IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E93-D No.5  (Publication Date:2010/05/01)
Previous | 
Next
Special Section on Formal Approach

pp.941-941  FOREWORD  Open Access Paper
FOREWORD
Hiroyuki SEKI  
Summary | FreeFull Text:PDF(59KB)

pp.942-952  PAPER-Term Rewriting Systems
Multi-Context Rewriting Induction with Termination Checkers
Haruhiko SATO  Masahito KURIHARA  
Summary | Full Text:PDF (581.4KB) >>Buy this Article

pp.953-962  PAPER-Term Rewriting Systems
Decidability of Termination and Innermost Termination for Term Rewriting Systems with Right-Shallow Dependency Pairs
Keita UCHIYAMA  Masahiko SAKAI  Toshiki SAKABE  
Summary | Full Text:PDF (495.1KB) >>Buy this Article

pp.963-973  PAPER-Program Transformation
Program Transformation Templates for Tupling Based on Term Rewriting
Yuki CHIBA  Takahito AOTO  Yoshihito TOYAMA  
Summary | Full Text:PDF (264KB) >>Buy this Article

pp.974-984  PAPER-Formal Specification
Towards Reliable E-Government Systems with the OTS/CafeOBJ Method
Weiqiang KONG  Kazuhiro OGATA  Kokichi FUTATSUGI  
Summary | Full Text:PDF (534.1KB) >>Buy this Article

pp.985-993  PAPER-Program Analysis
Over-Approximated Control Flow Graph Construction on Pure Esterel
Chul-Joo KIM  Jeong-Han YUN  Seonggun KIM  Kwang-Moo CHOE  Taisook HAN  
Summary | Full Text:PDF (979.9KB) >>Buy this Article

pp.994-1005  PAPER-Model Checking
An Abstraction Refinement Technique for Timed Automata Based on Counterexample-Guided Abstraction Refinement Loop
Takeshi NAGAOKA  Kozo OKANO  Shinji KUSUMOTO  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.1006-1017  PAPER-Software Testing
Computer Algebra System as Test Generation System
Satoshi HATTORI  
Summary | Full Text:PDF (429.1KB) >>Buy this Article

Special Section on Information and Communication System Security

pp.1018-1019  FOREWORD  Open Access Paper
FOREWORD
Hiroaki KIKUCHI  
Summary | FreeFull Text:PDF(62.5KB)

pp.1020-1030  INVITED PAPER
A Survey on Image Hashing for Image Authentication
Yang OU  Kyung Hyune RHEE  
Summary | Full Text:PDF (816.7KB) >>Buy this Article

pp.1031-1043  INVITED PAPER
Analysis of Existing Privacy-Preserving Protocols in Domain Name System
Fangming ZHAO  Yoshiaki HORI  Kouichi SAKURAI  
Summary | Full Text:PDF (376.1KB) >>Buy this Article

pp.1044-1052  INVITED PAPER
Time-Bound Hierarchical Key Assignment: An Overview
Wen Tao ZHU  Robert H. DENG  Jianying ZHOU  Feng BAO  
Summary | Full Text:PDF (248.7KB) >>Buy this Article

pp.1053-1061  PAPER
Abnormal Policy Detection and Correction Using Overlapping Transition
Sunghyun KIM  Heejo LEE  
Summary | Full Text:PDF (269.9KB) >>Buy this Article

pp.1062-1069  PAPER
Eliminating Cell Broadband EngineTM DMA Buffer Overflows
Masana MURASE  
Summary | Full Text:PDF (265.9KB) >>Buy this Article

pp.1070-1079  PAPER
Inconsistency Resolution Method for RBAC Based Interoperation
Chao HUANG  Jianling SUN  Xinyu WANG  Di WU  
Summary | Full Text:PDF (518.7KB) >>Buy this Article

pp.1080-1086  PAPER
Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
Kazumasa OMOTE  Kazuhiko KATO  
Summary | Full Text:PDF (434.6KB) >>Buy this Article

pp.1087-1095  PAPER
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
Lei WANG  Kazuo OHTA  Yu SASAKI  Kazuo SAKIYAMA  Noboru KUNIHIRO  
Summary | Full Text:PDF (317.2KB) >>Buy this Article

pp.1096-1105  PAPER
ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
Ilsun YOU  Jong-Hyouk LEE  Kouichi SAKURAI  Yoshiaki HORI  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.1106-1116  PAPER
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum Analysis
Masashi ETO  Kotaro SONODA  Daisuke INOUE  Katsunari YOSHIOKA  Koji NAKAO  
Summary | Full Text:PDF (561.2KB) >>Buy this Article

pp.1117-1126  PAPER
Packet Classification with Hierarchical Cross-Producting
Chun-Liang LEE  Chia-Tai CHAN  Pi-Chung WANG  
Summary | Full Text:PDF (758.8KB) >>Buy this Article

Regular Section

pp.1127-1136  PAPER-Fundamentals of Information Systems
A New Local Search Based Ant Colony Optimization Algorithm for Solving Combinatorial Optimization Problems
Md. Rakib HASSAN  Md. Monirul ISLAM  Kazuyuki MURASE  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.1137-1146  PAPER-Software Systems
NVFAT: A FAT-Compatible File System with NVRAM Write Cache for Its Metadata
In Hwan DOH  Hyo J. LEE  Young Je MOON  Eunsam KIM  Jongmoo CHOI  Donghee LEE  Sam H. NOH  
Summary | Full Text:PDF (885.3KB) >>Buy this Article

pp.1147-1153  PAPER-Software Systems
Energy-Aware Real-Time Task Scheduling Exploiting Temporal Locality
Yong-Hee KIM  Myoung-Jo JUNG  Cheol-Hoon LEE  
Summary | Full Text:PDF (897.4KB) >>Buy this Article

pp.1154-1161  PAPER-Data Engineering, Web Information Systems
Mining Co-location Relationships among Bug Reports to Localize Fault-Prone Modules
Ing-Xiang CHEN  Chien-Hung LI  Cheng-Zen YANG  
Summary | Full Text:PDF (935.2KB) >>Buy this Article

pp.1162-1174  PAPER-Information Network
Identifying High-Rate Flows Based on Sequential Sampling
Yu ZHANG  Binxing FANG  Hao LUO  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.1175-1185  PAPER-Information Network
A Novel Post-Silicon Debug Mechanism Based on Suspect Window
Jianliang GAO  Yinhe HAN  Xiaowei LI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1186-1196  PAPER-Artificial Intelligence, Data Mining
User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks
Hirotoshi IWASAKI  Nobuhiro MIZUNO  Kousuke HARA  Yoichi MOTOMURA  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.1197-1204  PAPER-Artificial Intelligence, Data Mining
Search for Minimal and Semi-Minimal Rule Sets in Incremental Learning of Context-Free and Definite Clause Grammars
Keita IMADA  Katsuhiko NAKAMURA  
Summary | Full Text:PDF (854KB) >>Buy this Article

pp.1205-1213  PAPER-Human-computer Interaction
An Investigation of Adaptive Pen Pressure Discretization Method Based on Personal Pen Pressure Use Profile
Yizhong XIN  Xiangshi REN  
Summary | Full Text:PDF (585.5KB) >>Buy this Article

pp.1214-1224  PAPER-Educational Technology
imCast: Studio-Quality Digital Media Platform Exploiting Broadband IP Networks
Jinyong JO  JongWon KIM  
Summary | Full Text:PDF (935.8KB) >>Buy this Article

pp.1225-1237  PAPER-Speech and Hearing
MPEG-2/4 Low-Complexity Advanced Audio Coding Optimization and Implementation on DSP
Bing-Fei WU  Hao-Yu HUANG  Yen-Lin CHEN  Hsin-Yuan PENG  Jia-Hsiung HUANG  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1238-1243  PAPER-Speech and Hearing
Complexity Scalability Design in the Internet Low Bit Rate Codec (iLBC) for Speech Coding
Fu-Kun CHEN  Kuo-Bao KUO  
Summary | Full Text:PDF (233.6KB) >>Buy this Article

pp.1244-1252  PAPER-Speech and Hearing
Acoustic Feature Transformation Based on Discriminant Analysis Preserving Local Structure for Speech Recognition
Makoto SAKAI  Norihide KITAOKA  Kazuya TAKEDA  
Summary | Full Text:PDF (214.2KB) >>Buy this Article

pp.1253-1262  PAPER-Image Processing and Video Processing
Video Quality Assessment Using Spatio-Velocity Contrast Sensitivity Function
Keita HIRAI  Jambal TUMURTOGOO  Ayano KIKUCHI  Norimichi TSUMURA  Toshiya NAKAGUCHI  Yoichi MIYAKE  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.1263-1271  PAPER-Image Recognition, Computer Vision
Exclusive Block Matching for Moving Object Extraction and Tracking
Zhu LI  Kenichi YABUTA  Hitoshi KITAZAWA  
Summary | Full Text:PDF (924KB) >>Buy this Article

pp.1272-1281  PAPER-Natural Language Processing
Improved Sequential Dependency Analysis Integrating Labeling-Based Sentence Boundary Detection
Takanobu OBA  Takaaki HORI  Atsushi NAKAMURA  
Summary | Full Text:PDF (512.1KB) >>Buy this Article

pp.1282-1290  PAPER-Kansei Information Processing, Affective Information Processing
Generating and Describing Affective Eye Behaviors
Xia MAO  Zheng LI  
Summary | Full Text:PDF (500.1KB) >>Buy this Article

pp.1291-1293  LETTER-Fundamentals of Information Systems
A Simple Procedure for Classical Signal-Processing in Cluster-State Quantum Computation
Kazuto OSHIMA  
Summary | Full Text:PDF (88.3KB) >>Buy this Article

pp.1294-1296  LETTER-Fundamentals of Information Systems
A New Model for Graph Matching and Its Algorithm
Kai-Jie ZHENG  Ji-Gen PENG  Ke-Xue LI  
Summary | Full Text:PDF (106.2KB) >>Buy this Article

pp.1297-1300  LETTER-Computer System
A QoS-Enabled Double Auction Protocol for the Service Grid
Zhan GAO  Siwei LUO  
Summary | Full Text:PDF (115.1KB) >>Buy this Article

pp.1301-1302  LETTER-Data Engineering, Web Information Systems
Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes
Mohamed RASSLAN  Amr YOUSSEF  
Summary | Full Text:PDF (54.8KB) >>Buy this Article

pp.1303-1306  LETTER-Data Engineering, Web Information Systems
Generalized Hash Chain Traversal with Selective Output
Dae Hyun YUM  Jae Woo SEO  Kookrae CHO  Pil Joong LEE  
Summary | Full Text:PDF (152.9KB) >>Buy this Article

pp.1307-1308  LETTER-Pattern Recognition
Discussion on "A Fuzzy Method for Medical Diagnosis of Headache"
Kuo-Chen HUNG  Yu-Wen WOU  Peterson JULIAN  
Summary | Full Text:PDF (51.6KB) >>Buy this Article

pp.1309-1312  LETTER-Speech and Hearing
A Robust Room Inverse Filtering Algorithm for Speech Dereverberation Based on a Kurtosis Maximization
Jae-woong JEONG  Young-cheol PARK  Dae-hee YOUN  Seok-Pil LEE  
Summary | Full Text:PDF (301.3KB) >>Buy this Article

pp.1313-1316  LETTER-Image Processing and Video Processing
Gaussian Kernel-Based Multi-Histogram Equalization
Suk Tae SEO  In Keun LEE  Hye Cheun JEONG  Soon Hak KWON  
Summary | Full Text:PDF (457.4KB) >>Buy this Article

pp.1317-1320  LETTER-Image Processing and Video Processing
Kernel Based Image Registration Incorporating with Both Feature and Intensity Matching
Quan MIAO  Guijin WANG  Xinggang LIN  
Summary | Full Text:PDF (640.5KB) >>Buy this Article

pp.1321-1324  LETTER-Image Recognition, Computer Vision
Online HOG Method in Pedestrian Tracking
Chang LIU  Guijin WANG  Fan JIANG  Xinggang LIN  
Summary | Full Text:PDF (474.5KB) >>Buy this Article

Previous | 
Next
go to Page Top