


default search action
23rd PDCAT 2022: Sendai, Japan
- Hiroyuki Takizawa, Hong Shen, Toshihiro Hanawa, Jong Hyuk Park, Hui Tian, Ryusuke Egawa:
Parallel and Distributed Computing, Applications and Technologies - 23rd International Conference, PDCAT 2022, Sendai, Japan, December 7-9, 2022, Proceedings. Lecture Notes in Computer Science 13798, Springer 2023, ISBN 978-3-031-29926-1
Heterogeneous System (1)
- Yifan Jin, Mulya Agung
, Keichi Takahashi, Yoichi Shimomura, Hiroyuki Takizawa
:
Towards Priority-Flexible Task Mapping for Heterogeneous Multi-core NUMA Systems. 3-15 - Kai Yang, Takayuki Aoki:
Multi-GPU Scaling of a Conservative Weakly Compressible Solver for Large-Scale Two-Phase Flow Simulation. 16-27 - Qingyang Zhang, Lei Xu, Rongliang Chen, Lin Chen, Xinhai Chen
, Qinglin Wang, Jie Liu, Bo Yang:
Improving the Performance of Lattice Boltzmann Method with Pipelined Algorithm on A Heterogeneous Multi-zone Processor. 28-41
FPGA
- Omkar Bhilare
, Rahul Singh, Vedant Paranjape, Sravan Chittupalli, Shraddha Suratkar, Faruk Kazi:
DEEPFAKE CLI: Accelerated Deepfake Detection Using FPGAs. 45-56 - Honoka Tani, Akira Yamawaki:
Memory Access Optimization for Former Process of Pencil Drawing Style Image Conversion in High-Level Synthesis. 57-68 - Hasitha Muthumala Waidyasooriya, Shutaro Ishihara, Masanori Hariyama:
Word2Vec FPGA Accelerator Based on Spatial and Temporal Parallelism. 69-77
HPC and AI
- Takaaki Fukai
, Kento Sato
, Takahiro Hirofuchi
:
Analyzing I/O Performance of a Hierarchical HPC Storage System for Distributed Deep Learning. 81-93 - Fitra Rahmani Khasyah, Kadek Gemilang Santiyuda, Gabriel Kaunang, Faizal Makhrus, Muhammad Alfian Amrizal, Hiroyuki Takizawa
:
An Advantage Actor-Critic Deep Reinforcement Learning Method for Power Management in HPC Systems. 94-107 - Amit Mankodi
, Amit Bhatt, Bhaskar Chaudhury:
An AutoML Based Algorithm for Performance Prediction in HPC Systems. 108-119
Embedded Systems and Communication
- Zhiming Sun, Jingjing Yu, Xingchun Liu:
Edge-Gateway Intrusion Detection for Smart Home. 123-135 - Liang Dai
, Hangyu Tian, Dingxuan Ju, Hongke Xu:
Energy-Delay Tradeoff in Parallel Task Allocation and Execution for Autonomous Platooning Applications. 136-146 - Kai-Siang Wang, Jerry Chou:
A Reservation-Based List Scheduling for Embedded Systems with Memory Constraints. 147-157 - Zhiru Hou, Jiaqi Yin, Huibiao Zhu, Ningning Chen:
Formalization and Verification of SIP Using CSP. 158-171
Blockchain
- Somnath Mazumdar
, Thomas Dreibholz
:
Towards a Blockchain and Fog-Based Proactive Data Distribution Framework for ICN. 175-186 - Jingya Xu, Lina Ge, Wei Zhou, Liang Yan, Zheng Hu:
Research on User Influence Weighted Scoring Algorithm Incorporating Incentive Mechanism. 187-198 - Hai Trieu Le, Phuc Nguyen Trong, Khiem Huynh Gia, Hong Khanh Vo, Huong Hoang Luong
, Khoa Tran Dang, Hieu Le Van, Nghia Huynh Huu, Tran Huyen Nguyen, The Anh Nguyen, Loc Van Cao Phu, Duy Nguyen Truong Quoc, Bang Le Khanh, Kiet Le Tuan:
BloodMan-Chain: A Management of Blood and Its Products Transportation Based on Blockchain Approach. 199-209
Deep Learning
- Jianxuan Liu, Haotian Xue
, Junfeng Wang, Shuo Hong, Hao Fu, Omar Dib:
A Systematic Comparison on Prevailing Intrusion Detection Models. 213-224 - Fengjiao Zhao, Na Li, Cheng Zhong:
Enhancing Resolution of Inferring Hi-C Data Integrating U-Net and ResNet Networks. 225-237 - Fatin Neamah Ridha Al-Sarray, Maslina Zolkepli:
Detecting Network Intrusions with Resilient Approaches Based on Convolutional Neural Networks. 238-248
Quantum Computing and Programming Language
- Kaho Aoyama, Kazuhiko Komatsu
, Masahito Kumagai
, Hiroaki Kobayashi
:
Analysis of Precision Vectors for Ising-Based Linear Regression. 251-261 - Yusuke Shiki
, Masahiro Yasugi
, Tasuku Hiraishi
:
Evaluating and Analyzing Irregular Tree Search in the Tascell and HOPE Parallel Programming Languages. 262-272
Best Papers
- Takeshi Fukaya:
Distributed Parallel Tall-Skinny QR Factorization: Performance Evaluation of Various Algorithms on Various Systems. 275-287 - Masayuki Sato
, Yuya Omori, Ryusuke Egawa
, Ken Nakamura, Daisuke Kobayashi, Hiroe Iwasaki
, Kazuhiko Komatsu
, Hiroaki Kobayashi
:
A Partitioned Memory Architecture with Prefetching for Efficient Video Encoders. 288-300 - Yoshiya Shikama, Michihiro Koibuchi, Hideharu Amano:
A Hardware Trojan Exploiting Coherence Protocol on NoCs. 301-313 - Shinji Sumimoto, Takashi Arakawa
, Yoshio Sakaguchi, Hiroya Matsuba, Hisashi Yashiro
, Toshihiro Hanawa, Kengo Nakajima:
A System-Wide Communication to Couple Multiple MPI Programs for Heterogeneous Computing. 314-327
Heterogeneous System (2)
- Kazuki Ide
, Keichi Takahashi
, Yoichi Shimomura, Hiroyuki Takizawa
:
A Task-Parallel Runtime for Heterogeneous Multi-node Vector Systems. 331-343 - Ryohei Kobayashi
, Norihisa Fujita, Yoshiki Yamaguchi, Taisuke Boku, Kohji Yoshikawa, Makito Abe, Masayuki Umemura:
Accelerating Radiative Transfer Simulation on NVIDIA GPUs with OpenACC. 344-358 - Satoshi Ohshima, Akihiro Ida, Rio Yokota, Ichitaro Yamazaki:
QR Factorization of Block Low-Rank Matrices on Multi-instance GPU. 359-369
Equivalence Checking and Model Checking
- Shunpei Sugawara, Keichi Takahashi
, Yoichi Shimomura, Ryusuke Egawa
, Hiroyuki Takizawa
:
Equivalence Checking of Code Transformation by Numerical and Symbolic Approaches. 373-386 - Junfu Luo, Jiaqi Yin, Huibiao Zhu:
MEA: A Framework for Model Checking of Mutual Exclusion Algorithms Focusing on Atomicity. 387-398
Interconnect
- Ke Cui
, Michihiro Koibuchi:
A High-Radix Circulant Network Topology for Efficient Collective Communication. 401-412 - Yamin Li, Wanming Chu:
Fault Tolerance and Packet Latency of Peer Fat-Trees. 413-425 - Hirotoshi Yamada, Masao Okita, Fumihiko Ino:
Accelerating Imbalanced Many-to-Many Communication with Systematic Delay Insertion. 426-437
Optimization (1)
- Ruochen Hao, Qinglin Wang, Shangfei Yin, Tianyang Zhou, Qingyang Zhang, Songzhu Mei, Siqi Shen, Jie Liu:
Optimizing Depthwise Convolutions on ARMv8 Architecture. 441-452 - Sergej Breiter, Josef Weidendorfer, Minh Thanh Chung, Karl Fürlinger:
A Profiling-Based Approach to Cache Partitioning of Program Data. 453-463
Optimization (2)
- Siyi Hu, Makiko Ito, Takahide Yoshikawa, Yuan He
, Masaaki Kondo:
Memory Bandwidth Conservation for SpMV Kernels Through Adaptive Lossy Data Compression. 467-480 - Le Li
, Kenjiro Taura
:
SimdFSM: An Adaptive Vectorization of Finite State Machines for Speculative Execution. 481-493
Privacy
- Xinru Deng, Yingpeng Sang
, Zhaojue Li:
Broad Learning Inference Based on Fully Homomorphic Encryption. 497-508 - Hiroshi Someda
, Shigeyuki Osada
, Yuya Kajikawa
:
Application of Probabilistic Common Set on an Open World Set for Vertical Federated Learning. 509-519
Workflow
- Wael R. Elwasif, Thomas J. Naughton, Matthew B. Baker:
Towards a Standard Process Management Infrastructure for Workflows Using Python. 523-534

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.