Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CANDARW
CANDARW 2018
Generate Citations
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)
Nov. 27 2018 to Nov. 30 2018
Takayama, Japan
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-15
Message from the Organizers
Freely available from IEEE.
pp. 16-16
Conference Organization
Freely available from IEEE.
pp. 17-18
Workshops Organization
Freely available from IEEE.
pp. 19-25
Reviewers
Freely available from IEEE.
pp. 26-30
Employing Genetic Algorithm and Particle Filtering as an Alternative for Indoor Device Positioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Guilherme David Branco
,
Jacir Luiz Bordim
A Mass Spring Model for String Simulation with Stress-Strain Handling
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-14
by
Roman Durikovic
,
Erich Siebenstich
A Weakly Universal Three-Dimensional Larger than Life Cellular Automaton
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-19
by
Katsunobu Imai
,
Kyosuke Oroji
,
Tomohiro Kubota
A Smaller-State Implementation of Real-Time Sequence Generator for {n^3 | n= 1, 2, 3,...}
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-26
by
Naoki Kamikawa
,
Hiroshi Umeo
Generalized FSSP on Two Triangular Tilings
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-31
by
Luidnel Maignan
,
Jean-Baptiste Yunès
Cellular Automaton Model for Turing Tumble Mechanical Computer
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-37
by
Takahiro Tomita
,
Jia Lee
,
Teijiro Isokawa
,
Ferdinand Peper
,
Naotake Kamiura
,
Takayuki Yumoto
Formalization of Asynchronous Cellular Automata Using Asynchronous Protocol for Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-41
by
Jia Lee
,
Ferdinand Peper
,
Kenji Leibnitz
On Relationship between Timeout and Latency of Connection Re-establishment for Control Packet Loss Scenario in Bluetooth MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-46
by
Temma Ohtani
,
Eitaro Kohno
,
Yoshiaki Kakuda
Handover Algorithm for Video Communications by Sharing Communication Quality Information of Access Points between Terminals
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Atsushi Takei
,
Shigetomo Kimura
Spatial Feature Aware Genetic Algorithm of Network Base Station Configuration for Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-58
by
Haobin Wang
,
Wei Huangfu
,
Yaxi Liu
,
Cheng Gong
,
Yebing Ren
,
Wei Liu
Experimental Evaluation of Information Dissemination Scheme Considering Mobile Network Base Station Load in Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-62
by
Tatsuki Horai
,
Tomoyuki Ohta
,
Yoshiaki Kakuda
Experimental Performance Analysis on Autonomous Distributed Collaborative Messaging Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-66
by
Hiroyoshi Ichikawa
,
Aki Kobayashi
A Study on Observing a Lost Child Using BLE Beacons
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-70
by
Atsushi Ito
,
Fu Xiang
,
Hiroyuki Hatano
,
Hidetoshi Uchiyama
DHT Clustering for Load Balancing Considering Blockchain Data Size
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-74
by
Yudai Kaneko
,
Takuya Asaka
Load Balancing Method for IoT Sensor System Using Multi-access Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-78
by
Ryuta Mogi
,
Taichiro Nakayama
,
Takuya Asaka
The Impact of Job Mapping on Random Network Topology
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-85
by
Yao Hu
,
Michihiro Koibuchi
A Network-Based Event Detection Module Using NTP for Cyber Attacks on IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-91
by
Tamotsu Kawamura
,
Masaru Fukushi
,
Yasushi Hirano
,
Yusuke Fujita
,
Yoshihiko Hamamoto
Reduction of Instruction Increase Overhead by STRAIGHT Compiler
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-98
by
Toru Koizumi
,
Satoshi Nakae
,
Akifumi Fukuda
,
Hidetsugu Irie
,
Shuichi Sakai
XY Based Fault-Tolerant Routing with the Passage of Faulty Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Yota Kurokawa
,
Masaru Fukushi
Integrating TicToc with Parallel Logging
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-111
by
Yasuhiro Nakamura
,
Hideyuki Kawashima
,
Osamu Tatebe
Non-volatile Memory Driver for Applying Automated Tiered Storage with Fast Memory and Slow Flash Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-118
by
Kazuichi Oe
,
Takeshi Nanri
A Color-Based Cooperative Caching Strategy for Time-Shifted Live Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Hiroki Okada
,
Takayuki Shiroma
,
Celimuge Wu
,
Tsutomu Yoshinaga
Towards Improving Data Transfer Efficiency for Accelerators Using Hardware Compression
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-131
by
Max Plauth
,
Andreas Polze
A Case Study on Memory Architecture Exploration for Manycores on an FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-137
by
Seiya Shirakuni
,
Ittetsu Taniguchi
,
Hiroyuki Tomiyama
AQSS: Accelerator of Quantization Neural Networks with Stochastic Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-144
by
Takeo Ueki
,
Iwai Keisuke
,
Takashi Matsubara
,
Takakazu Kurokawa
An Error Corrector for Dynamically Accuracy-Configurable Approximate Adder
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-151
by
Tomoaki Ukezono
Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-158
by
Masao Yamamoto
,
Kohta Nakashima
,
Toshihiro Yamauchi
,
Akira Nagoya
,
Hideo Taniguchi
Performance Evaluation of Collective Communication on Random Network Topology
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-162
by
Ke Cui
,
Michihiro Koibuchi
An Analysis on Randomness of Path ORAM for Light-Weight Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-165
by
Hiroki Fujita
,
Naoki Fujieda
,
Shuichi Ichikawa
An Adaptive Demotion Policy with Considering Temporal Locality
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-169
by
Masahiro Hasegawa
,
Jubee Tada
Detection and Parameter Estimation of R Peaks in ECG Signal Using Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-173
by
Sheng-Ta Hsieh
,
Chun-Ling Lin
Adaptive Artificial Bee Colony for Numerical Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-177
by
Sheng-Ta Hsieh
,
Chun-Ling Lin
,
Hao-Wen Cheng
Application of Timing Fault Detection to Rocket Core on FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-181
by
Ushio Jimbo
,
Ryota Shioya
,
Masahiro Goshima
An Trace-Driven Performance Prediction Method for Exploring NoC Design Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-185
by
Naoya Niwa
,
Tomohiro Totoki
,
Hiroki Matsutani
,
Michihiro Koibuchi
,
Hideharu Amano
Towards Large Scale Packet Capture and Network Flow Analysis on Hadoop
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-189
by
Miguel Zenon Nicanor L. Saavedra
,
William Emmanuel S. Yu
Application of Machine Learning Techniques on Prediction of Future Processor Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-195
by
Göktug Inal
,
Gürhan Küçük
Hybrid Building/Floor Classification and Location Coordinates Regression Using A Single-Input and Multi-Output Deep Neural Network for Large-Scale Indoor Localization Based on Wi-Fi Fingerprinting
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-201
by
Kyeong Soo Kim
Accelerating Facial Detection for Improvement of Person Identification Accuracy in Entering and Exiting Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-208
by
Hiroto Kizuna
,
Hiroyuki Sato
Tile Art Image Generation Using Conditional Generative Adversarial Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-215
by
Naoki Matsumura
,
Hiroki Tokura
,
Yuki Kuroda
,
Yasuaki Ito
,
Koji Nakano
Hierarchical Distributed-Memory Multi-Leader MPI-Allreduce for Deep Learning Workloads
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-222
by
Truong Thao Nguyen
,
Mohamed Wahib
,
Ryousei Takano
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-227
by
Jiawei Su
,
Danilo Vasconcellos Vargas
,
Kouichi Sakurai
XJTLUIndoorLoc: A New Fingerprinting Database for Indoor Localization and Trajectory Estimation Based on Wi-Fi RSS and Geomagnetic Field
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-234
by
Zhenghang Zhong
,
Zhe Tang
,
Xiangxing Li
,
Tiancheng Yuan
,
Yang Yang
,
Meng Wei
,
Yuanyuan Zhang
,
Renzhi Sheng
,
Naomi Grant
,
Chongfeng Ling
,
Xintao Huan
,
Kyeong Soo Kim
,
Sanghyuk Lee
Development of Generic CNN Deep Learning Method Using Feature Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-238
by
Kei Takahashi
,
Takumi Numajiri
,
Masaru Sogabe
,
Katsuyoshi Sakamoto
,
Koichi Yamaguchi
,
Tomah Sogabe
Evaluation of EMVA Using the Instruction-Level Parallelism on Tegra X1
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-242
by
Hirobumi Tominaga
,
Asuka Nakamura
,
Yoshitaka Maekawa
Performance Evaluation and Visualization of Scientific Applications Using PMlib
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-249
by
Kazunori Mikami
,
Kenji Ono
,
Jorji Nonaka
Metaprogramming Framework for Existing HPC Languages Based on the Omni Compiler Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-256
by
Hitoshi Murai
,
Mitsuhisa Sato
,
Masahiro Nakao
,
Jinpil Lee
Preconditioner Auto-Tuning Using Deep Learning for Sparse Iterative Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-262
by
Kenya Yamada
,
Takahiro Katagiri
,
Hiroyuki Takizawa
,
Kazuo Minami
,
Mitsuo Yokokawa
,
Toru Nagai
,
Masao Ogino
Accelerating Numerical Simulations of Supernovae with GPUs
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-266
by
Hideo Matsufuru
,
Kohsuke Sumiyoshi
Design of a Message Authentication Protocol for CAN FD Based on Chaskey Lightweight MAC
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-271
by
Guillaume Carel
,
Ryunosuke Isshiki
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Shunsuke Araki
Branch and Bound Algorithm for Parallel Many-Core Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-277
by
Kazuki Hazama
,
Hiroyuki Ebara
Self-Stabilizing Algorithm for Dynamically Maintaining Two Disjoint Dominating Sets
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-284
by
Sayaka Kamei
,
Hirotsugu Kakugawa
A Cooperative Partial Snapshot Algorithm for Checkpoint-Rollback Recovery of Large-Scale and Dynamic Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-291
by
Yonghwan Kim
,
Junya Nakamura
,
Yoshiaki Katayama
,
Toshimitsu Masuzawa
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Yuta Kodera
,
Minoru Kuribayashi
,
Takuya Kusaka
,
Yasuyuki Nogami
An Analytical Model of Energy-Aware RPL for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-304
by
Wilbert Jethro Limjoco
,
Nestor Michael Tiglao
A Pipeline Implementation for Dynamic Programming on GPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-309
by
Makoto Miyazaki
,
Susumu Matsumae
Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-315
by
Makoto Nagatomo
,
Kentaro Aburada
,
Naonobu Okazaki
,
Mirang Park
BlockPGP: A Blockchain-Based Framework for PGP Key Servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-322
by
Alexander Yakubov
,
Wazen Shbair
,
Radu State
Evaluation of Hierarchical Pincers Attack Search on Distributed Memory Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-326
by
Asuka Nakamura
,
Hirobumi Tominaga
,
Yoshitaka Maekawa
Incentive Driving Multipath Inter-Domain Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-330
by
Donghong Qin
,
Lina Ge
,
Ting Lv
An Adaptable Scheduling for Self-Reconfigurable Objects
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-336
by
Mahdillah Mahdillah
,
Shinya Nakayama
,
Qian Zhao
,
Takaichi Yoshida
Energy Balancing by Wireless Energy Transfer in Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-343
by
Hiroshi Michizu
,
Yuichi Sudo
,
Hirotsugu Kakugawa
,
Toshimitsu Masuzawa
Fault Tolerance of Small World Network Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-349
by
Hideki Mori
Optimization of Delivery Considering Redelivery and Loading Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-355
by
Daiki Ojima
,
Minoru Uehara
,
Takashi Mihara
C4: An FPGA-based Compression Algorithm for ExpEther
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-362
by
Hideki Shimura
,
Hiroyuki Noda
,
Hideharu Amano
An Extension of A Temperature Modeling Tool HotSpot 6.0 for Castle-of-Chips Stacking
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-369
by
Tomohiro Totoki
,
Michihiro Koibuchi
,
Hideharu Amano
System Optimum Traffic Assignment for Connected Cars
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-375
by
Weibin Wang
,
Minoru Uehara
,
Haruo Ozaki
Application of an Online Questionnaire to Secure the Diversity of Planungszelle Participant Attributes
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-379
by
Yoshiomi Otsuka
,
Toshiya Aramaki
Implementations of Droplets in Managed Network Blocks
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-382
by
Ryusei Saka
,
Minoru Uehara
A Cache Replacement Policy with Considering Global Fluctuations of Priority Values
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-386
by
Jubee Tada
Development of Eco Volunteer Computing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-390
by
Motoi Yamagiwa
,
Minoru Uehara
How to Realize Highly Accurate Computation with Fully Homomorphic Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-397
by
Tomoki Agematsu
,
Satoshi Obana
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-404
by
Yuya Ban
,
Toshihiro Yamauchi
Verifiable Secret Sharing Scheme Using Hash Values
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-409
by
Junta Imai
,
Mamoru Mimura
,
Hidema Tanaka
A Construction of Cramer-Shoup Like Encryption Protocols Based on the Anshel-Anshel-Goldfeld Key Exchange Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-416
by
Shuji Isobe
,
Jun-Ya Iwazaki
,
Eisuke Koizumi
,
Atsushi Suda
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-423
by
Ryousuke Komiya
,
Yaokai Feng
,
Kouichi Sakurai
On the Effectiveness of Extracting Important Words from Proxy Logs
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-430
by
Mamoru Mimura
Discovering New Malware Families Using a Linguistic-Based Macros Detection Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-437
by
Hiroya Miura
,
Mamoru Mimura
,
Hidema Tanaka
Updatable Searchable Symmetric Encryption with Fine-Grained Delete Functionality
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-444
by
Motoki Miyano
,
Satoshi Obana
Consideration of Efficient Pairing Applying Two Construction Methods of Extension Fields
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-451
by
Yuki Nanjo
,
Md. Al-Amin Khandaker
,
Takuya Kusaka
,
Yasuyuki Nogami
User-Side Updating of Third-Party Libraries for Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-458
by
Hiroki Ogawa
,
Eiji Takimoto
,
Koichi Mouri
,
Shoichi Saito
Smart Contract for Multiparty Fair Certified Notifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-465
by
Magdalena Payeras-Capellà
,
Macià Mut-Puigserver
,
Miquel Àngel Cabot-Nadal
A New Higher Order Differential of FeW
Full-text access may be available. Sign in or learn about subscription options.
pp. 466-471
by
Naoki Shibayama
,
Yasutaka Igarashi
,
Toshinobu Kaneko
Neural Cryptography Based on the Topology Evolving Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 472-478
by
Yuetong Zhu
,
Danilo Vasconcellos Vargas
,
Kouichi Sakurai
A Secure LiDAR with AES-Based Side-Channel Fingerprinting
Full-text access may be available. Sign in or learn about subscription options.
pp. 479-482
by
Ryuga Matsumura
,
Takeshi Sugawara
,
Kazuo Sakiyama
Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" Issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 483-485
by
Yuji Suga
Improving Performance of Transposition Algorithm of 3-D Data Array for Parallelization Using Message Passing Interface
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-490
by
Masahiro Arai
,
Fumiko Akagi
,
Saneyasu Yamaguchi
,
Kazuetsu Yoshida
Wandering Path Visualization System Prototype for Finding Wandering Elderly People Using BLE Beacon
Full-text access may be available. Sign in or learn about subscription options.
pp. 491-495
by
Tomoya Arakawa
,
Shun Shiramatsu
,
Akira Iwata
Improving Apache Spark's Cache Mechanism with LRC-Based Method Using Bloom Filter
Full-text access may be available. Sign in or learn about subscription options.
pp. 496-500
by
Hideo Inagaki
,
Ryota Kawashima
,
Hiroshi Matsuo
An Implementation of LLVM Pass for Loop Parallelization Based on IR-Level Directives
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-505
by
Kengo Jingu
,
Kohta Shigenobu
,
Kanemitsu Ootsu
,
Takeshi Ohkawa
,
Takashi Yokota
A Kernel-Based Method for Resolving Performance Inefficiencies in Mining Frequent-Patterns in Encrypted Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 506-510
by
Joichiro Kon
,
Gil Jae Lee
,
Jose A. B. Fortes
,
Saneyasu Yamaguchi
Venerability and Protection Tool Surveys of Industrial Control System
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-515
by
Kuan-Chu Lu
,
I-Hsien Liu
,
Jung-Shian Li
File Placing Location Optimization on Hadoop SWIM
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-519
by
Makoto Nakagami
,
Joichiro Kon
,
Gil Jae Lee
,
Jose A. B. Fortes
,
Saneyasu Yamaguchi
Showing 100 out of 114
Load More
Load All