name name IP [6] ICN Zipf 2 5 [7] 2 name 2 CCN 3 ICN Compact CCN 2. ICN ICN name NDN/CCN [], [2] CCN MTU name Interest Data CCN FIB PIT CS 3 CS

Size: px
Start display at page:

Download "name name IP [6] ICN Zipf 2 5 [7] 2 name 2 CCN 3 ICN Compact CCN 2. ICN ICN name NDN/CCN [], [2] CCN MTU name Interest Data CCN FIB PIT CS 3 CS"

Transcription

1 (ICN) Compact / (ICN) (CCN) Abstract A Proposal and Evaluation of Cache Replacement Policy for the Implementation of ICN Router Atsushi OOKA, Shingo ATA, and Masayuki MURATA Graduate School of Information Science and Technology, Osaka University -5 Yamadaoka, Suita, Osaka, , Japan Graduate School of Engineering, Osaka City University Sugimoto, Sumiyoshi-ku, Osaka-shi, Osaka , Japan {a-ooka,murata}@ist.osaka-u.ac.jp, ata@info.eng.osaka-cu.ac.jp Information-centric networking (ICN) requires an innovative cache replacement algorithm with performance far superior to simple policies such as and computational and memory overheads that are low enough to run on ICN router s hardware. We focus on as the suitable policy for an access pattern of workload on the router and propose the cache replacement policy (called Compact ) that satisfies the requirements. We also evaluate our proposed approach and show that the size of cache memory required to achieve a certain performance can be reduced to /th of that of the simple policy. Key words Policy Future Networks, Information-Centric Networking, Content-Centric Networking, Caching, Cache Replacement. Information-Centric Networking (ICN) ICN ICN IP name NDN/CCN [] [3], PSIRP/PURSUIT [4], SAIL/NetInf [5] ICN ICN clean-slate IP name

2 name name IP [6] ICN Zipf 2 5 [7] 2 name 2 CCN 3 ICN Compact CCN 2. ICN ICN name NDN/CCN [], [2] CCN MTU name Interest Data CCN FIB PIT CS 3 CS Data Data name Data 2. 2 ICN CE 2 (Cache Everything Everywhere) [], [2], [4], [5] CE 2 [8] d [9] [] [] Leave Copy Down (LCD) CE 2 [2] [3] 2. 3 Random First-In, First Out () Not Recently Used (NRU) Random First-In, First Out () IP Not Recently Used (NRU) ( R ) R LRU LRU [] Least Recently Used (LRU) Adaptive Replacement Cache (ARC) [4] Low Inter-reference Re- 2

3 cency Set (LIRS) [5] Least Frequently Used (LFU) LRU ICN Random LRU [], [6] ARC LRU LFU LRU ARC 2 LRU L L 2 2 L n (n =, 2) (T n ) (B n ) recent T n B n B n ghost cache T T 2 < = c L L 2 = T B T 2 B 2 < = 2c LRU LRU LIRS LRU loop(3. ) LFU LRU LRU R = R = R LRU ARC Clock with Adaptive Replacement () [7] T T 2 ARC B B 2 LRU T T 2 MRU operation LIRS -Pro [8] LRU loop LIRS ICN [3], [9] LRU LFU [2] scan, loop, correlated-reference, frequentlyshifts scan LRU n S > c loop scan (LRU, LFU, ARC ) scan correlated-reference LFU frequently-shifts LIRS / LRU MRU operation NRU LFU LRU tail NRU R set LRU-stack NRU bit ARC 3

4 LIRS ghost cache LFU 3. 2 ICN ICN 3 scan loop scan frequently-shifts 2 Web VoIP scan loop MTU.5KB scan loop MB 7k 3 scan loop scan frequently-shifts loop ARC -Pro correlated-reference LFU loop frequtently-shifts LFU ARC LIRS LRU LRU [7], [8] NRU -Pro -Pro loop frequently-shifts 3 loop scan frequently-shifts LRU 4. Compact 4. ARC LRU-stack ( ) LRU-stack 2 Compact ARC/ T, T 2, B, B 2 L = T B, L 2 = T 2 B 2 T T 2, B B 2 c c T = T T 2, B = B B 2 c T B 4

5 T ( T = n) a a 2 a i a n b c n b j a n a a 2 a 3 T 2 ( T 2 = c n) B ( B = m) B 2 ( B 2 = c m) b c n b b 2 b x x k x m y c m y l y b 3 x m x x 2 x 3 y c m y y 2 y 3 Algorithm 3 ReplaceBtm() for Compact : procedure REPLACEBTM(i) 2: Swap(B i [Hand Bi ], B i.edgechunk) 3: Discard B i.edgechunk 4: Rotate Hand Bi 5: an address next to the edge of B i is ensured to be free. 6: end procedure a i a i reference-bit (R-bit) b j b j Compact ( ARC ) T ( T = n) a a 2 a i a n b c n b j 2 a n a a 2 a i a i a 3 T 2 ( T 2 = c n) b c n b b 2 b j b j b b 3 x k x k T ( T = n ) a n a a 2 a n a i a 3 y l y l T 2 ( T 2 = c n + ) a a n a n a i b c n b j a i b (T T 2 a k ) + b j b j b 2 b b 3 Algorithm 4 ReplaceTop() for Compact : function REPLACETOP(i) 2: while T i [Hand Ti ].R-bit= do 3: T i [Hand Ti ].R-bit 4: if i= then 5: Swap(T i [Hand Ti ], T i.edgechunk) 6: Shift the boundary between T and T 2. 7: end if 8: Rotate Hand Ti 9: end while : s e an address next to the edge of B i : B i [s e] T i [Hand Ti ] 2: Swap(T i [Hand Ti ], T i.edgechunk) 3: Discard T i.edgechunk 4: Rotate Hand Ti 5: return T i.edgeaddr 6: end function Algorithm Dual-bit/Compact Replacement Algorithm : procedure CACHEREPLACEMENT(x) x is an accessed chunk. 2: if x T then cache hit 3: x.r-bit 4: return 5: else if x B then ghost hit 6: i 2 to cache x in T 2 7: if x B then 8: δ max(, B 2 ); p min(c, p + δ) B 9: DiscardBtm(,x) : else x B 2 : δ max(, B ); p max(, p δ) B 2 2: DiscardBtm(2,x) 3: end if 4: else cache miss 5: i to cache x in T 6: if Full(L ) & B > then ReplaceBtm() 7: else if Full(L) & B 2 > then ReplaceBtm(2) 8: end if 9: end if 2: if Full(T ) then 2: if T > = max(p, ) then s t ReplaceTop() 22: else s t ReplaceTop(2) 23: end if 24: else T is not full. 25: s t a free address in T i 26: end if 27: T i [s t ] x x is cached as a chunk in T i. 28: end procedure Algorithm 2 DiscardBtm() for Compact : procedure DISDBTM(i, x) 2: Swap(x, B i.edgechunk) 3: Discard x (at the edge of B i ) 4: an address next to the edge of B i is ensured to be free. 5: end procedure Compact 4. 2 Compact Compact T T 2 B B 2 T T 2 B B 2 R LRU-stack 2 T = (a, a 2,, a n ) T 2 = (b, b 2,, b c n ) a k LRU-stack a k T 2 (b j+,, b c n ) Compact a k a n T = (a, a k, a n, a k+, a n ), T 2 = (b, b 2,, b c n, a k ) T T 2 LRU 4. 3 Compact Compact R (2 4 ) 5 9 B ghost hit (5 3 ) p ghost hit p ARC T 5

6 p (4 9 ) B B B 2 p 2 26 B T s t 27 s t Hand Ti T i T i [Hand Ti ] (B i ) ( EdgeChunk) T Ghost hit B B 2 B i B B 2 DiscardBtm ( 2) B i x Ghost hit ReplaceBtm ( 3) B i B ReplaceTop ( 4) T i T T R 2 T 2 B B DiscardBtm ReplaceBtm B B Compact Zipf Zipf 2 A Zipf(α) A Zipf A Zipf(α) α A Zipf r f(r) = c α /r α (c, α ) [2] α.5.2 α =.6,.8,.,.2 4 A 7 YouTube, nicovideo, dailymotion ,428, ,545 3,4,868 3 Zipf 49,82 L 5B.5KB 6KB 6

7 [pck/sec].5kb 5KB 6KB SD(4.5[MB/min]) HD(9.[MB/min]) 2.5 A Zipf(α) 7 A KB 2: 2: ( 9 ) 5KB 3:2 4:8 ( 66 ) 6KB 9:57 4:45 ( 9 ) A C Zipf(α) AC A P =LKB Zipf(α) A P =LKB,,, CE 2 () 7 C 6 [Chunks] A Zipf(α) Zipf α A C Zipf(.6) 4 A C Zipf(.8) 5 AC Zipf(.) 6 AC Zipf(.2) 7 α =. 8 9 Compact LRU.5% / % α A A C, A P =.5KB 4 A P =LKB A P =.5KB A P =5KB A P =.5KB A P =6KB , A C Zipf(α) 5, A P =LKB Zipf(α),A P =5KB 7, 8 2,, 96,, 2, 2 7

8 Compact Compact Compact Compact A C Zipf(.6) 5 A C Zipf(.8) 6 A C Zipf(.) 7 A C Zipf(.2) Compact.3 Compact.4 Compact A P =.5KB Zipf(.) 9 A P =5KB Zipf(.) A P =6KB Zipf(.) Compact.5 Compact.5 Compact.4 Compact A C 2 A P =.5KB 3 A P =5KB 4 A P =6KB Repel Repel Repel Repel st th st th st th st th 5 A C Zipf(.8) (c = 5 [Chunks]) 6 A P =6KB Zipf(.2) (c = 3 [Chunks]) 7 A P =6KB Zipf(.) (c = 3 [Chunks]) 8 A P =6KB Zipf(.) (c = 4 [Chunks]) Repel Repel LRU Compact st 9 A C (C = 3 [Chunks]) th st 2 A P =5KB (C = 3 [Chunks]) th % A Zipf(α) α 8

9 loop loop loop 6. 2 Data Gbps.25GB Data 64B 2MSPS Interest % bit 2MSPS 2 24bit 63MB SRAM 2.3Gbit(8 288Mbit) 4 SRAM.45ns [22] 4 DRAM SSD FPGA [6] ICN 7. ICN ICN CS Web ICN [7] Compact Compact LRU / ICN SCOPE [] V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, and R.L. Braynard, Networking named content, Proceedings of the ACM CoNEXT 29, pp. 2, Dec. 29. [2] L. Zhang, D. Estrin, J. Burke, V. Jacobson, J.D. Thornton, D.K. Smetters, B. Zhang, G. Tsudik, K. Claffy, D. Krioukov, D. Massey, C. Papadopoulos, T. Abdelzaher, L. Wang, P. Crowley, and E. Yeh, Named data networking (NDN) project, Oct. 2. http: //named-data.net/techreport/trndn-proj.pdf [3], CCNx, [4] N. Fotiou, P. Nikander, D. Trossen, and G.C. Polyzos, Developing information networking further: From PSIRP to PURSUIT, Proceedings of the International ICST Conference on Broadband Communications,Networks, and Systems, pp. 3, Oct. 2. [5] T. Levä, J. Gonçalves, R.J. Ferreira, et al., Description of project wide scenarios and use cases, Feb eu/wp-content/uploads/2/2/sail D2 Project wide Scenarios and Use cases Public Final.pdf [6] K.I. Atsushi Ooka, Shingo Ata and M. Murata, High-speed design of conflict-less name lookup and efficient selective cache on CCN router, IEICE Transactions on Communications, vol.e98-b, no.4, pp.67 62, April 25. [7] F. Guillemin, B. Kauffmann, S. Moteau, and A. Simonian, Experimental analysis of caching efficiency for YouTube traffic in an ISP network, Proceedings of the 2 International Teletraffic Congress, pp. 9, Sept

10 [8] S.K. Fayazbakhsh, Y. Lin, A. Tootoonchian, A. Ghodsi, T. Koponen, B. Maggs, K.C. Ng, V. Sekar, and S. Shenker, Less pain, most of the gain: Incrementally deployable ICN, ACM SIGCOMM Computer Communication Review, vol.43, no.4, pp.47 58, Aug. 23. [9] S. Arianfar, P. Nikander, and J. Ott, On content-centric router design and implications, Proceedings of the ACM Re-Architecting the Internet Workshop, pp. 6, Nov. 2. [] W.K. Chai D. He I. Psaras, and G. Pavlou, Cache less for more in information-centric networks, Computer Communications vol.36 no.7 pp [] D. Rossi and G. Rossini, Caching performance of content centric networks under multi-path routing (and more), Technical report, Telecom ParisTech, July 2. [2] A. Ioannou and S. Weber, A taxonomy of caching approaches in information-centric network architectures, Technical report, School of Computer Science and Statistics, Trinity College Dublin, Jan. 25. [3] L. Wang, S. Bayhan, and J. Kangasharju, Optimal chunking and partial caching in information-centric networks, Computer Communications, vol.6, no., pp.48 57, May 25. [4] N. Megiddo and D.S. Modha, ARC: a self-tuning, low overhead replacement cache, Proceedings of the 2Nd USENIX Conference on File and Storage Technologies, pp.5 3, March 23. [5] S. Jiang and X. Zhang, Making LRU friendly to weak locality workloads: a novel replacement algorithm to improve buffer cache performance, IEEE Transactions on Computers, vol.54, no.8, pp , Aug. 25. [6] S. Arianfar, P. Nikander, and J. Ott, Packet-level caching for information-centric networking, Technical report, Finnish ICT SHOK, June 2. [7] S. Bansal and D.S. Modha, : Clock with adaptive replacement, Proceedings of the USENIX Conference on File and Storage Technologies, pp.87 2, March 24. [8] S. Jiang, F. Chen, and X. Zhang, -Pro: An effective improvement of the replacement, Proceedings of the USENIX 25, pp , April 25. [9] J. Ran, N. Lv, D. Zhang, Y. Ma, and Z. Xie, On performance of cache policies in named data networking, Proceedings of the International Conference on Advanced Computer Science and Electronics Information 23, pp , July 23. [2] A. Jaleel, K.B. Theobald, S.C. Steely, Jr., and J. Emer, High performance cache replacement using re-reference interval prediction (RRIP), ACM SIGARCH Computer Architecture News, vol.38, no.3, pp.6 7, June 2. [2] C. Fricker, P. Robert, J. Roberts, and N. Sbihi, Impact of traffic mix on caching performance in a content-centric network, Proceedings of the IEEE Conference on Computer Communications 22, pp.3 35, March 22. [22] D. Perino and M. Varvello, A reality check for Content Centric Networking, Proceedings of the ACM SIGCOMM workshop on Information-centric networking, pp.44 49, Aug. 2.

Zipf [5] 2 5 [6] [7][11] ICN [12] LIRS/CLOCK-Pro [13], [14] CLOCK-Pro Using Switching Hash-table (CUSH) (3. )4. CUSH ICN 2. CPU [15] [17] LRU [1], [18

Zipf [5] 2 5 [6] [7][11] ICN [12] LIRS/CLOCK-Pro [13], [14] CLOCK-Pro Using Switching Hash-table (CUSH) (3. )4. CUSH ICN 2. CPU [15] [17] LRU [1], [18 CLOCK-Pro 565-871 1-5 558-8585 3-3-138 E-mail: {a-ooka,suyong,murata}@ist.osaka-u.ac.jp, ata@info.eng.osaka-cu.ac.jp (ICN) CLOCK-Pro ICN CLOCK-Pro Using Switching Hash-table (CUSH) (ICN) (CCN) A Proposal

More information

1 CCN CCN(Content-Centric-Network) [1] PUR- SUIT [2]DONA(Data-Oriented-Network Architecture) [3] 4WARD [4]PSIRP [5] Energy Efficient and Enhanced-type

1 CCN CCN(Content-Centric-Network) [1] PUR- SUIT [2]DONA(Data-Oriented-Network Architecture) [3] 4WARD [4]PSIRP [5] Energy Efficient and Enhanced-type THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 223 8522 3 14 1 E-mail: miyazaki@yamanaka.ics.keio.ac.jp Content Centric Network(CCN) CCN CCN LRU(Least-Recently-Used)Prob-Cache(Probablistic

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

Content-Centric Networking CCN Unmanned Air V

Content-Centric Networking CCN Unmanned Air V 565 0871 1 5 558 8585 3 3 138 E-mail: {t-kitagawa,murata}@ist.osaka-u.ac.jp, ata@info.eng.osaka-cu.ac.jp Content-Centric NetworkingCCN Unmanned Air VehicleUAV CCN UAV CCNUAV Retrieving Information with

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

56 OS OS OS OS 1 OS HDD OS 1 OS HDD HDD OS OS OSOS HDD 図 1 二重キャッシュ環境 3. 負の参照の時間的局所性 3.1 参照の局所性 Locality of Reference Temporal locality Spatial localit

56 OS OS OS OS 1 OS HDD OS 1 OS HDD HDD OS OS OSOS HDD 図 1 二重キャッシュ環境 3. 負の参照の時間的局所性 3.1 参照の局所性 Locality of Reference Temporal locality Spatial localit 116 26 4 1 2 2 1 3 An Analysis of Locality of Reference in Virtualized Environment Hiroki SUGIMOTO 1, Kousuke TAKEUCHI 2, Kouya HINAGAWA 2 and Saneyasu YAMAGUCHI 1 3 Abstract As cloud computing has spread

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS

IPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high

More information

16.16%

16.16% 2017 (411824) 16.16% Abstract Multi-core processor is common technique for high computing performance. In many multi-core processor architectures, all processors share L2 and last level cache memory. Thus,

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

DTN DTN DTN DTN i

DTN DTN DTN DTN i 28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee

More information

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 565 871 1 5 E-mail: {j-konisi,wakamiya,murata}@ist.osaka-u.ac.jp QoS P2P P2P P2P P2P (Peer-to-Peer)

More information

4.1 % 7.5 %

4.1 % 7.5 % 2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel

More information

トランスポート層 TCP輻輳制御(3.7)

トランスポート層 TCP輻輳制御(3.7) 情報指向ネットワークへの適正と実現可能性を有する に基づいた置換方式の提案と評価 大岡睦, オムスーヨン, 阿多信吾, 村田正幸 大阪大学大学院情報科学研究科 大阪市立大学大学院工学研究科 発表内容 研究背景 ICN ルータにおけるキャッシング 置換方式の課題 提案手法 CUSH ( Usig Switchig Hash-tables) 評価 ネットワークトラフィックに適した戦略 ルータで実現可能な低コストの実装

More information

1

1 5-3 Photonic Antennas and its Application to Radio-over-Fiber Wireless Communication Systems LI Keren, MATSUI Toshiaki, and IZUTSU Masayuki In this paper, we presented our recent works on development of

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

3_39.dvi

3_39.dvi Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α,

(a) (b) (c) Canny (d) 1 ( x α, y α ) 3 (x α, y α ) (a) A 2 + B 2 + C 2 + D 2 + E 2 + F 2 = 1 (3) u ξ α u (A, B, C, D, E, F ) (4) ξ α (x 2 α, 2x α y α, [II] Optimization Computation for 3-D Understanding of Images [II]: Ellipse Fitting 1. (1) 2. (2) (edge detection) (edge) (zero-crossing) Canny (Canny operator) (3) 1(a) [I] [II] [III] [IV ] E-mail sugaya@iim.ics.tut.ac.jp

More information

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking 23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly

More information

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC H.264 CABAC 1 1 1 1 1 2, CABAC(Context-based Adaptive Binary Arithmetic Coding) H.264, CABAC, A Parallelization Technology of H.264 CABAC For Real Time Encoder of Moving Picture YUSUKE YATABE 1 HIRONORI

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i 26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information

More information

johnny-paper2nd.dvi

johnny-paper2nd.dvi 13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

: ( 1) () 1. ( 1) 2. ( 1) 3. ( 2)

: ( 1) () 1. ( 1) 2. ( 1) 3. ( 2) Acquiring Organized Information from News by Incremental Theme Refinements 1 1 1 Yutaro Taniguchi 1 Tetsunori Kobayashi 1 Yoshihiko Hayashi 1 1 1 School of Science and Engineering, Waseda University Abstract:

More information

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1

TA3-4 31st Fuzzy System Symposium (Chofu, September 2-4, 2015) Interactive Recommendation System LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Interactive Recommendation System 1 1 1 1 LeonardoKen Orihara, 1 Tomonori Hashiyama, 1 Shun ichi Tano 1 1 Graduate School of Information Systems, The University of Electro-Communications Abstract: The

More information

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN

2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN PenFlowchart 1,a) 2,b) 3,c) 2015 3 4 2015 5 12, 2015 9 5 PEN & PenFlowchart PEN Evaluation of the Effectiveness of Programming Education with Flowcharts Using PenFlowchart Wataru Nakanishi 1,a) Takeo Tatsumi

More information

Microsoft PowerPoint IEICE-ICN

Microsoft PowerPoint IEICE-ICN ICN における Content 名と Naming Scheme に関する 考察 亀山渉朴容震早稲田大学基幹理工学部情報通信学科 2016 年 4 月 20 日電子情報通信学会 ICN 時限研専 1 発表内容 1. 背景と本発表の目的 2. これまでに提案されている Content Naming Scheme 3. Content ID 標準にみる Naming Scheme の考え方 4. ICN

More information

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004 The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale

More information

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc

ICT a) Caption Presentation Method with Speech Expression Utilizing Speech Bubble Shapes for Video Content Yuko KONYA a) and Itiro SIIO 1. Graduate Sc VOL. J98-A NO. 1 JANUARY 2015 本 PDFの 扱 いは 電 子 情 報 通 信 学 会 著 作 権 規 定 に 従 うこと なお 本 PDFは 研 究 教 育 目 的 ( 非 営 利 )に 限 り 著 者 が 第 三 者 に 直 接 配 布 すること ができる 著 者 以 外 からの 配 布 は 禁 じられている ICT a) Caption Presentation Method

More information

MANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d

MANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d DEIM Forum 2013 F1-4 DTN, 565-0871 1-5 567-0047 5-1 184-8795 4-2-1 565-0871 2-1 E-mail: {sawamura.yusuke,nishio}@ist.osaka-u.ac.jp, teranisi@cmc.osaka-u.ac.jp, harumoto@eng.osaka-u.ac.jp DTN (DTN ) DTN

More information

DEIM Forum 2009 B4-6, Str

DEIM Forum 2009 B4-6, Str DEIM Forum 2009 B4-6, 305 8573 1 1 1 152 8550 2 12 1 E-mail: tttakuro@kde.cs.tsukuba.ac.jp, watanabe@de.cs.titech.ac.jp, kitagawa@cs.tsukuba.ac.jp StreamSpinner PC PC StreamSpinner Development of Data

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

<95DB8C9288E397C389C88A E696E6462>

<95DB8C9288E397C389C88A E696E6462> 2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,

More information

The 19th Game Programming Workshop 2014 SHOT 1,a) 2 UCT SHOT UCT SHOT UCT UCT SHOT UCT An Empirical Evaluation of the Effectiveness of the SHOT algori

The 19th Game Programming Workshop 2014 SHOT 1,a) 2 UCT SHOT UCT SHOT UCT UCT SHOT UCT An Empirical Evaluation of the Effectiveness of the SHOT algori SHOT 1,a) 2 UCT SHOT UCT SHOT UCT UCT SHOT UCT An Empirical Evaluation of the Effectiveness of the SHOT algorithm in Go and Gobang Masahiro Honjo 1,a) Yoshimasa Tsuruoka 2 Abstract: Today, UCT is the most

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

IPSJ SIG Technical Report Vol.2015-ARC-215 No.7 Vol.2015-OS-133 No /5/26 Just-In-Time PG 1,a) 1, Just-In-Time VM Geyser Dalvik VM Caffei

IPSJ SIG Technical Report Vol.2015-ARC-215 No.7 Vol.2015-OS-133 No /5/26 Just-In-Time PG 1,a) 1, Just-In-Time VM Geyser Dalvik VM Caffei Just-In-Time PG 1,a) 1, 1 2 1 1 Just-In-Time VM Geyser Dalvik VM CaffeineMark SPECJVM 17% 1. LSI [1][2][3][4][5] (PG) Geyser [6][7] PG ON/OFF OS PG PG [7][8][9][10] Java Just-In-Time (JIT PG [10] JIT 1

More information

自然言語処理16_2_45

自然言語処理16_2_45 FileMaker Pro E-learning GUI Phrase Reading Cloze. E-learning Language Processing Technology and Educational Material Development Generating English Educational Material using a Database Software Kenichi

More information

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h 23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),

More information

dews2004-final.dvi

dews2004-final.dvi DEWS2004 I-10-04 606 8501 E-mail: {akahoshi,hirotanaka,tanaka}@dl.kuis.kyoto-u.ac.jp A Basic Study on Ubiquitous Hypermedia Model Yuhei AKAHOSHI, Hiroya TANAKA, and Katsumi TANAKA Graduate School of Informatics,

More information

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0 AMBA 1 1 1 1 FabScalar FabScalar AMBA AMBA FutureBus Improvement of AMBA Bus Frame-work for Heterogeneos Multi-processor Seto Yusuke 1 Takahiro Sasaki 1 Kazuhiko Ohno 1 Toshio Kondo 1 Abstract: The demand

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

知能と情報, Vol.30, No.5, pp

知能と情報, Vol.30, No.5, pp 1, Adobe Illustrator Photoshop [1] [2] [3] Initital Values Assignment of Parameters Using Onomatopoieas for Interactive Design Tool Tsuyoshi NAKAMURA, Yuki SAWAMURA, Masayoshi KANOH, and Koji YAMADA Graduate

More information

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i 27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification

More information

1 I/F I/F 1 6) MobileIP 7) 8) MN: Monile Node MN AR Mobility Anchor Point(MAP) MobileIP HMIP HMIP HA-MAP MN MAP MN MAP HMIP MAP MN 2 MobileIP Mo

1 I/F I/F 1 6) MobileIP 7) 8) MN: Monile Node MN AR Mobility Anchor Point(MAP) MobileIP HMIP HMIP HA-MAP MN MAP MN MAP HMIP MAP MN 2 MobileIP Mo 1 2 2 I/F Mobility Anchor Point MAP Composite Wireless Access Networks on Mobile Communications and Its Evaluation Abstract: In emerging wireless communication environments, mobile terminals that have

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

fiš„v8.dvi

fiš„v8.dvi (2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp

More information

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,

More information

.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns

.,,, [12].,, [13].,,.,, meal[10]., [11], SNS.,., [14].,,.,,.,,,.,,., Cami-log, , [15], A/D (Powerlab ; ), F- (F-150M, ), ( PC ).,, Chart5(ADIns Cami-log: 1,a) 1,b) 1,c) 1,d),,,.,,.,,,.,, Cami-log,. Cami-log : Proposal of Application to Improve Daily Chewing Activities using Myoelectric Information Hiroki Kurosawa 1,a) Sho Mitarai 1,b) Nagisa Munekata

More information

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 :

149 (Newell [5]) Newell [5], [1], [1], [11] Li,Ryu, and Song [2], [11] Li,Ryu, and Song [2], [1] 1) 2) ( ) ( ) 3) T : 2 a : 3 a 1 : Transactions of the Operations Research Society of Japan Vol. 58, 215, pp. 148 165 c ( 215 1 2 ; 215 9 3 ) 1) 2) :,,,,, 1. [9] 3 12 Darroch,Newell, and Morris [1] Mcneil [3] Miller [4] Newell [5, 6], [1]

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation

,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation 1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1

More information

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,

More information

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,

More information

2 ( ) i

2 ( ) i 25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA

More information

12 DCT A Data-Driven Implementation of Shape Adaptive DCT

12 DCT A Data-Driven Implementation of Shape Adaptive DCT 12 DCT A Data-Driven Implementation of Shape Adaptive DCT 1010431 2001 2 5 DCT MPEG H261,H263 LSI DDMP [1]DDMP MPEG4 DDMP MPEG4 SA-DCT SA-DCT DCT SA-DCT DDMP SA-DCT MPEG4, DDMP,, SA-DCT,, ο i Abstract

More information

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat

TF-IDF TDF-IDF TDF-IDF Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Sat 1 1 2 1. TF-IDF TDF-IDF TDF-IDF. 3 18 6 Extracting Impression of Sightseeing Spots from Blogs for Supporting Selection of Spots to Visit in Travel Satoshi Date, 1 Teruaki Kitasuka, 1 Tsuyoshi Itokawa 2

More information

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai,

IPSJ SIG Technical Report 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai, 1,a) 1,b) 1,c) 1,d) 2,e) 2,f) 2,g) 1. [1] [2] 2 [3] 1 599 8531 1 1 Osaka Prefecture University 1 1, Gakuencho, Naka, Sakai, Osaka 599 8531, Japan 2 565 0871 Osaka University 1 1, Yamadaoka, Suita, Osaka

More information

電子マネーと通信産業の戦略

電子マネーと通信産業の戦略 No.7, 55-65 (2006) Vision of Electronic Money Card Distribution Plans in Japan - Discussion of the and Credit Card Distribution Plans - OSHIMA Kazuchika Nihon University, Graduate School of Social and

More information

202

202 201 Presenteeism 202 203 204 Table 1. Name Elements of Work Productivity Targeted Populations Measurement items of Presenteeism (Number of Items) Reliability Validity α α 205 α ä 206 Table 2. Factors of

More information

WMN Wi-Fi MBCR i

WMN Wi-Fi MBCR i 27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI

More information

屋内ロケーション管理技術

屋内ロケーション管理技術 Technology to Manage Indoor Locations 奥山敏 森信一郎 小川晃弘 あらまし ICT GPS GPS Abstract Smart devices and wireless networks have become widespread and an environment is gradually being put in place in which information

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

IPSJ SIG Technical Report Vol.2016-ARC-221 No /8/9 GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC Dalv

IPSJ SIG Technical Report Vol.2016-ARC-221 No /8/9 GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC Dalv GC 1 1 GC GC GC GC DalvikVM GC 12.4% 5.7% 1. Garbage Collection: GC GC Java GC GC GC GC DalvikVM[1] GC 1 Nagoya Institute of Technology GC GC 2. GC GC 2.1 GC 1 c 2016 Information Processing Society of

More information

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z + 3 3D 1,a) 1 1 Kinect (X, Y) 3D 3D 1. 2010 Microsoft Kinect for Windows SDK( (Kinect) SDK ) 3D [1], [2] [3] [4] [5] [10] 30fps [10] 3 Kinect 3 Kinect Kinect for Windows SDK 3 Microsoft 3 Kinect for Windows

More information

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S KiZUNA: P2P 1,a) 1 1 1 P2P KiZUNA KiZUNA Pure P2P P2P 1 Skip Graph ALM(Application Level Multicast) Pub/Sub, P2P Skip Graph, Bloom Filter KiZUNA: An Implementation of Distributed Microblogging Service

More information

untitled

untitled The Impact of Digitization on Music Production: From a Perspective of Modularity 51 2 pp. 87-108 2003 12 I 21 3 Information and Communication Technology, ICT 0 1 1 20 1 199820012000 1 MP3 CD 2 3 II CD

More information

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU

IPSJ SIG Technical Report Vol.2010-GN-74 No /1/ , 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KU 1 2 2 1, 3 Disaster Training Supporting System Based on Electronic Triage HIROAKI KOJIMA, 1 KUNIAKI SUSEKI, 2 KENTARO NAGAHASHI 2 and KEN-ICHI OKADA 1, 3 When there are a lot of injured people at a large-scale

More information

5D1 SY0004/14/ SICE 1, 2 Dynamically Consistent Motion Design of Humanoid Robots even at the Limit of Kinematics Kenya TANAKA 1 and Tomo

5D1 SY0004/14/ SICE 1, 2 Dynamically Consistent Motion Design of Humanoid Robots even at the Limit of Kinematics Kenya TANAKA 1 and Tomo 5D1 SY4/14/-485 214 SICE 1, 2 Dynamically Consistent Motion Design of Humanoid Robots even at the Limit of Kinematics Kenya TANAKA 1 and Tomomichi SUGIHARA 2 1 School of Engineering, Osaka University 2-1

More information

2017 (413812)

2017 (413812) 2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

08医療情報学22_1_水流final.PDF

08医療情報学22_1_水流final.PDF 22 (1), 702002: 59 59- The Problem of Nursing Common Language for the Information Sharing in Clinical Practice The fact-finding in regard to the correspondence between name and content of nursing action

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [

1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [ Vol.2, No.x, April 2015, pp.xx-xx ISSN xxxx-xxxx 2015 4 30 2015 5 25 253-8550 1100 Tel 0467-53-2111( ) Fax 0467-54-3734 http://www.bunkyo.ac.jp/faculty/business/ 1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The

More information

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP LSM OS 700-8530 3 1 1 matsuda@swlab.it.okayama-u.ac.jp tabata@cs.okayama-u.ac.jp 242-8502 1623 14 munetoh@jp.ibm.com OS Linux 2.6 Linux Security Modules LSM LSM Linux 4 OS OS LSM An Evaluation of Performance

More information

2

2 Programming of Terrestrial Broadcasters and BS Digital Broadcasters by Genre ABSTRACT This study examined the programming of terrestrial and BS digital broadcasters by genre from the viewpoint of economics,

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

PowerPoint プレゼンテーション

PowerPoint プレゼンテーション Mini-Cefore: Container-Based Large-Scale Cefore Emulator 大岡睦, 朝枝仁 National Institute of Information and Communications Technology (NICT) 目次 背景 実験プラットフォームの比較 テストベッド シミュレーター エミュレーター エミュレーターの実装方式の比較 VM (Virtual

More information

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect Using a Human-Shaped Input Device for Remote Pose Instruction Yuki Tayama 1,a) Yoshiaki Ando 2,b) Misaki Hagino 2,c) Ken-ichi Okada 1,d) Abstract: There

More information

The Journal of the Japan Academy of Nursing Administration and Policies Vol 7, No 2, pp 19 _ 30, 2004 Survey on Counseling Services Performed by Nursi

The Journal of the Japan Academy of Nursing Administration and Policies Vol 7, No 2, pp 19 _ 30, 2004 Survey on Counseling Services Performed by Nursi The Journal of the Japan Academy of Nursing Administration and Policies Vol 7, No 2, pp 19 _ 30, 2004 Survey on Counseling Services Performed by Nursing Professionals for Diabetic Outpatients Not Using

More information

ITAOI2003第三屆離島資訊與應用研討會論文範例

ITAOI2003第三屆離島資訊與應用研討會論文範例 2003 6 kung@mail.npust.edu.tw, b8956018@mail.npust.edu.tw, m9056011@mail.npust.edu.tw (Internet) and build up cache proxy servers. In this paper, we (Multi-media) design and development four proxy servers

More information

Mullen IFDOInternational Federation of Data Organizations http : / / www. ifdo. org / org _ archives/arc_bfr.htm CESSDA CESSDA CESSDA http://www.nsd.uib.no/ Cessda/ CESSDAArchives in Europe Elder et al.

More information

paper.dvi

paper.dvi 28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret

More information

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis

[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis 1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information