Your search returned 30 records. Click on the hyperlinks to view further details of Titles..

 

Magazine Name : Ieice Transactions On Information And Systems

Year : 2014 Volume number : E97-D Issue: 03

Efficient Samplin Method For Monte Carlo Tree Search Problem (Article)
Subject: Monte Carlo Tree Search , Random Sampling , Game , Uct
Author: Kazuki Teraoka      Kohei Hatano     
page:      392 - 398
Worst Case Analysis Of Approximation Algorithm Of Abrams Et Al. For The Set K-Cover Problem (Article)
Subject: Set K-Cover , Approximation Algorithms , Upper Bound On The Performance
Author: Satoshi Fujita     
page:      399 - 405
Spanning Distribution Trees Of Graphs (Article)
Subject: Spanning Distribution Tree , Series-Parallel Graph , Supply , Demand
Author: Masaki Kawabata      Takao Nishizeki     
page:      406 - 412
Convex Grid Drawings Of Plane Graphs With Pentagonal Contours (Article)
Subject: Algorithm , Convex Grid Drawing , Graph Drawing , Plane Graph
Author: Kazuyuki Miura     
page:      413 - 420
Constant Time Enmeration Of Subtrees With Exactly K Nodes In A Tree (Article)
Subject: Graph Algorithm , Enumeration Algorithm , Constant Delay Enumeration , Motif Discovery
Author: Kunihiro Wasa      Yusaku Kaneta     
page:      421 - 430
Asynchronous Memory Machine Models With Barrier Synchronization (Article)
Subject: Memory Machine Models , Parallel Algorithms , Contiguous Memory Access , Asynchronous Models
Author: Koji Nakano     
page:      431 - 441
On The Complexity Of Computing Discrete Logarithms Over Algebraic Tori (Article)
Subject: Algebraic Tori , Order Certified Discrete Logarithm , Turing Reduction
Author: Shuji Isobe      Eisuke Koizumi     
page:      442 - 447
A Formulation Of Composition For Cellular Automata On Groups (Article)
Subject: Cellular Automata , Group , Models Of Computation , Automata
Author: Shuichi Inokuchi      Takahiro Ito     
page:      448 - 454
A New Artificial Fish Swarm Algorithm For The Multiple Knapsack Problem (Article)
Subject: Artificial Fish Swarm Algorithm , Multiple Knapsack Problem , Constraint Boundary
Author: Qing Liu      Tomohiro Odaka     
page:      455 - 468
Efficient Update Activation For Virtual Machines In Iaas Cloud Computing Environment (Article)
Subject: Cloud Computing , Iaas , Virtual Machine , Software Updates
Author: Hiroshi Yamada      Shuntaro Tonosaki     
page:      469 - 479
Enhanced Cycle-Conserving Dynamic Voltage Scaling For Low-Power Real-Time Operating Systems (Article)
Subject: Rt-Dvs , Low-Power Operating Systems , Real-Time Operating Systems , Real-Time Dynamic Voltage Scaling
Author: Min-Seok Lee      Cheol-Hoon Lee     
page:      480 - 487
Research On Software Trust Analysis Based On Behavior (Article)
Subject: Trust , Software Behavior , System Call , State-Layer
Author: Yingxu Lai      Wenwen Zhang     
page:      488 - 496
Ustore: Stt-Mram Based Light-Weight User-Level Storage For Enhancing Performance Of Accessing Persistent Data (Article)
Subject: Non-Volatile Memory , Storage , Persistent Data , Implementation
Author: Yong Song      Kyuho Park     
page:      497 - 509
A General Framework And Algorithms For Score Level Indexing And Fusion In Biometric Identification (Article)
Subject: Biometric Identification , Score Level Fusion , Missing Score , Metric Space Indexing
Author: Takao Murakami      Kenta Takahashi     
page:      510 - 523
A Buffer Overflow Based Algorithm To Conceal Software Watermarking Trigger Behavior (Article)
Subject: Software Watermarking , Trigger Behaviour , Buffer Overflow
Author: Jiu-Jun Cheng      Shangee Gao     
page:      524 - 532
Scan Shift Time Reduction Using Test Compaction For On-Chip Delay Measurement (Article)
Subject: Small-Delay Defects , Test Compaction , Test Application Time , Test Data Volume
Author: Wenpo Zhang      Kazuteru Namba     
page:      533 - 540
Orientation-Compensative Signal Registration For Owner Authentication Using An Accelerometer (Article)
Subject: Biometric Authentication , Dynamic Programming , Gait , Accelerometer
Author: Trung Thanh Ngo      Yasushi Makihara     
page:      541 - 553
Confidence Measure Based On Context Consistency Using Word Occurrence Probability And Topic Adaptation For Spoken Term Detection (Article)
Subject: Spoken Term Detection , Confidence Measure (Cm) , Context Consistency , Sematic Similarity
Author: Haiyang Li      Tieran Zheng     
page:      554 - 561
Bitstream-Level Film Noise Cancellation For Damaged Video Playback (Article)
Subject: Film Noise Removal , Bitstream-Level , Wastes To Energy
Author: Sinwook Lee      Euee-Seon Jang     
page:      562 - 572
Fpga Implementation Of Exclusive Block Matching For Robust Moving Object Extraction And Tracking (Article)
Subject: Object Tracking , Motion Extraction , Fpga , Synchronous Shift Data Transfer
Author: Yoichi Tomioka      Ryota Takasu     
page:      573 - 582
An Average-Case Efficient Algorithm On Testing The Identity Of Boolean Functions In Trace Representation (Article)
Subject: Average-Case Analysis , Boolean Functions In Polynomial Form , Trace Representation , Univariate Representation
Author: Qian Guo      Haibin Kan     
page:      583 - 588
Implementation Of The Complete Predictor For Ddr3 Sdram (Article)
Subject: Ddr3 Sdram , Iatency , Predictor
Author: Vladimir V. Stankovic      Nebojsa Z. Milenkovic     
page:      589 - 592
Development Of Compression Tolerable And Highly Implementable Watermarking Method For Mobile Devices (Article)
Subject: Watermark , Max-Plus Algebra , Morphological Wavelet Transform , Jpeg
Author: Takeshi Kumaki      Kei Nakao     
page:      593 - 596
P2p Based Social Network Over Mobile Ad-Hoc Networks (Article)
Subject: Mobile Social Network , Mobile Ad Hoc Networking , Mobile Peer To Peer Network , Location Based Network
Author: He Li      Kyoungsoo Bok     
page:      597 - 600
Icruiser: An Improveed Approach For Concurrent Heap Buffer Overflow Monitoring (Article)
Subject: Heap Buffer Overflow , Multi-Core Technology
Author: Donghai Tian      Xuanya Li     
page:      601 - 605
Detecting Hardware Trojan Through Time Domain Constrained Estimator Based Unified Subspace Technique (Article)
Subject: Information Security , Hardware Security , Hardware Trojan Detection , Unified Subspace Technique
Author: Mingfu Xue      Wei Liu     
page:      606 - 609
Integrating Facial Expression And Body Gesture In Videos For Emotion Recognition (Article)
Subject: Bimodel Emotion Recognition , Harris Plus Cuboids Spatiotemporal Feature (Hst) , Sparse Canonical Correlation Analysis (Scca)
Author: Jingjie Yan      Wenming Zheng     
page:      610 - 613
Topic-Based Knowledge Transfer Algorithm For Cross-View Action Recognition (Article)
Subject: Cross-View Human Action Recognition , Topic Distribution Of Visual Works , Latent Dirichlet Allocation , Bilingual Dictionary
Author: Changhong Chen      Shunqing Yang     
page:      614 - 617
Vanishing Point-Based Road Detection For General Road Images (Article)
Subject: Road Detection , Vanishing Points Detection , Road Borders Detection , General Road Images
Author: Trung Hieu Bui      Takeshi Saitoh     
page:      618 - 621
A New Evolutionary Approach To Recommender Systems (Article)
Subject: Recommender Systems , Content-Based Filtering , Data Grouping
Author: Hyun Tae Kim      Jinung An     
page:      622 - 625