Vol.55 No (Mar. 2014) 1,a) , SAML/ID-WSF ID-WSF A Proposal and an Evaluation of Technology on Federated Identity and
|
|
- さいぞう はらしない
- 4 years ago
- Views:
Transcription
1 1,a) , SAML/ID-WSF ID-WSF A Proposal and an Evaluation of Technology on Federated Identity and Usage of Attributes in Cloud Computing Takashi Shitamichi 1,a) Ryoichi Sasaki 1 Received: March 25, 2013, Accepted: December 4, 2013 Abstract: Federated services among multi-domain network are expected to be widely deployed onto cloud computing environment. Technology not only for federated identity but also services using distributed attributes, that are not only static but also dynamic, are required. Focusing on SAML and ID-WSF, that are technology for identity management and services with privacy, this paper discusses deployments and problem of them in the real world to extend ID-WSF, proposes adaptable, fast and safe technology which can safely use attributes, and evaluates the effectiveness of the proposed technology. Keywords: identity, cloud computing, federation 1. SAML Security Assertion Markup Language [1] OpenID [2], OAuth [3] 1 Tokyo Denki University, Adachi, Tokyo , Japan a) takashi.shitamichi@private. .ne.jp Federated Identity [4] SAML SAML Shibboleth [5] SAML Liberty Alliance ID-WSF Identity Web Service Framework [6] SAML c 2014 Information Processing Society of Japan 1186
2 static attribute dynamic attribute [7] Facebook Twitter API [8] SSO [9] LAN SSO [10] [11] [12] Web RTT: Round Trip Time SAML/ID-WSF ID-WSF Web SAML ID-WSF SAML ID-WSF SAML ID-WSF 2.1 SAML SAML SSO: Single Sign On 2000 SAML IdP: Identity Provider STS: Security Token Service SP: Service Provider SP IdP IdP SAML SAML XML SAML SSO 1 Web UA User Agent SSO 1 ID c 2014 Information Processing Society of Japan 1187
3 1 SAML Fig. 1 Identity federation using SAML. 3 SAML Fig. 3 Structure of SAML token. 2 Liberty Alliance Fig. 2 Framework of Liberty Alliance specification. SAML SSO Web SSO 3 [13] (1) SP-initiated SSO: Redirect/POST Bindings (2) SP-Initiated SSO: POST/Artifact Bindings (3) IdP-Initiated SSO: POST Binding SSL/TLS SAML Web SOAP Simple Object Access Protocol SAML (2) *1 2.2 ID-WSF ID-WSF Web Liberty Alliance SAML ID-WSF 2 ID-WSF SOAP *1 SSL/TLS [14], [15] SSL/TLS SOAP [16] 4 ID-WSF Fig. 4 Message flow of ID-WSF. ID 3 SAML [17] XML IdP ID-WSF 4 SOAP ID-WSF OpenID REST Representational State Transfer SOAP WS-* c 2014 Information Processing Society of Japan 1188
4 SOAP ID-WSF WSP Web Service Provider WSP URL DS Discovery Service WSC Web Service Consumer DS WSC WSC WSP URL DS WSC WSP WSP WSC 2 IS: Interaction Service /ID-WSF ID-WSF AOL Radio@AOL ID-WSF [18] Nokia ID-WSF SOA [19], [20] [21], [22], [23], [24], [25] ID-WSF [26], [27] 3. SAML SSO SAML SSO POST/Artifact Bindings 3.1 AWS Amazon Web Service 7 IaaS Amazon EC2 Elastic Computing Cloud 1 PC AWS EC2 RTT msec () hop Table 1 RTT between client PC and each AWS EC2 regions (msec, (): number of hops). (1) AWS EC2 PC AWS EC2 OS/Middleware Fedora bit/jdk1.6 Tomcat6 OpenAM9.5.3 Small 1.7 GB memory 1 EC2 Compute Unit 160 GB storage IP 14 Elastic IP PC OS Mac OS X Web Firefox Wired 100 Mbps (2) 7 IdP SP 14 SAML SSO SAML SSO Web IdP SP RTT PC RTT traceroute (3) 1 PC RTT ms ms 30 RTT / ms RTT / ms 20 c 2014 Information Processing Society of Japan 1189
5 2 IdP/SP Table 2 Duration between IdP and SP. 5 SAML SSO POST/Artifact Bindings Fig. 5 Sequence of SAML SSO POST/Artifact Bindings. RTT 1msec 3.2 AWS EC2 SAML SSO (1) (2) SAML SP-Initiated SSO POST/Artifact Bindings AWS EC2 7 IdP SP tshark 5 t1 t24 24 T 1 =SP IdP T 2 = SP T u = SP T T = T 1 + T u + T 2 T u T s T s = T 1 + T 2 T s T s (3) IdP/SP 2 T 1 / 989 msec T 2 / 1,929 msec T s / 2,540 msec T 1 T 2 T s / 63 msec 199 msec 262 msec T s / 2,540 msec / 262 msec 10 T 1 1 T 2 2 T 2 / / 3 5 S 8 S 9 IdP/SP SOAP 3 t14 t19 Δ Δt15 = 468 msec Δt16 = 294 msec Δt17 = 3 msec TCP/IP Δt15 [SYN] [SYN, ACK] [SYN] TCP/IP Δt16 POST [ACK] IdP S8 Artifact Response S8 c 2014 Information Processing Society of Japan 1190
6 3 T1 T2 Table 3 Duration of T1 and T2. Idp Δt17 3msec SOAP 3.3 SAML ID-WSF [28], [29] (1) 4 ID-WSF WSC WSP *2 ID-WSF WSC WSP WSC WSP *2 Web 3 47% 2 Web Web 3 40% [31] ID-WSF (2) [30] ID-WSF *3 4. ID-WSF 2 RTT ID-WSF WSC (1) (a) WSP WSPs WSPd A B *3 Liberty Geo Location Service [32] c 2014 Information Processing Society of Japan 1191
7 ID-SIS Personal Profile id-sis-pp <DyamicAttributes> id-sis-pp XML 6 Fig. 6 Message flow of dynamic attributes roaming. (b) WSPd WSC WSPr WSC WSPd HTTP (a) (b) 6 (2) WSC ID-WSF ID-SIS id-sis-wps id-sis-wpd id-sis-wpr 3 id-sis-wps (3) WSC WSPr 6 () 1 WSPd DS dd1 WSC WSPs id-sis-wps <DynamicAttributes> id-siswpd WSC DS WSPd 2 DS dd2 WSC c 2014 Information Processing Society of Japan 1192
8 3 WSPd pd1 ResourceID WSC WSPd 8 WSPr WSPd cd1 WSPr BulkRequest WSPd 4 WSPd pd2 WSPd 9 WSPd WSPr cd2 WSPd WSPr 5 WSPr DS dr1 WSPd roam WSC ServiceType id-sis-wpr DS WSPr 6 DS dr2 DS WSPr ResourceID 10 pr1 WSC WSC WSPr WSPd UA WSPr WSPd (4) WSPr pr1 WSPd WSPr WSC WSPr 4.2 SOAP 1 1 RTT RTT (1) WSPr n WSPd n c 2014 Information Processing Society of Japan 1193
9 Fig. 7 7 Sequence of dynamic attributes roaming method. Fig. 9 9 System flow of parallel transfer of batched dynamic attributes. 8 Fig. 8 Comparison with transfer methods. n HTTP SOAP n SOAP (2) SOAP SSL SOAP XML XML SOAP XML (3) 8 (a) HTTP GET (b) HTTP GET (c) 1 (4) C 9 S1 WSPr CP n fork() S2 CP HTTP GET WSPd n b n S3 WSPd httpd CGI S4 CP HTTP GET httpd CGI n c 2014 Information Processing Society of Japan 1194
10 S5 n S6 HTTP SOAP CP S7 CP SOAP b n S8 CP WSPr 4 RTT sec / Table 4 Comparison of RTT in each method and effectiveness (msec, effectiveness: non-roaming/roaming) XML (a) (b) (a) WSC (b) WSPd WSPr n n n (a) 5.1 (1) 7 3 (Ts1,Ts2) (Td1,Td2) (Tr) WSC S8 S9 n S8 S9 / td1/td2 td3/td4 tdp 1 Td1 RTT Tdt Tdt = = n (Td1)i = i=1 n (ΔS8+ΔS9+tdp)i i=1 n ((td2 td1) + (td4 td3) + (td3 td2))i i=1 RTT Trt Trt = 17 i=12 ΔSi + 5 (trp)i i=1 =(tr2 tr1) + (tr3 tr2) + +(tr12 tr11) Tdt Trt AWS EC2 (2) AWS EC2 WSC WSPd WSPr DS/IdP C AWS EC2 1GB mem CentOS5.7 Apache 2.2 MySQL5.1 1,024 2,048 8,192 16,384 byte C (3) 4 N N =1 10, 20, 50, 100, 200, 500, 1,000 RTT Trt RTT Tdt WSC WSPd 10 (4) 8,192 byte 4 10 / / c 2014 Information Processing Society of Japan 1195
11 10 N =1 10 RTT Fig. 10 Comparison of RTT with each methoed from N =1 to 10. RTT RTT RTT WSC WSPd RTT N =1,000 WSC WSPd RTT N N = 100 N >100 N =3 > 1 N =20/ / 1 N N 1 N =1,000 8,192 1,000=8 MB RTT N =10 10 (5) / 100 RTT 2.79 / 11 M Fig. 11 Comparison of transfer time at multiplicity M. RTT RTT 5.2 (1) 1 WSPd SOAP WSPr AWS EC2 (2) 2 AWS EC2 WSPd WSPr AWS EC2 1.7 GB mem High-CPU Medium Instance CentOS6.3 Apache 2.2 MySQL KB 256 KB 512 KB 768 KB 1,536 KB (3) WSPr WSPd M HTTP M 4.2 C 10 (4) M c 2014 Information Processing Society of Japan 1196
12 12 M Fig. 12 Comparison of transfer bandwidth at multiplicity M. vmstat OS WSPr M = 100 CPU Idle 90% WSPd M =50 CPU idle 70% M = % CPU (5) AWS EC AWS AWS AWS 13 XML Fig. 13 Comparison of processing time to attach XML signature. 5.3 (1) SSL AWS EC2 OS XML XML Security Library (2) AWS EC2 2 PC 3 AWS EC2 1.7 GB mem High-CPU Medium Instance CentOS6.3 Apache 2.2 MySQL5.5 PC Native Core i7 2.2 GHz 4 core 16 GB mem MacOS 10.7 VM Virtual Box GB mem CentOS6.3 XML Security Library xmlsec SHA256 RSA2048 XML 100 KB 500 KB 1MB 2MB 4MB 8MB (3) XML AWS EC2 2 3 XML (4) 13 XML 14 XML AWS EC2 High-CPU Medium Instance PC 20 30% c 2014 Information Processing Society of Japan 1197
13 14 XML Fig. 14 Comparison of processing time to verify XML signature. 5 Table 5 Effectiveness by each method. 1MB XML 74 msec 58 msec 2MB XML 123 msec 99 msec OS Linux MacOS CPU xmlsec MacOS Linux (5) AWS EC2 CPU PC SOAP XML 6. 5 AWS XML XML AWS XML 7. SAML/ID-WSF RTT SOAP [1] OASIS Security Services (SAML) TC, available from home.php? wg abbrev=security. [2] OpenID Authentication 2.0 Final, available from 0.html. c 2014 Information Processing Society of Japan 1198
14 [3] The OAuth 1.0 Protocol, available from ietf.org/html/rfc5849. [4] Liberty Alliance Project White Paper, available from ad/387/2720/file/liberty Federated Social Identity.pdf. [5] Internet2 Shibboleth Project, available from [6] Liberty Alliance ID-WSF 2.0 Specifications including Errata v1.0 Updates, available from projectliberty.org/resource center/specifications/liberty alliance id wsf 2 0 specifications including errata v1 0 updates/. [7] Web AI Vol.24, No.4, pp , [8] Takeda, Y., Kondo, S., Kitayama, Y., Torato, M. and Motegi, T.: Avoidance of Performance Bottlenecks Caused by HTTP Redirect in Identity Management Protocols, DIM 06, Proc. 2nd ACM Workshop on Digital Identity Management, ACM (2006). [9] Tran, T. and Wietfeld, C.: Approaches for Optimizing the Performance of a Mobile SAML-based Emergency Response System, Enterprise Distributed Object Computing Conference Workshops, EDOCW 2009, 13th, IEEE (2009). [10] Vol.47, No.3, pp (2006). [11] F-1 (2010). [12] Cuddy, S., Katchabaw, M. and Lutfiyya, H.: Context- Aware Service Selection Based on Dynamic and Static Service Attributes, Wireless And Mobile Computing, IEEE International Conference on Networking And Communications (WiMob 2005 ), Vol.4, IEEE (2005). [13] Security Assertion Markup Language (SAML) V2.0 Technical Overview, OASIS (25 Mar. 2008). [14] SSL/TLS renegotiation IPSJ SIG Notes 2010-CSEC-50(12), 1-4, (2010). [15] Heninger, N., Durumeric, Z., Wustrow, E. and Halderman, J.A.: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices, USENIX Security 12 (2012). [16] V2.5 (2012). [17] ID-WSF (2011). [18] Liberty Alliance Project XML (Sep. 2005). [19] Nokia Web Services Framework for Devices A Serviceoriented Architecture, NOKIA CORPORATION. [20] Web Services Framework API: Using the API, available from Developers Library/GUID-759FBC7F A8D4B76F6AA6/html/Web Services Framework API4. html. [21] (Sep. 2008). [22] Vol.2009-DPS-141, No.14 (2009). [23] ID IN (2010-1) (2009). [24] FIT L-035 (2010). [25] Hatakeyama, M. and Shima, S.: Privilege Federation between Different User Profiles for Service Federation, DIM 08, Proc. 4th ACM Workshop on Digital Identity Management, ACM (2008). [26] 9 2r gdlt-att/2r gdqj.pdf. [27] html. [28] Liberty Alliance Liberty ID-WSF Security Mechanisms Core, available from org/liberty/content/download/3478/23060/file/libertyidwsf-security-mechanisms-core-2.0-errata-v1.0.pdf. [29] ID-WSF 2.0 SecMech SAML Profile, available from /file/liberty-idwsf-security-mechanisms-saml-profilev2.0.pdf. [30] No.28, pp , (2010). [31] Forrester Research: ecommerce Web Site Performance Today An Updated Look At Consumer Reaction To A Poor Online Shopping Experience (Aug. 2009), available from ecommerce website perf wp.pdf. [32] Liberty ID-SIS Geolocation Service Specification, available from center/specifications/liberty alliance id sis 1 0 specifica tions/. AT&T UNIX Java API 2010 IPA Ruby ISO SC27/WG5 ISACA CISA CISM c 2014 Information Processing Society of Japan 1199
15 IT 2008 c 2014 Information Processing Society of Japan 1200
ppt
XML Liberty Alliance Project 2005 9 13 Liberty Alliance SIG Co-Chair NEC 1 Liberty Alliance 2 Liberty Alliance Project Liberty Alliance Liberty 3 Liberty Alliance Project 4 Liberty
More informationuntitled
WEB SAML 2.0 RSA 2005 SAML 2.0 2 1 3 Federated Identity The agreements, standards, and technologies that make identity and entitlements portable across autonomous domains. The Burton Group Web 4 2 Scope
More informationWeb ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval
SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto
More information& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us
1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo
More informationSAML
2003 6 2 XML Consortium SWG ( )NTT ( ) Copyright XML Consortium 2003/06/02 1 Copyright XML Consortium 2003/06/02 2 2002 2003 7 8 9 10 11 12 1 2 3 4 5 6 3/5 6/2 Copyright XML Consortium 2003/06/02 3 Copyright
More informationPowerPoint プレゼンテーション
Room D Azure Active Directory によるクラウドアプリ連携編 ~ Password Windows Intune Password Windows Intune デスクトップ PC(Windows) に対するガバナンス Azure Active Directory World SaaS Windows Server Active Directory World 業務データ
More informationTCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of
IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More information1_26.dvi
C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito
More informationXMLを基盤とするビジネスプロトコルの動向
XML Trends of XML-Based Business Protocols ebxml Web XML ebxml UN/CEFACT EDIFACTOASIS XML Web W3C World Wide Web Consortium Abstract XML-based technologies such as the Electronic Business XML Initiative
More informationGPGPU
GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationEncryption Security
200426 XML Consortium WG XML Signature XML Encryption XKMS2.0 X-KRSS:Register X-KISS:Locate X-KISS:Validate WS-Security XACML WG 2004/02/06 1 XML WG 2004/02/06 2 2001 2002 2003 XKMS XML SAML SSO SAML XML
More information1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan
SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationDPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)
1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology
More informationVol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a
1,a) 2012 6 1, 2012 12 20 A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a) Received: June 1, 2012, Accepted: December 20, 2012 Abstract: On the disasters, the
More informationuntitled
SAML 2004 12 9 y-endo@ah.jp.nec.com 2. SAML SAML SAML SAML SAML SSO SAML 4. Liberty Alliance Liberty Liberty ID-FF1.2 NEC Corporation 2004 2 PKI ID NEC Corporation 2004 4 PKI ID NEC Corporation 2004 5
More informationA B, ID http:// End-User 3 How do I get an OpenID?, 4
ID - OpenID Authentication1.1) 2007 12 07 XML Day, 1 07-Dec-2007, 2 A B, ID http:// End-User 3 How do I get an OpenID?, 4 , 5, 6 ~120 million OpenID s (including every AOL and LiveJournal user), 7, 8 ,
More informationTesting XML Performance
- DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More informationuntitled
22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29
More information1 2 3 ( ) ( ) SNS SNS Facebook %[g]( %[ ]) [ ] IT LNS (Life Networking Service) LNS LNS LNS SNS SNS 3. LNS (Life Networking S
情報処理学会インタラクション 2012 IPSJ Interaction 2012 2012-Interacti 2012/3/15 Life Networking Service LNS LNS twitter LNS Life Log Sharing with Life Networking Service YUSUKE NAKANO HIROSHI KAWAKAMI HIROYUKI TARUMI
More informationDTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe
1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More informationB HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int
SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura
More informationHP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree
LAN 1 2 3 2 LAN WiFiTag WiFiTag LAN LAN 100% WiFi Tag An Improved Determination Method with Multiple Access Points for Relative Position Estimation Using Wireless LAN Abstract: We have proposed a WiFiTag
More informationIPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara
1 1,2 1 (: Head Mounted Display),,,, An Information Presentation Method for Wearable Displays Considering Surrounding Conditions in Wearable Computing Environments Masayuki Nakao 1 Tsutomu Terada 1,2 Masahiko
More informationuntitled
All rights reserved. NTT Copy rights 2007 1 HTTPS 100% 92% 53% S. Schechter et al, The Emperor's New Security Indicators, Proc. IEEE Symp. Security and Privacy, 2007 All rights reserved. NTT Copy rights
More information2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationVol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe
Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2
More information3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More informationBIG‑IP Access Policy Manager | F5 Datasheet
2 3 5 7 8 Secure Web Gateway 10 12 BIG-IP APM 13 F5 Global Services 13 13 BIG-IP Access Policy Manager (APM) LAN BIG-IP APM IT LAN 1 Web OAM XenApp Exchange Web Web Web Web Web web BIG-IP APM LAN IT /
More informationID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR
Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append
More informationIEEE e
2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More information60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S
1,a) 1 1,b) 1,c) 1,d) Interaction Design for Communication Between Older Adults and Their Families Using Channel-Oriented Interface Takeda Keigo 1,a) Ishiwata Norihiro 1 Nakano Teppei 1,b) Akabane Makoto
More informationDec , IS p. 1/60
Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60
More information2. Twitter Twitter 2.1 Twitter Twitter( ) Twitter Twitter ( 1 ) RT ReTweet RT ReTweet RT ( 2 ) URL Twitter Twitter 140 URL URL URL 140 URL URL
1. Twitter 1 2 3 3 3 Twitter Twitter ( ) Twitter (trendspotter) Twitter 5277 24 trendspotter TRENDSPOTTER DETECTION SYSTEM FOR TWITTER Wataru Shirakihara, 1 Tetsuya Oishi, 2 Ryuzo Hasegawa, 3 Hiroshi Hujita
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More informationsp c-final
NIST SP 800-63C - Federation and Assertions - Nov Matake Nov Matake OpenID Foundation Japan WG #idcon OAuth.jp YAuth.jp LLC 800-63-3 Federation Assurance Level (FAL) Federation Assurance Level Federation
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More information[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing
1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November
More informationIPSJ SIG Technical Report Vol.2019-IOT-44 No /3/8 CRIU HTTP 1,a) 2 PC SNS Web FastContainer HTTP HTTP Web HTTP Web Web Low-cost and High Perfor
CRIU HTTP 1,a) 2 PC SNS Web FastContainer HTTP HTTP Web HTTP Web Web Low-cost and High Performance Scheduling Method for Reactive Relocation of Containers Each HTTP Request Using CRIU Ryosuke Matsumoto
More informationVol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L
Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More information,., ping - RTT,., [2],RTT TCP [3] [4] Android.Android,.,,. LAN ACK. [5].. 3., 1.,. 3 AI.,,Amazon, (NN),, 1..NN,, (RNN) RNN
DEIM Forum 2018 F1-1 LAN LSTM 112 8610 2-1-1 163-8677 1-24-2 E-mail: aoi@ogl.is.ocha.ac.jp, oguchi@is.ocha.ac.jp, sane@cc.kogakuin.ac.jp,,.,,., LAN,. Android LAN,. LSTM LAN., LSTM, Analysis of Packet of
More informationVol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu
EVITS 1,a) 2 2 2011 10 21, 2012 4 2 EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Communication System for Electric Vehicle Yuriko Hattori 1,a) Tomokazu Shimoda 2 Masayoshi
More informationDEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN
DEIM Forum 2017 H2-2 Android LAN 112-8610 2-1-1 163-8677 1-24-2 E-mail: {ayano,oguchi}@ogl.is.ocha.ac.jp, sane@cc.kogakuin.ac.jp Android 1 Android LAN Ayano KOYANAGI, Saneyasu YAMAGUCHI, and Masato OGUCHI
More informationIPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
More informationA Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)
More informationVol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information
Vol.54 No.7 1937 1950 (July 2013) 1,a) 2012 11 1, 2013 4 5 1 Similar Sounds Sentences Generator Based on Morphological Analysis Manner and Low Class Words Masaaki Kanakubo 1,a) Received: November 1, 2012,
More information23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h
23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),
More informationIP IP DHCP..
NICE 2008 4 14 1 NICE 2 1.1.................... 2 2 3 2.1........................................ 3 2.2....................................... 5 2.3.................................... 6 2.4...................................
More informationIPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS
1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high
More informationVol.57 No (Mar. 2016) 1,a) , L3 CG VDI VDI A Migration to a Cloud-based Information Infrastructure to Support
1,a) 1 1 2015 6 22, 2015 12 7 L3 CG 50 600 VDI VDI A Migration to a Cloud-based Information Infrastructure to Support University Education and It s Analysis Kaori Maeda 1,a) Nobuo Suematsu 1 Toshiaki Kitamura
More information6_27.dvi
Vol. 49 No. 6 1932 1941 (June 2008) RFID 1 2 RFID RFID RFID 13.56 MHz RFID A Experimental Study for Measuring Human Activities in A Bathroom Using RFID Ryo Onishi 1 and Shigeyuki Hirai 2 A bathroom is
More informationWebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More informationIPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [
1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)
More information2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou
情 報 処 理 学 会 インタラクション 2013 IPSJ Interaction 2013 2013-Interaction (3EXB-06) 2013/3/2 ourcam: 1 2 ourcam ourcam: On-Site Programming Environment for Digital Photography RYO OSHIMA 1 YASUAKI KAKEHI 2 In these
More informationPC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i
21 The private mailers synchronization operation for plural terminals 1125083 2010 3 1 PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i Abstract The private mailers synchronization operation for plural terminals
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationAll Rights Reserved, Copyright FUJITSU LIMITED. 2004 3 All Rights Reserved, Copyright FUJITSU LIMITED. 2004 4
2004129 1 All Rights Reserved, Copyright FUJITSU LIMITED. 2004 All Rights Reserved, Copyright FUJITSU LIMITED. 2004 2 All Rights Reserved, Copyright FUJITSU LIMITED. 2004 3 All Rights Reserved, Copyright
More information,4) 1 P% P%P=2.5 5%!%! (1) = (2) l l Figure 1 A compilation flow of the proposing sampling based architecture simulation
1 1 1 1 SPEC CPU 2000 EQUAKE 1.6 50 500 A Parallelizing Compiler Cooperative Multicore Architecture Simulator with Changeover Mechanism of Simulation Modes GAKUHO TAGUCHI 1 YOUICHI ABE 1 KEIJI KIMURA 1
More information2006 [3] Scratch Squeak PEN [4] PenFlowchart 2 3 PenFlowchart 4 PenFlowchart PEN xdncl PEN [5] PEN xdncl DNCL 1 1 [6] 1 PEN Fig. 1 The PEN
PenFlowchart 1,a) 2,b) 3,c) 2015 3 4 2015 5 12, 2015 9 5 PEN & PenFlowchart PEN Evaluation of the Effectiveness of Programming Education with Flowcharts Using PenFlowchart Wataru Nakanishi 1,a) Takeo Tatsumi
More informationIPSJ SIG Technical Report Vol.2011-IOT-12 No /3/ , 6 Construction and Operation of Large Scale Web Contents Distribution Platfo
1 1 2 3 4 5 1 1, 6 Construction and Operation of Large Scale Web Contents Distribution Platform using Cloud Computing 1. ( ) 1 IT Web Yoshihiro Okamoto, 1 Naomi Terada and Tomohisa Akafuji, 1, 2 Yuko Okamoto,
More information1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c
CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification
More informationAmazon EC2 IaaS (Infrastructure as a Service) HPCI HPCI ( VM) VM VM HPCI VM OS VM HPCI HPC HPCI RENKEI-PoP 2 HPCI HPCI 1 HPCI HPCI HPC CS
HPCI 1 2 3 4 5 1, 6 5 24 HPCI HPC OS HPC RENKEI-PoP Design of Advanced Software Deployment Infrastructure in HPCI Wide-area Distributed Environment Shinichiro Takizawa, 1 Masaharu Munetomo, 2 Atsuya Uno,
More information1034 IME Web API Web API 1 IME Fig. 1 Suitable situations for context-aware IME. IME IME IME IME 1 GPS Web API Web API Web API Web )
Vol. 52 No. 3 1033 1044 (Mar. 2011) IME 1 2 1 1 IME Web PC Android Dynamic Dictionary Generation Method for Context-aware Input Method Editor Yutaka Arakawa, 1 Shinji Suematsu, 2 Shigeaki Tagashira 1 and
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of
t-room 1 2 2 2 2 1 1 2 t-room 2 Development of Assistant System for Ensemble in t-room Yosuke Irie, 1 Shigemi Aoyagi, 2 Toshihiro Takada, 2 Keiji Hirata, 2 Katsuhiko Kaji, 2 Shigeru Katagiri 1 and Miho
More informationIT,, i
22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki
More information0401489‐工芸‐医用画像22‐1/12[論文]柳田
364-8501 6-100 321-3292 20-2 XR 277-0804 2-1 2004 10 3 2004 12 6 Effectiveness of Mobile Flat Panel Detector system Satoshi YANAGITA, Masako HITACHI, Tomoyuki SAKURAI, Yoshihiro SUZAKI, Takashi OGURA Eiji
More information6 2. AUTOSAR 2.1 AUTOSAR AUTOSAR ECU OSEK/VDX 3) OSEK/VDX OS AUTOSAR AUTOSAR ECU AUTOSAR 1 AUTOSAR BSW (Basic Software) (Runtime Environment) Applicat
AUTOSAR 1 1, 2 2 2 AUTOSAR AUTOSAR 3 2 2 41% 29% An Extension of AUTOSAR Communication Layers for Multicore Systems Toshiyuki Ichiba, 1 Hiroaki Takada, 1, 2 Shinya Honda 2 and Ryo Kurachi 2 AUTOSAR, a
More informationuntitled
IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS
More informationIPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I
Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(Information and Communication Technology) (Google [2] [5] ) 2. Google 2.1 Google Google [2]( 1) Google Web, Google Web Google Chrome
More information"CAS を利用した Single Sign On 環境の構築"
CAS Single Sign On (Hisashi NAITO) naito@math.nagoya-u.ac.jp Graduate School of Mathematics, Nagoya University naito@math.nagoya-u.ac.jp, Oct. 19, 2005 Tohoku Univ. p. 1/40 Plan of Talk CAS CAS 2 CAS Single
More information3_39.dvi
Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar
More informationOracle Application Server 10g( )インストール手順書
Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE and Web Cache...2...3...3...4...6...6...6 OS...9...10...12...13...25...25
More information2009 NTT Corporation. All rights reserved.
2009 NTT Corporation. All rights reserved. SAML2.0 (X.1141) HITSP ITU-T 3GPP ISO OMA ETSI UPKI ISOC OpenID Foundation Concordia Project OATH Bandit OSIS OASIS Higgins OpenSSO Information Card Foundation
More information258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System
Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More informationWebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i
28 WebRTC Design of multi-platform file sharing system using WebRTC 1170336 2017 2 28 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i Abstract Design of multi-platform file sharing system using WebRTC Harumi
More informationLAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson, et al. LAN P P Peer-to-Peer Gember, et al. UDP HTTP L
LAN PC LAN LAN LAN LAN LAN LAN 1 はじめに WWW World Wide Web Windows WWW Tim Berners Lee THIS IS FOR EVERYONE PC PC LAN BYOD Bring Your Own Device Ballagas, et al. PC PC LAN Business Insider PC LAN LAN Henderson,
More informationVol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus
Vol. 48 No. 3 Mar. 2007 PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Industry Collaboration Yoshiaki Matsuzawa and Hajime Ohiwa
More informationIPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came
3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is
More information1 Web Web 1,,,, Web, Web : - i -
2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.
More informationComputer Security Symposium October 2013 Android OS kub
Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android
More information