Abstract is missing.
- Almost Optimal Cheating-Detectable (2, 2, n) Ramp Secret Sharing SchemeTomoki Agematsu, Satoshi Obana. 1-9 [doi]
- An Efficient MQ-Based Signature in the QROMHiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi. 10-17 [doi]
- Folded Bloom Filter for High Bandwidth Memory, with GPU ImplementationsMasatoshi Hayashikawa, Koji Nakano, Yasuaki Ito, Ryota Yasudo. 18-27 [doi]
- Threat Analysis of Fake Virus Alerts Using WebView MonitorYuta Imamura, Rintaro Orito, Kritsana Chaikaew, Célia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi. 28-36 [doi]
- Revised Pulse Algorithm for Elementary Shortest Path Problem with Resource ConstraintsJiaxin Li, Xin Han. 37-44 [doi]
- A Color Image Representation Approach for Content-Based Image RetrievalCheng-Hsien Liu, Chang-Hsing Lee, Jau-Ling Shih, Chin-Chuan Han. 45-53 [doi]
- Hybrid Storage System to Achieve Efficient Use of Fast Memory AreaKazuichi Oe, Takeshi Nanri. 63-72 [doi]
- Effective Decentralized Energy Restoration by a Mobile RobotPaola Flocchini, Eman Omar, Nicola Santoro. 73-81 [doi]
- 2(1 - 1/ℓ)-Factor Steiner Tree Approximation in Õ(n^1/3) Rounds in the CONGESTED CLIQUEParikshit Saikia, Sushanta Karmakar. 82-91 [doi]
- Function Identification in Android Binaries with Deep LearningAizaz Sharif, Mohammad Nauman. 92-101 [doi]
- Efficient GPU Implementations to Compute the Diameter of a GraphDaisuke Takafuji, Koji Nakano, Yasuaki Ito. 102-111 [doi]
- A Label-Based Approach for Automatic Identifying Adversarial Examples with Image TransformationDang Duy Thang, Toshihiro Matsui. 112-120 [doi]
- Fog-Assisted Virtual Reality MMOG with Ultra Low LatencyTsuyoshi Yoshihara, Satoshi Fujita. 121-129 [doi]
- A Density-Based Congestion Avoidance Protocol for Strict Beaconing Requirements in VANETsPaulo Victor Gonçalves Farias, Jacir Luiz Bordim, Marcos Fagundes Caetano. 130-136 [doi]
- A Resource-Efficient Weight Sampling Method for Bayesian Neural Network AcceleratorsYuki Hirayama, Tetsuya Asai, Masato Motomura, Shinya Takamaeda-Yamazaki. 137-142 [doi]
- How to Improve the Cohesion of a Social Network? A Structural PerspectiveRuochen Jiang, Jiamou Liu, Wu Chen. 143-149 [doi]
- Siva - The IPFS Search EngineNawras Khudhur, Satoshi Fujita. 150-156 [doi]
- Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-BoxYuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami. 157-163 [doi]
- Data-Transfer-Bottleneck-Less Architecture for FPGA-Based Quantum Annealing SimulationChia-Yin Liu, Hasitha Muthumala Waidyasooriya, Masanori Hariyama. 164-170 [doi]
- CNN Architecture for Surgical Image Segmentation Systems with Recursive Network Structure to Mitigate OverfittingTaito Manabe, Koki Tomonaga, Yuichiro Shibata. 171-177 [doi]
- A Performance Analysis and Evaluation of SIDH with Implementation-Friendly Classes of Quadratic Extension FieldsYuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami. 178-184 [doi]
- GPGPU Implementation of Variational Bayesian Gaussian Mixture ModelsHiroki Nishimoto, Takashi Nakada, Yasuhiko Nakashima. 185-190 [doi]
- Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 PairingsHiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki 0002. 191-196 [doi]
- Extraction of Characteristic Subgraph Patterns with Support Threshold from Databases of Floor PlansTomonobu Ozaki. 197-203 [doi]
- Mobility-Aware Tasks Offloading in Mobile Edge Computing EnvironmentChunrong Wu, Qinglan Peng, Yunni Xia, Jia Lee. 204-210 [doi]
- Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS)Farhad Rasapour, Edoardo Serra, Hoda Mehrpouyan. 211-217 [doi]
- A Tensor Factorization on Rating Prediction for Recommendation by Feature Extraction from ReviewsYang Sun, Guan-Shen Fang, Sayaka Kamei. 218-224 [doi]
- A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit MicrocontrollerYoshinori Uetake, Keiji Yoshimoto, Yuta Kodera, Leo Weissbart, Takuya Kusaka, Yasuyuki Nogami. 225-231 [doi]
- Benchmarks for FPGA-Targeted High-Level-SynthesisHasitha Muthumala Waidyasooriya, Yasuaki Iimura, Masanori Hariyama. 232-238 [doi]
- An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDSHao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai. 239-244 [doi]
- Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography LibraryKeiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami. 245-250 [doi]