IEICE TRANSACTIONS on Information and Systems
Online ISSN : 1745-1361
[Whole issue]:PDF (65.7MB)
Previous | 
Top 10 downloads
To the Latest Issue

Advance publication (published online immediately after acceptance)


PBGC: Proxy Block-based Garbage Collection for Index Structures in NAND Flash Memory
Seon Hwan KIM  Ju Hee CHOI  Jong Wook KWAK  
Summary | Full Text:PDF(256.8KB)


Inishing: A UI phishing attack to exploit the vulnerability of inotify in Android smartphones
Woo Hyun AHN  Sanghyeon PARK  Jaewon OH  Seung-Ho LIM  
Summary | Full Text:PDF(1.4MB)


Fast intra mode decision for screen contents coding in HEVC
Yong-Jo AHN  Xiangjian WU  Donggyu SIM  Woo-Jin HAN  
Summary | Full Text:PDF(419KB)


Fast coding unit size decision in HEVC intra coding
Tao FAN  Guozhong WANG  Xiwu SHANG  
Summary | Full Text:PDF(244.1KB)


Efficient Residual Coding Method of Spatial Audio Object Coding with Two-Step Coding Structure for Interactive Audio Services
Byonghwa LEE  Kwangki KIM  Minsoo HAHN  
Summary | Full Text:PDF(725.1KB)


Energy-based Tree Illustration System: ETIS
Katsuto NAKAJIMA  Azusa MAMA  Yuki MORIMOTO  
Summary | Full Text:PDF(1.9MB)


Speech Enhancement Algorithm using Recursive Wavelet Shrinkage
Gihyoun LEE  Sung Dae NA  KiWoong SEONG  Jin-Ho CHO  Myoung Nam KIM  
Summary | Full Text:PDF(135.3KB)


Spectral features based on local Hu moments of Gabor spectrograms for speech emotion recognition
Huawei TAO  Ruiyu LIANG  Cheng ZHA  Xinran ZHANG  Li ZHAO  
Summary | Full Text:PDF(435.7KB)


LRU-LC: Fast Estimating Cardinality of Flows over Sliding Windows
Jingsong SHAN  Jianxin LUO  Guiqiang NI  Yinjin FU  Zhaofeng WU  
Summary | Full Text:PDF(141KB)


LP guided PSO Algorithm for Office Lighting Control
Wa SI  Xun PAN  Harutoshi OGAI  Katsumi HIRAI  
Summary | Full Text:PDF(8.9MB)


The novel performance evaluation method of the fingerprinting-based indoor positioning
Shutchon PREMCHAISAWATT  Nararat RUANGCHAIJATUPON  
Summary | Full Text:PDF(318.9KB)


Reputation-based Collusion Detection with Majority of Colluders
Junbeom HUR  Mengxue GUO  Younsoo PARK  Chan-Gun LEE  Ho-Hyun PARK  
Summary | Full Text:PDF(423KB)


Multiple k-Nearest Neighbor Classifier and Its Application to Tissue Characterization of Coronary Plaque
Eiji UCHINO  Ryosuke KUBOTA  Takanori KOGA  Hideaki MISAWA  Noriaki SUETAKE  
Summary | Full Text:PDF(4MB)


Incremental Semantic Construction Based on Combinatory Categorial Grammar
Yoshihide KATO  Shigeki MATSUBARA  
Summary | Full Text:PDF(217.4KB)


Design of multilevel hybrid classifier with variant feature sets for intrusion detection system
Aslhan Akyol  Mehmet Hac?beyolu  Bekir Karlk  
Summary | Full Text:PDF(804KB)


A Virtualization-based Hybrid Storage System for a Map-Reduce Framework
Aseffa, DEREJE TEKILU  Chin-Hsien WU  
Summary | Full Text:PDF(295.9KB)


API-based Software Birthmarking Method Using Fuzzy Hashing
Donghoon LEE  Dongwoo KANG  Younsung CHOI  Jiye KIM  Dongho WON  
Summary | Full Text:PDF(561.5KB)


Power Consumption Signature: Characterizing an SSD
Balgeun YOO  Seongjin LEE  Youjip WON  
Summary | Full Text:PDF(1.1MB)


An Interoperability Framework of Open Educational Resources and Massive Open Online Courses for Sustainable e-Learning Platform
Sila CHUNWIJITRA  Chanchai JUNLOUCHAI  Sitdhibong LAOKOK  Pornchai TUMMARATTANANONT  Kamthorn KRAIRAKSA  Chai WUTIWIWATCHAI  
Summary | Full Text:PDF(3.3MB)


A Heuristic Expansion Framework for Mapping Instances to Linked Open Data
Natthawut KERTKEIDKACHORN  Ryutaro ICHISE  
Summary | Full Text:PDF(1.8MB)


Development of Tactile Graph Generation Web Application Using R Statistics Software Environment
Tetsuya WATANABE  Kosuke ARAKI  Toshimitsu YAMAGUCHI  Kazunori MINATANI  
Summary | Full Text:PDF(277.4KB)


Reliability-Enhanced ECC-Based Memory Architecture Using In-Field Self-Repair
Gian MAYUGA  Yuta YAMATO  Tomokazu YONEDA  Yasuo SATO  Michiko INOUE  
Summary | Full Text:PDF(3.2MB)


A novel Lambertian-RBFNN for Office Light Modeling
Wa SI  Xun PAN  Harutoshi OGAI  Katsumi HIRAI  
Summary | Full Text:PDF(3.6MB)


Computing Terminal Reliability of Multi-tolerance Graphs
Chien-Min Chen  Min-Sheng Lin  
Summary | Full Text:PDF(1.4MB)


Human Action Recognition from Depth Videos Using Pool of Multiple Projections with Greedy Selection
Chien-Quang LE  Sang PHAN  Thanh Duc NGO  Duy-Dinh LE  Shin'ichi SATOH  Duc Anh DUONG  
Summary | Full Text:PDF(5.5MB)


Real-time hardware implementation of a sound recognition system with in-field learning
Mauricio KUGLER  Teemu TOSSAVAINEN  Miku NAKATSU  Susumu KUROYANAGI  Akira IWATA  
Summary | Full Text:PDF(9MB)


Value-driven V-model: from requirements analysis to acceptance testing
Youngsub Han  Dong-hyun Lee  Byoungju Choi  Mike Hinchey  Hoh Peter In  
Summary | Full Text:PDF(574.4KB)


WORLD: a vocoder-based high-quality speech synthesis system for real-time applications
Masanori MORISE  Fumiya YOKOMORI  Kenji OZAWA  
Summary | Full Text:PDF(190.4KB)


Robust Scale Adaptive and Real-Time Visual Tracking with Correlation Filters
Jiatian PI  Keli HU  Yuzhang GU  Lei QU  Fengrong LI  Xiaolin ZHANG  Yunlong ZHAN  
Summary | Full Text:PDF(4.5MB)


Haptic Rendering of Curved Surface by Bending an Encountered-Type Flexible Plate
Seokhee JEON  
Summary | Full Text:PDF(2.4MB)


Multiple-Object Tracking in Large-Scale Scene
Wenbo YUAN  Zhiqiang CAO  Min TAN  Hongkai CHEN  
Summary | Full Text:PDF(1.7MB)


Large Displacement Dynamic Scene Segmentation through Multiscale Saliency Flow
Yinhui ZHANG  Zifen HE  
Summary | Full Text:PDF(501.3KB)


Grammar-DrivenWorkload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems
Min SHAO  Min S. KIM  Victor C. VALGENTI  Jungkeun PARK  
Summary | Full Text:PDF(256.8KB)


Robust Non-parametric Template Matching with Local Rigidity Constraints
Chao ZHANG  Haitian SUN  Takuya AKASHI  
Summary | Full Text:PDF(3.3MB)


Preemptive Real-Time Scheduling Incorporating Security Constraint For Cyber Physical Systems
Hyoengboo BAEK  Jaewoo LEE  Yongjae LEE  Hyunsoo YOON  
Summary | Full Text:PDF(956KB)


Shilling Attack Detection in Recommender Systems via Selecting Patterns Analysis
Wentao LI  Min GAO  Hua LI  Jun ZENG  Qingyu XIONG  Sachio HIROKAWA  
Summary | Full Text:PDF(2.3MB)


Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things
Huaqun WANG  Keqiu LI  Kaoru OTA  Jian SHEN  
Summary | Full Text:PDF(198.3KB)


Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment
Remi ANDO  Shigeyoshi SHIMA  Toshihiko TAKEMURA  
Summary | Full Text:PDF(691.8KB)


Challenges of Fully Homomorphic Encryptions for the Internet of Things
Licheng WANG  Jing LI  Haseeb AHMAD  
Summary | Full Text:PDF(173.2KB)


Privacy-aware Information Sharing in Location-based Services: Attacks and Defense
Zhikai XU  Hongli ZHANG  Xiangzhan YU  Shen SU  
Summary | Full Text:PDF(1MB)


BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
Jinli RAO  Zhangqing HE  Shu XU  Kui DAI  Xuecheng ZOU  
Summary | Full Text:PDF(581.2KB)


MDMA:A multi-data and multi-ACK verified Selective Forwarding Attack Detection Scheme in WSNs
Anfeng Liu  Xiao Liu  He Li  Jun Long  
Summary | Full Text:PDF(614.1KB)


Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems
Guangquan XU  Yuanyuan REN  Yuanbin HAN  Xiaohong LI  Zhiyong FENG  
Summary | Full Text:PDF(1.2MB)


A secure RFID application revocation scheme for IoT
Kai FAN  Zhao DU  Yuanyuan GONG  Yue WANG  Tongjiang YAN  Hui LI  Yintang YANG  
Summary | Full Text:PDF(1.6MB)


CloudS: A Multi-Cloud Storage System with Multi-Level Security
Lu SHEN  Shifang FENG  Jinjin SUN  Zhongwei LI  Ming SU  Gang WANG  Xiaoguang LIU  
Summary | Full Text:PDF(2.5MB)


A Matrix based ORAM: Design, Implementation and Experimental Analysis
Steven GORDON  Atsuko MIYAJI  Chunhua SU  Karin SUMONGKAYOTHIN  
Summary | Full Text:PDF(3.2MB)


Implementation of μNaCl on 32-bit ARM Cortex-M0
Toshifumi NISHINAGA  Masahiro MAMBO  
Summary | Full Text:PDF(98.4KB)


Behavioral Equivalence of Security-Oriented Interactive Systems
Guanjun LIU  Changjun JIANG  
Summary | Full Text:PDF(287.1KB)


Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model
Mohammad Rasool Sarrafi Aghdam  Noboru Sonehara  
Summary | Full Text:PDF(451.7KB)


Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption
Yoshinori AONO  Takuya HAYASHI  Le Trieu PHONG  Lihua WANG  
Summary | Full Text:PDF(522KB)


Mathematical Analysis of Secrecy Amplification in Key Infection
Dae Hyun YUM  
Summary | Full Text:PDF(1.3MB)


Hierarchical system schedulability analysis framework using UPPAAL
So Jin Ahn  Dae Yon Hwang  Miyoung Kang  Jin-Young Choi  
Summary | Full Text:PDF(416.1KB)


A Conditional Dependency Based Probabilistic Model Building Grammatical Evolution
Hyun-Tae KIM  Hyun-Kyu KANG  Chang Wook AHN  
Summary | Full Text:PDF(390.2KB)


Learning from multiple sources via multiple domain relationship
Zhen LIU  Junan YANG  Hui LIU  Jian LIU  
Summary | Full Text:PDF(1.1MB)


A Collaborative Intrusion Detection System against DDoS for SDN
Xiaofan CHEN  Shunzheng YU  
Summary | Full Text:PDF(193.1KB)


A Local Characteristic Image Restoration Based on Convolutional Neural Network
Guohao LYU  Hui YIN  Xinyan YU  Siwei LUO  
Summary | Full Text:PDF(2MB)


A Keypoint-based Region Duplication Forgery Detection Algorithm
Mahmoud EMAM  Qi HAN  Liyang YU  Hongli ZHANG  
Summary | Full Text:PDF(2MB)


Design and Comparison of Immersive Gesture Interfaces for HMD Based Virtual World Navigation
Bong-Soo SOHN  
Summary | Full Text:PDF(1.5MB)


Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code
Hongzhe LI  Jaesang OH  Heejo LEE  
Summary | Full Text:PDF(210.5KB)


Tardy Flow Scheduling in Data Center Networks
Gyuyeong KIM  Wonjun LEE  
Summary | Full Text:PDF(107.9KB)


Security of Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
Seunghwan PARK  Dong Hoon LEE  
Summary | Full Text:PDF(171.1KB)


Realization of SR-Equivalents Using Generalized Shift Registers for Secure Scan Design
Hideo FUJIWARA  Katsuya FUJIWARA  
Summary | Full Text:PDF(281.6KB)


Fast Search of a Similar Patch for Self-Similarity Based Image Super Resolution
Jun-Sang YOO  Ji-Hoon CHOI  Kang-Sun CHOI  Dae-Yeol LEE  Hui-Yong KIM  Jong-Ok KIM  
Summary | Full Text:PDF(3.7MB)


An Improved PSO Algorithm for Interval Multi-objective Optimization Systems
Yong ZHANG  Wanqiu ZHANG  Dunwei GONG  Yinan GUO  Leida LI  
Summary | Full Text:PDF(126.4KB)


LAB-LRU: A Life-Aware Buffer Management Algorithm for NAND Flash Memory
Liyu WANG  Lan CHEN  Xiaoran HAO  
Summary | Full Text:PDF(197.5KB)


Flow Clustering based Efficient Consolidated Middlebox Positioning Approach for SDN/NFV-enabled Network
Tiep VU DUC  Kyungbaek KIM  
Summary | Full Text:PDF(133.9KB)


Robust and Adaptive Object Tracking via Correspondence Clustering
Bo WU  Yurui XIE  Wang LUO  
Summary | Full Text:PDF(3.7MB)


2PTS: A two-phase task scheduling algorithm for MapReduce
Byungnam LIM  Yeeun SHIM  Yon Dohn CHUNG  
Summary | Full Text:PDF(221.3KB)


A Secure Light-weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor
Yilun WU  Xinye LIN  Xicheng LU  Jinshu SU  Peixin CHEN  
Summary | Full Text:PDF(368KB)


Illumination-invariant face representation via normalized structural information
Wonjun KIM  
Summary | Full Text:PDF(1MB)


Hough Transform-Based Clock Skew Measurement by Dynamically Locating the Region of Offset Majority
Komang OKA SAPUTRA  Wei-Chung TENG  Takaaki NARA  
Summary | Full Text:PDF(1.9MB)


Entity Identification on Microblogs by CRF Model with Adaptive Dependency
Jun-Li LU  Makoto P. KATO  Takehiro YAMAMOTO  Katsumi TANAKA  
Summary | Full Text:PDF(966.6KB)


Adaptive rendering using a best matching patch
Yu LIU  Changwen ZHENG  
Summary | Full Text:PDF(3.1MB)


Autonomous Decentralized Semantic based Traceability Link Recovery Framework
Khalid MAHMOOD  Mazen ALOBAIDI  Hironao TAKAHASHI  
Summary | Full Text:PDF(741.5KB)


Optimal Gaussian Weight Predictor and Sorting Using Genetic Algorithm for Reversible Watermarking Based on PEE and HS
Chaiyaporn PANYINDEE  Chuchart PINTAVIROOJ  
Summary | Full Text:PDF(1.5MB)


Robust Projective Template Matching
Chao ZHANG  Takuya AKASHI  
Summary | Full Text:PDF(3.2MB)


SmartUI: Resource-Saving and Editable Smartphone User Interface for Fast Remote PC Control
Haeyoung Lee  
Summary | Full Text:PDF(1MB)


Automated Duplicate Bug Report Detection using Multi-factor Analysis
Jie ZOU  Ling XU  Mengning YANG  Xiaohong ZHANG  Jun ZENG  Sachio HIROKAWA  
Summary | Full Text:PDF(1.8MB)


Singular-Spectrum Analysis for Digital Audio Watermarking with Automatic Parameterization and Parameter Estimation
Jessada KARNJANA  Masashi UNOKI  Pakinee AIMMANEE  Chai WUTIWIWATCHAI  
Summary | Full Text:PDF(907.2KB)


Bayesian Exponential Inverse Document Frequency and Region-of-Interest Effect for Enhancing Instance Search Accuracy
Masaya MURATA  Hidehisa NAGANO  Kaoru HIRAMATSU  Kunio KASHINO  Shin'ichi SATOH  
Summary | Full Text:PDF(1.2MB)


Acquiring 4D Light Fields of Self-Luminous Extended Light Sources Using Programmable Filter
Motohiro NAKAMURA  Shinnosuke OYA  Takahiro OKABE  Hendrik P. A. LENSCH  
Summary | Full Text:PDF(1.3MB)


Vehicle Detection Using Local Size-specific Classifiers
SeungJong NOH  Moongu JEON  
Summary | Full Text:PDF(1.5MB)


A Configuration Management Study to Fast Massive Writing for Distributed NoSQL System
Xianqiang BAO  Nong XIAO  Yutong LU  Zhiguang CHEN  
Summary | Full Text:PDF(2MB)


Competitive Strategies for Evacuating from an Unknown Affected Area
Qi WEI  Xuehou TAN  Bo JIANG  
Summary | Full Text:PDF(368.2KB)


Reliability and Failure Impact Analysis of Distributed Storage Systems with Dynamic Refuging
Hiroaki Akutsu  Kazunori Ueda  Takeru Chiba  Tomohiro Kawaguchi  Norio Shimozono  
Summary | Full Text:PDF(497.9KB)


CCP-based Plant-wide Optimization and Application to the Walking-beam-type Reheating Furnace
Yan Zhang  Hongyan Mao  
Summary | Full Text:PDF(508.2KB)

 Volume E99-D No.6  (Publication Date:2016/06/01)
Special Section on Formal ApproachImportant Notice

pp.1409-1409  FOREWORD  Open Access Paper
FOREWORD
Yoshinobu KAWABE  
Summary | FreeFull Text:PDF(83.2KB)

pp.1410-1419  PAPER-Formal Methods
Query Rewriting for Nondeterministic Tree Transducers
Kazuki MIYAHARA  Kenji HASHIMOTO  Hiroyuki SEKI  
Summary | Full Text:PDF (434.8KB) >>Buy this Article

pp.1420-1427  PAPER-Formal Methods
Choreography Realization by Re-Constructible Decomposition of Acyclic Relations
Toshiyuki MIYAMOTO  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1428-1435  PAPER-Formal Methods
Optimal Stabilizing Controller for the Region of Weak Attraction under the Influence of Disturbances
Sasinee PRUEKPRASERT  Toshimitsu USHIO  
Summary | Full Text:PDF (371.5KB) >>Buy this Article

Special Section on Human Cognition and Behavioral Science and Technology

pp.1436-1436  FOREWORD  Open Access Paper
FOREWORD
Hideki KASHIOKA  
Summary | FreeFull Text:PDF(74KB)

pp.1437-1446  PAPER
Enhancing Event-Related Potentials Based on Maximum a Posteriori Estimation with a Spatial Correlation Prior
Hayato MAKI  Tomoki TODA  Sakriani SAKTI  Graham NEUBIG  Satoshi NAKAMURA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1447-1454  PAPER
A Comprehensive Medicine Management System with Multiple Sources in a Nursing Home in Taiwan
Liang-Bi CHEN  Wan-Jung CHANG  Kuen-Min LEE  Chi-Wei HUANG  Katherine Shu-Min LI  
Summary | Full Text:PDF (1005.7KB) >>Buy this Article

pp.1455-1461  PAPER
Lexical Network Analysis on an Online Explanation Task: Effects of Affect and Embodiment of a Pedagogical Agent
Yugo HAYASHI  
Summary | Full Text:PDF (731.8KB) >>Buy this Article

pp.1462-1473  PAPER
Predicting Performance of Collaborative Storytelling Using Multimodal Analysis
Shogo OKADA  Mi HANG  Katsumi NITTA  
Summary | Full Text:PDF (837KB) >>Buy this Article

pp.1474-1481  PAPER
Sparse Trajectory Prediction Method Based on Entropy Estimation
Lei ZHANG  Leijun LIU  Wen LI  
Summary | Full Text:PDF (761.7KB) >>Buy this Article

pp.1482-1484  LETTER
Lower Trunk Acceleration Signals Reflect Fall Risk During Walking
Yoshitaka OTANI  Osamu AOKI  Tomohiro HIROTA  Hiroshi ANDO  
Summary | Full Text:PDF (367.2KB) >>Buy this Article

Regular Section

pp.1485-1501  PAPER-Fundamentals of Information Systems
D-Paxos: Building Hierarchical Replicated State Machine for Cloud Environments
Fagui LIU  Yingyi YANG  
Summary | Full Text:PDF (936KB) >>Buy this Article

pp.1502-1511  PAPER-Computer System
A Dynamic Switching Flash Translation Layer Based on Page-Level Mapping
Dongchul PARK  Biplob DEBNATH  David H.C. DU  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1512-1520  PAPER-Data Engineering, Web Information Systems
A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness
Tinghuai MA  Limin GUO  Meili TANG  Yuan TIAN  Mznah AL-RODHAAN  Abdullah AL-DHELAAN  
Summary | Full Text:PDF (520.1KB) >>Buy this Article

pp.1521-1530  PAPER-Data Engineering, Web Information Systems
Linked Data Entity Resolution System Enhanced by Configuration Learning Algorithm
Khai NGUYEN  Ryutaro ICHISE  
Summary | Full Text:PDF (460.9KB) >>Buy this Article

pp.1531-1540  PAPER-Data Engineering, Web Information Systems
Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation
Zhili ZHOU  Ching-Nung YANG  Beijing CHEN  Xingming SUN  Qi LIU  Q.M. Jonathan WU  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.1541-1552  PAPER-Information Network
A Visible Watermarking with Automated Location Technique for Copyright Protection of Portrait Images
Antonio CEDILLO-HERNANDEZ  Manuel CEDILLO-HERNANDEZ  Francisco GARCIA-UGALDE  Mariko NAKANO-MIYATAKE  Hector PEREZ-MEANA  
Summary | Full Text:PDF (4.8MB) >>Buy this Article

pp.1553-1562  PAPER-Information Network
Quickly Converging Renumbering in Network with Hierarchical Link-State Routing Protocol
Kenji FUJIKAWA  Hiroaki HARAI  Motoyuki OHMORI  Masataka OHTA  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1563-1575  PAPER-Information Network
Extended Dual Virtual Paths Algorithm Considering the Timing Requirements of IEC61850 Substation Message Types
Seokjoon HONG  Ducsun LIM  Inwhee JOE  
Summary | Full Text:PDF (8MB) >>Buy this Article

pp.1576-1584  PAPER-Artificial Intelligence, Data Mining
Fast Lyric Area Extraction from Images of Printed Korean Music Scores
Cong Minh DINH  Hyung Jeong YANG  Guee Sang LEE  Soo Hyung KIM  
Summary | Full Text:PDF (3.5MB) >>Buy this Article

pp.1585-1594  PAPER-Artificial Intelligence, Data Mining
Guide Automatic Vectorization by means of Machine Learning: A Case Study of Tensor Contraction Kernels
Antoine TROUVÉ  Arnaldo J. CRUZ  Kazuaki J. MURAKAMI  Masaki ARAI  Tadashi NAKAHIRA  Eiji YAMANAKA  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.1595-1602  PAPER-Artificial Intelligence, Data Mining
Modified t-Distribution Evolutionary Algorithm for Dynamic Deployment of Wireless Sensor Networks
Xiaolei LIU  Xiaosong ZHANG  Yiqi JIANG  Qingxin ZHU  
Summary | Full Text:PDF (859.8KB) >>Buy this Article

pp.1603-1614  PAPER-Human-computer Interaction
Estimating Head Orientation Using a Combination of Multiple Cues
Bima Sena Bayu DEWANTARA  Jun MIURA  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.1615-1625  PAPER-Educational Technology
Cultivating Listening Skills for Academic English Based on Strategy Object Mashups Approach
Hangyu LI  Hajime KIRA  Shinobu HASEGAWA  
Summary | Full Text:PDF (3.5MB) >>Buy this Article

pp.1626-1634  PAPER-Image Recognition, Computer Vision
Efficient Two-Step Middle-Level Part Feature Extraction for Fine-Grained Visual Categorization
Hideki NAKAYAMA  Tomoya TSUDA  
Summary | Full Text:PDF (939.6KB) >>Buy this Article

pp.1635-1644  PAPER-Image Recognition, Computer Vision
Precise Vehicle Speed Measurement Based on a Hierarchical Homographic Transform Estimation for Law Enforcement Applications
Hamed ESLAMI  Abolghasem A. RAIE  Karim FAEZ  
Summary | Full Text:PDF (3.4MB) >>Buy this Article

pp.1645-1652  PAPER-Natural Language Processing
Sentence Similarity Computational Model Based on Information Content
Hao WU  Heyan HUANG  
Summary | Full Text:PDF (753.5KB) >>Buy this Article

pp.1653-1662  PAPER-Biological Engineering
Exploiting EEG Channel Correlations in P300 Speller Paradigm for Brain-Computer Interface
Yali LI  Hongma LIU  Shengjin WANG  
Summary | Full Text:PDF (2.7MB) >>Buy this Article

pp.1663-1670  PAPER-Biological Engineering
A Similarity Study of Interactive Content-Based Image Retrieval Scheme for Classification of Breast Lesions
Hyun-chong CHO  Lubomir HADJIISKI  Berkman SAHINER  Heang-Ping CHAN  Chintana PARAMAGUL  Mark HELVIE  Alexis V. NEES  Hyun Chin CHO  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1671-1677  PAPER-Biological Engineering
A Robust Algorithm for Extracting Signals with Temporal Structure
Yibing LI  Wei NIE  Fang YE  
Summary | Full Text:PDF (924.8KB) >>Buy this Article

pp.1678-1681  LETTER-Fundamentals of Information Systems
Dominant Fairness Fairness: Hierarchical Scheduling for Multiple Resources in Heterogeneous Datacenters
Wenzhu WANG  Kun JIANG  Yusong TAN  Qingbo WU  
Summary | Full Text:PDF (226KB) >>Buy this Article

pp.1682-1685  LETTER-Fundamentals of Information Systems
Fast Algorithm for Computing Analysis Windows in Real-Valued Discrete Gabor Transform
Rui LI  Liang TAO  
Summary | Full Text:PDF (99.1KB) >>Buy this Article

pp.1686-1689  LETTER-Fundamentals of Information Systems
DynamicAdjust: Dynamic Resource Adjustment for Mitigating Skew in MapReduce
Zhihong LIU  Aimal KHAN  Peixin CHEN  Yaping LIU  Zhenghu GONG  
Summary | Full Text:PDF (668.1KB) >>Buy this Article

pp.1690-1693  LETTER-Information Network
The Stability-Featured Dynamic Multi-Path Routing
Zhaofeng WU  Guyu HU  Fenglin JIN  Yinjin FU  Jianxin LUO  Tingting ZHANG  
Summary | Full Text:PDF (354KB) >>Buy this Article

pp.1694-1697  LETTER-Pattern Recognition
Micro-Expression Recognition by Regression Model and Group Sparse Spatio-Temporal Feature Learning
Ping LU  Wenming ZHENG  Ziyan WANG  Qiang LI  Yuan ZONG  Minghai XIN  Lenan WU  
Summary | Full Text:PDF (305.8KB) >>Buy this Article

pp.1698-1701  LETTER-Image Processing and Video Processing
Key Frame Extraction Based on Chaos Theory and Color Information for Video Summarization
Jaeyong JU  Taeyup SONG  Bonhwa KU  Hanseok KO  
Summary | Full Text:PDF (385.9KB) >>Buy this Article

pp.1702-1706  LETTER-Image Processing and Video Processing
Adaptive Perceptual Block Compressive Sensing for Image Compression
Jin XU  Yuansong QIAO  Zhizhong FU  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1707-1710  LETTER-Image Recognition, Computer Vision
Non-Linear Extension of Generalized Hyperplane Approximation
Hyun-Chul CHOI  
Summary | Full Text:PDF (855.2KB) >>Buy this Article

pp.1711-1715  LETTER-Image Recognition, Computer Vision
Food Image Recognition Using Covariance of Convolutional Layer Feature Maps
Atsushi TATSUMA  Masaki AONO  
Summary | Full Text:PDF (990.1KB) >>Buy this Article

pp.1716-1719  LETTER-Image Recognition, Computer Vision
Discrete Spherical Laplacian Operator
Shigang LI  Hiroya FUNAKI  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.1720-1723  LETTER-Image Recognition, Computer Vision
Robust Object Tracking with Compressive Sensing and Patches Matching
Jiatian PI  Keli HU  Xiaolin ZHANG  Yuzhang GU  Yunlong ZHAN  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.1724-1728  LETTER-Computer Graphics
Generation of Oil-Film-Like Images by Bilateral Infra-Envelope Filter
Toru HIRAOKA  Kiichi URAHAMA  
Summary | Full Text:PDF (9.8MB) >>Buy this Article

pp.1729-1732  LETTER-Biological Engineering
Hybrid Retinal Image Registration Using Mutual Information and Salient Features
Jaeyong JU  Murray LOEW  Bonhwa KU  Hanseok KO  
Summary | Full Text:PDF (510.5KB) >>Buy this Article

Previous | 
go to Page Top