


default search action
Journal of Information Processing, Volume 20
Volume 20, Number 1, January 2012
- Gregory Hazelbeck, Hiroaki Saito:

A Tool for Creating Glossed Japanese Reading Materials. 1-10 - Yuanyuan Wang

, Kazutoshi Sumiya:
A Browsing Method for Presentation Slides Based on Semantic Relations and Document Structure for e-Learning. 11-25 - Jiongyao Ye, Hongfeng Ding, Yingtao Hu, Takahiro Watanabe:

A Behavior-based Adaptive Access-mode for Low-power Set-associative Caches in Embedded Systems. 26-36 - Norio Shiratori, Kenji Sugawara, Yusuke Manabe, Shigeru Fujita, Basabi Chakraborty:

Symbiotic Computing Based Approach Towards Reducing User's Burden Due to Information Explosion. 37-44 - Hideyuki Tokuda, Jin Nakazawa:

SenseCampus: Sensor enabled Cyber-Physical Coupling for Ubiquitous Services. 45-53 - Taye Mulugeta, Lei Shu

, Manfred Hauswirth, ZhangBing Zhou, Shojiro Nishio:
Secured Geographic Forwarding in Wireless Multimedia Sensor Networks. 54-64 - Gang Chen, Ke Chen, Dawei Jiang, Beng Chin Ooi, Lei Shi, Hoang Tam Vo, Sai Wu:

E3: an Elastic Execution Engine for Scalable Data Processing. 65-76 - Zheng Liu, Jeffrey Xu Yu, Hong Cheng:

Approximate Homogeneous Graph Summarization. 77-88 - Kentaro Hara, Kenjiro Taura

:
Half-process: A Process Partially Sharing Its Address Space with Other Processes. 89-103 - Kriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

Effective Node Deployment in Sparse Mobile Sensor Networks. 104-113 - Yanwei Xu, Yoshiharu Ishikawa

, Jihong Guan:
Efficient Continual Top-k Keyword Search in Relational Databases. 114-127 - Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani, Taiichi Yuasa:

Parallel Graph Traversals using Work-Stealing Frameworks for Many-core Platforms. 128-139 - Kentaro Hara, Kenjiro Taura

:
Parallel Computational Reconfiguration Based on a PGAS Model. 140-153 - Tsuyoshi Hisamatsu, Hitoshi Asaeda

:
Adaptive Overlay Network for High-Bandwidth Streaming. 154-166 - Yoshiaki Taniguchi, Akimitsu Kanzaki, Naoki Wakamiya, Takahiro Hara:

An Energy-Efficient Data Gathering Mechanism using Traveling Wave and Spatial Interpolation for Wireless Sensor Networks. 167-176 - Yuichi Hattori, Sozo Inoue:

A Large Scale Gathering System for Activity Data using Mobile Devices. 177-184 - Kazuhisa Matsuzono, Hitoshi Asaeda

, Jun Murai:
DP-FEC: Dynamic Probing FEC for High-Performance Real-Time Interactive Video Streaming. 185-195 - Hidehito Gomi:

Policy Provisioning and Its Access Control Beyond Administrative and Collaborative Domains. 196-206 - Hiroshi Ishii, Qiang Ma

, Masatoshi Yoshikawa:
Incremental Construction of Causal Network from News Articles. 207-215 - Keiji Shinzato, Tomohide Shibata, Daisuke Kawahara, Sadao Kurohashi:

TSUBAKI: An Open Search Engine Infrastructure for Developing Information Access Methodology. 216-227 - Naoki Yoshinaga, Masaru Kitsuregawa:

Efficient Classification with Conjunctive Features. 228-237 - Satoshi Yoshida, Takashi Uemura, Takuya Kida, Tatsuya Asai, Seishi Okamoto:

Improving Parse Trees for Efficient Variable-to-Fixed Length Codes. 238-249 - Supheakmungkol Sarin, Michael Fahrmair, Matthias Wagner, Wataru Kameyama:

Leveraging Features from Background and Salient Regions for Automatic Image Annotation. 250-266 - Ryo Yonetani, Hiroaki Kawashima, Takatsugu Hirayama, Takashi Matsuyama:

Mental Focus Analysis Using the Spatio-temporal Correlation between Visual Saliency and Eye Movements. 267-276 - Mamoun Nawahdah, Tomoo Inoue:

Motion Adaptive Orientation Adjustment of a Virtual Teacher to Support Physical Task Learning. 277-286 - Chenhao Wang, Zhencheng Hu, Roland Chapuis:

Predictive Lane Detection by Interaction with Digital Road Map. 287-296 - Quang Tran Minh, Eiji Kamioka

:
Adaptive Approaches in Mobile Phone Based Traffic State Estimation with Low Penetration Rate. 297-307 - Manabu Ito, Satoshi Komorita, Yoshinori Kitatsuji, Hidetoshi Yokota:

IMS-based Fast Session Handover with Available Network Resources Discovery of Access Networks. 308-318 - XingPing He, Sayaka Kamei

, Satoshi Fujita:
Autonomous Multi-Source Multi-Sink Routing in Wireless Sensor Networks. 319-326 - Shelly Sachdeva

, Aastha Madaan, Subhash Bhalla
:
Discovery of Patterns to Improve Usability of Electronic Health Record Systems. 327-339
Volume 20, Number 2, April 2012
- Yusuke Wada, Shigeru Kusakabe:

Performance Evaluation of A Testing Framework Using QuickCheck and Hadoop. 340-346 - Achmad Basuki

, Achmad Husni Thamrin
, Hitoshi Asaeda
, Jun Murai:
ODMT: On-demand Inter-domain Multicast Tunneling. 347-357 - Hironao Takahashi, Khalid Mahmood Malik

, Kinji Mori:
Autonomous L3 Cache Technolgy for High Responsiveness. 358-365 - Sherihan Abu Elenin, Masato Kitakami:

Proposal of Grid Monitoring System with Fault Tolerance. 366-377 - Ervianto Abdullah, Satoshi Fujita:

Prevent Contents Leaking in P2P CDNs with Robust and Quick Detection of Colluders. 378-385 - Yong Jin, Nariyoshi Yamai

, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. 386-395 - Masatoshi Sekine, Kurato Maeno:

Activity Recognition Using Radio Doppler Effect for Human Monitoring Service. 396-405 - Koji Ara, Tomoaki Akitomi, Nobuo Sato, Kunio Takahashi, Hideyuki Maeda, Kazuo Yano, Masao Yanagisawa:

Integrating Wearable Sensor Technology into Project-management Process. 406-418 - Mohammed Sahli, Tetsuo Shibuya:

Max-Shift BM and Max-Shift Horspool: Practical Fast Exact String Matching Algorithms. 419-425 - Satoshi Fujita, Yang Yang:

Efficient Shape Recognition of Dynamic Event Regions Using Wireless Sensor Networks. 426-434 - Chuzo Iwamoto, Junichi Kishi, Kenichi Morita

:
Lower Bound of Face Guards of Polyhedral Terrains. 435-437 - Shelly Sachdeva

, Subhash Bhalla
:
Visual Query Language for Archetype-Based Electronic Health Records Databases. 438-450 - Yang Chen, Ryo Kurachi, Gang Zeng, Hiroaki Takada:

The Worst-Case Response Time Analysis for FIFO-based Offset Assigned CAN Messages. 451-462 - Ting Ting Qin, Qi Cao, Qi Ying Wei, Satoshi Fujita:

A Tag-Based Scheme to Realize Real-Time File Search in Hierarchical Peer-to-Peer Systems. 463-471 - Tao Xu, Masahiro Watanabe, Masaki Bandai

, Takashi Watanabe
:
An RSSI-Based Cross Layer Protocol for Directional Ad Hoc Networks and Its Implementation. 472-479 - Tetsuya Arita, Fumio Teraoka:

PNEMO: A Network-Based Localized Mobility Management Protocol for Mobile Networks. 480-490 - Kotaro Ishitani, Hiroshi Yamamoto, Maki Yamamoto, Katsuyuki Yamazaki:

Development and Evaluation of Ecotourism Support System using One-seg Broadcasting with Mobile Networks. 491-495 - Mitsuhiro Hattori, Nori Matsuda, Takashi Ito, Yoichi Shibata, Katsuyuki Takashima, Takeshi Yoneda:

Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation. 496-507 - Tetsuo Iijima:

A Decision Making Model and Its Application to Airplane Accidents. 508-511 - Graham Neubig, Taro Watanabe, Eiichiro Sumita, Shinsuke Mori, Tatsuya Kawahara

:
Joint Phrase Alignment and Extraction for Statistical Machine Translation. 512-523
Volume 20, Number 3, July 2012
- Hark-Jin Lee, Young-Sung Son, Jun-Hee Park, Kyeong-Deok Moon, Jae-Cheol Ryou

:
General Middleware Bridge to Support Device Interoperability on Different Middlewares. 525-530 - Futoshi Sugimoto, Makoto Murakami, Chieko Kato:

A Method to Synthesize Three Dimensional Face Models by Mapping from a Word Space to a Physical Model Space and the Inspection of the Mapping Function. 531-536 - Masaharu Hirota

, Naoki Fukuta
, Shohei Yokoyama, Hiroshi Ishikawa:
A Robust Clustering Method for Missing Metadata in Image Search Results. 537-547 - Yuichi Murakami, Shingo Nakamura, Shuji Hashimoto:

An Article Kansei Retrieval System Combining Recommendation Function and Interaction Design. 548-558 - Yuki Hasegawa, Yoshinao Isobe

, Kazuhito Ohmaki, Hideki Mori, Kensei Tsuchida, Yasunori Shiono:
Implementation and Verification of Concurrent Sorting Algorithms with CSP based Architecture. 559-569 - Haruhisa Hasegawa, Noriaki Kamiyama, Hideaki Yoshino:

Traffic Management Scheme to Control Content Distribution with Cloud-based Architecture. 570-577 - Takuya Nishikawa, Satoshi Fujita:

A Reputation Management Scheme for Peer-to-Peer Networks based on the EigenTrust Trust Management Algorithm. 578-584 - Akiya Inoue, Yuuki Takano, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimatsu:

Mobile-carrier Choice Modeling Framework Under Competitive Conditions. 585-591 - Jasmine A. Malinao

, Richelle Ann B. Juayong, Rona May U. Tadlas, Jhoirene B. Clemente, Erlo Robert F. Oquendo, John Boaz Lee, Ma. Sheilah Gaabucayan-Napalang, Jose Regin F. Regidor, Henry N. Adorna
:
A Quantitative Analysis-based Algorithm for Optimal Data Signature Construction of Traffic Data Sets. 592-598 - Tomoo Sumida, Yasunori Shiono, Takaaki Goto

, Katsuyoshi Ito, Kensei Tsuchida:
Highly Efficient Transport Protocol for Large Capacity Data Files and its details. 599-606 - Naoki Fukuta

:
A Mobile Agent Approach for P2P-based Semantic File Retrieval. 607-613 - Hiroki Nakagawa, Akihiko Nagai, Takayuki Ito

:
A Middle-Agent Framework Focused on the Role of Distributors. 614-621 - Yasunori Shiono, Tomokazu Arita, Youzou Miyadera, Kimio Sugita, Takeo Yaku

, Kensei Tsuchida:
Automatic Generation of XML Files and Their Database Registration from Tabular Form Specifications. 622-632 - Ippei Torii, Kaoruko Ohtani, Takahito Niwa, Naohiro Ishii:

Information Visualization System For Activation of Shotengai. 633-639 - Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:

Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement. 640-648 - Satoshi Takahashi, Tokuro Matsuo:

A Decision Method in B2B E-Commerce Model based on Multi-Items Auction. 649-654 - Shohei Hido, Shoko Suzuki, Risa Nishiyama, Takashi Imamichi, Rikiya Takahashi, Tetsuya Nasukawa, Tsuyoshi Idé

, Yusuke Kanehira, Rinju Yohda, Takeshi Ueno, Akira Tajima, Toshiya Watanabe:
Modeling Patent Quality: A System for Large-scale Patentability Analysis using Text Mining. 655-666 - Hideki Tsuiki, Yohei Yokota:

Enumerating 3D-Sudoku Solutions over Cubic Prefractal Objects. 667-671 - Shane Dye, Nicola Ward Petty:

Rogo, a TSP-based Paper Puzzle: Optimization Approaches. 672-679 - Sascha Kurz:

Squaring the Square with Integer Linear Programming. 680-685 - Yoshifumi Manabe, Tatsuaki Okamoto:

Meta-envy-free Cake-cutting and Pie-cutting Protocols. 686-693 - Jonas Kölker:

Kurodoko is NP-Complete. 694-706 - Jonas Kölker:

The Magnets Puzzle is NP-Complete. 707-708 - Jonas Kölker:

Selected Slither Link Variants are NP-complete. 709-712 - Tetsuo Asano, Erik D. Demaine, Martin L. Demaine, Ryuhei Uehara

:
NP-completeness of generalized Kaboozle. 713-718 - Kevin Buchin

, Maike Buchin
:
Rolling Block Mazes are PSPACE-complete. 719-722 - Kenichiro Nakai, Yasuhiko Takenaga:

NP-Completeness of Pandemic. 723-726 - Kazuya Haraguchi, Yasutaka Abe, Akira Maruoka:

How to Produce BlockSum Instances with Various Levels of Difficulty. 727-737 - Daisuke Asai, Jarrod Orszulak, Richard Myrick, Chaiwoo Lee, Lisa A. D'Ambrosio, Kathryn M. Godfrey, Joseph F. Coughlin, Olivier L. de Weck

:
Enhance Communication between Parents and Mature Children by Sharing Medication Information. 738-748 - Mingmei Li, Naoki Imai, Kiyohito Yoshihara:

An Integration Method for Wireless Location Using Built-in Sensors of Mobile Phones and TDOA Landmarks. 749-756 - Nobuharu Kami, Teruyuki Baba, Satoshi Ikeda, Takashi Yoshikawa, Hiroyuki Morikawa:

Detecting Significant Locations from Raw GPS Data Using Random Space Partitioning. 757-766 - Takuro Kutsuna

, Shuichi Sato, Naoya Chujo:
Efficient Root Cause Detection in Complex Embedded Systems with Abstract Model-based Diagnosis. 767-773 - Amang Sudarsono

, Toru Nakanishi, Nobuo Funabiki:
A Pairing-Based Anonymous Credential System with Efficient Attribute Proofs. 774-784 - Masaharu Fukase, Kazunori Yamaguchi

:
Finding a Very Short Lattice Vector in the Extended Search Space. 785-795 - Sho Tsugawa, Hiroyuki Ohsaki, Makoto Imase:

Estimating Message Importance Using Inferred Inter-recipient Trust for Supporting Email Triage. 796-805
Volume 20, Number 4, October 2012
- Hong Cheng, Jeffrey Xu Yu:

Clustering Large Attributed Graph. 806-813 - Ryôichi Sasaki:

Considerations on Risk Communication for IT Systems and Development of Support Systems. 814-822
- Satoru Torii:

Editor's Message to Special Issue on Computer Security Technology Achieving Smart Society. 823 - Terry Benzel, John Wroclawski:

The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation. 824-834 - Takahiro Kasama, Katsunari Yoshioka

, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto
, Daisuke Inoue, Koji Nakao:
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior. 835-845 - Ruan Na, Takashi Nishide, Yoshiaki Hori:

Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. 846-853 - Hidenori Kuwakado:

Length-preserving CBC Enciphering Scheme and Its Security Analysis. 854-860
- Naoto Kiribuchi

, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura:
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation. 861-870 - Isao Goto, Masao Utiyama, Takashi Onishi, Eiichiro Sumita:

An Empirical Comparison of Parsers in Constraining Reordering for E-J Patent Machine Translation. 871-882

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














