2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)最新文献

筛选
英文 中文
Wandering Path Visualization System Prototype for Finding Wandering Elderly People Using BLE Beacon 利用BLE信标寻找流浪老人的漫游路径可视化系统原型
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00095
Tomoya Arakawa, Shun Shiramatsu, Akira Iwata
{"title":"Wandering Path Visualization System Prototype for Finding Wandering Elderly People Using BLE Beacon","authors":"Tomoya Arakawa, Shun Shiramatsu, Akira Iwata","doi":"10.1109/CANDARW.2018.00095","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00095","url":null,"abstract":"In this study, we focused on wandering behavior, which is one of symptoms of dementia patients, and developed a system for watching over such patients. In our proposed method, Bluetooth Low Energy (BLE) beacons were carried by elderly people with dementia. We installed fixed receivers in the town where we conducted this study. We visualized the wandering route by using the reception history of the BLE beacon that can be acquired from the fixed receiver. In this paper, we aimed to develop an interface that enables us to check the history of actions to narrow down the search range when an elderly person with dementia is missing. Also, by using this interface, his/her family and caregivers can check that an elderly person with dementia is in a safe place. Particularly, (1) because the signal range of the BLE beacon has been improved, it became possible for some fixed receivers to receive signal, and this solved the problem of detecting an elderly person with dementia in the vicinity. Furthermore, (2) merely displaying the shortest route is insufficient for the purpose of searching for a wandering route, and it was necessary to be able to display detour routes. To deal with these two problems, we developed a method to acquire only the reception history of the BLE beacon that is considered necessary for route visualization.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134266500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding 基于自动阈值的SDN分布式网络攻击检测
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00083
Ryousuke Komiya, Yaokai Feng, K. Sakurai
{"title":"Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding","authors":"Ryousuke Komiya, Yaokai Feng, K. Sakurai","doi":"10.1109/CANDARW.2018.00083","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00083","url":null,"abstract":"Distributed Cyber Attack launched from many hosts simultaneously has become one of the most sophisticated and the most dangerous attacks in the cyber world including the traditional Internet and the SDN (Software Defined Networking) environments. As a kind of centralized network environment, the SDN has been greatly developed and popularized in recent years, especially in cloud systems. Thus, how to efficiently detect distributed attacks in SDN environments has attracted great attentions in academia and industry and various researches have been done to counter such attacks. The latest related researches made attempts to exploit the information of the PacketIn packets collected in the SDN controller and those methods proved efficient for detecting distributed cyber attacks in SDN environments. However, such methods adopted a threshold for distinguishing between attacks and normal situations. The threshold must be properly determined manually in advance, which is not easy in many applications even for experts. In this study, we try to automatically extract a proper threshold from the historical data of the monitored SDN environment so that the difficult parameter-tuning (determination of the threshold) process can be removed. In addition, because the extracted threshold can well reflect the actual situations of the monitored environment, a better detection performance than the existing approaches can be expected. The detection performance of our proposal is also tested using real traffic data.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131439237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preconditioner Auto-Tuning Using Deep Learning for Sparse Iterative Algorithms 基于深度学习的稀疏迭代算法预调节器自动调谐
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00055
Kenya Yamada, T. Katagiri, H. Takizawa, K. Minami, M. Yokokawa, Toru Nagai, M. Ogino
{"title":"Preconditioner Auto-Tuning Using Deep Learning for Sparse Iterative Algorithms","authors":"Kenya Yamada, T. Katagiri, H. Takizawa, K. Minami, M. Yokokawa, Toru Nagai, M. Ogino","doi":"10.1109/CANDARW.2018.00055","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00055","url":null,"abstract":"In numerical libraries for sparse matrix operations, there are many tuning parameters related to implementation selection. Selection of different tuning parameters could result in totally different performance. Moreover, optimal implementation depends on the sparse matrices to be operated. It is difficult to find optimal implementation without executing each implementation and thereby examining its performance on a given sparse matrix. In this study, we propose an implementation selection method for sparse iterative algorithms and preconditioners in a numerical library using deep learning. The proposed method uses full color images to represent the features of a sparse matrix. We present an image generation method for partitioning a given matrix (to generate its feature image) so that the value of each matrix element is considered in the implementation selection. We then evaluate the effectiveness of the proposed method by conducting a numerical experiment. In this experiment, the accuracy of implementation selection is evaluated. The training data comprise a pair of sparse matrix and its optimal implementation. The optimal implementation of each sparse matrix in the training data is obtained in advance by executing every implementation and getting the best one. The experimental results obtained using the proposed method show that the accuracy of selecting the optimal implementation of each sparse matrix is 79.5%.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132868056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory 考虑释放内存的大小和数量,使用库来缓解释放后使用攻击
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00080
Yuya Ban, Toshihiro Yamauchi
{"title":"Mitigating Use-after-Free Attack Using Library Considering Size and Number of Freed Memory","authors":"Yuya Ban, Toshihiro Yamauchi","doi":"10.1109/CANDARW.2018.00080","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00080","url":null,"abstract":"Use-after-free (UAF) vulnerabilities, are abused by exploiting a dangling pointer that refers to a freed memory, location and then executing arbitrary code. Vulnerabilities are caused by bugs in software programs, particularly large scale programs such as browsers. We had previously proposed HeapRevolver, which prohibits freed memory area from being reused for a certain period. HeapRevolver on Windows uses the number of freed memory areas that are prohibited for reuse as a trigger to release the freed memory area. Alternatively, HeapRevolver uses the number of the freed memory areas as a threshold for releasing freed memory. However, when the size of individual freed memory area is large, HeapRevolver on Windows increases the memory overhead. In this paper, we propose an improved HeapRevolver for Windows considering the size and number of the freed memory areas. The improved HeapRevolver prohibits the reuse of a certain number of freed memory areas at a given time by considering the size and number of freed memory areas as thresholds. Evaluation results demonstrate that the improved HeapRevolver can prevent attacks that exploit UAF vulnerabilities. Particularly, when the size of individual freed memory area is small in a program, HeapRevolver is effective in decreasing the attack success rate.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tile Art Image Generation Using Conditional Generative Adversarial Networks 使用条件生成对抗网络的图像生成
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00047
Naoki Matsumura, Hiroki Tokura, Yuki Kuroda, Yasuaki Ito, K. Nakano
{"title":"Tile Art Image Generation Using Conditional Generative Adversarial Networks","authors":"Naoki Matsumura, Hiroki Tokura, Yuki Kuroda, Yasuaki Ito, K. Nakano","doi":"10.1109/CANDARW.2018.00047","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00047","url":null,"abstract":"Image-to-image translation is a task of mapping an image in one domain to a corresponding image in another domain. The task includes various types of problems such as super-resolution, colorization, and artistic style transfer. In recent years, with the advent of deep learning, the technology has been rapidly advanced. The main purpose of this paper is to propose a tile art image generation method using machine learning approach based on conditional generative adversarial networks. To make the training data set of tile art images, we adopted a square-pointillism image generation method using the greedy approach. After training, the proposed network can generate tile art images that have the structure of tiles and reproduce the original images well. As regards generating time, the greedy approach takes 1322 seconds to generate tile art image of size 4096x3072, while the proposed machine learning approach takes 0.593 seconds.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114314317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Application of an Online Questionnaire to Secure the Diversity of Planungszelle Participant Attributes 在线问卷的应用,以确保计划参与者属性的多样性
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00075
Yoshiomi Otsuka, T. Aramaki
{"title":"Application of an Online Questionnaire to Secure the Diversity of Planungszelle Participant Attributes","authors":"Yoshiomi Otsuka, T. Aramaki","doi":"10.1109/CANDARW.2018.00075","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00075","url":null,"abstract":"Planungszelle (PZ) has attracted attention as a new consensus formation method. One of the core features of PZ is random sampling of participants, aimed at securing the diversity of participant attributes. In this research, a method for selecting participants that ensures the diversity of their attributes was developed through an online questionnaire on PZ implementation to discuss the future of a sustainable water use system. To select PZ participants, we carried out a screening survey with registered monitors and asked candidates about their willingness to participate, as well as collected the demographics and psychographics of monitors. Participation requests were sent by e-mail, controlled by real-time monitoring with the demographics and psychographics information of candidates. This method enables the PZ organizer to easily control participant selection and reduces lead-time by a factor of ten in comparison with the traditional mail method.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114712005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Performance of Transposition Algorithm of 3-D Data Array for Parallelization Using Message Passing Interface 利用消息传递接口提高并行化三维数据阵列转置算法的性能
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00094
Masahiro Arai, F. Akagi, Saneyasu Yamaguchi, K. Yoshida
{"title":"Improving Performance of Transposition Algorithm of 3-D Data Array for Parallelization Using Message Passing Interface","authors":"Masahiro Arai, F. Akagi, Saneyasu Yamaguchi, K. Yoshida","doi":"10.1109/CANDARW.2018.00094","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00094","url":null,"abstract":"Parallelization with a message passing interface (MPI) is useful for improving the performance of the LLG micromagnetics simulator used for analysis of magnetization behavior. However, it is necessary to transpose elements of 3-D data arrays to be consistent in the data. In this paper, we investigated two methods for improving the performance of the transpose processes. One divides 6-transpose-processes in a triple for loop into 6-triple for loops. The other transposes the elements of the 3-D data arrays in each process before the data is integrated by using MPI_Allgather(). We compared the effects of the two methods on improving performances on two supercomputers: Oakforest-PACS and Reedbush-U. The results show that the former method was only effective on Oakforest-PACS, but the latter method was effective on both computers.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115546866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DHT Clustering for Load Balancing Considering Blockchain Data Size 考虑区块链数据大小的负载均衡DHT聚类
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00022
Yudai Kaneko, T. Asaka
{"title":"DHT Clustering for Load Balancing Considering Blockchain Data Size","authors":"Yudai Kaneko, T. Asaka","doi":"10.1109/CANDARW.2018.00022","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00022","url":null,"abstract":"Blockchain technology which is the fundamental system of Bitcoin running on a peer-to-peer (P2P) network, has attracted a lot of attention. This enables a practical P2P electronic money system with Byzantine fault tolerance and stability with all participating nodes having the same transaction ledger and using a distributed consensus algorithm called Proof of Work (PoW) that performs calculation work called mining. Many studies have proposed methods of enhancing scalability in terms of transaction processing of blockchain, however few studies have proposed them in term of network load in a P2P network architecture. To solve these problems, we propose a method in which all nodes are separated into mining nodes in a pure P2P network and blockchain data having nodes in a distributed hash table (DHT) network. Kademlia is incorporated as DHT network for processing responsible blocks' data for each node cluster and broadcasting efficiently. The results of a broadcast simulation show that our method improved the redundancy rate and average number of messages in the networks.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of an Incentive Decision Method for an Agriculture Information Sharing System 农业信息共享系统的激励决策方法设计
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00103
Joji Toshima, Akiko Takahashi
{"title":"Design of an Incentive Decision Method for an Agriculture Information Sharing System","authors":"Joji Toshima, Akiko Takahashi","doi":"10.1109/CANDARW.2018.00103","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00103","url":null,"abstract":"In Japan, agriculture is facing a crisis due to the aging of farmers and the shortage of successors. In addition, there is much work in agriculture based on know-how that new farmers cannot get easily; therefore, some new farmers give up farming after a few years. Consequently, it is necessary to share the know-how with new farmers. However, it is difficult to positively share the know-how due to the difficulty of verbalizing the know-how. Therefore, it is necessary to provide the know-how providers with an incentive. In this paper, we propose an incentive decision method using auto-negotiation while considering the intentions of the know-how providers. This method consists of agents that have utility functions, which express the intentions of farmers and a service. The performances of our method are investigated by simulation experiments. Specifically, we verify that the method collects more high-quality know-how while giving a lower incentive. Our results indicate that the proposed method better performs compared to the other simple methods we assume in the experiments.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121348233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incentive Driving Multipath Inter-Domain Routing 激励驱动多路径域间路由
2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW) Pub Date : 2018-11-01 DOI: 10.1109/CANDARW.2018.00067
Donghong Qin, Lina Ge, Ting Lv
{"title":"Incentive Driving Multipath Inter-Domain Routing","authors":"Donghong Qin, Lina Ge, Ting Lv","doi":"10.1109/CANDARW.2018.00067","DOIUrl":"https://doi.org/10.1109/CANDARW.2018.00067","url":null,"abstract":"To deploy multipath inter-domain routing, this paper tries to integrate our designed incentive mechanism into multipath inter-domain routing and propose an Incentive Driving Multi-path Inter-domain Routing scheme (IDMIR). Under the incentive mechanism, it can collect the path-let information from the selected nodes from the feasible BGP paths and build a scale-limited topology to compute the special routes. Meanwhile, it can adjust the protocol performance by configuring the path-let visibility degree (R) and topological nodes size (N). The simulation results demonstrate that IDMIR has strong path discovery capability with reasonable overhead.","PeriodicalId":329439,"journal":{"name":"2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124321740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信