IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E93-D No.3  (Publication Date:2010/03/01)
Previous | 
Next
Special Section on Trust, Security and Privacy for Pervasive Applications

pp.409-410  FOREWORD  Open Access Paper
FOREWORD
Guojun WANG  Laurence T.YANG  Kouichi SAKURAI  
Summary | FreeFull Text:PDF(100.8KB)

pp.411-420  INVITED PAPER
Secured Fast Handoff in 802.11-Based Wireless Mesh Networks for Pervasive Internet Access
Gang YAO  Jiannong CAO  Ye YAN  Yusheng JI  
Summary | Full Text:PDF (431.7KB) >>Buy this Article

pp.421-429  INVITED PAPER
A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks
Song GUO  An-Ni SHEN  Minyi GUO  
Summary | Full Text:PDF (287.3KB) >>Buy this Article

pp.430-437  PAPER
An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment
Zhuo MA  Jianfeng MA  SangJae MOON  Xinghua LI  
Summary | Full Text:PDF (537.6KB) >>Buy this Article

pp.438-447  PAPER
HopRec: Hop-Based Recommendation Ability Enhanced Reputation Ranking in P2P Networks
Yufeng WANG  Akihiro NAKAO  Jianhua MA  
Summary | Full Text:PDF (1001.1KB) >>Buy this Article

pp.448-457  PAPER
Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks
Daigo MURAMATSU  
Summary | Full Text:PDF (972.9KB) >>Buy this Article

pp.458-465  PAPER
Tier-Based Scalable and Secure Routing for Wireless Sensor Networks with Mobile Sinks
Feilong TANG  Minyi GUO  Song GUO  
Summary | Full Text:PDF (360.7KB) >>Buy this Article

pp.466-472  PAPER
A Trust Management Model Based on Bi-evaluation in P2P Networks
Jingyu FENG  Yuqing ZHANG  Hong WANG  
Summary | Full Text:PDF (203.1KB) >>Buy this Article

pp.473-483  PAPER
A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks
Myoungrak LEE  Byungsik YOON  Hyogon KIM  Hoh Peter IN  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.484-490  PAPER
Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks
YaHui LI  JianFeng MA  SangJae MOON  
Summary | Full Text:PDF (221.4KB) >>Buy this Article

pp.491-502  PAPER
Consistency Checking of Safety and Availability in Access Control
Ruixuan LI  Jianfeng LU  Zhengding LU  Xiaopu MA  
Summary | Full Text:PDF (281.4KB) >>Buy this Article

pp.503-509  PAPER
LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network
Xiaofeng LU  Pan HUI  Don TOWSLEY  Juhua PU  Zhang XIONG  
Summary | Full Text:PDF (375.2KB) >>Buy this Article

pp.510-517  PAPER
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks
Sancheng PENG  Weijia JIA  Guojun WANG  Jie WU  Minyi GUO  
Summary | Full Text:PDF (679.1KB) >>Buy this Article

pp.518-527  PAPER
Lightweight Props on the Weak Security of EPC Class-1 Generation-2 Standard
Pedro PERIS-LOPEZ  Tieyan LI  Julio C. HERNANDEZ-CASTRO  
Summary | Full Text:PDF (357KB) >>Buy this Article

pp.528-530  LETTER
On the Security of RFID Group Scanning Protocols
Duc Nguyen DANG  Kwangjo KIM  
Summary | Full Text:PDF (113.5KB) >>Buy this Article

pp.531-533  LETTER
An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming
Baokang ZHAO  Dan WANG  Zili SHAO  Jiannong CAO  Keith C.C. CHAN  Jinshu SU  
Summary | Full Text:PDF (149.3KB) >>Buy this Article

Regular Section

pp.534-541  PAPER-Computation and Computational Models
Orbital Systolic Algorithms and Array Processors for Solution of the Algebraic Path Problem
Stanislav G. SEDUKHIN  Toshiaki MIYAZAKI  Kenichi KURODA  
Summary | Full Text:PDF (631.9KB) >>Buy this Article

pp.542-549  PAPER-Computation and Computational Models
An Ultrasonic and Air Pressure Sensing System for Detection of Behavior before Getting out of Bed Aided by Fuzzy Theory
Hayato YAMAGUCHI  Hiroshi NAKAJIMA  Kazuhiko TANIGUCHI  Syoji KOBASHI  Yutaka HATA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.550-559  PAPER-Networks
Management of Energy Consumption on Cluster Based Routing Protocol for MANET
Seyed-Amin HOSSEINI-SENO  Tat-Chee WAN  Rahmat BUDIARTO  Masashi YAMADA  
Summary | Full Text:PDF (919.1KB) >>Buy this Article

pp.560-568  PAPER-Distributed Cooperation and Agents
Optimal Decision-Making of Countermeasures by Estimating Their Expected Utilities
So Ryoung PARK  Sanguk NOH  
Summary | Full Text:PDF (366.1KB) >>Buy this Article

pp.569-582  PAPER-Artificial Intelligence and Cognitive Science
Reasoning on the Self-Organizing Incremental Associative Memory for Online Robot Path Planning
Aram KAWEWONG  Yutaro HONDA  Manabu TSUBOYAMA  Osamu HASEGAWA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.583-594  PAPER-Pattern Recognition
Least-Squares Conditional Density Estimation
Masashi SUGIYAMA  Ichiro TAKEUCHI  Taiji SUZUKI  Takafumi KANAMORI  Hirotaka HACHIYA  Daisuke OKANOHARA  
Summary | Full Text:PDF (493.3KB) >>Buy this Article

pp.595-601  PAPER-Speech and Hearing
A Covariance-Tying Technique for HMM-Based Speech Synthesis
Keiichiro OURA  Heiga ZEN  Yoshihiko NANKAKU  Akinobu LEE  Keiichi TOKUDA  
Summary | Full Text:PDF (662.9KB) >>Buy this Article

pp.602-610  PAPER-Image Processing and Video Processing
A Fast and Memory Efficient SPIHT Image Encoder
Zhong-Ho CHEN  Alvin W. Y. SU  
Summary | Full Text:PDF (639.4KB) >>Buy this Article | Errata[Uploaded on May 1,2010]

pp.611-623  PAPER-Image Recognition, Computer Vision
Elliptical Object Detection by a Modified RANSAC with Sampling Constraint from Boundary Curves' Clustering
Yingdi XIE  Jun OHYA  
Summary | Full Text:PDF (2.4MB) >>Buy this Article

pp.624-634  PAPER-Natural Language Processing
An Unsupervised Model of Redundancy for Answer Validation
Youzheng WU  Hideki KASHIOKA  Satoshi NAKAMURA  
Summary | Full Text:PDF (484.8KB) >>Buy this Article

pp.635-638  LETTER-Database
Efficient Window Processing over Disordered Data Streams
Hyeon-Gyu KIM  Woo-Lam KANG  Myoung-Ho KIM  
Summary | Full Text:PDF (279.3KB) >>Buy this Article

pp.639-642  LETTER-Dependable Computing
An Autonomic Connection Scheme for High Service Availability
Daekeun MOON  Jinho PARK  Hagbae KIM  
Summary | Full Text:PDF (535.5KB) >>Buy this Article

pp.643-646  LETTER-Dependable Computing
Pattern Mapping Method for Low Power BIST Based on Transition Freezing Method
Youbean KIM  Jaewon JANG  Hyunwook SON  Sungho KANG  
Summary | Full Text:PDF (293.9KB) >>Buy this Article

pp.647-650  LETTER-Speech and Hearing
Utterance Verification Using State-Level Log-Likelihood Ratio with Frame and State Selection
Suk-Bong KWON  Hoirin KIM  
Summary | Full Text:PDF (180.1KB) >>Buy this Article

pp.651-653  LETTER-Image Recognition, Computer Vision
Development of an XYZ Digital Camera with Embedded Color Calibration System for Accurate Color Acquisition
Maciej KRETKOWSKI  Ryszard JABLONSKI  Yoshifumi SHIMODAIRA  
Summary | Full Text:PDF (331.7KB) >>Buy this Article

pp.654-657  LETTER-Image Recognition, Computer Vision
Distributed Video Coding with Multiple Side Information Sets
Jung Ah PARK  Doug Young SUH  Gwang-Hoon PARK  
Summary | Full Text:PDF (264.4KB) >>Buy this Article

pp.658-661  LETTER-Image Recognition, Computer Vision
Real-Time Human Detection Using Hierarchical HOG Matrices
Guan PANG  Guijin WANG  Xinggang LIN  
Summary | Full Text:PDF (485KB) >>Buy this Article

pp.662-665  LETTER-Image Recognition, Computer Vision
Robust Object Tracking via Combining Observation Models
Fan JIANG  Guijin WANG  Chang LIU  Xinggang LIN  Weiguo WU  
Summary | Full Text:PDF (446.7KB) >>Buy this Article

pp.666-670  LETTER-Image Recognition, Computer Vision
Moment Invariants of the Weighted Image
Ken-ichi SAKAUE  Youji IIGUNI  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

Previous | 
Next
go to Page Top