IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E96-D No.2  (Publication Date:2013/02/01)
Previous | 
Next
Special Section on The Internet Architectures, Protocols, and Applications for Diversified Futures

pp.175-175  FOREWORD  Open Access Paper
FOREWORD
Kenzi WATANABE  
Summary | FreeFull Text:PDF(66.9KB)

pp.176-183  INVITED PAPER  Open Access Paper
Current and Future ITS
Seii SAI  Onur ALTINTAS  John KENNEY  Hideaki TANAKA  Yuji INOUE  
Summary | FreeFull Text:PDF(1.3MB)

pp.184-192  PAPER
Autonomous IP Fast Rerouting with Compressed Backup Flow Entries Using OpenFlow
Shohei KAMAMURA  Daisaku SHIMAZAKI  Atsushi HIRAMATSU  Hidenori NAKAZATO  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.193-201  PAPER
A Routing Strategy for Multihomed ISP to Mitigate the Impact of Overlay Traffic
Xun SHAO  Go HASEGAWA  Yoshiaki TANIGUCHI  Hirotaka NAKANO  
Summary | Full Text:PDF (813.6KB) >>Buy this Article

pp.202-212  PAPER
Node Degree Based Routing Metric for Traffic Load Distribution in the Internet
Jun'ichi SHIMADA  Hitomi TAMURA  Masato UCHIDA  Yuji OIE  
Summary | Full Text:PDF (2.2MB) >>Buy this Article

pp.213-225  PAPER
Location-Aware Optimal Resource Selection Method for P2P-Based Contents Management and Real-Time Distribution
Hiroshi YAMAMOTO  Katsuyuki YAMAZAKI  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.226-237  PAPER
Design and Implementation of Security for HIMALIS Architecture of Future Networks
Ved P. KAFLE  Ruidong LI  Daisuke INOUE  Hiroaki HARAI  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.238-248  PAPER
A Design and Prototyping of In-Network Processing Platform to Enable Adaptive Network Services
Masayoshi SHIMAMURA  Takeshi IKENAGA  Masato TSURU  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.249-258  PAPER
Deep Inspection of Unreachable BitTorrent Swarms
Masahiro YOSHIDA  Akihiro NAKAO  
Summary | Full Text:PDF (678.8KB) >>Buy this Article

Regular Section

pp.259-269  PAPER-Fundamentals of Information Systems
An Efficient I/O Aggregator Assignment Scheme for Multi-Core Cluster Systems
Kwangho CHA  
Summary | Full Text:PDF (3.9MB) >>Buy this Article

pp.270-277  PAPER-Fundamentals of Information Systems
An Efficient Algorithm for Node-Weighted Tree Partitioning with Subtrees' Weights in a Given Range
Guangchun LUO  Hao CHEN  Caihui QU  Yuhai LIU  Ke QIN  
Summary | Full Text:PDF (591.8KB) >>Buy this Article

pp.278-288  PAPER-Computer System
Register Indirect Jump Target Forwarding
Ryota SHIOYA  Naruki KURATA  Takashi TOYOSHIMA  Masahiro GOSHIMA  Shuichi SAKAI  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.289-302  PAPER-Information Network
A Method to Reduce Inter-ISP Transit Cost Caused by Overlay Routing Based on End-to-End Network Measurement
Kazuhito MATSUDA  Go HASEGAWA  Satoshi KAMEI  Masayuki MURATA  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.303-313  PAPER-Dependable Computing
Device-Parameter Estimation through IDDQ Signatures
Michihiro SHINTANI  Takashi SATO  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.314-328  PAPER-Artificial Intelligence, Data Mining
Dynamic and Safe Path Planning Based on Support Vector Machine among Multi Moving Obstacles for Autonomous Vehicles
Quoc Huy DO  Seiichi MITA  Hossein Tehrani Nik NEJAD  Long HAN  
Summary | Full Text:PDF (3.1MB) >>Buy this Article

pp.329-339  PAPER-Pattern Recognition
PCA-Based Retinal Vessel Tortuosity Quantification
Rashmi TURIOR  Danu ONKAEW  Bunyarit UYYANONVARA  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.340-348  PAPER-Image Processing and Video Processing
Query-by-Sketch Image Retrieval Using Edge Relation Histogram
Yoshiki KUMAGAI  Gosuke OHASHI  
Summary | Full Text:PDF (2.2MB) >>Buy this Article

pp.349-356  PAPER-Image Processing and Video Processing
Improved Seam Merging for Content-Aware Image Resizing
Kazu MISHIBA  Masaaki IKEHARA  Takeshi YOSHITOME  
Summary | Full Text:PDF (3.2MB) >>Buy this Article

pp.357-364  PAPER-Image Recognition, Computer Vision
A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack
Manabu INUMA  Akira OTSUKA  Hideki IMAI  
Summary | Full Text:PDF (292.5KB) >>Buy this Article

pp.365-369  LETTER-Computer System
Dual-Core Framework: Eliminating the Bottleneck Effect of Scalar Kernels on SIMD Architectures
Yaohua WANG  Shuming CHEN  Hu CHEN  Jianghua WAN  Kai ZHANG  Sheng LIU  
Summary | Full Text:PDF (590.8KB) >>Buy this Article

pp.370-374  LETTER-Computer System
Bypass Extended Stack Processing for Anti-Thrashing Replacement in Shared Last Level Cache of Chip Multiprocessors
Young-Sik EOM  Jong Wook KWAK  Seong-Tae JHANG  Chu-Shik JHON  
Summary | Full Text:PDF (705.3KB) >>Buy this Article

pp.375-378  LETTER-Pattern Recognition
Semi-Supervised Nonparametric Discriminant Analysis
Xianglei XING  Sidan DU  Hua JIANG  
Summary | Full Text:PDF (367.8KB) >>Buy this Article

pp.379-382  LETTER-Speech and Hearing
Statistical Approaches to Excitation Modeling in HMM-Based Speech Synthesis
June Sig SUNG  Doo Hwa HONG  Hyun Woo KOO  Nam Soo KIM  
Summary | Full Text:PDF (386.9KB) >>Buy this Article

pp.383-386  LETTER-Image Processing and Video Processing
Adaptive Block-Wise Compressive Image Sensing Based on Visual Perception
Xue ZHANG  Anhong WANG  Bing ZENG  Lei LIU  Zhuo LIU  
Summary | Full Text:PDF (697.5KB) >>Buy this Article

pp.387-391  LETTER-Image Recognition, Computer Vision
A Fully Automatic Player Detection Method Based on One-Class SVM
Xuefeng BAI  Tiejun ZHANG  Chuanjun WANG  Ahmed A. ABD EL-LATIF  Xiamu NIU  
Summary | Full Text:PDF (854.1KB) >>Buy this Article

pp.392-395  LETTER-Image Recognition, Computer Vision
CBRISK: Colored Binary Robust Invariant Scalable Keypoints
Huiyun JING  Xin HE  Qi HAN  Xiamu NIU  
Summary | Full Text:PDF (551.2KB) >>Buy this Article

Previous | 
Next
go to Page Top