


default search action
Journal of Information Processing, Volume 19
Volume 19, January-December 2011
- Kei Tanimoto, Susumu Ishihara

:
NEMO-based Path Aggregation System Using Mobile Routers on Multiple Vehicles. 1-11 - Nguyen Thanh Hung, Hideto Ikeda, Kenzi Kuribayasi, Nikolaos Vogiatzis:

Reducing the Network Load in CREPEnvironment. 12-24 - Tsutomu Inaba, Hiroyuki Takizawa

, Hiroaki Kobayashi:
A Self-Organized Overlay Network Management Mechanism for Heterogeneous Environments. 25-38 - Kan Watanabe, Masaru Fukushi, Michitaka Kameyama:

Adaptive Group-Based Job Scheduling for High Performance and Reliable Volunteer Computing. 39-51 - Donghui Lin

, Yohei Murakami
, Masahiro Tanaka:
Designing Dynamic Control Mechanisms for Service Invocation. 52-61 - Akira Yamada, Hara Masanori, Yutaka Miyake:

Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation. 62-73 - Ryosuke Sato

, Kohei Suenaga
, Naoki Kobayashi
:
Ordered Types for Stream Processing of Tree-Structured Data. 74-87 - Ritsu Nomura, Masahiro Kuroda, Tadanori Mizuno:

Radio-Free Mutual Authentication for Cognitive Radio Network. 88-102 - Kriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

A Node Deployment Strategy for Efficient Sensing with Mobile Sensors in Sparse Sensor Networks. 103-117 - Hajime Tazaki

, Rodney Van Meter
, Ryuji Wakikawa, Keisuke Uehara, Jun Murai:
NAT-MANEMO: Route Optimization for Unlimited Network Extensibility in MANEMO. 118-128 - Hiroki Noguchi, Tomoya Takagi, Koji Kugata, Shintaro Izumi, Masahiko Yoshimoto, Hiroshi Kawaguchi

:
Data-Intensive Sound Acquisition System with Large-scale Microphone Array. 129-140 - Kenji Ito, Noriyoshi Suzuki, Satoshi Makido, Hiroaki Hayashi:

Periodic Broadcast Timing Reservation Multiple Access for Inter-vehicle Communication. 141-152 - Katsunari Yoshioka, Yoshihiko Hosobuchi, Tatsunori Orii, Tsutomu Matsumoto:

Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems. 153-168 - Keisuke Takemori, Takahiro Sakai, Masakatsu Nishigaki

, Yutaka Miyake:
Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists. 169-179 - Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada:

Hit-list Worm Detection Using Distributed Sliding Window. 180-189 - Wei Li, Xiaojuan Wu, Hua-An Zhao:

New Techniques of Foreground Detection, Segmentation and Density Estimation for Crowded Objects Motion Analysis. 190-200 - Xavier Olive

, Hiroshi Nakashima:
Efficient Representation of Constraints and Propagation of Variable-Value Symmetries in Distributed Constraint Reasoning. 201-210 - Yuko Murayama:

Special Issue: Trust Management. 211 - Taro Yamamoto, Naoko Chiba, Fumihiko Magata, Katsumi Takahashi, Naoya Sekiya, Isao Nakamura, Morihiro Ogasahara, Yoshiaki Hashimoto:

Investigation on Anxieties while Using the Internet to Study about "Anshin". 212-220 - Isabella Hatak

, Dietmar Roessl:
Correlating Relational Competence with Trust. 221-230 - Stephen Marsh, Pamela Briggs

, Khalil El-Khatib, Babak Esfandiari, John A. Stewart:
Defining and Investigating Device Comfort. 231-252 - Toshihiko Takemura, Hideyuki Tanaka, Kanta Matsuura

:
Analysis of Awareness Gap between Security Managers and Workers in an Organization with Regard to the Effectiveness of the Information Security Measures. 253-262 - Hiroyuki Sato, Akira Kubo:

Graded Trust of Certificates and Its Management with Extended Path Validation. 263-273 - Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph

:
Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security. 274-291 - Daniel Lomsak, Jay Ligatti:

PoliSeer: A Tool for Managing Complex Security Policies. 292-306 - Ayako Komatsu, Tsutomu Matsumoto:

Empirical Study on Privacy Concerns and the Acceptance of e-Money in Japan. 307-316 - Leonardo A. Martucci, Sebastian Ries, Max Mühlhäuser:

Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services. 317-331 - Pern Hui Chia, Georgios Pitsilis:

Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions.com. 332-344 - Christian Damsgaard Jensen, Povilas Pilkauskas, Thomas Lefévre:

Classification of Recommender Expertise in the Wikipedia Recommender System. 345-363 - Marcin Seredynski, Pascal Bouvry

, Dominic Dunlop:
Performance Evaluation of Personal and General Data Classes for Trust Management in MANETs. 364-377 - Ahmad Bazzi, Yoshikuni Onozato:

Feasibility Study of Security Virtual Appliances for Personal Computing. 378-388 - Masahiro Koyama:

A Study of "Information security" in Internet Society: The Value Formation of Information Technology and Social Trust. 389-399 - Shuichi Oikawa, Jin Kawasaki:

Simultaneous Virtual-Machine Logging and Replay. 400-410 - Megumi Ito, Shuichi Oikawa:

Making a Virtual Machine Monitor Interruptible. 411-420 - Sayaka Akioka, Yuki Ohno, Midori Sugaya, Tatsuo Nakajima:

A Library-based Performance Tool for Multicore Pervasive Servers. 421-429 - Mebae Ushida, Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta:

Proxiable Designated Verifier Signature. 430-440 - Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:

Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves. 441-450 - Tangtisanon Pikulkaew, Hiroaki Kikuchi:

Perfect Privacy-preserving Automated Trust Negotiation. 451-462 - Hiroaki Kikuchi, Shuji Matsuo, Masato Terada:

Principal Component Analysis of Botnet Takeover. 463-472 - Asaad Ahmed

, Keiichi Yasumoto
, Yukiko Yamauchi, Minoru Ito:
Probabilistic Coverage Methods in People-Centric Sensing. 473-490

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














