


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2009
- Tomoyosi Akiba, Kiyoaki Aikawa, Yoshiaki Itoh, Tatsuya Kawahara
, Hiroaki Nanjo, Hiromitsu Nishizaki, Norihito Yasuda, Yoichi Yamashita, Katunobu Itou:
Construction of a Test Collection for Spoken Document Retrieval from Lecture Audio Data. J. Inf. Process. 17: 82-94 (2009) - Sumudu Dematapitiya, Masatoshi Kawazoe, Akira Nishikawa, Masaki Sakurai, Sato Saga
:
Snapping of Fuzzy Objects Using the Multi-Resolution Fuzzy Grid Snapping Technique. J. Inf. Process. 17: 47-58 (2009) - Keita Emura
, Atsuko Miyaji
, Kazumasa Omote:
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics. J. Inf. Process. 17: 216-231 (2009) - Masataka Goto
, Takayuki Goto:
Musicream: Integrated Music-Listening Interface for Active, Flexible, and Unexpected Encounters with Musical Pieces. J. Inf. Process. 17: 292-305 (2009) - Yuko Hara, Hiroyuki Tomiyama, Shinya Honda, Hiroaki Takada:
Proposal and Quantitative Analysis of the CHStone Benchmark Program Suite for Practical C-based High-level Synthesis. J. Inf. Process. 17: 242-254 (2009) - Tokuya Inagaki, Susumu Ishihara
:
HGAF: A Power Saving Scheme for Wireless Sensor Networks. J. Inf. Process. 17: 255-266 (2009) - Takayuki Ishida, Kazumi Yamawaki, Hideki Noda, Michiharu Niimi:
An Improved QIM-JPEG2000 Steganography and Its Evaluation by Steganalysis. J. Inf. Process. 17: 267-272 (2009) - Katsutoshi Itoyama, Masataka Goto
, Kazunori Komatani, Tetsuya Ogata
, Hiroshi G. Okuno
:
Parameter Estimation for Harmonic and Inharmonic Models by Using Timbre Feature Distributions. J. Inf. Process. 17: 191-201 (2009) - Masayuki Iwai, Yoshito Tobe, Hideyuki Tokuda:
A Flexible Modeling Engine Enabling Inter-service Management. J. Inf. Process. 17: 119-137 (2009) - Piyanuch Klaisubun, Takashi Ishikawa:
Design and Evaluation of Mutual Awareness Function in Social Bookmarking Service to Foster Collaborative Information Gathering. J. Inf. Process. 17: 167-179 (2009) - Kazuhiro Kono, Yoshimichi Ito, Akihito Aoyama, Hiroaki Kamoda, Noboru Babaguchi:
Matrix-Based Algorithm for Integrating Inheritance Relations of Access Rights for Policy Generation. J. Inf. Process. 17: 318-327 (2009) - Cho Il Kwon, Koji Okamura:
Analysis and Study of IP Telephony Traffic Characteristics over Next Generation Network with NGN Carrier's Case Study. J. Inf. Process. 17: 106-118 (2009) - Francisco Lamosa, Zhencheng Hu, Keiichi Uchimura:
Vehicle Detection Using Probability Fusion Maps Generated by Multi-camera Systems. J. Inf. Process. 17: 1-13 (2009) - Kazunari Meguro, Shinichi Motomura, Toshihiko Sasama, Takao Kawamura, Kazunori Sugahara:
Backup and Recovery Scheme for Distributed e-Learning System. J. Inf. Process. 17: 273-279 (2009) - Yujin Noishiki, Hidetoshi Yokota:
Study and Implementation of Dynamic Network Composition in Heterogeneous Network Environments. J. Inf. Process. 17: 306-317 (2009) - Toshiaki Osada, Gen Kitagata, Debasish Chakraborty, Takuo Suganuma, Norio Shiratori:
A New QoS Routing Scheme Based on Bandwidth Consumption for MANETs. J. Inf. Process. 17: 14-25 (2009) - Tetsuya Sakai:
On the Robustness of Information Retrieval Metrics to Biased Relevance Assessments. J. Inf. Process. 17: 156-166 (2009) - Munehiko Sato, Atsushi Hiyama, Tomohiro Tanikawa, Michitaka Hirose:
Particle Display System - Virtually Perceivable Pixels with Randomly Distributed Physical Pixels. J. Inf. Process. 17: 280-291 (2009) - Mikio Shinya, Michio Shiraishi, Yoshinori Dobashi, Kei Iwasaki
, Tomoyuki Nishita:
Rendering Translucent Materials with Plane-parallel Solution. J. Inf. Process. 17: 180-190 (2009) - Katsuhito Sudoh
, Hajime Tsukada
, Hideki Isozaki:
Named Entity Recognition from Speech Using Discriminative Models and Speech Recognition Confidence. J. Inf. Process. 17: 72-81 (2009) - Shinta Sugimoto, Ryoji Kato, Toshikane Oda:
Network-Controlled Route Optimization for Heterogeneous Mobile IP Networks. J. Inf. Process. 17: 26-38 (2009) - Motoyuki Suzuki, Takuto Ichikawa, Akinori Ito
, Shozo Makino:
Novel Tonal Feature and Statistical User Modeling for Query-by-Humming. J. Inf. Process. 17: 95-105 (2009) - Atsushi Takeda, Debasish Chakraborty, Gen Kitagata, Kazuo Hashimoto, Norio Shiratori:
Proposal and Performance Evaluation of Hash-based Authentication for P2P Network. J. Inf. Process. 17: 59-71 (2009) - Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki:
IP Traceback Using DNS Logs against Bots. J. Inf. Process. 17: 232-241 (2009) - Yuta Tsuboi, Hisashi Kashima, Shohei Hido, Steffen Bickel, Masashi Sugiyama:
Direct Density Ratio Estimation for Large-scale Covariate Shift Adaptation. J. Inf. Process. 17: 138-155 (2009) - Toshihiko Yamakami:
One-path Relaxed Realtime Constraint Mobile User Classification Method in Mobile Clickstreams. J. Inf. Process. 17: 39-46 (2009) - Kazuki Yoneyama:
Efficient and Strongly Secure Password-based Server Aided Key Exchange. J. Inf. Process. 17: 202-215 (2009)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-06-28 19:40 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint