default search action
7th CANDAR 2019: Nagasaki, Japan
- 2019 Seventh International Symposium on Computing and Networking, CANDAR 2019, Nagasaki, Japan, November 25-28, 2019. IEEE 2019, ISBN 978-1-7281-4725-3
Long Papers
- Tomoki Agematsu, Satoshi Obana:
Almost Optimal Cheating-Detectable (2, 2, n) Ramp Secret Sharing Scheme. 1-9 - Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi:
An Efficient MQ-Based Signature in the QROM. 10-17 - Masatoshi Hayashikawa, Koji Nakano, Yasuaki Ito, Ryota Yasudo:
Folded Bloom Filter for High Bandwidth Memory, with GPU Implementations. 18-27 - Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Célia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi:
Threat Analysis of Fake Virus Alerts Using WebView Monitor. 28-36 - Jiaxin Li, Xin Han:
Revised Pulse Algorithm for Elementary Shortest Path Problem with Resource Constraints. 37-44 - Cheng-Hsien Liu, Chang-Hsing Lee, Jau-Ling Shih, Chin-Chuan Han:
A Color Image Representation Approach for Content-Based Image Retrieval. 45-53 - Kazuichi Oe, Takeshi Nanri:
Hybrid Storage System to Achieve Efficient Use of Fast Memory Area. 63-72 - Paola Flocchini, Eman Omar, Nicola Santoro:
Effective Decentralized Energy Restoration by a Mobile Robot. 73-81 - Parikshit Saikia, Sushanta Karmakar:
2(1 - 1/ℓ)-Factor Steiner Tree Approximation in Õ(n^1/3) Rounds in the CONGESTED CLIQUE. 82-91 - Aizaz Sharif, Mohammad Nauman:
Function Identification in Android Binaries with Deep Learning. 92-101 - Daisuke Takafuji, Koji Nakano, Yasuaki Ito:
Efficient GPU Implementations to Compute the Diameter of a Graph. 102-111 - Dang Duy Thang, Toshihiro Matsui:
A Label-Based Approach for Automatic Identifying Adversarial Examples with Image Transformation. 112-120 - Tsuyoshi Yoshihara, Satoshi Fujita:
Fog-Assisted Virtual Reality MMOG with Ultra Low Latency. 121-129
Regular Papers
- Paulo Victor Gonçalves Farias, Jacir Luiz Bordim, Marcos Fagundes Caetano:
A Density-Based Congestion Avoidance Protocol for Strict Beaconing Requirements in VANETs. 130-136 - Yuki Hirayama, Tetsuya Asai, Masato Motomura, Shinya Takamaeda-Yamazaki:
A Resource-Efficient Weight Sampling Method for Bayesian Neural Network Accelerators. 137-142 - Ruochen Jiang, Jiamou Liu, Wu Chen:
How to Improve the Cohesion of a Social Network? A Structural Perspective. 143-149 - Nawras Khudhur, Satoshi Fujita:
Siva - The IPFS Search Engine. 150-156 - Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami:
Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box. 157-163 - Chia-Yin Liu, Hasitha Muthumala Waidyasooriya, Masanori Hariyama:
Data-Transfer-Bottleneck-Less Architecture for FPGA-Based Quantum Annealing Simulation. 164-170 - Taito Manabe, Koki Tomonaga, Yuichiro Shibata:
CNN Architecture for Surgical Image Segmentation Systems with Recursive Network Structure to Mitigate Overfitting. 171-177 - Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami:
A Performance Analysis and Evaluation of SIDH with Implementation-Friendly Classes of Quadratic Extension Fields. 178-184 - Hiroki Nishimoto, Takashi Nakada, Yasuhiko Nakashima:
GPGPU Implementation of Variational Bayesian Gaussian Mixture Models. 185-190 - Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki:
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings. 191-196 - Tomonobu Ozaki:
Extraction of Characteristic Subgraph Patterns with Support Threshold from Databases of Floor Plans. 197-203 - Chunrong Wu, Qinglan Peng, Yunni Xia, Jia Lee:
Mobility-Aware Tasks Offloading in Mobile Edge Computing Environment. 204-210 - Farhad Rasapour, Edoardo Serra, Hoda Mehrpouyan:
Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS). 211-217 - Yang Sun, Guan-Shen Fang, Sayaka Kamei:
A Tensor Factorization on Rating Prediction for Recommendation by Feature Extraction from Reviews. 218-224 - Yoshinori Uetake, Keiji Yoshimoto, Yuta Kodera, Leo Weissbart, Takuya Kusaka, Yasuyuki Nogami:
A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller. 225-231 - Hasitha Muthumala Waidyasooriya, Yasuaki Iimura, Masanori Hariyama:
Benchmarks for FPGA-Targeted High-Level-Synthesis. 232-238 - Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS. 239-244 - Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library. 245-250
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.