


default search action
12th CANDAR 2024: Naha, Japan - Workshops
- Twelfth International Symposium on Computing and Networking, CANDAR 2024 - Workshops, Naha, Japan, November 26-29, 2024. IEEE 2024, ISBN 979-8-3315-0534-9

- Atsuki Hara, Hiroyasu Obata, Chisa Takano:

A Dynamic Splitting TCP Using both Packet Loss Rate and Latency. 1-7 - Xinwei Liu, Satoshi Fujita:

Resilient Pub/Sub Multicast in Dynamic MANETs with High Node Mobility. 8-14 - Momoka Mizuno, Shigetomo Kimura:

A Flow Distribution Algorithm with Segment Routing for Software-Defined Networking. 15-21 - Shoya Obayashi, Tomoyuki Ohta:

Information Sharing Scheme Using AoI for DTN-based Evacuation Systems and Its Evaluation. 22-27 - Yuki Maeda, Tomoyuki Ohta:

A UDP-based Data Transmission Scheme Considering Transfer Time for Wireless Multihop Networks and Its Evaluation. 28-31 - Tomonori Taniguchi, Hiroyasu Obata, Chisa Takano, Masaki Aida:

Characteristic Analysis of SNS Videos for Detection of Flaming Using Sentiment Analysis and Principal Component Analysis. 32-35 - Yutaro Bessho, Hideyuki Kawashima:

Fast Hybrid Transactional Index with Scalable Phantom Avoidance. 36-42 - Alessandro Cordeiro de Lima

, Eduardo A. P. Alchieri, Jacir Luiz Bordim, João J. C. Gondim:
An Improved Method for Detecting EDoS Attacks in the Cloud With Hyperparameter Optimization and Metaheuristic Algorithms. 43-49 - Naoki Fujieda, Naoya Ito:

A case for edge video processing with FPGA SoC: reversi board detection using Hough transform. 50-55 - Keisuke Honda, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:

Hardware Acceleration of Underwater Image Color Restoration Algorithm. 56-62 - Haruka Hori, Masato Oguchi:

A Study of Blockchain-Based Metadata Management and Its Use for Data Verification. 63-68 - Mariama Mbow, Takeshi Takahashi, Kouichi Sakurai:

Poisoning Attacks on Federated-learning based NIDS. 69-75 - Kaname Sato, Nobuyuki Yamasaki:

A Learning-based Control Scheme for Prioritized SMT Processor. 76-82 - Kenta Takabayashi, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:

A Study of the Periodic Performance Degradation of Flash Memory Write Operations in Smartphones. 83-89 - Haolin Ye, Celimuge Wu, Tsutomu Yoshinaga:

A Comparative Study between FPGA and DSP for the Efficient Implementation of FIR Filters. 90-95 - Souma Yoneda, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:

FPGA Implementation of a Pipelined XMSS Leaf Accelerator. 96-102 - Takuto Ando

, Yusuke Inoue:
Facial Expression Recognition System Using DNN Accelerator with Multi-threading on FPGA. 103-109 - Van Duy Tran, Tran Xuan Hieu Le, Thi Diem Tran, Hoai Luan Pham, Vu Trung Duong Le, Tuan Hai Vu, Van Tinh Nguyen, Yasuhiko Nakashima:

Exploring the Limitations of Kolmogorov-Arnold Networks in Classification: Insights to Software Training and Hardware Implementation. 110-116 - Hideyuki Kawashima:

Hippo: Accelerating Transaction Processing for Approximate Query Processing Engine with Sampling Semantics. 117-122 - Masafumi Koike, Masako Saito, Atsushi Ito, Katsuhiko Hibino:

Hammering Tests of Tiles Fixed with Organic Adhesives with the aid of Machine Learning. 123-129 - Yohei Kojima, Ryu Kazama, Hirotake Abe, Chunghan Lee:

RNN-based Congestion Control in the Linux Kernel. 130-136 - Kentaro Machida, Soma Asuka, Tomomi Osaka, Fumikazu Watanabe, Hironori Nakajo:

Matthiola incana classification using CNN and class activation maps for model understanding. 137-143 - Fumiya Mitsuji, Sudesna Chakraborty, Takeshi Morita, Shusaku Egami, Takanori Ugai, Ken Fukuda:

Entity Linking for Wikidata using Large Language Models and Wikipedia Links. 144-149 - Yushi Ogiwara, Hideyuki Kawashima:

Sparse Ternary Matrix Multiplication with Tensor Core for Transformer. 150-156 - Koki Sugioka, Sayaka Kamei, Yasuhiko Morimoto:

BERT Pre-training for Cooking Time Prediction from Cooking Recipes. 157-162 - Nobuya Yokogawa, Yasuaki Ito, Satoki Tsuji, Haruto Fujii, Kanta Suzuki, Koji Nakano, Akihiko Kasagi:

Parallel GPU Computation of Nuclear Attraction Integrals in Quantum Chemistry. 163-169 - Jun Kato, Airi Mita, Keita Gobara, Akihiro Inokuchi:

Deep Graph Attention Networks. 170-174 - Hiroki Takahashi, Tomonobu Ozaki:

Recommendation of dinner menu sequences for small groups considering individual preferences and their lunch menu sequences. 175-178 - Nobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh, Munehiro Tanaka:

Estimating tomato plant leaf area in greenhouse environment using multiple RGB-D cameras. 179-182 - Paola Flocchini, Debasish Pattanayak, Francesco Piselli

, Nicola Santoro, Yukiko Yamauchi:
Asynchronous Separation of Unconscious Colored Robots. 183-189 - Shuma Ohara, Kazuhiro Saito

, Hideyuki Kawashima:
Evaluation of QAOA for black-box serializability problem. 190-196 - Tatsuyoshi Ohmura, Keichi Takahashi, Ryusuke Egawa, Hiroyuki Takizawa:

A QA-Assisted Job Scheduler for Minimizing the Impact of Urgent Computing on HPC System Operation. 197-203 - Yashdeep Singh, Sushanta Karmakar:

Bounded unpopularity matching in a (3, 3)-hypergraph with one-sided preferences. 204-210 - Satoki Tsuji, Yasuaki Ito, Haruto Fujii, Nobuya Yokogawa, Kanta Suzuki, Koji Nakano, Akihiko Kasagi:

Dynamic Screening of Two-Electron Repulsion Integrals in GPU Parallelization. 211-217 - Shunsuke Tsukiyama, Koji Nakano, Yasuaki Ito, Takumi Kato, Yuya Kawamata:

Breaking SHA-1 through QUBO models. 218-224 - Yifan Wei, Haozhe Sun, Xuyang Pan, Shengye Hu, Zhe Tang, Taoyu Wu, Sihao Li, Kyeong Soo Kim, Limin Yu, Jeremy S. Smith:

AGV-Assisted Construction of Dynamic Wi-Fi Fingerprint Databases for Indoor Localization. 225-231 - Aoi Kida

, Hideyuki Kawashima:
Making Simplified SMR Protocol Tolerant to Partial Network Partitions. 232-235 - Reo Ueno, Akihiro Fujiwara:

An asynchronous P system with improved branch and bound for solving the minimum Steiner tree. 236-239 - Ryunosuke Amano, Kazuo Sakiyama, Daiki Miyahara, Yang Li:

LoS Trick: Countermeasure against CPA for DNN Models Using Loss of Significance in Multiply-Accumulate Operations. 240-246 - Masakazu Awakiahra, Keiji Yoshimoto, Shota Kanzawa, Akane Miyoshi, Yasuyuki Nogami, Yuta Kodera:

Proposal and Evaluation for Efficient splitfft and mergefft in FALCON. 247-251 - Mathieu de Goyon, Atsuko Miyaji:

Isogeny-based Proxy Signature. 252-258 - Issei Hayashi, Masahiko Kato, Ryotaro Kobayashi:

Updatable Decision Tree in Malware Detection Hardware Using Processor Information. 259-265 - Yixuan He, Samsul Huda

, Yuta Kodera, Yasuyuki Nogami:
NUSS:Non-Interactive Updatable of Secret Sharing Schemes Using Homomorphic Encryption. 266-271 - Akira Kanaoka, Masayuki Okada:

Alter Ego: Identifying Web Server Certificates Containing IP Addresses As Subjects. 272-278 - Hideaki Miyaji, Noriaki Kamiyama:

Privacy-preserving efficient M+1st-price sealed bid auction in cross-chain communication. 279-285 - Kosei Okumura, Ryotaro Kobayashi:

Reducing Testing Time in Penetration Test Automation by Using EPSS and Parallelization. 286-292 - Mirang Park, Zhaolin Chang, Shotaro Usuzaki, Kentaro Aburada, Naonobu Okazaki:

Proposal and Evaluation of a Gaze Authentication Method that Combines Image Selection and Eye Movement Trajectory Features. 293-299 - Taku Sudo, Ryotaro Kobayashi, Masahiko Kato:

Small-Scale Implementation of a Hardware Detector for Malicious Communications and Malware Targeting the IoT. 300-306 - Nobuyuki Sugio:

Implementation of Cryptanalytic Program for ASCON Using ChatGPT. 307-313 - Ye Xu

, Takashi Nishide:
Verifiable Homomorphic Secret Sharing for SIMD Operations. 314-320 - Rosa Pericàs-Gornals

, María Magdalena Payeras Capellà, Macià Mut Puigserver, Jaume Ramis-Bibiloni:
Two-step Contract Signing Protocol. 321-324 - Yusuke Fukasawa, Kazuhiko Komatsu, Masayuki Sato, Saori Maki-Yonekura, Hirofumi Kurokawa, Koji Yonekura, Hiroaki Kobayashi:

A Graph-based Molecular Structure Identification Method via Feature Extraction for Three-dimensional Electron Diffraction Data. 325-329 - Toshiya Kanai, Toshikazu Samura, Yota Kurokawa, Masaru Fukushi:

GPU Acceleration of Synthetic Image Generation Using Multi-temporal and Single-polarized SAR Images. 330-334 - Shota Matsumura, Hiroyuki Hatano, Kosuke Sanada, Kazuo Mori:

Satellite Selection Method by Multiple Receivers on Vehicles for Improving Inter-vehicle Distance Estimation with Local DGNSS. 335-339 - Masaya Murai, Takahiro Sasaki:

PTWT: A reduction technique of page table walking. 340-344 - Satoki Nagao, Kanemitsu Ootsu, Takashi Yokota:

A Translation Method from 64-bit ARM Machine Code to LLVM IR for Binary-Level Optimization. 345-349 - Masaya Okabe, Hiroshi Tsunoda:

An eBPF-based packet capture system with embedded application metadata for network forensics. 350-354 - Shunsuke Okawa, Saneyasu Yamaguchi:

A Performance Study on Rust and C Programs. 355-359 - Haruhiro Tanaka, Takahiro Sasaki:

Extended VLIW Processor Based on RISC-V Compressed Instruction Set. 360-364 - Kozo Tanigawa, Masaru Shiozuka, Kenichi Takahashi:

Reduction of Agents Based on Appearance Probability for Agent-based Human Tracking System. 365-369 - Yuta Uehara, Susumu Matsumae:

Effect of Integrating Variational Autoencoder with SENet on Dimensionality Reduction in Driving Behavior Learning. 370-374 - Yang Jie, Yuta Kodera, Samsul Huda

, Yasuyuki Nogami:
A Study of Layer-2 Consortium Blockchain with zk-SNARKs for Medical Information Management. 375-379 - Zhe-Ming Zhang, Chih-Min Chao:

Enhanced Source Location Privacy for Energy Efficiency in Underwater Wireless Sensor Networks. 380-384 - Makoto Eguchi, Nobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh:

Bicycle-based collision prevention system using pedestrian trajectory prediction with an iPhone. 385-387 - Daiki Inoue, Tomonobu Ozaki:

Preliminary Study of Named Entity Recognition Techniques in Japanese Light Novels. 388-390 - Nobuya Ishihara, Yuta Kodera, Samsul Huda

, Tanoshimaru Isokawa, Yasuyuki Nogami:
An Implementation of USB-Enabled Network Isolation for Remote IoT Security Exercises. 391-393 - Toyoki Kosuda, Morikazu Nakamura, Tadashi Shiroma, Takayuki Nakachi:

Multi-objective Quantum Optimization based on Bayesian Approach for Computing Resource Assignment Problems. 394-396 - Kuan-Ting Liu, Jui-Chih Chang, Jeen-Shing Wang:

Automated Model Generation for Arteriovenous Shunt Stenosis Detection Using Machine Learning Algorithms. 397-399 - Ryuki Mutsu, Kosei Kishimoto, Hiroshi Okumura, Wen Liang Yeoh, Osamu Fukuda, Masatomo Miura, Sakiko Kimura, Nobuhiko Yamaguchi:

Machine learning prediction of drug dynamics in dasatinib. 400-402 - Andrea Rosà

, Matteo Basso, Walter Binder:
Analyzing the Vectorization Capability of the Java Vector API. 403-405 - Po-I Shen, De-Syuan Huang, Jeen-Shing Wang, Ya-Ting C. Yang:

AI-Based Multi-Objective Optimization Algorithm for Intelligent School Lunch Menu Planning System. 406-408 - Ryota Uechi, Morikazu Nakamura, Tadashi Shiroma, Takayuki Nakachi:

Petri net-based QUBO Model Formulation for Multi-Resource Flow-Shop Scheduling Problems. 409-411

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














