IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E91-D No.4  (Publication Date:2008/04/01)
Previous | 
Next
Special Section on Knowledge-Based Software Engineering

pp.879-880  FOREWORD  Open Access Paper
FOREWORD
Takahira YAMAGUCHI  
Summary | FreeFull Text:PDF(58.6KB)

pp.881-887  PAPER-Software Engineering
A Generation Method of Exceptional Scenarios from a Normal Scenario
Atsushi OHNISHI  
Summary | Full Text:PDF (570KB) >>Buy this Article

pp.888-896  PAPER-Software Engineering
Prediction of Fault-Prone Software Modules Using a Generic Text Discriminator
Osamu MIZUNO  Tohru KIKUNO  
Summary | Full Text:PDF (846.3KB) >>Buy this Article

pp.897-906  PAPER-Software Engineering
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems
Haruhiko KAIYA  Akira OSADA  Kenji KAIJIRI  
Summary | Full Text:PDF (874KB) >>Buy this Article

pp.907-920  PAPER-Software Engineering
GUI Change Method according to Roles of Widgets and Change Patterns
Junko SHIROGANE  Hajime IWATA  Kazuhiro FUKAYA  Yoshiaki FUKAZAWA  
Summary | Full Text:PDF (696.5KB) >>Buy this Article

pp.921-932  PAPER-Software Engineering
Attributed Goal-Oriented Analysis Method for Selecting Alternatives of Software Requirements
Kazuma YAMAMOTO  Motoshi SAEKI  
Summary | Full Text:PDF (679.2KB) >>Buy this Article

pp.933-944  PAPER-Software Engineering
Design Pattern Detection by Using Meta Patterns
Shinpei HAYASHI  Junya KATADA  Ryota SAKAMOTO  Takashi KOBAYASHI  Motoshi SAEKI  
Summary | Full Text:PDF (819.3KB) >>Buy this Article

pp.945-958  PAPER-Knowledge Engineering
DODDLE-OWL: Interactive Domain Ontology Development with Open Source Software in Java
Takeshi MORITA  Naoki FUKUTA  Noriaki IZUMI  Takahira YAMAGUCHI  
Summary | Full Text:PDF (3.5MB) >>Buy this Article

pp.959-968  PAPER-Knowledge Engineering
Cause Information Extraction from Financial Articles Concerning Business Performance
Hiroyuki SAKAI  Shigeru MASUYAMA  
Summary | Full Text:PDF (604.8KB) >>Buy this Article

pp.969-975  PAPER-Knowledge Engineering
Sentence Topics Based Knowledge Acquisition for Question Answering
Hyo-Jung OH  Bo-Hyun YUN  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.976-985  PAPER-Ubiquitous Computing
Query Language for Location-Based Services: A Model Checking Approach
Christian HOAREAU  Ichiro SATOH  
Summary | Full Text:PDF (481.3KB) >>Buy this Article

pp.986-989  LETTER
An Informative DOM Subtree Identification Method from Web Pages in Unfamiliar Web Sites
Masanobu TSURUTA  Hiroyuki SAKAI  Shigeru MASUYAMA  
Summary | Full Text:PDF (252.6KB) >>Buy this Article

Regular Section

pp.990-995  PAPER-Computation and Computational Models
Recursion Theoretic Operators for Function Complexity Classes
Kenya UENO  
Summary | Full Text:PDF (146.5KB) >>Buy this Article

pp.996-1002  PAPER-Algorithm Theory
Tree-Shellability of Restricted DNFs
Yasuhiko TAKENAGA  Nao KATOUGI  
Summary | Full Text:PDF (210.9KB) >>Buy this Article

pp.1003-1009  PAPER-Algorithm Theory
The Container Problem in Bubble-Sort Graphs
Yasuto SUZUKI  Keiichi KANEKO  
Summary | Full Text:PDF (431KB) >>Buy this Article

pp.1010-1022  PAPER-Computer Systems
A Dynamic Control Mechanism for Pipeline Stage Unification by Identifying Program Phases
Jun YAO  Shinobu MIWA  Hajime SHIMADA  Shinji TOMITA  
Summary | Full Text:PDF (923.7KB) >>Buy this Article

pp.1023-1031  PAPER-Computer Systems
A New Caching Technique to Support Conjunctive Queries in P2P DHT
Koji KOBATAKE  Shigeaki TAGASHIRA  Satoshi FUJITA  
Summary | Full Text:PDF (499.8KB) >>Buy this Article

pp.1032-1041  PAPER-Data Mining
An Unsupervised Opinion Mining Approach for Japanese Weblog Reputation Information Using an Improved SO-PMI Algorithm
Guangwei WANG  Kenji ARAKI  
Summary | Full Text:PDF (394.7KB) >>Buy this Article

pp.1042-1049  PAPER-Data Mining
Small Number of Hidden Units for ELM with Two-Stage Linear Model
Hieu Trung HUYNH  Yonggwan WON  
Summary | Full Text:PDF (217.3KB) >>Buy this Article

pp.1050-1057  PAPER-Application Information Security
Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization
Dong Seong KIM  Jong Sou PARK  
Summary | Full Text:PDF (589.9KB) >>Buy this Article

pp.1058-1073  PAPER-Application Information Security
Random Visitor: Defense against Identity Attacks in P2P Networks
Jabeom GU  Jaehoon NAH  Hyeokchan KWON  Jongsoo JANG  Sehyun PARK  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1074-1081  PAPER-Human-computer Interaction
Comparison of Classification Methods for Detecting Emotion from Mandarin Speech
Tsang-Long PAO  Yu-Te CHEN  Jun-Heng YEH  
Summary | Full Text:PDF (385.6KB) >>Buy this Article

pp.1082-1090  PAPER-Educational Technology
Knowledge Grid Based Knowledge Supply Model
Lu ZHEN  Zuhua JIANG  
Summary | Full Text:PDF (640.3KB) >>Buy this Article

pp.1091-1100  PAPER-Pattern Recognition
Construction of Appearance Manifold with Embedded View-Dependent Covariance Matrix for 3D Object Recognition
Lina  Tomokazu TAKAHASHI  Ichiro IDE  Hiroshi MURASE  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1101-1109  PAPER-Pattern Recognition
Improving Automatic Text Classification by Integrated Feature Analysis
Lazaro S.P. BUSAGALA  Wataru OHYAMA  Tetsushi WAKABAYASHI  Fumitaka KIMURA  
Summary | Full Text:PDF (438.6KB) >>Buy this Article

pp.1110-1116  PAPER-Image Processing and Video Processing
LSB-Based Steganography Using Reflected Gray Code
Chang-Chu CHEN  Chin-Chen CHANG  
Summary | Full Text:PDF (689KB) >>Buy this Article

pp.1117-1126  PAPER-Image Processing and Video Processing
Motion-Compensated Frame Interpolation for Intra-Mode Blocks
Sang-Heon LEE  Hyuk-Jae LEE  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1127-1134  PAPER-Image Processing and Video Processing
Video Encoding Scheme Employing Intra and Inter Prediction Based on Averaged Template Matching Predictors
Yoshinori SUZUKI  Choong Seng BOON  Thiow Keng TAN  
Summary | Full Text:PDF (868.6KB) >>Buy this Article

pp.1135-1148  PAPER-Computer Graphics
Instant Casting Movie Theater: The Future Cast System
Akinobu MAEJIMA  Shuhei WEMLER  Tamotsu MACHIDA  Masao TAKEBAYASHI  Shigeo MORISHIMA  
Summary | Full Text:PDF (2.2MB) >>Buy this Article

pp.1149-1158  PAPER-Computer Graphics
3D Model Segmentation and Representation with Implicit Polynomials
Bo ZHENG  Jun TAKAMATSU  Katsushi IKEUCHI  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.1159-1167  PAPER-Computer Graphics
Motion Belts: Visualization of Human Motion Data on a Timeline
Hiroshi YASUDA  Ryota KAIHARA  Suguru SAITO  Masayuki NAKAJIMA  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.1168-1175  PAPER-Biocybernetics, Neurocomputing
Learning Algorithms Which Make Multilayer Neural Networks Multiple-Weight-and-Neuron-Fault Tolerant
Tadayoshi HORITA  Itsuo TAKANAMI  Masatoshi MORI  
Summary | Full Text:PDF (291.8KB) >>Buy this Article

pp.1176-1184  PAPER-Biological Engineering
Noninvasive Femur Bone Volume Estimation Based on X-Ray Attenuation of a Single Radiographic Image and Medical Knowledge
Supaporn KIATTISIN  Kosin CHAMNONGTHAI  
Summary | Full Text:PDF (573KB) >>Buy this Article

pp.1185-1188  LETTER-Computer Components
A New Scan Power Reduction Scheme Using Transition Freezing for Pseudo-Random Logic BIST
Youbean KIM  Kicheol KIM  Incheol KIM  Hyunwook SON  Sungho KANG  
Summary | Full Text:PDF (589.9KB) >>Buy this Article

pp.1189-1192  LETTER-VLSI Systems
Low Static Powered Asynchronous Data Transfer for GALS System
Myeong-Hoon OH  Seongwoon KIM  
Summary | Full Text:PDF (364.2KB) >>Buy this Article

pp.1193-1196  LETTER-Networks
Distributed Fair Access Point Selection for Multi-Rate IEEE 802.11 WLANs
Huazhi GONG  Kitae NAHM  JongWon KIM  
Summary | Full Text:PDF (223.8KB) >>Buy this Article

pp.1197-1200  LETTER-Dependable Computing
MTR-Fill: A Simulated Annealing-Based X-Filling Technique to Reduce Test Power Dissipation for Scan-Based Designs
Dong-Sup SONG  Jin-Ho AHN  Tae-Jin KIM  Sungho KANG  
Summary | Full Text:PDF (538.3KB) >>Buy this Article

pp.1201-1205  LETTER-Application Information Security
A New Approach for Personal Identification Based on dVCG
Jong Shill LEE  Baek Hwan CHO  Young Joon CHEE  In Young KIM  Sun I. KIM  
Summary | Full Text:PDF (716.1KB) >>Buy this Article

pp.1206-1210  LETTER-Artificial Intelligence and Cognitive Science
δ-Similar Elimination to Enhance Search Performance of Multiobjective Evolutionary Algorithms
Hernan AGUIRRE  Masahiko SATO  Kiyoshi TANAKA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1211-1214  LETTER-Natural Language Processing
Semantic Classification of Bio-Entities Incorporating Predicate-Argument Features
Kyung-Mi PARK  Hae-Chang RIM  
Summary | Full Text:PDF (173.9KB) >>Buy this Article

pp.1215-1217  LETTER-Biological Engineering
A Fuzzy Method for Medical Diagnosis of Headache
Jeong-Yong AHN  Kill-Sung MUN  Young-Hyun KIM  Sun-Young OH  Beom-Soo HAN  
Summary | Full Text:PDF (74.8KB) >>Buy this Article

Previous | 
Next
go to Page Top