default search action
CANDAR Workshops 2018: Takayama, Japan
- Sixth International Symposium on Computing and Networking, CANDAR Workshops 2018, Takayama, Japan, November 27-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9184-7
- Guilherme David Branco, Jacir Luiz Bordim:
Employing Genetic Algorithm and Particle Filtering as an Alternative for Indoor Device Positioning. 1-7 - Roman Durikovic, Erich Siebenstich:
A Mass Spring Model for String Simulation with Stress-Strain Handling. 8-14 - Katsunobu Imai, Kyosuke Oroji, Tomohiro Kubota:
A Weakly Universal Three-Dimensional Larger than Life Cellular Automaton. 15-19 - Naoki Kamikawa, Hiroshi Umeo:
A Smaller-State Implementation of Real-Time Sequence Generator for {n^3 | n= 1, 2, 3, ...}. 20-26 - Luidnel Maignan, Jean-Baptiste Yunès:
Generalized FSSP on Two Triangular Tilings. 27-31 - Takahiro Tomita, Jia Lee, Teijiro Isokawa, Ferdinand Peper, Naotake Kamiura, Takayuki Yumoto:
Cellular Automaton Model for Turing Tumble Mechanical Computer. 32-37 - Jia Lee, Ferdinand Peper, Kenji Leibnitz:
Formalization of Asynchronous Cellular Automata Using Asynchronous Protocol for Communications. 38-41 - Temma Ohtani, Eitaro Kohno, Yoshiaki Kakuda:
On Relationship between Timeout and Latency of Connection Re-establishment for Control Packet Loss Scenario in Bluetooth MANETs. 42-46 - Atsushi Takei, Shigetomo Kimura:
Handover Algorithm for Video Communications by Sharing Communication Quality Information of Access Points between Terminals. 47-52 - Haobin Wang, Wei Huangfu, Yaxi Liu, Cheng Gong, Yebing Ren, Wei Liu:
Spatial Feature Aware Genetic Algorithm of Network Base Station Configuration for Internet of Things. 53-58 - Tatsuki Horai, Tomoyuki Ohta, Yoshiaki Kakuda:
Experimental Evaluation of Information Dissemination Scheme Considering Mobile Network Base Station Load in Wireless Networks. 59-62 - Hiroyoshi Ichikawa, Aki Kobayashi:
Experimental Performance Analysis on Autonomous Distributed Collaborative Messaging Protocol. 63-66 - Atsushi Ito, Fu Xiang, Hiroyuki Hatano, Hidetoshi Uchiyama:
A Study on Observing a Lost Child Using BLE Beacons. 67-70 - Yudai Kaneko, Takuya Asaka:
DHT Clustering for Load Balancing Considering Blockchain Data Size. 71-74 - Ryuta Mogi, Taichiro Nakayama, Takuya Asaka:
Load Balancing Method for IoT Sensor System Using Multi-access Edge Computing. 75-78 - Yao Hu, Michihiro Koibuchi:
The Impact of Job Mapping on Random Network Topology. 79-85 - Tamotsu Kawamura, Masaru Fukushi, Yasushi Hirano, Yusuke Fujita, Yoshihiko Hamamoto:
A Network-Based Event Detection Module Using NTP for Cyber Attacks on IoT. 86-91 - Toru Koizumi, Satoshi Nakae, Akifumi Fukuda, Hidetsugu Irie, Shuichi Sakai:
Reduction of Instruction Increase Overhead by STRAIGHT Compiler. 92-98 - Yota Kurokawa, Masaru Fukushi:
XY Based Fault-Tolerant Routing with the Passage of Faulty Nodes. 99-104 - Yasuhiro Nakamura, Hideyuki Kawashima, Osamu Tatebe:
Integrating TicToc with Parallel Logging. 105-111 - Kazuichi Oe, Takeshi Nanri:
Non-volatile Memory Driver for Applying Automated Tiered Storage with Fast Memory and Slow Flash Storage. 112-118 - Hiroki Okada, Takayuki Shiroma, Celimuge Wu, Tsutomu Yoshinaga:
A Color-Based Cooperative Caching Strategy for Time-Shifted Live Video Streaming. 119-124 - Max Plauth, Andreas Polze:
Towards Improving Data Transfer Efficiency for Accelerators Using Hardware Compression. 125-131 - Seiya Shirakuni, Ittetsu Taniguchi, Hiroyuki Tomiyama:
A Case Study on Memory Architecture Exploration for Manycores on an FPGA. 132-137 - Takeo Ueki, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:
AQSS: Accelerator of Quantization Neural Networks with Stochastic Approach. 138-144 - Tomoaki Ukezono:
An Error Corrector for Dynamically Accuracy-Configurable Approximate Adder. 145-151 - Masao Yamamoto, Kohta Nakashima, Toshihiro Yamauchi, Akira Nagoya, Hideo Taniguchi:
Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines. 152-158 - Ke Cui, Michihiro Koibuchi:
Performance Evaluation of Collective Communication on Random Network Topology. 159-162 - Hiroki Fujita, Naoki Fujieda, Shuichi Ichikawa:
An Analysis on Randomness of Path ORAM for Light-Weight Implementation. 163-165 - Masahiro Hasegawa, Jubee Tada:
An Adaptive Demotion Policy with Considering Temporal Locality. 166-169 - Sheng-Ta Hsieh, Chun-Ling Lin:
Detection and Parameter Estimation of R Peaks in ECG Signal Using Optimization Algorithm. 170-173 - Sheng-Ta Hsieh, Chun-Ling Lin, Hao-Wen Cheng:
Adaptive Artificial Bee Colony for Numerical Optimization. 174-177 - Ushio Jimbo, Ryota Shioya, Masahiro Goshima:
Application of Timing Fault Detection to Rocket Core on FPGA. 178-181 - Naoya Niwa, Tomohiro Totoki, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano:
An Trace-Driven Performance Prediction Method for Exploring NoC Design Optimization. 182-185 - Miguel Zenon Nicanor Lerias Saavedra, William Emmanuel Yu:
Towards Large Scale Packet Capture and Network Flow Analysis on Hadoop. 186-189 - Goktug Inal, Gurhan Kucuk:
Application of Machine Learning Techniques on Prediction of Future Processor Performance. 190-195 - Kyeong Soo Kim:
Hybrid Building/Floor Classification and Location Coordinates Regression Using A Single-Input and Multi-Output Deep Neural Network for Large-Scale Indoor Localization Based on Wi-Fi Fingerprinting. 196-201 - Hiroto Kizuna, Hiroyuki Sato:
Accelerating Facial Detection for Improvement of Person Identification Accuracy in Entering and Exiting Management System. 202-208 - Naoki Matsumura, Hiroki Tokura, Yuki Kuroda, Yasuaki Ito, Koji Nakano:
Tile Art Image Generation Using Conditional Generative Adversarial Networks. 209-215 - Truong Thao Nguyen, Mohamed Wahib, Ryousei Takano:
Hierarchical Distributed-Memory Multi-Leader MPI-Allreduce for Deep Learning Workloads. 216-222 - Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation. 223-227 - Zhenghang Zhong, Zhe Tang, Xiangxing Li, Tiancheng Yuan, Yang Yang, Meng Wei, Yuanyuan Zhang, Renzhi Sheng, Naomi Grant, Chongfeng Ling, Xintao Huan, Kyeong Soo Kim, Sanghyuk Lee:
XJTLUIndoorLoc: A New Fingerprinting Database for Indoor Localization and Trajectory Estimation Based on Wi-Fi RSS and Geomagnetic Field. 228-234 - Kei Takahashi, Takumi Numajiri, Masaru Sogabe, Katsuyoshi Sakamoto, Koichi Yamaguchi, Tomah Sogabe:
Development of Generic CNN Deep Learning Method Using Feature Graph. 235-238 - Hirobumi Tominaga, Asuka Nakamura, Yoshitaka Maekawa:
Evaluation of EMVA Using the Instruction-Level Parallelism on Tegra X1. 239-242 - Kazunori Mikami, Kenji Ono, Jorji Nonaka:
Performance Evaluation and Visualization of Scientific Applications Using PMlib. 243-249 - Hitoshi Murai, Mitsuhisa Sato, Masahiro Nakao, Jinpil Lee:
Metaprogramming Framework for Existing HPC Languages Based on the Omni Compiler Infrastructure. 250-256 - Kenya Yamada, Takahiro Katagiri, Hiroyuki Takizawa, Kazuo Minami, Mitsuo Yokokawa, Toru Nagai, Masao Ogino:
Preconditioner Auto-Tuning Using Deep Learning for Sparse Iterative Algorithms. 257-262 - Hideo Matsufuru, Kohsuke Sumiyoshi:
Accelerating Numerical Simulations of Supernovae with GPUs. 263-266 - Guillaume Carel, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Shunsuke Araki:
Design of a Message Authentication Protocol for CAN FD Based on Chaskey Lightweight MAC. 267-271 - Kazuki Hazama, Hiroyuki Ebara:
Branch and Bound Algorithm for Parallel Many-Core Architecture. 272-277 - Sayaka Kamei, Hirotsugu Kakugawa:
Self-Stabilizing Algorithm for Dynamically Maintaining Two Disjoint Dominating Sets. 278-284 - Yonghwan Kim, Junya Nakamura, Yoshiaki Katayama, Toshimitsu Masuzawa:
A Cooperative Partial Snapshot Algorithm for Checkpoint-Rollback Recovery of Large-Scale and Dynamic Distributed Systems. 285-291 - Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami:
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage. 292-297 - Wilbert Jethro Limjoco, Nestor Michael C. Tiglao:
An Analytical Model of Energy-Aware RPL for Wireless Sensor Networks. 298-304 - Makoto Miyazaki, Susumu Matsumae:
A Pipeline Implementation for Dynamic Programming on GPU. 305-309 - Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:
Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer. 310-315 - Alexander Yakubov, Wazen M. Shbair, Radu State:
BlockPGP: A Blockchain-Based Framework for PGP Key Servers. 316-322 - Asuka Nakamura, Hirobumi Tominaga, Yoshitaka Maekawa:
Evaluation of Hierarchical Pincers Attack Search on Distributed Memory Systems. 323-326 - Donghong Qin, Lina Ge, Ting Lv:
Incentive Driving Multipath Inter-Domain Routing. 327-330 - Mahdillah Mahdillah, Shinya Nakayama, Qian Zhao, Takaichi Yoshida:
An Adaptable Scheduling for Self-Reconfigurable Objects. 331-336 - Hiroshi Michizu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
Energy Balancing by Wireless Energy Transfer in Sensor Networks. 337-343 - Hideki Mori:
Fault Tolerance of Small World Network Architecture. 344-349 - Daiki Ojima, Minoru Uehara, Takashi Mihara:
Optimization of Delivery Considering Redelivery and Loading Methods. 350-355 - Hideki Shimura, Hiroyuki Noda, Hideharu Amano:
C4: An FPGA-based Compression Algorithm for ExpEther. 356-362 - Tomohiro Totoki, Michihiro Koibuchi, Hideharu Amano:
An Extension of A Temperature Modeling Tool HotSpot 6.0 for Castle-of-Chips Stacking. 363-369 - Weibin Wang, Minoru Uehara, Haruo Ozaki:
System Optimum Traffic Assignment for Connected Cars. 370-375 - Yoshiomi Otsuka, Toshiya Aramaki:
Application of an Online Questionnaire to Secure the Diversity of Planungszelle Participant Attributes. 376-379 - Ryusei Saka, Minoru Uehara:
Implementations of Droplets in Managed Network Blocks. 380-382 - Jubee Tada:
A Cache Replacement Policy with Considering Global Fluctuations of Priority Values. 383-386 - Motoi Yamagiwa, Minoru Uehara:
Development of Eco Volunteer Computing System. 387-390 - Tomoki Agematsu, Satoshi Obana:
How to Realize Highly Accurate Computation with Fully Homomorphic Encryption. 391-397 - Yuya Ban, Toshihiro Yamauchi:
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory. 398-404 - Junta Imai, Mamoru Mimura, Hidema Tanaka:
Verifiable Secret Sharing Scheme Using Hash Values. 405-409 - Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Atsushi Suda:
A Construction of Cramer-Shoup Like Encryption Protocols Based on the Anshel-Anshel-Goldfeld Key Exchange Protocol. 410-416 - Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai:
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding. 417-423 - Mamoru Mimura:
On the Effectiveness of Extracting Important Words from Proxy Logs. 424-430 - Hiroya Miura, Mamoru Mimura, Hidema Tanaka:
Discovering New Malware Families Using a Linguistic-Based Macros Detection Method. 431-437 - Motoki Miyano, Satoshi Obana:
Updatable Searchable Symmetric Encryption with Fine-Grained Delete Functionality. 438-444 - Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami:
Consideration of Efficient Pairing Applying Two Construction Methods of Extension Fields. 445-451 - Hiroki Ogawa, Eiji Takimoto, Koichi Mouri, Shoichi Saito:
User-Side Updating of Third-Party Libraries for Android Applications. 452-458 - Magdalena Payeras-Capellà, Macià Mut Puigserver, Miquel Angel Cabot-Nadal:
Smart Contract for Multiparty Fair Certified Notifications. 459-465 - Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko:
A New Higher Order Differential of FeW. 466-471 - Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Neural Cryptography Based on the Topology Evolving Neural Networks. 472-478 - Ryuga Matsumura, Takeshi Sugawara, Kazuo Sakiyama:
A Secure LiDAR with AES-Based Side-Channel Fingerprinting. 479-482 - Yuji Suga:
Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" Issues. 483-485 - Masahiro Arai, Fumiko Akagi, Saneyasu Yamaguchi, Kazuetsu Yoshida:
Improving Performance of Transposition Algorithm of 3-D Data Array for Parallelization Using Message Passing Interface. 486-490 - Tomoya Arakawa, Shun Shiramatsu, Akira Iwata:
Wandering Path Visualization System Prototype for Finding Wandering Elderly People Using BLE Beacon. 491-495 - Hideo Inagaki, Ryota Kawashima, Hiroshi Matsuo:
Improving Apache Spark's Cache Mechanism with LRC-Based Method Using Bloom Filter. 496-500 - Kengo Jingu, Kohta Shigenobu, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota:
An Implementation of LLVM Pass for Loop Parallelization Based on IR-Level Directives. 501-505 - Joichiro Kon, Gil Jae Lee, José A. B. Fortes, Saneyasu Yamaguchi:
A Kernel-Based Method for Resolving Performance Inefficiencies in Mining Frequent-Patterns in Encrypted Data. 506-510 - Kuan-Chu Lu, I-Hsien Liu, Jung-Shian Li:
Venerability and Protection Tool Surveys of Industrial Control System. 511-515 - Makoto Nakagami, Joichiro Kon, Gil Jae Lee, José A. B. Fortes, Saneyasu Yamaguchi:
File Placing Location Optimization on Hadoop SWIM. 516-519 - Takafumi Miyazaki, Hayato Hidari, Naohisa Hojo, Ittetsu Taniguchi, Hiroyuki Tomiyama:
Revisiting Thread Execution Methods for GPU-Oriented OpenCL Programs on Multicore Processors. 520-523 - Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems. 524-528 - Joji Toshima, Akiko Takahashi:
Design of an Incentive Decision Method for an Agriculture Information Sharing System. 529-533 - Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Tracing MIRAI Malware in Networked System. 534-538 - Yuta Yamada, Satoshi Fujita:
Load Balancing in P2P Video Streaming Systems with Service Differentiation. 539-543 - Bin Zhang, Masahide Kaneko, Hunok Lim:
Robust Mapping for the Autonomous Mobile Robot Considering Potential Occupied Spaces of Objects. 544-548 - Chih-Min Chao, Wei-Che Lee, Cong-Xiang Wang, Shin-Chung Huang, Yu-Chich Yang:
A Flexible Anti-Jamming Channel Hopping for Cognitive Radio Networks. 549-551 - Hiroya Ikeda, Hiroki Yamane, Yuki Shibayama, Mutsumi Kimura, Yasuhiko Nakashima:
Evaluation of Letter Reproduction System Using Cellular Neural Network and Oxide Semiconductor Synapses by Logic Simulation. 552-554 - Masato Kitou, Takahiro Sasaki, Kazuhiko Ohno:
Performance Evaluation of Dynamic Cell Allocation Cache Using Cycle Accurate Simulator. 555-557 - Ting Lv, Donghong Qin, Lina Ge:
Research and Analysis of Statistical Characteristics of Internet Exchange Points. 558-560 - Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
A New Design for Evaluating Moving Target Defense System. 561-563 - Yusuke Sato, Masato Oguchi, Saneyasu Yamaguchi:
Mobile Application Aware Smartphone CPU Clock Frequency Optimization. 564-566
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.