Abstract is missing.
- Slice Swarms for HPC Application ResilienceAnis Alazzawe, Krishna Kant. 1-10 [doi]
- Single Kernel Soft Synchronization Technique for Task Arrays on CUDA-enabled GPUs, with ApplicationsShunji Funasaka, Koji Nakano, Yasuaki Ito. 11-20 [doi]
- Performance Improvement of a Two-Dimensional Flood Simulation Application in Hybrid Computing EnvironmentsRyan Marshall, Sheikh K. Ghafoor, Alfred J. Kalyanapu, Mike Rogers, Tigstu T. Dullo. 21-29 [doi]
- Tight Lower Bounds on the Maximum Number of Hops in P2P Video Streaming through Multiple Spanning TreesTakuya Shoji, Satoshi Fujita. 30-37 [doi]
- A Square Pointillism Image Generation, and Its GPU AccelerationHiroki Tokura, Yuki Kuroda, Yasuaki Ito, Koji Nakano. 38-47 [doi]
- A Hybrid Architecture for the Approximate String Matching on an FPGATakuma Wada, Shunji Funasaka, Koji Nakano, Yasuaki Ito. 48-57 [doi]
- Large-Scale Interconnection Network Simulation Methods Based on Cellular AutomataTakashi Yokota, Kanemitsu Ootsu, Takeshi Ohkawa. 58-67 [doi]
- Semi-order Preserving Encryption Technique for Numeric Data to Enhance PrivacySaleh Ahmed, Annisa, Asif Zaman, Zhan Zhang, Kazi Md. Rokibul Alam, Yasuhiko Morimoto. 68-74 [doi]
- Energy-Efficient BLE Device Discovery for Internet of ThingsBo-Ren Chen, Shin-Ming Cheng, Jia-Jhun Lin. 75-79 [doi]
- Complex Dynamics, Evolution, Separation, Profile Modeling of Fire in 3D for Computer AnimationRoman Durikovic, Jozef Hladky. 80-86 [doi]
- A Galindo-Garcia-Like Identity-Based Signature with Tight Security ReductionMasayuki Fukumitsu, Shingo Hasegawa. 87-93 [doi]
- Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware AnalysisKeisuke Furumoto, Korehito Kashiki, Masakatu Morii, Masato Ikegami, Tomohisa Hasegawa, Teiichi Ishikawa, Koji Nakao. 94-100 [doi]
- Improved Differential Evolution with Searching Pioneer for Solving Multi-modal Optimization ProblemsChun-Ling Lin, Sheng-Ta Hsieh, Shih-Yuan Chiu. 101-105 [doi]
- HDR Image Acquisition Using Integrated Mobile Device CameraAndrej Mihalik, Pavol Kunovsky, Roman Durikovic. 106-111 [doi]
- Compression and Aggregation for Optimizing Information Transmission in Distributed CNNTakamasa Mitani, Hisakazu Fukuoka, Yuria Hiraga, Takashi Nakada, Yasuhiko Nakashima. 112-118 [doi]
- An Information Platform for Smart Communities Realizing Data Usage Authentication and Secure Data SharingAkira Niwa, Hiroaki Nishi. 119-125 [doi]
- A Practical Collision Avoidance Method for an Inter-Chip Bus with Wireless Inductive through Chip InterfaceAkio Nomura, Junichiro Kadomoto, Tadahiro Kuroda, Hideharu Amano. 126-131 [doi]
- SPH-based Fluid Simulation on GPU Using Verlet List and Subdivided Cell-Linked ListKazuhiko Ohno, Tomoki Nitta, Hiroto Nakai. 132-138 [doi]
- Blind Watermarking Method for Anonymized DataYuta Ohno, Tomomu Iwai, Hiroaki Nishi. 139-145 [doi]
- Optimization Strategies for WRF Single-Moment 6-Class Microphysics Scheme (WSM6) on Intel MicroarchitecturesT. A. J. Ouermi, Aaron Knoll, Robert M. Kirby, Martin Berzins. 146-152 [doi]
- Generalized-Star Crossed Cube - A Flexible Interconnection Network with High-Performance at Low-CostTomofumi Sato, Yamin Li. 153-158 [doi]
- A Light-Weight Cooperative Caching Strategy by D2D Content SharingTakayuki Shiroma, Takuma Nakajima, Celimuge Wu, Tsutomu Yoshinaga. 159-165 [doi]
- CPCI Stack: Metric for Accurate Bottleneck Analysis on OoO MicroprocessorsTeruo Tanimoto, Takatsugu Ono, Koji Inoue. 166-172 [doi]
- Discovery of δ-Tolerance Closed Subgraphs on GPGPUTatsuya Toki, Tomonobu Ozaki. 173-179 [doi]
- A Feasibility Study of Programmable Analog Calculation Unit for Approximate ComputingRenyuan Zhang, Takashi Nakada, Yasuhiko Nakashima. 180-186 [doi]
- Biologically Adaptive Artificial Bee Colony for Numerical OptimizationSheng-Ta Hsieh, Hao-Wen Cheng, Chun-Ling Lin, Tsung-Ying Sun. 187-193 [doi]
- Hierarchical Motion Representation of 2-State Number Conserving Cellular AutomataGilTak Kong, Katsunobu Imai, Toru Nakanishi 0001. 194-199 [doi]
- On a Triangular Brownian Cellular Automaton with 4 States and 6 RulesYuta Yamatani, Teijiro Isokawa, Jia Lee, Ferdinand Peper. 200-204 [doi]
- Fractal Structure of a Class of Two-Dimensional Two-State Cellular AutomataAkane Kawaharada, Takao Namiki. 205-208 [doi]
- A Contention Window Control Method Using Priority Control Based on the Number of Freezes of Wireless LANTomoki Hanzawa, Shigetomo Kimura. 209-215 [doi]
- Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network SystemMd. Manowarul Islam, Md. Selim Al Mamun, Nobuo Funabiki, Minoru Kuribayashi. 216-222 [doi]
- Proposal of a Multi-agent Based Flexible IoT Edge Computing Architecture Harmonizing Its Control with Cloud ComputingShinji Kitagami, Tadashi Ogino, Takuo Suganuma, Norio Shiratori. 223-229 [doi]
- Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry PiHideharu Kojima, Naoto Yanai. 230-236 [doi]
- Data Collection Method Using Data Collection with DTN in Participatory Sensing and Data InterpolationHiro Onishi, Ryuta Mogi, Takuya Asaka. 237-242 [doi]
- Effective Suppression of False Rumors in Social Network ServiceYuusuke Ookita, Satoshi Fujita. 243-248 [doi]
- Coded Caching for Hierarchical Networks with a Different Number of LayersMakoto Takita, Masanori Hirotomo, Masakatu Morii. 249-255 [doi]
- Game Theory-Based Power Allocation and Channel Selection of Multi-channel D2DAunee Azrina Zulkifli, Kaori Kuroda, Mikio Hasegawa. 256-262 [doi]
- Peer-to-Peer Bidirectional Streaming Using Mobile Edge ComputingTaichiro Nakayama, Takuya Asaka. 263-266 [doi]
- Evaluation of Information Dissemination Scheme Using Autonomous Clustering and Epidemic Routing Considering Mobile Core Network Load in Wireless NetworksToshikazu Terami, Tomoyuki Ohta, Yoshiaki Kakuda. 267-270 [doi]
- Configurable Fast Cycle-Approximate Timing Estimation for Instruction-Level EmulatorsTzu-Yi Chang, Chung-Ta King, Bhaskar Das, Bo-Hao Liao. 271-276 [doi]
- FEBRE: A Fast and Efficient Bit-Flipping Reduction Technique to Extend PCM lifetimePeng Gao, Dongsheng Wang, Haixia Wang. 277-283 [doi]
- MemSpaces: Evaluating the Tuple Space Paradigm in the Context of Memory-Centric ArchitecturesAndreas Grapentin, Max Plauth, Andreas Polze. 284-290 [doi]
- Logarithmic Compression for Memory Footprint Reduction in Neural Network TrainingKazutoshi Hirose, Ryota Uematsu, Kota Ando, Kentaro Orimo, Kodai Ueyoshi, Masayuki Ikebe, Tetsuya Asai, Shinya Takamaeda-Yamazaki, Masato Motomura. 291-297 [doi]
- Optimising Scientific Workflow Execution Using Desktops, Clusters and CloudsEdvard Martins de Oliveira, Jílio Cezar Estrella, Fausto Guzzo da Costa, Alexandre Cláudio Botazzo Delbem, Stephan Reiff-Marganiec. 298-304 [doi]
- Time-Sharing Multithreading on Stream-Based Lossless Data CompressionKoichi Marumo, Shinichi Yamagiwa. 305-310 [doi]
- Automated Tiered Storage System Consisting of Memory and Flash Storage to Improve Response Time with Input-Output (IO) Concentration WorkloadsKazuichi Oe, Mitsuru Sato, Takeshi Nanri. 311-317 [doi]
- Topological Properties and Routing Algorithm for the Static K-ary N-tree Interconnection NetworkMasahiro Tozaki, Yamin Li. 318-322 [doi]
- An Obfuscated Hardwired Sequence Control System Generated by High Level SynthesisYoshiki Ishigaki, Naoki Fujieda, Yuumi Matsuoka, Kazuki Uyama, Shuichi Ichikawa. 323-325 [doi]
- Power Measurement and Modeling of Quadcopters on Horizontal FlightKotaro Maekawa, Shunsuke Negoro, Ittetsu Taniguchi, Hiroyuki Tomiyama. 326-329 [doi]
- GUNREAL: GPU-accelerated UNsupervised REinforcement and Auxiliary LearningYouri Coppens, Koichi Shirahata, Takuya Fukagai, Yasumoto Tomita, Atsushi Ike. 330-336 [doi]
- Is Emulating "Binary Grep in Eyes" Possible with Machine Learning?Mamoru Mimura, Yuhei Otsubo, Hidema Tanaka, Atsuhiro Goto. 337-343 [doi]
- CloudCL: Distributed Heterogeneous Computing on Cloud ScaleMax Plauth, Florian Rosler, Andreas Polze. 344-350 [doi]
- High Performance and Low Power Architectures: GPU vs. FPGA for Fast Factorized BackprojectionM. Wielage, Fabian Cholewa, C. Fahnemann, Peter Pirsch, Holger Blume. 351-357 [doi]
- Improving Multiple Precision Integer Multiplication on GPUsMakoto Miyazaki, Susumu Matsumae. 358-361 [doi]
- Mixed Precision Solver Scalable to 16000 MPI Processes for Lattice Quantum Chromodynamics Simulations on the Oakforest-PACS SystemTaisuke Boku, Ken ichi Ishikawa, Yoshinobu Kuramashi, Lawrence Meadows. 362-368 [doi]
- Designing an Open Database of System-Aware Code OptimizationsRyusuke Egawa, Kazuhiko Komatsu, Hiroyuki Takizawa. 369-374 [doi]
- Practical Implementation of Lattice QCD Simulation on Intel Xeon Phi Knights LandingIssaku Kanamori, Hideo Matsufuru. 375-381 [doi]
- Embedded-DSL-Like Code Generation and Optimization of Bayesian Estimation Routines with User-Defined Source-to-Source Code Transformation Framework XevolverReiji Suda. 382-388 [doi]
- An Application-Level Incremental Checkpointing Mechanism with Automatic Parameter TuningHiroyuki Takizawa, Muhammad Alfian Amrizal, Kazuhiko Komatsu, Ryusuke Egawa. 389-394 [doi]
- Discrete Periodic Radon Transform Based Weighted Nuclear Norm Minimization for Image DenoisingB. Budianto, Daniel Pak-Kong Lun. 395-400 [doi]
- Synchronizing Parallel Geometric Algorithms on Multi-core MachinesJoel Fuentes, Fei Luo, Isaac D. Scherson. 401-407 [doi]
- An Asynchronous P System Using Branch and Bound for the Satisfiability ProblemYuki Jimen, Akihiro Fujiwara. 408-413 [doi]
- An Asynchronous Message-Passing Distributed Algorithm for the Global Critical Section ProblemSayaka Kamei, Hirotsugu Kakugawa. 414-419 [doi]
- A Verified Accumulate Algorithmic SkeletonFrédéric Loulergue. 420-426 [doi]
- Estimating Power Consumption of Servers Using Gaussian Mixture ModelHao Zhu, Huadong Dai, Shazhou Yang, Yuejin Yan, Bin Lin 0011. 427-433 [doi]
- Fingerprinting BitTorrent Traffic in Encrypted Tunnels Using Recurrent Deep LearningMichelangelo Cruz, Roel Ocampo, Isabel Montes, Rowel Atienza. 434-438 [doi]
- A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and ReliabilityMasayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Masao Sakai. 439-444 [doi]
- An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit MicrocontrollerYuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami. 445-450 [doi]
- An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom SequenceYuta Kodera, Takuya Kusaka, Takeru Miyazaki, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara. 451-455 [doi]
- Long-Term Performance of a Generic Intrusion Detection Method Using Doc2vecMamoru Mimura, Hidema Tanaka. 456-462 [doi]
- Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVMHideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi. 463-468 [doi]
- Implementation of Hash Function Generator on Schematic to Program Translator(SPT)Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa. 469-474 [doi]
- Implementation of High Speed Hash Function Keccak Using CUDA on GTX 1080Thuong Nguyen Dat, Keisuke Iwai, Takakazu Kurokawa. 475-481 [doi]
- Optimal Representation for Right-to-Left Parallel Scalar Point MultiplicationKittiphon Phalakarn, Kittiphop Phalakarn, Vorapong Suppakitpaisarn. 482-488 [doi]
- Implementation of Revocable Group Signatures with Compact Revocation List Using Vector CommitmentsShahidatul Sadiah, Toru Nakanishi 0001. 489-495 [doi]
- Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing AttacksTakanori Saito, Toru Nakanishi 0001. 496-502 [doi]
- Mocha: Automatically Applying Content Security Policy to HTML Hybrid Application on Android DeviceToshiki Takeuchi, Koichi Mouri, Shoichi Saito. 503-509 [doi]
- Analysis of Effectiveness of Slow Read DoS Attack and Influence of Communication EnvironmentShunsuke Tayama, Hidema Tanaka. 510-515 [doi]
- Biometric Bit String Generation from Handwritten Initials on Smart PhonesRyo Yamagami, Yasushi Yamazaki. 516-521 [doi]
- Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlowXiang You, Yaokai Feng, Kouichi Sakurai. 522-528 [doi]
- Access Control of Webcam on PC with Prevention against Peeping by AttackersYuri Yoshino, Masaki Inamura. 529-532 [doi]
- Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web TrackingShiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai. 533-536 [doi]
- Messaging Protocol for Relaying Messages between Participants with Autonomous Distributed Blockchain PropagationHiroyoshi Ichikawa, Aki Kobayashi. 537-541 [doi]
- The Entering and Exiting Management System by Person Specification Using Deep-CNNHiroto Kizuna, Hiroyuki Sato. 542-545 [doi]
- Wind-Aware Emergency Landing Assistant Based on Dubins CurvesMarius Klein, Andreas Klos, Jorg Lenhardt, Wolfram Schiffmann. 546-550 [doi]
- Label Estimation Method with Modifications for Unreliable Examples in TamingYasutake Koishi, Shuichi Ishida, Tatsuo Tabaru, Hiroyuki Miyamoto. 551-554 [doi]
- A Deletion Aware Usable Space Control for SD2Joichiro Kon, Kenji Nakashima, Saneyasu Yamaguchi. 555-559 [doi]
- Estimation of Power Consumption of Each Application Caused by Device Lock Considering Software Dependency in SmartphonesShun Kurihara, Shoki Fukuda, Masato Oguchi, Saneyasu Yamaguchi. 560-564 [doi]
- Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided RelaysKenta Sasaki, Xuening Liao, Xiaohong Jiang. 565-569 [doi]
- A Study of TRAX Player by Template MatchingMasataka Nakano, Yoshiki Yamaguchi. 570-574 [doi]
- A Translation Method of ARM Machine Code to LLVM-IR for Binary Code Parallelization and OptimizationKohta Shigenobu, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota. 575-579 [doi]
- A Study on the Performance of Web Applications Based on RoR in a Highly Consolidated Server with Container-Based VirtualizationYuto Tachibana, Joichiro Kon, Saneyasu Yamaguchi. 580-583 [doi]
- Study on Reduction on Average Computational Complexity of GMD Decoding Using Property of Bounded Distance DecodingShunsuke Ueda, Takuya Kusaka. 584-588 [doi]
- Acceleration of Large-Scale CGH Generation Using Multi-GPU ClusterShinpei Watanabe, Boaz Jessie Jackin, Takeshi Ohkawa, Kanemitsu Ootsu, Takashi Yokota, Yoshio Hayasaki, Toyohiko Yatagai, Takanobu Baba. 589-593 [doi]
- A Firefly Optimization for a Connected Dominating Set in a Sensor NetworkYuta Matsumoto, Akihiro Fujiwara. 594-596 [doi]
- Performance Evaluation of File Operations on OverlayFSNaoki Mizusawa, Kenji Nakazima, Saneyasu Yamaguchi. 597-599 [doi]
- A Study of a Fault-Tolerant System Using Dynamic Partial ReconfigurationSeiya Ogido, Chikatoshi Yamada, Kei Miyagi, Shuichi Ichikawa. 600-602 [doi]
- A Study on Direction Estimation of Movement by Multiple Sensors for Pedestrian Dead-ReckoningYuya Sakuma, Masahiro Fujii. 603-605 [doi]
- Examination of Classifying Hoaxes over SNS Using Bayesian NetworkRyutaro Ushigome, Takeshi Matsuda, Michio Sonoda, Jinhui Chao. 606-608 [doi]
- A Study to Optimize Heterogeneous Resources for Open IoTYoji Yamato, Naoto Hoshikawa, Hirofumi Noguchi, Tatsuya Demizu, Misao Kataoka. 609-611 [doi]