


default search action
13th CANDAR 2025: Yamagata, Japan - Workshops
- Thirteenth International Symposium on Computing and Networking, CANDAR 2025 - Workshops, Yamagata, Japan, November 25-28, 2025. IEEE 2025, ISBN 979-8-3315-5533-7

- Attila Egri-Nagy:

Bringing Algebraic Hierarchical Decompositions to Concatenative Functional Languages. 1-7 - Ryo Enkita, Chisa Takano, Hiroyasu Obata, Yasuhiro Ohishi, Masaki Aida:

Performance Evaluation of Load Distribution System based on Diffusion Equation for Asymmetric Network Model. 8-14 - Soma Kato, Ryoma Katsube, Tomoaki Ukezono, Kouichi Sakurai:

Random Trace Shifting by OSs for Side-Channel-Resilient Execution of Legacy Program Binaries. 15-21 - Zeyi Li, Zhe Tang, Kyeong Soo Kim, Sihao Li, Jeremy S. Smith:

EKF-Based Fusion of Wi-Fi/LiDAR/IMU for Indoor Localization and Navigation. 22-28 - Katsuya Matsubara, Yuzuki Saito, Daigo Fujii, Yuki Nakata:

Seamless Self-Healing in WebAssembly Container Orchestration with Runtime-Neutral Checkpointing. 29-35 - Kazuichi Oe, Kento Aida:

Dynamic Cache Reconfiguration for IO-Intensive Applications in Hybrid Storage Systems. 36-42 - Takashi Yokota, Kanemitsu Ootsu, Takuma Kitamoto:

A Practical Approach for Optimizing Routes and Injection Timing of Packets for Rapid Collective Communication. 43-48 - Ryo Nakanowatari, Jubee Tada:

Design of a Matrix Multiplier using a Compressed Ternary Format. 49-51 - Yuki Tada, Takuo Niinuma, Jubee Tada:

Design and Implementation of a Dynamic Cache Profiler. 52-54 - Nishchal Acharya, Prabhat K. C., Sajan Maharjan, Prabhat Bhatta

, Masafumi Koike
, Masako Saito, Katsuhiko Hibino, Atsushi Ito:
Acoustic Signal-Based Binary Classification for Brick Wall Inspection by Hammering Test. 55-61 - Ranyelson Neres Carvalho, Jacir Luiz Bordim, Eduardo A. P. Alchieri:

SHIELD-P4: A Trust-based DDoS Mitigation in the Programmable Data Plane. 62-68 - Santosh Giri, Jebish Purbey

, Sunil Adhikari, Atsushi Ito, Babu R. Dawadi, Sushant Chalise, Sanjivan Satyal:
Automatic Monument Detection: Leveraging Deep Learning for Cultural Heritage Applications. 69-75 - Toshiaki Kawagoshi, Naoto Hoshikawa:

Three-Stage CLIP-Based Approach for Rebar Rust Classification in Precast Concrete Products. 76-82 - Mark Mizzi, Johann A. Briffa:

GPU implementation of binary and non-binary LDPC decoding. 83-89 - Satoki Tsuji, Yasuaki Ito, Nobuya Yokogawa, Kanta Suzuki, Koji Nakano, Victor Parque, Akihiko Kasagi:

A GPU Implementation of the Second- and Third-Order Møller-Plesset Perturbation Theory. 90-96 - Yuecheng Yao, Katunobu Itou:

Emotion and Genre-Based Music Recommendation System. 97-103 - Yiqing Zhou, Xule Zhou, Zecan Cheng, Chenao Lu, Junhan Chen, Jiahong Pan, Yizhuo Liu, Sihao Li, Kyeong Soo Kim:

Impact of Environmental Factors on LoRa 2.4 GHz Time of Flight Ranging Outdoors. 104-108 - A. Y. Vasilyev:

On implicit gradient regularization in neural-ordinary-differential-equation control. 109-112 - Shintaro Yamamoto, Kazuhiko Ohno:

Performance Estimation Using Both Source and Assembly Code for Data Layout Optimization on GPU. 113-116 - Mingyang Zhang, Yoshihiro Adachi, Junwu Zhu, Minoru Uehara:

Emotion Analysis for Chinese Text Using an OpenAI Embedding Model. 117-120 - Andrea Aliberti, Yonghwan Kim, Yoshiaki Katayama:

Limits of Fault-Tolerant Observation: Impossibility of Gathering in the (4,2)-Defected View Model. 121-127 - Hannes Fassold:

I see what you do: The HumAct algorithm for live human action recognition and applications. 128-134 - Tuan Hai Vu, Doanh C. Bui, Vu Trung Duong Le, Pham Hoai Luan, Yasuhiko Nakashima:

Transfer-Based Strategies for Multi-Target Quantum Optimization. 135-141 - Tatsuro Hanyu, Takahiro Katagiri, Daichi Mukunoki, Tetsuya Hoshino:

An Algorithm Portfolio Approach for Parameter Tuning in Coherent Ising Machines. 142-148 - GilTak Kong, Un-Sook Choi:

Cellular Automata Denoising Framework for Salt-and-Pepper Noise Considering Directional Structure and Local Homogeneity. 149-153 - Yutaro Nakahara, Shunsuke Tsukiyama, Koji Nakano, Yasuaki Ito, Victor Parque, Takashi Yazane, Takumi Kato, Kanto Teranishi:

A QUBO-based approach to the Generalized Quadratic Assignment Problem. 154-158 - Yoshiki Noguchi, Keichi Takahashi, Chonho Lee, Susumu Date:

Exploring Diverse Cloud Bursting Policies Using Pareto Conditioned Networks. 159-165 - Fukuhito Ooshita, Hirotsugu Kakugawa, Sayaka Kamei, Masahiro Shibata:

Crash-tolerant perpetual exploration of myopic luminous robots with fewer colors on rings. 166-172 - Tomohiro Suzuki:

Multi-color ordering method for minimizing number of colors in quadratic unconstrained binary optimization formulation. 173-179 - Xiaoyan Li, Kazumi Saito:

A Method for Accelerating Node Influence Computation in Social Networks Focusing on the Largest Strongly Connected Component. 180-186 - Yu Inoue, Atsushi Hori, Takao Marukame, Tetsuya Asai, Alexandre Schmid, Kota Ando:

Co-Optimization of Models and Hardware for Neural Network Inference in Variable-Parallelism Processor. 187-190 - Naoya Kamakura, Akihiro Fujiwara:

An asynchronous P system with branch and bound for solving N-puzzle. 191-194 - Shigeru Ninagawa:

Flying Register in a Three-State Face-Centered Cubic Cellular Automaton. 195-198 - Yitong Wang, Keiichi Kaneko:

Pairwise Disjoint Paths Routing in Bicubes. 199-202 - Shuhei Deno, Ryo Nojima, Lihua Wang:

Redactable Signature for Data Anonymization. 203-209 - Kittipat Wattanasuwan, Atikan Mangkala, Panat Kitchon, Somchart Fugkeaw:

A Dynamic XSS Attack Detection System with Realtime and Fast Response based on Transformer Learning Model and Adaptive Rule-based System. 210-216 - Kittipat Tangtanawirut, Archawit Changtor, Pakapon Rattanasrisuk, Somchart Fugkeaw:

ZAPx: Extending OWASP ZAP for Enhanced Web Vulnerability Detection and AI-Powered Remediation. 217-223 - Thanh Hai To, Vu-Trung Duong Le, Van Tinh Nguyen, Van-Tuan Luu, Hoai Luan Pham, Yasuhiko Nakashima:

zk-STARKs in Action: Real-Time and Post-Quantum Verification for Banking Transactions. 224-230 - Yixuan He, Yuta Kodera, Yasuyuki Nogami:

Improved Threshold Fully Homomorphic Encryption with Dynamic Role-based Share Refresh. 231-237 - Haruki Hirose, Yuichi Komano:

Designated Confirmer Sanitizable Signature suitable for Audit Log. 238-244 - Yuma Ito, Ryotaro Kobayashi:

Server Load-Aware False-Positive Reduction in an FPGA-Based Machine-Learning Network Intrusion Prevention System. 245-251 - Takeshi Kawamoto

, Maharage Nisansala Sevwandi Perera, Franziska Zimmer
, Ryosuke Kobayashi, Mhd Irvan, Rie Shigetomi Yamaguchi:
Player Authentication in Fighting Games using Controller Operation Dynamics. 252-258 - Hiroki Kuzuno, Toshihiro Yamauchi:

vkFlow: Automated Identification of Vulnerable Kernel Function Related to System Call. 259-266 - Kazuki Oe, Hiroki Kuzuno, Keiichiro Kimura, Makoto Takita, Yoshiaki Shiraishi:

Proposal of Detection Method for Remaining Vulnerability for Software Development Environment. 267-273 - Kosei Okumura, Ryotaro Kobayashi:

Penetration Testing Without Port Scanning Using EPSS-Based Vulnerability Lists in Port-Scan Countermeasure Environments. 274-279 - Thanh Phong Do, Yasushi Yamazaki:

Robust Flick-Based Continuous Authentication via CTGAN-Generated Touch Features. 280-286 - Naoki Shibayama, Yasutaka Igarashi:

Integral Characteristics of Piccolo derived by Bit-based Division Property. 287-293 - Yuuki Tachioka:

Decoder-free Audio Watermarking via Visual Cryptography in Time-Frequency Domain. 294-300 - Chihiro Toyoshima, Ryotaro Kobayashi, Masahiko Kato:

Improving Malware Detection Accuracy with Instruction-Sequence Features Using AMH. 301-307 - Tomoki Yasui, Hidenobu Watanabe:

Proposal of an Identity Verification System Using Trusted Execution Environment in the Japan's Digital Authentication App. 308-313 - Ryo Asaoka, Akihiro Nakao, Masato Oguchi, Saneyasu Yamaguchi:

Accelerating Service Identification in Network Elements using SNI Exclusion. 314-318 - Koki Hotta, Hiroyuki Hatano, Kosuke Sanada, Kazuo Mori:

A Novel GNSS Satellite and Pseudorange Selection Method for Robust Positioning in Urban Canyons. 319-323 - Qianlong Liao, Nobuhiko Yamaguchi, Tsubasa Nozoe, Munehiro Tanaka, Hiroshi Okumura, Kalpani Abeysinghe:

Leaf area estimation of tomato plants using a monocular depth estimation model. 324-327 - Sopharith Phan, Jigang Liu:

A Viability Analysis of IPFS as a Decentralized Storage Solution to IoT. 328-332 - Taichi Mushika, Ayano Naito, Hidekazu Suzuki:

Proposal and Evaluation of CYPHONIC with QUIC Datagram Mode. 333-337 - Kotaro Oikawa

, Zhe Sun, Takashi Michikawa, Shin Yoshizawa, Shigeho Noda, Ruggero Micheletto, Hideo Yokota:
Consistent Video Compression using H.266/VVC based on Spatio-Temporal Color Gradients. 338-342 - Manato Okawara, Kanemitsu Ootsu, Takuma Kitamoto, Takashi Yokota:

Performance Evaluation of CNN using RISC-V Vector Extension for Embedded System. 343-346 - Seiya Yaguchi, Ryusuke Egawa:

Anomaly Detection in HPC Systems using Time Difference Analysis of Reconstructed Data. 351-355 - Ryota Yamamoto, Susumu Matsume:

Measurement of Baseball Spin Rate Using a Smartphone Camera. 356-359 - Moyo Yanagi, Nobuyuki Yamasaki:

Pseudo-SMT Processor with Context Cache. 360-364 - Naoki Fujieda, Rei Yokoyama, Takuji Ebinuma:

A flexible FPGA implementation of GNSS signal acquisition circuit using high level synthesis. 365-367 - Soma Kai, Chikatoshi Yamada:

Consideration of Network Anomaly Detection Models using Machine Learning. 368-370 - Sho Kato, Madoka Hasegawa, Naoya Tsuruta, Atsushi Ito:

Outdoor Positioning Method for Tourism Apps Using BLE Beacon and GNSS. 371-373 - Kosei Kishimoto, Nobuhiko Yamaguchi, Sakiko Kimura, Masatomo Miura, Osamu Fukuda, Wen Liang Yeoh:

Prediction of plasma drug concentration of lenvatinib using missing data imputation. 374-376 - Kazuki Kogure, Nobuyuki Yamasaki:

Exploring Shared Reservation Stations for Embedded Processors. 377-379 - Andrea Rosà, Joy Albertini, Júnior Löff, Walter Binder:

JVProf: Locating Vectorization Candidates in JVM Applications. 380-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














