Program

Time Zones

November 25 (Wednesday)

JST(UTC+9) CET(UTC+1) EST(UTC-5) Zoom A Zoom B Zoom C
16:00-16:508:00-8:502:00-2:50 Track1 Track5 ASON1
17:00-17:509:00-9:503:00-3:50 LHAM WICS1 ASON2
18:00-18:5010:00-10:504:00-4:50 LHAM Keynote ASON Keynote
19:00-19:5011:00-11:505:00-5:50 Track4A WICS2 ASON3
20:00-20:5012:00-12:506:00-6:50 Track4B WICS3 Track3

November 26 (Thursday)

JST(UTC+9) CET(UTC+1) EST(UTC-5) Zoom A Zoom B Zoom C
16:00-16:508:00-8:502:00-2:50 CSA1 PDAA1
17:00-17:509:00-9:503:00-3:50 CSA2 PDAA2
18:00-18:5010:00-10:504:00-4:50CSA Keynote
19:00-19:5011:00-11:505:00-5:50 Track2A WANC1
20:00-20:5012:00-12:506:00-6:50 Track2B WANC2

November 27 (Friday)

JST(UTC+9) CET(UTC+1) EST(UTC-5) Zoom A Zoom B Zoom C
16:00-16:508:00-8:502:00-2:50 WANC3
17:00-17:509:00-9:503:00-3:50 SUSCW1 GCA1 WANC4
18:00-18:5010:00-10:504:00-4:50SUSCW Keynote
19:00-19:5011:00-11:505:00-5:50 SUSCW2 GCA2 WANC5
20:00-20:5012:00-12:506:00-6:50 SUSCW3 WANC6
21:00-21:1513:00-13:157:00-7:15 Award Ceremony

CANDAR main tracks

Track1

  • Chairs: Akihiro Fujiwara (Kyushu Institute of Technology), Susumu Matsumae (Saga University)
  • 67 Commutativity of Composition of some Elementary Cellular Automata on

Monoids Toshikazu Ishida and Shuichi Inokuchi

  • 104 Evacuation from a Finite 2D Square Grid Field by a Metamorphic Robotic System Junya Nakamura, Sayaka Kamei and Yukiko Yamauchi
  • 47 An implementation methodology for Neural Network on a Low-end FPGA Board Kaijie Wei, Koki Honda and Hideharu Amano
  • 85 Fully-Pipelined Architecture for Simulated Annealing-based QUBO Solver on the FPGA Hiroshi Kagawa, Yasuaki Ito, Koji Nakano, Ryota Yasudo, Yuya Kawamata, Ryota Katsuki, Yusuke Tabata, Takashi Yazane and Kenichiro Hamano
  • 82 Efficient GPU Implementation for Solving the Maximum Independent Set Problem Tomohiro Imanaga, Koji Nakano, Masaki Tao, Ryota Yasudo, Yasuaki Ito, Yuya Kawamata, Ryota Katsuki, Yusuke Tabata, Takashi Yazane and Kenichiro Hamano

Track2A

  • Chairs: Ikki Fujiwara (National Institute of Informatics), Shin'ya Takamaeda (University of Tokyo)
  • 12 ProgressiveNN: Achieving Computational Scalability without Network Alteration by MSB-first Accumulative Computation Junnosuke Suzuki, Kota Ando, Kazutoshi Hirose, Kazushi Kawamura, Thiem Van Chu, Masato Motomura and Jaehoon Yu
  • 17 ExtraFerns: Fully Parallel Ensemble Learning Technique with Non-Greedy yet Minimal Memory Access Training Shungo Kumazawa, Kazushi Kawamura, Thiem Van Chu, Masato Motomura and Jaehoon Yu
  • 66 Low-bit Quantized CNN Acceleration based on Bit-serial Dot Product Unit with Zero-bit Skip Sora Isobe and Yoichi Tomioka
  • 79 An In-Network Parameter Aggregation using DPDK for Multi-GPU Deep Learning Masaki Furukawa, Tomoya Itsubo and Hiroki Matsutani
  • 98 Performance Improvement of Hadoop ext4-based Disk I/O Makoto Nakagami, Jose A.B. Fortes and Saneyasu Yamaguchi

Track2B

  • Chairs: Shin'ya Takamaeda (University of Tokyo), Ikki Fujiwara (National Institute of Informatics)
  • 84 Polymorphic Data Layout for SX-Aurora TSUBASA Vector Engines Naoki Ebata, Yoko Isobe, Ryusuke Egawa and Hiroyuki Takizawa
  • 102 Exploiting temporal parallelism in particle-based incompressive fluid simulation on FPGA Manfred Orsztynowicz, Kenichi Kubota, Hideharu Amano and Takaaki Miyajima
  • 64 Fast and Memory Efficient Approximated Convex Hull Computation with FPGA Tatsuma Mori, Taito Manabe and Yuichiro Shibata
  • 89 A Learning-based Fetch Thread Gating Mechanism for A Simultaneous Multithreading Processor Yosuke Ide and Nobuyuki Yamasaki
  • 109 Architecture-aware Cost Function for 3D FPGA Placement Using Convolutional Neural Network Qian Zhao, Motoki Amagasaki, Masahiro Iida and Takaichi Yoshida

Track3

  • Chairs: Satoshi Fujita (Hiroshima University), Junichi Funasaka (Hiroshima City University)
  • 99 TCP BBR Performance Improvement on a Network with Increasing RTT Kanon Sasaki, Kouto Miyazawa, Kouhei Ogawa and Saneyasu Yamaguchi
  • 75 On the Connection-Establishment Request Control Method to Improve Data Packet Delivery Ratio at Densely Populated Areas for Bluetooth MANETs Akifumi Nomasaki, Eitaro Kohno and Yoshiaki Kakuda
  • 111 On the Loop Suppression Method by Utilizing Information of Master Terminals for Neighboring Terminals in Bluetooth MANETs Haruki Ishizaki, Ryohei Saka, Eitaro Kohno and Yoshiaki Kakuda
  • 106 Bandit-based Run-time Adaptation of Cache Replacement Policies in Content Management Systems Srivattsan Sridharan, Shravan Gaonkar and Jose A. B. Fortes

Track4A

  • Chairs: Hiroyuki Sato(University of Tokyo), Kouzou Ohara(Aoyama Gakuin University)
  • 3 Use cases and success stories of a data analytics system in an automotive paint shop Angel Dacal-Nieto, Juan José Areal, Miguel García-Fernández and Marcos Lluch
  • 38 Extraction of Interpretable Decision Sets in Graph Databases Kota Matsuyama and Tomonobu Ozaki
  • 86 Combinatorial Clustering based on an Externally-defined One-hot Constraint Masahito Kumagai, Kazuhiko Komatsu, Fumiyo Takano, Takuya Araki, Masayuki Sato and Hiroaki Kobayashi
  • 80 Maximum Expressive Number of Threshold Neural Networks Kenta Inoue

Track4B

  • Chairs: Kouzou Ohara (Aoyama Gakuin University), Hiroyuki Sato (University of Tokyo)
  • 8 Emergency Landing Field Identification Based on a Hierarchical Ensemble Transfer Learning Model Andreas Klos, Marius Rosenbaum and Wolfram Schiffmann
  • 53 Bayes without Bayesian Learning for Resisting Adversarial Attacks Thi Thu Thao Khong, Takashi Nakada and Yasuhiko Nakashima
  • 77 Derived metrics for the game of Go – intrinsic network strength assessment and cheat-detection Attila Egri-Nagy and Antti Törmänen
  • 78 Face completion with pyramid semantic attention and latent codes Shilei Cao and Kouichi Sakurai

Track5

  • Chairs: Masayuki Fukumitsu (Hokkaido Information University), Toru Nakanishi (Hiroshima University)
  • 6 Public-key Projective Arithmetic Functional Encryption Shingo Hasegawa, Masashi Hisai and Hiroki Shizuya
  • 18 Homomorphic commitment scheme with low output locality Hideaki Miyaji, Atsuko Miyaji and Yuntao Wang
  • 100 Analysis of a method to eliminate fruitless cycles for Pollard’s rho method with skew Frobenius mapping over a Barreto-Naehrig curve Hiromasa Miura, Rikuya Matsumura, Takuya Kusaka and Yasuyuki Nogami
  • 69 Virtual Machine Monitor-based Hiding Method for Access to Debug Registers Masaya Sato, Hideo Taniguchi and Ryosuke Nakamura
  • 73 Graph visualization of the dark web hyperlink Taichi Aoki and Atsuhiro Goto

Workshops

ASON1

  • Chairs: Atsushi Ito (Utsunomiya University), Shinji Inoue (Hiroshima City University)
  • 201 On the Acceleration of Data Packets Dissemination by Considering Terminals Processing Load in Crowded Environment for Bluetooth MANETs Reo Morishige, Eitaro Kohno and Yoshiaki Kakuda
  • 19 Realtime Congestion Forecasting of Remote Space Through BLE Beacons Taiki Iwao and Satoshi Fujita
  • 13 Blackhole Attack Cooperative Prevention Method in MANETs Takeru Terai, Masami Yoshida, Alberto Gallegos Ramonet and Taku Noguchi
  • 33 A New Model of Flaming Phenomena in Online Social Networks that Considers Resonance Driven by External Stimuli Tomoya Kinoshita and Masaki Aida

ASON2

  • Chairs: Tomoyuki Ohta (Hiroshima City University), Shinji Inoue (Hiroshima City University)
  • 169 A Study on Adjacent Interference of LoRa Jinshan Luo, Atsushi Ito, Akira Sasaki, Madoka Hasegawa, Shiori Ashibe, Yoshikazu Nagao, Yuko Hiramatsu, Kotaro Torii and Toru Aoki
  • 118 A Generalization of Transmission Power Optimization Method for Concurrently Communicating Multiple Access-Points in Wireless Local-Area Network Hendy Briantoro, Nobuo Funabiki, Kwenga Ismael Munene, Md. Mahbubur Rahman, Fatema Akhter, Minoru Kuribayashi and Wen-Chung Kao
  • 140 Adaptive Link Rate Switching Based on Traffic Splitting Method for Power Saving Shingo Uchida and Shigetomo Kimura
  • 131 Throughput Characteristics Evaluation of Media Access Control SP-MAC in Multi-hop WLAN Environment Considering Capture Effect Kazuki Nakamura, Hiroyasu Obata, Chisa Takano and Kenji Ishida
  • 163 Evaluation on Progressive Download Methods Based on Timer-Driven Requesting Schemes on Multiple Paths with Shared Links Junichi Funasaka

ASON3

  • Chairs: Nobuo Funabiki (Okayama University), Shinji Inoue (Hiroshima City University)
  • 142 Evacuation Route Guidance Scheme for Building Evacuation Using Wireless Mesh Network Systems Hironori Fujinaka, Tomoyuki Ohta and Yoshiaki Kakuda
  • 42 Evaluation of Disaster Information-Sharing System in Various Situations Kaito Shibutani, Kentaro Mizunaga, Utsav Shrestha and Aki Kobayashi
  • 49 3D maps distribution of self-driving vehiclesusing roadside edges Masaya Mizutani, Manabu Tsukada, Yuki Iida and Hiroshi Esaki
  • 200 A New Method for Reconfiguring Vehicle Platoon Takuya Yamashichi, Shinji Inoue and Yoshiaki Kakuda

CSA1

  • Chairs: Hayato Yamaki (The University of Electro-Communications), Michihiro Koibuchi (National Institute of Informatics)
  • 70 FPGA Context-based Live Migration Maintaining Network Consistency Akihiro Fukuhara, Soichiro Shohata and Hiroaki Nishi Akihiro Fukuhara
  • 186 Resource utilization prediction model for SLAM offload to Edge Koki Nagahama, Yoichi Ishiwata and Midori Sugaya Koki Nagahama
  • 181 Layout-Oriented Low-Diameter Topology for HPC Interconnection Networks Ryuta Kawano, Hiroki Matsutani and Hideharu Amano Ryuta Kawano
  • 182 Speeding Up VBGMM By Using Logsumexp With the Approximate Exp-function Taku Honda, Hiroki Nishimoto and Yasuhiko Nakashima Taku Honda

CSA2

  • Chairs: Yasunori Osana (University of the Ryukyus), Michihiro Koibuchi (National Institute of Informatis)
  • 88 FPGA Acceleration of ROS2-Based Reinforcement Learning Agents Daniel Pinheiro Leal, Midori Sugaya, Hideharu Amano and Takeshi Ohkawa
  • 45 Parameter Optimization of Approximate Signal and Image Processing Algorithms in FPGAs Nguyen Anh Vu Doan, Manu Manuel, Simon Conrady, Arne Kreddig and Walter Stechele
  • 148 A Translator from FDL to SystemVerilog for FPGA Implementation of Fuzzy Inference Yuichi Kamina, Keisuke Iwai, Takashi Matsubara and Takakazu Kurokawa
  • 114 Netlist-based measures for hardware obfuscation: A preliminary study Shotaro Yamada and Shuichi Ichikawa

GCA1

  • Chairs: Jacir L. Bordim (University of Brasilia), Yasuaki Ito (Hiroshima University)
  • 122 Distributed Deep Learning of ResNet50 and VGG16 with Pipeline Parallelism Naoki Takisawa, Syunji Yazaki and Hiroaki Ishihata
  • 48 Refining Similarity Matrices to Cluster Attributed Networks Accurately Yuta Yajima and Akihiro Inokuchi
  • 51 Automated Test Input Generation for Convolutional Neural Networks by Implementing Multiobjective Evolutionary Algorithms Lingfeng Zhang and Hiroyuki Sato
  • 177 An Efficient Skinny Matrix-Matrix Multiplication Method by Folding Input Matrices into Tensor Core Operations Hao Tang, Kazuhiko Komatsu, Masayuki Sato and Hiroaki Kobayashi
  • 198 An Energy Efficient Stochastic+Spiking Neural Network Takeshi Nomura, Renyuan Zhang and Yasuhiko Nakashima

GCA2

  • Chairs: Jacir L. Bordim (University of Brasilia), Yasuaki Ito (Hiroshima University)
  • 101 Predicting Smartphone Users’ Future Locations through Deep Reinforcement Learning Mhd Irvan, Tran Phuong Thao, Ryosuke Kobayashi, Toshiyuki Nakata and Rie Shigetomi Yamaguchi
  • 39 Image Classification with Additional Non-decision Labels using Self-supervised learning and GAN Toshiki Hatano, Toi Tsuneda, Yuta Suzuki, Shintani Kousuke and Satoshi Yamane
  • 188 Transfer Learning Algorithm for Object Detection Yuta Suzuki, Daiki Kuyoshi and Satoshi Yamane
  • 147 Model-based reinforcement learning with missing data Nobuhiko Yamaguchi, Osamu Fukuda and Hiroshi Okumura
  • 16 Topic and Sentiment Analysis Matrix Factorization on Rating Prediction for Recommendation Ben Wang, Guan-Shen Fang and Sayaka Kamei
  • 159 Art Font Image Generation with Conditional Generative Adversarial Networks Ye Yuan, Yasuaki Ito and Koji Nakano

LHAM

  • Chairs: Takeshi Nanri(Kyushu University), Toshio Endo(Tokyo Institute of Technology)
  • 166 Modernising an Industrial CFD Applicaiton Istvan Reguly and Gihan Mudalige
  • 90 OpenFC: a portable toolkit for custom FPGA accelerators and clusters Yasunori Osana, Taisei Imahigashi and Akinobu Tomori
  • 30 Performance Evaluation of Accurate Matrix–Matrix Multiplication on GPU Using Sparse Matrix Multiplications Fumiya Ishiguro, Takahiro Katagiri, Satoshi Ohshima and Toru Nagai
  • 161 Improving the accuracy in SpMV implementation selection with machine learning Reo Furuhata, Minglu Zhao, Mulya Agung, Ryusuke Egawa and Hiroyuki Takizawa

PDAA1

  • Chairs:Fukuhito Ooshita (Nara Institute of Science and Technology), Sayaka Kamei (Hiroshima University)
  • 32 Closed-Form Solutions of the Fundamental Equation That Describes User Dynamics in Online Social Networks T. Ikeya and Masaki Aida
  • 81 Implementing a Multi-ejection Switch and Making the Use of Multiple Lanes in a Circuit-switched Multi-FPGA System Kohei Ito, Kensuke Iizuka, Kazuei Hironaka, Yao Hu, Michihiro Koibuchi and Hideharu Amano
  • 149 A Parallel Volunteer Computing Based on Server Assisted Communications Yuto Watanabe and Masaru Fukushi
  • 167 A Diagonal Checksum Algorithm-Based Fault Tolerance for Parallel Matrix Multiplication Cui Ke and Michihiro Koibuchi
  • 172 Transparent Transaction Processing with A High-Performance Proxy for Distributed KVS Ryuya Miwa, Motoshi Miyamoto, Ryota Kawashima and Hiroshi Matsuo

PDAA2

  • Chairs: Sayaka Kamei (Hiroshima University), Fukuhito Ooshita (Nara Institute of Science and Technology)
  • 11 Enhanced use of mixed-mode clock manager for coherent sampling-based true random number generator Naoki Fujieda and Sogo Takashima
  • 34 Link Fault Tolerant Routing Algorithms in Mirrored K-Ary N-Tree Interconnection Networks Yaodong Wang and Yamin Li
  • 126 An asynchronous P system with branch and bound for solving the knapsack problem Yoshikata Nakano and Akihiro Fujiwara
  • 195 Optimal Resource Allocation for Machine Learning Tasks in Distributed Computing Environments Shoya Kyan and Morikazu Nakamura

SUSCW1

  • Chairs: Yoshiomi Otsuka (Toyo University), Nobuhiko Nakano (Keio University)
  • 137 Cluster analysis of Psychological Characteristics in Elite Level Rugby Players who Belong to Companies Takeru Hatachi, Chieko Kato and Yoshiomi Otsuka
  • 112 Assessment of Consumers’ Acceptability of Life Infrastructure Service Interruption and Their Factors Yoshiomi Otsuka
  • 133 Proposal of a Smart Bicycle Tourism Improving Tourability and Safety for Tourists by Mesh LPWA Communication System Tomonari Uchimi and Shinji Chiba
  • 116 Toward autonomous adaptive embedded systems for sustainable services using reinforcement learning (WiP report) Yukikazu Nakamoto, Elhard Kumalija and Menglei Zhang

SUSCW2

  • Chairs: Hideharu Amano (Keio University), Minoru Uehara (Toyo University)
  • 154 Noble Inheritance Mechanism of Digital Content for “Digital-Ji-in” toward Sustainable Society Masahiro Hiji, Yuichi Hashi, Kazuhiko Kikuchi, Shigeru Fujita, Yotaro Miyanishi and Norio Shiratori
  • 27 Reducing the Effect of Human Body for Position Estimation using iBeacon Takayuki Miyazaki, Takehiro Makita, Kenichi Takahashi, Takao Kawamura and Kazunori Sugahara
  • 129 An Implementation of a Grid Square Codes Generator on a RISC-V Processor Jubee Tada and Keiichi Sato
  • 190 Functional Model of a Smart Bead Bracelet Fu Rui and Minoru Uehara

SUSCW3

  • Chairs: Minoru Uehara (Toyo University), Yoshiomi Otsuka (Toyo University)
  • 132 Programming Learning by Creating Problems Minoru Uehara
  • 156 Horizontal division of deep learning applications with all-to-all communication on a multiFPGA system Yugo Yamauchi, Kensuke Iizuka, Aoi Hiruma and Hideharu Amano
  • 176 Fault Tolerance Evaluation of Small World Networks for VLSI Implementation Hideki Mori
  • 46 CLAHE implementation on a low-end FPGA board by high-level synthesis Koki Honda, Wei Kaijie, Masatoshi Arai and Hideharu Amano

WICS1

  • Chairs: Shingo Hasegawa (Tohoku University), Toru Nakanishi (Hiroshima University)
  • 14 A Tightly Secure DDH-based Multisignature with Public Key Aggregation Masayuki Fukumitsu and Shingo Hasegawa
  • 50 New Approach to Dishonest-Majority Secure Multiparty Computation for Malicious Adversaries when n < 2k - 1 Shogo Ochiai and Keiichi Iwamura
  • 135 Specific Congruence Classes of Integer Parameters for Generating BLS Curves for Fast Pairings Yuki Nanjo, Masaaki Shirase, Takuya Kusaka and Yasuyuki Nogami
  • 165 An Approach for Attacking Speck on Microcontroller with Correlation Power Analysis Jianjie Tang, Kengo Iokibe, Takuya Kusaka and Yasuyuki Nogami
  • 175 Improvement of Bit Distribution of Binary Sequence Generated by Alternative Trace Map Function Fatema Akhter, Tomoya Tatara, Yasuyuki Nogami, Takuya Kusaka and Nobuo Funabiki

WICS2

  • Chairs: Hiroaki Anada (University of Nagasaki), Toru Nakanishi (Hiroshima University)
  • 120 Quantum Security and Implementation Evaluation of Non-adaptive Group-Testing Aggregate Message Authentication Codes Hiroaki Anada and Daiki Kamibayashi
  • 130 An Accumulator-Based Revocation in Delegatable Anonymous Credentials Nasima Begum and Toru Nakanishi
  • 37 Method of Generating a Blacklist for Mobile Devices by Searching Malicious Websites Takashi Ishihara, Masaya Sato and Toshihiro Yamauchi
  • 138 Information Security Fatigue Countermeasures Based on Cognitive Strategy Scale Misato Ogawa, Shigeaki Tanimoto, Takashi Hatashima and Atsushi Kanai

WICS3

  • Chairs: Masaya Sato (Okayama University), Toru Nakanishi (Hiroshima University)
  • 15 Dataset Properties and Degradation of Machine Learning Accuracy with an Anonymized Training Dataset Wakana Maeda, Toshiya Shimizu, Takeru Fukuoka and Ikuya Morikawa
  • 76 A New Feature to Secure Web Applications Kohei Kubota, Wai Kyi Kyi Oo and Hiroshi Koide
  • 97 Enhanced Classification Method for Homograph Attack Detection Zicong Zhu, Thao Tran Phuong, Hoang-Quoc Nguyen-Son, Rie Yamaguchi and Toshiyuki Nakata
  • 105 Towards a Secure Proxy-based Architecture for Collaborative AI Engineering Roman-Valentyn Tkachuk, Dragos Ilie and Kurt Tutschku
  • 115 SUESSA: Sustainable & Ultra-Elastic Stack Security Architecture for Securing IoT Networks of Future Smart Cities Bishnu Prasad Gautam and Norio Shiratori

WANC1

  • Chairs: Takashi Yokota(Utsunomiya University), Kanemitsu Ootsu (Utsunomiya University)
  • 164 RNN-based approach to TCP throughput prediction Luyao Bai, Hirotake Abe and Chunghan Lee
  • 119 Q-learning in Continuous Action Space by Extending EVA Toi Tsuneda, Daiki Kuyoshi and Satoshi Yamane
  • 124 Efficient Exploration by Decision Making Considering Curiosity and Episodic Memory in Deep Reinforcement Learning Daiki Kuyoshi, Kuniyasu Imade and Satoshi Yamane
  • 194 Reinforcement learning of electric prosthetic hand with depth camera in simulation environment Takuya Ayukawa, Nobuhiko Yamaguchi, Osamu Fukuda and Hiroshi Okumura
  • 196 A proposed system for machine translation by crowdsourcing Kantaro Mera, Taichi Sugimura and Takahiro Koita

WANC2

  • Chairs: Takashi Yokota(Utsunomiya University), Kanemitsu Ootsu (Utsunomiya University)
  • 56 Tweet Classification using Conversational Relationships Toshiyuki Fujita, Kaito Shibutani and Aki Kobayashi
  • 125 A Study of Value Trace Problems for Code Reading Study of C Programming Lu Xiqin, Nobuo Funabiki, Htoo Htoo Sandi Kyaw, Shune Lae Aung and Nem Khan Dim
  • 145 Detection of Foreign Objects overlapped to Green Onion Flakes Gukjin Son, Donghoon Kwak and Youngduk Kim
  • 146 Real-time Detection of Foreign Substance in Seaweed using Pushbroom Hyperspectral Imaging Donghoon Kwak, Gukjin Son and Youngduk Kim
  • 197 An Evaluation of the Discount Rates for Spot Instances on Amazon EC2 Genki Isobe, Sora Aketani and Takahiro Koita

WANC3

  • Chairs: Takashi Yokota(Utsunomiya University), Shuichi Ichikawa (Toyohashi University of Technology)
  • 4 A Hybrid solution for Pattern Recognition: Face and Speech Yassamine Lala Bouali, Mourad Bouache, Mohammed Redjimi and Samira Hazmoun
  • 44 Transient pattern detection from streaming nature data Thanapol Phungtua-Eng, Yoshitaka Yamamoto and Shigeyuki Sako
  • 83 Device position estimation for Multi-tablet virtual display system Hiroto Suzuki, Gaichi Kawaai, Toshiyuki Fujita and Aki Kobayashi
  • 94 Prototype implementation of flat naming scheme ICN on Cefore as the CCN platform Kentaro Mizunaga and Aki Kobayashi
  • 160 An Image Classification Model that Learns MNIST Image Features and Numerical Information Yuta Suzuki, Toshiki Hatano, Toi Tsuneda and Satoshi Yamane

WANC4

  • Chairs: Takashi Yokota(Utsunomiya University), Shuichi Ichikawa (Toyohashi University of Technology)
  • 63 An asynchronous P system for counting sort Kosei Nagao and Akihiro Fujiwara
  • 141 Puyo Puyo AI using Monte Carlo tree search Katsutoshi Soejima, Nobuhiko Yamaguchi, Osamu Fukuda and Hiroshi Okumura
  • 150 Generating and Analyzing Data Set of Workflow-Nets Shohei Matsubara, Shingo Yamaguchi and Mohd Anuaruddin Bin Ahmadon
  • 171 Location estimation algorithm using UAV for real environments Masaya Tomiyama, Yuma Takeda and Takahiro Koita
  • 193 An asynchronous P system using branch and bound for maximum independent set Kotaro Umetsu and Akihiro Fujiwara

WANC5

  • Chairs: Shuichi Ichikawa (Toyohashi University of Technology), Yukinori Sato(Toyohashi University of Technology)
  • 136 Category-oriented Sentiment Polarity Dictionary for Rating Prediction of Japanese Hotels Akito Shibata, Sayaka Kamei and Koji Nakano
  • 183 Development of Soft-Core Processor with Efficient Array Data Transfer Mechanism Tomoya Kikuchi, Yoshiki Kimura, Kanemitsu Ootsu and Takashi Yokota
  • 24 Proposal of Automatic Offloading Method in Mixed Offloading Destination Environment Yoji Yamato
  • 68 A Peak-Avoidance Scheme for Chasing Playback of Mobile Live Streaming Hiroki Okada, Masato Yoshimi, Celimuge Wu and Tsutomu Yoshinaga

WANC6

  • Chairs: Shuichi Ichikawa (Toyohashi University of Technology), Yukinori Sato(Toyohashi University of Technology)
  • 92 A study of FPGA-based cluster computingby high-speed serial-link communication Ruochong Fan and Yoshiki Yamaguchi
  • 93 A Conflict-Aware Capacity Control Mechanism for Last-Level Cache Jiaheng Liu, Ryusuke Egawa, Mulya Agung and Hiroyuki Takizawa
  • 151 An FPGA implementation of a Gaussian process based predictor for sequential time series data. Hirokazu Suzuki, Seiji Tsutsumi and Yukinori Sato
  • 174 Cache Replacement Based on LSTM in the Second Cache in Virtualized Environment Taisei Miura, Kenichi Kourai and Saneyasu Yamaguchi