default search action
9th CANDAR 2021: Matsue, Japan - Workshops
- Ninth International Symposium on Computing and Networking, CANDAR 2021 - Workshops, Matsue, Japan, 23-26 November 2021. IEEE 2021, ISBN 978-1-6654-1218-6
- Shogo Amita, Akihiro Fujihara:
A Performance Evaluation of Vehicular Swarm Intelligence for Seamless Route Guidance using Opportunistic Networking. 1-7 - Hiroto Fujita, Yasuyuki Tanaka, Kosuke Mori, Fumio Teraoka:
Efficient RPL Tree Construction Using Passive Link Quality Estimation. 8-14 - Tsubasa Fukumura, Hayato Aratame, Atsushi Ito, Masafumi Koike, Katsuhiko Hibino, Yoshihisa Kawamura:
Improvement of Sound Classification Method on Smartphone for Hammering Test Using 5G Network. 15-20 - Kobayashi Kakeru, Satoshi Fujita:
An Enhancement of Physical Web with Stateful BLE Beacons. 21-27 - Yuko Ikeda, Hiroyasu Obata, Kenji Ishida:
Performance Evaluation of Information Floating with Limited Expiration Time in Terms of Information Reception Time and Error Diffusion Rate. 28-34 - Haruki Ishizaki, Eitaro Kohno, Yoshiaki Kakuda:
On the Suppression of Loops with Long Hops During Scatternet Configuration in Bluetooth MANETs. 35-41 - Hiroyasu Obata, Chisa Takano:
Switching Method of Media Access Control for Improving Fairness of Throughput between WLAN systems under Adjacent Channel Interference. 42-48 - Shuichi Tokunaga, Satoshi Ohzahata, Ryo Yamamoto:
A Link State Routing Method for CCN with Blockchain. 49-55 - Masami Yoshida, Alberto Gallegos Ramonet, Taku Noguchi:
Adaptive Network Coding Broadcasting based on Node Mobility in Mobile Ad-hoc Networks. 56-61 - Jun Zhou, Masaaki Kondo:
A Lightweight Interactive Graph Processing Library for Edge Computing in Smart Society. 62-68 - Fatema Akhter, Sun Yuanshuai, Nobuo Funabiki, Hendy Briantoro, Kwenga Ismael Munene, Md. Mahbubur Rahman:
Feasibility Investigations of Access-Point Transmission Power Optimization Method under Co-use of Channel Bonding and Non Channel Bonding in Wireless Local-Area Network. 69-72 - Takuya Mizushiro, Teruaki Kitasuka:
Porting Caching Functions to Named Data Networking Forwarding Daemon (NFD). 73-76 - Haruka Yoshimoto, Kazuki Sakai, Yuko Hiramatsu, Atsushi Ito:
Building a sensor network to measure drivers' emotions. 77-80 - Naoki Fujieda:
A Python-based evaluation framework for stochastic computing circuits on FPGA SoC. 81-86 - Jixin Han, Tomofumi Yuki, Michelle Mills Strout, Dan Umeda, Hironori Kasahara, Keiji Kimura:
Parallelizing Compiler Translation Validation Using Happens-Before and Task-Set. 87-93 - Yunjiao Ma, Yuan He, Yasutaka Wada, Wenchao Luo, Ryuichi Sakamoto, Masaaki Kondo:
Mitigating Process Variations with Cooperative Tuning for Performance and Power through a Simple DSL. 94-100 - Akiyuki Mamiya, Nobuyuki Yamasaki:
Data Rearrange Unit for Efficient Data Computation in Embedded Systems. 101-106 - Yuta Masuda, Yasuhiro Nakahara, Motoki Amagasaki, Masahiro Iida:
Automatic executable code generation for DNN accelerator ReNA. 107-113 - Reon Oshio, Atsushi Sawada, Mutsumi Kimura, Renyuan Zhang, Yasuhiko Nakashima:
Preliminary Evaluation for Multi-domain Spike Coding on Memcapacitive Neuromorphic Circuit. 114-119 - Daiki Saito, Takahiro Hirofuchi, Hiroko Arai, Yukinori Sato:
A simulation of a memory subsystem using a highly energy-efficient but erroneous MRAM. 120-126 - Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:
Performance Study of Kotlin and Java Program Considering Bytecode Instructions and JVM JIT Compiler. 127-133 - Van-Cam Nguyen, Yasuhiko Nakashima:
Analysis of Fully-Pipelined CNN Implementation on FPGA and HBM2. 134-137 - Ranyelson Neres Carvalho, Lucas Rodrigues Costa, Jacir Luiz Bordim, Eduardo A. P. Alchieri:
Detecting DDoS Attacks on SDN Data Plane with Machine Learning. 138-144 - Jiamian Huang, Yasuaki Ito, Koji Nakano:
A GPU Implementation of Watercolor Painting Image Generation. 145-151 - Tomohiro Ishigami, Teijiro Isokawa, Naotake Kamiura, Hiroki Masumoto, Hitoshi Tabuchi:
Instillation Checking Using Long Short-Term Memories for Ophthalmology Patients. 152-158 - Kota Matsuyama, Tomonobu Ozaki:
Heuristic extraction of co-occurrence patterns for effective construction of graph-based interpretable decision sets. 159-165 - Manh Tuan Nguyen, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:
Acceleration and higher precision by discrete wavelet transform for single image super-resolution using convolutional neural networks. 166-172 - Kenta Shimada, Tomonobu Ozaki:
Adversarial attack detection on node classification by autoencoder-based analysis of hidden layers in graph convolutional networks. 173-179 - Daisuke Takafuji, Koji Nakano, Yasuaki Ito, Akihiko Kasagi:
Acceleration of Deflate Encoding and Decoding with GPU implementations. 180-186 - Toi Tsuneda, Taro Kiriyama, Kousuke Shintani, Satoshi Yamane:
GANs with Suppressed Mode Collapse Using Intrinsic Rewards. 187-192 - Abdalla Elmokhtar Ahmed Elesawi, Kyeong Soo Kim:
Hierarchical Multi-Building And Multi-Floor Indoor Localization Based On Recurrent Neural Networks. 193-196 - Yojiro Harie, Sangam Babu Neupane, Bishnu Prasad Gautam, Norio Shiratori:
Augmented Triplet Network for Individual Organism and Unique Object Classification for Reliable Monitoring of Ezoshika Deer. 197-200 - Kazuhiko Komatsu, Masahito Kumagai, Ji Qi, Masayuki Sato, Hiroaki Kobayashi:
An Externally-Constrained Ising Clustering Method for Material Informatics. 201-204 - Tomohiro Suzuki:
Empirical parameter tuning of task-based tiled QR factorization using quantum annealing. 211-216 - Wenbin Wang, Jiahao Li, Yohichi Shimomura, Hiroyuki Takizawa:
A memory bank conflict prevention mechanism for SYCL on SX-Aurora TSUBASA. 217-222 - Yuto Katoh, Keiichiro Fukazawa, Takeshi Nanri, Yohei Miyake:
Cross-Reference Simulation by Code-To-Code Adapter (CoToCoA) Library for the Study of Multi-Scale Physics in Planetary Magnetospheres. 223-226 - Toshikazu Ishida, Shuichi Inokuchi:
Commutativity of Composition of some Elementary Cellular Automata with Essentially 2-Neighborhood Local Functions over Monoids. 227-233 - Luca Manzoni, Luca Mariot, Eva Tuba:
Tip the Balance: Improving Exploration of Balanced Crossover Operators by Adaptive Bias. 234-240 - Kosei Nagao, Akihiro Fujiwara:
An asynchronous P system with branch and bound for solving the subset sum problem. 241-247 - Tomoya Uchihara, Morikazu Nakamura:
Petri Net based Mathematical Programming for Optimal Resource Assignment Problems with Multiple Resource Requirements. 248-253 - Yaodong Wang, Yamin Li:
Hybrid Interconnection Networks for Reducing Hardware Cost and Improving Path Diversity Based on Fat-Trees and Hypercubes. 254-260 - Burak Çetinkaya, Johannes Stadler, Nguyen Anh Vu Doan:
Classification Models in Genetic Algorithms for Commonality Optimization in Passive Crash Safety. 261-267 - Ariel Kamoyedji, Nobuo Funabiki, Hein Htet, Minoru Kuribayashi:
A Proposal of Dynamic Job Scheduling Algorithm Considering CPU Core Utilization for User-PC Computing System. 268-271 - Tomoya Akabe, Renyuan Zhang, Yasuhiko Nakashima:
Speeding Up of CGRAs by Reshaping and Stochastic FMA. 272-277 - Sven Köhler, Lukas Wenzel, Max Plauth, Pawel Böning, Philipp Gampe, Leonard Geier, Andreas Polze:
Recognizing HPC Workloads Based on Power Draw Signatures. 278-284 - Hirotsugu Kakugawa, Sayaka Kamei:
A Distributed Multi-group Mutual Exclusion Algorithm for Intersection Traffic Control. 285-291 - Hideto Kayashima, Hideharu Amano:
Analysis of Resistance Distribution and Voltage Drop in Chips with Inductive Coupling Wireless Communication Interface. 292-296 - Renzhi Mao, Kaijie Wei, Hideharu Amano, Yuki Kuno, Masatoshi Arai:
Weight Least Square Filter for Improving the Quality of Depth Map on FPGA. 297-300 - Shusuke Nakazato, Nobuhiko Nakano:
Speech Signal Processing Using Consonant-Vowel Location Detection. 301-304 - Yoshiomi Otsuka:
Evaluation of the effect of ICT in education on the academic literacy of high school students. 305-308 - Rei Watanabe, Jubee Tada, Keiichi Sato:
An Implementation of a World Grid Square Codes Generator on a RISC-V Processor. 309-312 - Mutsuki Deguchi, Masahiko Katoh, Ryotaro Kobayashi:
Evaluation of implementability in a malware detection mechanism using processor information. 313-319 - Shuntaro Ema, Yuta Sato, Keita Emura, Toshihiro Ohigashi:
Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC. 320-325 - Ryosuke Kobayashi, Rie Shigetomi Yamaguchi:
Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by Smartphone. 326-331 - Seitaro Mishima, Kazuhisa Nakasho, Yuuki Takano, Atsuko Miyaji:
A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection. 332-338 - Masaki Nakanose, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Consideration of the side-channel attack to SPECK implemented on Arduino Uno. 339-345 - Katsuya Nishijima, Takao Kondo, Tatsumi Hosokawa, Tomohiro Shigemoto, Nobutaka Kawaguchi, Hiroyuki Hasegawa, Hideyuki Honda, Yasuhito Suzuki, Tadashi Kaji, Osamu Nakamura:
Verification of the Effectiveness to Monitor Darknet across Multiple Organizations. 346-351 - Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato, Hideo Taniguchi:
Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM. 352-358 - Mirang Park, Kentaro Aburada, Naonobu Okazaki:
Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches. 359-364 - Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan:
Single-round Lattice-based Multisignatures. 365-371 - Kaichi Sato, Satoshi Obana:
Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication Function. 372-378 - Naoki Shibayama, Yasutaka Igarashi:
A New Higher Order Differential of Enocoro-128v2. 379-384 - Kentaro Takeshita, Michiko Harayama:
Improvement of Hybrid NIDS Using Deep Learning for Practical Use. 385-391 - Yuya Tajima, Hiroshi Koide:
Applying The Attacks Tracer on Advanced Persistent Threats to Real Networks. 392-397 - Tomoya Terashima, Masahiro Nakayama, Teruaki Yokoyama, Hiroshi Koide:
KAKOI: A New Tool to Make Simple and Secure Build Cyber Ranges Using Public Cloud. 398-404 - Moeka Yamamoto, Shohei Kakei, Shoichi Saito:
FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices. 405-411 - Harunobu Enami, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Consideration of the side-channel attack to SIMON implemented on Arduino Uno. 412-415 - Phung Minh Ngoc, Mamoru Mimura:
Data augmentation of JavaScript dataset using DCGAN and random seed. 416-419 - Hideya Sato, Ryotaro Kobayashi:
A machine learning-based NIDS that collects training data from within the organization and updates the discriminator periodically and automatically. 420-423 - Kazuki Chugo, Yukinori Sato:
Thread-Aware Cache Simulator for HPC Application Tuning. 424-428 - Sho Higa, Koji Yamada, Shihoko Kamisato:
Development of the Estimation Model for Intentions to Move Based on Gaze and Face Information with 1DCNN-LSTM and Evaluation of Electric Wheelchair Driving. 429-433 - Riku Hirabayashi, José A. B. Fortes, Saneyasu Yamaguchi:
Aggressiveness-Controllable Block-Level Cache. 434-438 - Yuta Imamura, Shota Fukui, Taito Manabe, Yuichiro Shibata:
An FPGA-based Power-saving Particle Filter Using Dynamic Reconfiguration. 439-443 - Motoshi Miyamoto, Ryota Kawashima, Hiroshi Matsuo:
Transparent Relational Database Caching Based on Storage Engines Using In-memory Database. 444-448 - Yuki Nakagawa, Shuichi Ohno, Shohei Yamamoto:
Recognition of Multiple Rectangular Stickers for Construction Machines. 449-453 - Thanapol Phungtua-Eng, Yoshitaka Yamamoto, Shigeyuki Sako:
Detection for Transient Patterns with Unpredictable Duration using Chebyshev Inequality and Dynamic Binning. 454-458 - Atsushi Santo, Nobuyuki Yamasaki:
Real-Time Execution based on Fluid Scheduling by using IPC Control Scheme. 459-463 - Yuta Suzuki, Daiki Kuyoshi, Satoshi Yamane:
Single and Ensemble CNN Models with Out-Category Penalty in Cifar 10. 464-467 - Yoji Yamato:
Arranging resource amount after automatic GPU offloading. 468-472 - Siqi Zeng, Kosuke Kaneko, Ke Yan, Haowen Tan, Kouichi Sakurai:
Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum. 473-477 - Kuniyasu Imade, Toi Tsuneda, Satoshi Yamane, Kousuke Shintani, Taro Kiriyama:
Loss Function of GAN to Make a Clear Judgment. 478-480 - Kota Kumakura, Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:
Observation of Method Invocation in Application Runtime in Android for CPU Clock Rate Adjustment. 481-483 - Ma Yunqi, Satoshi Fujita:
Distributed Rewarding for Browser-Based P2P Video Streaming with Ethereum Blockchain. 484-486 - Shumpei Miyake, Keita Ushida:
Supporting Music Arrangement, Ringer Assignment, and Score Preparation for Musicbell Ensembles. 487-489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.