


default search action
Journal of Information Processing, Volume 27
Volume 27, 2019
- Nobuo Kawaguchi:

Editor's Message to Special Issue of Pervasive System and Intelligent Transportation Systems for Future Life. 1 - Mineo Takai, Jay Martin, Shigeru Kaneda, Taka Maeno:

Scenargie as a Network Simulator and Beyond. 2-9 - Kosuke Watanabe, Kei Hiroi, Takeshi Kamiyama, Hiroyuki Sano, Masakatsu Tsukamoto, Masaji Katagiri, Daizo Ikeda

, Katsuhiko Kaji, Nobuo Kawaguchi
:
A Smartphone 3D Positioning Method using a Spinning Magnet Marker. 10-24 - Thongtat Oransirikul, Ian Piumarta, Hideyuki Takada

:
Classifying Passenger and Non-passenger Signals in Public Transportation by Analysing Mobile Device Wi-Fi Activity. 25-32 - Bondan Suwandi

, Teruaki Kitasuka, Masayoshi Aritsugi:
Vehicle Vibration Error Compensation on IMU-accelerometer Sensor Using Adaptive Filter and Low-pass Filter Approaches. 33-40 - Hidekazu Shiozawa:

Editor's Message to Special Issue of Collaboration Technologies and Network Services Towards the Society Connecting All People and Things. 41 - Yunosuke Higashi, Masao Ohira, Yutaro Kashiwa, Yuki Manabe:

Hierarchical Clustering of OSS License Statements toward Automatic Generation of License Rules. 42-50 - Yu Suzuki, Yoshitaka Matsuda, Satoshi Nakamura:

Additional Operations of Simple HITs on Microtask Crowdsourcing for Worker Quality Prediction. 51-60 - Abu Nowshed Chy

, Md. Zia Ullah, Masaki Aono:
Query Expansion for Microblog Retrieval Focusing on an Ensemble of Features. 61-76 - Yoshihiko Kakutani, Yuito Murase, Yuichi Nishiwaki:

Dual-context Modal Logic as Left Adjoint of Fitch-style Modal Logic. 77-86 - Yuya Kono, Hideyuki Kawabata

, Tetsuo Hironaka:
Resolving Ambiguous Types in Haskell by Checking Uniqueness of Type Variable Assignments under Type Class Constraints. 87-94 - Daisuke Sakamoto

:
Editor's Message to Special Issue of Understanding, Technology, and Application of Interaction. 95 - Kentaro Ueda, Tsutomu Terada, Masahiko Tsukamoto:

Input Interface Using Wrinkles on Clothes for Wearable Computing. 96-105 - Ryosuke Takada, Toshiyuki Ando, Buntarou Shizuki, Shin Takahashi:

BaroTouch: A Technique for Touch Force Sensing Using a Waterproof Device's Built-in Barometer. 106-115 - Masashi Yamamuro:

Editor's Message to Special Issue of Network Services and Distributed Processing. 116 - Takahiro Noi, Takuya Yoshihiro:

A Scheduling for Slotted-CSMA-based Wireless Mesh Networks to Reduce Delivery Delay. 117-124 - Junji Takemasa, Yuki Koizumi

, Toru Hasegawa:
Lightweight Cache Admission Algorithm for Fast NDN Software Routers. 125-134 - Hironori Nakajo:

Editor's Message to Special Issue on Embedded Systems Engineering. 135 - Yang Qin, Gang Zeng, Ryo Kurachi, Yutaka Matsubara

, Hiroaki Takada
:
Energy-Aware Task Allocation for Heterogeneous Multiprocessor Systems by Using Integer Linear Programming. 136-148 - Huatao Zhao, Jiongyao Ye, Takahiro Watanabe:

A Low-power Shared Cache Design with Modified PID Controller for Efficient Multicore Embedded Systems. 149-158 - Junko Takahashi, Masashi Tanaka, Hitoshi Fuji, Toshio Narita, Shunsuke Matsumoto, Hiroki Sato:

Automotive Security on Abnormal Vehicle Behavior Using Only Fabricated Informative CAN Messages. 159-167 - Ryo Masumura, Taichi Asami, Takanobu Oba, Hirokazu Masataki, Sumitaka Sakauchi:

Viterbi Approximation of Latent Words Language Models for Automatic Speech Recognition. 168-176 - Masahiro Yasugi, Reichi Ikeuchi, Tasuku Hiraishi, Tsuneyasu Komiya:

Evaluating Portable Mechanisms for Legitimate Execution Stack Access with a Scheme Interpreter in an Extended SC Language. 177-189 - Chen Zhao, Bin Yang, Yu Hirate:

A Reward Optimization Model for Decision-making under Budget Constraint. 190-200 - Senxi Li, Takeshi Iwashita, Takeshi Fukaya:

Enhancement of Algebraic Block Multi-Color Ordering for ILU Preconditioning and Its Performance Evaluation in Preconditioned GMRES Solver. 201-210 - An Huynh, Christian Helm, Shintaro Iwasaki, Wataru Endo, Byambajav Namsraijav, Kenjiro Taura

:
TP-PARSEC: A Task Parallel PARSEC Benchmark Suite. 211-220 - Shun Kurihara, Shoki Fukuda, Takeshi Kamiyama, Akira Fukuda, Masato Oguchi, Saneyasu Yamaguchi:

Estimation of Power Consumption of Each Application Considering Software Dependency in Android. 221-232 - Yoshiaki Kitaguchi:

Editor's Message to Special Issue of the Internet and Operation Technologies by Constructing Resilient Information Systems. 233 - Motoyuki Ohmori

, Masayuki Higashino, Toshiya Kawato, Satoshi Fujio, Kiyoyuki Nakashima:
On-demand Suspicious Host Isolation Adopting Software Defined Network Approach on a Computer Security Incident Response. 234-243 - Etsuya Shibayama

:
Editor's Message to Special Issue of Young Researchers' Papers. 244 - Thach V. Bui, Minoru Kuribayashi

, Tetsuya Kojima
, Roghayyeh Haghvirdinezhad, Isao Echizen:
Efficient (nonrandom) Construction and Decoding for Non-adaptive Group Testing. 245-256 - Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata

, Tetsuo Hironaka:
Easy-going Development of Event-Driven Applications by Iterating a Search-Select-Superpose Loop. 257-267 - Tran Duy Linh, Masayuki Arai:

Two-stage Deep Neural Network for General Object Detection. 268-277 - Tatsunori Hirai, Shun Sawada:

Melody2Vec: Distributed Representations of Melodic Phrases based on Melody Segmentation. 278-286 - Hirotaka Suzuki, Haruhisa Ichikawa, Jin Mitsugi, Yuusuke Kawakita:

GNU Radio-based Cloud Development Environment for Software-defined Radio Users. 287-296 - Yuhei Kawakoya, Eitaro Shioji, Makoto Iwamura, Jun Miyoshi:

API Chaser: Taint-Assisted Sandbox for Evasive Malware Analysis. 297-314 - Kazuhiro Seki:

On Cross-Lingual Text Similarity Using Neural Translation Models. 315-321 - Mihiro Sonoyama, Takatsugu Ono, Haruichi Kanaya, Osamu Muta, Smruti R. Sarangi, Koji Inoue:

Radio Propagation Characteristics-based Spoofing Attack Prevention on Wireless Connected Devices. 322-334 - Yoshinao Ishii

, Masaki Takanashi:
Low-cost Unsupervised Outlier Detection by Autoencoders with Robust Estimation. 335-339 - Naoki Kondo, Kiminori Matsuzaki:

Playing Game 2048 with Deep Convolutional Neural Networks Trained by Supervised Learning. 340-347 - Ayumi Ohnishi, Tsutomu Terada, Masahiko Tsukamoto:

A Method for Recognizing Postures and Gestures Using Foot Pressure Sensors. 348-358 - Yoshiaki Matsuzawa:

Editor's Message to Special Issue of Information Systems. 359 - Van Cu Pham

, Yuto Lim
, Antonio Sgorbissa, Yasuo Tan:
An Ontology-driven ECHONET Lite Adaptation Layer for Smart Homes. 360-368 - Wataru Aoyama, Hideya Iwasaki

:
dajFS: A New File System with Per-directory Adaptive Journaling. 369-377 - Takeshi Miura, Takeshi Shibata, Madoka Uemura, Katsubumi Tajima, Hideo Tamamoto:

Development of a Cartogram Construction Method for Visualizing Japanese Folk Dance Distribution. 378-391 - Koji Kawamata, Kenta Oku:

Roadscape-based Route Recommender System Using Coarse-to-fine Route Search. 392-403 - Yu Suzuki:

Filtering Method for Twitter Streaming Data Using Human-in-the-Loop Machine Learning. 404-410 - Akimasa Morihata

:
Using Algebraic Properties and Function Fusion to Evaluate Tree Accumulations in Parallel. 411-421 - Takayuki Miyazaki, Yasuhiko Minamide:

Derivatives of Regular Expressions with Lookahead. 422-430 - Keigo Imai

, Jacques Garrigue:
Lightweight Linearly-typed Programming with Lenses and Monads. 431-444 - Nathavuth Kitbutrawat, Hirozumi Yamaguchi

, Teruo Higashino:
EasyTrack: Zero-Calibration Smart-Home Tracking System. 445-455 - Tetsuro Kakeshita, Kosuke Ohta:

Student Log Analysis Functions for Web-based Programming Education Support Tool pgtracer. 456-468 - Sheng Hu

, Chuan Xiao
, Yoshiharu Ishikawa
:
Scope-aware Code Completion with Discriminative Modeling. 469-478 - Tetsuro Yamazaki

, Shigeru Chiba:
Buffered Garbage Collection: An Approach to Collecting Self-Created Garbage Objects. 479-488 - Kosuke Matsumoto, Tomoharu Ugawa:

Visualization of Counterexamples of Memory Model-aware Model Checking Using SPIN. 489-498 - Kazuaki Hanawa, Akira Sasaki, Naoaki Okazaki, Kentaro Inui:

Stance Detection Attending External Knowledge from Wikipedia. 499-506 - Shiho Moriai:

Editor's Message to Special Issue of Computer Security Technologies for Digital Transformation. 507 - Nasima Begum

, Toru Nakanishi:
Efficiency Improvement in Group Signature Scheme with Probabilistic Revocation. 508-516 - Yasufumi Hashimoto

, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. 517-524 - Tomofumi Nakamori, Daiki Chiba

, Mitsuaki Akiyama, Shigeki Goto:
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records. 525-535 - Yuta Sawabe, Daiki Chiba

, Mitsuaki Akiyama, Shigeki Goto:
Detection Method of Homograph Internationalized Domain Names with OCR. 536-544 - Shun Tobiyama, Yukiko Yamaguchi, Hirokazu Hasegawa, Hajime Shimada, Mitsuaki Akiyama, Takeshi Yagi:

Using Seq2Seq Model to Detect Infection Focusing on Behavioral Features of Processes. 545-554 - Mamoru Mimura

, Hiroya Miura:
Detecting Unseen Malicious VBA Macros with NLP Techniques. 555-563 - Motoyuki Ohmori

:
On Automation and Orchestration of an Initial Computer Security Incident Response by Introducing Centralized Incident Tracking System. 564-573 - Songpon Teerakanok, Tetsutaro Uehara

:
A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection. 574-584 - Yuichi Komano

, Hideo Shimizu, Hideyuki Miyake:
Integrative Acceleration of First-order Boolean Masking for Embedded IoT Devices. 585-592 - Kanae Yoshida, Hironori Imai, Nana Serizawa, Tatsuya Mori

, Akira Kanaoka:
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps. 593-602 - Hironori Imai, Akira Kanaoka:

Chronological Analysis of Source Code Reuse Impact on Android Application Security. 603-612 - Kenichi Yoshida:

Editor's Message to Special Issue of "Applications and the Internet" in Conjunction with Main Topics of COMPSAC 2018. 613 - Yutaka Arakawa:

Sensing and Changing Human Behavior for Workplace Wellness. 614-623 - Nusrat Jahan Mozumder, Maitraye Das

, Tanzima Hashem
, Sharmin Afrose, Khandakar Ashrafi Akbar:
Towards Privacy-preserving Authenticated Disease Risk Queries. 624-642 - Kazuyuki Yamashita, Yuichi Yasuda, Ryo Nakamura, Hiroyuki Ohsaki:

Revisiting the Robustness of Complex Networks against Random Node Removal. 643-649 - Ryosuke Matsumoto, Kenji Rikitake, Kentaro Kuribayashi:

Large-scale Certificate Management on Multi-tenant Web Servers. 650-657 - Tomoya Nonaka, Tomoharu Ugawa:

Design and Implementation of Superinstructions for JavaScript Virtual Machine Generation System for Embedded Systems eJSTK. 658-670 - Tsubasa Murakami, Takeshi Kamiyama, Akira Fukuda, Masato Oguchi, Saneyasu Yamaguchi:

BET Estimation on Power Saving by Intermittent Disabling Network Interface on Android. 671-681 - Takayuki Kosaka:

Editor's Message to Special Issue of Entertainment Computing. 682 - Mina Shiraishi, Kozue Ogasawara, Tetsuro Kitahara:

HamoKara: A System that Enables Amateur Singers to Practice Backing Vocals for Karaoke. 683-692 - Christoph M. Wilk, Shigeki Sagayama:

Automatic Music Completion Based on Joint Optimization of Harmony Progression and Voicing. 693-700 - Chaxiong Yukonhiatou, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo:

A Method to Reduce Transaction Time for Real-time IoT Applications. 701-710 - Mamoru Mimura

:
An Attempt to Read Network Traffic with Doc2vec. 711-719 - Masahiro Sato, Koki Nagatani, Takashi Sonoda, Qian Zhang, Tomoko Ohkuma:

Context Style Explanation for Recommender Systems. 720-729 - Phanucheep Chotnithi, Hong Van Le, Atsuhiro Takasu:

An Effective Parameter-free Comparison of NGS Short Reads for Phylogeny Reconstruction. 730-741 - Zhaohao Zeng, Ruihua Song, Pingping Lin, Tetsuya Sakai:

Attitude Detection for One-Round Conversation: Jointly Extracting Target-Polarity Pairs. 742-751 - Faith Wavinya Mutinda, Atsuhiro Nakashima, Koh Takeuchi, Yuya Sasaki, Makoto Onizuka

:
Time Series Link Prediction Using NMF. 752-761 - Katsumi Takahashi:

Editor's Message to Special Issue of Usable Security. 762 - Tatsuya Midorikawa, Akihiro Tachikawa, Akira Kanaoka:

Helping Johnny to Search: Usable Encrypted Search on Webmail System. 763-772 - Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Youki Kadobayashi:

A Demographic Perspective of Smartphone Security and Its Redesigned Notifications. 773-786 - Toru Nakamura, Andrew A. Adams, Kiyoshi Murata

, Shinsaku Kiyomoto, Nobuo Suzuki:
The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability. 787-801 - Tatsuya Nagai, Makoto Takita, Keisuke Furumoto, Yoshiaki Shiraishi, Kelin Xia, Yasuhiro Takano, Masami Mohri, Masakatu Morii:

Understanding Attack Trends from Security Blog Posts Using Guided-topic Model. 802-809 - Qizhen Zhu, Hitoshi Akama, Yasuhiko Minamide:

Solving String Constraints with Streaming String Transducers. 810-821 - Akihiro Fujii, Shigeo Kaneko, Teruo Tanaka, Takeshi Iwashita:

Time Segment Correction Method for Parallel Time Integration. 822-830 - Akihiro Ida, Hiroshi Nakashima, Tasuku Hiraishi, Ichitaro Yamazaki, Rio Yokota, Takeshi Iwashita:

QR Factorization of Block Low-rank Matrices with Weak Admissibility Condition. 831-839 - Zhengyang Bai

, Tasuku Hiraishi, Hiroshi Nakashima, Akihiro Ida, Masahiro Yasugi:
Parallelization of Matrix Partitioning in Construction of Hierarchical Matrices using Task Parallel Languages. 840-851

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














