default search action
Journal of Information Processing, Volume 20
Volume 20, Number 1, January 2012
- Gregory Hazelbeck, Hiroaki Saito:
A Tool for Creating Glossed Japanese Reading Materials. 1-10 - Yuanyuan Wang, Kazutoshi Sumiya:
A Browsing Method for Presentation Slides Based on Semantic Relations and Document Structure for e-Learning. 11-25 - Jiongyao Ye, Hongfeng Ding, Yingtao Hu, Takahiro Watanabe:
A Behavior-based Adaptive Access-mode for Low-power Set-associative Caches in Embedded Systems. 26-36 - Norio Shiratori, Kenji Sugawara, Yusuke Manabe, Shigeru Fujita, Basabi Chakraborty:
Symbiotic Computing Based Approach Towards Reducing User's Burden Due to Information Explosion. 37-44 - Hideyuki Tokuda, Jin Nakazawa:
SenseCampus: Sensor enabled Cyber-Physical Coupling for Ubiquitous Services. 45-53 - Taye Mulugeta, Lei Shu, Manfred Hauswirth, ZhangBing Zhou, Shojiro Nishio:
Secured Geographic Forwarding in Wireless Multimedia Sensor Networks. 54-64 - Gang Chen, Ke Chen, Dawei Jiang, Beng Chin Ooi, Lei Shi, Hoang Tam Vo, Sai Wu:
E3: an Elastic Execution Engine for Scalable Data Processing. 65-76 - Zheng Liu, Jeffrey Xu Yu, Hong Cheng:
Approximate Homogeneous Graph Summarization. 77-88 - Kentaro Hara, Kenjiro Taura:
Half-process: A Process Partially Sharing Its Address Space with Other Processes. 89-103 - Kriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
Effective Node Deployment in Sparse Mobile Sensor Networks. 104-113 - Yanwei Xu, Yoshiharu Ishikawa, Jihong Guan:
Efficient Continual Top-k Keyword Search in Relational Databases. 114-127 - Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani, Taiichi Yuasa:
Parallel Graph Traversals using Work-Stealing Frameworks for Many-core Platforms. 128-139 - Kentaro Hara, Kenjiro Taura:
Parallel Computational Reconfiguration Based on a PGAS Model. 140-153 - Tsuyoshi Hisamatsu, Hitoshi Asaeda:
Adaptive Overlay Network for High-Bandwidth Streaming. 154-166 - Yoshiaki Taniguchi, Akimitsu Kanzaki, Naoki Wakamiya, Takahiro Hara:
An Energy-Efficient Data Gathering Mechanism using Traveling Wave and Spatial Interpolation for Wireless Sensor Networks. 167-176 - Yuichi Hattori, Sozo Inoue:
A Large Scale Gathering System for Activity Data using Mobile Devices. 177-184 - Kazuhisa Matsuzono, Hitoshi Asaeda, Jun Murai:
DP-FEC: Dynamic Probing FEC for High-Performance Real-Time Interactive Video Streaming. 185-195 - Hidehito Gomi:
Policy Provisioning and Its Access Control Beyond Administrative and Collaborative Domains. 196-206 - Hiroshi Ishii, Qiang Ma, Masatoshi Yoshikawa:
Incremental Construction of Causal Network from News Articles. 207-215 - Keiji Shinzato, Tomohide Shibata, Daisuke Kawahara, Sadao Kurohashi:
TSUBAKI: An Open Search Engine Infrastructure for Developing Information Access Methodology. 216-227 - Naoki Yoshinaga, Masaru Kitsuregawa:
Efficient Classification with Conjunctive Features. 228-237 - Satoshi Yoshida, Takashi Uemura, Takuya Kida, Tatsuya Asai, Seishi Okamoto:
Improving Parse Trees for Efficient Variable-to-Fixed Length Codes. 238-249 - Supheakmungkol Sarin, Michael Fahrmair, Matthias Wagner, Wataru Kameyama:
Leveraging Features from Background and Salient Regions for Automatic Image Annotation. 250-266 - Ryo Yonetani, Hiroaki Kawashima, Takatsugu Hirayama, Takashi Matsuyama:
Mental Focus Analysis Using the Spatio-temporal Correlation between Visual Saliency and Eye Movements. 267-276 - Mamoun Nawahdah, Tomoo Inoue:
Motion Adaptive Orientation Adjustment of a Virtual Teacher to Support Physical Task Learning. 277-286 - Chenhao Wang, Zhencheng Hu, Roland Chapuis:
Predictive Lane Detection by Interaction with Digital Road Map. 287-296 - Quang Tran Minh, Eiji Kamioka:
Adaptive Approaches in Mobile Phone Based Traffic State Estimation with Low Penetration Rate. 297-307 - Manabu Ito, Satoshi Komorita, Yoshinori Kitatsuji, Hidetoshi Yokota:
IMS-based Fast Session Handover with Available Network Resources Discovery of Access Networks. 308-318 - XingPing He, Sayaka Kamei, Satoshi Fujita:
Autonomous Multi-Source Multi-Sink Routing in Wireless Sensor Networks. 319-326 - Shelly Sachdeva, Aastha Madaan, Subhash Bhalla:
Discovery of Patterns to Improve Usability of Electronic Health Record Systems. 327-339
Volume 20, Number 2, April 2012
- Yusuke Wada, Shigeru Kusakabe:
Performance Evaluation of A Testing Framework Using QuickCheck and Hadoop. 340-346 - Achmad Basuki, Achmad Husni Thamrin, Hitoshi Asaeda, Jun Murai:
ODMT: On-demand Inter-domain Multicast Tunneling. 347-357 - Hironao Takahashi, Khalid Mahmood Malik, Kinji Mori:
Autonomous L3 Cache Technolgy for High Responsiveness. 358-365 - Sherihan Abu Elenin, Masato Kitakami:
Proposal of Grid Monitoring System with Fault Tolerance. 366-377 - Ervianto Abdullah, Satoshi Fujita:
Prevent Contents Leaking in P2P CDNs with Robust and Quick Detection of Colluders. 378-385 - Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. 386-395 - Masatoshi Sekine, Kurato Maeno:
Activity Recognition Using Radio Doppler Effect for Human Monitoring Service. 396-405 - Koji Ara, Tomoaki Akitomi, Nobuo Sato, Kunio Takahashi, Hideyuki Maeda, Kazuo Yano, Masao Yanagisawa:
Integrating Wearable Sensor Technology into Project-management Process. 406-418 - Mohammed Sahli, Tetsuo Shibuya:
Max-Shift BM and Max-Shift Horspool: Practical Fast Exact String Matching Algorithms. 419-425 - Satoshi Fujita, Yang Yang:
Efficient Shape Recognition of Dynamic Event Regions Using Wireless Sensor Networks. 426-434 - Chuzo Iwamoto, Junichi Kishi, Kenichi Morita:
Lower Bound of Face Guards of Polyhedral Terrains. 435-437 - Shelly Sachdeva, Subhash Bhalla:
Visual Query Language for Archetype-Based Electronic Health Records Databases. 438-450 - Yang Chen, Ryo Kurachi, Gang Zeng, Hiroaki Takada:
The Worst-Case Response Time Analysis for FIFO-based Offset Assigned CAN Messages. 451-462 - Ting Ting Qin, Qi Cao, Qi Ying Wei, Satoshi Fujita:
A Tag-Based Scheme to Realize Real-Time File Search in Hierarchical Peer-to-Peer Systems. 463-471 - Tao Xu, Masahiro Watanabe, Masaki Bandai, Takashi Watanabe:
An RSSI-Based Cross Layer Protocol for Directional Ad Hoc Networks and Its Implementation. 472-479 - Tetsuya Arita, Fumio Teraoka:
PNEMO: A Network-Based Localized Mobility Management Protocol for Mobile Networks. 480-490 - Kotaro Ishitani, Hiroshi Yamamoto, Maki Yamamoto, Katsuyuki Yamazaki:
Development and Evaluation of Ecotourism Support System using One-seg Broadcasting with Mobile Networks. 491-495 - Mitsuhiro Hattori, Nori Matsuda, Takashi Ito, Yoichi Shibata, Katsuyuki Takashima, Takeshi Yoneda:
Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation. 496-507 - Tetsuo Iijima:
A Decision Making Model and Its Application to Airplane Accidents. 508-511 - Graham Neubig, Taro Watanabe, Eiichiro Sumita, Shinsuke Mori, Tatsuya Kawahara:
Joint Phrase Alignment and Extraction for Statistical Machine Translation. 512-523
Volume 20, Number 3, July 2012
- Hark-Jin Lee, Young-Sung Son, Jun-Hee Park, Kyeong-Deok Moon, Jae-Cheol Ryou:
General Middleware Bridge to Support Device Interoperability on Different Middlewares. 525-530 - Futoshi Sugimoto, Makoto Murakami, Chieko Kato:
A Method to Synthesize Three Dimensional Face Models by Mapping from a Word Space to a Physical Model Space and the Inspection of the Mapping Function. 531-536 - Masaharu Hirota, Naoki Fukuta, Shohei Yokoyama, Hiroshi Ishikawa:
A Robust Clustering Method for Missing Metadata in Image Search Results. 537-547 - Yuichi Murakami, Shingo Nakamura, Shuji Hashimoto:
An Article Kansei Retrieval System Combining Recommendation Function and Interaction Design. 548-558 - Yuki Hasegawa, Yoshinao Isobe, Kazuhito Ohmaki, Hideki Mori, Kensei Tsuchida, Yasunori Shiono:
Implementation and Verification of Concurrent Sorting Algorithms with CSP based Architecture. 559-569 - Haruhisa Hasegawa, Noriaki Kamiyama, Hideaki Yoshino:
Traffic Management Scheme to Control Content Distribution with Cloud-based Architecture. 570-577 - Takuya Nishikawa, Satoshi Fujita:
A Reputation Management Scheme for Peer-to-Peer Networks based on the EigenTrust Trust Management Algorithm. 578-584 - Akiya Inoue, Yuuki Takano, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimatsu:
Mobile-carrier Choice Modeling Framework Under Competitive Conditions. 585-591 - Jasmine A. Malinao, Richelle Ann B. Juayong, Rona May U. Tadlas, Jhoirene B. Clemente, Erlo Robert F. Oquendo, John Boaz Lee, Ma. Sheilah Gaabucayan-Napalang, Jose Regin F. Regidor, Henry N. Adorna:
A Quantitative Analysis-based Algorithm for Optimal Data Signature Construction of Traffic Data Sets. 592-598 - Tomoo Sumida, Yasunori Shiono, Takaaki Goto, Katsuyoshi Ito, Kensei Tsuchida:
Highly Efficient Transport Protocol for Large Capacity Data Files and its details. 599-606 - Naoki Fukuta:
A Mobile Agent Approach for P2P-based Semantic File Retrieval. 607-613 - Hiroki Nakagawa, Akihiko Nagai, Takayuki Ito:
A Middle-Agent Framework Focused on the Role of Distributors. 614-621 - Yasunori Shiono, Tomokazu Arita, Youzou Miyadera, Kimio Sugita, Takeo Yaku, Kensei Tsuchida:
Automatic Generation of XML Files and Their Database Registration from Tabular Form Specifications. 622-632 - Ippei Torii, Kaoruko Ohtani, Takahito Niwa, Naohiro Ishii:
Information Visualization System For Activation of Shotengai. 633-639 - Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement. 640-648 - Satoshi Takahashi, Tokuro Matsuo:
A Decision Method in B2B E-Commerce Model based on Multi-Items Auction. 649-654 - Shohei Hido, Shoko Suzuki, Risa Nishiyama, Takashi Imamichi, Rikiya Takahashi, Tetsuya Nasukawa, Tsuyoshi Idé, Yusuke Kanehira, Rinju Yohda, Takeshi Ueno, Akira Tajima, Toshiya Watanabe:
Modeling Patent Quality: A System for Large-scale Patentability Analysis using Text Mining. 655-666 - Hideki Tsuiki, Yohei Yokota:
Enumerating 3D-Sudoku Solutions over Cubic Prefractal Objects. 667-671 - Shane Dye, Nicola Ward Petty:
Rogo, a TSP-based Paper Puzzle: Optimization Approaches. 672-679 - Sascha Kurz:
Squaring the Square with Integer Linear Programming. 680-685 - Yoshifumi Manabe, Tatsuaki Okamoto:
Meta-envy-free Cake-cutting and Pie-cutting Protocols. 686-693 - Jonas Kölker:
Kurodoko is NP-Complete. 694-706 - Jonas Kölker:
The Magnets Puzzle is NP-Complete. 707-708 - Jonas Kölker:
Selected Slither Link Variants are NP-complete. 709-712 - Tetsuo Asano, Erik D. Demaine, Martin L. Demaine, Ryuhei Uehara:
NP-completeness of generalized Kaboozle. 713-718 - Kevin Buchin, Maike Buchin:
Rolling Block Mazes are PSPACE-complete. 719-722 - Kenichiro Nakai, Yasuhiko Takenaga:
NP-Completeness of Pandemic. 723-726 - Kazuya Haraguchi, Yasutaka Abe, Akira Maruoka:
How to Produce BlockSum Instances with Various Levels of Difficulty. 727-737 - Daisuke Asai, Jarrod Orszulak, Richard Myrick, Chaiwoo Lee, Lisa A. D'Ambrosio, Kathryn M. Godfrey, Joseph F. Coughlin, Olivier L. de Weck:
Enhance Communication between Parents and Mature Children by Sharing Medication Information. 738-748 - Mingmei Li, Naoki Imai, Kiyohito Yoshihara:
An Integration Method for Wireless Location Using Built-in Sensors of Mobile Phones and TDOA Landmarks. 749-756 - Nobuharu Kami, Teruyuki Baba, Satoshi Ikeda, Takashi Yoshikawa, Hiroyuki Morikawa:
Detecting Significant Locations from Raw GPS Data Using Random Space Partitioning. 757-766 - Takuro Kutsuna, Shuichi Sato, Naoya Chujo:
Efficient Root Cause Detection in Complex Embedded Systems with Abstract Model-based Diagnosis. 767-773 - Amang Sudarsono, Toru Nakanishi, Nobuo Funabiki:
A Pairing-Based Anonymous Credential System with Efficient Attribute Proofs. 774-784 - Masaharu Fukase, Kazunori Yamaguchi:
Finding a Very Short Lattice Vector in the Extended Search Space. 785-795 - Sho Tsugawa, Hiroyuki Ohsaki, Makoto Imase:
Estimating Message Importance Using Inferred Inter-recipient Trust for Supporting Email Triage. 796-805
Volume 20, Number 4, October 2012
- Hong Cheng, Jeffrey Xu Yu:
Clustering Large Attributed Graph. 806-813 - Ryôichi Sasaki:
Considerations on Risk Communication for IT Systems and Development of Support Systems. 814-822
- Satoru Torii:
Editor's Message to Special Issue on Computer Security Technology Achieving Smart Society. 823 - Terry Benzel, John Wroclawski:
The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation. 824-834 - Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao:
Malware Sandbox Analysis with Efficient Observation of Herder's Behavior. 835-845 - Ruan Na, Takashi Nishide, Yoshiaki Hori:
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. 846-853 - Hidenori Kuwakado:
Length-preserving CBC Enciphering Scheme and Its Security Analysis. 854-860
- Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura:
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation. 861-870 - Isao Goto, Masao Utiyama, Takashi Onishi, Eiichiro Sumita:
An Empirical Comparison of Parsers in Constraining Reordering for E-J Patent Machine Translation. 871-882
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.