Default Cover Image

2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)

Nov. 27 2018 to Nov. 30 2018

Takayama, Japan

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-15
Message from the OrganizersFreely available from IEEE.pp. 16-16
Conference OrganizationFreely available from IEEE.pp. 17-18
Workshops OrganizationFreely available from IEEE.pp. 19-25
ReviewersFreely available from IEEE.pp. 26-30
A Mass Spring Model for String Simulation with Stress-Strain HandlingFull-text access may be available. Sign in or learn about subscription options.pp. 8-14
A Weakly Universal Three-Dimensional Larger than Life Cellular AutomatonFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
A Smaller-State Implementation of Real-Time Sequence Generator for {n^3 | n= 1, 2, 3,...}Full-text access may be available. Sign in or learn about subscription options.pp. 20-26
Generalized FSSP on Two Triangular TilingsFull-text access may be available. Sign in or learn about subscription options.pp. 27-31
Cellular Automaton Model for Turing Tumble Mechanical ComputerFull-text access may be available. Sign in or learn about subscription options.pp. 32-37
Formalization of Asynchronous Cellular Automata Using Asynchronous Protocol for CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 38-41
Experimental Performance Analysis on Autonomous Distributed Collaborative Messaging ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 63-66
A Study on Observing a Lost Child Using BLE BeaconsFull-text access may be available. Sign in or learn about subscription options.pp. 67-70
DHT Clustering for Load Balancing Considering Blockchain Data SizeFull-text access may be available. Sign in or learn about subscription options.pp. 71-74
Load Balancing Method for IoT Sensor System Using Multi-access Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 75-78
The Impact of Job Mapping on Random Network TopologyFull-text access may be available. Sign in or learn about subscription options.pp. 79-85
A Network-Based Event Detection Module Using NTP for Cyber Attacks on IoTFull-text access may be available. Sign in or learn about subscription options.pp. 86-91
Reduction of Instruction Increase Overhead by STRAIGHT CompilerFull-text access may be available. Sign in or learn about subscription options.pp. 92-98
XY Based Fault-Tolerant Routing with the Passage of Faulty NodesFull-text access may be available. Sign in or learn about subscription options.pp. 99-104
Integrating TicToc with Parallel LoggingFull-text access may be available. Sign in or learn about subscription options.pp. 105-111
Non-volatile Memory Driver for Applying Automated Tiered Storage with Fast Memory and Slow Flash StorageFull-text access may be available. Sign in or learn about subscription options.pp. 112-118
A Color-Based Cooperative Caching Strategy for Time-Shifted Live Video StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
Towards Improving Data Transfer Efficiency for Accelerators Using Hardware CompressionFull-text access may be available. Sign in or learn about subscription options.pp. 125-131
A Case Study on Memory Architecture Exploration for Manycores on an FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 132-137
AQSS: Accelerator of Quantization Neural Networks with Stochastic ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 138-144
An Error Corrector for Dynamically Accuracy-Configurable Approximate AdderFull-text access may be available. Sign in or learn about subscription options.pp. 145-151
Performance Evaluation of Collective Communication on Random Network TopologyFull-text access may be available. Sign in or learn about subscription options.pp. 159-162
An Analysis on Randomness of Path ORAM for Light-Weight ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 163-165
An Adaptive Demotion Policy with Considering Temporal LocalityFull-text access may be available. Sign in or learn about subscription options.pp. 166-169
Detection and Parameter Estimation of R Peaks in ECG Signal Using Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 170-173
Adaptive Artificial Bee Colony for Numerical OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 174-177
Application of Timing Fault Detection to Rocket Core on FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 178-181
Towards Large Scale Packet Capture and Network Flow Analysis on HadoopFull-text access may be available. Sign in or learn about subscription options.pp. 186-189
Application of Machine Learning Techniques on Prediction of Future Processor PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 190-195
Tile Art Image Generation Using Conditional Generative Adversarial NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 209-215
Hierarchical Distributed-Memory Multi-Leader MPI-Allreduce for Deep Learning WorkloadsFull-text access may be available. Sign in or learn about subscription options.pp. 216-222
Evaluation of EMVA Using the Instruction-Level Parallelism on Tegra X1Full-text access may be available. Sign in or learn about subscription options.pp. 239-242
Performance Evaluation and Visualization of Scientific Applications Using PMlibFull-text access may be available. Sign in or learn about subscription options.pp. 243-249
Metaprogramming Framework for Existing HPC Languages Based on the Omni Compiler InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 250-256
Accelerating Numerical Simulations of Supernovae with GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 263-266
Branch and Bound Algorithm for Parallel Many-Core ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
Self-Stabilizing Algorithm for Dynamically Maintaining Two Disjoint Dominating SetsFull-text access may be available. Sign in or learn about subscription options.pp. 278-284
Advanced Searchable Encryption: Keyword Search for Matrix-Type StorageFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
An Analytical Model of Energy-Aware RPL for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 298-304
A Pipeline Implementation for Dynamic Programming on GPUFull-text access may be available. Sign in or learn about subscription options.pp. 305-309
Proposal and Evaluation of Secure Device Pairing Method with Camera and AccelerometerFull-text access may be available. Sign in or learn about subscription options.pp. 310-315
BlockPGP: A Blockchain-Based Framework for PGP Key ServersFull-text access may be available. Sign in or learn about subscription options.pp. 316-322
Evaluation of Hierarchical Pincers Attack Search on Distributed Memory SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 323-326
Incentive Driving Multipath Inter-Domain RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 327-330
An Adaptable Scheduling for Self-Reconfigurable ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 331-336
Energy Balancing by Wireless Energy Transfer in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 337-343
Fault Tolerance of Small World Network ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 344-349
Optimization of Delivery Considering Redelivery and Loading MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 350-355
C4: An FPGA-based Compression Algorithm for ExpEtherFull-text access may be available. Sign in or learn about subscription options.pp. 356-362
An Extension of A Temperature Modeling Tool HotSpot 6.0 for Castle-of-Chips StackingFull-text access may be available. Sign in or learn about subscription options.pp. 363-369
System Optimum Traffic Assignment for Connected CarsFull-text access may be available. Sign in or learn about subscription options.pp. 370-375
Application of an Online Questionnaire to Secure the Diversity of Planungszelle Participant AttributesFull-text access may be available. Sign in or learn about subscription options.pp. 376-379
Implementations of Droplets in Managed Network BlocksFull-text access may be available. Sign in or learn about subscription options.pp. 380-382
A Cache Replacement Policy with Considering Global Fluctuations of Priority ValuesFull-text access may be available. Sign in or learn about subscription options.pp. 383-386
Development of Eco Volunteer Computing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 387-390
How to Realize Highly Accurate Computation with Fully Homomorphic EncryptionFull-text access may be available. Sign in or learn about subscription options.pp. 391-397
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 398-404
Verifiable Secret Sharing Scheme Using Hash ValuesFull-text access may be available. Sign in or learn about subscription options.pp. 405-409
Detecting Distributed Cyber Attacks in SDN Based on Automatic ThresholdingFull-text access may be available. Sign in or learn about subscription options.pp. 417-423
On the Effectiveness of Extracting Important Words from Proxy LogsFull-text access may be available. Sign in or learn about subscription options.pp. 424-430
Discovering New Malware Families Using a Linguistic-Based Macros Detection MethodFull-text access may be available. Sign in or learn about subscription options.pp. 431-437
Updatable Searchable Symmetric Encryption with Fine-Grained Delete FunctionalityFull-text access may be available. Sign in or learn about subscription options.pp. 438-444
Consideration of Efficient Pairing Applying Two Construction Methods of Extension FieldsFull-text access may be available. Sign in or learn about subscription options.pp. 445-451
User-Side Updating of Third-Party Libraries for Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 452-458
Smart Contract for Multiparty Fair Certified NotificationsFull-text access may be available. Sign in or learn about subscription options.pp. 459-465
A New Higher Order Differential of FeWFull-text access may be available. Sign in or learn about subscription options.pp. 466-471
Neural Cryptography Based on the Topology Evolving Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 472-478
A Secure LiDAR with AES-Based Side-Channel FingerprintingFull-text access may be available. Sign in or learn about subscription options.pp. 479-482
Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 483-485
Wandering Path Visualization System Prototype for Finding Wandering Elderly People Using BLE BeaconFull-text access may be available. Sign in or learn about subscription options.pp. 491-495
Improving Apache Spark's Cache Mechanism with LRC-Based Method Using Bloom FilterFull-text access may be available. Sign in or learn about subscription options.pp. 496-500
Venerability and Protection Tool Surveys of Industrial Control SystemFull-text access may be available. Sign in or learn about subscription options.pp. 511-515
File Placing Location Optimization on Hadoop SWIMFull-text access may be available. Sign in or learn about subscription options.pp. 516-519
Showing 100 out of 114