


default search action
Journal of Information Processing, Volume 21
Volume 21, Number 1, January 2013
- Tetsuo Imai, Atsushi Tanaka:

Expected Price of Anarchy for the Dynamic Network Formation Game Model. 2-8 - Naoki Fukuta

:
An Approach to VCG-like Approximate Allocation and Pricing for Large-scale Multi-unit Combinatorial Auctions. 9-15 - Akira Ura, Daisaku Yokoyama, Takashi Chikayama:

Two-level Task Scheduling for Parallel Game Tree Search Based on Necessity. 17-25 - Kazuya Haraguchi:

The Number of Inequality Signs in the Design of Futoshiki Puzzle. 26-32 - Shin'ichi Shiraishi:

Qualitative Comparison of ADL-Based Approaches to Real-World Automotive System Development. 34-45 - Makoto Sugihara, Akihito Iwanaga:

Minimization of FlexRay Bus Bandwidth for Hard Real-Time Applications. 46-52 - Midori Sugaya, Hiroki Takamura, Yoichi Ishiwata, Satoshi Kagami, Kimio Kuramitsu

:
Online Kernel Log Analysis for Robotics Application. 53-66 - Patcharee Basu, Achmad Basuki

, Achmad Husni Thamrin
, Keiko Okawa, Jun Murai:
Collaborating Remote Computer Laboratory and Distance Learning Approach for Hands-on IT Education. 67-74 - Quang Tran Minh, Muhammad Ariff Baharudin, Eiji Kamioka

:
MC-TES: An Efficient Mobile Phone Based Context-Aware Traffic State Estimation Framework. 76-89 - Huiting Cheng, Yasushi Yamao:

Performance Analysis of ITS V2V Broadcast Communication Using CSMA/CA and a Roadside Relay Station at Intersections. 90-98 - Yuichiro Otsuka, Junshan Hu, Tomoo Inoue:

Tabletop dish recommendation system for social dining: Group FDT design based on the investigations of dish recommendation. 100-108 - Kazuhisa Matsuzono, Hitoshi Asaeda

, Osamu Nakamura, Jun Murai:
GENEVA: Streaming Control Algorithm Using Generalized Multiplicative-increase/additive-decrease. 109-121 - Hiroki Oda, Hiroyuki Hisamatsu, Hiroshi Noborio:

Compound TCP+: A Solution for Compound TCP Unfairness in Wireless LAN. 122-130 - Odira Elisha Abade, Katsuhiko Kaji, Nobuo Kawaguchi

:
Scalable QoS for XCAST Using Differentiated Services Architecture. 131-144 - Tetsuya Sakai:

Web Search Evaluation with Informational and Navigational Intents. 145-155
Volume 21, Number 2, April 2013
- Kiyohiro Shikano:

Comparison of Methods for Topic Classification of Spoken Inquiries. 157-167 - Xinhui Hu, Shigeki Matsuda, Chiori Hori, Hideki Kashioka:

Collecting Colloquial and Spontaneous-like Sentences from Web Resources for Constructing Chinese Language Models of Speech Recognition. 168-175 - Satoshi Natori, Yuto Furuya, Hiromitsu Nishizaki, Yoshihiro Sekiguchi:

Spoken Term Detection Using Phoneme Transition Network from Multiple Speech Recognizers' Outputs. 176-185 - Noppawat Chaisamran, Takeshi Okuda, Suguru Yamaguchi:

Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships. 188-197 - Yuki Sakai, Akira Uchiyama, Hirozumi Yamaguchi

, Teruo Higashino:
Self-Estimation of Neighborhood Distribution for Mobile Wireless Nodes. 198-205 - Xuejun Tian, Dejian Ye, Tetsuo Ideguchi, Takashi Okuda:

A Proposal of Quasi-Distributed WLAN MAC Protocol with High Throughput and Traffic Adaptability. 206-215 - Masaaki Ohnishi, Masugi Inoue, Hiroaki Harai:

Incremental Distributed Construction Method of Delaunay Overlay Network on Detour Overlay Paths. 216-224 - Hiroshi Yamamoto, Katsuyuki Yamazaki:

LISP-based Application-Layer Multicasting System for a Content Distribution Network. 226-236 - Takashi Yamanoue

, Kentaro Oda, Koichi Shimozono:
A Malicious Bot Capturing System using a Beneficial Bot and Wiki. 237-245 - Daichi Sakaue, Katsutoshi Itoyama, Tetsuya Ogata

, Hiroshi G. Okuno
:
Robust Multipitch Analyzer against Initialization based on Latent Harmonic Allocation using Overtone Corpus. 246-255 - Satoshi Tojo, Keiji Hirata:

Distance and Similarity of Time-span Trees. 256-263 - Gen Hori, Hirokazu Kameoka, Shigeki Sagayama:

Input-Output HMM Applied to Automatic Arrangement for Guitars. 264-271 - Kazuhiko Yamamoto:

Possessing Drums: An Interface of Musical Instruments that Assigns Arbitrary Timbres to Personal Belongings. 274-282 - Chika Oshima, Naoki Itou, Kazushi Nishimoto, Kiyoshi Yasuda, Naohito Hosoi, Hiromi Yamashita, Koichi Nakayama, Etsuo Horikawa:

A Music Therapy System for Patients with Dementia who Repeat Stereotypical Utterances. 283-294 - Kana Misawa, Yoshio Ishiguro, Jun Rekimoto:

LiveMask: A Telepresence Surrogate System with a Face-Shaped Screen for Supporting Nonverbal Communication. 295-303 - Yusuke Suzuki, Motoki Terashima, Koichi Takeuchi, Hideaki Kuzuoka

:
An Object-Defined Remote Robot Control Interface. 304-314 - Tsubasa Saito:

Fast Computation of the n-th Root in Quad-double Arithmetic Using a Fourth-order Iterative Scheme. 315-319 - Tatsuya Abe, Yutaka Arakawa

, Shigeaki Tagashira, Akira Fukuda:
Energy-efficient Data Collection Method with Multiple Deadlines for Wireless Sensor Networks. 320-328 - Khamisi Kalegele

, Hideyuki Takahashi, Johan Sveholm, Kazuto Sasai, Gen Kitagata, Tetsuo Kinoshita
:
Numerosity Reduction for Resource Constrained Learning. 329-341 - Yu Suzuki:

Effects of Implicit Positive Ratings for Quality Assessment of Wikipedia Articles. 342-348 - Mikio Shinya, Yoshinori Dobashi, Kei Iwasaki

, Michio Shiraishi, Tomoyuki Nishita:
A Simplified Plane-parallel Scattering Model for Rendering Densely Distributed Objects such as Foliage. 349-357 - Takeshi Miura, Naho Matsumoto, Takaaki Kaiga, Hiroaki Katsura, Katsubumi Tajima, Hideo Tamamoto:

Indexing of Motion Capture Data Using Feature Vectors Derived from Posture Variation. 358-361 - Toshiharu Horiuchi

, Shinya Takayama, Tsuneo Kato:
Passive Pointing System for Distant Screens Using Acoustic Position Estimator and Gravity Sensor. 362-366
Volume 21, Number 3, July 2013
- Zachary Abel, Erik D. Demaine, Martin L. Demaine, Sarah Eisenstat, Jayson Lynch, Tao B. Schardl:

Finding a Hamiltonian Path in a Cube with Specified Turns is Hard. 368-377 - Paul Cull, Leanne Merrill, Tony Van:

A Tale of Two Puzzles: Towers of Hanoi and Spin-Out. 378-392 - Koki Hamada:

A Picturesque Maze Generation Algorithm with Any Given Endpoints. 393-397 - Osamu Ikawa, Osamu Shimabukuro:

Square Subgroup of Rubik's Cube Group. 398-401 - Tomomi Matsui

:
NP-completeness of Arithmetical Restorations. 402-404 - Akihiro Uejima, Fuhito Yanagitani, Shohei Tsukamoto:

The Complexity of Tantrix Match Puzzles with Four Colors. 405-412 - Heyong Wang, Carl K. Chang, Hen-I Yang, Yanping Chen:

Estimating the Relative Importance of Nodes in Social Networks. 414-422 - Takamichi Nishijima, Hiroyuki Ohsaki, Makoto Imase:

Automatic Parallelism Tuning Mechanism for Heterogeneous IP-SAN Protocols in Long-fat Networks. 423-432 - Yoshihiro Ohsumi, Kiyohiko Okayama, Nariyoshi Yamai

:
A Configuration of Location Free Network Applicable to Location Dependent Services. 433-440 - Yong Jin, Takuya Yamaguchi, Nariyoshi Yamai

, Kiyohiko Okayama, Motonori Nakamura:
A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming. 441-449 - Ikuo Nakagawa, Kenichi Nagami:

Jobcast - Parallel and distributed processing framework Data processing on a cloud style KVS database. 450-457 - Kazuyuki Tasaka, Takashi Ozu, Akira Idoue:

An Account Provision and Management Architecture for Messaging Services in Emergencies. 458-467 - Yoshimichi Tanizawa, Takeshi Ishihara, Yuichiro Oyama, Takaomi Murakami, Tsuyoshi Kogawa, Eiji Kamagata, Kotaro Ise:

Zero-watt Networked Standby: Reducing Power Consumption of Home A/V Network Systems. 468-480 - Yusuke Sakumoto, Hiroyuki Ohsaki, Makoto Imase:

A Method for Accelerating Flow-level Network Simulation with Low-pass Filtering of Fluid Models. 481-489 - Hiroshi Yamamoto, Katsuyuki Yamazaki:

Evaluation of Coexisting Enhanced TCP Flows on the High-speed Internetworking Satellite (WINDS). 490-494 - Ravi Santosh Arvapally, Xiaoqing (Frank) Liu, Hojong Baik:

Collaborative Air Traffic Decision Support Based on Web-based Intelligent Argumentation. 495-506 - Muhammad Asif Hossain Khan, Masayuki Iwai, Kaoru Sezaki:

An Improved Classification Strategy for Filtering Relevant Tweets Using Bag-of-Word Classifiers. 507-516 - Kazunori Fujiwara, Akira Sato, Kenichi Yoshida:

DNS Traffic Analysis - CDN and the World IPv6 Launch. 517-526 - Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi:

A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets. 527-538 - Daiki Chiba

, Kazuhiro Tobe, Tatsuya Mori
, Shigeki Goto:
Analyzing Spatial Structure of IP Addresses for Detecting Malicious Websites. 539-550 - Hsuan-Chun Liao, Mochamad Asri, Tsuyoshi Isshiki, Dongju Li, Hiroaki Kunieda:

Flexible and High Performance ASIPs for Pixel Level Image Processing and Two Dimensional Image Processing. 552-562 - Makoto Sugihara, Akihito Iwanaga:

Slot Multiplexing Optimization for Minimizing the Operating Frequency of a FlexRay Bus under Hard Real-time Constraints. 563-571 - Hirokazu Kodera, Masao Yanagisawa, Nozomu Togawa

:
Scan-based Attack against DES and Triple DES Cryptosystems Using Scan Signatures. 572-579 - Tomohiro Kokogawa, Yuji Maeda, Takahiro Matsui, Junko Itou, Jun Munemori:

The Effect of Using Photographs in Idea Generation Support System. 580-587
Volume 21, Number 4, October 2013
- Kouya Tochikubo:

New Construction Methods of Secret Sharing Schemes Based on Authorized Subsets. 590-598 - Takanori Isobe, Toshihiro Ohigashi

, Masakatu Morii:
Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack. 599-606 - Masayuki Ohrui, Hiroaki Kikuchi, Nur Rohman Rosyid

, Masato Terada:
Mining Botnet Coordinated Attacks using Apriori-PrefixSpan Hybrid Algorithm. 607-616 - Hiroaki Kikuchi, Anna Mochizuki:

Privacy-preserving Collaborative Filtering Using Randomized Response. 617-623 - Guillermo Horacio Ramirez Caceres, Yoshimi Teshigawara:

A Threat Model for Security Specification in Security Evaluation by ISO/IEC 19791. 624-631 - Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto:

Detection of Unexpected Services and Communication Paths in Networked Systems. 632-639 - Jinxiao Zhu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:

Effects of Channel Correlation on Outage Secrecy Capacity. 640-649 - Ning Li, Yuki Kinebuchi, Hiromasa Shimada, Tatsuo Nakajima:

An Extensible Secure OS Architecture for Embedded Systems. 650-659 - Masashi Saito, Shin-Ichi Nakano:

Two Compact Codes for Rectangular Drawings with Degree Four Vertices. 660-664 - Jun Shinomiya, Yuuichi Teranishi, Kaname Harumoto, Shojiro Nishio:

A Sensor Data Collection Method for Multi-granularity Contour Lines Map Creations on an Overlay Network. 665-673 - Makoto Fujisawa, Yojiro Mandachi, Kenjiro T. Miura:

Calculation of Velocity on an Implicit Surface by Curvature Invariance. 674-680

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














