


default search action
5th CANDAR 2017: Aomori, Japan
- Fifth International Symposium on Computing and Networking, CANDAR 2017, Aomori, Japan, November 19-22, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2087-8

Fifth International Symposium on Computing and Networking (CANDAR 2017)
CANDAR 2017 Long Papers
- Anis Alazzawe, Krishna Kant:

Slice Swarms for HPC Application Resilience. 1-10 - Shunji Funasaka, Koji Nakano

, Yasuaki Ito:
Single Kernel Soft Synchronization Technique for Task Arrays on CUDA-enabled GPUs, with Applications. 11-20 - Ryan Marshall, Sheikh K. Ghafoor, Alfred J. Kalyanapu, Mike Rogers, Tigstu T. Dullo:

Performance Improvement of a Two-Dimensional Flood Simulation Application in Hybrid Computing Environments. 21-29 - Takuya Shoji, Satoshi Fujita:

Tight Lower Bounds on the Maximum Number of Hops in P2P Video Streaming through Multiple Spanning Trees. 30-37 - Hiroki Tokura, Yuki Kuroda, Yasuaki Ito, Koji Nakano

:
A Square Pointillism Image Generation, and Its GPU Acceleration. 38-47 - Takuma Wada, Shunji Funasaka, Koji Nakano

, Yasuaki Ito:
A Hybrid Architecture for the Approximate String Matching on an FPGA. 48-57 - Takashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa:

Large-Scale Interconnection Network Simulation Methods Based on Cellular Automata. 58-67
CANDAR 2017 Regular Papers
- Saleh Ahmed, Annisa

, Asif Zaman, Zhan Zhang, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:
Semi-order Preserving Encryption Technique for Numeric Data to Enhance Privacy. 68-74 - Bo-Ren Chen, Shin-Ming Cheng

, Jia-Jhun Lin:
Energy-Efficient BLE Device Discovery for Internet of Things. 75-79 - Roman Durikovic

, Jozef Hladky:
Complex Dynamics, Evolution, Separation, Profile Modeling of Fire in 3D for Computer Animation. 80-86 - Masayuki Fukumitsu, Shingo Hasegawa:

A Galindo-Garcia-Like Identity-Based Signature with Tight Security Reduction. 87-93 - Keisuke Furumoto, Korehito Kashiki, Masakatu Morii, Masato Ikegami, Tomohisa Hasegawa, Teiichi Ishikawa, Koji Nakao:

Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis. 94-100 - Chun-Ling Lin

, Sheng-Ta Hsieh, Shih-Yuan Chiu:
Improved Differential Evolution with Searching Pioneer for Solving Multi-modal Optimization Problems. 101-105 - Andrej Mihalik, Pavol Kunovsky, Roman Durikovic

:
HDR Image Acquisition Using Integrated Mobile Device Camera. 106-111 - Takamasa Mitani, Hisakazu Fukuoka, Yuria Hiraga, Takashi Nakada, Yasuhiko Nakashima:

Compression and Aggregation for Optimizing Information Transmission in Distributed CNN. 112-118 - Akira Niwa, Hiroaki Nishi

:
An Information Platform for Smart Communities Realizing Data Usage Authentication and Secure Data Sharing. 119-125 - Akio Nomura, Junichiro Kadomoto, Tadahiro Kuroda, Hideharu Amano:

A Practical Collision Avoidance Method for an Inter-Chip Bus with Wireless Inductive through Chip Interface. 126-131 - Kazuhiko Ohno, Tomoki Nitta, Hiroto Nakai:

SPH-based Fluid Simulation on GPU Using Verlet List and Subdivided Cell-Linked List. 132-138 - Yuta Ohno, Tomomu Iwai, Hiroaki Nishi

:
Blind Watermarking Method for Anonymized Data. 139-145 - T. A. J. Ouermi, Aaron Knoll, Robert M. Kirby

, Martin Berzins
:
Optimization Strategies for WRF Single-Moment 6-Class Microphysics Scheme (WSM6) on Intel Microarchitectures. 146-152 - Tomofumi Sato, Yamin Li:

Generalized-Star Crossed Cube - A Flexible Interconnection Network with High-Performance at Low-Cost. 153-158 - Takayuki Shiroma, Takuma Nakajima, Celimuge Wu

, Tsutomu Yoshinaga:
A Light-Weight Cooperative Caching Strategy by D2D Content Sharing. 159-165 - Teruo Tanimoto

, Takatsugu Ono, Koji Inoue:
CPCI Stack: Metric for Accurate Bottleneck Analysis on OoO Microprocessors. 166-172 - Tatsuya Toki, Tomonobu Ozaki:

Discovery of δ-Tolerance Closed Subgraphs on GPGPU. 173-179 - Renyuan Zhang, Takashi Nakada, Yasuhiko Nakashima:

A Feasibility Study of Programmable Analog Calculation Unit for Approximate Computing. 180-186
Fifth International Workshop on Applications and Fundamentals of Cellular Automata (AFCA 2017)
AFCA 2017 Regular Papers
- Sheng-Ta Hsieh, Hao-Wen Cheng, Chun-Ling Lin

, Tsung-Ying Sun:
Biologically Adaptive Artificial Bee Colony for Numerical Optimization. 187-193 - GilTak Kong, Katsunobu Imai, Toru Nakanishi:

Hierarchical Motion Representation of 2-State Number Conserving Cellular Automata. 194-199 - Yuta Yamatani, Teijiro Isokawa, Jia Lee, Ferdinand Peper:

On a Triangular Brownian Cellular Automaton with 4 States and 6 Rules. 200-204
AFCA 2017 Poster Papers
- Akane Kawaharada, Takao Namiki:

Fractal Structure of a Class of Two-Dimensional Two-State Cellular Automata. 205-208
10th International Workshop on Autonomous Self-Organizing Networks (ASON 2017)
ASON 2017 Regular Papers
- Tomoki Hanzawa, Shigetomo Kimura

:
A Contention Window Control Method Using Priority Control Based on the Number of Freezes of Wireless LAN. 209-215 - Md. Manowarul Islam, Md. Selim Al Mamun, Nobuo Funabiki, Minoru Kuribayashi

:
Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System. 216-222 - Shinji Kitagami, Tadashi Ogino, Takuo Suganuma, Norio Shiratori:

Proposal of a Multi-agent Based Flexible IoT Edge Computing Architecture Harmonizing Its Control with Cloud Computing. 223-229 - Hideharu Kojima

, Naoto Yanai
:
Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi. 230-236 - Hiro Onishi, Ryuta Mogi, Takuya Asaka:

Data Collection Method Using Data Collection with DTN in Participatory Sensing and Data Interpolation. 237-242 - Yuusuke Ookita, Satoshi Fujita:

Effective Suppression of False Rumors in Social Network Service. 243-248 - Makoto Takita, Masanori Hirotomo, Masakatu Morii:

Coded Caching for Hierarchical Networks with a Different Number of Layers. 249-255 - Aunee Azrina Zulkifli, Kaori Kuroda, Mikio Hasegawa

:
Game Theory-Based Power Allocation and Channel Selection of Multi-channel D2D. 256-262
ASON 2017 Poster Papers
- Taichiro Nakayama, Takuya Asaka:

Peer-to-Peer Bidirectional Streaming Using Mobile Edge Computing. 263-266 - Toshikazu Terami, Tomoyuki Ohta, Yoshiaki Kakuda:

Evaluation of Information Dissemination Scheme Using Autonomous Clustering and Epidemic Routing Considering Mobile Core Network Load in Wireless Networks. 267-270
Fifth International Workshop on Computer Systems and Architectures (CSA 2017)
CSA 2017 Regular Papers
- Tzu-Yi Chang, Chung-Ta King, Bhaskar Das, Bo-Hao Liao:

Configurable Fast Cycle-Approximate Timing Estimation for Instruction-Level Emulators. 271-276 - Peng Gao, Dongsheng Wang, Haixia Wang:

FEBRE: A Fast and Efficient Bit-Flipping Reduction Technique to Extend PCM lifetime. 277-283 - Andreas Grapentin, Max Plauth

, Andreas Polze:
MemSpaces: Evaluating the Tuple Space Paradigm in the Context of Memory-Centric Architectures. 284-290 - Kazutoshi Hirose, Ryota Uematsu, Kota Ando, Kentaro Orimo, Kodai Ueyoshi, Masayuki Ikebe, Tetsuya Asai, Shinya Takamaeda-Yamazaki, Masato Motomura

:
Logarithmic Compression for Memory Footprint Reduction in Neural Network Training. 291-297 - Edvard Martins de Oliveira

, Júlio Cezar Estrella, Fausto Guzzo da Costa, Alexandre Cláudio Botazzo Delbem, Stephan Reiff-Marganiec
:
Optimising Scientific Workflow Execution Using Desktops, Clusters and Clouds. 298-304 - Koichi Marumo, Shinichi Yamagiwa:

Time-Sharing Multithreading on Stream-Based Lossless Data Compression. 305-310 - Kazuichi Oe

, Mitsuru Sato, Takeshi Nanri:
Automated Tiered Storage System Consisting of Memory and Flash Storage to Improve Response Time with Input-Output (IO) Concentration Workloads. 311-317 - Masahiro Tozaki, Yamin Li:

Topological Properties and Routing Algorithm for the Static K-ary N-tree Interconnection Network. 318-322
CSA 2017 Poster Papers
- Yoshiki Ishigaki, Naoki Fujieda, Yuumi Matsuoka, Kazuki Uyama, Shuichi Ichikawa:

An Obfuscated Hardwired Sequence Control System Generated by High Level Synthesis. 323-325 - Kotaro Maekawa, Shunsuke Negoro, Ittetsu Taniguchi

, Hiroyuki Tomiyama:
Power Measurement and Modeling of Quadcopters on Horizontal Flight. 326-329
Second International Workshop on GPU Computing and Applications (GCA 2017)
GCA 2017 Regular Papers
- Youri Coppens

, Koichi Shirahata, Takuya Fukagai, Yasumoto Tomita, Atsushi Ike:
GUNREAL: GPU-accelerated UNsupervised REinforcement and Auxiliary Learning. 330-336 - Mamoru Mimura

, Yuhei Otsubo, Hidema Tanaka, Atsuhiro Goto:
Is Emulating "Binary Grep in Eyes" Possible with Machine Learning? 337-343 - Max Plauth

, Florian Rosler, Andreas Polze:
CloudCL: Distributed Heterogeneous Computing on Cloud Scale. 344-350 - M. Wielage, Fabian Cholewa

, Christian Fahnemann
, Peter Pirsch, Holger Blume
:
High Performance and Low Power Architectures: GPU vs. FPGA for Fast Factorized Backprojection. 351-357
GCA 2017 Poster Paper
- Makoto Miyazaki, Susumu Matsumae

:
Improving Multiple Precision Integer Multiplication on GPUs. 358-361
Fifth International Workshop on Legacy HPC Application Migration (LHAM 2017)
LHAM 2017 Regular Papers
- Taisuke Boku, Ken-Ichi Ishikawa, Yoshinobu Kuramashi, Lawrence Meadows:

Mixed Precision Solver Scalable to 16000 MPI Processes for Lattice Quantum Chromodynamics Simulations on the Oakforest-PACS System. 362-368 - Ryusuke Egawa, Kazuhiko Komatsu

, Hiroyuki Takizawa
:
Designing an Open Database of System-Aware Code Optimizations. 369-374 - Issaku Kanamori

, Hideo Matsufuru
:
Practical Implementation of Lattice QCD Simulation on Intel Xeon Phi Knights Landing. 375-381 - Reiji Suda:

Embedded-DSL-Like Code Generation and Optimization of Bayesian Estimation Routines with User-Defined Source-to-Source Code Transformation Framework Xevolver. 382-388 - Hiroyuki Takizawa

, Muhammad Alfian Amrizal, Kazuhiko Komatsu
, Ryusuke Egawa:
An Application-Level Incremental Checkpointing Mechanism with Automatic Parameter Tuning. 389-394
Ninth International Workshop on Parallel and Distributed Algorithms and Applications (PDAA 2017)
PDAA 2017 Regular Papers
- B. Budianto, Daniel Pak-Kong Lun:

Discrete Periodic Radon Transform Based Weighted Nuclear Norm Minimization for Image Denoising. 395-400 - Joel Fuentes

, Fei Luo, Isaac D. Scherson:
Synchronizing Parallel Geometric Algorithms on Multi-core Machines. 401-407 - Yuki Jimen, Akihiro Fujiwara:

An Asynchronous P System Using Branch and Bound for the Satisfiability Problem. 408-413 - Sayaka Kamei

, Hirotsugu Kakugawa:
An Asynchronous Message-Passing Distributed Algorithm for the Global Critical Section Problem. 414-419 - Frédéric Loulergue

:
A Verified Accumulate Algorithmic Skeleton. 420-426 - Hao Zhu, Huadong Dai, Shazhou Yang, Yuejin Yan, Bin Lin:

Estimating Power Consumption of Servers Using Gaussian Mixture Model. 427-433
Fourth International Workshop on Information and Communication Security (WICS 2017)
WICS 2017 Regular Papers
- Michelangelo Cruz, Roel Ocampo, Isabel Montes

, Rowel Atienza:
Fingerprinting BitTorrent Traffic in Encrypted Tunnels Using Recurrent Deep Learning. 434-438 - Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Masao Sakai:

A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability. 439-444 - Yuta Hashimoto, Md. Al-Amin Khandaker

, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami:
An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller. 445-450 - Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Md. Al-Amin Khandaker

, Yasuyuki Nogami, Satoshi Uehara:
An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence. 451-455 - Mamoru Mimura

, Hidema Tanaka:
Long-Term Performance of a Generic Intrusion Detection Method Using Doc2vec. 456-462 - Hideaki Moriyama, Toshihiro Yamauchi

, Masaya Sato, Hideo Taniguchi:
Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM. 463-468 - Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:

Implementation of Hash Function Generator on Schematic to Program Translator(SPT). 469-474 - Thuong Nguyen Dat, Keisuke Iwai, Takakazu Kurokawa:

Implementation of High Speed Hash Function Keccak Using CUDA on GTX 1080. 475-481 - Kittiphon Phalakarn, Kittiphop Phalakarn, Vorapong Suppakitpaisarn:

Optimal Representation for Right-to-Left Parallel Scalar Point Multiplication. 482-488 - Shahidatul Sadiah, Toru Nakanishi:

Implementation of Revocable Group Signatures with Compact Revocation List Using Vector Commitments. 489-495 - Takanori Saito, Toru Nakanishi:

Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks. 496-502 - Toshiki Takeuchi, Koichi Mouri, Shoichi Saito:

Mocha: Automatically Applying Content Security Policy to HTML Hybrid Application on Android Device. 503-509 - Shunsuke Tayama, Hidema Tanaka:

Analysis of Effectiveness of Slow Read DoS Attack and Influence of Communication Environment. 510-515 - Ryo Yamagami, Yasushi Yamazaki:

Biometric Bit String Generation from Handwritten Initials on Smart Phones. 516-521 - Xiang You, Yaokai Feng, Kouichi Sakurai:

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow. 522-528
WICS 2017 Poster Papers
- Yuri Yoshino, Masaki Inamura:

Access Control of Webcam on PC with Prevention against Peeping by Attackers. 529-532 - Shiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai:

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking. 533-536
Eighth International Workshop on Advances in Networking and Computing (WANC 2017)
WANC 2017 Short Papers
- Hiroyoshi Ichikawa, Aki Kobayashi:

Messaging Protocol for Relaying Messages between Participants with Autonomous Distributed Blockchain Propagation. 537-541 - Hiroto Kizuna, Hiroyuki Sato:

The Entering and Exiting Management System by Person Specification Using Deep-CNN. 542-545 - Marius Klein, Andreas Klos, Jorg Lenhardt, Wolfram Schiffmann:

Wind-Aware Emergency Landing Assistant Based on Dubins Curves. 546-550 - Yasutake Koishi, Shuichi Ishida

, Tatsuo Tabaru
, Hiroyuki Miyamoto:
Label Estimation Method with Modifications for Unreliable Examples in Taming. 551-554 - Joichiro Kon, Kenji Nakashima, Saneyasu Yamaguchi:

A Deletion Aware Usable Space Control for SD2. 555-559 - Shun Kurihara, Shoki Fukuda, Masato Oguchi, Saneyasu Yamaguchi:

Estimation of Power Consumption of Each Application Caused by Device Lock Considering Software Dependency in Smartphones. 560-564 - Kenta Sasaki, Xuening Liao, Xiaohong Jiang:

Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays. 565-569 - Masataka Nakano, Yoshiki Yamaguchi:

A Study of TRAX Player by Template Matching. 570-574 - Kohta Shigenobu, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota:

A Translation Method of ARM Machine Code to LLVM-IR for Binary Code Parallelization and Optimization. 575-579 - Yuto Tachibana, Joichiro Kon, Saneyasu Yamaguchi:

A Study on the Performance of Web Applications Based on RoR in a Highly Consolidated Server with Container-Based Virtualization. 580-583 - Shunsuke Ueda, Takuya Kusaka:

Study on Reduction on Average Computational Complexity of GMD Decoding Using Property of Bounded Distance Decoding. 584-588 - Shinpei Watanabe, Boaz Jessie Jackin

, Takeshi Ohkawa, Kanemitsu Ootsu, Takashi Yokota, Yoshio Hayasaki, Toyohiko Yatagai, Takanobu Baba:
Acceleration of Large-Scale CGH Generation Using Multi-GPU Cluster. 589-593
WANC 2017 Poster Papers
- Yuta Matsumoto, Akihiro Fujiwara:

A Firefly Optimization for a Connected Dominating Set in a Sensor Network. 594-596 - Naoki Mizusawa, Kenji Nakazima, Saneyasu Yamaguchi:

Performance Evaluation of File Operations on OverlayFS. 597-599 - Seiya Ogido, Chikatoshi Yamada, Kei Miyagi, Shuichi Ichikawa:

A Study of a Fault-Tolerant System Using Dynamic Partial Reconfiguration. 600-602 - Yuya Sakuma, Masahiro Fujii:

A Study on Direction Estimation of Movement by Multiple Sensors for Pedestrian Dead-Reckoning. 603-605 - Ryutaro Ushigome, Takeshi Matsuda, Michio Sonoda, Jinhui Chao:

Examination of Classifying Hoaxes over SNS Using Bayesian Network. 606-608 - Yoji Yamato, Naoto Hoshikawa, Hirofumi Noguchi, Tatsuya Demizu, Misao Kataoka:

A Study to Optimize Heterogeneous Resources for Open IoT. 609-611

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














