2E Penetration Testing Framework for IoT. 633-642 - Thamer Horbylon Nascimento, Fabrízzio Alphonsus A. M. N. Soares:
WatchControl: A Control for Interactive Movie Using Continuous Gesture Recognition in Smartwatches. 643-649 - Naoki Kobayakawa, Mitsuyoshi Imamura, Kei Nakagawa, Kenichi Yoshida:
Impact of Cryptocurrency Market Capitalization on Open Source Software Participation. 650-657 - Tatsuji Munaka, Farzad Samie, Lars Bauer, Jörg Henkel:
Improved Feature Extraction Method for Sound Recognition Applied to Automatic Sorting of Recycling Wastes. 658-665 - Sozo Inoue:
Editor's Message to Special Issue of Ubiquitous Computing Systems (IX). 666-667 - Van Cu Pham, Yoshiki Makino, Khoa Pho, Yuto Lim, Yasuo Tan:
IoT Area Network Simulator For Network Dataset Generation. 668-678 - Ryota Sawano, Kazuya Murao:
Annotation Method for Human Activity and Device State Recognition Based on Smartphone Notification Removals. 679-688 - Boqi Gao, Daichi Amagata, Takuya Maekawa, Takahiro Hara:
Detecting Energy Depriving Malicious Nodes by Unsupervised Learning in Energy Harvesting Cooperative Wireless Sensor Networks. 689-698 - Koichi Furukawa, Yusuke Fukushima, Saki Nishino, Ikuko Eguchi Yairi:
Survey on Psychological Effects of Appreciative Communication via Voice Agent. 699-710 - Takeshi Miura, Katsubumi Tajima:
Point Location Conversion in Distance Cartogram Construction Based on Vector Field Analysis. 711-714 - Yuya Morinaga, Kazunori Yamaguchi:
Improvement of Neural Reverse Dictionary by Using Cascade Forward Neural Network. 715-723 - Shigeyuki Sato, Hiroka Ihara, Kenjiro Taura:
CENTAURUS: A Dynamic Parser Generator for Parallel Ad Hoc Data Extraction. 724-732 - Yasuichi Nakayama, Yasushi Kuno, Hiroyasu Kakuda:
Split-Paper Testing: A Novel Approach to Evaluate Programming Performance. 733-743 - Hiro Ito:
Editor's Message for Special Issue of Discrete and Computational Geometry, Graphs, and Games. 744 - Erik D. Demaine, Martin L. Demaine:
Adventures in Maze Folding Art. 745-749 - Jin Akiyama, Kiyoko Matsunaga:
An Algorithm for Folding a Conway Tile into an Isotetrahedron or a Rectangle Dihedron. 750-758 - Gergely Kiss, János Pach, Gábor Somlai:
Minimum Area Isosceles Containers. 759-765 - Elena Arseneva, John Iacono, Grigorios Koumoutsos, Stefan Langerman, Boris Zolotov:
Sublinear Explicit Incremental Planar Voronoi Diagrams. 766-774 - Evangelos Kranakis, Jorge Urrutia:
Pantographs and Phase Transitions for the Boundedness of Orbits. 775-781 - David Caballero, Angel A. Cantu, Timothy Gomez, Austin Luchsinger, Robert T. Schweller, Tim Wylie:
Hardness of Reconfiguring Robot Swarms with Uniform External Control in Limited Directions. 782-790 - Elena Arseneva, Stefan Langerman, Boris Zolotov:
A Complete List of All Convex Polyhedra Made by Gluing Regular Pentagons. 791-799 - Koji Ouchi, Ryuhei Uehara:
Minimum Forcing Sets for Single-vertex Crease Pattern. 800-805 - Yiyang Jia, Jun Mitani, Ryuhei Uehara:
Efficient Algorithm for 2 × n Map Folding with a Box-pleated Crease Pattern. 806-815 - Yiyang Jia, Jun Mitani, Ryuhei Uehara:
Valid Orderings of Layers When Simple-Folding a Map. 816-824 - Erik D. Demaine, Martin L. Demaine, Hiro Ito, Chie Nara, Izumi Shirahama, Tomohiro Tachi, Mizuho Tomura:
Flat Folding a Strip with Parallel or Nonacute Zigzag Creases with Mountain-Valley Assignment. 825-833 - Kazuki Matsubara, Chie Nara:
Continuous Flattening of Multi-layered Pyramids with Rigid Radial Edges. 834-840 - Martin L. Demaine, Robert A. Hearn, Junnosuke Hoshido, Jason S. Ku, Ryuhei Uehara:
Rectangular Unfoldings of Polycubes. 841-845 - Shin-ichi Tokunaga:
On Domination Number of Triangulated Discs. 846-848 - Kyohei Chiba, Rémy Belmonte, Hiro Ito, Michael Lampis, Atsuki Nagao, Yota Otachi:
K3 Edge Cover Problem in a Wide Sense. 849-858 - Agnes D. Garciano, Reginaldo M. Marcelo, Mari-Jo P. Ruiz, Mark Anthony C. Tolentino:
Sigma Coloring and Edge Deletions. 859-864 - Zata Yumni Awanis, A. N. M. Salman, Suhadi Wido Saputro:
The Strong 3-rainbow Index of Comb Product of a Tree and a Connected Graph. 865-875 - Robert D. Barish, Akira Suyama:
Randomized Reductions and the Topology of Conjectured Classes of Uniquely Hamiltonian Graphs. 876-888 - Jean-Claude Bermond, Takako Kodate, Joseph Yu:
Gossiping with Interference Constraints in Radio Chain Networks. 889-902 - Go Kato, Shin-ichi Minato:
Enumeration of Associative Magic Squares of Order 7. 903-910 - Akihiro Uejima, Kentaro Oe:
The Computational Complexity of Creek Puzzles on Several Grids. 911-918 - Michael Hoffmann, Jayson Lynch, Andrew Winslow:
Mad Science is Provably Hard: Puzzles in Hearthstone's Boomsday Lab are NP-hard. 919-928 - Joshua Ani, Sualeh Asif, Erik D. Demaine, Yevhenii Diomidov, Dylan H. Hendrickson, Jayson Lynch, Sarah Scheffler, Adam Suhl:
PSPACE-completeness of Pulling Blocks to Reach a Goal. 929-941 - Sualeh Asif, Michael J. Coulombe, Erik D. Demaine, Martin L. Demaine, Adam Hesterberg, Jayson Lynch, Mihir Singhal:
Tetris is NP-hard even with O(1) Rows or Columns. 942-958 - Tetsuo Miyauchi, Kiyofumi Tanaka:
Solving Slitherlink with FPGA and SMT Solver. 959-969 - Kai Hirokawa, Ryohei Miyadera, Yusuke Sakamoto, Koki Suetsugu:
Variant of Wythoff's Game-Corner Two Rooks. 970-975 - Yuhei Fukui, Aleksandar Shurbevski, Hiroshi Nagamochi:
Group Strategy-proof Mechanisms for Shuttle Facility Games. 976-986 - Jeffrey Bosboom, Charlotte Chen, Lily Chung, Spencer Compton, Michael J. Coulombe, Erik D. Demaine, Martin L. Demaine, Ivan Tadeu Ferreira Antunes Filho, Dylan H. Hendrickson, Adam Hesterberg, Calvin Hsu, William Hu, Oliver Korten, Zhezheng Luo, Lillian Zhang:
Edge Matching with Inequalities, Triangles, Unknown Shape, and Two Players. 987-1007 - Akira Kanaoka:
Editor's Message to Special Issue of Usable Security. 1008-1009 - Tatsuya Takemura, Naoto Yanai, Toru Fujiwara:
Model Extraction Attacks on Recurrent Neural Networks. 1010-1024 - Thin Tharaphe Thein, Yuki Ezawa, Shunta Nakagawa, Keisuke Furumoto, Yoshiaki Shiraishi, Masami Mohri, Yasuhiro Takano, Masakatu Morii:
Paragraph-based Estimation of Cyber Kill Chain Phase from Threat Intelligence Reports. 1025-1029 - Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Addressing the Privacy Threat to Identify Existence of a Target's Account on Sensitive Services. 1030-1046 - Hirotoshi Honma, Yoko Nakajima, Shigeru Masuyama:
An Algorithm for the Influential Hinge Vertex Problem on Interval Graphs. 1047-1051 - Wataru Matsuda, Mariko Fujimoto, Takuho Mitsunaga:
Detection of Malicious Tools by Monitoring DLL Using Deep Learning. 1052-1064 - Nagi Yoshitsugu, Shinya Abe, Kayoko Yamamoto:
Method for Deriving Evacuation Routes Considering Disaster Risk. 1065-1072 - Ryohei Kobayashi, Norihisa Fujita, Yoshiki Yamaguchi, Taisuke Boku, Kohji Yoshikawa, Makito Abe, Masayuki Umemura:
Multi-Hybrid Accelerated Simulation by GPU and FPGA on Radiative Transfer Simulation in Astrophysics. 1073-1089
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.