WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
|
|
- うまじ たけすえ
- 5 years ago
- Views:
Transcription
1 26 WebRTC The data distribution system using browser cache sharing and WebRTC /02/27
2 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
3 Abstract The data distribution system using browser cache sharing and WebRTC Kazuki Matsushita In recent years, broadband connections to the Internet environment have spread, thus traffic delivery and the retrieval of large-volume content such as videos have soared. P2P Web Proxy is present as an existing technique for solving the problem. However, it is difficult to use for client because it has two problems. It is a problem of retaining the cache after download of the content, a problem that it is necessary to open the port toward the outside. In this paper, by using technologies of browser plug-in and WebRTC to propose a system which solves the aforementioned problems. And implement as browser cache sharing system using WebRTC. key words Web, HTTP, WebRTC, P2P ii
4 Web Web Proxy P2P Web Proxy WebRTC Web WebRTC iii
5 17 iv
6 2.1 P2P Web Proxy v
7 vi
8 1 [1] [2] HTTP P2P Web Proxy P2P Web Proxy HTTP P2P P2P Web Proxy P2P WebRTC P2P Web Proxy 1
9 2 Web P2P Web Web Web Web Web P2P Web WebRTC 2.1 Web Web Web Web Web 2.2 Web Proxy Web Proxy HTTP HTTP Web Proxy Web Proxy 2
10 2.3 P2P Web Proxy Web Proxy Web Proxy Web Proxy Web Proxy 2.3 P2P Web Proxy P2P Web Proxy 2.2 Web Proxy P2P Web Proxy ( 2.1) P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy 2.4 WebRTC WebRTC (Web Real-Time Communication) W3C (World Wide Web Consortium) [3] WebRTC WebRTC P2P NAT STUN UDP WebRTC Google Chrome Firefox 3
11 2.4 WebRTC Web サーバー Web コンテンツ P2P Web Proxy P2P Web Proxy P2P Web Proxy P2P ネットワーク Web ブラウザ Web ブラウザ 2.1 P2P Web Proxy 4
12 3 2.3 P2P Web Proxy P2P HTTP P2P WebRTC [3] 3.1 PC ( 3.1) HTTP HTTP 5
13 3.2 クライアント (A) ウェブサーバー クライアント (B) クライアント (C) シグナリングサーバー Web Web Web 3.3 WebRTC [3] 6
14 3.4 Google Chrome プラグインウェブサーバーシグナリングサーバ他ピア (1) (2) (3) (4) (5) コンテンツ (HTTP) コンテンツ (WebRTC) シグナリング (HTTP) Web Web 3.4 HTTP WebRTC 1. HTTP ( 3.2 (1)) Web HTTP Web 7
15 3.4 ( ) 2. ( 3.2 (2)) HTTP Web 3. ( 3.2 (2)) (2) 4. Web ( 3.2 (4)) Web Web 5. ( 3.2 (5)) (4) WebRTC Web 8
16 ピア 1 ピア 2 中継終了 サーバーから取得済 他ピアから取得済 Google Chrome Google Chrome ( 4.1) Google Chrome CPU 9
17 4.1 クライアント サーバ 通常の HTTP 通信 転送される通信 ブラウザ ウェブページ Location ヘッダ挿入による転送 内部 HTTP コネクション 内部 HTTP サーバ WebRTC による他ピアとの通信 Google Chrome Google Chrome JavaScript Google Chrome V8 JavaScript TypeScript JavaScript Web HTTP ( 4.2) Web Google Chrome API Web Web API 10
18 Web HTTP Web P2P: on Web Web P2P-WebRTC P2P-WebRTC: PeerJS peerjs api localhost:1337 P2P-WebRTC 3 1 ID P2P-WebRTC ID PeerJS ID PeerJS WebRTC IP ID ID PeerJS ID 3 P2P-WebRTC 11
19 4.1 Web Web Web Web Web WebRTC Web WebRTC Web WebRTC WebRTC 3 JSON TypeScript 12
20 4.2 interface PeerjsDataConnectionMessage { hadblocks?: boolean[]; blocknumber?: number; blockdata?: ArrayBuffer; } 4.1 hadblocks blocknumber blockdata 4.2 API REST (Representational State Transfer) API Node.js API API API HTTP JSON 13
21 4.2 14
22 5 P2P Web Proxy P2P Web Proxy WebRTC Web Web HTTP WebRTC P2P Web Proxy 3 WebRTC 3 15
23 ,,,, 16
24 [1], 25, johotsusintokei/whitepaper/ja/h25/z. [2] Cisco System, Cisco visual networking index , pdf/white_paper_c pdf. [3] Alan B. Johnston, Daniel C. Burnett,, WebRTC P2P,
P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i
27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification
More informationWebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i
28 WebRTC Design of multi-platform file sharing system using WebRTC 1170336 2017 2 28 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i Abstract Design of multi-platform file sharing system using WebRTC Harumi
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationDTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More informationP2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i
26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More information, IT.,.,..,.. i
25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More informationVirtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking
23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual
More informationpaper.dvi
28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret
More informationIT,, i
22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki
More informationo 2o 3o 3 1. I o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o I 2o 3o 4o 5o 6o 7o 2197/ o 1o 1 1o
78 2 78... 2 22201011... 4... 9... 7... 29 1 1214 2 7 1 8 2 2 3 1 2 1o 2o 3o 3 1. I 1124 4o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o 72 1. I 2o 3o 4o 5o 6o 7o 2197/6 9. 9 8o 1o 1 1o 2o / 3o 4o 5o 6o
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationn 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i
15 Comparison and Evaluation of Dynamic Programming and Genetic Algorithm for a Knapsack Problem 1040277 2004 2 25 n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i Abstract Comparison and
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More information, i
23 The reserch of the users action patterns and the suitable delivery of coupons for them 1145120 2012 2 13 , i Abstract The reserch of the users action patterns and the suitable delivery of coupons for
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More information23 The Study of support narrowing down goods on electronic commerce sites
23 The Study of support narrowing down goods on electronic commerce sites 1120256 2012 3 15 i Abstract The Study of support narrowing down goods on electronic commerce sites Masaki HASHIMURA Recently,
More informationIT i
27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational
More informationi
14 i ii iii iv v vi 14 13 86 13 12 28 14 16 14 15 31 (1) 13 12 28 20 (2) (3) 2 (4) (5) 14 14 50 48 3 11 11 22 14 15 10 14 20 21 20 (1) 14 (2) 14 4 (3) (4) (5) 12 12 (6) 14 15 5 6 7 8 9 10 7
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More informationSobel Canny i
21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been
More informationSOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i
20 SOM Development of Syllabus Vsualization System using Spherical Self-Organizing Maps 1090366 2009 3 5 SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i Abstract Development of Syllabus Vsualization
More information21 A contents organization method for information sharing systems
21 A contents organization method for information sharing systems 1125140 2010 3 4 IT i Abstract A contents organization method for information sharing systems Aoki, Wataru Organizations to share information,
More informationIPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [
1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More informationITAOI2003第三屆離島資訊與應用研討會論文範例
2003 6 kung@mail.npust.edu.tw, b8956018@mail.npust.edu.tw, m9056011@mail.npust.edu.tw (Internet) and build up cache proxy servers. In this paper, we (Multi-media) design and development four proxy servers
More information卒業論文2.dvi
15 GUI A study on the system to transfer a GUI sub-picture to the enlarging viewer for operational support 1040270 2004 2 27 GUI PC PC GUI Graphical User Interface PC GUI GUI PC GUI PC PC GUI i Abstract
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More informationKansai University of Welfare Sciences Practical research on the effectiveness of the validation for the elderly with dementia Naoko Tsumura, Tomoko Mi
Practical research on the effectiveness of the validation for the elderly with dementia Naoko Tsumura, Tomoko Mitamura and Takeshi Hashino 2 1 Abstract : The present conditions to surround the elderly
More information20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow
20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering
More information19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability
19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability 1105402 2008 2 4 2,, i Abstract Systematization of Problem Solving Strategy in High School
More information25 Removal of the fricative sounds that occur in the electronic stethoscope
25 Removal of the fricative sounds that occur in the electronic stethoscope 1140311 2014 3 7 ,.,.,.,.,.,.,.,,.,.,.,.,,. i Abstract Removal of the fricative sounds that occur in the electronic stethoscope
More informationkut-paper-template.dvi
26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More information,,.,.,,.,.,.,.,,.,..,,,, i
22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of
More information28 TCG SURF Card recognition using SURF in TCG play video
28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka
More informationbook.dvi
P2P Web Proxy 1120180 24 3 16 1 3 2 5 2.1 Web........................ 5 2.2 Web Proxy.................................... 10 2.2.1 P2P Web Proxy.............................. 11 3 P2P Web Proxy 13 3.1...................................
More informationWeb Web Web
P2P Web Proxy The Cooperation P2P Web Proxy for reduction of offer resources 1165054 26 3 20 1 5 2 7 2.1...................................... 7 2.1.1 Web...................... 7 2.1.2 Web.....................
More information社会学部紀要 114号☆/22.松村
March 2012 1 1 1 2005 : 261 1 100 2 22 15.1 41.8 10.3 100 3 2008 : 282 23 34 70 3 114 30 4 1 2 1 2 2 1 1998 1999 2004 N 3 4 7 9 3 100 1970 March 2012 15900 42 10 15000 4 K 40 2 2 2 3 5 100 DVD 6 http :
More information24 LED A visual programming environment for art work using a LED matrix
24 LED A visual programming environment for art work using a LED matrix 1130302 2013 3 1 LED,,,.,. Arduino. Arduino,,,., Arduino,.,, LED,., Arduino, LED, i Abstract A visual programming environment for
More information21 e-learning Development of Real-time Learner Detection System for e-learning
21 e-learning Development of Real-time Learner Detection System for e-learning 1100349 2010 3 1 e-learning WBT (Web Based training) e-learning LMS (Learning Management System) LMS WBT e-learning e-learning
More information企業内システムにおけるA j a x 技術の利用
Utilization of Ajax in Enterprise Intranet Systemsby Tetsuo Yamashita, Takeshi Kuroe and Kazuhisa Ikeda Enterprise 2.0 refers to the recent trend of applying the web technologies widely deployed in Internet
More information, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i
25 Estimation scheme of indoor positioning using difference of times which chirp signals arrive 114348 214 3 6 , (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,,
More informationSURF,,., 55%,.,., SURF(Speeded Up Robust Features), 4 (,,, ), SURF.,, 84%, 96%, 28%, 32%.,,,. SURF, i
24 SURF Recognition of Facial Expression Based on SURF 1130402 2013 3 1 SURF,,., 55%,.,., SURF(Speeded Up Robust Features), 4 (,,, ), SURF.,, 84%, 96%, 28%, 32%.,,,. SURF, i Abstract Recognition of Facial
More information24 Region-Based Image Retrieval using Fuzzy Clustering
24 Region-Based Image Retrieval using Fuzzy Clustering 1130323 2013 3 9 Visual-key Image Retrieval(VKIR) k-means Fuzzy C-means 2 200 2 2 20 VKIR 5 18% 54% 7 30 Fuzzy C-means i Abstract Region-Based Image
More informationi ii iii iv v vi vii ( ー ー ) ( ) ( ) ( ) ( ) ー ( ) ( ) ー ー ( ) ( ) ( ) ( ) ( ) 13 202 24122783 3622316 (1) (2) (3) (4) 2483 (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) 11 11 2483 13
More informationAPI SCORM e-learning SCORM Sharable Content Object Reference ModelSCORM e-learning e-learning SCORM SCORM SCO LMS SCORM SCORM HTML XML JavaScript SCO
18 API SCORM Development of SCORM Making Support System focus on using Data Model and API Instance 1070419 2007 3 9 API SCORM e-learning SCORM Sharable Content Object Reference ModelSCORM e-learning e-learning
More information262014 3 1 1 6 3 2 198810 2/ 198810 2 1 3 4 http://www.pref.hiroshima.lg.jp/site/monjokan/ 1... 1... 1... 2... 2... 4... 5... 9... 9... 10... 10... 10... 10... 13 2... 13 3... 15... 15... 15... 16 4...
More information<30315F836D815B83675F95D08BCB8E812E696E6464>
Sociological Essays 7 : Anticipating changes in an opaque society Shinji KATAGIRI Abstract After the Great East Japan Earthquake, it became very difficult to predict the future of Japanese society. However,
More information大学における原価計算教育の現状と課題
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012
More information23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones
23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones 1120220 2012 3 1 iphone..,. 2 (, ) 3 (,, ),,,.,..,. HCI i Abstract A Comparison of Flick and Ring Document Scrolling in
More information1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,
More information3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp
More information44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2)
(1) I 44 II 45 III 47 IV 52 44 4 I (1) ( ) 1945 8 9 (10 15 ) ( 17 ) ( 3 1 ) (2) 45 II 1 (3) 511 ( 451 1 ) ( ) 365 1 2 512 1 2 365 1 2 363 2 ( ) 3 ( ) ( 451 2 ( 314 1 ) ( 339 1 4 ) 337 2 3 ) 363 (4) 46
More information178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21
I 178 II 180 III ( ) 181 IV 183 V 185 VI 186 178 5 I 1 ( ) ( ) 10 3 13 3 1 8891 8 3023 6317 ( 10 1914 7152 ) 16 5 1 ( ) 6 13 3 13 3 8575 3896 8 1715 779 6 (1) 2 7 4 ( 2 ) 13 11 26 12 21 14 11 21 4 10 (
More information27 VR Effects of the position of viewpoint on self body in VR environment
27 VR Effects of the position of viewpoint on self body in VR environment 1160298 2015 2 25 VR (HMD), HMD (VR). VR,.. HMD,., VR,.,.,,,,., VR,. HMD VR i Abstract Effects of the position of viewpoint on
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More informationi ii i iii iv 1 3 3 10 14 17 17 18 22 23 28 29 31 36 37 39 40 43 48 59 70 75 75 77 90 95 102 107 109 110 118 125 128 130 132 134 48 43 43 51 52 61 61 64 62 124 70 58 3 10 17 29 78 82 85 102 95 109 iii
More information(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji
Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake
More informationネットワークビデオレコーダー VK-64/VK-16/VK-Lite v2.2 セットアップガイド
VK-64/VK-16/VK-Lite Ver. 2.2 VK-64 v2.2 VK-16 v2.2 ( VK-64/VK-16) VK-Lite v2.2 ( VK-Lite) VK-64/VK-16 VK-Lite 2 1. 2. 3. 4. 2. 3. ( ) ( ) canon.jp/webview Canon Canon Microsoft Windows Microsoft Internet
More informationWi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i
26 A Study on Secure Remote Control Methods 1175078 2015 2 27 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication
More informationkut-paper-template.dvi
14 Application of Automatic Text Summarization for Question Answering System 1030260 2003 2 12 Prassie Posum Prassie Prassie i Abstract Application of Automatic Text Summarization for Question Answering
More informatione-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learning LMS CMS A Trial and Prospect of Kumamoto
e-learning station 1) 2) 1) 3) 2) 2) 1) 4) e-learning Station 16 e-learning e-learning key words: e-learninglms CMS A Trial and Prospect of Kumamoto University e-learning Station Hiroshi Nakano 1) Kazuhisa
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More information評論・社会科学 84号(よこ)(P)/3.金子
1 1 1 23 2 3 3 4 3 5 CP 1 CP 3 1 1 6 2 CP OS Windows Mac Mac Windows SafariWindows Internet Explorer 3 1 1 CP 2 2. 1 1CP MacProMacOS 10.4.7. 9177 J/A 20 2 Epson GT X 900 Canon ip 4300 Fujifilm FinePix
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087
More information情報処理学会研究報告 IPSJ SIG Technical Report Vol.2013-CVIM-186 No /3/15 EMD 1,a) SIFT. SIFT Bag-of-keypoints. SIFT SIFT.. Earth Mover s Distance
EMD 1,a) 1 1 1 SIFT. SIFT Bag-of-keypoints. SIFT SIFT.. Earth Mover s Distance (EMD), Bag-of-keypoints,. Bag-of-keypoints, SIFT, EMD, A method of similar image retrieval system using EMD and SIFT Hoshiga
More information1: ( 1) 3 : 1 2 4
RippleDesk Using Ripples to Represent Conversational Noise on Internet Shigaku Iwabuchi Takaomi Hisamatsu Shin Takahashi Buntarou Shizuki Kazuo Misue Jiro Tanaka Department of Comupter Science, University
More information10_細川直史.indd
GIS Theory and Applications of GIS, 2010, Vol. 18, No.1, pp.79-85 電子タグによる屋内測位を利用した携帯電話からの通報システム 細川直史 * 高梨健一 ** 滝澤修 *** Emergency Call System by Cellular-phone equipped with RFID Positioning Masafumi HOSOKAWA*,
More informationWebサービス本格活用のための設計ポイント
The Web Services are a system which links up the scattered systems on the Internet, leveraging standardized technology such as SOAP, WSDL and UDDI. It is a general thought that in the future business enterprises
More informationInnovation Linked Open Data Resource Description Framework Uniform Resource Identifier Open Government 25 5 23 2011 25 2013 6 26 2014 3 ...1 ICT 2...4...4.....5..6..9..9 13 15 15 22 24 26 26 27 29 32 43
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More informationDEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme
DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community
More informationfinalrep.dvi
18 Building a Knowledge Management System for Acquiring Wisdom of Crowds 1095701 2007 3 16 Blog Wiki Web Web Web i Abstract Building a Knowledge Management System for Acquiring Wisdom of Crowds Kazunori
More informationSNS ( ) SNS(Social Networking Service) SNS SNS i
22 SNS Job-Hunting Activities situation Understanding Support System Using SNS 1110252 2011 03 01 SNS ( ) SNS(Social Networking Service) SNS SNS i Abstract Job-Hunting Activities situation Understanding
More information,,.,,., II,,,.,,.,.,,,.,,,.,, II i
12 Load Dispersion Methods in Thin Client Systems 1010405 2001 2 5 ,,.,,., II,,,.,,.,.,,,.,,,.,, II i Abstract Load Dispersion Methods in Thin Client Systems Noritaka TAKEUCHI Server Based Computing by
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information(VKIR) VKIR VKIR DCT (R) (G) (B) Ward DCT i
24 Region-Based Image Retrieval using Color Histogram Feature 1130340 2013 3 1 (VKIR) VKIR VKIR DCT (R) (G) (B) 64 64 Ward 20 1 20 1 20. 5 10 2 DCT i Abstract Region-Based Image Retrieval using Color Histogram
More informationMicrosoft Word - 11_thesis_08k1131_hamada.docx
23 08k1131 24 i JSP HTML CSS JavaScript Flash ios ii 1.... 1 2.... 1 2.1...1 2.2...2 2.3 Flash...2 2.4...2 2.5...3 2.6...3 2.7...4 3.... 4 3.1...4 3.2...6 3.3...8 3.4...9 3.5... 11 3.6... 12 3.7... 13
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More informationuntitled
2011 2 9 Akamai Technologies, Inc., et al., Plaintiff Appellant, v. Limelight Networks, Inc., Defendant-Cross Appellant. 1 ( ) 2 3 CAFC BMC 4 (control or 3 Aro Mfg. Co. v. Convertible Top Replacement Co.,
More information13 RoboCup The Interface System for Learning By Observation Applied to RoboCup Agents Ruck Thawonmas
13 RoboCup The Interface System for Learning By Observation Applied to RoboCup Agents 1020302 Ruck Thawonmas 2002 2 8 RoboCup RoboCup SemiReal SemiReal RAIK-NTG4 Huma SemiReal Huma RoboCup. i Abstract
More information1 2 3 ( ) ( ) SNS SNS Facebook %[g]( %[ ]) [ ] IT LNS (Life Networking Service) LNS LNS LNS SNS SNS 3. LNS (Life Networking S
情報処理学会インタラクション 2012 IPSJ Interaction 2012 2012-Interacti 2012/3/15 Life Networking Service LNS LNS twitter LNS Life Log Sharing with Life Networking Service YUSUKE NAKANO HIROSHI KAWAKAMI HIROYUKI TARUMI
More informationron.dvi
12 Effect of occlusion and perception of shadow in depth perception caused by moving shadow. 1010361 2001 2 5 (Occlusion), i Abstract Effect of occlusion and perception of shadow in depth perception caused
More information