


default search action
10th CANDAR 2022: Himeji, Japan - Workshops
- 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022 - Workshops, Himeji, Japan, November 21-24, 2022. IEEE 2022, ISBN 978-1-6654-7532-7

- Jörg Fischer, Gerald Ulbricht, Robert Koch:

M2M-SCM: A Spatial Channel Model for Mobile-to-Mobile Communications in the VHF and UHF Band. 1-6 - Fukuyama Hiromi, Satoshi Fujita:

Causality-Aware Metadata Propagation Scheme for Federated Social Network Servers. 7-13 - Haruto Kawakami, Yosei Sato, Haruka Nakayama, Yuko Hiramatsu, Madoka Hasegawa, Hiromu Niitsuma, Kazutaka Ueda

, Yasunari Harada, Akira Sasaki, Atsushi Ito
:
Evaluation of sightseeing application using BLE beacon in Oku-Nikko. 14-19 - Kazuto Kobori, Chunghan Lee

, Toshio Hirotsu:
A Portable Time Synchronization Method using eBPF. 20-25 - Yuki Matsunaga, Tomoyuki Ohta:

An Evacuation System Using Autonomous Clustering-Based MANET for Sharing Disaster Information. 26-32 - Chao Zhang, Shigetomo Kimura

:
ALR Switching and Routing Strategy for Multiple Sites Based on Traffic Splitting Method for Power Saving. 33-39 - Rika Fukumori, Kaori Hara, Yuko Hiramatsu, Atsushi Ito

, Kento Arai, Shiori Ashibe, Yoshikazu Nagao, Akira Sasaki, Hirotsugu Yamamoto, Yukitoshi Otani, Masaki Yasugi, Yasutoshi Yoshiura:
Measurement of pH in the cow's rumen for high-quality dairy product. 40-43 - Kazuya Matsutani, Shigetomo Kimura

:
Delivery Routing to Reduce Calculation Load of Drones on Divided Logistics Areas for Drone Logistics Networks. 44-47 - Zhengyang Bai

, Tasuku Hiraishi, Akihiro Ida, Masahiro Yasugi, Keiichiro Fukazawa:
Construction of Hierarchical Matrix on Distributed Memory Systems using a Task Parallel Language. 48-54 - Yuto Hoshino, Hiroki Kawakami, Hiroki Matsutani:

Communication Size Reduction of Federated Learning based on Neural ODE Model. 55-61 - Till Lehmann, Lukas Wenzel, Max Plauth, Sven Köhler, Andreas Polze:

Accelerating Next Generation Genome Sequencing Leveraging High Bandwidth Memory on FPGAs. 62-68 - Hui Meng, Qian Zhao, Takaichi Yoshida:

A Study of Reconfigurable Switch Architecture for Chiplets Interconnection. 69-75 - Kenji Nemoto, Hiroki Matsutani:

A Packet Routing using Lightweight Reinforcement Learning Based on Online Sequential Learning. 76-82 - Yuki Shibuya, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa:

FPGA Implementation of Stream Cipher SOSEMANUK. 83-89 - Peiqi Zhang, Shinya Takamaeda-Yamazaki:

Multi-Input Adaptive Activation Function for Binary Neural Networks. 90-96 - Ryu Hashimoto, Tomonobu Ozaki:

Extraction of Preference and Classification Rules in Floor Plan Databases using Answer Set Programming. 97-102 - Shun Kasai, Yasunori Osana

:
A driver-based approach for DMA transfer between FPGA-GPU. 103-108 - Taiki Kondo, Hiroyuki Sato:

Accelerating Convolution Neural Networks in Embedded Intel GPUs. 109-113 - Rento Kurokochi, Tomonobu Ozaki:

Rule-based role estimation in werewolf games using probabilistic logic programming. 114-119 - Filippos Pantekis

, Phillip James:
Towards Massively Parallel GPU Assisted SAT. 120-126 - Hao Su

, Jiamian Huang, Yasuaki Ito, Koji Nakano
:
ConvUNeXt: A Lightweight Convolutional Neural Network for Watercolor Image Translation. 127-133 - Menglei Zhang, Yukikazu Nakamoto:

Toward ensuring better learning performance in reinforcement learning. 134-139 - Paul Zehner, Atsushi Hashimoto:

Influence of Time Integration Method on GPU Performance for Industry Relevant CFD Simulations. 140-146 - Yosuke Seki:

Dialogue System to Make Humor by Tatoe-Tsukkomi. 147-150 - Nobuhiko Yamaguchi, Hiroki Tokumaru, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh:

Bicycle-based collision prevention system using pedestrian trajectory prediction. 151-153 - Jing Bi, Vorapong Suppakitpaisarn:

Performances of Symmetric Loss for Private Data from Exponential Mechanism. 154-160 - Jion Hirose, Junya Nakamura

, Fukuhito Ooshita, Michiko Inoue:
Gathering despite a linear number of weakly Byzantine agents. 161-167 - Hirotsugu Kakugawa, Sayaka Kamei:

A linear-time self-stabilizing distributed algorithm for the minimal minus ($L, K, Z$) -domination problem under the distance-2 model. 168-173 - Vanel A. Lazcano

, Felipe Calderero:
Hybrid Model Convolutional Stage-Positive Definite Metric Operator-Infinity Laplacian Applied to Depth Completion. 174-179 - Xiaotian Li

, Koji Nakano
, Yasuaki Ito, Daisuke Takafuji, Takashi Yazane, Junko Yano, Shiro Ozaki, Ryota Katsuki, Rie Mori:
Bit duplication technique to generate hard QUBO problems. 180-184 - Yushan Li, Satoshi Fujita:

Design of Elixir-Based Edge Server for Responsive IoT Applications. 185-191 - Taisei Mori, Ibuki Kawamata, Satoshi Murata:

Self-replication and Mutation of Polymeric Molecules Simulated by Simplified Chemistry. 192-198 - Takuya Noguchi, Akihiro Fujiwara:

An asynchronous P system for solving the maximum clique problem with the Bron-Kerbosch algorithm. 199-205 - Masato Osugi, Danilo Vasconcellos Vargas:

Image Generation from Text and Segmentation. 206-211 - Takuya Shinjo, Morikazu Nakamura

, Norihiko Itani:
QUBO Model Formulation for Flow-shop Scheduling Problems with Changeover based on Timed Colored Petri Nets. 212-217 - Kenshiro Tamata, Tomohiro Mashita:

3D Mesh Generation from a Defective Point Cloud using Style Transformation. 218-223 - Yuta Tanaka, Tomonobu Ozaki:

An extension of optimal fashion capsule wardrobe construction by considering visual dissimilarity and number of good coordinates. 224-228 - Aoi Hiruma, Kensuke Iizuka, Hideharu Amano:

Toward a training of CNNs on a multi-FPGA system. 229-235 - Zhongyang Hou, Kaijie Wei, Hideharu Amano, Kazuhiro Nakadai:

An FPGA off-loading of HARK sound source localization. 236-240 - Osamu Ishimura, Yoshihide Yoshimoto:

Just-In-Time Compiler System in Aspect-Oriented Programming based Building Block Platform for constructing Domain-Specific Language for HPC Application. 241-247 - Marcos J. Santos-Neto, Jacir Luiz Bordim, Eduardo A. P. Alchieri, Edison Ishikawa, Leonardo S. Dourado:

Detecting DDoS Attacks in SDN using a Hybrid Method with Entropy and Machine Learning. 248-254 - Kenshin Tsumuraya, Miki Amano, Minoru Uehara, Yoshihiro Adachi:

Topic-Based Clustering of Japanese Sentences Using Sentence-BERT. 255-260 - Yaodong Wang, Yamin Li:

Load-Balancing Routing Algorithms for Reducing Packet Latency and Avoiding Deadlock in Datacenter Interconnection Networks. 261-267 - Yonghui Huang, Siyuan Cheng, Xin Zhao, Minoru Uehara, Yoshihiro Adachi:

Analysis of Modern and Ancient Chinese Literature Using a Chinese Emotional Expression Analysis System. 268-272 - Riku Takayama, Jubee Tada:

An Implementation of a Pattern Matching Accelerator on a RISC-V Processor. 273-275 - Kyoya Anzai, Masayuki Fukumitsu, Hiroaki Anada, Shingo Hasegawa:

Group Signatures with Equality Test on Signers. 276-282 - Jiaqing Bai, Ji He, Xiaohong Jiang:

Covert Communication in NOMA Systems with Decision-Assisted Q-learning. 283-287 - Mutsuki Deguchi, Masahiko Katoh, Ryotaro Kobayashi:

Evaluation of Low-cost Operation of a Malware Detection Mechanism using Processor Information Targeting the IoT. 288-294 - Masayuki Fukumitsu, Shingo Hasegawa:

On Multi-user Security of Schnorr Signature in Algebraic Group Model. 295-301 - Kotaro Hayashi, Ryuichi Minagawa, Naoya Torii:

Side-channel attack on COSO-based TRNG to estimate output bits. 302-308 - Tomohiro Iida, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:

Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates. 309-315 - Tomoaki Kitahara, Ryota Hira, Yuko Hara-Azumi, Daiki Miyahara, Yang Li, Kazuo Sakiyama:

Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M0. 316-322 - Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi:

Medical knowledge discovery by randomly sampled "patient characteristics" formatted data. 323-329 - Yu-Xiang Lin, Bing-Kai Hong, Shin-Ming Cheng

:
Conformance Testing for 5G O-RAN Entities through MEC. 330-336 - Hideaki Miyaji, Po-Chu Hsu

, Atsuko Miyaji
:
Privacy-Preserving Social Media with a Disclosure. 337-343 - Yunosuke Noso, Keiichi Iwamura, Masaki Inamura:

Proposal and Evaluation of a Method for Secure Division Sum Using the Secret Sharing Scheme by Rounding Off Real Numbers. 344-350 - Hideya Sato, Ryotaro Kobayashi:

Koga2022 Dataset: Comprehensive Dataset with Detailed Classification for Network Intrusion Detection Systems. 351-357 - Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi:

Hook Point Estimation for System Call Detection by Virtual Machine Monitor. 358-362 - Naoki Shibayama, Yasutaka Igarashi:

A New Higher Order Differential of RAGHAV. 363-369 - Yuji Suga:

How to implement non-committed card protocols to realize AND operations satisfying the three-valued logics. 370-374 - Sú-Goân Tân, I-Hsien Liu, Jung-Shian Li:

Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree. 375-379 - Kei Ikebe, Kouichi Sakurai:

Analysis of Variance of Searching Time for Serial Concatenation of Graph-Clique based Cryptocurrency Mining. 380-383 - Takuya Kato, Hiroto Shiba, Masahiro Mambo:

On the Identity Match Rate in Web Browsing History. 384-387 - Isao Nakanishi

, Yuta Ishikawa, Kotaro Mukai:
Correlation Analysis of Features for Fusing in User Verification Using EEG Evoked by Ultrasound. 388-391 - Zhongqi Wang, Keita Fuse, Takashi Nishide:

Square Table Lookup Multiparty Computation Protocol. 392-395 - Taiki Akiba, Celimuge Wu, Tsutomu Yoshinaga:

Load-Based Content Allocation for Mobile Cooperative Cache. 396-400 - Ryo Asaoka, Akihiro Nakao, Masato Oguchi, Saneyasu Yamaguchi:

Accuracy Improvement by Occurrence Probability of Service Identification based on SNI. 401-405 - Pengyu Huang, Kaijie Wei, Hideharu Amano, Kaori Ohkoda, Masashi Aono:

Multi-board FPGA Implementation to Solve the Satisfiability Problem for Multi-Agent Path Finding in Smart Factory. 406-410 - Shintaro Matsui, Taito Manabe, Yuichiro Shibata:

FPGA implementation of contour detection based on Helmholtz principle. 411-415 - Hemraj Raikwar

, Sushanta Karmakar:
Fully Dynamic Algorithm for the Steiner Tree Problem in Planar Graphs. 416-420 - Kengo Shimizu, Hidekazu Suzuki:

Proposal for Optical Fiber Network Monitoring System Using IoT Technology. 421-425 - Atsuya Kobayashi, Yoshihaya Takahashi, Saneyasu Yamaguchi:

A Study on Subjective Information in Deep Neural Network Models. 426-429 - Takuya Miyamoto, Akihiro Fujiwara:

Robust optimization algorithms for multi-objective knapsack problem. 430-432 - Akira Nishihara, Masateru Tsunoda:

Weaving Heart Rate into the Authentication Based on Spatiotemporal Information and Actions. 433-435 - Eiji Sugahara, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama:

Energy Consumption Reduction through Resource Allocation Using Docker. 436-437 - Ludi Wang, Takeshi Ohkawa:

FPGA-Based Control of Remote Robotic Hands and ROS2 Integration. 438-440

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














