


default search action
12th CANDAR 2024: Naha, Japan
- Twelfth International Symposium on Computing and Networking, CANDAR 2024, Naha, Japan, November 26-29, 2024. IEEE 2024, ISBN 979-8-3315-2836-2
- Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa:
Group Signatures with Designated Traceability over Openers' Attributes from Lattices. 1-10 - Fumikatsu Anaguchi, Sudesna Chakraborty, Takeshi Morita, Shusaku Egami, Takanori Ugai, Ken Fukuda:
Reasoning and Justification System for Domestic Hazardous Behaviors Based on Knowledge Graph of Daily Activities and Retrieval-Augmented Generation. 11-20 - Hang Cui, Keichi Takahashi, Hiroyuki Takizawa:
DRAS-OD: A Reinforcement Learning based Job Scheduler for On-Demand Job Scheduling in High-Performance Computing Systems. 21-29 - Yojiro Harie, Yuto Ogata, Bishnu Prasad Gautam, Katsumi Wasaki:
CodoMo: Python Model Checking to Integrate Agile Verification Process of Computer Vision Systems. 30-38 - Kodai Hayashida, Atsuko Miyaji:
Message and Order Flexible Pairing based Multisignature. 39-48 - Shuhei Ippa, Takao Okubo, Masaki Hashimoto:
An Analysis of Relationship Between Social Bots and Echo Chambers on X in Modern Japan. 49-58 - Ryota Koda, Keichi Takahashi, Hiroyuki Takizawa, Nozomu Ishiguro, Yukio Takahashi:
Real-Time Phase Retrieval Using On-the-Fly Training of Sample-Specific Surrogate Models. 59-66 - Keyang Liu, Tsuyoshi Takagi:
A Transparent Zero-Knowledge Dual Membership Set Commitment based on Perfect Hash Function. 67-76 - Ben Lloyd-Roberts, Filippos Pantekis, Phillip James, Liam O'Reilly, Michael Edwards:
Effective Candidate Invariant Generation Using GPGPUs and Optimisations. 77-86 - Karin Onouchi, Masayuki Sato, Hiroe Iwasaki, Kazuhiko Komatsu, Hiroaki Kobayashi:
Adaptive Parallelization based on Frame-level and Tile-level Parallelisms for VVC Encoding. 87-95 - Victor Parque:
A Hierarchical Heuristic for Clustered Steiner Trees in the Plane with Obstacles. 96-105 - Ryosei Shimanuki, Hiroshi Hosobe:
A Machine Learning Based Method for Rating Adversarial Board Games. 106-114 - Kanta Suzuki, Yasuaki Ito, Haruto Fujii, Nobuya Yokogawa, Satoki Tsuji, Koji Nakano, Akihiko Kasagi:
GPU Acceleration of Head-Gordon-Pople Algorithm. 115-124 - Senri Yoshikawa, Shuji Sannomiya, Makoto Iwata, Hiroaki Nishikawa:
FPGA-oriented Two-phase Bundled-data Circular Self-timed Pipeline. 125-134 - Chunlu Chen, Zhuotao Lian, Chunhua Su, Kouichi Sakurai:
Evaluating Differential Privacy in Federated Continual Learning: A Catastrophic Forgetting-Performance Tradeoff Analysis. 135-141 - Ayumu Chiba, Shuichi Ichikawa:
Random Number Generation Based on Cryptocurrency Prices and Linear Feedback Shift Register. 142-148 - Kyohei Fujiwara, Ryotaro Kobayashi, Masahiko Kato:
Hardware Mechanism for Detecting Malicious Communication in IoT Devices by using Time-Series Processor Information. 149-155 - Masashi Kurahashi, Najd Salaani, Tsuyoshi Migita, Norikazu Takahashi:
Depth-First Search Algorithms for Algebraic Connectivity Maximizing Regular Graphs. 156-161 - Zaku Kusunoki, Shuai Jiang, Shengzhe Hou, Sayaka Kamei, Yasuhiko Morimoto:
CaT: A Category-oriented Transformer for Text and Sentiment Analysis in Japanese Hotel Overall Ratings Prediction. 162-168 - Haowen Li, Rina Onishi, Hideyuki Kawashima:
Serval: A Wait-free Multi-version Deterministic Concurrency Control Scheme. 169-175 - Yoshiki Matsuda, Kenichi Takahashi, Masayuki Higashino, Takao Kawamura:
Analysis of API calls with 'A' and 'W' suffixes used in parent and child processes for ransomware detection. 176-182 - Yuta Minato, Takeshi Masumoto, Hiroshi Koide:
A System Call Moving Target Defense for Binary Injections. 183-189 - Naoki Murakami, Naoto Hiramatsu, Hiroki Kobayashi, Shuichi Akizuki, Manabu Hashimoto:
DC-PaDiM: Fast Anomaly Detection based on Effective Feature Dimension-Compression. 190-195 - Wataru Nakamura, Kenta Takahashi:
How to Efficiently Determine the Lattice Scale for Fuzzy Extractors and Fuzzy Signatures. 196-202 - Toru Nakanishi, Masanori Tani, Teruaki Kitasuka:
Decentralized Attribute-Based Credentials with Short Attribute Proofs from DualRing. 203-209 - Victor Parque:
A Hybrid Evolutionary Approach for Multi Robot Coordinated Planning at Intersections. 210-216 - Chenglong Shao, Tongyang Xu, Qinghe Du:
Toward Collision-Free LoRaWAN Communication under the Coexistence with Wi-Fi Networks. 217-223 - Akihiro Shioda, Ángel López García-Arias, Hikari Otsuka, Yuki Ichikawa, Yasuyuki Okoshi, Kazushi Kawamura, Thiem Van Chu, Daichi Fujiki, Masato Motomura:
Exploiting N:M Sparsity in Quantized-Folded ResNets: Signed Multicoat Supermasks and Iterative Pruning-Quantization. 224-230 - Vu Trung Duong Le, Anh Kiet Pham, Hoai Luan Pham, Tuan Hai Vu, Yasuhiko Nakashima:
PESA: Power-Efficient SPHINCS+ Accelerator for Multi-Domain Security Applications on FPGA SoC. 231-237 - Vu Tuan Hai, Vu Trung Duong Le, Pham Hoai Luan, Yasuhiko Nakashima:
Benchmarking Classical and Quantum Optimizers for Quantum Simulator. 238-244 - Yuki Ueki, Katsuya Nishijima, Nobutaka Kawaguchi, Tomohiro Shigemoto, Tateki Harada:
Ransomware detection using write data obtained from I/O Request Packets. 245-251 - Hitoaki Uetani, Yasuhiko Nakashima:
Implementation and Evaluation of LLM on a CGLA. 252-258 - Chenzhang Xia, Yuan Wang, Koji Inoue:
Multithreaded Edge-Assisted Visual SLAM with Keyframe Backup Mechanism. 259-265 - Cheng Xu, Yirong Kan, Renyuan Zhang, Yasuhiko Nakashima:
An FPGA-Oriented Quantization Approach for Vision Transformer with LUT-Friendly Operations. 266-271 - Akira Yamazawa, Tsutomu Itou, Kazutoshi Suito, Nobuyuki Yamasaki:
Context Cache for Multicore RISC-V Processor. 272-278 - Tomonari Yoshida, Tomonobu Ozaki:
Retrieving similar partial trajectories in soccer games considering surrounding player movements. 279-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.