


default search action
IEICE Transactions on Information & Systems, Volume 93-D
Volume 93-D, Number 1, January 2010
- Kazumi Hatayama, Tsuyoshi Shinogi:

Foreword. 1 - Kohei Miyase, Xiaoqing Wen, Hiroshi Furukawa, Yuta Yamato, Seiji Kajihara, Patrick Girard, Laung-Terng Wang, Mohammad Tehranipoor:

High Launch Switching Activity Reduction in At-Speed Scan Testing Using CTX: A Clock-Gating-Based Test Relaxation and X-Filling Scheme. 2-9 - Hiroyuki Yotsuyanagi, Masayuki Yamamoto, Masaki Hashizume:

Scan Chain Ordering to Reduce Test Data for BIST-Aided Scan Test Using Compatible Scan Flip-Flops. 10-16 - Anis Uzzaman, Brion L. Keller, Brian Foutz, Sandeep Bhatia, Thomas Bartenstein, Masayuki Arai, Kazuhiko Iwasaki:

Reduction of Test Data Volume and Improvement of Diagnosability Using Hybrid Compression. 17-23 - Ryoichi Inoue, Toshinori Hosokawa, Hideo Fujiwara:

A Fault Dependent Test Generation Method for State-Observable FSMs to Increase Defect Coverage under the Test Length Constraint. 24-32 - Wimol San-Um, Masayoshi Tachibana:

A Fault Signature Characterization Based Analog Circuit Testing Scheme and the Extension of IEEE 1149.4 Standard. 33-42
- Mutsumi Komuro, Norihisa Komoda:

A Model to Explain Quality Improvement Effect of Peer Reviews. 43-49 - Changchun Xu, Yanyi Xu, Gan Liu, Kezhong Liu:

Voice Communications over 802.11 Ad Hoc Networks: Modeling, Optimization and Call Admission Control. 50-58 - Xiang Fu, Huawei Li

, Xiaowei Li:
Testable Critical Path Selection Considering Process Variation. 59-67 - Cheng-Min Lin:

Reliability Analysis and Modeling of ZigBee Networks. 68-78 - Cong Nguyen Bui, Hae-Yeoun Lee, Jeong-Chun Joo, Heung-Kyu Lee:

Secure Bit-Plane Based Steganography for Secret Communication. 79-86 - Mehdi Fallahpour, David Megías:

Robust High-Capacity Audio Watermarking Based on FFT Amplitude Modification. 87-93 - Jia Hao, Tadashi Shibata:

An Ego-Motion Detection System Employing Directional-Edge-Based Motion Field Representations. 94-106 - Yusuke Ijima, Takashi Nose

, Makoto Tachibana, Takao Kobayashi:
A Rapid Model Adaptation Technique for Emotional Speech Recognition with Style Estimation Based on Multiple-Regression HMM. 107-115 - Takashi Nose

, Takao Kobayashi:
A Technique for Estimating Intensity of Emotional Expressions and Speaking Styles in Speech Based on Multiple-Regression HSMM. 116-124 - Minoru Mori, Minako Sawaki, Junji Yamato

:
Robust Character Recognition Using Adaptive Feature Extraction Method. 125-133 - Ryo Ohtera, Takahiko Horiuchi

, Hiroaki Kotera:
Eyegaze Detection from Monocular Camera Image for Eyegaze Communication System. 134-143 - Kenichi Kanatani:

Geometric BIC. 144-151 - Trung Ngo Thanh, Yuichiro Kojima, Hajime Nagahara, Ryusuke Sagawa, Yasuhiro Mukaigawa, Masahiko Yachida, Yasushi Yagi:

Real-Time Estimation of Fast Egomotion with Feature Classification Using Compound Omnidirectional Vision Sensor. 152-166 - Junghoon Kwon, Jeongin Lee, Harksu Kim, Gilsoo Jang

, Young-Ho Chai:
Deforming NURBS Surfaces to Target Curves for Immersive VR Sketching. 167-175 - Miao Song, Keizo Shinomori, Shiyong Zhang:

The Influence of a Low-Level Color or Figure Adaptation on a High-Level Face Perception. 176-184 - Lixin Jia, Bo Yang

, Suchang Guo, Dong Ho Park:
Software Reliability Modeling Considering Fault Correction Process. 185-188 - Jae-Sung Lee, Dae-Won Kim:

Classifying Categorical Data Based on Adoptive Hamming Distance. 189-192 - YongJoon Kim, Jaeseok Park, Sungho Kang:

A Selective Scan Chain Activation Technique for Minimizing Average and Peak Power Consumption. 193-196 - Bong-Jin Lee, Chi-Sang Jung, Jeung-Yoon Choi, Hong-Goo Kang:

On the Importance of Transition Regions for Automatic Speaker Recognition. 197-200 - Joo-Young Lee, Young-In Song, Hae-Chang Rim, Kyoung-Soo Han:

Incorporating Frame Information to Semantic Role Labeling. 201-204
Volume 93-D, Number 2, February 2010
- Yuichi Kaji:

Foreword. 207 - Tatsuya Akutsu

:
Tree Edit Distance Problems: Algorithms and Applications to Bioinformatics. 208-218 - Shirou Maruyama, Youhei Tanaka, Hiroshi Sakamoto, Masayuki Takeda:

Context-Sensitive Grammar Transform: Compression and Pattern Matching. 219-226 - Kaoru Fujioka:

Refinement of Representation Theorems for Context-Free Languages. 227-232 - Yuichi Yoshida, Hiro Ito:

Query-Number Preserving Reductions and Linear Lower Bounds for Testing. 233-240 - Ruka Tanahashi, Zhi-Zhong Chen:

A Deterministic Approximation Algorithm for Maximum 2-Path Packing. 241-249 - Sung Kwon Kim:

Optimal Online and Offline Algorithms for Finding Longest and Shortest Subsequences with Length and Sum Constraints. 250-256 - Hiroki Morizumi, Genki Suzuki:

Negation-Limited Inverters of Linear Size. 257-262 - Toshiya Itoh, Yasuhiro Suzuki:

Improved Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length. 263-270 - Ngo Anh Vien, SeungGwan Lee, TaeChoong Chung:

Policy Gradient Based Semi-Markov Decision Problems: Approximation and Estimation Errors. 271-279 - Hideaki Fukuhara, Eiji Takimoto:

Lower Bounds on Quantum Query Complexity for Read-Once Formulas with XOR and MUX Operators. 280-289 - Hideaki Otsuki, Tomio Hirata:

Inapproximability of the Minimum Biclique Edge Partition Problem. 290-292
- Shi Wang, Hyongsuk Kim

, Chun-Shin Lin, Hongxin Chen:
Accurate and Robust Surface Measurement Using Optimal Structured Light Tracking Method. 293-299 - Kazuhiro Nakamura, Masatoshi Yamamoto, Kazuyoshi Takagi, Naofumi Takagi

:
A VLSI Architecture for Output Probability Computations of HMM-Based Recognition Systems with Store-Based Block Parallel Processing. 300-305 - Kan Watanabe, Masaru Fukushi, Susumu Horiguchi:

Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing. 306-314 - Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong

, DaeHun Nyang:
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency. 315-325 - Kanji Tanaka, Kenichi Saeki, Mamoru Minami, Takeshi Ueda:

LSH-RANSAC: Incremental Matching of Large-Size Maps. 326-334 - Ryo Nagata, Jun'ichi Kakegawa, Yukiko Yabuta:

A Topic-Independent Method for Scoring Student Essay Content. 335-340 - Kun-Ching Wang:

An Adaptive Wavelet-Based Denoising Algorithm for Enhancing Speech in Non-stationary Noise Environment. 341-349 - Deng Zhang, Jegoon Ryu

, Toshihiro Nishimura:
A Novel Modeling and Evaluating for RTS Noise on CMOS Image Sensor in Motion Picture. 350-358 - Jegoon Ryu

, Toshihiro Nishimura:
Noise Reduction in CMOS Image Sensor Using Cellular Neural Networks with a Genetic Algorithm. 359-366 - Mitsuharu Matsumoto:

Band-Pass epsilon-Filter for Edge Enhancement and Noise Removal. 367-375 - Yong Cao

, Qingxin Zhu:
The Software Reliability Model Based on Fractals. 376-379 - YongJoon Kim, Jaeseok Park, Sungho Kang:

Selective Scan Slice Grouping Technique for Efficient Test Data Compression. 380-383 - DongMing Tang, Qingxin Zhu, Yong Cao, Fan Yang:

An Efficient Clustering Algorithm for Irregularly Shaped Clusters. 384-387 - Hochong Park, Ho-Sang Sung:

Delay-Reduced MDCT for Scalable Speech Codec with Cascaded Transforms. 388-391 - Youngjoo Suh, Hoirin Kim:

Cepstral Domain Feature Extraction Utilizing Entropic Distance-Based Filterbank. 392-394 - Makoto Sakai, Norihide Kitaoka, Yuya Hattori, Seiichi Nakagawa, Kazuya Takeda:

Evaluation of Combinational Use of Discriminant Analysis-Based Acoustic Feature Transformation and Discriminative Training. 395-398 - Shih-Chieh Shie, Ji-Han Jiang, Long-Tai Chen, Zeng-Hui Huang:

Secret Image Transmission Scheme Using Secret Codebook. 399-402 - Zhe Wang, Siwei Luo, Liang Wang:

A Fast Algorithm for Learning the Overcomplete Image Prior. 403-406
Volume 93-D, Number 3, March 2010
- Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:

Foreword. 409-410 - Gang Yao, Jiannong Cao

, Ye Yan, Yusheng Ji:
Secured Fast Handoff in 802.11-Based Wireless Mesh Networks for Pervasive Internet Access. 411-420 - Song Guo

, An-Ni Shen, Minyi Guo:
A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks. 421-429 - Zhuo Ma, Jianfeng Ma, Sang-Jae Moon, Xinghua Li:

An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment. 430-437 - Yufeng Wang, Akihiro Nakao

, Jianhua Ma:
HopRec: Hop-Based Recommendation Ability Enhanced Reputation Ranking in P2P Networks. 438-447 - Daigo Muramatsu:

Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks. 448-457 - Feilong Tang, Minyi Guo, Song Guo

:
Tier-Based Scalable and Secure Routing for Wireless Sensor Networks with Mobile Sinks. 458-465 - Jingyu Feng, Yuqing Zhang, Hong Wang:

A Trust Management Model Based on Bi-evaluation in P2P Networks. 466-472 - Myoung Rak Lee, Byungsik Yoon, Hyogon Kim, Hoh Peter In:

A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks. 473-483 - Yahui Li, Jianfeng Ma, Sang-Jae Moon:

Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks. 484-490 - Ruixuan Li, Jianfeng Lu, Zhengding Lu, Xiaopu Ma:

Consistency Checking of Safety and Availability in Access Control. 491-502 - Xiaofeng Lu, Pan Hui, Don Towsley

, Juhua Pu, Zhang Xiong:
LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network. 503-509 - Sancheng Peng, Weijia Jia

, Guojun Wang, Jie Wu, Minyi Guo:
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks. 510-517 - Pedro Peris-Lopez

, Tieyan Li, Julio C. Hernandez-Castro
:
Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard. 518-527 - Dang Nguyen Duc, Kwangjo Kim:

On the Security of RFID Group Scanning Protocols. 528-530 - Baokang Zhao, Dan Wang

, Zili Shao
, Jiannong Cao
, Keith C. C. Chan
, Jinshu Su
:
An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming. 531-533
- Stanislav G. Sedukhin

, Toshiaki Miyazaki, Kenichi Kuroda:
Orbital Systolic Algorithms and Array Processors for Solution of the Algebraic Path Problem. 534-541 - Hayato Yamaguchi, Hiroshi Nakajima, Kazuhiko Taniguchi, Syoji Kobashi

, Yutaka Hata:
An Ultrasonic and Air Pressure Sensing System for Detection of Behavior before Getting out of Bed Aided by Fuzzy Theory. 542-549 - Seyed Amin Hosseini Seno

, Tat Chee Wan
, Rahmat Budiarto
, Masashi Yamada:
Management of Energy Consumption on Cluster Based Routing Protocol for MANET. 550-559 - So Ryoung Park

, Sanguk Noh:
Optimal Decision-Making of Countermeasures by Estimating Their Expected Utilities. 560-568 - Aram Kawewong, Yutaro Honda, Manabu Tsuboyama, Osamu Hasegawa:

Reasoning on the Self-Organizing Incremental Associative Memory for Online Robot Path Planning. 569-582 - Masashi Sugiyama, Ichiro Takeuchi, Taiji Suzuki, Takafumi Kanamori, Hirotaka Hachiya, Daisuke Okanohara:

Least-Squares Conditional Density Estimation. 583-594 - Keiichiro Oura, Heiga Zen

, Yoshihiko Nankaku, Akinobu Lee, Keiichi Tokuda:
A Covariance-Tying Technique for HMM-Based Speech Synthesis. 595-601 - Zhong-Ho Chen, Alvin Wen-Yu Su:

A Fast and Memory Efficient SPIHT Image Encoder. 602-610 - Yingdi Xie, Jun Ohya:

Elliptical Object Detection by a Modified RANSAC with Sampling Constraint from Boundary Curves' Clustering. 611-623 - Youzheng Wu, Hideki Kashioka, Satoshi Nakamura:

An Unsupervised Model of Redundancy for Answer Validation. 624-634 - Hyeon Gyu Kim, Woo-Lam Kang, Myoung-Ho Kim:

Efficient Window Processing over Disordered Data Streams. 635-638 - Daekeun Moon, Jinho Park, Hagbae Kim:

An Autonomic Connection Scheme for High Service Availability. 639-642 - Youbean Kim, Jaewon Jang, Hyunwook Son, Sungho Kang:

Pattern Mapping Method for Low Power BIST Based on Transition Freezing Method. 643-646 - Suk-Bong Kwon, Hoirin Kim:

Utterance Verification Using State-Level Log-Likelihood Ratio with Frame and State Selection. 647-650 - Maciej Kretkowski, Ryszard Jablonski, Yoshifumi Shimodaira:

Development of an XYZ Digital Camera with Embedded Color Calibration System for Accurate Color Acquisition. 651-653 - Jung Ah Park, Doug Young Suh, Gwang Hoon Park:

Distributed Video Coding with Multiple Side Information Sets. 654-657 - Guan Pang, Guijin Wang, Xinggang Lin:

Real-Time Human Detection Using Hierarchical HOG Matrices. 658-661 - Fan Jiang, Guijin Wang, Chang Liu, Xinggang Lin, Weiguo Wu:

Robust Object Tracking via Combining Observation Models. 662-665 - Ken-ichi Sakaue, Youji Iiguni:

Moment Invariants of the Weighted Image. 666-670
Volume 93-D, Number 4, April 2010
- Atsushi Ohnishi:

Foreword. 677-678 - Noboru Hattori, Shuichiro Yamamoto, Tsuneo Ajisaka, Tsuyoshi Kitani:

Proposal for Requirement Validation Criteria and Method Based on Actor Interaction. 679-692 - Atsushi Ohnishi, Koji Kitamoto:

A Generation Method of Alternative Scenarios with a Normal Scenario. 693-701 - Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato, Akira Osada, Kenji Kaijiri:

Improving Reliability of Spectrum Analysis for Software Quality Requirements Using TCM. 702-712 - Takehiko Murakawa, Masaru Nakagawa:

Graphical Expression of SQL Statements Using Clamshell Diagram. 713-720 - Junko Shirogane, Takashi Mori, Hajime Iwata, Yoshiaki Fukazawa:

Accessibility Evaluation for GUI Software Using Source Programs and Its Evaluation. 721-732 - Teruyoshi Zenmyo, Takashi Kobayashi

, Motoshi Saeki:
Deriving Framework Usages Based on Behavioral Models. 733-744 - Shouzo Hori, Takako Nakatani, Keiichi Katamine, Naoyasu Ubayashi

, Masaaki Hashimoto:
Project Management Patterns to Prevent Schedule Delay Caused by Requirement Elicitation. 745-753 - Shinpei Hayashi

, Yasuyuki Tsuda, Motoshi Saeki:
Search-Based Refactoring Detection from Source Code Revisions. 754-762 - Masao Okabe, Akiko Yoshioka, Keido Kobayashi, Takahira Yamaguchi:

Organizational Knowledge Transfer Using Ontologies and a Rule-Based System. 763-773 - Sameera Abar

, Tetsuo Kinoshita
:
A Knowledge-Based Strategy for the Automated Support to Network Management Tasks. 774-788 - Ichiro Satoh:

Design and Implementation of Context-Aware Musuem Guide Agents. 789-799
- Shigeto Tajima, Nobuo Funabiki, Teruo Higashino:

A WDS Clustering Algorithm for Wireless Mesh Networks. 800-810 - Shuang Zhao, Wenqing Lu, Xiaofang Zhou, Dian Zhou, Gerald E. Sobelman:

Implementations of FFT and STBD for MIMO-OFDM on a Reconfigurable Baseband Platform. 811-821 - Hiroshi Igaki, Masahide Nakamura

:
Modeling and Detecting Feature Interactions among Integrated Services of Home Network Systems. 822-833 - Yuna Kim, Wan Yeon Lee, Kyong Hoon Kim, Jong Kim:

AdaFF: Adaptive Failure-Handling Framework for Composite Web Services. 834-842 - Lihong Ma, Dong Yu, Gang Wei, Jing Tian

, Hanqing Lu:
Adaptive Spread-Transform Dither Modulation Using a New Perceptual Model for Color Image Watermarking. 843-857 - Xianzhi Ye, Lei Jing, Mizuo Kansen, Junbo Wang

, Kaoru Ota
, Zixue Cheng:
A Support Method with Changeable Training Strategies Based on Mutual Adaptation between a Ubiquitous Pet and a Learner. 858-872 - Chung-Lin Wen, Bing-Yu Chen

, Yoichi Sato:
Video Segmentation with Motion Smoothness. 873-881 - Ahmed Afifi, Toshiya Nakaguchi, Norimichi Tsumura, Yoichi Miyake:

A Model Optimization Approach to the Automatic Segmentation of Medical Images. 882-890 - Ken-ichi Suzuki, Yoshiyuki Kaeriyama, Kazuhiko Komatsu

, Ryusuke Egawa, Nobuyuki Ohba, Hiroaki Kobayashi:
A Fast Ray-Tracing Using Bounding Spheres and Frustum Rays for Dynamic Scene Rendering. 891-902 - Ayako Nishimura, Minoru Sakairi, Daisuke Suzuki:

Increasing the Strength of Odors Produced by an Odor-Emitting Technology Using Odor Capsules. 903-908 - Ithipan Methasate, Thanaruk Theeramunkong:

A Family-Based Evolutional Approach for Kernel Tree Selection in SVMs. 909-921 - Yu Gwang Jin, Nam Soo Kim:

On Detecting Target Acoustic Signals Based on Non-negative Matrix Factorization. 922-925 - Jik-Han Jung, Hwal-Suk Lee, Dong-Jo Park:

A Fast Block Matching Technique Using a Gradual Voting Strategy. 926-929 - Wenjie Xie, De Xu, Shuoyan Liu, Yingjun Tang:

How the Number of Interest Points Affect Scene Classification. 930-933 - Sheng Li

, Xiao-Yuan Jing, Lu-Sha Bian, Shi-Qiang Gao, Qian Liu, Yong-Fang Yao:
Facial Image Recognition Based on a Statistical Uncorrelated Near Class Discriminant Approach. 934-937
Volume 93-D, Number 5, May 2010
- Hiroyuki Seki:

Foreword. 941 - Haruhiko Sato, Masahito Kurihara:

Multi-Context Rewriting Induction with Termination Checkers. 942-952 - Keita Uchiyama, Masahiko Sakai

, Toshiki Sakabe:
Decidability of Termination and Innermost Termination for Term Rewriting Systems with Right-Shallow Dependency Pairs. 953-962 - Yuki Chiba, Takahito Aoto, Yoshihito Toyama:

Program Transformation Templates for Tupling Based on Term Rewriting. 963-973 - Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi:

Towards Reliable E-Government Systems with the OTS/CafeOBJ Method. 974-984 - Chul-Joo Kim, Jeong-Han Yun, Seonggun Kim, Kwang-Moo Choe, Taisook Han:

Over-Approximated Control Flow Graph Construction on Pure Esterel. 985-993 - Takeshi Nagaoka, Kozo Okano, Shinji Kusumoto:

An Abstraction Refinement Technique for Timed Automata Based on Counterexample-Guided Abstraction Refinement Loop. 994-1005 - Satoshi Hattori:

Computer Algebra System as Test Generation System. 1006-1017
- Hiroaki Kikuchi:

Foreword. 1018-1019 - Yang Ou, Kyung Hyune Rhee:

A Survey on Image Hashing for Image Authentication. 1020-1030 - Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai:

Analysis of Existing Privacy-Preserving Protocols in Domain Name System. 1031-1043 - Wen Tao Zhu, Robert H. Deng

, Jianying Zhou
, Feng Bao:
Time-Bound Hierarchical Key Assignment: An Overview. 1044-1052 - Sunghyun Kim, Heejo Lee:

Abnormal Policy Detection and Correction Using Overlapping Transition. 1053-1061 - Masana Murase:

Eliminating Cell Broadband EngineTM DMA Buffer Overflows. 1062-1069 - Chao Huang, Jianling Sun, Xinyu Wang, Di Wu:

Inconsistency Resolution Method for RBAC Based Interoperation. 1070-1079 - Kazumasa Omote, Kazuhiko Kato:

Practical and Secure Recovery of Disk Encryption Key Using Smart Cards. 1080-1086 - Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro

:
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. 1087-1095 - Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori:

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6. 1096-1105 - Masashi Eto

, Kotaro Sonoda
, Daisuke Inoue, Katsunari Yoshioka
, Koji Nakao:
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis. 1106-1116 - Chun-Liang Lee, Chia-Tai Chan, Pi-Chung Wang

:
Packet Classification with Hierarchical Cross-Producting. 1117-1126
- Md. Rakib Hassan, Md. Monirul Islam, Kazuyuki Murase

:
A New Local Search Based Ant Colony Optimization Algorithm for Solving Combinatorial Optimization Problems. 1127-1136 - In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim

, Jongmoo Choi, Donghee Lee, Sam H. Noh:
NVFAT: A FAT-Compatible File System with NVRAM Write Cache for Its Metadata. 1137-1146 - Yong-Hee Kim, Myoung-Jo Jung, Cheol-Hoon Lee:

Energy-Aware Real-Time Task Scheduling Exploiting Temporal Locality. 1147-1153 - Ing-Xiang Chen, Chien-Hung Li, Cheng-Zen Yang

:
Mining Co-location Relationships among Bug Reports to Localize Fault-Prone Modules. 1154-1161 - Yu Zhang, Binxing Fang, Hao Luo:

Identifying High-Rate Flows Based on Sequential Sampling. 1162-1174 - Jianliang Gao, Yinhe Han, Xiaowei Li:

A Novel Post-Silicon Debug Mechanism Based on Suspect Window. 1175-1185 - Hirotoshi Iwasaki, Nobuhiro Mizuno, Kousuke Hara, Yoichi Motomura:

User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks. 1186-1196 - Keita Imada, Katsuhiko Nakamura:

Search for Minimal and Semi-Minimal Rule Sets in Incremental Learning of Context-Free and Definite Clause Grammars. 1197-1204 - Yizhong Xin

, Xiangshi Ren
:
An Investigation of Adaptive Pen Pressure Discretization Method Based on Personal Pen Pressure Use Profile. 1205-1213 - Jinyong Jo, JongWon Kim:

imCast: Studio-Quality Digital Media Platform Exploiting Broadband IP Networks. 1214-1224 - Bing-Fei Wu, Hao-Yu Huang, Yen-Lin Chen

, Hsin-Yuan Peng, Jia-Hsiung Huang:
MPEG-2/4 Low-Complexity Advanced Audio Coding Optimization and Implementation on DSP. 1225-1237 - Fu-Kun Chen, Kuo-Bao Kuo:

Complexity Scalability Design in the Internet Low Bit Rate Codec (iLBC) for Speech Coding. 1238-1243 - Makoto Sakai, Norihide Kitaoka, Kazuya Takeda:

Acoustic Feature Transformation Based on Discriminant Analysis Preserving Local Structure for Speech Recognition. 1244-1252 - Keita Hirai, Jambal Tumurtogoo, Ayano Kikuchi, Norimichi Tsumura, Toshiya Nakaguchi, Yoichi Miyake:

Video Quality Assessment Using Spatio-Velocity Contrast Sensitivity Function. 1253-1262 - Zhu Li, Kenichi Yabuta, Hitoshi Kitazawa:

Exclusive Block Matching for Moving Object Extraction and Tracking. 1263-1271 - Takanobu Oba, Takaaki Hori, Atsushi Nakamura:

Improved Sequential Dependency Analysis Integrating Labeling-Based Sentence Boundary Detection. 1272-1281 - Xia Mao, Zheng Li:

Generating and Describing Affective Eye Behaviors. 1282-1290 - Kazuto Oshima:

A Simple Procedure for Classical Signal-Processing in Cluster-State Quantum Computation. 1291-1293 - Kai-Jie Zheng, Jigen Peng, Kexue Li:

A New Model for Graph Matching and Its Algorithm. 1294-1296 - Zhan Gao, Siwei Luo:

A QoS-Enabled Double Auction Protocol for the Service Grid. 1297-1300 - Mohamed M. Nasreldin Rasslan

, Amr M. Youssef:
Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes. 1301-1302 - Dae Hyun Yum, Jae Woo Seo, Kookrae Cho, Pil Joong Lee:

Generalized Hash Chain Traversal with Selective Output. 1303-1306 - Kuo-Chen Hung, Yu-Wen Wou, Peterson Julian

:
Discussion on "A Fuzzy Method for Medical Diagnosis of Headache". 1307-1308 - Jae-woong Jeong, Young-Cheol Park, Dae Hee Youn, Seok-Pil Lee:

A Robust Room Inverse Filtering Algorithm for Speech Dereverberation Based on a Kurtosis Maximization. 1309-1312 - Suk Tae Seo, In Keun Lee, Hye Cheun Jeong, Soon Hak Kwon:

Gaussian Kernel-Based Multi-Histogram Equalization. 1313-1316 - Quan Miao, Guijin Wang, Xinggang Lin:

Kernel Based Image Registration Incorporating with Both Feature and Intensity Matching. 1317-1320 - Chang Liu, Guijin Wang, Fan Jiang, Xinggang Lin:

Online HOG Method in Pedestrian Tracking. 1321-1324
Volume 93-D, Number 6, June 2010
- Masaru Kitsuregawa:

Foreword. 1329 - Lei Li, Bin Fu, Christos Faloutsos:

Efficient Parallel Learning of Hidden Markov Chain Models on SMPs. 1330-1342 - Ting Wang, Ling Liu:

Execution Assurance for Massive Computing Tasks. 1343-1351 - Matthias Rambow, Florian Rohrmüller, Omiros Kourakos, Drazen Brscic

, Dirk Wollherr
, Sandra Hirche, Martin Buss:
A Framework for Information Distribution, Task Execution and Decision Making in Multi-Robot Systems. 1352-1360 - Ryohei Sasano, Daisuke Kawahara, Sadao Kurohashi:

The Effect of Corpus Size on Case Frame Acquisition for Predicate-Argument Structure Analysis. 1361-1368 - Atsushi Fujii, Seiji Takegata:

Question Answering for the Operation of Software Applications: A Document Retrieval Approach. 1369-1377 - Nobuyuki Shimizu, Masashi Sugiyama, Hiroshi Nakagawa:

Spectral Methods for Thesaurus Construction. 1378-1385 - Xiao Sun

, Degen Huang, Fuji Ren:
Detecting New Words from Chinese Text Using Latent Semi-CRF Models. 1386-1393 - Zhenglu Yang

, Lin Li, Masaru Kitsuregawa:
Efficient Analyzing General Dominant Relationship Based on Partial Order Models. 1394-1402 - Tsubasa Takahashi, Hiroyuki Kitagawa

, Keita Watanabe:
Social Bookmarking Induced Active Page Ranking. 1403-1413 - Young-joo Chung, Masashi Toyoda, Masaru Kitsuregawa:

Detecting Hijacked Sites by Web Spammer Using Link-Based Algorithms. 1414-1421 - Hisashi Kurasawa, Daiji Fukagawa, Atsuhiro Takasu, Jun Adachi:

Margin-Based Pivot Selection for Similarity Search Indexes. 1422-1432 - Fengrong Li, Yoshiharu Ishikawa

:
Query Processing in a Traceable P2P Record Exchange Framework. 1433-1446 - Min-Soo Kim, Jin Hyun Son, Ju Wan Kim, Myoung-Ho Kim:

Energy-Efficient Distributed Spatial Join Processing in Wireless Sensor Networks. 1447-1458 - Takashi Hisamori, Toru Arikawa, Gosuke Ohashi:

Query-by-Sketch Image Retrieval Using Similarity in Stroke Order. 1459-1469 - Takatsugu Hirayama, Jean-Baptiste Dodane, Hiroaki Kawashima, Takashi Matsuyama:

Estimates of User Interest Using Timing Structures between Proactive Content-Display Updates and Eye Movements. 1470-1478 - Yuma Munekawa, Fumihiko Ino, Kenichi Hagihara:

Accelerating Smith-Waterman Algorithm for Biological Database Search on CUDA-Compatible GPUs. 1479-1488
- Shigeru Ninagawa

:
Evolution of Cellular Automata toward a LIFE-Like Rule Guided by 1/f Noise. 1489-1496 - Yong-Eun Kim, Kyung-Ju Cho, Jin-Gyun Chung, Xinming Huang:

Fixed-Width Group CSD Multiplier Design. 1497-1503 - Cheng-Min Lin:

Analysis and Modeling of a Priority Inversion Scheme for Starvation Free Controller Area Networks. 1504-1511 - Lung-Pin Chen, I-Chen Wu

, William C. Chu, Jhen-You Hong, Meng-Yuan Ho:
Incremental Digital Content Object Delivering in Distributed Systems. 1512-1520 - Junbo Wang

, Zixue Cheng, Lei Jing, Kaoru Ota
, Mizuo Kansen:
A Two-Stage Composition Method for Danger-Aware Services Based on Context Similarity. 1521-1539 - Fuminori Makikawa, Tatsuhiro Tsuchiya

, Tohru Kikuno:
Constructing Overlay Networks with Short Paths and Low Communication Cost. 1540-1548 - Tomokazu Yoneda, Akiko Shuto, Hideyuki Ichihara, Tomoo Inoue, Hideo Fujiwara:

Design and Optimization of Transparency-Based TAM for SoC Test. 1549-1559 - Gicheol Wang, Kang-Suk Song, Gihwan Cho:

DIRECT: Dynamic Key Renewal Using Secure Cluster Head Election in Wireless Sensor Networks. 1560-1571 - Jianmei Guo, Yinglin Wang, Jian Cao:

OWPA: An Ontology-Based Approach to Adaptable Workflow Participant Assignment. 1572-1579 - Shuoyan Liu, De Xu, Songhe Feng:

Discriminating Semantic Visual Words for Scene Classification. 1580-1588 - Yamato Ohtani, Tomoki Toda

, Hiroshi Saruwatari, Kiyohiro Shikano:
Adaptive Training for Voice Conversion Based on Eigenvoices. 1589-1598 - Roghayeh Doost, Abolghasem Sayadiyan, Hossein Shamsi:

A New Method for Low SNR Estimation of Noisy Speech Signals Using Fourth-Order Moments. 1599-1607 - Nasharuddin Zainal

, Toshihisa Tanaka
, Yukihiko Yamashita:
Moving Picture Coding by Lapped Transform and Edge Adaptive Deblocking Filter with Zero Pruning SPIHT. 1608-1617 - Kazu Mishiba, Masaaki Ikehara:

Image Interpolation Using Edge-Directed Smoothness Measure Filter. 1618-1624 - Sopon Phumeechanya

, Charnchai Pluempitiwiriyawej, Saowapak Thongvigitmanee:
Active Contour Using Local Regional Information on Extendable Search Lines (LRES) for Image Segmentation. 1625-1635 - Tomohiko Mukai, Ken-ichi Wakisaka, Shigeru Kuriyama:

Generating Concise Rules for Human Motion Retrieval. 1636-1643 - Jaegeuk Kim, Jinho Seol, Seung Ryoul Maeng:

A Buffer Management Issue in Designing SSDs for LFSs. 1644-1647 - Hea-Suk Kim, Yang-Sae Moon:

Fourier Magnitude-Based Privacy-Preserving Clustering on Time-Series Data. 1648-1651 - Jong-Mo Kum, Joon-Hyuk Chang:

Improved Global Soft Decision Incorporating Second-Order Conditional MAP in Speech Enhancement. 1652-1655 - Yuhwai Tseng, Chauchin Su, Chien-Nan Jimmy Liu:

Measurement and Evaluation of the Bioelectrical Impedance of the Human Body by Deconvolution of a Square Wave. 1656-1660
Volume 93-D, Number 7, July 2010
- Ken-ichi Maeda:

Foreword. 1669 - Tomoyuki Shibata, Toshikazu Wada:

K-D Decision Tree: An Accelerated and Memory Efficient Nearest Neighbor Classifier. 1670-1681 - Norimichi Ukita, Akira Makino, Masatsugu Kidode:

Real-Time Uncharacteristic-Part Tracking with a Point Set. 1682-1689 - Gholamreza Akbarizadeh, Gholam Ali Rezai Rad, Shahriar Baradaran Shokouhi

:
A New Region-Based Active Contour Model with Skewness Wavelet Energy for Segmentation of SAR Images. 1690-1699 - Kentaro Yokoi:

Probabilistic BPRRC: Robust Change Detection against Illumination Changes and Background Movements. 1700-1707 - Zhuo Yang, Sei-ichiro Kamata:

Fast Polar and Spherical Fourier Descriptors for Feature Extraction. 1708-1715 - Shuijiong Wu, Peilin Liu, Yiqing Huang, Qin Liu, Takeshi Ikenaga:

Constant Bit-Rate Multi-Stage Rate Control for Rate-Distortion Optimized H.264/AVC Encoders. 1716-1726 - Hideki Nakayama

, Tatsuya Harada, Yasuo Kuniyoshi:
Dense Sampling Low-Level Statistics of Local Features. 1727-1736 - Shaopeng Tang, Satoshi Goto:

Histogram of Template for Pedestrian Detection. 1737-1744 - Il-Woong Jeong, Jin Choi, Kyusung Cho, Yongho Seo, Hyun Seung Yang:

A Vision-Based Emergency Response System with a Paramedic Mobile Robot. 1745-1753 - Koichiro Enomoto, Masashi Toda, Yasuhiro Kuwahara:

Extraction Method of Scallop Area in Gravel Seabed Images for Fishery Investigation. 1754-1760 - Dung Nghi Truong Cong, Louahdi Khoudour, Catherine Achard

, Lounis Douadi:
People Detection and Re-Identification in Complex Environments. 1761-1772 - Fan-Chieh Cheng, Shanq-Jang Ruan:

Image Quality Analysis of a Novel Histogram Equalization Method for Image Contrast Enhancement. 1773-1779 - Romain Gallen, Nicolas Hautière

, Eric Dumont:
Static Estimation of the Meteorological Visibility Distance in Night Fog with Imagery. 1780-1787 - Tomohiko Ohtsuka, Daisuke Watanabe:

Singular Candidate Method: Improvement of Extended Relational Graph Method for Reliable Detection of Fingerprint Singularity. 1788-1797
- Hiroyuki Goto

:
High-Speed Computation of the Kleene Star in Max-Plus Algebraic System Using a Cell Broadband Engine. 1798-1806 - Chih-Sheng Chen, Shen-Yi Lin, Min-Hsuan Fan, Chua-Huang Huang:

A Novel Construction Method for n-Dimensional Hilbert Space-Filling Curves. 1807-1815 - Toshiki Saitoh

, Katsuhisa Yamanaka, Masashi Kiyomi
, Ryuhei Uehara
:
Random Generation and Enumeration of Proper Interval Graphs. 1816-1823 - Yung-Kuei Lu, Ming-Der Shieh:

High-Speed Low-Complexity Architecture for Reed-Solomon Decoders. 1824-1831 - Jeong-Hoon Lee, Kyu-Young Whang, Hyo-Sang Lim, Byung Suk Lee, Jun-Seok Heo:

Progressive Processing of Continuous Range Queries in Hierarchical Wireless Sensor Networks. 1832-1847 - Meng Ge, Kwok-Yan Lam, Jian-Bin Li, Siu Leung Chung:

Ubiquitous and Secure Certificate Service for Wireless Ad Hoc Network. 1848-1856 - Hiroshi Iwata, Satoshi Ohtake, Hideo Fujiwara:

A Method of Path Mapping from RTL to Gate Level and Its Application to False Path Identification. 1857-1865 - Shi-Cho Cha:

Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy. 1866-1877 - Osama Ouda

, Norimichi Tsumura, Toshiya Nakaguchi:
BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes. 1878-1888 - Jaehoon Kim, Seog Park:

Decomposition Optimization for Minimizing Label Overflow in Prime Number Graph Labeling. 1889-1899 - Chen-Sung Chang:

Approach to the Unit Maintenance Scheduling Decision Using Risk Assessment and Evolution Programming Techniques. 1900-1908 - Keigo Nakamura, Tomoki Toda

, Hiroshi Saruwatari, Kiyohiro Shikano:
Evaluation of Extremely Small Sound Source Signals Used in Speaking-Aid System with Statistical Voice Conversion. 1909-1917 - Wei Tang, Dongju Li, Tsuyoshi Isshiki, Hiroaki Kunieda:

Orientation Field Estimation for Embedded Fingerprint Authentication System. 1918-1926 - Seongjun Hahm, Yuichi Ohkawa

, Masashi Ito, Motoyuki Suzuki, Akinori Ito
, Shozo Makino:
Improved Reference Speaker Weighting Using Aspect Model. 1927-1935 - ChangCheng Wu, Chunyu Zhao, Dayue Chen:

Improved Radiometric Based Method for Suppressing Impulse Noise from Corrupted Images. 1936-1943 - Giseok Choe, Jongho Nang:

Tile-Image Merging and Delivering for Virtual Camera Services on Tiled-Display for Real-Time Remote Collaboration. 1944-1956 - Rodrigo Santamaría, Roberto Therón

:
Visualization of Intersecting Groups Based on Hypergraphs. 1957-1964 - Yuyu Liu, Yoichi Sato:

Segmentation of the Speaker's Face Region with Audiovisual Correlation. 1965-1975 - Chooi-Ling Goh, Taro Watanabe, Hirofumi Yamamoto, Eiichiro Sumita:

Constraining a Generative Word Alignment Model with Discriminative Output. 1976-1983 - Hae Young Lee

, Seung-Min Park, Tae Ho Cho:
Simulation Modeling of SAM Fuzzy Logic Controllers. 1984-1986 - Yuanyuan Zhang, Shijun Lin, Li Su, Depeng Jin, Lieguang Zeng:

A Dual-Port Access Structure of 3D Mesh-Based NoC. 1987-1990 - Gile Narcisse Fanzou Tchuissang, Ning Wang

, Nathalie Cindy Kuicheu, François Siewe, De Xu, Shuoyan Liu:
Predicting DataSpace Retrieval Using Probabilistic Hidden Information. 1991-1994 - Eun-Jun Yoon, Kee-Young Yoo:

Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability. 1995-1996 - Jun-Cheol Park:

Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials. 1997-2000 - Youngshin Han, SoYoung Kim, Taekyu Kim, Jason J. Jung

:
Automatic Defect Classification System in Semiconductors EDS Test Based on System Entity Structure Methodology. 2001-2004 - Makoto Sakai, Norihide Kitaoka, Kazuya Takeda:

Acoustic Feature Transformation Combining Average and Maximum Classification Error Minimization Criteria. 2005-2008 - Guoan Yang, Huub van de Wetering

, Ming Hou, Chihiro Ikuta, Yuehu Liu:
A Novel Design Approach for Contourlet Filter Banks. 2009-2011 - Do Quan

, Yo-Sung Ho:
Fast Intra Prediction Mode Decision for H.264/AVC. 2012-2015 - Xiaokan Wang, Xia Mao, Catalin-Daniel Caleanu:

Nonlinear Shape-Texture Manifold Learning. 2016-2019
Volume 93-D, Number 8, August 2010
- Michitaka Kameyama:

Foreword. 2025 - Tsutomu Sasao, Hiroki Nakahara

, Munehiro Matsuura, Yoshifumi Kawamura, Jon T. Butler:
A Quaternary Decision Diagram Machine: Optimization of Its Code. 2026-2035 - Koki Nishizawa:

Multi-Valued Modal Fixed Point Logics for Model Checking. 2036-2039 - Noboru Takagi:

A Delay Model of Multiple-Valued Logic Circuits Consisting of Min, Max, and Literal Operations. 2040-2047 - Hiroki Nakahara

, Tsutomu Sasao, Munehiro Matsuura, Yoshifumi Kawamura:
A Parallel Branching Program Machine for Sequential Circuits: Implementation and Evaluation. 2048-2058 - Shinobu Nagayama, Tsutomu Sasao, Jon T. Butler:

A Systematic Design Method for Two-Variable Numeric Function Generators Using Multiple-Valued Decision Diagrams. 2059-2067 - Kwang-Jow Gan, Dong-Shong Liang, Yan-Wun Chen:

Novel Multiple-Valued Logic Design Using BiCMOS-Based Negative Differential Resistance Circuit Biased by Two Current Sources. 2068-2072 - Motoi Inaba, Koichi Tanno, Hiroki Tamura, Okihiko Ishizuka:

Optimization and Verification of Current-Mode Multiple-Valued Digit ORNS Arithmetic Circuits. 2073-2079 - Hirokatsu Shirahama, Takashi Matsuura, Masanori Natsui

, Takahiro Hanyu:
Energy-Aware Multiple-Valued Current-Mode Sequential Circuits Using a Completion-Detection Scheme. 2080-2088 - Naoya Onizawa, Takahiro Hanyu:

Highly Reliable Multiple-Valued One-Phase Signalling for an Asynchronous On-Chip Communication Link. 2089-2099 - Liang-Bi Chen

, Jiun-Cheng Ju, Chien-Chou Wang, Ing-Jer Huang:
HPChecker: An AMBA AHB On-Chip Bus Protocol Checker with Efficient Verification Mechanisms. 2100-2108 - Yasushi Yuminaka, Yasunori Takahashi, Kenichi Henmi:

Multiple-Valued Data Transmission Based on Time-Domain Pre-Emphasis Techniques. 2109-2116 - Naofumi Homma, Yuichi Baba, Atsushi Miyamoto, Takafumi Aoki:

Multiple-Valued Constant-Power Adder and Its Application to Cryptographic Processor. 2117-2125 - Nobuaki Okada, Michitaka Kameyama:

Logic-In-Control-Architecture-Based Reconfigurable VLSI Using Multiple-Valued Differential-Pair Circuits. 2126-2133 - Shota Ishihara, Noriaki Idobata, Masanori Hariyama, Michitaka Kameyama:

A Switch Block Architecture for Multi-Context FPGAs Based on a Ferroelectric-Capacitor Functional Pass-Gate Using Multiple/Binary Valued Hybrid Signals. 2134-2144
- Chammika Mannakkara, Tomohiro Yoneda:

Asynchronous Pipeline Controller Based on Early Acknowledgement Protocol. 2145-2161 - Sung-Rae Lee, Ser-Hoon Lee, Sun-Young Hwang:

A Concurrent Instruction Scheduling and Recoding Algorithm for Power Minimization in Embedded Systems. 2162-2171 - Pham Ngoc Hung, Viet Ha Nguyen, Toshiaki Aoki

, Takuya Katayama:
A Minimized Assumption Generation Method for Component-Based Software Verification. 2172-2181 - Takako Nakatani, Shouzo Hori, Naoyasu Ubayashi

, Keiichi Katamine, Masaaki Hashimoto:
A Case Study of Requirements Elicitation Process with Changes. 2182-2189 - Ricardo Martinho

, Dulce Domingos
, João Varajão
:
Concept Maps for the Modelling of Controlled Flexibility in Software Processes. 2190-2197 - Nobutaka Suzuki:

An Algorithm for Inferring K Optimum Transformations of XML Document from Update Script to DTD. 2198-2212 - Achmad Basuki

, Achmad Husni Thamrin
, Hitoshi Asaeda
, Jun Murai:
Real-Time Monitoring of Multicast Group Information. 2213-2222 - Jun Liu, Yinhe Han, Xiaowei Li:

Extended Selective Encoding of Scan Slices for Reducing Test Data and Test Power. 2223-2232 - Tae-Heon Yang

, Sang-Youn Kim, Wayne J. Book, Dong-Soo Kwon:
Tiny Feel: A New Miniature Tactile Module Using Elastic and Electromagnetic Force for Mobile Devices. 2233-2242 - Wei Chen, Gang Liu, Jun Guo, Shinichiro Omachi

, Masako Omachi, Yujing Guo:
Novel Confidence Feature Extraction Algorithm Based on Latent Topic Similarity. 2243-2251 - Sanaz Seyedin

, Seyed Mohammad Ahadi:
A New Subband-Weighted MVDR-Based Front-End for Robust Speech Recognition. 2252-2261 - Kyung-Yong Kim, Gwang Hoon Park, Doug Young Suh:

Adaptive Depth-Map Coding for 3D-Video. 2262-2272 - Jing-Xin Wang, Alvin Wen-Yu Su:

Adaptive Zero-Coefficient Distribution Scan for Inter Block Mode Coding of H.264/AVC. 2273-2280 - Kong-Joo Lee

, Jee-Eun Kim:
Improving Automatic English Writing Assessment Using Regression Trees and Error-Weighting. 2281-2290 - Hyunjin Park

, Alfred O. Hero III, Peyton H. Bland, Marc Kessler, Jongbum Seo, Charles R. Meyer:
Construction of Abdominal Probabilistic Atlases and Their Value in Segmentation of Normal Organs in Abdominal CT Scans. 2291-2301 - In Hwan Doh, Myoung Sub Shim, Eunsam Kim

, Jongmoo Choi, Donghee Lee, Sam H. Noh:
An Empirical Study of FTL Performance in Conjunction with File System Pursuing Data Integrity. 2302-2305 - Min-Soo Kim, Ju Wan Kim, Myoung-Ho Kim:

Hybrid Spatial Query Processing between a Server and a Wireless Sensor Network. 2306-2310 - Eun-Jun Yoon, Kee-Young Yoo:

A Biometric Authenticated Key Agreement Protocol for Secure Token. 2311-2315 - Miyuki Koshimura, Hidetomo Nabeshima, Hiroshi Fujita, Ryuzo Hasegawa:

Solving Open Job-Shop Scheduling Problems by SAT Encoding. 2316-2318 - Chang Sik Son

, Yoon-Nyun Kim, Kyung-Ri Park, Hee-Joon Park:
Design of Hierarchical Fuzzy Classification System Based on Statistical Characteristics of Data. 2319-2323 - Xia Mao, Lijiang Chen:

Speech Emotion Recognition Based on Parametric Filter and Fractal Dimension. 2324-2326 - Sung Soo Kim, Chang Woo Han, Nam Soo Kim:

Study of Prominence Detection Based on Various Phone-Specific Features. 2327-2330 - Chang Woo Han, Shin Jae Kang, Nam Soo Kim:

Estimation of Phone Mismatch Penalty Matricesfor Two-Stage Keyword Spotting. 2331-2335 - Do-Gil Lee, Gumwon Hong, Seok Kee Lee

, Hae-Chang Rim:
Minimizing Human Intervention for Constructing Korean Part-of-Speech Tagged Corpus. 2336-2338
Volume 93-D, Number 9, September 2010
- Takao Kobayashi:

Foreword. 2347 - Koichi Shinoda:

Acoustic Model Adaptation for Speech Recognition. 2348-2362 - Tetsuo Kosaka, Yuui Takeda, Takashi Ito, Masaharu Katoh, Masaki Kohda:

Unsupervised Speaker Adaptation Using Speaker-Class Models for Lecture Speech Recognition. 2363-2369 - Shoei Sato, Takahiro Oku, Shinichi Homma, Akio Kobayashi, Toru Imai

:
Learning Speech Variability in Discriminative Acoustic Model Adaptation. 2370-2378 - Yoo Rhee Oh, Hong Kook Kim:

A Hybrid Acoustic and Pronunciation Model Adaptation Approach for Non-native Speech Recognition. 2379-2387 - Dessi Puji Lestari, Sadaoki Furui:

Adaptation to Pronunciation Variations in Indonesian Spoken Query-Based Information Retrieval. 2388-2396 - Longbiao Wang, Kazue Minami, Kazumasa Yamamoto

, Seiichi Nakagawa:
Speaker Recognition by Combining MFCC and Phase Information in Noisy Conditions. 2397-2406 - Seongjun Hahm, Yuichi Ohkawa

, Masashi Ito, Motoyuki Suzuki, Akinori Ito
, Shozo Makino:
Speech Recognition under Multiple Noise Environment Based on Multi-Mixture HMM and Weight Optimization by the Aspect Model. 2407-2416 - Yanqing Sun, Yu Zhou, Qingwei Zhao, Yonghong Yan:

Acoustic Feature Optimization Based on F-Ratio for Robust Speech Recognition. 2417-2430 - Yanqing Sun, Yu Zhou, Qingwei Zhao, Pengyuan Zhang, Fuping Pan, Yonghong Yan:

Enhancing the Robustness of the Posterior-Based Confidence Measures Using Entropy Information for Speech Recognition. 2431-2439 - Yasunari Obuchi, Takashi Sumiyoshi:

Intentional Voice Command Detection for Trigger-Free Speech Interface. 2440-2450 - Alberto Yoshihiro Nakano, Seiichi Nakagawa, Kazumasa Yamamoto

:
Distant Speech Recognition Using a Microphone Array Network. 2451-2462 - Kook Cho, Hajime Okumura, Takanobu Nishiura, Yoichi Yamashita:

Multiple Sound Source Localization Based on Inter-Channel Correlation Using a Distributed Microphone System in a Real Environment. 2463-2471 - Hironori Doi, Keigo Nakamura, Tomoki Toda

, Hiroshi Saruwatari, Kiyohiro Shikano:
Esophageal Speech Enhancement Based on Statistical Voice Conversion with Gaussian Mixture Models. 2472-2482 - Takashi Nose

, Yuhei Ota, Takao Kobayashi:
HMM-Based Voice Conversion Using Quantized F0 Context. 2483-2490 - Yamato Ohtani, Tomoki Toda

, Hiroshi Saruwatari, Kiyohiro Shikano:
Improvements of the One-to-Many Eigenvoice Conversion System. 2491-2499
- Jeong Hun Kim, Suki Kim, Kwang-Hyun Baek

:
A Low Power SOC Architecture for the V2.0+EDR Bluetooth Using a Unified Verification Platform. 2500-2508 - Cheng-Min Lin:

Nested Interrupt Analysis of Low Cost and High Performance Embedded Systems Using GSPN Framework. 2509-2519 - Hasan Kadhem, Toshiyuki Amagasa

, Hiroyuki Kitagawa
:
MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values. 2520-2533 - Cheng-Min Lin, Jyh-Horng Lin, Jen-Cheng Chiu:

DIWSAN: Distributed Intelligent Wireless Sensor and Actuator Network for Heterogeneous Environment. 2534-2543 - Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto

, Koji Nakao:
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data. 2544-2554 - Masashi Sugiyama, Hirotaka Hachiya, Hisashi Kashima, Tetsuro Morimura:

Least Absolute Policy Iteration-A Robust Approach to Value Function Approximation. 2555-2565 - Takaaki Kamogawa:

Structural Models that Manage IT Portfolio Affecting Business Value of Enterprise Architecture. 2566-2576 - Danni Ai, Xian-Hua Han, Xiang Ruan

, Yen-Wei Chen:
Color Independent Components Based SIFT Descriptors for Object/Scene Classification. 2577-2586 - Aram Kawewong, Sirinart Tangruamsub, Osamu Hasegawa:

Position-Invariant Robust Features for Long-Term Recognition of Dynamic Outdoor Scenes. 2587-2601 - Cheng Wan, Jun Sato:

Computing Spatio-Temporal Multiple View Geometry from Mutual Projections of Multiple Cameras. 2602-2613 - Ukrit Watchareeruetai

, Tetsuya Matsumoto, Yoshinori Takeuchi, Hiroaki Kudo, Noboru Ohnishi:
Multi-Objective Genetic Programming with Redundancy-Regulations for Automatic Construction of Image Feature Extractors. 2614-2625 - Junichi Hori, Kentarou Sunaga, Satoru Watanabe:

Signal and Noise Covariance Estimation Based on ICA for High-Resolution Cortical Dipole Imaging. 2626-2634 - Vladimir V. Stankovic, Nebojsa Z. Milenkovic:

DDR3 SDRAM with a Complete Predictor. 2635-2638 - Jongwan Kim

, Dukshin Oh, Keecheon Kim:
Indexing of Tagged Moving Objects over Localized Trajectory with Time Intervals in RFID Systems. 2639-2642 - Yuan Hu, Li Lu, Jingqi Yan, Zhi Liu, Pengfei Shi:

Sexual Dimorphism Analysis and Gender Classification in 3D Human Face. 2643-2646 - Noriaki Suetake, Go Tanaka, Hayato Hashii, Eiji Uchino:

Hellinger Distance-Based Parameter Tuning for epsilon-Filter. 2647-2650 - Nan Liu, Yao Zhao, Zhenfeng Zhu, Rongrong Ni:

Commercial Shot Classification Based on Multiple Features Combination. 2651-2655 - Hui Cao, Koichiro Yamaguchi, Mitsuhiko Ohta, Takashi Naito, Yoshiki Ninomiya:

Feature Interaction Descriptor for Pedestrian Detection. 2656-2659 - Yoshihide Kato, Shigeki Matsubara

:
Correcting Syntactic Annotation Errors Using a Synchronous Tree Substitution Grammar. 2660-2663
Volume 93-D, Number 10, October 2010
- Masashi Sugiyama:

Foreword. 2671 - Hisashi Kashima, Satoshi Oyama, Yoshihiro Yamanishi, Koji Tsuda:

Cartesian Kernel: An Efficient Alternative to the Pairwise Kernel. 2672-2679 - Yukito Iba, Shotaro Akaho

:
Gaussian Process Regression with Measurement Error. 2680-2689 - Masashi Sugiyama:

Superfast-Trainable Multi-Class Probabilistic Classifier by Least-Squares Posterior Fitting. 2690-2701 - The Dung Luong, Tu Bao Ho:

Privacy Preserving Frequency Mining in 2-Part Fully Distributed Setting. 2702-2708 - Mohammad Anisuzzaman Siddique

, Yasuhiko Morimoto:
Algorithm for Computing Convex Skyline Objectsets on Numerical Databases. 2709-2716 - Makoto Nakatsuji, Akimichi Tanaka, Takahiro Madokoro, Kenichiro Okamoto, Sumio Miyazaki, Tadasu Uchiyama:

Extracting Know-Who/Know-How Using Development Project-Related Taxonomies. 2717-2727 - Shaopeng Tang, Satoshi Goto:

Accurate Human Detection by Appearance and Motion. 2728-2736
- Tetsuo Yokoyama

, Gang Zeng, Hiroyuki Tomiyama, Hiroaki Takada:
Static Task Scheduling Algorithms Based on Greedy Heuristics for Battery-Powered DVS Systems. 2737-2746 - Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:

Efficient Distributed Web Crawling Utilizing Internet Resources. 2747-2762 - Jian Shen, Sangman Moh, Ilyong Chung:

A Priority Routing Protocol Based on Location and Moving Direction in Delay Tolerant Networks. 2763-2775 - Hideyuki Ichihara, Kenta Sutoh, Yuki Yoshikawa, Tomoo Inoue:

A Practical Threshold Test Generation for Error Tolerant Application. 2776-2782 - Nobutaka Kito, Kensuke Hanai, Naofumi Takagi

:
A C-Testable 4-2 Adder Tree for an Easily Testable High-Speed Multiplier. 2783-2791 - Akihiro Inokuchi, Takashi Washio:

GTRACE: Mining Frequent Subsequences from Graph Sequences. 2792-2804 - Huimin Lu, Boqin Feng, Xi Chen:

Visual Knowledge Structure Reasoning with Intelligent Topic Map. 2805-2812 - Yu Zhou, Junfeng Li, Yanqing Sun, Jianping Zhang, Yonghong Yan, Masato Akagi:

A Hybrid Speech Emotion Recognition System Based on Spectral and Prosodic Features. 2813-2821 - Sirikan Chucherd

, Annupan Rodtook, Stanislav S. Makhanov
:
Phase Portrait Analysis for Multiresolution Generalized Gradient Vector Flow. 2822-2835 - Kenichi Kanatani, Yasuyuki Sugaya, Hirotaka Niitsuma

:
Optimization without Minimization Search: Constraint Satisfaction by Orthogonal Projection with Applications to Multiview Triangulation. 2836-2845 - Makoto Yamada

, Masashi Sugiyama, Gordon Wichern, Jaak Simm:
Direct Importance Estimation with a Mixture of Probabilistic Principal Component Analyzers. 2846-2849 - Masahiro Kimoto, Tatsuhiro Tsuchiya

, Tohru Kikuno:
The Time Complexity of Hsu and Huang's Self-Stabilizing Maximal Matching Algorithm. 2850-2853 - Dongook Seong, Junho Park, Myungho Yeo, Jaesoo Yoo:

Energy Efficient Skyline Query Processing in Wireless Sensor Networks. 2854-2857 - Daekeun Moon, Kwangil Lee, Hagbae Kim:

The Design of a Total Ship Service Framework Based on a Ship Area Network. 2858-2861 - Makio Ishihara, Yukio Ishihara:

Calibrating Coordinates of a Tabletop Display with a Reflex in Eye-Hand Coordination. 2862-2865 - Na Duan, Soon Hak Kwon:

Image Contrast Enhancement by Global and Local Adjustment of Gray Levels. 2866-2869 - Tetsu Matsukawa

, Takio Kurita
:
Extraction of Combined Features from Global/Local Statistics of Visual Words Using Relevant Operations. 2870-2874 - Kazuya Ueki, Masashi Sugiyama, Yasuyuki Ihara:

A Semi-Supervised Approach to Perceived Age Prediction from Face Images. 2875-2878 - Chang Wook Ahn

, Yehoon Kim:
Improving Proximity and Diversity in Multiobjective Evolutionary Algorithms. 2879-2882 - In Keun Lee, Soon Hak Kwon:

Design of Sigmoid Activation Functions for Fuzzy Cognitive Maps via Lyapunov Stability Analysis. 2883-2886
Volume 93-D, Number 11, November 2010
- Fumio Teraoka:

Foreword. 2897 - Eun-Jun Yoon, Kee-Young Yoo:

A Robust Security Mechanism for Mobile Commerce Transactions. 2898-2906 - Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:

Exploring Web Partition in DHT-Based Distributed Web Crawling. 2907-2921 - Shigeya Suzuki, Rodney Van Meter

, Osamu Nakamura, Jun Murai:
Otedama: A Relocatable RFID Information Repository Architecture. 2922-2931 - Mohammad Behdadfar, Hossein Saidi

, Masoud Reza Hashemi, Ali Ghiasian
, Hamid Alaei:
IP Lookup Using the Novel Idea of Scalar Prefix Search with Fast Table Updates. 2932-2943 - Rentao Gu

, Hongxiang Wang, Yongmei Sun, Yuefeng Ji:
Fast Traffic Classification Using Joint Distribution of Packet Size and Estimated Protocol Processing Time. 2944-2952 - Heru Sukoco, Yoshiaki Hori, Hendrawan

, Kouichi Sakurai:
Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol. 2953-2961
- Ichiro Mitsuhashi, Michio Oyamaguchi, Kunihiro Matsuura:

The Unification Problem for Confluent Semi-Constructor TRSs. 2962-2978 - In-Cheol Park

, Tae-Hwan Kim:
Multiplier-less and Table-less Linear Approximation for Square-Related Functions. 2979-2988 - Sung Kwon Kim:

Optimal Algorithms for Finding Density-Constrained Longest and Heaviest Paths in a Tree. 2989-2994 - Chuzo Iwamoto

, Kento Sasaki, Kenji Nishio, Kenichi Morita
:
NP-Hard and k-EXPSPACE-Hard Cast Puzzles. 2995-3004 - Malik Jahan Khan

, Mian M. Awais, Shafay Shamail
:
Improving Efficiency of Self-Configurable Autonomic Systems Using Clustered CBR Approach. 3005-3016 - Young-Jin Kim, Jihong Kim, Jeong-Bae Lee, Kee-Wook Rim:

PAW: A Pattern-Aware Write Policy for a Flash Non-volatile Cache. 3017-3026 - Masato Asahara, Kenji Kono, Toshinori Kojima, Ai Hayakawa:

P2P-Based Approach to Finding Replica Server Locations for Alleviating Flash Crowds. 3027-3037 - Ana Erika Camargo Cruz, Koichiro Ochimizu:

A UML Approximation of Three Chidamber-Kemerer Metrics and Their Ability to Predict Faulty Code across Software Projects. 3038-3050 - Tetsuo Imai, Atsushi Tanaka:

A Game Theoretic Model for AS Topology Formation with the Scale-Free Property. 3051-3058 - Kuo-Chen Hung, Yuan-Cheng Tsai, Kuo-Ping Lin

, Peterson Julian
:
A Novel Measured Function for MCDM Problem Based on Interval-Valued Intuitionistic Fuzzy Sets. 3059-3065 - Mitsuharu Matsumoto:

Self-Quotient epsilon-Filter for Feature Extraction from Noise Corrupted Image. 3066-3075 - Gang Yeon Kim, Kwan H. Lee:

A Reflectance Model for Metallic Paints Using a Two-Layer Structure Surface with Microfacet Distributions. 3076-3087 - Sven Forstmann, Jun Ohya:

Efficient, High-Quality, GPU-Based Visualization of Voxelized Surface Data with Fine and Complicated Structures. 3088-3099 - Ching-Chi Chen, Wei-Yen Hsu

, Shih-Hsuan Chiu, Yung-Nien Sun:
An Efficient Algorithm for Point Set Registration Using Analytic Differential Approach. 3100-3107 - Kenji Tsuchie, Yoshiko Hanada, Seiji Miyoshi:

Estimation of Distribution Algorithm Incorporating Switching. 3108-3111 - Heekwon Park, Seungjae Baek, Jongmoo Choi:

Performance and Energy Efficiency Tradeoffs of Storage Class Memory. 3112-3115 - Yong Cao

, Qingxin Zhu:
The Software Reliability Model Using Hybrid Model of Fractals and ARIMA. 3116-3119 - Woong-Kee Loh, Yang-Sae Moon, Jun-Gyu Kang:

A Data Cleansing Method for Clustering Large-Scale Transaction Databases. 3120-3123 - Jihwan Song, Xing Xie

, Yoon-Joon Lee, Ji-Rong Wen:
Estimating Mobile-Friendliness Scores of Web Pages. 3124-3127 - Suk Tae Seo, In Keun Lee, Seo Ho Son, Hyong Gun Lee, Soon Hak Kwon:

Co-occurrence Matrix-Based Image Segmentation. 3128-3131 - Ju Hyun Park, Young-Chul Kim, Hong-Sung Hoon:

Edge-Based Motion Vector Processing for Frame Interpolation Based on Weighted Vector Median Filter. 3132-3135 - Yan Li, Siwei Luo, Qi Zou:

Active Contour Model Based on Salient Boundary Point Image for Object Contour Detection in Natural Image. 3136-3139 - JunSeong Kim, JongSu Yi:

Heuristic Designs of SAD Algorithm for a Platform-Based Vision System. 3140-3143 - Lv Guo, Yin Li, Jie Yang, Li Lu:

Exploration into Single Image Super-Resolution via Self Similarity by Sparse Representation. 3144-3148 - Yuefei Zhang, Mei Xie, Ling Mao:

Digital Image Stabilization Based on Correction for Basic Reference Frame Jitter. 3149-3152 - In Keun Lee, Soon Hak Kwon:

Learning Rule for Time Delay in Fuzzy Cognitive Maps. 3153-3157
Volume 93-D, Number 12, December 2010
- Satoshi Fujita:

Foreword. 3163 - Kan Watanabe, Masaru Fukushi:

Generalized Spot-Checking for Reliable Volunteer Computing. 3164-3172 - Masaki Kohana, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura:

Evaluation of a Dynamic Data Allocation Method for Web-Based Multi-Server MORPG System. 3173-3180 - Takeru Inoue, Hiroshi Asakura, Yukio Uematsu, Hiroshi Sato, Noriyuki Takahashi:

Web API Database Systems for Rapid Web Application Development. 3181-3193 - Kyong Hoon Kim, Wan Yeon Lee, Jong Kim, Rajkumar Buyya:

SLA-Based Scheduling of Bag-of-Tasks Applications on Power-Aware Cluster Systems. 3194-3201 - Min Zhu, Leibo Liu

, Shouyi Yin, Chongyong Yin, Shaojun Wei:
A Cycle-Accurate Simulator for a Reconfigurable Multi-Media System. 3202-3210 - Xiaomin Jia, Pingjing Lu, Caixia Sun, Minxuan Zhang:

Dynamic Program Behavior Identification for High Performance CMPs with Private LLCs. 3211-3222 - Tongsheng Geng, Leibo Liu

, Shouyi Yin, Min Zhu, Shaojun Wei:
Parallelization of Computing-Intensive Tasks of the H.264 High Profile Decoding Algorithm on a Reconfigurable Multimedia System. 3223-3231 - Yi Tang, Junchen Jiang, Xiaofei Wang, Chengchen Hu, Bin Liu, Zhijia Chen:

Parallel DFA Architecture for Ultra High Throughput DFA-Based Pattern Matching. 3232-3242 - Jacir Luiz Bordim, Koji Nakano

:
Deafness Resilient MAC Protocol for Directional Communications. 3243-3250 - Koichi Nishide, Hiroyuki Kubo, Ryoichi Shinkuma

, Tatsuro Takahashi:
Virtual Multi-AP Access for Transport-Level Quality Improvement in Wireless Local Area Networks with Hidden Stations. 3251-3259 - Hiroyuki Kubo, Ryoichi Shinkuma

, Tatsuro Takahashi:
Social Network Based P2P Multicast Reducing Psychological Forwarding Cost in Mobile Networks. 3260-3268 - Kenji Yamada, Tsuyoshi Itokawa, Teruaki Kitasuka, Masayoshi Aritsugi

:
Redundant TC Message Senders in OLSR. 3269-3272 - Weiwei Yang, Yueming Cai, Lei Wang:

Outage Performance of Decode-and-Forward Relay Systems Using Imperfect MRC Receiver over Nakagami-m Fading Channels. 3273-3275
- Kazuya Yamashita, Mitsuru Sakai, Sadaki Hirose, Yasuaki Nishitani:

The Firing Squad Synchronization Problems for Number Patterns on a Seven-Segment Display and Segment Arrays. 3276-3283 - Yoshiki Yunbe, Masayuki Miyama, Yoshio Matsuda:

A VGA 30 fps Affine Motion Model Estimation VLSI for Real-Time Video Segmentation. 3284-3293 - Yusuke Tanaka, Hideki Ando:

Register File Size Reduction through Instruction Pre-Execution Incorporating Value Prediction. 3294-3305 - JianFeng Cui, HeungSeok Chae:

Component Identification and Evaluation for Legacy Systems-An Empirical Study-. 3306-3320 - Soonghwan Ro, Hanh Van Nguyen, Woochul Jung, Young Woo Pae, Jonathan P. Munson, Jinmyung Woo, Sibok Yu, Kisung Lee:

A Usability Evaluation on the XVC Framework for In-Vehicle User Interfaces. 3321-3330 - Mi-Young Park, Sang-Hwa Chung:

Detecting TCP Retransmission Timeouts Non-related to Congestion in Multi-Hop Wireless Networks. 3331-3343 - Karolina Nurzynska

, Mamoru Kubo, Ken-ichiro Muramoto:
2D Feature Space for Snow Particle Classification into Snowflake and Graupel. 3344-3351 - Xu Yang, Huilin Xiong, Xin Yang:

Optimal Gaussian Kernel Parameter Selection for SVM Classifier. 3352-3358 - Kazunori Komatani, Yuichiro Fukubayashi, Satoshi Ikeda, Tetsuya Ogata

, Hiroshi G. Okuno
:
Selecting Help Messages by Using Robust Grammar Verification for Handling Out-of-Grammar Utterances in Spoken Dialogue Systems. 3359-3367 - Yusuke Takano, Kazuhiro Kondo

:
Estimation of Speech Intelligibility Using Speech Recognition Systems. 3368-3376 - Dong Yang, Paul R. Dixon, Sadaoki Furui:

A New Hybrid Method for Machine Transliteration. 3377-3383 - Takahiro Ota, Hiroyoshi Morita:

On-Line Electrocardiogram Lossless Compression Using Antidictionary Codes for a Finite Alphabet. 3384-3391 - Dongsu Kang

, Chee-Yang Song, Doo-Kwon Baik:
A Feature-Based Service Identification Method to Improve Productivity of Service-Oriented System. 3392-3395 - Eun-Jun Yoon, Muhammad Khurram Khan

, Kee-Young Yoo:
Improvement of the Efficient Secret Broadcast Scheme. 3396-3399 - Eun-Jun Yoon, Muhammad Khurram Khan

, Kee-Young Yoo:
Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing. 3400-3402 - Kyungbaek Kim

:
Relative MTTF-Based Incentive Scheme for Availability-Based Replication in P2P Systems. 3403-3406 - Kazuteru Namba, Kengo Nakashima, Hideo Ito:

Single-Event-Upset Tolerant RS Flip-Flop with Small Area. 3407-3409 - Hao Bai, Changzhen Hu, Gang Zhang, Xiao-chuan Jing, Ning Li:

Binary Oriented Vulnerability Analyzer Based on Hidden Markov Model. 3410-3413 - Cheng Lu

, Mrinal Mandal:
Improved Demons Technique with Orthogonal Gradient Information for Medical Image Registration. 3414-3417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














