Zipf [5] 2 5 [6] [7][11] ICN [12] LIRS/CLOCK-Pro [13], [14] CLOCK-Pro Using Switching Hash-table (CUSH) (3. )4. CUSH ICN 2. CPU [15] [17] LRU [1], [18

Size: px
Start display at page:

Download "Zipf [5] 2 5 [6] [7][11] ICN [12] LIRS/CLOCK-Pro [13], [14] CLOCK-Pro Using Switching Hash-table (CUSH) (3. )4. CUSH ICN 2. CPU [15] [17] LRU [1], [18"

Transcription

1 CLOCK-Pro (ICN) CLOCK-Pro ICN CLOCK-Pro Using Switching Hash-table (CUSH) (ICN) (CCN) A Proposal and Evaluation of Feasible Cache Replacement Policy for ICN Abstract based on CLOCK-Pro Atsushi OOKA, Eum SUYONG, Shingo ATA, and Masayuki MURATA Graduate School of Information Science and Technology, Osaka University 1-5 Yamadaoka, Suita, Osaka, , Japan Graduate School of Engineering, Osaka City University Sugimoto, Sumiyoshi-ku, Osaka-shi, Osaka , Japan {a-ooka,suyong,murata}@ist.osaka-u.ac.jp, ata@info.eng.osaka-cu.ac.jp Information-centric networking (ICN) requires an innovative cache replacement algorithm with performance far superior to simple policies such as FIFO and computational and memory overheads that are low enough to run on ICN router s hardware. We propose CLOCK-Pro Using Switching Hash-tables (CUSH) to satisfies the requirements and evaluated it, which reveals that CUSH can achieve cache hits against the traces that simple conventional algorithms cannot cause any hits. Key words Information-Centric Networking, Content-Centric Networking, Caching, Cache Replacement Policy 1. Information-Centric Networking (ICN) ICN (where) ICN IP name (what) NDN [1]CCNx [2]PURSUIT [3]SAIL [4]Green ICN ICN clean-slate NDN CCNx [1], [2] NDN MTU name YouTube ccn://youtube/video/a.mp4/s2 name 1

2 Zipf [5] 2 5 [6] [7][11] ICN [12] LIRS/CLOCK-Pro [13], [14] CLOCK-Pro Using Switching Hash-table (CUSH) (3. )4. CUSH ICN 2. CPU [15] [17] LRU [1], [18] CLOCK 2 n CLOCK R R Random Random LRU LRU [1]First-In, First Out (FIFO) 1 (FIFO tail) LRU LRU friendly LRU LRU stack Least Frequently Used (LFU) (frequency) Adaptive Replacement Cache (ARC) [19] LRU LFU ARC 2 LRU L 1 L (ghost cache) Low Inter-reference Recency Set (LIRS) [13] (Inter-Reference Recency; IRR) LRU (recency) LIRS IRR 2 IRR hot cold cold LRU cold LRU ARC 2

3 loop ( ) LFU hot ( 4n [13]) LRU LRU ARC 2. 3 CLOCK LRU CLOCK R R = 1 R = CLOCK CLOCK LRU Clock with Adaptive Replacement (CAR) [2] ARC CLOCK LRU CLOCK MRU operation ARC CLOCK LRU [12] CLOCK-Pro [14] LIRS CLOCK R 2 1 hot cold 1 test flag LIRS stack pruning cold () CLOCK 3 cold hot LIRS hot cold LRU-friendly ( n ) loop LIRS 3. CUSH ICN CLOCK-Pro (3. 1 ) CUSH CUSH (3. 2 ) 3. 3 CUSH CLOCK-Pro 3. 1 ( ) scan loop CLOCK-Pro ICN ( ) scanloopcorrelated-referencefickle-interest 4 1 scan: 1 LRU recency loop: scan recency frequency (LRULFUARC ) correlated-reference: 1 LFU frequency fickle-interest: correlated-reference frequency LFU LIRS hot 1 ARC 2 priority limited-frequency correlated-reference LFU loop LRU LFU 3

4 1: policies LRU, CLOCK LFU ARC, CAR LIRS CLOCK-Pro priority recency frequency limited-frequency IRR limited-irr scan loop loop correlated-reference fickle-interest CLOCK-Pro priority limited-irr loop LIRS CLOCK-Pro LIRS hot correlated-reference fickle-interest scan loop CLOCK-Pro scan scan 1 6 [6] CCNx NDN ICN scan scan loop Web OS 1 loop loop 1MB.7M loop correlated-reference fickleinterest SNS correlated-reference VoIP fickle-interest LIRS/CLOCK-Pro scan loop correlated-reference fickle-interest CLOCK-Pro scan loop Compact CAR scanfickle-interest [12] scan loop CLOCK-Pro loop fickle-interest 3. 2 CUSH CLOCK-Pro CLOCK-Pro CLOCK-Pro ICN CUSH CUSH CLOCK-Pro LIRS/CLOCK-Pro CLOCK-Pro LIRS IRR loop loop LRU CLOCK recency( ) 2 LIRS loop 4

5 interest: /A.mpg/s1 Lookup table KEY (name) (address) /A.mpg/s1 1 /A.mpg/s2 4 /A.mpg/s3 9 /X.jpg /B.mpg/s1 6 /B.mpg/s2 8 /B.mpg/s3 1 Cache Meta Circular buffer /Z.txt -1 [bit] log 2[bit] 1: CLOCK-Pro IRR( 2 ) loop IRR hot cold LIRS loop scan IRR cold scan CLOCK-Pro LIRS CLOCK LIRS IRR LRU stack pruning CLOCK-Pro LRU CLOCK loop CLOCK-Pro CLOCK 3 HAND cold HAND hot HAND test R hot/cold HAND test test 1 cold Chot H M R = 1 CLOCK-Pro HAND cold cold hot CLOCK R = 1 cold hot hot HAND hot hot cold cold test test hot cold test HAND test cold HAND test LIRS CLOCK CLOCK-Pro CLOCK-Pro ICN 3 loop loop CLOCK- Pro 2 loop loop CLOCK-Pro 1 CLOCK-Pro 5

6 Ideal (error-free ghost cache) Lookup table KEY (name) (address) Real (ghost cache without collision resolution) Lookup table KEY (name) (address) Circular buffer Cache [bit] Cache log 2 [bit] Hash table Meta Address ((name)) (address) Meta [bit] log 2 [bit] cut down log 2 [bit] 2: CLOCK-Pro HAND cold HAND cold loop 1 Key-Value CLOCK-Pro n 2n (lookup table) (circular buffer) name L max[bit](name ) log 2n[bit] 2n(L max + log 2n)[bit] n(l max + log 2n)[bit] L max[bit] name ICN 1 ICN name 2 name 1 name L max [bit] name ICN CUSH CUSH CLOCK-Pro CUSH CLOCK-Pro CLOCK-Pro 2 ( 3 ) 1bit k loop 1 CUSH LIRS loop LIRS hot cold loop hot hot hot loop LIRS 6

7 CLOCK Pro Proposal Lookup table KEY (name) [bit] Cache (address) log 2 [bit] Cache Lookup table KEY (name) (address) Circular buffer 2 hands Circular buffer Cache [bit] log [bit] 3 hands Meta separate Meta fill alternately Hash table 1 Hash table 2 Hash table Address ((name)) (address) Address ((name)) (flag) Address ((name)) (flag) Meta [bit] [bit] log 2 [bit] 3: CLOCK-Pro LRU hot CUSH hot n h loop 2 correlated-reference hot CUSH 2 2 B 1B 2 B 1 n h /2 B 2 n h /2 B 1 B 1 loop B 1 B 2 CUSH HAND test 2 2bit HAND cold HAND hot 3 1bit 2bit 3. 3 CUSH 1,2,3,4 CUSH CLOCK A p A[p] c ()n, n h, n c cold hot m h, m c cold hot 2 B 1, B 2 B c B n B1, n B2 B 1 B 2 n hit x chunk chunk.r bit reference bit 1 chunk.h bit hot 1 hot 1 7

8 Algorithm 1 CUSH Replacement Algorithm 1: procedure CACHEREPLACEMENT(x) x is an accessed chunk. 2: if x A then cache hit 3: x.r-bit 1 4: UpdateHistory() 5: AdaptSmallIRR() 6: return 7: else if x B then ghost hit 8: UpdateHistory() 9: AdaptSmallIRR() 1: h true 11: if n = m then A is full. 12: Run HAND cold 13: if n h > m h then 14: Run HAND hot 15: end if 16: end if 17: else cache miss 18: if n < m then A is not full. 19: h (n h < m h ) 2: else A is full. 21: Run HAND cold 22: h (n h < m h & 2n c > m h ) 23: end if 24: end if 25: p an available address in A 26: A[p] x 27: if h then A[p].H-bit 1 28: end if 29: end procedure Algorithm 2 Algorithm for Adapting Parameters 1: procedure ADAPTLARGEIRR 2: m c max(m c max(m h /m c, 1), 1) 3: m h m m c 4: end procedure 5: 6: procedure ADAPTSMALLIRR 7: m h max(m h max(m c/(m h + 1), 1), ) 8: m c m m h 9: end procedure x R 1 ( 3 6) ( 7 15) ( 8 9)x hot h 1 ( 1) HAND cold hot n h m h HAND hot hot ( 11 16) ( 17 23) ( 18 19)hot n h m h hot hot loop ( 2 22)HAND cold hot Algorithm 3 Algorithms of Hand Movement 1: procedure RUN HAND cold 2: while (A[HAND cold ].H-bit= or A[HAND cold ].R-bit= 1) do 3: while n c = do 4: Run HAND hot 5: end while 6: if A[HAND cold ].R-bit= 1 then 7: A[HAND cold ].R-bit 8: A[HAND cold ].H-bit 1 9: end if 1: Move HAND cold forward 11: end while 12: Discard A[HAND cold ] and add it to B 13: if n b1 = c B then 14: SwitchHashTable() 15: end if 16: Move HAND cold forward 17: end procedure 18: 19: procedure RUN HAND hot 2: while (A[HAND hot ].H-bit= or A[HAND hot ].R-bit= 1) do 21: if A[HAND hot ].R-bit= 1 then 22: A[HAND hot ].R-bit 23: end if 24: if A[HAND hot ].H-bit= then 25: AdaptLargeIRR() 26: end if 27: Move HAND hot forward 28: end while 29: A[HAND hot ].H-bit 3: Move HAND hot forward 31: end procedure Algorithm 4 Algorithm for Updating Hash Tables 1: procedure UPDATEHISTORY 2: Increment n hit 3: if (n hit > Threshold() or n B = c B ) then 4: SwitchHashTable() 5: end if 6: end procedure 7: 8: procedure SWITCHHASHTABLE 9: AdaptLargeIRR() 1: Switch B If B = B 1 then B B 2 ; else B B 1. 11: Clear B Reset all bits in B. 12: n hit 13: end procedure 14: 15: function THRESHOLD 16: return max(n h /2, 1) 17: end function n h < m h cold n c ( hot m h cold ) hot ( ) ( 25 28) hot h 2 IRR hot/cold IRR LRU-friendly correlated-reference fickle-interest LRU/CLOCK 8

9 cold IRR scan loop scan loop loop hot IRR hot hot/cold m c m h 2 2 CLOCK-Pro CLOCK-Pro test m c CUSH test test CUSH CLOCK-Pro IRR IRR HAND hot cold CLOCK-Pro 1 test CLOCK-Pro CUSH ARC 3 2 (HAND cold HAND hot ) HAND cold R = cold ( 2 11) ( 12) hot R = 1 cold hot ( 6 8) cold HAND hot ( 3 5)cold ( 12 15) HAND hot 3 HAND hot R = hot ( 2 28) cold ( 29) R = 1 hot R = cold IRR CLOCK-Pro HAND hot test OFF m c 4 UpdateHistory n hit ( 2) ( 3 5) n hit n h /2(Threshold ( 15 17) ) SwitchHadhTable AdaptLargeIRR ( 9) CLOCK-Pro test m c ( 1) ( 11) ( 12) loop 4. CUSH CLOCK-Pro CUSH ( ) YouTube CUSH ( ) CUSH CUSH CLOCK CUSH CLOCK-Pro CUSH CLOCK-Pro CUSH scan loop Zipf ( ) CUSH CLOCK-Pro OPTFIFOCLOCK Compact CAR OPT ICN Random CLOCK LRU scan loop Compact CAR scan ARC CUSH scan CLOCK-Pro Compact CAR 2 9

10 OPT FIFO CLOCK Compact CAR CLCOK-Pro (real) CLOCK-Pro (ideal) (a) α =.8 (b) α = 1. (c) α = 1.2 4: OPT FIFO CLOCK OPT Compact CAR OPT CLCOK-Pro (real) CLOCK-Pro (ideal) CUSH-log (a) (b) Compact CAR (c) CLOCK-Pro 5: (α = 1.) loop Zipf α.8, 1., 1.2, 1.4 [21] 15B1.5KB6KB CUSH 4 () CLOCK-Pro n log 2n[bit] (CUSH-log) 2 CUSH-log CLOCK-Pro 4,5,6, ,7 5 loop scan 5(a) CUSH CLOCK 1 bit CUSH scan 5(b) scan Compact CAR loop Compact CAR CUSH 5(c) CLOCK-Pro 7 loop loop 7(a) CUSH loop 7(b) scan loop Compact CAR loop 7(a) 7(c) CLOCK-Pro CUSH 1

11 FIFO CLOCK Compact CAR CLCOK-Pro (real) CLOCK-Pro (ideal) (a) α = 1., L = 1.5K (b) α = 1.2, L = 1.5K (c) α = 1.4, L = 1.5K 6: FIFO CLOCK Compact CAR CLCOK-Pro (real) CLOCK-Pro (ideal) CUSH-log (a) (b) Compact CAR (c) CLOCK-Pro 7: (α = 1.4, L = 1.5K) 2: [pck/sec] 1.5KB 15KB 6KB SD(4.5[MB/min]) HD(9.[MB/min]) : loop CUSH-log CLOCK-Pro CUSH CLOCK-Pro loop CLOCK-Pro loop loop YouTube CUSH YouTube, nicovideo, dailymotion ,451, , ,378,925 8 Zipf 3,949 L 15B15KB6KB 11

12 OPT FIFO CLOCK Compact CAR CLCOK-Pro (real) CLOCK-Pro (ideal) (ht4x4) (a) (b) (L = 15K) 9: (c) (L = 6K) 1 2 A Zipf(α) 9 CUSH 4 correlated-reference fickle-interest loop ( 9(a)) CUSH Compact CAR scan loop ( 9(b),9(c)) CLOCK-Pro(real) CUSH CLOCK-Pro(ideal) loop CUSH scan loop CUSH 3 n n k FIFO CLOCK O(n) LRU LRU DLL LFU LFU H O(n log n) LRU LIRS CLOCK CAR CLOCK-Pro Compact CAR CLOCK O(n) n k O(kn log n) CUSH CLOCK kn k = 1 CLOCK-Pro k = log n CLOCK-Pro loop CUSH CUSH 4 CLOCK 1 1 α = 1. 1 O(n) CUSH CLOCK 4 CLOCK 1 2 CLOCK-Pro CLOCK CLOCK 12

13 3: [bit] [bit] [bit] FIFO O(log n) - - LRU DLL O(n log n) - - LFU H O(n log n) - - LIRS (with LRU DLL ) O(n log n) O(kn log kn) O(kn log kn) CLOCK O(n) - - CAR (with LRU DLL ) O(n log n) O(n log n) - CLOCK-Pro O(n) O(n) O(kn log n) Compact CAR O(n) O(n) O(kn log n) CUSH O(n) O(kn) - 4: n CLOCK CLOCK-Pro CUSH Compact CAR CLOCK CLOCK-Pro CUSH Compact CAR hot Compact CAR CUSH CLOCK-Pro CLOCK CUSH CLOCK-Pro CUSH CLOCK CLOCK-Pro (.8 ) Compact CAR 5. ICN loop ICN Compact CAR CLOCK-Pro CUSH CUSH loop CUSH CLOCK-Pro CLOCK ICN ICN ICN (SCOPE)

14 Technologies, pp.187 2, March 24. [1] L. Zhang, D. Estrin, J. Burke, V. Jacobson, J.D. Thornton, D.K. Smetters, B. Zhang, G. Tsudik, K. Claffy, D. Krioukov, D. Massey, C. Papadopoulos, T. Abdelzaher, L. Wang, P. Crowley, and E. Yeh, Named data networking (NDN) project, Oct. 21. http: //named-data.net/techreport/tr1ndn-proj.pdf [21] C. Fricker, P. Robert, J. Roberts, and N. Sbihi, Impact of traffic mix on caching performance in a content-centric network, Proceedings of the IEEE Conference on Computer Communications 212, pp , March 212. [2] V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, and R.L. Braynard, Networking named content, Proceedings of the ACM CoNEXT 29, pp.1 12, Dec. 29. [3] N. Fotiou, P. Nikander, D. Trossen, and G.C. Polyzos, Developing information networking further: From PSIRP to PURSUIT, Proceedings of the 7th International ICST Conference on Broadband Communications,Networks, and Systems, pp.1 13, Oct. 21. [4] T. Levä, J. Gonçalves, R.J. Ferreira, et al., Description of project wide scenarios and use cases, Feb eu/wp-content/uploads/211/2/sail D21 Project wide Scenarios and Use cases Public Final.pdf [5] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, Web caching and Zipf-like distributions: evidence and implications, Proceedings of IEEE INFOCOM 99, vol.1, pp , March [6] F. Guillemin, B. Kauffmann, S. Moteau, and A. Simonian, Experimental analysis of caching efficiency for YouTube traffic in an ISP network, Proceedings of the 25th International Teletraffic Congress, pp.1 9, Sept [7] S. Arianfar, P. Nikander, and J. Ott, On content-centric router design and implications, Proceedings of the ACM Re-Architecting the Internet Workshop, pp.1 6, Nov. 21. [8] A. Ioannou and S. Weber, A taxonomy of caching approaches in information-centric network architectures, Technical report, School of Computer Science and Statistics, Trinity College Dublin, Jan [9] L. Wang, S. Bayhan, and J. Kangasharju, Optimal chunking and partial caching in information-centric networks, Computer Communications, vol.61, no.1, pp.48 57, May 215. [1] D. Rossi and G. Rossini, Caching performance of content centric networks under multi-path routing (and more), Technical report, Telecom ParisTech, July 211. [11] W.K. ChaiD. HeI. Psaras, and G. Pavlou, Cache less for more in information-centric networks, Computer Communicationsvol.36no.7pp May 212 [12] A. Ooka, S. Ata, and M. Murata, A proposal and evaluation of cache replacement policy for the implementation of ICN router, Technical Committee on Information-Centric Networking (ICN), pp.1 1, July 215. [13] S. Jiang and X. Zhang, Making LRU friendly to weak locality workloads: a novel replacement algorithm to improve buffer cache performance, IEEE Transactions on Computers, vol.54, no.8, pp , Aug. 25. [14] S. Jiang, F. Chen, and X. Zhang, CLOCK-Pro: An effective improvement of the CLOCK replacement, Proceedings of the USENIX 25, pp , April 25. [15] J. Wang, A survey of web caching schemes for the Internet, ACM SIGCOMM Computer Communication Review, vol.29, no.5, pp.36 46, Oct [16] K.-Y. Wong, Web cache replacement policies: a pragmatic approach, IEEE Network, vol.2, no.1, pp.28 34, Jan. 26. [17] A.-M.K. Pathan and R. Buyya, A taxonomy and survey of content delivery networks, Technical report, University of Melbourne Grid Computing and Distributed Systems Laboratory, Feb. 27. [18] S. Arianfar, P. Nikander, and J. Ott, Packet-level caching for information-centric networking, Technical report, Finnish ICT SHOK, June 21. [19] N. Megiddo and D.S. Modha, ARC: a self-tuning, low overhead replacement cache, Proceedings of the 2Nd USENIX Conference on File and Storage Technologies, pp , March 23. [2] S. Bansal and D.S. Modha, CAR: Clock with adaptive replacement, Proceedings of the 3rd USENIX Conference on File and Storage 14

name name IP [6] ICN Zipf 2 5 [7] 2 name 2 CCN 3 ICN Compact CCN 2. ICN ICN name NDN/CCN [], [2] CCN MTU name Interest Data CCN FIB PIT CS 3 CS

name name IP [6] ICN Zipf 2 5 [7] 2 name 2 CCN 3 ICN Compact CCN 2. ICN ICN name NDN/CCN [], [2] CCN MTU name Interest Data CCN FIB PIT CS 3 CS 565-87 -5 558-8585 3-3-38 E-mail: {a-ooka,murata}@ist.osaka-u.ac.jp, ata@info.eng.osaka-cu.ac.jp (ICN) Compact / (ICN) (CCN) Abstract A Proposal and Evaluation of Cache Replacement Policy for the Implementation

More information

トランスポート層 TCP輻輳制御(3.7)

トランスポート層 TCP輻輳制御(3.7) 情報指向ネットワークへの適正と実現可能性を有する に基づいた置換方式の提案と評価 大岡睦, オムスーヨン, 阿多信吾, 村田正幸 大阪大学大学院情報科学研究科 大阪市立大学大学院工学研究科 発表内容 研究背景 ICN ルータにおけるキャッシング 置換方式の課題 提案手法 CUSH ( Usig Switchig Hash-tables) 評価 ネットワークトラフィックに適した戦略 ルータで実現可能な低コストの実装

More information

1 CCN CCN(Content-Centric-Network) [1] PUR- SUIT [2]DONA(Data-Oriented-Network Architecture) [3] 4WARD [4]PSIRP [5] Energy Efficient and Enhanced-type

1 CCN CCN(Content-Centric-Network) [1] PUR- SUIT [2]DONA(Data-Oriented-Network Architecture) [3] 4WARD [4]PSIRP [5] Energy Efficient and Enhanced-type THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 223 8522 3 14 1 E-mail: miyazaki@yamanaka.ics.keio.ac.jp Content Centric Network(CCN) CCN CCN LRU(Least-Recently-Used)Prob-Cache(Probablistic

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

Content-Centric Networking CCN Unmanned Air V

Content-Centric Networking CCN Unmanned Air V 565 0871 1 5 558 8585 3 3 138 E-mail: {t-kitagawa,murata}@ist.osaka-u.ac.jp, ata@info.eng.osaka-cu.ac.jp Content-Centric NetworkingCCN Unmanned Air VehicleUAV CCN UAV CCNUAV Retrieving Information with

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

56 OS OS OS OS 1 OS HDD OS 1 OS HDD HDD OS OS OSOS HDD 図 1 二重キャッシュ環境 3. 負の参照の時間的局所性 3.1 参照の局所性 Locality of Reference Temporal locality Spatial localit

56 OS OS OS OS 1 OS HDD OS 1 OS HDD HDD OS OS OSOS HDD 図 1 二重キャッシュ環境 3. 負の参照の時間的局所性 3.1 参照の局所性 Locality of Reference Temporal locality Spatial localit 116 26 4 1 2 2 1 3 An Analysis of Locality of Reference in Virtualized Environment Hiroki SUGIMOTO 1, Kousuke TAKEUCHI 2, Kouya HINAGAWA 2 and Saneyasu YAMAGUCHI 1 3 Abstract As cloud computing has spread

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN PenFlowchart 1,a) 2,b) 3,c) 2015 3 4 2015 5 12, 2015 9 5 PEN & PenFlowchart PEN Evaluation of the Effectiveness of Programming Education with Flowcharts Using PenFlowchart Wataru Nakanishi 1,a) Takeo Tatsumi

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S KiZUNA: P2P 1,a) 1 1 1 P2P KiZUNA KiZUNA Pure P2P P2P 1 Skip Graph ALM(Application Level Multicast) Pub/Sub, P2P Skip Graph, Bloom Filter KiZUNA: An Implementation of Distributed Microblogging Service

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

MANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d

MANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d DEIM Forum 2013 F1-4 DTN, 565-0871 1-5 567-0047 5-1 184-8795 4-2-1 565-0871 2-1 E-mail: {sawamura.yusuke,nishio}@ist.osaka-u.ac.jp, teranisi@cmc.osaka-u.ac.jp, harumoto@eng.osaka-u.ac.jp DTN (DTN ) DTN

More information

5D1 SY0004/14/ SICE 1, 2 Dynamically Consistent Motion Design of Humanoid Robots even at the Limit of Kinematics Kenya TANAKA 1 and Tomo

5D1 SY0004/14/ SICE 1, 2 Dynamically Consistent Motion Design of Humanoid Robots even at the Limit of Kinematics Kenya TANAKA 1 and Tomo 5D1 SY4/14/-485 214 SICE 1, 2 Dynamically Consistent Motion Design of Humanoid Robots even at the Limit of Kinematics Kenya TANAKA 1 and Tomomichi SUGIHARA 2 1 School of Engineering, Osaka University 2-1

More information

2 ( ) i

2 ( ) i 25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA

More information

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came 3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is

More information

DEIM Forum 2009 B4-6, Str

DEIM Forum 2009 B4-6, Str DEIM Forum 2009 B4-6, 305 8573 1 1 1 152 8550 2 12 1 E-mail: tttakuro@kde.cs.tsukuba.ac.jp, watanabe@de.cs.titech.ac.jp, kitagawa@cs.tsukuba.ac.jp StreamSpinner PC PC StreamSpinner Development of Data

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004 The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale

More information

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking 23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual

More information

修士論文

修士論文 27 Mobile Ad Hoc Networks An Ant-based Routing Algorithm with Multi-phase Pheromone and Power-saving in Mobile Ad Hoc Networks 14T0013 Shohei Miyashita E-mail: shohei.miyashita.4j@stu.hosei.ac.jp : Abstract

More information

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high

More information

fiš„v8.dvi

fiš„v8.dvi (2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc VOL. J98-A NO. 1 JANUARY 2015 本 PDFの 扱 いは 電 子 情 報 通 信 学 会 著 作 権 規 定 に 従 うこと なお 本 PDFは 研 究 教 育 目 的 ( 非 営 利 )に 限 り 著 者 が 第 三 者 に 直 接 配 布 すること ができる 著 者 以 外 からの 配 布 は 禁 じられている ICT a) Caption Presentation Method

More information

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat 1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2

More information

johnny-paper2nd.dvi

johnny-paper2nd.dvi 13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which

More information

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp

More information

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( ) 1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

4.1 % 7.5 %

4.1 % 7.5 % 2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel

More information

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP LSM OS 700-8530 3 1 1 matsuda@swlab.it.okayama-u.ac.jp tabata@cs.okayama-u.ac.jp 242-8502 1623 14 munetoh@jp.ibm.com OS Linux 2.6 Linux Security Modules LSM LSM Linux 4 OS OS LSM An Evaluation of Performance

More information

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,

More information

IPSJ SIG Technical Report Vol.2009-BIO-17 No /5/26 DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing

IPSJ SIG Technical Report Vol.2009-BIO-17 No /5/26 DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing Youhei Namiki 1 and Yutaka Akiyama 1 Pyrosequencing, one of the DNA sequencing technologies, allows us to determine

More information

3_39.dvi

3_39.dvi Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar

More information

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation 1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1

More information

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Jun Motohashi, Member, Takashi Ichinose, Member (Tokyo

More information

16.16%

16.16% 2017 (411824) 16.16% Abstract Multi-core processor is common technique for high computing performance. In many multi-core processor architectures, all processors share L2 and last level cache memory. Thus,

More information

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i -

2 2 1 2 1 2 1 2 2 Web Web Web Web 1 1,,,,,, Web, Web - i - 2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN C (PR ) Group Name GroupC (PR) /Project No.

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

DEIM Forum 2009 E

DEIM Forum 2009 E DEIM Forum 2009 E5-3 464-8601 1 606-8501 464 8601 1 E-mail: lifushi@arch.itc.nagoya-u.ac.jp, mayumi@mm.media.kyoto-u.ac.jp, {hirano,kajita,mase}@itc.nagoya-u.ac.jp Abstract Study on a Recipe Recommendation

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

自然言語処理16_2_45

自然言語処理16_2_45 FileMaker Pro E-learning GUI Phrase Reading Cloze. E-learning Language Processing Technology and Educational Material Development Generating English Educational Material using a Database Software Kenichi

More information

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i 27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification

More information

スライド 1

スライド 1 WWW Request Client Data Server Request Data Client WWW Request Data Client Server Request Data Client WWW CPU Request Data Client Server Request Data Client Request Client Data Server Request Data Client

More information

PowerPoint プレゼンテーション

PowerPoint プレゼンテーション Mini-Cefore: Container-Based Large-Scale Cefore Emulator 大岡睦, 朝枝仁 National Institute of Information and Communications Technology (NICT) 目次 背景 実験プラットフォームの比較 テストベッド シミュレーター エミュレーター エミュレーターの実装方式の比較 VM (Virtual

More information

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 565 871 1 5 E-mail: {j-konisi,wakamiya,murata}@ist.osaka-u.ac.jp QoS P2P P2P P2P P2P (Peer-to-Peer)

More information

Mullen IFDOInternational Federation of Data Organizations http : / / www. ifdo. org / org _ archives/arc_bfr.htm CESSDA CESSDA CESSDA http://www.nsd.uib.no/ Cessda/ CESSDAArchives in Europe Elder et al.

More information

IPSJ SIG Technical Report Vol.2010-NL-199 No /11/ treebank ( ) KWIC /MeCab / Morphological and Dependency Structure Annotated Corp

IPSJ SIG Technical Report Vol.2010-NL-199 No /11/ treebank ( ) KWIC /MeCab / Morphological and Dependency Structure Annotated Corp 1. 1 1 1 2 treebank ( ) KWIC /MeCab / Morphological and Dependency Structure Annotated Corpus Management Tool: ChaKi Yuji Matsumoto, 1 Masayuki Asahara, 1 Masakazu Iwatate 1 and Toshio Morita 2 This paper

More information

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor 独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that

More information

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i 26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information

More information

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Interactive Recommendation System 1 1 1 1 LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Shun ichi Tano 1 1 Graduate School of Information Systems, The University of Electro-Communications Abstract: The

More information

1

1 5-3 Photonic Antennas and its Application to Radio-over-Fiber Wireless Communication Systems LI Keren, MATSUI Toshiaki, and IZUTSU Masayuki In this paper, we presented our recent works on development of

More information

屋内ロケーション管理技術

屋内ロケーション管理技術 Technology to Manage Indoor Locations 奥山敏 森信一郎 小川晃弘 あらまし ICT GPS GPS Abstract Smart devices and wireless networks have become widespread and an environment is gradually being put in place in which information

More information

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect Using a Human-Shaped Input Device for Remote Pose Instruction Yuki Tayama 1,a) Yoshiaki Ando 2,b) Misaki Hagino 2,c) Ken-ichi Okada 1,d) Abstract: There

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

Consideration of Cycle in Efficiency of Minority Game T. Harada and T. Murata (Kansai University) Abstract In this study, we observe cycle in efficien

Consideration of Cycle in Efficiency of Minority Game T. Harada and T. Murata (Kansai University) Abstract In this study, we observe cycle in efficien Consideration of Cycle in Efficiency of Minority Game T. Harada and T. Murata (Kansai University) Abstract In this study, we observe cycle in efficiency of Minority Game. The Minority Game is a game when

More information

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a 1, 1,a) 1, 2 1 1, 3 2 1 2011 6 17, 2011 12 16 Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a) Kazuki Kanamori 1, 2 Mie Nakatani 1 Hirokazu Kato 1, 3 Sanae H. Wake 2 Shogo Nishida

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

ITAOI2003第三屆離島資訊與應用研討會論文範例

ITAOI2003第三屆離島資訊與應用研討會論文範例 2003 6 kung@mail.npust.edu.tw, b8956018@mail.npust.edu.tw, m9056011@mail.npust.edu.tw (Internet) and build up cache proxy servers. In this paper, we (Multi-media) design and development four proxy servers

More information

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append

More information

DTN DTN DTN DTN i

DTN DTN DTN DTN i 28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee

More information

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU 1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale

More information

2reN-A14.dvi

2reN-A14.dvi 340 30 1 SP2-N 2015 Onomatoperori : Ranking Cooking Recipes by using Onomatopoeias which Express their Tastes and Textures Chiemi Watanabe Satoshi Nakamura Graduate School of Systems and Information Engineering,

More information

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twitter Ustream 1 Graduate School of Information Science and Technology, Osaka University, Japan 2 Cybermedia Center, Osaka University,

More information

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 : Transactions of the Operations Research Society of Japan Vol. 58, 215, pp. 148 165 c ( 215 1 2 ; 215 9 3 ) 1) 2) :,,,,, 1. [9] 3 12 Darroch,Newell, and Morris [1] Mcneil [3] Miller [4] Newell [5, 6], [1]

More information

Microsoft PowerPoint IEICE-ICN

Microsoft PowerPoint IEICE-ICN ICN における Content 名と Naming Scheme に関する 考察 亀山渉朴容震早稲田大学基幹理工学部情報通信学科 2016 年 4 月 20 日電子情報通信学会 ICN 時限研専 1 発表内容 1. 背景と本発表の目的 2. これまでに提案されている Content Naming Scheme 3. Content ID 標準にみる Naming Scheme の考え方 4. ICN

More information

202

202 201 Presenteeism 202 203 204 Table 1. Name Elements of Work Productivity Targeted Populations Measurement items of Presenteeism (Number of Items) Reliability Validity α α 205 α ä 206 Table 2. Factors of

More information

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i 26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN

More information

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC H.264 CABAC 1 1 1 1 1 2, CABAC(Context-based Adaptive Binary Arithmetic Coding) H.264, CABAC, A Parallelization Technology of H.264 CABAC For Real Time Encoder of Moving Picture YUSUKE YATABE 1 HIRONORI

More information

2017 (413812)

2017 (413812) 2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has

More information

先端社会研究 ★5★号/4.山崎

先端社会研究 ★5★号/4.山崎 71 72 5 1 2005 7 8 47 14 2,379 2,440 1 2 3 2 73 4 3 1 4 1 5 1 5 8 3 2002 79 232 2 1999 249 265 74 5 3 5. 1 1 3. 1 1 2004 4. 1 23 2 75 52 5,000 2 500 250 250 125 3 1995 1998 76 5 1 2 1 100 2004 4 100 200

More information

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF.

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF. 2011 2012 1 31 5110B036-6 1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF....................................

More information

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

paper.dvi

paper.dvi 28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret

More information

Journal of Geography 116 (6) Configuration of Rapid Digital Mapping System Using Tablet PC and its Application to Obtaining Ground Truth

Journal of Geography 116 (6) Configuration of Rapid Digital Mapping System Using Tablet PC and its Application to Obtaining Ground Truth Journal of Geography 116 (6) 749-758 2007 Configuration of Rapid Digital Mapping System Using Tablet PC and its Application to Obtaining Ground Truth Data: A Case Study of a Snow Survey in Chuetsu District,

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L 1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

1_26.dvi

1_26.dvi C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito

More information

Vol. 42 No. 4 Apr VC 2 VC 4 VC VC 4 Recover-x Performance Evaluation of Adaptive Routers Based on the Number of Virtual Channels and Operating F

Vol. 42 No. 4 Apr VC 2 VC 4 VC VC 4 Recover-x Performance Evaluation of Adaptive Routers Based on the Number of Virtual Channels and Operating F Vol. 42 No. 4 Apr. 2001 VC 2 VC 4 VC VC 4 Recover-x Performance Evaluation of Adaptive Routers Based on the Number of Virtual Channels and Operating Frequencies Maki Horita, Tsutomu Yoshinaga, Kanemitsu

More information

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai,

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai, 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] 1 599 8531 1 1 Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai, Osaka 599 8531, Japan 2 565 0871 Osaka University 1 1, Yamadaoka, Suita, Osaka

More information

soturon.dvi

soturon.dvi 12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm

More information

第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T

第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T 第 55 回自動制御連合講演会 212 年 11 月 日, 日京都大学 1K43 () Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. Tokumoto, T. Namerikawa (Keio Univ. ) Abstract The purpose of

More information