IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E93-D No.12  (Publication Date:2010/12/01)
Previous | 
Next
Special Section on Parallel and Distributed Computing and Networking

pp.3163-3163  FOREWORD  Open Access Paper
FOREWORD
Satoshi FUJITA  
Summary | FreeFull Text:PDF(48.2KB)

pp.3164-3172  PAPER
Generalized Spot-Checking for Reliable Volunteer Computing
Kan WATANABE  Masaru FUKUSHI  
Summary | Full Text:PDF (873KB) >>Buy this Article

pp.3173-3180  PAPER
Evaluation of a Dynamic Data Allocation Method for Web-Based Multi-Server MORPG System
Masaki KOHANA  Shusuke OKAMOTO  Masaru KAMADA  Tatsuhiro YONEKURA  
Summary | Full Text:PDF (554.1KB) >>Buy this Article

pp.3181-3193  PAPER
Web API Database Systems for Rapid Web Application Development
Takeru INOUE  Hiroshi ASAKURA  Yukio UEMATSU  Hiroshi SATO  Noriyuki TAKAHASHI  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.3194-3201  PAPER
SLA-Based Scheduling of Bag-of-Tasks Applications on Power-Aware Cluster Systems
Kyong Hoon KIM  Wan Yeon LEE  Jong KIM  Rajkumar BUYYA  
Summary | Full Text:PDF (3.4MB) >>Buy this Article

pp.3202-3210  PAPER
A Cycle-Accurate Simulator for a Reconfigurable Multi-Media System
Min ZHU  Leibo LIU  Shouyi YIN  Chongyong YIN  Shaojun WEI  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.3211-3222  PAPER
Dynamic Program Behavior Identification for High Performance CMPs with Private LLCs
Xiaomin JIA  Pingjing LU  Caixia SUN  Minxuan ZHANG  
Summary | Full Text:PDF (3.2MB) >>Buy this Article

pp.3223-3231  PAPER
Parallelization of Computing-Intensive Tasks of the H.264 High Profile Decoding Algorithm on a Reconfigurable Multimedia System
Tongsheng GENG  Leibo LIU  Shouyi YIN  Min ZHU  Shaojun WEI  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.3232-3242  PAPER
Parallel DFA Architecture for Ultra High Throughput DFA-Based Pattern Matching
Yi TANG  Junchen JIANG  Xiaofei WANG  Chengchen HU  Bin LIU  Zhijia CHEN  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.3243-3250  PAPER
Deafness Resilient MAC Protocol for Directional Communications
Jacir Luiz BORDIM  Koji NAKANO  
Summary | Full Text:PDF (476.3KB) >>Buy this Article

pp.3251-3259  PAPER
Virtual Multi-AP Access for Transport-Level Quality Improvement in Wireless Local Area Networks with Hidden Stations
Koichi NISHIDE  Hiroyuki KUBO  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  
Summary | Full Text:PDF (689.7KB) >>Buy this Article

pp.3260-3268  PAPER
Social Network Based P2P Multicast Reducing Psychological Forwarding Cost in Mobile Networks
Hiroyuki KUBO  Ryoichi SHINKUMA  Tatsuro TAKAHASHI  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.3269-3272  LETTER
Redundant TC Message Senders in OLSR
Kenji YAMADA  Tsuyoshi ITOKAWA  Teruaki KITASUKA  Masayoshi ARITSUGI  
Summary | Full Text:PDF (150.5KB) >>Buy this Article

pp.3273-3275  LETTER
Outage Performance of Decode-and-Forward Relay Systems Using Imperfect MRC Receiver over Nakagami-m Fading Channels
Weiwei YANG  Yueming CAI  Lei WANG  
Summary | Full Text:PDF (154.2KB) >>Buy this Article

Regular Section

pp.3276-3283  PAPER-Fundamentals of Information Systems
The Firing Squad Synchronization Problems for Number Patterns on a Seven-Segment Display and Segment Arrays
Kazuya YAMASHITA  Mitsuru SAKAI  Sadaki HIROSE  Yasuaki NISHITANI  
Summary | Full Text:PDF (559.4KB) >>Buy this Article

pp.3284-3293  PAPER-Computer System
A VGA 30 fps Affine Motion Model Estimation VLSI for Real-Time Video Segmentation
Yoshiki YUNBE  Masayuki MIYAMA  Yoshio MATSUDA  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.3294-3305  PAPER-Computer System
Register File Size Reduction through Instruction Pre-Execution Incorporating Value Prediction
Yusuke TANAKA  Hideki ANDO  
Summary | Full Text:PDF (541.3KB) >>Buy this Article

pp.3306-3320  PAPER-Software Engineering
Component Identification and Evaluation for Legacy Systems--An Empirical Study--
JianFeng CUI  HeungSeok CHAE  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.3321-3330  PAPER-Information Network
A Usability Evaluation on the XVC Framework for In-Vehicle User Interfaces
Soonghwan RO  Hanh Van NGUYEN  Woochul JUNG  Young Woo PAE  Jonathan P. MUNSON  Jinmyung WOO  Sibok YU  Kisung LEE  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.3331-3343  PAPER-Information Network
Detecting TCP Retransmission Timeouts Non-related to Congestion in Multi-Hop Wireless Networks
Mi-Young PARK  Sang-Hwa CHUNG  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.3344-3351  PAPER-Pattern Recognition
2D Feature Space for Snow Particle Classification into Snowflake and Graupel
Karolina NURZYNSKA  Mamoru KUBO  Ken-ichiro MURAMOTO  
Summary | Full Text:PDF (754KB) >>Buy this Article

pp.3352-3358  PAPER-Pattern Recognition
Optimal Gaussian Kernel Parameter Selection for SVM Classifier
Xu YANG  HuiLin XIONG  Xin YANG  
Summary | Full Text:PDF (269.2KB) >>Buy this Article

pp.3359-3367  PAPER-Speech and Hearing
Selecting Help Messages by Using Robust Grammar Verification for Handling Out-of-Grammar Utterances in Spoken Dialogue Systems
Kazunori KOMATANI  Yuichiro FUKUBAYASHI  Satoshi IKEDA  Tetsuya OGATA  Hiroshi G. OKUNO  
Summary | Full Text:PDF (827.9KB) >>Buy this Article

pp.3368-3376  PAPER-Speech and Hearing
Estimation of Speech Intelligibility Using Speech Recognition Systems
Yusuke TAKANO  Kazuhiro KONDO  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.3377-3383  PAPER-Natural Language Processing
A New Hybrid Method for Machine Transliteration
Dong YANG  Paul DIXON  Sadaoki FURUI  
Summary | Full Text:PDF (320.7KB) >>Buy this Article

pp.3384-3391  PAPER-Biological Engineering
On-Line Electrocardiogram Lossless Compression Using Antidictionary Codes for a Finite Alphabet
Takahiro OTA  Hiroyoshi MORITA  
Summary | Full Text:PDF (635.9KB) >>Buy this Article

pp.3392-3395  LETTER-Software System
A Feature-Based Service Identification Method to Improve Productivity of Service-Oriented System
Dongsu KANG  CheeYang SONG  Doo-Kwon BAIK  
Summary | Full Text:PDF (450.2KB) >>Buy this Article

pp.3396-3399  LETTER-Information Network
Improvement of the Efficient Secret Broadcast Scheme
Eun-Jun YOON  Muhammad KHURRAM KHAN  Kee-Young YOO  
Summary | Full Text:PDF (132.3KB) >>Buy this Article

pp.3400-3402  LETTER-Information Network
Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
Eun-Jun YOON  Muhammad Khurram KHAN  Kee-Young YOO  
Summary | Full Text:PDF (291.9KB) >>Buy this Article

pp.3403-3406  LETTER-Dependable Computing
Relative MTTF-Based Incentive Scheme for Availability-Based Replication in P2P Systems
Kyungbaek KIM  
Summary | Full Text:PDF (177KB) >>Buy this Article

pp.3407-3409  LETTER-Dependable Computing
Single-Event-Upset Tolerant RS Flip-Flop with Small Area
Kazuteru NAMBA  Kengo NAKASHIMA  Hideo ITO  
Summary | Full Text:PDF (240.1KB) >>Buy this Article

pp.3410-3413  LETTER-Dependable Computing
Binary Oriented Vulnerability Analyzer Based on Hidden Markov Model
Hao BAI  Chang-zhen HU  Gang ZHANG  Xiao-chuan JING  Ning LI  
Summary | Full Text:PDF (118.9KB) >>Buy this Article

pp.3414-3417  LETTER-Biological Engineering
Improved Demons Technique with Orthogonal Gradient Information for Medical Image Registration
Cheng LU  Mrinal MANDAL  
Summary | Full Text:PDF (390.1KB) >>Buy this Article

Previous | 
Next
go to Page Top