IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E98-D No.3  (Publication Date:2015/03/01)
[Whole issue]:PDF (48.6MB)
Previous | 
Next
Special Section on Foundations of Computer Science---New Spirits in Theory of Computation and Algorithm---

pp.485-485  FOREWORD  Open Access Paper
FOREWORD
Yushi UNO  
Summary | FreeFull Text:PDF(50.5KB)

pp.486-489  PAPER
Secure Sets and Defensive Alliances in Graphs: A Faster Algorithm and Improved Bounds
Kazuyuki AMANO  Kyaw May OO  Yota OTACHI  Ryuhei UEHARA  
Summary | Full Text:PDF (267.1KB) >>Buy this Article

pp.490-496  PAPER
Faster Enumeration of All Maximal Cliques in Unit Disk Graphs Using Geometric Structure
Taisuke IZUMI  Daisuke SUZUKI  
Summary | Full Text:PDF (378.1KB) >>Buy this Article

pp.497-502  PAPER
The Biclique Cover Problem and the Modified Galois Lattice
Hideaki OTSUKI  Tomio HIRATA  
Summary | Full Text:PDF (417.1KB) >>Buy this Article

pp.503-511  PAPER
Some Reduction Procedure for Computing Pathwidth of Undirected Graphs
Masataka IKEDA  Hiroshi NAGAMOCHI  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.512-523  PAPER
Node Query Preservation for Deterministic Linear Top-Down Tree Transducers
Kazuki MIYAHARA  Kenji HASHIMOTO  Hiroyuki SEKI  
Summary | Full Text:PDF (565.6KB) >>Buy this Article

pp.524-531  PAPER
Candidate Boolean Functions towards Super-Quadratic Formula Size
Kenya UENO  
Summary | Full Text:PDF (206.1KB) >>Buy this Article

pp.532-540  PAPER
A Fourier-Analytic Approach to List-Decoding for Sparse Random Linear Codes
Akinori KAWACHI  Ikko YAMANE  
Summary | Full Text:PDF (227.7KB) >>Buy this Article

pp.541-544  LETTER
Computational Complexity of Generalized Golf Solitaire
Chuzo IWAMOTO  
Summary | Full Text:PDF (372.2KB) >>Buy this Article

Special Section on the Architectures, Protocols, and Applications for the Future Internet

pp.545-545  FOREWORD  Open Access Paper
FOREWORD
Yusheng JI  
Summary | FreeFull Text:PDF(64.2KB)

pp.546-556  INVITED PAPER  Open Access Paper
New Directions for a Japanese Academic Backbone Network
Shigeo URUSHIDANI  Shunji ABE  Kenjiro YAMANAKA  Kento AIDA  Shigetoshi YOKOYAMA  Hiroshi YAMADA  Motonori NAKAMURA  Kensuke FUKUDA  Michihiro KOIBUCHI  Shigeki YAMADA  
Summary | FreeFull Text:PDF(2.8MB)

pp.557-564  PAPER-Internet Architecture and Protocols
Local Tree Hunting: Finding Closest Contents from In-Network Cache
Hiroshi SHIMIZU  Hitoshi ASAEDA  Masahiro JIBIKI  Nozomu NISHINAGA  
Summary | Full Text:PDF (2.2MB) >>Buy this Article

pp.565-577  PAPER-Internet Architecture and Protocols
Adaptive TTL Control to Minimize Resource Cost in Hierarchical Caching Networks
Satoshi IMAI  Kenji LEIBNITZ  Masayuki MURATA  
Summary | Full Text:PDF (2.2MB) >>Buy this Article

pp.578-587  PAPER-Internet Operation and Management
Improved Resilience through Extended KVS-Based Messaging System
Masafumi KINOSHITA  Osamu TAKADA  Izumi MIZUTANI  Takafumi KOIKE  Kenji LEIBNITZ  Masayuki MURATA  
Summary | Full Text:PDF (3.4MB) >>Buy this Article

pp.588-595  PAPER-Internet Operation and Management
Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies
Sirikarn PUKKAWANNA  Hiroaki HAZEYAMA  Youki KADOBAYASHI  Suguru YAMAGUCHI  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.596-606  PAPER-Network Computing and Applications
Dual-Band Sensor Network for Accurate Device-Free Localization in Indoor Environment with WiFi Interference
Manyi WANG  Zhonglei WANG  Enjie DING  Yun YANG  
Summary | Full Text:PDF (2.7MB) >>Buy this Article

Regular Section

pp.607-616  PAPER-Fundamentals of Information Systems
Pseudo Polynomial Time Algorithms for Optimal Longcut Route Selection
Yuichi SUDO  Toshimitsu MASUZAWA  Gen MOTOYOSHI  Tutomu MURASE  
Summary | Full Text:PDF (805.5KB) >>Buy this Article

pp.617-626  PAPER-Software Engineering
A Scenario-Based Reliability Analysis Approach for Component-Based Software
Chunyan HOU  Chen CHEN  Jinsong WANG  Kai SHI  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.627-636  PAPER-Software Engineering
Method Verb Recommendation Using Association Rule Mining in a Set of Existing Projects
Yuki KASHIWABARA  Takashi ISHIO  Hideaki HATA  Katsuro INOUE  
Summary | Full Text:PDF (844.8KB) >>Buy this Article

pp.637-648  PAPER-Information Network
A Quantitative Model for Evaluating the Efficiency of Proactive and Reactive Security Countermeasures
Yoon-Ho CHOI  Han-You JEONG  Seung-Woo SEO  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.649-660  PAPER-Information Network
A Novel Statistical Approach to Detect Card Frauds Using Transaction Patterns
Chae Chang LEE  Ji Won YOON  
Summary | Full Text:PDF (1.1MB) >>Buy this Article | Errata[Uploaded on April 1,2015]

pp.661-670  PAPER-Information Network  Open Access Paper
The Case for Network Coding for Collective Communication on HPC Interconnection Networks
Ahmed SHALABY  Ikki FUJIWARA  Michihiro KOIBUCHI  
Summary | FreeFull Text:PDF(1.7MB)

pp.671-680  PAPER-Pattern Recognition
Multiple Binary Codes for Fast Approximate Similarity Search
Shinichi SHIRAKAWA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.681-691  PAPER-Image Recognition, Computer Vision
Analysis of Noteworthy Issues in Illumination Processing for Face Recognition
Min YAO  Hiroshi NAGAHASHI  
Summary | Full Text:PDF (2.8MB) >>Buy this Article

pp.692-703  PAPER-Image Recognition, Computer Vision
Extraction of Blood Vessels in Retinal Images Using Resampling High-Order Background Estimation
Sukritta PARIPURANA  Werapon CHIRACHARIT  Kosin CHAMNONGTHAI  Hideo SAITO  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.704-711  PAPER-Multimedia Pattern Processing
Discriminating Unknown Objects from Known Objects Using Image and Speech Information
Yuko OZASA  Mikio NAKANO  Yasuo ARIKI  Naoto IWAHASHI  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.712-716  LETTER-Software Engineering
Split-Jaccard Distance of Hierarchical Decompositions for Software Architecture
Ki-Seong LEE  Byung-Woo HONG  Youngmin KIM  Jaeyeop AHN  Chan-Gun LEE  
Summary | Full Text:PDF (168.1KB) >>Buy this Article

pp.717-720  LETTER-Speech and Hearing
Discriminative Pronunciation Modeling Using the MPE Criterion
Meixu SONG  Jielin PAN  Qingwei ZHAO  Yonghong YAN  
Summary | Full Text:PDF (98.5KB) >>Buy this Article

pp.721-725  LETTER-Image Processing and Video Processing
Making Joint-Histogram-Based Weighted Median Filter Much Faster
Hanhoon PARK  
Summary | Full Text:PDF (3.7MB) >>Buy this Article

pp.726-727  LETTER-Image Processing and Video Processing
A Uniformity-Approximated Histogram Equalization Algorithm for Image Enhancement
Pei-Chen WU  Chang Hong LIN  
Summary | Full Text:PDF (506.5KB) >>Buy this Article

pp.728-732  LETTER-Image Processing and Video Processing
No-Reference Blur Strength Estimation Based on Spectral Analysis of Blurred Images
Hanhoon PARK  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.733-736  LETTER-Image Recognition, Computer Vision
An Efficient Filtering Method for Scalable Face Image Retrieval
Deokmin HAAM  Hyeon-Gyu KIM  Myoung-Ho KIM  
Summary | Full Text:PDF (365.8KB) >>Buy this Article

pp.737-740  LETTER-Image Recognition, Computer Vision
Automatic Mura Detection for Display Film Using Mask Filtering in Wavelet Transform
Jong-Seung PARK  Seung-Ho LEE  
Summary | Full Text:PDF (954.8KB) >>Buy this Article

pp.741-744  LETTER-Computer Graphics
Displacement Mapping with an Augmented Patch Mesh
Sungchul JUNG  Chang Ha LEE  
Summary | Full Text:PDF (6.8MB) >>Buy this Article

pp.745-748  LETTER-Biological Engineering
Detection of S1/S2 Components with Extraction of Murmurs from Phonocardiogram
Xingri QUAN  Jongwon SEOK  Keunsung BAE  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

Previous | 
Next
go to Page Top