, Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei

Size: px
Start display at page:

Download ", Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei"

Transcription

1 , Evaluation of Certificate Verification Method in Mobile Environment Katuyuki UMEZAWA,, Mituhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigeichi HIRASAWA PKI PKI CRL OCSP CVS 3 3 CVS PKI CVS OCSP CRL 1. ID PKI Hitachi, Ltd., Sytem Development Laboratory, Hitachi Sytem Plaza Shinkawaaki, 890 Kahimada, Saiwai-ku, Kawaaki-hi, Japan Graduate School of Science & Engineering, Waeda Univerity, Okubo, Shinjuku-ku, Tokyo, Japan (GPKI) PKI 384 D Vol. J90 D No. 2 pp c 2007

2 CRL (Certificate Revocation Lit) OCSP (Online Certificate Statu Protocol) CVS (Certificate Validation Server) 1 2 [1] CRL OCSP CVS CRL OCSP CVS ITU-T X.509 (2000) [5] RFC3280 [6] 2. 1 CRL (Certificate Revocation Lit) [5], [6] OCSP (Online Certificate Statu Protocol) [7] CVS (Certificate Validation Server) [8], [9] CRL CRL CRL (Certification Authority CA) CRL CRL CRL CRL CRL CRL 1 SCVP [15] CVS [2] [4] 385

3 2007/2 Vol. J90 D No. 2 δ-crl 5 CRL CRL δ-crl bae-crl CRL CRL bae-crl δ-crl bae-crl CRL δ-crl bae-crl OCSP OCSP OCSP (Varidation Authority VA) (good) (revoked) (unknown) CVS CRL OCSP CVS CVS (GPKI) [8] [9] [14] (CA) (VA) CA VA CRL OCSP CVS CA VA [1] (δ-)crl 2 3 VA OCSP 2 VA VA CVS VA CA CRL 5 VA VA OCSP VA 6 1 Table 1 Claification of the certificate verification method. CRL OCSP CVS 1 (δ-)crl Fig. 1 (δ-)crl model. 5 CRL CRL CRL (CRT Certificate Revocation Tree) 6 VA

4 2 OCSP 1 Fig. 2 OCSP model 1. 3 OCSP 2 Fig. 3 OCSP model 2. 4 CVS 1 Fig. 4 CVS model 1. N k q r β α M 1 M 2 M 3 M 4 M 5 D n D ig D n D ig 5 CVS 2 Fig. 5 CVS model 2. 2 Table 2 Notation. [ ] VA [ ] CA [ ] 1 [ /day ] CA +1 [ ] VA [bit/] VA VA CA VA [] [] [] CRL [] [] OCSP [bit] OCSP [bit] CVS [bit] CVS [bit] 3. 2 CRL CRL CRL CRL CRL C x M x R x T x T x = C x + M x + R x (1) x C x M x R x C x 387

5 2007/2 Vol. J90 D No. 2 λ X P (X) =λ X e λ /X! [1] q [ /day ] CA k [ ] T [day] CA qt/k 1. A 1 2 CA λ = qt k 7 T T 1 p e X 1 p e T X 1 =1 e qt k (2) VA X X OCSP 1 N VA 1. A 2 2 OCSP 2 CVS 1 2 N/ VA 1. A 3 2 A 4 2 VA q = q N CVS 2 q 1 1. A 4 3 q Nv 1 VA 1. A 4 4 VA VA q = q N OCSP 1 CVS 2 k/ OCSP 2 CVS 1 k CA T VA CA qt/k N 1. A 2 3 A 4 5 N qt/k 1. A 3 3 VA T 1 OCSP 1 CVS 2 p T vx 1 OCSP 2 CVS 1 T p v X 1 p T vx 1 =1 qt e k N (3) p v T X 1 =1 e qt k NNv (4) 3. 4 CRL CRL δ-crl CA CRL CA VA CRL 8 CRL T C CRL CA 1 CRL 1 CRL C CRL (2) T = T C l CRL CA q C CRL = k pe T C X 1 lcrl T C q (5) l CRL CA 1 CRL 2. l CRL = N pl l n + l ig [bit] (6) k δ-crl bae-crl δ-crl C baecrl C delta C deltacrl = C baecrl + C delta (7) δ-crl bae-crl CRL CRL C baecrl (5) bae-crl T B C baecrl = k pe T B X 1 lcrl (8) T B q δ-crl C delta n δ-crl l delta (n) C delta = k pe T C X 1 TB TC 1 n=1 l delta (n) (9) T B q l delta (n) l delta (n)= N { ( ) pl n } 1 1 TC l n k L + l ig (10) 7 [1] 8 [1] CA CRL 388

6 3. CA VA CRL OCSP 1 CVS 2 k/ CA CRL OCSP 2 CVS 1 k CA CRL 1 CRL C x x (3) (4) T = T C l CRL CRL CA q β C OCSP1 = C CV S2 = k p T C vx 1 lcrl T C q β (11) C CV S1 = C OCSP2 = k pvt C X 1 l CRL (12) T C q β CRL r 1 CVS 1 CVS 2 VA 3 5 CRL δ-crl OCSP 1 r CRL δ-crl VA 1 5 M n (1 n 5) [] M 12 = M 1 + M 2 M 35 = M 3 + M 5 1 M x x 9 M CRL =(r 1)(M 12 + M 4) (13) M deltacrl = M CRL (14) M OCSP1 =(r 1)(M 12 + αm 4 + M 35) (15) M OCSP2 =(r 1)(M 12 + αm 4)+M 35 (16) M CV S1 =(r 1)α(M 12 + M 4)+M 35 (17) M CV S2 = M CV S1 (18) 3. 6 CRL δ-crl 0 10 CVS 1 2 r OCSP 1 2 CA r 1 OCSP 1 r 1 OCSP 2 CVS 1 2 OCSP 1 (r 1)(D n +D ig) OCSP 2 (r 1)D n + D ig CVS 1 2 rd n + D ig CVS 2 CA VA VA VA VA Nv 1 CVS 2 VA VA R CV S2 R CV S2 = Nv 1 (r 1) (Dn + Dig) β (19) VA VA VA OCSP 1 1 R x x 11 R CRL = R deltacrl = 0 (20) (r 1)(Dn + Dig) R OCSP1 = (21) (r 1)Dn + Dig R OCSP2 = (22) R CV S1 = rd n + D ig (23) { rd n + D ig R CV S2 = 9 r 1 CA 10 CRL

7 2007/2 Vol. J90 D No. 2 + Nv 1 } (r 1)(Dn + Dig) β (24) M 2 M VA (δ-)crl OCSP 1 2 CVS 1 12 (a) (1) T x x T x = C x + M x + R x (2) (23) 3 1 T x x T CRL = M (25) T deltacrl = M (26) T OCSP1 = β (0.712α+4)M (27) T OCSP2 = β (0.712α+3)M (28) T CV S1 = β (2.712α+1)M (29) k, 384k, 6 =28.8k [bit/] Fig. 6 The average of the verification time in the each ytem when the tranaction peed i =28.8k [bit/]. 7 = 384k [bit/] Fig. 7 The average of the verification time in the each ytem when the tranaction peed i = 384k [bit/]. 2.4M [bit/] α = β = 100 CA VA 100 (25) (29) Y CRL 12 CVS 2 390

8 3 Table 3 Parameter for evaluation. 1 2 N [ ] 77,229, ,000 N [ ] 633,000 77,229,000 q [ /day] p [ /day] 0.1/ /365 L [day] CRL δ-crl T C [day] 1 1 CRL l n,[bit] CRL l ig [bit] CA k [ ] VA [ ] OCSP D n [bit] OCSP D ig [bit] CVS D n [bit] 6,464 6,464 CVS D ig [bit] bae-crl T B [ ] M 1 [] 0 0 M 2 [] M M M 3 [] 0 0 CRL M 4 [] 0.356M 0.356M M 5 [] M M M Table4 ThevalueofM that i the interection in Fig. 6, 7 and k 384k 2.4M T CRL M = M = M = T deltacrl M = M = M = T OCSP 1 M = M = M = T OCSP 2 M = M = M = =2.4M [bit/] Fig. 8 The average of the verification time in the each ytem when the tranaction peed i =2.4M [bit/]. Y CVS CVS (α =1.0) (β =1.0) OCSP 2 CVS 1 (28) (29) M T CV S1 >T OCSP2 CVS CVS (b) CVS T CV S1 M 4 391

9 2007/2 Vol. J90 D No k [bit/] M = T CV S1 T OCSP2 26.2m [] CVS (c) CVS VA α α 0.5 = 384k [bit/] =2.4M [bit/] OCSP 1 OCSP 2 CVS 1 9 CVS 1 9 CVS 1 α CVS 1 9 CVS CVS (CRL) CRL CVS 2 13 VA VA CVS 1 CVS 1 CVS 2 VA VA CA α =0.5 VA β =1.0 CA VA VA = 100M [bit/] CVS OCSP 1 2 CVS Fig. 9 Area where average verification time of CVS method become mall more than OCSP method 1 and = 100M [bit/] Fig. 10 The average of the verification time in the each ytem when the tranaction peed i = 100M [bit/] CA CRL VA CA CRL OCSP VA CRL 392

10 14 10 CVS 1 CVS 2 (CRL) CVS CRL OCSP CVS 3. CRL OCSP [2] CVS 1 CDMA 1x WIN BREW CPU Intel r Pentium r GHz 2GByte OS Window r XP operating ytem 5 (M CV S1) (R CV S1) (T CV S1) CRL C CV S1 =0 M 35 =0 675 [Byte] 569 [Byte] 5[Byte] 1249 [Byte] rd n + D ig = 9992 [bit] α =0.16/ CRL 7 CRL 4. M (17) (28 [m]) 2 (r =2) (M 35 =0) (α =0.16/10.03) M 12+M 4 = 1755 [m] (13) (14) CRL M CRL = M deltacrl = 1755 [m] (15) (16) 7 CRL M 4 =0.356M 2 M 1 =0 M OCSP1 = M OCSP2 = 1302 [m] (23) (879 [m]) 9992 [bit] = [bit/] 1 OCSP 704 [bit] (21) (22) R OCSP1 = R OCSP2 =62[m] 8 γ n (n = 1, 2, 3) 1 1 CRL 6 Table 6 The meaurement value of ignature generation time. [m] CRL Table 7 The ratio between time of verifying ignature and earching CRL. (M 2 M 5) 1 CRL (M 4) Table 5 The meaurement value of certificate validation time. [m] (M CV S1) 28 (R CV S1) (879) (T CV S1) 907 * 8 Table 8 Certificate verification time of each method. [m] T CRL T deltacrl γ 1 T OCSP 1 T OCSP γ 2 T CV S γ 3 14 OCSP

11 2007/2 Vol. J90 D No. 2 (5) (11) (12) CRL CA k VA T C q q 1 T p C T ex 1 p C vx 1 p T C vx 1 1 γ n γ 1 = l CRL/ γ 2 = γ 3 = l CRL/(β ) VA VA CA β >1 γ 1 >γ 2 = γ 3 15 γ 8143 [Byte] CRL CRL 106 [m] (6) 3 CRL 1230 [Byte] 106 [m] γ CVS CRL CRL CRL λ =(q N/Nv)/( ) M/M/S [m] 15 T = R CRL δ-crl CRL CRL 1 δ-crl CRL γ 1 11 Fig. 11 The average repone time. 5. VA (NICT) Window Microoft Corporation Intel Pentium Intel Corporation BREW BREW Qualcomm [1] PKI vol.45, no.12, pp

12 2833, [2] IT , Sept [3] 2005 pp , Oct [4] 28 pp , Nov [5] ITU-T Recommendation X.509 (2000) ISO/IEC :2001: Information Technology Open Sytem Interconnection The Directory: Public-key and Attribute Certificate Framework. [6] R. Houley, T. Polk, W. Ford, and D. Solo, RFC Internet X.509 Public Key Infratructure Certificate and Certificate Revocation Lit (CRL) Profile, IETF, April [7] M. Myer, R. Ankney, A. Malpani, S. Galperin, and C. Adam, RFC X.509 Internet Public Key Infratructure Online Certificate Statu Protocol OCSP, IRTF, June [8] H15/12/17 [9] D-I vol.j87-d-i, no.8, pp , Aug [10] X.509 vol.2005, no.33, pp.55 60, [11] S. Hane, T. Fujihiro, Y. Hahimoto, T. Kaji, K. Kondo, and S. Tezuka, Speeding up X.509 certificate path validation, 4th International Workhop for Applied PKI, IWAP2005, [12] PKI 2002, pp , [13] (GPKI) OFS , [14] vol.2005, no.70, pp , [15] T. Freman, R. Houley, A. Malpani, D. Cooper, and T. Polk, Simple Certificate Validation Protocol (SCVP), IETF, July [16] CRL A 1 A 4 CRL OCSP 2 CVS 1 CRL 2. l CRL p 16 CRL A 1 (δ-)crl CRL Fig. A 1 Derive the average of the acquirement time of CRL for (δ-)crl model. A 2 OCSP 1 CRL Fig. A 2 Derive the average of the acquirement time of CRL for OCSP model [1] 395

13 2007/2 Vol. J90 D No. 2 l n l ig (6) 3. l delta(n) bae-crl n δ-crl P n CA T C N pt C/k [ ] P nt C/L [ ] A 3 CVS 1 OCSP 2 CRL Fig. A 3 Derive the average of the acquirement time of CRL for CVS model 1 and OCSP model 2. A 4 CVS 2 CRL Fig. A 4 Derive the average of the acquirement time of CRL for CVS model 2. N table (N,L,p,k) CA 1 N p/k [ ] N table (N,L,p,k)/L [ ] N table (N,L,p,k) N table (N,L,p,k)= N pl (A 1) k CRL l CRL P n+1 = P n + N pt C k PnTC L (A 2) P 0 =0 P n 1 n T B/T C 1 P n = N { ( ) pl n } TC 1 (A 3) k L n δ-crl l delta (n) l n l ig (10) N 2 N [16] ,126 IP 1 N 2 N [16] / 26.0% 20.3% 14.6% 3 1 q [16] [ / ] [ / ] 1 3[ /day]

14 2 q ,229,000 3[ ] 633,000 [ ] 77,229,000 3/633,000 p L T C l n l ig [1] [1] N N [1] 1 2 N N CA k 2 CA 1 VA 19 (B) (C) A: 1/7 B: 1/18 C: 1/ CRL 1:0.356 CRL l CRL (6) 3 l CRL = 9843 [bit] CRL 5. CRL (5) (7) (11) (12) 1 CRL C CRL = [m] (A 4) C deltacrl = [m] (A 5) C OCSP1 = [m] (A 6) C OCSP2 = [m] (A 7) C CV S1 = [m] (A 8) D n D ig [7] D n D ig [3] T B [1] M 1 M 1 0 M 3 0 M 2 M 5 M M 4 CRL M 6 CRL 3 1 (A) 19 (MVNO)

15 2007/2 Vol. J90 D No LAN UCLA IEEE Fellow 2001 ACM 398

untitled

untitled better RFID 1 /?? PKI PKI ) (GPKI) GtoB GPKI 3300- LGPKI GtoC -> Identrus B2B GPKI Identrus PKI 2 Internet-VPN PKI? HTTPS ( ) HTTPS 3 PKI??????? PDA/ /? RFIDPKI?? 4 Challenge

More information

はじめに

はじめに 19 1.1 19 1.2 21 1.3 22 1.3.1 DES 24 1.4 25 1.4.1 DH 26 1.4.2 RSA 26 1.4.3 ElGamal 27 1.4.4 DSA 27 1.5 27 1.6 28 1.6.1 SHA-1 28 1.6.2 MD5 Message Digest 5 28 1.7 29 1.7.1 MIC 29 1.7.2 HMAC 29 1.7.3 30

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

第3 章 電子認証技術に関する国際動向

第3 章 電子認証技術に関する国際動向 3 IETF PKI TAM Trust Anchor Management 3. IETF Internet Engineering Task Force PKIX WG 3.1. IETF PKIX WG 1 2006 PKI Public-Key Infrastructure IETF PKIX WG 2007 69 IETF 70 IETF WG PKIX WG 2006 3 2 3.2.

More information

/07/ /10/12 I

/07/ /10/12 I Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web

More information

証明書検証サーバ

証明書検証サーバ (Certificate Validation Server) 2007/11/1 Version 1.09 (Certificate Validation Server) 1 2006/4/27 0.930 2 2007/5/8 0.940 / 3 2007/5/15 0.950 Solaris TOE Linux TOE ST 4 2007/5/23 0.960 ASE ( : ASE001-01)

More information

untitled

untitled PKI 1 / SSL/TLS PKI 28 Oct 2005 PKI /JNSA PKI Day 3 PKI? 2 RFC 2459/RFC 3280/RFC 3280bis CRL(RFC 2459/RFC 3280/RFC 3280bis) OCSP(RFC 2560/Light-weight OCSP) SCVP(SCVP) CMP(RFC 2510/RFC 4210) CRMF(RFC 2511/RFC

More information

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L 1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

5b_08.dvi

5b_08.dvi , Circularly Polarized Patch Antennas Combining Different Shaped Linealy Polarized Elements Takanori NORO,, Yasuhiro KAZAMA, Masaharu TAKAHASHI, and Koichi ITO 1. GPS LAN 10% [1] Graduate School of Science

More information

YMS-VPN1_User_Manual

YMS-VPN1_User_Manual YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows

More information

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting

More information

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**

More information

Proposal of Driving Torque Control Method for Electric Vehicle with In-Wheel Motors Masataka Yoshimura (Yokohama National University) Hiroshi Fujimoto

Proposal of Driving Torque Control Method for Electric Vehicle with In-Wheel Motors Masataka Yoshimura (Yokohama National University) Hiroshi Fujimoto Propoal of Control Method for Electric ehicle with In-Wheel Motor Maataka Yohimura (Yokohama National Univerity) Hirohi Fujimoto (The Univerity of Tokyo) Abtract The anti-lip control or the lip ratio control

More information

1_26.dvi

1_26.dvi C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,

More information

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: alex@ee.tokushima-u.ac.jp Id: itrc20th-20061005.tex,v

More information

Vol.8 No (July 2015) 2/ [3] stratification / *1 2 J-REIT *2 *1 *2 J-REIT % J-REIT J-REIT 6 J-REIT J-REIT 10 J-REIT *3 J-

Vol.8 No (July 2015) 2/ [3] stratification / *1 2 J-REIT *2 *1 *2 J-REIT % J-REIT J-REIT 6 J-REIT J-REIT 10 J-REIT *3 J- Vol.8 No.2 1 9 (July 2015) 1,a) 2 3 2012 1 5 2012 3 24, 2013 12 12 2 1 2 A Factor Model for Measuring Market Risk in Real Estate Investment Hiroshi Ishijima 1,a) Akira Maeda 2 Tomohiko Taniyama 3 Received:

More information

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [ 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)

More information

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC H.264 CABAC 1 1 1 1 1 2, CABAC(Context-based Adaptive Binary Arithmetic Coding) H.264, CABAC, A Parallelization Technology of H.264 CABAC For Real Time Encoder of Moving Picture YUSUKE YATABE 1 HIRONORI

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

zsj2017 (Toyama) program.pdf

zsj2017 (Toyama) program.pdf 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88

More information

88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88

More information

_170825_<52D5><7269><5B66><4F1A>_<6821><4E86><5F8C><4FEE><6B63>_<518A><5B50><4F53><FF08><5168><9801><FF09>.pdf

_170825_<52D5><7269><5B66><4F1A>_<6821><4E86><5F8C><4FEE><6B63>_<518A><5B50><4F53><FF08><5168><9801><FF09>.pdf 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88

More information

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre 3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination

More information

WMN Wi-Fi MBCR i

WMN Wi-Fi MBCR i 27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

JFE.dvi

JFE.dvi ,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

untitled

untitled PKI UTF8String Part4: IETF MicrosoftMSWindowsWindows 2000Windows NTWindows XPWindows Internet ExplorerOutlookOutlook Express Microsoft Corporation Sun MicrosystemsSun Java Solaris JavaJDK Sun Microsystems

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

IEEE e

IEEE e 2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

25 About what prevent spoofing of misusing a session information

25 About what prevent spoofing of misusing a session information 25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent

More information

情報セキュリティの現状と課題

情報セキュリティの現状と課題 443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html

More information

携帯グループ(完成版)2007

携帯グループ(完成版)2007 The present condition and the next development of mobile phone industry The present condition and the next development of mobile phone industry WiMAX 90 1 16.5 5 5 13 13 5 5 5 1 NEC 1 2007 07 11 2 2G GSM

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

O1-1 O1-2 O1-3 O1-4 O1-5 O1-6

O1-1 O1-2 O1-3 O1-4 O1-5 O1-6 O1-1 O1-2 O1-3 O1-4 O1-5 O1-6 O1-7 O1-8 O1-9 O1-10 O1-11 O1-12 O1-13 O1-14 O1-15 O1-16 O1-17 O1-18 O1-19 O1-20 O1-21 O1-22 O1-23 O1-24 O1-25 O1-26 O1-27 O1-28 O1-29 O1-30 O1-31 O1-32 O1-33 O1-34 O1-35

More information

橡セキュリティポリシー雛形策定に関する調査報告書

橡セキュリティポリシー雛形策定に関する調査報告書 13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site

More information

1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing

1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing 1,a) 2,b) 3 Modeling of Agitation Method in Automatic Mahjong Table using Multi-Agent Simulation Hiroyasu Ide 1,a) Takashi Okuda 2,b) Abstract: Automatic mahjong table refers to mahjong table which automatically

More information

(2) LAN PDA (3) 14 13 14

(2) LAN PDA (3) 14 13 14 3.4.5 (1) RF-ID (2) LAN PDA (3) 14 13 14 a b (4) 14 (5) 14 (6) 14 14 a ID 03c312508144a000 ID 0385b1508144a001 2 b CSV ID:056571508144a002 (7) 14 a 15 b ID ID ID 15 (8) 14, 1 FIT2002 Vol.4, M-80, pp.193-194,

More information

Linux Activities for Promoting Desktop Linux Utilization Jun Iio Research Center for Information Technology, Mitsubish

Linux Activities for Promoting Desktop Linux Utilization Jun Iio Research Center for Information Technology, Mitsubish Linux Activities for Promoting Desktop Linux Utilization Jun Iio iiojun@mri.co.jp 100-8141 2-3-6 Research Center for Information Technology, Mitsubishi Research Institute, Inc. 2-3-6 Otemachi, Chiyoda-ku,

More information

untitled

untitled 1 2 1 3 IR... 4 2 5 1990 Surety 1990 2000 IETFISO/IEC 6 3 7 ISO/IEC 18014 IETF RFC 3161 Time-stamp Protocol ETSI TS 102 023RFC 3628) ETSI TS 101 861 8 4 (TSA, Time Stamping Authority) 1ab5c98f... 1ab5c98f...

More information

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL

xx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP

More information

1.indd

1.indd 14 15 6 april 6 16 17 18 april 18 april 18 19 28 april 20 21 28 april 22 23 21 may 24 25 10 june 21 may 26 27 10 june 28 29 12 june 30 31 12 25 june 32 33 25 34 35 4 july 37 36 38 39 25 july 25 july 40

More information

imai@eng.kagawa-u.ac.jp No1 No2 OS Wintel Intel x86 CPU No3 No4 8bit=2 8 =256(Byte) 16bit=2 16 =65,536(Byte)=64KB= 6 5 32bit=2 32 =4,294,967,296(Byte)=4GB= 43 64bit=2 64 =18,446,744,073,709,551,615(Byte)=16EB

More information

1 911 9001030 9:00 A B C D E F G H I J K L M 1A0900 1B0900 1C0900 1D0900 1E0900 1F0900 1G0900 1H0900 1I0900 1J0900 1K0900 1L0900 1M0900 9:15 1A0915 1B0915 1C0915 1D0915 1E0915 1F0915 1G0915 1H0915 1I0915

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B

Dual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B root Android IPv4/ 1 1 2 1 NAT Network Address Translation IPv4 NTMobile Network Traversal with Mobility NTMobile Android 4.0 VPN API VpnService root VpnService IPv4 IPv4 VpnService NTMobile root IPv4/

More information

SmartLMSユーザーズガイド<講師編>

SmartLMSユーザーズガイド<講師編> SmartLearning Management System SmartLMS (1) (2) (3) (4) (3) (5) Microsoft MS PowerPoint DirectX Windows Windows NT Windows Media Microsoft Corporation Intel Pentium Intel Corporation NEC 2003-2004 NEC

More information

2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii

2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101

More information

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 1, 2 1 1 1 Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 Nobutaka ONO 1 and Shigeki SAGAYAMA 1 This paper deals with instrument separation

More information

Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science,

Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science, Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science, Bunka Women's University, Shibuya-ku, Tokyo 151-8523

More information

fl™‹ä1.eps

fl™‹ä1.eps Information Science Japan Advanced Institute of Science and Technology, Announcement of Researchers School of Information Science Shirai Laboratory Research Interests Associate Professor Kiyoaki Shirai

More information

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3

Vol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3 36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there

More information

...i A

...i A ...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20

More information

Epson Print Admin

Epson Print Admin Epson Print Admin NPD5368-02 JA Epson Print Admin Epson Print Admin Epson Print Admin Epson Print Admin Epson Open Platform Epson Open Platform Epson Print Admin Epson Print Admin Epson Print Admin Epson

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of

IPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of t-room 1 2 2 2 2 1 1 2 t-room 2 Development of Assistant System for Ensemble in t-room Yosuke Irie, 1 Shigemi Aoyagi, 2 Toshihiro Takada, 2 Keiji Hirata, 2 Katsuhiko Kaji, 2 Shigeru Katagiri 1 and Miho

More information

IPSJ SIG Technical Report Vol.2014-ARC-213 No.24 Vol.2014-HPC-147 No /12/10 GPU 1,a) 1,b) 1,c) 1,d) GPU GPU Structure Of Array Array Of

IPSJ SIG Technical Report Vol.2014-ARC-213 No.24 Vol.2014-HPC-147 No /12/10 GPU 1,a) 1,b) 1,c) 1,d) GPU GPU Structure Of Array Array Of GPU 1,a) 1,b) 1,c) 1,d) GPU 1 GPU Structure Of Array Array Of Structure 1. MPS(Moving Particle Semi-Implicit) [1] SPH(Smoothed Particle Hydrodynamics) [] DEM(Distinct Element Method)[] [] 1 Tokyo Institute

More information

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append

More information

22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener

22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener 22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Generator PF-Web for Constructing Web Applications. Tomohiro

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

,,.,,., II,,,.,,.,.,,,.,,,.,, II i

,,.,,., II,,,.,,.,.,,,.,,,.,, II i 12 Load Dispersion Methods in Thin Client Systems 1010405 2001 2 5 ,,.,,., II,,,.,,.,.,,,.,,,.,, II i Abstract Load Dispersion Methods in Thin Client Systems Noritaka TAKEUCHI Server Based Computing by

More information

Q [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4]

Q [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4] 1,a) 2,3,b) Q ϵ- 3 4 Q greedy 3 ϵ- 4 ϵ- Comparation of Methods for Choosing Actions in Werewolf Game Agents Tianhe Wang 1,a) Tomoyuki Kaneko 2,3,b) Abstract: Werewolf, also known as Mafia, is a kind of

More information

F = 0 F α, β F = t 2 + at + b (t α)(t β) = t 2 (α + β)t + αβ G : α + β = a, αβ = b F = 0 F (t) = 0 t α, β G t F = 0 α, β G. α β a b α β α β a b (α β)

F = 0 F α, β F = t 2 + at + b (t α)(t β) = t 2 (α + β)t + αβ G : α + β = a, αβ = b F = 0 F (t) = 0 t α, β G t F = 0 α, β G. α β a b α β α β a b (α β) 19 7 12 1 t F := t 2 + at + b D := a 2 4b F = 0 a, b 1.1 F = 0 α, β α β a, b /stlasadisc.tex, cusp.tex, toileta.eps, toiletb.eps, fromatob.tex 1 F = 0 F α, β F = t 2 + at + b (t α)(t β) = t 2 (α + β)t

More information

IT 1. IT 2. 2.1. IT 2.2. SKYSEA Client View Government License Light Edition Sky 1500 28 2 15 12 3. 4. 28 3 25 1 5. 5.1. (1) 28 4 1 (2) (3) (4) ISO27001 P (5) ISO/IEC20000 (6) USB 1 (7) OS (8) 1 CPU 4

More information

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara

IPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara 1 1,2 1 (: Head Mounted Display),,,, An Information Presentation Method for Wearable Displays Considering Surrounding Conditions in Wearable Computing Environments Masayuki Nakao 1 Tsutomu Terada 1,2 Masahiko

More information

2016 10 31 1. 1.1 20 1 1993 20 2 2 1 industrial society 2 2 169 2014 3 1.2 4 5 6 3 1.3 4 5 1973 6 170 7 8 9 7 ISO/IEC 9126 11 8 1 9 ABS ABS ABS ABS 171 2. 2.1 1960 10 11 12 13 10 1964 IBM S/360 11 16 FORTRAN

More information

2013 M

2013 M 2013 M0110453 2013 : M0110453 20 1 1 1.1............................ 1 1.2.............................. 4 2 5 2.1................................. 6 2.2................................. 8 2.3.................................

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

1 y(t)m b k u(t) ẋ = [ 0 1 k m b m x + [ 0 1 m u, x = [ ẏ y (1) y b k m u

1 y(t)m b k u(t) ẋ = [ 0 1 k m b m x + [ 0 1 m u, x = [ ẏ y (1) y b k m u ( ) LPV( ) 1 y(t)m b k u(t) ẋ = [ 0 1 k m b m x + [ 0 1 m u, x = [ ẏ y (1) y b k m u m 1 m m 2, b 1 b b 2, k 1 k k 2 (2) [m b k ( ) k 0 b m ( ) 2 ẋ = Ax, x(0) 0 (3) (x(t) 0) ( ) V (x) V (x) = x T P x >

More information

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved. Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise

More information

Emacs ML let start ::= exp (1) exp ::= (2) fn id exp (3) ::= (4) (5) ::= id (6) const (7) (exp) (8) let val id = exp in

Emacs ML let start ::= exp (1) exp ::= (2) fn id exp (3) ::= (4) (5) ::= id (6) const (7) (exp) (8) let val id = exp in Emacs, {l06050,sasano}@sic.shibaura-it.ac.jp Eclipse Visual Studio Standard ML Haskell Emacs 1 Eclipse Visual Studio variable not found LR(1) let Emacs Emacs Emacs Java Emacs JDEE [3] JDEE Emacs Java 2

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

Vol. 44 No. 12 Dec , 3 4 Development and Evaluation of Information Provision System for In-Vehicle Terminal Based on Agent Framework Masa

Vol. 44 No. 12 Dec , 3 4 Development and Evaluation of Information Provision System for In-Vehicle Terminal Based on Agent Framework Masa Vol. 44 No. 12 Dec. 2003 1 1 1 2, 3 4 Development and Evaluation of Information Provision System for In-Vehicle Terminal Based on Agent Framework Masanori Hattori, 1 Kenta Cho, 1 Akihiko Ohsuga, 1 Shinichi

More information

21 VoIP An encrypted VoIP communication system for mobile telephones

21 VoIP An encrypted VoIP communication system for mobile telephones 21 VoIP An encrypted VoIP communication system for mobile telephones 1095702 2010 3 4 VoIP, IP., IP, VoIP(Voice over Internet Protocol)., VoIP,., VoIP over SSL(VoIPs), VoIPs.,,.,, VoIP., LAN VoIP. LAN

More information

1 Vol Vol JULY 6 JUNE

1 Vol Vol JULY 6 JUNE 01 02 03 04 05 07 08 09 10 11 12 14 15 16 17 18 19 21 22 23 25 26 29 OPEN CAMPUS 1 Vol.201 2 Vol.201 7 JULY 6 JUNE 3 Vol.201 4 Vol.201 5 Vol.201 Vol.201 6 8/3 MON 7 Vol.201 Vol.201 8 Columbia University

More information