default search action
11th CANDAR 2023: Matsue, Japan - Workshops
- Eleventh International Symposium on Computing and Networking, CANDAR 2023 - Workshops, Matsue, Japan, November 27-30, 2023. IEEE 2023, ISBN 979-8-3503-0694-1
- Jinshan Luo, Yuki Okaniwa, Yuko Hiramatsu, Atsushi Ito, Madoka Hasegawa:
Measuring Driver's Emotion. 1-6 - Yuya Takanashi, Shigetomo Kimura:
Method for Detecting DoH Communications from Non-Encrypted Information at a Middlebox. 7-13 - Yoji Yamato:
A study for environmental adaptation of IoT devices. 14-19 - Koya Mitsuhira, Shinji Inoue, Tomoyuki Ohta:
A Dynamic Method for Forming Vehicle Platoons and Its Evaluations in Urban Areas. 20-23 - Tung Nguyen, Hideyuki Kawashima:
Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real-time Database Systems. 24-30 - Yuta Nojiri, Nobuyuki Yamasaki:
A Design of Multithreaded RISC-V Processor for Real-Time System. 31-37 - Aoi Yamashita, Masahiro Tanaka, Yutaro Bessho, Yasuhiro Fujiwara, Hideyuki Kawashima:
Improving Raft Performance with Bulk Transfers. 38-44 - Zhang Yuwei, Satoshi Fujita:
Acceleration of Sociality-Aware Message Routing in Opportunistic Networks. 45-51 - Mery Diana, Masato Kiyama, Motoki Amagasaki, Masayoshi Ito, Yuki Morishita:
A Deep Neural Network Translator for Edge Site Implementation. 52-55 - Alessandro Cordeiro de Lima, Jacir Luiz Bordim, Eduardo A. P. Alchieri:
Detecting EDoS Attacks in Cloud Environments Using Machine Learning and Metaheuristic Algorithms. 56-62 - Sihao Li, Kyeong Soo Kim, Zhe Tang, Jeremy S. Smith:
Stage-Wise and Hierarchical Training of Linked Deep Neural Networks for Large-Scale Multi-Building and Multi-Floor Indoor Localization Based on Wi-Fi Fingerprinting. 63-68 - Bruno Silva, Luiz Guerreiro Lopes:
A GPU-Based Parallel Implementation of the GWO Algorithm: Application to the Solution of Large-Scale Nonlinear Equation Systems. 69-75 - Kenshin Tsumuraya, Minoru Uehara, Yoshihiro Adachi:
Semantic Search of Japanese Sentences Using Distributed Representations. 76-81 - Hiromasa Takeda, Eiji Sugino, Hiroyuki Sato:
Efficient Cryptographic Processing Using On-Chip GPUs in System-on-Chip Architectures. 82-85 - Maxime Dresler, Sanaï Mansour, Safaâ Talhaoui, Yukiko Yamauchi, Sébastien Tixeuil:
On Dynamics of Basic Network Creation Games with Non-Uniform Communication Interest. 86-92 - Toshikazu Ishida, Shuichi Inokuchi:
Multiplication of Local Formulae and Commutativity of CAs with Essentially 3-Neighborhood Local Functions over Monoid N. 93-99 - Hirotsugu Kakugawa, Sayaka Kamei, Masahiro Shibata, Fukuhito Ooshita:
A self-stabilizing distributed algorithm for the 1-MIS problem under the distance-3 model. 100-106 - Yonghwan Kim, Yoshiaki Katayama, Koichi Wada:
Asynchronous Complete Visibility Algorithm for Luminous Robots on Grid. 107-113 - Masahiro Kimura, Teijiro Isokawa, Ferdinand Peper, Sho Nakade, Jia Lee, Naotake Kamiura:
On Implementation of Brownian Circuits by Swarm Agents. 114-120 - Yashdeep Singh, Sushanta Karmakar:
The Popular Matching Problem in a (3, 3)-Hypergraph with One-sided Preferences. 121-127 - Reo Ueno, Akihiro Fujiwara:
An asynchronous P system for solving the minimum Steiner tree with branch and bound. 128-134 - Kaito Watanabe, Hirotaka Nakayama, Atsushi Shiraki, Tomoyoshi Ito, Katsumi Hirata, Naoto Hoshikawa:
A Method for Automatic Generation of 3D Background Models Using Fractal Models and Genetic Algorithms. 135-141 - Shan-Cheng Pan, Wei-Der Chang, Cheng-En Chung:
Implementation of the Home Automation System by Using FPGA Platform. 142-145 - Yuhang Du, Satoshi Fujita:
Online Assignment of Reservations to Parking Lots for Smart Cities under the i.i.d. Model. 146-152 - Yibao Liang, Minoru Uehara:
Browser-based Java Development Environment for Programming Education. 153-158 - Takero Magara, Nobuyuki Yamasaki:
Design of Decoded Instruction Cache. 159-164 - Naoki Shibahara, Michihiro Koibuchi, Hiroki Matsutani:
Performance Improvement of Federated Learning Server using Smart NIC. 165-171 - Riku Takayama, Jubee Tada:
An Implementation of an Instruction Controlled Cache Replacement Policy on a RISC-V Processor. 172-178 - Chuankai Wang, Satoshi Fujita:
Polynomial-Time Cloudlet Placement Scheme with an Improved Approximation Ratio. 179-185 - Ruoxuan Wang, Minoru Uehara:
A Multitenant Single-Page Application for Programming Education. 186-190 - Mingqi Cai, Hiroyuki Kose:
Motivation Survey and Influence Factor Analysis of Old People to Improve Digital Literacy. 191-194 - Md. Biplob Hossain, Maya Rahayu, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application. 195-201 - Takumi Fukuda, Isao Nakanishi:
Introduction of Finger-softness Feature into Writer Verification Based on Finger-writing of Simple Symbol. 202-207 - Yuki Funaoka, Hiroshi Koide:
Improved Vulnerability Handling Framework to Automatically Fix Vulnerable Web Applications. 208-212 - Kosuke Higuchi, Ryotaro Kobayashi:
Real-Time Defense System using eBPF for Machine Learning-Based Ransomware Detection Method. 213-219 - Le Hoang Anh, Yuta Kawada, Samsul Huda, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami:
An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption. 220-226 - Tetsuro Ishida, Kazuma Ikesaka, Ali Md. Arshad, Yasuyuki Nogami, Yuta Kodera:
A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation. 227-231 - Momoka Kasuya, Nobuyoshi Morita, Hiroki Yamazaki, Kazuo Sakiyama:
Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive Industry. 232-238 - Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi:
Impact of Anonymity Indicator "PFDOC Entropy l-Diversity" on Medical Data Utility. 239-245 - Natsume Matsuzaki, Masayuki Fukumitsu, Yoshihiro Kita:
Emergency Button: Evacuation of Crypto Asset When Key Loss. 246-252 - Yutaro Matunaka, Ryotaro Kobayashi, Masahiko Kato:
Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information. 253-259 - Maya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology. 260-266 - Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi:
Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine Monitor. 267-273 - Kaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi:
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE. 274-278 - Taku Sudo, Ryotaro Kobayashi, Masahiko Kato:
Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices. 279-285 - Maki Tsukahara, Haruka Hirata, Mingyu Yang, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, Kazuo Sakiyama:
On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI. 286-291 - Hervet Victor, Satoru Kobayashi, Toshihiro Yamauchi:
Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach. 292-297 - Hayato Aoba, Ryota Kawashima, Hiroshi Matsuo:
Accelerating Key-Value Store with Layer-2 Transparent Proxy Cache Using DPDK. 298-302 - Takuto Hashibe, Makoto Murakoshi, Teruaki Kitasuka, Toru Nakanishi:
A Serverless Signaling Scheme for WebRTC Using Bluetooth LE. 303-307 - Yudai Katto, Yukikazu Nakamoto:
Low-cost implementation of a bicycle assistance embedded system using TensorFlow Lite. 308-312 - Atsuya Kobayashi, Saneyasu Yamaguchi:
Extraction of Subjective Information from Generative AI Models. 313-317 - Yui Koyanagi, Tomoaki Ukezono:
A Cost-aware Generation Method of Disposable Random Value Exploiting Parallel S-box Implementation for Tamper-resistant AES Design. 318-322 - Kuwabara Nobuaki, Satoshi Fujita:
DODA: A Decentralized Online Dating Application. 323-327 - Reo Otsuka, Saneyasu Yamaguchi:
Improving TCP Fairness by Expiring TCP BBR Considering Frequency. 328-332 - Yuta Tomida, Hiroyuki Hatano, Kosuke Sanada, Kazuo Mori:
Stochastic Resonance Assisted Successive Interference Cancellation Receiver for Multilevel Modulated Signals. 333-337 - Yuta Uehara, Susumu Matsumae:
Dimensionality Reduction Methods Using VAE for Deep Reinforcement Learning of Autonomous Driving. 338-342 - Yutaka Watanabe, Ryota Kawashima, Hiroshi Matsuo:
Proxy-based Transaction Acceleration for NewSQL. 343-347 - Junya Yamamoto, Hirotake Abe, Kenta Yamasawa, Kazuhiko Kato:
Priority-MPTCP: A Novel Multipath Data Transfer Method for V2V Communication. 348-352 - Masami Yoshida, Ryota Uchida, Taku Noguchi:
Rank Attack Avoidance Method based on Neighbor Node Rank Variation in RPL Network. 353-357 - Makoto Eguchi, Nobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh:
Bicycle-based collision prevention system using iPhone with LiDAR. 358-360 - Ryoma Ishizu, Hironori Kitakaze, Ryo Matsumura:
Data Augmentation with Pseudo-Infrared Night-Vision Image Conversion for Improved Nighttime Object Detection. 361-363 - Yuto Miura, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama:
Simulation-based Analysis of Power Side-Channel Leakage at Different Sampling Intervals. 364-365 - Kaito Mori, Mao Nishira, Hiroki Nishikawa, Hiroyuki Tomiyama:
Surveillance Routing with a Minimum Number of Drones. 366-367 - Ryuichi Niitsu, Saneyasu Yamaguchi:
Performance Evaluation and Improvement of HTTP/3 Considering TLS. 368-370 - Andrea Rosà, Matteo Basso, Leonardo Bohnhoff, Walter Binder:
Adaptive Thread Type Selection on the Java Virtual Machine. 371-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.