Abstract is missing.
- Face completion with pyramid semantic attention and latent codesShilei Cao 0004, Kouichi Sakurai. 1-8  [doi]
- Derived metrics for the game of Go - intrinsic network strength assessment and cheat-detectionAttila Egri-Nagy, Antti Törmänen. 9-18  [doi]
- A Learning-based Fetch Thread Gating Mechanism for A Simultaneous Multithreading ProcessorYosuke Ide, Nobuyuki Yamasaki. 19-28  [doi]
- Efficient GPU Implementation for Solving the Maximum Independent Set ProblemTomohiro Imanaga, Koji Nakano, Masaki Tao, Ryota Yasudo, Yasuaki Ito, Yuya Kawamata, Ryota Katsuki, Yusuke Tabata, Takashi Yazane, Kenichiro Hamano. 29-38  [doi]
- Fully-Pipelined Architecture for Simulated Annealing-based QUBO Solver on the FPGAHiroshi Kagawa, Yasuaki Ito, Koji Nakano, Ryota Yasudo, Yuya Kawamata, Ryota Katsuki, Yusuke Tabata, Takashi Yazane, Kenichiro Hamano. 39-48  [doi]
- Emergency Landing Field Identification Based on a Hierarchical Ensemble Transfer Learning ModelAndreas Klos, Marius Rosenbaum, Wolfram Schiffmann. 49-58  [doi]
- Combinatorial Clustering Based on an Externally-Defined One-Hot ConstraintMasahito Kumagai, Kazuhiko Komatsu, Fumiyo Takano, Takuya Araki, Masayuki Sato 0001, Hiroaki Kobayashi. 59-68  [doi]
- Evacuation from a Finite 2D Square Grid Field by a Metamorphic Robotic SystemJunya Nakamura 0001, Sayaka Kamei, Yukiko Yamauchi. 69-78  [doi]
- Bandit-based Run-time Adaptation of Cache Replacement Policies in Content Management SystemsSrivattsan Sridharan, Shravan Gaonkar, José A. B. Fortes. 79-88  [doi]
- Graph visualization of the dark web hyperlinkTaichi Aoki, Atsuhiro Goto. 89-94  [doi]
- Use cases and success stories of a data analytics system in an automotive Paint ShopÁngel Dacal-Nieto, Juan José Areal, Miguel García-Fernández, Marcos Lluch. 95-100  [doi]
- Polymorphic Data Layout for SX-Aurora TSUBASA Vector EnginesNaoki Ebata, Yoko Isobe, Ryusuke Egawa, Hiroyuki Takizawa. 101-107  [doi]
- An In-Network Parameter Aggregation using DPDK for Multi-GPU Deep LearningMasaki Furukawa, Tomoya Itsubo, Hiroki Matsutani. 108-114  [doi]
- Public-key Projective Arithmetic Functional EncryptionShingo Hasegawa, Masashi Hisai, Hiroki Shizuya. 115-121  [doi]
- Maximum Expressive Number of Threshold Neural NetworksKenta Inoue. 122-127  [doi]
- Commutativity of Composition of some Elementary Cellular Automata on MonoidsToshikazu Ishida, Shuichi Inokuchi. 128-133  [doi]
- On the Loop Suppression Method by Utilizing Information of Master Terminals for Neighboring Terminals in Bluetooth MANETsHaruki Ishizaki, Ryohei Saka, Eitaro Kohno, Yoshiaki Kakuda. 134-140  [doi]
- Low-bit Quantized CNN Acceleration based on Bit-serial Dot Product Unit with Zero-bit SkipSora Isobe, Yoichi Tomioka. 141-145  [doi]
- ExtraFerns: Fully Parallel Ensemble Learning Technique with Non-Greedy yet Minimal Memory Access TrainingShungo Kumazawa, Kazushi Kawamura, Thiem Van Chu, Masato Motomura, Jaehoon Yu. 146-152  [doi]
- Extraction of Interpretable Decision Sets in Graph DatabasesKota Matsuyama, Tomonobu Ozaki. 153-159  [doi]
- Analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curveHiromasa Miura, Rikuya Matsumura, Takuya Kusaka, Yasuyuki Nogami. 160-166  [doi]
- Homomorphic commitment scheme with constant output localityHideaki Miyaji, Atsuko Miyaji, Yuntao Wang. 167-173  [doi]
- Fast and Memory Efficient Approximated Convex Hull Computation with FPGATatsuma Mori, Taito Manabe, Yuichiro Shibata. 174-180  [doi]
- Performance Improvement of Hadoop ext4-based Disk I/OMakoto Nakagami, José A. B. Fortes, Saneyasu Yamaguchi. 181-187  [doi]
- On the Connection-Establishment Request Control Method to Improve Data Packet Delivery Ratio at Densely Populated Areas for Bluetooth MANETsAkifumi Nomasaki, Eitaro Kohno, Yoshiaki Kakuda. 188-194  [doi]
- Exploiting temporal parallelism in particle-based incompressive fluid simulation on FPGAManfred Orsztynowicz, Hideharu Amano, Kenichi Kubota, Takaaki Miyajima. 195-201  [doi]
- TCP BBR Performance Improvement on a Network with Increasing RTTKanon Sasaki, Kouto Miyazawa, Kohei Ogawa, Saneyasu Yamaguchi. 202-208  [doi]
- Virtual Machine Monitor-based Hiding Method for Access to Debug RegistersMasaya Sato, Hideo Taniguchi, Ryosuke Nakamura. 209-214  [doi]
- ProgressiveNN: Achieving Computational Scalability without Network Alteration by MSB-first Accumulative ComputationJunnosuke Suzuki, Kota Ando, Kazutoshi Hirose, Kazushi Kawamura, Thiem Van Chu, Masato Motomura, Jaehoon Yu. 215-220  [doi]
- Bayes without Bayesian Learning for Resisting Adversarial AttacksThi Thu Thao Khong, Takashi Nakada, Yasuhiko Nakashima. 221-227  [doi]
- An implementation methodology for Neural Network on a Low-end FPGA BoardKaijie Wei, Koki Honda, Hideharu Amano. 228-234  [doi]
- Architecture-aware Cost Function for 3D FPGA Placement Using Convolutional Neural NetworkQian Zhao 0001, Motoki Amagasaki, Masahiro Iida, Takaichi Yoshida. 235-241  [doi]