IEICE TRANSACTIONS on Information and Systems    (open access publishing)
Online ISSN : 1745-1361
[Whole issue]:PDF (26.9MB)
Previous | 
Top 10 downloads
To the Latest Issue

Advance publication (published online immediately after acceptance)


Automated Detection of Children at Risk of Chinese Handwriting Difficulties Using Handwriting Process Information: An Exploratory Study
Zhiming WU  Tao LIN  Ming LI  
Summary | Full Text:PDF(376.8KB)


Visual emphasis of lip protrusion for pronunciation learning
Siyang YU  Kazuaki KONDO  Yuichi NAKAMURA  Takayuki NAKAJIMA  Hiroaki NANJO  Masatake DANTSUJI  
Summary | Full Text:PDF(1023.8KB)


Side Scan Sonar Image Super Resolution via Region-Selective Sparse Coding
Jaihyun PARK  Bonhwa KU  Youngsaeng JIN  Hanseok KO  
Summary | Full Text:PDF(560.9KB)


Adaptive Tiling Selection for Viewport Adaptive Streaming of 360-degree Video
Duc V. NGUYEN  Huyen T. T. TRAN  Truong Cong THANG  
Summary | Full Text:PDF(525KB)


Image Manipulation Specifications on Social Networking Services for Encryption-then-Compression Systems
Tatsuya CHUMAN  Kenta IIDA  Warit SIRICHOTEDUMRONG  Hitoshi KIYA  
Summary | Full Text:PDF(1.7MB)


Robust and Secure Data Hiding for PDF Text Document
Minoru KURIBAYASHI  Takuya FUKUSHIMA  Nobuo FUNABIKI  
Summary | Full Text:PDF(306.8KB)


Permutation-based Signature Generation for Spread-Spectrum Video Watermarking
Hiroshi ITO  Tadashi KASEZAWA  
Summary | Full Text:PDF(740.4KB)


Image watermarking technique using embedder and extractor neural networks
Ippei HAMAMOTO  Masaki KAWAMURA  
Summary | Full Text:PDF(1.2MB)


Robust Image Identification with DC Coefficients for Double-compressed JPEG Images
Kenta IIDA  Hitoshi KIYA  
Summary | Full Text:PDF(3.3MB)


Symmetric Decomposition of Convolution Kernels
Jun OU  Yujian LI  
Summary | Full Text:PDF(549.3KB)


Towards Privacy-preserving Location Sharing over Mobile Online Social Networks
Juan CHEN  Shen SU  Xianzhi WANG  
Summary | Full Text:PDF(2MB)


On-Demand Generalization of Road Networks based on Facility Search Results
Daisuke YAMAMOTO  Masaki MURASE  Naohisa TAKAHASHI  
Summary | Full Text:PDF(8.6MB)


JPEG steganalysis based on multi-projection ensemble discriminant clustering
Yan SUN  Guorui FENG  Yanli REN  
Summary | Full Text:PDF(330.4KB)


A High Throughput Device-to-Device Wireless Communication System
Amin JAMALI  Seyed Mostafa SAFAVI HEMAMI  Mehdi BERENJKOUB  Hossein SAIDI  Masih ABEDINI  
Summary | Full Text:PDF(2.4MB)


Cycle Time Improvement of EtherCAT Networks with Embedded Linux-Based Master
Hyun-Chul YI  Joon-Young CHOI  
Summary | Full Text:PDF(236.3KB)


A Semantic Management Method of Simulation Models in GNSS Distributed Simulation Environment
Guo-chao FAN  Chun-sheng HU  Xue-en ZHENG  Cheng-dong XU  
Summary | Full Text:PDF(3.1MB)


Fast Visual Odometry based Sparse Geometric Constraint for RGB-D Camera
Ruibin GUO  Dongxiang ZHOU  Keju PENG  Yunhui LIU  
Summary | Full Text:PDF(2.3MB)


Design of High-Speed Easy-to-Expand CC-Link Parallel Communication Module Based on R-IN32M3
Yeong-Mo Yeon  Seung-Hee Kim  
Summary | Full Text:PDF(1.4MB)


Temporal and spatial analysis of local body sway movements for the identification of people
Takuya KAMITANI  Hiroki YOSHIMURA  Masashi NISHIYAMA  Yoshio IWAI  
Summary | Full Text:PDF(3.6MB)


Real-time Sparse Visual Tracking using Circulant Reverse Lasso Model
Cheng gang GUO  Dong yi CHEN  Zhi qi HUANG  
Summary | Full Text:PDF(2.9MB)


Real-time Head Action Recognition Based on HOF and ELM
Tie HONG  Yuan Wei LI  Zhi Ying WANG  
Summary | Full Text:PDF(738.4KB)


Selecting orientation-insensitive features for activity recognition from accelerometers
Yasser MOHAMMAD  Kazunori MATSUMOTO  Keiichiro HOASHI  
Summary | Full Text:PDF(735.9KB)


Accelerating Large-Scale Interconnection Network Simulation by Cellular Automata Concept
Takashi YOKOTA  Kanemitsu OOTSU  Takeshi OHKAWA  
Summary | Full Text:PDF(2.4MB)


Millimeter-wave Radar Target Recognition Algorithm based on Collaborative Auto-encoder
Yilu MA  Zhihui YE  Yuehua LI  
Summary | Full Text:PDF(441.8KB)


A Robot Model that Obeys a Norm of a Human Group by Participating in the Group and Interacting with its Members
Yotaro FUSE  Hiroshi TAKENOUCHI  Masataka TOKUMARU  
Summary | Full Text:PDF(2.1MB)


Empirical Studies of a Kernel Density Estimation Based Naive Bayes Method for Software Defect Prediction
Haijin JI  Song HUANG  Xuewei LV  Yaning WU  Yuntian FENG  
Summary | Full Text:PDF(731.3KB)


Patch Optimization for Surface Light Field Reconstruction
Wei LI  Huajun GONG  Chunlin SHEN  Yi WU  
Summary | Full Text:PDF(2.2MB)


Visualization of Inter-module Dataflow through Global Variables for Source Code Review
Naoto ISHIDA  Takashi ISHIO  Yuta NAKAMURA  Shinji KAWAGUCHI  Tetsuya KANDA  Katsuro INOUE  
Summary | Full Text:PDF(100.5KB)


A Multilevel Indexing Method for Approximate Geospatial Aggregation Analysis
Luo CHEN  Ye WU  Wei XIONG  Ning JING  
Summary | Full Text:PDF(813KB)


Parametric Models for Mutual Kernel Matrix Completion
Rachelle RIVERO  Tsuyoshi KATO  
Summary | Full Text:PDF(176.8KB)


Salient Feature Selection for CNN-based Visual Place Recognition
Yutian Chen  Wenyan Gan  Shanshan Jiao  Youwei Xu  Yuntian Feng  
Summary | Full Text:PDF(529KB)


Extrinsic Camera Calibration of Display-Camera System with Cornea Reflections
Kosuke TAKAHASHI  Dan MIKAMI  Mariko ISOGAWA  Akira KOJIMA  Hideaki KIMATA  
Summary | Full Text:PDF(2.6MB)


Multi Long-Short Term Memory Models for Short Term Traffic Flow Prediction
Zelong XUE  Yang XUE  
Summary | Full Text:PDF(2.8MB)


New Context-Adaptive Arithmetic Coding Scheme for Lossless Bit Rate Reduction of Parametric Stereo in Enhanced aacPlus
Hee-Suk PANG  Jun-seok LIM  Hyun-Young JIN  
Summary | Full Text:PDF(216.7KB)


Hardware based parallel phrase matching engine in dictionary compressor
Qian Dong  
Summary | Full Text:PDF(349.8KB)


A Genetic Approach for Accelerating Communication Performance by Node Mapping
Takashi YOKOTA  Kanemitsu OOTSU  Takeshi OHKAWA  
Summary | Full Text:PDF(174.7KB)


Parallel Precomputation with Input Value Prediction for Model Predictive Control Systems
Satoshi KAWAKAMI  Takatsugu ONO  Toshiyuki OHTSUKA  Koji INOUE  
Summary | Full Text:PDF(3.9MB)


Real-time and Energy-efficient Face Detection on CPU-GPU Heterogeneous Embedded Platforms
Chanyoung OH  Saehanseul YI  Youngmin YI  
Summary | Full Text:PDF(644.1KB)


ATSMF: Automated tiered storage with fast memory and slow flash storage to improve response time with concentrated input-output (IO) workloads
Kazuichi OE  Mitsuru SATO  Takeshi NANRI  
Summary | Full Text:PDF(1.2MB)


The Panpositionable Pancyclicity of Locally Twisted Cubes
Hon-Chan CHEN  
Summary | Full Text:PDF(274.6KB)


Order Adjustment Approach using Cayley Graphs for the Order/Degree Problem
Teruaki KITASUKA  Takayuki MATSUZAKI  Masahiro IIDA  
Summary | Full Text:PDF(245.6KB)


Cycle Embedding in Generalized Recursive Circulant Graphs
Shyue-Ming TANG  Yue-Li WANG  Chien-Yi LI  Jou-Ming CHANG  
Summary | Full Text:PDF(514.9KB)


Enhancing Job Scheduling on Inter-rackscale Datacenters with Free-space Optical Links
Yao HU  Michihiro KOIBUCHI  
Summary | Full Text:PDF(4.1MB)


Distributed Video Decoding on Hadoop
Illo YOON  Saehanseul YI  Chanyoung OH  Hyeonjin JUNG  Youngmin YI  
Summary | Full Text:PDF(750.6KB)


A Robust Algorithm for Deadline Constrained Scheduling in IaaS Cloud Environment
Bilkisu Larai MUHAMMAD-BELLO  Masayoshi ARITSUGI  
Summary | Full Text:PDF(1.9MB)


Avoiding Performance Impacts by Re-replication Workload Shifting in HDFS based Cloud Storage
Thanda SHWE  Masayoshi ARITSUGI  
Summary | Full Text:PDF(364.1KB)


Discovering Co-cluster Structure from Relationships between Biased Objects
Iku OHAMA  Takuya KIDA  Hiroki ARIMURA  
Summary | Full Text:PDF(1.9MB)


Highly Efficient Mobile Visual Search Algorithm
Chuang ZHU  Xiao Feng HUANG  Guo Qing XIANG  Hui Hui DONG  Jia Wen SONG  
Summary | Full Text:PDF(1.1MB)


Leveraging Unannotated Texts for Scientific Relation Extraction
Qin DAI  Naoya INOUE  Paul REISERT  Kentaro INUI  
Summary | Full Text:PDF(1.6MB)


A New DY Conjugate Gradient Method and Applications to Image Denoising
Wei XUE  Junhong REN  Xiao ZHENG  Zhi LIU  Yueyong LIANG  
Summary | Full Text:PDF(1.1MB)


BareUnpack: Generic Unpacking on the Bare-metal Operating System
Cheng BINLIN  Li PENGWEI  
Summary | Full Text:PDF(806.9KB)


Finding Widespread Events with Simple Bitmaps
Syed MOEEN ALI NAQVI  MyungKeun YOON  
Summary | Full Text:PDF(285.1KB)


A Verification Framework for Assembly Programs under Relaxed Memory Model using SMT Solver
Pattaravut MALEEHUAN  Yuki CHIBA  Toshiaki AOKI  
Summary | Full Text:PDF(694.9KB)


Local Feature Reliability Measure Consistent with Match Conditions for Mobile Visual Search
Kohei MATSUZAKI  Kazuyuki TASAKA  Hiromasa YANAGIHARA  
Summary | Full Text:PDF(2.4MB)


Shortening Downtime of Reboot-based Kernel Updates using Dwarf
Ken TERADA  Hiroshi YAMADA  
Summary | Full Text:PDF(1.1MB)


Improving Thai Word and Sentence Segmentation Using Linguistic Knowledge
Rungsiman Nararatwong  Natthawut Kertkeidkachorn  Nagul Cooharojananone  Hitoshi Okada  
Summary | Full Text:PDF(1.4MB)


A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components
Shoko IMAIZUMI  Hitoshi KIYA  
Summary | Full Text:PDF(3MB)


A two-stage crack detection method for concrete bridges using Convolutional Neural Networks
Yundong Li  Weigang Zhao  Xueyan Zhang  Qichen Zhou  
Summary | Full Text:PDF(515.9KB)


In-vehicle Voice Interface with Improved Utterance Classification Accuracy Using Off-the-shelf Cloud Speech Recognizer
Takeshi HOMMA  Yasunari OBUCHI  Kazuaki SHIMA  Rintaro IKESHITA  Hiroaki KOKUBO  Takuya MATSUMOTO  
Summary | Full Text:PDF(747.6KB)


A Novel Speech Enhancement System Based on the Coherence-based Algorithm and the Differential Beamforming
Lei WANG  Jie ZHU  
Summary | Full Text:PDF(465.1KB)


Currency Preserving Query: Selecting the Newest Values from Multiple Tables
Mohan LI  Yanbin SUN  
Summary | Full Text:PDF(598.9KB)


A Robust Depth Image Based Rendering Scheme for Stereoscopic View Synthesis with Adaptive Domain Transform Based Filtering Framework
Wei LIU  Yun Qi TANG  Jian Wei DING  Ming Yue CUI  
Summary | Full Text:PDF(980.3KB)


View Priority Based Threads Allocation and Binary Search Oriented Reweight for GPU Accelerated Real-time 3D Ball Tracking
Yilin HOU  Ziwei DENG  Xina CHENG  Takeshi IKENAGA  
Summary | Full Text:PDF(6.3MB)


Cooperative GPGPU Scheduling for Consolidating Server Workloads
Yusuke SUZUKI  Hiroshi YAMADA  Shinpei KATO  Kenji KONO  
Summary | Full Text:PDF(2.1MB)


Security Consideration For Deep Learning-Based Image Forensics
Wei ZHAO  Pengpeng YANG  Rongrong NI  Yao ZHAO  Haorui WU  
Summary | Full Text:PDF(3.9MB)


Development of License Plate Recognition on Complex Scene with Plate-style Classification and Confidence Scoring based on KNN
Vince Jebryl MONTERO  Yong-Jin JEONG  
Summary | Full Text:PDF(691.7KB)


Hidden Singer: Distinguishing Imitation Singers based on Training with Only the Original Song
Hosung PARK  Seungsoo NAM  Eun MAN CHOI  Daeseon CHOI  
Summary | Full Text:PDF(1.1MB)


A rate perceptual-distortion optimized video coding HEVC
Bumshik Lee  Jae Young Choi  
Summary | Full Text:PDF(1.2MB)


Automatic prevention of buffer overflow vulnerability using candidate code generation
Young-Su JANG  Jin-Young CHOI  
Summary | Full Text:PDF(651.4KB)


Syntax-Based Context Representation for Statistical Machine Translation
Kehai CHEN  Tiejun ZHAO  Muyun YANG  
Summary | Full Text:PDF(952KB)


An Overview of Cyber Security for Connected Vehicles
Junko TAKAHASHI  
Summary | Full Text:PDF(3.1MB)


A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks
Taekeun PARK  Koohong KANG  Daesung MOON  
Summary | Full Text:PDF(342.9KB)


Tag-KEM/DEM Framework for Public-key Encryption with Non-interactive Opening
Yusuke SAKAI  Takahiro MATSUDA  Goichiro HANAOKA  
Summary | Full Text:PDF(305.9KB)


Identifying Evasive Code in Malicious Websites by Analyzing Redirection Differences
Yuta TAKATA  Mitsuaki AKIYAMA  Takeshi YAGI  Takeo HARIU  Kazuhiko OHKUBO  Shigeki GOTO  
Summary | Full Text:PDF(2MB)


Understanding the Inconsistency between Behaviors and Descriptions of Mobile Apps
Takuya WATANABE  Mitsuaki AKIYAMA  Tetsuya SAKAI  Hironori WASHIZAKI  Tatsuya MORI  
Summary | Full Text:PDF(2MB)


Ad-hoc Analytical Framework of Bitcoin Investigations for Law Enforcement
Hiroki KUZUNO  Giannis TZIAKOURIS  
Summary | Full Text:PDF(1.9MB)


Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities
  
Summary | Full Text:PDF(743.9KB)


Automatically Generating Malware Analysis Reports Using Sandbox Logs
Bo SUN  Akinori FUJINO  Tatsuya MORI  Tao BAN  Takeshi TAKAHASHI  Daisuke INOUE  
Summary | Full Text:PDF(2.2MB)


Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
Seira HIDANO  Takao MURAKAMI  Shuichi KATSUMATA  Shinsaku KIYOMOTO  Goichiro HANAOKA  
Summary | Full Text:PDF(713.5KB)


Design and Implementation of SDN-based Proactive Firewall System in Collaboration with Domain Name Resolution
Hiroya IKARASHI  Yong JIN  Nariyoshi YAMAI  Naoya KITAGAWA  Kiyohiko OKAYAMA  
Summary | Full Text:PDF(1.2MB)


Modeling Attack Activity for Integrated Analysis of Threat Information
Daiki Ito  Kenta Nomura  Masaki Kamizono  Yoshiaki Shiraishi  Yasuhiro Takano  Masami Mohri  Masakatu Morii  
Summary | Full Text:PDF(191.6KB)


A Secure In-Depth File System Concealed by GPS-based Mounting Authentication for Mobile Devices
Yong JIN  Masahiko TOMOISHI  Satoshi MATSUURA  Yoshiaki KITAGUCHI  
Summary | Full Text:PDF(3.2MB)


Design exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V processor
Jinli RAO  Tianyong AO  Shu XU  Kui DAI  Xuecheng ZOU  
Summary | Full Text:PDF(666KB)


Zero-Knowledge Identification Scheme Using LDPC Codes
Haruka ITO  Masanori HIROTOMO  Youji FUKUTA  Masami MOHRI  Yoshiaki SHIRAISHI  
Summary | Full Text:PDF(150.2KB)


Energy-Efficient Connectivity Re-establishment in UASNs with Dumb Nodes
Qiuli CHEN  Ming HE  Fei DAI  Chaozheng ZHU  
Summary | Full Text:PDF(462.8KB)


Efficient Methods of Inactive Regions Padding for Segmented Sphere Projection (SSP) of 360 Video
Yong-Uk Yoon  Yong-Jo Ahn  Donggyu Sim  Jae-Gon Kim  
Summary | Full Text:PDF(448.9KB)


NEST: Towards Extreme Scale Computing Systems
Yunfeng LU  Huaxi GU  Xiaoshan YU  Kun WANG  
Summary | Full Text:PDF(407.9KB)


High-performance Super-Resolution via Patch-based Deep Neural Network for Real-time Implementation
Reo AOKI  Kousuke IMAMURA  Akihiro HIRANO  Yoshio MATSUDA  
Summary | Full Text:PDF(2.1MB)


EFFICIENT REUSABLE COLLECTIONS
Davud MOHAMMADPUR  Ali MAHJUR  
Summary | Full Text:PDF(1.5MB)


Food intake detection and classification using a necklace-type piezoelectric wearable sensor system
Ghulam HUSSAIN  Kamran JAVED  Jundong CHO  Juneho YI  
Summary | Full Text:PDF(1.5MB)


On the Optimal Configuration of Grouping-Based Framed Slotted ALOHA
Young-Beom KIM  
Summary | Full Text:PDF(124.7KB)


How are IF-Conditional Statements Fixed Through Peer CodeReview?
Yuki UEDA  Akinori IHARA  Takashi ISHIO  Toshiki HIRAO  Kenichi MATSUMOTO  
Summary | Full Text:PDF(275.7KB)


Studying the Cost and Effectiveness of OSS Quality Assessment Models: An Experience Report of Fujitsu QNET
Yasutaka KAMEI  Takahiro MATSUMOTO  Kazuhiro YAMASHITA  Naoyasu UBAYASHI  Takashi IWASAKI  Shuichi TAKAYAMA  
Summary | Full Text:PDF(649.1KB)


Adaptive Object Tracking with Complementary Models
Peng GAO  Yipeng MA  Chao LI  Ke SONG  Yan ZHANG  Fei WANG  Liyi XIAO  
Summary | Full Text:PDF(1.8MB)


Fostering Real-time Software Analysis by Leveraging Heterogeneous and Autonomous Software Repositories
Chaman WIJESIRIWARDANA  Prasad WIMALARATNE  
Summary | Full Text:PDF(746.3KB)


Speeding up Extreme Multi-label Classifier by Approximate Nearest Neighbor Search
Yukihiro TAGAMI  
Summary | Full Text:PDF(3.1MB)


Accelerating a Lloyd-Type k-Means Clustering Algorithm with Summable Lower Bounds in a Lower-Dimensional Space
Kazuo AOYAMA  Kazumi SAITO  Tetsuo IKEDA  
Summary | Full Text:PDF(651.6KB)


Deep Convolutional Neural Networks for Manga Show-Through Cancellation
Taku NAKAHARA  Kazunori URUMA  Tomohiro TAKAHASHI  Toshihiro FURUKAWA  
Summary | Full Text:PDF(1.1MB)


Lightweight Security Hardware Architecture using DWT and AES Algorithms
Ignacio ALGREDO-BADILLO  Francisco R. CASTILLO-SORIA  Kelsey A. RAMÍREZ-GUTIÉRREZ  Luis MORALES-ROSALES  Alejandro MEDINA-SANTIAGO  Claudia FEREGRINO-URIBE  
Summary | Full Text:PDF(1.8MB)


Efficient texture creation based on random patches in database and guided filter
Seok Bong Yoo  Mikyong Han  
Summary | Full Text:PDF(1.1MB)


Accurate Scale Adaptive and Real-Time Visual Tracking with Correlation Filters
Jiatian PI  Shaohua ZENG  Qing ZUO  Yan WEI  
Summary | Full Text:PDF(1.1MB)


Critical Nodes Identification of Power Grids Based on Network Efficiency
WenJie KANG  PeiDong ZHU  JieXin ZHANG  JunYang ZHANG  
Summary | Full Text:PDF(634.5KB)


Strip-Switched Deployment Method to Optimize Single Failure Recovery for Erasure Coded Storage Systems
Yingxun FU  Shilin WEN  Li MA  Jianyong DUAN  
Summary | Full Text:PDF(170.7KB)


High-speed spelling in virtual reality with sequential hybrid BCIs
Zhaolin YAO  Xinyao MA  Yijun WANG  Xu ZHANG  Ming LIU  Weihua PEI  Hongda CHEN  
Summary | Full Text:PDF(621.4KB)

 Volume E101-D No.10  (Publication Date:2018/10/01)
Regular Section

pp.2423-2435  PAPER-Fundamentals of Information Systems
Improving Per-Node Computing Efficiency by an Adaptive Lock-Free Scheduling Model
Zhishuo ZHENG  Deyu QI  Naqin ZHOU  Xinyang WANG  Mincong YU  
Summary | Full Text:PDF (3.8MB) >>Buy this Article

pp.2436-2446  PAPER-Software Engineering
Spectrum-Based Fault Localization Using Fault Triggering Model to Refine Fault Ranking List
Yong WANG  Zhiqiu HUANG  Rongcun WANG  Qiao YU  
Summary | Full Text:PDF (824.9KB) >>Buy this Article

pp.2447-2457  PAPER-Data Engineering, Web Information Systems
Uncertain Rule Based Method for Determining Data Currency
Mohan LI  Jianzhong LI  Siyao CHENG  Yanbin SUN  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.2458-2464  PAPER-Information Network
MinDoS: A Priority-Based SDN Safe-Guard Architecture for DoS Attacks
Tao WANG  Hongchang CHEN  Chao QI  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.2465-2473  PAPER-Information Network
Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames
Qian LU  Haipeng QU  Yuan ZHUANG  Xi-Jun LIN  Yuzhan OUYANG  
Summary | Full Text:PDF (4.2MB) >>Buy this Article

pp.2474-2484  PAPER-Information Network
Weighting Estimation Methods for Opponents' Utility Functions Using Boosting in Multi-Time Negotiations
Takaki MATSUNE  Katsuhide FUJITA  
Summary | Full Text:PDF (547.4KB) >>Buy this Article

pp.2485-2500  PAPER-Artificial Intelligence, Data Mining
Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers
Hyun KWON  Yongchul KIM  Ki-Woong PARK  Hyunsoo YOON  Daeseon CHOI  
Summary | Full Text:PDF (5.3MB) >>Buy this Article

pp.2501-2508  PAPER-Pattern Recognition
Individuality-Preserving Gait Pattern Prediction Based on Gait Feature Transitions
Tsuyoshi HIGASHIGUCHI  Norimichi UKITA  Masayuki KANBARA  Norihiro HAGITA  
Summary | Full Text:PDF (987.6KB) >>Buy this Article

pp.2509-2517  PAPER-Image Recognition, Computer Vision
Finding Important People in a Video Using Deep Neural Networks with Conditional Random Fields
Mayu OTANI  Atsushi NISHIDA  Yuta NAKASHIMA  Tomokazu SATO  Naokazu YOKOYA  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.2518-2522  LETTER-Software System
RbWL: Recency-Based Static Wear Leveling for Lifetime Extension and Overhead Reduction in NAND Flash Memory Systems
Sang-Ho HWANG  Jong Wook KWAK  
Summary | Full Text:PDF (725.2KB) >>Buy this Article

pp.2523-2525  LETTER-Software Engineering
A Quantitative Analysis on Relationship between an Early-Closed Bug and Its Amount of Clues: A Case Study of Apache Ant
Akito SUNOUCHI  Hirohisa AMAN  Minoru KAWAHARA  
Summary | Full Text:PDF (112.9KB) >>Buy this Article

pp.2526-2529  LETTER-Data Engineering, Web Information Systems
Search-Based Concolic Execution for SW Vulnerability Discovery
Rustamov FAYOZBEK  Minjun CHOI  Joobeom YUN  
Summary | Full Text:PDF (621KB) >>Buy this Article

pp.2530-2533  LETTER-Human-computer Interaction
Impact of Viewing Distance on Task Performance and Its Properties
Makio ISHIHARA  Yukio ISHIHARA  
Summary | Full Text:PDF (464.4KB) >>Buy this Article

pp.2534-2538  LETTER-Human-computer Interaction
TS-ICNN: Time Sequence-Based Interval Convolutional Neural Networks for Human Action Detection and Recognition
Zhendong ZHUANG  Yang XUE  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.2539-2542  LETTER-Image Processing and Video Processing
Low Bit-Rate Compression Image Restoration through Subspace Joint Regression Learning
Zongliang GAN  
Summary | Full Text:PDF (907.1KB) >>Buy this Article

pp.2543-2546  LETTER-Image Processing and Video Processing
Standard-Compliant Multiple Description Image Coding Based on Convolutional Neural Networks
Ting ZHANG  Huihui BAI  Mengmeng ZHANG  Yao ZHAO  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.2547-2550  LETTER-Image Recognition, Computer Vision
Twofold Correlation Filtering for Tracking Integration
Wei WANG  Weiguang LI  Zhaoming CHEN  Mingquan SHI  
Summary | Full Text:PDF (435.5KB) >>Buy this Article

pp.2551-2558  LETTER-Natural Language Processing
Improving Distantly Supervised Relation Extraction by Knowledge Base-Driven Zero Subject Resolution
Eun-kyung KIM  Key-Sun CHOI  
Summary | Full Text:PDF (463.7KB) >>Buy this Article

Previous | 
go to Page Top