Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision | Previous revision | ||
|
program [2019/11/05 14:17] |
program [2025/11/16 14:44] (current) nakano [WANC2] |
||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== Program (tentative) | ||
| + | * The program is tentative, subject to change. | ||
| + | * Each oral presentation will have a duration of 25 minutes, including a 5-minute Q&A session. | ||
| + | * The presenters should ensure they have properly connected their laptop or notebook PC for the presentation to the LCD projector via HDMI during the break time before their assigned session. | ||
| + | * The poster size is A0. | ||
| + | * The paper titles on this Web page are copied from EasyChair. Even if the titles are changed in the final manuscripts, | ||
| + | * A light meal, such as rice balls and sandwiches will be provided during the poster sessions. | ||
| + | |||
| + | ===== November 25 (Tue) ===== | ||
| + | * Registration: | ||
| + | |||
| + | ===== November 26 (Wed) ===== | ||
| + | * Registration: | ||
| + | * Reception: 19:00- (Not included in the registration fee. Ticket must be purchased to join) | ||
| + | |||
| + | ^ Time ^ Room A ^ Room B ^ Room C ^ | ||
| + | |9: | ||
| + | |9: | ||
| + | |10: | ||
| + | |10: | ||
| + | |12: | ||
| + | |13: | ||
| + | |13: | ||
| + | |14: | ||
| + | |15: | ||
| + | |||
| + | |||
| + | |||
| + | ===== November 27 (Thu) ===== | ||
| + | * Registration: | ||
| + | * Banquet: 19: | ||
| + | |||
| + | |||
| + | ^ Time ^ Room A ^ Room B ^ Room C ^ | ||
| + | |9: | ||
| + | |10: | ||
| + | |10: | ||
| + | |12: | ||
| + | |13: | ||
| + | |13: | ||
| + | |14: | ||
| + | |15: | ||
| + | |||
| + | |||
| + | |||
| + | ===== November 28 (Fri) ===== | ||
| + | * Registration: | ||
| + | |||
| + | ^ Time ^ Room A ^ Room B ^ Room C ^ | ||
| + | |9: | ||
| + | |10: | ||
| + | |10: | ||
| + | |12: | ||
| + | |13: | ||
| + | |13: | ||
| + | |14: | ||
| + | |||
| + | |||
| + | ===== Oral Sessions ===== | ||
| + | |||
| + | ==== TrackA1 ==== | ||
| + | * Chair: Junya Nakamura (Toyohashi University of Technology) | ||
| + | * (23) A self-stabilizing algorithm for the dynamic total domination problem, Sayaka Kamei, Masahiro Shibata, Fukuhito Ooshita and Hirotsugu Kakugawa | ||
| + | * (55) Happy vertex game, Hiroshi Eto, Akiko Fujimoto, Hironori Kiya, Ruka Matsushita, Eiji Miyano, Yuto Murao and Toshiki Saitoh | ||
| + | * (56) Ultra Low Latency Spiking Locally Competitive Algorithm for Spatio-temporal Data and Hierarchical Networks, Takumi Kuwahara, Reon Oshio, Taiga Hirano, Mutsumi Kimura and Yasuhiko Nakashima | ||
| + | ==== TrackA2 ==== | ||
| + | * Chair: Daisuke Takafuji | ||
| + | * (21) Computing Embeddings and Isomorphisms of Finite Semigroups, Attila Egri-Nagy, James East, Andrew Francis and James Mitchell | ||
| + | * (47) Optimizing Pipeline Parallelism for Deep Learning with Activation Checkpointing, | ||
| + | * (35) Fully GPU-Accelerated Full Configuration Interaction for Exact Molecular Ground-state Energy Calculation, | ||
| + | * (68) GPU Acceleration of RI-RMP2 Correlation Energy Computation, | ||
| + | |||
| + | ==== TrackB1 ==== | ||
| + | * Chair: Eitaro Kohno (Notre Dame Seishin University) | ||
| + | * (9) Leveraging Knowledge Graphs for Semantic-Aware Feed Generation in Bluesky Social Network, Wanli Zhao and Satoshi Fujita | ||
| + | * (19) Real-Time 6DoF Immersive Video Streaming System Based on MPEG-DASH, Chi-Hsun Chiang, Nien-Chen Lin, Chi-Heng Lan, Chun-Feng Lin, Yi-Yin Chen and Chung-Yi Wang | ||
| + | * (83) Lift: Byzantine-Tolerant Hub Sampling Protocol, Mohamed Amine Legheraba, Nour Rachdi, Maria Potop-Butucaru and Sebastien Tixeuil | ||
| + | |||
| + | ==== TrackB2 ==== | ||
| + | * Chair: Takatsugu Ono (Kyushu University) | ||
| + | * (22) Energy-Efficient Hardware Acceleration of Whisper ASR on a CGLA, Takuto Ando, Yu Eto, Ayumu Takeuchi and Yasuhiko Nakashima | ||
| + | * (66) HPQEA: A Scalable and High-Performance Quantum Emulator with High-Bandwidth Memory for Diverse Algorithms Support, Van Duy Tran, Tuan Hai Vu, Vu Trung Duong Le, Hoai Luan Pham, Cao Doanh Bui and Yasuhiko Nakashima | ||
| + | * (67) MMzk: 384-bit Low-Resource Montgomery Multiplier on FPGA for zk-SNARK, Hikaru Okamoto, Vu Trung Duong Le, Hoai Luan Pham, Van Tinh Nguyen and Yasuhiko Nakashima | ||
| + | * (74) iRMTvisor: A Real-Time Hypervisor with IPC Control Scheme, Haruka Sanuki and Nobuyuki Yamasaki | ||
| + | |||
| + | ==== TrackC ==== | ||
| + | * (77) FashionistAI: | ||
| + | * (46) Music Genre Classification Using Multi-Group Self-Attention with Diversity Regularization, | ||
| + | * (63) Mutual Recommendation of Sake and Dishes using Contrastive Learning-based Embeddings on LLM-generated Descriptive Texts, Souta Matsuda and Tomonobu Ozaki | ||
| + | * (64) Multi-Interest Sequential Recommendation Based on Prompt-Oriented BERT, Yuruo Su, Shuai Jiang, Sayaka Kamei and Yasuhiko Morimoto | ||
| + | |||
| + | ==== TrackD1 ==== | ||
| + | * Chair: | ||
| + | * (32) Reducing Key Size for Multi-Message Authentication Code with Arbitration, | ||
| + | * (43) Linked-Data based Verifiable Credentials for Selective Disclosure with Efficient Verification, | ||
| + | * (61) Improving Homomorphic Evaluation of Bivariate Functions in BFV via Tree-Based BSGS with Lazy Relinearization, | ||
| + | |||
| + | ==== TrackD2 ==== | ||
| + | * Chair: | ||
| + | * (50) Experimental Evaluations of Fault Sensitivity Imbalance for Masked AES Using t-Test and Entropy, Haruka Hirata, Koki Furuno, Daiki Miyahara, Mitsugu Iwamoto, Kazuo Sakiyama and Yang Li | ||
| + | * (14) Staged LLM-Based Original Entry Point Identification Using Disassembled Code, Kohei Arai and Ryotaro Kobayashi | ||
| + | * (39) Detecting Illicit Drug Trade on SNS through Image Classification and Real-time Monitoring, Tetta Hayashi and Ryo Nojima | ||
| + | * (53) Malicious rApps for Eavesdropping and Data Exfiltration in O-RAN Non-RT RIC, Ting-Jia Wu, Cheng-Feng Hung, Wei-Hong Dai and Shin-Ming Cheng | ||
| + | |||
| + | ==== CSA1 ==== | ||
| + | * Chair: Hideyuki Kawashima (Keio U) | ||
| + | * (96) A Practical Approach for Optimizing Routes and Injection Timing of Packets for Rapid Collective Communication, | ||
| + | * (10) Managing multiple IO-intensive applications in storage systems, Kazuichi Oe and Kento Aida | ||
| + | * (78) Seamless Self-healing in WebAssembly Container Orchestration with Runtime-netral Checkpointing, | ||
| + | * (38) Random Trace Shifting by OSs for Side-Channel-Resilient Execution of Legacy Program Binaries, Soma Kato | ||
| + | |||
| + | ==== CSA2 ==== | ||
| + | * Chair: Michihiro Koibuchi (National Institute of Informatics) | ||
| + | * (11) Performance Evaluation of Load Distribution System based on Diffusion Equation for Asymmetric Network Model, Ryo Enkita, Chisa Takano, Hiroyasu Obata, Yasuhiro Ohishi and Masaki Aida | ||
| + | * (116) Bringing Algebraic Hierarchical Decompositions to Concatenative Functional Languages, Attila Egri-Nagy | ||
| + | * (60) EKF-Based Fusion of Wi-Fi/ | ||
| + | |||
| + | ==== GCA1 ==== | ||
| + | * Chair: Satoki Tsuji (Hiroshima University) | ||
| + | * (76) SHIELD-SDN: Security Handling of Intrusions and Exploits through Learning and Detection in SDN, Ranyelson Carvalho, Jacir Bordim and Eduardo Alchieri | ||
| + | |||
| + | ==== GCA2 ==== | ||
| + | * Chair: Victor Parque (Hiroshima University) | ||
| + | * (24) Three-Stage CLIP-Based Approach for Rebar Rust Classification in Precast Concrete Products, Toshiaki Kawagoshi and Naoto Hoshikawa | ||
| + | * (27) Emotion and Genre-Based Music Recommendation System, Yuecheng Yao and Katunobu Itou | ||
| + | * (105) Acoustic Signal-Based Binary Classification for Brick Wall Inspection by Hammering Test, Nishchal Acharya, Prabhat Kc, Sajan Maharjan, Prabhat Bhatta, Masafumi Koike, Masako Saito, Katsuhiko Hibino and Atsushi Ito | ||
| + | * (107) Automatic Monument Detection: Leveraging Deep Learning for Cultural Heritage Applications, | ||
| + | |||
| + | |||
| + | ==== GCA3 ==== | ||
| + | * Chair: Jacir L. Bordim (University of Brasilia) | ||
| + | * (25) GPU implementation of binary and non-binary LDPC decoding, Mark Mizzi and Johann A. Briffa | ||
| + | * (131) A GPU Implementation of the Second- and Third-Order Møller-Plesset Perturbation Theory, Satoki Tsuji, Yasuaki Ito, Nobuya Yokogawa, Kanta Suzuki, Koji Nakano, Victor Parque and Akihiko Kasagi | ||
| + | * (123) Impact of Environmental Factors on LoRa 2.4 GHz Time of Flight Ranging Outdoors, Yiqing Zhou, Xule Zhou, Zecan Cheng, Chenao Lu, Junhan Chen, Jiahong Pan, Yizhuo Liu, Sihao Li and Kyeong Soo Kim | ||
| + | |||
| + | ==== PDAA1 ==== | ||
| + | * Chair: Keiichi Kaneko (Tokyo University of Agriculture and Technology) | ||
| + | * (115) Crash-tolerant perpetual exploration of myopic luminous robots with fewer colors on rings, Fukuhito Ooshita, Hirotsugu Kakugawa, Sayaka Kamei and Masahiro Shibata | ||
| + | * (133) Limits of Fault-Tolerant Observation: | ||
| + | * (26) A Method for Accelerating Node Influence Computation in Social Networks Focusing on the Largest Strongly Connected Component, Li Xiaoyan and Saito Kazumi | ||
| + | * (136) Exploring Diverse Cloud Bursting Policies Using Pareto Conditioned Networks, Yoshiki Noguchi, Chonho Lee, Keichi Takahashi and Susumu Date | ||
| + | |||
| + | ==== PDAA2 ==== | ||
| + | * Chair: Shigeru Ninagawa (Kanazawa Institute of Technology) | ||
| + | * (95) Cellular Automata Denoising Framework for Salt-and-Pepper Noise Considering Directional Structure and Local Homogeneity, | ||
| + | * (1) I see what you do: The HumAct algorithm for live human action recognition and applications, | ||
| + | * (146) Error Correction Methods of Low-precision Analog Matrix Processors for High-precision Matrix Multiplications, | ||
| + | |||
| + | ==== PDAA3 ==== | ||
| + | * Chair: | ||
| + | * (8) An Algorithm Portfolio Approach for Parameter Tuning in Coherent Ising Machines, Tatsuro Hanyu, Takahiro Katagiri, Daichi Mukunoki and Tetsuya Hoshino | ||
| + | * (16) Multi-color ordering method for minimizing number of colors in quadratic unconstrained binary optimization formulation, | ||
| + | * (28) Transfer-Based Strategies for Multi-Target Quantum Optimization, | ||
| + | * (112) A QUBO-based approach to the Generalized Quadratic Assignment Problem, Yutaro Nakahara, Shunsuke Tsukiyama, Koji Nakano, Yasuaki Ito, Victor Parque, Takashi Yazane, Takumi Kato and Kanto Teranishi | ||
| + | |||
| + | ==== WICS1 ==== | ||
| + | * Chair: Samsul Huda (Okayama University) | ||
| + | * (3) Enabling Dynamic XSS Attack Detection with Realtime and Fast Response Based on Improved Transformer Learning Model, Somchart Fugkeaw, Kittipat Wattanasuwan, | ||
| + | * (18) Proposal of Remaining Vulnerability Detection Method for Software Development Environment, | ||
| + | * (72) vkFlow: Automated Identification of Vulnerable Kernel Function Related to System Call, Hiroki Kuzuno and Toshihiro Yamauchi | ||
| + | |||
| + | ==== WICS2 ==== | ||
| + | * Chair: Lihua Wang (National Institute of Information and Communications Technology (NICT)) | ||
| + | * (81) Designated Confirmer Sanitizable Signature suitable for Audit Log, Haruki Hirose and Yuichi Komano | ||
| + | * (102) Integral Characteristics of Piccolo derived by Bit-based Division Property, Naoki Shibayama and Yasutaka Igarashi | ||
| + | * (54) Improved Threshold Fully Homomorphic Encryption with Dynamic Role-based Share Refresh, Yixuan He, Yuta Kodera and Yasuyuki Nogami | ||
| + | * (140) Short Revocable Group Signatures with Compact Revocation Lists from SPS-EQ (preliminary version), Yuka Yonezawa, Toru Nakanishi, Teruaki Kitasuka and Zhuotao Lian | ||
| + | |||
| + | ==== WICS3 ==== | ||
| + | * Chair: Satoshi Obana (Hosei University) | ||
| + | * (108) ZAPx: Extending OWASP ZAP for Enhanced Web Vulnerability Detection and AI-Powered Remediation, | ||
| + | * (48) Decoder-free Audio Watermarking via Visual Cryptography in Time-Frequency Domain, Yuuki Tachioka | ||
| + | * (31) zk-STARKs in Action: Real-Time and Post-Quantum Verification for Banking Transactions, | ||
| + | |||
| + | ==== WICS4 ==== | ||
| + | * Chair: Samsul Huda (Okayama University) | ||
| + | * (34) Redactable Signature for Data Anonymization, | ||
| + | * (87) Improving Malware Detection Accuracy with Instruction Sequential Features Using AMH, Chihiro Toyoshima, Ryotaro Kobayashi and Masahiko Kato | ||
| + | * (88) Server Load‑Aware False‑Positive Reduction in an FPGA‑Based Machine‑Learning Network Intrusion Prevention System, Yuma Ito and Ryotaro Kobayashi | ||
| + | * (90) Penetration Testing Without Port Scanning Using EPSS-Based Vulnerability Lists in Port-Scan Countermeasure Environments, | ||
| + | |||
| + | ==== WICS5 ==== | ||
| + | * Chair: Toru Nakanishi (Hiroshima University) | ||
| + | * (109) Robust Flick-Based Continuous Authentication via CTGAN-Generated Touch Features, Thanh Phong Do and Yasushi Yamazaki | ||
| + | * (119) Proposal of an Identity Verification System Using Trusted Execution Environment in the Japan' | ||
| + | * (130) Player Authentication in Fighting Games using Controller Operation Dynamics, Takeshi Kawamoto, Maharage Nisansala Sevwandi Perera, Franziska Zimmer, Ryosuke Kobayashi, Mhd Irvan and Rie Shigetomi Yamaguchi | ||
| + | |||
| + | ==== WANC1 ==== | ||
| + | * Chair: Shuichi Ichikawa (Toyohashi University of Technology) | ||
| + | * (73) Pseudo-SMT Processor with Context Cache, Moyo Yanagi and Nobuyuki Yamasaki | ||
| + | * (129) Performance Evaluation of CNN using RISC-V Vector Extension for Embedded System, Manato Okawara, Kanemitsu Ootsu, Takuma Kitamoto and Takashi Yokota | ||
| + | * (142) Research on instruction scheduling for extended VLIW based on RISC-V compression instruction set, Yoshiki Yamauchi and Takahiro Sasaki | ||
| + | |||
| + | ==== WANC2 ==== | ||
| + | * Chair: Kanemitsu Ootsu (Utsunomiya University) | ||
| + | * (51) Proposal and Evaluation of CYPHONIC with QUIC Datagram Mode, Taichi Mushika, Ayano Naito and Hidekazu Suzuki | ||
| + | * (134) Improvement of Speed of Service Identification based on SNIs in Network Element, Ryo Asaoka, Akihiro Nakao, Masato Oguchi and Saneyasu Yamaguchi | ||
| + | * (111) A Viability Analysis of IPFS as a Decentralized Storage Solution to IoT, Sopharith Phan and Jigang Liu | ||
| + | |||
| + | ==== WANC3 ==== | ||
| + | * Chiar: Takashi MICHIKAWA (RIKEN) | ||
| + | * (91) Measurement of Baseball Spin Rate Using a Smartphone Camera, Ryota Yamamoto and Susumu Matsumae | ||
| + | * (97) Leaf Area Estimation of Tomato Plants Using a Monocular Depth Estimation Mode, Qianlong Liao, Nobuhiko Yamaguchi, Hiroshi Okumura, Tsubasa Nozoe, Munehiro Tanaka and Kalpani Abeysinghe | ||
| + | * (128) A Novel GNSS Satellite and Pseudorange Selection Method for Robust Positioning in Urban Canyons, Koki Hotta, Hiroyuki Hatano, Kosuke Sanada and Kazuo Mori | ||
| + | |||
| + | ==== WANC4 ==== | ||
| + | * Chair: Takashi Yokota (Utsunomiya University) | ||
| + | * (33) Paper writing support system using basic design sheet and Gemini Principal Investigator, | ||
| + | * (121) Anomaly Detection in HPC Systems using Time Difference Analysis of Reconstructed Data, Seiya Yaguchi and Ryusuke Egawa | ||
| + | * (122) Consistent Video Compression using H.266/VVC based on Spatio-Temporal Color Gradients, Kotaro Oikawa, Zhe Sun, Takashi Michikawa, Shin Yoshizawa, Shigeho Noda, Ruggero Micheletto and Hideo Yokota | ||
| + | |||
| + | ===== Poster Sessions ===== | ||
| + | |||
| + | ==== CSA Poster ==== | ||
| + | * (125) Design of a matrix multiplier using a compressed ternary format, Ryo Nakanowatari and Jubee Tada | ||
| + | * (126) Design and Implementation of a Dynamic Cache Profiler, Yuki Tada, Takuo Niinuma and Jubee Tada | ||
| + | |||
| + | ==== GCA Poster ==== | ||
| + | * (98) Emotion Analysis for Chinese Text Using an OpenAI Embedding Model, Mingyang Zhang, Yoshihiro Adachi, Minoru Uehara and Junwu Zhu | ||
| + | * (110) Performance Estimation Using Both Source and Assembly Code for Data Layout Optimization on GPU, Shintaro Yamamoto and Kazuhiko Ohno | ||
| + | * (118) On implicit gradient regularization in neural-ordinary-differential-equation control, Alexander Vasilyev | ||
| + | |||
| + | ==== PDAA Poster ==== | ||
| + | * (36) Pairwise Disjoint Paths Routing in Bicubes, Yitong Wang and Keiichi Kaneko | ||
| + | * (40) Flying Register in a Three-State Face-Centered Cubic Cellular Automaton, Shigeru Ninagawa | ||
| + | * (101) Co-Optimization of Models and Hardware for Neural Network Inference in Variable-Parallelism Processor, Yu Inoue, Atsushi Hori, Alexandre Schmid, Takao Marukame, Tetsuya Asai and Kota Ando | ||
| + | * (106) An asynchronous P system with branch and bound for solving N-puzzle, Naoya Kamakura and Akihiro Fujiwara | ||
| + | |||
| + | ==== WANC Poster ==== | ||
| + | * (6) A flexible FPGA implementation of GNSS signal acquisition circuit using high level synthesis, Naoki Fujieda, Rei Yokoyama and Takuji Ebinuma | ||
| + | * (49) Outdoor Positioning Method for Tourism Apps Using BLE Beacon and GNSS, Sho Kato, Madoka Hasegawa, Naoya Tsuruta and Atsushi Ito | ||
| + | * (69) Exploring Shared Reservation Stations for Embedded Processors, Kazuki Kogure and Nobuyuki Yamasaki" | ||
| + | * (103) Prediction of plasma drug concentration of lenvatinib using missing data imputation, Kosei Kishimoto, Nobuhiko Yamaguchi, Sakiko Kimura, Masatomo Miura, Osamu Fukuda and Wen Liang Yeoh | ||
| + | * (113) JVProf: Locating Vectorization Candidates in JVM Applications, | ||
| + | * (117) Consideration of Network Anomaly Detection Models using Machine Learning, Souma Kai and Chikatoshi Yamada | ||
| + | |||
| + | ==== NCSS Poster ==== | ||
| + | * (139) A Case Study on Extending Rules of Games, Takahiro Imano and Minoru Uehara | ||
| + | * (141) Introspective Self-Dialogue: | ||
| + | * (143) HUBO Formulation For Task Allocation Optimization in Hybrid Optical-Electrical Networks, Yaxuan Zhao, Shunsuke Tsukiyama, Koji Nakano, Michihiro Koibuchi, Victor Parque and Yasuaki Ito | ||
| + | * (144) Evaluating the Efficiency of Hailo-8 for YOLOv10-Based Object Detection in Edge Environments, | ||
| + | * (145) Developing a generator for CUDA C files to reduce synchronization overhead (preliminary version), Daisuke Takafuji | ||
