IEICE TRANSACTIONS on Information and Systems    (open access publishing)
Online ISSN : 1745-1361
[Whole issue]:PDF (41.9MB)
Previous | 
Top 10 downloads
To the Latest Issue

Advance publication (published online immediately after acceptance)

Patch Optimization for Surface Light Field Reconstruction
Wei LI  Huajun GONG  Chunlin SHEN  Yi WU  
Summary | Full Text:PDF(2.2MB)

Visualization of Inter-module Dataflow through Global Variables for Source Code Review
Naoto ISHIDA  Takashi ISHIO  Yuta NAKAMURA  Shinji KAWAGUCHI  Tetsuya KANDA  Katsuro INOUE  
Summary | Full Text:PDF(100.5KB)

A Multilevel Indexing Method for Approximate Geospatial Aggregation Analysis
Luo CHEN  Ye WU  Wei XIONG  Ning JING  
Summary | Full Text:PDF(813KB)

Parametric Models for Mutual Kernel Matrix Completion
Rachelle RIVERO  Tsuyoshi KATO  
Summary | Full Text:PDF(176.8KB)

Salient Feature Selection for CNN-based Visual Place Recognition
Yutian Chen  Wenyan Gan  Shanshan Jiao  Youwei Xu  Yuntian Feng  
Summary | Full Text:PDF(529KB)

Extrinsic Camera Calibration of Display-Camera System with Cornea Reflections
Summary | Full Text:PDF(2.6MB)

Multi Long-Short Term Memory Models for Short Term Traffic Flow Prediction
Zelong XUE  Yang XUE  
Summary | Full Text:PDF(2.8MB)

New Context-Adaptive Arithmetic Coding Scheme for Lossless Bit Rate Reduction of Parametric Stereo in Enhanced aacPlus
Hee-Suk PANG  Jun-seok LIM  Hyun-Young JIN  
Summary | Full Text:PDF(216.7KB)

Hardware based parallel phrase matching engine in dictionary compressor
Qian Dong  
Summary | Full Text:PDF(349.8KB)

A Genetic Approach for Accelerating Communication Performance by Node Mapping
Takashi YOKOTA  Kanemitsu OOTSU  Takeshi OHKAWA  
Summary | Full Text:PDF(174.7KB)

Parallel Precomputation with Input Value Prediction for Model Predictive Control Systems
Satoshi KAWAKAMI  Takatsugu ONO  Toshiyuki OHTSUKA  Koji INOUE  
Summary | Full Text:PDF(3.9MB)

Real-time and Energy-efficient Face Detection on CPU-GPU Heterogeneous Embedded Platforms
Chanyoung OH  Saehanseul YI  Youngmin YI  
Summary | Full Text:PDF(644.1KB)

ATSMF: Automated tiered storage with fast memory and slow flash storage to improve response time with concentrated input-output (IO) workloads
Kazuichi OE  Mitsuru SATO  Takeshi NANRI  
Summary | Full Text:PDF(1.2MB)

The Panpositionable Pancyclicity of Locally Twisted Cubes
Hon-Chan CHEN  
Summary | Full Text:PDF(274.6KB)

Order Adjustment Approach using Cayley Graphs for the Order/Degree Problem
Teruaki KITASUKA  Takayuki MATSUZAKI  Masahiro IIDA  
Summary | Full Text:PDF(245.6KB)

Cycle Embedding in Generalized Recursive Circulant Graphs
Shyue-Ming TANG  Yue-Li WANG  Chien-Yi LI  Jou-Ming CHANG  
Summary | Full Text:PDF(514.9KB)

Enhancing Job Scheduling on Inter-rackscale Datacenters with Free-space Optical Links
Yao HU  Michihiro KOIBUCHI  
Summary | Full Text:PDF(4.1MB)

Distributed Video Decoding on Hadoop
Illo YOON  Saehanseul YI  Chanyoung OH  Hyeonjin JUNG  Youngmin YI  
Summary | Full Text:PDF(750.6KB)

A Robust Algorithm for Deadline Constrained Scheduling in IaaS Cloud Environment
Bilkisu Larai MUHAMMAD-BELLO  Masayoshi ARITSUGI  
Summary | Full Text:PDF(1.9MB)

Avoiding Performance Impacts by Re-replication Workload Shifting in HDFS based Cloud Storage
Thanda SHWE  Masayoshi ARITSUGI  
Summary | Full Text:PDF(364.1KB)

Discovering Co-cluster Structure from Relationships between Biased Objects
Iku OHAMA  Takuya KIDA  Hiroki ARIMURA  
Summary | Full Text:PDF(1.9MB)

Highly Efficient Mobile Visual Search Algorithm
Chuang ZHU  Xiao Feng HUANG  Guo Qing XIANG  Hui Hui DONG  Jia Wen SONG  
Summary | Full Text:PDF(1.1MB)

Leveraging Unannotated Texts for Scientific Relation Extraction
Qin DAI  Naoya INOUE  Paul REISERT  Kentaro INUI  
Summary | Full Text:PDF(1.6MB)

A New DY Conjugate Gradient Method and Applications to Image Denoising
Wei XUE  Junhong REN  Xiao ZHENG  Zhi LIU  Yueyong LIANG  
Summary | Full Text:PDF(1.1MB)

BareUnpack: Generic Unpacking on the Bare-metal Operating System
Summary | Full Text:PDF(806.9KB)

Finding Widespread Events with Simple Bitmaps
Summary | Full Text:PDF(285.1KB)

A Verification Framework for Assembly Programs under Relaxed Memory Model using SMT Solver
Pattaravut MALEEHUAN  Yuki CHIBA  Toshiaki AOKI  
Summary | Full Text:PDF(694.9KB)

Local Feature Reliability Measure Consistent with Match Conditions for Mobile Visual Search
Summary | Full Text:PDF(2.4MB)

Shortening Downtime of Reboot-based Kernel Updates using Dwarf
Ken TERADA  Hiroshi YAMADA  
Summary | Full Text:PDF(1.1MB)

Improving Thai Word and Sentence Segmentation Using Linguistic Knowledge
Rungsiman Nararatwong  Natthawut Kertkeidkachorn  Nagul Cooharojananone  Hitoshi Okada  
Summary | Full Text:PDF(1.4MB)

A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components
Shoko IMAIZUMI  Hitoshi KIYA  
Summary | Full Text:PDF(3MB)

A two-stage crack detection method for concrete bridges using Convolutional Neural Networks
Yundong Li  Weigang Zhao  Xueyan Zhang  Qichen Zhou  
Summary | Full Text:PDF(515.9KB)

In-vehicle Voice Interface with Improved Utterance Classification Accuracy Using Off-the-shelf Cloud Speech Recognizer
Takeshi HOMMA  Yasunari OBUCHI  Kazuaki SHIMA  Rintaro IKESHITA  Hiroaki KOKUBO  Takuya MATSUMOTO  
Summary | Full Text:PDF(747.6KB)

A Novel Speech Enhancement System Based on the Coherence-based Algorithm and the Differential Beamforming
Lei WANG  Jie ZHU  
Summary | Full Text:PDF(465.1KB)

Currency Preserving Query: Selecting the Newest Values from Multiple Tables
Mohan LI  Yanbin SUN  
Summary | Full Text:PDF(598.9KB)

A Robust Depth Image Based Rendering Scheme for Stereoscopic View Synthesis with Adaptive Domain Transform Based Filtering Framework
Wei LIU  Yun Qi TANG  Jian Wei DING  Ming Yue CUI  
Summary | Full Text:PDF(980.3KB)

View Priority Based Threads Allocation and Binary Search Oriented Reweight for GPU Accelerated Real-time 3D Ball Tracking
Yilin HOU  Ziwei DENG  Xina CHENG  Takeshi IKENAGA  
Summary | Full Text:PDF(6.3MB)

Cooperative GPGPU Scheduling for Consolidating Server Workloads
Yusuke SUZUKI  Hiroshi YAMADA  Shinpei KATO  Kenji KONO  
Summary | Full Text:PDF(2.1MB)

Security Consideration For Deep Learning-Based Image Forensics
Wei ZHAO  Pengpeng YANG  Rongrong NI  Yao ZHAO  Haorui WU  
Summary | Full Text:PDF(3.9MB)

Development of License Plate Recognition on Complex Scene with Plate-style Classification and Confidence Scoring based on KNN
Vince Jebryl MONTERO  Yong-Jin JEONG  
Summary | Full Text:PDF(691.7KB)

Hidden Singer: Distinguishing Imitation Singers based on Training with Only the Original Song
Hosung PARK  Seungsoo NAM  Eun MAN CHOI  Daeseon CHOI  
Summary | Full Text:PDF(1.1MB)

A rate perceptual-distortion optimized video coding HEVC
Bumshik Lee  Jae Young Choi  
Summary | Full Text:PDF(1.2MB)

Automatic prevention of buffer overflow vulnerability using candidate code generation
Young-Su JANG  Jin-Young CHOI  
Summary | Full Text:PDF(651.4KB)

Syntax-Based Context Representation for Statistical Machine Translation
Kehai CHEN  Tiejun ZHAO  Muyun YANG  
Summary | Full Text:PDF(952KB)

An Overview of Cyber Security for Connected Vehicles
Summary | Full Text:PDF(3.1MB)

A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks
Taekeun PARK  Koohong KANG  Daesung MOON  
Summary | Full Text:PDF(342.9KB)

Tag-KEM/DEM Framework for Public-key Encryption with Non-interactive Opening
Yusuke SAKAI  Takahiro MATSUDA  Goichiro HANAOKA  
Summary | Full Text:PDF(305.9KB)

Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences
Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeo HARIU  Kazuhiko OHKUBO  Shigeki GOTO  
Summary | Full Text:PDF(2MB)

Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps
Takuya WATANABE  Mitsuaki AKIYAMA  Tetsuya SAKAI  Hironori WASHIZAKI  Tatsuya MORI  
Summary | Full Text:PDF(2MB)

Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement
Summary | Full Text:PDF(1.9MB)

Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities
Summary | Full Text:PDF(743.9KB)

Automatically Generating Malware Analysis Reports Using Sandbox Logs
Bo SUN  Akinori FUJINO  Tatsuya MORI  Tao BAN  Takeshi TAKAHASHI  Daisuke INOUE  
Summary | Full Text:PDF(2.2MB)

Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
Seira HIDANO  Takao MURAKAMI  Shuichi KATSUMATA  Shinsaku KIYOMOTO  Goichiro HANAOKA  
Summary | Full Text:PDF(713.5KB)

Design and Implementation of SDN-based Proactive Firewall System in Collaboration with Domain Name Resolution
Hiroya IKARASHI  Yong JIN  Nariyoshi YAMAI  Naoya KITAGAWA  Kiyohiko OKAYAMA  
Summary | Full Text:PDF(1.2MB)

Modeling Attack Activity for Integrated Analysis of Threat Information
Daiki Ito  Kenta Nomura  Masaki Kamizono  Yoshiaki Shiraishi  Yasuhiro Takano  Masami Mohri  Masakatu Morii  
Summary | Full Text:PDF(191.6KB)

A Secure In-Depth File System Concealed by GPS-based Mounting Authentication for Mobile Devices
Yong JIN  Masahiko TOMOISHI  Satoshi MATSUURA  Yoshiaki KITAGUCHI  
Summary | Full Text:PDF(3.2MB)

Design exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V processor
Jinli RAO  Tianyong AO  Shu XU  Kui DAI  Xuecheng ZOU  
Summary | Full Text:PDF(666KB)

Zero-Knowledge Identification Scheme Using LDPC Codes
Haruka ITO  Masanori HIROTOMO  Youji FUKUTA  Masami MOHRI  Yoshiaki SHIRAISHI  
Summary | Full Text:PDF(150.2KB)

Energy-Efficient Connectivity Re-establishment in UASNs with Dumb Nodes
Qiuli CHEN  Ming HE  Fei DAI  Chaozheng ZHU  
Summary | Full Text:PDF(462.8KB)

Efficient Methods of Inactive Regions Padding for Segmented Sphere Projection (SSP) of 360 Video
Yong-Uk Yoon  Yong-Jo Ahn  Donggyu Sim  Jae-Gon Kim  
Summary | Full Text:PDF(448.9KB)

NEST: Towards Extreme Scale Computing Systems
Yunfeng LU  Huaxi GU  Xiaoshan YU  Kun WANG  
Summary | Full Text:PDF(407.9KB)

High-performance Super-Resolution via Patch-based Deep Neural Network for Real-time Implementation
Reo AOKI  Kousuke IMAMURA  Akihiro HIRANO  Yoshio MATSUDA  
Summary | Full Text:PDF(2.1MB)

Summary | Full Text:PDF(1.5MB)

Food intake detection and classification using a necklace-type piezoelectric wearable sensor system
Ghulam HUSSAIN  Kamran JAVED  Jundong CHO  Juneho YI  
Summary | Full Text:PDF(1.5MB)

On the Optimal Configuration of Grouping-Based Framed Slotted ALOHA
Young-Beom KIM  
Summary | Full Text:PDF(124.7KB)

How are IF-Conditional Statements Fixed Through Peer CodeReview?
Yuki UEDA  Akinori IHARA  Takashi ISHIO  Toshiki HIRAO  Kenichi MATSUMOTO  
Summary | Full Text:PDF(275.7KB)

Studying the Cost and Effectiveness of OSS Quality Assessment Models: An Experience Report of Fujitsu QNET
Yasutaka KAMEI  Takahiro MATSUMOTO  Kazuhiro YAMASHITA  Naoyasu UBAYASHI  Takashi IWASAKI  Shuichi TAKAYAMA  
Summary | Full Text:PDF(649.1KB)

Adaptive Object Tracking with Complementary Models
Peng GAO  Yipeng MA  Chao LI  Ke SONG  Yan ZHANG  Fei WANG  Liyi XIAO  
Summary | Full Text:PDF(1.8MB)

Fostering Real-time Software Analysis by Leveraging Heterogeneous and Autonomous Software Repositories
Summary | Full Text:PDF(746.3KB)

Speeding up Extreme Multi-label Classifier by Approximate Nearest Neighbor Search
Yukihiro TAGAMI  
Summary | Full Text:PDF(3.1MB)

Accelerating a Lloyd-Type k-Means Clustering Algorithm with Summable Lower Bounds in a Lower-Dimensional Space
Kazuo AOYAMA  Kazumi SAITO  Tetsuo IKEDA  
Summary | Full Text:PDF(651.6KB)

Deep Convolutional Neural Networks for Manga Show-Through Cancellation
Taku NAKAHARA  Kazunori URUMA  Tomohiro TAKAHASHI  Toshihiro FURUKAWA  
Summary | Full Text:PDF(1.1MB)

Lightweight Security Hardware Architecture using DWT and AES Algorithms
Summary | Full Text:PDF(1.8MB)

Efficient texture creation based on random patches in database and guided filter
Seok Bong Yoo  Mikyong Han  
Summary | Full Text:PDF(1.1MB)

Accurate Scale Adaptive and Real-Time Visual Tracking with Correlation Filters
Jiatian PI  Shaohua ZENG  Qing ZUO  Yan WEI  
Summary | Full Text:PDF(1.1MB)

Critical Nodes Identification of Power Grids Based on Network Efficiency
WenJie KANG  PeiDong ZHU  JieXin ZHANG  JunYang ZHANG  
Summary | Full Text:PDF(634.5KB)

Strip-Switched Deployment Method to Optimize Single Failure Recovery for Erasure Coded Storage Systems
Yingxun FU  Shilin WEN  Li MA  Jianyong DUAN  
Summary | Full Text:PDF(170.7KB)

High-speed spelling in virtual reality with sequential hybrid BCIs
Zhaolin YAO  Xinyao MA  Yijun WANG  Xu ZHANG  Ming LIU  Weihua PEI  Hongda CHEN  
Summary | Full Text:PDF(621.4KB)

TS-ICNN: Time Sequence-based Interval Convolutional Neural Networks for Human Action Detection and Recognition
Zhendong ZHUANG  Yang XUE  
Summary | Full Text:PDF(2.3MB)

Finding Important People in a Video Using Deep Neural Networks with Conditional Random Fields
Mayu OTANI  Atsushi NISHIDA  Yuta NAKASHIMA  Tomokazu SATO  Naokazu YOKOYA  
Summary | Full Text:PDF(1.8MB)

Individuality-preserving Gait Pattern Prediction based on Gait Feature Transitions
Tsuyoshi HIGASHIGUCHI  Norimichi UKITA  Masayuki KANBARA  Norihiro HAGITA  
Summary | Full Text:PDF(495.9KB)

Standard-Compliant Multiple Description Image Coding Based on Convolutional Neural Networks
Ting ZHANG  Huihui BAI  Mengmeng ZHANG  Yao ZHAO  
Summary | Full Text:PDF(1.1MB)

Improving Distantly Supervised Relation Extraction by Knowledge Base-driven Zero Subject Resolution
Eun-kyung KIM  KEY-SUN CHOI  
Summary | Full Text:PDF(1MB)

Uncertain Rule based Method for Determining Data Currency
Mohan LI  Jianzhong LI  Siyao CHENG  Yanbin SUN  
Summary | Full Text:PDF(480.8KB)

Twofold Correlation Filtering for Tracking Integration
Wei WANG  Weiguang Li  Zhaoming CHEN  Mingquan SHI  
Summary | Full Text:PDF(2.9MB)

Weighting Estimation Methods for Opponents' Utility Functions using Boosting in Multi-time Negotiations
Takaki MATSUNE  Katsuhide FUJITA  
Summary | Full Text:PDF(344.4KB)

RbWL: Recency-based static wear leveling for lifetime extension and overhead reduction in NAND flash memory systems
Sang-Ho HWANG  Jong Wook KWAK  
Summary | Full Text:PDF(3MB)

Improving Per-node Computing Efficiency by an Adaptive Lock-free Scheduling Model
Zhishuo ZHENG  Deyu QI  Naqin ZHOU  Xinyang WANG  Mincong YU  
Summary | Full Text:PDF(1.9MB)

Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers
Hyun KWON  Yongchul KIM  Ki-Woong PARK  Hyunsoo YOON  Daeseon CHOI  
Summary | Full Text:PDF(5.6MB)

Spectrum-based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List
Yong WANG  Zhiqiu HUANG  Rongcun WANG  Qiao YU  
Summary | Full Text:PDF(347.4KB)

Search-based Concolic Execution for SW Vulnerability Discovery
Rustamov FAYOZBEK  Minjun CHOI  Joobeom YUN  
Summary | Full Text:PDF(606.4KB)

Impact of Viewing Distance on Task Performance and Its Properties
Summary | Full Text:PDF(386KB)

Client-side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames
Qian LU  Haipeng QU  Yuan ZHUANG  Xi-Jun LIN  Yuzhan OUYANG  
Summary | Full Text:PDF(2.7MB)

Low Bit-Rate Compression Image Restoration Through Subspace Joint Regression Learning
Zongliang GAN  
Summary | Full Text:PDF(1.4MB)

A Quantitative Analysis on Relationship between an Early-Closed Bug and its Amount of Clues: A Case Study of Apache Ant
Akito SUNOUCHI  Hirohisa AMAN  Minoru KAWAHARA  
Summary | Full Text:PDF(85.7KB)

MinDoS: A Priority-Based SDN Safe-Guard Architecture for DoS Attacks
Tao Wang  Hongchang Chen  Chao Qi  
Summary | Full Text:PDF(735.2KB)

 Volume E101-D No.9  (Publication Date:2018/09/01)
Special Section on Picture Coding and Image Media Processing

pp.2178-2178  FOREWORD
Toshiaki FUJII  
Summary | Full Text:PDF (63.7KB) >>Buy this Article

pp.2179-2189  PAPER
Robust Index Code to Distribute Digital Images and Digital Contents Together
Minsu KIM  Kunwoo LEE  Katsuhiko GONDOW  Jun-ichi IMURA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.2190-2200  PAPER
Designing Coded Aperture Camera Based on PCA and NMF for Light Field Acquisition
Yusuke YAGI  Keita TAKAHASHI  Toshiaki FUJII  Toshiki SONODA  Hajime NAGAHARA  
Summary | Full Text:PDF (3.6MB) >>Buy this Article

pp.2201-2208  PAPER
Video Saliency Detection Using Spatiotemporal Cues
Yu CHEN  Jing XIAO  Liuyi HU  Dan CHEN  Zhongyuan WANG  Dengshi LI  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.2209-2219  PAPER
Sparse Graph Based Deep Learning Networks for Face Recognition
Renjie WU  Sei-ichiro KAMATA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.2220-2223  LETTER
Fast CU Termination Algorithm with AdaBoost Classifier in HEVC Encoder
Yitong LIU  Wang TIAN  Yuchen LI  Hongwen YANG  
Summary | Full Text:PDF (280.2KB) >>Buy this Article

Regular Section

pp.2224-2234  PAPER-Fundamentals of Information Systems
Trading-Off Computing and Cooling Energies by VM Migration in Data Centers
Ying SONG  Xia ZHAO  Bo WANG  Yuzhong SUN  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.2235-2246  PAPER-Fundamentals of Information Systems
A Linear-Time Algorithm for Finding a Spanning Tree with Non-Terminal Set VNT on Interval Graphs
Shin-ichi NAKAYAMA  Shigeru MASUYAMA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.2247-2257  PAPER-Computer System
Evaluating Energy-Efficiency of DRAM Channel Interleaving Schemes for Multithreaded Programs
Satoshi IMAMURA  Yuichiro YASUI  Koji INOUE  Takatsugu ONO  Hiroshi SASAKI  Katsuki FUJISAWA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.2258-2268  PAPER-Computer System
Proxy Responses by FPGA-Based Switch for MapReduce Stragglers
Koya MITSUZUKA  Michihiro KOIBUCHI  Hideharu AMANO  Hiroki MATSUTANI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.2269-2278  PAPER-Software Engineering
Cross-Validation-Based Association Rule Prioritization Metric for Software Defect Characterization
Takashi WATANABE  Akito MONDEN  Zeynep YÜCEL  Yasutaka KAMEI  Shuji MORISAKI  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.2279-2290  PAPER-Data Engineering, Web Information Systems
Entity Ranking for Queries with Modifiers Based on Knowledge Bases and Web Search Results
Wiradee IMRATTANATRAI  Makoto P. KATO  Katsumi TANAKA  Masatoshi YOSHIKAWA  
Summary | Full Text:PDF (416.3KB) >>Buy this Article

pp.2291-2297  PAPER-Information Network
Formal Method for Security Analysis of Electronic Payment Protocols
Yi LIU  Qingkun MENG  Xingtong LIU  Jian WANG  Lei ZHANG  Chaojing TANG  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.2298-2306  PAPER-Artificial Intelligence, Data Mining
Review Rating Prediction on Location-Based Social Networks Using Text, Social Links, and Geolocations
Yuehua WANG  Zhinong ZHONG  Anran YANG  Ning JING  
Summary | Full Text:PDF (2.9MB) >>Buy this Article

pp.2307-2314  PAPER-Artificial Intelligence, Data Mining
A Machine Learning-Based Approach for Selecting SpMV Kernels and Matrix Storage Formats
Hang CUI  Shoichi HIRASAWA  Hiroaki KOBAYASHI  Hiroyuki TAKIZAWA  
Summary | Full Text:PDF (749.4KB) >>Buy this Article

pp.2315-2322  PAPER-Artificial Intelligence, Data Mining
Deep Reinforcement Learning with Sarsa and Q-Learning: A Hybrid Approach
Zhi-xiong XU  Lei CAO  Xi-liang CHEN  Chen-xi LI  Yong-liang ZHANG  Jun LAI  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.2323-2333  PAPER-Artificial Intelligence, Data Mining
Pattern-Based Ontology Modeling and Reasoning for Emergency System
Yue TAN  Wei LIU  Zhenyu YANG  Xiaoni DU  Zongtian LIU  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.2334-2345  PAPER-Artificial Intelligence, Data Mining
An Application of Intuitionistic Fuzzy Sets to Improve Information Extraction from Thai Unstructured Text
Summary | Full Text:PDF (1017.3KB) >>Buy this Article

pp.2346-2355  PAPER-Artificial Intelligence, Data Mining
Incremental Estimation of Natural Policy Gradient with Relative Importance Weighting
Ryo IWAKI  Hiroki YOKOYAMA  Minoru ASADA  
Summary | Full Text:PDF (3.1MB) >>Buy this Article

pp.2356-2367  PAPER-Educational Technology
Reciprocal Kit-Build Concept Map: An Approach for Encouraging Pair Discussion to Share Each Other's Understanding
Warunya WUNNASRI  Jaruwat PAILAI  Yusuke HAYASHI  Tsukasa HIRASHIMA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.2368-2380  PAPER-Image Processing and Video Processing
Variational-Bayesian Single-Image Devignetting
Motoharu SONOGASHIRA  Masaaki IIYAMA  Michihiko MINOH  
Summary | Full Text:PDF (5.3MB) >>Buy this Article

pp.2381-2391  PAPER-Image Processing and Video Processing
Optimal Billboard Deformation via 3D Voxel for Free-Viewpoint System
Keisuke NONAKA  Houari SABIRIN  Jun CHEN  Hiroshi SANKOH  Sei NAITO  
Summary | Full Text:PDF (3.1MB) >>Buy this Article

pp.2392-2400  PAPER-Biological Engineering
An Edge Detection Method Based on Wavelet Transform at Arbitrary Angles
Su LIU  Xingguang GENG  Yitao ZHANG  Shaolong ZHANG  Jun ZHANG  Yanbin XIAO  Chengjun HUANG  Haiying ZHANG  
Summary | Full Text:PDF (2.9MB) >>Buy this Article

pp.2401-2403  LETTER-Computer System
Waffle: A New Photonic Plasmonic Router for Optical Network on Chip
Chao TANG  Huaxi GU  Kun WANG  
Summary | Full Text:PDF (302.9KB) >>Buy this Article

pp.2404-2408  LETTER-Data Engineering, Web Information Systems
Data Recovery Aware Garbage Collection Mechanism in Flash-Based Storage Devices
Joon-Young PAIK  Rize JIN  Tae-Sun CHUNG  
Summary | Full Text:PDF (481.4KB) >>Buy this Article

pp.2409-2412  LETTER-Artificial Intelligence, Data Mining
Reward-Based Exploration: Adaptive Control for Deep Reinforcement Learning
Zhi-xiong XU  Lei CAO  Xi-liang CHEN  Chen-xi LI  
Summary | Full Text:PDF (479.2KB) >>Buy this Article

pp.2413-2416  LETTER-Pattern Recognition
A Propagation Method for Multi Object Tracklet Repair
Nii L. SOWAH  Qingbo WU  Fanman MENG  Liangzhi TANG  Yinan LIU  Linfeng XU  
Summary | Full Text:PDF (783.1KB) >>Buy this Article

pp.2417-2421  LETTER-Natural Language Processing
A Unified Neural Network for Quality Estimation of Machine Translation
Maoxi LI  Qingyu XIANG  Zhiming CHEN  Mingwen WANG  
Summary | Full Text:PDF (610.8KB) >>Buy this Article

Previous | 
go to Page Top