Abstract is missing.
- LARSS: A Rider Scoring System to Mitigate Fraud in TNVSLawrence Earl Carandang, Carl Dizon, Wilbert Jethro Limjoco, Lew Andrew Tria. 1-7 [doi]
- On the Secure Dispersed Data Transfer-Oriented Path Construction Method for Different ID Trees in WSNsKazuki Fujita, Eitaro Kohno, Yoshiaki Kakuda. 8-13 [doi]
- A State Space Reduction Method for Model Checking of Wireless Multi-Hop Network Routing Protocols Focusing on TopologiesHideharu Kojima, Naoto Yanai. 14-20 [doi]
- CWC: Simple and Stateless AQM Capable of Handling High Priority Thin Flows to Prevent BufferbloatKyosuke Kubota, Shigetomo Kimura. 21-27 [doi]
- On the Effect of BLE Beacons on Fast Bluetooth Connection Establishment SchemeYuya Minami, Ryohei Saka, Eitaro Kohno, Yoshiaki Kakuda. 28-32 [doi]
- Cooperative Update Mechanism of Cache Update Method Based on Content Update Dynamic Queries for Named Data NetworkingTakatoshi Miwa, Shigetomo Kimura. 33-39 [doi]
- A Congestion Avoidance for Adaptive Streaming over ICN Using Bitrate Feedback from In-Network NodesRei Nakagawa, Satoshi Ohzahata, Ryo Yamamoto, Toshihiko Kato. 40-46 [doi]
- A Basic Study on Communication Characteristics by Bluetooth Low Energy for i-ConstructionKazuomi Endo, Ryo Hamamoto, Hiroki Tanaka, Koichi Yamashita, Masayuki Kagoshima, Hiroshi Togo, Kouta Mizukoshi, Hidenaga Kawaguchi, Yuta Kishino. 47-50 [doi]
- Delay Tolerant Networks Considering Pedestrian CrowdsTakenori Kazama, Chihiro Morishima, Takashi Nishitsuji, Takuya Asaka. 51-54 [doi]
- Development of a Network Status Visualizing System for Wireless Multihop NetworksRyoichi Mukai, Tomoyuki Ohta, Yoshiaki Kakuda. 55-58 [doi]
- Simulation of Evacuation Route Guidance Considering Evacuation Situation Changes in MANET-Based Building Evacuation SystemShinnosuke Murakami, Tomoyuki Ohta, Jürgen Dunkel, Yoshiaki Kakuda. 59-62 [doi]
- A Study on Construction of Ad-Hoc Network with BLE AdvertisementKai Takahashi, Atsushi Ito. 63-66 [doi]
- Processing Assignment of Deep Learning According to Sensor Node CapacityKarin Umeda, Takashi Nishitsuji, Takuya Asaka, Takumi Miyoshi. 67-70 [doi]
- Evaluation of a Chained Systolic Array with High-Speed LinksJun Iwamoto, Renyuan Zhang, Yasuhiko Nakashima. 71-77 [doi]
- Throughput-Optimal Hardware Implementation of LZW Decompression on the FPGAHiroshi Kagawa, Yasuaki Ito, Koji Nakano. 78-83 [doi]
- Deadlock-Free Layered Routing for Infiniband NetworksRyuta Kawano, Hiroki Matsutani, Hideharu Amano. 84-90 [doi]
- A Programmable Approximate Calculation Unit Employing Time-Encoded Stochastic Computing ElementsVan Tinh Nguyen, Tati Erlina, Renyuan Zhang, Yasuhiko Nakashima. 91-96 [doi]
- GPU-Based Decompression for the 842 AlgorithmMax Plauth, Andreas Polze. 97-102 [doi]
- A Memory-Bandwidth-Efficient Word2vec Accelerator Using OpenCL for FPGATomoki Shoji, Hasitha Muthumala Waidyasooriya, Taisuke Ono, Masanori Hariyama, Yuichiro Aoki, Yuki Kondoh, Yaoko Nakagawa. 103-108 [doi]
- Fast Interrupt Handling Scheme by Using Interrupt Wake-Up MechanismRyo Wada, Nobuyuki Yamasaki. 109-114 [doi]
- A Pre-Routing Net Wirelength Prediction Method Using an Optimized Convolutional Neural NetworkRyota Watanabe, Yuki Katsuda, Qian Zhao 0001, Takaichi Yoshida. 115-120 [doi]
- Application of Cross-Reference Framework CoToCoA to Macro- and Micro-Scale Simulations of Planetary MagnetospheresKeiichiro Fukazawa, Yuto Katoh, Takeshi Nanri, Yohei Miyake. 121-124 [doi]
- Orchestrating Near-Data FPGA Accelerators Using Unix PipesRobert Schmid, Max Plauth, Lukas Wenzel, Felix Eberhardt, Andreas Polze. 125-128 [doi]
- Expressive Numbers of Two or More Hidden Layer ReLU Neural NetworksKenta Inoue. 129-135 [doi]
- A Quantized Neural Network Library for Proper Implementation of Hardware EmulationMasato Kiyama, Yasuhiro Nakahara, Motoki Amagasaki, Masahiro Iida. 136-140 [doi]
- Task Scheduling Techniques for Deep Learning in Heterogeneous EnvironmentPangfeng Liu, Jan-Jan Wu. 141-147 [doi]
- Structured Sparse Fully-Connected Layers in the CNNs and Its GPU AccelerationNaoki Matsumura, Yasuaki Ito, Koji Nakano, Akihiko Kasagi, Tsuguchika Tabaru. 148-154 [doi]
- Face Image Anonymization as an Application of Multidimensional Data K-AnonymizerTaichi Nakamura, Yuiko Sakuma, Hiroaki Nishi. 155-161 [doi]
- Fast Compression and Optimization of Deep Learning Models for Natural Language ProcessingMarcin Pietron, Michal Karwatowski, Maciej Wielgosz, Jerzy Duda. 162-168 [doi]
- Frame Difference Generative Adversarial Networks: Clearer Contour Video GeneratingRui Qiu, Danilo Vasconcellos Vargas, Kouichi Sakurai. 169-175 [doi]
- Parallelization of Direct-Forcing Immersed Boundary Method Using OpenACCFang-An Kuo, Shuen-Tai Wang, Chau-Yi Chou, Yu-Bin Fang. 176-179 [doi]
- Ensemble Approach for Natural Language Question Answering ProblemAnna Aniol, Marcin Pietron, Jerzy Duda. 180-183 [doi]
- Kernel-Based Direct Policy Search Reinforcement Learning Based on Variational Bayesian InferenceNobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura. 184-187 [doi]
- Forgive & Forget: Self-Stabilizing Swarms in Spite of Byzantine RobotsYotam Ashkenazi, Shlomi Dolev, Sayaka Kamei, Fukuhito Ooshita, Koichi Wada. 188-194 [doi]
- Eventually Consistent Distributed Ledger Relying on Degraded Atomic BroadcastGrégory Bénassy, Fukuhito Ooshita, Michiko Inoue. 195-200 [doi]
- Multi-Objective Optimization of Channel Mapping for Fail-Operational Hybrid TDM NoCsNguyen Anh Vu Doan, Max Koenen, Thomas Wild, Andreas Herkersdorf. 201-207 [doi]
- Collaborative Illustrator with Android TabletsShogo Inoue, Satoshi Fujita. 208-214 [doi]
- 4 | n = 1, 2, 3, ...}Naoki Kamikawa, Hiroshi Umeo. 215-220 [doi]
- Live Streaming over Wi-Fi Direct Multi-GroupsMasayuki Kawakami, Satoshi Fujita. 221-227 [doi]
- Robustness of Elementary Cellular Automata to Asynchronous Transitions and CommunicationsQin Lei, Jia Lee, Kenji Leibnitz, Ferdinand Peper. 228-234 [doi]
- A Development Platform of Intelligent Mobile APP Based on Edge ComputingWei-Chen Liu, Yu Ting Chiang, Tyng-Yeu Liang. 235-241 [doi]
- An Asynchronous P System Using Branch and Bound for Minimum Graph ColoringKotaro Umetsu, Akihiro Fujiwara. 242-248 [doi]
- The Degree Diameter Problem for Host-Switch GraphsRyota Yasudo, Koji Nakano. 249-255 [doi]
- An Asynchronous P System with Branch and Bound for Solving Hamiltonian Cycle ProblemAkihiro Fujiwara, Kotaro Umetsu, Fumiya Nozato. 256-259 [doi]
- Low-Cost Weed Identification System Using DronesWei-Che Liang, You-Jei Yang, Chih-Min Chao. 260-263 [doi]
- A Web-Based Routing and Visualization Tool for Drone DeliveryTakuma Hikida, Yusuke Funabashi, Hiroyuki Tomiyama. 264-268 [doi]
- Real Chip Performance Evaluation on Through Chip Interface IP for Renesas SOTB 65nm ProcessHideto Kayashima, Takuya Kojima, Hayate Okuhara, Tsunaaki Shidei, Hideharu Amano. 269-274 [doi]
- A Rapid Optimization Method for Visual Indirect SLAM Using a Subset of Feature PointsRyosuke Kazami, Hideharu Amano. 275-279 [doi]
- Acceleration of ART Algorithm on an FPGA Board with Xilinx SDAccelYasuaki Okamoto, Hideharu Amano. 280-284 [doi]
- Analysis of Factors Influencing Global Carbon Dioxide Emission Characteristics Using Panel Data and Evaluation of Their ImpactYoshiomi Otsuka. 285-291 [doi]
- JavaScript Development Environment for Programming Education Using SmartphonesMinoru Uehara. 292-297 [doi]
- Interactive Cultivation System for the Future IoT-Based AgricultureKesevan Veloo, Hayate Kojima, Shogo Takata, Masashi Nakamura, Hironori Nakajo. 298-304 [doi]
- Improvement of Multi-Purpose Travel Route Recommendation System Based on Genetic AlgorithmChen Yuan 0004, Minoru Uehara. 305-308 [doi]
- A Cache Replacement Policy with Considering Fluctuation Patterns of Total Priority ValueJubee Tada, Ryosuke Higashi. 309-312 [doi]
- Detecting Input Sanitization Errors in ScalaMohammadreza Ashouri. 313-319 [doi]
- Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear MapKotaro Chinen, Hiroaki Anada. 320-326 [doi]
- Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC SchemeShoichi Hirose, Junji Shikata. 327-332 [doi]
- Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream CiphersHayato Kimura 0002, Takanori Isobe 0001, Toshihiro Ohigashi. 333-338 [doi]
- Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism Using Processor InformationKazuki Koike, Ryotaro Kobayashi, Masahiko Katoh. 339-345 [doi]
- Reliable Decentralized Oracle with Mechanisms for Verification and DisputationLimao Ma, Kosuke Kaneko, Subodh Sharma 0001, Kouichi Sakurai. 346-352 [doi]
- A Preliminary Study on Methods to Eliminate Short Fruitless Cycles for Pollard's Rho Method for ECDLP over BN CurvesHiromasa Miura, Rikuya Matsumura, Ken Ikuta, Sho Joichi, Takuya Kusaka, Yasuyuki Nogami. 353-359 [doi]
- Identifying Useful Features for Malware Detection in the Ember DatasetYoshihiro Oyama, Takumi Miyashita, Hirotaka Kokubo. 360-366 [doi]
- A Covert System Identification Attack on Constant Setpoint Control SystemsTyler Phillips, Hoda Mehrpouyan, John Gardner, Stephen Reese. 367-373 [doi]
- An Efficient Anonymous Reputation System for Crowd SensingShahidatul Sadiah, Toru Nakanishi 0001. 374-380 [doi]
- A New Higher Order Differential of BIGNaoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko. 381-386 [doi]
- ECC Atomic Block against Strong Side-Channel Attacks Using Binary CurvesYusuke Takemura, Keisuke Hakuta, Naoyuki Shinohara. 387-393 [doi]
- Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number SequenceYuki Taketa, Yuta Kodera, Shogo Tanida, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi, Satoshi Uehara. 394-400 [doi]
- Image-Based Unknown Malware Classification with Few-Shot Learning ModelsTrung-Kien Tran, Hiroshi Sato, Masao Kubo. 401-407 [doi]
- Binary Sequence Generated by Alternative Trace Map Function and Its PropertiesFatema Akhter, Yasuyuki Nogami, Takuya Kusaka, Yuki Taketa, Tomoya Tatara. 408-411 [doi]
- Redefine and Organize, 4th Authentication Factor, BehaviorRie Shigetomi Yamaguchi, Toshiyuki Nakata, Ryosuke Kobayashi. 412-415 [doi]
- A Study on Person Verification Using Electroencephalograms Evoked by Unperceivable Vibration StimuliYoshiaki Shindo, Isao Nakanishi, Akinobu Takemura. 416-419 [doi]
- Proposal of a Novel Book Content Search Method for Web-Based EBook LibrariesSomchai Chatvichienchai, Hitomi Kimura, Asuka Aneyama. 420-424 [doi]
- An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear CodeShinichi Kageyama, Ken Ikuta, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami. 425-429 [doi]
- A Study on Phase Shift Keying on 2-SphereSho Kakuwa, Masahiro Fujii. 430-434 [doi]
- Proposal of Scalable Vector Extension for Embedded RISC-V Soft-Core ProcessorYoshiki Kimura, Tomoya Kikuchi, Kanemitsu Ootsu, Takashi Yokota. 435-439 [doi]
- Evaluation of Processing Distribution for Application Program and OS in Microkernel OSYuya Kobayashi, Masaya Sato, Hideo Taniguchi. 440-444 [doi]
- A Virtual Sign Language Translator on SmartphonesYun-Jung Ku, Min-Jen Chen, Chung-Ta King. 445-449 [doi]
- Fast and Secure Back-Propagation Learning Using Vertically Partitioned Data with IoTHirofumi Miyajima, Hiromi Miyajima, Norio Shiratori. 450-454 [doi]
- Generating Block IO Trace Data from a Cloud Site Using Packet Capture and Analyzing the IO Trace DataKazutaka Ogihara. 455-459 [doi]
- Finding the Maximum Number of Symbols for the 4b/10b Line Code with Error CorrectionMasayuki Takeda, Nobuyuki Yamasaki. 460-464 [doi]
- A Watercolor Painting Image Generation Using Stroke-Based RenderingHisaki Yamane, Yasuaki Ito, Koji Nakano. 465-469 [doi]
- A Study on Service Identification Based on Server Name Indication AnalysisHiroaki Yamauchi, Akihiro Nakao, Masato Oguchi, Shu Yamamoto, Saneyasu Yamaguchi. 470-474 [doi]
- A Study on Transmission Efficiency of Systematic Spinal CodesYota Katagishi, Masahiro Fujii. 475-477 [doi]
- A Study on Cyclic Performance Fluctuation of CUBIC TCP and TCP BBR Considering Estimated RTT and BandwidthKouto Miyazawa, Saneyasu Yamaguchi, Aki Kobayashi. 478-480 [doi]
- Strawberry Optimization for Multi-Objective Knapsack ProblemYamato Mizobe, Kei Ohnishi, Akihiro Fujiwara. 481-483 [doi]
- Usable Disk Space Control Based on Hadoop Job FeaturesMakoto Nakagami, José A. B. Fortes, Saneyasu Yamaguchi. 484-486 [doi]
- Improvement of Cache System Automatic Design Tool for Heterogeneous Multi-CoreTaiga Yukawa, Takahiro Sasaki. 487-489 [doi]