IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E100-D No.8  (Publication Date:2017/08/01)
[Whole issue]:PDF (68.9MB)
Previous | 
Special Section on Multiple-Valued Logic and VLSI Computing

pp.1555-1555  FOREWORD  Open Access Paper
FOREWORD
Takahiro HANYU  
Summary | FreeFull Text:PDF(70.9KB)

pp.1556-1562  INVITED PAPER  Open Access Paper
Power of Enumeration — Recent Topics on BDD/ZDD-Based Techniques for Discrete Structure Manipulation
Shin-ichi MINATO  
Summary | FreeFull Text:PDF(2.3MB)

pp.1563-1573  INVITED PAPER  Open Access Paper
Biomimetics Image Retrieval Platform
Miki HASEYAMA  Takahiro OGAWA  Sho TAKAHASHI  Shuhei NOMURA  Masatsugu SHIMOMURA  
Summary | FreeFull Text:PDF(9.1MB)

pp.1574-1582  PAPER-Logic Design
A Fast Updatable Implementation of Index Generation Functions Using Multiple IGUs
Tsutomu SASAO  
Summary | Full Text:PDF (477.4KB) >>Buy this Article

pp.1583-1591  PAPER-Logic Design
A Balanced Decision Tree Based Heuristic for Linear Decomposition of Index Generation Functions
Shinobu NAGAYAMA  Tsutomu SASAO  Jon T. BUTLER  
Summary | Full Text:PDF (694.2KB) >>Buy this Article

pp.1592-1602  PAPER-VLSI Architecture
High-Accuracy and Area-Efficient Stochastic FIR Digital Filters Based on Hybrid Computation
Shunsuke KOSHITA  Naoya ONIZAWA  Masahide ABE  Takahiro HANYU  Masayuki KAWAMATA  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1603-1610  PAPER-VLSI Architecture
Automatic Generation System for Multiple-Valued Galois-Field Parallel Multipliers
Rei UENO  Naofumi HOMMA  Takafumi AOKI  
Summary | Full Text:PDF (979.3KB) >>Buy this Article

pp.1611-1617  PAPER-VLSI Architecture
Double-Rate Tomlinson-Harashima Precoding for Multi-Valued Data Transmission
Yosuke IIJIMA  Yasushi YUMINAKA  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.1618-1624  PAPER-VLSI Architecture
Energy-Efficient and Highly-Reliable Nonvolatile FPGA Using Self-Terminated Power-Gating Scheme
Daisuke SUZUKI  Takahiro HANYU  
Summary | Full Text:PDF (933KB) >>Buy this Article

pp.1625-1633  PAPER-Soft Computing
On Map-Based Analysis of Item Relationships in Specific Health Examination Data for Subjects Possibly Having Diabetes
Naotake KAMIURA  Shoji KOBASHI  Manabu NII  Takayuki YUMOTO  Ichiro YAMAMOTO  
Summary | Full Text:PDF (2.8MB) >>Buy this Article

pp.1634-1641  PAPER-Soft Computing
Health Checkup Data Analysis Focusing on Body Mass Index
Mizuki HIGUCHI  Kenichi SORACHI  Yutaka HATA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1642-1646  PAPER-Soft Computing
Incidence Rate Prediction of Diabetes from Medical Checkup Data
Masakazu MORIMOTO  Naotake KAMIURA  Yutaka HATA  Ichiro YAMAMOTO  
Summary | Full Text:PDF (881.8KB) >>Buy this Article

Special Section on Information and Communication System Security

pp.1647-1648  FOREWORD  Open Access Paper
FOREWORD
Yasunori ISHIHARA  
Summary | FreeFull Text:PDF(80.5KB)

pp.1649-1662  INVITED PAPER  Open Access Paper
An Overview of Security and Privacy Issues for Internet of Things
Heung Youl YOUM  
Summary | FreeFull Text:PDF(6.5MB)

pp.1663-1670  PAPER-Privacy
Building a Scalable Web Tracking Detection System: Implementation and the Empirical Study
Yumehisa HAGA  Yuta TAKATA  Mitsuaki AKIYAMA  Tatsuya MORI  
Summary | Full Text:PDF (633.9KB) >>Buy this Article

pp.1671-1679  PAPER-Privacy
Novel Method to Watermark Anonymized Data for Data Publishing
Yuichi NAKAMURA  Yoshimichi NAKATSUKA  Hiroaki NISHI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1680-1690  PAPER-Privacy
Tracking the Human Mobility Using Mobile Device Sensors
Takuya WATANABE  Mitsuaki AKIYAMA  Tatsuya MORI  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1691-1702  PAPER-Program Analysis
Finding New Varieties of Malware with the Classification of Network Behavior
Mitsuhiro HATADA  Tatsuya MORI  
Summary | Full Text:PDF (454.3KB) >>Buy this Article

pp.1703-1713  PAPER-Program Analysis
APPraiser: A Large Scale Analysis of Android Clone Apps
Yuta ISHII  Takuya WATANABE  Mitsuaki AKIYAMA  Tatsuya MORI  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1714-1728  PAPER-Internet Security
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces
Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeshi YADA  Shigeki GOTO  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.1729-1737  PAPER-Internet Security
HFSTE: Hybrid Feature Selections and Tree-Based Classifiers Ensemble for Intrusion Detection System
Bayu Adhi TAMA  Kyung-Hyune RHEE  
Summary | Full Text:PDF (505KB) >>Buy this Article

pp.1738-1750  PAPER-Internet Security
Trustworthy DDoS Defense: Design, Proof of Concept Implementation and Testing
Mohamad Samir A. EID  Hitoshi AIDA  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.1751-1761  PAPER-Internet Security
A Client Based DNSSEC Validation System with Adaptive Alert Mechanism Considering Minimal Client Timeout
Yong JIN  Kunitaka KAKOI  Nariyoshi YAMAI  Naoya KITAGAWA  Masahiko TOMOISHI  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1762-1769  PAPER-Access Control
Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem
Jianfeng LU  Zheng WANG  Dewu XU  Changbing TANG  Jianmin HAN  
Summary | Full Text:PDF (682.9KB) >>Buy this Article

pp.1770-1779  PAPER-Cryptographic Schemes
Multi-Group Signature Scheme for Simultaneous Verification by Neighbor Services
Kenta NOMURA  Masami MOHRI  Yoshiaki SHIRAISHI  Masakatu MORII  
Summary | Full Text:PDF (1018.3KB) >>Buy this Article

pp.1780-1789  PAPER-Industrial Control System Security
A Novel RNN-GBRBM Based Feature Decoder for Anomaly Detection Technology in Industrial Control Network
Hua ZHANG  Shixiang ZHU  Xiao MA  Jun ZHAO  Zeng SHOU  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1790-1797  PAPER-Industrial Control System Security
Recovery Measure against Disabling Reassembly Attack to DNP3 Communication
Sungmoon KWON  Hyunguk YOO  Taeshik SHON  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

Regular Section

pp.1798-1806  PAPER-Computer System
A Novel Channel Assignment Method to Ensure Deadlock-Freedom for Deterministic Routing
Ryuta KAWANO  Hiroshi NAKAHARA  Seiichi TADE  Ikki FUJIWARA  Hiroki MATSUTANI  Michihiro KOIBUCHI  Hideharu AMANO  
Summary | Full Text:PDF (988.8KB) >>Buy this Article

pp.1807-1818  PAPER-Computer System
An Approach for Solving SAT/MaxSAT-Encoded Formal Verification Problems on FPGA
Kenji KANAZAWA  Tsutomu MARUYAMA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1819-1826  PAPER-Software Engineering
Model Checking of Embedded Assembly Program Based on Simulation
Satoshi YAMANE  Ryosuke KONOSHITA  Tomonori KATO  
Summary | Full Text:PDF (346.8KB) >>Buy this Article

pp.1827-1836  PAPER-Information Network
A Generic Bi-Layer Data-Driven Crowd Behaviors Modeling Approach
Weiwei XING  Shibo ZHAO  Shunli ZHANG  Yuanyuan CAI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1837-1843  PAPER-Dependable Computing
Node-to-Node Disjoint Paths Problem in Möbius Cubes
David KOCIK  Keiichi KANEKO  
Summary | Full Text:PDF (506.9KB) >>Buy this Article

pp.1844-1851  PAPER-Artificial Intelligence, Data Mining
Mutual Kernel Matrix Completion
Rachelle RIVERO  Richard LEMENCE  Tsuyoshi KATO  
Summary | Full Text:PDF (517.7KB) >>Buy this Article

pp.1852-1859  PAPER-Artificial Intelligence, Data Mining
The Biterm Author Topic in the Sentences Model for E-Mail Analysis
Xiuze ZHOU  Shunxiang WU  
Summary | Full Text:PDF (935.7KB) >>Buy this Article

pp.1860-1869  PAPER-Pattern Recognition
Feature Selection Based on Modified Bat Algorithm
Bin YANG  Yuliang LU  Kailong ZHU  Guozheng YANG  Jingwei LIU  Haibo YIN  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1870-1881  PAPER-Image Recognition, Computer Vision
3D Tracker-Level Fusion for Robust RGB-D Tracking
Ning AN  Xiao-Guang ZHAO  Zeng-Guang HOU  
Summary | Full Text:PDF (4.9MB) >>Buy this Article

pp.1882-1892  PAPER-Natural Language Processing
An Approach for Chinese-Japanese Named Entity Equivalents Extraction Using Inductive Learning and Hanzi-Kanji Mapping Table
JinAn XU  Yufeng CHEN  Kuang RU  Yujie ZHANG  Kenji ARAKI  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.1893-1902  PAPER-Natural Language Processing
Relation Extraction with Deep Reinforcement Learning
Hongjun ZHANG  Yuntian FENG  Wenning HAO  Gang CHEN  Dawei JIN  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1903-1906  LETTER-Software Engineering
Kernel CCA Based Transfer Learning for Software Defect Prediction
Ying MA  Shunzhi ZHU  Yumin CHEN  Jingjing LI  
Summary | Full Text:PDF (188KB) >>Buy this Article

pp.1907-1910  LETTER-Data Engineering, Web Information Systems
Analysis of Performance for NAND Flash Based SSDs via Using Host Semantic Information
Jaeho KIM  Jung Kyu PARK  
Summary | Full Text:PDF (395.2KB) >>Buy this Article

pp.1911-1915  LETTER-Information Network
Optimal Spot-Checking Ratio for Probabilistic Attacks in Remote Data Checking
Younsoo PARK  Jungwoo CHOI  Young-Bin KWON  Jaehwa PARK  Ho-Hyun PARK  
Summary | Full Text:PDF (310.4KB) >>Buy this Article

pp.1916-1919  LETTER-Information Network
Affinity Propagation Algorithm Based Multi-Source Localization Method for Binary Detection
Yan WANG  Long CHENG  Jian ZHANG  
Summary | Full Text:PDF (394.1KB) >>Buy this Article

pp.1920-1921  LETTER-Dependable Computing
Stochastic Fault-Tolerant Routing in Dual-Cubes
Junsuk PARK  Nobuhiro SEKI  Keiichi KANEKO  
Summary | Full Text:PDF (143.3KB) >>Buy this Article

pp.1922-1924  LETTER-Pattern Recognition
Trajectory-Set Feature for Action Recognition
Kenji MATSUI  Toru TAMAKI  Bisser RAYTCHEV  Kazufumi KANEDA  
Summary | Full Text:PDF (479.9KB) >>Buy this Article

pp.1925-1928  LETTER-Speech and Hearing
Voice Conversion Using Input-to-Output Highway Networks
Yuki SAITO  Shinnosuke TAKAMICHI  Hiroshi SARUWATARI  
Summary | Full Text:PDF (557.9KB) >>Buy this Article

pp.1929-1933  LETTER-Image Processing and Video Processing
DIBR-Synthesized Image Quality Assessment via Statistics of Edge Intensity and Orientation
Yu ZHOU  Leida LI  Ke GU  Zhaolin LU  Beijing CHEN  Lu TANG  
Summary | Full Text:PDF (2.7MB) >>Buy this Article

pp.1934-1937  LETTER-Image Processing and Video Processing
Rapid Generation of the State Codebook in Side Match Vector Quantization
Hanhoon PARK  Jong-Il PARK  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.1938-1942  LETTER-Image Recognition, Computer Vision
Pre-Processing for Fine-Grained Image Classification
Hao GE  Feng YANG  Xiaoguang TU  Mei XIE  Zheng MA  
Summary | Full Text:PDF (944KB) >>Buy this Article

Previous | 
go to Page Top