


default search action
Journal of Information Processing, Volume 29
Volume 29, 2021
- Shunsuke Inenaga:

Towards a Complete Perspective on Labeled Tree Indexing: New Size Bounds, Efficient Constructions, and Beyond. 1-13 - Akifumi Inoue:

Editor's Message to Special Issue of Collaboration Technologies and Network Services toward the Sustainable Society. 14-15 - Abu Nowshed Chy, Umme Aymun Siddiqua, Masaki Aono:

Exploiting Transfer Learning and Hand-Crafted Features in a Unified Neural Model for Identifying Actionable Informative Tweets. 16-29 - Ryo Ishii, Ryuichiro Higashinaka, Koh Mitsuda, Taichi Katayama, Masahiro Mizukami, Junji Tomita, Hidetoshi Kawabata, Emi Yamaguchi, Noritake Adachi, Yushi Aono:

Methods for Efficiently Constructing Text-dialogue-agent System using Existing Anime Characters. 30-44 - Ken Ohta

:
Editor's Message to Special Issue of Mobile and Intelligent Transportation Systems Evolving Society in the 5G Era. 45 - Akira Uchiyama, Shunsuke Saruwatari, Takuya Maekawa, Kazuya Ohara, Teruo Higashino:

Context Recognition by Wireless Sensing: A Comprehensive Survey. 46-57 - Kenta Urano, Kei Hiroi, Takuro Yonezawa

, Nobuo Kawaguchi
:
An End-to-End BLE Indoor Localization Method Using LSTM. 58-69 - Ryosuke Hasegawa, Akira Uchiyama, Takuya Magome, Juri Tatsumi, Teruo Higashino:

Maneuver and Turn Classification in Wheelchair Basketball Using Inertial Sensors. 70-80 - Yuta Ishizaki, Yurie Koyama, Toshinori Takayama, Nozomu Togawa

:
A Route Recommendation Method Considering Individual User's Preferences by Monte-Carlo Tree Search and Its Evaluations. 81-92 - Naoki Fukushi, Daiki Chiba

, Mitsuaki Akiyama, Masato Uchida
:
A Comprehensive Measurement of Cloud Service Abuse. 93-102 - Hideaki Goto:

Inter-federation Roaming Architecture for Large-scale Wireless LAN Roaming Systems. 103-112 - Takuo Suganuma:

Editor's Message to Special Issue of Network Services and Distributed Processing. 113-114 - Nguyen Minh Tri

, Masahiro Shibata, Masato Tsuru:
Effective Route Scheme of Multicast Probing to Locate High-loss Links in OpenFlow Networks. 115-123 - Arnan Maipradit

, Tomoya Kawakami, Ying Liu, Juntao Gao, Minuro Ito:
An Adaptive Traffic Signal Control Scheme Based on Back-pressure with Global Information. 124-131 - Ushio Yamamoto:

Receiver-prioritized Next Transmission in Multichannel MAC Protocol for Wireless Ad-hoc Networks. 132-139 - Eiji Nii, Shoma Nishigami, Takamasa Kitanouma, Hiroyuki Yomo, Yasuhisa Takizawa:

Dynamic Swarm Spatial Scaling for Mobile Sensing Cluster in a Noisy Environment. 140-148 - Miya Fukumoto, Takuya Yoshihiro:

Localization with Portable APs in Ultra-Narrow-Band-based LPWA Networks. 149-156 - Hiroko Nagashima, Yuka Kato:

Flexible Imputation Method for Sensor Data based on Programming by Example: APREP-S. 157-165 - Yuki Matsuyama, Shuichi Miyazaki:

Hardness of Instance Generation with Optimal Solutions for the Stable Marriage Problem. 166-173 - Masaki Umeda, Atusi Maeda:

Packrat Parsers Can Support Multiple Left-recursive Calls at the Same Position. 174-187 - Shohei Matsugu, Hiroaki Shiokawa, Hiroyuki Kitagawa:

Fast Algorithm for Attributed Community Search. 188-196 - Mikifumi Shikida:

Editor's Message to Special Issue of the Internet and Operation Technologies for Comfortable Administrations and Operations. 197 - Motoyuki Ohmori

, Naoki Miyata, Koji Okamura:
AXARPSC: Scalable ARP Snooping Using Policy-based Mirroring of Core Switches with ARP Log Contraction. 198-204 - Shin-ichi Minato:

Editor's Message to Special Issue of Young Researchers' Papers. 205 - Shiori Endo, Yoshinari Takegawa, Ayaka Funaki, Kohei Matsumura, Keiji Hirata, Takeo Igarashi:

Construction of a Switching Support System for Live Broadcast of Oral Presentation. 206-214 - Hironori Nakajo:

Editor's Message to Special Issue of Embedded Systems Engineering. 215 - Shingo Igarashi, Takuro Fukunaga, Takuya Azumi:

Accurate Contention-aware Scheduling Method on Clustered Many-core Platform. 216-226 - Keita Miura, Shota Tokunaga, Yuki Horita, Yasuhiro Oda, Takuya Azumi:

CoSAM: Co-Simulation Framework for ROS-based Self-driving Systems and MATLAB/Simulink. 227-235 - Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa

:
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. 236-246 - Hideyuki Tanaka, Yuichi Sudo

, Hirotsugu Kakugawa, Toshimitsu Masuzawa, Ajoy K. Datta:
A Self-stabilizing 1-maximal Independent Set Algorithm. 247-255 - Korakoch Wilailux

, Sudsanguan Ngamsuriyaroj:
Novel Bi-directional Flow-based Traffic Generation Framework for IDS Evaluation and Exploratory Data Analysis. 256-265 - Koji Shima, Hiroshi Doi:

New Proof Techniques Using the Properties of Circulant Matrices for XOR-based (k, n) Threshold Secret Sharing Schemes. 266-274 - Ryoya Yaguchi, Sayaka Shiota, Nobutaka Ono, Hitoshi Kiya:

Replay Attack Detection Based on Spatial and Spectral Features of Stereo Signal. 275-282 - Shigeto Suzuki, Michiko Hiraoka, Takashi Shiraishi, Enxhi Kreshpa, Takuji Yamamoto, Hiroyuki Fukuda, Shuji Matsui, Masahide Fujisaki, Atsuya Uno:

Power Prediction for Sustainable HPC. 283-294 - Shinpei Hayashi:

Editor's Message to Special Issue of Software Engineering. 295 - Shi Qiu, Daniel M. Germán, Katsuro Inoue:

Empirical Study on Dependency-related License Violation in the JavaScript Package Ecosystem. 296-304 - Kunihiro Noda, Takashi Kobayashi

, Kiyoshi Agusa:
Constructing Object Groups Corresponding to Concepts for Recovery of a Summarized Sequence Diagram. 305-320 - Toshiaki Noumi, Seiichi Inoue, Haruka Fujita, Kugatsu Sadamitsu, Makoto Sakaguchi, Akiko Tenma, Hironori Nakagami:

Epitope Prediction of Antigen Protein Using Attention-based LSTM Network. 321-327 - Shuhei Tarashima:

Sports Field Recognition Using Deep Multi-task Learning. 328-335 - Kiminori Matsuzaki:

Developing Value Networks for Game 2048 with Reinforcement Learning. 336-346 - Yuanfeng Pang, Takeshi Ito:

Visualizing and Understanding Policy Networks of Computer Go. 347-359 - Ryo Masumura, Taichi Asami, Takanobu Oba, Sumitaka Sakauchi:

Hierarchical Latent Words Language Models for Automatic Speech Recognition. 360-369 - Hiroki Watanabe

, Hiroaki Kakizawa, Masanori Sugimoto:
User Authentication Method Using Active Acoustic Sensing. 370-379 - Yoshio Kakizaki

:
Editor's Message to Special Issue of Information Systems. 380 - Songpon Teerakanok

, Tetsutaro Uehara
, Atsuo Inomata:
A Secure Cloud-centric IoT Framework for Smart Device Registration. 381-391 - Takashi Koide, Daiki Chiba

, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
Understanding the Fake Removal Information Advertisement Sites. 392-405 - Takayuki Nakatsuka

, Kazuyoshi Yoshii, Yuki Koyama, Satoru Fukayama, Masataka Goto
, Shigeo Morishima
:
MirrorNet: A Deep Reflective Approach to 2D Pose Estimation for Single-Person Images. 406-423 - Naruki Shirahama

, Satoshi Watanabe
, Kenji Moriya, Kazuhiro Koshi, Keiji Matsumoto:
A New Method of Subjective Evaluation Using Visual Analog Scale for Small Sample Data Analysis. 424-433 - Tatsuya Abe

, Tasuku Hiraishi:
An Extensionally Equivalence-ensured Language for Task Parallel Processing with Backtracking-based Load Balancing. 434-448 - Man Yiu Chow, Mitsuhiro Kitani:

Heterogeneous Sensor Fusion with GMPHD for Environmentally Adaptable Obstacle Detection in Mobility Systems. 449-464 - Yukimasa Nagai, Takenori Sumi, Jianlin Guo, Philip V. Orlik, Hiroshi Mineno

:
IEEE 802.19.3 Standardization for Coexistence of IEEE 802.11ah and IEEE 802.15.4g Systems in Sub-1GHz Frequency Bands. 465-477 - Ryusuke Nakashima, Masahiro Yasugi, Hiroshi Yoritaka, Tasuku Hiraishi, Seiji Umatani:

Work-stealing Strategies That Consider Work Amount and Hierarchy. 478-489 - Sangwhan Moon, Naoaki Okazaki:

Effects and Mitigation of Out-of-vocabulary in Universal Language Models. 490-503 - Katsunari Yoshioka:

Editor's Message to Special Issue of Computer Security Technologies for Realizing Society 5.0. 504 - Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe:

Real-time Container Integrity Monitoring for Large-Scale Kubernetes Cluster. 505-514 - Hikaru Tsuchida

, Takashi Nishide:
Client-aided Robust Bit-composition Protocol with Deterministic Cheater Identification in Standard Model. 515-524 - Rikuhiro Kojima, Dai Yamamoto, Takeshi Shimoyama, Kouichi Yasaki, Kazuaki Nimura:

A New Schnorr Multi-Signatures to Support Both Multiple Messages Signing and Key Aggregation. 525-536 - Yuichiro Chinen

, Naoto Yanai
, Jason Paul Cruz, Shingo Okamura:
RA: A Static Analysis Tool for Analyzing Re-Entrancy Attacks in Ethereum Smart Contracts. 537-547 - Toshihiro Ohigashi

, Shuya Kawaguchi, Kai Kobayashi, Hayato Kimura, Tatsuya Suzuki, Daichi Okabe, Takuya Ishibashi, Hiroshi Yamamoto, Maki Inui, Ryo Miyamoto, Kazuyoshi Furukawa, Tetsuya Izu:
Detecting Fake QR Codes Using Information from Error-Correction. 548-558 - Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima:

Novel Deception Techniques for Malware Detection on Industrial Control Systems. 559-571 - Aamir H. Bokhari, Yuta Inoue, Seiya Kato, Katsunari Yoshioka, Tsutomu Matsumoto:

Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device. 572-580 - Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:

SVTester: Finding DoS Vulnerabilities of Virtual Switches. 581-591 - Meguru Yamazaki, Miki Yamamoto:

Fairness Improvement of Congestion Control with Reinforcement Learning. 592-595 - Kazuya Murao:

Editor's Message to Special Issue of Ubiquitous Computing Systems (X). 596 - Cheng Chen, Takuya Maekawa, Daichi Amagata, Takahiro Hara:

Predicting Next-use Mobile Apps Using App Semantic Representations. 597-609 - Atsuhiro Fujii

, Kazuya Murao:
User Identification Method based on Head Shape Using Pressure Sensors Embedded in a Helmet. 610-619 - Kei Iwase, Yu Enokibori, Naoto Yoshida, Kenji Mase:

Joint Position Estimation for Body Pressure Images during Sleep: An Extension for CPM Using Body Area and Posture Estimation Mashups. 620-629 - Takahisa Toda, Takeru Inoue:

Interval-based Counterexample Analysis for Error Explanation. 630-639 - Hiroki Watanabe, Kazuki Hayashi, Tomonori Sato, Takao Kondo

, Fumio Teraoka:
Management and Network Orchestration for Edge/Fog-based Distributed Data Processing. 640-648 - Yuta Takata, Daiki Ito, Hiroshi Kumagai, Masaki Kamizono:

Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking. 649-656 - Dario Alfonso Cuello Mejía, Aoba Saito, Mitsuhiko Kimoto

, Takamasa Iio, Katsunori Shimohara, Hidenobu Sumioka, Hiroshi Ishiguro, Masahiro Shiomi:
Modeling of Pre-Touch Reaction Distance for Faces in a Virtual Environment. 657-666 - Toshiyuki Hagiya, Kazunari Nawa:

Acceptability Evaluation of Inter-driver Interaction via a Vehicle Agent Using Vehicle-to-Vehicle Communication on a Driving Simulator. 667-675 - Tomoya Michinaka, Hideyuki Kawabata

, Tetsuo Hironaka:
Rumpfr: A Fast and Memory Leak-free Rust Binding to the GNU MPFR Library. 676-684 - Akihiko Yokoyama, Sosuke Moriguchi

, Takuo Watanabe
:
A Functional Reactive Programming Language for Small-Scale Embedded Systems with Recursive Data Types. 685-706 - Yoshihaya Takahashi, Kosuke Nakamura, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:

Person Identification Based on Accelerations Sensed in Smartphones with LSTM. 707-716 - Bo Chen, Muhammad Alfian Amrizal, Satoru Izumi, Toru Abe, Takuo Suganuma:

Improving the Efficiency in Multiple Object Tracking by Tracker Switching According to Occlusion States. 717-724 - Kojiro Iizuka, Makoto P. Kato, Yoshifumi Seki:

Dynamic Hyperbolic Embeddings with Graph-Centralized Regularization for Recommender Systems. 725-734 - Naoki Wake, Ryohei Suzuki, Yuri Munakata, Ryohei Fushimi:

The Development and Practice for Exhibiting an HCI Device in a Public Space - A Case Study of Sight: A Sonification Device Towards a Visual Perception without Eyes -. 735-745 - Masaki Shimaoka:

Editor's Message to Special Issue of Information Security and Trust in Digital Society. 746 - Kenta Yokogi, Naoya Kitagawa, Nariyoshi Yamai:

IoT-oriented Secure Data Sharing Using Public Cloud. 747-756 - Yuichiro Dan, Toshiki Shibahara, Junko Takahashi:

Timing Attack on Random Forests: Experimental Evaluation and Detailed Analysis. 757-768 - Satsuki Nishioka, Yasuo Okabe:

Centralized Control of Account Migration at Single Sign-On in Shibboleth. 769-777 - Tomoaki Mimoto, Masayuki Hashimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji

:
Privacy Risk of Document Data and a Countermeasure Framework. 778-786 - Shintaro Ishihara, Kazuma Yasuda, Kota Abe, Yuuichi Teranishi, Toyokazu Akiyama:

Comparative Evaluation of Dataflow Component Selection Methods in Distributed MQTT Broker Environment. 787-800 - Kazuya Nomura, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:

Auto-creation of Robust Android Malware Family Trees. 801-811 - Shugo Fujimura, Shigeyuki Sato, Kenjiro Taura

:
An Efficient and Scalable Distributed Hypergraph Processing System. 812-822 - Jixin Han, Keiji Kimura:

Durable Queue Implementations Built on a Formally Defined Strand Persistency Model. 823-838

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














