


default search action
Journal of Information Processing, Volume 32
Volume 32, 2024
- Katsuhide Fujita:

Editor's Message to Special Issue of Agent Theory, Technology, and its Applications. 1 - Hyuga Matsuo, Katsuhide Fujita:

Effective Acceptance Strategy Using Deep Reinforcement Learning in Bilateral Multi-issue Negotiation. 2-9 - Kosei Takashima, Isao Yagi:

Model Building and Description Using the Agent-based Computational Economics Framework for Accounting. 10-21 - Hironori Egi:

Editor's Message to Special Issue of Collaboration and Network Services. 22 - Hiroki Yasui

, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto:
SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices. 23-34 - Kenro Go, Shunsuke Tokuda, Haruna Niiyama, Toshiki Onishi

, Asahi Ogushi, Akihiro Miyata:
Evaluation of Prosodic Features Suitable for Conversational Agents Replying with a Joke. 35-40 - Zhou Pei, Hiroyuki Shinnou:

Combining Generative Model and Attention Network for Anomaly Detection. 41-51 - Toshinori Saito:

Editor's Message to Special Issue of Computers in Education for Creative Learning. 52 - Don Passey

:
Lessons from Learner Home Engagement Prior to and during Covid-19: Are Parents and Guardians Prepared for Future Crises? 53-61 - Therese Keane

, Susanne Garvis:
STEM in Australian Early Childhood Education. 62-68 - Kimio Kuramitsu

, Momoka Obara, Miyu Sato, Yuka Akinobu:
Training AI Model that Suggests Python Code from Student Requests in Natural Language. 69-76 - Jaana Holvikivi:

A Risk Evaluation Framework for Digitalization of Education with an Emphasis on Africa. 77-83 - Takashi Date, Mariko Sasakura, Kenichi Iwata

, Masakazu Nakamoto, Toshiki Hino, Kazuhiko Nishi:
Effectiveness of Body Movements to Enjoy Online Classes. 84-92 - Yutaro Ohashi:

Online Survey on Changes of Teachers' Minds on Information and Communication Technology Use and Programming Education in Japanese Elementary Schools between 2017 and 2022. 93-102 - Yui Ono, Daisuke Saito, Hironori Washizaki, Yoshiaki Fukazawa:

Measuring Complexity in Visual Programming for Elementary School Students. 103-112 - Maiko Shimabuku, Yuzuru Aoki, Susumu Kanemune:

School-wide Programming Education in a Public Elementary School. 113-121 - Minae Nishimoto, Keiji Emi:

Text-mining Analysis of What Students Think About e-learning and Face-to-face Classes during COVID-19. 122-126 - Ben Tsutom Wada:

Teaching Computer Science Unplugged in Online for Undergraduate College Students. 127-132 - Toru Ochi, Koji Tateno:

Comparing Efficacy of Online Real-time Classes with On-demand Viewing Classes. 133-138 - Hideki Kondo, Sayaka Tohyama

, Ayano Ohsaki, Masayuki Yamada:
Time-shifting Method to Mitigate Discussion Stagnation and Promote SNS Collaboration. 139-149 - Tomonari Kishimoto, Yuki Honda, Kosuke Urushihara, Maiko Shimabuku, Susumu Kanemune:

Connect DB: An Online Learning System for Data Analysis. 150-158 - Jun Iio:

An Evaluation of the Flipped Classroom Approach Toward Programming Education. 159-165 - Sayaka Tohyama

, Yoshiaki Matsuzawa, Takito Totsuka:
What are the Consequences of Attaining a Greater Sense of Empowerment?: Longitudinal Cohort Study of Early Programming Education in Japan during the '80s and '90s. 166-174 - Yuko Murakami, Yukari Sho, Tomohiro Inagaki:

Improving Motivation in Learning AI for Undergraduate Students by Case Study. 175-181 - Hajime Murai:

Editor's Message to Special Issue of Computer and Humanities. 182 - Takeshi Miura:

Geometric Correction of Historical Maps by the Hybrid of Triangulated Irregular Network and Vector Field Analysis. 183-194 - Yoshinari Takegawa:

Editor's Message to Special Issue of Understanding, Technology, and Application of Interaction. 195 - Yukiko I. Nakano, Fumio Nihei, Ryo Ishii, Ryuichiro Higashinaka:

Selecting Iconic Gesture Forms Based on Typical Entity Images. 196-205 - Shigeru Fujita

:
Editor's Message to Special Issue on "Network Services and Distributed Processing". 206 - Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji

:
PRSafe: A Domain Specific Language Created with LLVM. 207-222 - Yuuri Iwashina, Sho Kato, Hiroshi Shigeno:

Evaluation of a Negotiation Acceptance Scheme in Maneuver Coordination within a Congested Environment. 223-231 - Kouhei Kita, Ryuya Uda:

Fast Preprocessing by Suffix Arrays for Managing Byte n-grams to Detect Malware Subspecies by Machine Learning. 232-246 - Shota Yamanaka:

Sample-size and Repetition Effects on the Prediction Accuracy of Time and Error-rate Models in Steering Tasks. 247-255 - Zikai Zhou, Kei Wakabayashi, Hiroyoshi Ito:

Phrase-Level Topic Modeling Based on Joint Embedding Space of Words, Phrases and Documents. 256-264 - Shinya Abe, Shoko Fujii, Hideya Mino, Jun Goto, Go Ohtake, Satoshi Fujitsu, Kinji Matsumura, Hiroshi Fujisawa:

Impact of Audio on Adaptive Japanese Subtitles and Captions Ruby. 265-274 - Kota Kumakura, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:

CPU Clock Rate Control Based on Method Invocation in Foreground Application in Android Smartphone. 275-286 - Makoto Otani:

Editor's Message to Special Issue of Internet and Operational Technologies for Developing Well-being Network Environment. 287 - Masato Hirai, Daisuke Kotani, Yasuo Okabe:

Linking Contexts from Distinct Data Sources in Zero Trust Federation. 288-296 - Hiroki Takakura:

Editor's Message to Special Issue of "Young Researchers' Papers". 297 - Chika Komiya, Naoto Yanai

, Kyosuke Yamashita
, Shingo Okamura:
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection. 298-307 - Tengfei Shao

, Yuya Ieiri, Reiko Hishiyama:
Multiple Clusters Discovery Utilizing Network Motifs for Community Improvement: Insights from Tourism and Goods' Transactions. 308-318 - Hiroto Fujita, Yasuyuki Tanaka, Kosuke Mori, Fumio Teraoka:

BROF : An Efficient Tree Construction Method Using Passive Link Quality Estimation for a Wireless Sensor Network. 319-330 - Yuka Kataoka, Achmad Husni Thamrin

, Rodney Van Meter:
The Effect of Teacher Electronic Feedback on Japanese SFL Basic Learners' Speaking Improvement. 331-345 - Seiji Kataoka:

A Subtour Elimination Constraint for Non-simpl e Circuit Problems. 346-351 - Nobuyuki Sugio, Naoki Shibayama, Yasutaka Igarashi:

Higher-order Differential Attack on Reduced-round SLIM. 352-357 - Wataru Kawabe

, Yusuke Sugano:
Image-to-Text Translation for Interactive Image Recognition: A Comparative User Study with Non-expert Users. 358-368 - Yen-Chen Chen, Kengo Nakajima:

A Cascadic Parareal Method for Parallel-in-Time Simulation of Compressible Supersonic Flow. 369-379 - Hayataka Nakamura, Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:

Performance Study of Kotlin and Java Programs with Bytecode Analysis. 380-395 - Takumi Nakamura, Shusuke Kawamura, Hiroshi Yoshiura, Masatsugu Ichino:

Personal Authentication for Periocular Region in Thermal and Visible Light Images by Using CNN. 396-406 - Hideaki Goto:

Disruption-tolerant Local Authentication Method for Network Roaming Systems. 407-416 - Misaki Kojima, Naoki Nishida

:
A Sufficient Condition of Logically Constrained Term Rewrite Systems for Decidability of All-path Reachability Problems with Constant Destinations. 417-435 - Masahiro Yasugi, Kento Emoto, Tasuku Hiraishi:

Designing Restartable Exception Handling Mechanisms for Implementing Efficient and Safe High-level Languages. 436-450 - Bach Nguyen Trong, Kanae Tsushima, Zhenjiang Hu:

Synthesis of Bidirectional Programs from Examples with Functional Dependencies. 451-465 - Atsuki Tamekuri, Saneyasu Yamaguchi:

Provide Interpretability of Document Classification by Large Language Models Based on Word Masking. 466-470 - Bach Nguyen Trong, Kanae Tsushima, Zhenjiang Hu:

SYNTHBX: An Example-guided Synthesizer for Bidirectional Programs on Relations. 471-486 - Yuki Kuwabara, Yu Suzuki:

Automatic Stopword Generation Based on Attention for Document Classification Using Neural Networks. 487-495 - Yuichi Tokunaga:

Editor's Message to Special Issue of Intelligent Transportation Systems and Pervasive Systems that Recreate the Value of Physical Mobility. 496-497 - Hisatomo Hanabusa, Tadashi Komiya, Kyohei Ichinose, Koji Takahashi, Ryota Horiguchi:

Development of a Nowcast Crowd Simulation Framework. 498-508 - Shota Horisaki, Kazushige Matama, Katsuhiro Naito, Hidekazu Suzuki:

CYPHONIC-over-QUIC: Secure End-to-End Communication Architecture Traversing Firewalls/NATs. 509-519 - Ayumu Harada, Akihito Hiromori, Hirozumi Yamaguchi:

Anomaly Detection of Building Structure from Incomplete Point Cloud Obtained by UAV. 520-532 - Cher Yen Tan, Ryotaro Akagawa, Tatsuya Yamazaki

, Motohiko Yamazaki:
CT Image Diagnostic Support System for Predicting EGFR Gene Mutations in Lung Cancer. 533-542 - Koga Toriumi, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:

Fast Screen Orientation Adjustment Based on SVM Rotation Inference on Android Smartphones. 543-551 - Shunya Oguchi, Shoji Yuen:

Constant Propagation in CRIL by Bidirectional Data Flow Analysis. 552-564 - Yuuichi Teranishi:

Editor's Message to Special Issue of "Applications and the Internet" in Conjunction with the Main Topics of COMPSAC 2023. 565 - Daiki Nobayashi, Renju Akashi, Kazuya Tsukamoto, Takeshi Ikenaga, Myung J. Lee:

Performance Evaluation of Spatio-temporal Data Retention System Supporting a Floating Cyber-physical System. 566-574 - Hangli Ge

, Takashi Michikata, Noboru Koshizuka:
K-neighboring on Multi-weighted Graphs for Passenger Count Prediction on Railway Networks. 575-585 - Jie Yin, Yutaka Ishikawa, Atsuko Takefusa:

A Linux Audit and MQTT based Monitoring Framework for IoT Devices and Its Evaluation. 586-595 - Kyosuke Teramoto, Tomoki Haruyama, Takuru Shimoyama, Fumihiko Kato, Hiroshi Mineno

:
Human Activity Recognition Using FixMatch-based Semi-supervised Learning with CSI. 596-604 - Tatsuya Sato, Taku Shimosawa, Nariyoshi Yamai:

BillingOpsSC: Smart Contract-based Service Billing Management Method for Consortium Blockchain-based Systems. 605-617 - Masataka Kakinouchi, Kazumasa Omote:

Reducing Security Fatigue in Visually Impaired University Students through Problem Posing. 618-627 - Haiyue Song, Raj Dabre, Chenhui Chu, Atsushi Fujita, Sadao Kurohashi:

Bilingual Corpus Mining and Multistage Fine-tuning for Improving Machine Translation of Lecture Transcripts. 628-640 - Mohammad Soltanian, Keivan Borna:

Video Classification Using Smooth Approximation of Hard-assignment Encoding. 641-651 - Vijay Daultani, Héctor Javier Vázquez Martínez, Naoaki Okazaki:

Acceptability Evaluation of Naturally Written Sentences. 652-666 - Noriaki Matsumura

, Takahiro Hasegawa:
IRA-3MSS: Integrated Risk Assessment Method for Three Management System Standards in the Field of Information Technology Service. 667-677 - Mitsuaki Akiyama:

Editor's Message to Special Issue of Cybersecurity Technologies for Secure Supply-Chain. 678 - Shogo Shiraki, Hayato Kimura, Takanori Isobe:

Looking Further into the Security of End-to-End Encryption of SFrame. 679-689 - Ren Ishibashi, Kazuki Yoneyama:

Big Data-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage without Random Oracles. 690-709 - Yoshiyuki Sakamaki, Takeru Fukuoka, Junpei Yamaguchi, Masanobu Morinaga:

Secure Rating Computation on Weighted Signed Network for Supply Chain Network. 710-718 - Koji Shima, Hiroshi Doi:

Hierarchical Secret-Sharing Scheme Based on XOR Operations. 719-730 - Qingxin Mao, Daisuke Makita, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:

Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot. 731-747 - Phung Minh Ngoc, Mamoru Mimura:

Malicious JavaScript Detection in Realistic Environments with SVM and MLP Models. 748-756 - Takayuki Miura, Masanobu Kii, Toshiki Shibahara, Kazuki Iwahana, Tetsuya Okuda, Atsunori Ichikawa, Naoto Yanai:

SETSUBUN: Revisiting Membership Inference Game for Evaluating Synthetic Data Generation. 757-766 - Tomohiko Yano, Hiroki Kuzuno:

Visualization Method for Open Source Software Risk Related to Vulnerability and Developmental Status Considering Dependencies. 767-778 - Huang Shu-Pei, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:

An Investigation of Privacy and Security in VR APPs through URL String Analysis. 779-788 - Takayuki Sasaki, Jia Wang, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto:

EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities. 789-800 - Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:

Understanding the Breakdown of Same-origin Policies in Web Services That Rehost Websites. 801-816 - Kenji Hisazumi:

Editor's Message to Special Issue of Embedded Systems Engineering. 817 - Yoshitada Takaso, Nao Yoshimura, Hiroshi Oyama, Hiroaki Takada, Takuya Azumi:

HRMP3+TECS v2: Component Framework for Reliable Multiprocessor Real-time Operating System. 818-828 - Yixiao Xing, Yixiao Li, Hiroaki Takada:

A Multi-core RTOS Benchmark Methodology To Assess System Services Under Contentions. 829-843 - Siqi Peng, Akihiro Yamamoto:

Concept Lattice Reduction Using Integer Programming. 844-860 - Takuya Maekawa:

Editor's Message to Special Issue of Ubiquitous Computing Systems (XII). 861-862 - Teerawat Kumrai, Zesheng Cai, Takuya Maekawa, Takahiro Hara, Kazuya Ohara, Tomoki Murakami, Hirantha Abeysekera:

AoA-net: Estimating Angle-of-arrival Using Wi-Fi Channel State Information Based on Deep Neural Networks with Subcarrier Selection. 863-872 - Kazuma Iwase, Tomoyuki Takenawa:

Interpolation of Mountain Weather Forecasts by Machine Learning. 873-880 - Chengguang Gan, Qinghao Zhang, Tatsunori Mori:

Application of LLM Agents in Recruitment: A Novel Framework for Automated Resume Screening. 881-893 - Daiki Watanabe, Takumi Tada, Kazuya Haraguchi:

Comparison of Algorithms and Implementations for Enumerating Support-closed Connected Induced Subgraphs. 894-902 - Tianjia Ni, Kento Sugiura, Yoshiharu Ishikawa, Kejing Lu:

Guaranteeing an Exact Error Bound for Bounded Approximate Query Processing. 903-915 - Naoya Yokoyama, Kiyofumi Tanaka:

Container Auto-scaling System Using Sliding-Window Regression with Fuzzy Entropy. 916-928 - Yuma Dose, Shuichiro Haruta, Takahiro Hara:

INCL: A Graph-based Recommendation Model Using Contrastive Learning for Inductive Scenario. 929-937 - Mariko Chiba, Wataru Yamada, Keiichi Ochiai:

Shadowed Speech: An Approach for Slowing Speech Rate Using Adaptive Delayed Auditory Feedback. 938-947 - Makoto Miyazaki, Hiroyoshi Watanabe, Mieko Masaka, Kumiko Takai:

Self-assessment System for Generic Skills Using Rubrics and Checklists. 948-962 - Rina Trisminingsih, Savong Bou, Toshiyuki Amagasa:

Efficient Pattern Matching over Out-of-Order Event Streams Using Sliding Buffer. 963-972 - Eint Sandi Aung, Hayato Yamana:

PhiSN: Phishing URL Detection Using Segmentation and NLP Features. 973-989 - Marin Matsumoto, Tsubasa Takahashi, Seng Pei Liew, Masato Oguchi:

Measuring Local and Shuffled Privacy of Gradient Randomized Response. 990-1002 - Kento Sugiura, Manabu Nishimura, Yoshiharu Ishikawa:

Practical Persistent Multi-word Compare-and-Swap Algorithms for Many-core CPUs. 1003-1012 - Natsuki Hamada, Kazuhiro Saito, Hideyuki Kawashima:

Qobra: Accelerating Transactional Serializability Verifier by Quantum Annealing. 1013-1022 - Sora Okamoto, Tomoya Kawakami:

A Message Reduction Scheme Based on Geographical Information in Initiative-evacuation Induction Using Social Graphs. 1023-1032 - Saki Takano, Akihiro Nakao, Saneyasu Yamaguchi, Masato Oguchi:

Privacy-protective Distributed Machine Learning between Rich Devices and Edge Servers. 1033-1043 - Kazuki Takeda, Shoji Kajita:

Comfortable PandA: Student-Developed Extension for Enhancing the Usability of Sakai LMS at Kyoto University. 1044-1055 - Midori Inaba:

Editor's Message to Special Issue of Information Security and Trust to Support Social and Ethical Digital Activities. 1056 - Ryôichi Sasaki, Kenta Onishi, Yoshihiro Mitsui, Masato Terada:

Development and Trial Application of an Improved MRC-EDC Method for Risk Assessment of Attacks on Humans by Generative AI. 1057-1065 - Keiichiro Kimura

, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii:
Man-in-the-Portal: Breaking SSL/TLS Silently Abusing Captive Portal. 1066-1081 - Guannan Hu, Kensuke Fukuda:

Investigate the Countermeasure to Mitigate the Privacy Leakage in DNS over QUIC. 1082-1089 - Hiroki Kuzuno, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham

, Toshihiro Yamauchi:
Proposal of Open Source Software Security Risk Indicator Based on Vulnerability Management Interview. 1090-1104 - Qisheng Chen

, Kazumasa Omote:
A Machine Learning Based Three-step Framework for Malicious URL Detection. 1105-1113 - Atsushi Kanda, Masaki Hashimoto

, Takao Okubo:
Can We Create a TLS Lie Detector? 1114-1124 - Takeshi Miura:

Quantitative Estimation of Local Distortions in Historical Maps by Moving Least Squares Technique. 1125-1128

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














