IEICE Transactions in Information and Systems - 巻 102 / 号 9
| タイトル | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| 著者 | 巻 | 号 | ページ | 年 | PKV | ||||
| Data-Driven Decision-Making in Cyber-Physical Integrated Society | |||||||||
| Noboru SONEHARA, Takahisa SUZUKI, Akihisa KODATE, Toshihiko WAKAHARA, ... | 102 | 9 | 1607–1616 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Elastic Trust Model for Dynamically Evolving Trust Frameworks | |||||||||
| Hiroyuki SATO, Noriyasu YAMAMOTO | 102 | 9 | 1617–1624 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Upcoming Mood Prediction Using Public Online Social Networks Data: Analysis over Cyber-Social-Physical Dimension | |||||||||
| Chaima DHAHRI, Kazunori MATSUMOTO, Keiichiro HOASHI | 102 | 9 | 1625–1634 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Marked Temporal Point Processes for Trip Demand Prediction in Bike Sharing Systems | |||||||||
| Maya OKAWA, Yusuke TANAKA, Takeshi KURASHIMA, Hiroyuki TODA, Tomohiro ... | 102 | 9 | 1635–1643 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Latent Variable Based Anomaly Detection in Network System Logs | |||||||||
| Kazuki OTOMO, Satoru KOBAYASHI, Kensuke FUKUDA, Hiroshi ESAKI | 102 | 9 | 1644–1652 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments | |||||||||
| Haiyan TIAN, Yoshiaki SHIRAISHI, Masami MOHRI, Masakatu MORII | 102 | 9 | 1653–1664 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| A Malicious Web Site Identification Technique Using Web Structure Clustering | |||||||||
| Tatsuya NAGAI, Masaki KAMIZONO, Yoshiaki SHIRAISHI, Kelin XIA, Masami ... | 102 | 9 | 1665–1672 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| A Feasibility Study on the Safety Confirmation System Using NFC and UHF Band RFID Tags | |||||||||
| Shigeki TAKEDA, Kenichi KAGOSHIMA, Masahiro UMEHIRA | 102 | 9 | 1673–1675 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Authentication Scheme Using Pre-Registered Information on Blockchain | |||||||||
| Toshiki TSUCHIDA, Makoto TAKITA, Yoshiaki SHIRAISHI, Masami MOHRI, Yas ... | 102 | 9 | 1676–1678 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||
| Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description | |||||||||
| Shunta NAKAGAWA, Tatsuya NAGAI, Hideaki KANEHARA, Keisuke FURUMOTO, Ma ... | 102 | 9 | 1679–1682 | 2019 | 0.0 | ||||
| 平均評価: 0.0 / 5 (0 件のレビュー) | |||||||||