default search action
Journal of Information Processing, Volume 32
Volume 32, 2024
- Katsuhide Fujita:
Editor's Message to Special Issue of Agent Theory, Technology, and its Applications. 1 - Hyuga Matsuo, Katsuhide Fujita:
Effective Acceptance Strategy Using Deep Reinforcement Learning in Bilateral Multi-issue Negotiation. 2-9 - Kosei Takashima, Isao Yagi:
Model Building and Description Using the Agent-based Computational Economics Framework for Accounting. 10-21 - Hironori Egi:
Editor's Message to Special Issue of Collaboration and Network Services. 22 - Hiroki Yasui, Takahiro Inoue, Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto:
SPOT: In-depth Analysis of IoT Ransomware Attacks Using Bare Metal NAS Devices. 23-34 - Kenro Go, Shunsuke Tokuda, Haruna Niiyama, Toshiki Onishi, Asahi Ogushi, Akihiro Miyata:
Evaluation of Prosodic Features Suitable for Conversational Agents Replying with a Joke. 35-40 - Zhou Pei, Hiroyuki Shinnou:
Combining Generative Model and Attention Network for Anomaly Detection. 41-51 - Toshinori Saito:
Editor's Message to Special Issue of Computers in Education for Creative Learning. 52 - Don Passey:
Lessons from Learner Home Engagement Prior to and during Covid-19: Are Parents and Guardians Prepared for Future Crises? 53-61 - Therese Keane, Susanne Garvis:
STEM in Australian Early Childhood Education. 62-68 - Kimio Kuramitsu, Momoka Obara, Miyu Sato, Yuka Akinobu:
Training AI Model that Suggests Python Code from Student Requests in Natural Language. 69-76 - Jaana Holvikivi:
A Risk Evaluation Framework for Digitalization of Education with an Emphasis on Africa. 77-83 - Takashi Date, Mariko Sasakura, Kenichi Iwata, Masakazu Nakamoto, Toshiki Hino, Kazuhiko Nishi:
Effectiveness of Body Movements to Enjoy Online Classes. 84-92 - Yutaro Ohashi:
Online Survey on Changes of Teachers' Minds on Information and Communication Technology Use and Programming Education in Japanese Elementary Schools between 2017 and 2022. 93-102 - Yui Ono, Daisuke Saito, Hironori Washizaki, Yoshiaki Fukazawa:
Measuring Complexity in Visual Programming for Elementary School Students. 103-112 - Maiko Shimabuku, Yuzuru Aoki, Susumu Kanemune:
School-wide Programming Education in a Public Elementary School. 113-121 - Minae Nishimoto, Keiji Emi:
Text-mining Analysis of What Students Think About e-learning and Face-to-face Classes during COVID-19. 122-126 - Ben Tsutom Wada:
Teaching Computer Science Unplugged in Online for Undergraduate College Students. 127-132 - Toru Ochi, Koji Tateno:
Comparing Efficacy of Online Real-time Classes with On-demand Viewing Classes. 133-138 - Hideki Kondo, Sayaka Tohyama, Ayano Ohsaki, Masayuki Yamada:
Time-shifting Method to Mitigate Discussion Stagnation and Promote SNS Collaboration. 139-149 - Tomonari Kishimoto, Yuki Honda, Kosuke Urushihara, Maiko Shimabuku, Susumu Kanemune:
Connect DB: An Online Learning System for Data Analysis. 150-158 - Jun Iio:
An Evaluation of the Flipped Classroom Approach Toward Programming Education. 159-165 - Sayaka Tohyama, Yoshiaki Matsuzawa, Takito Totsuka:
What are the Consequences of Attaining a Greater Sense of Empowerment?: Longitudinal Cohort Study of Early Programming Education in Japan during the '80s and '90s. 166-174 - Yuko Murakami, Yukari Sho, Tomohiro Inagaki:
Improving Motivation in Learning AI for Undergraduate Students by Case Study. 175-181 - Hajime Murai:
Editor's Message to Special Issue of Computer and Humanities. 182 - Takeshi Miura:
Geometric Correction of Historical Maps by the Hybrid of Triangulated Irregular Network and Vector Field Analysis. 183-194 - Yoshinari Takegawa:
Editor's Message to Special Issue of Understanding, Technology, and Application of Interaction. 195 - Yukiko I. Nakano, Fumio Nihei, Ryo Ishii, Ryuichiro Higashinaka:
Selecting Iconic Gesture Forms Based on Typical Entity Images. 196-205 - Shigeru Fujita:
Editor's Message to Special Issue on "Network Services and Distributed Processing". 206 - Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji:
PRSafe: A Domain Specific Language Created with LLVM. 207-222 - Yuuri Iwashina, Sho Kato, Hiroshi Shigeno:
Evaluation of a Negotiation Acceptance Scheme in Maneuver Coordination within a Congested Environment. 223-231 - Kouhei Kita, Ryuya Uda:
Fast Preprocessing by Suffix Arrays for Managing Byte n-grams to Detect Malware Subspecies by Machine Learning. 232-246 - Shota Yamanaka:
Sample-size and Repetition Effects on the Prediction Accuracy of Time and Error-rate Models in Steering Tasks. 247-255 - Zikai Zhou, Kei Wakabayashi, Hiroyoshi Ito:
Phrase-Level Topic Modeling Based on Joint Embedding Space of Words, Phrases and Documents. 256-264 - Shinya Abe, Shoko Fujii, Hideya Mino, Jun Goto, Go Ohtake, Satoshi Fujitsu, Kinji Matsumura, Hiroshi Fujisawa:
Impact of Audio on Adaptive Japanese Subtitles and Captions Ruby. 265-274 - Kota Kumakura, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:
CPU Clock Rate Control Based on Method Invocation in Foreground Application in Android Smartphone. 275-286 - Makoto Otani:
Editor's Message to Special Issue of Internet and Operational Technologies for Developing Well-being Network Environment. 287 - Masato Hirai, Daisuke Kotani, Yasuo Okabe:
Linking Contexts from Distinct Data Sources in Zero Trust Federation. 288-296 - Hiroki Takakura:
Editor's Message to Special Issue of "Young Researchers' Papers". 297 - Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura:
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection. 298-307 - Tengfei Shao, Yuya Ieiri, Reiko Hishiyama:
Multiple Clusters Discovery Utilizing Network Motifs for Community Improvement: Insights from Tourism and Goods' Transactions. 308-318 - Hiroto Fujita, Yasuyuki Tanaka, Kosuke Mori, Fumio Teraoka:
BROF : An Efficient Tree Construction Method Using Passive Link Quality Estimation for a Wireless Sensor Network. 319-330 - Yuka Kataoka, Achmad Husni Thamrin, Rodney Van Meter:
The Effect of Teacher Electronic Feedback on Japanese SFL Basic Learners' Speaking Improvement. 331-345 - Seiji Kataoka:
A Subtour Elimination Constraint for Non-simpl e Circuit Problems. 346-351 - Nobuyuki Sugio, Naoki Shibayama, Yasutaka Igarashi:
Higher-order Differential Attack on Reduced-round SLIM. 352-357 - Wataru Kawabe, Yusuke Sugano:
Image-to-Text Translation for Interactive Image Recognition: A Comparative User Study with Non-expert Users. 358-368 - Yen-Chen Chen, Kengo Nakajima:
A Cascadic Parareal Method for Parallel-in-Time Simulation of Compressible Supersonic Flow. 369-379 - Hayataka Nakamura, Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:
Performance Study of Kotlin and Java Programs with Bytecode Analysis. 380-395 - Takumi Nakamura, Shusuke Kawamura, Hiroshi Yoshiura, Masatsugu Ichino:
Personal Authentication for Periocular Region in Thermal and Visible Light Images by Using CNN. 396-406 - Hideaki Goto:
Disruption-tolerant Local Authentication Method for Network Roaming Systems. 407-416 - Misaki Kojima, Naoki Nishida:
A Sufficient Condition of Logically Constrained Term Rewrite Systems for Decidability of All-path Reachability Problems with Constant Destinations. 417-435 - Masahiro Yasugi, Kento Emoto, Tasuku Hiraishi:
Designing Restartable Exception Handling Mechanisms for Implementing Efficient and Safe High-level Languages. 436-450 - Bach Nguyen Trong, Kanae Tsushima, Zhenjiang Hu:
Synthesis of Bidirectional Programs from Examples with Functional Dependencies. 451-465 - Atsuki Tamekuri, Saneyasu Yamaguchi:
Provide Interpretability of Document Classification by Large Language Models Based on Word Masking. 466-470 - Bach Nguyen Trong, Kanae Tsushima, Zhenjiang Hu:
SYNTHBX: An Example-guided Synthesizer for Bidirectional Programs on Relations. 471-486 - Yuki Kuwabara, Yu Suzuki:
Automatic Stopword Generation Based on Attention for Document Classification Using Neural Networks. 487-495 - Yuichi Tokunaga:
Editor's Message to Special Issue of Intelligent Transportation Systems and Pervasive Systems that Recreate the Value of Physical Mobility. 496-497 - Hisatomo Hanabusa, Tadashi Komiya, Kyohei Ichinose, Koji Takahashi, Ryota Horiguchi:
Development of a Nowcast Crowd Simulation Framework. 498-508 - Shota Horisaki, Kazushige Matama, Katsuhiro Naito, Hidekazu Suzuki:
CYPHONIC-over-QUIC: Secure End-to-End Communication Architecture Traversing Firewalls/NATs. 509-519 - Ayumu Harada, Akihito Hiromori, Hirozumi Yamaguchi:
Anomaly Detection of Building Structure from Incomplete Point Cloud Obtained by UAV. 520-532 - Cher Yen Tan, Ryotaro Akagawa, Tatsuya Yamazaki, Motohiko Yamazaki:
CT Image Diagnostic Support System for Predicting EGFR Gene Mutations in Lung Cancer. 533-542 - Koga Toriumi, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:
Fast Screen Orientation Adjustment Based on SVM Rotation Inference on Android Smartphones. 543-551 - Shunya Oguchi, Shoji Yuen:
Constant Propagation in CRIL by Bidirectional Data Flow Analysis. 552-564 - Yuuichi Teranishi:
Editor's Message to Special Issue of "Applications and the Internet" in Conjunction with the Main Topics of COMPSAC 2023. 565 - Daiki Nobayashi, Renju Akashi, Kazuya Tsukamoto, Takeshi Ikenaga, Myung J. Lee:
Performance Evaluation of Spatio-temporal Data Retention System Supporting a Floating Cyber-physical System. 566-574 - Hangli Ge, Takashi Michikata, Noboru Koshizuka:
K-neighboring on Multi-weighted Graphs for Passenger Count Prediction on Railway Networks. 575-585 - Jie Yin, Yutaka Ishikawa, Atsuko Takefusa:
A Linux Audit and MQTT based Monitoring Framework for IoT Devices and Its Evaluation. 586-595 - Kyosuke Teramoto, Tomoki Haruyama, Takuru Shimoyama, Fumihiko Kato, Hiroshi Mineno:
Human Activity Recognition Using FixMatch-based Semi-supervised Learning with CSI. 596-604 - Tatsuya Sato, Taku Shimosawa, Nariyoshi Yamai:
BillingOpsSC: Smart Contract-based Service Billing Management Method for Consortium Blockchain-based Systems. 605-617 - Masataka Kakinouchi, Kazumasa Omote:
Reducing Security Fatigue in Visually Impaired University Students through Problem Posing. 618-627 - Haiyue Song, Raj Dabre, Chenhui Chu, Atsushi Fujita, Sadao Kurohashi:
Bilingual Corpus Mining and Multistage Fine-tuning for Improving Machine Translation of Lecture Transcripts. 628-640 - Mohammad Soltanian, Keivan Borna:
Video Classification Using Smooth Approximation of Hard-assignment Encoding. 641-651 - Vijay Daultani, Héctor Javier Vázquez Martínez, Naoaki Okazaki:
Acceptability Evaluation of Naturally Written Sentences. 652-666 - Noriaki Matsumura, Takahiro Hasegawa:
IRA-3MSS: Integrated Risk Assessment Method for Three Management System Standards in the Field of Information Technology Service. 667-677 - Mitsuaki Akiyama:
Editor's Message to Special Issue of Cybersecurity Technologies for Secure Supply-Chain. 678 - Shogo Shiraki, Hayato Kimura, Takanori Isobe:
Looking Further into the Security of End-to-End Encryption of SFrame. 679-689 - Ren Ishibashi, Kazuki Yoneyama:
Big Data-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage without Random Oracles. 690-709 - Yoshiyuki Sakamaki, Takeru Fukuoka, Junpei Yamaguchi, Masanobu Morinaga:
Secure Rating Computation on Weighted Signed Network for Supply Chain Network. 710-718 - Koji Shima, Hiroshi Doi:
Hierarchical Secret-Sharing Scheme Based on XOR Operations. 719-730 - Qingxin Mao, Daisuke Makita, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto:
Characteristics Comparison between Carpet Bombing-type and Single Target DRDoS Attacks Observed by Honeypot. 731-747 - Phung Minh Ngoc, Mamoru Mimura:
Malicious JavaScript Detection in Realistic Environments with SVM and MLP Models. 748-756 - Takayuki Miura, Masanobu Kii, Toshiki Shibahara, Kazuki Iwahana, Tetsuya Okuda, Atsunori Ichikawa, Naoto Yanai:
SETSUBUN: Revisiting Membership Inference Game for Evaluating Synthetic Data Generation. 757-766 - Tomohiko Yano, Hiroki Kuzuno:
Visualization Method for Open Source Software Risk Related to Vulnerability and Developmental Status Considering Dependencies. 767-778 - Huang Shu-Pei, Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
An Investigation of Privacy and Security in VR APPs through URL String Analysis. 779-788 - Takayuki Sasaki, Jia Wang, Kazumasa Omote, Katsunari Yoshioka, Tsutomu Matsumoto:
EtherWatch: A Framework for Detecting Suspicious Ethereum Accounts and Their Activities. 789-800 - Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Understanding the Breakdown of Same-origin Policies in Web Services That Rehost Websites. 801-816 - Kenji Hisazumi:
Editor's Message to Special Issue of Embedded Systems Engineering. 817 - Yoshitada Takaso, Nao Yoshimura, Hiroshi Oyama, Hiroaki Takada, Takuya Azumi:
HRMP3+TECS v2: Component Framework for Reliable Multiprocessor Real-time Operating System. 818-828 - Yixiao Xing, Yixiao Li, Hiroaki Takada:
A Multi-core RTOS Benchmark Methodology To Assess System Services Under Contentions. 829-843 - Siqi Peng, Akihiro Yamamoto:
Concept Lattice Reduction Using Integer Programming. 844-860
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.