{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T18:29:06Z","timestamp":1711996146611},"reference-count":19,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,6,1]]},"DOI":"10.1587\/transinf.2019kbp0008","type":"journal-article","created":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T22:09:54Z","timestamp":1590962994000},"page":"1288-1296","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Aware Best-Balanced Multilingual Communication"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Mondheera","family":"PITUXCOOSUVARN","sequence":"first","affiliation":[{"name":"Department of Social Informatics, Kyoto University"}]},{"given":"Takao","family":"NAKAGUCHI","sequence":"additional","affiliation":[{"name":"Kyoto College of Graduate Studies for Informatics"}]},{"given":"Donghui","family":"LIN","sequence":"additional","affiliation":[{"name":"Department of Social Informatics, Kyoto University"}]},{"given":"Toru","family":"ISHIDA","sequence":"additional","affiliation":[{"name":"School of Creative Science and Engineering, Waseda University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] M. Pituxcoosuvarn and T. Ishida, \u201cMultilingual communication via best-balanced machine translation,\u201d New Generation Computing, vol.36, no.4, pp.349-364, Aug. 2018. 10.1007\/s00354-018-0041-7","DOI":"10.1007\/s00354-018-0041-7"},{"key":"2","unstructured":"[2] U.D. of Education, \u201cFamily educational right and privacy act,\u201d 2018."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] G. Anders, F. Siefert, J.P. Stegh\u00f6fer, and W. Reif, \u201cA decentralized multi-agent algorithm for the set partitioning problem,\u201d Int. Conf. Principles and Practice of Multi-Agent Systems, pp.107-121, Springer, 2012. 10.1007\/978-3-642-32729-2_8","DOI":"10.1007\/978-3-642-32729-2_8"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] T. Matsui, M. Silaghi, K. Hirayama, M. Yokoo, and H. Matsuo, \u201cDistributed search method with bounded cost vectors on multiple objective dcops,\u201d Int. Conf. Principles and Practice of Multi-Agent Systems, pp.137-152, Springer, 2012. 10.1007\/978-3-642-32729-2_10","DOI":"10.1007\/978-3-642-32729-2_10"},{"key":"5","unstructured":"[5] R. Greenstadt, J.P. Pearce, and M. Tambe, \u201cAnalysis of privacy loss in distributed constraint optimization,\u201d AAAI, pp.647-653, AAAI, July 2006."},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] M. Yokoo, K. Suzuki, and K. Hirayama, \u201cSecure distributed constraint satisfaction: Reaching agreement without revealing private information,\u201d Int. Conf. Principles and Practice of Constraint Programming, pp.387-401, Springer, 2002. 10.1007\/3-540-46135-3_26","DOI":"10.1007\/3-540-46135-3_26"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] E. Vartiainen, V. Domova, and M. Englund, \u201cExpert on wheels: an approach to remote collaboration,\u201d Proc. 3rd Int. Conf. Human-Agent Interaction, pp.49-54, ACM, 2015.","DOI":"10.1145\/2814940.2814943"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] R. Ishii, S. Kumano, and K. Otsuka, \u201cPrediction of next-utterance timing using head movement in multi-party meetings,\u201d Proc. 5th Int. Conf. Human Agent Interaction, pp.181-187, ACM, Oct. 2017. 10.1145\/3125739.3125765","DOI":"10.1145\/3125739.3125765"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] S. Kimura, H.H. Huang, Q. Zhang, S. Okada, N. Ohta, and K. Kuwabara, \u201cProposal of a model to determine the attention target for an agent in group discussion with non-verbal features,\u201d Proc. 5th Int. Conf. Human Agent Interaction, pp.195-202, ACM, Oct. 2017. 10.1145\/3125739.3125775","DOI":"10.1145\/3125739.3125775"},{"key":"10","unstructured":"[10] Y.K. Jain and S.K. Bhandare, \u201cMin max normalization based data perturbation method for privacy protection,\u201d Int. J. Computer &amp; Communication Technology, vol.2, no.8, pp.45-50, 2011."},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] L. Sweeney, \u201cAchieving k-anonymity privacy protection using generalization and suppression,\u201d Int. J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, no.05, pp.571-588, 2002. 10.1142\/S021848850200165X","DOI":"10.1142\/S021848850200165X"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] T. Yi, M. Shi, and Z. Hong, \u201cPrivacy protection method for test score publishing,\u201d 2015 7th Int. Conf. Information Technology in Medicine and Education (ITME), pp.516-520, IEEE, 2015. 10.1109\/ITME.2015.12","DOI":"10.1109\/ITME.2015.12"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] R.A. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan, \u201cCryptdb: protecting confidentiality with encrypted query processing,\u201d Proc. Twenty-Third ACM Symposium on Operating Systems Principles, pp.85-100, ACM, Oct. 2011. 10.1145\/2043556.2043566","DOI":"10.1145\/2043556.2043566"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] T. Ishida, Y. Murakami, D. Lin, T. Nakaguchi, and M. Otani, \u201cLanguage service infrastructure on the web: the language grid,\u201d Computer, vol.51, no.6, pp.72-81, June 2018. 10.1109\/MC.2018.2701643","DOI":"10.1109\/MC.2018.2701643"},{"key":"15","unstructured":"[15] A. Cambridge, \u201cInternational language standards,\u201d Oct. 2019. Available at http:\/\/www.cambridgeenglish.org\/exams-and-tests\/cefr."},{"key":"16","unstructured":"[16] ETS, \u201cCompare toefl scores,\u201d Oct. 2019. Available at https:\/\/www.ets.org\/toefl\/institutions\/scores\/compare\/."},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] T. Ishida, The language grid: Service-oriented collective intelligence for language resource interoperability, Springer Science &amp; Business Media, 2011. 10.1007\/978-3-642-21178-2","DOI":"10.1007\/978-3-642-21178-2"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] M. Wooldridge, N.R. Jennings, and D. Kinny, \u201cThe gaia methodology for agent-oriented analysis and design,\u201d Autonomous Agents and multi-agent systems, vol.3, no.3, pp.285-312, 2000. 10.1023\/A:1010071910869","DOI":"10.1023\/A:1010071910869"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] J. Wang and Z.A. Kissel, Introduction to network security: theory and practice, John Wiley &amp; Sons, 2015. 10.1002\/9781119113102","DOI":"10.1002\/9781119113102"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/6\/E103.D_2019KBP0008\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,18]],"date-time":"2021-03-18T00:35:12Z","timestamp":1616027712000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/6\/E103.D_2019KBP0008\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,1]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019kbp0008","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,1]]}}}