Program(tentative)

  • Program is tentative and subject to change.
  • Titles/Authors in this web page are copied from those registered in EasyChair. If the title is changed according to reviewers comments, it will be updated in the final program.
  • All oral presentations will be of 25 minutes duration, which includes a 20-minute presentation and 5-minute question and discussion time.

Poster Presentation

  • The size of posters must be up to A0 (841mm width x 1189mm height).
  • Push pins can be used to fix posters.

Nov. 19 (Sun)

Room A(4F)
14:30-17:30Registration of CANDAR and CPSY
15:00-17:00CPSY Poster Demo Session
17:15-17:30Award Ceremony of CPSY Poster-Demo Session

Nov. 20 (Mon)

Room A(4F) Room B(4F) Room C(5F) Room D(5F) Room E(6F)
9:00-17:00 Registration
9:30-10:30 Keynote1
10:30-10:45 break
10:45-12:00 LHAM1 CSA1 PDAA1
12:00-13:00 Poster(CSAP,NCSSP1)
13:15-14:15 LHAMK CSAK PDAAK
14:15-14:30 break
14:30-15:45 LHAM2 CSA2 PDAA2 ASON1
15:45-16:00 break
16:00-17:15 WICS1 CSA3 NCSS ASON2
17:20-17:40 Award Ceremony
19:00-21:00 Reception

Nov. 21 (Tue)

Room A(4F) Room B(4F) Room C(5F) Room D(5F) Room E(6F)
9:00-16:00 Registration
9:30-10:30 Keynote2
10:30-10:45 break
10:45-12:00 ASON3 Track2A WANC1 WICS2
12:00-13:00Poster(ASONP,GCAP,WANCP)
13:00-13:15 break
13:15-14:15 ASONK GCAK WANCK
14:15-14:30 break
14:30-16:10 Track3 GCA Track2B Track4+Track5
16:30-23:00 Banquet

Nov. 22 (Wed)

Room A(4F) Room B(4F) Room C(5F) Room D(5F) Room E(6F)
9:00-16:00 Registration
9:30-10:30 Keynote3
10:30-10:45 break
10:45-12:00 AFCA Track1A WICS3 WANC2
12:00-13:00Poster(AFCAP,WICSP,NCSSP2)
13:00-13:15 break
13:15-14:15 AFCAK GraphGolfK WICSK
14:15-14:30 break
14:30-15:45 Track1B GraphGolf WICS4 WANC3
15:45-16:00 break
16:00-17:40 Track1C WICS5 WANC4
18:00-20:00 Farewell party

Track1A

  • Chair: Kazuhiko Ohno (Mie University)
  • 24, Single Kernel Soft Synchronization Technique for CUDA-enabled GPUs, with Applications, Shunji Funasaka, Koji Nakano and Yasuaki, Ito
  • 52, A Square Pointillism Image Generation, and its GPU Acceleration, Yuki Kuroda, Hiroki Tokura, Yasuaki Ito and Koji Nakano
  • 58, Optimization Strategies for WSM6 on Intel Microarchitectures, Timbwaoga Ouermi, Aaron Knoll, Robert M. Kirby and Martin Berzins

Track1B

  • Chair: Roman Durikovic (Comenius University Bratislava)
  • 61, A Hybrid Architecture for the Approximate String Matching on an FPGA, Takuma Wada, Shunji Funasaka, Koji Nakano and Yasuaki Ito
  • 66, Discovery of Delta-tolerance closed subgraphs on GPGPU Tatsuya Toki and Tomonobu Ozaki
  • 74, Improved Differential Evolution with Searching Pioneer for Solving Multi-modal Optimization Problems, Chun-Ling Lin, Sheng-Ta Hsieh and Shih-Yuan Chiu

Track1C

  • Chair: Xiaohong Jiang (Future University Hakodate)
  • 5, Complex Dynamics, Evolution, Separation, Profile Modeling of Fire in 3D for Computer Animation, Roman Durikovic and Jozef Hladky
  • 67, Performance Improvement of a Two-dimensional Flood Simulation Application in Hybrid Computing Environments, Ryan Marshall, Sheikh Ghafoor, Alfred Kalyanapu, Mike Rogers and Tigstu Tsige Dullo
  • 77, SPH-based Fluid Simulation on GPU using Verlet List and Subdivided Cell-Linked List, Kazuhiko Ohno, Tomoki Nitta and Hiroto Nakai
  • 6, HDR Image Acquisition Using Integrated Mobile Device Camera, Andrej Mihalik, Pavol Kunovsky and Roman Durikovic

Track2A

  • Chair: Shinya Takamaeda (Hokkaido University)
  • 11, Large-Scale Interconnection Network Simulation Methods Based on Cellular Automata, Takashi Yokota, Kanemitsu Ootsu and Takeshi Ohkawa
  • 72, A practical collision avoidance method for an inter-chip bus with wireless inductive Through Chip Interface, Akio Nomura, Junichiro Kadomoto, Tadahiro Kuroda and Hideharu Amano
  • 59, A Light-weight Cooperative Caching Strategy by D2D Content Sharing, Takayuki Shiroma, Takuma Nakajima, Celimuge Wu and Tsutomu Yoshinaga

Track2B

  • Chair: Hideharu Amano (Keio University)
  • 64, Slice Swarms for HPC Application Resilience, Anis Alazzawe and Krishna Kant
  • 45, A Feasibility Study of Programmable Analog Calculation Unit for Approximate Computing, Renyuan Zhang, Takashi Nakada and Yasuhiko Nakashima
  • 80, CPCI Stack: Metric for Accurate Bottleneck Analysis on OoO Microprocessors, Teruo Tanimoto, Takatsugu Ono and Koji Inoue
  • 30, Compression and aggregation for optimizing information transmission in distributed CNN, Takamasa Mitani, Hisakazu Fukuoka, Yuria Hiraga, Takashi Nakada and Yasuhiko Nakashima

Track3

  • Chair: Eitaro Kohno (Hiroshima City University)
  • 3, Energy-Efficient BLE Device Discovery for Internet of Things, Bo-Ren Chen, Shin-Ming Cheng and Jia-Jhun Lin
  • 47, An information platform for smart communities realizing data usage authentication and secure data sharing, Akira Niwa and Hiroaki Nishi
  • 44, Generalized-Star Crossed Cube - A Flexible Interconnection Network with High-Performance at Low-Cost, Sato Tomofumi and Li Yamin
  • 68, Tight Lower Bounds on the Maximum Number of Hops in P2P Video Streaming through Multiple Spanning Trees, Takuya Shoji and Satoshi Fujita

Track4+Track5

  • Chair: Toru Nakanishi (Hiroshima University)
  • 34, Semi-Order Preserving Encryption Technique for Numeric Data to Enhance Privacy, Saleh Ahmed, Annisa, Asif Zaman, Zhan Zhang, Kazi Md. Rokibul Alam and Yasuhiko Morimoto
  • 18, A Galindo-Garcia-like Identity-Based Signature with Tight Security Reduction, Masayuki Fukumitsu and Shingo Hasegawa
  • 46, The Blind Watermarking Method for Anonymized Data Yuta Ohno, Tomomu Iwai and Hiroaki Nishi
  • 81, Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis, Keisuke Furumoto, Korehito Kashiki, Masakatu Morii, Masato Ikegami, Tomohisa Hasegawa, Teiichi Ishikawa and Koji Nakao

AFCA

  • Chair: Georgios Ch. Sirakoulis (Democritus University of Thrace)
  • 129, Hierarchical Motion Representation of 2-state Number Conserving Cellular Automata, Gil-Tak Kong, Katsunobu Imai and Toru Nakanishi
  • 73, Biologically Adaptive Artificial Bee Colony for Numerical Optimization, Sheng-Ta Hsieh, Hao-Wen Cheng, Chun-Ling Lin and Tsung-Ying Sun
  • 124, On a Triangular Brownian Cellular Automaton with 4 States and 6 Rules, Yuta Yamatani, Teijiro Isokawa, Jia Lee and Ferdinand Peper

ASON1

  • Chair: Eitaro Kohno (Hiroshima City University)
  • 22, Proposal of A Multi-agent Based Flexible  IoT Edge Computing Architecture Harmonizing Its Control with Cloud, Shinji Kitagami, Tadashi Ogino, Takuo Suganuma and Norio Shiratori
  • 130, Game Theory-Based Power Allocation and Channel Selection of Multi-channel, D2D Aunee Azrina Zulkifli, Kaori Kuroda and Mikio Hasegawa
  • 141, Data Collection Method using Data Collection with DTN in Participatory Sensing and Data Interpolation, Hiro Onishi, Ryuta Mogi and Takuya Asaka

ASON2

  • Chair: Eitaro Kohno (Hiroshima City University)
  • 15, Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System, Md. Manowarul Islam, Md. Selim Al Mamun, Nobuo Funabiki and Minoru Kuribayashi
  • 106, A Contention Window Control Method Based on Priority Control with the Number of Freezes of Wireless LAN, Tomoki Hanzawa and Shigetomo Kimura
  • 119, Coded Caching for Hierarchical Networks with a Different Number of Layers, Makoto Takita, Masanori Hirotomo and Masakatu Morii

ASON3

  • Chair: Satoshi Fujita (Hiroshima University)
  • 42, Effective Suppression of False Rumors in Social Network Service, Yuusuke Ookita and Satoshi Fujita
  • 132, Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi, Hideharu Kojima and Naoto Yanai

CSA1

  • Chair: Ikki Fujiwara (NICT)
  • 16, Topological Properties and Routing Algorithm for the Static K-Ary N-Tree Interconnection Network, Masahiro Tozaki and Yamin Li
  • 79, Optimising Scientific Workflow Execution using Desktops, Clusters and Clouds, Edvard Martins de Oliveira, Julio Cezar Estrella, Fausto Guzzo Da Costa, Alexandre Delbem and Stephan Reiff-Marganiec
  • 137, Time-sharing Multithreading on Stream-based Lossless Data Compression, Koichi Marumo and Shinichi Yamagiwa

CSA2

  • Chair: Takashi Nakada (NAIST)
  • 20, Configurable Fast Cycle-approximate Timing Estimation for Instruction-level Emulators, Tzu-Yi Chang, Chung-Ta King and Bhaskar Das
  • 107, FEBRE: A Fast and Efficient Bit-flipping Reduction technique to Extend PCM lifetime, Gao Peng, Dongsheng Wang and Haixia Wang

CSA3

  • Chair: Kanemitsu Ootsu (Utsunomiya Univ.)
  • 21, MemSpaces: Evaluating the Tuple Space Paradigm in the Context of Memory-Centric Architectures, Andreas Grapentin, Max Plauth and Andreas Polze
  • 31, Automated tiered storage system consisting of memory and flash storage to improve response time with input-output (IO) concentration workloads, Kazuichi Oe, Mitsuru Sato and Takeshi Nanri
  • 54, Logarithmic Compression for Memory Footprint Reduction in Neural Network Training, Kazutoshi Hirose, Ryota Uematsu, Kota Ando, Kentaro Orimo, Kodai Ueyoshi, Masayuki Ikebe, Tetsuya Asai, Shinya Takamaeda-Yamazaki and Masato Motomura

GCA

  • Chair: Jacir L. Bordim (University of Brasilia)
  • 49, High Performance and Low Power Architectures: GPU vs. FPGA for Fast Factorized Backprojection, Matthis Wielage, Fabian Cholewa, Christian Fahnemann, Peter Pirsch and Holger Blume
  • 56, CloudCL: Distributed Heterogeneous Computing on Cloud Scale Max Plauth, Florian Rösler and Andreas Polze
  • 89, Is Emulating “Binary Grep in Eyes” Possible with Machine Learning? Mamoru Mimura, Yuhei Otsubo, Hidema Tanaka and Atsuhiro Goto
  • 100, GUNREAL: GPU-accelerated UNsupervised REinforcement and Auxiliary Learning Youri Coppens, Koichi Shirahata, Takuya Fukagai, Yasumoto Tomita and Atsushi Ike

LHAM1

  • Chair: Fumihiko Ino (Osaka University)
  • 147, Designing an Open Database of System-aware Code Optimizations, Ryusuke Egawa, Kazuhiko Komatsu and Hiroyuki Takizawa
  • 144, Embedded-DSL-like code generation and optimization of Bayesian estimation routines with user-defined source-to-source code transformation framework Xevolver, Reiji Suda

LHAM2

  • Chair: Reiji Suda (The University of Tokyo)
  • 87, Mixed Precision Solver Scalable to 16000 MPI Processes for Lattice Quantum Chromodynamics (QCD) Simulations on a large Xeon Phi (KNL) System, Ken-Ichi Ishikawa, Taisuke Boku, Yoshinobu Kuramashi and Lawrence Meadows
  • 126, Practical implementation of lattice QCD simulation on Intel Xeon Phi Knights Landing, Issaku Kanamori and Hideo Matsufuru
  • 146, An Application-Level Incremental Checkpointing Mechanism with Automatic Parameter Tuning, Hiroyuki Takizawa, Muhammad Alfian Amrizal, Kazuhiko Komatsu and Ryusuke Egawa

PDAA1

  • Chair: Sayaka Kamei (Hiroshima University)
  • 86, Synchronizing Parallel Geometric Algorithms on Multi-Core Machines, Joel Fuentes, Isaac D. Scherson and Fei Luo
  • 112, A Verified Accumulate Algorithmic Skeleton, Frederic Loulergue
  • 125, Discrete Periodic Radon Transform based Weighted Nuclear Norm Minimization for Image Denoising, Budianto Budianto and Daniel P.K. Lun

PDAA2

  • Chair: Daniel P. K. Lun (The Hong Kong Polytechnic University)
  • 9, Estimating Power Consumption of Servers Using Gaussian Mixture Model, Hao Zhu, Huadong Dai, Yuejin Yan and Bin Lin
  • 103, An asynchronous message-passing distributed algorithm for the global critical section problem, Sayaka Kamei and Hirotsugu Kakugawa
  • 122, An asynchronous P system using branch and bound for the satisfiability problem, Yuki Jimen and Akihiro Fujiwara

WICS1

  • Chair: Masaya Sato (Okayama University)
  • 90, Long-term Performance of a Generic Intrusion Detection Mehotd Using Doc2vec, Mamoru Mimura and Hidema Tanaka
  • 114, Analysis of Effectiveness of Slow Read DoS attack and Influence of Communication Environment, Shunsuke Tayama and Hidema Tanaka
  • 128, Packet In message based DDoS attack detection in SDN network using OpenFlow, Xiang You, Yaokai Feng and Kouichi Sakurai

WICS2

  • Chair: Mamoru Mimura (National Defense Academy)
  • 135, Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM, Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato and Hideo Taniguchi
  • 69, Biometric Bit String Generation from Handwritten Initials on Smart Phones, Ryo Yamagami and Yasushi Yamazaki
  • 153, Fingerprinting BitTorrent Traffic in Encrypted Tunnels using Recurrent Deep Learning, Michelangelo Cruz, Roel Ocampo, Isabel Montes and Rowel Atienza

WICS3

  • Chair: Shingo Hasegawa (Tohoku University)
  • 134, Mocha:Automatically Applying Content Security Policy to HTML hybrid application on Android Device, Toshiki Takeuchi, Koichi Mouri and Shoichi Saito
  • 83, Implementation of Hash Function Generator on Schematic to Program Translator(SPT), Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara and Takakazu Kurokawa
  • 98, Implementation of high speed hash function Keccak using CUDA on GTX 1080, Thuong Nguyen Dat, Keisuke Iwai and Takakazu Kurokawa

WICS4

  • Chair: Noboru Kunihiro (The University of Tokyo)
  • 36, Optimal Representation for Right-to-Left Parallel Scalar Point Multiplication, Kittiphon Phalakarn, Kittiphop Phalakarn and Vorapong Suppakitpaisarn
  • 53, An Efficient Implementation of Trace calculation over Finite Field with vector represetnation, Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Md. Al-Amin Khandaker, Yasuyuki Nogami and Satoshi Uehara
  • 57, An ECC implementation method with a twisted Montgomery curve over Fq^32 on an 8-bit microcontroller, Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka and Yasuyuki Nogami

WICS5

  • Chair: Vorapong Suppakitpaisarn (The University of Tokyo)
  • 85, A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability, Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Jun-Ya Iwazaki, Eisuke Koizumi and Masao Sakai
  • 109, Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks, Takanori Saito and Toru Nakanishi
  • 110, Implementation of Revocable Group Signatures with Compact Revocation List Using Vector Commitments, Shahidatul Sadiah and Toru Nakanishi

WANC1

  • Chair: Naoki Fujieda (Toyohashi University of Technology)
  • 55, Wind-aware emergency landing assistant (based on Dubins curves), Marius Klein, Andreas Klos, Jörg Lenhardt and Wolfram Schiffmann
  • 116, A Study on the Performance of Web Applications Based on RoR in a Highly Consolidated Server with Container-based Virtualization, Yuto Tachibana, Joichiro Kon and Saneyasu Yamaguchi
  • 148, The entering and exiting management system by person specification using Deep-CNN, Hiroto Kizuna and Hiroyuki Sato

WANC2

  • Chair: Takashi Yokota (Utsunomiya University)
  • 14, A Deletion Aware Usable Space Control for SD2, Joichiro Kon, Kenji Nakashima and Saneyasu Yamaguchi
  • 62, A Study of TRAX Player by Template Matching, Masataka Nakano and Yoshiki Yamaguchi
  • 118, Acceleration of large-scale CGH generation using multi-GPU cluster, Shinpei Watanabe, Boaz Jessie Jackin, Takeshi Ohkawa, Kanemitsu Ootsu, Takashi Yokota, Yoshio Hayasaki, Toyohiko Yatagai and Takanobu Baba

WANC3

  • Chair: Saneyasu Yamaguchi (Kogakuin University)
  • 101, Label Estimation Method with Modifications for Unreliable Examples in Taming, Yasutake Koishi, Shuichi Ishida, Tatsuo Tabaru and Hiroyuki Miyamoto
  • 111, A Translation Method of ARM Machine Code to LLVM-IR for Binary Code Parallelization and Optimization, Kohta Shigenobu, Kanemitsu Ootsu, Takeshi Ohkawa and Takashi Yokota
  • 120, Estimation of Power Consumption of Each Application Caused by Device Lock Considering Software Dependency in Smartphones, Shun Kurihara, Shoki Fukuda, Masato Oguchi and Saneyasu Yamaguchi

WANC4

  • Chair: Aki Kobayashi (Kogakuin University)
  • 37, Study on reduction on average computational complexity of GMD decoding using property of bounded distance decoding, Shunsuke Ueda and Takuya Kusaka
  • 96, Messaging Protocol for Relaying Messages between Participants with Autonomous Distributed Blockchain Propagation, Hiroyoshi Ichikawa and Aki Kobayashi
  • 143, Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays, Kenta Sasaki, Jaing Xiaohong and Liao Xuening

NCSS

  • Chiar: Daisuke Takafuji (Hiroshima University)
  • 168, High-performance and Secure Just-in-time Compiler Protection, Tomoyuki Nakayama, Masanori Misono and Takahiro Shinagawa
  • 161, Parallel Rabin-Karp Algorithm Implementation on GPU (Preliminary Version), Lucas Saad, Jacir Bordim, Yasuaki Ito and Koji Nakano

AFCAP

  • 105, Fractal structure of a class of two-dimensional two-states cellular automata, Akane Kawaharada and Takao Namiki

ASONP

  • 113, Peer-to-Peer Bidirectional Streaming Using Mobile Edge Computing, Taichiro Nakayama and Takuya Asaka
  • 117, Evaluation of Information Dissemination Scheme Using Autonomous Clustering and Epidemic Routing Considering Mobile Core Network Load in Wireless Networks, Toshikazu Terami, Tomoyuki Ohta and Yoshiaki Kakuda

CSAP

  • 115, An Obfuscated Hardwired Sequence Control System Generated by High Level Synthesis, Yoshiki Ishigaki, Naoki Fujieda, Yuumi Matsuoka, Kazuki Uyama and Shuichi Ichikawa
  • 121, Power Measurement and Modeling of Quadcopters on Horizontal Flight, Kotaro Maekawa, Shunsuke Negoro, Ittetsu Taniguchi and Hiroyuki Tomiyama

GCAP

  • 71, Improving Multiple Precision Integer Multiplication on GPUs, Makoto Miyazaki and Susumu Matsumae

WICSP

  • 127, Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking, Shiqian Yu, Danilo Vasconcellos Vargas and Kouichi Sakurai
  • 131, Access Control of Webcam on PC with Prevention against Peeping by Attackers, Yuri Yoshino and Masaki Inamura

WANCP

  • 82, A Study to Optimize Heterogeneous Resources for Open IoT, Yoji Yamato, Naoto Hoshikawa, Hirofumi Noguchi, Tatsuya Demizu and Misao Kataoka
  • 95, Examination of classifying hoaxes over SNS using Bayesian Network, Ryutaro Ushigome, Takeshi Matsuda, Michio Sonoda and Jinhui Chao
  • 97, Performance Evaluation of File Operations on OverlayFS, Naoki Mizusawa, Kenji Nakashima and Saneyasu Yamaguchi
  • 99, A Study on Direction Estimation of Movement by Multiple Sensors for Pedestrian Dead-Reckoning, Yuya Sakuma and Masahiro Fujii
  • 123, A firefly optimization for a connected dominating set in a sensor network, Yuta Matsumoto and Akihiro Fujiwara
  • 151, A Study of a Fault-tolerant System Using Dynamic Partial Reconfiguration, Seiya Ogido, Chikatoshi Yamada, Kei Miyagi and Shuichi Ichikawa

NCSSP1

  • 155, KyAnalyzer: An Efficient Code Source Classifier for Operating System Packages, Yi Ren, Jianbo Guan, Hao Zhu, Liang Bai and Yusong Tan
  • 156, Industrial proof of HPC application design for long term maintenance, Francois Letierce
  • 157, Development of a system alerting unsafe actions of texting while walking using a tail lamp, Amato Tsuji, Keita Ushida and Qiu Chen
  • 158, An FPGA Implementation of a Parallel Column Sort Algorithm with Off-chip DRAMs, Naoaki Harada, Koji Nakano and Yasuaki Ito
  • 159, GPU-accelerated Ant Colony Optimization for the Traveling Salesman Problem, Ryouhei Murooka, Yasuaki Ito and Koji Nakano
  • 162, Capturing Temporal Dynamics of Implicit Feedbacks for Collaborative Filtering by Using Deep Recurrent Neural Networks, Minjia He and Yasuhiko Morimoto

NCSSP2

  • 163, Deep Neural Network to Predict NDA Graduates Refusing to Become SDF Officers, Kazuhiro Seiwa, Keisuke Iwai, Takashi Mastubara and Takakazu Kurokawa
  • 164, A Web-based Management System for International Academic Symposiums, Tomoya Baba, Yasuaki Ito and Koji Nakano
  • 165, Acceleration Techniques for Ray Tracing based on Parallel Methods, Jin Okaze, Chikatoshi Yamada, Kei Miyagi and Shuichi Ichikawa
  • 166, Program Obfuscation Method using Entropy, Takuto Omine, Chikatoshi Yamada, Kei Miyagi and Shuichi Ichikawa
  • 167, A CUDA C Program Generator for Verifying Logical Operators, Daisuke Takafuji, Koji Nakano and Yasuaki Ito

Social Events

Reception

Banquet

Banquet includes:

Farewell party