main.dvi

Size: px
Start display at page:

Download "main.dvi"

Transcription

1 Vytautas Reklaitis

2 Tripwire Tripwire

3 Execution Path Analysis BlueBox Independent Auditor P Pentium Pentium knark Adore-ng

4 SucKIT

5 idtr [26] [26] [26]

6 knark Adore-ng SucKIT

7 [1, 2, 3] [4, 5] [6, 7]

8 1. 7 [6] CPU CPU

9 1. 8 Intel NetBurst Linux Red Hat NetBurst

10 [1] [6] DDoS [8] [4, 5] [6, 7, 13, 18]

11 : 2.2:

12 :

13 [9] 2.2 CPU CPU

14 2.2 13

15 Frederick Cohen 1984 [32] [33] [6] 2

16 [7] Unix

17 : /bin /sbin /usr/bin [20] 3.2 [6, 7, 13, 18]

18 [6]

19 /dev/kmem LKM Loadable Kernel Module /dev/kmem /dev/kmem /dev/kmem Linux /dev/kmem 4

20 idtr IDT Interrupt Descriptor Table 0x80 3.4

21 :

22 :

23 :

24 idtr idtr idtr idtr : idtr

25 idtr [6] knark [10] Adore [10] Adore-ng [11] SucKIT [12]

26 knark knark Creed knark knark Adore Adore-ng Adore Stealth Adore Adore knark Adore Adore-ng Adore-ng Adore Stealth Adore-ng Adore 2.6 Linux

27 SucKIT SucKIT sd devik SucKIT /dev/kmem SucKIT knark [9, 13, 14]

28 IDS Intrusion Detection System [15, 16] [17] 10 [7] [1]

29

30 4.1 29

31 [18] 4.2 [6, 9, 18]

32 Tripwire Tripwire [19] Tripwire Tripwire Tripwire Tripwire Tripwire Tripwire Tripwire Tripwire 2 Tripwire

33 Tripwire Tripwire Tripwire Tripwire Tripwire CD Tripwire Tripwire Tripwire [7]

34 chkrootkit [20] chkrootkit chkrootkit KSTAT [21] kstat /dev/kmem 2.2 System.map 2.4 make make KSTAT kern check [22] kern check System.map alamo [23] getdents getdents alamo getdents getdents CheckIDT [24] 0x80

35 Execution Path Analysis Execution Path Analysis [13, 14] Intel [25] Execution Path Analysis Execution Path Analysis Execution Path Analysis Execution Path Analysis

36 BlueBox BlueBox [17] BlueBox Independent Auditor Independent Auditor [7] PCI Independent Auditor Independent Auditor Independent Auditor

37 Intel NetBurst

38 Intel 32 Pentium 4 P6 Pentium MSR Model-Specific Register 1 [26] P6 P6 1.

39 P6 [27, 28, 29] P6 P6

40 [27, 28, 29] Dean [30] Pentium Pro Pentium Pro 25 Sprunt [31] Pentium 4 Pentium Pentium 4 Pentium 4 Pentium 4

41 Pentium 4 45 ESCR Event Selection Control Register CCCR Cunter Configuration Control Register PMC Performance Monitoring Counter : [26] 1. 2.

42 : [26] 5.3: [26]

43 Pentium 4 Pentium 4 instr retired

44 open getdents64 read write ioctl getdents, read open write ioctl

45 [10, 11, 12] / /proc /dev/kmem /etc/passwd /proc/net/tcp /proc/net/udp

46 :

47

48 Linux Red Hat Linux version 9.0 Kernel Pentium 4 CPU Pentium GHz 6.1: CPU Red Hat Linux version 9.0 Kernel Intel Pentium GHz 1.0 GB

49 Pentium 4 Intel [26] WRMSR 6.2: No. No. MSR IQ COUNTER CH MSR IQ CCCR0 36CH MSR CRU ESCR0 4 3B8H MSR IQ COUNTER H MSR IQ CCCR5 371H MSR CRU ESCR1 4 3B9H Pentium 4 instr retired

50 : instr retired MSR CRU ESCR0 MSR CRU ESCR1 ESCR0: 12, 13, 16 ESCR0: 14, 15, 17 02H 0: NBOGUSNTAG 04H 1. instr retired 2. instr retired MSR CRU ESCR WRMSR

51 : Pentium 4 NBOGUSNTAG 6.2 WRMSR 6.2: 6.1

52 RDPMC 6.3: 31 RDPMC Pentium WRMSR 6.4:

53 Pentium 4 RDPMC RDMSR instr retired 6.5 WRMSR 6.5: 6.3 5

54 entry.s sys call num EAX count start count read and stop after operation count start

55 :

56 count start count start count execution count execution dir flag count execution dir flag , count read and stop

57 count read and stop count read and stop after operation count read and stop after operation after operation 6.3.5

58 getdents64 read open 6.4: open /dev/kmem open /etc/passwd getdents64 / getdents64 /proc read /dev/kmem read /proc/net/tcp read /proc/net/udp /etc/kmem open /etc/passwd open /proc getdents64

59 /etc/kmem open /etc/passwd open /proc getdents64 6.5: open /dev/kmem open /etc/passwd getdents64 / getdents64 /proc read /dev/kmem read /proc/net/tcp read /proc/net/udp /etc/kmem open /etc/passwd open /etc/kmem open /etc/passwd open

60 packet storm [10] Stealth [11] knark knark knark : knark open /dev/kmem open /etc/passwd getdents64 /proc read /proc/net/udp knark 6.6 /proc

61 getdents getdents64 knark getdents64 /proc/net/udp read 23 /proc getdents knark /proc/net/udp read getdents64 /proc/net/tcp /proc/net/udp read getdents Adore-ng Adore-ng knark Adore-ng 6.7 Adore-ng 6.7 /proc getdents

62 : Adore-ng open /dev/kmem open /etc/passwd getdents64 /proc read /proc/net/udp getdents64 Adore-ng knark getdents64 Adore-ng SucKIT SucKIT /dev/kmem SucKIT 6.8 SucKIT 6.8 /dev/kmem

63 : SucKIT open /dev/kmem open /etc/passwd getdents64 /proc read /proc/net/udp open /etc/passwd open /proc getdents /proc/net/udp read 3400 SucKIT SucKIT

64 CPU CPU

65 CPU

66 CPU CPU time : open /dev/kmem 2.26s 4.6s 104% open /etc/passwd 2.68s 4.99s 86% getdents64 /proc 4.46s 6.32s 42% read /proc/net/udp 0.113s 2.63s 2227% 6.9 1

67 Linux Limux

68

69 7. 68

70 69 Vytas

71 70 [1] Wenke Lee Salvatore J Stolfo and Kui W Mok: A Data Mining Framework for Building Intrusion Detection Models, 1999 IEEE Symposium on Security and Privacy pp May 1999 [2] : 2004, Junuary [3] : 16, August 2004 [4] :, ISBN July 2003 [5] : 2, ISBN July 2004 [6] Julian B. Grizzard, John G. Levine and Henry L. Owen: Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table, ESORICS pp September 2004 [7] Jesus Molina and William Arbaugh: Using Independent Auditors as Intrusion Detection Systems, Proceedings of the Fourth International Conference on Informationand Communications Security pp December [8] Jelena Mirkovic Janice Martin and Peter Reiher: A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms, Computer Science Department University of California Los Angeles Technical report July 2002

72 71 [9] Raul Siles Pelaez: Linux kernel rootkits protecting the system s Ring-Zero, May 2004 [10] packet storm: [11] Adore-ng: [12] sd and devik: Linux on-the-fly kernel patching without LKM, Phrack Magazine Volume 11, Issue 58 File [13] Jan K. Rutkowski: Execution path analysis: finding kernel based rootkits, Phrack Magazine Volume 11, Issue 59 File [14] Jan K. Rutkowski: Advanced Windows 2000 Rootkit Detection Execution path analysis, Black Hat Briefings USA, July 2003 [15] Ludovic Me and Cedric Michel: Intrusion Detection: A Bibliography, Technical report SSIR , Supelec, September 2001 [16] Stefan Axelsson: Research in Intrusion Detection Systems: A Survey, Technical Report No 98-17, Dept. of Computer Engineering, Chalmers University of Technology, August 1999 [17] Suresh N. Chari and Pau-Chen Cheng: BlueBox: A Policy driven Host Based Intrusion Detection system, Network and Distributed System Security Symposium Conference Proceedings February [18] Adam G Pennington John D Strunk John Linwood Griffin Craig A N Soules and Garth R Goodson: Storage-based Intrusion Detection: Watching storage activity for suspicious behavior, Proceedings of the 12th USENIX Security Symposium pp August 2003

73 72 [19] tripwire: [20] chkrootkit: [21] KSTAT: [22] kern check: check.c [23] alamo: [24] kad: Handling Interrupt Descriptor Table for fun and profit, Phrack Magazine Volume 11, Issue 59 File [25] Marc Khouzam and Thomas Kunz: Single Stepping in Event-Visualization Tools, Proceedings of the 1996 conference of the Centre for Advanced Studies, November [26] Intel: IA-32, Order Number J, 2002 [27] : Intel IA-32, 44 pp [28] : OLTP, [29] : 14 OLTP, 2003

74 73 [30] Jeffrey Dean, James E. Hicks, Carl A. Waldspurger, William E. Weihl and George Chrysos: ProfileMe: Hardware Support for Instruction-Level Profiling on Out-Of-Order Processors, Proceedings of Micro-30, December 1997 [31] Brinkley Sprunt: Pentium 4 Performance Monitoring Features, IEEE Micro Volume 22, Issue 4 July 2002 [32] Fred Cohen: Computer Viruses : Theory and Experiments, In 7th DOD/NBS Computer Security Conference Proceedings September 1984 [33] Yin Zhang and Vern Paxson: Detecting Backdoors, Proceedings of the 9th USENIX Security Symposium August 2000

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP LSM OS 700-8530 3 1 1 matsuda@swlab.it.okayama-u.ac.jp tabata@cs.okayama-u.ac.jp 242-8502 1623 14 munetoh@jp.ibm.com OS Linux 2.6 Linux Security Modules LSM LSM Linux 4 OS OS LSM An Evaluation of Performance

More information

Vol.55 No (Sep. 2014) 1,a) 1,b) , Linux Proposal of Kernel Rootkits Detection Method by Comparing Kernel Stack Yuta Ike

Vol.55 No (Sep. 2014) 1,a) 1,b) , Linux Proposal of Kernel Rootkits Detection Method by Comparing Kernel Stack Yuta Ike 1,a) 1,b) 2013 12 2, 2014 6 17 Linux Proposal of Kernel Rootkits Detection Method by Comparing Kernel Stack Yuta Ikegami 1,a) Toshihiro Yamauchi 1,b) Received: December 2, 2013, Accepted: June 17, 2014

More information

shio SA.ppt[読み取り専用]

shio SA.ppt[読み取り専用] 2005 213 Rootkit 2 ...... GPG EFS Windows 3 Rootkit + ifconfig, ps, ls, login Tripwire lkm-rootkit NT Rootkit, AFX Rootkit OS 4 HD... NTFS ADS Alternate Data Stream... NTFS HD HD...

More information

untitled

untitled IT E- IT http://www.ipa.go.jp/security/ CERT/CC http://www.cert.org/stats/#alerts IPA IPA 2004 52,151 IT 2003 12 Yahoo 451 40 2002 4 18 IT 1/14 2.1 DoS(Denial of Access) IDS(Intrusion Detection System)

More information

1 May 2011

1 May 2011 1 May 2011 2 May 2011 3 May 2011 4 May 2011 5 June 2011 6 June 2011 7 June 2011 8 June 2011 9 July 2011 10 July 2011 11 July 2011 12 July 2011 13 August 2011 14 August 2011 15 August 2011 16 August 2011

More information

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation 1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1

More information

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S 1 1 1 Fig. 1 1 Example of a sequential pattern that is exracted from a set of method definitions. A Defect Detection Method for Object-Oriented Programs using Sequential Pattern Mining Goro YAMADA, 1 Norihiro

More information

November 13 June 1 April 23 October 1 December 22 August 6 September 5 July 2 May 2 8 6 11 1 7 01 1516 4 23 4 1995 4 23 1999 4 23 19 2 02 88 5 2 3 03 6 1 6 1 300 4 04 100 7 2 7 2 706 15 2 5 05 8 6 86

More information

DEIM Forum 2017 H ,

DEIM Forum 2017 H , DEIM Forum 217 H5-4 113 8656 7 3 1 153 855 4 6 1 3 2 1 2 E-mail: {satoyuki,haya,kgoda,kitsure}@tkl.iis.u-tokyo.ac.jp,.,,.,,.,, 1.. 1956., IBM IBM RAMAC 35 IBM 35 24 5, 5MB. 1961 IBM 131,,, IBM 35 13.,

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

1 3DCG [2] 3DCG CG 3DCG [3] 3DCG 3 3 API 2 3DCG 3 (1) Saito [4] (a) 1920x1080 (b) 1280x720 (c) 640x360 (d) 320x G-Buffer Decaudin[5] G-Buffer D

1 3DCG [2] 3DCG CG 3DCG [3] 3DCG 3 3 API 2 3DCG 3 (1) Saito [4] (a) 1920x1080 (b) 1280x720 (c) 640x360 (d) 320x G-Buffer Decaudin[5] G-Buffer D 3DCG 1) ( ) 2) 2) 1) 2) Real-Time Line Drawing Using Image Processing and Deforming Process Together in 3DCG Takeshi Okuya 1) Katsuaki Tanaka 2) Shigekazu Sakai 2) 1) Department of Intermedia Art and Science,

More information

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification

More information

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**

More information

B

B B 27 1153021 28 2 10 1 1 5 1.1 CPU................. 5 1.2.... 5 1.3.... 6 1.4.. 7 1.5................................ 8 2 9 2.1.................................. 9 2.2............................ 10 2.3............................

More information

56 OS OS OS OS 1 OS HDD OS 1 OS HDD HDD OS OS OSOS HDD 図 1 二重キャッシュ環境 3. 負の参照の時間的局所性 3.1 参照の局所性 Locality of Reference Temporal locality Spatial localit

56 OS OS OS OS 1 OS HDD OS 1 OS HDD HDD OS OS OSOS HDD 図 1 二重キャッシュ環境 3. 負の参照の時間的局所性 3.1 参照の局所性 Locality of Reference Temporal locality Spatial localit 116 26 4 1 2 2 1 3 An Analysis of Locality of Reference in Virtualized Environment Hiroki SUGIMOTO 1, Kousuke TAKEUCHI 2, Kouya HINAGAWA 2 and Saneyasu YAMAGUCHI 1 3 Abstract As cloud computing has spread

More information

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2013-HPC-139 No /5/29 Gfarm/Pwrake NICT NICT 10TB 100TB CPU I/O HPC I/O NICT Gf

情報処理学会研究報告 IPSJ SIG Technical Report Vol.2013-HPC-139 No /5/29 Gfarm/Pwrake NICT NICT 10TB 100TB CPU I/O HPC I/O NICT Gf Gfarm/Pwrake NICT 1 1 1 1 2 2 3 4 5 5 5 6 NICT 10TB 100TB CPU I/O HPC I/O NICT Gfarm Gfarm Pwrake A Parallel Processing Technique on the NICT Science Cloud via Gfarm/Pwrake KEN T. MURATA 1 HIDENOBU WATANABE

More information

SOZO_経営_PDF用.indd

SOZO_経営_PDF用.indd Faculty of Business Administration Department of Business Administration CONTENTS ADMISSION POLICY 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 INTERNET SOZO Wireless Network 16 Campus Life Calendar APRIL MAY JUNE

More information

2016 10 31 1. 1.1 20 1 1993 20 2 2 1 industrial society 2 2 169 2014 3 1.2 4 5 6 3 1.3 4 5 1973 6 170 7 8 9 7 ISO/IEC 9126 11 8 1 9 ABS ABS ABS ABS 171 2. 2.1 1960 10 11 12 13 10 1964 IBM S/360 11 16 FORTRAN

More information

paper

paper WISS2013 EpisoPass:. / EpisoPass EpisoPass / 1 [21] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [23] [1][3][12] [18] Copyright is held by the author(s). Toshiyuki Masui, [25] [2][19] EpisoPass

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

GOVERNOR'S No.1 JULY 2 GOVERNOR'S No.1 JULY 3 GOVERNOR'S No.1 JULY 4 GOVERNOR'S No.1 JULY 5 GOVERNOR'S No.1 JULY 6 GOVERNOR'S No.1 JULY 7 GOVERNOR'S No.1 JULY 8 GOVERNOR'S No.1 JULY 9 GOVERNOR'S No.1 JULY

More information

MORALITY LEARNING AMBITION 2 KASUMIGAOKA

MORALITY LEARNING AMBITION 2 KASUMIGAOKA KASUMIGAOKA MORALITY LEARNING AMBITION 2 KASUMIGAOKA KASUMIGAOKA 3 4 KASUMIGAOKA KASUMIGAOKA 5 Super Science High School 6 KASUMIGAOKA School Life 4 April 5 May 6 June 7 July 8 August 9 September 10 October

More information

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU 1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale

More information

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3) (MIRU2012) 2012 8 820-8502 680-4 E-mail: {d kouno,shimada,endo}@pluto.ai.kyutech.ac.jp (1) (2) (3) (4) 4 AdaBoost 1. Kanade [6] CLAFIC [12] EigenFace [10] 1 1 2 1 [7] 3 2 2 (1) (2) (3) (4) 4 4 AdaBoost

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor

独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor 独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that

More information

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3 36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

workshop Eclipse TAU AICS.key

workshop Eclipse TAU AICS.key 11 AICS 2016/02/10 1 Bryzgalov Peter @ HPC Usability Research Team RIKEN AICS Copyright 2016 RIKEN AICS 2 3 OS X, Linux www.eclipse.org/downloads/packages/eclipse-parallel-application-developers/lunasr2

More information

新製品開発プロジェクトの評価手法

新製品開発プロジェクトの評価手法 CIRJE-J-60 2001 8 A note on new product project selection model: Empirical analysis in chemical industry Kenichi KuwashimaUniversity of Tokyo Junichi TomitaUniversity of Tokyo August, 2001 Abstract By

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

美唄市広報メロディー2014年1月号

美唄市広報メロディー2014年1月号 1 2014 E-mailkouhoujouhou@city.bibai.lg.jp January May September October November December February March June July August April BIBAI CITY INFORMATION http://db.net-bibai.co.jp/bibai/

More information

13金子敬一.indd

13金子敬一.indd 1 1 Journal of Multimedia Aided Education Research, 2004, No. 1, 115122 ED21 1 2 2 WWW 158 34 Decker 3 ED21 ED21 1 ED21 1 CS 1 2 ED213 4 5 ED21 ED21 ED21 ED9900 9 EL21 EE21 EC21 ED9900 JavaApplet JavaApplet

More information

i Ceph

i Ceph 23 Ceph I/O 20 20115107 i 1 1 2 2 2.1.............................. 2 2.1.1..................... 2 2.1.2.................. 3 2.1.3....................... 3 2.2 Ceph........................ 4 2.2.1.................................

More information

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN DEIM Forum 2017 H2-2 Android LAN 112-8610 2-1-1 163-8677 1-24-2 E-mail: {ayano,oguchi}@ogl.is.ocha.ac.jp, sane@cc.kogakuin.ac.jp Android 1 Android LAN Ayano KOYANAGI, Saneyasu YAMAGUCHI, and Masato OGUCHI

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

IPSJ SIG Technical Report Vol.2015-ARC-215 No.7 Vol.2015-OS-133 No /5/26 Just-In-Time PG 1,a) 1, Just-In-Time VM Geyser Dalvik VM Caffei

IPSJ SIG Technical Report Vol.2015-ARC-215 No.7 Vol.2015-OS-133 No /5/26 Just-In-Time PG 1,a) 1, Just-In-Time VM Geyser Dalvik VM Caffei Just-In-Time PG 1,a) 1, 1 2 1 1 Just-In-Time VM Geyser Dalvik VM CaffeineMark SPECJVM 17% 1. LSI [1][2][3][4][5] (PG) Geyser [6][7] PG ON/OFF OS PG PG [7][8][9][10] Java Just-In-Time (JIT PG [10] JIT 1

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting

More information

3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root

3.1 Thalmic Lab Myo * Bluetooth PC Myo 8 RMS RMS t RMS(t) i (i = 1, 2,, 8) 8 SVM libsvm *2 ν-svm 1 Myo 2 8 RMS 3.2 Myo (Root 1,a) 2 2 1. 1 College of Information Science, School of Informatics, University of Tsukuba 2 Faculty of Engineering, Information and Systems, University of Tsukuba a) oharada@iplab.cs.tsukuba.ac.jp 2.

More information

25 3 26 2 14 12350917 3 Cyclesports USBhostAPI Arduino 3 LED LED LED Cyclesports Cyclesports 1 4 1.1...................................... 4 1.2................. 5 1.3.................................

More information

火災危険1.PDF

火災危険1.PDF 1994 22 NFPA(National Fire Protection Association ) USFA(United States Fire Administration ) NFPA USFA NFPA 64 NFPA J.Hall ( ) 1),2),3),4) 20.7 15 1994 33 18 GDP 5),6) 50 72.1 19851989 94.6 89.4 89.3 19881997

More information

DNS: Domain Name

DNS: Domain Name 2012 DNS 2012 8 2 5110B140-4 1 5 1.1..................................... 5 1.2..................................... 6 1.3.................................... 6 2 DNS: Domain Name System 7 2.1...................................

More information

IPSJ SIG Technical Report Vol.2013-ICS-172 No /11/12 1,a), 1,b) Anomaly Detection 1. 1 Nagoya Institute of Technology 1 Presently with Nagoya In

IPSJ SIG Technical Report Vol.2013-ICS-172 No /11/12 1,a), 1,b) Anomaly Detection 1. 1 Nagoya Institute of Technology 1 Presently with Nagoya In 1,a), 1,b) Anomaly Detection 1. 1 Nagoya Institute of Technology 1 Presently with Nagoya Institute of Technology a) otsuka.takanobu@nitech.ac.jp b) ito.takayuki@nitech.ac.jp Anomaly Detection 2 3 4 5 6

More information

2

2 Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/

More information

EPSON ES-D200 パソコンでのスキャンガイド

EPSON ES-D200 パソコンでのスキャンガイド NPD4271-00 ...4...7 EPSON Scan... 7...11 PDF...12 / EPSON Scan...13 EPSON Scan...13 EPSON Scan...14 EPSON Scan...14 EPSON Scan...15 Epson Event Manager...16 Epson Event Manager...16 Epson Event Manager...16

More information

04.™ƒ”R/’Ô”�/’Xfl©

04.™ƒ”R/’Ô”�/’Xfl© Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

RICOH SP 6440/6430/6420/6410/6440M/6430M/6420M

RICOH SP 6440/6430/6420/6410/6440M/6430M/6420M Black & White Printer RICOH SP 6440 A3 38 RICOH SP 6430 A3 38 RICOH SP 6420 A3 38 RICOH SP 6410 A3 32 RICOH SP 6440/6430/6420/6410 RICOH SP 6440/6440M RICOH SP 6430/6430M RICOH SP 6420/6420M RICOH SP 6410

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

名称未設定

名称未設定 Parallels Desktop 6 for Mac Read Me Parallels Desktop for Mac build 6.0.11822 Parallels Desktop for Mac 1.Parallels Desktop for Mac 2. 3. 4. 5. Parallels Desktop 6. Parallels Desktop 6 for Mac 7. Parallels

More information

Mark A. Peterson, Legislating Together: The White House and Capitol Hill from Eisenhower to Reagan, Cambridge : Harvard University Press, Michel Foley

Mark A. Peterson, Legislating Together: The White House and Capitol Hill from Eisenhower to Reagan, Cambridge : Harvard University Press, Michel Foley Mark A. Peterson, Legislating Together: The White House and Capitol Hill from Eisenhower to Reagan, Cambridge : Harvard University Press, Michel Foley and John E. Owens, Congress and the presidency: Institutional

More information

Computer Security Symposium October 2015 DDoS

Computer Security Symposium October 2015 DDoS Computer Security Symposium 2015 21-23 October 2015 DDoS 657-8501 1-1 146t255t@stu.kobe-u.ac.jp kitazono@eedept.kobe-u.ac.jp ozawasei@kobe-u.ac.jp 184-8795 4-2-1 bantao@nict.go.jp nakazato@nict.go.jp 141-0031

More information

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF.

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF. 2011 2012 1 31 5110B036-6 1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF....................................

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325 社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

JR東日本会社要覧2012-2013

JR東日本会社要覧2012-2013 Technology Planning Department Frontier Service Development Laboratory Advanced Railway System Development Center Safety Research Laboratory Disaster Prevention Research Laboratory Technical Center Environmental

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

1 OpenCL OpenCL 1 OpenCL GPU ( ) 1 OpenCL Compute Units Elements OpenCL OpenCL SPMD (Single-Program, Multiple-Data) SPMD OpenCL work-item work-group N

1 OpenCL OpenCL 1 OpenCL GPU ( ) 1 OpenCL Compute Units Elements OpenCL OpenCL SPMD (Single-Program, Multiple-Data) SPMD OpenCL work-item work-group N GPU 1 1 2 1, 3 2, 3 (Graphics Unit: GPU) GPU GPU GPU Evaluation of GPU Computing Based on An Automatic Program Generation Technology Makoto Sugawara, 1 Katsuto Sato, 1 Kazuhiko Komatsu, 2 Hiroyuki Takizawa

More information

IPSJ SIG Technical Report Vol.2013-ARC-203 No /2/1 SMYLE OpenCL (NEDO) IT FPGA SMYLEref SMYLE OpenCL SMYLE OpenCL FPGA 1

IPSJ SIG Technical Report Vol.2013-ARC-203 No /2/1 SMYLE OpenCL (NEDO) IT FPGA SMYLEref SMYLE OpenCL SMYLE OpenCL FPGA 1 SMYLE OpenCL 128 1 1 1 1 1 2 2 3 3 3 (NEDO) IT FPGA SMYLEref SMYLE OpenCL SMYLE OpenCL FPGA 128 SMYLEref SMYLE OpenCL SMYLE OpenCL Implementation and Evaluations on 128 Cores Takuji Hieda 1 Noriko Etani

More information

2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4

2.R R R R Pan-Tompkins(PT) [8] R 2 SQRS[9] PT Q R WQRS[10] Quad Level Vector(QLV)[11] QRS R Continuous Wavelet Transform(CWT)[12] Mexican hat 4 G-002 R Database and R-Wave Detecting System for Utilizing ECG Data Takeshi Nagatomo Ikuko Shimizu Takeshi Ikeda Akio Sashima Koichi Kurumatani R R MIT-BIH R 90% 1. R R [1] 2 24 16 Tokyo University of

More information

[1] [2] [3] (RTT) 2. Android OS Android OS Google OS 69.7% [4] 1 Android Linux [5] Linux OS Android Runtime Dalvik Dalvik UI Application(Home,T

[1] [2] [3] (RTT) 2. Android OS Android OS Google OS 69.7% [4] 1 Android Linux [5] Linux OS Android Runtime Dalvik Dalvik UI Application(Home,T LAN Android Transmission-Control Middleware on multiple Android Terminals in a WLAN Environment with consideration of Round Trip Time Ai HAYAKAWA, Saneyasu YAMAGUCHI, and Masato OGUCHI Ochanomizu University

More information

16

16 Empirical Analysis of the Efficiency of the Broadcasting Industry: Verification of Regionalism and a Proposal ABSTRACT Reforms in the broadcasting industry have recently been discussed and proposed, and

More information

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC H.264 CABAC 1 1 1 1 1 2, CABAC(Context-based Adaptive Binary Arithmetic Coding) H.264, CABAC, A Parallelization Technology of H.264 CABAC For Real Time Encoder of Moving Picture YUSUKE YATABE 1 HIRONORI

More information

dsample.dvi

dsample.dvi 1 1 1 2009 2 ( ) 600 1 2 1 2 RFID PC Practical Verification of Evacuation Guidance Based on Pedestrian Traffic Measurement Tomohisa Yamashita, 1 Shunsuke Soeda 1 and Noda Itsuki 1 In this paper, we report

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

Key Words: probabilisic scenario earthquake, active fault data, Great Hanshin earthquake, low frequency-high impact earthquake motion, seismic hazard map 3) Cornell, C. A.: Engineering Seismic

More information

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z + 3 3D 1,a) 1 1 Kinect (X, Y) 3D 3D 1. 2010 Microsoft Kinect for Windows SDK( (Kinect) SDK ) 3D [1], [2] [3] [4] [5] [10] 30fps [10] 3 Kinect 3 Kinect Kinect for Windows SDK 3 Microsoft 3 Kinect for Windows

More information

,…I…y…„†[…e…B…fi…O…V…X…e…•‡Ì…J†[…l…‰fi®“ì‡Ì›Â”‰›»pdfauthor

,…I…y…„†[…e…B…fi…O…V…X…e…•‡Ì…J†[…l…‰fi®“ì‡Ì›Â”‰›»pdfauthor OS 1 1 4 1.1........................................... 4 1.2........................................... 4 2 5 2.1..................................... 5 2.2 OS................................... 5 3 7

More information

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high

More information

SEJulyMs更新V7

SEJulyMs更新V7 1 2 ( ) Quantitative Characteristics of Software Process (Is There any Myth, Mystery or Anomaly? No Silver Bullet?) Zenya Koono and Hui Chen A process creates a product. This paper reviews various samples

More information

IPSJ SIG Technical Report Vol.2014-ICS-175 No /3/14 Modified Stochastic Cell Transmission Model 1,a) 1,b) 1,c) Cell Transmission Model CTM Stoc

IPSJ SIG Technical Report Vol.2014-ICS-175 No /3/14 Modified Stochastic Cell Transmission Model 1,a) 1,b) 1,c) Cell Transmission Model CTM Stoc Modified Stochastic Cell Transmission Model 1,a) 1,b) 1,c) Cell Transmission Model CTM Stochastic Cell Transmission Model SCTM CTM SCTM Modified Stochastic Cell Transmission Model MSCTM MSCTM CTM 1. Cell

More information

,, WIX. 3. Web Index 3. 1 WIX WIX XML URL, 1., keyword, URL target., WIX, header,, WIX. 1 entry keyword 1 target 1 keyword target., entry, 1 1. WIX [2

,, WIX. 3. Web Index 3. 1 WIX WIX XML URL, 1., keyword, URL target., WIX, header,, WIX. 1 entry keyword 1 target 1 keyword target., entry, 1 1. WIX [2 DEIM Forum 2013 B10-4 Web Index 223-8522 3-14-1 E-mail: haseshun@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp, URL WIX, Web Web Index(WIX). WIX, WIX.,,. Web Index, Web, Web,, Related Contents Recommendation

More information

2 2001 5 1 (New Framework) BMD 1980 BMD BMD BMD BMD BMD BMD BMD 1980 BMD 85 BMD 98 12 BMD

2 2001 5 1 (New Framework) BMD 1980 BMD BMD BMD BMD BMD BMD BMD 1980 BMD 85 BMD 98 12 BMD BMD (George W Bush) (strategic fait accompli) 1 (Bill Clinton) 1999 7 NMD NMD 2001 5 1 (NMD) TMD MAD 01 12 ABM (Balance of Terror) ABM 02 6 (John Lewis Gaddis) (The Long Peace) 2 ABM ABM (MD) 1 2 2001

More information

EPSON EP-803A/EP-803AW ユーザーズガイド

EPSON EP-803A/EP-803AW ユーザーズガイド NPD4293-00 ...6... 6...10 Mac OS X...11 Mac OS X v10.5.x v10.6.x...11 Mac OS X v10.4.x...15...18...19...19...22...23...24!ex...24 /...25 P.I.F. PRINT Image Framer...25...26...30...30...31...31...31...35

More information

インターネットと運用技術シンポジウム 2016 Internet and Operation Technology Symposium 2016 IOTS /12/1 syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo Show

インターネットと運用技術シンポジウム 2016 Internet and Operation Technology Symposium 2016 IOTS /12/1 syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo Show syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo ShowNet syslog Proposal of the anomaly detection method analyzing syslog data using Bollinger Bands algorithm on event network Hiroshi Abe 1,2,a) Mikifumi

More information

EPSON EP-703A ユーザーズガイド

EPSON EP-703A ユーザーズガイド NPD4295-00 ...6... 6...10 Mac OS X...11 Mac OS X v10.5.x v10.6.x...11 Mac OS X v10.4.x...15...18...19...19...22...23...24!ex...24 /...25 P.I.F. PRINT Image Framer...25...26...29...30...30...31...31...34

More information

36 581/2 2012

36 581/2 2012 4 Development of Optical Ground Station System 4-1 Overview of Optical Ground Station with 1.5 m Diameter KUNIMORI Hiroo, TOYOSHMA Morio, and TAKAYAMA Yoshihisa The OICETS experiment, LEO Satellite-Ground

More information

2004 SYN/ACK SYN Flood G01P014-6

2004 SYN/ACK SYN Flood G01P014-6 2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................

More information

guideline_1_0.dvi

guideline_1_0.dvi Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10

More information

2013 M

2013 M 2013 M0110453 2013 : M0110453 20 1 1 1.1............................ 1 1.2.............................. 4 2 5 2.1................................. 6 2.2................................. 8 2.3.................................

More information

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara 1 1,2 1 (: Head Mounted Display),,,, An Information Presentation Method for Wearable Displays Considering Surrounding Conditions in Wearable Computing Environments Masayuki Nakao 1 Tsutomu Terada 1,2 Masahiko

More information

Enterprise Software Support(ESS)とEnterprise Software Support Standard(ESS Standard)のサポート対象OSおよびアプリケーションリスト

Enterprise Software Support(ESS)とEnterprise Software Support Standard(ESS Standard)のサポート対象OSおよびアプリケーションリスト サポート対象 OS およびション ARCserve Backup r16.5 Windows 16.5 サポート対象アプリケー Client Agent for サービスの種類 サービス終了予定日 2018 年 3 月 30 日 ARCserve Backup r16.5 for Windows 16.5 2018 年 3 月 30 日 ARCserve Backup r16.5 for Windows

More information

Microsoft Word - deim2011_new-ichinose-20110325.doc

Microsoft Word - deim2011_new-ichinose-20110325.doc DEIM Forum 2011 B7-4 252-0882 5322 E-mail: {t08099ai, kurabaya, kiyoki}@sfc.keio.ac.jp A Music Search Database System with a Selector for Impressive-Sections of Continuous Data Aya ICHINOSE Shuichi KURABAYASHI

More information

2 1958 10 2 2 60 60020 20 10 1 10 2, 3 2, 3 5 6 108 6 357

2 1958 10 2 2 60 60020 20 10 1 10 2, 3 2, 3 5 6 108 6 357 3 860 8555 2 39 1 e-mail: keitaro@sci.kumamoto-u.ac.jp 1 3 1958 1 195710 1957 7 * 1 12 Fred Lawrence Whipple * 1 1957 7 1 1958 12 31 356 2015 6 2 1958 10 2 2 60 60020 20 10 1 10 2, 3 2, 3 5 6 108 6 357

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

01.97号.indd

01.97号.indd 2014.November No.97NIHON UNIVERSITY College of Science and Technology Department of Oceanic Architecture and Engineering 97 Teaching Staff VOICE VOICE Jiang Jianyi Gu Xinglong Yin Jiawei VOICE REPORT

More information

リコー工業所有権紹介|リコーテクニカルレポートNo.23

リコー工業所有権紹介|リコーテクニカルレポートNo.23 138 Ricoh Technical Report No.23, SEPTEMBER, 1997 Ricoh Technical Report No.23, SEPTEMBER, 1997 139 140 Ricoh Technical Report No.23, SEPTEMBER, 1997 Ricoh Technical Report No.23, SEPTEMBER, 1997 141 142

More information

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis 1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames

More information

2008 : 80725872 1 2 2 3 2.1.......................................... 3 2.2....................................... 3 2.3......................................... 4 2.4 ()..................................

More information

Contents

Contents 2009 Faculty of Humanities and Economics Faculty of Education Faculty of Science Medical School Faculty of Agriculture 2009 Contents Geographical features of Tosa 3 Geographical features of Tosa Geographical

More information