


default search action
Journal of Information Processing, Volume 16
Volume 16, April-December 2008
- Koji Ara, Naoto Kanehira, Daniel Olguín Olguín, Benjamin N. Waber, Taemie Kim, Akshay Mohan, Peter A. Gloor, Rob Laubacher, Daniel Oster, Alex Pentland, Kazuo Yano:

Sensible Organizations: Changing Our Businesses and Work Styles through Sensor Data. 1-12 - Naoshi Uchihira

, Yuji Kyoya, Sun K. Kim, Katsuhiro Maeda, Masanori Ozawa, Kosuke Ishii:
Analysis and Design Methodology for Recognizing Opportunities and Difficulties for Product-based Services. 13-26 - Weihua Sun, Junya Fukumoto, Hirozumi Yamaguchi

, Shinji Kusumoto, Teruo Higashino:
A Contact-based Hybrid Routing Protocol for Mobile Ad Hoc Networks. 27-37 - Ben Yan, Masahide Nakamura, Lydie du Bousquet, Ken-ichi Matsumoto:

Validating Safety for the Integrated Services of the Home Network System Using JML. 38-49 - Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:

Analysis of Probabilistic Trapezoid Protocol for Data Replication. 50-63 - Toshihiko Sasama, Hiroshi Masuyama, Kazuya Murakami:

Algorithms for Energy-Efficient Broad- and Multi-Casting in Wireless Networks. 64-67 - Maike Erdmann, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:

Extraction of Bilingual Terminology from a Multilingual Web-based Encyclopedia. 68-79 - Satoshi Matsuura, Kazutoshi Fujikawa, Hideki Sunahara:

Implementation Methodology of Geographical Overlay Network Suitable for Ubiquitous Sensing Environment. 80-92 - Toshihiko Yamakami:

A Stream-mining Oriented User Identification Algorithm Based on a Day Scale Click Regularity Assumption in Mobile Clickstreams. 93-99 - Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi:

Estimation of Increase of Scanners Based on ISDAS Distributed Sensors. 100-109 - Toru Nakanishi, Nobuo Funabiki:

Efficient Revocable Group Signature Schemes Using Primes. 110-121 - Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka:

Extending Bleichenbacher's Forgery Attack. 122-129 - Kazuhide Fukushima

, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. 130-141 - Yi Yin, Yoshiaki Katayama, Naohisa Takahashi:

Detection of Conflicts Caused by a Combination of Filters Based on Spatial Relationships. 142-156 - Takeshi Okuda, Suguru Yamaguchi:

Lightweight Vulnerability Management System. 157-164 - Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew:

Automated Port-scan Classification with Decision Tree and Distributed Sensors. 165-175 - Atsuko Miyaji

, Kenji Mizosoe:
Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point. 176-189 - Zhenbao Liu, Jun Mitani, Yukio Fukui, Seiichi Nishihara:

A New 3D Shape Retrieval Method Using Spherical Healpix. 190-200 - Masayoshi Shimamura, Katsuyoshi Iida

, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi:
Hose Bandwidth Allocation Method to Achieve a Minimum Throughput Assurance Service for Provider Provisioned VPNs. 201-218

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














