IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E102-A No.9  (Publication Date:2019/09/01)
[Whole issue]:PDF (70MB)
Previous | 
Next
Special Section on Discrete Mathematics and Its Applications

pp.986-986  FOREWORD  Open Access Paper
FOREWORD
Kunihiko SADAKANE  
Summary | FreeFull Text:PDF(212.7KB)

pp.987-993  PAPER-Graph algorithms
Forbidden Subgraphs Generating Almost All Claw-Free Graphs with High Connectivity
Michitaka FURUYA  Maho YOKOTA  
Summary | Full Text:PDF (780.4KB) >>
Buy this Article


pp.994-1001  PAPER-Graph algorithms
Acute Constraints in Straight-Line Drawings of Planar Graphs
Akane SETO  Aleksandar SHURBEVSKI  Hiroshi NAGAMOCHI  Peter EADES  
Summary | Full Text:PDF (1.2MB) >>
Buy this Article


pp.1002-1006  PAPER-Graph algorithms
Enumerating Highly-Edge-Connected Spanning Subgraphs
Katsuhisa YAMANAKA  Yasuko MATSUI  Shin-ichi NAKANO  
Summary | Full Text:PDF (741.6KB) >>
Buy this Article


pp.1007-1016  PAPER-Graph algorithms
A Space-Efficient Separator Algorithm for Planar Graphs
Ryo ASHIDA  Sebastian KUHNERT  Osamu WATANABE  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.1017-1021  PAPER-Graph algorithms
Excluded Minors for ℚ-Representability in Algebraic Extension
Hidefumi HIRAISHI  Sonoko MORIYAMA  
Summary | Full Text:PDF (801.7KB) >>
Buy this Article


pp.1022-1027  PAPER-Graph algorithms  Open Access Paper
Revisiting the Top-Down Computation of BDD of Spanning Trees of a Graph and Its Tutte Polynomial
Farley Soares OLIVEIRA  Hidefumi HIRAISHI  Hiroshi IMAI  
Summary | FreeFull Text:PDF(775.5KB)

pp.1028-1036  PAPER-Cryptography and Information Security  Open Access Paper
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC
Yacheng WANG  Yasuhiko IKEMATSU  Dung Hoang DUONG  Tsuyoshi TAKAGI  
Summary | FreeFull Text:PDF(1.3MB)

pp.1037-1047  PAPER-Cryptography and Information Security
General Secret Sharing Schemes Using Hierarchical Threshold Scheme
Kouya TOCHIKUBO  
Summary | Full Text:PDF (581.4KB) >>
Buy this Article


pp.1048-1060  PAPER-Cryptography and Information Security
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions
Nuttapong ATTRAPADUNG  Goichiro HANAOKA  Shinsaku KIYOMOTO  Tomoaki MIMOTO  Jacob C. N. SCHULDT  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.1061-1071  PAPER-Cryptography and Information Security
Differences among Summation Polynomials over Various Forms of Elliptic Curves
Chen-Mou CHENG  Kenta KODERA  Atsuko MIYAJI  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.1072-1078  PAPER-Cryptography and Information Security
Card-Based Physical Zero-Knowledge Proof for Kakuro
Daiki MIYAHARA  Tatsuya SASAKI  Takaaki MIZUKI  Hideaki SONE  
Summary | Full Text:PDF (1.2MB) >>
Buy this Article


pp.1079-1090  PAPER-Cryptography and Information Security
Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing
Kazuma OHARA  Yohei WATANABE  Mitsugu IWAMOTO  Kazuo OHTA  
Summary | Full Text:PDF (1.3MB) >>
Buy this Article


pp.1091-1100  PAPER-Cryptography and Information Security  Open Access Paper
Explicit Relation between Low-Dimensional LLL-Reduced Bases and Shortest Vectors
Kotaro MATSUDA  Atsushi TAKAYASU  Tsuyoshi TAKAGI  
Summary | FreeFull Text:PDF(1.2MB)

pp.1101-1117  PAPER-Cryptography and Information Security
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology
Kazuma OHARA  Keita EMURA  Goichiro HANAOKA  Ai ISHIDA  Kazuo OHTA  Yusuke SAKAI  
Summary | Full Text:PDF (1.8MB) >>
Buy this Article


pp.1118-1125  PAPER-Puzzles
Computational Complexity of Herugolf and Makaro
Chuzo IWAMOTO  Masato HARUISHI  Tatsuaki IBUSUKI  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.1126-1133  PAPER-Puzzles
Generalized Shogi, Chess, and Xiangqi are Constant-Time Testable
Hiro ITO  Atsuki NAGAO  Teagun PARK  
Summary | Full Text:PDF (1.1MB) >>
Buy this Article


pp.1134-1141  PAPER-Puzzles
On Computational Complexity of Pipe Puzzles
Takumu SHIRAYAMA  Takuto SHIGEMURA  Yota OTACHI  Shuichi MIYAZAKI  Ryuhei UEHARA  
Summary | Full Text:PDF (7MB) >>
Buy this Article


pp.1142-1149  PAPER-Optimization
An Approximation Algorithm for the Maximum Induced Matching Problem on C5-Free Regular Graphs
Yuichi ASAHIRO  Guohui LIN  Zhilong LIU  Eiji MIYANO  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.1150-1158  PAPER-Optimization
On the Competitive Analysis for the Multi-Objective Time Series Search Problem
Toshiya ITOH  Yoshinori TAKEI  
Summary | Full Text:PDF (869.2KB) >>
Buy this Article


pp.1159-1170  PAPER-Optimization
Efficient Approximate 3-Dimensional Point Set Matching Using Root-Mean-Square Deviation Score
Yoichi SASAKI  Tetsuo SHIBUYA  Kimihito ITO  Hiroki ARIMURA  
Summary | Full Text:PDF (2.2MB) >>
Buy this Article


pp.1171-1178  PAPER-Classification
A Packet Classification Method via Cascaded Circular-Run-Based Trie
Takashi HARADA  Yuki ISHIKAWA  Ken TANAKA  Kenji MIKAWA  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.1179-1186  PAPER-Mechanical design
λ-Group Strategy-Proof Mechanisms for the Obnoxious Facility Game in Star Networks
Yuhei FUKUI  Aleksandar SHURBEVSKI  Hiroshi NAGAMOCHI  
Summary | Full Text:PDF (1015.7KB) >>
Buy this Article


pp.1187-1194  PAPER-Distributed algorithms
Sub-Linear Time Aggregation in Probabilistic Population Protocol Model
Ryota EGUCHI  Taisuke IZUMI  
Summary | Full Text:PDF (759KB) >>
Buy this Article


Special Section on Image Media Quality

pp.1195-1195  FOREWORD  Open Access Paper
FOREWORD
Toshiya NAKAGUCHI  
Summary | FreeFull Text:PDF(664.4KB)

pp.1196-1204  PAPER  Open Access Paper
Eye Movement Measurement of Gazing at the Rim of a Column in Stereo Images with Yellow-Blue Equiluminance Random Dots
Shinya MOCHIDUKI  Ayaka NUNOMURA  Hiroaki KUDO  Mitsuho YAMADA  
Summary | FreeFull Text:PDF(2.3MB)

pp.1205-1216  PAPER  Open Access Paper
Development of a Novel Accurate Analysis System Regarding Information Processing within the Gazing Point
Tsuyoshi KUSHIMA  Miyuki SUGANUMA  Shinya MOCHIDUKI  Mitsuho YAMADA  
Summary | FreeFull Text:PDF(4.5MB)  | Errata[Uploaded on October 1,2019]

pp.1217-1224  PAPER
Prediction of the Helmholtz-Kohlrausch Effect for Natural Images Using a Correction Function
Yuki HAYAMI  Daiki TAKASU  Hisakazu AOYANAGI  Hiroaki TAKAMATSU  Yoshifumi SHIMODAIRA  Gosuke OHASHI  
Summary | Full Text:PDF (3.7MB) >>
Buy this Article


pp.1225-1234  PAPER  Open Access Paper
Pyramid Predictive Attention Network for Medical Image Segmentation
Tingxiao YANG  Yuichiro YOSHIMURA  Akira MORITA  Takao NAMIKI  Toshiya NAKAGUCHI  
Summary | FreeFull Text:PDF(6MB)

pp.1235-1245  PAPER
Vision Based Nighttime Vehicle Detection Using Adaptive Threshold and Multi-Class Classification
Yuta SAKAGAWA  Kosuke NAKAJIMA  Gosuke OHASHI  
Summary | Full Text:PDF (3.1MB) >>
Buy this Article


pp.1246-1249  LETTER
Construction of Subjective Vehicle Detection Evaluation Model Considering Shift from Ground Truth Position
Naho ITO  Most Shelina AKTAR  Yuukou HORITA  
Summary | Full Text:PDF (1.8MB) >>
Buy this Article


pp.1250-1253  LETTER
Consideration of Relationship between Human Preference and Pulse Wave Derived from Brain Activity
Mami KITABATA  Yota NIIGAKI  Yuukou HORITA  
Summary | Full Text:PDF (1.2MB) >>
Buy this Article


pp.1254-1258  LETTER  Open Access Paper
Analysis of Eye Movement and Critical Fusion Frequency Responses to Different Movie Types
Takahide OTOMO  Shinya MOCHIDUKI  Eriko ISHII  Yuko HOSHINO  Mitsuho YAMADA  
Summary | FreeFull Text:PDF(239.3KB)

Regular Section

pp.1259-1271  PAPER-Cryptography and Information Security
Improved Integral Attack on HIGHT
Yuki FUNABIKI  Yosuke TODO  Takanori ISOBE  Masakatu MORII  
Summary | Full Text:PDF (1.6MB) >>
Buy this Article


pp.1272-1284  PAPER-Cryptography and Information Security
New Approach to Constructing Noise Source Based on Race Conditions
Seong Gyeom KIM  Seung Joon LEE  Deukjo HONG  Jaechul SUNG  Seokhie HONG  
Summary | Full Text:PDF (5.3MB) >>
Buy this Article


pp.1285-1292  PAPER-Cryptography and Information Security  Open Access Paper
Opcount: A Pseudo-Code Performance Estimation System for Pairing-Based Cryptography
Masayuki ABE  Fumitaka HOSHINO  Miyako OHKUBO  
Summary | FreeFull Text:PDF(1.3MB)

pp.1293-1302  PAPER-Vision
Efficient Class-Incremental Learning Based on Bag-of-Sequencelets Model for Activity Recognition
Jong-Woo LEE  Ki-Sang HONG  
Summary | Full Text:PDF (2.2MB) >>
Buy this Article


pp.1303-1311  PAPER-Mathematical Systems Science
Subnets Generation of Program Nets and Its Application to Software Testing
Biao WU  Xiaoan BAO  Na ZHANG  Hiromu MORITA  Mitsuru NAKATA  Qi-Wei GE  
Summary | Full Text:PDF (1.7MB) >>
Buy this Article


pp.1312-1316  LETTER-Digital Signal Processing
A Novel Nonhomogeneous Detector Based on Over-Determined Linear Equations with Single Snapshot
Di YAO  Xin ZHANG  Qiang YANG  Weibo DENG  
Summary | Full Text:PDF (556.3KB) >>
Buy this Article


pp.1317-1320  LETTER-Numerical Analysis and Optimization
A Fast Cross-Validation Algorithm for Kernel Ridge Regression by Eigenvalue Decomposition
Akira TANAKA  Hideyuki IMAI  
Summary | Full Text:PDF (260.7KB) >>
Buy this Article


pp.1321-1325  LETTER-Cryptography and Information Security  Open Access Paper
On the Construction of Balanced Boolean Functions with Strict Avalanche Criterion and Optimal Algebraic Immunity
Deng TANG  
Summary | FreeFull Text:PDF(248.7KB)

pp.1326-1329  LETTER-Coding Theory  Open Access Paper
On the Optimality of Gabidulin-Based LRCs as Codes with Multiple Local Erasure Correction
Geonu KIM  Jungwoo LEE  
Summary | FreeFull Text:PDF(224.2KB)

pp.1330-1332  LETTER-Mobile Information Network and Personal Communications  Open Access Paper
Geometric Dilution of Precision for Received Signal Strength in the Wireless Sensor Networks
Wanchun LI  Yifan WEI  Ping WEI  Hengming TAI  Xiaoyan PENG  Hongshu LIAO  
Summary | FreeFull Text:PDF(1.9MB)

Previous | 
Next
go to Page Top