default search action
Journal of Information Processing, Volume 29
Volume 29, 2021
- Shunsuke Inenaga:
Towards a Complete Perspective on Labeled Tree Indexing: New Size Bounds, Efficient Constructions, and Beyond. 1-13 - Akifumi Inoue:
Editor's Message to Special Issue of Collaboration Technologies and Network Services toward the Sustainable Society. 14-15 - Abu Nowshed Chy, Umme Aymun Siddiqua, Masaki Aono:
Exploiting Transfer Learning and Hand-Crafted Features in a Unified Neural Model for Identifying Actionable Informative Tweets. 16-29 - Ryo Ishii, Ryuichiro Higashinaka, Koh Mitsuda, Taichi Katayama, Masahiro Mizukami, Junji Tomita, Hidetoshi Kawabata, Emi Yamaguchi, Noritake Adachi, Yushi Aono:
Methods for Efficiently Constructing Text-dialogue-agent System using Existing Anime Characters. 30-44 - Ken Ohta:
Editor's Message to Special Issue of Mobile and Intelligent Transportation Systems Evolving Society in the 5G Era. 45 - Akira Uchiyama, Shunsuke Saruwatari, Takuya Maekawa, Kazuya Ohara, Teruo Higashino:
Context Recognition by Wireless Sensing: A Comprehensive Survey. 46-57 - Kenta Urano, Kei Hiroi, Takuro Yonezawa, Nobuo Kawaguchi:
An End-to-End BLE Indoor Localization Method Using LSTM. 58-69 - Ryosuke Hasegawa, Akira Uchiyama, Takuya Magome, Juri Tatsumi, Teruo Higashino:
Maneuver and Turn Classification in Wheelchair Basketball Using Inertial Sensors. 70-80 - Yuta Ishizaki, Yurie Koyama, Toshinori Takayama, Nozomu Togawa:
A Route Recommendation Method Considering Individual User's Preferences by Monte-Carlo Tree Search and Its Evaluations. 81-92 - Naoki Fukushi, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
A Comprehensive Measurement of Cloud Service Abuse. 93-102 - Hideaki Goto:
Inter-federation Roaming Architecture for Large-scale Wireless LAN Roaming Systems. 103-112 - Takuo Suganuma:
Editor's Message to Special Issue of Network Services and Distributed Processing. 113-114 - Nguyen Minh Tri, Masahiro Shibata, Masato Tsuru:
Effective Route Scheme of Multicast Probing to Locate High-loss Links in OpenFlow Networks. 115-123 - Arnan Maipradit, Tomoya Kawakami, Ying Liu, Juntao Gao, Minuro Ito:
An Adaptive Traffic Signal Control Scheme Based on Back-pressure with Global Information. 124-131 - Ushio Yamamoto:
Receiver-prioritized Next Transmission in Multichannel MAC Protocol for Wireless Ad-hoc Networks. 132-139 - Eiji Nii, Shoma Nishigami, Takamasa Kitanouma, Hiroyuki Yomo, Yasuhisa Takizawa:
Dynamic Swarm Spatial Scaling for Mobile Sensing Cluster in a Noisy Environment. 140-148 - Miya Fukumoto, Takuya Yoshihiro:
Localization with Portable APs in Ultra-Narrow-Band-based LPWA Networks. 149-156 - Hiroko Nagashima, Yuka Kato:
Flexible Imputation Method for Sensor Data based on Programming by Example: APREP-S. 157-165 - Yuki Matsuyama, Shuichi Miyazaki:
Hardness of Instance Generation with Optimal Solutions for the Stable Marriage Problem. 166-173 - Masaki Umeda, Atusi Maeda:
Packrat Parsers Can Support Multiple Left-recursive Calls at the Same Position. 174-187 - Shohei Matsugu, Hiroaki Shiokawa, Hiroyuki Kitagawa:
Fast Algorithm for Attributed Community Search. 188-196 - Mikifumi Shikida:
Editor's Message to Special Issue of the Internet and Operation Technologies for Comfortable Administrations and Operations. 197 - Motoyuki Ohmori, Naoki Miyata, Koji Okamura:
AXARPSC: Scalable ARP Snooping Using Policy-based Mirroring of Core Switches with ARP Log Contraction. 198-204 - Shin-ichi Minato:
Editor's Message to Special Issue of Young Researchers' Papers. 205 - Shiori Endo, Yoshinari Takegawa, Ayaka Funaki, Kohei Matsumura, Keiji Hirata, Takeo Igarashi:
Construction of a Switching Support System for Live Broadcast of Oral Presentation. 206-214 - Hironori Nakajo:
Editor's Message to Special Issue of Embedded Systems Engineering. 215 - Shingo Igarashi, Takuro Fukunaga, Takuya Azumi:
Accurate Contention-aware Scheduling Method on Clustered Many-core Platform. 216-226 - Keita Miura, Shota Tokunaga, Yuki Horita, Yasuhiro Oda, Takuya Azumi:
CoSAM: Co-Simulation Framework for ROS-based Self-driving Systems and MATLAB/Simulink. 227-235 - Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa:
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. 236-246 - Hideyuki Tanaka, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa, Ajoy K. Datta:
A Self-stabilizing 1-maximal Independent Set Algorithm. 247-255 - Korakoch Wilailux, Sudsanguan Ngamsuriyaroj:
Novel Bi-directional Flow-based Traffic Generation Framework for IDS Evaluation and Exploratory Data Analysis. 256-265 - Koji Shima, Hiroshi Doi:
New Proof Techniques Using the Properties of Circulant Matrices for XOR-based (k, n) Threshold Secret Sharing Schemes. 266-274 - Ryoya Yaguchi, Sayaka Shiota, Nobutaka Ono, Hitoshi Kiya:
Replay Attack Detection Based on Spatial and Spectral Features of Stereo Signal. 275-282 - Shigeto Suzuki, Michiko Hiraoka, Takashi Shiraishi, Enxhi Kreshpa, Takuji Yamamoto, Hiroyuki Fukuda, Shuji Matsui, Masahide Fujisaki, Atsuya Uno:
Power Prediction for Sustainable HPC. 283-294 - Shinpei Hayashi:
Editor's Message to Special Issue of Software Engineering. 295 - Shi Qiu, Daniel M. Germán, Katsuro Inoue:
Empirical Study on Dependency-related License Violation in the JavaScript Package Ecosystem. 296-304 - Kunihiro Noda, Takashi Kobayashi, Kiyoshi Agusa:
Constructing Object Groups Corresponding to Concepts for Recovery of a Summarized Sequence Diagram. 305-320 - Toshiaki Noumi, Seiichi Inoue, Haruka Fujita, Kugatsu Sadamitsu, Makoto Sakaguchi, Akiko Tenma, Hironori Nakagami:
Epitope Prediction of Antigen Protein Using Attention-based LSTM Network. 321-327 - Shuhei Tarashima:
Sports Field Recognition Using Deep Multi-task Learning. 328-335 - Kiminori Matsuzaki:
Developing Value Networks for Game 2048 with Reinforcement Learning. 336-346 - Yuanfeng Pang, Takeshi Ito:
Visualizing and Understanding Policy Networks of Computer Go. 347-359 - Ryo Masumura, Taichi Asami, Takanobu Oba, Sumitaka Sakauchi:
Hierarchical Latent Words Language Models for Automatic Speech Recognition. 360-369 - Hiroki Watanabe, Hiroaki Kakizawa, Masanori Sugimoto:
User Authentication Method Using Active Acoustic Sensing. 370-379 - Yoshio Kakizaki:
Editor's Message to Special Issue of Information Systems. 380 - Songpon Teerakanok, Tetsutaro Uehara, Atsuo Inomata:
A Secure Cloud-centric IoT Framework for Smart Device Registration. 381-391 - Takashi Koide, Daiki Chiba, Mitsuaki Akiyama, Katsunari Yoshioka, Tsutomu Matsumoto:
Understanding the Fake Removal Information Advertisement Sites. 392-405 - Takayuki Nakatsuka, Kazuyoshi Yoshii, Yuki Koyama, Satoru Fukayama, Masataka Goto, Shigeo Morishima:
MirrorNet: A Deep Reflective Approach to 2D Pose Estimation for Single-Person Images. 406-423 - Naruki Shirahama, Satoshi Watanabe, Kenji Moriya, Kazuhiro Koshi, Keiji Matsumoto:
A New Method of Subjective Evaluation Using Visual Analog Scale for Small Sample Data Analysis. 424-433 - Tatsuya Abe, Tasuku Hiraishi:
An Extensionally Equivalence-ensured Language for Task Parallel Processing with Backtracking-based Load Balancing. 434-448 - Man Yiu Chow, Mitsuhiro Kitani:
Heterogeneous Sensor Fusion with GMPHD for Environmentally Adaptable Obstacle Detection in Mobility Systems. 449-464 - Yukimasa Nagai, Takenori Sumi, Jianlin Guo, Philip V. Orlik, Hiroshi Mineno:
IEEE 802.19.3 Standardization for Coexistence of IEEE 802.11ah and IEEE 802.15.4g Systems in Sub-1GHz Frequency Bands. 465-477 - Ryusuke Nakashima, Masahiro Yasugi, Hiroshi Yoritaka, Tasuku Hiraishi, Seiji Umatani:
Work-stealing Strategies That Consider Work Amount and Hierarchy. 478-489 - Sangwhan Moon, Naoaki Okazaki:
Effects and Mitigation of Out-of-vocabulary in Universal Language Models. 490-503 - Katsunari Yoshioka:
Editor's Message to Special Issue of Computer Security Technologies for Realizing Society 5.0. 504 - Hirokuni Kitahara, Kugamoorthy Gajananan, Yuji Watanabe:
Real-time Container Integrity Monitoring for Large-Scale Kubernetes Cluster. 505-514 - Hikaru Tsuchida, Takashi Nishide:
Client-aided Robust Bit-composition Protocol with Deterministic Cheater Identification in Standard Model. 515-524 - Rikuhiro Kojima, Dai Yamamoto, Takeshi Shimoyama, Kouichi Yasaki, Kazuaki Nimura:
A New Schnorr Multi-Signatures to Support Both Multiple Messages Signing and Key Aggregation. 525-536 - Yuichiro Chinen, Naoto Yanai, Jason Paul Cruz, Shingo Okamura:
RA: A Static Analysis Tool for Analyzing Re-Entrancy Attacks in Ethereum Smart Contracts. 537-547 - Toshihiro Ohigashi, Shuya Kawaguchi, Kai Kobayashi, Hayato Kimura, Tatsuya Suzuki, Daichi Okabe, Takuya Ishibashi, Hiroshi Yamamoto, Maki Inui, Ryo Miyamoto, Kazuyoshi Furukawa, Tetsuya Izu:
Detecting Fake QR Codes Using Information from Error-Correction. 548-558 - Takanori Machida, Dai Yamamoto, Yuki Unno, Hisashi Kojima:
Novel Deception Techniques for Malware Detection on Industrial Control Systems. 559-571 - Aamir H. Bokhari, Yuta Inoue, Seiya Kato, Katsunari Yoshioka, Tsutomu Matsumoto:
Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device. 572-580 - Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
SVTester: Finding DoS Vulnerabilities of Virtual Switches. 581-591 - Meguru Yamazaki, Miki Yamamoto:
Fairness Improvement of Congestion Control with Reinforcement Learning. 592-595 - Kazuya Murao:
Editor's Message to Special Issue of Ubiquitous Computing Systems (X). 596 - Cheng Chen, Takuya Maekawa, Daichi Amagata, Takahiro Hara:
Predicting Next-use Mobile Apps Using App Semantic Representations. 597-609 - Atsuhiro Fujii, Kazuya Murao:
User Identification Method based on Head Shape Using Pressure Sensors Embedded in a Helmet. 610-619 - Kei Iwase, Yu Enokibori, Naoto Yoshida, Kenji Mase:
Joint Position Estimation for Body Pressure Images during Sleep: An Extension for CPM Using Body Area and Posture Estimation Mashups. 620-629 - Takahisa Toda, Takeru Inoue:
Interval-based Counterexample Analysis for Error Explanation. 630-639 - Hiroki Watanabe, Kazuki Hayashi, Tomonori Sato, Takao Kondo, Fumio Teraoka:
Management and Network Orchestration for Edge/Fog-based Distributed Data Processing. 640-648 - Yuta Takata, Daiki Ito, Hiroshi Kumagai, Masaki Kamizono:
Risk Analysis of Cookie Sharing by Link Decoration and CNAME Cloaking. 649-656 - Dario Alfonso Cuello Mejía, Aoba Saito, Mitsuhiko Kimoto, Takamasa Iio, Katsunori Shimohara, Hidenobu Sumioka, Hiroshi Ishiguro, Masahiro Shiomi:
Modeling of Pre-Touch Reaction Distance for Faces in a Virtual Environment. 657-666 - Toshiyuki Hagiya, Kazunari Nawa:
Acceptability Evaluation of Inter-driver Interaction via a Vehicle Agent Using Vehicle-to-Vehicle Communication on a Driving Simulator. 667-675 - Tomoya Michinaka, Hideyuki Kawabata, Tetsuo Hironaka:
Rumpfr: A Fast and Memory Leak-free Rust Binding to the GNU MPFR Library. 676-684 - Akihiko Yokoyama, Sosuke Moriguchi, Takuo Watanabe:
A Functional Reactive Programming Language for Small-Scale Embedded Systems with Recursive Data Types. 685-706 - Yoshihaya Takahashi, Kosuke Nakamura, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:
Person Identification Based on Accelerations Sensed in Smartphones with LSTM. 707-716 - Bo Chen, Muhammad Alfian Amrizal, Satoru Izumi, Toru Abe, Takuo Suganuma:
Improving the Efficiency in Multiple Object Tracking by Tracker Switching According to Occlusion States. 717-724 - Kojiro Iizuka, Makoto P. Kato, Yoshifumi Seki:
Dynamic Hyperbolic Embeddings with Graph-Centralized Regularization for Recommender Systems. 725-734 - Naoki Wake, Ryohei Suzuki, Yuri Munakata, Ryohei Fushimi:
The Development and Practice for Exhibiting an HCI Device in a Public Space - A Case Study of Sight: A Sonification Device Towards a Visual Perception without Eyes -. 735-745 - Masaki Shimaoka:
Editor's Message to Special Issue of Information Security and Trust in Digital Society. 746 - Kenta Yokogi, Naoya Kitagawa, Nariyoshi Yamai:
IoT-oriented Secure Data Sharing Using Public Cloud. 747-756 - Yuichiro Dan, Toshiki Shibahara, Junko Takahashi:
Timing Attack on Random Forests: Experimental Evaluation and Detailed Analysis. 757-768 - Satsuki Nishioka, Yasuo Okabe:
Centralized Control of Account Migration at Single Sign-On in Shibboleth. 769-777 - Tomoaki Mimoto, Masayuki Hashimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji:
Privacy Risk of Document Data and a Countermeasure Framework. 778-786 - Shintaro Ishihara, Kazuma Yasuda, Kota Abe, Yuuichi Teranishi, Toyokazu Akiyama:
Comparative Evaluation of Dataflow Component Selection Methods in Distributed MQTT Broker Environment. 787-800 - Kazuya Nomura, Daiki Chiba, Mitsuaki Akiyama, Masato Uchida:
Auto-creation of Robust Android Malware Family Trees. 801-811 - Shugo Fujimura, Shigeyuki Sato, Kenjiro Taura:
An Efficient and Scalable Distributed Hypergraph Processing System. 812-822 - Jixin Han, Keiji Kimura:
Durable Queue Implementations Built on a Formally Defined Strand Persistency Model. 823-838
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.