IEICE TRANSACTIONS on Information and Systems    (open access publishing)
Online ISSN : 1745-1361
[Whole issue]:PDF (54.3MB)
Previous | 
Top 10 downloads
To the Latest Issue

Advance publication (published online immediately after acceptance)

Improving Distantly Supervised Relation Extraction by Knowledge Base-driven Zero Subject Resolution
Eun-kyung KIM  KEY-SUN CHOI  
Summary | Full Text:PDF(1MB)

Uncertain Rule based Method for Determining Data Currency
Mohan LI  Jianzhong LI  Siyao CHENG  Yanbin SUN  
Summary | Full Text:PDF(480.8KB)

Twofold Correlation Filtering for Tracking Integration
Wei WANG  Weiguang Li  Zhaoming CHEN  Mingquan SHI  
Summary | Full Text:PDF(2.9MB)

Weighting Estimation Methods for Opponents' Utility Functions using Boosting in Multi-time Negotiations
Takaki MATSUNE  Katsuhide FUJITA  
Summary | Full Text:PDF(344.4KB)

RbWL: Recency-based static wear leveling for lifetime extension and overhead reduction in NAND flash memory systems
Sang-Ho HWANG  Jong Wook KWAK  
Summary | Full Text:PDF(3MB)

Improving Per-node Computing Efficiency by an Adaptive Lock-free Scheduling Model
Zhishuo ZHENG  Deyu QI  Naqin ZHOU  Xinyang WANG  Mincong YU  
Summary | Full Text:PDF(1.9MB)

Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers
Hyun KWON  Yongchul KIM  Ki-Woong PARK  Hyunsoo YOON  Daeseon CHOI  
Summary | Full Text:PDF(5.6MB)

Spectrum-based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List
Yong WANG  Zhiqiu HUANG  Rongcun WANG  Qiao YU  
Summary | Full Text:PDF(347.4KB)

Search-based Concolic Execution for SW Vulnerability Discovery
Rustamov FAYOZBEK  Minjun CHOI  Joobeom YUN  
Summary | Full Text:PDF(606.4KB)

Impact of Viewing Distance on Task Performance and Its Properties
Summary | Full Text:PDF(386KB)

Client-side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames
Qian LU  Haipeng QU  Yuan ZHUANG  Xi-Jun LIN  Yuzhan OUYANG  
Summary | Full Text:PDF(2.7MB)

Low Bit-Rate Compression Image Restoration Through Subspace Joint Regression Learning
Zongliang GAN  
Summary | Full Text:PDF(1.4MB)

A Quantitative Analysis on Relationship between an Early-Closed Bug and its Amount of Clues: A Case Study of Apache Ant
Akito SUNOUCHI  Hirohisa AMAN  Minoru KAWAHARA  
Summary | Full Text:PDF(85.7KB)

Data recovery aware garbage collection mechanism in flash-based storage devices
Joon-Young PAIK  Rize JIN  Tae-Sun CHUNG  
Summary | Full Text:PDF(711.1KB)

Fast CU Termination Algorithm with AdaBoost Classifier in HEVC Encoder
Yitong LIU  Wang TIAN  Yuchen LI  Hongwen YANG  
Summary | Full Text:PDF(449.1KB)

Robust Index Code to distribute digital images and digital contents together
Minsu KIM  Kunwoo LEE  Katsuhiko GONDOW  Jun-ichi IMURA  
Summary | Full Text:PDF(784.6KB)

Designing Coded Aperture Camera Based on PCA and NMF for Light Field Acquisition
Yusuke YAGI  Keita TAKAHASHI  Toshiaki FUJII  Toshiki SONODA  Hajime NAGAHARA  
Summary | Full Text:PDF(3.5MB)

Video Saliency Detection Using Spatiotemporal Cues
Yu Chen  Jing Xiao  Liuyi Hu  Dan Chen  Zhongyuan Wang  Dengshi Li  
Summary | Full Text:PDF(1017.5KB)

Sparse Graph based Deep Learning Networks for Face Recognition
Renjie WU  Sei-ichiro KAMATA  
Summary | Full Text:PDF(1.1MB)

Formal Method for Security Analysis of Electronic Payment Protocols
Yi LIU  Qingkun MENG  Xingtong LIU  Jian WANG  Lei ZHANG  Chaojing TANG  
Summary | Full Text:PDF(707KB)

Entity Ranking for Queries with Modifiers based on Knowledge Bases and Web Search Results
Wiradee IMRATTANATRAI  Makoto P. KATO  Katsumi TANAKA  Masatoshi YOSHIKAWA  
Summary | Full Text:PDF(667.5KB)

Variational-Bayesian Single-Image Devignetting
Motoharu SONOGASHIRA  Masaaki IIYAMA  Michihiko MINOH  
Summary | Full Text:PDF(2.5MB)

Reward-Based Exploration: Adaptive Control for Deep Reinforcement Learning
Zhi-xiong Xu  Lei Cao  Xi-liang Chen  Chen-xi Li  
Summary | Full Text:PDF(465.7KB)

A Unified Neural Network for Quality Estimation of Machine Translation
Maoxi LI  Qingyu XIANG  Zhiming CHEN  Mingweng WANG  
Summary | Full Text:PDF(275.9KB)

Optimal Billboard Deformation via 3D Voxel for Free-viewpoint System
Keisuke NONAKA  Houari SABIRIN  Jun CHEN  Hiroshi SANKOH  Sei NAITO  
Summary | Full Text:PDF(7.8MB)

A linear-time algorithm for finding a spanning tree with non-terminal set VNT on interval graphs
Shin-ichi NAKAYAMA  Shigeru MASUYAMA  
Summary | Full Text:PDF(534.7KB)

Proxy Responses by FPGA-based Switch for MapReduce Stragglers
Koya MITSUZUKA  Michihiro KOIBUCHI  Hideharu AMANO  Hiroki MATSUTANI  
Summary | Full Text:PDF(635.6KB)

A Machine Learning-based Approach for Selecting SpMV Kernels and Matrix Storage Formats
Hang CUI  Shoichi HIRASAWA  Hiroaki KOBAYASHI  Hiroyuki TAKIZAWA  
Summary | Full Text:PDF(268.3KB)

Cross-Validation-Based Association Rule Prioritization Metric for Software Defect Characterization
Takashi WATANABE  Akito MONDEN  Zeynep YÜCEL  Yasutaka KAMEI  Shuji MORISAKI  
Summary | Full Text:PDF(1.9MB)

An edge detection method based on wavelet transform at arbitrary angles
Su Liu  Xingguang Geng  Yitao Zhang  Shaolong Zhang  Jun Zhang  Yanbin Xiao  Chengjun Huang  Haiying Zhang  
Summary | Full Text:PDF(2MB)

Evaluating Energy-Efficiency of DRAM Channel Interleaving Schemes for Multithreaded Programs
Satoshi IMAMURA  Yuichiro YASUI  Koji INOUE  Takatsugu ONO  Hiroshi SASAKI  Katsuki FUJISAWA  
Summary | Full Text:PDF(1.2MB)

Pattern-based Ontology Modeling and Reasoning for Emergency System
Yue Tan  Wei Liu  Zhenyu Yang  Xiaoni Du  Zongtian Liu  
Summary | Full Text:PDF(645.2KB)

Review Rating Prediction on Location-Based Social Networks Using Text, Social Links, and Geolocations
Yuehua WANG  Zhinong ZHONG  Anran YANG  Ning JING  
Summary | Full Text:PDF(8.7MB)

Trading-off Computing and Cooling Energies by VM Migration in Data Centers
Ying SONG  Xia ZHAO  Bo WANG  Yuzhong SUN  
Summary | Full Text:PDF(525KB)

Incremental Estimation of Natural Policy Gradient with Relative Importance Weighting
Ryo IWAKI  Hiroki YOKOYAMA  Minoru ASADA  
Summary | Full Text:PDF(2.1MB)

Reciprocal Kit-Build Concept Map: An Approach for Encouraging Pair Discussion to Share Each Other's Understanding
Warunya WUNNASRI  Jaruwat PAILAI  Yusuke HAYASHI  Tsukasa HIRASHIMA  
Summary | Full Text:PDF(995.7KB)

A Propagation Method for Multi Object Tracklet Repair
Nii L. SOWAH  Qingbo WU  Fanman MENG  Liangzhi TANG  Yinan LIU  Linfeng XU  
Summary | Full Text:PDF(834.3KB)

Waffle: A new photonic plasmonic router for optical network on chip
Chao TANG  Huaxi GU  Kun WANG  
Summary | Full Text:PDF(444.1KB)

An Application of Intuitionistic Fuzzy Sets to Improve Information Extraction from Thai Unstructured Text
Summary | Full Text:PDF(442.1KB)

Deep Reinforcement Learning with Sarsa and Q-Learning: A Hybrid Approach
Zhi-xiong Xu  Lei Cao  Xi-liang Chen  Chen-xi Li  Yong-liang Zhang  Jun Lai  
Summary | Full Text:PDF(924.8KB)

Tighter generalization bounds for matrix completion via factorization into constrained matrices
Ken-ichiro MORIDOMI  Kohei HATANO  Eiji TAKIMOTO  
Summary | Full Text:PDF(286.2KB)

A Novel Recommendation Algorithm Incorporating Temporal Dynamics, Reviews and Item Correlation
Ting WU  Yong FENG  JiaXing SANG  BaoHua QIANG  YaNan WANG  
Summary | Full Text:PDF(594.8KB)

Specificity-Aware Ontology Generation for Improving Web Service Clustering
Rupasingha A. H. M. Rupasingha  Incheon Paik  Banage T. G. S. Kumara  
Summary | Full Text:PDF(1.5MB)

From Easy to Difficult: a Self-Paced Multi-task Joint Sparse Representation Method
Lihua GUO  
Summary | Full Text:PDF(377.3KB)

A Scalable SDN Architecture for Underwater Networks Security Authentication
Qiuli CHEN  Ming HE  Xiang ZHENG  Fei DAI  Yuntian FENG  
Summary | Full Text:PDF(1.6MB)

Improved Radiometric Calibration by Brightness Transfer Function based Noise & Outlier Removal and Weighted Least Square Minimization
Summary | Full Text:PDF(3MB)

A routing method for fish farm monitoring under short transmission range condition
Koichi ISHIDA  Yoshiaki TANIGUCHI  Nobukazu IGUCHI  
Summary | Full Text:PDF(449.2KB)

PCANet-II: When PCANet Meets the Second Order Pooling
Chunxiao FAN  Xiaopeng HONG  Lei TIAN  Yue MING  Matti PIETIKÄINEN  Guoying ZHAO  
Summary | Full Text:PDF(603.3KB)

In-storage Anti-virus System via on-demand inspection
Jaehwan LEE  Youngrang KIM  Ji SUN SHIN  
Summary | Full Text:PDF(307.8KB)

Understanding Support of Causal Relationship between Events in Historical Learning
Tomoko KOJIRI  Fumito NATE  Keitaro TOKUTAKE  
Summary | Full Text:PDF(565.7KB)

Detecting Unsafe Raw Pointer Dereferencing Behavior in Rust
Zhijian HUANG  Yong Jun WANG  Jing LIU  
Summary | Full Text:PDF(136.1KB)

Robust 3D Surface Reconstruction in Real-time With Localization Sensor
Wei LI  Yi WU  Chunlin SHEN  Huajun GONG  
Summary | Full Text:PDF(2.8MB)

An efficient misalignment method for visual tracking based on sparse representation
Shan JIANG  Cheng HAN  Xiaoqiang DI  
Summary | Full Text:PDF(1.2MB)

Construction of Spontaneous Emotion Corpus from Indonesian TV Talk Shows and Its Application on Multimodal Emotion Recognition
Summary | Full Text:PDF(2.1MB)

Multilevel Thresholding Color Image Segmentation Using a Modified Artificial Bee Colony Algorithm
Sipeng ZHANG  Wei JIANG  Shin'ichi SATOH  
Summary | Full Text:PDF(3.5MB)

ECG Delineation with Randomly Selected Wavelet Feature and Random Forest Classifier
Dapeng FU  Zhourui XIA  Pengfei GAO  Haiqing WANG  Jianping LIN  Li SUN  
Summary | Full Text:PDF(1.5MB)

Transform Electric Power Curve into Dynamometer Diagram Image Using Deep Recurrent Neural Network
Junfeng SHI  Wenming MA  Peng SONG  
Summary | Full Text:PDF(219KB)

A Design for Testability of Open Defects at Interconnects in 3D Stacked ICs
Fara ASHIKIN  Masaki HASHIZUME  Hiroyuki YOTSUYANAGI  Shyue-Kung LU  Zvi ROTH  
Summary | Full Text:PDF(2MB)

Proof and Evaluation of Improved Slack Reclamation for Response Time Analysis of Real-Time Multiprocessor Systems
Hyeongboo BAEK  Donghyouk LIM  Jinkyu LEE  
Summary | Full Text:PDF(223.9KB)

An Emotion Similarity based Severity Prediction of Software Bugs : A Case Study of Open Source Projects
Geunseok YANG  Tao ZHANG  Byungjeong LEE  
Summary | Full Text:PDF(1.4MB)

MinDoS: A Priority-Based SDN Safe-Guard Architecture for DoS Attacks
Tao Wang  Hongchang Chen  Chao Qi  
Summary | Full Text:PDF(735.2KB)

Predicting Taxi Destination by Regularized RNN with SDZ
Lei ZHANG  Guoxing ZHANG  Zhizheng LIANG  Qingfu FAN  Yadong LI  
Summary | Full Text:PDF(348.9KB)

Design and Implementation of Deep Neural Network for Edge Computing
Junyang Zhang  Yang Guo  Xiao Hu  Rongzhen Li  
Summary | Full Text:PDF(1.8MB)

Data Hiding in Spatial Color Images on Smartphones by Adaptive R-G-B LSB Replacement
Haeyoung Lee  
Summary | Full Text:PDF(632.6KB)

Multi-Channels LSTM Networks for Fence Activity Classification
Kelu Hu  Chunlei Zheng  Wei He  Xinghe Bao  Yingguan Wang  
Summary | Full Text:PDF(1010KB)

A Two-Layered Framework for the Discovery of Software Behavior: A Case Study
Cong LIU  Jianpeng ZHANG  Guangming LI  Shangce GAO  Qingtian ZENG  
Summary | Full Text:PDF(940.6KB)

 Volume E101-D No.7  (Publication Date:2018/07/01)
Special Section on Knowledge-Based Software Engineering

pp.1723-1724  FOREWORD  Open Access Paper
Shigeo KANEDA  
Summary | FreeFull Text:PDF(108.4KB)

pp.1725-1732  PAPER
A Method of Verifying Time-Response Requirements
Yuma MATSUMOTO  Takayuki OMORI  Hiroya ITOGA  Atsushi OHNISHI  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.1733-1742  PAPER
An Investigative Study on How Developers Filter and Prioritize Code Smells
Natthawute SAE-LIM  Shinpei HAYASHI  Motoshi SAEKI  
Summary | Full Text:PDF (610.6KB) >>Buy this Article

pp.1743-1750  PAPER
Towards an Improvement of Bug Report Summarization Using Two-Layer Semantic Information
Cheng-Zen YANG  Cheng-Min AO  Yu-Han CHUNG  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1751-1765  PAPER
Identifying Core Objects for Trace Summarization by Analyzing Reference Relations and Dynamic Properties
Kunihiro NODA  Takashi KOBAYASHI  Noritoshi ATSUMI  
Summary | Full Text:PDF (927.5KB) >>Buy this Article

pp.1766-1779  PAPER
Refactoring Opportunity Identification Methodology for Removing Long Method Smells and Improving Code Analyzability
Summary | Full Text:PDF (2.7MB) >>Buy this Article

pp.1780-1789  PAPER
Detecting Architectural Violations Using Responsibility and Dependency Constraints of Components
Shinpei HAYASHI  Fumiki MINAMI  Motoshi SAEKI  
Summary | Full Text:PDF (915.8KB) >>Buy this Article

pp.1790-1800  PAPER
Usability Evaluation Method of Applications for Mobile Computers Using Operation Histories
Summary | Full Text:PDF (548.6KB) >>Buy this Article

pp.1801-1810  PAPER
Learners' Self Checking and Its Effectiveness in Conceptual Data Modeling Exercises
Takafumi TANAKA  Hiroaki HASHIURA  Atsuo HAZEYAMA  Seiichi KOMIYA  Yuki HIRAI  Keiichi KANEKO  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1811-1815  LETTER
Character Feature Learning for Named Entity Recognition
Ping ZENG  Qingping TAN  Haoyu ZHANG  Xiankai MENG  Zhuo ZHANG  Jianjun XU  Yan LEI  
Summary | Full Text:PDF (559.9KB) >>Buy this Article

Regular Section

pp.1816-1827  PAPER-Fundamentals of Information Systems
Energy Efficient Resource Selection and Allocation Strategy for Virtual Machine Consolidation in Cloud Datacenters
Yaohui CHANG  Chunhua GU  Fei LUO  Guisheng FAN  Wenhao FU  
Summary | Full Text:PDF (2.4MB) >>Buy this Article

pp.1828-1834  PAPER-Fundamentals of Information Systems
Cyclic Vertex Connectivity of Trivalent Cayley Graphs
Jenn-Yang KE  
Summary | Full Text:PDF (186.7KB) >>Buy this Article

pp.1835-1842  PAPER-Fundamentals of Information Systems
An Optimization Algorithm to Build Low Congestion Multi-Ring Topology for Optical Network-on-Chip
Lijing ZHU  Kun WANG  Duan ZHOU  Liangkai LIU  Huaxi GU  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.1843-1859  PAPER-Fundamentals of Information Systems
Fuzzy Levy-GJR-GARCH American Option Pricing Model Based on an Infinite Pure Jump Process
Huiming ZHANG  Junzo WATADA  
Summary | Full Text:PDF (10.2MB) >>Buy this Article

pp.1860-1869  PAPER-Artificial Intelligence, Data Mining
Infants' Pain Recognition Based on Facial Expression: Dynamic Hybrid Descriptions
Ruicong ZHI  Ghada ZAMZMI  Dmitry GOLDGOF  Terri ASHMEADE  Tingting LI  Yu SUN  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1870-1879  PAPER-Artificial Intelligence, Data Mining
Representation Learning for Users' Web Browsing Sequences
Yukihiro TAGAMI  Hayato KOBAYASHI  Shingo ONO  Akira TAJIMA  
Summary | Full Text:PDF (864.2KB) >>Buy this Article

pp.1880-1893  PAPER-Artificial Intelligence, Data Mining
AutoRobot: A Multi-Agent Software Framework for Autonomous Robots
Zhe LIU  Xinjun MAO  Shuo YANG  
Summary | Full Text:PDF (2.8MB) >>Buy this Article

pp.1894-1905  PAPER-Human-computer Interaction
Feedback Control Model of a Gesture-Based Pointing Interface for a Large Display
Kazuaki KONDO  Genki MIZUNO  Yuichi NAKAMURA  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1906-1914  PAPER-Rehabilitation Engineering and Assistive Technology
Experimental Tests of a Prototype of IMU-Based Closed-Loop Fuzzy Control System for Mobile FES Cycling with Pedaling Wheelchair
Takashi WATANABE  Takumi TADANO  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.1915-1923  PAPER-Image Processing and Video Processing
Robust Human-Computer Interaction for Unstable Camera Systems
Hao ZHU  Qing YOU  Wenjie CHEN  
Summary | Full Text:PDF (4.8MB) >>Buy this Article

pp.1924-1932  PAPER-Image Processing and Video Processing
MAP-MRF Estimation Based Weather Radar Visualization
Suk-Hwan LEE  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.1933-1937  PAPER-Image Recognition, Computer Vision
Active Contours Driven by Local Rayleigh Distribution Fitting Energy for Ultrasound Image Segmentation
Hui BI  Yibo JIANG  Hui LI  Xuan SHA  Yi WANG  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.1938-1945  PAPER-Natural Language Processing
Error Correction for Search Engine by Mining Bad Case
Jianyong DUAN  Tianxiao JI  Hao WANG  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1946-1949  LETTER-Fundamentals of Information Systems
Improved Wolf Pack Algorithm Based on Differential Evolution Elite Set
Xiayang CHEN  Chaojing TANG  Jian WANG  Lei ZHANG  Qingkun MENG  
Summary | Full Text:PDF (507.5KB) >>Buy this Article

pp.1950-1953  LETTER-Software Engineering
Implementing Adaptive Decisions in Stochastic Simulations via AOP
Pilsung KANG  
Summary | Full Text:PDF (280.5KB) >>Buy this Article

pp.1954-1958  LETTER-Data Engineering, Web Information Systems
Classifying MathML Expressions by Multilayer Perceptron
Yuma NAGAO  Nobutaka SUZUKI  
Summary | Full Text:PDF (252.7KB) >>Buy this Article

pp.1959-1962  LETTER-Data Engineering, Web Information Systems
Fast Time-Aware Sparse Trajectories Prediction with Tensor Factorization
Lei ZHANG  Qingfu FAN  Guoxing ZHANG  Zhizheng LIANG  
Summary | Full Text:PDF (632.8KB) >>Buy this Article

pp.1963-1967  LETTER-Speech and Hearing
Improve Multichannel Speech Recognition with Temporal and Spatial Information
Yu ZHANG  Pengyuan ZHANG  Qingwei ZHAO  
Summary | Full Text:PDF (692.6KB) >>Buy this Article

pp.1968-1971  LETTER-Image Recognition, Computer Vision
Crowd Gathering Detection Based on the Foreground Stillness Model
Chun-Yu LIU  Wei-Hao LIAO  Shanq-Jang RUAN  
Summary | Full Text:PDF (8.2MB) >>Buy this Article

pp.1972-1975  LETTER-Image Recognition, Computer Vision
Single-Image 3D Pose Estimation for Texture-Less Object via Symmetric Prior
Xiaoyuan REN  Libing JIANG  Xiaoan TANG  Junda ZHANG  
Summary | Full Text:PDF (429KB) >>Buy this Article

pp.1976-1979  LETTER-Multimedia Pattern Processing
A Novel Bimodal Emotion Database from Physiological Signals and Facial Expression
Jingjie YAN  Bei WANG  Ruiyu LIANG  
Summary | Full Text:PDF (532.7KB) >>Buy this Article

Previous | 
go to Page Top