


default search action
Information and Media Technologies, Volume 6
Volume 6, Number 1, 2011
- Hiroaki Yoshida, Masahiro Fujita:

Performance-Constrained Transistor Sizing for Different Cell Count Minimization. 1-11 - Yuji Numai, Yoshiaki Udagawa, Satoshi Kobayashi:

State and Threshold Sequence Minimization Algorithm of Linear Separation Automata. 12-24 - Shunsuke Inenaga, Kenichirou Oyama, Hiroto Yasuura:

Towards Modeling Stored-value Electronic Money Systems. 25-34 - Po-Ting Lai, Richard Tzong-Han Tsai:

A Dynamic Programming Re-ranking Approach to Enhance PPI Interactor Extraction. 35-38 - Koji Yahara, Ying Jiang, Takashi Yanagawa:

Computational Identification of Discriminating Features of Pathogenic and Symbiotic Type III Secreted Effector Proteins. 39-51 - Hongyan Wu, Taro L. Saito, Shinichi Morishita:

Accelerating Path-free XML Queries in RDBMS. 52-63 - Marc Pollefeys, Jan-Michael Frahm, Friedrich Fraundorfer, Christopher Zach, Changchang Wu, Brian Clipp, David Gallup:

Challenges in Wide-area Structure-from-motion. 64-79 - Yousun Kang, Koichiro Yamaguchi, Takashi Naito, Yoshiki Ninomiya:

Integrating Motion and Segmentation for Road Scene Labeling. 80-90 - Shohei Nobuhara, Yuta Kimura, Takashi Matsuyama:

Object-Oriented Color Calibration of Multi-viewpoint Cameras in Sparse and Convergent Arrangement. 91-103 - Hitoshi Habe, Hidehito Nakagawa, Masatsugu Kidode:

Efficient Acquisition of Human Existence Priors from Motion Trajectories. 104-114 - Tatsuya Tanaka, Satoshi Yoshinaga, Atsushi Shimada, Rin-Ichiro Taniguchi, Takayoshi Yamashita, Daisaku Arita:

Object Detection Based on Combining Multiple Background Modelings. 115-127 - Tatsuhisa Yamaguchi, Hiromasa Yoshimoto, Shohei Nobuhara, Takashi Matsuyama:

Cell-based 3D Video Capture of a Freely-moving Object Using Multi-viewpoint Active Cameras. 128-143 - Shinsaku Hiura, Ankit Mohan, Ramesh Raskar:

Krill-eye: Superposition Compound Eye for Wide-Angle Imaging via GRIN Lenses. 144-157 - Norihiko Kawai, Kotaro Machikita, Tomokazu Sato, Naokazu Yokoya:

Video Completion for Generating Omnidirectional Video without Invisible Areas. 158-171 - Takeshi Miura, Kazutaka Mitobe, Takashi Yukawa, Takaaki Kaiga, Toshiyuki Taniguchi, Hideo Tamamoto:

Adaptation of Grouping Structure Analysis in GTTM to Hierarchical Segmentation of Dance Motion. 172-192 - Minghui Sun, Xiangshi Ren, Xiang Cao:

Effects of Multimodal Error Feedback on Human Performance in Steering Tasks. 193-201 - Sosuke Matsui, Takahiro Okabe, Mihoko Shimano, Yoichi Sato:

Image Enhancement of Low-light Scenes with Near-infrared Flash Images. 202-210 - Michael Donoser, Hayko Riemenschneider, Horst Bischof:

IS-Match: Partial Shape Matching by Efficiently Solving an Order Preserving Assignment Problem. 211-221 - Indika H. Katugampala, Hirofumi Yamaki, Yukiko Yamaguchi:

Memory Complexity of Parsimonious Strategy in Automated Trust Negotiation. 222-230 - Takashi Uemura, Daisuke Ikeda, Takuya Kida, Hiroki Arimura:

Unsupervised Spam Detection by Document Probability Estimation with Maximal Overlap Method. 231-240 - Paul Vixie, Jun Murai:

NCAP - Distributed Network Capture with Shared Analysis. 241-251 - Kei Tanimoto, Susumu Ishihara:

NEMO-based Path Aggregation System Using Mobile Routers on Multiple Vehicles. 252-262 - Nguyen Thanh Hung, Hideto Ikeda, Kenzi Kuribayasi, Nikolaos Vogiatzis:

Reducing the Network Load in CREPEnvironment. 263-275
Volume 6, Number 2, 2011
- Youhei Tsukamoto, Masao Yanagisawa, Tatsuo Ohtsuki, Nozomu Togawa:

A Fast Selector-Based Subtract-Multiplication Unit and Its Application to Butterfly Unit. 276-285 - Hiroaki Yoshida, Masahiro Fujita:

Exact Minimum Factoring of Incompletely Specified Logic Functions via Quantified Boolean Satisfiability. 286-295 - Hiroki Noguchi, Yusuke Iguchi, Hidehiro Fujiwara, Shunsuke Okumura, Koji Nii, Hiroshi Kawaguchi, Masahiko Yoshimoto:

Design Choice in 45-nm Dual-Port SRAM - 8T, 10T Single End, and 10T Differential. 296-306 - Hiroki Noguchi, Tomoya Takagi, Koji Kugata, Shintaro Izumi, Masahiko Yoshimoto, Hiroshi Kawaguchi:

Data-Intensive Sound Acquisition System with Large-scale Microphone Array. 307-318 - Yoshiko Hanada, Mitsuji Muneyasu, Akira Asano:

Effectiveness of Genetic Multistep Search in Unsupervised Design of Morphological Filters for Noise Removal. 319-330 - Akito Taneda:

A Web Server for Multi-objective Pairwise RNA Sequence Alignment with an Index for Selecting Accurate Alignments. 331-337 - Joseph M. Pasia, Hernán E. Aguirre, Kiyoshi Tanaka:

Performance Analysis of Path Relinking on Many-objective NK-Landscapes. 338-351 - Kazuyuki Hara, Kentaro Katahira, Kazuo Okanoya, Masato Okada:

Statistical Mechanics of On-line Node-perturbation Learning. 352-361 - Kan Watanabe, Masaru Fukushi, Michitaka Kameyama:

Adaptive Group-Based Job Scheduling for High Performance and Reliable Volunteer Computing. 362-374 - Donghui Lin, Yohei Murakami, Masahiro Tanaka:

Designing Dynamic Control Mechanisms for Service Invocation. 375-384 - Ryosuke Sato, Kohei Suenaga, Naoki Kobayashi:

Ordered Types for Stream Processing of Tree-Structured Data. 385-398 - Malte Appeltauer, Robert Hirschfeld, Michael Haupt, Hidehiko Masuhara:

ContextJ: Context-oriented Programming with Java. 399-419 - Yuji Kosuga, Miyuki Hanaoka, Kenji Kono:

Generating Effective Attacks for Efficient and Precise Penetration Testing against SQL Injection. 420-433 - Toshinori Kojima, Masato Asahara, Kenji Kono, Ai Hayakawa:

Practical Approach to Integrating Network Coordinates with Distributed Hash Tables. 434-449 - Hajime Fujita, Yutaka Ishikawa:

DTS: Broadcast-based Content-aware TCP Connection Handover. 450-460 - Yoshihisa Abe, Hiroshi Yamada, Kenji Kono:

User-level Enforcement of Appropriate Background Process Execution. 461-480 - Sho Suzuki, Keiichirou Kusakari, Frédéric Blanqui:

Argument Filterings and Usable Rules in Higher-order Rewrite Systems. 481-492 - Shuji Yamada, Jinko Kanno, Miki Miyauchi:

Multi-sized Sphere Packing in Containers: Optimization Formula for Obtaining the Highest Density with Two Different Sized Spheres. 493-500 - Meindert Onno Wildeboer, Norishige Fukushima, Tomohiro Yendo, Mehrdad Panahpour Tehrani, Toshiaki Fujii, Masayuki Tanimoto:

A Semi-Automatic Depth Estimation Method for FTV. 501-507 - Jaak Simm, Masashi Sugiyama, Tsuyoshi Kato:

Computationally Efficient Multi-task Learning with Least-squares Probabilistic Classifiers. 508-515 - Tadaaki Hosaka, Takumi Kobayashi, Nobuyuki Otsu:

Object Detection Using Background Subtraction and Foreground Motion Estimation. 516-527 - Wei Li, Xiaojuan Wu, Hua-An Zhao:

New Techniques of Foreground Detection, Segmentation and Density Estimation for Crowded Objects Motion Analysis. 528-538 - Lu Yang, Tomohiro Yendo, Mehrdad Panahpour Tehrani, Toshiaki Fujii, Masayuki Tanimoto:

View Synthesis Using Probabilistic Reliability Reasoning for FTV. 539-545 - Tsutomu Inaba, Hiroyuki Takizawa, Hiroaki Kobayashi:

A Self-Organized Overlay Network Management Mechanism for Heterogeneous Environments. 546-559 - Akira Yamada, Hara Masanori, Yutaka Miyake:

Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation. 560-571 - Tsuyoshi Murata:

A New Tripartite Modularity for Detecting Communities. 572-579 - Ritsu Nomura, Masahiro Kuroda, Tadanori Mizuno:

Radio-Free Mutual Authentication for Cognitive Radio Network. 580-594 - Kriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

A Node Deployment Strategy for Efficient Sensing with Mobile Sensors in Sparse Sensor Networks. 595-609 - Hajime Tazaki, Rodney Van Meter, Ryuji Wakikawa, Keisuke Uehara, Jun Murai:

NAT-MANEMO: Route Optimization for Unlimited Network Extensibility in MANEMO. 610-620 - Kenji Ito, Noriyoshi Suzuki, Satoshi Makido, Hiroaki Hayashi:

Periodic Broadcast Timing Reservation Multiple Access for Inter-vehicle Communication. 621-632 - Katsunari Yoshioka, Yoshihiko Hosobuchi, Tatsunori Orii, Tsutomu Matsumoto:

Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems. 633-648 - Keisuke Takemori, Takahiro Sakai, Masakatsu Nishigaki, Yutaka Miyake:

Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists. 649-659 - Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada:

Hit-list Worm Detection Using Distributed Sliding Window. 660-669
Volume 6, Number 3, 2011
- Xavier Olive, Hiroshi Nakashima:

Efficient Representation of Constraints and Propagation of Variable-Value Symmetries in Distributed Constraint Reasoning. 670-679 - Dittaya Wanvarie, Hiroya Takamura, Manabu Okumura:

Active Learning with Subsequence Sampling Strategy for Sequence Labeling Tasks. 680-700 - Bernard Brosseau-Villeneuve, Noriko Kando, Jian-Yun Nie:

Construction of Context Models for Word Sense Disambiguation. 701-729 - Manabu Okumura, Kiyoaki Shirai, Kanako Komiya

, Hikaru Yokono:
On SemEval-2010 Japanese WSD Task. 730-744 - Young-joo Chung, Masashi Toyoda, Masaru Kitsuregawa:

A Study of Link Farm Evolution Using a Time-series of Web Snapshots. 745-758 - Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:

Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security. 759-776 - Daisuke Iwai, Felipe Toro, Noriko Nagata, Seiji Inokuchi:

Identification of Motion Features Affecting Perceived Rhythmic Sense of Virtual Characters through Comparison of Latin American and Japanese Dances. 777-784 - Halpage Chinthaka Nuwandika Premachandra, Tomohiro Yendo, Mehrdad Panahpour Tehrani, Takaya Yamazato, Hiraku Okada, Toshiaki Fujii, Masayuki Tanimoto:

LED Traffic Light Detection Using High-speed-camera Image Processing for Visible Light Communication. 785-791 - Tomoaki Yoshinaga, Shigeki Nagaya, Isao Karube:

Fast Method for Face Detection Based on the Characteristic of Cascade Classifier. 792-802 - Taiki Miyanishi, Kazuhiro Seki, Kuniaki Uehara:

Hypothesis Ranking Based on Semantic Event Similarities. 803-814 - Shinsuke Nakajima, Adam Jatowt, Yoichi Inagaki, Reyn Y. Nakamoto, Jianwei Zhang, Katsumi Tanaka:

Finding Good Predictors in Blogosphere Based on Temporal Analysis of Posting Patterns. 815-820 - Yuji Oyamada, Haruka Asai, Hideo Saito:

Blind Deconvolution for a Curved Motion Based on Cepstral Analysis. 821-832 - Kobkrit Viriyayudhakorn, Mizuhito Ogawa:

Associative Search on Shogi Game Records. 833-845 - Isabella Hatak, Dietmar Roessl:

Correlating Relational Competence with Trust. 846-855 - Daniel Lomsak, Jay Ligatti:

PoliSeer: A Tool for Managing Complex Security Policies. 856-870 - Pern Hui Chia, Georgios Pitsilis:

Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions.com. 871-883 - Christian Damsgaard Jensen, Povilas Pilkauskas, Thomas Lefévre:

Classification of Recommender Expertise in the Wikipedia Recommender System. 884-902 - Atsushi Terauchi, Kensuke Fukuda, Osamu Akashi:

IM-DB: Information Retrieval System for Interactive Network-Status Analysis. 903-913 - Stephen Marsh, Pamela Briggs, Khalil El-Khatib, Babak Esfandiari, John A. Stewart:

Defining and Investigating Device Comfort. 914-935 - Marcin Seredynski, Pascal Bouvry, Dominic Dunlop:

Performance Evaluation of Personal and General Data Classes for Trust Management in MANETs. 936-949 - Ahmad Bazzi, Yoshikuni Onozato:

Feasibility Study of Security Virtual Appliances for Personal Computing. 950-960 - Taro Yamamoto, Naoko Chiba, Fumihiko Magata, Katsumi Takahashi, Naoya Sekiya, Isao Nakamura, Morihiro Ogasahara, Yoshiaki Hashimoto:

Investigation on Anxieties while Using the Internet to Study about "Anshin". 961-969 - Toshihiko Takemura, Hideyuki Tanaka, Kanta Matsuura:

Analysis of Awareness Gap between Security Managers and Workers in an Organization with Regard to the Effectiveness of the Information Security Measures. 970-979 - Hiroyuki Sato, Akira Kubo:

Graded Trust of Certificates and Its Management with Extended Path Validation. 980-990 - Ayako Komatsu, Tsutomu Matsumoto:

Empirical Study on Privacy Concerns and the Acceptance of e-Money in Japan. 991-1000 - Leonardo A. Martucci, Sebastian Ries, Max Mühlhäuser:

Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services. 1001-1015 - Masahiro Koyama:

A Study of "Information security" in Internet Society: The Value Formation of Information Technology and Social Trust. 1016-1026
Volume 6, Number 4, 2011
- Philip Axer, Jonas Diemer, Mircea Negrean, Maurice Sebastian, Simon Schliecker, Rolf Ernst:

Mastering MPSoCs for Mixed-critical Applications. 1027-1052 - Seiji Kajihara, Satoshi Ohtake, Tomokazu Yoneda:

Delay Testing: Improving Test Quality and Avoiding Over-testing. 1053-1066 - Hirotaka Kawashima, Naofumi Takagi:

Partial Product Generation Utilizing the Sum of Operands for Reduced Area Parallel Multipliers. 1067-1075 - Masashi Tawada, Masao Yanagisawa, Tatsuo Ohtsuki, Nozomu Togawa:

Exact, Fast and Flexible L1 Cache Configuration Simulation for Embedded Systems. 1076-1091 - Zhao Lei, Daisuke Ikebuchi, Kimiyoshi Usami, Mitaro Namiki, Masaaki Kondo, Hiroshi Nakamura, Hideharu Amano:

Design and Implementation Fine-grained Power Gating on Microprocessor Functional Units. 1092-1102 - Keisuke Inoue, Mineo Kaneko:

Framework for Latch-based High-level Synthesis Using Minimum-delay Compensation. 1103-1115 - Yosuke Kakiuchi, Tomofumi Nakagawa, Kiyoharu Hamaguchi, Tadaaki Tanimoto, Masaki Nakanishi:

Symbolic Discord Computation for Efficient Analysis of Message Sequence Charts. 1116-1127 - Shuichi Oikawa, Jin Kawasaki:

Simultaneous Virtual-Machine Logging and Replay. 1128-1138 - Megumi Ito

, Shuichi Oikawa:
Making a Virtual Machine Monitor Interruptible. 1139-1148 - Sayaka Akioka, Yuki Ohno, Midori Sugaya, Tatsuo Nakajima:

A Library-based Performance Tool for Multicore Pervasive Servers. 1149-1157 - Shuji Morisaki, Yasutaka Kamei, Ken-ichi Matsumoto:

An Experimental Evaluation of the Effect of Specifying a Selected Defect Type in Software Inspection. 1158-1163 - Mebae Ushida, Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta:

Proxiable Designated Verifier Signature. 1164-1174 - Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:

Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves. 1175-1184 - Yoshiharu Kojima, Masahiko Sakai, Naoki Nishida, Keiichirou Kusakari, Toshiki Sakabe:

Decidability of Reachability for Right-shallow Context-sensitive Term Rewriting Systems. 1185-1208 - Nan Dun, Kenjiro Taura, Akinori Yonezawa:

Performance Evaluation of a Distributed File System with Locality-Aware Metadata Lookups. 1209-1220 - Meindert Onno Wildeboer, Tomohiro Yendo, Mehrdad Panahpour Tehrani, Toshiaki Fujii, Masayuki Tanimoto:

Depth Coding using Downsampling and View based Upsampling. 1221-1228 - Tangtisanon Pikulkaew, Hiroaki Kikuchi:

Perfect Privacy-preserving Automated Trust Negotiation. 1229-1240 - Hiroaki Kikuchi, Shuji Matsuo, Masato Terada:

Principal Component Analysis of Botnet Takeover. 1241-1250 - Asaad Ahmed, Keiichi Yasumoto, Yukiko Yamauchi, Minoru Ito:

Probabilistic Coverage Methods in People-Centric Sensing. 1251-1268 - Tomoko Yonezawa, Hirotake Yamazoe, Yuichi Koyama, Shinji Abe, Kenji Mase:

Assisting video communication by an intermediating robot system corresponding to each user's attitude. 1269-1281

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














