Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
accepted_papers [2019/10/11 21:25]
nakano [CANDAR LONG]
accepted_papers [2019/10/17 16:28] (current)
nakano [NCSS]
Line 6: Line 6:
   * Titles in this web page are copied from EasyChair. If the title is changed according to reviewers comments, it will be updated in the final program.   * Titles in this web page are copied from EasyChair. If the title is changed according to reviewers comments, it will be updated in the final program.
   * Last Update   * Last Update
-    * Papers: Oct. 1110PM (JST)+    * Papers: Oct. 1714PM (JST)
     * Registration:​ Oct. 11, 9AM (JST)     * Registration:​ Oct. 11, 9AM (JST)
   * Please write organizer19@is-candar.org if you find something incorrect in this list.   * Please write organizer19@is-candar.org if you find something incorrect in this list.
Line 15: Line 15:
 ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^ ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^
 |  15  | Hybrid storage system to achieve efficient use of fast memory area |  10  |  Kazuichi Oe  | |  15  | Hybrid storage system to achieve efficient use of fast memory area |  10  |  Kazuichi Oe  |
-|  20  | An Efficient MQ-based Signature in the QROM |  |  Hiroki Furue  |+|  20  | An Efficient MQ-based Signature in the QROM |  ​8 ​ ​| ​ Hiroki Furue  |
 |  34  | Fog-Assisted Virtual Reality MMOG with Ultra Low Latency |  9  |  Tsuyoshi Yoshihara ​ | |  34  | Fog-Assisted Virtual Reality MMOG with Ultra Low Latency |  9  |  Tsuyoshi Yoshihara ​ |
 |  37  | Effective Decentralized ​ Energy ​ Restoration ​ by a Mobile Robot |  9  |  Nicola Santoro ​ | |  37  | Effective Decentralized ​ Energy ​ Restoration ​ by a Mobile Robot |  9  |  Nicola Santoro ​ |
Line 22: Line 22:
 |  52  | DroidCaps: Orientation-based Malware Analysis for Android through Capsule Networks |  9  |  Mohammad Nauman ​ | |  52  | DroidCaps: Orientation-based Malware Analysis for Android through Capsule Networks |  9  |  Mohammad Nauman ​ |
 |  54  | Function Identification in Android Binaries with Deep Learning |  10  |  Aizaz Sharif ​ | |  54  | Function Identification in Android Binaries with Deep Learning |  10  |  Aizaz Sharif ​ |
-|  64  | A Label-based Approach for Automatic Identifying Adversarial Examples with Image Transformation |  |  Thang Dang Duy  |+|  64  | A Label-based Approach for Automatic Identifying Adversarial Examples with Image Transformation |  ​9 ​ ​| ​ Thang Dang Duy  |
 |  66  | Revised Pulse Algorithm for Elementary Shortest Path Problem with Resource Constraints |  8  |  Jiaxin Li  | |  66  | Revised Pulse Algorithm for Elementary Shortest Path Problem with Resource Constraints |  8  |  Jiaxin Li  |
 |  85  | Efficient GPU Implementations to Compute the Diameter of a Graph |  |  Daisuke Takafuji ​ | |  85  | Efficient GPU Implementations to Compute the Diameter of a Graph |  |  Daisuke Takafuji ​ |
Line 37: Line 37:
 |  25  | Siva -- The IPFS Search Engine |  |  Nawras Khudhur ​ | |  25  | Siva -- The IPFS Search Engine |  |  Nawras Khudhur ​ |
 |  31  | Mobility-aware Tasks Offloading in Mobile Edge Computing Environment |  7  |  Qinglan Peng  | |  31  | Mobility-aware Tasks Offloading in Mobile Edge Computing Environment |  7  |  Qinglan Peng  |
-|  36  | A Performance Analysis and Evaluation of SIDH with Several Classes of the Quadratic Extension Fields |  |  Yuki Nanjo  | +|  36  | A Performance Analysis and Evaluation of SIDH with Several Classes of the Quadratic Extension Fields |  ​7 ​ ​| ​ Yuki Nanjo  | 
-|  40  | An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS |  |  HAO ZHAO  | +|  40  | An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS |  ​6 ​ ​| ​ HAO ZHAO  | 
-|  47  | A Density-Based Congestion Avoidance Protocol for Strict Beaconing Requirements in VANETs |  |  Jacir Bordim ​ |+|  47  | A Density-Based Congestion Avoidance Protocol for Strict Beaconing Requirements in VANETs |  ​7 ​ ​| ​ Jacir Bordim ​ |
 |  50  | Decomposing the Inverse of a Masked Vector in an Isomorphic GF for Perfectly Masked S-Box |  7  |  Yuta Kodera ​ | |  50  | Decomposing the Inverse of a Masked Vector in an Isomorphic GF for Perfectly Masked S-Box |  7  |  Yuta Kodera ​ |
 |  62  | CNN Architecture for Surgical Image Segmentation Systems with Recursive Network Structure to Mitigate Overfitting |  |  Taito Manabe ​ | |  62  | CNN Architecture for Surgical Image Segmentation Systems with Recursive Network Structure to Mitigate Overfitting |  |  Taito Manabe ​ |
 |  73  | Benchmarks for FPGA-Targeted High-Level-Synthesis |  7  |  Yasuaki Iimura ​ | |  73  | Benchmarks for FPGA-Targeted High-Level-Synthesis |  7  |  Yasuaki Iimura ​ |
-|  80  | How to Improve the Cohesion of a Social Network? A Structural Perspective |  |  Jiamou Liu  |+|  80  | How to Improve the Cohesion of a Social Network? A Structural Perspective |  ​7 ​ ​| ​ Jiamou Liu  |
 |  88  | Extraction of Characteristic Subgraph Patterns with Support Threshold from Databases of Floor Plans |  7  |  Tomonobu Ozaki  | |  88  | Extraction of Characteristic Subgraph Patterns with Support Threshold from Databases of Floor Plans |  7  |  Tomonobu Ozaki  |
-|  99  | A Side-Channel Attack using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller |  |  Yoshinori Uetake ​ |+|  99  | A Side-Channel Attack using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller |  ​7 ​ ​| ​ Yoshinori Uetake ​ |
 |  102  | A Resource-efficient Weight Sampling Method for Bayesian Neural Network Accelerators |  |  Yuki Hirayama ​ | |  102  | A Resource-efficient Weight Sampling Method for Bayesian Neural Network Accelerators |  |  Yuki Hirayama ​ |
 |  104  | GPGPU Implementation of Variational Bayesian Gaussian Mixture Models |  |  Hiroki Nishimoto ​ | |  104  | GPGPU Implementation of Variational Bayesian Gaussian Mixture Models |  |  Hiroki Nishimoto ​ |
-|  114  | Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library |  |  Keiji Yoshimoto ​ |+|  114  | Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library |  ​6 ​ ​| ​ Keiji Yoshimoto ​ |
  
 ====== Workshop Papers ====== ====== Workshop Papers ======
Line 76: Line 76:
 |  32  | Evaluation of a Chained Systolic Array with High-Speed Links| ​ 7  |  Jun Iwamoto ​ | |  32  | Evaluation of a Chained Systolic Array with High-Speed Links| ​ 7  |  Jun Iwamoto ​ |
 |  41  | A Programmable Approximate Calculation Unit Employing Time-Encoded Stochastic Computing Elements| ​ |  NGUYEN VAN TINH  | |  41  | A Programmable Approximate Calculation Unit Employing Time-Encoded Stochastic Computing Elements| ​ |  NGUYEN VAN TINH  |
-|  61  | A Memory-Bandwidth-Efficient ​ Word2vec Accelerator Using OpenCL for FPGA|  |  Tomoki Shoji  |+|  61  | A Memory-Bandwidth-Efficient ​ Word2vec Accelerator Using OpenCL for FPGA|  ​6 ​ ​| ​ Tomoki Shoji  |
 |  93  | Deadlock-Free Layered Routing for Infiniband Networks| ​ |  Ryuta Kawano ​ | |  93  | Deadlock-Free Layered Routing for Infiniband Networks| ​ |  Ryuta Kawano ​ |
-|  105  | GPU-based Decompression using the 842 Algorithm| ​ |  Max Plauth ​ |+|  105  | GPU-based Decompression using the 842 Algorithm| ​ ​6 ​ ​| ​ Max Plauth ​ |
 |  106  | Fast Interrupt Handling Scheme By Using Interrupt Wake-Up Mechanism| ​ |  Ryo Wada  | |  106  | Fast Interrupt Handling Scheme By Using Interrupt Wake-Up Mechanism| ​ |  Ryo Wada  |
 |  182  | Throughput-Optimal Hardware Implementation of LZW Decompression on the FPGA|  6  |  Hiroshi Kagawa ​ | |  182  | Throughput-Optimal Hardware Implementation of LZW Decompression on the FPGA|  6  |  Hiroshi Kagawa ​ |
Line 92: Line 92:
 ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^ ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^
 |  18  | Frame Difference Generative Adversarial Networks:​Clearer Contour Video Generating |  |  Rui Qiu  | |  18  | Frame Difference Generative Adversarial Networks:​Clearer Contour Video Generating |  |  Rui Qiu  |
-|  72  | Face Image Anonymization as an Application of Multidimensional Data K-Anonymizer |  |  Taichi Nakamura ​ |+|  72  | Face Image Anonymization as an Application of Multidimensional Data K-Anonymizer |  ​7 ​ ​| ​ Taichi Nakamura ​ |
 |  77  | A Quantized Neural Network Library for Proper Implementation of Hardware Emulation |  |  Masato KIYAMA ​ | |  77  | A Quantized Neural Network Library for Proper Implementation of Hardware Emulation |  |  Masato KIYAMA ​ |
 |  78  | Task Scheduling Techniques for Deep Learning in Heterogeneous Environment |  7  |  Pangfeng Liu  | |  78  | Task Scheduling Techniques for Deep Learning in Heterogeneous Environment |  7  |  Pangfeng Liu  |
-|  84  | Expressive Numbers of Two or More Hidden Layer ReLU Neural Networks |  |  Kenta Inoue  |+|  84  | Expressive Numbers of Two or More Hidden Layer ReLU Neural Networks |  ​7 ​ ​| ​ Kenta Inoue  |
 |  124  | Fast compression and optimization of deep learning models for natural language processing |  |  Marcin Pietron ​ | |  124  | Fast compression and optimization of deep learning models for natural language processing |  |  Marcin Pietron ​ |
 |  173  | Structured Sparse Fully-Connected Layers in the CNNs and its GPU Acceleration |  7  |  Naoki Matsumura ​ | |  173  | Structured Sparse Fully-Connected Layers in the CNNs and its GPU Acceleration |  7  |  Naoki Matsumura ​ |
Line 109: Line 109:
 ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^ ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^
 |  28  | Collaborative Illustrator with Android Tablets |  |  Shogo Inoue  | |  28  | Collaborative Illustrator with Android Tablets |  |  Shogo Inoue  |
-|  29  | Live Streaming Over Wi-Fi Direct Multi-Groups |  |  Masayuki Kawakami ​ |+|  29  | Live Streaming Over Wi-Fi Direct Multi-Groups |  ​7 ​ ​| ​ Masayuki Kawakami ​ |
 |  43  | An asynchronous P system using branch and bound for minimum graph coloring |  |  Kotaro Umetsu ​ | |  43  | An asynchronous P system using branch and bound for minimum graph coloring |  |  Kotaro Umetsu ​ |
 |  82  | Multi-Objective Optimization of Channel Mapping for Fail-Operational Hybrid TDM NoCs |  7  |  Nguyen Anh Vu Doan  | |  82  | Multi-Objective Optimization of Channel Mapping for Fail-Operational Hybrid TDM NoCs |  7  |  Nguyen Anh Vu Doan  |
 |  94  | The Degree/​Diameter Problem for Host-Switch Graphs |  |  Ryota Yasudo ​ | |  94  | The Degree/​Diameter Problem for Host-Switch Graphs |  |  Ryota Yasudo ​ |
 |  97  | Forgive & Forget: Self-Stabilizing Swarms in Spite of Byzantine Robots |  7  |  Koichi Wada  | |  97  | Forgive & Forget: Self-Stabilizing Swarms in Spite of Byzantine Robots |  7  |  Koichi Wada  |
-|  115  | A Development Platform of Intelligent Mobile APP based on Edge Computing |  |  Tyng-Yeu Liang  | +|  115  | A Development Platform of Intelligent Mobile APP based on Edge Computing |  ​7 ​ ​| ​ Tyng-Yeu Liang  | 
-|  128  | Robustness of elementary cellular automata to asynchronous transitions and communications |  |  Qin Lei  |+|  128  | Robustness of elementary cellular automata to asynchronous transitions and communications |  ​7 ​ ​| ​ Qin Lei  |
 |  147  | Eventually Consistent Distributed Ledger Relying on Degraded Atomic Broadcast |  |  Michiko Inoue  | |  147  | Eventually Consistent Distributed Ledger Relying on Degraded Atomic Broadcast |  |  Michiko Inoue  |
 |  172  | A Construction of Real-Time Sequence Generation Algorithm for { n4  n = 1, 2, 3, ...} |  |  Naoki Kamikawa ​ | |  172  | A Construction of Real-Time Sequence Generation Algorithm for { n4  n = 1, 2, 3, ...} |  |  Naoki Kamikawa ​ |
Line 126: Line 126:
 ===== SUSCW REGULAR ===== ===== SUSCW REGULAR =====
 ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^ ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^
-|  24  | Real Chip Performance Evaluation on Through Chip Interface IP for Renesas SOTB 65nm Process |  |  Hideto Kayashima ​ |+|  24  | Real Chip Performance Evaluation on Through Chip Interface IP for Renesas SOTB 65nm Process |  ​6 ​ ​| ​ Hideto Kayashima ​ |
 |  33  | JavaScript Development Environment for Programming Education using Smartphones |  6  |  Minoru Uehara ​ | |  33  | JavaScript Development Environment for Programming Education using Smartphones |  6  |  Minoru Uehara ​ |
 |  74  | Interactive Cultivation System for the Future IoT-based Agriculture |  |  Hironori Nakajo ​ | |  74  | Interactive Cultivation System for the Future IoT-based Agriculture |  |  Hironori Nakajo ​ |
-|  90  | A Web-based Routing and Visualization Tool for Drone Delivery |  |  Takuma Hikida ​ | +|  90  | A Web-based Routing and Visualization Tool for Drone Delivery |  ​5 ​ ​| ​ Takuma Hikida ​ | 
-|  151  | Analysis of factors influencing global carbon dioxide emission characteristics using panel data and evaluation of their impact |  |  Yoshiomi Otsuka ​ |+|  151  | Analysis of factors influencing global carbon dioxide emission characteristics using panel data and evaluation of their impact |  ​7 ​ ​| ​ Yoshiomi Otsuka ​ |
 |  159  | A Rapid Optimization Method For Visual Indirect SLAM Using a Subset of Feature Points |  |  Ryosuke Kazami ​ | |  159  | A Rapid Optimization Method For Visual Indirect SLAM Using a Subset of Feature Points |  |  Ryosuke Kazami ​ |
 |  181  | Acceleration of ART algorithm on an FPGA board with Xilinx SDAccel |  |  Hideharu AMANO  | |  181  | Acceleration of ART algorithm on an FPGA board with Xilinx SDAccel |  |  Hideharu AMANO  |
Line 136: Line 136:
 ===== SUSCW POSTER ===== ===== SUSCW POSTER =====
 ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^ ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^
-|  121  | Improvement of Multipurpose Travel Route Recommendation System Based on GA |  |  YUAN CHEN  |+|  121  | Improvement of Multipurpose Travel Route Recommendation System Based on GA |  ​4 ​ ​| ​ YUAN CHEN  |
 |  169  | A Cache Replacement Policy with Considering Fluctuation Patterns of Total Priority Value |  |  Ryosuke Higashi ​ | |  169  | A Cache Replacement Policy with Considering Fluctuation Patterns of Total Priority Value |  |  Ryosuke Higashi ​ |
  
Line 143: Line 143:
 |  17  | Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication scheme on Asymmetric Bilinear Map |  |  Kotaro Chinen ​ | |  17  | Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication scheme on Asymmetric Bilinear Map |  |  Kotaro Chinen ​ |
 |  21  | Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism using Processor Information |  |  Kazuki Koike  | |  21  | Reduction of Classifier Size and Acceleration of Classification Algorithm in Malware Detection Mechanism using Processor Information |  |  Kazuki Koike  |
-|  23  | Reliable Decentralized Oracle with Mechanisms for Verification and Disputation |  |  LIMAO MA  |+|  23  | Reliable Decentralized Oracle with Mechanisms for Verification and Disputation |  ​7 ​ ​| ​ LIMAO MA  |
 |  44  | A Covert System Identification Attack on Constant Set-point Control Systems |  7  |  Hoda Mehrpouyan ​ | |  44  | A Covert System Identification Attack on Constant Set-point Control Systems |  7  |  Hoda Mehrpouyan ​ |
 |  65  | Investigating the Accuracy of Free-Text Keystroke Dynamics Authentication in Touchscreen Devices |  |  | |  65  | Investigating the Accuracy of Free-Text Keystroke Dynamics Authentication in Touchscreen Devices |  |  |
Line 149: Line 149:
 |  76  | A New Higher Order Differential of BIG |  6  |  Naoki Shibayama ​ | |  76  | A New Higher Order Differential of BIG |  6  |  Naoki Shibayama ​ |
 |  79  | Image-based Unknown Malware Classification with Few-Shot Learning Models |  |  Kien Tran  | |  79  | Image-based Unknown Malware Classification with Few-Shot Learning Models |  |  Kien Tran  |
-|  86  | Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers |  |  Hayato Kimura ​ |+|  86  | Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers |  ​6 ​ ​| ​ Hayato Kimura ​ |
 |  103  | ECC Atomic Block against Strong Side-Channel Attacks using Binary Curves |  |  Yusuke Takemura ​ | |  103  | ECC Atomic Block against Strong Side-Channel Attacks using Binary Curves |  |  Yusuke Takemura ​ |
 |  107  | Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence |  7  |  Yuki Taketa ​ | |  107  | Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence |  7  |  Yuki Taketa ​ |
 |  123  | Security Bug Detection Through Dynamic Taint Analysis in Scala |  |  Mohammadreza Ashouri ​ | |  123  | Security Bug Detection Through Dynamic Taint Analysis in Scala |  |  Mohammadreza Ashouri ​ |
-|  142  | A preliminary study on methods to eliminate short fruitless cycles for Pollard’s rho method for ECDLP over BN curves |  |  Hiromasa Miura  | +|  142  | A preliminary study on methods to eliminate short fruitless cycles for Pollard’s rho method for ECDLP over BN curves |  ​7 ​ ​| ​ Hiromasa Miura  | 
-|  146  | Identifying Useful Features for Malware Detection in the Ember Dataset |  |  Yoshihiro Oyama  | +|  146  | Identifying Useful Features for Malware Detection in the Ember Dataset |  ​7 ​ ​| ​ Yoshihiro Oyama  | 
-|  149  | An Efficient Anonymous Reputation System for Crowd Sensing |  |  Toru Nakanishi ​ |+|  149  | An Efficient Anonymous Reputation System for Crowd Sensing |  ​7 ​ ​| ​ Toru Nakanishi ​ |
  
 ===== WICS POSTER ===== ===== WICS POSTER =====
Line 171: Line 171:
 |  98  | Evaluation of AP and OS Processing Distribution for Microkernel OS |  5  |  Yuya Kobayashi ​ | |  98  | Evaluation of AP and OS Processing Distribution for Microkernel OS |  5  |  Yuya Kobayashi ​ |
 |  131  | An analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code |  5  |  Shinichi Kageyama ​ | |  131  | An analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code |  5  |  Shinichi Kageyama ​ |
-|  143  | Generating block IO trace data from a cloud site using packet capture and analyzing the IO trace data |  |  Kazutaka OGIHARA ​ | +|  143  | Generating block IO trace data from a cloud site using packet capture and analyzing the IO trace data |  ​5 ​ ​| ​ Kazutaka OGIHARA ​ | 
-|  150  | Finding the Maximum Number of Symbols for the 4b/10b Line Code with Error Correction |  |  Masayuki Takeda ​ |+|  150  | Finding the Maximum Number of Symbols for the 4b/10b Line Code with Error Correction |  ​5 ​ ​| ​ Masayuki Takeda ​ |
 |  156  | A Watercolor Painting Image Generation using Stroke-based Rendering |  5  |  Hisaki Yamane ​ | |  156  | A Watercolor Painting Image Generation using Stroke-based Rendering |  5  |  Hisaki Yamane ​ |
 |  168  | Proposal of Scalable Vector Extension for Embedded RISC-V Soft-core Processor |  5  |  Yoshiki Kimura ​ | |  168  | Proposal of Scalable Vector Extension for Embedded RISC-V Soft-core Processor |  5  |  Yoshiki Kimura ​ |
Line 179: Line 179:
 ===== WANC POSTER ===== ===== WANC POSTER =====
 ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^ ^  Paper ID  ^  Title  ^  Pages  ^  Speaker ​ ^
-|  45  | A study on transmission efficiency of systematic Spinal Codes |  |  Yota Katagishi ​ |+|  45  | A study on transmission efficiency of systematic Spinal Codes |  ​3 ​ ​| ​ Yota Katagishi ​ |
 |  129  | Artificial Bee Colony with Mutual Search Strategy for Solving Numerical Optimization Problems |  |  | |  129  | Artificial Bee Colony with Mutual Search Strategy for Solving Numerical Optimization Problems |  |  |
 |  135  | Strawberry optimization for multi-objective knapsack problem |  3  |  YAMATO MIZOBE ​ | |  135  | Strawberry optimization for multi-objective knapsack problem |  3  |  YAMATO MIZOBE ​ |
Line 196: Line 196:
 |  189  | Learning course features with Mini 4WD simulator |  Poster ​ |  2  |  Yuji Onoo ​ | |  189  | Learning course features with Mini 4WD simulator |  Poster ​ |  2  |  Yuji Onoo ​ |
 |  190  | Self-position estimation of Mini 4WD AI using digital camera images |  Poster ​ |  2  |  Kazuhisa Senju ​ | |  190  | Self-position estimation of Mini 4WD AI using digital camera images |  Poster ​ |  2  |  Kazuhisa Senju ​ |
 +|  192  | Flower pollination optimization for the multi-objective knapsack problem |  Oral  |  4  |  |