P2P P2P Winny 3 P2P P2P 1 P2P, i

Size: px
Start display at page:

Download "P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i"

Transcription

1 26 P2P Reduction of search packets by sharing peer information in P2P communication

2 P2P P2P Winny 3 P2P P2P 1 P2P, i

3 Abstract Reduction of search packets by sharing peer information in P2P communication KIMURA Norio In recent years, the traffic on the Internet have been increasing rapidly and have caused several problems. The number of users, who use the three major peer-to-peer file sharing applications such as Winny, reaches 150, ,000, in the reports by research companies. Overlay networks are built to achieve efficient communication by P2P applications. However, when peers use more than one P2P application, each P2P application has to manage its overlay networks. Specifically, the P2P application has to renew overlay networks depending on peers behaviors such as participation to a network. In my proposal method, one overlay network is built and it is used by multiple P2P applications. By sharing this information of overlay network, it is possible to omit duplicated network participation processes of peers and it is possible to decrease traffic depending on network management. key words P2P, Overlay network ii

4 1 1 2 P2P P2P Gnutella Winny BitTorrent P2P P4P ALTO iii

5 22 iv

6 Winny BitTorrent ALTO P2P v

7 1 Cisco [1] P2P NetAgent [2] WinnySharePerfect Dark 3 P2P 1520 P2P P2P P2P P2P ISP 1

8 ISP ISP ISP 2

9 2 P2P P2PPeer to Peer 2.1 P2P P2P P2P 3

10 2.1 P2P P2P 2 P2P 2.1 P2P P2P GnutellaWinnyBitTorrent P2P [3][4][5] Gnutella Gnutella P2P

11 2.1 P2P TTLTime to Live) Web Gnutella Winny Winny Gnutella P2P Winny 2.3 Winny 5

12 2.1 P2P 2.3 Winny BitTorrent BitTorrent Gnutella Winny P2P BitTorrent Tracker 2.4 torrent torrent Tracker URL URL Tracker Tracker Tracker 6

13 2.2 P2P 2.4 BitTorrent BitTorrent swarm 2.2 P2P P2P ISP P2P 7

14 2.2 P2P P4P P4P Provider Portal for ApplicationsISP P2P ISP [6] ISP P2P P4P ISP itrackers itrackers P2P apptracker itrackers itrackers ISP ISP ALTO ALTO Application-Layer Traffic Optimization IETFInternet Engineering Task Force [7]P4P P4P ISP P2P ISP ALTO P2P ALTO AppTracker ISP ALTO AppTracker ISP ISP 8

15 2.2 P2P ALTO ISP P2P $%& '()&*+! "!#, ALTO 9

16 3 P2P P2P P2P 1 1 P2P 3.1 P2P P2P P2P 10

17 3.1 P2P P2P ALTO P4P ISP ISP 3.1 P2P! "# 3.1 P2P 3.2 P2P 3.2 A A E C B B D C 3.2 A, B C

18 3.2 %!&#"#$! #"#$ 3.2 C 3.2 RTTRound-Trip Time P2P 12

19 P2P 13

20 [8] IP RTT A B E F 4.1 A B E F

21 RTT

22 % 100% 10% ID A B A A α 500 B β α β

23 % 100% 10% %10%

24 4.4 "!$#% '&)(+*,.-!$#% /&)(* ! #"%$& ('*),+ -/. "%$& ('*),

25 4.4 "!$#&%' )(+*-,.0/ #&%' 1(+*2,

26 5 P2P 3 P2P 1520 P2P

27 21

28 [1] Cisco, Cisco Visual Networking IndexVNI , paper_c html, [2] NetAgent, 2014 P2P, product/p2p/report/201401/01.html, [3], P2P, R&D,, [4], Winny,,, [5] B. Cohen, Incentives Build Robustness in BitTorrent, First Workshop on Economics of Peer to Peer Systems, [6] H.Xie,Y.R Yang, A Krishnamurthy, Y Liu, A Silberschatz, P4P: Provider Portal for Applications, ACM SIGCOMM Comput. Commun. Review 38(Issue 4), , [7] R. Alimi, R. Penno, and Y. Yang, ALTO Protocol, Internet draft, draft-ietfalto-protocol-10.txt, Oct [8],,,, P2P,, vol47, No.4, pp , Apr

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i 27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification

More information

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i 26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution

More information

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i 28 WebRTC Design of multi-platform file sharing system using WebRTC 1170336 2017 2 28 WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i Abstract Design of multi-platform file sharing system using WebRTC Harumi

More information

Web Web Web Web i

Web Web Web Web i 28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

Web Web ID Web 16 Web Web i

Web Web ID Web 16 Web Web i 24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro

More information

1 1 tf-idf tf-idf i

1 1 tf-idf tf-idf i 14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles

More information

7,, i

7,, i 23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two

More information

IT i

IT i 27 The automatic extract of know-how search tag using a thesaurus 1160374 2016 2 26 IT i Abstract The automatic extract of know-how search tag using a thesaurus In recent years, a number of organizational

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

paper.dvi

paper.dvi 28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

23 The Study of support narrowing down goods on electronic commerce sites

23 The Study of support narrowing down goods on electronic commerce sites 23 The Study of support narrowing down goods on electronic commerce sites 1120256 2012 3 15 i Abstract The Study of support narrowing down goods on electronic commerce sites Masaki HASHIMURA Recently,

More information

WMN Wi-Fi MBCR i

WMN Wi-Fi MBCR i 27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI

More information

, IT.,.,..,.. i

, IT.,.,..,.. i 25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge

More information

soturon.dvi

soturon.dvi 12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm

More information

財政金融統計月報第720号

財政金融統計月報第720号 ! # " $ % &! # % " $ &! # % " $ &! # %! # % " $ & " $ &! # % " $ & !!!!!!! !!!!!!! ! # " $ ! # " $ ! " # $! " # $ ! # " $ ! # $& %" !

More information

A Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 337-87 37 E-mail: {m199,miyoshi}@shibaura-it.ac.jp, olivier.fourmaux@upmc.fr P2P P2P ISP Internet Service

More information

29 Short-time prediction of time series data for binary option trade

29 Short-time prediction of time series data for binary option trade 29 Short-time prediction of time series data for binary option trade 1180365 2018 2 28 RSI(Relative Strength Index) 3 USD/JPY 1 2001 1 2 4 10 2017 12 29 17 00 1 high low i Abstract Short-time prediction

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

untitled

untitled Studies in Human Geography 32 Geoenvironmental Sciences, Graduate School of Life and Environmental Sciences, University of Tsukuba, Japan ArcGIS Geography Network ArcGIS ArcGIS ArcGIS Geography Network

More information

HTTP

HTTP 2008 P2P 2009 2 6 5107B024-5 1 5 1.1...................................... 5 1.2...................................... 6 1.3..................................... 7 2 HTTP 8 2.1.............................

More information

4.1 % 7.5 %

4.1 % 7.5 % 2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel

More information

n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i

n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i 15 Comparison and Evaluation of Dynamic Programming and Genetic Algorithm for a Knapsack Problem 1040277 2004 2 25 n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i Abstract Comparison and

More information

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering

More information

3_23.dvi

3_23.dvi Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems

More information

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i 26 A Study on Secure Remote Control Methods 1175078 2015 2 27 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

IT,, i

IT,, i 22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking 23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

21 A contents organization method for information sharing systems

21 A contents organization method for information sharing systems 21 A contents organization method for information sharing systems 1125140 2010 3 4 IT i Abstract A contents organization method for information sharing systems Aoki, Wataru Organizations to share information,

More information

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 565 871 1 5 E-mail: {j-konisi,wakamiya,murata}@ist.osaka-u.ac.jp QoS P2P P2P P2P P2P (Peer-to-Peer)

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

28 TCG SURF Card recognition using SURF in TCG play video

28 TCG SURF Card recognition using SURF in TCG play video 28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka

More information

DTN DTN DTN DTN i

DTN DTN DTN DTN i 28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

untitled

untitled SUMMARY This paper presents current situations, issues, and several practical use scenarios of anonymous communication which provides sender anonymity and receiver anonymity in a communication. As methods

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

840 Geographical Review of Japan 73A-12 835-854 2000 The Mechanism of Household Reproduction in the Fishing Community on Oro Island Masakazu YAMAUCHI (Graduate Student, Tokyo University) This

More information

76_01ver3.p65

76_01ver3.p65 GLOCOM Review 8:4 (76-1) 2003 Center for Global Communications 1 2 GLOCOM Review 8:4 (76-1) Recent research has been providing more support for the idea that Internet layers are formed along Power Law

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i 23 Experimental investigation of Natural Use Profiles of Pen Pressure, Tilt and Azimuth 1120230 2012 3 1 ,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i Abstract Experimental investigation of Natural Use

More information

March IT PR March March p p p PR March Vol. March p p p SN March SN PR PR March Potential Needs of Specialized Foster Parents for Abused Children: Analyzinga questionnaire survey on foster parents needs

More information

スライド 1

スライド 1 JANOG 14 2004.07.23 NTT kamei.satoshi@lab.ntt.co.jp 1 Peer-to-Peer ISP P2P AS / Copyright 2004 NTT Corporation, All Rights Reserved 2 Peer-to-Peer ISP P2P AS Copyright 2004 NTT Corporation, All Rights

More information

!!!!!! Agenda 2012/2/6

!!!!!! Agenda 2012/2/6 Loca%on Based P2P Loca%on Based P2P Clustering with Seeders 5110B074-7 2012/2/6 !!!!!! Agenda 2012/2/6 - IP2009 20145 4.3 [1] P2P P2P [1] 2010 Cisco Visual Networking Index Forecast 2012/2/6 P2P (BitTorrent)!

More information

58 10

58 10 57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have

More information

25 About what prevent spoofing of misusing a session information

25 About what prevent spoofing of misusing a session information 25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent

More information

2002 ( 14 ) 1 2 P2P 3

2002 ( 14 ) 1 2 P2P 3 2002 ( 14 ) 15 1 22 2002 ( 14 ) 1 2 P2P 3 Abstract of Bachelor s Thesis Optimization of overlay network using the state of a network and a node Academic Year 2002 This thesis presents a designe and implementation

More information

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i 20 SOM Development of Syllabus Vsualization System using Spherical Self-Organizing Maps 1090366 2009 3 5 SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i Abstract Development of Syllabus Vsualization

More information

2017 (413812)

2017 (413812) 2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has

More information

2 The Bulletin of Meiji University of Integrative Medicine 3, Yamashita 10 11

2 The Bulletin of Meiji University of Integrative Medicine 3, Yamashita 10 11 1-122013 1 2 1 2 20 2,000 2009 12 1 2 1,362 68.1 2009 1 1 9.5 1 2.2 3.6 0.82.9 1.0 0.2 2 4 3 1 2 4 3 Key words acupuncture and moxibustion Treatment with acupuncture, moxibustion and Anma-Massage-Shiatsu

More information

finalrep.dvi

finalrep.dvi 18 Building a Knowledge Management System for Acquiring Wisdom of Crowds 1095701 2007 3 16 Blog Wiki Web Web Web i Abstract Building a Knowledge Management System for Acquiring Wisdom of Crowds Kazunori

More information

provider_020524_2.PDF

provider_020524_2.PDF 1 1 1 2 2 3 (1) 3 (2) 4 (3) 6 7 7 (1) 8 (2) 21 26 27 27 27 28 31 32 32 36 1 1 2 2 (1) 3 3 4 45 (2) 6 7 5 (3) 6 7 8 (1) ii iii iv 8 * 9 10 11 9 12 10 13 14 15 11 16 17 12 13 18 19 20 (2) 14 21 22 23 24

More information

ISSN NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the Universit

ISSN NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the Universit ISSN 1346-5597 NII Technical Report Patent application and industry-university cooperation: Analysis of joint applications for patent in the University of Tokyo Morio SHIBAYAMA, Masaharu YANO, Kiminori

More information

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [ 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)

More information

#"

# !" #" !!! $" x %" 2011.3.11 3.12 3.1 4.02 4.17 4.24 4.28 4.29 5.8 5.14 6.4 7.3 8.1 8.10 8.23 8.28 9.10 9.30 11.13 11.21 12.23 12.28 2012.2.24 3.18 3.20 3.24 &" ! '" (" )" *" !+" !!" !#" !$" !%" !& !'"

More information

08-特集04.indd

08-特集04.indd 5 2 Journal of Multimedia Aided Education Research 2008, Vol. 5, No. 2, 3543 ICT ICT ICT 2 ICT ICT 1100 2008 ICT ICT 2007 ICT ICT ICT ICT IPtalk2008 2006 LAN TCP/IP 1 35 5 22008 1 Enter 1 IPtalk 2 2 2IPtalk

More information

(Visual Secret Sharing Scheme) VSSS VSSS 3 i

(Visual Secret Sharing Scheme) VSSS VSSS 3 i 13 A Visual Secret Sharing Scheme for Continuous Color Images 10066 14 8 (Visual Secret Sharing Scheme) VSSS VSSS 3 i Abstract A Visual Secret Sharing Scheme for Continuous Color Images Tomoe Ogawa The

More information

2.1 2.2 2.3 / 2.4 2.5 2.6 2.7 2.1 2.2 2.3 / 2.4 2.5 2.6 2.7 Web Web Web Web Web Web Web 2.1 2.2 2.3 / 2.4 2.5 2.6 2.7 2.1 2.2 2.3 / 2.4 2.5 2.6 2.7 Winny Winny Winny Winny Winny Winny Winny 2.1 2.2 2.3

More information

23 Study on Generation of Sudoku Problems with Fewer Clues

23 Study on Generation of Sudoku Problems with Fewer Clues 23 Study on Generation of Sudoku Problems with Fewer Clues 1120254 2012 3 1 9 9 21 18 i Abstract Study on Generation of Sudoku Problems with Fewer Clues Norimasa NASU Sudoku is puzzle a kind of pencil

More information

<836F F312E706466>

<836F F312E706466> 5022381212008. 3 1 2 1 2 1 2 3 1 2 3 4 1 2 3 4 1 2 3 Real World 4 Imagined World 1 5 6 4 1792 7 4 1847 8 9 1 10 11 12 13 14 22 200 15 1 3 1783 4 16 7 8 17 2 18 3 19 20 21 22 23 1995 40 24 25 3 1 1 4 3

More information

未婚者の恋愛行動分析 : なぜ適当な相手にめぐり会わないのか

未婚者の恋愛行動分析 : なぜ適当な相手にめぐり会わないのか Kwansei Gakuin University Rep Title 未 婚 者 の 恋 愛 行 動 分 析 : なぜ 適 当 な 相 手 にめぐり 会 わないのか Author(s) Nishimura, Tomo, 西 村, 智 Citation 経 済 学 論 究, 68(3): 493-515 Issue Date 2014-12-20 URL http://hdl.handle.net/10236/13428

More information

MRI | 所報 | 分権経営の進展下におけるグループ・マネジメント

MRI  | 所報 | 分権経営の進展下におけるグループ・マネジメント JOURNAL OF MITSUBISHI RESEARCH INSTITUTE No. 35 1999 (03)3277-0003 FAX (03)3277-0520 E-mailprd@mri.co.jp 76 Research Paper Group Management in the Development of Decentralized Management Satoshi Komatsubara,

More information

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2)

44 4 I (1) ( ) (10 15 ) ( 17 ) ( 3 1 ) (2) (1) I 44 II 45 III 47 IV 52 44 4 I (1) ( ) 1945 8 9 (10 15 ) ( 17 ) ( 3 1 ) (2) 45 II 1 (3) 511 ( 451 1 ) ( ) 365 1 2 512 1 2 365 1 2 363 2 ( ) 3 ( ) ( 451 2 ( 314 1 ) ( 339 1 4 ) 337 2 3 ) 363 (4) 46

More information

i ii i iii iv 1 3 3 10 14 17 17 18 22 23 28 29 31 36 37 39 40 43 48 59 70 75 75 77 90 95 102 107 109 110 118 125 128 130 132 134 48 43 43 51 52 61 61 64 62 124 70 58 3 10 17 29 78 82 85 102 95 109 iii

More information

’ÓŠ¹/‰´„û

’ÓŠ¹/‰´„û Core Ethics Vol. transition from school to work [][] [] Core Ethics Vol. [], pp.- [], p. [a], p.ojt OJT. [] OJT [] [] [], p. OJTOffJTp. [] p. [], pp.- [] [] [] [] [a] [], p. Core Ethics Vol. [], p. []

More information

評論・社会科学 87号(よこ)(P)/1.小林

評論・社会科学 87号(よこ)(P)/1.小林 ! 1 2 1978 1984 3 1984 1992 4 1992 5 1 2007 1 25 2006 GDP 10.7 20 9407 2005 0.3 2006 11 13 2007 9.6 " 1 10 1000 2! 2002 " 3 1 1 1970 1949 1978 4 1978 1984 5 1984 1992 1992 1 1 2 1978 1984 2 1 1978 1984

More information

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004

Web Stamps 96 KJ Stamps Web Vol 8, No 1, 2004 The Journal of the Japan Academy of Nursing Administration and Policies Vol 8, No 1, pp 43 _ 57, 2004 The Literature Review of the Japanese Nurses Job Satisfaction Research Which the Stamps-Ozaki Scale

More information

ron.dvi

ron.dvi 12 Effect of occlusion and perception of shadow in depth perception caused by moving shadow. 1010361 2001 2 5 (Occlusion), i Abstract Effect of occlusion and perception of shadow in depth perception caused

More information

22 1,936, ,115, , , , , , ,

22 1,936, ,115, , , , , , , 21 * 2 3 1 1991 1945 200 60 1944 No. 41 2016 22 1,936,843 1945 1,115,594 1946 647,006 1947 598,507 1 60 2014 501,230 354,503 5 2009 405,571 5 1 2 2009 2014 5 37,285 1 2 1965 10 1975 66 1985 43 10 3 1990

More information

Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship be

Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship be Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship between broadcasting and sport (major sport and professional

More information

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System 1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of

More information

) 2) , , ) 1 2 Q1 / Q2 Q Q4 /// Q5 Q6 3,4 Q7 5, Q8 HP Q9 Q10 13 Q11

) 2) , , ) 1 2 Q1 / Q2 Q Q4 /// Q5 Q6 3,4 Q7 5, Q8 HP Q9 Q10 13 Q11 2009 0612001. 1) 2) 2 2009 3 2009 8, 10 1 3, 12 50 4) 1 2 Q1 / Q2 Q3 910203040 5060708090 Q4 /// Q5 Q6 3,4 Q7 5,6711 123 4 Q8 HP Q9 Q10 13 Q11 , A 5 2 3 3 3 3 3 2 8 5 3 3 4 A C B 1 1 KJ 1 9 1 12 12 15

More information

220 28;29) 30 35) 26;27) % 8.0% 9 36) 8) 14) 37) O O 13 2 E S % % 2 6 1fl 2fl 3fl 3 4

220 28;29) 30 35) 26;27) % 8.0% 9 36) 8) 14) 37) O O 13 2 E S % % 2 6 1fl 2fl 3fl 3 4 Vol. 12 No. 2 2002 219 239 Λ1 Λ1 729 1 2 29 4 3 4 5 1) 2) 3) 4 6) 7 27) Λ1 701-0193 288 219 220 28;29) 30 35) 26;27) 0 6 7 12 13 18 59.9% 8.0% 9 36) 8) 14) 37) 1 1 1 13 6 7 O O 13 2 E S 1 1 17 0 6 1 585

More information

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:

More information

卒業論文はMS-Word により作成して下さい

卒業論文はMS-Word により作成して下さい () 2007 2006 KO-MA KO-MA 2006 6 2007 6 KO-MA KO-MA 256 :117:139 8 40 i 23 50 2008 3 8 NPO 7 KO-MA( KO-MA ) 1) (1945-) KO-MA KO-MA AD 2007 1 29 2007 6 13 20 KO-MA 2006 6 KO-MA KO-MA ii KJ 11 KO-MA iii KO-MA

More information

総セク報告書(印刷発出版_.PDF

総セク報告書(印刷発出版_.PDF - 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - - 10 - - 11 - IP 110 110 IP 110 110 - 12-110 2 IP 3 1 110 2 IP 3 1 - 13 - - 14 - IP - 15 - 17 11-16 - - 17 - - 18 - FAX (*1) http://www.kantei.go.jp/jp/singi/titeki2/kettei/040527f.html

More information

Sobel Canny i

Sobel Canny i 21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been

More information

Financing through Stadium Securitization \ Case Study of Professional Football Clubs in England \ õ Yoshiaki IIDA * Abstract The purpose of this study was to clarify the way in which the stadium securitization

More information

屋内ロケーション管理技術

屋内ロケーション管理技術 Technology to Manage Indoor Locations 奥山敏 森信一郎 小川晃弘 あらまし ICT GPS GPS Abstract Smart devices and wireless networks have become widespread and an environment is gradually being put in place in which information

More information

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi

A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi A Study on Throw Simulation for Baseball Pitching Machine with Rollers and Its Optimization Shinobu SAKAI*5, Yuichiro KITAGAWA, Ryo KANAI and Juhachi ODA Department of Human and Mechanical Systems Engineering,

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

NINJAL Research Papers No.8

NINJAL Research Papers No.8 (NINJAL Research Papers) 8: 177 196 (2014) ISSN: 2186-134X print/2186-1358 online 177 3 3 3 1940 3 late adoption real time 3 apparent time * 1. 1 2 3 1.1 3 1 1953 * 2014 3 18 2014 5 13 109 NINJAL 2012

More information

<30372D985F95B62D8E52967B8C4F8E7190E690B62E706466>

<30372D985F95B62D8E52967B8C4F8E7190E690B62E706466> 312013 95 Changes and Restructuring of Social Issues of the Urban Underclass Area with Increasing Welfare Needs in Kotobuki, Yokohama Kahoruko YAMAMOTO This paper explains social changes and restructuring

More information

udc-2.dvi

udc-2.dvi 13 0.5 2 0.5 2 1 15 2001 16 2009 12 18 14 No.39, 2010 8 2009b 2009a Web Web Q&A 2006 2007a20082009 2007b200720082009 20072008 2009 2009 15 1 2 2 2.1 18 21 1 4 2 3 1(a) 1(b) 1(c) 1(d) 1) 18 16 17 21 10

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

Bodenheimer, Thomas S., and Kevin Grumbach (1998) Understanding Health Policy: A Clinical Approach, 2nd ed. Appleton & Lange. The Present State of Managed Care and the Feasibility of its Application to

More information