Program(tentative)
- Program is tentative and subject to change.
- Titles/Authors in this web page are copied from those registered in EasyChair. If the title is changed according to reviewers comments, it will be updated in the final program.
- All oral presentations will be of 25 minutes duration, which includes a 20-minute presentation and 5-minute question and discussion time.
Poster Presentation
- The size of posters must be up to A0 (841mm width x 1189mm height).
- Push pins can be used to fix posters.
Nov. 19 (Sun)
Room A(4F) | |
---|---|
14:30-17:30 | Registration of CANDAR and CPSY |
15:00-17:00 | CPSY Poster Demo Session |
17:15-17:30 | Award Ceremony of CPSY Poster-Demo Session |
Nov. 20 (Mon)
- Registration
- CANDAR Technical Program
- Reception
Room A(4F) | Room B(4F) | Room C(5F) | Room D(5F) | Room E(6F) | |
---|---|---|---|---|---|
9:00-17:00 | Registration | ||||
9:30-10:30 | Keynote1 | ||||
10:30-10:45 | break | ||||
10:45-12:00 | LHAM1 | CSA1 | PDAA1 | ||
12:00-13:00 | Poster(CSAP,NCSSP1) | ||||
13:15-14:15 | LHAMK | CSAK | PDAAK | ||
14:15-14:30 | break | ||||
14:30-15:45 | LHAM2 | CSA2 | PDAA2 | ASON1 | |
15:45-16:00 | break | ||||
16:00-17:15 | WICS1 | CSA3 | NCSS | ASON2 | |
17:20-17:40 | Award Ceremony | ||||
19:00-21:00 | Reception |
Nov. 21 (Tue)
- Registration
- CANDAR Technical Program
- Banquet
Room A(4F) | Room B(4F) | Room C(5F) | Room D(5F) | Room E(6F) | |
---|---|---|---|---|---|
9:00-16:00 | Registration | ||||
9:30-10:30 | Keynote2 | ||||
10:30-10:45 | break | ||||
10:45-12:00 | ASON3 | Track2A | WANC1 | WICS2 | |
12:00-13:00 | Poster(ASONP,GCAP,WANCP) | ||||
13:00-13:15 | break | ||||
13:15-14:15 | ASONK | GCAK | WANCK | ||
14:15-14:30 | break | ||||
14:30-16:10 | Track3 | GCA | Track2B | Track4+Track5 | |
16:30-23:00 | Banquet |
Nov. 22 (Wed)
- Registration
- CANDAR Technical Program
- Farewell Party
Room A(4F) | Room B(4F) | Room C(5F) | Room D(5F) | Room E(6F) | |
---|---|---|---|---|---|
9:00-16:00 | Registration | ||||
9:30-10:30 | Keynote3 | ||||
10:30-10:45 | break | ||||
10:45-12:00 | AFCA | Track1A | WICS3 | WANC2 | |
12:00-13:00 | Poster(AFCAP,WICSP,NCSSP2) | ||||
13:00-13:15 | break | ||||
13:15-14:15 | AFCAK | GraphGolfK | WICSK | ||
14:15-14:30 | break | ||||
14:30-15:45 | Track1B | GraphGolf | WICS4 | WANC3 | |
15:45-16:00 | break | ||||
16:00-17:40 | Track1C | WICS5 | WANC4 | ||
18:00-20:00 | Farewell party |
Track1A
- Chair: Kazuhiko Ohno (Mie University)
- 24, Single Kernel Soft Synchronization Technique for CUDA-enabled GPUs, with Applications, Shunji Funasaka, Koji Nakano and Yasuaki, Ito
- 52, A Square Pointillism Image Generation, and its GPU Acceleration, Yuki Kuroda, Hiroki Tokura, Yasuaki Ito and Koji Nakano
- 58, Optimization Strategies for WSM6 on Intel Microarchitectures, Timbwaoga Ouermi, Aaron Knoll, Robert M. Kirby and Martin Berzins
Track1B
- Chair: Roman Durikovic (Comenius University Bratislava)
- 61, A Hybrid Architecture for the Approximate String Matching on an FPGA, Takuma Wada, Shunji Funasaka, Koji Nakano and Yasuaki Ito
- 66, Discovery of Delta-tolerance closed subgraphs on GPGPU Tatsuya Toki and Tomonobu Ozaki
- 74, Improved Differential Evolution with Searching Pioneer for Solving Multi-modal Optimization Problems, Chun-Ling Lin, Sheng-Ta Hsieh and Shih-Yuan Chiu
Track1C
- Chair: Xiaohong Jiang (Future University Hakodate)
- 5, Complex Dynamics, Evolution, Separation, Profile Modeling of Fire in 3D for Computer Animation, Roman Durikovic and Jozef Hladky
- 67, Performance Improvement of a Two-dimensional Flood Simulation Application in Hybrid Computing Environments, Ryan Marshall, Sheikh Ghafoor, Alfred Kalyanapu, Mike Rogers and Tigstu Tsige Dullo
- 77, SPH-based Fluid Simulation on GPU using Verlet List and Subdivided Cell-Linked List, Kazuhiko Ohno, Tomoki Nitta and Hiroto Nakai
- 6, HDR Image Acquisition Using Integrated Mobile Device Camera, Andrej Mihalik, Pavol Kunovsky and Roman Durikovic
Track2A
- Chair: Shinya Takamaeda (Hokkaido University)
- 11, Large-Scale Interconnection Network Simulation Methods Based on Cellular Automata, Takashi Yokota, Kanemitsu Ootsu and Takeshi Ohkawa
- 72, A practical collision avoidance method for an inter-chip bus with wireless inductive Through Chip Interface, Akio Nomura, Junichiro Kadomoto, Tadahiro Kuroda and Hideharu Amano
- 59, A Light-weight Cooperative Caching Strategy by D2D Content Sharing, Takayuki Shiroma, Takuma Nakajima, Celimuge Wu and Tsutomu Yoshinaga
Track2B
- Chair: Hideharu Amano (Keio University)
- 64, Slice Swarms for HPC Application Resilience, Anis Alazzawe and Krishna Kant
- 45, A Feasibility Study of Programmable Analog Calculation Unit for Approximate Computing, Renyuan Zhang, Takashi Nakada and Yasuhiko Nakashima
- 80, CPCI Stack: Metric for Accurate Bottleneck Analysis on OoO Microprocessors, Teruo Tanimoto, Takatsugu Ono and Koji Inoue
- 30, Compression and aggregation for optimizing information transmission in distributed CNN, Takamasa Mitani, Hisakazu Fukuoka, Yuria Hiraga, Takashi Nakada and Yasuhiko Nakashima
Track3
- Chair: Eitaro Kohno (Hiroshima City University)
- 3, Energy-Efficient BLE Device Discovery for Internet of Things, Bo-Ren Chen, Shin-Ming Cheng and Jia-Jhun Lin
- 47, An information platform for smart communities realizing data usage authentication and secure data sharing, Akira Niwa and Hiroaki Nishi
- 44, Generalized-Star Crossed Cube - A Flexible Interconnection Network with High-Performance at Low-Cost, Sato Tomofumi and Li Yamin
- 68, Tight Lower Bounds on the Maximum Number of Hops in P2P Video Streaming through Multiple Spanning Trees, Takuya Shoji and Satoshi Fujita
Track4+Track5
- Chair: Toru Nakanishi (Hiroshima University)
- 34, Semi-Order Preserving Encryption Technique for Numeric Data to Enhance Privacy, Saleh Ahmed, Annisa, Asif Zaman, Zhan Zhang, Kazi Md. Rokibul Alam and Yasuhiko Morimoto
- 18, A Galindo-Garcia-like Identity-Based Signature with Tight Security Reduction, Masayuki Fukumitsu and Shingo Hasegawa
- 46, The Blind Watermarking Method for Anonymized Data Yuta Ohno, Tomomu Iwai and Hiroaki Nishi
- 81, Analysis of Multiple Darknet Focusing on Outbound Packets and its Application to Malware Analysis, Keisuke Furumoto, Korehito Kashiki, Masakatu Morii, Masato Ikegami, Tomohisa Hasegawa, Teiichi Ishikawa and Koji Nakao
AFCA
- Chair: Georgios Ch. Sirakoulis (Democritus University of Thrace)
- 129, Hierarchical Motion Representation of 2-state Number Conserving Cellular Automata, Gil-Tak Kong, Katsunobu Imai and Toru Nakanishi
- 73, Biologically Adaptive Artificial Bee Colony for Numerical Optimization, Sheng-Ta Hsieh, Hao-Wen Cheng, Chun-Ling Lin and Tsung-Ying Sun
- 124, On a Triangular Brownian Cellular Automaton with 4 States and 6 Rules, Yuta Yamatani, Teijiro Isokawa, Jia Lee and Ferdinand Peper
ASON1
- Chair: Eitaro Kohno (Hiroshima City University)
- 22, Proposal of A Multi-agent Based Flexible IoT Edge Computing Architecture Harmonizing Its Control with Cloud, Shinji Kitagami, Tadashi Ogino, Takuo Suganuma and Norio Shiratori
- 130, Game Theory-Based Power Allocation and Channel Selection of Multi-channel, D2D Aunee Azrina Zulkifli, Kaori Kuroda and Mikio Hasegawa
- 141, Data Collection Method using Data Collection with DTN in Participatory Sensing and Data Interpolation, Hiro Onishi, Ryuta Mogi and Takuya Asaka
ASON2
- Chair: Eitaro Kohno (Hiroshima City University)
- 15, Dynamic Access-Point Configuration Approach for Elastic Wireless Local-Area Network System, Md. Manowarul Islam, Md. Selim Al Mamun, Nobuo Funabiki and Minoru Kuribayashi
- 106, A Contention Window Control Method Based on Priority Control with the Number of Freezes of Wireless LAN, Tomoki Hanzawa and Shigetomo Kimura
- 119, Coded Caching for Hierarchical Networks with a Different Number of Layers, Makoto Takita, Masanori Hirotomo and Masakatu Morii
ASON3
- Chair: Satoshi Fujita (Hiroshima University)
- 42, Effective Suppression of False Rumors in Social Network Service, Yuusuke Ookita and Satoshi Fujita
- 132, Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi, Hideharu Kojima and Naoto Yanai
CSA1
- Chair: Ikki Fujiwara (NICT)
- 16, Topological Properties and Routing Algorithm for the Static K-Ary N-Tree Interconnection Network, Masahiro Tozaki and Yamin Li
- 79, Optimising Scientific Workflow Execution using Desktops, Clusters and Clouds, Edvard Martins de Oliveira, Julio Cezar Estrella, Fausto Guzzo Da Costa, Alexandre Delbem and Stephan Reiff-Marganiec
- 137, Time-sharing Multithreading on Stream-based Lossless Data Compression, Koichi Marumo and Shinichi Yamagiwa
CSA2
- Chair: Takashi Nakada (NAIST)
- 20, Configurable Fast Cycle-approximate Timing Estimation for Instruction-level Emulators, Tzu-Yi Chang, Chung-Ta King and Bhaskar Das
- 107, FEBRE: A Fast and Efficient Bit-flipping Reduction technique to Extend PCM lifetime, Gao Peng, Dongsheng Wang and Haixia Wang
CSA3
- Chair: Kanemitsu Ootsu (Utsunomiya Univ.)
- 21, MemSpaces: Evaluating the Tuple Space Paradigm in the Context of Memory-Centric Architectures, Andreas Grapentin, Max Plauth and Andreas Polze
- 31, Automated tiered storage system consisting of memory and flash storage to improve response time with input-output (IO) concentration workloads, Kazuichi Oe, Mitsuru Sato and Takeshi Nanri
- 54, Logarithmic Compression for Memory Footprint Reduction in Neural Network Training, Kazutoshi Hirose, Ryota Uematsu, Kota Ando, Kentaro Orimo, Kodai Ueyoshi, Masayuki Ikebe, Tetsuya Asai, Shinya Takamaeda-Yamazaki and Masato Motomura
GCA
- Chair: Jacir L. Bordim (University of Brasilia)
- 49, High Performance and Low Power Architectures: GPU vs. FPGA for Fast Factorized Backprojection, Matthis Wielage, Fabian Cholewa, Christian Fahnemann, Peter Pirsch and Holger Blume
- 56, CloudCL: Distributed Heterogeneous Computing on Cloud Scale Max Plauth, Florian Rösler and Andreas Polze
- 89, Is Emulating “Binary Grep in Eyes” Possible with Machine Learning? Mamoru Mimura, Yuhei Otsubo, Hidema Tanaka and Atsuhiro Goto
- 100, GUNREAL: GPU-accelerated UNsupervised REinforcement and Auxiliary Learning Youri Coppens, Koichi Shirahata, Takuya Fukagai, Yasumoto Tomita and Atsushi Ike
LHAM1
- Chair: Fumihiko Ino (Osaka University)
- 147, Designing an Open Database of System-aware Code Optimizations, Ryusuke Egawa, Kazuhiko Komatsu and Hiroyuki Takizawa
- 144, Embedded-DSL-like code generation and optimization of Bayesian estimation routines with user-defined source-to-source code transformation framework Xevolver, Reiji Suda
LHAM2
- Chair: Reiji Suda (The University of Tokyo)
- 87, Mixed Precision Solver Scalable to 16000 MPI Processes for Lattice Quantum Chromodynamics (QCD) Simulations on a large Xeon Phi (KNL) System, Ken-Ichi Ishikawa, Taisuke Boku, Yoshinobu Kuramashi and Lawrence Meadows
- 126, Practical implementation of lattice QCD simulation on Intel Xeon Phi Knights Landing, Issaku Kanamori and Hideo Matsufuru
- 146, An Application-Level Incremental Checkpointing Mechanism with Automatic Parameter Tuning, Hiroyuki Takizawa, Muhammad Alfian Amrizal, Kazuhiko Komatsu and Ryusuke Egawa
PDAA1
- Chair: Sayaka Kamei (Hiroshima University)
- 86, Synchronizing Parallel Geometric Algorithms on Multi-Core Machines, Joel Fuentes, Isaac D. Scherson and Fei Luo
- 112, A Verified Accumulate Algorithmic Skeleton, Frederic Loulergue
- 125, Discrete Periodic Radon Transform based Weighted Nuclear Norm Minimization for Image Denoising, Budianto Budianto and Daniel P.K. Lun
PDAA2
- Chair: Daniel P. K. Lun (The Hong Kong Polytechnic University)
- 9, Estimating Power Consumption of Servers Using Gaussian Mixture Model, Hao Zhu, Huadong Dai, Yuejin Yan and Bin Lin
- 103, An asynchronous message-passing distributed algorithm for the global critical section problem, Sayaka Kamei and Hirotsugu Kakugawa
- 122, An asynchronous P system using branch and bound for the satisfiability problem, Yuki Jimen and Akihiro Fujiwara
WICS1
- Chair: Masaya Sato (Okayama University)
- 90, Long-term Performance of a Generic Intrusion Detection Mehotd Using Doc2vec, Mamoru Mimura and Hidema Tanaka
- 114, Analysis of Effectiveness of Slow Read DoS attack and Influence of Communication Environment, Shunsuke Tayama and Hidema Tanaka
- 128, Packet In message based DDoS attack detection in SDN network using OpenFlow, Xiang You, Yaokai Feng and Kouichi Sakurai
WICS2
- Chair: Mamoru Mimura (National Defense Academy)
- 135, Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM, Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato and Hideo Taniguchi
- 69, Biometric Bit String Generation from Handwritten Initials on Smart Phones, Ryo Yamagami and Yasushi Yamazaki
- 153, Fingerprinting BitTorrent Traffic in Encrypted Tunnels using Recurrent Deep Learning, Michelangelo Cruz, Roel Ocampo, Isabel Montes and Rowel Atienza
WICS3
- Chair: Shingo Hasegawa (Tohoku University)
- 134, Mocha:Automatically Applying Content Security Policy to HTML hybrid application on Android Device, Toshiki Takeuchi, Koichi Mouri and Shoichi Saito
- 83, Implementation of Hash Function Generator on Schematic to Program Translator(SPT), Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara and Takakazu Kurokawa
- 98, Implementation of high speed hash function Keccak using CUDA on GTX 1080, Thuong Nguyen Dat, Keisuke Iwai and Takakazu Kurokawa
WICS4
- Chair: Noboru Kunihiro (The University of Tokyo)
- 36, Optimal Representation for Right-to-Left Parallel Scalar Point Multiplication, Kittiphon Phalakarn, Kittiphop Phalakarn and Vorapong Suppakitpaisarn
- 53, An Efficient Implementation of Trace calculation over Finite Field with vector represetnation, Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Md. Al-Amin Khandaker, Yasuyuki Nogami and Satoshi Uehara
- 57, An ECC implementation method with a twisted Montgomery curve over Fq^32 on an 8-bit microcontroller, Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka and Yasuyuki Nogami
WICS5
- Chair: Vorapong Suppakitpaisarn (The University of Tokyo)
- 85, A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability, Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Jun-Ya Iwazaki, Eisuke Koizumi and Masao Sakai
- 109, Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks, Takanori Saito and Toru Nakanishi
- 110, Implementation of Revocable Group Signatures with Compact Revocation List Using Vector Commitments, Shahidatul Sadiah and Toru Nakanishi
WANC1
- Chair: Naoki Fujieda (Toyohashi University of Technology)
- 55, Wind-aware emergency landing assistant (based on Dubins curves), Marius Klein, Andreas Klos, Jörg Lenhardt and Wolfram Schiffmann
- 116, A Study on the Performance of Web Applications Based on RoR in a Highly Consolidated Server with Container-based Virtualization, Yuto Tachibana, Joichiro Kon and Saneyasu Yamaguchi
- 148, The entering and exiting management system by person specification using Deep-CNN, Hiroto Kizuna and Hiroyuki Sato
WANC2
- Chair: Takashi Yokota (Utsunomiya University)
- 14, A Deletion Aware Usable Space Control for SD2, Joichiro Kon, Kenji Nakashima and Saneyasu Yamaguchi
- 62, A Study of TRAX Player by Template Matching, Masataka Nakano and Yoshiki Yamaguchi
- 118, Acceleration of large-scale CGH generation using multi-GPU cluster, Shinpei Watanabe, Boaz Jessie Jackin, Takeshi Ohkawa, Kanemitsu Ootsu, Takashi Yokota, Yoshio Hayasaki, Toyohiko Yatagai and Takanobu Baba
WANC3
- Chair: Saneyasu Yamaguchi (Kogakuin University)
- 101, Label Estimation Method with Modifications for Unreliable Examples in Taming, Yasutake Koishi, Shuichi Ishida, Tatsuo Tabaru and Hiroyuki Miyamoto
- 111, A Translation Method of ARM Machine Code to LLVM-IR for Binary Code Parallelization and Optimization, Kohta Shigenobu, Kanemitsu Ootsu, Takeshi Ohkawa and Takashi Yokota
- 120, Estimation of Power Consumption of Each Application Caused by Device Lock Considering Software Dependency in Smartphones, Shun Kurihara, Shoki Fukuda, Masato Oguchi and Saneyasu Yamaguchi
WANC4
- Chair: Aki Kobayashi (Kogakuin University)
- 37, Study on reduction on average computational complexity of GMD decoding using property of bounded distance decoding, Shunsuke Ueda and Takuya Kusaka
- 96, Messaging Protocol for Relaying Messages between Participants with Autonomous Distributed Blockchain Propagation, Hiroyoshi Ichikawa and Aki Kobayashi
- 143, Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays, Kenta Sasaki, Jaing Xiaohong and Liao Xuening
NCSS
- Chiar: Daisuke Takafuji (Hiroshima University)
- 168, High-performance and Secure Just-in-time Compiler Protection, Tomoyuki Nakayama, Masanori Misono and Takahiro Shinagawa
- 161, Parallel Rabin-Karp Algorithm Implementation on GPU (Preliminary Version), Lucas Saad, Jacir Bordim, Yasuaki Ito and Koji Nakano
AFCAP
- 105, Fractal structure of a class of two-dimensional two-states cellular automata, Akane Kawaharada and Takao Namiki
ASONP
- 113, Peer-to-Peer Bidirectional Streaming Using Mobile Edge Computing, Taichiro Nakayama and Takuya Asaka
- 117, Evaluation of Information Dissemination Scheme Using Autonomous Clustering and Epidemic Routing Considering Mobile Core Network Load in Wireless Networks, Toshikazu Terami, Tomoyuki Ohta and Yoshiaki Kakuda
CSAP
- 115, An Obfuscated Hardwired Sequence Control System Generated by High Level Synthesis, Yoshiki Ishigaki, Naoki Fujieda, Yuumi Matsuoka, Kazuki Uyama and Shuichi Ichikawa
- 121, Power Measurement and Modeling of Quadcopters on Horizontal Flight, Kotaro Maekawa, Shunsuke Negoro, Ittetsu Taniguchi and Hiroyuki Tomiyama
GCAP
- 71, Improving Multiple Precision Integer Multiplication on GPUs, Makoto Miyazaki and Susumu Matsumae
WICSP
- 127, Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking, Shiqian Yu, Danilo Vasconcellos Vargas and Kouichi Sakurai
- 131, Access Control of Webcam on PC with Prevention against Peeping by Attackers, Yuri Yoshino and Masaki Inamura
WANCP
- 82, A Study to Optimize Heterogeneous Resources for Open IoT, Yoji Yamato, Naoto Hoshikawa, Hirofumi Noguchi, Tatsuya Demizu and Misao Kataoka
- 95, Examination of classifying hoaxes over SNS using Bayesian Network, Ryutaro Ushigome, Takeshi Matsuda, Michio Sonoda and Jinhui Chao
- 97, Performance Evaluation of File Operations on OverlayFS, Naoki Mizusawa, Kenji Nakashima and Saneyasu Yamaguchi
- 99, A Study on Direction Estimation of Movement by Multiple Sensors for Pedestrian Dead-Reckoning, Yuya Sakuma and Masahiro Fujii
- 123, A firefly optimization for a connected dominating set in a sensor network, Yuta Matsumoto and Akihiro Fujiwara
- 151, A Study of a Fault-tolerant System Using Dynamic Partial Reconfiguration, Seiya Ogido, Chikatoshi Yamada, Kei Miyagi and Shuichi Ichikawa
NCSSP1
- 155, KyAnalyzer: An Efficient Code Source Classifier for Operating System Packages, Yi Ren, Jianbo Guan, Hao Zhu, Liang Bai and Yusong Tan
- 156, Industrial proof of HPC application design for long term maintenance, Francois Letierce
- 157, Development of a system alerting unsafe actions of texting while walking using a tail lamp, Amato Tsuji, Keita Ushida and Qiu Chen
- 158, An FPGA Implementation of a Parallel Column Sort Algorithm with Off-chip DRAMs, Naoaki Harada, Koji Nakano and Yasuaki Ito
- 159, GPU-accelerated Ant Colony Optimization for the Traveling Salesman Problem, Ryouhei Murooka, Yasuaki Ito and Koji Nakano
- 162, Capturing Temporal Dynamics of Implicit Feedbacks for Collaborative Filtering by Using Deep Recurrent Neural Networks, Minjia He and Yasuhiko Morimoto
NCSSP2
- 163, Deep Neural Network to Predict NDA Graduates Refusing to Become SDF Officers, Kazuhiro Seiwa, Keisuke Iwai, Takashi Mastubara and Takakazu Kurokawa
- 164, A Web-based Management System for International Academic Symposiums, Tomoya Baba, Yasuaki Ito and Koji Nakano
- 165, Acceleration Techniques for Ray Tracing based on Parallel Methods, Jin Okaze, Chikatoshi Yamada, Kei Miyagi and Shuichi Ichikawa
- 166, Program Obfuscation Method using Entropy, Takuto Omine, Chikatoshi Yamada, Kei Miyagi and Shuichi Ichikawa
- 167, A CUDA C Program Generator for Verifying Logical Operators, Daisuke Takafuji, Koji Nakano and Yasuaki Ito
Social Events
Reception
- Stand-up dinner party at Aomori Kokusai Hotel.
Banquet
Banquet includes:
- Bus tour to Asamushi Hot Spring Resort.
- Bus will leave the conference venue around 16:30PM.
- Entrance to a large public bath in the top floor of Japenase Resort Hotel (Ryokan) Kaisen Kaku.
- Japenese Ozen Style Dinner at Kaisen Kaku.
Farewell party
- Dinner at Dining Cafe Hanafu