IEICE TRANSACTIONS on Information and Systems
Online ISSN : 1745-1361
[Whole issue]:PDF (61MB)
Previous | 
Top 10 downloads
To the Latest Issue

Advance publication (published online immediately after acceptance)


Inishing: A UI phishing attack to exploit the vulnerability of inotify in Android smartphones
Woo Hyun AHN  Sanghyeon PARK  Jaewon OH  Seung-Ho LIM  
Summary | Full Text:PDF(1.4MB)


Fast intra mode decision for screen contents coding in HEVC
Yong-Jo AHN  Xiangjian WU  Donggyu SIM  Woo-Jin HAN  
Summary | Full Text:PDF(419KB)


Energy-based Tree Illustration System: ETIS
Katsuto NAKAJIMA  Azusa MAMA  Yuki MORIMOTO  
Summary | Full Text:PDF(1.9MB)


Spectral features based on local Hu moments of Gabor spectrograms for speech emotion recognition
Huawei TAO  Ruiyu LIANG  Cheng ZHA  Xinran ZHANG  Li ZHAO  
Summary | Full Text:PDF(435.7KB)


LRU-LC: Fast Estimating Cardinality of Flows over Sliding Windows
Jingsong SHAN  Jianxin LUO  Guiqiang NI  Yinjin FU  Zhaofeng WU  
Summary | Full Text:PDF(141KB)


The novel performance evaluation method of the fingerprinting-based indoor positioning
Shutchon PREMCHAISAWATT  Nararat RUANGCHAIJATUPON  
Summary | Full Text:PDF(318.9KB)


Reseeding-oriented Test Power Reduction for Linear-Decompression-Based Test Compression Architectures
Tian CHEN  Dandan SHEN  Xin YI  Huaguo LIANG  Xiaoqing WEN  Wei WANG  
Summary | Full Text:PDF(3.7MB)


Incremental Semantic Construction Based on Combinatory Categorial Grammar
Yoshihide KATO  Shigeki MATSUBARA  
Summary | Full Text:PDF(217.4KB)


A Virtualization-based Hybrid Storage System for a Map-Reduce Framework
Aseffa, DEREJE TEKILU  Chin-Hsien WU  
Summary | Full Text:PDF(295.9KB)


An Interoperability Framework of Open Educational Resources and Massive Open Online Courses for Sustainable e-Learning Platform
Sila CHUNWIJITRA  Chanchai JUNLOUCHAI  Sitdhibong LAOKOK  Pornchai TUMMARATTANANONT  Kamthorn KRAIRAKSA  Chai WUTIWIWATCHAI  
Summary | Full Text:PDF(3.3MB)


Development of Tactile Graph Generation Web Application Using R Statistics Software Environment
Tetsuya WATANABE  Kosuke ARAKI  Toshimitsu YAMAGUCHI  Kazunori MINATANI  
Summary | Full Text:PDF(277.4KB)


Reliability-Enhanced ECC-Based Memory Architecture Using In-Field Self-Repair
Gian MAYUGA  Yuta YAMATO  Tomokazu YONEDA  Yasuo SATO  Michiko INOUE  
Summary | Full Text:PDF(3.2MB)


Human Action Recognition from Depth Videos Using Pool of Multiple Projections with Greedy Selection
Chien-Quang LE  Sang PHAN  Thanh Duc NGO  Duy-Dinh LE  Shin'ichi SATOH  Duc Anh DUONG  
Summary | Full Text:PDF(5.5MB)


HISTORY: An Efficient and Robust Algorithm for Noisy 1-bit Compressed Sensing
Biao SUN  Hui FENG  Xinxin XU  
Summary | Full Text:PDF(251.5KB)


Grammar-DrivenWorkload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems
Min SHAO  Min S. KIM  Victor C. VALGENTI  Jungkeun PARK  
Summary | Full Text:PDF(256.8KB)


Design of a compact sound localization device on a stand-alone FPGA-based platform
Mauricio KUGLER  Teemu TOSSAVAINEN  Susumu KUROYANAGI  Akira IWATA  
Summary | Full Text:PDF(5.7MB)


Robust Non-parametric Template Matching with Local Rigidity Constraints
Chao ZHANG  Haitian SUN  Takuya AKASHI  
Summary | Full Text:PDF(3.3MB)


Preemptive Real-Time Scheduling Incorporating Security Constraint For Cyber Physical Systems
Hyoengboo BAEK  Jaewoo LEE  Yongjae LEE  Hyunsoo YOON  
Summary | Full Text:PDF(956KB)


Shilling Attack Detection in Recommender Systems via Selecting Patterns Analysis
Wentao LI  Min GAO  Hua LI  Jun ZENG  Qingyu XIONG  Sachio HIROKAWA  
Summary | Full Text:PDF(2.3MB)


Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things
Huaqun WANG  Keqiu LI  Kaoru OTA  Jian SHEN  
Summary | Full Text:PDF(198.3KB)


Analysis of Privacy and Security Affecting the Intention of Use in Personal Data Collection in an IoT Environment
Remi ANDO  Shigeyoshi SHIMA  Toshihiko TAKEMURA  
Summary | Full Text:PDF(691.8KB)


Challenges of Fully Homomorphic Encryptions for the Internet of Things
Licheng WANG  Jing LI  Haseeb AHMAD  
Summary | Full Text:PDF(173.2KB)


Privacy-aware Information Sharing in Location-based Services: Attacks and Defense
Zhikai XU  Hongli ZHANG  Xiangzhan YU  Shen SU  
Summary | Full Text:PDF(1MB)


BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
Jinli RAO  Zhangqing HE  Shu XU  Kui DAI  Xuecheng ZOU  
Summary | Full Text:PDF(581.2KB)


MDMA:A multi-data and multi-ACK verified Selective Forwarding Attack Detection Scheme in WSNs
Anfeng Liu  Xiao Liu  He Li  Jun Long  
Summary | Full Text:PDF(614.1KB)


Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems
Guangquan XU  Yuanyuan REN  Yuanbin HAN  Xiaohong LI  Zhiyong FENG  
Summary | Full Text:PDF(1.2MB)


A secure RFID application revocation scheme for IoT
Kai FAN  Zhao DU  Yuanyuan GONG  Yue WANG  Tongjiang YAN  Hui LI  Yintang YANG  
Summary | Full Text:PDF(1.6MB)


CloudS: A Multi-Cloud Storage System with Multi-Level Security
Lu SHEN  Shifang FENG  Jinjin SUN  Zhongwei LI  Ming SU  Gang WANG  Xiaoguang LIU  
Summary | Full Text:PDF(2.5MB)


A Matrix based ORAM: Design, Implementation and Experimental Analysis
Steven GORDON  Atsuko MIYAJI  Chunhua SU  Karin SUMONGKAYOTHIN  
Summary | Full Text:PDF(3.2MB)


Implementation of μNaCl on 32-bit ARM Cortex-M0
Toshifumi NISHINAGA  Masahiro MAMBO  
Summary | Full Text:PDF(98.4KB)


Behavioral Equivalence of Security-Oriented Interactive Systems
Guanjun LIU  Changjun JIANG  
Summary | Full Text:PDF(287.1KB)


Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model
Mohammad Rasool Sarrafi Aghdam  Noboru Sonehara  
Summary | Full Text:PDF(451.7KB)


Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption
Yoshinori AONO  Takuya HAYASHI  Le Trieu PHONG  Lihua WANG  
Summary | Full Text:PDF(522KB)


Scenario Retrieval Method using Differential Scenario
Eiji SHIOTA  Atsushi OHNISHI  
Summary | Full Text:PDF(497.9KB)


Detecting Logical Inconsistencies by Clustering Technique in Natural Language Requirements
Satoshi Masuda  Tohru Matsuodani  Kazuhiko Tsuda  
Summary | Full Text:PDF(765.1KB)


Exhaustive and efficient identification of rationales using GQM+Strategies with stakeholder relationship analysis
Takanobu KOBORI  Hironori WASHIZAKI  Yoshiaki FUKAZAWA  Daisuke HIRABAYASHI  Katsutoshi SHINTANI  Yasuko OKAZAKI  Yasuhiro KIKUSHIMA  
Summary | Full Text:PDF(2.6MB)


A Search-based Constraint Elicitation in Test Design
Hiroyuki NAKAGAWA  Tatsuhiro TSUCHIYA  
Summary | Full Text:PDF(620.1KB)


Mathematical Analysis of Secrecy Amplification in Key Infection
Dae Hyun YUM  
Summary | Full Text:PDF(1.3MB)


Hierarchical system schedulability analysis framework using UPPAAL
So Jin Ahn  Dae Yon Hwang  Miyoung Kang  Jin-Young Choi  
Summary | Full Text:PDF(416.1KB)


A Collaborative Intrusion Detection System against DDoS for SDN
Xiaofan CHEN  Shunzheng YU  
Summary | Full Text:PDF(193.1KB)


A Local Characteristic Image Restoration Based on Convolutional Neural Network
Guohao LYU  Hui YIN  Xinyan YU  Siwei LUO  
Summary | Full Text:PDF(2MB)


A Keypoint-based Region Duplication Forgery Detection Algorithm
Mahmoud EMAM  Qi HAN  Liyang YU  Hongli ZHANG  
Summary | Full Text:PDF(2MB)


Fast Coding-Mode Selection and CU-Depth Prediction Algorithm based on Text-Block Recognition for Screen Content Coding
Mengmeng ZHANG  Ang ZHU  Zhi LIU  
Summary | Full Text:PDF(729.8KB)


Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code
Hongzhe LI  Jaesang OH  Heejo LEE  
Summary | Full Text:PDF(210.5KB)


Tardy Flow Scheduling in Data Center Networks
Gyuyeong KIM  Wonjun LEE  
Summary | Full Text:PDF(107.9KB)


Realization of SR-Equivalents Using Generalized Shift Registers for Secure Scan Design
Hideo FUJIWARA  Katsuya FUJIWARA  
Summary | Full Text:PDF(281.6KB)


Fast Search of a Similar Patch for Self-Similarity Based Image Super Resolution
Jun-Sang YOO  Ji-Hoon CHOI  Kang-Sun CHOI  Dae-Yeol LEE  Hui-Yong KIM  Jong-Ok KIM  
Summary | Full Text:PDF(3.7MB)


An Improved PSO Algorithm for Interval Multi-objective Optimization Systems
Yong ZHANG  Wanqiu ZHANG  Dunwei GONG  Yinan GUO  Leida LI  
Summary | Full Text:PDF(126.4KB)


LAB-LRU: A Life-Aware Buffer Management Algorithm for NAND Flash Memory
Liyu WANG  Lan CHEN  Xiaoran HAO  
Summary | Full Text:PDF(197.5KB)


Flow Clustering based Efficient Consolidated Middlebox Positioning Approach for SDN/NFV-enabled Network
Tiep VU DUC  Kyungbaek KIM  
Summary | Full Text:PDF(133.9KB)


Robust and Adaptive Object Tracking via Correspondence Clustering
Bo WU  Yurui XIE  Wang LUO  
Summary | Full Text:PDF(3.7MB)


Transfer Semi-supervised Non-negative Matrix Factorization for Speech Emotion Recognition
Peng SONG  Shifeng OU  Xinran ZHANG  Yun JIN  Wenming ZHENG  Jinglei LIU  Yanwei YU  
Summary | Full Text:PDF(107.9KB)


Robust Hybrid Finger Pattern Identification Using Intersection Enhanced Gabor Based Direction Coding
Wenming YANG  Wenyang JI  Fei ZHOU  Qingmin LIAO  
Summary | Full Text:PDF(603.7KB)


2PTS: A two-phase task scheduling algorithm for MapReduce
Byungnam LIM  Yeeun SHIM  Yon Dohn CHUNG  
Summary | Full Text:PDF(221.3KB)


A Secure Light-weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor
Yilun WU  Xinye LIN  Xicheng LU  Jinshu SU  Peixin CHEN  
Summary | Full Text:PDF(368KB)


An Index based on Irregular Identifier Space Partition for Quick Multiple Data Access in Wireless Data Broadcasting
SeokJin IM  HeeJoung HWANG  
Summary | Full Text:PDF(262.5KB)


Mining Spatial Temporal Saliency structure for Action Recognition
Yinan LIU  Qingbo WU  Linfeng XU  Bo WU  
Summary | Full Text:PDF(759.2KB)


A Visibility-Based Upper Bound for Android Unlock Patterns
Jinwoo LEE  Jae Woo SEO  Kookrae CHO  Pil Joong LEE  Juneyeun KIM  Seung Hoon CHOI  Dae Hyun YUM  
Summary | Full Text:PDF(90.7KB)


Illumination-invariant face representation via normalized structural information
Wonjun KIM  
Summary | Full Text:PDF(1MB)


Contrast Enhancement of Mycobacterium Tuberculosis Images Based on Improved Histogram Equalization
Chao XU  Dongxiang ZHOU  Keju PENG  Weihong FAN  Yunhui LIU  
Summary | Full Text:PDF(3.7MB)


Local Multi-Coordinate System for Object Retrieval
Go IRIE  Yukito WATANABE  Takayuki KUROZUMI  Tetsuya KINEBUCHI  
Summary | Full Text:PDF(243.4KB)


Adaptive Local Thresholding for Co-localization Detection in Multi-Channel Fluorescence Microscopic Images
Eisuke ITO  Yusuke TOMARU  Akira IIZUKA  Hirokazu HIRAI  Tsuyoshi KATO  
Summary | Full Text:PDF(1.8MB)


Hough Transform-Based Clock Skew Measurement by Dynamically Locating the Region of Offset Majority
Komang OKA SAPUTRA  Wei-Chung TENG  Takaaki NARA  
Summary | Full Text:PDF(1.9MB)


Entity Identification on Microblogs by CRF Model with Adaptive Dependency
Jun-Li LU  Makoto P. KATO  Takehiro YAMAMOTO  Katsumi TANAKA  
Summary | Full Text:PDF(966.6KB)


Autonomous Decentralized Semantic based Traceability Link Recovery Framework
Khalid MAHMOOD  Mazen ALOBAIDI  Hironao TAKAHASHI  
Summary | Full Text:PDF(741.5KB)


A linear time algorithm for finding a spanning tree with non-terminal set VNT on cographs
Shin-ichi NAKAYAMA  Shigeru MASUYAMA  
Summary | Full Text:PDF(796.6KB)


Optimal Gaussian Weight Predictor and Sorting Using Genetic Algorithm for Reversible Watermarking Based on PEE and HS
Chaiyaporn PANYINDEE  Chuchart PINTAVIROOJ  
Summary | Full Text:PDF(1.5MB)


Robust Projective Template Matching
Chao ZHANG  Takuya AKASHI  
Summary | Full Text:PDF(3.2MB)


Latent Attribute Inference of Users in Social Media with Very Small Labeled Dataset
Ding XIAO  Rui WANG  Lingling WU  
Summary | Full Text:PDF(1.6MB)


Semi-incremental recognition of on-line handwritten Japanese text
Cuong-Tuan NGUYEN  Bilan ZHU  Masaki NAKAGAWA  
Summary | Full Text:PDF(2.1MB)


Singular-Spectrum Analysis for Digital Audio Watermarking with Automatic Parameterization and Parameter Estimation
Jessada KARNJANA  Masashi UNOKI  Pakinee AIMMANEE  Chai WUTIWIWATCHAI  
Summary | Full Text:PDF(907.2KB)


Bayesian Exponential Inverse Document Frequency and Region-of-Interest Effect for Enhancing Instance Search Accuracy
Masaya MURATA  Hidehisa NAGANO  Kaoru HIRAMATSU  Kunio KASHINO  Shin'ichi SATOH  
Summary | Full Text:PDF(1.2MB)


Acquiring 4D Light Fields of Self-Luminous Extended Light Sources Using Programmable Filter
Motohiro NAKAMURA  Shinnosuke OYA  Takahiro OKABE  Hendrik P. A. LENSCH  
Summary | Full Text:PDF(1.3MB)


Vehicle Detection Using Local Size-specific Classifiers
SeungJong NOH  Moongu JEON  
Summary | Full Text:PDF(1.5MB)


A Configuration Management Study to Fast Massive Writing for Distributed NoSQL System
Xianqiang BAO  Nong XIAO  Yutong LU  Zhiguang CHEN  
Summary | Full Text:PDF(2MB)


Automatic Retrieval of Action Video Shots from the Web using Density-based Cluster Analysis and Outlier Detection
Nga H. DO  Keiji YANAI  
Summary | Full Text:PDF(2.9MB)


Competitive Strategies for Evacuating from an Unknown Affected Area
Qi WEI  Xuehou TAN  Bo JIANG  
Summary | Full Text:PDF(368.2KB)


Reliability and Failure Impact Analysis of Distributed Storage Systems with Dynamic Refuging
Hiroaki Akutsu  Kazunori Ueda  Takeru Chiba  Tomohiro Kawaguchi  Norio Shimozono  
Summary | Full Text:PDF(497.9KB)


CCP-based Plant-wide Optimization and Application to the Walking-beam-type Reheating Furnace
Yan Zhang  Hongyan Mao  
Summary | Full Text:PDF(508.2KB)


A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks
Dongxu CHENG  Jianwei LIU  Zhenyu GUAN  Tao SHANG  
Summary | Full Text:PDF(216.1KB)


Improvements of Voice Timbre Control Based on Perceived Age in Singing Voice Conversion
Kazuhiro KOBAYASHI  Tomoki TODA  Tomoyasu NAKANO  Masataka GOTO  Satoshi NAKAMURA  
Summary | Full Text:PDF(2.5MB)


Sensitivity-characterised Activity Neurogram (SCAN) for Visualising and Understanding the Inner Workings of Deep Neural Network
Khe Chai SIM  
Summary | Full Text:PDF(1.7MB)


Improved End-to-End Speech Recognition Using Adaptive Per-dimensional Learning Rate Methods
Xuyang WANG  Pengyuan ZHANG  Qingwei ZHAO  Jielin PAN  Yonghong YAN  
Summary | Full Text:PDF(147.1KB)


Multi-task Learning in Deep Neural Networks for Mandarin-English Code-mixing Speech Recognition
Mengzhe CHEN  Jielin PAN  Qingwei ZHAO  Yonghong YAN  
Summary | Full Text:PDF(111.3KB)


Short Text Classification based on Distributional Representations of Words
Chenglong MA  Qingwei ZHAO  Jielin PAN  Yonghong YAN  
Summary | Full Text:PDF(198KB)


Speeding up Deep Neural Networks in Speech Recognition with Piecewise Quantized Sigmoidal Activation Function
Anhao XING  Qingwei ZHAO  Yonghong YAN  
Summary | Full Text:PDF(120.9KB)


Acoustic Scene Analysis Based on Hierarchical Generative Model of Acoustic Event Sequence
Keisuke IMOTO  Suehiro SHIMAUCHI  
Summary | Full Text:PDF(6.6MB)


Statistical bandwidth extension for speech synthesis based on Gaussian mixture model with sub-band basis spectrum model
Yamato OHTANI  Masatsune TAMURA  Masahiro MORITA  Masami AKAMINE  
Summary | Full Text:PDF(1.7MB)


Policy optimization for spoken dialog management using genetic algorithm
Hang REN  Qingwei ZHAO  Yonghong YAN  
Summary | Full Text:PDF(369.1KB)


Speaker Adaptive Training Localizing Speaker Modules in DNN for Hybrid DNN-HMM Speech Recognizers
Tsubasa OCHIAI  Shigeki MATSUDA  Hideyuki WATANABE  Xugang LU  Chiori HORI  Hisashi KAWAI  Shigeru KATAGIRI  
Summary | Full Text:PDF(2.1MB)


Investigation of Using Continuous Representation of Various Linguistic Units in Neural Network based Text-to-Speech Synthesis
Xin WANG  Shinji TAKAKI  Junichi YAMAGISHI  
Summary | Full Text:PDF(461.2KB)


Re-Ranking Approach of Spoken Term Detection Using Conditional Random Fields-Based Triphone Detection
Naoki SAWADA  Hiromitsu NISHIZAKI  
Summary | Full Text:PDF(1MB)


Investigation of Combining Various Major Language Model Technologies including Data Expansion and Adaptation
Ryo MASUMURA  Taichi ASAMI  Takanobu OBA  Hirokazu MASATAKI  Sumitaka SAKAUCHI  Akinori ITO  
Summary | Full Text:PDF(984.6KB)


N-gram Approximation of Latent Words Language Models for Domain Robust Automatic Speech Recognition
Ryo MASUMURA  Taichi ASAMI  Takanobu OBA  Hirokazu MASATAKI  Sumitaka SAKAUCHI  Satoshi TAKAHASHI  
Summary | Full Text:PDF(1.1MB)


Spoken Term Detection using SVM-based Classiifier Trained with Pre-indexed Keywords
Kentaro DOMOTO  Takehito UTSURO  Naoki SAWADA  Hiromitsu NISHIZAKI  
Summary | Full Text:PDF(1.3MB)


Neural Network Approaches to Dialog Response Retrieval and Generation
Lasguido NIO  Sakriani SAKTI  Graham NEUBIG  Koichiro YOSHINO  Satoshi NAKAMURA  
Summary | Full Text:PDF(3.3MB)


Investigation of DNN-based audio-visual speech recognition
Satoshi TAMURA  Hiroshi NINOMIYA  Norihide KITAOKA  Shin OSUGA  Yurie IRIBE  Kazuya TAKEDA  Satoru HAYAMIZU  
Summary | Full Text:PDF(2.2MB)


A statistical sample-based approach to GMM-based voice conversion using tied-covariance acoustic models
Shinnosuke TAKAMICHI  Tomoki TODA  Graham NEUBIG  Sakriani SAKTI  Satoshi NAKAMURA  
Summary | Full Text:PDF(497.3KB)

 Volume E99-D No.7  (Publication Date:2016/07/01)
Regular Section

pp.1733-1741  PAPER-Fundamentals of Information Systems
Computing Terminal Reliability of Multi-Tolerance Graphs
Chien-Min CHEN  Min-Sheng LIN  
Summary | Full Text:PDF (980.1KB) >>Buy this Article

pp.1742-1752  PAPER-Fundamentals of Information Systems
A Novel Lambertian-RBFNN for Office Light Modeling
Wa SI  Xun PAN  Harutoshi OGAI  Katsumi HIRAI  
Summary | Full Text:PDF (7.9MB) >>Buy this Article

pp.1753-1761  PAPER-Fundamentals of Information Systems
LP Guided PSO Algorithm for Office Lighting Control
Wa SI  Xun PAN  Harutoshi OGAI  Katsumi HIRAI  
Summary | Full Text:PDF (7.7MB) >>Buy this Article

pp.1762-1775  PAPER-Software Engineering
Automated Duplicate Bug Report Detection Using Multi-Factor Analysis
Jie ZOU  Ling XU  Mengning YANG  Xiaohong ZHANG  Jun ZENG  Sachio HIROKAWA  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.1776-1785  PAPER-Software Engineering
Value-Driven V-Model: From Requirements Analysis to Acceptance Testing
Youngsub HAN  Dong-hyun LEE  Byoungju CHOI  Mike HINCHEY  Hoh Peter IN  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1786-1795  PAPER-Data Engineering, Web Information Systems
A Heuristic Expansion Framework for Mapping Instances to Linked Open Data
Natthawut KERTKEIDKACHORN  Ryutaro ICHISE  
Summary | Full Text:PDF (620.5KB) >>Buy this Article

pp.1796-1809  PAPER-Data Engineering, Web Information Systems
Power Consumption Signature: Characterizing an SSD
Balgeun YOO  Seongjin LEE  Youjip WON  
Summary | Full Text:PDF (2.5MB) >>Buy this Article

pp.1810-1821  PAPER-Information Network
Design of Multilevel Hybrid Classifier with Variant Feature Sets for Intrusion Detection System
Aslhan AKYOL  Mehmet HACIBEYOĞLU  Bekir KARLIK  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.1822-1835  PAPER-Information Network
Reputation-Based Collusion Detection with Majority of Colluders
Junbeom HUR  Mengxue GUO  Younsoo PARK  Chan-Gun LEE  Ho-Hyun PARK  
Summary | Full Text:PDF (876.6KB) >>Buy this Article

pp.1836-1851  PAPER-Information Network
API-Based Software Birthmarking Method Using Fuzzy Hashing
Donghoon LEE  Dongwoo KANG  Younsung CHOI  Jiye KIM  Dongho WON  
Summary | Full Text:PDF (1.2MB) >>Buy this Article | Errata[Uploaded on July 19,2016]

pp.1852-1861  PAPER-Human-computer Interaction
SmartUI: Resource-Saving and Editable Smartphone User Interface for Fast Remote PC Control
Haeyoung LEE  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.1862-1870  PAPER-Human-computer Interaction
Haptic Rendering of Curved Surface by Bending an Encountered-Type Flexible Plate
Seokhee JEON  
Summary | Full Text:PDF (3.4MB) >>Buy this Article

pp.1871-1876  PAPER-Pattern Recognition
Large Displacement Dynamic Scene Segmentation through Multiscale Saliency Flow
Yinhui ZHANG  Zifen HE  
Summary | Full Text:PDF (860.7KB) >>Buy this Article

pp.1877-1884  PAPER-Speech and Hearing
WORLD: A Vocoder-Based High-Quality Speech Synthesis System for Real-Time Applications
Masanori MORISE  Fumiya YOKOMORI  Kenji OZAWA  
[Paper on system development]Summary | Full Text:PDF (757.4KB) >>Buy this Article

pp.1885-1894  PAPER-Speech and Hearing
Real-Time Hardware Implementation of a Sound Recognition System with In-Field Learning
Mauricio KUGLER  Teemu TOSSAVAINEN  Miku NAKATSU  Susumu KUROYANAGI  Akira IWATA  
Summary | Full Text:PDF (5MB) >>Buy this Article

pp.1895-1902  PAPER-Image Recognition, Computer Vision
Robust Scale Adaptive and Real-Time Visual Tracking with Correlation Filters
Jiatian PI  Keli HU  Yuzhang GU  Lei QU  Fengrong LI  Xiaolin ZHANG  Yunlong ZHAN  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.1903-1909  PAPER-Image Recognition, Computer Vision
Multiple-Object Tracking in Large-Scale Scene
Wenbo YUAN  Zhiqiang CAO  Min TAN  Hongkai CHEN  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1910-1919  PAPER-Computer Graphics
Adaptive Rendering Using a Best Matching Patch
Yu LIU  Changwen ZHENG  
Summary | Full Text:PDF (8.1MB) >>Buy this Article

pp.1920-1927  PAPER-Biological Engineering
Multiple k-Nearest Neighbor Classifier and Its Application to Tissue Characterization of Coronary Plaque
Eiji UCHINO  Ryosuke KUBOTA  Takanori KOGA  Hideaki MISAWA  Noriaki SUETAKE  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.1928-1932  LETTER-Computer System
PBGC: Proxy Block-Based Garbage Collection for Index Structures in NAND Flash Memory
Seon Hwan KIM  Ju Hee CHOI  Jong Wook KWAK  
Summary | Full Text:PDF (750.2KB) >>Buy this Article

pp.1933-1936  LETTER-Information Network
Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
Seunghwan PARK  Dong Hoon LEE  
Summary | Full Text:PDF (101.2KB) >>Buy this Article

pp.1937-1940  LETTER-Artificial Intelligence, Data Mining
A Conditional Dependency Based Probabilistic Model Building Grammatical Evolution
Hyun-Tae KIM  Hyun-Kyu KANG  Chang Wook AHN  
Summary | Full Text:PDF (363.5KB) >>Buy this Article

pp.1941-1944  LETTER-Pattern Recognition
Learning from Multiple Sources via Multiple Domain Relationship
Zhen LIU  Junan YANG  Hui LIU  Jian LIU  
Summary | Full Text:PDF (617.4KB) >>Buy this Article

pp.1945-1948  LETTER-Speech and Hearing
Speech Enhancement Algorithm Using Recursive Wavelet Shrinkage
Gihyoun LEE  Sung Dae NA  KiWoong SEONG  Jin-Ho CHO  Myoung Nam KIM  
Summary | Full Text:PDF (311.9KB) >>Buy this Article

pp.1949-1952  LETTER-Speech and Hearing
Efficient Residual Coding Method of Spatial Audio Object Coding with Two-Step Coding Structure for Interactive Audio Services
Byonghwa LEE  Kwangki KIM  Minsoo HAHN  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.1953-1956  LETTER-Image Processing and Video Processing
Fast Coding Unit Size Decision in HEVC Intra Coding
Tao FAN  Guozhong WANG  Xiwu SHANG  
Summary | Full Text:PDF (794.7KB) >>Buy this Article

pp.1957-1960  LETTER-Computer Graphics
Design and Comparison of Immersive Gesture Interfaces for HMD Based Virtual World Navigation
Bong-Soo SOHN  
Summary | Full Text:PDF (4.7MB) >>Buy this Article

Previous | 
go to Page Top