Journal: IJNC

Volume 10, Issue 2

61 -- 0Koji Nakano. Preface: Special issued on the Seventh International Symposium on Networking and Computing
62 -- 83Paola Flocchini, Eman Omar, Nicola Santoro. Effective Energy Restoration of Wireless Sensor Networks by a Mobile Robot
84 -- 93Yuki Hirayama, Tetsuya Asai, Masato Motomura, Shinya Takamaeda. A Hardware-efficient Weight Sampling Circuit for Bayesian Neural Networks
94 -- 110Atsushi Ito, Kai Takahashi. A Study on Ad-hoc Network with BLE Advertisement
111 -- 126Yang Sun, Guan-Shen Fang, Sayaka Kamei. A Tensor Factorization on Rating Prediction for Recommendation by Feature Extraction from Reviews
127 -- 143Kazuichi Oe, Takeshi Nanri. Non-volatile memory driver to drastically reduce input-output response time and maintain Linux device-mapper framework
144 -- 158Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami. Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist
159 -- 173Kotaro Umetsu, Akihiro Fujiwara. P systems with branch and bound for solving two hard graph problems
174 -- 188Hiroshi Okano, Keita Emura, Takuya Ishibashi 0001, Toshihiro Ohigashi, Tatsuya Suzuki 0002. Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings
189 -- 199Rie Shigetomi Yamaguchi, Toshiyuki Nakata 0001, Ryosuke Kobayashi. Redefine and Organize, 4th Authentication Factor, Behavior
200 -- 212Jubee Tada, Ryosuke Higashi. A Cache Replacement Policy with Considering Fluctuation Patterns of Total Priority Value
213 -- 226Zhao Hao 0001, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai. A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks
227 -- 241Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami. A Performance Analysis and Evaluation of SIDH Applied Several Implementation-Friendly Quadratic Extension Fields
242 -- 258Naoki Kamikawa, Hiroshi Umeo. A Realization of Real-time Sequence Generator for k-th Powers of Natural Numbers by One-Dimensional Cellular Automata
259 -- 276Taito Manabe, Koki Tomonaga, Koki Fujita, Yuichiro Shibata, Taiichiro Kosaka, Tomohiko Adachi. CNN Architecture for Surgical Image Segmentation with Recursive Structure and Flip-Based Upsampling
277 -- 292Yusuke Takemura, Keisuke Hakuta, Naoyuki Shinohara. ECC Atomic Block with NAF against Strong Side-Channel Attacks on Binary Curves
293 -- 307Kenta Inoue. Expressive Numbers of Two or More Hidden Layer ReLU Neural Networks
308 -- 324Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi. An Efficient MQ-based Signature with Tight Security Proof

Volume 10, Issue 1

1 -- 24Alexander Yakubov, Wazen M. Shbair, Nida Khan, Radu State, Christophe Medinger, Jean Hilger. BlockPGP: A Blockchain-based Framework for PGP Key Servers
25 -- 43Temma Ohtani, Eitaro Kohno, Akifumi Nomasaki, Yoshiaki Kakuda. An Adaptive Connection-Establishment Timeout Configuration Method for Bluetooth MANETs in Control Packet Loss Environments
44 -- 60Atsushi Takei, Shigetomo Kimura. Handover Algorithm for Video Communications by Sharing Communication Quality Information of Access Points between Terminals