


default search action
9th CANDAR 2021: Matsue, Japan - Workshops
- Ninth International Symposium on Computing and Networking, CANDAR 2021 - Workshops, Matsue, Japan, 23-26 November 2021. IEEE 2021, ISBN 978-1-6654-1218-6

- Shogo Amita, Akihiro Fujihara:

A Performance Evaluation of Vehicular Swarm Intelligence for Seamless Route Guidance using Opportunistic Networking. 1-7 - Hiroto Fujita, Yasuyuki Tanaka, Kosuke Mori, Fumio Teraoka:

Efficient RPL Tree Construction Using Passive Link Quality Estimation. 8-14 - Tsubasa Fukumura, Hayato Aratame, Atsushi Ito, Masafumi Koike

, Katsuhiko Hibino, Yoshihisa Kawamura:
Improvement of Sound Classification Method on Smartphone for Hammering Test Using 5G Network. 15-20 - Kobayashi Kakeru, Satoshi Fujita:

An Enhancement of Physical Web with Stateful BLE Beacons. 21-27 - Yuko Ikeda, Hiroyasu Obata, Kenji Ishida:

Performance Evaluation of Information Floating with Limited Expiration Time in Terms of Information Reception Time and Error Diffusion Rate. 28-34 - Haruki Ishizaki, Eitaro Kohno, Yoshiaki Kakuda:

On the Suppression of Loops with Long Hops During Scatternet Configuration in Bluetooth MANETs. 35-41 - Hiroyasu Obata, Chisa Takano:

Switching Method of Media Access Control for Improving Fairness of Throughput between WLAN systems under Adjacent Channel Interference. 42-48 - Shuichi Tokunaga, Satoshi Ohzahata, Ryo Yamamoto

:
A Link State Routing Method for CCN with Blockchain. 49-55 - Masami Yoshida, Alberto Gallegos Ramonet

, Taku Noguchi
:
Adaptive Network Coding Broadcasting based on Node Mobility in Mobile Ad-hoc Networks. 56-61 - Jun Zhou, Masaaki Kondo:

A Lightweight Interactive Graph Processing Library for Edge Computing in Smart Society. 62-68 - Fatema Akhter, Sun Yuanshuai, Nobuo Funabiki, Hendy Briantoro

, Kwenga Ismael Munene, Md. Mahbubur Rahman:
Feasibility Investigations of Access-Point Transmission Power Optimization Method under Co-use of Channel Bonding and Non Channel Bonding in Wireless Local-Area Network. 69-72 - Takuya Mizushiro, Teruaki Kitasuka:

Porting Caching Functions to Named Data Networking Forwarding Daemon (NFD). 73-76 - Haruka Yoshimoto, Kazuki Sakai, Yuko Hiramatsu, Atsushi Ito:

Building a sensor network to measure drivers' emotions. 77-80 - Naoki Fujieda

:
A Python-based evaluation framework for stochastic computing circuits on FPGA SoC. 81-86 - Jixin Han, Tomofumi Yuki, Michelle Mills Strout, Dan Umeda, Hironori Kasahara, Keiji Kimura:

Parallelizing Compiler Translation Validation Using Happens-Before and Task-Set. 87-93 - Yunjiao Ma, Yuan He

, Yasutaka Wada, Wenchao Luo, Ryuichi Sakamoto, Masaaki Kondo:
Mitigating Process Variations with Cooperative Tuning for Performance and Power through a Simple DSL. 94-100 - Akiyuki Mamiya, Nobuyuki Yamasaki:

Data Rearrange Unit for Efficient Data Computation in Embedded Systems. 101-106 - Yuta Masuda, Yasuhiro Nakahara, Motoki Amagasaki, Masahiro Iida:

Automatic executable code generation for DNN accelerator ReNA. 107-113 - Reon Oshio

, Atsushi Sawada, Mutsumi Kimura, Renyuan Zhang, Yasuhiko Nakashima:
Preliminary Evaluation for Multi-domain Spike Coding on Memcapacitive Neuromorphic Circuit. 114-119 - Daiki Saito, Takahiro Hirofuchi, Hiroko Arai, Yukinori Sato:

A simulation of a memory subsystem using a highly energy-efficient but erroneous MRAM. 120-126 - Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:

Performance Study of Kotlin and Java Program Considering Bytecode Instructions and JVM JIT Compiler. 127-133 - Van-Cam Nguyen, Yasuhiko Nakashima:

Analysis of Fully-Pipelined CNN Implementation on FPGA and HBM2. 134-137 - Ranyelson Neres Carvalho, Lucas Rodrigues Costa

, Jacir Luiz Bordim, Eduardo A. P. Alchieri:
Detecting DDoS Attacks on SDN Data Plane with Machine Learning. 138-144 - Jiamian Huang, Yasuaki Ito, Koji Nakano

:
A GPU Implementation of Watercolor Painting Image Generation. 145-151 - Tomohiro Ishigami, Teijiro Isokawa, Naotake Kamiura, Hiroki Masumoto, Hitoshi Tabuchi:

Instillation Checking Using Long Short-Term Memories for Ophthalmology Patients. 152-158 - Kota Matsuyama, Tomonobu Ozaki:

Heuristic extraction of co-occurrence patterns for effective construction of graph-based interpretable decision sets. 159-165 - Manh Tuan Nguyen, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:

Acceleration and higher precision by discrete wavelet transform for single image super-resolution using convolutional neural networks. 166-172 - Kenta Shimada, Tomonobu Ozaki:

Adversarial attack detection on node classification by autoencoder-based analysis of hidden layers in graph convolutional networks. 173-179 - Daisuke Takafuji, Koji Nakano

, Yasuaki Ito, Akihiko Kasagi:
Acceleration of Deflate Encoding and Decoding with GPU implementations. 180-186 - Toi Tsuneda, Taro Kiriyama, Kousuke Shintani, Satoshi Yamane:

GANs with Suppressed Mode Collapse Using Intrinsic Rewards. 187-192 - Abdalla Elmokhtar Ahmed Elesawi, Kyeong Soo Kim

:
Hierarchical Multi-Building And Multi-Floor Indoor Localization Based On Recurrent Neural Networks. 193-196 - Yojiro Harie

, Sangam Babu Neupane, Bishnu Prasad Gautam
, Norio Shiratori:
Augmented Triplet Network for Individual Organism and Unique Object Classification for Reliable Monitoring of Ezoshika Deer. 197-200 - Kazuhiko Komatsu, Masahito Kumagai

, Ji Qi, Masayuki Sato, Hiroaki Kobayashi:
An Externally-Constrained Ising Clustering Method for Material Informatics. 201-204 - Tomohiro Suzuki:

Empirical parameter tuning of task-based tiled QR factorization using quantum annealing. 211-216 - Wenbin Wang, Jiahao Li, Yoichi Shimomura, Hiroyuki Takizawa

:
A memory bank conflict prevention mechanism for SYCL on SX-Aurora TSUBASA. 217-222 - Yuto Katoh, Keiichiro Fukazawa, Takeshi Nanri, Yohei Miyake:

Cross-Reference Simulation by Code-To-Code Adapter (CoToCoA) Library for the Study of Multi-Scale Physics in Planetary Magnetospheres. 223-226 - Toshikazu Ishida, Shuichi Inokuchi:

Commutativity of Composition of some Elementary Cellular Automata with Essentially 2-Neighborhood Local Functions over Monoids. 227-233 - Luca Manzoni, Luca Mariot, Eva Tuba

:
Tip the Balance: Improving Exploration of Balanced Crossover Operators by Adaptive Bias. 234-240 - Kosei Nagao, Akihiro Fujiwara:

An asynchronous P system with branch and bound for solving the subset sum problem. 241-247 - Tomoya Uchihara, Morikazu Nakamura:

Petri Net based Mathematical Programming for Optimal Resource Assignment Problems with Multiple Resource Requirements. 248-253 - Yaodong Wang, Yamin Li:

Hybrid Interconnection Networks for Reducing Hardware Cost and Improving Path Diversity Based on Fat-Trees and Hypercubes. 254-260 - Burak Çetinkaya, Johannes Stadler, Nguyen Anh Vu Doan:

Classification Models in Genetic Algorithms for Commonality Optimization in Passive Crash Safety. 261-267 - Ariel Kamoyedji, Nobuo Funabiki, Hein Htet

, Minoru Kuribayashi:
A Proposal of Dynamic Job Scheduling Algorithm Considering CPU Core Utilization for User-PC Computing System. 268-271 - Tomoya Akabe

, Renyuan Zhang, Yasuhiko Nakashima:
Speeding Up of CGRAs by Reshaping and Stochastic FMA. 272-277 - Sven Köhler, Lukas Wenzel, Max Plauth, Pawel Böning, Philipp Gampe, Leonard Geier, Andreas Polze:

Recognizing HPC Workloads Based on Power Draw Signatures. 278-284 - Hirotsugu Kakugawa, Sayaka Kamei

:
A Distributed Multi-group Mutual Exclusion Algorithm for Intersection Traffic Control. 285-291 - Hideto Kayashima, Hideharu Amano:

Analysis of Resistance Distribution and Voltage Drop in Chips with Inductive Coupling Wireless Communication Interface. 292-296 - Renzhi Mao, Kaijie Wei

, Hideharu Amano, Yuki Kuno, Masatoshi Arai:
Weight Least Square Filter for Improving the Quality of Depth Map on FPGA. 297-300 - Shusuke Nakazato, Nobuhiko Nakano:

Speech Signal Processing Using Consonant-Vowel Location Detection. 301-304 - Yoshiomi Otsuka:

Evaluation of the effect of ICT in education on the academic literacy of high school students. 305-308 - Rei Watanabe, Jubee Tada, Keiichi Sato:

An Implementation of a World Grid Square Codes Generator on a RISC-V Processor. 309-312 - Mutsuki Deguchi, Masahiko Katoh, Ryotaro Kobayashi:

Evaluation of implementability in a malware detection mechanism using processor information. 313-319 - Shuntaro Ema, Yuta Sato, Keita Emura, Toshihiro Ohigashi

:
Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC. 320-325 - Ryosuke Kobayashi, Rie Shigetomi Yamaguchi:

Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by Smartphone. 326-331 - Seitaro Mishima, Kazuhisa Nakasho, Yuuki Takano, Atsuko Miyaji

:
A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection. 332-338 - Masaki Nakanose, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:

Consideration of the side-channel attack to SPECK implemented on Arduino Uno. 339-345 - Katsuya Nishijima, Takao Kondo

, Tatsumi Hosokawa, Tomohiro Shigemoto, Nobutaka Kawaguchi, Hiroyuki Hasegawa, Hideyuki Honda, Yasuhito Suzuki, Tadashi Kaji, Osamu Nakamura:
Verification of the Effectiveness to Monitor Darknet across Multiple Organizations. 346-351 - Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato, Hideo Taniguchi:

Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM. 352-358 - Mirang Park, Kentaro Aburada, Naonobu Okazaki:

Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches. 359-364 - Kittiphon Phalakarn

, Vorapong Suppakitpaisarn, M. Anwar Hasan:
Single-round Lattice-based Multisignatures. 365-371 - Kaichi Sato, Satoshi Obana:

Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication Function. 372-378 - Naoki Shibayama, Yasutaka Igarashi:

A New Higher Order Differential of Enocoro-128v2. 379-384 - Kentaro Takeshita, Michiko Harayama:

Improvement of Hybrid NIDS Using Deep Learning for Practical Use. 385-391 - Yuya Tajima, Hiroshi Koide

:
Applying The Attacks Tracer on Advanced Persistent Threats to Real Networks. 392-397 - Tomoya Terashima, Masahiro Nakayama, Teruaki Yokoyama, Hiroshi Koide

:
KAKOI: A New Tool to Make Simple and Secure Build Cyber Ranges Using Public Cloud. 398-404 - Moeka Yamamoto, Shohei Kakei

, Shoichi Saito:
FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices. 405-411 - Harunobu Enami, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:

Consideration of the side-channel attack to SIMON implemented on Arduino Uno. 412-415 - Phung Minh Ngoc, Mamoru Mimura:

Data augmentation of JavaScript dataset using DCGAN and random seed. 416-419 - Hideya Sato, Ryotaro Kobayashi:

A machine learning-based NIDS that collects training data from within the organization and updates the discriminator periodically and automatically. 420-423 - Kazuki Chugo, Yukinori Sato:

Thread-Aware Cache Simulator for HPC Application Tuning. 424-428 - Sho Higa, Koji Yamada, Shihoko Kamisato:

Development of the Estimation Model for Intentions to Move Based on Gaze and Face Information with 1DCNN-LSTM and Evaluation of Electric Wheelchair Driving. 429-433 - Riku Hirabayashi, José A. B. Fortes, Saneyasu Yamaguchi:

Aggressiveness-Controllable Block-Level Cache. 434-438 - Yuta Imamura, Shota Fukui, Taito Manabe, Yuichiro Shibata:

An FPGA-based Power-saving Particle Filter Using Dynamic Reconfiguration. 439-443 - Motoshi Miyamoto, Ryota Kawashima, Hiroshi Matsuo:

Transparent Relational Database Caching Based on Storage Engines Using In-memory Database. 444-448 - Yuki Nakagawa, Shuichi Ohno, Shohei Yamamoto:

Recognition of Multiple Rectangular Stickers for Construction Machines. 449-453 - Thanapol Phungtua-Eng

, Yoshitaka Yamamoto, Shigeyuki Sako:
Detection for Transient Patterns with Unpredictable Duration using Chebyshev Inequality and Dynamic Binning. 454-458 - Atsushi Santo, Nobuyuki Yamasaki:

Real-Time Execution based on Fluid Scheduling by using IPC Control Scheme. 459-463 - Yuta Suzuki, Daiki Kuyoshi, Satoshi Yamane:

Single and Ensemble CNN Models with Out-Category Penalty in Cifar 10. 464-467 - Yoji Yamato:

Arranging resource amount after automatic GPU offloading. 468-472 - Siqi Zeng, Kosuke Kaneko, Ke Yan, Haowen Tan, Kouichi Sakurai:

Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum. 473-477 - Kuniyasu Imade, Toi Tsuneda, Satoshi Yamane, Kousuke Shintani, Taro Kiriyama:

Loss Function of GAN to Make a Clear Judgment. 478-480 - Kota Kumakura, Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi, Saneyasu Yamaguchi:

Observation of Method Invocation in Application Runtime in Android for CPU Clock Rate Adjustment. 481-483 - Ma Yunqi, Satoshi Fujita:

Distributed Rewarding for Browser-Based P2P Video Streaming with Ethereum Blockchain. 484-486 - Shumpei Miyake, Keita Ushida:

Supporting Music Arrangement, Ringer Assignment, and Score Preparation for Musicbell Ensembles. 487-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














