IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Dependable Computing (DC)  (Searched in: 2012)

Search Results: Keywords 'from:2012-08-02 to:2012-08-02'

[Go to Official DC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 27  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
DC, CPSY
(Joint)
2012-08-03
09:00
Tottori Torigin Bunka Kaikan *
Hideyuki Jitsumoto (Tokyo University) DC2012-17
(To be available after the conference date) [more] DC2012-17
pp.1-5
DC, CPSY
(Joint)
2012-08-03
09:30
Tottori Torigin Bunka Kaikan Fault Tolerance Evaluation for Object Search Protocol in Structured P2P network "Chord"
Tomoki Endoh, Ippei Ozawa, Masayuki Arai, Satoshi Fukumoto (Shutodai) DC2012-18
This paper discusses the influence of unavailable nodes in the object lookup protocol of structured P2P network ``Chord'... [more] DC2012-18
pp.7-12
DC, CPSY
(Joint)
2012-08-03
10:00
Tottori Torigin Bunka Kaikan A Report on Secondary Risk Assurance for Practical Web-service
Shinpei Nakata, Motoki Youan, Midori Sugaya, Shuichi Yamamoto, Kimio Kuramitsu (Yokokoku) DC2012-19
 [more] DC2012-19
pp.13-18
DC, CPSY
(Joint)
2012-08-03
10:45
Tottori Torigin Bunka Kaikan [Invited Talk] Dependability and Energy Efficiency of a Cloud Center
Haruo Yokota (Tokyo Tech) DC2012-20
The recent trend of the cloud indicates that computational-resource consolidation with the virtualization technique is e... [more] DC2012-20
pp.19-22
DC, CPSY
(Joint)
2012-08-02
13:30
Tottori Torigin Bunka Kaikan Effect of Loop Unrolling for Two-Path Limited Speculation Method
Yuki Homma, Hiroyoshi Jutori, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota, Takanobu Baba (Utsunomiya Univ.) CPSY2012-9
Our Two-Path Limited Speculation system PALS speculatively executes one of the top two paths of high frequency in loops.... [more] CPSY2012-9
pp.1-6
DC, CPSY
(Joint)
2012-08-02
14:00
Tottori Torigin Bunka Kaikan Consideration of Loop Path Predictors based on Branch Prediction Methods
Kazuhiro Kinkai, Hiroyoshi Jutori, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota, Takanobu Baba (Utsunomiya Univ.) CPSY2012-10
Execution path ratio is mostly dominated by up to two execution paths in program loops. We consider the Two-Path Limited... [more] CPSY2012-10
pp.7-12
DC, CPSY
(Joint)
2012-08-02
14:30
Tottori Torigin Bunka Kaikan Application Authentication System on Untrusted OS
Tsuyoshi Yamada, Masahiro Goshima, Shuichi Sakai (UT) CPSY2012-11
In order to prevent the information which an application deal from leakage, it is necessary to verify that following thr... [more] CPSY2012-11
pp.13-18
DC, CPSY
(Joint)
2012-08-02
15:15
Tottori Torigin Bunka Kaikan A Study of Emulator Oriented Small CPU for Realizing Film Computers
Yasuhiko Nakashima (NAIST) CPSY2012-12
This paper assumes an new material such as IGZO which is one of the
promising devices in the near future but still requ... [more]
CPSY2012-12
pp.19-24
DC, CPSY
(Joint)
2012-08-02
15:45
Tottori Torigin Bunka Kaikan *
Ryosuke Yamanaka, Jun Yao, Yasuhiko Nakashima (NAIST) CPSY2012-13
 [more] CPSY2012-13
pp.25-30
DC, CPSY
(Joint)
2012-08-02
16:15
Tottori Torigin Bunka Kaikan Co-processor of a low power accelerator CMA
Mai Izawa, Nobuaki Ozaki, Yusuke Koizumi, Rie Uno, Hideharu Amano (Keio Univ.) CPSY2012-14
Cool Mega-Array (CMA) is a novel high performance but low power reconfigurable accelerator consisting of a large PE(Proc... [more] CPSY2012-14
pp.31-36
DC, CPSY
(Joint)
2012-08-02
17:00
Tottori Torigin Bunka Kaikan An Optimal Parallel Prefix-sums Algorithm on the Memory Machine Models for GPUs
Koji Nakano (Hiroshima Univ.) CPSY2012-15
The main contribution of this paper is to show optimal algorithms
computing the sum and the prefix-sums on two memory m... [more]
CPSY2012-15
pp.37-42
DC, CPSY
(Joint)
2012-08-02
17:30
Tottori Torigin Bunka Kaikan Proposal of performance model for block ciphers using GPGPU
Naoki Nishikawa, Keisuke Iwai, Takakazu Kurokawa (NDA) CPSY2012-16
In this paper, we present a prototype of performance model of block ciphers using GPGPU whose encryption latency is read... [more] CPSY2012-16
pp.43-48
DC, CPSY
(Joint)
2012-08-02
18:00
Tottori Torigin Bunka Kaikan An Automatic Device Memory Allocation Method for OpenMPC
Hiroaki Uchiyama, Tomoaki Tsumura, Hiroshi Matsuo (Nagoya Inst. of Tech.) CPSY2012-17
The CUDA programming model provides better abstraction for GPU programming. However, it is still hard to build program b... [more] CPSY2012-17
pp.49-54
DC, CPSY
(Joint)
2012-08-03
09:00
Tottori Torigin Bunka Kaikan Implementation of the circuit division for High-Level Synthesis
Daiki Kugami, Takaaki Miyajima, Hideharu Amano (Keio Univ.) CPSY2012-18
High-Level Synthesis has been researched and developed for these 20
years. Not only ASIC, but also reconfigurable devic... [more]
CPSY2012-18
pp.55-60
DC, CPSY
(Joint)
2012-08-03
09:30
Tottori Torigin Bunka Kaikan A development scheduling simulater for reconfiguable system
Takashige Uda, Morihiro Kuga, Motoki Amagasaki, Masahiro Iida, Toshinori Sueyoshi (Kumamoto Univ.) CPSY2012-19
Reconfigurable Computing Systems (RC Systems) are used to high-speed applications processing. We have investigating the ... [more] CPSY2012-19
pp.61-66
DC, CPSY
(Joint)
2012-08-03
10:00
Tottori Torigin Bunka Kaikan A Method to Enhance Throughput in A Multi-Tasking Environment on A Server with Many-Core Accelerators
Takamichi Miyamoto, Kazuhisa Ishizaka, Takeo Hosomi, Junji Sakai (NEC) CPSY2012-20
On a server with a many-core accelerator, it is important to utilize all resources on the host processor and the acceler... [more] CPSY2012-20
pp.67-72
DC, CPSY
(Joint)
2012-08-03
10:45
Tottori Torigin Bunka Kaikan Automatic CPU-GPU Parallelization for Pseudo Realtime Video Processing Library RaVioli
Shinji Ohira, Tomoaki Tsumura, Hiroshi Matsuo (Nagoya Inst. of Tech.) CPSY2012-21
Realtime video processing applications, such as intruder detection system, are now in demand and being developed. Howeve... [more] CPSY2012-21
pp.73-78
DC, CPSY
(Joint)
2012-08-03
11:15
Tottori Torigin Bunka Kaikan Evaluation of Multi-GPU System with ExpEther
Shimpei Nomura, Tetsuya Nakahama (Keio Univ.), Junichi Higuchi, Jun Suzuki, Takashi Yoshikawa (NEC), Hideharu Amano (Keio Univ.) CPSY2012-22
Clusters with GPUs become widespread because they provide high peak performance and good performance per cost. However, ... [more] CPSY2012-22
pp.79-84
DC, CPSY
(Joint)
2012-08-03
11:45
Tottori Torigin Bunka Kaikan A Discussion for Acceleration of Ray Tracing Algorithms for Lighting Simulation on Several Parallel Computing Environments
Yuki Kurano, Masato Yoshimi, Mitsunori Miki, Tomoyuki Hiroyasu (Doshisha Univ.) CPSY2012-23
 [more] CPSY2012-23
pp.85-90
DC, CPSY
(Joint)
2012-08-03
14:00
Tottori Torigin Bunka Kaikan TCP congestion control algorithm using a perceptron
Junnosuke Kuroda, Naoki Tanida, Kei Hiraki (Univ. of Tokyo) CPSY2012-24
 [more] CPSY2012-24
pp.91-96
 Results 1 - 20 of 27  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan