Abstract is missing.
- Measuring Driver's EmotionJinshan Luo, Yuki Okaniwa, Yuko Hiramatsu, Atsushi Ito, Madoka Hasegawa. 1-6 [doi]
- Method for Detecting DoH Communications from Non-Encrypted Information at a MiddleboxYuya Takanashi, Shigetomo Kimura. 7-13 [doi]
- A study for environmental adaptation of IoT devicesYoji Yamato. 14-19 [doi]
- A Dynamic Method for Forming Vehicle Platoons and Its Evaluations in Urban AreasKoya Mitsuhira, Shinji Inoue, Tomoyuki Ohta. 20-23 [doi]
- Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real-time Database SystemsTung Nguyen, Hideyuki Kawashima. 24-30 [doi]
- A Design of Multithreaded RISC-V Processor for Real-Time SystemYuta Nojiri, Nobuyuki Yamasaki. 31-37 [doi]
- Improving Raft Performance with Bulk TransfersAoi Yamashita, Masahiro Tanaka, Yutaro Bessho, Yasuhiro Fujiwara, Hideyuki Kawashima. 38-44 [doi]
- Acceleration of Sociality-Aware Message Routing in Opportunistic NetworksZhang Yuwei, Satoshi Fujita. 45-51 [doi]
- A Deep Neural Network Translator for Edge Site ImplementationMery Diana, Masato Kiyama, Motoki Amagasaki, Masayoshi Ito, Yuki Morishita. 52-55 [doi]
- Detecting EDoS Attacks in Cloud Environments Using Machine Learning and Metaheuristic AlgorithmsAlessandro Cordeiro de Lima, Jacir Luiz Bordim, Eduardo A. P. Alchieri. 56-62 [doi]
- Stage-Wise and Hierarchical Training of Linked Deep Neural Networks for Large-Scale Multi-Building and Multi-Floor Indoor Localization Based on Wi-Fi FingerprintingSihao Li, Kyeong Soo Kim, Zhe Tang, Jeremy S. Smith. 63-68 [doi]
- A GPU-Based Parallel Implementation of the GWO Algorithm: Application to the Solution of Large-Scale Nonlinear Equation SystemsBruno Silva, Luiz Guerreiro Lopes. 69-75 [doi]
- Semantic Search of Japanese Sentences Using Distributed RepresentationsKenshin Tsumuraya, Minoru Uehara, Yoshihiro Adachi. 76-81 [doi]
- Efficient Cryptographic Processing Using On-Chip GPUs in System-on-Chip ArchitecturesHiromasa Takeda, Eiji Sugino, Hiroyuki Sato. 82-85 [doi]
- On Dynamics of Basic Network Creation Games with Non-Uniform Communication InterestMaxime Dresler, Sanaï Mansour, Safaâ Talhaoui, Yukiko Yamauchi, Sébastien Tixeuil. 86-92 [doi]
- Multiplication of Local Formulae and Commutativity of CAs with Essentially 3-Neighborhood Local Functions over Monoid NToshikazu Ishida, Shuichi Inokuchi. 93-99 [doi]
- A self-stabilizing distributed algorithm for the 1-MIS problem under the distance-3 modelHirotsugu Kakugawa, Sayaka Kamei, Masahiro Shibata, Fukuhito Ooshita. 100-106 [doi]
- Asynchronous Complete Visibility Algorithm for Luminous Robots on GridYonghwan Kim 0001, Yoshiaki Katayama, Koichi Wada 0001. 107-113 [doi]
- On Implementation of Brownian Circuits by Swarm AgentsMasahiro Kimura, Teijiro Isokawa, Ferdinand Peper, Sho Nakade, Jia Lee, Naotake Kamiura. 114-120 [doi]
- The Popular Matching Problem in a (3, 3)-Hypergraph with One-sided PreferencesYashdeep Singh, Sushanta Karmakar. 121-127 [doi]
- An asynchronous P system for solving the minimum Steiner tree with branch and boundReo Ueno, Akihiro Fujiwara. 128-134 [doi]
- A Method for Automatic Generation of 3D Background Models Using Fractal Models and Genetic AlgorithmsKaito Watanabe, Hirotaka Nakayama, Atsushi Shiraki, Tomoyoshi Ito, Katsumi Hirata, Naoto Hoshikawa. 135-141 [doi]
- Implementation of the Home Automation System by Using FPGA PlatformShan-Cheng Pan, Wei-Der Chang, Cheng En Chung. 142-145 [doi]
- Online Assignment of Reservations to Parking Lots for Smart Cities under the i.i.d. ModelYuhang Du, Satoshi Fujita. 146-152 [doi]
- Browser-based Java Development Environment for Programming EducationYibao Liang, Minoru Uehara. 153-158 [doi]
- Design of Decoded Instruction CacheTakero Magara, Nobuyuki Yamasaki. 159-164 [doi]
- Performance Improvement of Federated Learning Server using Smart NICNaoki Shibahara, Michihiro Koibuchi, Hiroki Matsutani. 165-171 [doi]
- An Implementation of an Instruction Controlled Cache Replacement Policy on a RISC-V ProcessorRiku Takayama, Jubee Tada. 172-178 [doi]
- Polynomial-Time Cloudlet Placement Scheme with an Improved Approximation RatioChuankai Wang, Satoshi Fujita. 179-185 [doi]
- A Multitenant Single-Page Application for Programming EducationRuoxuan Wang, Minoru Uehara. 186-190 [doi]
- Motivation Survey and Influence Factor Analysis of Old People to Improve Digital LiteracyMingqi Cai, Hiroyuki Kose. 191-194 [doi]
- A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email ApplicationMd. Biplob Hossain, Maya Rahayu, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami. 195-201 [doi]
- Introduction of Finger-softness Feature into Writer Verification Based on Finger-writing of Simple SymbolTakumi Fukuda, Isao Nakanishi. 202-207 [doi]
- Improved Vulnerability Handling Framework to Automatically Fix Vulnerable Web ApplicationsYuki Funaoka, Hiroshi Koide. 208-212 [doi]
- Real-Time Defense System using eBPF for Machine Learning-Based Ransomware Detection MethodKosuke Higuchi, Ryotaro Kobayashi. 213-219 [doi]
- An implementation of ELiPS-based Ciphertext-Policy Attribute-Based EncryptionLe Hoang Anh, Yuta Kawada, Samsul Huda, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami. 220-226 [doi]
- A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive OperationTetsuro Ishida, Kazuma Ikesamka, Ali Md. Arshad, Yasuyuki Nogami, Yuta Kodera. 227-231 [doi]
- Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive IndustryMomoka Kasuya, Nobuyoshi Morita, Hiroki Yamazaki, Kazuo Sakiyama. 232-238 [doi]
- Impact of Anonymity Indicator "PFDOC Entropy l-Diversity" on Medical Data UtilityKenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi. 239-245 [doi]
- Emergency Button: Evacuation of Crypto Asset When Key LossNatsume Matsuzaki, Masayuki Fukumitsu, Yoshihiro Kita. 246-252 [doi]
- Verification of IoT Malware Match Rate Using Signatures Created Based on Processor InformationYutaro Matunaka, Ryotaro Kobayashi, Masahiko Kato. 253-259 [doi]
- An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technologyMaya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami. 260-266 [doi]
- Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine MonitorMasaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi. 267-273 [doi]
- Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEEKaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi. 274-278 [doi]
- Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT DevicesTaku Sudo, Ryotaro Kobayashi, Masahiko Kato. 279-285 [doi]
- On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TIMaki Tsukahara, Haruka Hirata, Mingyu Yang, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, Kazuo Sakiyama. 286-291 [doi]
- Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis ApproachHervet Victor, Satoru Kobayashi, Toshihiro Yamauchi. 292-297 [doi]
- Accelerating Key-Value Store with Layer-2 Transparent Proxy Cache Using DPDKHayato Aoba, Ryota Kawashima, Hiroshi Matsuo. 298-302 [doi]
- A Serverless Signaling Scheme for WebRTC Using Bluetooth LETakuto Hashibe, Makoto Murakoshi, Teruaki Kitasuka, Toru Nakanishi 0001. 303-307 [doi]
- Low-cost implementation of a bicycle assistance embedded system using TensorFlow LiteYudai Katto, Yukikazu Nakamoto. 308-312 [doi]
- Extraction of Subjective Information from Generative AI ModelsAtsuya Kobayashi, Saneyasu Yamaguchi. 313-317 [doi]
- A Cost-aware Generation Method of Disposable Random Value Exploiting Parallel S-box Implementation for Tamper-resistant AES DesignYui Koyanagi, Tomoaki Ukezono. 318-322 [doi]
- DODA: A Decentralized Online Dating ApplicationKuwabara Nobuaki, Satoshi Fujita. 323-327 [doi]
- Improving TCP Fairness by Expiring TCP BBR Considering FrequencyReo Otsuka, Saneyasu Yamaguchi. 328-332 [doi]
- Stochastic Resonance Assisted Successive Interference Cancellation Receiver for Multilevel Modulated SignalsYuta Tomida, Hiroyuki Hatano, Kosuke Sanada, Kazuo Mori. 333-337 [doi]
- Dimensionality Reduction Methods Using VAE for Deep Reinforcement Learning of Autonomous DrivingYuta Uehara, Susumu Matumae. 338-342 [doi]
- Proxy-based Transaction Acceleration for NewSQLYutaka Watanabe, Ryota Kawashima, Hiroshi Matsuo. 343-347 [doi]
- Priority-MPTCP: A Novel Multipath Data Transfer Method for V2V CommunicationJunya Yamamoto, Hirotake Abe, Kenta Yamasawa, Kazuhiko Kato. 348-352 [doi]
- Rank Attack Avoidance Method based on Neighbor Node Rank Variation in RPL NetworkMasami Yoshida, Ryota Uchida, Taku Noguchi. 353-357 [doi]
- Bicycle-based collision prevention system using iPhone with LiDARMakoto Eguchi, Nobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh. 358-360 [doi]
- Data Augmentation with Pseudo-Infrared Night-Vision Image Conversion for Improved Nighttime Object DetectionRyoma Ishizu, Hironori Kitakaze, Ryo Matsumura. 361-363 [doi]
- Simulation-based Analysis of Power Side-Channel Leakage at Different Sampling IntervalsYuto Miura, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama. 364-365 [doi]
- Surveillance Routing with a Minimum Number of DronesKaito Mori, Mao Nishira, Hiroki Nishikawa, Hiroyuki Tomiyama. 366-367 [doi]
- Performance Evaluation and Improvement of HTTP/3 Considering TLSRyuichi Niitsu, Saneyasu Yamaguchi. 368-370 [doi]
- Adaptive Thread Type Selection on the Java Virtual MachineAndrea Rosà, Matteo Basso, Leonardo Bohnhoff, Walter Binder. 371-373 [doi]