default search action
Journal of Information Processing, Volume 19
Volume 19, January-December 2011
- Kei Tanimoto, Susumu Ishihara:
NEMO-based Path Aggregation System Using Mobile Routers on Multiple Vehicles. 1-11 - Nguyen Thanh Hung, Hideto Ikeda, Kenzi Kuribayasi, Nikolaos Vogiatzis:
Reducing the Network Load in CREPEnvironment. 12-24 - Tsutomu Inaba, Hiroyuki Takizawa, Hiroaki Kobayashi:
A Self-Organized Overlay Network Management Mechanism for Heterogeneous Environments. 25-38 - Kan Watanabe, Masaru Fukushi, Michitaka Kameyama:
Adaptive Group-Based Job Scheduling for High Performance and Reliable Volunteer Computing. 39-51 - Donghui Lin, Yohei Murakami, Masahiro Tanaka:
Designing Dynamic Control Mechanisms for Service Invocation. 52-61 - Akira Yamada, Hara Masanori, Yutaka Miyake:
Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation. 62-73 - Ryosuke Sato, Kohei Suenaga, Naoki Kobayashi:
Ordered Types for Stream Processing of Tree-Structured Data. 74-87 - Ritsu Nomura, Masahiro Kuroda, Tadanori Mizuno:
Radio-Free Mutual Authentication for Cognitive Radio Network. 88-102 - Kriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
A Node Deployment Strategy for Efficient Sensing with Mobile Sensors in Sparse Sensor Networks. 103-117 - Hajime Tazaki, Rodney Van Meter, Ryuji Wakikawa, Keisuke Uehara, Jun Murai:
NAT-MANEMO: Route Optimization for Unlimited Network Extensibility in MANEMO. 118-128 - Hiroki Noguchi, Tomoya Takagi, Koji Kugata, Shintaro Izumi, Masahiko Yoshimoto, Hiroshi Kawaguchi:
Data-Intensive Sound Acquisition System with Large-scale Microphone Array. 129-140 - Kenji Ito, Noriyoshi Suzuki, Satoshi Makido, Hiroaki Hayashi:
Periodic Broadcast Timing Reservation Multiple Access for Inter-vehicle Communication. 141-152 - Katsunari Yoshioka, Yoshihiko Hosobuchi, Tatsunori Orii, Tsutomu Matsumoto:
Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems. 153-168 - Keisuke Takemori, Takahiro Sakai, Masakatsu Nishigaki, Yutaka Miyake:
Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists. 169-179 - Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada:
Hit-list Worm Detection Using Distributed Sliding Window. 180-189 - Wei Li, Xiaojuan Wu, Hua-An Zhao:
New Techniques of Foreground Detection, Segmentation and Density Estimation for Crowded Objects Motion Analysis. 190-200 - Xavier Olive, Hiroshi Nakashima:
Efficient Representation of Constraints and Propagation of Variable-Value Symmetries in Distributed Constraint Reasoning. 201-210 - Yuko Murayama:
Special Issue: Trust Management. 211 - Taro Yamamoto, Naoko Chiba, Fumihiko Magata, Katsumi Takahashi, Naoya Sekiya, Isao Nakamura, Morihiro Ogasahara, Yoshiaki Hashimoto:
Investigation on Anxieties while Using the Internet to Study about "Anshin". 212-220 - Isabella Hatak, Dietmar Roessl:
Correlating Relational Competence with Trust. 221-230 - Stephen Marsh, Pamela Briggs, Khalil El-Khatib, Babak Esfandiari, John A. Stewart:
Defining and Investigating Device Comfort. 231-252 - Toshihiko Takemura, Hideyuki Tanaka, Kanta Matsuura:
Analysis of Awareness Gap between Security Managers and Workers in an Organization with Regard to the Effectiveness of the Information Security Measures. 253-262 - Hiroyuki Sato, Akira Kubo:
Graded Trust of Certificates and Its Management with Extended Path Validation. 263-273 - Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security. 274-291 - Daniel Lomsak, Jay Ligatti:
PoliSeer: A Tool for Managing Complex Security Policies. 292-306 - Ayako Komatsu, Tsutomu Matsumoto:
Empirical Study on Privacy Concerns and the Acceptance of e-Money in Japan. 307-316 - Leonardo A. Martucci, Sebastian Ries, Max Mühlhäuser:
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services. 317-331 - Pern Hui Chia, Georgios Pitsilis:
Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions.com. 332-344 - Christian Damsgaard Jensen, Povilas Pilkauskas, Thomas Lefévre:
Classification of Recommender Expertise in the Wikipedia Recommender System. 345-363 - Marcin Seredynski, Pascal Bouvry, Dominic Dunlop:
Performance Evaluation of Personal and General Data Classes for Trust Management in MANETs. 364-377 - Ahmad Bazzi, Yoshikuni Onozato:
Feasibility Study of Security Virtual Appliances for Personal Computing. 378-388 - Masahiro Koyama:
A Study of "Information security" in Internet Society: The Value Formation of Information Technology and Social Trust. 389-399 - Shuichi Oikawa, Jin Kawasaki:
Simultaneous Virtual-Machine Logging and Replay. 400-410 - Megumi Ito, Shuichi Oikawa:
Making a Virtual Machine Monitor Interruptible. 411-420 - Sayaka Akioka, Yuki Ohno, Midori Sugaya, Tatsuo Nakajima:
A Library-based Performance Tool for Multicore Pervasive Servers. 421-429 - Mebae Ushida, Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta:
Proxiable Designated Verifier Signature. 430-440 - Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:
Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves. 441-450 - Tangtisanon Pikulkaew, Hiroaki Kikuchi:
Perfect Privacy-preserving Automated Trust Negotiation. 451-462 - Hiroaki Kikuchi, Shuji Matsuo, Masato Terada:
Principal Component Analysis of Botnet Takeover. 463-472 - Asaad Ahmed, Keiichi Yasumoto, Yukiko Yamauchi, Minoru Ito:
Probabilistic Coverage Methods in People-Centric Sensing. 473-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.