


default search action
CANDAR Workshops 2018: Takayama, Japan
- Sixth International Symposium on Computing and Networking, CANDAR Workshops 2018, Takayama, Japan, November 27-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9184-7

- Guilherme David Branco, Jacir Luiz Bordim:

Employing Genetic Algorithm and Particle Filtering as an Alternative for Indoor Device Positioning. 1-7 - Roman Durikovic

, Erich Siebenstich:
A Mass Spring Model for String Simulation with Stress-Strain Handling. 8-14 - Katsunobu Imai, Kyosuke Oroji, Tomohiro Kubota:

A Weakly Universal Three-Dimensional Larger than Life Cellular Automaton. 15-19 - Naoki Kamikawa, Hiroshi Umeo:

A Smaller-State Implementation of Real-Time Sequence Generator for {n^3 | n= 1, 2, 3, ...}. 20-26 - Luidnel Maignan

, Jean-Baptiste Yunès:
Generalized FSSP on Two Triangular Tilings. 27-31 - Takahiro Tomita, Jia Lee, Teijiro Isokawa, Ferdinand Peper, Naotake Kamiura, Takayuki Yumoto:

Cellular Automaton Model for Turing Tumble Mechanical Computer. 32-37 - Jia Lee, Ferdinand Peper, Kenji Leibnitz:

Formalization of Asynchronous Cellular Automata Using Asynchronous Protocol for Communications. 38-41 - Temma Ohtani, Eitaro Kohno, Yoshiaki Kakuda:

On Relationship between Timeout and Latency of Connection Re-establishment for Control Packet Loss Scenario in Bluetooth MANETs. 42-46 - Atsushi Takei, Shigetomo Kimura

:
Handover Algorithm for Video Communications by Sharing Communication Quality Information of Access Points between Terminals. 47-52 - Haobin Wang, Wei Huangfu, Yaxi Liu, Cheng Gong, Yebing Ren, Wei Liu:

Spatial Feature Aware Genetic Algorithm of Network Base Station Configuration for Internet of Things. 53-58 - Tatsuki Horai, Tomoyuki Ohta, Yoshiaki Kakuda:

Experimental Evaluation of Information Dissemination Scheme Considering Mobile Network Base Station Load in Wireless Networks. 59-62 - Hiroyoshi Ichikawa, Aki Kobayashi:

Experimental Performance Analysis on Autonomous Distributed Collaborative Messaging Protocol. 63-66 - Atsushi Ito, Fu Xiang, Hiroyuki Hatano, Hidetoshi Uchiyama:

A Study on Observing a Lost Child Using BLE Beacons. 67-70 - Yudai Kaneko, Takuya Asaka:

DHT Clustering for Load Balancing Considering Blockchain Data Size. 71-74 - Ryuta Mogi, Taichiro Nakayama, Takuya Asaka:

Load Balancing Method for IoT Sensor System Using Multi-access Edge Computing. 75-78 - Yao Hu, Michihiro Koibuchi:

The Impact of Job Mapping on Random Network Topology. 79-85 - Tamotsu Kawamura, Masaru Fukushi, Yasushi Hirano, Yusuke Fujita, Yoshihiko Hamamoto:

A Network-Based Event Detection Module Using NTP for Cyber Attacks on IoT. 86-91 - Toru Koizumi, Satoshi Nakae, Akifumi Fukuda, Hidetsugu Irie, Shuichi Sakai

:
Reduction of Instruction Increase Overhead by STRAIGHT Compiler. 92-98 - Yota Kurokawa, Masaru Fukushi:

XY Based Fault-Tolerant Routing with the Passage of Faulty Nodes. 99-104 - Yasuhiro Nakamura, Hideyuki Kawashima, Osamu Tatebe

:
Integrating TicToc with Parallel Logging. 105-111 - Kazuichi Oe, Takeshi Nanri:

Non-volatile Memory Driver for Applying Automated Tiered Storage with Fast Memory and Slow Flash Storage. 112-118 - Hiroki Okada, Takayuki Shiroma, Celimuge Wu

, Tsutomu Yoshinaga:
A Color-Based Cooperative Caching Strategy for Time-Shifted Live Video Streaming. 119-124 - Max Plauth

, Andreas Polze:
Towards Improving Data Transfer Efficiency for Accelerators Using Hardware Compression. 125-131 - Seiya Shirakuni, Ittetsu Taniguchi

, Hiroyuki Tomiyama:
A Case Study on Memory Architecture Exploration for Manycores on an FPGA. 132-137 - Takeo Ueki, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:

AQSS: Accelerator of Quantization Neural Networks with Stochastic Approach. 138-144 - Tomoaki Ukezono:

An Error Corrector for Dynamically Accuracy-Configurable Approximate Adder. 145-151 - Masao Yamamoto, Kohta Nakashima, Toshihiro Yamauchi

, Akira Nagoya, Hideo Taniguchi:
Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines. 152-158 - Ke Cui

, Michihiro Koibuchi:
Performance Evaluation of Collective Communication on Random Network Topology. 159-162 - Hiroki Fujita, Naoki Fujieda, Shuichi Ichikawa:

An Analysis on Randomness of Path ORAM for Light-Weight Implementation. 163-165 - Masahiro Hasegawa, Jubee Tada:

An Adaptive Demotion Policy with Considering Temporal Locality. 166-169 - Sheng-Ta Hsieh, Chun-Ling Lin

:
Detection and Parameter Estimation of R Peaks in ECG Signal Using Optimization Algorithm. 170-173 - Sheng-Ta Hsieh, Chun-Ling Lin

, Hao-Wen Cheng:
Adaptive Artificial Bee Colony for Numerical Optimization. 174-177 - Ushio Jimbo, Ryota Shioya, Masahiro Goshima:

Application of Timing Fault Detection to Rocket Core on FPGA. 178-181 - Naoya Niwa

, Tomohiro Totoki, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano:
An Trace-Driven Performance Prediction Method for Exploring NoC Design Optimization. 182-185 - Miguel Zenon Nicanor Lerias Saavedra, William Emmanuel Yu:

Towards Large Scale Packet Capture and Network Flow Analysis on Hadoop. 186-189 - Goktug Inal, Gurhan Kucuk:

Application of Machine Learning Techniques on Prediction of Future Processor Performance. 190-195 - Kyeong Soo Kim

:
Hybrid Building/Floor Classification and Location Coordinates Regression Using A Single-Input and Multi-Output Deep Neural Network for Large-Scale Indoor Localization Based on Wi-Fi Fingerprinting. 196-201 - Hiroto Kizuna, Hiroyuki Sato:

Accelerating Facial Detection for Improvement of Person Identification Accuracy in Entering and Exiting Management System. 202-208 - Naoki Matsumura, Hiroki Tokura, Yuki Kuroda, Yasuaki Ito, Koji Nakano

:
Tile Art Image Generation Using Conditional Generative Adversarial Networks. 209-215 - Truong Thao Nguyen

, Mohamed Wahib, Ryousei Takano:
Hierarchical Distributed-Memory Multi-Leader MPI-Allreduce for Deep Learning Workloads. 216-222 - Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:

Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation. 223-227 - Zhenghang Zhong, Zhe Tang, Xiangxing Li, Tiancheng Yuan, Yang Yang, Meng Wei, Yuanyuan Zhang

, Renzhi Sheng, Naomi Grant, Chongfeng Ling, Xintao Huan
, Kyeong Soo Kim
, Sanghyuk Lee:
XJTLUIndoorLoc: A New Fingerprinting Database for Indoor Localization and Trajectory Estimation Based on Wi-Fi RSS and Geomagnetic Field. 228-234 - Kei Takahashi, Takumi Numajiri, Masaru Sogabe, Katsuyoshi Sakamoto, Koichi Yamaguchi, Tomah Sogabe:

Development of Generic CNN Deep Learning Method Using Feature Graph. 235-238 - Hirobumi Tominaga, Asuka Nakamura, Yoshitaka Maekawa:

Evaluation of EMVA Using the Instruction-Level Parallelism on Tegra X1. 239-242 - Kazunori Mikami, Kenji Ono, Jorji Nonaka

:
Performance Evaluation and Visualization of Scientific Applications Using PMlib. 243-249 - Hitoshi Murai, Mitsuhisa Sato, Masahiro Nakao, Jinpil Lee:

Metaprogramming Framework for Existing HPC Languages Based on the Omni Compiler Infrastructure. 250-256 - Kenya Yamada, Takahiro Katagiri, Hiroyuki Takizawa

, Kazuo Minami, Mitsuo Yokokawa
, Toru Nagai, Masao Ogino:
Preconditioner Auto-Tuning Using Deep Learning for Sparse Iterative Algorithms. 257-262 - Hideo Matsufuru

, Kohsuke Sumiyoshi:
Accelerating Numerical Simulations of Supernovae with GPUs. 263-266 - Guillaume Carel, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Shunsuke Araki:

Design of a Message Authentication Protocol for CAN FD Based on Chaskey Lightweight MAC. 267-271 - Kazuki Hazama, Hiroyuki Ebara:

Branch and Bound Algorithm for Parallel Many-Core Architecture. 272-277 - Sayaka Kamei

, Hirotsugu Kakugawa:
Self-Stabilizing Algorithm for Dynamically Maintaining Two Disjoint Dominating Sets. 278-284 - Yonghwan Kim

, Junya Nakamura
, Yoshiaki Katayama, Toshimitsu Masuzawa:
A Cooperative Partial Snapshot Algorithm for Checkpoint-Rollback Recovery of Large-Scale and Dynamic Distributed Systems. 285-291 - Yuta Kodera, Minoru Kuribayashi

, Takuya Kusaka, Yasuyuki Nogami:
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage. 292-297 - Wilbert Jethro Limjoco, Nestor Michael C. Tiglao:

An Analytical Model of Energy-Aware RPL for Wireless Sensor Networks. 298-304 - Makoto Miyazaki, Susumu Matsumae

:
A Pipeline Implementation for Dynamic Programming on GPU. 305-309 - Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park:

Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer. 310-315 - Alexander Yakubov, Wazen M. Shbair

, Radu State:
BlockPGP: A Blockchain-Based Framework for PGP Key Servers. 316-322 - Asuka Nakamura, Hirobumi Tominaga, Yoshitaka Maekawa:

Evaluation of Hierarchical Pincers Attack Search on Distributed Memory Systems. 323-326 - Donghong Qin, Lina Ge, Ting Lv:

Incentive Driving Multipath Inter-Domain Routing. 327-330 - Mahdillah Mahdillah, Shinya Nakayama, Qian Zhao, Takaichi Yoshida:

An Adaptable Scheduling for Self-Reconfigurable Objects. 331-336 - Hiroshi Michizu, Yuichi Sudo

, Hirotsugu Kakugawa, Toshimitsu Masuzawa:
Energy Balancing by Wireless Energy Transfer in Sensor Networks. 337-343 - Hideki Mori:

Fault Tolerance of Small World Network Architecture. 344-349 - Daiki Ojima, Minoru Uehara, Takashi Mihara:

Optimization of Delivery Considering Redelivery and Loading Methods. 350-355 - Hideki Shimura, Hiroyuki Noda, Hideharu Amano:

C4: An FPGA-based Compression Algorithm for ExpEther. 356-362 - Tomohiro Totoki, Michihiro Koibuchi, Hideharu Amano:

An Extension of A Temperature Modeling Tool HotSpot 6.0 for Castle-of-Chips Stacking. 363-369 - Weibin Wang, Minoru Uehara, Haruo Ozaki:

System Optimum Traffic Assignment for Connected Cars. 370-375 - Yoshiomi Otsuka, Toshiya Aramaki

:
Application of an Online Questionnaire to Secure the Diversity of Planungszelle Participant Attributes. 376-379 - Ryusei Saka, Minoru Uehara:

Implementations of Droplets in Managed Network Blocks. 380-382 - Jubee Tada:

A Cache Replacement Policy with Considering Global Fluctuations of Priority Values. 383-386 - Motoi Yamagiwa, Minoru Uehara:

Development of Eco Volunteer Computing System. 387-390 - Tomoki Agematsu, Satoshi Obana:

How to Realize Highly Accurate Computation with Fully Homomorphic Encryption. 391-397 - Yuya Ban, Toshihiro Yamauchi

:
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory. 398-404 - Junta Imai, Mamoru Mimura

, Hidema Tanaka:
Verifiable Secret Sharing Scheme Using Hash Values. 405-409 - Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Atsushi Suda:

A Construction of Cramer-Shoup Like Encryption Protocols Based on the Anshel-Anshel-Goldfeld Key Exchange Protocol. 410-416 - Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai:

Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding. 417-423 - Mamoru Mimura

:
On the Effectiveness of Extracting Important Words from Proxy Logs. 424-430 - Hiroya Miura, Mamoru Mimura

, Hidema Tanaka:
Discovering New Malware Families Using a Linguistic-Based Macros Detection Method. 431-437 - Motoki Miyano, Satoshi Obana:

Updatable Searchable Symmetric Encryption with Fine-Grained Delete Functionality. 438-444 - Yuki Nanjo, Md. Al-Amin Khandaker

, Takuya Kusaka, Yasuyuki Nogami:
Consideration of Efficient Pairing Applying Two Construction Methods of Extension Fields. 445-451 - Hiroki Ogawa, Eiji Takimoto

, Koichi Mouri, Shoichi Saito:
User-Side Updating of Third-Party Libraries for Android Applications. 452-458 - Magdalena Payeras-Capellà, Macià Mut Puigserver, Miquel Angel Cabot-Nadal:

Smart Contract for Multiparty Fair Certified Notifications. 459-465 - Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko:

A New Higher Order Differential of FeW. 466-471 - Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai:

Neural Cryptography Based on the Topology Evolving Neural Networks. 472-478 - Ryuga Matsumura, Takeshi Sugawara

, Kazuo Sakiyama:
A Secure LiDAR with AES-Based Side-Channel Fingerprinting. 479-482 - Yuji Suga:

Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" Issues. 483-485 - Masahiro Arai, Fumiko Akagi, Saneyasu Yamaguchi, Kazuetsu Yoshida:

Improving Performance of Transposition Algorithm of 3-D Data Array for Parallelization Using Message Passing Interface. 486-490 - Tomoya Arakawa, Shun Shiramatsu, Akira Iwata:

Wandering Path Visualization System Prototype for Finding Wandering Elderly People Using BLE Beacon. 491-495 - Hideo Inagaki, Ryota Kawashima

, Hiroshi Matsuo:
Improving Apache Spark's Cache Mechanism with LRC-Based Method Using Bloom Filter. 496-500 - Kengo Jingu, Kohta Shigenobu, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota:

An Implementation of LLVM Pass for Loop Parallelization Based on IR-Level Directives. 501-505 - Joichiro Kon, Gil Jae Lee, José A. B. Fortes, Saneyasu Yamaguchi:

A Kernel-Based Method for Resolving Performance Inefficiencies in Mining Frequent-Patterns in Encrypted Data. 506-510 - Kuan-Chu Lu, I-Hsien Liu

, Jung-Shian Li:
Venerability and Protection Tool Surveys of Industrial Control System. 511-515 - Makoto Nakagami, Joichiro Kon, Gil Jae Lee, José A. B. Fortes, Saneyasu Yamaguchi:

File Placing Location Optimization on Hadoop SWIM. 516-519 - Takafumi Miyazaki, Hayato Hidari, Naohisa Hojo, Ittetsu Taniguchi

, Hiroyuki Tomiyama:
Revisiting Thread Execution Methods for GPU-Oriented OpenCL Programs on Multicore Processors. 520-523 - Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:

Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems. 524-528 - Joji Toshima, Akiko Takahashi:

Design of an Incentive Decision Method for an Agriculture Information Sharing System. 529-533 - Yao Xu, Hiroshi Koide

, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Tracing MIRAI Malware in Networked System. 534-538 - Yuta Yamada, Satoshi Fujita:

Load Balancing in P2P Video Streaming Systems with Service Differentiation. 539-543 - Bin Zhang, Masahide Kaneko, Hunok Lim:

Robust Mapping for the Autonomous Mobile Robot Considering Potential Occupied Spaces of Objects. 544-548 - Chih-Min Chao, Wei-Che Lee, Cong-Xiang Wang, Shin-Chung Huang, Yu-Chich Yang:

A Flexible Anti-Jamming Channel Hopping for Cognitive Radio Networks. 549-551 - Hiroya Ikeda, Hiroki Yamane, Yuki Shibayama, Mutsumi Kimura, Yasuhiko Nakashima:

Evaluation of Letter Reproduction System Using Cellular Neural Network and Oxide Semiconductor Synapses by Logic Simulation. 552-554 - Masato Kitou, Takahiro Sasaki, Kazuhiko Ohno:

Performance Evaluation of Dynamic Cell Allocation Cache Using Cycle Accurate Simulator. 555-557 - Ting Lv, Donghong Qin, Lina Ge:

Research and Analysis of Statistical Characteristics of Internet Exchange Points. 558-560 - Wai Kyi Kyi Oo, Hiroshi Koide

, Danilo Vasconcellos Vargas, Kouichi Sakurai:
A New Design for Evaluating Moving Target Defense System. 561-563 - Yusuke Sato, Masato Oguchi, Saneyasu Yamaguchi:

Mobile Application Aware Smartphone CPU Clock Frequency Optimization. 564-566

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














