Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC, CPSY (Joint) |
2012-08-03 09:00 |
Tottori |
Torigin Bunka Kaikan |
* Hideyuki Jitsumoto (Tokyo University) DC2012-17 |
(To be available after the conference date) [more] |
DC2012-17 pp.1-5 |
DC, CPSY (Joint) |
2012-08-03 09:30 |
Tottori |
Torigin Bunka Kaikan |
Fault Tolerance Evaluation for Object Search Protocol in Structured P2P network "Chord" Tomoki Endoh, Ippei Ozawa, Masayuki Arai, Satoshi Fukumoto (Shutodai) DC2012-18 |
This paper discusses the influence of unavailable nodes in the object lookup protocol of structured P2P network ``Chord'... [more] |
DC2012-18 pp.7-12 |
DC, CPSY (Joint) |
2012-08-03 10:00 |
Tottori |
Torigin Bunka Kaikan |
A Report on Secondary Risk Assurance for Practical Web-service Shinpei Nakata, Motoki Youan, Midori Sugaya, Shuichi Yamamoto, Kimio Kuramitsu (Yokokoku) DC2012-19 |
[more] |
DC2012-19 pp.13-18 |
DC, CPSY (Joint) |
2012-08-03 10:45 |
Tottori |
Torigin Bunka Kaikan |
[Invited Talk]
Dependability and Energy Efficiency of a Cloud Center Haruo Yokota (Tokyo Tech) DC2012-20 |
The recent trend of the cloud indicates that computational-resource consolidation with the virtualization technique is e... [more] |
DC2012-20 pp.19-22 |
DC, CPSY (Joint) |
2012-08-02 13:30 |
Tottori |
Torigin Bunka Kaikan |
Effect of Loop Unrolling for Two-Path Limited Speculation Method Yuki Homma, Hiroyoshi Jutori, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota, Takanobu Baba (Utsunomiya Univ.) CPSY2012-9 |
Our Two-Path Limited Speculation system PALS speculatively executes one of the top two paths of high frequency in loops.... [more] |
CPSY2012-9 pp.1-6 |
DC, CPSY (Joint) |
2012-08-02 14:00 |
Tottori |
Torigin Bunka Kaikan |
Consideration of Loop Path Predictors based on Branch Prediction Methods Kazuhiro Kinkai, Hiroyoshi Jutori, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota, Takanobu Baba (Utsunomiya Univ.) CPSY2012-10 |
Execution path ratio is mostly dominated by up to two execution paths in program loops. We consider the Two-Path Limited... [more] |
CPSY2012-10 pp.7-12 |
DC, CPSY (Joint) |
2012-08-02 14:30 |
Tottori |
Torigin Bunka Kaikan |
Application Authentication System on Untrusted OS Tsuyoshi Yamada, Masahiro Goshima, Shuichi Sakai (UT) CPSY2012-11 |
In order to prevent the information which an application deal from leakage, it is necessary to verify that following thr... [more] |
CPSY2012-11 pp.13-18 |
DC, CPSY (Joint) |
2012-08-02 15:15 |
Tottori |
Torigin Bunka Kaikan |
A Study of Emulator Oriented Small CPU for Realizing Film Computers Yasuhiko Nakashima (NAIST) CPSY2012-12 |
This paper assumes an new material such as IGZO which is one of the
promising devices in the near future but still requ... [more] |
CPSY2012-12 pp.19-24 |
DC, CPSY (Joint) |
2012-08-02 15:45 |
Tottori |
Torigin Bunka Kaikan |
* Ryosuke Yamanaka, Jun Yao, Yasuhiko Nakashima (NAIST) CPSY2012-13 |
[more] |
CPSY2012-13 pp.25-30 |
DC, CPSY (Joint) |
2012-08-02 16:15 |
Tottori |
Torigin Bunka Kaikan |
Co-processor of a low power accelerator CMA Mai Izawa, Nobuaki Ozaki, Yusuke Koizumi, Rie Uno, Hideharu Amano (Keio Univ.) CPSY2012-14 |
Cool Mega-Array (CMA) is a novel high performance but low power reconfigurable accelerator consisting of a large PE(Proc... [more] |
CPSY2012-14 pp.31-36 |
DC, CPSY (Joint) |
2012-08-02 17:00 |
Tottori |
Torigin Bunka Kaikan |
An Optimal Parallel Prefix-sums Algorithm on the Memory Machine Models for GPUs Koji Nakano (Hiroshima Univ.) CPSY2012-15 |
The main contribution of this paper is to show optimal algorithms
computing the sum and the prefix-sums on two memory m... [more] |
CPSY2012-15 pp.37-42 |
DC, CPSY (Joint) |
2012-08-02 17:30 |
Tottori |
Torigin Bunka Kaikan |
Proposal of performance model for block ciphers using GPGPU Naoki Nishikawa, Keisuke Iwai, Takakazu Kurokawa (NDA) CPSY2012-16 |
In this paper, we present a prototype of performance model of block ciphers using GPGPU whose encryption latency is read... [more] |
CPSY2012-16 pp.43-48 |
DC, CPSY (Joint) |
2012-08-02 18:00 |
Tottori |
Torigin Bunka Kaikan |
An Automatic Device Memory Allocation Method for OpenMPC Hiroaki Uchiyama, Tomoaki Tsumura, Hiroshi Matsuo (Nagoya Inst. of Tech.) CPSY2012-17 |
The CUDA programming model provides better abstraction for GPU programming. However, it is still hard to build program b... [more] |
CPSY2012-17 pp.49-54 |
DC, CPSY (Joint) |
2012-08-03 09:00 |
Tottori |
Torigin Bunka Kaikan |
Implementation of the circuit division for High-Level Synthesis Daiki Kugami, Takaaki Miyajima, Hideharu Amano (Keio Univ.) CPSY2012-18 |
High-Level Synthesis has been researched and developed for these 20
years. Not only ASIC, but also reconfigurable devic... [more] |
CPSY2012-18 pp.55-60 |
DC, CPSY (Joint) |
2012-08-03 09:30 |
Tottori |
Torigin Bunka Kaikan |
A development scheduling simulater for reconfiguable system Takashige Uda, Morihiro Kuga, Motoki Amagasaki, Masahiro Iida, Toshinori Sueyoshi (Kumamoto Univ.) CPSY2012-19 |
Reconfigurable Computing Systems (RC Systems) are used to high-speed applications processing. We have investigating the ... [more] |
CPSY2012-19 pp.61-66 |
DC, CPSY (Joint) |
2012-08-03 10:00 |
Tottori |
Torigin Bunka Kaikan |
A Method to Enhance Throughput in A Multi-Tasking Environment on A Server with Many-Core Accelerators Takamichi Miyamoto, Kazuhisa Ishizaka, Takeo Hosomi, Junji Sakai (NEC) CPSY2012-20 |
On a server with a many-core accelerator, it is important to utilize all resources on the host processor and the acceler... [more] |
CPSY2012-20 pp.67-72 |
DC, CPSY (Joint) |
2012-08-03 10:45 |
Tottori |
Torigin Bunka Kaikan |
Automatic CPU-GPU Parallelization for Pseudo Realtime Video Processing Library RaVioli Shinji Ohira, Tomoaki Tsumura, Hiroshi Matsuo (Nagoya Inst. of Tech.) CPSY2012-21 |
Realtime video processing applications, such as intruder detection system, are now in demand and being developed. Howeve... [more] |
CPSY2012-21 pp.73-78 |
DC, CPSY (Joint) |
2012-08-03 11:15 |
Tottori |
Torigin Bunka Kaikan |
Evaluation of Multi-GPU System with ExpEther Shimpei Nomura, Tetsuya Nakahama (Keio Univ.), Junichi Higuchi, Jun Suzuki, Takashi Yoshikawa (NEC), Hideharu Amano (Keio Univ.) CPSY2012-22 |
Clusters with GPUs become widespread because they provide high peak performance and good performance per cost. However, ... [more] |
CPSY2012-22 pp.79-84 |
DC, CPSY (Joint) |
2012-08-03 11:45 |
Tottori |
Torigin Bunka Kaikan |
A Discussion for Acceleration of Ray Tracing Algorithms for Lighting Simulation on Several Parallel Computing Environments Yuki Kurano, Masato Yoshimi, Mitsunori Miki, Tomoyuki Hiroyasu (Doshisha Univ.) CPSY2012-23 |
[more] |
CPSY2012-23 pp.85-90 |
DC, CPSY (Joint) |
2012-08-03 14:00 |
Tottori |
Torigin Bunka Kaikan |
TCP congestion control algorithm using a perceptron Junnosuke Kuroda, Naoki Tanida, Kei Hiraki (Univ. of Tokyo) CPSY2012-24 |
[more] |
CPSY2012-24 pp.91-96 |