default search action
Journal of Information Processing, Volume 31
Volume 31, 2023
- Masayuki Okamoto:
Editor's Message to Special Issue of Collaboration Technologies and Network Services to Support the New Normal Era. 1 - Yunosuke Higashi, Masao Ohira, Yuki Manabe:
Automating License Rule Generation to Help Maintain Rule-based OSS License Identification Tools. 2-12 - Hirozumi Yamaguchi:
Editor's Message to Special Issue of Mobile Computing and Intelligent Transport Systems for Next-generation Society and Smart Community. 13-14 - Takuto Yoshida, Katsuhiko Kaji, Satoki Ogiso, Ryosuke Ichikari, Hideaki Uchiyama, Takeshi Kurata, Nobuo Kawaguchi:
A Survey of Ground Truth Measurement Systems for Indoor Positioning. 15-20 - Akimasa Morihata:
Conjuring Fusion Laws via Relational Calculus. 21-32 - Akihiro Miyata:
Editor's Message to Special Issue of Understanding, Technology, and Application of Interaction. 33 - Atsushi Ito, Yukiko I. Nakano, Fumio Nihei, Tatsuya Sakato, Ryo Ishii, Atsushi Fukayama, Takao Nakamura:
Estimating and Visualizing Persuasiveness of Participants in Group Discussions. 34-44 - Yuka Kato:
Editor's Message to Special Issue on "Network Services and Distributed Processing". 45-46 - Shinya Abe, Tohru Takiguchi, Hiroki Endo, Masaya Ikeo, Yuto Komatsu, Satoshi Fujitsu, Kinji Matsumura, Hiroshi Fujisawa:
Web-based Distributed Architecture for Local Device Collaboration on Integrated Broadcast-broadband Systems. 47-56 - Masashi Kunibe, Rei Yamazaki, Taichi Murakawa, Hiroshi Shigeno:
Adaptive Message Prioritization for Vehicular Cooperative Perception at Target Intervals. 57-65 - Kenji Hisazumi:
Editor's Message to Special Issue of Embedded Systems Engineering. 66 - Takaharu Suzuki, Kiyofumi Tanaka:
Real-time Scheduling Algorithm with Execution Right Delegation for Multiprocessor. 67-77 - Yixiao Li, Yutaka Matsubara, Hiroaki Takada, Kenji Suzuki, Hideaki Murata:
A Performance Evaluation of Embedded Multi-core Mixed-criticality System Based on PREEMPT_RT Linux. 78-87 - Takaki Asanuma, Takanori Isobe:
Even-Mansour Space-hard Cipher: White-box Cryptography Cipher Meets Physically Unclonable Function. 88-96 - Atuya Okudaira:
Epidemic Spreading and Localization in Multilayer Scale-free Networks. 97-111 - Jin Sano, Naoki Yamamoto, Kazunori Ueda:
Type Checking Data Structures More Complex than Trees. 112-130 - Ryo Asaoka, Yuto Soma, Hiroaki Yamauchi, Akihiro Nakao, Masato Oguchi, Saneyasu Yamaguchi, Aki Kobayashi:
Service Identification of TLS Flows Based on Handshake Analysis. 131-142 - Man Yiu Chow:
Analysis of Embedded System's Functional Requirement using BERT-based Name Entity Recognition for Extracting IO Entities. 143-153 - Minoru Ikebe:
Editor's Message to Special Issue of "the Internet and Operation Technologies for Supporting Full-scale Digital Transformation". 154 - Takuya Urimoto, Daisuke Kotani, Yasuo Okabe:
Vantage Point Placement Based on Inference of AS-level Connections. 155-164 - Xuping Huang, Shunsuke Mochizuki, Akira Fujita, Katsunari Yoshioka:
Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users. 165-173 - Naoki Matsumoto, Daisuke Kotani, Yasuo Okabe:
CREBAS: Enabling Network Access Control in a Home with One Click. 174-184 - Yasue Kishino:
Editor's Message to Special Issue of Young Researchers' Papers. 185 - Jialong Li, Kenji Tei:
Efficient Difference Analysis of Guaranteeable Requirements for Fault-tolerant Self-adaptation. 186-195 - Masahiro Yoshida:
A Multiple Objective Resource Scheduling Algorithm for Network Services on the NFV Infrastructure. 196-204 - Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, Kazuo Sakiyama:
Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography. 205-219 - Naotake Masuda, Daisuke Saito:
Quality-diversity for Synthesizer Sound Matching. 220-228 - John Augeri, Shoji Kajita:
Teaching & Learning Stakes and Perspectives Raised by the Lessons of the COVID-19 Era: A French/Japanese Comparative Insight. 229-243 - Jin Nakazawa:
Editor's Message to Special Issue of Ubiquitous Computing Systems (XI). 244-245 - Yusuke Yamada, Tadashi Okoshi, Jin Nakazawa:
c-SNE: Deep Cross-modal Retrieval based on Subjective Information using Stochastic Neighbor Embedding. 246-255 - Ryoma Kondo, Bojian Du, Yoshiaki Narusue, Hiroyuki Morikawa:
Machine Learning Framework Supervised by Hydraulic Mechanical Models for Real-time Pluvial Flood Prediction. 256-264 - Hisao Katsumi, Wataru Yamada, Keiichi Ochiai:
Characterizing Generic POI: A Novel Approach for Discovering Tourist Attractions. 265-277 - Shiho Ogino:
Editor's Message to Special Issue of Information Systems. 278 - Satoshi Okada, Nobuho Hashimoto, Takuho Mitsunaga:
Efficient Matching Algorithms between Logs and Indicators for Automatic Incident Response System. 279-287 - Koki Morimura, Daisuke Maeda, Takashi Nishide:
Accelerating Polynomial Evaluation for Integer-wise Homomorphic Comparison and Division. 288-298 - Weiqi Gu, Haiyue Song, Chenhui Chu, Sadao Kurohashi:
Spatial Hierarchical Attention Network Based Video-guided Machine Translation. 299-307 - Haomin Mao, Shuhei Tsuchida, Yuma Suzuki, Rintaro Kanada, Takayuki Hori, Tsutomu Terada, Masahiko Tsukamoto:
Subjective and Objective Thermal Comfort Estimation Using Wearable Sensors and Environmental Sensors. 308-320 - Dukundane Gashongore Prince, Savong Bou:
Fast Relevant Feature Selection Based on Markov Boundary Learning from Data Stream for Classification Tasks. 321-331 - Ao Liu, Congjian Luo, Naoaki Okazaki:
Improving Logical-level Natural Language Generation with Topic-conditioned Data Augmentation and Logical Form Generation. 332-343 - Ayana Niwa, Sho Takase, Naoaki Okazaki:
Nearest Neighbor Non-autoregressive Text Generation. 344-352 - Muhammad Haseeb U. R. Rehman Khan, Kei Wakabayashi:
Keyphrase-based Refinement Functions for Efficient Improvement on Document-Topic Association in Human-in-the-Loop Topic Models. 353-364 - Tatsuhiro Nakamori, Jun Nemoto, Takashi Hoshino, Hideyuki Kawashima:
Scalable Timestamp Allocation for Deadlock Prevention in Two-phase Locking based Protocols. 365-374 - Shunpei Yamaguchi, Motoki Nagano, Ritsuko Oshima, Jun Oshima, Takuya Fujihashi, Shunsuke Saruwatari, Takashi Watanabe:
Multi-Speaker Identification with IoT Badges for Collaborative Learning Analysis. 375-386 - Yusuke Kitagawa, Kazuyuki Shudo, Osamu Mizuno, Ryohei Banno:
A Study of Using Plumtree Algorithm in Blockchain Networks. 387-391 - Shohei Mori, Satoshi Hashiguchi, Fumihisa Shibata, Asako Kimura:
Point & Teleport with Orientation Specification, Revisited: Is Natural Turning Always Superior? 392-403 - Shinya Abe, Shoko Fujii, Tatsuya Sato, Yuto Komatsu, Satoshi Fujitsu, Hiroshi Fujisawa:
Web-based Force-directed Adaptive Device Selection for User Notification. 404-412 - Samuel Masseport, Tom Davot, Rodolphe Giroudeau:
Ricochet Robots with Infinite Horizontal Board is Turing-complete. 413-420 - Takayuki Miyazaki, Yasuhiko Minamide:
Derivatives of Context-free Grammars with Lookahead. 421-431 - Yosuke Fukuda:
An S4 extension of the λμμ-calculus. 432-439 - Masanori Takagi, Haruka Ishikawa, Ichikawa Hisashi, Yasuhiko Morimoto:
Development and Evaluation of a Support System for Creating Learning Plans by Reflection on Past Learning Plans and Learning Situations. 440-451 - Tomoyuki Tokuue, Tomoaki Ishiyama:
Performance Evaluation of Parallel Sortings on the Supercomputer Fugaku. 452-458 - Yuya Yanase, Yasunobu Sumikawa:
Lazy Demand-driven Partial Redundancy Elimination. 459-468 - HanYu Zhang, Tomoji Kishi:
Long Method Detection Using Graph Convolutional Networks. 469-477 - KuanYi Ng, Aalaa M. A. Babai, Teruo Tanimoto, Satoshi Kawakami, Koji Inoue:
Empirical Power-performance Analysis of Layer-wise CNN Inference on Single Board Computers. 478-494 - Senri Yoshikawa, Shuji Sannomiya, Makoto Iwata, Akira Sato, Hiroaki Nishikawa:
EDA-oriented FPGA Circuit Design Method for Four-phase Bundled-data Circular Self-timed Pipeline. 495-508 - Kai Ishikawa, Akitoshi Okumura, Dai Kusui, Noriyoshi Ichinose, Kentaro Torisawa, Kiyonori Ohtake:
WISDOM-DX: An Automatic DX Assessment System Using a QA System Based on Web Data. 509-521 - Toshihiro Ohigashi:
Editor's Message to Special Issue of Computer Security Technologies for Secure Cyberspace. 522 - Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend. 523-536 - Satoshi Okada, Kunio Akashi, Daisuke Miyamoto, Yuji Sekiya, Hideki Takase, Hiroshi Nakamura:
Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network. 537-549 - Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:
A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers. 550-561 - Hoang Viet Nguyen, Tetsutaro Uehara:
Multilayer Action Representation based on MITRE ATT&CK for Automated Penetration Testing. 562-577 - Shota Fujii, Nobutaka Kawaguchi, Tomohiro Shigemoto, Toshihiro Yamauchi:
Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources. 578-590 - Masaki Kobayashi, Yo Kanemoto, Daisuke Kotani, Yasuo Okabe:
Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities. 591-601 - Michio Kunimoto, Takao Okubo:
Analysis and Consideration of Detection Methods to Prevent Fraudulent Access by Utilizing Attribute Information and the Access Log History. 602-608 - Rei Yamagishi, Shota Fujii:
An Analysis of Susceptibility to Phishing via Business Chat through Online Survey. 609-619 - Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers. 620-642 - Ichiro Asomura, Ryo Iijima, Tatsuya Mori:
Automating the Detection of Fraudulent Activities in Online Banking Service. 643-653 - Jun Yajima, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Kentaro Tsuji, Ikuya Morikawa, Nobukazu Yoshioka:
ASRA-Q: AI Security Risk Assessment by Selective Questions. 654-666 - Hiromasa Kitai, Naoto Yanai, Kazuki Iwahana, Masataka Tatsumi, Jason Paul Cruz:
A Study on Quantized Parameters for Protection of a Model and Its Inference Input. 667-678 - Supavas Sitthithanasakul, Bodin Chinthanet, Raula Gaikovina Kula, Natthakit Netsiwawichian, Pattara Leelaprute, Bundit Manaskasemsak, Arnon Rungsawang, Kenichi Matsumoto:
Do Developers Present Proficient Code Snippets in Their README Files? An Analysis of PyPI Libraries in GitHub. 679-688 - Koichi Onoue, Masaru Ueno, Yui Noma:
Container-native Managed Data Sharing. 689-699 - Tsutomu Matsumoto, Junichi Sakamoto, Manami Suzuki, Dai Watanabe, Naoki Yoshida:
A Trial to Embed RAM Encryption Scheme in Cryptographic Programs. 700-707 - Ryosuke Sato:
Refinement Types for Call-by-name Programs. 708-721 - Siqi Peng, Akihiro Yamamoto:
Z-TCA: Fast Algorithm for Triadic Concept Analysis Using Zero-suppressed Decision Diagrams. 722-733 - Kaoru Katayama, Youta Yamaji, Shotaro Toyoizumi, Takashi Hirashima:
Content-based Retrieval of 3D CAD Subassemblies Using 3D Radon Transform. 734-742 - Daiki Natori, Takahiro Hirofuchi, Ryousei Takano, Saneyasu Yamaguchi:
Investigating Weird Latency Deterioration of Solid-state Drives. 743-747 - Ryuichi Ito, Seng Pei Liew, Tsubasa Takahashi, Yuya Sasaki, Makoto Onizuka:
Scaling Private Deep Learning with Low-rank and Sparse Gradients. 748-757 - Yoshihiro Tsuboki, Tomoya Kawakami, Satoru Matsumoto, Tomoki Yoshihisa, Yuuichi Teranishi:
A Real-time Background Replacement System Based on Estimated Depth for AR Applications. 758-765 - Shoko Fujii, Shinya Abe, Satoshi Fujitsu, Kinji Matsumura, Hiroshi Fujisawa:
Demonstration Experiment of a System that Helps Users Select Educational Content Using Terms in Basic/advanced Relationships. 766-774 - Shizuka Shirai, Takahiro Nakahara, Tetsuo Fukui:
MathTOUCH Editor: Rich-text Editor for Math E-learning Using an Intelligent Math Input Interface. 775-785 - Ryuichi Ogawa:
Editor's Message to Special Issue of Information Security and Trust to Support Information Distribution on Next-Generation Digital Platforms. 786-787 - Hiroki Kuzuno, Toshihiro Yamauchi:
Identification of Vulnerable Kernel Code Using Kernel Tracing Mechanism. 788-801 - Masaki Kuwano, Momoka Okuma, Satoshi Okada, Takuho Mitsunaga:
The Attacker Might Also Do Next: ATT&CK Behavior Forecasting by Attacker-based Collaborative Filtering and Graph Databases. 802-811 - Takayuki Miura, Toshiki Shibahara, Masanobu Kii, Atsunori Ichikawa, Juko Yamamoto, Koji Chida:
On Rényi Differential Privacy in Statistics-based Synthetic Data Generation. 812-820 - Tomoaki Mimoto, Takashi Matsunaka, Hiroyuki Yokoyama, Toru Nakamura, Takamasa Isohara:
Hierarchical Local Differential Privacy. 821-828 - Keika Mori, Tatsuya Nagai, Yuta Takata, Masaki Kamizono, Tatsuya Mori:
Analysis of Privacy Compliance by Classifying Policies Before and After the Japanese Law Revision. 829-841 - Rajulapati Shourya, Yoko Kumagai, Ashokkumar C, Hiroki Yamazaki, Hirofumi Nakakoji:
Proposal of Vulnerability Assessment Tool for Software Supply Chain Security. 842-850 - Hitoshi Nakanishi, Masahiro Suzuki, Yutaka Matsuo:
HAWK-Net: Hierarchical Attention Weighted Top-K Network for High-resolution Image Classification. 851-859 - Yingqi Zhao, Takeshi Fukaya, Takeshi Iwashita:
Numerical Behavior of Mixed Precision Iterative Refinement Using the BiCGSTAB Method. 860-874 - Hirotoshi Tamori, Takeshi Fukaya, Takeshi Iwashita:
Subspace Correction Preconditioning for Solving a Sequence of Asymmetric Linear Systems Using the Bi-CGSTAB Method. 875-884
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.