61 | -- | 0 | Koji Nakano. Preface: Special issued on the Seventh International Symposium on Networking and Computing |
62 | -- | 83 | Paola Flocchini, Eman Omar, Nicola Santoro. Effective Energy Restoration of Wireless Sensor Networks by a Mobile Robot |
84 | -- | 93 | Yuki Hirayama, Tetsuya Asai, Masato Motomura, Shinya Takamaeda. A Hardware-efficient Weight Sampling Circuit for Bayesian Neural Networks |
94 | -- | 110 | Atsushi Ito, Kai Takahashi. A Study on Ad-hoc Network with BLE Advertisement |
111 | -- | 126 | Yang Sun, Guan-Shen Fang, Sayaka Kamei. A Tensor Factorization on Rating Prediction for Recommendation by Feature Extraction from Reviews |
127 | -- | 143 | Kazuichi Oe, Takeshi Nanri. Non-volatile memory driver to drastically reduce input-output response time and maintain Linux device-mapper framework |
144 | -- | 158 | Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami. Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist |
159 | -- | 173 | Kotaro Umetsu, Akihiro Fujiwara. P systems with branch and bound for solving two hard graph problems |
174 | -- | 188 | Hiroshi Okano, Keita Emura, Takuya Ishibashi 0001, Toshihiro Ohigashi, Tatsuya Suzuki 0002. Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings |
189 | -- | 199 | Rie Shigetomi Yamaguchi, Toshiyuki Nakata 0001, Ryosuke Kobayashi. Redefine and Organize, 4th Authentication Factor, Behavior |
200 | -- | 212 | Jubee Tada, Ryosuke Higashi. A Cache Replacement Policy with Considering Fluctuation Patterns of Total Priority Value |
213 | -- | 226 | Zhao Hao 0001, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai. A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks |
227 | -- | 241 | Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami. A Performance Analysis and Evaluation of SIDH Applied Several Implementation-Friendly Quadratic Extension Fields |
242 | -- | 258 | Naoki Kamikawa, Hiroshi Umeo. A Realization of Real-time Sequence Generator for k-th Powers of Natural Numbers by One-Dimensional Cellular Automata |
259 | -- | 276 | Taito Manabe, Koki Tomonaga, Koki Fujita, Yuichiro Shibata, Taiichiro Kosaka, Tomohiko Adachi. CNN Architecture for Surgical Image Segmentation with Recursive Structure and Flip-Based Upsampling |
277 | -- | 292 | Yusuke Takemura, Keisuke Hakuta, Naoyuki Shinohara. ECC Atomic Block with NAF against Strong Side-Channel Attacks on Binary Curves |
293 | -- | 307 | Kenta Inoue. Expressive Numbers of Two or More Hidden Layer ReLU Neural Networks |
308 | -- | 324 | Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi. An Efficient MQ-based Signature with Tight Security Proof |