1

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "1"

Transcription

1 VM Secure Processor for Protecting VM and its Application to Authentication

2 1

3 OS OS TPM Trusted Boot TPM Trusted Boot OS TPM Trusted Boot OS OS OS OS OS OS VM VM 2

4 DRM DRM DRM TPM TrustedBoot TrustedBoot TPM TrustedBoot VM VM VM VM VM i

5 TPM Trusted Boot ii

6 2.1 IBM TPM Trusted Boot Page Table Entry OS TPM Trusted Boot iii

7 1 [1] [2] OS OS OS DRM TPM Trusted Boot TPM[9, 10] Trusted Boot TPM Trusted Boot OS TPM Trusted Boot OS OS 1

8 OS VM VM 2 3 VM 4 VM

9 2 2.1 DRM (Digital Rights Management : DRM) [3, 4] DRM DRM [5, 6] DRM 2 ID PC ID PC OS DRM DRM DVD CSS DVD. 3

10 OS DRM OS OS OS OS OS DRM DRM DRM [7] OS OS DRM 2.2 IBM 4758 cryptograph coprosessor 1997 IBM PCI 2.1 Intel i486 DES DRAM RAM FLASH ROM IBM 4758 cryptograph coprosessor CPU Intel i

11 2.1: IBM TPM TrustedBoot TPM Trusted Boot TrustedBoot TPM TPM Trusted Boot 5

12 2.2: TPM Trusted Boot Trusted Boot TPM [14] Trusted Boot 2.2 BIOS CRTM(Core Root of Trust Measurement) OS PCR(Platform Configuration Register) TPM CRTM CRTM TPM CRTM CRTM CRTM TPM CRTM BIOS PCR PCR TPM PCR PCR 6

13 TPM TPM TrustedBoot TPM TrustedBoot CRTM BIOS TPM OS OS TPM Trusted Boot OS OS OS TPM Trusted Boot OS TPM Trusted Boot 2.3 7

14 2.3: 8

15 3 VM VM 3.1 OS OS [15]

16 3.1: Lie XOM[16, 17] OS 3.1 AEGIS Suh AEGIS[18] [19, 20, 21]

17 3.2: Page Table Entry OS OS OS OS 3.2 VM VM VM VM VM VM VM OS VM 11

18 3.2.1 VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM OS OS VM VM VM VM OS VM VM VM 12

19 4 VM 4.1 VM OS AES[22] m S R key S R key S R m m key ce m ce m ckenc key (m) (4.1) RSA[23] S R pk sk S m R sk S m sk S S pk S m 13

20 4.1: m sk S sd m sd m sig sks (m) (4.2) S R pk R m pk R R sk R pk R m pe m pe m pkenc pkr (m) (4.3) SHA[24]. m hd m hd m hash(m) (4.4) 14

21 4.1.4 m 1 m 2 m 12 m 12 m 1 m 2 (4.5) VM P pk P sk P pk P P pk M pk P sk P P OS OS A OS A X pk X pk X A pk X otk 15

22 4.2: A A hash(d) P hd d hash(d) (4.6) d A d pk X P hd d P sk P hd d sig skp (hash(d)) A. sd d sig skp (hash(d)) (4.7) P sk P pk P P 16

23 4.3: 3. A otk A sd d pk P otk pk X pkenc pkx (otk pk P sd d ) X. pe d pkenc pkx (otk pk P sd d ) (4.8) X X sk X pe d 6. X P pk M pk P P P pk P sd d P. 7. sd d X hd d hd d X t otk ckenc otk (t) A. ce t ckenc otk (t) (4.9) A otk ce t t. t 9. A t 17

24 4.4 18

25 P A pe d pkenc pkx (otk pk P sd d ) pk P X pk P pk M pk P sd d P 19

26 5.1: OS : OS VM A A pe d pkenc pkx (otk pk P sd d ) 5.3 A A X pk X pe d 3. 20

27 5.3: : ce t otk otk otk otk A X ce t A A A otk X A ce t pe d X ce t 21

28 5.5: 22

29 6 6.1 [11] [12] [13] OS VM VM 6.2 TPM Trusted Boot TPM Trusted Boot 6.1 TPM Trusted Boot BIOS Boot Loader 6.1 VM BIOS Boot Loader OS 23

30 6.1: TPM Trusted Boot 24

31 7 7.1 OS VM OS OS 7.2 VM 25

32 [1]. recent trends in broadband contents sharing platform. [2],,,..,, vol. 109, no. 237, pp. 7-12, [3] P. A. Jamkhedkar and G. L. Heileman. Drm as a layered system, DRM 04:Proceedings of the 4th ACM workshop on Digital rights management, New York, NY, USA, ACM Press, pp [4] W. Ku and C.-H. Chi. Survey on the technological aspects of digital rights management, ISC, pp [5] Q. Liu, R. Safavi-Naini and N. P. Sheppard. Digital rights management for content distribution, CRPITS 03: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, Darlinghaust, Australia, Australian Computer Society, Inc., pp [6] M. L. Smith. Digital rights managements protecting the digital media value chain, MUM 04: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia, New York, NY, USA, ACM Press, pp [7] T. Hauser and C. Wenz. Drm unter attack: Weaknesses in exsting systems, Digital Rights Management, pp [8] IBM. IBM PCI Cryptographic Coprocessor 03.ibm.com/security/cryptocards/pcicc/overview.shtml [9] Trusted Computing Group. TCG Specification Architecture Overview. [10] Trusted Computing Group. TPM Specification Version 1.2 Revision 103. [11],, : OS, CPSY , Vol. 112, No. 173 pp ). 26

33 [12] Tsuyoshi Yamada, Naruki Kurata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai. Minimal Additional Function to Secure Processor for Application Authentication. WEWoRC [13]. CSS [14],,, Nguyen Anh Quynh,. Knoppix trusted computing. [15],. OS., Vol.45, No.3, March [16] Dan Boneh, David Lie, Pat Lincoln, Lohn Mitchell, and Mark Mitchell. Hardware support for tamper-resistatnt and copy-resistant software. Technical report, Stanford University Computer Science, [17] David Lie, Chandramohan A. Thekkath, and Mark Horowitz. Implementing an untrusted operating system on trusted hardware. In Proceedings of ACM Symposium on Operating Systems Principles, [18] G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. AEGIS: Architecture for tamperevident and tamper-resistant processing. In International Conference on Supercomputing, [19],,, no.17, pp , [20],,,.., CPSY , vol.109, no.237, pp , [21], CPSY , vol.111, no.163 pp [22] National Institute of Standards and Technology. Federal Information Processing Standards Publication 197 ADVANCED ENCRYPTION STANDARD (AES), November 26, [23] Rivest, R., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2(Feb. 1978),

34 [24] National Institute of Standards and Technology. Federal Information Processing Standards Publication SECURE HASH STANDARD (SHS), March,

35 1. VM,,, SCIS 2014(2014). 2.,,, CSS 2013(2013). 3. Tsuyoshi Yamada, Naruki Kurata, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai Minimal Additional Function to Secure Processor for Application Authentication WEWoRC 2013(2013). 4.,, OS CPSY (2012) (2012). 1. A Cloud Architecture for Protecting Guest s Information from Malicious Operators with Memory Management Koki Murakami, Tsuyoshi Yamada, Rie Yamaguchi, Masahiro Goshima and Shuichi Sakai CODASPY 2014(2014). 29

36 2.,,,, SCIS 2014(2014). 3.,,,, CSS 2013(2013). 30

37 31

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3 36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there

More information

23

23 Master's Thesis / 修 士 論 文 映 像 配 信 の 中 断 から 復 旧 までの 時 間 を 短 縮 するネットワーク 再 構 築 手 法 の 改 良 隅 田, 貴 久 三 重 大 学, 2011. 三 重 大 学 大 学 院 地 域 イノベーション 学 研 究 科 博 士 前 期 課 程 地 域 イノベーション 学 専 攻 http://hdl.handle.net/10076/12400

More information

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy 1, 2 3 1, 2 Web Fischer Social Creativity 1) Social Creativity CG Network Analysis of an Emergent Massively Collaborative Creation Community Masahiro Hamasaki, 1, 2 Hideaki Takeda 3 and Takuichi Nishimura

More information

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて 1999 IC IC 2008 2 5 10 E-mail: masataka.suzuki@boj.or.jp E-mail: hirokawa@imes.boj.or.jp E-mail: une@imes.boj.or.jp //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008

More information

4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5

4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5 No.5, 185-196 (2004) Conformity to the next-generation currency seen from a Electronic money classification : OSHIMA Kazuchika Nihon University, Graduate School of Social and Cultural Studies Internet

More information

Microsoft Word - archip.doc

Microsoft Word - archip.doc 131 71 71 71 7 1 71 71 71 71 71 71 7 1 71 71 71 71 71 71 7-1 71 71 71 71 71 71 7-1 71 71 7 1 71 71 71 71 71 71 71 71 71 71 71 71 71 71 7 1 71 71 71 71 71 71 7 1 71 71 71 71 71 71 71 71 71 71 71 71 71 71

More information

26 FPGA 11 05340 1 FPGA (Field Programmable Gate Array) ASIC (Application Specific Integrated Circuit) FPGA FPGA FPGA FPGA Linux FreeDOS skewed way L1

26 FPGA 11 05340 1 FPGA (Field Programmable Gate Array) ASIC (Application Specific Integrated Circuit) FPGA FPGA FPGA FPGA Linux FreeDOS skewed way L1 FPGA 272 11 05340 26 FPGA 11 05340 1 FPGA (Field Programmable Gate Array) ASIC (Application Specific Integrated Circuit) FPGA FPGA FPGA FPGA Linux FreeDOS skewed way L1 FPGA skewed L2 FPGA skewed Linux

More information

33312004_先端融合開発専攻_観音0314PDF用

33312004_先端融合開発専攻_観音0314PDF用 Advanced Course for Interdisciplinary Technology Development National Institute of Technology, Gifu College Advanced Course for Interdisciplinary Technology Development 1 5 Curriculum National Institute

More information

paper

paper WISS2013 EpisoPass:. / EpisoPass EpisoPass / 1 [21] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [23] [1][3][12] [18] Copyright is held by the author(s). Toshiyuki Masui, [25] [2][19] EpisoPass

More information

Lyra 2 2 2 X Y X Y ivis Designer Lyra ivisdesigner Lyra ivisdesigner 2 ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) (1) (2) (3) (4) (5) Iv Studio [8] 3 (5) (4) (1) (

Lyra 2 2 2 X Y X Y ivis Designer Lyra ivisdesigner Lyra ivisdesigner 2 ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) (1) (2) (3) (4) (5) Iv Studio [8] 3 (5) (4) (1) ( 1,a) 2,b) 2,c) 1. Web [1][2][3][4] [5] 1 2 a) ito@iplab.cs.tsukuba.ac.jp b) misue@cs.tsukuba.ac.jp c) jiro@cs.tsukuba.ac.jp [6] Lyra[5] ivisdesigner[6] [7] 2 Lyra ivisdesigner c 2012 Information Processing

More information

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc VOL. J98-A NO. 1 JANUARY 2015 本 PDFの 扱 いは 電 子 情 報 通 信 学 会 著 作 権 規 定 に 従 うこと なお 本 PDFは 研 究 教 育 目 的 ( 非 営 利 )に 限 り 著 者 が 第 三 者 に 直 接 配 布 すること ができる 著 者 以 外 からの 配 布 は 禁 じられている ICT a) Caption Presentation Method

More information

Amazon EC2 IaaS (Infrastructure as a Service) HPCI HPCI ( VM) VM VM HPCI VM OS VM HPCI HPC HPCI RENKEI-PoP 2 HPCI HPCI 1 HPCI HPCI HPC CS

Amazon EC2 IaaS (Infrastructure as a Service) HPCI HPCI ( VM) VM VM HPCI VM OS VM HPCI HPC HPCI RENKEI-PoP 2 HPCI HPCI 1 HPCI HPCI HPC CS HPCI 1 2 3 4 5 1, 6 5 24 HPCI HPC OS HPC RENKEI-PoP Design of Advanced Software Deployment Infrastructure in HPCI Wide-area Distributed Environment Shinichiro Takizawa, 1 Masaharu Munetomo, 2 Atsuya Uno,

More information

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L 1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives

More information

橡Webcamユーザーガイド03.PDF

橡Webcamユーザーガイド03.PDF Desktop On-Call Version 4 Webcam extension Pak for Windows Webcam extension Pak Desktop On-Call Version 4 Web PC i Desktop On-Call Version 4 PC PC Desktop On-Call Version 4 PC Windows 98 Windows 98SE Windows

More information

untitled

untitled The Impact of Digitization on Music Production: From a Perspective of Modularity 51 2 pp. 87-108 2003 12 I 21 3 Information and Communication Technology, ICT 0 1 1 20 1 199820012000 1 MP3 CD 2 3 II CD

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

Ver. 3.7 Ver E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI,, HT,

Ver. 3.7 Ver E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI,, HT, PowerEdge T130 Contents RAID /RAID & PCIe OS P3-4 P5 P6 P6 P7 P8-9 P10-16 P17-19 P20 P20 P21-24 P25 P26-30 P30-31 P32-33 v3.7 Apr. 2017 2016 4 28 2016 4 22 Ver. 3.7 Ver. 1.1 +- E5-2630 v3 2.4GHz, 20M cache,

More information

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou 情 報 処 理 学 会 インタラクション 2013 IPSJ Interaction 2013 2013-Interaction (3EXB-06) 2013/3/2 ourcam: 1 2 ourcam ourcam: On-Site Programming Environment for Digital Photography RYO OSHIMA 1 YASUAKI KAKEHI 2 In these

More information

BCCE製品ガイド

BCCE製品ガイド 1 Jetico Inc. Oy PROPRIETARY 2 BCCE BestCrypt Container Encryption BCCE BCCE V.9 BCCE Jetico Jetico 3 BCCE BCCE (BestCrypt Container Encryption) Jetico Jetico 100 100 米 国 原 子 力 規 制 委 員 会 4 BCCE BCCE (BestCrypt

More information

Social Intelligence []... [] ( ) ( ) 一 般 の 情 報 他 人 の 情 報 人 コンテキスト 付 与 ソーシャル メディアの 普 及 により 受 け 手 は 自 分 の 認 識 を 発 信 機 械 コンテキスト 分 析 私 の 情 報 神 沼 靖 子, 内 木

Social Intelligence []... [] ( ) ( ) 一 般 の 情 報 他 人 の 情 報 人 コンテキスト 付 与 ソーシャル メディアの 普 及 により 受 け 手 は 自 分 の 認 識 を 発 信 機 械 コンテキスト 分 析 私 の 情 報 神 沼 靖 子, 内 木 THE 一 INSTITUTE 般 社 団 法 人 OF ELECTRONICS, 電 子 情 報 通 信 学 会 信 IEICE 学 技 Technical 報 Report INFORMATION THE INSTITUTE ANDOF COMMUNICATION ELECTRONICS, ENGINEERS IEICE Technical Report INFORMATION AND COMMUNICATION

More information

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h 23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

, IT.,.,..,.. i

, IT.,.,..,.. i 25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge

More information

科技表紙PDF200603

科技表紙PDF200603 2 1 2 18 Science & Technology Trends March 2006 19 20 3 Science & Technology Trends March 2006 21 4 22 5 Science & Technology Trends March 2006 23 6 24 Science & Technology Trends March 2006 25 26 Science

More information

TRON 050028 2002 2 Copyright C 2002 by KURATA Keiicchi

TRON 050028 2002 2 Copyright C 2002 by KURATA Keiicchi JAIST Reposi https://dspace.j Title TRONプロジェクトの 標 準 化 における 成 功 失 敗 要 因 Author(s) 倉 田, 啓 一 Citation Issue Date 2002-03 Type Thesis or Dissertation Text version author URL http://hdl.handle.net/10119/355

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

untitled

untitled Copyright 2008 IPAAll Rights Reserved 1 1. 2. 3. Copyright 2008 IPAAll Rights Reserved 2 IT IT IT Copyright 2008 IPAAll Rights Reserved http://www.jitec.jp/1_00topic/topic_20071225_shinseido.html 3 URL

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

WISS 2008 [2] PowerPoint[7] KeyNote[8] ZUI(Zooming User Interface) ZUI 1. : Pad[9] CounterPoint[10] KidPad[11] ( ); ( ). [12] 3 4 [12] 5 3 TabletPC 2

WISS 2008 [2] PowerPoint[7] KeyNote[8] ZUI(Zooming User Interface) ZUI 1. : Pad[9] CounterPoint[10] KidPad[11] ( ); ( ). [12] 3 4 [12] 5 3 TabletPC 2 WISS2008 An Augmented Dining System for Cooking Optical Decorations and Storytelling Summary. 1 [1] 1 [2] 1 1 Flash Copyright is held by the author(s). Maki Mori,, Kazutaka Kurihara, /, Tsukada Koji,,

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

2011 : M Schell Interest curve Schell Chan FPS Schell Interest curve Chan FPS Chan Chan Chan Chan

2011 : M Schell Interest curve Schell Chan FPS Schell Interest curve Chan FPS Chan Chan Chan Chan 2011 M0106515 2011 : M0106515 Schell Interest curve Schell Chan FPS Schell Interest curve Chan FPS Chan Chan Chan Chan 1 1 1.1............................. 1 1.2................................. 4 2 5

More information

fiš„v5.dvi

fiš„v5.dvi (2001) 49 2 293 303 VRML 1 2 3 2001 4 12 2001 10 16 Web Java VRML (Virtual Reality Modeling Language) VRML Web VRML VRML VRML VRML Web VRML VRML, 3D 1. WWW (World Wide Web) WWW Mittag (2000) Web CGI Java

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

( 1) 3. Hilliges 1 Fig. 1 Overview image of the system 3) PhotoTOC 5) 1993 DigitalDesk 7) DigitalDesk Koike 2) Microsoft J.Kim 4). 2 c 2010

( 1) 3. Hilliges 1 Fig. 1 Overview image of the system 3) PhotoTOC 5) 1993 DigitalDesk 7) DigitalDesk Koike 2) Microsoft J.Kim 4). 2 c 2010 1 2 2 Automatic Tagging System through Discussing Photos Kazuma Mishimagi, 1 Masashi Toda 2 and Toshio Kawashima 2 Many media forms can be stored easily at present. Photographs, for example, can be easily

More information

Security Guide

Security Guide TPM EN6267B TPM 1 TPM TPM TPM Trusted Platform Module TPM TCG Trusted Computing Group TPM HDD TPM TPM TPM Infineon Security Platform Security Platform TPM Windows XP Professional Windows XP Home Edition

More information

技術の系統化調査報告「プロセス制御システムの技術系統化調査」

技術の系統化調査報告「プロセス制御システムの技術系統化調査」 A Technical Survey of Process Control Systems 3 Yutaka Wakasa Abstract Yutaka Wakasa 95 1 2 96 Vol.11 2008.March 2.1 2.2 97 98 Vol.11 2008.March 99 3 3.1 3.2 3.3 100 Vol.11 2008.March 101 3.4 102 Vol.11

More information

Cisco 1711/1712セキュリティ アクセス ルータの概要

Cisco 1711/1712セキュリティ アクセス ルータの概要 CHAPTER 1 Cisco 1711/1712 Cisco 1711/1712 Cisco 1711/1712 1-1 1 Cisco 1711/1712 Cisco 1711/1712 LAN Cisco 1711 1 WIC-1-AM WAN Interface Card WIC;WAN 1 Cisco 1712 1 ISDN-BRI S/T WIC-1B-S/T 1 Cisco 1711/1712

More information

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP

More information

8 PC CoIT (Consumerization of IT) BCP () PC BYOD (Bring Your Own Device) 8.1 8 BYOD IT IT 8.1 8 IT IT 8.1 8.1 PC/ 2

8 PC CoIT (Consumerization of IT) BCP () PC BYOD (Bring Your Own Device) 8.1 8 BYOD IT IT 8.1 8 IT IT 8.1 8.1 PC/ 2 8.1 1 (2013 10 ) 8 PC CoIT (Consumerization of IT) BCP () PC BYOD (Bring Your Own Device) 8.1 8 BYOD IT IT 8.1 8 IT IT 8.1 8.1 PC/ 2 IT 4 5 PC 6 7 PC 8 9 3 8 1 Web 8.1 4 UX 8.1 UI 8/8.1 Microsoft Office

More information

2797 4 5 6 7 2. 2.1 COM COM 4) 5) COM COM 3 4) 5) 2 2.2 COM COM 6) 7) 10) COM Bonanza 6) Bonanza 6 10 20 Hearts COM 7) 10) 52 4 3 Hearts 3 2,000 4,000

2797 4 5 6 7 2. 2.1 COM COM 4) 5) COM COM 3 4) 5) 2 2.2 COM COM 6) 7) 10) COM Bonanza 6) Bonanza 6 10 20 Hearts COM 7) 10) 52 4 3 Hearts 3 2,000 4,000 Vol. 50 No. 12 2796 2806 (Dec. 2009) 1 1, 2 COM TCG COM TCG COM TCG Strategy-acquisition System for Video Trading Card Game Nobuto Fujii 1 and Haruhiro Katayose 1, 2 Behavior and strategy of computers

More information

ICT Web Web ICT Web 2. 新 学 習 指 導 要 領 の 理 念 と 教 育 の 情 報 化 の 意 義 2-1 新 学 習 指 導 要 領 の 理 念 20 3 23 1 ICT 2

ICT Web Web ICT Web 2. 新 学 習 指 導 要 領 の 理 念 と 教 育 の 情 報 化 の 意 義 2-1 新 学 習 指 導 要 領 の 理 念 20 3 23 1 ICT 2 30 2012 Web キーワード Web CIRRI Educational Method and Technology, Elementary School, School Library Website, Information Literacy, CIRRI Contents Model 1.はじめに ICTInformation and Communication Technology :

More information

RFID http://www.soumu.go.jp/snews/2004/040223_2.html http://www.meti.go.jp/feedback/data/i4 0316aj.html

RFID http://www.soumu.go.jp/snews/2004/040223_2.html http://www.meti.go.jp/feedback/data/i4 0316aj.html RFID LSI sozo@c.csce.kyushu-u.ac.jp RFID Radio Frequency mm 0.5 5m 2m 1 64k IC http://www.tij.co.jp/jmc/docs/tiris/goods/index.html RF http://www.hitachisemiconduct or.com/sic/jsp/japan/jpn/gain/1 35/next/

More information

ATR-01-D

ATR-01-D (JCMVP) 24 2 29 ATR-01-D Cryptographic Algorithm Implementation Testing Requirements 1 1 1.1....................... 1 1.2....................................... 2 2 3 2.1.....................................

More information

Ver Ver NOTE E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI

Ver Ver NOTE E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI PowerEdge T630 Contents RAID /RAID & PCIe GPU OS V4.10 Mar.2018 P3-5 P6 P7 P8-9 P10-11 P12-16 P17-84 P85-90 P91-92 P93-95 P95 P96-97 P98-101 P102-105 P106-110 P110-111 P112-113 2018 3 30 2016 4 22 Ver.

More information

- - - - - - - - - - - - - - - - - - - - - - - - - -1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - -2...2...3...4...4...4...5...6...7...8...

- - - - - - - - - - - - - - - - - - - - - - - - - -1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - -2...2...3...4...4...4...5...6...7...8... 取 扱 説 明 書 - - - - - - - - - - - - - - - - - - - - - - - - - -1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - -2...2...3...4...4...4...5...6...7...8...9...11 - - - - - - - - - - - - - - - - -

More information

6_27.dvi

6_27.dvi Vol. 49 No. 6 1932 1941 (June 2008) RFID 1 2 RFID RFID RFID 13.56 MHz RFID A Experimental Study for Measuring Human Activities in A Bathroom Using RFID Ryo Onishi 1 and Shigeyuki Hirai 2 A bathroom is

More information

SketchPoint Pie-Menu On/Off 3 Pie-Menu 8 6 On/Off 8 5 2 SketchPoint i

SketchPoint Pie-Menu On/Off 3 Pie-Menu 8 6 On/Off 8 5 2 SketchPoint i 15 1040328 2004 2 27 SketchPoint Pie-Menu On/Off 3 Pie-Menu 8 6 On/Off 8 5 2 SketchPoint i Abstract SketchPoint is a system for creating the memorandum in case of the pen-input situation or informal presentation.

More information

([ ]!) name1 name2 : [Name]! name10 2. 3 SuperSQL,,,,,,, (@) < >@{ < > } =,,., 200,., TFE,, 1 2.,, 4, 3.,,,, Web EGG [5] SSVisual [6], Java SSedit( ss

([ ]!) name1 name2 : [Name]! name10 2. 3 SuperSQL,,,,,,, (@) < >@{ < > } =,,., 200,., TFE,, 1 2.,, 4, 3.,,,, Web EGG [5] SSVisual [6], Java SSedit( ss DEIM Forum 2016 H6-3 SuperSQL CSS 223 8522 3-14-1 E-mail: {ryosuke,goto}@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp SuperSQL, SQL. SuperSQL HTML, PHP,,,, SuperSQL Web, CSS 1. SQL, SuperSQL, CSS SuperSQL,

More information

Microsoft Word - deim2011_new-ichinose-20110325.doc

Microsoft Word - deim2011_new-ichinose-20110325.doc DEIM Forum 2011 B7-4 252-0882 5322 E-mail: {t08099ai, kurabaya, kiyoki}@sfc.keio.ac.jp A Music Search Database System with a Selector for Impressive-Sections of Continuous Data Aya ICHINOSE Shuichi KURABAYASHI

More information

クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応

クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応 E-mail: masashi.une@boj.or.jp E-mail: masataka.suzuki@boj.or.jp E-mail: sachikoy@jp.ibm.com / /2011.1 227 1. 1 1 2010 1 2 2 3 1 2010 2010 2 1 1 3 multi-tenancy 228 /2011.1 SaaS 4 Vamosi [2008] 1 CPU CPU

More information

imai@eng.kagawa-u.ac.jp No1 No2 OS Wintel Intel x86 CPU No3 No4 8bit=2 8 =256(Byte) 16bit=2 16 =65,536(Byte)=64KB= 6 5 32bit=2 32 =4,294,967,296(Byte)=4GB= 43 64bit=2 64 =18,446,744,073,709,551,615(Byte)=16EB

More information

和文タイトル

和文タイトル Paper Browsing System with Structure Analysis and Displaying Annotation on Side-note Windows Takeshi Abekawa Akiko Aizawa National Institute of Informatics Abstract: In this paper, we introduce our on-going

More information

Ver. 3.9 Ver E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI,, HT,

Ver. 3.9 Ver E v3 2.4GHz, 20M cache, 8.00GT/s QPI,, HT, 8C/16T 85W E v3 1.6GHz, 15M cache, 6.40GT/s QPI,, HT, PowerEdge R630 Contents RAID /RAID & PCIe OS P3-6 P7 P8 P9 P10-11 P12-16 P17-61 P62 P63-72 P73-75 P75 P76-79 P80-83 P84-90 P90-91 P92-93 V3.9 Apr. 2017 2017 4 28 2016 4 22 Ver. 3.9 Ver. 1.0 +- E5-2630

More information

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( ) 1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

CS1987_ReducingITCosts_WP_0212_JPN.indd

CS1987_ReducingITCosts_WP_0212_JPN.indd WHITE PAPER IT 2012 2 IT Sumner Blount CA Security Management 1 IT 04 2 / 05 3 07 IT 4 15 5 16 6 17 7 18 8 18 02 IT IT IT / IAM IAM IT IAM / / / IT IT 03 1:IT IT IT IT IT Sarbanes-Oxley PCI DSS Basel II

More information

R927清水信彦様.indd

R927清水信彦様.indd Special Issue CFRP 455-8502 9 1 Development Status of Carbon Fiber Reinforced Plastics Nobuhiko SHIMIZU Automotive Center, Toray Industries, Inc., 9-1 Oe-cho, Minato-ku, Nagoya, Aichi 455-8502 Received

More information

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô 1 / 37 (Cryptographic Hash Functions) H : {0, 1} {0, 1} l (Unkeyed hash function) (MDC: Manipulation Detection Code) (Keyed hash function) (MAC: Message Authentication Code) 2 / 37 OAEP (One-wayness) (Preimage

More information

main.dvi

main.dvi 305 8550 1 2 CREST fujii@slis.tsukuba.ac.jp 1 7% 2 2 3 PRIME Multi-lingual Information Retrieval 2 2.1 Cross-Language Information Retrieval CLIR 1990 CD-ROM a. b. c. d. b CLIR b 70% CLIR CLIR 2.2 (b) 2

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

実教の教科書_H24+

実教の教科書_H24+ 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Information Technology Multimedia&Communication 18 19 20 21 22 23 13,650 14,700 21,000 12,600 21,000 9,450 21,000 14,700 21,000 12,600 21,000 9,450 21,000 14,700

More information

JAPAN MARKETING JOURNAL 122 Vol.31 No.22011

JAPAN MARKETING JOURNAL 122 Vol.31 No.22011 JAPAN MARKETING JOURNAL 122 Vol.31 No.22011 JAPAN MARKETING JOURNAL 122 Vol.31 No.22011 JAPAN MARKETING JOURNAL 122 Vol.31 No.22011 JAPAN MARKETING JOURNAL 122 Vol.31 No.22011 JAPAN MARKETING JOURNAL 122

More information

Networking Semester 802.3

Networking Semester 802.3 Networking Semester 802.3 2 ) ( Computer Hardware () () () () () () () () ()- () () () () () BIOS () Computer Software Operating Systems Windows, Linux Linux Windows OS I 1.C 2. 3. 3-1.main 3-2.printf

More information

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto

More information

·¬ÝÊß½13.11

·¬ÝÊß½13.11 DAIDO INSTITUTE OF TECHNOLOGY No.38 CONTENTS TOPICS INFORMATION 11 2001 NOVEMBER ,,,,,,,,,, QQQQQQQQQQ,,,,,,,,,, QQQQQQQQQQ,,,,,,,,,, QQQQQQQQQQ,,,,,,,,,, QQQQQQQQQQ,,,,,,,,,, QQQQQQQQQQ ã

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3)

3 2 2 (1) (2) (3) (4) 4 4 AdaBoost 2. [11] Onishi&Yoda [8] Iwashita&Stoica [5] 4 [3] 3. 3 (1) (2) (3) (MIRU2012) 2012 8 820-8502 680-4 E-mail: {d kouno,shimada,endo}@pluto.ai.kyutech.ac.jp (1) (2) (3) (4) 4 AdaBoost 1. Kanade [6] CLAFIC [12] EigenFace [10] 1 1 2 1 [7] 3 2 2 (1) (2) (3) (4) 4 4 AdaBoost

More information

ベース0516.indd

ベース0516.indd QlikView QlikView 2012 2 qlikview.com Business Discovery QlikTech QlikView QlikView QlikView QlikView 1 QlikView Server QlikTech QlikView Scaling Up vs. Scaling Out in a QlikView Environment 2 QlikView

More information

untitled

untitled P04 P23 P21 01 CONTENTS P0305 P28 30 P28 1 2 3 4 5 P07 P09 P13 P15 P19 P30 6 P21 7 8 P22 P25 02 03 04 05 P04 P07P28 P29 06 1 2 3 4 1 07 5-1 -2 6 7-1 -2 8 08 1 2 3 4 2 1 09 5-1 -2 6 7-1 -2 8 10 1 2 3 4

More information

CASP 5 2 3 4 5 2. WildCAT WildCAT Java CASP CASP XML Context Query API CASP 1 Fig. 1 Outline Of Framework WildCAT CASP 3. 1.,,,.,

CASP 5 2 3 4 5 2. WildCAT WildCAT Java CASP CASP XML Context Query API CASP 1 Fig. 1 Outline Of Framework WildCAT CASP 3. 1.,,,., 1 2 3 3 4 5,, Proposal of Application Framework Synchronized with Portable Sensing Devices Akinori Sakamoto, 1 Kazuki Sakamoto, 2 Takaaki Myoujou, 3 Masahiro Ichikawa, 3 Ismail Arai 4 and Nobuhiko Nishio

More information

12

12 1 2 3 2.1 3 2 US Department of Commerce, The advanced technology program: Reform with a purpose, 2002. 3 H. Osada, J. Kaneko, Strategic Management of Technology Innovation, The 18th Asia Quality Symposium

More information

mobicom.dvi

mobicom.dvi 13Dynamic Voltage Scaling on a Low-Power Microprocessor Johan Pouwelse 5 Koen Langendoen Henk Sips Faculty of Information Technology and Systems Delft University of Technology, The Netherlands 1 78724

More information

n Great support experiences n Security n Cross Platform n Fast and Clear n Reboot & Reconnect

n Great support experiences n Security n Cross Platform n Fast and Clear n Reboot & Reconnect Specification Sheet of RSup Remotecall n Great support experiences n Security n Cross Platform n Fast and Clear n Reboot & Reconnect Requirements Requirements Server Security Information Basic Features

More information

2 984 WWW

2 984 WWW 18 2 984 WWW 1 1 1.1................................. 1 2 3 2.1............................ 3 2.1.1......................... 3 2.1.2......................... 4 2.1.3........................ 5 2.2........

More information

08-特集04.indd

08-特集04.indd 5 2 Journal of Multimedia Aided Education Research 2008, Vol. 5, No. 2, 3543 ICT ICT ICT 2 ICT ICT 1100 2008 ICT ICT 2007 ICT ICT ICT ICT IPtalk2008 2006 LAN TCP/IP 1 35 5 22008 1 Enter 1 IPtalk 2 2 2IPtalk

More information

キヤノンマーケティングジャパングループ CSR報告書 情報セキュリティ報告書

キヤノンマーケティングジャパングループ CSR報告書 情報セキュリティ報告書 1 Canon Marketing Japan Group 2 3 9 11 15 23 29 41 51 53 55 57 59 62 63 65 67 5 Corporate Social Responsibility Report 2008 2 3 Canon Marketing Japan Group Corporate Social Responsibility Report 2008 4

More information

07九州工業大学.indd

07九州工業大学.indd 1 1 Journal of Multimedia Aided Education Research, 2004, No. 1, 45 58 e-learning e-learning e-learning Video On Demand e-learning e-learning e-learning e-learning 2004 e-learning e-learning OLU SCS 2

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

科技表紙PDF200508

科技表紙PDF200508 2 1 2 20 Science & Technology Trends August 2005 21 3 22 Science & Technology Trends August 2005 23 4 24 C C Science & Technology Trends August 2005 25 C C C 26 5 Science & Technology Trends August 2005

More information

01.indd

01.indd 2 Vol. 27 1 1 2 2 4 Vol. 27 Contents 3 Vol. 27 2 01 02 03 04 14 24 28 37 38 4 Vol. 27.01 5 Vol. 27.01 6 Vol. 27 7 Vol. 27.01 8 Vol. 27.02 9 Vol. 27.02 10 Vol. 27 11 Vol. 27.02 12 Vol. 27 13 Vol. 27.02

More information

★20052G1.doc

★20052G1.doc Office I Office Application I: Word Processor Windows IME Word web 2002() FOM Programming C C C CQ Operating Systems I Windows, Linux OS I Linux OS Linux Linux vi X-Window i-node Linux/UNIX ISBN4-7973-2742-1

More information

CONTENTS 2012 2 Vol.65 No.2 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~

CONTENTS 2012 2 Vol.65 No.2 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~ 2 2012 CONTENTS 2012 2 Vol.65 No.2 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

More information

CONTENTS 20103 Vol.63 No.3 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~ ~~~~~~~~

CONTENTS 20103 Vol.63 No.3 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~ ~~~~~~~~ 3 2010 CONTENTS 20103 Vol.63 No.3 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~ ~~~~~~~~ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42

More information