Abstract is missing.
- The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit DelayAndrew Feutrill, Dinesha Ranathunga, Yuval Yarom, Matthew Roughan. 1-10 [doi]
- Resilient Peer-to-Peer Video Streaming with a Guaranteed LatencySatoshi Fujita. 11-18 [doi]
- Data Pinning and Back Propagation Memory Optimization for Deep Learning on GPUCing-Fu Jhu, Pangfeng Liu, Jan-Jan Wu. 19-28 [doi]
- A Self-Stabilizing Algorithm for Constructing a Maximal (2, 2)-Directed Acyclic Mixed GraphYongHwan Kim, Hiroki Aono, Yoshiaki Katayama, Toshimitsu Masuzawa. 29-38 [doi]
- An Efficient Shortest Path Routing on the Hypercube with Blocking/Faulty NodesMehrdad Arabpour Niasari, Ke Qiu. 39-46 [doi]
- Hiding Communication of Essential Services by System Call ProxyYuuki Okuda, Masaya Sato, Hideo Taniguchi. 47-56 [doi]
- An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc CommunicationAmang Sudarsono, Mike Yuliana, Prima Kristalina, Ali Ridho Barakbah. 57-65 [doi]
- Efficient Byte Stream Pattern Test using Bloom Filter with Rolling Hash Functions on the FPGATakuma Wada, Naoki Matsumura, Koji Nakano, Yasuaki Ito. 66-75 [doi]
- Investigating the Effects of Dynamic Thread Team Size Adjustment for Irregular ApplicationsXiong Xiao, Mulya Agung, Muhammad Alfian Amrizal, Ryusuke Egawa, Hiroyuki Takizawa. 76-84 [doi]
- Detailed Instantiation of the Decentralized Multi-Authority Anonymous Authentication Scheme and Tighter Reduction for SecurityHiroaki Anada. 85-91 [doi]
- A Galindo-Garcia-Like Identity-Based Signature with Tight Security Reduction, RevisitedMasayuki Fukumitsu, Shingo Hasegawa. 92-98 [doi]
- k-Optimized Path Routing for High-Throughput Data Center NetworksRyuta Kawano, Ryota Yasudo, Hiroki Matsutani, Hideharu Amano. 99-105 [doi]
- A Comparative Implementation of GLV Technique on KSS-16 CurveMd. Al-Amin Khandaker, Yuki Nanjo, Takuya Kusaka, Yasuyuki Nogami. 106-112 [doi]
- A Fast Message-Delivery Mechanism to Support Broadcast in Vehicular Ad hoc NetworksTulio A. Lima, Paulo V. G. Farias, Marcos F. Caetano, Jacir Luiz Bordim. 113-119 [doi]
- Acquiring Nearly Optimal Peer Selection Strategy through Deep Q-NetworkTokihiro Naito, Satoshi Fujita. 120-125 [doi]
- Slow-Port-Exhaustion DoS Attack on Virtual Network Using Port Address TranslationSon Duc Nguyen, Mamoru Mimura, Hidema Tanaka. 126-132 [doi]
- Scheduling of Malleable Fork-Join Tasks with Constraint ProgrammingHiroki Nishikawa, Kana Shimada, Ittetsu Taniguchi, Hiroyuki Tomiyama. 133-138 [doi]
- A Prefix-Sum-Based Rabin-Karp Implementation for Multiple Pattern Matching on GPGPULucas Saad N. Nunes, Jacir Luiz Bordim, Yasuaki Ito, Koji Nakano. 139-145 [doi]
- Critical Node Identification Based on Articulation Point Detection for Network with Uncertain ConnectivityKouzou Ohara, Kazumi Saito, Masahiro Kimura, Hiroshi Motoda. 146-152 [doi]
- Evaluation Measures for Frequent Itemsets Based on Distributed RepresentationsTomonobu Ozaki. 153-159 [doi]
- Speeding Up Revocable Group Signature with Compact Revocation List Using Vector CommitmentsYasuyuki Seita, Toru Nakanishi. 160-166 [doi]
- A Template-Based Sub-Optimal Content Distribution for D2D Content Sharing NetworksTakayuki Shiroma, Celimuge Wu, Tsutomu Yoshinaga. 167-173 [doi]
- A CloudSim Extension for Evaluating Security Overhead in Workflow Execution in CloudsHenrique Yoshikazu Shishido, Júlio Cezar Estrella, Claudio Fabiano Motta Toledo, Stephan Reiff-Marganiec. 174-180 [doi]
- Hardware for Accelerating Anonymization Transparent to NetworkSoichiro Shohata, Yuichi Nakamura, Hiroaki Nishi. 181-187 [doi]
- A Construction of Fake QR Codes Based on Error-Correcting CodesMakoto Takita, Hiroya Okuma, Masakatu Morii. 188-193 [doi]
- drDRM: A PUF-Based Dynamically Reconfigurable DRM Mechanism for FPGA-Based PlatformTze Hon Tan, Chia Yee Ooi, Muhammad Nadzir Marsono. 194-200 [doi]
- A Semi-Automatic Video Labeling Tool for Autonomous Driving Based on Multi-Object Detector and TrackerBen-li Wang, Chung-Ta King, Hung-Kuo Chu. 201-206 [doi]
- A Proposal of New Reading Text CAPTCHA using Random Dot PatternsHisaaki Yamaba, Shotaro Usuzaki, Kentaro Aburada, Masayuki Mukunoki, Mirang Park, Naonobu Okazaki. 207-212 [doi]