![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
12th CANDAR 2024: Naha, Japan - Workshops
- Twelfth International Symposium on Computing and Networking, CANDAR 2024 - Workshops, Naha, Japan, November 26-29, 2024. IEEE 2024, ISBN 979-8-3315-0534-9
- Atsuki Hara, Hiroyasu Obata, Chisa Takano:
A Dynamic Splitting TCP Using both Packet Loss Rate and Latency. 1-7 - Xinwei Liu, Satoshi Fujita:
Resilient Pub/Sub Multicast in Dynamic MANETs with High Node Mobility. 8-14 - Momoka Mizuno, Shigetomo Kimura:
A Flow Distribution Algorithm with Segment Routing for Software-Defined Networking. 15-21 - Shoya Obayashi, Tomoyuki Ohta:
Information Sharing Scheme Using AoI for DTN-based Evacuation Systems and Its Evaluation. 22-27 - Yuki Maeda, Tomoyuki Ohta:
A UDP-based Data Transmission Scheme Considering Transfer Time for Wireless Multihop Networks and Its Evaluation. 28-31 - Tomonori Taniguchi, Hiroyasu Obata, Chisa Takano, Masaki Aida:
Characteristic Analysis of SNS Videos for Detection of Flaming Using Sentiment Analysis and Principal Component Analysis. 32-35 - Yutaro Bessho, Hideyuki Kawashima:
Fast Hybrid Transactional Index with Scalable Phantom Avoidance. 36-42 - Alessandro Cordeiro de Lima, Eduardo A. P. Alchieri, Jacir Luiz Bordim, João J. C. Gondim:
An Improved Method for Detecting EDoS Attacks in the Cloud With Hyperparameter Optimization and Metaheuristic Algorithms. 43-49 - Naoki Fujieda, Naoya Ito:
A case for edge video processing with FPGA SoC: reversi board detection using Hough transform. 50-55 - Keisuke Honda, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:
Hardware Acceleration of Underwater Image Color Restoration Algorithm. 56-62 - Haruka Hori, Masato Oguchi:
A Study of Blockchain-Based Metadata Management and Its Use for Data Verification. 63-68 - Mariama Mbow, Takeshi Takahashi, Kouichi Sakurai:
Poisoning Attacks on Federated-learning based NIDS. 69-75 - Kaname Sato, Nobuyuki Yamasaki:
A Learning-based Control Scheme for Prioritized SMT Processor. 76-82 - Kenta Takabayashi, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:
A Study of the Periodic Performance Degradation of Flash Memory Write Operations in Smartphones. 83-89 - Haolin Ye, Celimuge Wu, Tsutomu Yoshinaga:
A Comparative Study between FPGA and DSP for the Efficient Implementation of FIR Filters. 90-95 - Souma Yoneda, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:
FPGA Implementation of a Pipelined XMSS Leaf Accelerator. 96-102 - Takuto Ando, Yusuke Inoue:
Facial Expression Recognition System Using DNN Accelerator with Multi-threading on FPGA. 103-109 - Van Duy Tran, Tran Xuan Hieu Le, Thi Diem Tran, Hoai Luan Pham, Vu Trung Duong Le, Tuan Hai Vu, Van Tinh Nguyen, Yasuhiko Nakashima:
Exploring the Limitations of Kolmogorov-Arnold Networks in Classification: Insights to Software Training and Hardware Implementation. 110-116 - Hideyuki Kawashima:
Hippo: Accelerating Transaction Processing for Approximate Query Processing Engine with Sampling Semantics. 117-122 - Masafumi Koike, Masako Saito, Atsushi Ito, Katsuhiko Hibino:
Hammering Tests of Tiles Fixed with Organic Adhesives with the aid of Machine Learning. 123-129 - Yohei Kojima, Ryu Kazama, Hirotake Abe, Chunghan Lee:
RNN-based Congestion Control in the Linux Kernel. 130-136 - Kentaro Machida, Soma Asuka, Tomomi Osaka, Fumikazu Watanabe, Hironori Nakajo:
Matthiola incana classification using CNN and class activation maps for model understanding. 137-143 - Fumiya Mitsuji, Sudesna Chakraborty, Takeshi Morita, Shusaku Egami, Takanori Ugai, Ken Fukuda:
Entity Linking for Wikidata using Large Language Models and Wikipedia Links. 144-149 - Yushi Ogiwara, Hideyuki Kawashima:
Sparse Ternary Matrix Multiplication with Tensor Core for Transformer. 150-156 - Koki Sugioka, Sayaka Kamei, Yasuhiko Morimoto:
BERT Pre-training for Cooking Time Prediction from Cooking Recipes. 157-162 - Nobuya Yokogawa, Yasuaki Ito, Satoki Tsuji, Haruto Fujii, Kanta Suzuki, Koji Nakano, Akihiko Kasagi:
Parallel GPU Computation of Nuclear Attraction Integrals in Quantum Chemistry. 163-169 - Jun Kato, Airi Mita, Keita Gobara, Akihiro Inokuchi:
Deep Graph Attention Networks. 170-174 - Hiroki Takahashi, Tomonobu Ozaki:
Recommendation of dinner menu sequences for small groups considering individual preferences and their lunch menu sequences. 175-178 - Nobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh, Munehiro Tanaka:
Estimating tomato plant leaf area in greenhouse environment using multiple RGB-D cameras. 179-182 - Paola Flocchini, Debasish Pattanayak, Francesco Piselli, Nicola Santoro, Yukiko Yamauchi:
Asynchronous Separation of Unconscious Colored Robots. 183-189 - Shuma Ohara, Kazuhiro Saito, Hideyuki Kawashima:
Evaluation of QAOA for black-box serializability problem. 190-196 - Tatsuyoshi Ohmura, Keichi Takahashi, Ryusuke Egawa, Hiroyuki Takizawa:
A QA-Assisted Job Scheduler for Minimizing the Impact of Urgent Computing on HPC System Operation. 197-203 - Yashdeep Singh, Sushanta Karmakar:
Bounded unpopularity matching in a (3, 3)-hypergraph with one-sided preferences. 204-210 - Satoki Tsuji, Yasuaki Ito, Haruto Fujii, Nobuya Yokogawa, Kanta Suzuki, Koji Nakano, Akihiko Kasagi:
Dynamic Screening of Two-Electron Repulsion Integrals in GPU Parallelization. 211-217 - Shunsuke Tsukiyama, Koji Nakano, Yasuaki Ito, Takumi Kato, Yuya Kawamata:
Breaking SHA-1 through QUBO models. 218-224 - Yifan Wei, Haozhe Sun, Xuyang Pan, Shengye Hu, Zhe Tang, Taoyu Wu, Sihao Li, Kyeong Soo Kim, Limin Yu, Jeremy S. Smith:
AGV-Assisted Construction of Dynamic Wi-Fi Fingerprint Databases for Indoor Localization. 225-231 - Aoi Kida, Hideyuki Kawashima:
Making Simplified SMR Protocol Tolerant to Partial Network Partitions. 232-235 - Reo Ueno, Akihiro Fujiwara:
An asynchronous P system with improved branch and bound for solving the minimum Steiner tree. 236-239 - Ryunosuke Amano, Kazuo Sakiyama, Daiki Miyahara, Yang Li:
LoS Trick: Countermeasure against CPA for DNN Models Using Loss of Significance in Multiply-Accumulate Operations. 240-246 - Masakazu Awakiahra, Keiji Yoshimoto, Shota Kanzawa, Akane Miyoshi, Yasuyuki Nogami, Yuta Kodera:
Proposal and Evaluation for Efficient splitfft and mergefft in FALCON. 247-251 - Mathieu de Goyon, Atsuko Miyaji:
Isogeny-based Proxy Signature. 252-258 - Issei Hayashi, Masahiko Kato, Ryotaro Kobayashi:
Updatable Decision Tree in Malware Detection Hardware Using Processor Information. 259-265 - Yixuan He, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
NUSS:Non-Interactive Updatable of Secret Sharing Schemes Using Homomorphic Encryption. 266-271 - Akira Kanaoka, Masayuki Okada:
Alter Ego: Identifying Web Server Certificates Containing IP Addresses As Subjects. 272-278 - Hideaki Miyaji, Noriaki Kamiyama:
Privacy-preserving efficient M+1st-price sealed bid auction in cross-chain communication. 279-285 - Kosei Okumura, Ryotaro Kobayashi:
Reducing Testing Time in Penetration Test Automation by Using EPSS and Parallelization. 286-292 - Mirang Park, Zhaolin Chang, Shotaro Usuzaki, Kentaro Aburada, Naonobu Okazaki:
Proposal and Evaluation of a Gaze Authentication Method that Combines Image Selection and Eye Movement Trajectory Features. 293-299 - Taku Sudo, Ryotaro Kobayashi, Masahiko Kato:
Small-Scale Implementation of a Hardware Detector for Malicious Communications and Malware Targeting the IoT. 300-306 - Nobuyuki Sugio:
Implementation of Cryptanalytic Program for ASCON Using ChatGPT. 307-313 - Ye Xu, Takashi Nishide:
Verifiable Homomorphic Secret Sharing for SIMD Operations. 314-320 - Rosa Pericàs-Gornals, María Magdalena Payeras Capellà, Macià Mut Puigserver, Jaume Ramis-Bibiloni:
Two-step Contract Signing Protocol. 321-324 - Yusuke Fukasawa, Kazuhiko Komatsu, Masayuki Sato, Saori Maki-Yonekura, Hirofumi Kurokawa, Koji Yonekura, Hiroaki Kobayashi:
A Graph-based Molecular Structure Identification Method via Feature Extraction for Three-dimensional Electron Diffraction Data. 325-329 - Toshiya Kanai, Toshikazu Samura, Yota Kurokawa, Masaru Fukushi:
GPU Acceleration of Synthetic Image Generation Using Multi-temporal and Single-polarized SAR Images. 330-334 - Shota Matsumura, Hiroyuki Hatano, Kosuke Sanada, Kazuo Mori:
Satellite Selection Method by Multiple Receivers on Vehicles for Improving Inter-vehicle Distance Estimation with Local DGNSS. 335-339 - Masaya Murai, Takahiro Sasaki:
PTWT: A reduction technique of page table walking. 340-344 - Satoki Nagao, Kanemitsu Ootsu, Takashi Yokota:
A Translation Method from 64-bit ARM Machine Code to LLVM IR for Binary-Level Optimization. 345-349 - Masaya Okabe, Hiroshi Tsunoda:
An eBPF-based packet capture system with embedded application metadata for network forensics. 350-354 - Shunsuke Okawa, Saneyasu Yamaguchi:
A Performance Study on Rust and C Programs. 355-359 - Haruhiro Tanaka, Takahiro Sasaki:
Extended VLIW Processor Based on RISC-V Compressed Instruction Set. 360-364 - Kozo Tanigawa, Masaru Shiozuka, Kenichi Takahashi:
Reduction of Agents Based on Appearance Probability for Agent-based Human Tracking System. 365-369 - Yuta Uehara, Susumu Matsumae:
Effect of Integrating Variational Autoencoder with SENet on Dimensionality Reduction in Driving Behavior Learning. 370-374 - Yang Jie, Yuta Kodera, Samsul Huda, Yasuyuki Nogami:
A Study of Layer-2 Consortium Blockchain with zk-SNARKs for Medical Information Management. 375-379 - Zhe-Ming Zhang, Chih-Min Chao:
Enhanced Source Location Privacy for Energy Efficiency in Underwater Wireless Sensor Networks. 380-384 - Makoto Eguchi, Nobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh:
Bicycle-based collision prevention system using pedestrian trajectory prediction with an iPhone. 385-387 - Daiki Inoue, Tomonobu Ozaki:
Preliminary Study of Named Entity Recognition Techniques in Japanese Light Novels. 388-390 - Nobuya Ishihara, Yuta Kodera, Samsul Huda, Tanoshimaru Isokawa, Yasuyuki Nogami:
An Implementation of USB-Enabled Network Isolation for Remote IoT Security Exercises. 391-393 - Toyoki Kosuda, Morikazu Nakamura, Tadashi Shiroma, Takayuki Nakachi:
Multi-objective Quantum Optimization based on Bayesian Approach for Computing Resource Assignment Problems. 394-396 - Kuan-Ting Liu, Jui-Chih Chang, Jeen-Shing Wang:
Automated Model Generation for Arteriovenous Shunt Stenosis Detection Using Machine Learning Algorithms. 397-399 - Ryuki Mutsu, Kosei Kishimoto, Hiroshi Okumura, Wen Liang Yeoh, Osamu Fukuda, Masatomo Miura, Sakiko Kimura, Nobuhiko Yamaguchi:
Machine learning prediction of drug dynamics in dasatinib. 400-402 - Andrea Rosà, Matteo Basso, Walter Binder:
Analyzing the Vectorization Capability of the Java Vector API. 403-405 - Po-I Shen, De-Syuan Huang, Jeen-Shing Wang, Ya-Ting C. Yang:
AI-Based Multi-Objective Optimization Algorithm for Intelligent School Lunch Menu Planning System. 406-408 - Ryota Uechi, Morikazu Nakamura, Tadashi Shiroma, Takayuki Nakachi:
Petri net-based QUBO Model Formulation for Multi-Resource Flow-Shop Scheduling Problems. 409-411
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.