130 | -- | 0 | Koji Nakano. Preface: Special issued on the Sixth International Symposium on Networking and Computing |
131 | -- | 146 | Hiroki Nishikawa, Kana Shimada, Ittetsu Taniguchi, Hiroyuki Tomiyama. A Constraint Programming Approach to Scheduling of Malleable Tasks |
147 | -- | 160 | Sayaka Kamei, Hirotsugu Kakugawa. Asynchronous message-passing distributed algorithm for the global critical section problem |
161 | -- | 170 | Jubee Tada. A Cache Replacement Policy with Considering Global Fluctuations of Priority Values |
171 | -- | 187 | Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami. Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages |
188 | -- | 200 | Wai Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai. Analyzing the Effect of Moving Target Defense for a Web System |
201 | -- | 216 | Kouzou Ohara, Kazumi Saito, Masahiro Kimura, Hiroshi Motoda. Critical Node Identification based on Articulation Point Detection for Uncertain Network |
217 | -- | 238 | Yuuki Okuda, Masaya Sato, Hideo Taniguchi. Implementation and Evaluation of Communication-Hiding Method by System Call Proxy |
239 | -- | 256 | Hiroshi Michizu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa. Energy Balancing by Wireless Energy Transfer in Sensor Networks |
257 | -- | 275 | Naoki Kamikawa, Hiroshi Umeo. Two Implementations of Real-Time Sequence Generator for {n^3 | n=1, 2, 3, ... } and Their Comparison |
276 | -- | 300 | Joji Toshima, Takuo Suganuma, Akiko Takahashi. Design and Evaluation of an Incentive Decision Method for an Agricultural Information Sharing System |
301 | -- | 317 | Tomoaki Ukezono. Evaluations of CMA with Error Corrector in Image Processing Circuit |
318 | -- | 338 | Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park. Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using Marker |
339 | -- | 353 | Yasuhiro Nakamura, Hideyuki Kawashima, Osamu Tatebe. Integration of TicToc Concurrency Control Protocol with Parallel Write Ahead Logging Protocol |
354 | -- | 369 | Akane Kawaharada, Takao Namiki. Relation between spatio-temporal patterns generated by two-dimensional cellular automata and a singular function |
370 | -- | 389 | Thuong Nguyen Dat, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa. Implementation of high speed hash function Keccak on GPU |