Vol.53 No (Feb. 2012) IaaS 1 1 1, , IaaS VM VM VM VM VM VM IaaS VM IaaS FBCrypt FBCrypt VNC VMM VM VM FBCrypt Xen TightVNC S
|
|
- ありあ こうい
- 4 years ago
- Views:
Transcription
1 IaaS 1 1 1, , IaaS VM VM VM VM VM VM IaaS VM IaaS FBCrypt FBCrypt VNC VMM VM VM FBCrypt Xen TightVNC Secure Out-of-band Remote Management in IaaS Clouds Tomohisa Egawa 1 Naoki Nishimura 1 Kenichi Kourai 1,2 Received: November 4, 2011, Accepted: December 1, 2011 Abstract: In Infrastructure-as-a-Service (IaaS) clouds, the users remotely manage the systems in the provided virtual machines (VMs) called user VMs. Out-of-band remote management via the management VM allows the users to manage their systems even on failures inside the user VMs. However, the management VM is not always trustworthy in IaaS clouds. Outside or inside attackers in the management VM can easily eavesdrop on the keyboard inputs and video outputs in out-of-band remote management. To solve this security issue, this paper proposes FBCrypt for enabling secure out-of-band remote management. FBCrypt encrypts the inputs and outputs in a VNC client and the virtual machine monitor to prevent information leakage via the management VM. We have implemented FBCrypt in Xen and TightVNC and confirmed that the keyboard inputs and video outputs did not leak. Keywords: Virtual machine, remote management, information leakage 1. Infrastructure as a Service IaaS VM VM VNC VM VM 1 Kyushu Institute of Technology 2 CREST OS VM VM VM VM VM IaaS VM [1], [2] VM [3] VM c 2012 Information Processing Society of Japan 1
2 VNC VM IaaS FBCrypt FBCrypt VNC VMM VM VM VM VNC VMM VM VMM VNC FBCrypt VM VM FBCrypt Xen [4] TightVNC [5] VMM VM I/O IN VMM VMM VFB VM VFB FBCrypt VM 2 IaaS 3 FBCrypt 4 5 FBCrypt VM IaaS VM VNC VM VNC VNC VNC VM VNC VNC VM VM VNC VM OS OS VNC 1 VM VM 1 VM VM VM VM VM VM VNC VM VM VM VM VM VM OS Xen KVM VMware vsphere Hypervisor IaaS [6] IaaS VM IaaS VM [1], [2] IaaS VM VM VM VM IaaS VM VM VNC VNC VPN SSH VM VM c 2012 Information Processing Society of Japan 2
3 VM VNC VM VNC VM VM VM VNC VNC VNC VM VM VM VM 3. FBCrypt IaaS FBCrypt 3.1 FBCrypt IaaS VM VM OS VNC VM VNC VM FBCrypt IaaS [7] VMM VM VM VMM VM VM VM PC VNC 2 FBCrypt 3.2 FBCrypt FBCrypt VNC VMM VM VM VM FBCrypt VM VNC VM VMM VNC VM VNC. VNC VM VM VM VMM VM VM OS VMM VNC VM VNC VM VNC MAC VMM VM VM VM c 2012 Information Processing Society of Japan 3
4 VMM VNC VM VM VMM VM VNC VNC VNC VM VNC VNC VM OS OS VMM FBCrypt IaaS IaaS VMM TPM [8] FBCrypt TPM VMM VMM VMM IaaS IaaS FBCrypt Xen 1 VMM VMM VM Xen VM 0 VM VMM VMM KVM 2VMM VM OS VMM VMM FBCrypt VNC VNC VMM VM VMM VMM IaaS VMM VNC VMM VM VM VMM VMM VNC VMM VMM TPM VMM VM VMM 4. FBCrypt Xen [4] TightVNC Java Viewer [5] Xen VM 0 VM U VM IO QEMU VNC VM OS Linux Linux VNC 0 VNC VNC U VNC VMM VMM U I/O I/O VNC U I/O FBCrypt VMM I/O U kbdfront I/O 4 VNC U IN VMM 0 U VMM c 2012 Information Processing Society of Japan 4
5 FBCrypt VMM VNC VNC VMM MAC VNC MAC VMM VMM U OS VMM ASCII U VNC ASCII FBCrypt ASCII VMM I/O FBCrypt VMM U IO U I/O xenkbd 0 XenStore XenStore VMM U 0 xenkbd XenStore U I/O FBCrypt 0 U I/O 0 0 XenStore I/O xenkbd FBCrypt VMM 0 xenkbd 0 U VMM 0 XenStore xenkbd AES CTR [9] FBCrypt CyaSSL [10] VMM VNC TightVNC Java Viewer [5] Java API VNC 2 VNC 2 Enter Delete U fbfront VFB 0 VNC VFB U VFB 0 VFB c 2012 Information Processing Society of Japan 5
6 5 6 XenStore VFB FBCrypt VMM U VFB Linux U VFB 0 U VFB VFB xenfb U VFB 0 xenfb 0 XenStore VMM VFB VMM U VFB 0 0 U VFB VFB FBCrypt 0 VFB 2 VFB U VFB I/O 0 I/O xenfb VMM VFB 0 VFB 0 VNC VNC VNC VNC VFB FBCrypt I/O 0 U VFB U VFB 0 U VFB VMM I/O I/O I/O VFB RC5 [11] RC5 Xen VFB 1 32 FBCrypt RC5 x y VFB 2 Xen VNC VNC VNC XenStore U XenStore VMM FBCrypt VMM 0 U XenStore XenStore I/O U XenStore 16 XenStore XenStore device/vkbd/0/page-ref xenkbd c 2012 Information Processing Society of Japan 6
7 device/vfb/0/page-ref xenfb FBCrypt VMM U XenStore 0 XenStore FBCrypt VMM XenStore U XenStore XenStore U 0 U VMM U CPU XenStore FBCrypt VMM U CPU RSI U VMM U U P2M P2M U VMM U P2M P2M VMM M2P U VMM XenStore XenStore VMM XenStore 0 5. FBCrypt FBCrypt VNC Intel Core 2 Quad Q GHz CPU VNC VM VM VMM 7 VM 8 9 ( ) ( ) FBCrypt Xen VM VM Linux GB 0 3GB U 512MB VNC FBCrypt TightVNC Java Viewer Linux VM VNC VM VNC FBCrypt VNC 7 FBCrypt VNC 8 VM VNC VM VFB FBCrypt VM FBCrypt VM c 2012 Information Processing Society of Japan 7
8 10 13 (a) (b) FBCrypt 11 FBCrypt VM 800x600 FBCrypt VM VNC 13 FBCrypt 46ms 46ms 6. (a) (b) FBCrypt VNC FBCrypt VNC PV FBCrypt 5.1ms FV FBCrypt 4.2ms FBCrypt Xoar [12] VNC QEMU QemuVM VM Xen QEMU VM VM OS mini-os VM VNC IaaS VMware vsphere Hypervisor ESXi) [13] VMM VNC VMM VM VM VNC VMM FBCrypt VNC [2] VMCrypt [14] VM VM VM VM VMM VM I/O VFB c 2012 Information Processing Society of Japan 8
9 VM FBCrypt VM FBCrypt VM VM CloudVisor [7] VMM VM CloudVisor VM VMM VM VM VMM BitVisor [15] OS VMM OS I/O VMM USB PC BitVisor VM VMM VMM BitVisor Xen VNC Proxy [16] VM VM xvp Web VM VM VM xvp VNC 7. IaaS FBCrypt FBCrypt VNC VMM VM VM FBCrypt Xen TightVNC Java Viewer OS Windows Linux OS VFB AES 179 (2010). [3] TechSpot News: Google Fired Employees for Breaching User Privacy, google-fired-employees-for-breaching-user-privacy. html (2010). [4] P.Barham, B.Dragovic, K.Fraser, S.Hand, T.Harris, A.Ho, R.Neugebauer, I.Pratt and A.Warfield: Xen and the Art of Virtualization, In Proc. of the 19th Symposium on Operating Systems Principles, pp (2003). [5] TightVNC Group: TightVNC, com/. [6] rackspace: rackspace, [7] Zhang, F., Chen, J., Chen, H. and Zang, B.: CloudVisor: Retrofitting Protection of Virtual Machines in Multitenant Cloud with Nested Virtualization, Proc. Symp. Operating Systems Principles, pp (2011). [8] Trusted Computing Group: TPM Main Specification, (2011). [9] NIST: Advanced Encryption Standard (AES)., FIPS Publication 197 (2001). [10] yassl: yassl - Embedded SSL Library for Applications,Devices,and the Cloud, yassl/home.html. [11] Rivest, R. L.: The RC5 Encryption Algorithm, Proc. Workshop Fast Software Encryption (1994). [12] Colp, P., Nanavati, M., Zhu, J., Aiello, W., Coker, G., Deegan, T., Loscocco, P. and Warfield, A.: Breaking Up is Hard to Do: Security and Functionality in a Commodity Hypervisor, Proc. Symp. Operating Systems Principles, pp (2011). [13] VMware Inc.: VMware vsphere Hypervisor, [14] Preventing Information Leakage from Virtual Machine s Memory in IaaS Clouds, Advanced Computing Systems ACS Vol 5 No.4) (2012). [15] Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo, Y. and Kato, K.: BitVisor, Proc. Intl. Conf. Virtual Execution Environments and VEE 09, pp (2009). [16] xvp Project: Xen VNC Proxy Cross-platform VNCbased and Web-based Management for Citrix XenServer and Xen Cloud Platform 2012/6/28. [1] Santos, N., Gummadi, K. P. and Rodrigues, R.: Towards Trusted Cloud Computing, Proc. Workshop Hot Topics in Cloud Computing (2009). [2] Li, C., Raghunathan, A. and Jha, N. K.: Secure Virtual Machine Execution under an Untrusted Management OS, Proc. Intl. Conf. Cloud Computing, pp. 172 c 2012 Information Processing Society of Japan 9
IPSJ SIG Technical Report IaaS VM 1 1 1, 2 IaaS VM VM VM VM VM VM IaaS VM VM VM FBCrypt-V FBCrypt-V VM VMM FBCrypt-V Xen TightVNC VM Preventing Inform
IaaS VM 1 1 1, 2 IaaS VM VM VM VM VM VM IaaS VM VM VM FBCrypt-V FBCrypt-V VM VMM FBCrypt-V Xen TightVNC VM Preventing Information Leakage from Screens via Management VMs in IaaS Naoki Nishimura, 1 Tomohisa
More informationVM VM VM VM I/O UVBond VM % 3.2% 2 VM 3 UVBond VM VM VM VM VM VM SSH VNC VM Google [16] 28% [11] 35% [4] VM 1 IaaS VM VM VM VM VM [5]
34 (2017 ) VM IaaS IaaS VM VM VM VM VM UVBond UVBond VM VM VM VM VM UVBond Xen VM VM 1 IaaS VM VM VM VM VNC SSH VM VM VM VM VM VM Keisuke Inokuchi, Kenichi Kourai,, Kyushu Institute of Technology. VM VM
More informationIPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo
1 1 2 3 4 5 1 1, 6 Construction and Operation of Large Scale Web Contents Distribution Platform using Cloud Computing 1. ( ) 1 IT Web Yoshihiro Okamoto, 1 Naomi Terada and Tomohisa Akafuji, 1, 2 Yuko Okamoto,
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information今から間にあう仮想化入門とXenについて
Xen Linux 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Agenda IA Xen. Xen 4. Xen 2 19 10 1 IA IA Server Linux Windows Linux Linux
More information1 Microsoft Windows Server 2012 Windows Server Windows Azure Hyper-V Windows Server 2012 Datacenter/Standard Hyper-V Windows Server Windo
Windows Server 2012 2012 1 Cloud OS Windows Azure Platform On-Premises Service Provider 1 Microsoft Windows Server 2012 Windows Server 2012 1 Windows Azure Hyper-V Windows Server 2012 Datacenter/Standard
More informationIPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS
1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high
More informationVol.57 No (Mar. 2016) 1,a) , L3 CG VDI VDI A Migration to a Cloud-based Information Infrastructure to Support
1,a) 1 1 2015 6 22, 2015 12 7 L3 CG 50 600 VDI VDI A Migration to a Cloud-based Information Infrastructure to Support University Education and It s Analysis Kaori Maeda 1,a) Nobuo Suematsu 1 Toshiaki Kitamura
More informationデスクトップ仮想化の理解
Core vpro IT IT PC /OS 1 IT PC PC Core vpro PC .................................... 3 1................................................... 3 2................................. 4.................................................
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationPC Development of Distributed PC Grid System,,,, Junji Umemoto, Hiroyuki Ebara, Katsumi Onishi, Hiroaki Morikawa, and Bunryu U PC WAN PC PC WAN PC 1 P
PC Development of Distributed PC Grid System,,,, Junji Umemoto, Hiroyuki Ebara, Katsumi Onishi, Hiroaki Morikawa, and Bunryu U PC WAN PC PC WAN PC 1 PC PC PC PC PC Key Words:Grid, PC Cluster, Distributed
More informationECU RTOS 1),2) µitron 3) OSEK OS 4) API API DUOS Dual API Real-time OS ECU RTOS RTOS DUOS API ECU-A アプリケーションA RTOS-A CPU 30MHz ECU-B アプリケーションB RTOS-B
DUOS: ECU RTOS 1 1 1 1 1 1 1 ECU ECU ECU ECU ECU ECU RTOS µitron OSEK OS API API DUOS API DUOS: A Real-Time OS Framework for Integrating Electronic Control Units in Automotive Control Systems TAKUYA NAGAO,
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More information1 / 1 idrac8 CPU 1 Intel Xeon E v5 Intel Pentium Intel Core i3 Intel Celeron Intel C236 Microsoft Windows Server 2008 R2 SP1 Microsoft Windows S
PowerEdge T130 Contents RAID /RAID & PCIe OS P2-3 P4 P5 P5 P6 P7-8 P9-15 P16-18 P19 P19 P20-23 P24 P25-27 P27-28 P29-30 V1.1 Mar. 2016 1 / 1 idrac8 CPU 1 Intel Xeon E3-1200 v5 Intel Pentium Intel Core
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More informationPeerPool IP NAT IP UPnP 2) Bonjour 3) PeerPool CPU 4) 2 UPnP Bonjour PeerPool CPU PeerPool PeerPool PPv2 PPv2 2. PeerPool 2.1 PeerPool PeerPool PoolGW
PPv2: 1 2 3 4 PeerPool PeerPool 3 PPv2(PeerPool version 2) PPv2: A Transparent Network Architecture for Naive Inter-Smart Environment Communication Michinobu Shimatani, 4 Yu Enokibori, 2 ismail Arai 3
More information1_26.dvi
C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito
More informationスライド 1
FISMA 1 1 2 3 4 1 ISO/IEC 27001) (27003,27004,27007 3416 2010 2 ) IPA 5 6 7 http://csrc.nist.gov/groups/sma/fisma/index.html 8 9 (2003-2008) 2008) 10 SP 800-53 FISMA SP 800-53 GISRA FISMA 2002/12/17 SP
More informationHPE Moonshot System ~ビッグデータ分析&モバイルワークプレイスを新たなステージへ~
Brochure HPE Moonshot System HPE Moonshot System 4.3U 45 HPE Moonshot System Xeon & HPE Moonshot System HPE Moonshot System HPE HPE Moonshot System &IoT & SoC Xeon D-1500 Broadwell-DE HPE ProLiant m510
More information統合運用管理ソフトウェア FUJITSU Software Systemwalker 総合カタログ
FUJITSU Software Systemwalker FUJITSU Software Systemwalker ICT ICTICT ICT ICT FUJITSU Software SystemwalkerICTICT ICT ICT ICT ICT 1 Systemwalker ICT ICT ICT ICT ICT Systemwalker ICT ICT ICT ICT ICT ICT
More information1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf
1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi
More informationIPSJ SIG Technical Report Vol.2016-ARC-221 No /8/9 GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC Dalv
GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC DalvikVM[1] GC 1 Nagoya Institute of Technology GC GC 2. GC GC 2.1 GC 1 c 2016 Information Processing Society of
More information2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055
1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More informationDual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B
root Android IPv4/ 1 1 2 1 NAT Network Address Translation IPv4 NTMobile Network Traversal with Mobility NTMobile Android 4.0 VPN API VpnService root VpnService IPv4 IPv4 VpnService NTMobile root IPv4/
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More informationVer. 3.7 Ver E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI,, HT,
PowerEdge T130 Contents RAID /RAID & PCIe OS P3-4 P5 P6 P6 P7 P8-9 P10-16 P17-19 P20 P20 P21-24 P25 P26-30 P30-31 P32-33 v3.7 Apr. 2017 2016 4 28 2016 4 22 Ver. 3.7 Ver. 1.1 +- E5-2630 v3 2.4GHz, 20M cache,
More informationVMware VirtualCenter: Virtual Infrastructure Management Software
VMware : CPU 1998 VMware : 50(R&D) : Workstation1999 GSX Server 2001 ESX Server 2001 : 900 100805%VMware 200 100 10,000 2 VMware Workstation 1999 Linux x86 3 VMware GSX Server Windows Linux x86 4 VMware
More informationAmazon EC2 IaaS (Infrastructure as a Service) HPCI HPCI ( VM) VM VM HPCI VM OS VM HPCI HPC HPCI RENKEI-PoP 2 HPCI HPCI 1 HPCI HPCI HPC CS
HPCI 1 2 3 4 5 1, 6 5 24 HPCI HPC OS HPC RENKEI-PoP Design of Advanced Software Deployment Infrastructure in HPCI Wide-area Distributed Environment Shinichiro Takizawa, 1 Masaharu Munetomo, 2 Atsuya Uno,
More informationActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows
ActionScript3.0 1 1 YouTube Flash ActionScript3.0 Face detection and hiding using ActionScript3.0 for streaming video on the Internet Ryouta Tanaka 1 and Masanao Koeda 1 Recently, video streaming and video
More information11U Dell CPU RAID 1U 1 Intel Xeon E v5 Intel Pentium Intel Core i3 Intel Celeron Intel C236 Microsoft Windows Server 2008 R2/2008 R2 SP1 Standar
PowerEdge R230 Contents RAID /RAID & PCIe OS P2-4 P5 P6 P7 P8 P9-10 P11-26 P27-29 P30 P30 P31-34 P35 P36-38 P38-39 P40-41 V1.1 Mar. 2016 11U Dell CPU RAID 1U 1 Intel Xeon E3-1200 v5 Intel Pentium Intel
More informationOS,,, Abstract OS LibOS LibOS OS OS OS LibOS Elasticty LibOS LibOS Li
OS,,, mkanatsu@asg.cs.tuat.ac.jp,tazaki@iijlab.jp,yuo@iijlab.jp,hiroshiy@cc.tuat.ac.jp Abstract OS LibOS LibOS OS OS OS LibOS Elasticty LibOS LibOS LibOS Keywords:, OS,, Cloud, Library OS, measurement
More informationVol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a
1,a) 2012 6 1, 2012 12 20 A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a) Received: June 1, 2012, Accepted: December 20, 2012 Abstract: On the disasters, the
More informationVol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L
Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP
More information[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis
1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames
More information2reN-A14.dvi
340 30 1 SP2-N 2015 Onomatoperori : Ranking Cooking Recipes by using Onomatopoeias which Express their Tastes and Textures Chiemi Watanabe Satoshi Nakamura Graduate School of Systems and Information Engineering,
More information71-78.indd
6 AMD processor feature optimized to support virtualization machines (AMD) VMware Xen x86 AMD 2006 Rev. F F CPUSempron CPU AMD Virtualization AMD-V 9 Barcelona 3 Rapid Virtualization IndexingRVI Nested
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationWho is ETGEAR? Milestone ETWORK STORAGE PRODUCTS Who is ETGEAR IDEX 3 ETGEAR Ready DATA ReadyAS ,70,8 0G iscsi X- in $ mil
03 etwork Storage Catalog www.netgear.jp www.facebook.com/etgearjp ETGEARETGEARReadyASX-X-Front ViewLEAF ETWORKSiator arreadysharereadyas RemoteReadyAS VaultReadyCLOUDGenie+ReadyDLA ReadyDROPETGEAR Inc.
More informationVol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a
1, 1,a) 1, 2 1 1, 3 2 1 2011 6 17, 2011 12 16 Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a) Kazuki Kanamori 1, 2 Mie Nakatani 1 Hirokazu Kato 1, 3 Sanae H. Wake 2 Shogo Nishida
More informationHP ProLiant 500シリーズ
HPProLiant5 DL58/585 HPProLiant5 4 HPProLiant5 HPProLiant5 64 HPProLiant5 TPC-H@1GB 4, 34,99 SAP SD Benchmark Users QphH@1GB 3, 2, 1, 4, 3, 2, 1, DL58 G5, Xeon X735 DL585 G5, AMD Opteron 836SE 17,12 DL58
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More informationHPE Moonshot System HDI ソリューション
HPE Moonshot System HDI HPE ProLiant m700p HDI Hosted Desktop Infrastructure HPE Moonshot System HPE ProLiant m700p 1 45 180 4.3U HPE Moonshot System HPE Moonshot System HDI 1 1 HPE ProLiant m700p4 PC
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More information21 e-learning Development of Real-time Learner Detection System for e-learning
21 e-learning Development of Real-time Learner Detection System for e-learning 1100349 2010 3 1 e-learning WBT (Web Based training) e-learning LMS (Learning Management System) LMS WBT e-learning e-learning
More informationMAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP
LSM OS 700-8530 3 1 1 matsuda@swlab.it.okayama-u.ac.jp tabata@cs.okayama-u.ac.jp 242-8502 1623 14 munetoh@jp.ibm.com OS Linux 2.6 Linux Security Modules LSM LSM Linux 4 OS OS LSM An Evaluation of Performance
More informationComputer Security Symposium October 2013 Android OS kub
Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android
More informationPart 1 IT CPU IT IT 1998 Windows NT Server 4.0, Terminal Server Edition 1 Windows Based Terminal WBT Windows CE 1 100Mbps 1Gbps LAN OS 1 PC 1 OS 2
Microsoft Flexible Workstyle &BYOD Part 1 Part 2 Part 3 Windows Server 2012 Windows Server 2012 R2 RDS Part 1 IT CPU IT IT 1998 Windows NT Server 4.0, Terminal Server Edition 1 Windows Based Terminal WBT
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More information1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan
SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:
More informationOptiPlex OptiPlex 4 OptiPlex vpro Energy STAR5.0 EPEAT GOLD 90 Energy Smart Energy Smart
Dell OptiPlex PC OptiPlex 980 780 380 FX160 / FX100 www.dell.com/jp December / 2010 Core i5 vpro OptiPlex OptiPlex 4 OptiPlex vpro Energy STAR5.0 EPEAT GOLD 90 Energy Smart Energy Smart 2007 7 2 OptiPlex
More information& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us
1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo
More informationThe copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website
The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website by the author(s) under the agreement with the IPSJ.
More informationT330_ indd
PowerEdge T330 Contents RAID /RAID & PCIe OS P3-5 P6 P7 P7 P8 P9-10 P11-28 P29-31 P32 P32 P33-36 P37 P38-40 P40-41 P42-43 V1.0 Apr. 2016 2016 4 22 Ver1.0 +- E5-2630 v3 2.4GHz, 20M cache, 8.00GT/s QPI,,
More informationtemplate.dvi
XXVI W I D E P R O J E C T 26 26 1 WIDE 2010 1 WIDE WIDE Cloud 2010 2 3 4 5 6 NAT64 7 2 2010 7 2 WIDE 2.1 WIDE WIDE WIDE WIDE 50 2.2 WIDE 13:00 14:45 IaaS 15:00 16:45 WIDE StarBED 17:00 19:00 2.3 193
More information屋内ロケーション管理技術
Technology to Manage Indoor Locations 奥山敏 森信一郎 小川晃弘 あらまし ICT GPS GPS Abstract Smart devices and wireless networks have become widespread and an environment is gradually being put in place in which information
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More information卒業論文2.dvi
15 GUI A study on the system to transfer a GUI sub-picture to the enlarging viewer for operational support 1040270 2004 2 27 GUI PC PC GUI Graphical User Interface PC GUI GUI PC GUI PC PC GUI i Abstract
More informationGPGPU
GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the
More informationWeb ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval
SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto
More information, : GUI Web Java 2.1 GUI GUI GUI 2 y = x y = x y = x
J.JSSAC (2005) Vol. 11, No. 3,4, pp. 77-88 Noda2005 MathBlackBoard MathBlackBoard is a Java program based on the blackboard applet. We can use the blackboard applet with GUI operations. The blackboard
More informationIPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I
Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(Information and Communication Technology) (Google [2] [5] ) 2. Google 2.1 Google Google [2]( 1) Google Web, Google Web Google Chrome
More informationVol. 28 No. 2 Apr. 2011 173 1. 1 Web Twitter/Facebook UI 4 1. 2. 3. 4. Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2
172 SNS Web Web As social web sites such as blog and SNS(Social Network System) became popular, many people have communicated with their friends on the Web. Meanwhile, several problems of social web sites
More information[4] ACP (Advanced Communication Primitives) [1] ACP ACP [2] ACP Tofu UDP [3] HPC InfiniBand InfiniBand ACP 2 ACP, 3 InfiniBand ACP 4 5 ACP 2. ACP ACP
InfiniBand ACP 1,5,a) 1,5,b) 2,5 1,5 4,5 3,5 2,5 ACE (Advanced Communication for Exa) ACP (Advanced Communication Primitives) HPC InfiniBand ACP InfiniBand ACP ACP InfiniBand Open MPI 20% InfiniBand Implementation
More information23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h
23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),
More information6 2. AUTOSAR 2.1 AUTOSAR AUTOSAR ECU OSEK/VDX 3) OSEK/VDX OS AUTOSAR AUTOSAR ECU AUTOSAR 1 AUTOSAR BSW (Basic Software) (Runtime Environment) Applicat
AUTOSAR 1 1, 2 2 2 AUTOSAR AUTOSAR 3 2 2 41% 29% An Extension of AUTOSAR Communication Layers for Multicore Systems Toshiyuki Ichiba, 1 Hiroaki Takada, 1, 2 Shinya Honda 2 and Ryo Kurachi 2 AUTOSAR, a
More informationIPSJ SIG Technical Report NetMAS NetMAS NetMAS One-dimensional Pedestrian Model for Fast Evacuation Simulator Shunsuke Soeda, 1 Tomohisa Yam
1 1 1 1 1 NetMAS NetMAS NetMAS One-dimensional Model for Fast Evacuation Simulator Shunsuke Soeda, 1 Tomohisa Yamashita, 1 Masaki Onishi, 1 Ikushi Yoda 1 and Itsuki Noda 1 We propose the one-dimentional
More informationWikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy
1, 2 3 1, 2 Web Fischer Social Creativity 1) Social Creativity CG Network Analysis of an Emergent Massively Collaborative Creation Community Masahiro Hamasaki, 1, 2 Hideaki Takeda 3 and Takuichi Nishimura
More informationB HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int
SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura
More informationFirefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数
Computer Security Symposium 2014 22-24 October 2014 Firefox 182-8585 1-5-1 takaken@ol.inf.uec.ac.jp {kazushi, oyama}@inf.uec.ac.jp Web Firefox Firefox Firefox Investigation on Attack and Stealth Methods
More information3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
More informationFUJII, M. and KOSAKA, M. 2. J J [7] Fig. 1 J Fig. 2: Motivation and Skill improvement Model of J Orchestra Fig. 1: Motivating factors for a
/Specially issued Original Paper QOL 1 1 A Proposal of Value Co-creation Model to Promote Elderly People s Community Activities Concerning QOL Improvement Case Studies of Successful Social Activities by
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More informationIPSJ SIG Technical Report Vol.2014-IOT-27 No.14 Vol.2014-SPT-11 No /10/10 1,a) 2 zabbix Consideration of a system to support understanding of f
1,a) 2 zabbix Consideration of a system to support understanding of fault occurrences based on the similarity of the time series Miyaza Nao 1,a) Masuda Hideo 2 Abstract: With the development of network
More informationKASPERSKY ENDPOINT SECURITY FOR BUSINESS IT IT IT IT IT Kaspersky Endpoint Security for Business IT IT IT IT 2013 NAC Advanced 2013 Select Select Work
KASPERSKY ENDPOINT SECURITY FOR BUSINESS IT IT IT IT IT Kaspersky Endpoint Security for Business IT IT IT IT 2013 NAC Advanced 2013 Select Select Workstation Core / + Web Kaspersky Security Center Kaspersky
More information. IDE JIVE[1][] Eclipse Java ( 1) Java Platform Debugger Architecture [5] 3. Eclipse GUI JIVE 3.1 Eclipse ( ) 1 JIVE Java [3] IDE c 016 Information Pr
Eclipse 1,a) 1,b) 1,c) ( IDE) IDE Graphical User Interface( GUI) GUI GUI IDE View Eclipse Development of Eclipse Plug-in to present an Object Diagram to Debug Environment Kubota Yoshihiko 1,a) Yamazaki
More informationPrinter Driverセットアップ編
Microsoft MS-DOS Windows Windows Server Windows Vista Internet Explorer PowerPoint Outlook Microsoft Corporation Microsoft Corporation Intel Intel Inside Itanium Pentium Intel Corporation USB-IF Universal
More information25_05.dvi
Vol. 2 No. 1 53 63 (Mar. 2009) VMM WebVDI 1 1 1 Virtual Desktop Infrastructure VDI thin client VDI 1 thin client Web VDI WebVDI 1 WebVDI VMM OS HTTP Web VoXY VoXY VMM VNC HTTP VMM Web VMM WebVDI Implementation
More information(^^
57 GRACE 2012 2 21 munetomo@iic.hokudai.ac.jp 1996 1999 1998 1999 1999 (^^ 1962 2003 1979 11 43TFlops 2,000 40, Mem:128GB, 10GbE x 2 500TBytes Web Web IT SR16000 Model M1 22 Total: 172 TFlops Power 7
More informationVol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information
Vol.54 No.7 1937 1950 (July 2013) 1,a) 2012 11 1, 2013 4 5 1 Similar Sounds Sentences Generator Based on Morphological Analysis Manner and Low Class Words Masaaki Kanakubo 1,a) Received: November 1, 2012,
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More information,480 9,720 12,960 19,440 3,240 3, ,440 9,660 12,880 19,320 3,220 3, ,390 9,580 12,780 19,170 3,195 3, ,350 9,520
10-14 3,240 4,860 6,480 9,720 1,620 1,620 15-19 3,220 4,830 6,440 9,660 1,610 1,610 20-24 3,200 4,800 6,400 9,600 1,600 1,600 25-49 3,180 4,770 6,360 9,540 1,590 1,590 50-99 3,020 4,530 6,040 9,060 1,510
More information3_39.dvi
Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar
More informationCisco WebEx ホワイトペーパー: リアルタイムコラボレーションのパワーを解き放つ: Cisco WebEx ソリューションのセキュリティ概要
: Cisco WebEx : Cisco WebEx Cisco WebEx 107-6227 9-7-1 Tel: 03-6434-6044 Fax: 03-5411-9226 Japaninfo@webex.com www.webex.co.jp WebEx Communications, Inc. 3979 Freedom Circle, Santa Clara, CA 95054 USA
More informationVMware Horizon
FAQ VMware Q VMware A VMware Windows VMware 7 Apps Cloud FLEX 7 IT Apps 7 VMware Cloud Service VMware FLEX PC VMware 7 Q 7 A 7 IT /RDSH /RDSH RDS VMware ThinApp SaaS Citrix 7 4 Standard Edition VDI Advanced
More informationFortinet社
FortiGate Ver.5.0 MR2 Patch3 Information 第 1.0 版 改訂履歴 発行年月版数改版内容 H27.7 第 1.0 版初版発行 2 目次 1. はじめに... 4 2. アップグレードパス... 4 3. サポート機種... 5 4. アップグレード注意事項... 5 5. FortiAnalyzer サポートについて... 7 6. FortiManager
More informationAlkanet[1, 2] Alkanet CPU CPU 2 Alkanet Alkanet (VMM) VMM Alkanet Windows Alkanet 1 Alkanet VMM BitVisor[3] BitVisor OS ユーザモード カーネルモード マルウェア観測用 PC VM
Computer Security Symposium 2014 22-24 October 2014 525-8577 1-1-1 yotuki@asl.cs.ritsumei.ac.jp, {takimoto, mouri}@cs.ritsumei.ac.jp 466-8555 shoichi@nitech.ac.jp Alkanet CPU Identifying of System Call
More informationVer. 3.8 Ver NOTE E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI,,
PowerEdge R730 Contents RAID /RAID & PCIe GPU OS P3-5 P6 P7 P8 P9-10 P11-16 P17-55 P56 P57-66 P67-69 P70-72 P72 P73 P74-77 P78-81 P82-88 P88-89 P90-91 V3.8 Apr. 2017 2017 4 28 2016 4 22 Ver. 3.8 Ver. 1.0
More information名称未設定
Parallels Desktop 4.0 for Mac ( 4.0.3810 ) Read Me : 1. Parallels Desktop 2. 3. 4. 5. 6. Parallels Desktop 7. Parallels Desktop 4.0 for Mac 8. Parallels Desktop 9. Parallels Desktop 10. 11. 12. 1. Parallels
More informationPCライフサイクルの管理:生産性とIT効率の向上
IT@Intel IT IT PC 2012 7 PC IT IT PC IT Dave Buchholz IT Doug DeVetter IT John Gonzalez IT IT OS Omer Livne IT vpro AMT John Mahvi IT PC IT PC IT PC IT PC 6 IT 10 PC IT IT PC IT PC IT PC 2 4 PC PC PC 1
More informationVer. 3.8 Ver NOTE E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI,
PowerEdge T630 Contents RAID /RAID & PCIe GPU OS v3.8 Apr. 2017 P3-5 P6 P7 P8-9 P10-11 P12-16 P17-79 P80-85 P86-87 P88-90 P90 P91-92 P93-96 P97-100 P101-107 P107-108 P109-110 2017 4 28 2016 4 22 Ver. 3.8
More informationFirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client Edge Client Edge Client Edge Client LAN Edge Client VPN Wi
Security FirePass SSL VPN FirePass SSL VPN Virtual Edition VE) 1 Web E 11 12 icontrol SSL VPN API 12 FirePass FirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client
More informationMATLAB® における並列・分散コンピューティング ~ Parallel Computing Toolbox™ & MATLAB Distributed Computing Server™ ~
MATLAB における並列 分散コンピューティング ~ Parallel Computing Toolbox & MATLAB Distributed Computing Server ~ MathWorks Japan Application Engineering Group Takashi Yoshida 2016 The MathWorks, Inc. 1 System Configuration
More informationIPSJ SIG Technical Report Vol.2014-CE-127 No /12/7 1,a) 2,3 2,3 3 Development of the ethological recording application for the understanding of
1,a) 2,3 2,3 3 Development of the ethological recording application for the understanding of the zoo animals behavior Yoshida Nobuaki 1,a) Tanaka Masayuki 2,3 Wada Seitaro 2,3 Abstract: The authors are
More information[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing
1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November
More informationfiš„v5.dvi
(2001) 49 2 293 303 VRML 1 2 3 2001 4 12 2001 10 16 Web Java VRML (Virtual Reality Modeling Language) VRML Web VRML VRML VRML VRML Web VRML VRML, 3D 1. WWW (World Wide Web) WWW Mittag (2000) Web CGI Java
More informationKyushu Communication Studies 第2号
Kyushu Communication Studies. 2004. 2:1-11 2004 How College Students Use and Perceive Pictographs in Cell Phone E-mail Messages IGARASHI Noriko (Niigata University of Health and Welfare) ITOI Emi (Bunkyo
More information組込みシステムシンポジウム2011 Embedded Systems Symposium 2011 ESS /10/20 FPGA Android Android Java FPGA Java FPGA Dalvik VM Intel Atom FPGA PCI Express DM
Android Android Java Java Dalvik VM Intel Atom PCI Express DMA 1.25 Gbps Atom Android Java Acceleration with an Accelerator in an Android Mobile Terminal Keisuke Koike, Atsushi Ohta, Kohta Ohshima, Kaori
More informationfiš„v3.dvi
(2001) 49 2 261 275 Web 1 1 2001 2 21 2001 4 26 Windows OS Web Windows OS, DELPHI, 1. Windows OS. DELPHI Web DELPHI ALGOL PASCAL VISUAL BASIC C++ JAVA DELPHI Windows OS Linux OS KyLix Mac OS (ver 10) JAVA
More information