ABCDEFHIJKLMNOPQRSTUVWX
1
CategoryPaper IDTitleRegistrationPagesVideo
2
WICS POSTER2A machine learning-based NIDS that collects training data from within the organization and updates the discriminator periodically and automaticallyHideya Sato4
3
CANDAR REGULAR3PZLAST: an ultra-fast sequence similarity search tool implemented on a MIMD processorHitoshi Ishikawa6
4
ASON REGULAR5An Enhancement of Physical Web with Stateful BLE BeaconsKakeru Kobayashi7
5
CANDAR REGULAR6Template Protected Fingerprint Verification using Set Similarity-based Minutia Cylinder Code and MinHashYoshiko Yasumura7
6
GCA POSTER8Augmented Triplet Network for Individual Organism and Unique Object Classification for Reliable Monitoring of Ezaoshika DeerYojiro Harie4
7
PDAA REGUALR10Hybrid Interconnection Networks for Reducing Hardware Cost and Improving Path Diversity Based on Fat-Trees and HypercubesYaodong Wang7
8
SUSCW REGULAR11A Distributed Multi-group Mutual Exclusion Algorithm for Intersection Traffic ControlHirotsugu Kakugawa7
9
WICS REGUALR12Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGCShuntaro Ema6
10
WICS REGUALR17Verification of the Effectiveness to Monitor Darknet across Multiple OrganizationsKatsuya Nishijima6
11
WICS REGUALR18Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by SmartphoneRyosuke Kobayashi6
12
CANDAR REGULAR19Cost-Performance Evaluation of Heterogeneous Tierless Storage Management in a Public CloudReika Kinoshita6
13
CANDAR REGULAR20Efficient and Large Scale Pre-training Techniques for Japanese Natural Language ProcessingAkihiko Kasagi6
14
CANDAR REGULAR21A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding DegreesYuki Nanjo7
15
CANDAR LONG22Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFSYuki Nanjo8
16
CANDAR REGULAR23Dementia Sign Detection System Using Digital TwinToru Kobayashi7
17
CANDAR REGULAR24A Proposal of Code Modification Problem for Web Client Programming Using JavaScriptKhaing Hsu Wai7
18
WANC SHORT25An FPGA-based Power-saving Particle Filter Using Dynamic ReconfigurationYuta Imamura5
19
WICS REGUALR26Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for SmartwatchesMirang Park6
20
CANDAR REGULAR27A Strongly Unlinkable Group Signature Scheme with Matching-Based Verifier-Local Revocation for Privacy-Enhancing CrowdsensingToru Nakanishi7
21
CANDAR REGULAR28Evaluation of an HLS-based heterogeneous redundant design approach for functional safety systems on FPGAsTaichi Saikai6
22
CANDAR REGULAR29Implementation and Evaluation of a Ring Oscillator-based True Random Number GeneratorKotaro Hayashi7
23
WICS POSTER30Consideration of the side-channel attack to SIMON implemented on Arduino UnoHarunobu Enami4
24
CANDAR REGULAR31Browser-Based Manipulation of Virtual Objects Through MVVM Architecture with Data BindingKentaro Nagaki7
25
WANC SHORT32Recognition of Multiple Rectangular Labels for Construction MachinesYuki Nakagawa5
26
PDAA REGUALR33Tip the Balance: Improving Exploration of Balanced Crossover Operators by Adaptive BiasLuca Manzoni7
27
CANDAR LONG34Hip to Be (Latin) Square: Maximal Period Sequences from Orthogonal Cellular AutomataLuca Mariot9
28
CANDAR REGULAR35Group Signatures with Designated TraceabilityHiroaki Anada7
29
CANDAR REGULAR36Reducing Revocation Lists in CS-Based Revocable Group Signature Scheme Using Vector CommitmentKouhei Sugimoto7
30
WICS REGUALR37Applying The Attacks Tracer on Advanced Persistent Threats to Real NetworksYuya Tajima6
31
PDAA REGUALR38Classification Models in Genetic Algorithms for Commonality Optimization in Passive Crash SafetyNguyen Anh Vu Doan7
32
WANC SHORT39Arranging resource amount after automatic GPU offloadingYoji Yamato5
33
CANDAR LONG40Accelerate CNN Models via Filter Pruning and Sparse Tensor CorePangfeng Liu9
34
WICS REGUALR42Consideration of the side-channel attack to SPECK implemented on Arduino UnoMasaki Nakanose7
35
CANDAR REGULAR43An asynchronous P system with a DPLL algorithm for solving a satisfiability problemTakuya Noguchi7
36
CANDAR REGULAR45Visual Studio Code Extension and Auto-completion for Mizar LanguageHiroto Taniguchi7
37
CANDAR LONG46Solving the sparse QUBO on multiple GPUs for Simulating a Quantum AnnealerKoji Nakano10
38
WICS REGUALR48A Practical Parallel Computation in a Scalable Multiparty Private Set IntersectionSeitaro Mishima7
39
GCA REGULAR49Instillation Checking Using Long Short-Term Memories for Ophthalmology PatientsTomohiro Ishigami7
40
GCA REGULAR51Detecting DDoS Attacks on SDN Data Plane with Machine LearningRanyelson Carvalho7
41
PDAA REGUALR56Commutativity of Composition of some Elementary Cellular Automata with Essentially 2-Neighborhood Local Functions on MonoidsToshikazu Ishida7
42
ASON REGULAR57A Lightweight Interactive Graph Processing Library for Edge Computing in Smart SocietyJun Zhou7
43
WICS REGUALR60Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication FunctionKaichi Sato7
44
CANDAR LONG61An Intrusion Detection system for imbalanced dataset based on Deep LearningMariama Mbow10
45
PDAA REGUALR64Petri Net based Mathematical Programming for Optimal Resource Assignment Problems with Multiple Resource RequirementsTomoya Uchihara6
46
WICS REGUALR65KAKOI: A New Tool to Make Simple and Secure Build Cyber Ranges Using Public CloudTomoya Terashima7
47
CANDAR LONG66Efficient Multi-Party Contact TracingDe Goyon Mathieu9
48
CANDAR REGULAR67M-KUBOS/PYNQ Cluster for multi-access edge computingTakumi Inage7
49
SUSCW REGULAR68Speeding Up of CGRAs by Reshaping and Stochastic FMATomoya Akabe6
50
CANDAR REGULAR69Area-efficient Binary and Ternary CNN Accelerator using Random-forest-based ApproximationKaisei Kimura7
51
CANDAR LONG70Trajectory Anonymization through Laplace Noise Addition in Latent SpaceYuiko Sakuma9
52
WANC POSTER71Distributed Rewarding for Browser-Based P2P Video Streaming with Ethereum BlockchainYunqi Ma3
53
CSA REGULAR72Performance Study of Kotlin and Java Program Considering Bytecode Instructions and JVM JIT CompilerAtsuya Sonoyama7
54
GCA REGULAR73Acceleration of Deflate Encoding and Decoding with GPU implementationsDaisuke Takafuji7
55
GCA REGULAR74GANs with Suppressed Mode Collapse Using Intrinsic RewardsToi Tsuneda6
56
CANDAR REGULAR75Semi-Uniform Deployment of Mobile Robots in Perfect \ell-ary TreesMasahiro Shibata7
57
WANC SHORT78Real-time execution based on fluid scheduling by using IPC control schemeAtsushi Santo5
58
CANDAR REGULAR80On the Performance of Hidden Markov Model Spectrum Opportunity Forecast on Limited Observed Channel ActivityRodrigo Feitosa Bezerra7
59
CSA REGULAR81Mitigating Process Variations with Cooperative Tuning for Performance and Power through a Simple DSLYuan He7
60
CANDAR LONG82Low-Latency High-Bandwidth Interconnection Networks by Selective Packet CompressionNaoya Niwa9
61
WANC SHORT85Development of the Estimation Model for Intentions to Move Based on Gaze and Face Information with 1DCNN-LSTM and Evaluation of Electric Wheelchair DrivingSho Higa5
62
CANDAR REGULAR86A State Transfer Method That Adapts to Network Bandwidth Variations in Geographic State Machine ReplicationTairi Chiba7
63
SUSCW POSTER87Evaluation of the effect of ICT in education on the academic literacy of high school studentsYoshiomi Otsuka4
64
ASON POSTER89Porting Caching Functions to Named Data Networking Forwarding Daemon (NFD)Takuya Mizushiro4
65
WICS REGUALR90Improvement of Hybrid NIDS Using Deep Learning for Practical UseKentaro Takeshita7
66
PDAA REGUALR92An asynchronous P system with branch and bound for solving the subset sum problemKosei Nagao7
67
WANC SHORT96Single and Ensemble CNN Models with Out-Category Penalty in Cifar10Yuta Suzuki4
68
PDAA POSTER98A Proposal of Dynamic Job Scheduling Algorithm Considering CPU Core Utilization for User-PC Computing SystemARIEL KAMOYEDJI4
69
WICS REGUALR99FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT DevicesMoeka Yamamoto7
70
ASON REGULAR100Switching Method of Media Access Control for Improving Fairness of Throughput between WLAN systems under Adjacent Channel InterferenceHiroyasu Obata7
71
ASON REGULAR101Performance Evaluation of Information Floating with Limited Expiration Time in Terms of Information Reception Time and Error Diffusion RateYuko Ikeda7
72
SUSCW POSTER102Speech Signal Processing Using Consonant-Vowel Location DetectionShusuke Nakazato4
73
GCA POSTER104Hierarchical Multi-Building And Multi-Floor Indoor Localization Based On Recurrent Neural NetworksAbdalla Elesawi4
74
WICS REGUALR105Evaluation of implementability in a malware detection mechanism using processor informationMutsuki Deguchi7
75
WANC SHORT106Detection for Transient Patterns with Unpredictable Duration using Chebyshev Inequality and Dynamic BinningThanapol Phungtua-eng5
76
ASON REGULAR107A Link State Routing Method for CCN with BlockchainShuichi Tokunaga7
77
WANC POSTER108Supporting Music Arrangement, Ringer Assignment, and Score Preparation for Musicbell EnsemblesKeita Ushida3
78
WANC SHORT110Transparent Relational Database Caching Based on Storage Engines Using In-memory DatabaseMotoshi Miyamoto5
79
ASON POSTER112Developing a sensor network around a car driverHaruka Yoshimoto4
80
LHAM REGULAR113Empirical parameter tuning of task-based tiled QR factorization using quantum annealingTomohiro Suzuki6
81
GCA REGULAR115Adversarial attack detection on node classification by autoencoder-based analysis of hidden layers in graph convolutional networksKenta Shimada7
82
WANC POSTER117Loss Function of GAN to Make a Clear JudgmentKuniyasu Imade3
83
SUSCW POSTER118Weight Least Square Filter For Improving the Quality of Depth Map on FPGARenzhi Mao4
84
SUSCW POSTER119An Implementation of a World Grid Square Codes Generator on a RISC-V ProcessorRei Watanabe4
85
ASON REGULAR120A Performance Evaluation of Vehicular Swarm Intelligence for Seamless Route Guidance using Opportunistic NetworkingAkihiro Fujihara7
86
ASON REGULAR121Adaptive Network Coding Broadcasting based on Node Mobility in Mobile Ad-hoc NetworksMasami Yoshida6
87
GCA REGULAR122Heuristic extraction of co-occurrence patterns for effective construction of graph-based interpretable decision setsKota Matsuyama7
88
SUSCW REGULAR123Analysis of Resistance Distribution and Voltage Drop in Chips with Inductive Coupling Wireless Communication InterfaceHIDETO KAYASHIMA5
89
CSA REGULAR124Automatic executable code generation for DNN accelerator ReNAYuta Masuda7
90
ASON POSTER127Feasibility Investigations of Access-Point Transmission Power Optimization Method under Co-use of Channel Bonding and Non Channel Bonding in Wireless Local-Area NetworkFatema Akhter4
91
WICS REGUALR128A New Higher Order Differential of Enocoro-128v2Naoki Shibayama6
92
ASON REGULAR129Improvement of Sound Classification Method on Smartphone for Hammering Test Using 5G NetworkTsubasa Fukumura6
93
WICS POSTER130Data augmentation of JavaScript dataset using DCGAN and random seedNgoc Minh Phung4
94
WICS REGUALR132Non-interactive Lattice-based MultisignaturesKittiphon Phalakarn7
95
WANC POSTER133Observation of Method Invocation in Application Runtime in Android for CPU Clock Rate AdjustmentKota Kumakura3
96
WICS REGUALR134Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVMKohei Otani7
97
ASON REGULAR136Efficient RPL Tree Construction Using Passive Link Quality EstimationHiroto Fujita7
98
LHAM REGULAR138A memory bank conflict prevention mechanism for SYCL on SX-Aurora TSUBASAHiroyuki Takizawa6
99
LHAM POSTER139Cross-Reference Simulation by Code-To-Code Adapter (CoToCoA) Library for the Study of Multi-Scale Physics in Planetary MagnetospheresYuto Katoh4
100
ASON REGULAR140On the Suppression of Loops with Long Hops During Scatternet Configuration in Bluetooth MANETsHaruki Ishizaki7