3: PZLAST: an ultra-fast sequence similarity search tool implemented on a MIMD processor
Hitoshi Ishikawa
34: Hip to Be (Latin) Square: Maximal Period Sequences from Orthogonal Cellular Automata
Luca Mariot
43: An asynchronous P system with a DPLL algorithm for solving a satisfiability problem
Takuya Noguchi and Akihiro Fujiwara
46: Solving the sparse QUBO on multiple GPUs for Simulating a Quantum Annealer
Tomohiro Imanaga, Koji Nakano, Ryota Yasudo, Yasuaki Ito, Yuya Kawamata, Ryota Katsuki, Shiro Ozaki, Takashi Yazane and Kenichiro Hamano
75: Semi-Uniform Deployment of Mobile Robots in Perfect \ell-ary Trees
Masahiro Shibata and Sebastien Tixeuil
86: A State Transfer Method That Adapts to Network Bandwidth Variations in Geographic State Machine Replication
Tairi Chiba, Ren Ohmura and Junya Nakamura
CANDAR Track2
19: Cost-Performance Evaluation of Heterogeneous Tierless Storage Management in a Public Cloud
Reika Kinoshita, Satoshi Imamura, Lukas Vogel, Satoshi Kazama and Eiji Yoshida
28: Evaluation of an HLS-based heterogeneous redundant design approach for functional safety systems on FPGAs
Taichi Saikai, Kotoko Miyata, Taito Manabe and Yuichiro Shibata
69: Area-efficient Binary and Ternary CNN Accelerator using Random-forest-based Approximation
Kaisei Kimura, Sho Yatabe, Sora Isobe, Yoichi Tomioka, Hiroshi Saito, Yukihide Kohira and Qiangfu Zhao
82: Low-Latency High-Bandwidth Interconnection Networks by Selective Packet Compression
Naoya Niwa, Hideharu Amano and Michihiro Koibuchi
CANDAR Track3
23: Dementia Sign Detection System Using Digital Twin
Toru Kobayashi, Kazuki Fukae, Tetsuo Imai and Kenichi Arai
80: On the Performance of Hidden Markov Model Spectrum Opportunity Forecast on Limited Observed Channel Activity
Rodrigo Feitosa Bezerra, Jacir Bordim, Marcos Fagundes Caetano and Marcus Vinicius Lamar
CANDAR Track4
20: Efficient and Large Scale Pre-training Techniques for Japanese Natural Language Processing
Akihiko Kasagi, Akihiro Tabuchi, Yosuke Oyama, Masahiro Asaoka, Takumi Honda, Yasufumi Sakai, Tsuguchika Tabaru and Thang Dang
24: A Proposal of Code Modification Problem for Web Client Programming Using JavaScript
Khaing Hsu Wai, Nobuo Funabiki, Khin Thet Mon, San Hay Mar Shwe, Htoo Htoo Sandi Kyaw and Khin Sandar Lin
31: Browser-Based Manipulation of Virtual Objects Through MVVM Architecture with Data Binding
Kentaro Nagaki and Satoshi Fujita
40: Accelerate CNN Models via Filter Pruning and Sparse Tensor Core
An-Tai Chen, Pangfeng Liu, Ding-Yong Hong and Jan-Jan Wu
45: Visual Studio Code Extension and Auto-completion for Mizar Language
Hiroto Taniguchi and Kazuhisa Nakasho
70: Trajectory Anonymization through Laplace Noise Addition in Latent Space
Yuiko Sakuma, Thai P. Tran, Tomomu Iwai, Akihito Nishikawa and Hiroaki Nishi
CANDAR Track5
6: Template Protected Fingerprint Verification using Set Similarity-based Minutia Cylinder Code and MinHash
Yoshiko Yasumura, Masakazu Fujio, Wataru Nakamura, Yosuke Kaga and Kenta Takahashi
21: A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees
Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka and Yasuyuki Nogami
22: Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS
Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka and Yasuyuki Nogami
27: A Strongly Unlinkable Group Signature Scheme with Matching-Based Verifier-Local Revocation for Privacy-Enhancing Crowdsensing
Yuto Nakazawa and Toru Nakanishi
29: Implementation and Evaluation of a Ring Oscillator-based True Random Number Generator
Naoya Torii, Ryuichi Minagawa, Hideaki Kevin Omae and Koutarou Hayashi
35: Group Signatures with Designated Traceability
Hiroaki Anada, Masayuki Fukumitsu and Shingo Hasegawa
36: Reducing Revocation Lists in CS-Based Revocable Group Signature Scheme Using Vector Commitment
Kouhei Sugimoto and Toru Nakanishi
61: An Intrusion Detection system for imbalanced dataset based on Deep Learning
Mariama Mbow, Hiroshi Koide and Kouichi Sakurai
66: Efficient Multi-Party Contact Tracing
Mathieu De Goyon, Atsuko Miyaji and Tian Yangguang
ASON
5: An Enhancement of Physical Web with Stateful BLE Beacons
Kakeru Kobayashi and Satoshi Fujita
57: A Lightweight Interactive Graph Processing Library for Edge Computing in Smart Society
Jun Zhou and Masaaki Kondo
89: Porting Caching Functions to Named Data Networking Forwarding Daemon (NFD)
Takuya Mizushiro and Teruaki Kitasuka
100: Switching Method of Media Access Control for Improving Fairness of Throughput between WLAN systems under Adjacent Channel Interference
Hiroyasu Obata and Chisa Takano
101: Performance Evaluation of Information Floating with Limited Expiration Time in Terms of Information Reception Time and Error Diffusion Rate
Yuko Ikeda, Hiroyasu Obata and Kenji Ishida
107: A Link State Routing Method for CCN with Blockchain
Shuichi Tokunaga, Satoshi Ohzahata and Ryo Yamamoto
112: Building a Sensor Network to Measure Drivers' Emotions
Kazuki Sakai, Haruka Yosimoto, Atsushi Ito and Yuko Hiamatsu
120: A Performance Evaluation of Vehicular Swarm Intelligence for Seamless Route Guidance using Opportunistic Networking
Shougo Amita and Akihiro Fujihara
121: Adaptive Network Coding Broadcasting based on Node Mobility in Mobile Ad-hoc Networks
Masami Yoshida, Alberto Gallegos Ramonet and Taku Noguchi
127: Feasibility Investigations of Access-Point Transmission Power Optimization Method under Co-use of Channel Bonding and Non Channel Bonding in Wireless Local-Area Network
Fatema Akhter, Sun Yuanshuai, Nobuo Funabiki, Hendy Briantoro, Kwenga Ismael Munene and Md. Mahbubur Rahman
129: Improvement of Sound Classification Method on Smartphone for Hammering Test Using 5G Network
Tsubasa Fukumura, Hayato Aratame, Atsushi Ito, Masafumi Koike, Katsuhiko Hibino and Yoshihisa Kawamura
136: Efficient RPL Tree Construction Using Passive Link Quality Estimation
Hiroto Fujita, Yasuyuki Tanaka, Kosuke Mori and Fumio Teraoka
140: On the Suppression of Loops with Long Hops During Scatternet Configuration in Bluetooth MANETs
Haruki Ishizaki, Eitaro Kohno and Yoshiaki Kakuda
168: Analysis of Reward Function for Incentive-based Participation Promotion Method
Kaito Tanino and Teruaki Kitasuka
CSA
72: Performance Study of Kotlin and Java Program Considering Bytecode Instructions and JVM JIT Compiler
Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi and Saneyasu Yamaguchi
81: Mitigating Process Variations with Cooperative Tuning for Performance and Power through a Simple DSL
Yunjiao Ma, Yuan He, Yasutaka Wada, Wenchao Luo, Ryuichi Sakamoto and Masaaki Kondo
124: Automatic executable code generation for DNN accelerator ReNA
Yuta Masuda, Yasuhiro Nakahara, Motoki Amagasaki and Masahiro Iida
143: A simulation of a memory subsystem using a highly energy-efficient but erroneous MRAM
Daiki Saito, Takahiro Hirofuchi, Hiroko Arai and Yukinori Sato
144: Parallelizing Compiler Translation Validation Using Happens-Before and Task-Set
Jixin Han, Tomofumi Yuki, Michelle Strout, Dan Umeda, Hironori Kasahara and Keiji Kimura
146: Data Rearrange Unit for Efficient Data Computation in Embedded Systems
Akiyuki Mamiya and Nobuyuki Yamasaki
148: Preliminary Evaluation for Multi-domain Spike Coding on Memcapacitive Neuromorphic Circuit
Reon Oshio, Atsushi Sawada, Mutsumi Kimura, Renyuan Zhang and Yasuhiko Nakashima
150: A Python-based evaluation framework for stochastic computing circuits on FPGA SoC
Naoki Fujieda
151: Analysis of Fully-Pipelined CNN Implementation on FPGA and HBM2
Van Cam Nguyen and Yasuhiko Nakashima
GCA
8: Augmented Triplet Network for Individual Organism and Unique Object Classification for Reliable Monitoring of Ezaoshika Deer
Yojiro Harie, Sangam Neupane and Gautam Bishnu
49: Instillation Checking Using Long Short-Term Memories for Ophthalmology Patients
Tomohiro Ishigami, Teijiro Isokawa, Naotake Kamiura, Hiroki Masumoto and Hitoshi Tabuchi
51: Detecting DDoS Attacks on SDN Data Plane with Machine Learning
Ranyelson Carvalho, Lucas Costa, Eduardo Alchieri and Jacir Bordim
73: Acceleration of Deflate Encoding and Decoding with GPU implementations
Daisuke Takafuji, Koji Nakano, Yasuaki Ito and Akihiko Kasagi
74: GANs with Suppressed Mode Collapse Using Intrinsic Rewards
Toi Tsuneda, Taro Kiriyama, Kosuke Shintani and Satoshi Yamane
104: Hierarchical Multi-Building And Multi-Floor Indoor Localization Based On Recurrent Neural Networks
Abdalla Elesawi and Kyeong Soo Kim
115: Adversarial attack detection on node classification by autoencoder-based analysis of hidden layers in graph convolutional networks
Kenta Shimada and Tomonobu Ozaki
122: Heuristic extraction of co-occurrence patterns for effective construction of graph-based interpretable decision sets
Kota Matsuyama and Tomonobu Ozaki
141: An Externally-Constrained Ising Clustering Method for Material Informatics
Kazuhiko Komatsu, Masahito Kumagai, Ji Qi, Masayuki Sato and Hiroaki Kobayashi
142: A GPU Implementation of Watercolor Painting Image Generation
Jiamian Huang, Yasuaki Ito and Koji Nakano
147: Acceleration and higher precision by discrete wavelet transform for single image super-resolution using convolutional neural networks
Manh Tuan Nguyen, Keisuke Iwai, Takashi Matsubara and Takakazu Kurokawa
166: Conditions Based Generative Adversarial Networks with attention module for Image Generation
Kaixu Chen, Zhengxuan Zhao and Satoshi Yamane
170: Anime-style Image Generation using GAN
Zhen Cui, Yasuaki Ito and Koji Nakano
172: Decision Making in American Football under State Uncertainty by Stochastic Inverse Reinforcement Leaning
Risa Takayanagi, Keita Takahashi, Masaya Watabe, Kazunori Ohkawara and Tomah Sogabe
LHAM
113: Empirical parameter tuning of task-based tiled QR factorization using quantum annealing
Tomohiro Suzuki
138: A memory bank conflict prevention mechanism for SYCL on SX-Aurora TSUBASA
Wenbin Wang, Jiahao Li, Yoichi Shimomura and Hiroyuki Takizawa
139: Cross-Reference Simulation by Code-To-Code Adapter (CoToCoA) Library for the Study of Multi-Scale Physics in Planetary Magnetospheres
Yuto Katoh, Keiichiro Fukazawa, Takeshi Nanri and Yohei Miyake
157: Out-of-GPU FFT: A case study in GPU prefetching
Peter Pirgov, Lenore Mullin and Rishi Khan
PDAA
10: Hybrid Interconnection Networks for Reducing Hardware Cost and Improving Path Diversity Based on Fat-Trees and Hypercubes
Yaodong Wang and Yamin Li
33: Tip the Balance: Improving Exploration of Balanced Crossover Operators by Adaptive Bias
Luca Manzoni, Luca Mariot and Eva Tuba
38: Classification Models in Genetic Algorithms for Commonality Optimization in Passive Crash Safety
Burak Çetinkaya, Johannes Stadler and Nguyen Anh Vu Doan
56: Commutativity of Composition of some Elementary Cellular Automata with Essentially 2-Neighborhood Local Functions on Monoids
Toshikazu Ishida and Shuichi Inokuchi
64: Petri Net based Mathematical Programming for Optimal Resource Assignment Problems with Multiple Resource Requirements
Tomoya Uchihira and Morikazu Nakamura
92: An asynchronous P system with branch and bound for solving the subset sum problem
Kosei Nagao and Akihiro Fujiwara
98: A Proposal of Dynamic Job Scheduling Algorithm Considering CPU Core Utilization for User-PC Computing System
Ariel Kamoyedji, Nobuo Funabiki, Hein Htet and Minoru Kuribayashi
SUSCW
11: A Distributed Multi-group Mutual Exclusion Algorithm for Intersection Traffic Control
Hirotsugu Kakugawa and Sayaka Kamei
68: Speeding Up of CGRAs by Reshaping and Stochastic FMA
Tomoya Akabe, Renyuan Zhang and Yasuhiko Nakashima
87: Evaluation of the effect of ICT in education on the academic literacy of high school students
Yoshiomi Otsuka
102: Speech Signal Processing Using Consonant-Vowel Location Detection
Shusuke Nakazato and Nobuhiko Nakano
118: Weight Least Square Filter For Improving the Quality of Depth Map on FPGA
Renzhi Mao, Kaijie Wei, Hideharu Amano, Yuki Kuno and Masatoshi Arai
119: An Implementation of a World Grid Square Codes Generator on a RISC-V Processor
Rei Watanabe, Jubee Tada and Keiichi Sato
123: Analysis of Resistance Distribution and Voltage Drop in Chips with Inductive Coupling Wireless Communication Interface
Hideto Kayashima and Hideharu Amano
155: Recognizing HPC Workloads Based on Power Draw Signatures
Sven Köhler, Lukas Wenzel, Max Plauth, Pawel Böning, Philipp Gampe, Leonard Geier and Andreas Polze
WICS
2: A machine learning-based NIDS that collects training data from within the organization and updates the discriminator periodically and automatically
Hideya Sato and Ryotaro Kobayashi
12: Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC
Shuntaro Ema, Yuta Sato, Keita Emura and Toshihiro Ohigashi
17: Verification of the Effectiveness to Monitor Darknet across Multiple Organizations
Katsuya Nishijima, Takao Kondo, Tatsumi Hosokawa, Tomohiro Shigemoto, Nobutaka Kawaguchi, Hiroyuki Hasegawa, Hideyuki Honda, Yasuhito Suzuki, Tadashi Kaji and Osamu Nakamura
18: Effects of Data Sampling Interval on Accuracy of Authentication Using Wi-Fi Information Captured by Smartphone
Ryosuke Kobayashi and Rie Yamaguchi
26: Proposal and Evaluation of a Gesture Authentication Method with Peep Resistance for Smartwatches
Mirang Park, Kentaro Aburada and Naonobu Okazaki
30: Consideration of the side-channel attack to SIMON implemented on Arduino Uno
Harunobu Enami, Yuta Kodera, Takuya Kusaka and Yasuyuki Nogami
37: Applying The Attacks Tracer on Advanced Persistent Threats to Real Networks
Yuya Tajima and Hiroshi Koide
42: Consideration of the side-channel attack to SPECK implemented on Arduino Uno
Masaki Nakanose, Yuta Kodera, Takuya Kusaka and Yasuyuki Nogami
48: A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection
Seitaro Mishima, Kazuhisa Nakasho, Yuuki Takano and Atsuko Miyaji
60: Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication Function
Kaichi Sato and Satoshi Obana
65: KAKOI: A New Tool to Make Simple and Secure Build Cyber Ranges Using Public Cloud
Tomoya Terashima, Masahiro Nakayama, Teruaki Yokoyama and Hiroshi Koide
90: Improvement of Hybrid NIDS Using Deep Learning for Practical Use
Kentaro Takeshita and Michiko Harayama
99: FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices
Moeka Yamamoto, Shohei Kakei and Shoichi Saito
105: Evaluation of implementability in a malware detection mechanism using processor information
Mutsuki Deghuchi, Masahiko Katoh and Ryotaro Kobayashi
128: A New Higher Order Differential of Enocoro-128v2
Naoki Shibayama and Yasutaka Igarashi
130: Data augmentation of JavaScript dataset using DCGAN and random seed
Phung Minh Ngoc and Mimura Mamoru
132: Single-Round Lattice-based Multisignatures
Kittiphon Phalakarn, Vorapong Suppakitpaisarn and Anwar Hasan
134: Function for Tracing Diffusion of Classified Information to Support Multiple VMs with KVM
Kohei Otani, Toshiki Okazaki, Toshihiro Yamauchi, Hideaki Moriyama, Masaya Sato and Hideo Taniguchi
164: A Survey of the Offensive and Defensive in Industrial Control System
Kuan-Chu Lu, I-Hsien Liu and Jung-Shian Li
WANC
25: An FPGA-based Power-saving Particle Filter Using Dynamic Reconfiguration
Yuta Imamura, Shota Fukui, Taito Manabe and Yuichiro Shibata
32: Recognition of Multiple Rectangular Stickers for Construction Machines
Yuki Nakagawa, Shuichi Ohno and Shohei Yamamoto
39: Arranging resource amount after automatic GPU offloading
Yoji Yamato
71: Distributed Rewarding for Browser-Based P2P Video Streaming with Ethereum Blockchain
Yunqi Ma and Satoshi Fujita
78: Real-time execution based on fluid scheduling by using IPC control scheme
Atsushi Santo and Nobuyuki Yamasaki
85: Development of the Estimation Model for Intentions to Move Based on Gaze and Face Information with 1DCNN-LSTM and Evaluation of Electric Wheelchair Driving
Sho Higa, Koji Yamada and Shihoko Kamisato
96: Single and Ensemble CNN Models with Out-Category Penalty in Cifar10
Yuta Suzuki, Daiki Kuyoshi and Satoshi Yamane
106: Detection for Transient Patterns with Unpredictable Duration using Chebyshev Inequality and Dynamic Binning
Thanapol Phungtua-Eng, Yoshitaka Yamamoto and Shigeyuki Sako
108: Supporting Music Arrangement, Ringer Assignment, and Score Preparation for Musicbell Ensembles
Shumpei Miyake and Keita Ushida
110: Transparent Relational Database Caching Based on Storage Engines Using In-memory Database
Motoshi Miyamoto, Ryota Kawashima and Hiroshi Matsuo
117: Loss Function of GAN to Make a Clear Judgment
Kuniyasu Imade, Toi Tsuneda, Satoshi Yamane, Kousuke Shintani and Taro Kiriyama
133: Observation of Method Invocation in Application Runtime in Android for CPU Clock Rate Adjustment
Kota Kumakura, Atsuya Sonoyama, Takeshi Kamiyama, Masato Oguchi and Saneyasu Yamaguchi
152: Aggressiveness Controlable Block Level Cache
Riku Hirabayashi, Jose Fortes and Saneyasu Yamaguchi
153: Design and Evaluation of Escrow Scheme on Autonomous Vehicles for Overtaking Service with Ethereum
Siqi Zeng, Kosuke Kaneko, Yan Ke, Haowen Tan and Kouichi Sakurai
154: Thread-Aware Cache Simulator for HPC Application Tuning
Kazuki Chugo and Yukinori Sato
167: Learnability and expressibility of variational quantum circuit: VC and PAC-Bayesian theory
Chih-Chieh Chen, Masaya Watabe, Kodai Shiba, Masaru Sogabe, Katsuyoshi Sakamoto and Tomah Sogabe