Program

  • Titles/Authors in this web page are copied from those registered in EasyChair. If the title is changed according to reviewers comments, it will be updated in the final program.
  • All oral presentations will be of 25 minutes duration, which includes a 20-minute presentation and 5-minute question and discussion time.
  • Poster Presentation: The size of posters must be up to A0 (841mm width x 1189mm height).
  • Keynote starts at 9:30AM on Nov 28 and 29 and 9:15AM on Nov 30.
  • Excursion bus departure: 12:30PM

Nov. 27 (Tue)

Nov. 28 (Wed)

3-11(3F) 4-4(4F) 4-7(4F) 4-9(4F) 2-3(2F) 2-5(2F)
9:00-17:30 Registration
9:30-10:15 CANDAR Keynote A
10:15-10:30 break
10:30-11:45 CSA1 CANREXI1 PDAA1 Track5A
11:45-12:40 Poster(ASON,CSA,PDAA,LHAM,NCSS1)
12:40-12:45 break
12:45-13:30 CANREXI Keynote PDAA Keynote
13:30-13:45 break
13:45-15:00 CSA2 CANREXI2 PDAA2 Track5B ASON
15:00-15:15 break
15:15-16:00 LHAM Keynote ASON Keynote
16:00-16:15 break
16:15-17:55 CANREXI3 LHAM PDAA3 Track5C Track3
19:30-21:30 Reception(Hida Hotel Plaza)

Nov. 29 (Thu)

3-11(3F) 4-4(4F) 4-7(4F) 4-9(4F) 2-3(2F) 2-5(2F) 3-3(3F)
9:00-17:30 Registration
9:30-10:15 CANDAR Keynote B
10:15-10:30 break
10:30-11:45 Track1A Track2A AFCA1 WICS1 WANC1
11:45-12:40 Poster(AFCA,GCA,SUSCW,WICS,WANC,NCSS2)
12:40-12:45 break
12:45-13:30 GCA Keynote AFCA Keynote
13:30-13:45 break
13:45-15:00 Track1B Track2B GCA1 AFCA2 WICS2 WANC2
15:00-15:15 break
15:15-16:00 CSA Keynote WICS Keynote
16:00-16:15 break
16:15-17:55 SUSCW1 CSA3 Track4 NCSS WICS3 WANC3
17:55-18:00 break
18:00-18:10 Award Ceremony
19:30-21:30 Banquet(Takayama Green Hotel)

Nov. 30 (Fri)

3-11(3F) 4-4(4F) 4-7(4F) 4-9(4F) 2-3(2F) 2-5(2F)
9:00-10:30 Registration
9:15-10:00 SUSCW Keynote WANC Keynote
10:00-10:15 break
10:15-11:30 CSA4 SUSCW2 GCA2 WICS4 WANC4
11:30-12:30 Lunch (on your own)
12:30 Excursion bus departure

Oral Presentations

Track1A

  • Chair: Yonghwan Kim
  • 37 Data Pinning and Back Propagation Memory Optimization for Deep Learning on GPU, Cing-Fu Jhu, Pangfeng Liu and Jan-Jan Wu
  • 83 Investigating the Effects of Dynamic Thread Team Size Adjustment for Irregular Applications, Xiong Xiao, Mulya Agung, Muhammad Alfian Amrizal, Ryusuke Egawa and Hiroyuki Takizawa
  • 31 Efficient Byte Stream Pattern Test using Bloom Filter with Rolling Hash Functions on the FPGA, Takuma Wada, Naoki Matsumura, Koji Nakano and Yasuaki Ito

Track1B

  • Chair: Ryusuke Egawa
  • 93 A Prefix-Sum-Based Rabin-Karp Implementation for Multiple Pattern Matching on GPGPU, Lucas Nunes, Jacir Bordim, Yasuaki Ito and Koji Nakano
  • 42 A Self-Stabilizing Algorithm for Constructing a Maximal (2,2)-Directed Acyclic Mixed Graph, Yonghwan Kim, Hiroki Aono, Yoshiaki Katayama and Toshimitsu Masuzawa
  • 53 An Efficient Shortest Path Routing on the Hypercube with Blocking/Faulty Nodes, Mehrdad Arabpour Niasari and Ke Qiu

Track2A

  • Chair: Hiroyuki Tomiyama
  • 69 k-Optimized Path Routing for High-Throughput Data Center Networks, Ryuta Kawano, Ryota Yasudo, Hiroki Matsutani and Hideharu Amano
  • 72 The template-based sub-optimal content distribution for a D2D content sharing network, Takayuki Shiroma, Celimuge Wu and Tsutomu Yoshinaga
  • 84 A Hardware for Accelerating Anonymization Transparent to a Network, Soichiro Shohata, Yuichi Nakamura and Hiroaki Nishi

Track2B

  • Chair: Masahiro Goshima
  • 15 drDRM: A PUF-based Dynamically Reconfigurable DRM Mechanism for FPGA-based Platform, Tze Hon Tan, Chia Yee Ooi and Muhammad Nadzir Marsono
  • 18 Scheduling of Malleable Fork-Join Tasks with Constraint Programming, Hiroki Nishikawa, Kana Shimada, Ittetsu Taniguchi and Hiroyuki Tomiyama

Track3

  • Chair: Eitaro Kohno
  • 67 An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication, Amang Sudarsono, Mike Yuliana, Prima Kristalina and Ali Ridho Barakbah
  • 91 A Fast Message-Delivery Mechanism to Support Broadcast in Vehicular Ad-Hoc Networks, Túlio Lima, Paulo Farias, Marcos Caetano and Jacir Bordim
  • 96 Acquiring Nearly Optimal Peer Selection Strategy through Deep Q-Network, Tokihiro Naito and Satoshi Fujita
  • 25 Resilient Peer-to-Peer Video Streaming with a Guaranteed Latency, Satoshi Fujita

Track4

  • Chair: Hiroyuki Sato
  • 14 A CloudSim extension for evaluating security overhead in workflow execution in clouds, Henrique Yoshikazu Shishido, Julio Cezar Estrella, Claudio Fabiano Motta Toledo and Stephan Reiff-Marganiec
  • 49 A Semi-Automatic Video Labeling Tool for Autonomous Driving Based on Multi-Object Detector and Tracker, Ben-Li Wang and Chung-Ta King
  • 54 Evaluation measures for frequent itemsets based on distributed representations, Tomonobu Ozaki
  • 95 Critical Node Identification based on Articulation Point Detection for Network with Uncertain Connectivity, Kouzou Ohara, Kazumi Saito, Masahiro Kimura and Hiroshi Motoda

Track5A

  • Chair: Hiroaki Anada
  • 11 A Galindo-Garcia-like Identity-based Signature with Tight Security Reduction, Revisited, Masayuki Fukumitsu and Shingo Hasegawa
  • 29 Speeding Up Revocable Group Signature with Compact Revocation List Using Vector Commitments, Yasuyuki Seita and Toru Nakanishi
  • 81 A Comparative Implementation of GLV Technique on KSS-16 Curve, Md. Al-Amin Khandaker, Yuki Nanjo, Takuya Kusaka and Yasuyuki Nogami

Track5B

  • Chair: Masaya Sato
  • 8 Detailed Instantiation of the Decentralized Multi-Authority Anonymous Authentication Scheme and Tighter Reduction for Security, Hiroaki Anada
  • 86 A Construction of Fake QR Codes Based on Error-Correcting Codes, Makoto Takita, Hiroya Okuma and Masakatu Morii
  • 52 A proposal of new reading text CAPTCHA using random dot patterns, Hisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park and Naonobu Okazaki

Track5C

  • Chair: Yuji Suga
  • 61 Slow-port-exhaustion DoS Attack on Virtual Network Using Port Address Translation, Son Nguyen Duc, Mamoru Mimura and Hidema Tanaka
  • 13 Hiding Communication of Essential Service by System Call Proxy, Yuuki Okuda, Masaya Sato and Hideo Taniguchi
  • 28 The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay, Andrew Feutrill, Dinesha Ranathunga, Yuval Yarom and Matthew Roughan

AFCA1

  • Chair: Jean-Baptiste Yunès
  • 20 A Mass Spring Model for String Simulation with Stress-Strain Handling, Roman Durikovic and Erich Siebenstich
  • 89 Employing Genetic Algorithm and Particle Filtering as an Alternative for Indoor Device Positioning, Guilherme David Branco and Jacir Luiz Bordim
  • 132 Cellular Automaton Model for Turing Tumble Mechanical Computer, Takahiro Tomita, Jia Lee, Teijiro Isokawa, Ferdinand Peper, Takayuki Yumoto and Naotake Kamiura

AFCA2

  • Chair: Teijiro Isokawa
  • 127 Generalized FSSP on Triangular Tiling, Luidnel Maignan and Jean-Baptiste Yunès
  • 164 A Smaller-state Implementation of Real-Time Sequence Generator for {n^3 | n=1, 2, 3,…}, Naoki Kamikawa and Hiroshi Umeo
  • 175 A weakly universal three-dimensional Larger than Life cellular automaton, Katsunobu Imai, Kyosuke Oroji and Tomohiro Kubota

ASON

  • Chair: Osamu Mizuno
  • 117 Spatial Feature Aware Genetic Algorithm of Network Base Station Configuration for Internet of Things, Haobin Wang, Wei Huangfu, Yaxi Liu, Cheng Gong, Yebing Ren and Wei Liu
  • 154 On Relationship between Timeout and Latency of Connection Re-establishment for Control Packet Loss Scenario in Bluetooth MANETs, Temma Ohtani, Eitaro Kohno and Yoshiaki Kakuda
  • 162 Handover Algorithm for Video Communications by Sharing Communication Quality Information of Access Points between Terminals, Atsushi Takei and Shigetomo Kimura

CSA1

  • Chair: Takeshi Ohkawa
  • 35 A Case Study on Memory Architecture Exploration for Manycores on an FPGA, Seiya Shirakuni, Ittetsu Taniguchi and Hiroyuki Tomiyama
  • 46 Towards Improving Data Transfer Efficiency for Accelerators using Hardware Compression, Max Plauth and Andreas Polze
  • 184 An Error Corrector for Dynamically Accuracy-Configurable Approximate Adder, Tomoaki Ukezono

CSA2

  • Chair: Max Plauth
  • 47 Non-volatile memory driver for applying automated tiered storage with fast memory and slow flash storage Kazuichi Oe and Takeshi Nanri
  • 149 A Color-Based Cooperative Caching Strategy for Time-Shifted Live Video Streaming Hiroki Okada, Takayuki Shiroma, Celimuge Wu and Tsutomu Yoshinaga
  • 171 AQSS: Accelerator of quantization neural networks with stochastic approach Takeo Ueki, Keisuke Iwai, Takakazu Kurokawa and Takashi Matsubara

CSA3

  • Chair: Kazuichi Oe
  • 78 Reduction of instruction increase overhead by STRAIGHT compiler, Toru Koizumi, Satoshi Nakae, Akifumi Fukuda, Hidetsugu Irie and Shuichi Sakai
  • 188 Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines, Masao Yamamoto, Kohta Nakashima, Toshihiro Yamauchi, Akira Nagoya and Hideo Taniguchi
  • 182 Integrating TicToc with Parallel Logging, Yasuhiro Nakamura, Hideyuki Kawashima and Osamu Tatebe

CSA4

  • Chair: Akira Asato
  • 139 The Impact of Job Mapping on Random Network Topology, Yao Hu and Michihiro Koibuchi
  • 167 XY Based Fault-Tolerant Routing with The Passage of Faulty Nodes, Yota Kurokawa and Masaru Fukushi
  • 75 The Network-based Event Detection Module by NTP for Cyber Attacks on IoT, Tamotsu Kawamura, Masaru Fukushi, Yasushi Hirano, Yusuke Fujita and Yoshihiko Hamamoto

GCA1

  • Chair: Fumihiko Ino
  • 32 Application of Machine Learning Techniques on Prediction of Future Processor Performance, Göktuğ İnal and Gürhan Küçük
  • 195 Hierarchical Distributed-Memory Multi-Leader MPI-Allreduce for Deep Learning Workloads, Truong Thao Nguyen, Ryousei Takano and Mohamed Wahib
  • 133 Accelerating facial detection for improvement of person identification accuracy in entering and exiting management system, Hiroto Kizuna and Hiroyuki Sato

GCA2

  • Chair: Jacir Bordim
  • 82 (moved to NCSS) Hybrid Building/Floor Classification and Location Coordinates Regression Using A Single-Input and Multi-Output Deep Neural Network for Large-Scale Indoor Localization Based on Wi-Fi Fingerprinting, Kyeong Soo Kim
  • 103 Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation, Jiawei Su, Danilo Vasconcellos Vargas and Kouichi Sakurai
  • 158 XJTLUIndoorLoc: A New Fingerprinting Database for Indoor Localization and Trajectory Estimation Based on Wi-Fi RSS and Geomagnetic Field, Zhenghang Zhong, Zhe Tang, Xiangxing Li, Tiancheng Yuan, Yang Yang, Wei Meng, Yuanyuan Zhang, Renzhi Sheng, Naomi Grant, Chongfeng Ling, Xintao Huan, Kyeong Soo Kim and Sanghyuk Lee

LHAM

  • Chair: Reiji Suda
  • 118 Preconditioner auto-tuning with deep learning for sparse iterative algorithms, Kenya Yamada, Takahiro Katagiri, Hiroyuki Takizawa, Kazuo Minami, Mitsuo Yokokawa, Toru Nagai and Masao Ogino
  • 136 Metaprogramming Framework for Existing HPC Languages Based on the Omni Compiler Infrastructure, Hitoshi Murai, Mitsuhisa Sato, Masahiro Nakao and Jinpil Lee
  • 145 Performance evaluation and visualization of scientific applications using PMlib, Kazunori Mikami, Kenji Ono and Jorji Nonaka

PDAA1

  • Chair: Susumu Matsumae
  • 161 Self-stabilizing algorithm for dynamically maintaining two disjoint dominating sets, Sayaka Kamei and Hirotsugu Kakugawa
  • 165 A Cooperative Partial Snapshot Algorithm for Checkpoint-Rollback Recovery of Large-Scale and Dynamic Distributed Systems, Yonghwan Kim, Junya Nakamura, Yoshiaki Katayama and Toshimitsu Masuzawa
  • 70 An Analytical Model of Energy-aware RPL for Wireless Sensor Networks with Ambient Energy Harvesting, Wilbert Jethro Limjoco and Nestor Michael Tiglao

PDAA2

  • Chair: Fukuhito Ooshita
  • 189 Branch and Bound Algorithm for Parallel Many-Core Architecture, Kazuki Hazama and Hiroyuki Ebara
  • 156 A Pipeline Implementation for Dynamic Programming on GPU, Makoto Miyazaki and Susumu Matsumae
  • 163 Tile Art Image Generation using Conditional Generative Adversarial Networks, Naoki Matsumura, Hiroki Tokura, Yasuaki Ito and Koji Nakano

PDAA3

  • Chair: Junya Nakamura
  • 43 Advanced Searchable Encryption: Keyword Search for Matrix-type Storage, Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka and Yasuyuki Nogami
  • 21 Design of a message authentication protocol for CAN FD based on Chaskey lightweight MAC, Guillaume Carel, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami and Shunsuke Araki
  • 65 Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki and Mirang Park
  • 10 BlockPGP: A Blockchain-based Framework for PGP Key Servers, Alexander Yakubov, Wazen Shbair and Radu State

SUSCW1

  • Chair: Motoi Yamagiwa
  • 51 An Adaptable Scheduling for Self-Reconfigurable Objects, Mahdillah, Shinya Nakayama, Qian Zhao and Takaichi Yoshida
  • 56 Energy Balancing by Wireless Energy Transfer in Sensor Networks, Hiroshi Michizu, Yuichi Sudo, Hirotsugu Kakugawa and Toshimitsu Masuzawa
  • 106 System Optimum Traffic Assignment for Connected Cars, Weibin Wang, Minoru Uehara and Haruo Ozaki
  • 107 Relationship Between Loading Methods of Packages and Travel Distance, Daiki Ojima, Minoru Uehara and Takashi Mihara

SUSCW2

  • Chair: Minoru Uehara
  • 138 Fault Tolerance of Small World Network Architecture, Hideki Mori
  • 144 C4: an FPGA-based compression algorithm for ExpEther, Hideki Shimura, Hiroyuki Noda and Hideharu Amano
  • 159 An Extension of A Temperature Modeling Tool HotSpot 6.0 for Castle-of-Chips Stacking, Tomohiro Totoki, Michihiro Koibuchi and Hideharu Amano

WICS1

  • Chair: Yasuyuki Nogami
  • 38 Updateable Searchable Symmetric Encryption with fine-grained delete functionality Motoki Miyano and Satoshi Obana
  • 58 How to Realize Highly Accurate Computation with Fully Homomorphic Encryption Tomoki Agematsu and Satoshi Obana
  • 9 A Construction of Cramer-Shoup Like Encryption Protocols Based on the Anshel-Anshel-Goldfeld Key Exchange Protocol Shuji Isobe, Jun-Ya Iwazaki, Eisuke Koizumi and Atsushi Suda

WICS2

  • Chair: Satoshi Obana
  • 33 A New Higher Order Differential of FeW, Naoki Shibayama, Yasutaka Igarashi and Toshinobu Kaneko
  • 140 Verifiable Secret Sharing Scheme Using Hash Values Junta Imai, Mamoru Mimura and Hidema Tanaka
  • 71 Consideration of Efficient Pairing Applying Two Construction Methods of Extension Fields Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka and Yasuyuki Nogami

WICS3

  • Chair: Amang Sudarsono
  • 45 Smart Contract for Multiparty Fair Certified Notifications M. Magdalena Payeras-Capellà, Macià Mut Puigserver and Miquel À. Cabot-Nadal
  • 155 Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding Ryousuke Komiya, Yaokai Feng and Kouichi Sakurai
  • 173 Discovering New Malware Families Using a Linguistic-Based Macros Detection Method Hiroya Miura, Mamoru Mimura and Hidema Tanaka
  • 186 On the Effectiveness of Extracting Important Words from Proxy Logs Mamoru Mimura

WICS4

  • Chair: Mamoru Mimura
  • 113 Neural Cryptography Based on the Topology Evolving Neural Networks Yuetong Zhu, Danilo Vasconcellos Vargas and Kouichi Sakurai
  • 146 User-Side Updating of Third-Party Libraries for Android Applications Hiroki Ogawa, Eiji Takimoto, Koichi Mouri and Shoichi Saito
  • 174 Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory Yuya Ban and Toshihiro Yamauchi

WANC1

  • Chair: Takashi Yokota
  • 134 Tracing MIRAI Malware in Networked System, Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas and Kouichi Sakurai
  • 176 Improving Apache Spark's Cache Mechanism with LRC-based Method using Bloom Filter, Hideo Inagaki, Tomoyuki Fujii, Ryota Kawashima and Hiroshi Matsuo
  • 193 A Kernel-based Method for Resolving Performance Inefficiencies in Mining Frequent-patterns in Encrypted Data, Joichiro Kon, Giljae Lee, Jose Fortes and Saneyasu Yamaguchi

WANC2

  • Chair: Kanemitsu Ootsu
  • 192 File Placing Location Optimization on Hadoop SWIM, Makoto Nakagami, Joichiro Kon, Giljae Lee, Jose Fortes and Saneyasu Yamaguchi
  • 141 Design of Incentive Decision Method for Agriculture Information Sharing System, Joji Toshima and Akiko Takahashi
  • 183 Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems, Yuki Nishida, Kosuke Kaneko, Subodh Sharma and Kouichi Sakurai

WANC3

  • Chair: Saneyasu Yamaguchi
  • 94 Load balancing in P2P video streaming systems with service differentiation, Yuta Yamada and Satoshi Fujita
  • 36 Improving performance of transposition algorithm of 3-D data array for parallelization using message passing interface, Masahiro Arai, Fumiko Akagi, Yamaguchi Saneyasu and Kazuetsu Yoshida
  • 131 An Implementation of LLVM Pass for Loop Parallelization Based on IR-Level Directives, Kengo Jingu, Kohta Shigenobu, Kanemitsu Ootsu, Takeshi Ohkawa and Takashi Yokota
  • 137 Revisiting Thread Execution Methods for GPU-oriented OpenCL Programs on Multicore Processors, Takafumi Miyazaki, Hayato Hidari, Naohisa Hojo, Ittetsu Taniguchi and Hiroyuki Tomiyama

WANC4

  • Chair: Shuichi Ichikawa
  • 85 Robust Mapping for the Autonomous Mobile Robot Considering Potential Occupied Spaces of Objects, Bin Zhang, Masahide Kaneko and Hun-Ok Lim
  • 124 (moved to NCSS) Wandering Path Visualization System Prototype for Finding Wandering Elderly People using BLE Beacon, Tomoya Arakawa, Shun Shiramatsu and Akira Iwata
  • 7 Venerability and Protection Tool Surveys of Industrial Control System, Kuan-Chu Lu, I-Hsien Liu and Jung-Shian Li

NCSS

  • Chair: Jacir L. Bordim
  • 109 True Service Orientation with SORCER, Michael Sobolewski
  • 212 Design of a New Stream Cipher: PALS, Mohammadreza Ashouri
  • 82 Hybrid Building/Floor Classification and Location Coordinates Regression Using A Single-Input and Multi-Output Deep Neural Network for Large-Scale Indoor Localization Based on Wi-Fi Fingerprinting, Kyeong Soo Kim (GCA)
  • 124 Wandering Path Visualization System Prototype for Finding Wandering Elderly People using BLE Beacon, Tomoya Arakawa, Shun Shiramatsu and Akira Iwata (WANC)

CANREXI1

  • Chair:Ryusuke Egawa
  • Towards real-time data kernel, Hideyuki Kawashima
  • Near-I/O reconfigurable computing for medical engineering, Yuichiro Shibata
  • A CPU-FPGA hybrid cluster platform for accelerated scientific computing, Yasunori Osana

CANREXI2

  • Chair: Yukinori Sato
  • An Environmentally Adaptive Anomaly Detection Method for Edge Devices, Hiroki Matsutani
  • Exploiting SSD Performance for Scalable and Efficient Data Processing Systems, Yohei Hasegawa
  • Towards a common platform for stream computing using Intel Programmable Accelerator Card, Takaaki Miyajima

CANREXI3

  • Chair: Hironori Nakajo
  • Highly available optical physical layer for future telecom and datacom networks, Kiyo Ishii, Shu Namiki
  • Scalable routing techniques for the optimized interconnection networks, Ryuta Kawano
  • Interconnection Networks with the Optimal Number of Switches and the Optimal Host Distribution, Ryota Yasudo
  • New AI Architecture with Fusion of Logical Inference and Machine Learning, Hironori Nakajo, Tomoaki Shikina, Daichi Teruya, Masashi Takemoto and Shozo Takeoka

Poster Presentations

AFCA Poster

  • 178 Formalization of asynchronous cellular automata using asynchronous protocol for communications, Jia Lee, Ferdinand Peper and Kenji Leibnitz

ASON Poster

  • 55 Experimental Performance Analysis on Autonomous Distributed Collaborative Messaging Protocol, Hiroyoshi Ichikawa and Aki Kobayashi
  • 135 A study on observing a lost child using BLE beacons, Atsushi Ito, Hiroyuki Hatano, Hidetoshi Uchiyama and Xiang Fu
  • 147 Load balancing method for IoT sensor system using multi-access edge computing, Ryuta Mogi, Taichiro Nakayama and Takuya Asaka
  • 151 DHT clustering for load balancing considering blockchain data size, Yudai Kaneko and Takuya Asaka
  • 157 Experimental Evaluation of Information Dissemination Scheme Considering Mobile Network Base Station Load in Wireless Networks, Tatsuki Horai, Tomoyuki Ohta and Yoshiaki Kakuda

CSA Poster

  • 12 Towards Large Scale Packet Capture and Network Flow Analysis on Hadoop, Miguel Zenon Nicanor Saavedra and William Emmanuel Yu
  • 40 Adapted Artificial Bee Colony for Numerical Optimization, Sheng-Ta Hsieh, Chun-Lin Lin and Hao-Wen Cheng
  • 41 Detection and parameter estimation of R peaks in ECG signal using optimization algorithm, Sheng-Ta Hsieh and Chun-Ling Lin
  • 99 An Analysis on Randomness of Path ORAM for Light-weight Implementation, Hiroki Fujita, Naoki Fujieda and Shuichi Ichikawa
  • 142 An Adaptive Demotion Policy with considering Temporal Locality, Masahiro Hasegawa and Jubee Tada
  • 169 Performance Evaluation of Collective Communication on Random Network Topology, Ke Cui and Michihiro Koibuchi
  • 196 An Trace-Driven Performance Prediction Method for Exploring 3D-NoC Design Optimization, Naoya Niwa, Tomohiro Totoki, Hiroki Matsutani, Michihiro Koibuchi and Hideharu Amano
  • 203 Application of Timing Fault Detection to Rocket Core on FPGA, Ushio Jimbo, Ryota Shioya and Masahiro Goshima

GCA Poster

  • 179 Development of generic CNN deep learning method using feature graph, Kei Takahashi, Takumi Numajiri, Katsuyohi Sakamoto, Koichi Yamaguchi and Tomah Sogabe
  • 181 Evaluation of EMVA using the instruction-level parallelism on TegraX1, Hirobumi Tominaga, Asuka Nakamura and Yoshitaka Maekawa

LHAM Poster

  • 170 Accelerating numerical simulations of supernovae with GPUs, Hideo Matsufuru and Kohsuke Sumiyoshi

PDAA Poster

  • 27 Incentive Driving Multipath Inter-domain Routing, Donghong Qin
  • 160 Evaluation of Hierarchical Pincers Attack Search on Distributed Memory Systems, Asuka Nakamura, Hirobumi Tominaga and Yoshitaka Maekawa

SUSCW Poster

  • 105 Implementations of Droplets in Managed Network Blocks, Ryusei Saka and Minoru Uehara
  • 119 Development of Eco Volunteer Computing system, Motoi Yamagiwa and Minoru Uehara
  • 125 Application of an online questionnaire to secure the diversity of Planungszelle participant attributes, Yoshiomi Otsuka and Toshiya Aramaki
  • 168 A Cache Replacement Policy with Considering Global Fluctuations of Priority Values, Jubee Tada

WICS Poster

  • 64 A Secure LiDAR with AES-Based Side-Channel Fingerprinting, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama
  • 202 Status survey of SSL/TLS sites in 2018 after pointing out about “search form” issues, Yuji Suga

WANC Poster

  • 39 Research and Analysis of Statistical Characteristics of Internet Exchange Points, Donghong Qin
  • 114 A Flexible Anti-Jamming Channel Hopping for Cognitive Radio Networks, Chih-Min Chao, Wei-Che Lee, Cong-Xiang Wang, Shin-Chung Huang and Yu-Chich Yang
  • 120 Evaluation of letter reproduction system using cellular neural network and oxide semiconductor synapses by logic simulation, Hiroya Ikeda, Hiroki Yamane, Yuki Shibayama, Mutsumi Kimura and Yasuhiko Nakashima
  • 126 Performance Evaluation of Dynamic Cell Allocation Cache using Cycle Accurate Simulator, Masato Kitou, Takahiro Sasaki and Kazuhiko Ohno
  • 187 Mobile Application Aware Smartphone CPU Clock Frequency Optimization, Yusuke Sato, Masato Oguchi and Saneyasu Yamaguchi
  • 191 A New Design for Evaluating Moving Target Defense System, Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas and Sakurai Kouichi

NCSS1 Poster

  • 209 Performance Evaluation of Fuzzy C-means Associated with Spark based on Virtual Cloud Computing, Gui-Ren Lin and I-Ching Hsu
  • 213 Vectorization of Kernel and Image Subsampling in FIR Image Filtering, Teppei Tsubokawa, Yoshihiro Maeda and Norishige Fukushima
  • 214 Low-Energy Routing for Deadline-constrained Delivery Drones under Windy Conditions, Kenta Takegami, Shunsuke Negoro, Yusuke Funabashi, Ittetsu Taniguchi and Hiroyuki Tomiyama
  • 215 A Study on Effective Repetition of Bilateral Filter for Medical Images, Akihiro Yoza, Chikatoshi Yamada, Kei Miyagi, Shuichi Ichikawa and Naoki Fujieda
  • 220 A Study on Effective Skill Passing Method for Uta-Sanshin, Tsugushi Nagahama, Kei Miyagi and Chikatoshi Yamada
  • 221 Fruit Recognition using BoF Method for Automatic Harvesting, Masaya Negawa, Chikatoshi Yamada and Kei Miyagi

NCSS2 Poster

  • 206 A Multi-factor Approach for Stock Price Prediction by using Recurrent Neural Networks, Xu Zhang, Chen Li and Yasuhiko Morimoto
  • 210 Smart Grid Optimization by Deep Reinforcement Learning over Discrete and Continuous Action Space, Tomohiro Hirata, Dinesh Malla, Katsuyoshi Sakamoto, Koichi Yamaguch, Yoshitaka Okada and Tomah Sogabe
  • 211 Hybrid Policy Gradient for Deep Reinforcement Learning, Dinesh Malla, Katsuyoshi Sakamoto, Koichi Yamaguchi, Shinji Yokogawa and Tomah Sogabe
  • 216 Fast Algorithm of Unified Layer Performing Convolution and Average Pooling on GPU, Hiroki Tokura, Takahiro Nishimura, Yasuaki Ito and Koji Nakano
  • 217 GPU implementation of the fast Smith-Waterman algorithm using BPBC technique, Takahiro Nishimura, Jacir Bordim, Yasuaki Ito and Koji Nakano
  • 218 Acquisition of Best Bet for 10,000 Yen Game Using Machine Learning, Ryota Komori, Yasuaki Ito and Koji Nakano
  • 219 Fast Algorithm of Inventory Management using Dynamic Programming on GPU, Makoto Motoka, Hiroki Tokura, Koji Nakano and Yasuaki Ito

Selected Posters from CANDAR Workshops

  • 64 A Secure LiDAR with AES-Based Side-Channel Fingerprinting, Ryuga Matsumura, Takeshi Sugawara and Kazuo Sakiyama
  • 169 Performance Evaluation of Collective Communication on Random Network Topology, Ke Cui and Michihiro Koibuchi
  • 206 A Multi-factor Approach for Stock Price Prediction by using Recurrent Neural Networks, Xu Zhang, Chen Li and Yasuhiko Morimoto
  • 216 Fast Algorithm of Unified Layer Performing Convolution and Average Pooling on GPU, Hiroki Tokura, Takahiro Nishimura, Yasuaki Ito and Koji Nakano
  • 217 GPU implementation of the fast Smith-Waterman algorithm using BPBC technique, Takahiro Nishimura, Jacir Bordim, Yasuaki Ito and Koji Nakano
  • 218 Acquisition of Best Bet for 10,000 Yen Game Using Machine Learning, Ryota Komori, Yasuaki Ito and Koji Nakano
  • 219 Fast Algorithm of Inventory Management using Dynamic Programming on GPU, Makoto Motoka, Hiroki Tokura, Koji Nakano and Yasuaki Ito

Graph Golf Session

  • (tentative)
  • Chair: Ikki Fujiwara (NII)
  • 13:30-13:40 Introduction
  • 13:40-13:50 Graph Golf Award Ceremony
  • 13:50-14:20 KN: Graph enumeration and its applications featuring compressed data structures, Takeru Inoue (NTT Laboratories)
  • 14:20-14:40 Winner's Talk, Masahiro Nakao (RIKEN Center for Computational Science)
  • 14:40-15:00 Winner's Talk, Toru Koizumi (U of Tokyo)
  • 15:00-15:20 Contributer's Talk, Haruishi Masato (Hiroshima U)
  • 15:20-15:30 Trends of Network Topology on Supercomputers, Michihiro Koibuchi (NII)
  • KN=25min for presentation, 5min for Q-and-A
  • Talk=15min for presentation, 5min for Q-and-A