Vol. 33 No. 3 Aug benign.com IP 1 benign.net IP 2 unknown.com IP 3 malicious.com 1 DNS : (malicious), (benign), (unknown) (Probabilistic Thre
|
|
- ゆきさ やなぎしま
- 6 years ago
- Views:
Transcription
1 16 DNS DNS (Domain Name System) IP 2 (DNS ) (Probabilistic Threat Propagation) DNS DNS 69% 1 ( ) DNS 9% 40% DNS 2,170 DNS This paper proposes a method to estimate malicious domain names from a large scale DNS query response dataset. The key idea of the work is to leverage the use of DNS graph that is a bipartite graph consisting of domain names and corresponding IP addresses. We apply a concept of Probabilistic Threat Propagation (PTP) on the graph with a set of predefined benign and malicious node to a DNS graph obtained from DNS queries at a backbone link. The performance of our proposed method (EPTP) outperformed that of an original PTP method (9% improved) and that of a traditional method using N-gram (40% improved) in an ROC analysis. We finally estimated 2,170 of new malicious domain names with EPTP. 1 Domain Name System (DNS) ( ) IP DNS IP DNS DNS Detecting Malicious Domains with Probabilistic Threat Propagation on DNS Graph. Yuta Kazato, Toshiharu Sugawara,, Waseda University. Kensuke Fukuda, /, National Institute of Informatics / Sokendai., Vol.33, No.3(2016), pp [ ] IP IP C&C IP DNS ( )
2 Vol. 33 No. 3 Aug benign.com IP 1 benign.net IP 2 unknown.com IP 3 malicious.com 1 DNS : (malicious), (benign), (unknown) (Probabilistic Threat Propagation; PTP) DNS IP 2 (DNS ) ( 1) ( IP ) 3 DNS PTP EPTP (Extended PTP) 9% (N-gram ) 40% 2 (1) PTP EPTP (2) DNS DNS DNS DNS 1 DNS Top Level Domain (TLD) (.jp) Second Level Domain (SLD) (, co.jp) IP ( ) gtld (.com,.net) cctld (.cn,.jp) 60 85% [8] [10] [24] 50% TLD [12] gtld.com.net [20] cctld.cn [25] 90% gtld DNS 1 [13] TLD DDoS( ) Exposure [7] Kopis [3] Notos [2] Exposure [7] time to live (TTL) 15 3,000
3 18 Kopis [3] DDoS Notos [2] [14] DNS SVM [26] Domain Generation Algorithm (DGA) (N-gram) K-L DGA [15] Jaccard index C&C NX ( ) [27] [4] NX DGA [23] DGA DNS [28] DNS [22] Fast-flux DNS IP Flux (CDN ) [16] [6] NX DNS failure graph [16] 3G [19] [11] [9] Manadhata [19] HTTP DNS Polonium [11] Machine File 2 Probability Threat Propagation (PTP) [9] web proxy IP URL IP PTP PTP [9] DNS DNS (DNS) DNS DNS A IP
4 Vol. 33 No. 3 Aug DNS ( 1) G X E G = (X, E) IP IP IP i IP j i IP j (e ij E) 1 IP 1 IP ( CDN) 1 IP 1 IP ( ) DNS [5] IP 0 x j 1 O(N 2 ) 1 1 k 2 P k (x i) = w ij(p k 1 (x j) C k 1 (x i, x j)) j N(x i ) (2) P k (x i ) k x i P k 1 (x j) k 1 x i x j C k 1 (x i, x j ) k 1 x i x j C k 1 x i x j k x j x i 3. 2 EPTP PTP [9] (Malicious ) {malicious} P (x malicious) = γ PTP G x i 1 P (x i ; G) = w ij P (x j x i = 0; G) (1) j N(x i ) 1 N(x i ) x i w ij i j P (x j x i = 0; G) x i 2 k C k 1 3 C k 1 (x i, x j ) = w ji (P k 2 (x i )) (3) w ij 4 w ij = 1 N(x i ) e ij E 0 e ij E (4) PTP Alexa [1] DNS Alexa {benign}
5 20 Require: W, {malicious}, {benign}, γ, β 1: P α N, P (malicious) γ, P (benign) β, C 0 N N 2: repeat 3: T W diag(p ) 4: C T W C T 5: P < C, 1 > 6: C(malicious, ) 0, C(benign, ) 0 7: P (malicious) γ, P (benign) β 8: until P has converged 9: return P (A(i, j) B(i, j)) {malicious} P (malicious) γ {benign} P (benign) β 0 0 T W diag(p ) (diag(p ) P N N ) T W C T 2 2 Extended Probability Threat Propagation C C P =< C, 1 > {benign} Benign Malicious 1 PTP Malicious γ [0,1] 0 EPTP β > 0 γ < 0 α = γ+β 2 P (x) γ P (x) < α P (x) γ α < P (x) β P (x) β Benign β = 1 Malicious γ = β = 1 α = γ+β 2 = 0 ( 2) EPTP 2 N P R N (P (i) = P (x i )) W R N N T R N N (T (i, j) = W (i, j) P (j)) C R N N, C = T W C T A B 1 EPTP (<, > 1 N 1 ) P {malicious} {benign} P C x x {malicious}, {benign} EPTP 1 P P x k PTP DNS DNS 1 DNS tcpdump UDP port
6 Vol. 33 No. 3 Aug Total Number (x1000) IN domains OUT domains KEEP domains Total Number (x1000) IN domains OUT domains KEEP domains Total Number (x1000) IN domains OUT domains KEEP domains Total Number (x1000) IN domains OUT domains KEEP domains /05 11/12 11/19 11/ /05 11/12 11/19 11/ /05 11/12 11/19 11/ /11 11/18 11/25 Time (JST 2013) Time (JST 2013) Time (JST 2013) Time (JST 2013) (a) (b) Benign (c) Malicious (d) Suspicious 3 IN KEEP OUT 24 DNS (A ) IP DNS 1,348,547, IP 2,417,727 3,917, DNS (Malicious) malwaredomains.com [18] uribl.com [21] (Malicious ) (Benign) Alexa [1] (Alexa ) 30,000 30,653 Alexa DGA 5 DNS DNS 5. 1 DNS 1 DNS k k 1 KEEP k 1 k OUT k 1 k IN DNS (All) (Malicious) (Benign) DNS IN KEEP OUT 3 (a) (c) 30,000 30,653 KEEP IN OUT 1 65% KEEP KEEP ( 71.8%) IN OUT ( 51.4%)
7 22 1 KEEP IN OUT KEEP IN OUT ALL 65.9% 17.1% 17.1% Benign 71.8% 14.1% 14.1% Malicious 48.6% 25.8% 25.6% Suspicious 65.3% 17.4% 17.2% 2 DNS d = 1 d = 24 1,271,975 3,766, ,266 1,348,547 IP 603,709 2,417,727 1,199,612 3,917, , , DNS 2013/11/05 1 (d = 1) 2013/11/ (d = 24) 2 DNS d=1 DNS DNS d = 24 d=1 DNS IP DNS d= 24 DNS 4 75% IP 1 1 d=24 70% Frequency Number of nodes 3 10 (d = 24) No. IP Benign Malicious 1 778,279 1,832, , , , , , , , , , % (d=24) 1 IP IP 2 spmode.ne.jp pandaworld.ne.jp 1
8 Vol. 33 No. 3 Aug d=1 d=24 567,663 2,610, , ,279 IP 218,082 1,832, ,706 3,095, (%) (%) ave med B B 912, ,422, M M 13, , B M 343, ,911, U U 2,738, ,226, IP 4 DNS 20 2 Frequency Benign-Benign Malicious-Malicious Benign-Malicious Unknown-Unknown Node distance d=24 d= DNS (d= ) 3 d=1 d=24 2 (B B) (B M) 8.4 (M M) % IP (B B) 5. 3 d=1 Benign Malicious Unknown 5 5 B B, M M, B M, U U Benign Malicious Benign Malicious Unknown (B M) Unknown (U U) B M 6 EPTP EPTP PTP, N-gram EPTP DNS
9 24 Ratio TPR 0.0 FPR Threshold True Positive Rate cv-Original PTP 10-cv-Extended PTP cv-Original PTP 5-cv-Extended PTP 0.00 Bigram-based False Positive Rate ROC (k-fold cross validation) 6. 1 EPTP 2,000, 1,973 k-fold cross validation (CV) (k = 5, 10) DNS 1 10-fold CV P (x) TPR (True Positive Rate) FPR (False Positive Rate) 6 TPR τ = 0 TPR 90% FPR τ = 0 FPR TLD biz net info SLD DGA Receiver Operatorating Characteristic (ROC) (EPTP) (PTP) N-gram [17] [26] 7 10-fold CV ROC EPTP FPR PTP TPR Time (s) / Memory (MiB) Memory (MiB) Time (s) Number of nodes EPTP EPTP TPR fold CV 10-fold CV ROC 10-fold CV N-gram 40% 1,000 10, ,000 1,000,000 EPTP 8 (CPU: Intel Xeon X GHz; Memory 32GB) 10
10 Vol. 33 No. 3 Aug c4brcwmg.biz info-ezweb-ne-jp.info poohpoohhany.info bvncm-kdkdkgree.jp nomoguz.su kisjehmbga.jp google-play.jp IP EPTP IP 1 IP IP IP 7 9 ( :, : IP : ) 6. 2 DNS d=24 DNS EPTP 6 FPR 0 τ = IP 2,170 IP 12,884 6 EPTP (τ = 0.1) IN KEEP OUT 6. 2 EPTP Suspicious IN KEEP OUT ( 3 (d) 1) Suspicious ALL IN KEEP OUT IN KEEP OUT Suspicious Malicious DGA 6 Suspicious DGA DNS 5 5 2
11 26 PTP DNS DNS IP DNS, d= DNS DNS DNS 69% 1 IP IP 7. 3 EPTP [9] PTP Alexa 10-fold CV FPR (=0.016) 8% 90.4% ( 7) EPTP 6 τ = 0 DNS 8 10 DNS 5-fold CV 10-fold CV 6 τ 0.1 2,170 ( 6) DGA google-play.jp N-gram EPTP ( 9) IP IP
12 Vol. 33 No. 3 Aug DNS A PTP DNS 1 EPTP DNS 90.4% 2,170 Malicious Alaxa (15H02699) (EU) FP7 ( :NECOMA) [ 1 ] Alexa: Alexa [Online], topsites/. [ 2 ] Antonakakis, M., Perdisci, R., Dagon, D., Lee, W. and Feamster, N.: Building a Dynamic Reputation System for DNS, in Proceedings of USENIX security symposium, 2010, pp [ 3 ] Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou II, N. and Dagon, D.: Detecting Malware Domains at the Upper DNS Hierarchy, in Proceedings of USENIX Security Symposium, 2011, pp [ 4 ] Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou II, N., Abu-Nimeh, S., Lee, W. and Dagon, D.: From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware, in Proceedings of USENIX Security Symposium, 2012, pp [ 5 ] Arkko, J., Cotton, M. and Vegoda, L.: IPv4 Address Blocks Reserved for Documentation, RFC 5737, January [ 6 ] Bar, A., Paciello, A. and Romirer-Maierhofer, P.: Trapping botnets by DNS failure graphs: validation, extension and application to a 3G network, in Proceedings of TMA 13, IEEE, 2013, pp [ 7 ] Bilge, L., Sen, S., Balzarotti, D., Kirda, E. and Kruegel, C.: EXPOSURE: a passive DNS analysis service to detect and report malicious domains, ACM Transactions on Information and System Security (TISSEC), Vol. 16, No. 4(2014), p. 14. [ 8 ] Brownlee, N., Claffy, K. and Nemeth, E.: DNS measurements at a root server, in Proceedings of GLOBECOM 01, Vol. 3, IEEE, 2001, pp [ 9 ] Carter, K. M., Idika, N. and Streilein, W. W.: Probabilistic threat propagation for malicious activity detection, in Proceedings of ICASSP 13, IEEE, 2013, pp [10] Castro, S., Wessels, D., Fomenkov, M. and Claffy, K.: A Day at the Root of the Internet, ACM SIGCOMM Computer Communication Review, Vol. 38, No. 5(2008), pp [11] Chau, D., Nachenberg, C., Wilhelm, J., Wright, A. and Faloutsos, C.: Polonium: Tera-scale graph mining and inference for malware detection, in Proceedings of SIAM International Conference on Data Mining, Vol. 2, [12] Gao, H., Yegneswaran, V., Chen, Y., Porras, P., Ghosh, S., Jiang, J. and Duan, H.: An empirical reexamination of global DNS behavior, in Proceedings of SIGCOMM 13, ACM, 2013, pp [13] Hao, S., Feamster, N. and Pandrangi, R.: Monitoring the initial DNS behavior of malicious domains, in Proceedings of IMC 11, ACM, 2011, pp [14] Ishibashi, K. and Sato, K.: Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy, in Proceedings of World Telecommunications Congress (WTC 12), 2012, pp [15] Ishibashi, K., Toyono, T., Hasegawa, H. and Yoshino, H.: Extending black domain name list by using co-occurrence relation between DNS queries, IEICE Transactions on Communications, Vol. 95, No. 3(2012), pp [16] Jiang, N., Cao, J., Jin, Y., Li, L. E. and Zhang, Z.-L.: Identifying suspicious activities through DNS failure graph analysis, in Proceedings of ICNP 10, IEEE, 2010, pp [17] Kazato, Y., Fukuda, K. and Sugawara, T.: To-
13 28 wards classification of DNS erroneous queries, in Proceedings of AINTEC 13, ACM, 2013, pp [18] Malware Domain Blocklist: DNS-BH Malware Domain Blocklist, com/. [19] Manadhata, P. K., Yadav, S., Rao, P. and Horne, W.: Detecting Malicious Domains via Graph Inference, in Proceedings of ESORICS 14, Springer, 2014, pp [20] Osterweil, E., McPherson, D., DiBenedetto, S., Papadopoulos, C. and Massey, D.: Behavior of DNS Top Talkers, a. com/. net View, in Proceedings of PAM 12, Springer, 2012, pp [21] P. Vixie: Traltime URI Blacklist, com/. [22] Perdisci, R., Corona, I., Dagon, D. and Lee, W.: Detecting malicious flux service networks through passive analysis of recursive DNS traces, in Proceedings of ACSAC 09, IEEE, 2009, pp [23] Schiavoni, S., Maggi, F., Cavallaro, L. and Zanero, S.: Phoenix: DGA-based botnet tracking and intelligence, in Proceedings of DIMVA 14, Springer, 2014, pp [24] Wessels, D. and Fomenkov, M.: Wow, that s a lot of packets, in Proceedings of PAM 03, [25] Xuebiao, Y., Xin, W., Xiaodong, L. and Baoping, Y.: DNS measurements at the.cn TLD servers, in Proceedings of FSKD 09, Vol. 7, 2009, pp [26] Yadav, S., Reddy, A., Reddy, A. and Ranjan, S.: Detecting algorithmically generated malicious domain names, in Proceedings of IMC 10, ACM, 2010, pp [27] Yadav, S. and Reddy, A. N.: Winning with DNS failures: Strategies for faster botnet detection, in Proceedings of SecureCom 12, Springer, 2012, pp [28],,, : DNS,. IOT, No. 21(2009), pp ( ( )) (2002) ( ; ) / ( ) 1982., ,.,.,,,,. ( ).,,,, ISOC IEEE, ACM, AAAI.
DNS: Domain Name
2012 DNS 2012 8 2 5110B140-4 1 5 1.1..................................... 5 1.2..................................... 6 1.3.................................... 6 2 DNS: Domain Name System 7 2.1...................................
More information8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact
8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for
More information1 PCAP PCAP PCAP IP K Wv(t + 1) = Wv(t) + (v; t)a(t)(d(t)!wv(t)) 16: standard find query 6:random ID choice NA ms-sql 1782 ssh t
Computer Security Symposium 2013 21-23 October 2013 okino@itc.u-toyama.ac.jp katayama@magi.co.jp ruo@nict.go.jp 22,168,821 Geographical classification of malicious packets using self-organization map Koji
More informationIPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
More informationRun-Based Trieから構成される 決定木の枝刈り法
Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationInput image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L
1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives
More information27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U
YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube
More informationIPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU
1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale
More informationTCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2
Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More informationDual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B
root Android IPv4/ 1 1 2 1 NAT Network Address Translation IPv4 NTMobile Network Traversal with Mobility NTMobile Android 4.0 VPN API VpnService root VpnService IPv4 IPv4 VpnService NTMobile root IPv4/
More informationWeb Web Web Web Web IP
2012 Web 2013 2 1 5111B073-1 1 5 1.1... 5 1.2... 6 1.3... 6 2 Web 8 2.1 Web... 8 2.2 Web... 9 2.2.1... 9 2.2.2 Web... 10 2.2.3 Web... 11 3 13 3.1... 13 3.2... 15 3.2.1 IP... 15 3.2.2 WHOIS... 17 3.2.3
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More information1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2
CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for
More informationHP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree
LAN 1 2 3 2 LAN WiFiTag WiFiTag LAN LAN 100% WiFi Tag An Improved Determination Method with Multiple Access Points for Relative Position Estimation Using Wireless LAN Abstract: We have proposed a WiFiTag
More information修士論文
27 Mobile Ad Hoc Networks An Ant-based Routing Algorithm with Multi-phase Pheromone and Power-saving in Mobile Ad Hoc Networks 14T0013 Shohei Miyashita E-mail: shohei.miyashita.4j@stu.hosei.ac.jp : Abstract
More informationIPSJ SIG Technical Report Pitman-Yor 1 1 Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Aki
Pitman-Yor Pitman-Yor n-gram A proposal of the melody generation method using hierarchical pitman-yor language model Akira Shirai and Tadahiro Taniguchi Although a lot of melody generation method has been
More informationIRC IRC HTTP P2P HTTP P2P IRC 1993 [1] IRC C&C [2], [3] [2] IRC C&C 16 3 [3] IRC IRC / n-gram 2003 C&C P2P [1] P2P P2P PeerShark [4] [4] IRC P2P HTTP
C&C 1,2, 1 1,2 2,3,a) 1,2 2014 12 8, 2015 6 5 Command and Control C&C 1 C&C C&C C&C C&C C&C C&C C&C C&C Evaluation of Machine Learning Techniques for C&C Traffic Classification Kazumasa Yamauchi 1,2, 1
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More informationDDoS Distributed Denial of Service Attack [1], [2] [3] [4] 1.2 [5], [6] [7], [8] IRC IRC IRC IRC IRC IRC IRC IRC IRC Dews [9] M
1,2,a) 2,3,b) 1,2,c) 1,2,d) 2012 6 29, 2012 12 7 IRC IRC IRC IRC IRC IRC IRC IRC A Bot Detection Method Using Hierarchical Clustering Based on Mechanical Communication Behavior Model Seiichiro Mizoguchi
More informationDEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme
DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community
More information[2][3][4][5] 4 ( 1 ) ( 2 ) ( 3 ) ( 4 ) 2. Shiratori [2] Shiratori [3] [4] GP [5] [6] [7] [8][9] Kinect Choi [10] 3. 1 c 2016 Information Processing So
1,a) 2 2 1 2,b) 3,c) A choreographic authoring system reflecting a user s preference Ryo Kakitsuka 1,a) Kosetsu Tsukuda 2 Satoru Fukayama 2 Naoya Iwamoto 1 Masataka Goto 2,b) Shigeo Morishima 3,c) Abstract:
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationDTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More information1
5-3 Photonic Antennas and its Application to Radio-over-Fiber Wireless Communication Systems LI Keren, MATSUI Toshiaki, and IZUTSU Masayuki In this paper, we presented our recent works on development of
More informationuntitled
580 26 5 SP-G 2011 AI An Automatic Question Generation Method for a Local Councilor Search System Yasutomo KIMURA Hideyuki SHIBUKI Keiichi TAKAMARU Hokuto Ototake Tetsuro KOBAYASHI Tatsunori MORI Otaru
More information1 : Google Amazon Facebook Akamai Hyper giants Web [1] Web Web Web Magnitude Exploit Kit PHP.net Web Yahoo 600 [2] Web URL Blacklist URL Blacklist URL
Computer Security Symposium 2014 22-24 October 2014 URL URL NTT 169-8555 3-4-1 180-8585 3-9-11 {sunshine,mori}@nsl.cs.waseda.ac.jp {akiyama.mitsuhiro, yagi.takeshi}@lab.ntt.co.jp Web URL URL URL URL URL
More informationCSIS (No.324) {kazuya-o, okuda, 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geograp
CSIS (No.324) {kazuya-o, okuda, suguru}@is.naist.jp 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geographically Aggregatable Location-based Multicast Address)
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More informationuntitled
2011 2 9 Akamai Technologies, Inc., et al., Plaintiff Appellant, v. Limelight Networks, Inc., Defendant-Cross Appellant. 1 ( ) 2 3 CAFC BMC 4 (control or 3 Aro Mfg. Co. v. Convertible Top Replacement Co.,
More informationIPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo
1 1 2 3 4 5 1 1, 6 Construction and Operation of Large Scale Web Contents Distribution Platform using Cloud Computing 1. ( ) 1 IT Web Yoshihiro Okamoto, 1 Naomi Terada and Tomohisa Akafuji, 1, 2 Yuko Okamoto,
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationict4.key
IP IP IP IP IP IPv4 32 0-1 IPv6 128 0-1 Web IP 192.47.204.101 IP addressing IP IP IP DNS daito.ac.jp st.daito.ac.jp ic.daito.ac.jp jm.daito.ac.jp DNS =host name....tld www.daito.ac.jp, www.google.com,
More informationDNS DNS DDoS [2] Open Resolver Project [3] DNS 53/UDP DNS ,800 DNS Spamhaus [4] DDoS DNS 120 Gbps Tier Gbps [5], [6] DDoS Prolex
DNS DNS 1,a) 1 1 2013 12 2, 2014 6 17 Domain Name System DNS IP DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS 1 DNS DNS DNS DNS DNS DNS Observing DNS Amplification Attacks with DNS Honeypot Daisuke
More informationIntrusion Detection Method using Online Learning by Kouki Takahata BA Thesis at Future University Hakodate, 2017 Advisor: Ayahiko N
28 1013251 29 1 31 Intrusion Detection Method using Online Learning by Advisor: Ayahiko Niimi Department of Media Architecture Future University Hakodate January 31, 2017 Abstract Cyber-attacks such as
More informationWebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution
More informationMining Social Network of Conference Participants from the Web
Social Network Mining Social network Semantic Web, KM, Our lives are enormously influenced by relations to others. SNS Mixi, myspace, LiveJournal, Yahoo!360 FOAF WebBlog Web mining Social network mining
More information1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More information2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal
1 2 3 A projection-based method for interactive 3D visualization of complex graphs Masanori Takami, 1 Hiroshi Hosobe 2 and Ken Wakita 3 Proposed is a new interaction technique to manipulate graph layouts
More information,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation
1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1
More informationNAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for
NAT-f SIP NAT 1 1, 2 1 IP SIP NAT NAT NAT NAT-f NAT-free protocol NAT-f SIP Session Initiation Protocol NAT-f SIP NAT Researches on NAT traversal for SIP utilizing NAT-f Kenkichi Miura, 1 Hidekazu Suzuki
More information浜松医科大学紀要
On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse
More information2
1 1 http://www.jpo.go.jp/indexj.htm International Patent Classification European Patent Classification JST Online Information System Derwent World Patent Index The Scientific and Technical Information
More informationA Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)
More informationPublish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S
KiZUNA: P2P 1,a) 1 1 1 P2P KiZUNA KiZUNA Pure P2P P2P 1 Skip Graph ALM(Application Level Multicast) Pub/Sub, P2P Skip Graph, Bloom Filter KiZUNA: An Implementation of Distributed Microblogging Service
More informationDPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)
1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology
More informationIPSJ SIG Technical Report Vol.2009-DBS-149 No /11/ Bow-tie SCC Inter Keyword Navigation based on Degree-constrained Co-Occurrence Graph
1 2 1 Bow-tie SCC Inter Keyword Navigation based on Degree-constrained Co-Occurrence Graph Satoshi Shimada, 1 Tomohiro Fukuhara 2 and Tetsuji Satoh 1 We had proposed a navigation method that generates
More information2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server
a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,
More information149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :
Transactions of the Operations Research Society of Japan Vol. 58, 215, pp. 148 165 c ( 215 1 2 ; 215 9 3 ) 1) 2) :,,,,, 1. [9] 3 12 Darroch,Newell, and Morris [1] Mcneil [3] Miller [4] Newell [5, 6], [1]
More informationDEIM Forum 2010 A Web Abstract Classification Method for Revie
DEIM Forum 2010 A2-2 305 8550 1 2 305 8550 1 2 E-mail: s0813158@u.tsukuba.ac.jp, satoh@slis.tsukuba.ac.jp Web Abstract Classification Method for Reviews using Degree of Mentioning each Viewpoint Tomoya
More informationInternet Week '98 (c) JPNIC, NTTPC, moto kawasaki WP, niana, wwtld Internet Governance Moto JPNIC DOM-WG / NTTPC 9
Internet Week '98 (c) JPNIC, NTTPC, moto kawasaki 1998 1 WP, niana, wwtld Internet Governance Moto Kawasaki(kawasaki@nic.ad.jp) JPNIC DOM-WG / NTTPC 98/Dec/15 Internet Governance IANA IP address AS number
More information258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System
Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.
More informationComputer Security Symposium October 2013 Android OS kub
Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android
More information(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s
1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene
More informationIPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-
1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,
More informationインターネットと運用技術シンポジウム 2016 Internet and Operation Technology Symposium 2016 IOTS /12/1 syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo Show
syslog 1,2,a) 3,b) syslog syslog syslog Interop Tokyo ShowNet syslog Proposal of the anomaly detection method analyzing syslog data using Bollinger Bands algorithm on event network Hiroshi Abe 1,2,a) Mikifumi
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationFirefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数
Computer Security Symposium 2014 22-24 October 2014 Firefox 182-8585 1-5-1 takaken@ol.inf.uec.ac.jp {kazushi, oyama}@inf.uec.ac.jp Web Firefox Firefox Firefox Investigation on Attack and Stealth Methods
More information1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c
CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification
More information..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i
25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time
More informationTA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1
Interactive Recommendation System 1 1 1 1 LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Shun ichi Tano 1 1 Graduate School of Information Systems, The University of Electro-Communications Abstract: The
More informationDNS DNS 2002/12/19 Internet Week 2002/DNS DAY 2
DNS 2002 12 19 2003 1 16 Internet Week 2002/DNS DAY ( ) (JPRS) DNS DNS 2002/12/19 Internet Week 2002/DNS DAY 2 DNS SOA SOA TTL $TTL NS MX CNAME 2002/12/19 Internet Week 2002/DNS DAY
More informationB HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int
SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More information23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h
23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),
More information2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL
1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita
More information3_39.dvi
Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar
More information[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing
1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November
More information[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis
1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe
1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly
More informationIPSJ SIG Technical Report Vol.2010-CVIM-170 No /1/ Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Ta
1 1 1 1 2 1. Visual Recognition of Wire Harnesses for Automated Wiring Masaki Yoneda, 1 Takayuki Okatani 1 and Koichiro Deguchi 1 This paper presents a method for recognizing the pose of a wire harness
More informationA Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member
A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe
More informationP2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i
27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification
More informationFig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S
1 1 1 Fig. 1 1 Example of a sequential pattern that is exracted from a set of method definitions. A Defect Detection Method for Object-Oriented Programs using Sequential Pattern Mining Goro YAMADA, 1 Norihiro
More informationmain.dvi
FDTD S A Study on FDTD Analysis based on S-Parameter 18 2 7 04GD168 FDTD FDTD S S FDTD S S S S FDTD FDTD i 1 1 1.1 FDTD.................................... 1 1.2 FDTD..................... 3 2 S 5 2.1 FDTD
More information2 ( ) i
25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More informationKey Words: probabilisic scenario earthquake, active fault data, Great Hanshin earthquake, low frequency-high impact earthquake motion, seismic hazard map 3) Cornell, C. A.: Engineering Seismic
More informationIPSJ SIG Technical Report Vol.2014-CG-155 No /6/28 1,a) 1,2,3 1 3,4 CG An Interpolation Method of Different Flow Fields using Polar Inter
,a),2,3 3,4 CG 2 2 2 An Interpolation Method of Different Flow Fields using Polar Interpolation Syuhei Sato,a) Yoshinori Dobashi,2,3 Tsuyoshi Yamamoto Tomoyuki Nishita 3,4 Abstract: Recently, realistic
More information22 / ( ) OD (Origin-Destination)
23 2 15 22 / ( ) OD (Origin-Destination) 1 1 2 3 2.1....................................... 3 2.2......................................... 3 2.3.......................................... 5 2.4............................
More informationWikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy
1, 2 3 1, 2 Web Fischer Social Creativity 1) Social Creativity CG Network Analysis of an Emergent Massively Collaborative Creation Community Masahiro Hamasaki, 1, 2 Hideaki Takeda 3 and Takuichi Nishimura
More informationElastic stack Jun Ohtani 1
Elastic stack Jun Ohtani 2017/12/06 @johtani 1 about Me, Jun Ohtani / Technical Advocate lucene-gosen ElasticSearch Server http://blog.johtani.info Elasticsearch, founded in 2012 Products: Elasticsearch,
More information.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns
Cami-log: 1,a) 1,b) 1,c) 1,d),,,.,,.,,,.,, Cami-log,. Cami-log : Proposal of Application to Improve Daily Chewing Activities using Myoelectric Information Hiroki Kurosawa 1,a) Sho Mitarai 1,b) Nagisa Munekata
More information1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,
More informationJFE.dvi
,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho
More information人工知能学会研究会資料 SIG-KBS-B Analysis of Voting Behavior in One Night Werewolf 1 2 Ema Nishizaki 1 Tomonobu Ozaki Graduate School of Integrated B
人工知能学会研究会資料 SIG-KBS-B508-09 Analysis of Voting Behavior in One Night Werewolf 1 2 Ema Nishizaki 1 Tomonobu Ozaki 2 1 1 Graduate School of Integrated Basic Sciences, Nihon University 2 2 College of Humanities
More information2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055
1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More information1 3 1.1..................................... 3 1.2..................................... 4 1.3.................................... 4 2 DNS 5 2.1 DNS...
2015 User-AgentDNS 2016 2 1 5114F058-7 1 3 1.1..................................... 3 1.2..................................... 4 1.3.................................... 4 2 DNS 5 2.1 DNS......................................
More information悪性Webサイト探索のための効率的な巡回順序の決定法
2012 年度修士論文審査 悪性 Web サイト探索のための 効率的な巡回順序の決定法 千葉大紀 学籍番号 : 5111B073-1 指導 : 後藤滋樹教授 Feb. 8, 2013 Daiki Chiba, Goto Lab. 1 種類別 査読付国際会議 国内学会発表 国内学会発表 国内学会発表 本論文に関わる研究業績 (2013 年 2 月現在 ) 題名 発表 発行掲載誌名 発表 発行年月 連名者
More information[1] [3]. SQL SELECT GENERATE< media >< T F E > GENERATE. < media > HTML PDF < T F E > Target Form Expression ( ), 3.. (,). : Name, Tel name tel
DEIM Forum 2011 C7-5 SuperSQL 223 8522 3 14 1 E-mail: tomonari@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp SuperSQL, SQL SELECT GENERATE SQL., SuperSQL HTML,.,. SuperSQL, HTML, Equivalent Transformation on
More informationPresent Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29
Present Situation and Problems on Aseismic Design of Pile Foundation By H. Hokugo, F. Ohsugi, A. Omika, S. Nomura, Y. Fukuda Concrete Journal, Vol. 29, No. 8, pp. 4-12, Aug. 1986 Synopsis The pile foundation
More information大学における原価計算教育の現状と課題
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012
More information[12] Qui [6][7] Google N-gram[11] Web ( 4travel 5, 6 ) ( 7 ) ( All About 8 ) (1) (2) (3) 3 3 (1) (2) (3) (a) ( (b) (c) (d) (e) (1
RD-003 Building a Database of Purpose for Action from Word-of-mouth on the Web y Hiromi Wakaki y Hiroko Fujii y Michiaki Ariga y Kazuo Sumita y Kouta Nakata y Masaru Suzuki 1 ().com 1 Amazon 2 3 [10] 2007
More information第 55 回自動制御連合講演会 2012 年 11 月 17 日,18 日京都大学 1K403 ( ) Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. T
第 55 回自動制御連合講演会 212 年 11 月 日, 日京都大学 1K43 () Interpolation for the Gas Source Detection using the Parameter Estimation in a Sensor Network S. Tokumoto, T. Namerikawa (Keio Univ. ) Abstract The purpose of
More information