Abstract is missing.
- Employing Genetic Algorithm and Particle Filtering as an Alternative for Indoor Device PositioningGuilherme David Branco, Jacir Luiz Bordim. 1-7 [doi]
- A Mass Spring Model for String Simulation with Stress-Strain HandlingRoman Durikovic, Erich Siebenstich. 8-14 [doi]
- A Weakly Universal Three-Dimensional Larger than Life Cellular AutomatonKatsunobu Imai, Kyosuke Oroji, Tomohiro Kubota. 15-19 [doi]
- A Smaller-State Implementation of Real-Time Sequence Generator for {n^3 | n= 1, 2, 3, ...}Naoki Kamikawa, Hiroshi Umeo. 20-26 [doi]
- Generalized FSSP on Two Triangular TilingsLuidnel Maignan, Jean-Baptiste Yunès. 27-31 [doi]
- Cellular Automaton Model for Turing Tumble Mechanical ComputerTakahiro Tomita, Jia Lee, Teijiro Isokawa, Ferdinand Peper, Naotake Kamiura, Takayuki Yumoto. 32-37 [doi]
- Formalization of Asynchronous Cellular Automata Using Asynchronous Protocol for CommunicationsJia Lee, Ferdinand Peper, Kenji Leibnitz. 38-41 [doi]
- On Relationship between Timeout and Latency of Connection Re-establishment for Control Packet Loss Scenario in Bluetooth MANETsTemma Ohtani, Eitaro Kohno, Yoshiaki Kakuda. 42-46 [doi]
- Handover Algorithm for Video Communications by Sharing Communication Quality Information of Access Points between TerminalsAtsushi Takei, Shigetomo Kimura. 47-52 [doi]
- Spatial Feature Aware Genetic Algorithm of Network Base Station Configuration for Internet of ThingsHaobin Wang, Wei Huangfu, Yaxi Liu, Cheng Gong, Yebing Ren, Wei Liu. 53-58 [doi]
- Experimental Evaluation of Information Dissemination Scheme Considering Mobile Network Base Station Load in Wireless NetworksTatsuki Horai, Tomoyuki Ohta, Yoshiaki Kakuda. 59-62 [doi]
- Experimental Performance Analysis on Autonomous Distributed Collaborative Messaging ProtocolHiroyoshi Ichikawa, Aki Kobayashi. 63-66 [doi]
- A Study on Observing a Lost Child Using BLE BeaconsAtsushi Ito, Fu Xiang, Hiroyuki Hatano, Hidetoshi Uchiyama. 67-70 [doi]
- DHT Clustering for Load Balancing Considering Blockchain Data SizeYudai Kaneko, Takuya Asaka. 71-74 [doi]
- Load Balancing Method for IoT Sensor System Using Multi-access Edge ComputingRyuta Mogi, Taichiro Nakayama, Takuya Asaka. 75-78 [doi]
- The Impact of Job Mapping on Random Network TopologyYao Hu, Michihiro Koibuchi. 79-85 [doi]
- A Network-Based Event Detection Module Using NTP for Cyber Attacks on IoTTamotsu Kawamura, Masaru Fukushi, Yasushi Hirano, Yusuke Fujita, Yoshihiko Hamamoto. 86-91 [doi]
- Reduction of Instruction Increase Overhead by STRAIGHT CompilerToru Koizumi, Satoshi Nakae, Akifumi Fukuda, Hidetsugu Irie, Shuichi Sakai. 92-98 [doi]
- XY Based Fault-Tolerant Routing with the Passage of Faulty NodesYota Kurokawa, Masaru Fukushi. 99-104 [doi]
- Integrating TicToc with Parallel LoggingYasuhiro Nakamura, Hideyuki Kawashima, Osamu Tatebe. 105-111 [doi]
- Non-volatile Memory Driver for Applying Automated Tiered Storage with Fast Memory and Slow Flash StorageKazuichi Oe, Takeshi Nanri. 112-118 [doi]
- A Color-Based Cooperative Caching Strategy for Time-Shifted Live Video StreamingHiroki Okada, Takayuki Shiroma, Celimuge Wu, Tsutomu Yoshinaga. 119-124 [doi]
- Towards Improving Data Transfer Efficiency for Accelerators Using Hardware CompressionMax Plauth, Andreas Polze. 125-131 [doi]
- A Case Study on Memory Architecture Exploration for Manycores on an FPGASeiya Shirakuni, Ittetsu Taniguchi, Hiroyuki Tomiyama. 132-137 [doi]
- AQSS: Accelerator of Quantization Neural Networks with Stochastic ApproachTakeo Ueki, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa. 138-144 [doi]
- An Error Corrector for Dynamically Accuracy-Configurable Approximate AdderTomoaki Ukezono. 145-151 [doi]
- Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual MachinesMasao Yamamoto, Kohta Nakashima, Toshihiro Yamauchi, Akira Nagoya, Hideo Taniguchi. 152-158 [doi]
- Performance Evaluation of Collective Communication on Random Network TopologyKe Cui, Michihiro Koibuchi. 159-162 [doi]
- An Analysis on Randomness of Path ORAM for Light-Weight ImplementationHiroki Fujita, Naoki Fujieda, Shuichi Ichikawa. 163-165 [doi]
- An Adaptive Demotion Policy with Considering Temporal LocalityMasahiro Hasegawa, Jubee Tada. 166-169 [doi]
- Detection and Parameter Estimation of R Peaks in ECG Signal Using Optimization AlgorithmSheng-Ta Hsieh, Chun-Ling Lin. 170-173 [doi]
- Adaptive Artificial Bee Colony for Numerical OptimizationSheng-Ta Hsieh, Chun-Ling Lin, Hao-Wen Cheng. 174-177 [doi]
- Application of Timing Fault Detection to Rocket Core on FPGAUshio Jimbo, Ryota Shioya, Masahiro Goshima. 178-181 [doi]
- An Trace-Driven Performance Prediction Method for Exploring NoC Design OptimizationNaoya Niwa, Tomohiro Totoki, Hiroki Matsutani, Michihiro Koibuchi, Hideharu Amano. 182-185 [doi]
- Towards Large Scale Packet Capture and Network Flow Analysis on HadoopMiguel Zenon Nicanor Lerias Saavedra, William Emmanuel Yu. 186-189 [doi]
- Application of Machine Learning Techniques on Prediction of Future Processor PerformanceGoktug Inal, Gurhan Kucuk. 190-195 [doi]
- Hybrid Building/Floor Classification and Location Coordinates Regression Using A Single-Input and Multi-Output Deep Neural Network for Large-Scale Indoor Localization Based on Wi-Fi FingerprintingKyeong Soo Kim. 196-201 [doi]
- Accelerating Facial Detection for Improvement of Person Identification Accuracy in Entering and Exiting Management SystemHiroto Kizuna, Hiroyuki Sato. 202-208 [doi]
- Tile Art Image Generation Using Conditional Generative Adversarial NetworksNaoki Matsumura, Hiroki Tokura, Yuki Kuroda, Yasuaki Ito, Koji Nakano. 209-215 [doi]
- Hierarchical Distributed-Memory Multi-Leader MPI-Allreduce for Deep Learning WorkloadsTruong Thao Nguyen, Mohamed Wahib, Ryousei Takano. 216-222 [doi]
- Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial PerturbationJiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai. 223-227 [doi]
- XJTLUIndoorLoc: A New Fingerprinting Database for Indoor Localization and Trajectory Estimation Based on Wi-Fi RSS and Geomagnetic FieldZhenghang Zhong, Zhe Tang, Xiangxing Li, Tiancheng Yuan, Yang Yang, Meng Wei, Yuanyuan Zhang, Renzhi Sheng, Naomi Grant, Chongfeng Ling, Xintao Huan, Kyeong Soo Kim, Sanghyuk Lee. 228-234 [doi]
- Development of Generic CNN Deep Learning Method Using Feature GraphKei Takahashi, Takumi Numajiri, Masaru Sogabe, Katsuyoshi Sakamoto, Koichi Yamaguchi, Tomah Sogabe. 235-238 [doi]
- Evaluation of EMVA Using the Instruction-Level Parallelism on Tegra X1Hirobumi Tominaga, Asuka Nakamura, Yoshitaka Maekawa. 239-242 [doi]
- Performance Evaluation and Visualization of Scientific Applications Using PMlibKazunori Mikami, Kenji Ono, Jorji Nonaka. 243-249 [doi]
- Metaprogramming Framework for Existing HPC Languages Based on the Omni Compiler InfrastructureHitoshi Murai, Mitsuhisa Sato, Masahiro Nakao, Jinpil Lee. 250-256 [doi]
- Preconditioner Auto-Tuning Using Deep Learning for Sparse Iterative AlgorithmsKenya Yamada, Takahiro Katagiri, Hiroyuki Takizawa, Kazuo Minami, Mitsuo Yokokawa, Toru Nagai, Masao Ogino. 257-262 [doi]
- Accelerating Numerical Simulations of Supernovae with GPUsHideo Matsufuru, Kohsuke Sumiyoshi. 263-266 [doi]
- Design of a Message Authentication Protocol for CAN FD Based on Chaskey Lightweight MACGuillaume Carel, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Shunsuke Araki. 267-271 [doi]
- Branch and Bound Algorithm for Parallel Many-Core ArchitectureKazuki Hazama, Hiroyuki Ebara. 272-277 [doi]
- Self-Stabilizing Algorithm for Dynamically Maintaining Two Disjoint Dominating SetsSayaka Kamei, Hirotsugu Kakugawa. 278-284 [doi]
- A Cooperative Partial Snapshot Algorithm for Checkpoint-Rollback Recovery of Large-Scale and Dynamic Distributed SystemsYongHwan Kim, Junya Nakamura, Yoshiaki Katayama, Toshimitsu Masuzawa. 285-291 [doi]
- Advanced Searchable Encryption: Keyword Search for Matrix-Type StorageYuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami. 292-297 [doi]
- An Analytical Model of Energy-Aware RPL for Wireless Sensor NetworksWilbert Jethro Limjoco, Nestor Michael C. Tiglao. 298-304 [doi]
- A Pipeline Implementation for Dynamic Programming on GPUMakoto Miyazaki, Susumu Matsumae. 305-309 [doi]
- Proposal and Evaluation of Secure Device Pairing Method with Camera and AccelerometerMakoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park. 310-315 [doi]
- BlockPGP: A Blockchain-Based Framework for PGP Key ServersAlexander Yakubov, Wazen M. Shbair, Radu State. 316-322 [doi]
- Evaluation of Hierarchical Pincers Attack Search on Distributed Memory SystemsAsuka Nakamura, Hirobumi Tominaga, Yoshitaka Maekawa. 323-326 [doi]
- Incentive Driving Multipath Inter-Domain RoutingDonghong Qin, Lina Ge, Ting Lv. 327-330 [doi]
- An Adaptable Scheduling for Self-Reconfigurable ObjectsMahdillah Mahdillah, Shinya Nakayama, Qian Zhao, Takaichi Yoshida. 331-336 [doi]
- Energy Balancing by Wireless Energy Transfer in Sensor NetworksHiroshi Michizu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa. 337-343 [doi]
- Fault Tolerance of Small World Network ArchitectureHideki Mori. 344-349 [doi]
- Optimization of Delivery Considering Redelivery and Loading MethodsDaiki Ojima, Minoru Uehara, Takashi Mihara. 350-355 [doi]
- C4: An FPGA-based Compression Algorithm for ExpEtherHideki Shimura, Hiroyuki Noda, Hideharu Amano. 356-362 [doi]
- An Extension of A Temperature Modeling Tool HotSpot 6.0 for Castle-of-Chips StackingTomohiro Totoki, Michihiro Koibuchi, Hideharu Amano. 363-369 [doi]
- System Optimum Traffic Assignment for Connected CarsWeibin Wang, Minoru Uehara, Haruo Ozaki. 370-375 [doi]
- Application of an Online Questionnaire to Secure the Diversity of Planungszelle Participant AttributesYoshiomi Otsuka, Toshiya Aramaki. 376-379 [doi]
- Implementations of Droplets in Managed Network BlocksRyusei Saka, Minoru Uehara. 380-382 [doi]
- A Cache Replacement Policy with Considering Global Fluctuations of Priority ValuesJubee Tada. 383-386 [doi]
- Development of Eco Volunteer Computing SystemMotoi Yamagiwa, Minoru Uehara. 387-390 [doi]
- How to Realize Highly Accurate Computation with Fully Homomorphic EncryptionTomoki Agematsu, Satoshi Obana. 391-397 [doi]
- Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed MemoryYuya Ban, Toshihiro Yamauchi. 398-404 [doi]
- Verifiable Secret Sharing Scheme Using Hash ValuesJunta Imai, Mamoru Mimura, Hidema Tanaka. 405-409 [doi]
- A Construction of Cramer-Shoup Like Encryption Protocols Based on the Anshel-Anshel-Goldfeld Key Exchange ProtocolShuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Atsushi Suda. 410-416 [doi]
- Detecting Distributed Cyber Attacks in SDN Based on Automatic ThresholdingRyousuke Komiya, Yaokai Feng, Kouichi Sakurai. 417-423 [doi]
- On the Effectiveness of Extracting Important Words from Proxy LogsMamoru Mimura. 424-430 [doi]
- Discovering New Malware Families Using a Linguistic-Based Macros Detection MethodHiroya Miura, Mamoru Mimura, Hidema Tanaka. 431-437 [doi]
- Updatable Searchable Symmetric Encryption with Fine-Grained Delete FunctionalityMotoki Miyano, Satoshi Obana. 438-444 [doi]
- Consideration of Efficient Pairing Applying Two Construction Methods of Extension FieldsYuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami. 445-451 [doi]
- User-Side Updating of Third-Party Libraries for Android ApplicationsHiroki Ogawa, Eiji Takimoto, Koichi Mouri, Shoichi Saito. 452-458 [doi]
- Smart Contract for Multiparty Fair Certified NotificationsMagdalena Payeras-Capellà, Macià Mut Puigserver, Miquel Angel Cabot-Nadal. 459-465 [doi]
- A New Higher Order Differential of FeWNaoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko. 466-471 [doi]
- Neural Cryptography Based on the Topology Evolving Neural NetworksYuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai. 472-478 [doi]
- A Secure LiDAR with AES-Based Side-Channel FingerprintingRyuga Matsumura, Takeshi Sugawara, Kazuo Sakiyama. 479-482 [doi]
- Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" IssuesYuji Suga. 483-485 [doi]
- Improving Performance of Transposition Algorithm of 3-D Data Array for Parallelization Using Message Passing InterfaceMasahiro Arai, Fumiko Akagi, Saneyasu Yamaguchi, Kazuetsu Yoshida. 486-490 [doi]
- Wandering Path Visualization System Prototype for Finding Wandering Elderly People Using BLE BeaconTomoya Arakawa, Shun Shiramatsu, Akira Iwata. 491-495 [doi]
- Improving Apache Spark's Cache Mechanism with LRC-Based Method Using Bloom FilterHideo Inagaki, Ryota Kawashima, Hiroshi Matsuo. 496-500 [doi]
- An Implementation of LLVM Pass for Loop Parallelization Based on IR-Level DirectivesKengo Jingu, Kohta Shigenobu, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota. 501-505 [doi]
- A Kernel-Based Method for Resolving Performance Inefficiencies in Mining Frequent-Patterns in Encrypted DataJoichiro Kon, Gil Jae Lee, José A. B. Fortes, Saneyasu Yamaguchi. 506-510 [doi]
- Venerability and Protection Tool Surveys of Industrial Control SystemKuan-Chu Lu, I-Hsien Liu, Jung-Shian Li. 511-515 [doi]
- File Placing Location Optimization on Hadoop SWIMMakoto Nakagami, Joichiro Kon, Gil Jae Lee, José A. B. Fortes, Saneyasu Yamaguchi. 516-519 [doi]
- Revisiting Thread Execution Methods for GPU-Oriented OpenCL Programs on Multicore ProcessorsTakafumi Miyazaki, Hayato Hidari, Naohisa Hojo, Ittetsu Taniguchi, Hiroyuki Tomiyama. 520-523 [doi]
- Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic SystemsYuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai. 524-528 [doi]
- Design of an Incentive Decision Method for an Agriculture Information Sharing SystemJoji Toshima, Akiko Takahashi. 529-533 [doi]
- Tracing MIRAI Malware in Networked SystemYao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai. 534-538 [doi]
- Load Balancing in P2P Video Streaming Systems with Service DifferentiationYuta Yamada, Satoshi Fujita. 539-543 [doi]
- Robust Mapping for the Autonomous Mobile Robot Considering Potential Occupied Spaces of ObjectsBin Zhang, Masahide Kaneko, Hunok Lim. 544-548 [doi]
- A Flexible Anti-Jamming Channel Hopping for Cognitive Radio NetworksChih-Min Chao, Wei-Che Lee, Cong-Xiang Wang, Shin-Chung Huang, Yu-Chich Yang. 549-551 [doi]
- Evaluation of Letter Reproduction System Using Cellular Neural Network and Oxide Semiconductor Synapses by Logic SimulationHiroya Ikeda, Hiroki Yamane, Yuki Shibayama, Mutsumi Kimura, Yasuhiko Nakashima. 552-554 [doi]
- Performance Evaluation of Dynamic Cell Allocation Cache Using Cycle Accurate SimulatorMasato Kitou, Takahiro Sasaki, Kazuhiko Ohno. 555-557 [doi]
- Research and Analysis of Statistical Characteristics of Internet Exchange PointsTing Lv, Donghong Qin, Lina Ge. 558-560 [doi]
- A New Design for Evaluating Moving Target Defense SystemWai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai. 561-563 [doi]
- Mobile Application Aware Smartphone CPU Clock Frequency OptimizationYusuke Sato, Masato Oguchi, Saneyasu Yamaguchi. 564-566 [doi]