International Journal of Networked and Distributed Computing

+ Advanced search
206 articles
Research Article

Accelerating NTRU Encryption with Graphics Processing Units

Tianyu Bai, Spencer Davis, Juanjuan Li, Ying Gu, Hai Jiang
Pages: 250 - 258
Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/ decryption process. However, the Big Data issue has perplexed most lattice based cryptographic systems since the overall processing is slowed down too much. This paper intends to analyze one of the...
Research Article

P2P Traffic Localization by Forcing Packet Loss

Hiep Hoang-Van, Koki Mizutani, Takumi Miyoshi, Olivier Fourmaux
Pages: 251 - 259
Recently, peer-to-peer (P2P) traffic is increasing rapidly in volume day by day. One of the main causes is that most of P2P applications including file sharing and streaming applications often form overlay networks for exchanging data that are oblivious to the underlay network topology. As a result,...
Research Article

Pedestrian Detection by Fusing 3D Points and Color Images

Ben-Zhong Lin, Chien-Chou Lin
Pages: 252 - 257
In this paper, a fusing approach of a 3D sensor and a camera are used to improve the reliability of pedestrian detection. The proposed pedestrian detecting system adopts DBSCAN to cluster 3D points and projects the candidate clusters onto images as region of interest (ROI). Those ROIs are detected by...
Research Article

Brain Activity Measurement during Program Comprehension with NIRS

Yoshiharu Ikutani, Hidetake Uwano
Pages: 259 - 268
Near infrared spectroscopy (NIRS) has been used as a low cost, noninvasive method to measure brain activity. In this paper, we experiment to measure the effects of variables and controls in a source code to brain activity during program comprehension. The measurement results are evaluated after noise...
Research Article

Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS system part-I)

Kazuya Odagiri, Shogo Shimizu, Makoto Takizawa, Naohiro Ishii
Pages: 260 - 269
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...
Research Article

A Pruning Algorithm for Reverse Nearest Neighbors in Directed Road Networks

Rizwan Qamar, Muhammad Attique, Tae-Sun Chung
Pages: 261 - 272
In this paper, we studied the problem of continuous reverse k nearest neighbors (RkNN) in directed road network, where a road segment can have a particular orientation. A RNN query returns a set of data objects that take query point as their nearest neighbor. Although, much research has been done for...