


default search action
11th CANDAR 2023: Matsue, Japan - Workshops
- Eleventh International Symposium on Computing and Networking, CANDAR 2023 - Workshops, Matsue, Japan, November 27-30, 2023. IEEE 2023, ISBN 979-8-3503-0694-1

- Jinshan Luo, Yuki Okaniwa, Yuko Hiramatsu, Atsushi Ito, Madoka Hasegawa:

Measuring Driver's Emotion. 1-6 - Yuya Takanashi, Shigetomo Kimura:

Method for Detecting DoH Communications from Non-Encrypted Information at a Middlebox. 7-13 - Yoji Yamato:

A study for environmental adaptation of IoT devices. 14-19 - Koya Mitsuhira, Shinji Inoue, Tomoyuki Ohta:

A Dynamic Method for Forming Vehicle Platoons and Its Evaluations in Urban Areas. 20-23 - Tung Nguyen

, Hideyuki Kawashima:
Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real-time Database Systems. 24-30 - Yuta Nojiri, Nobuyuki Yamasaki:

A Design of Multithreaded RISC-V Processor for Real-Time System. 31-37 - Aoi Yamashita, Masahiro Tanaka, Yutaro Bessho, Yasuhiro Fujiwara, Hideyuki Kawashima:

Improving Raft Performance with Bulk Transfers. 38-44 - Zhang Yuwei, Satoshi Fujita:

Acceleration of Sociality-Aware Message Routing in Opportunistic Networks. 45-51 - Mery Diana

, Masato Kiyama, Motoki Amagasaki, Masayoshi Ito, Yuki Morishita:
A Deep Neural Network Translator for Edge Site Implementation. 52-55 - Alessandro Cordeiro de Lima

, Jacir Luiz Bordim, Eduardo A. P. Alchieri:
Detecting EDoS Attacks in Cloud Environments Using Machine Learning and Metaheuristic Algorithms. 56-62 - Sihao Li

, Kyeong Soo Kim
, Zhe Tang, Jeremy S. Smith:
Stage-Wise and Hierarchical Training of Linked Deep Neural Networks for Large-Scale Multi-Building and Multi-Floor Indoor Localization Based on Wi-Fi Fingerprinting. 63-68 - Bruno Silva, Luiz Guerreiro Lopes

:
A GPU-Based Parallel Implementation of the GWO Algorithm: Application to the Solution of Large-Scale Nonlinear Equation Systems. 69-75 - Kenshin Tsumuraya, Minoru Uehara, Yoshihiro Adachi:

Semantic Search of Japanese Sentences Using Distributed Representations. 76-81 - Hiromasa Takeda, Eiji Sugino, Hiroyuki Sato:

Efficient Cryptographic Processing Using On-Chip GPUs in System-on-Chip Architectures. 82-85 - Maxime Dresler, Sanaï Mansour, Safaâ Talhaoui, Yukiko Yamauchi, Sébastien Tixeuil:

On Dynamics of Basic Network Creation Games with Non-Uniform Communication Interest. 86-92 - Toshikazu Ishida, Shuichi Inokuchi:

Multiplication of Local Formulae and Commutativity of CAs with Essentially 3-Neighborhood Local Functions over Monoid N. 93-99 - Hirotsugu Kakugawa, Sayaka Kamei, Masahiro Shibata, Fukuhito Ooshita:

A self-stabilizing distributed algorithm for the 1-MIS problem under the distance-3 model. 100-106 - Yonghwan Kim, Yoshiaki Katayama, Koichi Wada:

Asynchronous Complete Visibility Algorithm for Luminous Robots on Grid. 107-113 - Masahiro Kimura, Teijiro Isokawa, Ferdinand Peper, Sho Nakade, Jia Lee, Naotake Kamiura:

On Implementation of Brownian Circuits by Swarm Agents. 114-120 - Yashdeep Singh, Sushanta Karmakar:

The Popular Matching Problem in a (3, 3)-Hypergraph with One-sided Preferences. 121-127 - Reo Ueno, Akihiro Fujiwara:

An asynchronous P system for solving the minimum Steiner tree with branch and bound. 128-134 - Kaito Watanabe, Hirotaka Nakayama, Atsushi Shiraki, Tomoyoshi Ito, Katsumi Hirata, Naoto Hoshikawa:

A Method for Automatic Generation of 3D Background Models Using Fractal Models and Genetic Algorithms. 135-141 - Shan-Cheng Pan, Wei-Der Chang, Cheng-En Chung:

Implementation of the Home Automation System by Using FPGA Platform. 142-145 - Yuhang Du, Satoshi Fujita:

Online Assignment of Reservations to Parking Lots for Smart Cities under the i.i.d. Model. 146-152 - Yibao Liang, Minoru Uehara:

Browser-based Java Development Environment for Programming Education. 153-158 - Takero Magara, Nobuyuki Yamasaki:

Design of Decoded Instruction Cache. 159-164 - Naoki Shibahara, Michihiro Koibuchi, Hiroki Matsutani:

Performance Improvement of Federated Learning Server using Smart NIC. 165-171 - Riku Takayama, Jubee Tada:

An Implementation of an Instruction Controlled Cache Replacement Policy on a RISC-V Processor. 172-178 - Chuankai Wang, Satoshi Fujita:

Polynomial-Time Cloudlet Placement Scheme with an Improved Approximation Ratio. 179-185 - Ruoxuan Wang, Minoru Uehara:

A Multitenant Single-Page Application for Programming Education. 186-190 - Mingqi Cai, Hiroyuki Kose:

Motivation Survey and Influence Factor Analysis of Old People to Improve Digital Literacy. 191-194 - Md. Biplob Hossain, Maya Rahayu, Ali Md. Arshad, Samsul Huda

, Yuta Kodera, Yasuyuki Nogami:
A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application. 195-201 - Takumi Fukuda, Isao Nakanishi:

Introduction of Finger-softness Feature into Writer Verification Based on Finger-writing of Simple Symbol. 202-207 - Yuki Funaoka, Hiroshi Koide:

Improved Vulnerability Handling Framework to Automatically Fix Vulnerable Web Applications. 208-212 - Kosuke Higuchi

, Ryotaro Kobayashi:
Real-Time Defense System using eBPF for Machine Learning-Based Ransomware Detection Method. 213-219 - Le Hoang Anh

, Yuta Kawada, Samsul Huda
, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami:
An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption. 220-226 - Tetsuro Ishida, Kazuma Ikesaka, Ali Md. Arshad, Yasuyuki Nogami, Yuta Kodera:

A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation. 227-231 - Momoka Kasuya, Nobuyoshi Morita, Hiroki Yamazaki, Kazuo Sakiyama:

Automated Extraction for Vulnerability Management on PSIRT: A Case Study of Automotive Industry. 232-238 - Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi:

Impact of Anonymity Indicator "PFDOC Entropy l-Diversity" on Medical Data Utility. 239-245 - Natsume Matsuzaki, Masayuki Fukumitsu, Yoshihiro Kita:

Emergency Button: Evacuation of Crypto Asset When Key Loss. 246-252 - Yutaro Matunaka, Ryotaro Kobayashi, Masahiko Kato:

Verification of IoT Malware Match Rate Using Signatures Created Based on Processor Information. 253-259 - Maya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda

, Yuta Kodera, Yasuyuki Nogami:
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology. 260-266 - Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi:

Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine Monitor. 267-273 - Kaito Shiba, Hiroki Kuzuno, Toshihiro Yamauchi:

Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE. 274-278 - Taku Sudo, Ryotaro Kobayashi, Masahiko Kato:

Single-Hardware Method to Detect Malicious Communications and Malware on Resource-Constrained IoT Devices. 279-285 - Maki Tsukahara, Haruka Hirata

, Mingyu Yang, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, Kazuo Sakiyama:
On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI. 286-291 - Hervet Victor, Satoru Kobayashi

, Toshihiro Yamauchi:
Analyzing Post-injection Attacker Activities in IoT Devices: A Comprehensive Log Analysis Approach. 292-297 - Hayato Aoba, Ryota Kawashima, Hiroshi Matsuo:

Accelerating Key-Value Store with Layer-2 Transparent Proxy Cache Using DPDK. 298-302 - Takuto Hashibe, Makoto Murakoshi, Teruaki Kitasuka, Toru Nakanishi:

A Serverless Signaling Scheme for WebRTC Using Bluetooth LE. 303-307 - Yudai Katto, Yukikazu Nakamoto:

Low-cost implementation of a bicycle assistance embedded system using TensorFlow Lite. 308-312 - Atsuya Kobayashi, Saneyasu Yamaguchi:

Extraction of Subjective Information from Generative AI Models. 313-317 - Yui Koyanagi, Tomoaki Ukezono

:
A Cost-aware Generation Method of Disposable Random Value Exploiting Parallel S-box Implementation for Tamper-resistant AES Design. 318-322 - Kuwabara Nobuaki, Satoshi Fujita:

DODA: A Decentralized Online Dating Application. 323-327 - Reo Otsuka, Saneyasu Yamaguchi:

Improving TCP Fairness by Expiring TCP BBR Considering Frequency. 328-332 - Yuta Tomida, Hiroyuki Hatano, Kosuke Sanada, Kazuo Mori:

Stochastic Resonance Assisted Successive Interference Cancellation Receiver for Multilevel Modulated Signals. 333-337 - Yuta Uehara, Susumu Matsumae:

Dimensionality Reduction Methods Using VAE for Deep Reinforcement Learning of Autonomous Driving. 338-342 - Yutaka Watanabe, Ryota Kawashima, Hiroshi Matsuo:

Proxy-based Transaction Acceleration for NewSQL. 343-347 - Junya Yamamoto, Hirotake Abe, Kenta Yamasawa, Kazuhiko Kato:

Priority-MPTCP: A Novel Multipath Data Transfer Method for V2V Communication. 348-352 - Masami Yoshida, Ryota Uchida, Taku Noguchi

:
Rank Attack Avoidance Method based on Neighbor Node Rank Variation in RPL Network. 353-357 - Makoto Eguchi, Nobuhiko Yamaguchi, Osamu Fukuda, Hiroshi Okumura, Wen Liang Yeoh:

Bicycle-based collision prevention system using iPhone with LiDAR. 358-360 - Ryoma Ishizu, Hironori Kitakaze, Ryo Matsumura

:
Data Augmentation with Pseudo-Infrared Night-Vision Image Conversion for Improved Nighttime Object Detection. 361-363 - Yuto Miura, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama:

Simulation-based Analysis of Power Side-Channel Leakage at Different Sampling Intervals. 364-365 - Kaito Mori, Mao Nishira, Hiroki Nishikawa, Hiroyuki Tomiyama:

Surveillance Routing with a Minimum Number of Drones. 366-367 - Ryuichi Niitsu, Saneyasu Yamaguchi:

Performance Evaluation and Improvement of HTTP/3 Considering TLS. 368-370 - Andrea Rosà

, Matteo Basso, Leonardo Bohnhoff, Walter Binder
:
Adaptive Thread Type Selection on the Java Virtual Machine. 371-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














