SEARCH
Search DetailsNAKAMURA MasahideCenter for Mathematical and Data SciencesProfessor
Researcher basic information
■ Research Keyword- ビッグデータ
- IoT
- 認知症ケア
- 対話エージェント
- スマートシティ
- ジェロンテクノロジー
- クラウドコンピューティング
- サービスコンピューティング
- Home Network
- Web Services
- Software Engineering
- Informatics / Web and service informatics
- Informatics / Information networks
- Informatics / Computer systems
- Informatics / Software
- Apr. 2021 - Present, 三田市, 総合計画審議会委員
- Mar. 2021 - Present, 三田市, さんだ里山スマートシティアドバイザー
- Apr. 2009 - Present, 電子情報通信学会, サービスコンピューティング研究会 (SC) 専門委員
- Apr. 2010 - May 2023, 電子情報通信学会, ライフインテリジェンスとオフィス情報システム研究会 (LOIS) 専門委員
- Apr. 2009 - May 2020, 電子情報通信学会, 情報ネットワーク研究会 (IN) 専門委員
- Apr. 2018 - Apr. 2020, 電子情報通信学会, サービスコンピューティング研究会 (SC) 委員長
- Apr. 2012 - May 2018, 電子情報通信学会, ソフトウェアサイエンス研究会 (SS) 専門委員
- Apr. 2016 - Mar. 2018, 情報処理学会, 情報処理学会行動変容と社会システム研究会 (BCSS) 運営委員
- Apr. 2009 - Mar. 2013, 情報処理学会, ソフトウェア工学研究会 (SIG-SE) 運営委員
Research activity information
■ Award- Sep. 2024 iSemantic2024, Best Paper Award, Study of Community Event Introduction Service for Promoting In-Home Elderly Social Participation
- Apr. 2024 国際会議ICEIB2024, Best Conference Paper Award
- Oct. 2023 神戸大学, 学長表彰
- Nov. 2022 Outstanding Paper Award, Study of Multi-Modal Diary Service Using Spoken Dialogue Agent for Self-Care in Elderly People
- Oct. 2022 神戸大学, 学長表彰
- Jul. 2022 23rd ACIS International Summer Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Summer), Best Student Paper Award, Developing a Gamification Method Based on Motivation Subscales for Lifelogging Applications
- Oct. 2021 Faculty of Engineering, Kobe University, Excellent Educator Award, コロナ禍におけるオンライン対応チーム
- Oct. 2021 Kobe University, President's Award
- Jun. 2021 第10回日本認知症予防学会学術集会, 浦上賞, 在宅高齢者・認知症当事者を対象とした困り事・対処法共有サービスの研究開発
- Dec. 2019 電子情報通信学会, ヒューマンコミュニケーション賞 (HC賞), 在宅高齢者を対象とした「こころ」の見守りサービスの試作と予備的評価
- Nov. 2018 International Conference on Signal Processing and Information Security (ICSPIS2018), Best Paper Award, Evaluating Feasibility of Image-Based Cognitive APIs for Home Context SensingInternational society
- Jul. 2018 2018 IEEE/ACIS 3rd International Conference on Big Data, Cloud Computing, Data Science & Engineering, Best Paper Award, A Study of Practical Education Program on AI, Big Data, and Cloud Computing through Development of Automatic Ordering SystemInternational society
- Feb. 2018 World Data Viz Challenge 2017, ベストプレゼンテーション賞, Kobe Demographics APIInternational academic award
- Oct. 2016 World Data Viz Challenge 2016, ベストプレゼンテーション賞, PRISM:Personalized Real-time Information with Security MapInternational academic award
- Mar. 2016 情報処理学会・SE研究会, 学生研究賞, ソフトウェア開発者の年齢がプログラム理解速度に及ぼす影響の分析Japan society
- Jan. 2015 電子情報通信学会・IA研究会, 学生研究奨励賞(林), すれちがいシステムのためのアプリケーションフレームワークの一提案Japan society
- Jan. 2015 電子情報通信学会・IA研究会, 学生研究奨励賞(井元), クラウド型HNSにおける家電リモコンサービスの実装Japan society
- Aug. 2014 マルチメディア,分散,協調とモバイル(DICOMO2014)シンポジウム, 野口賞(優秀デモンストレーション賞), クラウドと Web of Things を活用したサービス指向ホームネットワークシステムJapan society
- Nov. 2013 The 14th International Symposium on Advanced Intelligent Systems (ISIS2013), Best Session Paper Award, Using Materialized View as a Service of Scallop4SC for Smart City Application ServicesInternational society
- Nov. 2012 電子情報通信学会・LOIS研究会, 研究賞, Implementation and Evaluation of MashMap Framework for Visualizing Location-based LifelogJapan society
- Nov. 2012 電子情報通信学会・LOIS研究会, 若手研究者賞, Implementing API of Large-scale House Log Data Platform in Smart CityJapan society
- Aug. 2012 情報処理学会・MBL研究会, SIG-MBL2012 優秀発表賞受賞, スマートフォンを利用したピークカット促進 アプリケーションの提案と実装Japan society
- Jul. 2005 International Conference on Feature Interactions in Telecommunication Networks and Distributed Systems, ICFI'05, Best Paper Award, Feature Interactions in Integrated Services of Networked Home Appliances -An Object-Oriented Approach-International society
- Aug. 2004 International Conference on E-Business and Telecommunication Networks(ICETE'04), ICETE'04 Best Paper Award, Design and Evaluation of the Home Network Systems Using the Service Oriented ArchitectureInternational society
- 本稿はKobe University Engineering Summer School 2024 における教育実践の試みを報告し、その成果と課題を探索することを目的としている。このプログラムにおける学修を参加留学生からのフィードバックに基づいて検討することで、本稿は以下の3 点を主に明らかにした:(1)参加留学生は自らの専門に近い分野に対して特に強い興味関心を示しやすい一方で、滞在している国や地域独自の技術や応用のされ方が明示的に表れる領域も印象的な学修として捉える傾向にある。(2)現地学生との共修を通じて、参加留学生に意欲の強化と知識の深化という学修効果が表れる。(3)コミュニケーションを題材とした学修活動を取り入れることで、参加留学生がプログラムにおける学びをより有機的に結びつけることを支援できる可能性がある。本稿は防災・減災が工学系学生へ向けた専門的学修と社会文化的学修を融合する越境的な学びの支援として効果的なテーマの1 つであることと、国内学生-留学生間の交流をプログラム外でもさらに促進していくことが望まれることを結語とする。神戸大学大学教育推進機構, Mar. 2025, 大學教育研究, 33, 171 - 188, Japanese
- Mar. 2025, In Proceedings of 2025 7th International Conference on Software Engineering and Computer Science (CSECS2025), English[Refereed]International conference proceedings
- Abstract In this study, aimed at achieving Society 5.0, we explore efficient development methods for services tailored to individual user needs. The diversification of user demographics has led to swiftly changing service demands, increasing the necessity for personalized adaptation. However, developing services tailored to individual users requires specialized knowledge and incurs high costs. This research focuses on developing technologies that enable service development through a concrete understanding of user needs. Utilizing an interactive needs extraction system with a virtual agent (VA) developed in prior studies, along with the Sharing Upcycling Cases with Context and Evaluation for Efficient Software Development (SUCCEED) system, we aim to automate the extraction of user needs and provide developers with relevant insights. Prior research has found it challenging to grasp the outline of services to be developed from user statements. However, a new method using large language models (LLM) has enabled the automatic extraction of novel service needs. Experiments have shown the potential to automatically provide development insights for 67% of ideal needs.Springer Science and Business Media LLC, Dec. 2024, International Journal of Networked and Distributed Computing, 13(1) (1)[Refereed]Scientific journal
- Nov. 2024, ソフトウェア工学の基礎ワークショップ FOSE2024, 205 - 206, Japanese[Refereed]Symposium
- In today’s world, services are essential in daily life, and identifying each person’s unique needs is key to creating a human-centered society. Traditional research has used machine learning to recommend services based on user behavior logs without directly detecting individual needs. This study introduces a system called Needs Companion, which automatically detects individual service needs, laying the groundwork for accurate needs sensing. The system defines a needs data model based on the 6W1H framework, uses virtual agents for needs elicitation, and applies large language models (LLMs) to analyze and automatically extract needs. Experiments showed that the system could detect needs accurately and quickly. This research provides interpretable data for personalized services and contributes to fields like machine learning, human-centered design, and requirements engineering.MDPI AG, Oct. 2024, Sensors, 24(21) (21), 6814 - 6814[Refereed]Scientific journal
- IEEE, Oct. 2024, 2024 15th International Conference on Information and Communication Technology Convergence (ICTC), 98 - 102[Refereed]International conference proceedings
- Oct. 2024, 14th IEEE International Conference on Big Data and Cloud Computing (IEEE BDCloud), English[Refereed]International conference proceedings
- Sep. 2024, 2024 International Seminar on Application for Technology of Information and Communication (iSemantic), English[Refereed]International conference proceedings
- Sep. 2024, International Seminar on Application for Technology of Information and Communication (ISemantic), English[Refereed]International conference proceedings
- Aug. 2024, 7th International Conference on Knowledge Innovation and Invention 2024 (ICKII 2024), English[Refereed]International conference proceedings
- IEEE, Jul. 2024, 2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 185 - 191[Refereed]International conference proceedings
- IEEE, Jul. 2024, 2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 26 - 32[Refereed]International conference proceedings
- IEEE, Jul. 2024, 2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 66 - 72[Refereed]International conference proceedings
- Jun. 2024, 2024 IEEE 6th Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBOIS 2024), English[Refereed]International conference proceedings
- IEEE, May 2024, 2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA), 21, 230 - 236[Refereed]International conference proceedings
- IEEE, May 2024, 2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA), 224 - 229[Refereed]International conference proceedings
- IEEE, May 2024, 2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA), 218 - 223[Refereed]International conference proceedings
- IEEE, May 2024, 2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA), 59, 193 - 198[Refereed]International conference proceedings
- May 2024, English[Refereed]In book
- IEEE, Apr. 2024, 2024 IEEE 4th International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB)[Refereed]International conference proceedings
- Mar. 2024, the 27th East Asian Forum of Nursing Scholars (EAFONS 2024), Poster(1400) (1400), English[Refereed]International conference proceedings
- Mar. 2024, the 27th East Asian Forum of Nursing Scholars (EAFONS 2024), Poster(1369) (1369), English[Refereed]International conference proceedings
- Jan. 2024, 2024 IEEE 7th Eurasian Conference on Educational Innovation (IEEE ECEI 2024), English[Refereed]International conference proceedings
- Jan. 2024, Proceedings of International Conference on Green and Human Information Technology 2024 (ICGHIT2024), English[Refereed]International conference proceedings
- Jan. 2024, Proceedings of International Conference on Green and Human Information Technology 2024 (ICGHIT20204), 355 - 358, English[Refereed]International conference proceedings
- Dec. 2023, Computer Science & Information Technology (CS & IT), 13(24) (24), 1 - 10, English[Refereed]International conference proceedings
- Dec. 2023, Computer Science & Information Technology (CS & IT), 13(24) (24), 21 - 33, English[Refereed]International conference proceedings
- Dec. 2023, Computer Science & Information Technology (CS & IT), 13(24) (24), 45 - 57, English[Refereed]International conference proceedings
- Dec. 2023, Innovation in Aging, 7(Supplement1) (Supplement1), 1035 - 1036, English[Refereed]Scientific journal
- Nov. 2023, 6th International Conference on Signal Processing and Information Security (ICSPIS), 46 - 51, English[Refereed]International conference proceedings
- Nov. 2023, The 5th IEEE International Conference on Technology Management, Operations and Decisions, English[Refereed]International conference proceedings
- Software upcycling, a form of software reuse, is a concept that efficiently generates novel, innovative, and value-added development projects by utilizing knowledge extracted from past projects. However, how to integrate the materials derived from these projects for upcycling remains uncertain. This study defines a systematic model for upcycling cases and develops the Sharing Upcycling Cases with Context and Evaluation for Efficient Software Development (SUCCEED) system to support the implementation of new upcycling initiatives by effectively sharing cases within the organization. To ascertain the efficacy of upcycling within our proposed model and system, we formulated three research questions and conducted two distinct experiments. Through surveys, we identified motivations and characteristics of shared upcycling-relevant development cases. Development tasks were divided into groups, those that employed the SUCCEED system and those that did not, in order to discern the enhancements brought about by upcycling. As a result of this research, we accomplished a comprehensive structuring of both technical and experiential knowledge beneficial for development, a feat previously unrealizable through conventional software reuse, and successfully realized reuse in a proactive and closed environment through construction of the wisdom of crowds for upcycling cases. Consequently, it becomes possible to systematically perform software upcycling by leveraging knowledge from existing projects for streamlining of software development.MDPI AG, Sep. 2023, Information, 14(9) (9), 518 - 518[Refereed]Scientific journal
- IEEE, Sep. 2023, 2023 IEEE International Conference on Artificial Intelligence in Engineering and Technology IICAIET 2023, English[Refereed]International conference proceedings
- Sep. 2023, 2023 IEEE International Conference on Artificial Intelligence in Engineering and Technology IICAIET 2023, English[Refereed]International conference proceedings
- Sep. 2023, The 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 1017 - 1020, English[Refereed]International conference proceedings
- IEEE, Sep. 2023, In 2023 IEEE International Conference on Artificial Intelligence in Engineering and Technology IICAIET 2023, English[Refereed]International conference proceedings
- Springer Nature Switzerland, Jul. 2023, Lecture Notes in Computer Science, 139 - 153[Refereed]In book
- Springer Nature Switzerland, Jul. 2023, Lecture Notes in Computer Science, 259 - 268[Refereed]In book
- Jun. 2023, the IAGG Asia/Oceania Regional Congress 2023, English[Refereed]International conference proceedings
- Jun. 2023, the IAGG Asia/Oceania Regional Congress 2023, English[Refereed]International conference proceedings
- Jun. 2023, the IAGG Asia/Oceania Regional Congress 2023, English[Refereed]International conference proceedings
- Jun. 2023, the IAGG Asia/Oceania Regional Congress 2023, English[Refereed]International conference proceedings
- Jun. 2023, COMPSAC 2023 workshop, The 11th IEEE International Workshop on Consumer Devices, Systems, and Services, English[Refereed]International conference proceedings
- Jun. 2023, The 20th International Joint Conference on Computer Science and Software Engineering, 285 - 290, English[Refereed]International conference proceedings
- IEEE, Feb. 2023, 2023 IEEE 6th Eurasian Conference on Educational Innovation (ECEI)[Refereed]International conference proceedings
- 2023, SNPD(Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing)2023 Winter (2023), 222 - 230International conference proceedings
- Dec. 2022, IIAI 13th International Congress on Advanced Applied Informatics (AAI 2022-Winter), 4pages - 4pages, English[Refereed]International conference proceedings
- IEEE, Nov. 2022, 2022 International Conference on Data and Software Engineering (ICoDSE)[Refereed]International conference proceedings
- Nov. 2022, The Gerontological Society of America's 2022 Annual Scientific Meeting (GSA2022), English[Refereed]International conference proceedings
- Nov. 2022, 2022 1st International Conference on Software Engineering and Information Technology (ICoSEIT), 22 - 27, English[Refereed]International conference proceedings
- Oct. 2022, Proceedings - 2022 IEEE 11th Global Conference on Consumer Electronics (GCCE 2022), 268 - 269, English[Refereed]International conference proceedings
- Unlike masking human faces from images, facial masking in real-time, frame by frame from a video stream, presents technical challenges related to various factors such as camera-to-human distance, head direction, and mosaic schemes. In many existing studies, expensive equipment and huge computational resources are strongly required, and it is not easy to effectively realize real-time facial masking with a simpler approach. This study aims to develop a secure streaming system to support remote medicine education and to quantitatively evaluate consecutive and effective facial masking using image-based bone sensing. Our key idea is to use the facial feature of bone sensing instead of general face recognition techniques to perform facial masking from the video stream. We use a general-purpose computer and a USB fixed-point camera to implement the eye line mosaic and face mosaic. We quantitatively evaluate the results of facial masking at different distances and human head orientations using bone sensing technology and a depth camera. we compare the results of a similar approach for face recognition with those of bone sensing. As the main results, consecutive face masking using bone sensing is unaffected by distance and head orientation, and the variation width of the mosaic area is stable within around 30% of the target area. However, about three-fourths of the results using conventional face recognition were unable to mask their faces consecutively.MDPI AG, Oct. 2022, Applied Sciences, 12(20: 10507) (20: 10507), 10507 - 10507, English[Refereed]Scientific journal
- Oct. 2022, ISG's 13th World Conference of Gerontechnology, 552 - 552, English[Refereed]International conference proceedings
- IEEE, Aug. 2022, Fifth International Balkan Conference on Communications and Networking (BalkanCom2022), 62 - 67, English[Refereed]International conference proceedings
- IEEE, Jul. 2022, 2022 23rd ACIS International Summer Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Summer)International conference proceedings
- IEEE, Jul. 2022, 2022 23rd ACIS International Summer Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Summer)International conference proceedings
- IEEE, Jul. 2022, 2022 23rd ACIS International Summer Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Summer)International conference proceedings
- IEEE, Jul. 2022, 2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 130 - 136, English[Refereed]International conference proceedings
- Jun. 2022, The 35th Global Conference of Alzheimer's Disease International (ADI2022), English[Refereed]International conference proceedings
- Jun. 2022, The 35th Global Conference of Alzheimer's Disease International (ADI2022), English[Refereed]International conference proceedings
- To assist personalized healthcare of elderly people, our interest is to develop a virtual caregiver system that retrieves the expression of mental and physical health states through human–computer interaction in the form of dialogue. The purpose of this paper is to implement and evaluate a virtual caregiver system using mobile chatbot. Unlike the conventional health monitoring approach, our key idea is to integrate a rule-based virtual caregiver system (called “Mind Monitoring” service) with the physical, mental, and social questionnaires into the mobile chat application. The elderly person receives one question from the mobile chatbot per day, and answers it by pushing the optional button or using a speech recognition technique. Furthermore, a novel method is implemented to quantify the answers, generate visual graphs, and send the corresponding summaries or advice to the specific elder. In the experimental evaluation, we applied it to eight elderly subjects and 19 younger subjects within 14 months. As main results, its effects were significantly improved by the proposed method, including the above 80% in the response rate, the accurate reflection of their real lives from the responses, and high usefulness of the feedback messages with software quality requirements and evaluation. We also conducted interviews with subjects for health analysis and improvement.MDPI AG, May 2022, Sensors, 22(10) (10), 3829 - 3829, English[Refereed]Scientific journal
- May 2022, 8th International Conference, ITAP 2022, Held as Part of the 24th HCI International Conference, HCII 2022, LNCS 13331, 197 - 209, English[Refereed]International conference proceedings
- May 2022, 8th International Conference, ITAP 2022, Held as Part of the 24th HCI International Conference, HCII 2022, LNCS 13331, 52 - 70, English[Refereed]International conference proceedings
- Rule-based systems, which are the typical technology used to realize context-aware services, have been independently implemented in various smart services. The challenges of these systems are the versatility of action, looseness, and the coding that is needed to describe the conditional branches. The purpose of this study was to support the realization of service coordination and smart services using context-aware technology by converting rule-based systems into services. In the proposed method, we designed and implemented the architecture of a new service: Unified Rule-Based Message Delivery Service (Uni-messe), which is an application-neutral rule management and evaluation service for rule-based systems. The core part of the Uni-messe proposal is the combination of a Pub/Sub and a rule-based system, and the proposal of a new event–condition–route (ECR) rule-based system. We applied Uni-messe to an audio information presentation system (ALPS) and indoor location sensing technology to construct concrete smart services, and then compared and evaluated the implementation to “if this then that” (IFTTT), which is a typical service coordination technology. Moreover, we analyzed the characteristics of other rule-based systems that have been serviced in previous studies and compared them to Uni-messe. This study shows that Uni-messe can provide services that simultaneously combine versatility, ease of conditional description, looseness, context independence, and user interface (UI), which cannot be achieved using conventional rule-based system services. By using Uni-messe, advanced heterogeneous distributed service coordination using rule-based systems and the construction of context-aware services can be performed easily.MDPI AG, Feb. 2022, Energies, 15(5) (5), 1729 - 1729, English[Refereed]Scientific journal
- IGI Global, Jan. 2022, International Journal of Software Innovation, 10(1) (1), 1 - 27
Continuous data input is essential for lifelogging services, where users input their daily records. But whether the user can continuously input data depends mainly on the user's motivation. This article presents a new method of introducing gamification in line with the purpose of lifelogging. The authors introduce a comprehensive set of gamification features based on motivation subscales into a lifelogging service. Meanwhile, the authors elucidate which gamification features correspond to which motivation subscales are effective for lifelogging, including intrinsic motivation, introjected regulation, integrated regulation, identified regulation, and external regulation. As a case study, the authors introduce the five gamification features corresponding to each motivation subscale into work support service (WSS) designed to record and review work hours. The authors also compare and evaluate changes in user behavior before and after the introduction of the gamification features. In this way, user motivation for continuous input increases when gamification in the WSS is confirmed.
Scientific journal - Springer International Publishing, 2022, Distributed, Ambient and Pervasive Interactions. Smart Environments, Ecosystems, and Cities, 193 - 207, English[Refereed]In book
- Dec. 2021, The 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2021), English[Refereed]International conference proceedings
- IEEE, Nov. 2021, 2021 4th International Conference on Signal Processing and Information Security (ICSPIS), English[Refereed]International conference proceedings
- Nov. 2021, 22nd IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD2021), English[Refereed]International conference proceedings
- IEEE, Nov. 2021, 22nd IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD2021), English[Refereed]International conference proceedings
- Nov. 2021, 22nd IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD2021), English[Refereed]International conference proceedings
- Nov. 2021, 22nd IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD2021), English[Refereed]International conference proceedings
- Nov. 2021, 22nd IEEE/ACIS International Fall Virtual Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2021-Fall), English[Refereed]International conference proceedings
- Nov. 2021, 22nd IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD2021), English[Refereed]International conference proceedings
- ACM, Nov. 2021, The 23nd International Conference on Information Integration and Web-based Applications & Services (iiWAS2021), English[Refereed]International conference proceedings
- Oct. 2021, Sensors, 21(20: 6726) (20: 6726), English[Refereed]Scientific journal
- Jul. 2021, The 2021 IEEE International Conference on Industry 4.0, Artificial, Intelligence, and Communication Technology (IAICT'21), 148 - 153, English[Refereed]International conference proceedings
- Jun. 2021, BIO Clinica, 36(7) (7), 39 - 43, Japanese[Refereed]Scientific journal
- May 2021, 電子情報通信学会論文誌, J104-D(5) (5), 521 - 525, Japanese[Refereed]Scientific journal
- IEEE, Mar. 2021, The 2021 International Workshop on Pervasive Information Flow (PerFlow'21), Held in conjunction with the 19th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2021), 495 - 501, English[Refereed]International conference proceedings
- Japan Society for Software Science and Technology, Jan. 2021, コンピュータ ソフトウェア, 38(1) (1), 1_52 - 1_64, Japanese, Domestic magazine
In PBL, it is often pointed out that it is difficult to qualitatively evaluate the improvement of students' fundamental competencies for working persons. In this study, we propose a method to evaluate students' growth and to improve classes through self-evaluation by students and objective evaluation by a third party as an approach to qualitative evaluation of PBL courses. In the proposed method, we aim to evaluate the validity of the subjective self-evaluation by the students before and after taking the PBL course, based on the objective evaluation. In this paper, we report on the evaluation results of the PBL course in 2017 and 2018 by the proposed method using the self-evaluation of fundamental competencies for working persons before and after taking the PBL course and the objective evaluation through PROG competency test.
Scientific journal - Jan. 2021, IEICE Transaction on Information and Systems, E104-D(1) (1), 121 - 125, English[Refereed]Scientific journal
- Jan. 2021, コンピュータソフトウェア, 38(1) (1), 1 - 13, JapaneseMeasuring the Effectiveness of Qualitative Education in a Practical Human Resource Development Course Based on Changes in Self-Evaluation and Objective Evaluation[Refereed]Scientific journal
- (株)ワールドプランニング, Dec. 2020, 老年精神医学雑誌, 31(増刊II) (増刊II), 179 - 179, Japanese
- Nov. 2020, The 22nd International Conference on Information Integration and Web-based Applications & Services (iiWAS2020), 390 - 395, English[Refereed]International conference proceedings
- Nov. 2020, The 22nd International Conference on Information Integration and Web-based Applications & Services (iiWAS2020), 21 - 27, English[Refereed]International conference proceedings
- Oct. 2020, ISG's 12th World Conference of Gerontechnology, 19(suppl), English[Refereed]International conference proceedings
- Oct. 2020, ISG's 12th World Conference of Gerontechnology, 19(suppl), English[Refereed]International conference proceedings
- Oct. 2020, ISG's 12th World Conference of Gerontechnology, 19(suppl), English[Refereed]International conference proceedings
- Oct. 2020, Sensors, 20(20: 5894) (20: 5894), 5894 - 5894, English[Refereed]Scientific journal
- Jul. 2020, 10th International Conference, DHM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, LNCS 12199(2) (2), 159 - 174, English[Refereed]International conference proceedings
- Jul. 2020, 10th International Conference, DHM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, 199 - 213, English[Refereed]International conference proceedings
- Jul. 2020, 11th International Conference, DHM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, LNCN 12198(1) (1), 592 - 608, English[Refereed]International conference proceedings
- Jul. 2020, 10th International Conference, DHM 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, LNCS_12198(1) (1), 460 - 472, English[Refereed]International conference proceedings
- Jul. 2020, International Journal of Software Evolution (IJSI), 8(3) (3), 35 - 40, English[Refereed]Scientific journal
- Mar. 2020, Sensors, 20(5: 1442) (5: 1442), 1442 - 1442, English[Refereed]Scientific journal
- Mar. 2020, The 2020 International Workshop on Pervasive Information Flow (PerFlow'20), Held in conjunction with the 18th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2020), 35 - 40, English[Refereed]International conference proceedings
- 日本ソフトウェア科学会 ; 1984-, Feb. 2020, コンピュータソフトウェア, 37(1) (1), 19 - 30, Japanese自動発注問題を題材とした実践的人材育成コースにおける授業改善[Refereed]Scientific journal
- Japan Society for Software Science and Technology, 2020, Computer Software, 37(1) (1), 1_19 - 1_30, Japanese
AiBiC Kansai offers an education course, AiBiC Spiral, designed to develop abilities to solve individual social issues using Big Data, artificial intelligence, and Cloud technologies through teamwork. In this paper, we report on the problems of the environments for the education program and the discrepancies in the expectations on topics and contents found by the analysis of the questionnaire conducted in 2017, and describe the activities and results performed to improve the program in 2018. Through the improvements, we have found that the problem on the program environments has been dissolved. However, as for the discrepancies in the expectations, we have revealed that only some part of the problem was improved and there were still some students found the topics and contents provided by the program were different from their expectations.
- Jan. 2020, Sensors, 20(3: 666) (3: 666), 666 - 666, English[Refereed]Scientific journal
- Dec. 2019, 21st International Conference on Information Integration and Web-based Applications & Services (iiWAS2019), 439 - 445, English[Refereed]International conference proceedings
- Dec. 2019, 21st International Conference on Information Integration and Web-based Applications & Services (iiWAS2019), 666 - 670, English[Refereed]International conference proceedings
- Dec. 2019, International Journal of Networked and Distributed Computing (IJNDC), 8(1) (1), 16 - 24, English[Refereed]Scientific journal
- Nov. 2019, 1st International Workshop on Software Engineering for Infrastructure and Configuration Code (SEConfig2019), Held as Part of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), 90 - 93, English[Refereed]International conference proceedings
- Nov. 2019, the 12th International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2019), English[Refereed]International conference proceedings
- IEEE, Oct. 2019, 11th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC2019), 360 - 366, English[Refereed]International conference proceedings
- Springer, Aug. 2019, 21st International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2019), 310 - 320, English[Refereed]International conference proceedings
- IEEE, Jul. 2019, 20th IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD2019), 533 - 538, English[Refereed]International conference proceedings
- Jul. 2019, 10th International Conference, DHM 2019, Held as Part of the 21st HCI International Conference, HCII 2019, LNCS 11582(2) (2), 391 - 403, English[Refereed]International conference proceedings
- Jul. 2019, 20th IEEE-ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Distributed Computing (SNPD2019), 525 - 532, English[Refereed]International conference proceedings
- Jul. 2019, International Journal of Web Information Systems (IJWIS), 15(2) (2), 183 - 200, English[Refereed]Scientific journal
- Jul. 2019, 10th International Conference, DHM 2019, Held as Part of the 21st HCI International Conference, HCII 2019, LNCS 11582(1) (1), 420 - 432, English[Refereed]International conference proceedings
- Jul. 2019, 10th International Conference, DHM 2019, Held as Part of the 21st HCI International Conference, HCII 2019, LNCS 11582(2) (2), 353 - 364, English[Refereed]International conference proceedings
- Jul. 2019, 10th International Conference, DHM 2019, Held as Part of the 21st HCI International Conference, HCII 2019, LNCS 11582(1) (1), 355 - 365, English[Refereed]International conference proceedings
- ACM, Mar. 2019, 2nd International Conference on Software and Services Engineering (ICSSE 2019), 37 - 46, English[Refereed]International conference proceedings
- Dec. 2018, Impact, 2018(11) (11), 31 - 33, English[Refereed]Scientific journal
- IEEE Computer Society, Nov. 2018, 25th Australasian Software Engineering Conference (ASWEC) and Australasian Software Week (ASW), 126 - 130, English[Refereed]International conference proceedings
- Nov. 2018, 20th International Conference on Information Integration and Web-based Applications & Services (iiWAS ’18), 323 - 330, English[Refereed]International conference proceedings
- Nov. 2018, International Conference on Signal Processing and Information Security (ICSPIS2018), English[Refereed]International conference proceedings
- Nov. 2018, International Conference on Signal Processing and Information Security (ICSPIS2018), 5 - 8, EnglishEvaluating Feasibility of Image-Based Cognitive APIs for Home Context Sensing[Refereed]International conference proceedings
- Oct. 2018, The Tenth International Conference on Advances in System Testing and Validation Lifecycle (VALID 2018), English[Refereed]International conference proceedings
- Springer, Sep. 2018, Proc. of 29th International Conference on Database and Expert Systems Applications (DEXA 2018), LNCS 11029, pp. 134 - 149, English[Refereed]International conference proceedings
- Aug. 2018, International Journal of Software Innovation (IJSI), 6(4) (4), 16 - 29, English[Refereed]Scientific journal
- Aug. 2018, International Journal of Software Innovation (IJSI), 6(4) (4), 46 - 58, English[Refereed]Scientific journal
- Jul. 2018, HCI in Business, Government, and Organizations 2018 (HCIBGO 2018), Held as Part of HCI International 2018, LNCS 10923, 611 - 625, English[Refereed]International conference proceedings
- Jul. 2018, Digital Human Modeling 2018 (DHM 2018), Held as Part of HCI International 2018, LNCS 10917, 326 - 337, English[Refereed]International conference proceedings
- Jul. 2018, Digital Human Modeling 2018 (DHM 2018), Held as Part of HCI International 2018, LNCS 10917, 466 - 477, English[Refereed]International conference proceedings
- Jul. 2018, Digital Human Modeling 2018 (DHM 2018), Held as Part of HCI International 2018, LNCS 10917, 513 - 526, English[Refereed]International conference proceedings
- May 2018, 11th World conference of Gerontechnology (ISG2018), 17, 118s - 118s, English[Refereed]International conference proceedings
- May 2018, 11th World conference of Gerontechnology (ISG2018), 17, 151s - 151s, English[Refereed]International conference proceedings
- Apr. 2018, 11th World conference of Gerontechnology (ISG2018), 17, 144s - 144s, English[Refereed]International conference proceedings
- Mar. 2018, Information Engineering Express (IEE), 4(1) (1), 1 - 10, English[Refereed]Scientific journal
- Mar. 2018, 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 831 - 836, English[Refereed]International conference proceedings
- IEEE Computer Society, 2018, 2018 IEEE/ACIS 3rd International Conference on Big Data, Cloud Computing, Data Science & Engineering, 31 - 36, English[Refereed]International conference proceedings
- Springer Verlag, 2018, Advances in Intelligent Systems and Computing, 722, 216 - 222, English[Refereed]International conference proceedings
- Springer Verlag, 2018, Advances in Intelligent Systems and Computing, 722, 267 - 273, English[Refereed]International conference proceedings
- Springer Verlag, 2018, Advances in Intelligent Systems and Computing, 722, 112 - 118, English[Refereed]International conference proceedings
- Association for Computing Machinery, Dec. 2017, ACM International Conference Proceeding Series, 330 - 337, English[Refereed]International conference proceedings
- Association for Computing Machinery, Dec. 2017, ACM International Conference Proceeding Series, 208 - 214, English[Refereed]International conference proceedings
- Association for Computing Machinery, Dec. 2017, ACM International Conference Proceeding Series, 131 - 135, English[Refereed]International conference proceedings
- Dec. 2017, Information Engineering Express (IEE), 3(4) (4), 33 - 42, English[Refereed]Scientific journal
- Dec. 2017, The 19th International Conference on Information Integration and Web-based Applications & Services (iiWAS2017), English[Refereed]International conference proceedings
- Nov. 2017, Computer Software: JSSST Jounal, 34(4) (4), 4_116 - 4_128, English[Refereed]Scientific journal
- Sep. 2017, Proceedings of Eighth International Conference on Indoor Positioning and Indoor Navigation (IPIN2017), English[Refereed]International conference proceedings
- Institute of Electrical and Electronics Engineers Inc., Aug. 2017, Proceedings - 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2017, (CFP1779A-USB) (CFP1779A-USB), 465 - 470, English[Refereed]International conference proceedings
- Institute of Electrical and Electronics Engineers Inc., Aug. 2017, Proceedings - 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2017, (CFP1779A-USB) (CFP1779A-USB), 477 - 482, English[Refereed]International conference proceedings
- IEEE, Jul. 2017, 2nd International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD 2017), 333 - 339, English[Refereed]International conference proceedings
- May 2017, 2017 6th International Conference on Advanced Materials and Computer Science (ICAMCS 2017), 3, 323 - 329, English[Refereed]International conference proceedings
- Mar. 2017, INTELLIGENT AUTOMATION AND SOFT COMPUTING, 23(1) (1), 153 - 159, English[Refereed]Scientific journal
- Springer Verlag, 2017, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10287, 161 - 172, English[Refereed]International conference proceedings
- Springer Verlag, 2017, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10286(LNCS 10286) (LNCS 10286), 336 - 347, English[Refereed]International conference proceedings
- Springer Verlag, 2017, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10287(LNCS 10287) (LNCS 10287), 183 - 194, English[Refereed]International conference proceedings
- Emerald Group Publishing Ltd., 2017, International Journal of Pervasive Computing and Communications, 13(1) (1), 76 - 91, English[Refereed]Scientific journal
- Association for Computing Machinery, Nov. 2016, ACM International Conference Proceeding Series, 414 - 421, English[Refereed]International conference proceedings
- Nov. 2016, The 18th International Conference on Information Integration and Web-based Applications & Services (iiWAS2016), 416 - 423, English[Refereed]International conference proceedings
- Oct. 2016, World Data Viz Challenge 2016 (WDVC2016), Kobe Round, English[Refereed]International conference proceedings
- Oct. 2016, World Data Viz Challenge 2016 (WDVC2016), Kobe Round, English[Refereed]International conference proceedings
- Oct. 2016, International Journal of Software Innovation (IJSI), 5(1) (1), 30 - 43, English[Refereed]Scientific journal
- Sep. 2016, 10th World conference of Gerontechnology (ISG2016), 15, 98s - 98s, English[Refereed]International conference proceedings
- Jun. 2016, World Data Viz Challenge 2016 (WDVC2016), Barcelona Round, English[Refereed]International conference proceedings
- Jun. 2016, World Data Viz Challenge 2016 (WDVC2016), Barcelona Round, English[Refereed]International conference proceedings
- Mar. 2016, International Workshop on Empirical Software Engineering in Practice (IWESEP 2016), Poster Session - Poster Session, English[Refereed]International conference proceedings
- 2016, 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 909 - 914, English[Refereed]International conference proceedings
- 2016, 2016 4TH INTL CONF ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY/3RD INTL CONF ON COMPUTATIONAL SCIENCE/INTELLIGENCE AND APPLIED INFORMATICS/1ST INTL CONF ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (ACIT-CSII-BCD), 202 - 207, English[Refereed]International conference proceedings
- 2016, 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 891 - 896, English[Refereed]International conference proceedings
- 2016, 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 885 - 890, English[Refereed]International conference proceedings
- 2016, 2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2946 - 2953, English[Refereed]International conference proceedings
- 2016, PROCEEDINGS 7TH INTERNATIONAL WORKSHOP ON EMPIRICAL SOFTWARE ENGINEERING IN PRACTICE (IWESEP 2016), 36 - 40, English[Refereed]International conference proceedings
- 2016, 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 897 - 902, English[Refereed]International conference proceedings
- 2016, Digital Human Modeling: Applications in Health, Safety, Ergonomics and Risk Management, 9745, 274 - 285, English[Refereed]International conference proceedings
- 2016, Digital Human Modeling: Applications in Health, Safety, Ergonomics and Risk Management, 9745, 357 - 368, English[Refereed]International conference proceedings
- Science and Engineering Research Support Society, 2016, International Journal of Smart Home, 10(9) (9), 275 - 286, English[Refereed]Scientific journal
- Emerald Group Publishing Ltd., 2016, International Journal of Pervasive Computing and Communications, 12(1) (1), 49 - 65, English[Refereed]Scientific journal
- Emerald Group Publishing Ltd., 2016, International Journal of Pervasive Computing and Communications, 12(1) (1), 154 - 172, English[Refereed]Scientific journal
- 2016, INTERNET OF THINGS: IOT INFRASTRUCTURES, IOT 360, PT II, 170, 44 - 52, English[Refereed]International conference proceedings
- Association for Computing Machinery, Inc, Dec. 2015, 17th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2015 - Proceedings, 548 - 557, English[Refereed]International conference proceedings
- Association for Computing Machinery, Inc, Dec. 2015, 17th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2015 - Proceedings, 430 - 439, English[Refereed]International conference proceedings
- Jul. 2015, International Journal of Software Innovation, 3(3) (3), 26 - 40, English[Refereed]Scientific journal
- Jul. 2015, International Journal of Software Innovation, 3(3) (3), 57 - 68, English[Refereed]Scientific journal
- Jun. 2015, The 2015 Alzheimer's Disease Congress (Alz2015), English[Refereed]International conference proceedings
- Apr. 2015, International Journal of Software Innovation, 3(2) (2), 24 - 34, English[Refereed]Scientific journal
- オブジェクト指向プログラム固有なデバッグの困難性を克服する Back-in-Time デバッガの実現に向けて逆回し (back-in-time) デバッガはプログラムのトレース (実行履歴) を記録して過去の状態の参照を可能する機能を有しており,デバッグに於ける診断のあり方を根本から変える可能性を秘めている.しかしながらその機能を有効に活用するためには,作業者が膨大なトレースの中から適切な実行時点を指定し,その状態の正不正を判定しなければならない.こうした指定や判定は作業者自身のプログラム理解に大きく依存している.オブジェクト指向プログラミングはプログラムの再利用性や拡張性が向上させる反面,コードの理解を困難にする傾向が指摘されている.我々はこうしたオブジェクト指向プログラムに固有な問題を解決するために,外挿診断法 (diagnosis by extrapolation) という手法を提案し,それを実現する逆回しデバッガを開発中である.本手法は指定された時点の実行文脈を,作業者の既知の情報を用いて抽象化する事によって,問題解決を実現する点に最大の特徴を有している.本論文では実用的なプログラムのデバッグ事例を通じて逆回しデバッガが実装すべき機能と手法の有効性の評価方法を考察する.一般社団法人情報処理学会, Mar. 2015, 情報処理学会研究報告, 205-SE-187(37) (37), 1 - 8, JapaneseSymposium
- Mar. 2015, EAI Endorsed Transactions on Context-aware Systems and Applications, 15(3) (3), e3 - e3, English[Refereed]Scientific journal
- Science and Engineering Research Support Society, 2015, International Journal of Smart Home, 9(12) (12), 233 - 244, English[Refereed]Scientific journal
- 2015, SERVICE-ORIENTED COMPUTING - ICSOC 2014 WORKSHOPS, 8954, 270 - 280, English[Refereed]International conference proceedings
- 2015, 2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), English[Refereed]International conference proceedings
- 2015, 2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), English[Refereed]International conference proceedings
- 2015, 2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), English[Refereed]International conference proceedings
- Fuji Technology Press, 2015, Journal of Advanced Computational Intelligence and Intelligent Informatics, 19(6) (6), 785 - 795, English[Refereed]Scientific journal
- Science and Engineering Research Support Society, 2015, International Journal of Smart Home, 9(8) (8), 151 - 162, English[Refereed]Scientific journal
- 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, 289 - 294, English[Refereed]International conference proceedings
- 2015, 2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), 109 - 114, English[Refereed]International conference proceedings
- 2015, 2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), 127 - 132, English[Refereed]International conference proceedings
- Dec. 2014, Joint 7th International Conference on Soft Computing and Intelligent Systems and 15th International Symposium on Advanced Intelligent Systems (ISIS2014), 398 - 403, English[Refereed]International conference proceedings
- Association for Computing Machinery, Nov. 2014, International Conference on Information and Knowledge Management, Proceedings, 25 - 32, English[Refereed]International conference proceedings
- Nov. 2014, The Third International Workshop on Self-Managing Pervasive Service Systems (SeMaPS2014), 73 - 82, English[Refereed]International conference proceedings
- Jul. 2014, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E97D(7) (7), 1709 - 1718, English[Refereed]Scientific journal
- Association for Computing Machinery, 2014, Proceedings of the ACM Symposium on Applied Computing, 1176 - 1178, English[Refereed]International conference proceedings
- 2014, 16TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS 2014), 233 - 242, English[Refereed]International conference proceedings
- 2014, 2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 964 - 969, English[Refereed]International conference proceedings
- ICST, 2014, Proceedings of 3rd International Conference on Context-Aware Systems and Applications, ICCASA 2014, English[Refereed]International conference proceedings
- 2014, 2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 258 - 259, English[Refereed]International conference proceedings
- 2014, 2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 268 - 270, English[Refereed]International conference proceedings
- 2014, 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 325 - 330, English[Refereed]International conference proceedings
- 2014, 2014 WORLD AUTOMATION CONGRESS (WAC): EMERGING TECHNOLOGIES FOR A NEW PARADIGM IN SYSTEM OF SYSTEMS ENGINEERING, 219 - 224, English[Refereed]International conference proceedings
- 2014, 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 355 - 360, English[Refereed]International conference proceedings
- 2014, 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 343 - 348, English[Refereed]International conference proceedings
- 2014, 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 319 - 324, English[Refereed]International conference proceedings
- Springer Verlag, 2014, Advances in Intelligent Systems and Computing, 271, 51 - 60, English[Refereed]Scientific journal
- Springer Verlag, 2014, Advances in Intelligent Systems and Computing, 271, 39 - 49, English[Refereed]Scientific journal
- 2014, 2014 IEEE 16TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 31 - 36, English[Refereed]International conference proceedings
- International Society for Gerontechnology, 2014, Gerontechnology, 13(2) (2), 289 - 289, English[Refereed]International conference proceedings
- Springer Verlag, 2014, Advances in Intelligent Systems and Computing, 271, 51 - 60, English[Refereed]Scientific journal
- Nov. 2013, The 14th International Symposium on Advanced Intelligent Systems (ISIS2013), 1205 - 1215, English[Refereed]International conference proceedings
- Aug. 2013, COMPUTER NETWORKS, 57(12) (12), 2442 - 2453, English[Refereed]Scientific journal
- 2013, International Conference on Wireless and Mobile Computing, Networking and Communications, 273 - 278, English[Refereed]International conference proceedings
- 2013, ACM International Conference Proceeding Series, 133 - 139, English[Refereed]International conference proceedings
- 2013, 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 311 - 316, English[Refereed]International conference proceedings
- 2013, Computer Software, 30(3) (3), 18 - 24, English[Refereed]Scientific journal
- 2013, SNPD 2013 - 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 549 - 554, English[Refereed]International conference proceedings
- 2013, 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 535 - 542, English[Refereed]International conference proceedings
- 2013, SNPD 2013 - 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 529 - 534, English[Refereed]International conference proceedings
- 2013, 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 523 - 528, English[Refereed]International conference proceedings
- 2013, 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 511 - 516, English[Refereed]International conference proceedings
- 2013, 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 273 - 278, EnglishImplementing a Mobile Application for Spontaneous Peak Shaving of Home Electricity[Refereed]International conference proceedings
- Springer Verlag, 2013, Studies in Computational Intelligence, 443, 159 - 170, English[Refereed]International conference proceedings
- Nov. 2012, Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT2012), English[Refereed]International conference proceedings
- Nov. 2012, Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT2012), English[Refereed]International conference proceedings
- Nov. 2012, Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT2012), English[Refereed]International conference proceedings
- Jul. 2012, SENSORS, 12(7) (7), 8447 - 8464, English[Refereed]Scientific journal
- Jun. 2012, Journal of Asia-Pasific Association for Machine Translation (AAMT Journal), 51, 33 - 41[Refereed]Scientific journal
- 家庭における省エネ促進のための電力消費振り返りサービスの実装と評価近年,住宅設備の電化や家電機器の増加・性能向上を要因として,家庭における消費電力量増加が重要課題となっている.家庭内の省エネ実現を目的として,ネットワークに接続された電力センサ等を用いた宅内の消費電力量可視化するサービスが研究・開発されている.実際に消費電力量の可視化によってユーザの省エネ行動を促進することができるという実験結果も現れつつある.一方で,既存サービスのほとんどは宅内の消費電力量のログを可視化するものであり,ユーザの在/不在や室温,照度といった環境状態に基づいた電力の消費結果と消費の原因の因果関係を後から細かく振り返ることを目的としていない.本研究では,HNSにおいて取得可能な様々なログを組み合わせることで,ユーザが日々の電力消費をより細かく振り返ることができる「電力消費振り返りサービス」を提案する.また,提案サービスを実際のホームネットワークシステム上で実装し,有用性を確認するための評価実験を行った.実験により,提案サービスを用いて「電力消費超過」,「サービス提供不能」,「環境状態無視」といった分類でのユーザの電力浪費行動全てを具体的な根拠に基づいて発見することができた.The Institute of Electronics, Information and Communication Engineers, Apr. 2012, 電子情報通信学会論文誌, J95-D(4) (4), 778 - 789, Japanese[Refereed]Scientific journal
- 異種ライフログ統合のための標準データモデルとマッシュアップAPI様々なサービスを通じて記録された各種ライフログを,ネットワーク越しに統合・集約することで,より高い付加価値をもつサービスへ発展させることが可能である.本論文では,異種ライフログ統合のための標準データモデル(LLCDM),及び標準データモデルにアクセスするためのマッシュアップAPI(LLAPI)を提案する.各種ライフログの記録項目を5W1Hの観点から分類,整理することで,ライフログの種類に強く依存しない中立的なデータモデルを構築する.整理された標準データに対し,汎用的なマッシュアップAPIを設けることで,効率的かつ柔軟なライフログの統合を支援する.LLCDMとLLAPIの有効性を確かめる評価実験として,二つのライフログを統合するアプリケーションを題材とした開発実験を行う.The Institute of Electronics, Information and Communication Engineers, Apr. 2012, 電子情報通信学会論文誌, J95-D(4) (4), 758 - 768, Japanese[Refereed]Scientific journal
- We propose a new authentication method based on actions and spatiotemporal information such as location, elapsed time, and travel distance of a user. To be authenticated, a user performs certain actions at certain points defined with spatiotemporal information. To apply spatiotemporal information to authentication, it is needed that suppressing probability of authentication failure of regular user, for it is not easy to retry authentication. So we propose partial matching authentication which allows partial mistake of user's authentication procedure. Also, we define combination of spatiotemporal information and action as spatiotemporal character, and formalize security evaluation of our method based on it. In addition, we show security effectiveness of our method with an experiment. The experiment showed that false rejection rate of our method is 0.233% and false acceptance rate is 0.010%.Japan Society for Fuzzy Theory and Intelligent Informatics, Feb. 2012, 知能と情報 (日本知能情報ファジィ学会誌), 23(6) (6), 874 - 881, Japanese[Refereed]Scientific journal
- 2012, International Conference on Wireless and Mobile Computing, Networking and Communications, 769 - 776, English[Refereed]International conference proceedings
- 2012, 4TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2012), 589 - 594, EnglishTOWARD UNDERSTANDING SIDE EFFECTS IN FRAMEWORK APPLICATIONS[Refereed]International conference proceedings
- 2012, 2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1, 713 - 716, English[Refereed]International conference proceedings
- 2012, 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 141 - 148, English[Refereed]International conference proceedings
- 2012, 2012 THIRD INTERNATIONAL CONFERENCE ON NETWORKING AND COMPUTING (ICNC 2012), 195 - 200, English[Refereed]International conference proceedings
- 2012, 2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1, 342 - 345, English[Refereed]International conference proceedings
- 2012, 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 815 - 820, English[Refereed]International conference proceedings
- 2012, Proceedings - 2012 4th International Workshop on Empirical Software Engineering in Practice, IWESEP 2012, 35 - 39, English[Refereed]International conference proceedings
- 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012, 853 - 858, English[Refereed]International conference proceedings
- Nov. 2011, International Conference on Energy Aware Computing(iceac2011), English[Refereed]International conference proceedings
- Mar. 2011, 1st IEEE PerCom Workshop on Pervasive Communities and Service Clouds (PerCoSC2011), 449 - 454, English[Refereed]International conference proceedings
- 2011, Computer Software, 28(1) (1), 300 - 305, JapaneseProgram camouflage at the source code levelScientific journal
- 2011, ACM International Conference Proceeding Series, 503 - 506, English[Refereed]International conference proceedings
- 2011, ACM International Conference Proceeding Series, 375 - 378, English[Refereed]International conference proceedings
- 2011, ACM International Conference Proceeding Series, 395 - 398, English[Refereed]International conference proceedings
- 2011, ACM International Conference Proceeding Series, 337 - 340, English[Refereed]International conference proceedings
- 2011, Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011, 13 - 19, English[Refereed]International conference proceedings
- 2011, Proceedings - 2011 IEEE International Conference on Services Computing, SCC 2011, 576 - 583, English[Refereed]International conference proceedings
- 2011, International Journal of Information Systems in the Service Sector, 3(4) (4), 54 - 72, English[Refereed]Scientific journal
- Jan. 2011, コンピュータソフトウェア, 28(1) (1), 1_300 - 1_305[Refereed]Scientific journal
- Nov. 2010, Workshop on Dependability of Network Software Applications 2010 (DNSA 2010), English[Refereed]International conference proceedings
- Jun. 2010, Proc. of 8th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT2010), CDROM, EnglishMashing up Multiple Logs in Home Network System for Promoting Energy-Saving Behavior[Refereed]International conference proceedings
- Jun. 2010, Proc. of 8th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT2010), CDROM, English[Refereed]International conference proceedings
- Apr. 2010, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E93D(4) (4), 822 - 833, English[Refereed]Scientific journal
- 2010, iiWAS2010 - 12th International Conference on Information Integration and Web-Based Applications and Services, 263 - 270, English[Refereed]International conference proceedings
- 2010, ACM International Conference Proceeding Series, USB - USB, English[Refereed]International conference proceedings
- Nov. 2009, ヒューマンインターフェース学会論文誌 「ユニバーサルデザイン」特集号, 11(4) (4), 369 - 379[Refereed]Scientific journal
- Apr. 2009, International Journal of Smart Home, 3(2) (2), 71 - 88, English[Refereed]Scientific journal
- 2009, 2009 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC 2009), 437 - +, English[Refereed]International conference proceedings
- 2009, ICE-B 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 131 - 134, EnglishRSS CONVERSION SERVICE FOR INTEGRATING WEB INFORMATION RESOURCES AND HOME NETWORK SYSTEM[Refereed]International conference proceedings
- 2009, FEATURE INTERACTIONS IN SOFTWARE AND COMMUNICATION SYSTEMS X, 191 - 206, English[Refereed]International conference proceedings
- 2009, Innovations in Systems and Software Engineering, 5(3) (3), 181 - 196, English[Refereed]Scientific journal
- Jan. 2009, International Journal of Smart Home, 3(1) (1), 67 - 80, English[Refereed]Scientific journal
- 2009, Innovations in Systems and Software Engineering, 5(3) (3), 181 - 196, English[Refereed]Scientific journal
- Sep. 2008, International Journal of Computer Science and Network Security, 8(9) (9), 59 - 71, English[Refereed]Scientific journal
- Jun. 2008, Proc. of the 4th International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2008), 41 - 49, English[Refereed]International conference proceedings
- Jun. 2008, IPSJ Journal (also published as Journal of Information Processing (JIP)), 49(6) (6), 1751 - 1762, English[Refereed]Scientific journal
- Mar. 2008, Proc. of the IASTED International Conference on Human Computer Interaction (IASTED-HCI 2008), 107 - 112, English[Refereed]International conference proceedings
- Feb. 2008, Proc. of the IASTED International Conference on Software Engineering (IASTED SE 2008), 125 - 130, English[Refereed]International conference proceedings
- Feb. 2008, Proc. of the IASTED International Conference on Software Engineering (IASTED SE 2008), 37 - 42, English[Refereed]International conference proceedings
- Information Processing Society of Japan, 2008, Journal of Information Processing, 16, 38 - 49, English[Refereed]Scientific journal
- 2008, FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2, 906 - +, EnglishDeriving Safety Properties for Home Network System Based on Goal-Oriented Hazard Analysis Model[Refereed]International conference proceedings
- 2008, 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 275 - +, English[Refereed]International conference proceedings
- Jan. 2008, INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 5(1) (1), 82 - 98, EnglishConstructing home network systems and integrated services using legacy home appliances and Web services[Refereed]Scientific journal
- APIライブラリ名隠ぺいのための動的名前解決を用いた名前難読化名前難読化とは,プログラム中の名前(識別子)を別の名前に付け替えることで,プログラムを理解しづらいものにするソフトウェア保護手法である.従来の名前難読化手法は,各名前を静的に別の文字列で置換するものであり,プログラム中に現れる任意のユーザ定義の名前を隠ぺいできる.しかしながら,従来手法を用いてシステム定義の名前(標準ライブラリやAPIの呼出し等)を難読化することは,プログラムの移植性を著しく低下させるため,現実的に不可能である.そこで本論文では,オブジェクト指向言語を対象に,システム定義の名前をも隠ぺい可能な新たな名前難読化手法を提案する.具体的には,プログラム中の名前使用部分をあらかじめ暗号化しておき,実行時に名前を復号して当該処理を実行する,動的名前解決の仕組みを導入する.提案手法では,オブジェクト指向言語のリフレクション機構を用いて,クラスの参照,メソッド呼出し,フィールドの参照・代入に現れる任意の名前を動的解決する方法を実現している.また,提案手法をJavaプログラム用に実装し評価実験を行った.ある実用プログラムへの適用では,4.11倍の性能劣化でプログラム中のすべてのクラス名,メソッド名,フィールド名(計10,580回出現)を難読化できることが分かった.The Institute of Electronics, Information and Communication Engineers, Oct. 2007, 電子情報通信学会論文誌D, J90-D(10) (10), 2723 - 2735, Japanese[Refereed]Scientific journal
- Oct. 2007, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E90A(10) (10), 2290 - 2300, English[Refereed]Scientific journal
- 2007, 203 - 214Using Formal Methods to increase confidence in one Home Network System implementation: Case study.International conference proceedings
- 2007, PERVASIVE COMPUTING FOR QUALITY OF LIFE ENHANCEMENT, PROCEEDINGS, 4541, 130 - +, EnglishCharacterizing safety of integrated services in home network system[Refereed]International conference proceedings
- Jul. 2006, International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2006), II, 173 - 176, English[Refereed]International conference proceedings
- Mar. 2006, Proceedings of Int'l Eye Tracking Research & Applications Symposium (ETRA 2006), 133 - 140, English[Refereed]International conference proceedings
- This paper presents a method to evaluate the risk of information leakage in software processes for security-sensitive applications. A software process is modeled as a series of sub-processes, each of which produces new work products from input products. Since a process is conducted usually by multiple developers, knowledge of work products is shared among the developers. Through the collaboration, a developer may share with others the knowledge of products that are not related to the process. We capture the transfer of such irrelevant product knowledge as information leakage in a software process. In this paper, we first formulate the problem of information leakage by introducing a formal software process model. Then, we propose a method to derive the probability that each developer d knows each work product p at a given process of software development. The probability reflects the possibility that someone leaked the knowledge of p to d. We also conduct three case studies to show the applicability of leakage to practical settings. In the case studies, we evaluate how the risk of information leakage is influenced by the collaboration among developers, the optimal developer assignment and the structure of the software process. As a result, we show that the proposed method provides a simple yet powerful means to perform quantitative analysis on information leakage in a security-sensitive software process.Information and Media Technologies Editorial Board, 2006, Information and Media Technologies, 1(1) (1), 121 - 133, English
- 2006, ASPEC 2006: 13TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 45 - 52, English[Refereed]International conference proceedings
- 2006, UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 4239, 13 - 27, EnglishExploiting eye gaze information for operating services in home network system[Refereed]Scientific journal
- 2006, ICWS 2006: IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 849 - +, English[Refereed]International conference proceedings
- 2006, PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND TECHNOLOGY, 286 - +, EnglishSoftware obfuscation from crackers' viewpoint[Refereed]International conference proceedings
- 2006, ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 89(1) (1), 47 - 59, English[Refereed]Scientific journal
- Dec. 2005, NECTEC Technical Journal, 5(16) (16), 581 - 597, English[Refereed]Scientific journal
- Sep. 2005, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E88D(9) (9), 2148 - 2158, English[Refereed]Scientific journal
- Aug. 2005, IPSJ Journal, Special Issue on Research on Computer Security Characterized in the Context of Social Responsibilities, 46(8) (8), 2129 - 2141, English[Refereed]Scientific journal
- Use Case Maps を用いたサービス競合可能シナリオの導出と実験的評価サービス競合(Feature Interactions)とは, 複数の通信サービスを組み合わせたとき, 単独サービスで予期しない動作が発生する不具合を指す.すべてのサービス競合を厳密に検出し, 解消することは, サービス数及びシナリオ数の組合せ爆発により, 非常に困難な問題として知られている.そこで, 本研究では電話通信サービスを対象として, サービス開発の要求段階において, 「競合が起こりがちな」シナリオを低コストで導出するための枠組みを提案する.具体的には, Use Case Maps (UCMs)と呼ばれる要求記述法のスタブプラグインという概念を利用し, 基本電話サービスと付加サービスのシナリオを記述する.その後, UCMs上の三つのパス条件により, サービス競合が発生する可能性の高いシナリオを導出する.UCMsのシンプルなパス解析により, 競合の可能性があるシナリオを大幅に絞り込むことができる.また, 実際の携帯電話サービスに提案法を適用して評価実験を行った.2560の全サービスシナリオに対して, 提案法の適用により競合可能シナリオを148にまで絞り込むことができた.検証の結果, 導出された競合可能シナリオには, 既知のサービス競合がすべて含まれることが分かった.更に, いくつかの新たなサービス競合を発見できた.The Institute of Electronics, Information and Communication Engineers, Jul. 2005, 電子情報通信学会論文誌, J88-B(7) (7), 1237 - 1247, Japanese[Refereed]Scientific journal
- Jun. 2005, Proc. of 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005), 245 - 250, English[Refereed]International conference proceedings
- Apr. 2005, 情報処理学会論文誌, 46(4) (4), 930 - 939[Refereed]Scientific journal
- Feb. 2005, 情報処理学会論文誌, 46(2) (2), 314 - 326サービス指向アーキテクチャを用いたネットワーク家電連携サービスの開発[Refereed]Scientific journal
- Feb. 2005, Proc. of the IASTED International Conference on Software Engineering (IASTED SE 2005), 91 - 98, English[Refereed]International conference proceedings
- 2005, 12th Asia-Pacific Software Engineering Conference, Proceedings, 549 - 558, English[Refereed]International conference proceedings
- 2005, Eighth International Workshop on Principles of Software Evolution, Proceedings, 61 - 64, English[Refereed]International conference proceedings
- 2005, Feature Interactions in Telecommunications and Software Systems VIII, 236 - 251, EnglishFeature interactions in integrated services of networked home appliances[Refereed]International conference proceedings
- Australian Computer Society, Jan. 2005, Proc. 3rd Australasian Information Security Workshop (AISW2005), 44, 145 - 151, EnglishCharacterizing Dynamics of Information Leakage in Software Process[Refereed]International conference proceedings
- Nov. 2004, Proc. International Conference of Service Oriented Computing (ICSOC04), 269 - 278, English[Refereed]International conference proceedings
- Oct. 2004, Proc. International Symposium on Future Software Technology 2004 (ISFST 2004), CDROM, 20 - 22, EnglishDynamic Software Birthmarks to Detect the Theft of Windows Applications[Refereed]International conference proceedings
- Aug. 2004, COMPUTER NETWORKS, 45(5) (5), 605 - 624, English[Refereed]Scientific journal
- Aug. 2004, Proc. International Conference on E-Business and Telecommunication Networks(ICETE04), 1, 62 - 69, EnglishDesign and evaluation of the Home network systems using the service oriented architecture[Refereed]International conference proceedings
- 命令のカムフラージュによるソフトウェア保護方法本論文では,プログラムに含まれる多数の命令をカムフラージュ(偽装)することにより,悪意をもったユーザ(攻撃者)によるプログラムの解析を困難にする方法を提案する.提案方法では,プログラム中の任意の命令(ターゲット)を異なる命令で偽装し,プログラムの自己書換え機構を用いて,実行時のある期間においてのみ元来の命令に復元する.攻撃者がカムフラージュされた命令を含む範囲の解析を試みたとしても,ターゲットの書換えを行うルーチン(書換えルーチン)の存在に気づかない限り,プログラムの元来の動作を正しく理解することは不可能である.解析を成功させるためには,書換えルーチンを含む範囲についても解析する必要があり,結果として,攻撃者はより広範囲にわたるプログラムの解析を強いられることとなる.提案方法は自動化が容易であり,要求される保護の強さ,及び,許容される実行効率の低下の度合に応じて,ターゲットの個数を任意に決定できる.The Institute of Electronics, Information and Communication Engineers, Jun. 2004, 電子情報通信学会論文誌A, J87-A(6) (6), 755 - 767, Japanese[Refereed]Scientific journal
- Mar. 2004, Proc. of the 10th Intetnational Symposium on Pacific Rim Dependable Computing (PRDC2004), Fast Abstracts, 15 - 16, English[Refereed]International conference proceedings
- 2004, PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 569 - 574, EnglishDesign and evaluation of birthmarks for detecting theft of Java programs[Refereed]International conference proceedings
- Dec. 2003, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E86D(12) (12), 2579 - 2587, EnglishFeature interaction detection by bounded model checking[Refereed]Scientific journal
- Nov. 2003, 情報処理学会論文誌, 44(11) (11), 2575 - 2586[Refereed]Scientific journal
- Jul. 2003, Proc. 2003 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2003)(3) (3), 1807 - 1810, English[Refereed]International conference proceedings
- Jun. 2003, 10th Int'l Conference on Human - Computer Interaction (HCI International 2003), Adjunct Proceeding, 289 - 290, English[Refereed]International conference proceedings
- Jun. 2003, Proc. 10th Int'l Conference on Human - Computer Interaction (HCI International 2003), (1) (1), 813 - 817, EnglishWebTracer: Evaluating web usability with browsing history and eye movement[Refereed]International conference proceedings
- 2003, FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS VII, 215 - 230, EnglishDetecting script-to-script interactions in call processing language[Refereed]International conference proceedings
- 2003, NINTH INTERNATIONAL SOFTWARE METRICS SYMPOSIUM, PROCEEDINGS, 351 - 360, English[Refereed]International conference proceedings
- 2003, 27TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 170 - 179, EnglishExploiting self-modification mechanism for program protection[Refereed]International conference proceedings
- 2003, ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 552 - 561, English[Refereed]International conference proceedings
- 2003, 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 283 - 290, English[Refereed]International conference proceedings
- Oct. 2002, Proc. of the Sixth National Computer Science and Engineering Conference (NCSEC2002), 57 - 62, English[Refereed]International conference proceedings
- Oct. 2002, In Proc. International Symposium on Empirical Software Engineering (ISESE2002), 2, 27 - 28, EnglishDevelopment and evaluation of a usability evaluation tool: WebTracer[Refereed]International conference proceedings
- Jul. 2002, In Proc. International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2002), CDROM, 556 - 559, EnglishCharacterizing Semantic Warnings of Service Description in Call Processing Language on Internet Telephony[Refereed]International conference proceedings
- Jun. 2002, In Proc. IEEE Conference on Dependable Systems and Networks (ICDSN-2002), 2(Fast Abstract) (Fast Abstract), B46-B47 - B46-B47, English[Refereed]International conference proceedings
- Mar. 2002, Pan-Yellow-Sea International Workshop on Information Technologies for Network Era (PYIWIT'02), 251 - 256, English[Refereed]International conference proceedings
- Springer Verlag, 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2343, 641 - 651, EnglishInternational conference proceedings
- 2002, 2002 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 131 - 134, English[Refereed]International conference proceedings
- Jan. 2002, 16th International Conference on Information Networking (ICOIN-16), 8B2.1 - 2.11, English[Refereed]International conference proceedings
- 2002, PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 237 - 244, English[Refereed]International conference proceedings
- 2002, 2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS, 20 - 23, English[Refereed]International conference proceedings
- Aug. 2001, システム/制御/情報, 45(8) (8), 451 - 460[Refereed]Scientific journal
- Jul. 2001, Int'l Conf. on Information Technology Based Higher Education and Training (ITHET'01), CDROM, English[Refereed]International conference proceedings
- IOS Press, May 2000, Proc. of Sixth Int'l. Workshop on Feature Interactions in Telecommunication Networks and Distributed Systems (FIW'00), 314 - 317, EnglishSecond feature interction contest - Contest report[Refereed]International conference proceedings
- 2000, FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS VI, 163 - 178, EnglishFeature interaction filtering with use case maps at requirements stage[Refereed]International conference proceedings
- Oct. 1999, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E82D(10) (10), 1352 - 1363, EnglishExploiting symmetric relation for efficient feature interaction detection[Refereed]Scientific journal
- Sep. 1999, Information and Software Technology, 41(11) (11), 745 - 754, English[Refereed]Scientific journal
- Dec. 1998, INTEGRATION-THE VLSI JOURNAL, 26(1-2) (1-2), 211 - 223, English[Refereed]Scientific journal
- 1998, FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS V, 187 - 201, EnglishFeature interaction detection using permutation symmetry[Refereed]International conference proceedings
- 1997, THIRD IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 96 - 105, EnglishA synthesis method for fault-tolerant and flexible multipath routing protocols[Refereed]International conference proceedings
- 1997, FEATURE INTERACTIONS IN TELECOMMUNICATION NETWORKS IV, 138 - 152, EnglishPetri-net based detection method for non-deterministic feature interactions and its experimental evaluation[Refereed]International conference proceedings
- 1997, IEEE INFOCOM '97 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1253 - 1260, EnglishAnalyzing non-determinism in telecommunication services using P-invariant of Petri-net model[Refereed]International conference proceedings
- Dec. 1996, COMPUTER COMMUNICATIONS, 19(14) (14), 1200 - 1215, English[Refereed]Scientific journal
- 1996, IEEE INFOCOM '96 - FIFTEENTH ANNUAL JOINT CONFERENCE OF THE IEEE COMPUTER AND COMMUNICATIONS SOCIETIES: NETWORKING THE NEXT GENERATION, PROCEEDINGS VOLS 1-3, 1157 - 1164, EnglishAn integration-oriented approach for designing communication protocols from component-based service specifications[Refereed]International conference proceedings
- Dec. 1994, Proc. of Int'l. Conf. on Information Networking (ICOIN'94), 177 - 182, English[Refereed]International conference proceedings
- Oct. 1994, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E77A(10) (10), 1634 - 1645, EnglishAUTOMATED SYNTHESIS OF PROTOCOL SPECIFICATIONS FROM SERVICE SPECIFICATIONS WITH PARALLELLY EXECUTABLE MULTIPLE PRIMITIVES[Refereed]Scientific journal
- Mar. 2025, 電子情報通信学会技術研究報告, 124(444, LOIS2024-89) (444, LOIS2024-89), 109 - 115, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(444, LOIS2024-87) (444, LOIS2024-87), 93 - 100, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(429,SS2024-64) (429,SS2024-64), 121 - 127, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(444, LOIS2024-88) (444, LOIS2024-88), 101 - 108, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(444, LOIS2024-85) (444, LOIS2024-85), 77 - 84, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(444, LOIS2024-83) (444, LOIS2024-83), 65 - 70, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(444, LOIS2024-86) (444, LOIS2024-86), 85 - 92, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(429,SS2024-48) (429,SS2024-48), 25 - 30, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(429,SS2024-63) (429,SS2024-63), 115 - 120, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(429,SS2024-78) (429,SS2024-78), 208 - 213, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(429,SS2024-79) (429,SS2024-79), 214 - 219, JapaneseTechnical report
- Mar. 2025, 電子情報通信学会技術研究報告, 124(429,SS2024-80) (429,SS2024-80), 220 - 225, JapaneseTechnical report
- Jan. 2025, 電子情報通信学会技術研究報告, 124(334,LOIS2024-54) (334,LOIS2024-54), 15 - 20, JapaneseTechnical report
- Jan. 2025, 情報処理学会/ソフトウェア工学研究会ウィンターワークショップ2025・イン・下関, JapaneseTechnical report
- Jan. 2025, 電子情報通信学会技術研究報告, 124(LOIS2024-67) (LOIS2024-67), 90 - 95, JapaneseTechnical report
- Jan. 2025, 情報処理学会/ソフトウェア工学研究会ウィンターワークショップ2025・イン・下関, JapaneseTechnical report
- Jan. 2025, 電子情報通信学会技術研究報告, 124(334 LOIS2024-58) (334 LOIS2024-58), 38 - 43, JapaneseTechnical report
- Jan. 2025, 情報処理学会/ソフトウェア工学研究会ウィンターワークショップ2025・イン・下関, JapaneseTechnical report
- Jan. 2025, 電子情報通信学会技術研究報告, 124(334, LOIS2024-56) (334, LOIS2024-56), 26 - 31, JapaneseTechnical report
- Jan. 2025, 電子情報通信学会技術研究報告, 124(334, LOIS2024-57) (334, LOIS2024-57), 32 - 37, JapaneseTechnical report
- Jan. 2025, 電子情報通信学会技術研究報告, 124(334, LOIS2024-55) (334, LOIS2024-55), 21 - 25, JapaneseTechnical report
- Jan. 2025, 電子情報通信学会技術研究報告, 124(334, LOIS2024-66) (334, LOIS2024-66), 84 - 89, JapaneseTechnical report
- Jan. 2025, 電子情報通信学会技術研究報告, 124(334, LOIS2024-59) (334, LOIS2024-59), 44 - 49, JapaneseTechnical report
- Nov. 2024, 電子情報通信学会技術研究報告, 124(245 SC2024-32) (245 SC2024-32), 56 - 64, JapaneseTechnical report
- Nov. 2024, 電子情報通信学会技術研究報告, 124(245 SC2024-40) (245 SC2024-40), 108 - 115, JapaneseTechnical report
- Nov. 2024, 電子情報通信学会技術研究報告, 124(245 SC2024-23) (245 SC2024-23), 1 - 6, JapaneseTechnical report
- Nov. 2024, 電子情報通信学会技術研究報告, 124(245 SC2024-23) (245 SC2024-23), 44 - 49, JapaneseTechnical report
- Nov. 2024, 電子情報通信学会技術研究報告, 124(245,SC2024-38) (245,SC2024-38), 95 - 101, JapaneseTechnical report
- Nov. 2024, 電子情報通信学会技術研究報告, 124(245 SC2024-23) (245 SC2024-23), 1 - 6, JapaneseTechnical report
- Nov. 2024, 電子情報通信学会技術研究報告, 124(SC2024-25) (SC2024-25), 13 - 20, JapaneseTechnical report
- Aug. 2024, 電子情報通信学会技術研究報告, 124(160) (160), 42 - 51, EnglishTechnical report
- Aug. 2024, 電子情報通信学会技術研究報告, 124(160) (160), 25 - 30, JapaneseTechnical report
- Aug. 2024, 電子情報通信学会技術研究報告, 124(160, SC2024-18) (160, SC2024-18), 19 - 24, JapaneseTechnical report
- Jun. 2024, 電子情報通信学会技術研究報告, 124(71, SC2024-11) (71, SC2024-11), 60 - 64, JapaneseTechnical report
- Jun. 2024, IEICE Technical Report, 124(71, SC2024-10) (71, SC2024-10), 52 - 59, EnglishTechnical report
- Jun. 2024, 電子情報通信学会技術研究報告, 124(71, SC2024-13) (71, SC2024-13), 71 - 76, JapaneseTechnical report
- Jun. 2024, 電子情報通信学会技術研究報告, 124(71 SC2024-12) (71 SC2024-12), 65 - 70, JapaneseTechnical report
- Jun. 2024, 電子情報通信学会技術研究報告, 124(71) (71), 77 - 82, JapaneseTechnical report
- May 2024, 電子情報通信学会技術研究報告, 124(27, MICT2024-11) (27, MICT2024-11), 54 - 59, JapaneseTechnical report
- Mar. 2024, 電子情報通信学会技術研究報告, 123(414 SS2023-50) (414 SS2023-50), 7 - 12, JapaneseTechnical report
- Mar. 2024, 電子情報通信学会技術研究報告, 123(429, LOIS2023-59) (429, LOIS2023-59), 62 - 69, JapaneseTechnical report
- Mar. 2024, 電子情報通信学会技術研究報告, 123(429, LOIS2023-54) (429, LOIS2023-54), 33 - 38 - 33 - 38, JapaneseTechnical report
- Mar. 2024, 電子情報通信学会技術研究報告, 123(443,KBSE2023-81) (443,KBSE2023-81), JapaneseTechnical report
- Mar. 2024, 電子情報通信学会技術研究報告, 123(443,KBSE2023-83) (443,KBSE2023-83), 96 - 101, JapaneseTechnical report
- Mar. 2024, 電子情報通信学会技術研究報告, 123(429,LOIS2023-60) (429,LOIS2023-60), 070 - 077, JapaneseTechnical report
- Mar. 2024, 電子情報通信学会技術研究報告, 123(429, LOIS2023-61) (429, LOIS2023-61), 078 - 083 - 078 - 083, JapaneseTechnical report
- Mar. 2024, 電子情報通信学会技術研究報告, 123(429,LOIS2023-52) (429,LOIS2023-52), 19 - 26, JapaneseTechnical report
- Mar. 2024, 電子情報通信学会技術研究報告, 123(414) (414), 121 - 126, JapaneseTechnical report
- Feb. 2024, 第5回次世代ソフトウェアエコシステムワークショップ, JapaneseTechnical report
- Feb. 2024, 第5回次世代ソフトウェアエコシステムワークショップ, JapaneseTechnical report
- Feb. 2024, 第5回次世代ソフトウェアエコシステムワークショップ, JapaneseTechnical report
- Dec. 2023, 電子情報通信学会技術研究報告, 123(294, WIT2023-38) (294, WIT2023-38), 76 - 81, JapaneseTechnical report
- Dec. 2023, 電子情報通信学会技術研究報告, 123(294, WIT2023-25) (294, WIT2023-25), 001 - 008, JapaneseTechnical report
- Nov. 2023, 電子情報通信学会技術研究報告, 123(no.270(KBSE), no.271(SC)) (no.270(KBSE), no.271(SC)), 63 - 68, JapaneseTechnical report
- Nov. 2023, 電子情報通信学会技術研究報告, 127(271, SC2023-25) (271, SC2023-25), 45 - 50, JapaneseTechnical report
- Nov. 2023, 電子情報通信学会技術研究報告, 123(no.270(KBSE), no.271(SC)) (no.270(KBSE), no.271(SC)), 51 - 56, JapaneseTechnical report
- Nov. 2023, 電子情報通信学会技術研究報告, 123(271 SC2023-27) (271 SC2023-27), 57 - 62, JapaneseTechnical report
- Nov. 2023, FOSE2023 第30回ソフトウェア工学の基礎ワークショップ・ポスター発表, JapaneseTechnical report
- Aug. 2023, 電子情報通信学会技術研究報告, 123(166) (166), 019 - 025, JapaneseTechnical report
- Aug. 2023, 電子情報通信学会技術研究報告, 123(150, LOIS2023-6) (150, LOIS2023-6), 18 - 22, JapaneseTechnical report
- Jul. 2023, 電子情報通信学会技術研究報告, 123(124,KBSE2023-17) (124,KBSE2023-17), 31 - 36, JapaneseTechnical report
- Jul. 2023, 電子情報通信学会技術研究報告, 123(124 KBSE2023-30) (124 KBSE2023-30), 104 - 109, JapaneseTechnical report
- Jun. 2023, 電子情報通信学会技術研究報告, 123(81, WIT2023-6) (81, WIT2023-6), 30 - 35, JapaneseTechnical report
- Jun. 2023, 電子情報通信学会技術研究報告, 123(81, WIT2023-5) (81, WIT2023-5), 24 - 29, JapaneseTechnical report
- Jun. 2023, 電子情報通信学会技術研究報告, 123(61, SC2023-5) (61, SC2023-5), 24 - 31, JapaneseTechnical report
- Mar. 2023, 電子情報通信学会技術研究報告, 122(423,LOIS2022-62) (423,LOIS2022-62), 35 - 40, JapaneseTechnical report
- Mar. 2023, 電子情報通信学会技術研究報告, 122(432 SS2022-72) (432 SS2022-72), 151 - 156, JapaneseTechnical report
- Mar. 2023, 電子情報通信学会技術研究報告, 122(448 SC2022-45) (448 SC2022-45), 38 - 43, JapaneseTechnical report
- Mar. 2023, 電子情報通信学会技術研究報告, 122(423,LOIS2022-54) (423,LOIS2022-54), 059 - 065, JapaneseTechnical report
- Mar. 2023, 電子情報通信学会技術研究報告, 122(423,LOIS2022-62) (423,LOIS2022-62), 108 - 113, JapaneseTechnical report
- Mar. 2023, 電子情報通信学会技術研究報告, 122(448, SC2022-48) (448, SC2022-48), 55 - 60, JapaneseTechnical report
- Mar. 2023, 電子情報通信学会技術研究報告, 122(423,LOIS2022-62) (423,LOIS2022-62), 083 - 088, JapaneseTechnical report
- Mar. 2023, 電子情報通信学会技術研究報告, 122(448 SC2022-41) (448 SC2022-41), 16 - 21, JapaneseTechnical report
- Mar. 2023, 仮想エージェントとビデオ会議サービスを連携した在宅高齢者の会話機会の創出, 000 - 007, JapaneseTechnical report
- 2023, 情報処理学会研究報告(Web), 2023(MBL-108) (MBL-108)Proposal of Method for Estimating Message Emotions in the LINE Metaverse
- Jan. 2023, 電子情報通信学会技術研究報告, 122(338, LOIS2022-43) (338, LOIS2022-43), 71 - 76, JapaneseTechnical report
- Jan. 2023, 電子情報通信学会技術研究報告, 122(345 KBSE2022-45) (345 KBSE2022-45), 13 - 18, JapaneseTechnical report
- Dec. 2022, 第4回次世代ソフトウェアエコシステムワークショップ, JapaneseTechnical report
- Dec. 2022, 第42回日本看護科学学会学術集会, JapaneseTechnical report
- Dec. 2022, 第42回日本看護科学学会学術集会, JapaneseTechnical report
- Oct. 2022, 第10回看護理工学会学術集会, JapaneseTechnical report
- Sep. 2022, 日本機械学会 第 32 回設計工学・システム部門講演会, (1204) (1204), JapaneseTechnical report
- May 2022, 電子情報通信学会技術研究報告, 122(50, SC2022-5) (50, SC2022-5), 25 - 30, Japanese医学教育のための臨床現場の安全なストリーミングシステムの開発Technical report
- Mar. 2022, 第3回次世代ソフトウェアエコシステムワークショップ・ポスター発表, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(416 SS2021-57) (416 SS2021-57), 90 - 96, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(424) (424), 018 - 023, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(437, SC2021-48) (437, SC2021-48), 75 - 80, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(437, SC2021-43) (437, SC2021-43), 45 - 52, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(437 SC2021-47) (437 SC2021-47), 71 - 74, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(416) (416), 151 - 156, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(401 LOIS2021-42) (401 LOIS2021-42), 14 - 21, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(437 SC2021-47) (437 SC2021-47), JapaneseTechnical report
- Mar. 2022, 第3回次世代ソフトウェアエコシステムワークショップ, JapaneseTechnical report
- Mar. 2022, 第3回次世代ソフトウェアエコシステムワークショップ・ポスター発表, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(416) (416), 157 - 162, JapaneseTechnical report
- Mar. 2022, 電子情報通信学会技術研究報告, 121(401, LOIS2021-41) (401, LOIS2021-41), 7 - 13, JapaneseTechnical report
- Mar. 2022, 信学技報, 121(424) (424), 24 - 29, JapaneseTechnical report
- Nov. 2021, 電子情報通信学会技術研究報告, 121(229) (229), 31 - 36, JapaneseTechnical report
- Nov. 2021, 電子情報通信学会技術研究報告, 121(229) (229), 037 - 042, JapaneseTechnical report
- Sep. 2021, 老年精神医学雑誌, 32, 124 - 124, JapaneseTechnical report
- Sep. 2021, 日本機械学会 第 31 回設計工学・システム部門講演会, (3408) (3408), JapaneseTechnical report
- Sep. 2021, 日本機械学会 第 31 回設計工学・システム部門講演会, (3407) (3407), JapaneseTechnical report
- Aug. 2021, 電子情報通信学会技術研究報告, 121(157 SC2021-16) (157 SC2021-16), 24 - 31, JapaneseTechnical report
- Aug. 2021, 電子情報通信学会技術研究報告, 121(157 SC2021-16) (157 SC2021-16), 32 - 37, JapaneseTechnical report
- Jun. 2021, 日本認知症予防学会学術集会プログラム・予稿集, JapaneseTechnical report
- Jun. 2021, 日本認知症予防学会学術集会プログラム・予稿集, 276 - 276, JapaneseTechnical report
- Jun. 2021, 第10回⽇本認知症予防学会学術集会, O23(5) (5), 288 - 288, JapaneseTechnical report
- Mar. 2021, 電子情報通信学会技術研究報告, 120(432, HCS2020-75) (432, HCS2020-75), 43 - 48, JapaneseTechnical report
- Mar. 2021, 電子情報通信学会技術研究報告, 120(434, SC2020-42) (434, SC2020-42), 55 - 61, JapaneseTechnical report
- Mar. 2021, 電子情報通信学会技術研究報告, 120(432, HCS2020-78) (432, HCS2020-78), 60 - 66, JapaneseTechnical report
- Mar. 2021, 電子情報通信学会技術研究報告, 120(434) (434), 43 - 48, JapaneseTechnical report
- Mar. 2021, 電子情報通信学会技術研究報告, 120(434) (434), 049 - 054, JapaneseTechnical report
- Mar. 2021, 電子情報通信学会技術研究報告, 120(432, HCS2020-74) (432, HCS2020-74), 37 - 42, JapaneseTechnical report
- 2021, 情報処理学会研究報告(Web), 2021(SE-209) (SE-209)Pursuing a Support by Abstraction of program Executions based on Concerns and their Comparison
- Jan. 2021, 電子情報通信学会技術研究報告, 120(324) (324), 87 - 92, JapaneseTechnical report
- Jan. 2021, 電子情報通信学会技術研究報告, 120(324,LOIS2020-38) (324,LOIS2020-38), 93 - 99, JapaneseTechnical report
- Jan. 2021, 電子情報通信学会技術研究報告, 120(324, LOIS2020-39) (324, LOIS2020-39), 100 - 107, JapaneseTechnical report
- Nov. 2020, 電子情報通信学会技術研究報告, 120(232 SC2020-31) (232 SC2020-31), 13 - 19, JapaneseTechnical report
- Nov. 2020, 電子情報通信学会技術研究報告, 120(232 SC2020-31) (232 SC2020-31), 63 - 69, JapaneseTechnical report
- Aug. 2020, 電子情報通信学会技術研究報告, 120(136, HCS2020-34) (136, HCS2020-34), 77 - 82, JapaneseTechnical report
- Aug. 2020, 電子情報通信学会技術研究報告, 120(136, HCS2020-33) (136, HCS2020-33), 71 - 76, JapaneseTechnical report
- May 2020, 電子情報通信学会技術研究報告, 120(49, SC2020-1) (49, SC2020-1), 1 - 6, JapaneseTechnical report
- Mar. 2020, 電子情報通信学会技術研究報告, 119(482, SC2019-36) (482, SC2019-36), 9 - 16, JapaneseEVIDENT:神経心理学的描画検査における描画過程の可視化及び可視化インターフェースSummary national conference
- Mar. 2020, 電子情報通信学会技術研究報告, 119(477, LOIS2019-80) (477, LOIS2019-80), 163 - 168, JapaneseTechnical report
- Mar. 2020, 電子情報通信学会技術報告, (SC2019-37) (SC2019-37), 17 - 22, JapaneseTechnical report
- Mar. 2020, 電子情報通信学会技術報告書, 119(477, LOIS2019-83) (477, LOIS2019-83), 157 - 162, JapaneseTechnical report
- Mar. 2020, 電子情報通信学会技術報告書, (SC2019-35) (SC2019-35), 1 - 8, JapaneseTechnical report
- Mar. 2020, 電子情報通信学会技術報告書, (LOIS2019-82) (LOIS2019-82), 151 - 156, JapaneseTechnical report
- Mar. 2020, 電子情報通信学会技術研究報告, (LOIS2019-80) (LOIS2019-80), 139 - 144, JapaneseTechnical report
- Mar. 2020, 電子情報通信学会技術報告書, (LOIS2019-82) (LOIS2019-82), 145 - 150, JapaneseTechnical report
- Nov. 2019, Services Computing (SC), (SC2019-25) (SC2019-25), 31 - 36, JapaneseTechnical report
- Nov. 2019, ソフトウェア工学の基礎ワークショップ FOSE2019, Japanese[Refereed]
- Sep. 2019, 日本機械学会 第 29 回設計工学・システム部門講演会, (2413) (2413), JapaneseTechnical report
- 日本ソフトウェア科学会, Aug. 2019, 日本ソフトウェア科学会 第36回大会(2019年度)講演論文集, 36, 6p - 50, JapaneseAnalysis of a PBL-based Practical Education Course using Self and Objective EvaluationsSummary national conference
- Aug. 2019, 日本ソフトウェア科学界第36回大会, JapaneseTechnical report
- Aug. 2019, 電子情報通信学会技術報告書, (WIT2019-9) (WIT2019-9), 1 - 6, JapaneseTechnical report
- Aug. 2019, 電子情報通信学会技術報告書, 119(178, SC2019-13) (178, SC2019-13), 5 - 10, JapaneseTechnical report
- Aug. 2019, 電子情報通信学会技術報告, (SWIM2019-17,SC2019-17) (SWIM2019-17,SC2019-17), 29 - 34, JapaneseTechnical report
- Aug. 2019, 電子情報通信学会技術報告書, (WIT2019-10) (WIT2019-10), 7 - 12, JapaneseTechnical report
- May 2019, 電子情報通信学会技術研究報告, 119(66, SC2019-6) (66, SC2019-6), 33 - 38, JapaneseTechnical report
- Mar. 2019, 電子情報通信学会技術研究報告, 118(485, LOIS2018-68) (485, LOIS2018-68), 79 - 84, JapaneseTechnical report
- Mar. 2019, 電子情報通信学会技術報告書, 118(511, SC2018-40) (511, SC2018-40), 19 - 24, JapaneseTechnical report
- Mar. 2019, 電子情報通信学会技術報告書, 118(485, LOIS2018-70) (485, LOIS2018-70), 85 - 90, JapaneseTechnical report
- Mar. 2019, 電子情報通信学会技術報告書, 118(511, SC2018-41) (511, SC2018-41), 25 - 30, JapaneseTechnical report
- Mar. 2019, 電子情報通信学会技術研究報告, 118(511, SC2018-38) (511, SC2018-38), 7 - 12, JapaneseTechnical report
- Mar. 2019, 電子情報通信学会技術研究報告, 118(485, LOIS2018-68) (485, LOIS2018-68), 73 - 78, JapaneseTechnical report
- 2019, 日本ソフトウェア科学会大会講演論文集(Web), 36th実践的人材育成コースにおける自己評価と客観評価にもとづく社会人基礎力の分析
- Jan. 2019, Winter Workshop 2019 in Fukushima Iizaka, JapaneseOn the Necessity and Implementation about Expression Watching by Java Debuggers[Refereed]
- Jan. 2019, 電子情報通信学会技術研究報告, 118(420, LOIS2018-49) (420, LOIS2018-49), 41 - 46, JapaneseTechnical report
- Jan. 2019, 第5 回実践的IT 教育シンポジウム(rePiT2019)論文集, (86) (86), 1 - 10, JapaneseAn empirical report of nurturing practical engineer course based on questionnaire results for students[Refereed]
- Dec. 2018, 電子情報通信学会技術研究報告, (DE2018-24) (DE2018-24), 023 - 028, JapaneseTechnical report
- Nov. 2018, 日本機械学会 第 28 回設計工学・システム部門講演会講演論文集, (1309) (1309), JapaneseTechnical report
- Nov. 2018, World Data Viz Challenge 2018 (WDVC2018), Kobe Round, English[Refereed]Summary international conference
- Nov. 2018, World Data Viz Challenge 2018 (WDVC2018), Barcelona Round, English[Refereed]Summary international conference
- Nov. 2018, World Data Viz Challenge 2018 (WDVC2018), Barcelona Round, English[Refereed]Summary international conference
- Nov. 2018, 電子情報通信学会技術報告書, (SC2018-23) (SC2018-23), 1 - 6
- Nov. 2018, 電子情報通信学会技術報告書, (SC2018-24) (SC2018-24), 7 - 12
- Aug. 2018, 電子情報通信学会技術研究報告, 118(195, SC2018-19) (195, SC2018-19), 31 - 36, Japanese画像に基づくコグニティブAPIの宅内センシングへの適用可能\性
- Aug. 2018, 電子情報通信学会技術研究報告, (SC2018-16) (SC2018-16), 15 - 20
- Aug. 2018, 電子情報通信学会技術報告書, 118(180,WIT2018-19) (180,WIT2018-19), 33 - 38
- Aug. 2018, 電子情報通信学会技術報告書, WIT2018-18, 27 - 32
- Aug. 2018, 電子情報通信学会技術研究報告, (SC2018-22) (SC2018-22), 45 - 50
- Jun. 2018, SC研究会, (SC2018-2) (SC2018-2), 7 - 12
- Mar. 2018, DEIM Forum 2018論文集
- Mar. 2018, 電子情報通信学会技術報告書, LOIS2017-87, 93 - 98, Japanese認知症者のための音声対話システムにおける個人向けヴァーチャルエージェントの生成
- Mar. 2018, 電子情報通信学会技術報告書, LOIS2017-89, 105 - 110, Japaneseコグニティブコンピューティングによる顔感情解析を用いたケア効果の定量的
- Mar. 2018, 電子情報通信学会技術研究報告, 117(512, SC2017-31) (512, SC2017-31), 1 - 6
- Mar. 2018, 電子情報通信学会技術報告書, LOIS2017-85, 81 - 86
- Mar. 2018, 電子情報通信学会技術報告書, LOIS2017-86, 87 - 92
- Feb. 2018, World Data Viz Challenge 2017 (WDVC2017), Kobe Round, English[Refereed]Summary international conference
- Feb. 2018, World Data Viz Challenge 2017 (WDVC2017), Kobe Round, English[Refereed]Summary international conference
- Dec. 2017, 情報処理学会研究報告データベースシステム(DBS), 2017-DBS-166(4) (4), pp. 1 - 6
- Nov. 2017, IEICE Technical Report, (IA2017-41) (IA2017-41), 49 - 52, English
- 電子情報通信学会, Nov. 2017, 電子情報通信学会技術研究報告, 117(271, SC2017-29) (271, SC2017-29), 37 - 42, JapaneseGenerating dialogues corresponding to user's age for Home Dementia Counseling System
- 電子情報通信学会, Nov. 2017, IEICE Technical Report, 117(IA2017-42) (IA2017-42), 53 - 56, EnglishA methodology of dynamic topics creation for dementia counseling system exploiting internet resources
- 電子情報通信学会, 19 Oct. 2017, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117(250) (250), 17 - 22, JapanesePrototyping Tales of Familiar and Adapting for Real-World Operation
- 電子情報通信学会, Oct. 2017, 電子情報通信学会技術研究報告, 117(250, SP2017-52) (250, SP2017-52), 101 - 106, JapaneseMachine Learning Approach to Recognizing Indoor Activities based on Environment Sensing and Activity Logs on Changing Points
- 日本ソフトウェア科学会, 18 Sep. 2017, 日本ソフトウェア科学会大会論文集, 34, 317 - 322, JapaneseCourse Design for Training AI and BigData Experts Using Automatic Ordering Problem
- Sep. 2017, 日本ソフトウェア科学会大会 第34回大会 予稿集, Japaneseデバッグ作業者の内面分析支援を目的とした障害発生過程の実体化手法
- Sep. 2017, 日本機械学会 第 27 回設計工学・システム部門講演会講演論文集, 17-32(2407) (2407)
- 映像情報メディア学会, Sep. 2017, 電子情報通信学会技術研究報告, 117(199, LOIS2017-22) (199, LOIS2017-22), 65 - 70, JapaneseCharacteristic Evaluations of Probabilistic Location Information using Geographic Coordinate Information and Pass-by Information
- Aug. 2017, 電子情報通信学会技術研究報告, 117(184, SC2017-21) (184, SC2017-21), 45 - 50
- 電子情報通信学会, Jun. 2017, SC研究会, 117(75) (75), 41 - 46, EnglishAnalyzing Indoor Environment Sensing Data for Recognizing ADL of One Person Household
- Mar. 2017, 電子情報通信学会技術研究報告, 116(488, LOIS2016-68) (488, LOIS2016-68), 35 - 40, Japanese在宅認知症者の日常カウンセリングシステムのための個人向け話題生成
- Mar. 2017, 電子情報通信学会技術研究報告, 116(518, SC2016-37) (518, SC2016-37), 051 - 056, Japanese個人適応防犯情報サービス PRISM を用いた街頭犯罪の可視化と分析
- Mar. 2017, 電子情報通信学会技術研究報告, 116(518, SC2016-36) (518, SC2016-36), 45 - 50
- Mar. 2017, 電子情報通信学会技術研究報告, 116(488, LOIS2016-68) (488, LOIS2016-68), 13 - 18
- Feb. 2017, 電子情報通信学会技術報告, 116(453, WIT2016-63-WIT2016-75) (453, WIT2016-63-WIT2016-75), 19 - 24
- 2017, 日本ソフトウェア科学会大会講演論文集(CD-ROM), 34th, ROMBUNNO.rePiT2‐1, Japanese自動発注問題を題材としたビッグデータ・AI技術に対する実践的人材育成コースの設計
- 電子情報通信学会, Jan. 2017, 電子情報通信学会技術研究報告, 116(405,LOIS2016-49) (405,LOIS2016-49), 7 - 12, Japanese宅内の環境変化と声掛けに基づく在宅高齢者の日常生活行動センシングシステムの検討
- Jan. 2017, 情報処理学会/ソフトウェア工学研究会 ウィンターワークショップ2017・イン・飛騨高山, 57 - 58, Japanese絶対位置情報と相対位置情報を活用した確率的位置情報の導出に関する考察
- Jan. 2017, 情報処理学会/ソフトウェア工学研究会 ウィンターワークショップ2017・イン・飛騨高山, 55 - 56, Japaneseバーチャルエージェントを活用した認知症者の日常カウンセリングの提案
- 電子情報通信学会, 15 Dec. 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116(362) (362), 69 - 74, JapaneseA study of a method of delivery narrative using stuffed doll in narrative delivery service for individuals
- Dec. 2016, 電子情報通信学会技術研究報告, 116(362, IA2016-72) (362, IA2016-72), 053 - 058, Japaneseオープンデータを活用した個人適応防犯情報サービスの開発
- 電子情報通信学会, 04 Nov. 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116(287) (287), 33 - 38, JapaneseDeveloping Street Job-matching Service Using Pass-By Framework
- 電子情報通信学会, 04 Nov. 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116(287) (287), 1 - 6, JapaneseA Study of Topic Delivery Service for Individuals Using IoT
- Oct. 2016, 電子情報通信学会技術研究報告, 7 - 8, English
- Sep. 2016, 日本ソフトウェア科学会第 33 回大会, FOSE3-2, Japaneseデバッグ時の診断作業の質的な分析に向けた事例研究
- 電子情報通信学会, 26 Aug. 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 116(201) (201), 31 - 36, JapaneseA Study on Mission-Oriented Environment Sensing based on Military Analogy
- Jun. 2016, 電子情報通信学会技術研究報告, 116(76, SC2016-5) (76, SC2016-5), 21 - 22
- May 2016, 電子情報通信学会技術研究報告, 115(486) (486), 19 - 24, JapaneseすれちがいフレームワークのためのBLEを用いた近接検知機構の実装と評価
- 電子情報通信学会, 25 Mar. 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115(520) (520), 31 - 36, EnglishImplementing Execution Platform for Managing Context-Aware Services Based on Heterogeneous and Distributed Web Services (サービスコンピューティング)
- 電子情報通信学会, 25 Mar. 2016, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115(520) (520), 25 - 30, EnglishCloud-based Aggregation Service for Heterogeneous Indoor Location (サービスコンピューティング)
- Mar. 2016, 電子情報通信学会技術研究報告, 115(486, LOIS2015-67) (486, LOIS2015-67), 25 - 30, Japanese自律センサボックスを活用したスマートシティ屋内環境センシングサービスの開発
- Mar. 2016, 情報処理学会研究報告, ソフトウェア工学研究会, 2016-SE-191(1) (1), 1 - 6
- Jan. 2016, 電子情報通信学会技術研究報告, 115(437,ASN2015-93) (437,ASN2015-93), 81 - 86
- Jan. 2016, 電子情報通信学会技術研究報告, 115(437, ASN2015-92) (437, ASN2015-92), 75 - 80
- Dec. 2015, 電子情報通信学会技術報告, 115(354, WIT2015-63-WIT2015-87) (354, WIT2015-63-WIT2015-87), 1 - 6
- 電子情報通信学会, Dec. 2015, 電子情報通信学会技術研究報告, 115(371) (371), 19 - 24, JapaneseDesigning Feature of Generating and Storing Common Pass-by Data in Pass-by Framework
- Sep. 2015, 日本ソフトウェア科学会 第32回大会 講演論文集, 32nd, 5p, Japaneseソフトウェア開発PBLにおけるAWS in Education助成プログラムの活用Summary national conference
- Sep. 2015, 32nd Annual Conference of Japan Society of Software Science and Technologyy, JapaneseToward Personalized Support for Back-in-Time Debugging
- Aug. 2015, ソフトウェアエンジニアリングシンポジウム, 170 - 175, JapaneseHTML/CSS/JavaScriptに対するサイズ最適化リテラシの醸成に向けて
- Jul. 2015, 電子情報通信学会技術研究報告, 115(138, LOIS2015-10) (138, LOIS2015-10), 7 - 12
- Mar. 2015
- Mar. 2015, 電子情報通信学会技術報告, 114(500, LOIS2014-61-LOIS2014-95) (500, LOIS2014-61-LOIS2014-95), 191 - 196
- Mar. 2015, 電子情報通信学会技術研究報告, 114(500, LOIS2014-61-LOIS2014-95) (500, LOIS2014-61-LOIS2014-95), 179 - 184
- Jan. 2015, Winter Workshop 2015 in Ginowan, JapaneseDesigning an Omniscient Debugger that Leverages Maintainers’ Knowledge Efficiently
- Implementation of Appliance Controller Service in Cloud-Based Home Network ServiceHome network system (HNS) provides a variety of value-added services by orchestrating house-hold appliances and sensors. In our previous research, we have proposed Cloud HNS that delegates all of HNS functions to Cloud. In this paper, we propose IRaaS (Infrared as a Service) which controls legacy house-hold appliances based on infrared signal controlling, as a Cloud HNS service. IRaaS is consist of two components, IR Proxy and jRemocon. IR Proxy is a service that delegates control request to jRemocon, and jRemocon is a device that transmits infrared signal to execute appliance control. Using its components, IRaaS executes requested appliance control. Then, we design and consider elements required for implementing IRaaS, and we also create and test a prototype. Based on these results, we discuss the effectiveness of proposed system.The Institute of Electronics, Information and Communication Engineers, Jan. 2015, 電子情報通信学会技術研究報告, 114(439, IA2015-79) (439, IA2015-79), 67 - 72, Japanese
- Jan. 2015, 電子情報通信学会技術研究報告, 114(439, IA2014-79-IA2014-91) (439, IA2014-79-IA2014-91), 49 - 54
- Nov. 2014, 電子情報通信学会技術研究報告, 114(319) (319), 27 - 32
- Considering Architecture for Managing House Log in Cloud-Based Home Network SystemWe have been developing a novel home network system, called Cloud-HNS, which manages home servers and all the services within a cloud. The HNS services often use house log which is log data gathered from the environment and devices in a house. Since the house log contains security-privacy information, the house log must be managed carefully in cloud-HNS. In this paper, we propose a new architecture to manage the house log in the cloud-HNS. In the proposed architecture, for every house, a dedicated virtual home server manages the private log of the house. Also, a shared virtual city server is deployed to manage public de-identified data. The virtual home server provides home services for individual household, whereas the virtual city server provides smart city services using the data gathered from multiple houses within the city. In this paper, we also develop a prototype system that collects house log in the cloud, using a sensor box and Raspberry Pi.The Institute of Electronics, Information and Communication Engineers, 24 Oct. 2014, IEICE technical report. SC, Services Computing, 114(277) (277), 55 - 60, Japanese
- Considering Architecture for Managing House Log in Cloud-Based Home Network System我々のグループでは,ホームサーバやサービスを全てクラウドで管理する新たなホームネットワークシステム (HNS) 「クラウド型 HNS」 の研究開発を行っている.HNS サービスは宅内の機器や環境のログデータ (住宅 ログ) を利用するが,住宅ログにはセキュリティ・プライバシ情報が含まれるため,クラウドでの管理には注意が必要である.本論文では,クラウド型 HNS において住宅ログを管理するための新たなアーキテクチャを提案する.提案アーキテクチャでは,各家のプライベートなログを管理する仮想ホームサーバと,匿名化された公開可能なログを町単位で管理する仮想シティサーバで構成する.仮想ホームサーバは家ごとのホームサービスを提供し,仮想シティサーバは町中の HNS から収集したデータを活用したスマートシティサービスを提供する.また本論文では,各家からクラウドに住宅ログを収集するシステムをセンサボックスと Raspberry Pi を用いて試作する.We have been dev17 Oct. 2014, 研究報告教育学習支援情報システム(CLE), 2014(10) (10), 1 - 6, Japanese
- Aug. 2014, マルチメディア,分散,協調とモバイル(DICOMO2014)シンポジウム, 2062 - 2069
- Jul. 2014, 電子情報通信学会技術報, 114(150) (150), 11 - 16
- Jun. 2014, 電子情報通信学会技術研究報告, 114(110,IN2014-28) (110,IN2014-28), 73 - 78
- Considering Common Data Model for Indoor Location-aware ServicesRecently, research and development have been conducted on the Indoor Positioning System (IPS), which identifies locations of various indoor objects. The indoor location is promising to achieve sophisticated Indoor Location-Aware Services (InLAS), and some practical services come onto market. However, the conventional system does not supposed to reuse the data and program of the indoor locations of another system. This makes the system complex and difficult to manage. To cope with the problem, this paper presents Data Model for Indoor Location (DM4InL), which prescribes a common data model independent of implementation of IPS or the usage of InLAS. The proposed DM4InL represents the location of every indoor object in a standard way, by using three kinds of models: position, building and object models. The proposed method achieves loose-coupling of InLAS and IPS, which significantly improves the efficiency and reusability in the InLAS development.The Institute of Electronics, Information and Communication Engineers, 07 Mar. 2014, IEICE technical report. Life intelligence and office information systems, 113(479) (479), 101 - 106, Japanese
- Mar. 2014, ソフトウェアサイエンス研究会(SS), Japaneseフレームワーク・アプリケーションに於ける予期せぬ副作用の効率的なデバッグに向けて
- Mar. 2014, 電子情報通信学会技術研究報告, 113(470, MVE2013-97) (470, MVE2013-97), 169 - 174
- Mar. 2014, 電子情報通信学会技術報告, 113(479, LOIS2013-70) (479, LOIS2013-70), 95 - 100
- Mar. 2014, 電子情報通信学会技術報告, 113(479, LOIS2013-69) (479, LOIS2013-69), 89 - 94
- Developing Cloud Service for Controlling Home AppliancesThe programmable remote control system is a convenient tool that can consolidate multiple controllers of various house-hold appliances. It is also adopted in the emerging home network systems. However, the control signals of appliances are registered and maintained within individual home, which imposes a heavy burden on a home user. To cope with the problem, this paper presents Remocon as a Service (RaaS), an appliance remote controller service using the cloud computing. The key idea is to manage and share all the control signals within the cloud, and provide the signals as service for various users and applications. By using the cloud, RaaS overcomes the problem of the signal registration and management. It also decouples the feature of remote control from user interface, which achieves a variety of remote control applications. In this paper, we focus on the conventional infrared remote control (IrDA), and discuss the architecture, primary databases, and user interface of RaaS. We also implement a prototype of a signal transmission module of RaaS using Raspberry Pi and LIRC, in order to see practical feasibility.The Institute of Electronics, Information and Communication Engineers, 13 Feb. 2014, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 113(432) (432), 1 - 6, Japanese
- Feb. 2014, 電子情報通信学会技術報告, 113(431,CNR2013-29) (431,CNR2013-29), 41645, Japaneseクラウドを活用した家電リモコンサービスの検討
- Feb. 2014, 電子情報通信学会技術報告, 113(432, CNR2013-40) (432, CNR2013-40), 61 - 66
- A Simulation Framework of Virtual Load for Auto-Scaling Exercise in Cloud Computing EducationIn the current information technology society where the cloud services are generally spread, it is a societal and important challenge to promote cloud computing education. In this paper, we propose a framework of virtual load simulation which replicate the response time to conduct auto scalling exercise in cloud education curriculum. The proposed framework replicate the response time of cloud services by using thread waiting methods such as sleep command. This allows us to have experience of virtualized auto scalling situation without actual load to physical computing resources. In addition, we report expertise obtained in an actual auto scaling exercise which conducted as a part of ministry's educational program.The Institute of Electronics, Information and Communication Engineers, 10 Jan. 2014, IEICE technical report. SC, Services Computing, 113(376) (376), 7 - 12, Japanese
- Jan. 2014, ウィンターワークショップ2014・イン・大洗, Japaneseフレームワーク誤用による副作用の可視化手法
- Jan. 2014, 電子情報通信学会技術研究報告, 113(399, ASN2013-129) (399, ASN2013-129), 67 - 70
- Jan. 2014, ウィンターワークショップ2014・イン・大洗
- Implementing Materialized View as a Service for Large-Scale House Log in Smart CityWe have proposed a logging platform, called Scallop4SC(Scalable Logging Platform for Smart City), for managing various and large-scale log data from smart houses within a smart city. Moreover, we design that Scallop4SC provides MVaaS(Materialized View as a Service), which supports processing and using house log efficiently. In this paper, we implement an architecture of MVaaS using MapReduce on Hadoop and HBase KVS. Concretely, MVaaS automatically generates MapReduce programs with a spec for processing log data. The spec are drawn based on retrieval conditions or processing method for house log. By treating MVaaS, a developer of an application can dynamically create and efficiently access smart city data by only describing data specification for the application.The Institute of Electronics, Information and Communication Engineers, 19 Dec. 2013, IEICE technical report. Information networks, 113(363) (363), 95 - 100, Japanese
- A Framework for Personal Sensor Box in Mobile Environmental SensingThe mobile environmental sensing, where mobile users measure surrounding information with hand-held sensors, is a powerful means of the participatory sensing. We are studying the personal sensor box, by which individual user performs personalized mobile sensing with favorite sensors. This paper presents an application framework for the personal sensor box that enhances the flexibility of the applications towards the variety of sensor configurations. The proposed framework consists of three layers: (1) ConcreteSensor Layer, wrapping sensor devices and implementing device-specific operations, (2) AbstractSensor Layer, abstracting the devices with common sensor operations, (3) SensorBox Layer, aggregating multiple sensors and providing measured data for various applications. The proposed framework allows a user to flexibly customize his sensor box, and to easily implement applications using the customized box. We develop a prototype of a personal sensor box with 9 kinds of Phidgets sensors.The Institute of Electronics, Information and Communication Engineers, 28 Nov. 2013, IEICE technical report. Life intelligence and office information systems, 113(327) (327), 51 - 56, Japanese
- Implementing Execution Platform for Managing Context-Aware Services Based on Heterogeneous and Distributed Web ServicesWith the spread of Machine-to-Machine (M2M) and cloud services, we have become to be able to use heterogeneous and distributed data. Implementation of the service which judges the context and controls autonomous from these data is expected. We have previously proposed the framework, which can create and manage in a unified manner context-aware services using heterogeneous and distributed Web services (sensor services, information system, state of appliance services and so on). The proposed framework consists of five layers and we define the context based on the data of the existing Web services, and then define the context-aware service by the ECA rule that is a set of event, condition and action. In this paper, we implement a platform based on the framework. The platform has the functions to register, delete, get and edit elements in each layer and to run the services. We implement these using Java, and publish APIs as the Web service.The Institute of Electronics, Information and Communication Engineers, Nov. 2013, 電子情報通信学会技術報告, 113(327, LOIS2013-36) (327, LOIS2013-36), 71 - 76, Japanese
- Nov. 2013, 電子情報通信学会技術報告, 113(303) (303), 53 - 58
- Nov. 2013, 電子情報通信学会技術研究報告, 113(303) (303), 29 - 34
- Nov. 2013, 電子情報通信学会技術研究報告 情報セキュリティ, 113(326) (326), 77 - 82
- Nov. 2013, 電子情報通信学会技術報告, 113(326, LOIS2013-38) (326, LOIS2013-38), 83 - 88
- Implementing Caching Mechanism to Improve Efficiency of Service-Oriented Mining Software RepositoryWe have proposed a framework called SO-MSR (Service-Oriented Mining Software Repository), which applied service-oriented architecture to MSR techniques. Following the SO-MSR, we have developed a web service, named MetricsWebAPI, for metrics calculation from a variety of software repositories and a variety source codes. One of the challenges of MetricsWebAPI is low usability in terms of response time for MSR processing requests. The goal of this paper is to improve service interaction for MSR services deployed in SO-MSR. In this paper, we apply a caching mechanism and asynchronous API to MSR services. In MSR processing, all of repository data are past logs and processed result can be reused to other MSR services if once MSR applied to the repository data. Asynchronous API realizes parallel and batch processing to MSR services. We have conducted a experimentalevaluation to confirm the efficiency of applying a caching mechanism to MSR services.Information Processing Society of Japan (IPSJ), 17 Oct. 2013, IPSJ SIG Notes, 2013(12) (12), 1 - 6, Japanese
- Oct. 2013, 第182回ソフトウェア工学研究発表会フレームワークアプリケーションに於ける副作用の兆候を抽出する動的解析手法
- Oct. 2013, 電子情報通信学会技術報告, 113(245, IN2013-77) (245, IN2013-77), 1 - 6
- Oct. 2013, 電子情報通信学会技術研究報告, 113(269) (269), 73 - 78
- [日本ソフトウェア科学会], 10 Sep. 2013, 日本ソフトウェア科学会大会論文集, 30, 305 - 311, JapaneseCloud Spiral : Cloud Specialist Program Initiative for Reality-based Advanced Learning
- 映像情報メディア学会, Sep. 2013, 電子情報通信学会技術報, 113(210,IN2013-10) (210,IN2013-10), 1 - 6, Japaneseホームネットワークシステムにおけるプレゼンスセンシングのためのサービスフレームワークの提案
- Report of Winter Workshop 2013 in Nasu (WWS2013)IPSJ Special Interest Group of Software Engineering (SIGSE) holds a workshop focusing on deep discussion among participants once a year. In the fiscal year of 2012, we had a workshop in Nasu, Tochigi prefecture, January 2013. We had a deep discussion about recent issues and future direction of software engineering. In this paper, we report each discussion held in each special theme session and the whole workshop.Information Processing Society of Japan (IPSJ), 10 Jul. 2013, IPSJ SIG Notes, 2013(11) (11), 1 - 8, Japanese
- The Institute of Electronics, Information and Communication Engineers, 05 Mar. 2013, Proceedings of the IEICE General Conference, 2013(2) (2), "SS - 37"-"SS-38", JapaneseBT-2-4 Can ICT Contribute to Work-Life Balance?
- Mar. 2013, 電子情報通信学会技術研究報告 SS2012-60, IEICE-112(458) (458), 7 - 12, JapaneseMapReduceを用いた大規模消費電力ログの体現ビュー実現手法
- Mar. 2013, 第179回ソフトウェア工学研究発表会フレームワークアプリケーションの抽象化のための動的解析手法
- Mar. 2013, 電子情報通信学会技術研究報告 SS2012-59, IEICE-112(458) (458), 1 - 6
- Mar. 2013, 電子情報通信学会技術研究報告 SS2012-81, IEICE-112(457) (457), 127 - 132
- Mar. 2013, 電子情報通信学会技術研究報告 SS2012-61, IEICE-112(458) (458), 13 - 18
- Jan. 2013, ウィンターワークショップ2013・イン・那須動的解析によるフレームワーク学習に向けて[Refereed]
- Introducing Multiple Microphone Arrays for Enhancing Smart Home Voice ControlWe have previously developed a voice control system for a home network system (HNS), using a microphone array technology. Although the microphone array achieved a convenient hands-free controller, a single array had limitations on coverage of sound collection and speech recognition rate. In this paper, we try to overcome the limitations by increasing the number of the microphone arrays. Specifically, we construct a microphone array network using four separate arrays, and enhance algorithms of sound source localization (SSL) and sound source separation (SSS) on the network. We also conduct an experimental evaluation, where precision of SSL and speech recognition rate are evaluated in a real HNS test-bed. As a result, it is shown that the usage of multiple arrays significantly improves the coverage and speech recognition ratio, compared with the previous system.The Institute of Electronics, Information and Communication Engineers, Jan. 2013, 電子情報通信学会技術研究報告, 112(388) (388), 19 - 24, English
- Jan. 2013, 電子情報通信学会技術研究報告 IN2012-143, IEICE-112(393) (393), 27 - 32
- Dec. 2012, ソフトウェア工学の基礎XIX,ソフトウェア工学の基礎ワークショップFOSE2012, 151 - 16-命令の乱雑さに基づくプログラム理解性の評価[Refereed]
- Considering HTable Table Design for Efficient Attribute SearchOur long-term goal is to establish a generic datastore and a service platform for bigdata where heterogeneous applications can share and use the bigdata horizontally. The emerging key-value store (KVS), including HBase, has been proven to be useful for managing the bigdata. However, design of a KVS-based datastore often depends heavily on the application how the data is used and searched. This significantly declines generality and extensibility of the datastore. In this paper, we present a design method of HBase tables that achieves generic data search by various attributes. The key idea is to construct an index table in which all permutations of attribute values are used as row keys, pointing to contents of a main data table. The index table allows efficient data retrieval by any attribute specified by applications. A case study using smart city log illustrates practical feasibility of the method.The Institute of Electronics, Information and Communication Engineers, 09 Nov. 2012, IEICE technical report. SC, Services Computing, 112(299) (299), 1 - 6, Japanese
- Implementing API of Large-scale House Log Data Platform in Smart CitySmart city is a next-generation city planning. In the smart city, some value-added services are provided using wide variety of logs collected from various appliances and sensors. In our previous work, we have been proposed and developed a smart city platform, called Scallop4SC that supports collecting and processing the extremely large-scale log data. This system stores variety of logs on key-value store, and supports the statistical processing of the logs on Hadoop. And we designed a meta-data scheme for smart city configuration information, designed Scallop4SCAPIs for accessing stored logs and meta-data. In this paper, we implement storing house logs and Scallop4SCAPIs based on previous work, and implement concrete application using Scallop4SC. And we discuss about the current state of Scallop4SC.The Institute of Electronics, Information and Communication Engineers, Nov. 2012, 電子情報通信学会技術研究報告, 112(305) (305), 27 - 32, Japanese
- Considering Value-Added Services Using Environmental Data Collected by Personal Mobile SensingThe researches of value-added services by using data measured by mobile terminal such as smartphone and GPS are caught on. In these researches, the devices that measure the user such as accelerometer and GPS are mainly used. On the other hand, environmental data like temperature and humidity is measured by fixed devices. It enables to get detailed and valuable information by means of that users privately measure these data by mobile terminal. In this paper, we discuss that what kind of value-added services can be realized by users carrying on the mobile sensors and measuring the environmental data. We also carry out the case study with prototype of mobile sensor.The Institute of Electronics, Information and Communication Engineers, Nov. 2012, 電子情報通信学会技術研究報告, 112(307) (307), 1 - 6, Japanese
- Nov. 2012, 電子情報通信学会技術研究報告, 112(305) (305), 21 - 26
- Report on Winter Workshop 2012 in BiwakoThis paper reports on "Winter Workshop 2012 in Biwako(WW2012)", which was held at Biwako Conference Center in Hikone, Shiga from January 19 through 20, 2012.Information Processing Society of Japan (IPSJ), 25 Oct. 2012, IPSJ SIG Notes, 2012(12) (12), 1 - 8, Japanese
- Report on Winter Workshop 2012 in BiwakoThis paper reports on "Winter Workshop 2012 in Biwako (WW2012)", which was held at Biwako Conference Center in Hikone, Shiga from January 19 through 20, 2012.The Institute of Electronics, Information and Communication Engineers, 25 Oct. 2012, Technical report of IEICE. SS, 112(275) (275), 67 - 74, Japanese
- Sep. 2012, 電子情報通信学会技術研究報告 IN2012-65, IEICE-112(209) (209), 81 - 86
- スマートフォンを利用したピークカット促進 アプリケーションの提案と実装本研究では,家庭内での省エネを実現方法として,生活者によるピークカットを目指し,個人の省エネ意識を向上するアプリケーション,ピークカッターを提案,実装する.ピークカッターはホームネットワークシステム(HNS)と連携し,消費電力がピークを超えると住人のスマートフォンに通知する.生活者は機器毎の使用電力を画面で確認し,つけっぱなしや無駄な使用があれば,遠隔で機器の電源を制御する.To encourage residents to reduce peak demand of electricity, we propose and implement a smartphone application, named Peak Cutter. This application works within a home network system (HNS), and notices a peak electricity demand via their smartphone. Residents can confirm power consumptions for each home appliance, and can remotely control the home appliacnes.Aug. 2012, 情報処理学会研究報告, 2012-MBL-63(4) (4), 1 - 7, Japanese
- Jul. 2012, 第177回情報処理学会ソフトウェア工学研究会, JapaneseCharacterizing Side Effects in Framework Applications
- Jun. 2012, 電子情報通信学会技術研究報告, 112(77) (77), 19 - 24
- Mar. 2012, 電子情報通信学会技術研究報告, Vol. 111, No. 481, pp.73-78(481(SS2011 57-82)) (481(SS2011 57-82)), Japaneseマイクアレイネットワークを用いたホームネットワークサービス向けハンズフリー音声インタフェースReport scientific journal
- A Study on Data Platform for Collecting and Using Large-scale House Log in Smart CitySmart city is a next-generation societal concept which aims to provide low-carbon and sustainable social infrastructure. In the smart city environment, wide variety of city data are retrieved from sensors. Social services are provided from the collected data for smart city residents. In this paper, we propose a smart city platform, called Scallop4SC that supports collecting and using the extremely large-scale log data. The Scallop4SC constructs a distributed multi-node infrastructure using Hadoop and HBase, and provides high-scalablity and high-performance data processing for petabyte scale data. We conduct an experimental performance evaluation of the proposed platform using actual house log obtained in our smart home environment Based on the results, we discuss the applicability of Scallop4SC in city scale log data processing.The Institute of Electronics, Information and Communication Engineers, Mar. 2012, 電子情報通信学会技術研究報告, 111(470) (470), 207 - 212, Japanese
- Implementation of Consumer-Oriented ReceiptLog Mining Service Based on RFMWe have previously proposed ReceiptLog, which stores user's purchase histories from daily receipts for various application and services. In this paper, we propose and implement consumer-oriented lifelog mining service, called ReceiptLog mining service. ReceiptLog mining service provide user potential value add information by using user's purchase history. Concretely, we implement mining service which analyzes purchase history from perspective of Recency, Frequency and Monetary.The Institute of Electronics, Information and Communication Engineers, Mar. 2012, 電子情報通信学会技術研究報告, 111(470) (470), 189 - 194, Japanese
- Mar. 2012, 電子情報通信学会技術研究報告 SS2011-70, 111(481) (481), 79 - 84
- レシートログを利用した買い物支援サービスの実装と評価We have previously proposed the ReceiptLog, which stores user's purchase histories from daily receipts for value-added consumer services. As a practical application of the ReceiptLog, we design and implement a shopping support service, called "Sma-Sho", in this paper. Sma-sho is designed to cope with two typical problems in daily shopping: duplicate purchase and forgotten purchase. The duplicate purchase is that a user mistakenly buys a product although there is sufficient stock of the same product at home. The forgotten purchase is that a user forgets to buy a product although the product is out of stock. Using the ReceiptLog APIs extensively, Sma-Sho provides useful purchase histories for the user with a mobile terminal, to prevent the above two problems. We also conduct an experimental evaluation with 8 subjects, to show the effectiveness of the proposed method.The Institute of Electronics, Information and Communication Engineers, Mar. 2012, 電子情報通信学会技術研究報告, 111(470) (470), 195 - 200, Japanese
- An Application Framework for Developing Visualization Services of Location based LifelogThis paper presents an application framework, called MashMap framework, which facilitates development of location-based lifelog services. The proposed framework imports various types of location log data, and stores them in a database with the Life Log Common Data Model (LLCDM). A developer first creates a data source consisting of a filter and a display format. The filter extracts necessary data from the database, while the display format defines how the data is shown on the map. The developer then defines a MashMap by choosing a single or multiple data sources. The MashMap is an object, which aggregates several data sources on a single map, shown in the designated display format. The object is finally visualized on a Google Map by MashMap renderer. We conduct a case study developing a travel log review service and a conference history map using MashMap framework.The Institute of Electronics, Information and Communication Engineers, Mar. 2012, 電子情報通信学会技術研究報告, 111(470) (470), 183 - 188, Japanese
- Nov. 2011, 電子情報通信学会技術研究報告 AI2011-31, 111(316) (316), 13 - 18
- Redefining Environment Feature Interactions in Home Network System Based on Nature of Environmental ImpactsThe integrated services of the home network system (HNS) orchestrate multiple networked home appliances to achieve value-added and comfortable services for home users. If multiple services are used at the same time, functional conflicts may occur among the services, which results in unexpexted behaviors. This is known as feature interactions (FIs). We defined two kinds of FIs : appliance interactions and environmental interactions. Due to lack of the degree of environmental impact and explicit consideration of requirements, the previous formalization tends to overestimate many acceptable cases as feature interactions. To capture the environment interaction more precisely, this paper introduces an environment impact model, describing how much impact is given to the environment by each appliance operation within a service. We also describe user requirements by environment properties evaluated within the model. Then, the environment interaction is formalized as the unfulfilled requirement caused by the use of multiple services.The Institute of Electronics, Information and Communication Engineers, Oct. 2011, 電子情報通信学会技術研究報告, 111(255) (255), 67 - 72, Japanese
- ユビキタスクラウドにおけるユーザコンテキスト管理サービスの一考察?適応型通知サービスの実装?The adaptive ubiquitous services, which dynamically adapt behaviors to requirements and contexts, are one of the major challenges in the ubiquitous computing. To facilitate the management of ubiquitous service resources, we are currently implementing a novel platform called ubiquitous cloud, borrowing the concept of the cloud computing. In this paper, we present models for changing service behavior to adapt user context. And we implement "Context Manager" which manages user context. In the end of this paper, we evaluate our model by implementing actual ubiquitous service which changes methods of messaging as to user context.The Institute of Electronics, Information and Communication Engineers, Oct. 2011, 電子情報通信学会技術研究報告, 111(255) (255), 85 - 90, Japanese
- Service Oriented Platform for Mining Device Status Log in HNSWe have been studying and developing the home network system (HNS), which provides value-added services by orchestrating home appliances, equipments and sensors via network. Our HNS periodically records status of every device within the system. The records, called device status log, can be used for various value-added services. In this paper, we implement the system that automatically search various status of home users, using the device status log. Also we demonstrate its feasibility through a case study of detecting energy-wast ing behaviors.The Institute of Electronics, Information and Communication Engineers, Oct. 2011, 電子情報通信学会技術研究報告 CPSY2011-36, 111(255) (255), 73 - 78, Japanese
- A Feasibility Study of Home Services Using a Microphone Array NetworkThe home network system (HNS), which provides value-added services by orchestrating networked home appliances, equipments and sensors, attracts great attention to realize the next-generation smart home. Implementing the location-aware services within the the HNS context is one of greatest challenges, where the appropriate services are performed based according to the location of the inhabitants. We have been studying the technologies of sound source localization and sound source separation using networked multiple microphone arrays. In this paper, we conduct a feasibility study of applying the microphone array network to the location-aware services within the HNS. Specifically, we first present three kinds of home services using illustrative examples. We then enumerate three kinds of requirements (accuracy requirement, installation requirement, user requirement), which are essential for implementing the location-aware home services using the microphone array network. In a preliminary experiment, we evaluate the accuracy requirement using an actual microphone array. Moreover, we conduct a directivity shape simulation assuming multiple arrays.The Institute of Electronics, Information and Communication Engineers, Oct. 2011, 電子情報通信学会技術研究報告, 111(256) (256), 61 - 66, Japanese
- Report on Winter Workshop 2011 in Shuzenji2011 年 1 月 20 日,21 日の 2 日間に伊豆・修善寺のラフォーレ修善寺にて開催したウィンターワークショップ 2011・イン・修善寺 (WW2011) の概要について報告するThis paper reports on "Winter Workshop 2011 in Shuzenji(ww2011)" held at LAFORET SHUZENJI HOTEL in Izu City, Shizuoka Prefecture from 20th to 21st January, 2011.14 Jul. 2011, 研究報告ソフトウェア工学(SE), 2011(11) (11), 1 - 9, Japanese
- 嗜好アンケートに基づく個人適応型省エネ行動推薦手法の検討 ~家庭における空調サービスへの適用~We have been studying the personalized energy-saving behaviors using the Home Network System (HNS). In this paper, we propose a method that finds personalized energy-saving behaviors in air conditioning services. Specifically, we first extract user's preference to energy-saving, air conditioning and appliances, by conducting a preliminary questionnaire. Using the preference of each user, we then formulate an optimization problem on preferred appliance operations and the power consumptions. By solving the problem, we derive a personalized energy-saving air-conditioning service. To demonstrate the effectiveness, we conduct an experiment with fifteen subjects in an actual HNS.The Institute of Electronics, Information and Communication Engineers, Jul. 2011, 電子情報通信学会技術報告 IN2011-63, Vol. 111, No. 146, pp.105-110(146) (146), 105 - 110, JapaneseReport scientific journal
- ホームネットワークシステムにおけるパーソナルリモコン作成GUI の実装と評価We have previously proposed an application framework of personal remote controller, which allows users topersonalize the remote controllers in Home Network System. However, the framework required users to define the layoutin XML format, which is a quite tedious and unreliable task. To cope with the problem, we implement a graphical userinterface, which intuitively supports users to perform efficient creation of the personal remote controller definitions. We also conduct an experimental evaluation, where the subjectscreate own remote controllers on the Android smart phones foran actual home network system.The Institute of Electronics, Information and Communication Engineers, Jul. 2011, 電子情報通信学会技術研究報告 LOIS2011-11, 111(152) (152), 13 - 18, Japanese
- Evaluating Lifelog Common Data Model and Mashup API through Practical Application DevelopmentIn order to support efficient integration of heterogeneous lifelog services, we have previously proposed the lifelog common data model (LLCDM) and the lifelog mashup API (LLAPI). In this paper, we evaluate the efficiency of the LLCDM and the LLAPI through a practical application development project. Specifically, we implement two versions of an integrated lifelog application with and without the LLCDM and the LLAPI. We compare the two versions from viewpoints of the quality of the product as well as the efficiency of the development process.The Institute of Electronics, Information and Communication Engineers, Jun. 2011, IEICE Technical Report, 111(107) (107), 29 - 34, English
- Evaluating Habituation Effect on Conversational Voice Control in Home Network SystemThe voice control is an easy and effective method to operate heterogeneous devices in the home network system (HNS). However, as the user is getting used to the interface, too much feedback from the system annoy the user and decline the usability. In this paper, we empirically evaluate the habituation effect on the voice control in the HNS. Specifically, we characterize the habituation effect by the time since the system begins the feedback until the user issues the next command. Based on the empirical study, we consider a voice feedback method that adapts the individual habituation.The Institute of Electronics, Information and Communication Engineers, Jun. 2011, IEICE Technical Report, 111(107) (107), 47 - 52, English
- ReceiptLog: A Consumer-Oriented Lifelog Service for Storing and Reviewing Daily ReceiptsWe have previously implemented the receipt service platform, where consumers can digitize their own receipts for various applications and services. In this paper, we develop a consumer-oriented lifelog service, called ReceiptLog, by using the receipt service platform. Using the purchase history obtained from the receipts, the ReceiptLog extensively supports every end user to review daily life from financial and living viewpoints. Moreover, we also study more value-added services by integrating other lifelog services with the ReceiptLog.The Institute of Electronics, Information and Communication Engineers, Jun. 2011, In IEICE Technical Report, 111(107) (107), 23 - 28, English
- Mar. 2011, 電子情報通信学会技術研究報告 SS2010-54, 110(458) (458), 7 - 12ホームネットワークシステムのためのパーソナルリモコン開発フレームワーク
- Mar. 2011, 電子情報通信学会技術研究報告 SS2010-53, 110(458) (458), 1 - 6
- Mar. 2011, 電子情報通信学会 IN研究会, 110(449) (449), 187 - 192
- 2011, 電子情報通信学会技術研究報告, 110(450) (450), 37 - 42
- 2011, ソフトウェア工学の基礎ワークショップ FOSE2011, 37, 231 - 236[Refereed]
- Recording Receipts for Consumer-Oriented Lifelog ServicesConsumer's past purchase data has been used to tool and to serve for the seller and suppliers of the trend analysis and the sales strategy decision, etc. so far. In this paper, it proposes "consumer-oriented lifelog services" which is used to suport their facet of living and health aspect. Concretely, the end user oneself accumulates receipt information as a life log, and service that supports health aspects on the life side of the user is examined. Moreover, we design API that becomes useful for implementation service. In addition, we think that when oriented-lifelog it aims at the achievement of high service of the additional value or more by combining with other life log services.The Institute of Electronics, Information and Communication Engineers, Nov. 2010, IEICE technical report, 110(Vol.110 No.281,pp.95-100) (Vol.110 No.281,pp.95-100), 95 - 100, Japanese
- Implementing Database and Web Services for Life-Log APIsWe have previously proposed the LifeLog Common Data Model (LLCDM) to aggregate heterogeneous lifelog data, and the LifeLog mashup API (LLAPI) to access the standardized data. The LLAPI was implemented as a set of Perl libraries that access the local file system storing XML data of the LLCDM. Therefore, it had a performance bottleneck, and was poor in the portability. To cope with these problems, we re-engineer the LLCDM and the LLAPI with the relational database MySQL and the Web services, respectively. The experimental evaluation shows that the performance of the new implementation achieves 23 to 275 faster than the previous one.The Institute of Electronics, Information and Communication Engineers, Nov. 2010, 電子情報通信学会技術研究報告, 110(281) (281), 101 - 106, Japanese
- Nov. 2010, 電子情報通信学会 IN研究会, IN2010-94, 77 - 82
- Design and Evaluation of End-User Development Environment for Context-Aware Services in Service-Oriented HNSThe home network system (HNS, for short) provides value-added and context-aware services for home users, by orchestrating networked home appliances and sensors. Although the HNS services have been developed by system vendors, there exist strong needs that the end-users create their own services according to their convenience. This paper presents a novel service creation environment, called Sensor Service Binder (SSB), which provides a user-friendly interface for creating context-aware services within the HNS. Built on top of the service-oriented HNS, the SSB allows non-expert users to register contexts using the sensors, and to bind the registered context to any operation of the networked appliances. Experimental evaluation with an actual HNS showed that the effort for service creation was reduced to 10% by introducing the proposed SSB.The Institute of Electronics, Information and Communication Engineers, 16 Aug. 2010, IEICE technical report, 110(172) (172), 7 - 12, English
- Aug. 2010, 電子情報通信学会技術報告, 110(172) (172), 7 - 12
- Aug. 2010, 信学技法, 110(172) (172), 1 - 6
- Aug. 2010, (信学技報, vol. 110, no. 172, AI2010-15) (信学技報, vol. 110, no. 172, AI2010-15)
- Report on Winter Workshop 2010 in Kurashiki2010 年 1 月 21 日,22 日の 2 日間に倉敷市芸文館 (岡山県倉敷市) にて開催したウインターワークショップ 2010・イン・倉敷 (WW2010) の概要について報告するThis paper reports on "Winter Workshop 2010 in Kurashiki (WW2010)" held at Kurashiki Geibunkan in Kurashiki City, Okayama Prefecture from January 21th to the 22th.情報処理学会, 25 May 2010, 研究報告ソフトウェア工学(SE), 2010(18) (18), 1 - 8, Japanese
- Developing Home Network Services with Feature Interaction Detection and Resolution SystemAs one of the major Home Network System, the integrated service of networked home appliances are proposed. When such integrated services are executed simultaneously, functional conflicts can occur between the functions of each appliance. Such conflicts are called Feature Interaction in HNS. In our precedence research, we proposed an feature interaction detection and resolution mechanism based on service-oriented architecture (SOA). In this paper, we propose new software development process for integrated services in HNS. In our process, we adopt a specification template for integrated services, simulation for feature interactions detection and resolution, and automatic transformation service specifications into implementations. In our comparative experiment, we confirmed our development process is more useful to develop reliable integrated services effectively than that of conventional development.The Institute of Electronics, Information and Communication Engineers, Mar. 2010, 電子情報通信学会技術研究報告, IEICE-109(IEICE-SS-456) (IEICE-SS-456), 25 - 30, Japanese
- Mar. 2010, 電子情報通信学会技術研究報告, 109(450) (450), 61 - 66Interactive Voice Interface for Eliciting and Estimating Implicit User Requirements in Home Network System
- Mar. 2010, 電子情報通信学会技術研究報告, 109(450) (450), 85 - 90
- A Proposal of Service Registry for Discovering Service Resources in UBiquitous NetworkIn the future ubiquitous network, it is expected to realize an adaptive service platform, which dynamically integrates various service resources to provide adaptive and context-aware services. This paper presents a service registry, called Ubi-Regi, in order to support efficient and dynamic discovery of service resources in the ubiquitous network. Ubi-Regi categorizes every service operation into one of three types: Source, Transformation or Sink service, to define the scope of the operation within the real and IT worlds. Also, it associates every resource with the physical location and the goal keywords, so that the resource can be searched by place or purpose. This paper first conducts data modeling of Ubi-Regi. We then design and implement Ubi-Regi APIs as data accessors. We demonstrate its feasibility through a case study of the environment migration service in a home network system.The Institute of Electronics, Information and Communication Engineers, Mar. 2010, 電子情報通信学会技術研究報告, 109(456) (456), 19 - 24, Japanese
- Mar. 2010, 電子情報通信学会技術研究報告, 109(450) (450), 91 - 96
- Mar. 2010, 情報処理学会研究報告, 数理モデル化と問題解決研究会, 2010-MPS-77(27) (27), 1 - 6
- Jan. 2010, ウィンターワークショップ2010・イン・倉敷 論文集, 2010(3) (3), 73 - 74SMuP:A Service-oriented Platform for Sensor Service Mashups
- Jan. 2010, ウィンターワークショップ2010・イン・倉敷, 2010(3) (3), 59 - 60
- Sensor search with spatial information and support by showing similar parameter for building sensor contextIn a home network system, a context-aware application is one of the value-added services. The application controls various appliances based on a context which is estimated by various sensors in the home network system. In our precedence research, we proposed "a Sensor Service Binder(SSB)" which facilitate the development of the context-aware applications by integrating the context and the appliance. However, our SSB needs the contexts and the appliances information which are registered by specialist, in advance. In order to register the contexts, a developer must know sensors which is used in the contexts, and define the condition equation by himself. In this paper, we propose SSB 2.0 supporting to register contexts by end-users. The SSB 2.0 realizes a sensor search service with using place information of sensors, and a context search service with using context registration history. Our SSB 2.0 supports a series of the development process from the context registration to the context and appliance integration for the context-aware application.The Institute of Electronics, Information and Communication Engineers, 03 Dec. 2009, IEICE technical report, 109(327) (327), 59 - 64, Japanese
- Dec. 2009, 電子情報通信学会技術報告, 109(327) (327), 53 - 58
- Nov. 2009, 電子情報通信学会技術研究報告, 109(272) (272), 35 - 40Considering Common Data Model to Mash-up Life Logs
- Nov. 2009, 電子情報通信学会技術研究報告, 109(276) (276), 23 - 38
- Nov. 2009, 情報処理学会研究報告, 2009-SE-166(4) (4)
- Nov. 2009, 電子情報通信学会技術研究報告, 109(272) (272), 29 - 34
- Nov. 2009, 電子情報通信学会 IN研究会, IN2009-73, 29 - 34
- Sep. 2009, 情報処理学会 ソフトウェアエンジニアリングシンポジウム2009, ワークショップWS-2
- Sep. 2009, 情報処理学会 ソフトウェアエンジニアリングシンポジウム2009, ワークショップWS-2
- Sep. 2009, ソフトウェアエンジニアリング最前線 2009 情報処理学会SEシンポジウム, 89 - 96[Refereed]
- Jul. 2009, 電子情報通信学会 サービスコンピューティング時限研究専門委員会 第1回研究会
- Jul. 2009, サービスコンピューティング時限研究専門委員会 第1回研究会
- Report on Winter Workshop 2009 in MiyazakiThis paper reports on "Winter Workshop 2009 in Miyazaki (WW2009)"; held in Miyazaki City from 23rd to 24th January 2009.一般社団法人情報処理学会, 21 May 2009, IPSJ SIG Notes, 2009(20) (20), 1 - 7, Japanese
- Mar. 2009, 電子情報通信学会技術研究報告, 108(458) (458), 381 - 386
- Mar. 2009, 電子情報通信学会 OIS研究会, OIS2008, 13 - 18
- Mar. 2009, 電子情報通信学会 OIS研究会, OIS2008(82) (82), 43 - 48
- Mar. 2009, 電子情報通信学会 OIS研究会, OIS2008-75(2009-3), 75 - 80ホームネットワークシステムにおけるサービス開発を容易化するネット家電標準データモデル
- Mar. 2009, 電子情報通信学会技術研究報告, 108(458) (458), 433 - 438
- Mar. 2009, 情報ネットワーク研究会, IN2008-206, 439 - 444Feature interaction resolution in integrated services of networked home appliances
- A Standardized Data Model for Networked appliances in Home Network SystemVarious Home Network System (HNS) services are being widely developed. HNS appliance information and its data structure in such conventional services differ. As a result, the services and HNS appliances are tightly-coupled. This causes the implementation of the services becomes more complicated. In this paper, we propose a hierarchical HNS appliance data model for improving reusability. Our data model has three layered structures (1) Standardized appliance class information independent of several HNS environment (2) Appliance information included in a HNS environment independent of services (3) Service-specific appliance information. We applied the data model for multiple services, and verified effectiveness.The Institute of Electronics, Information and Communication Engineers, 26 Feb. 2009, IEICE technical report, 108(462) (462), 1 - 6, Japanese
- Jan. 2009, ウィンターワークショップ2009・イン・宮崎 論文集, 49 - 50
- Jan. 2009, ウィンターワークショップ2009・イン・宮崎 論文集, 47 - 48
- Jan. 2009, ウィンターワークショップ2009・イン・宮崎 論文集, 51 - 52
- Jul. 2008, 電子情報通信学会技術研究報告, 108(136) (136), 47 - 52
- Jul. 2008, 電子情報通信学会技術研究報告, 108(136) (136), 41 - 46
- Jul. 2008, 電子情報通信学会技術研究報告, 108(136) (136)
- Mar. 2008, 電子情報通信学会2種研究会 サイバーワールド(CW)第9回研究会, 19 - 24
- Mar. 2008, 電子情報通信学会2種研究会 サイバーワールド(CW)第9回研究会, 13 - 18ホームネットワークシステムにおける家電状態を利用した音声操作インタフェースの改善
- ビル管理システム連携におけるシステムとサービス競合の定式化The building automation system (BAS, for short) provides efficient management features of building equipments as well as various value-added services. According to the progress of network infrastructure, it is expected, in the near future, to achieve more value-added and sophisticated services by integrating multiple BASs over the network. However, the integration of heterogeneous systems yields complexity of the systems as well as the service interaction problem. To cope with these problems, we propose a modeling method for the BAS. Specifically, we characterize a BAS by sets of equipments and service scenarios achieved by the equipments. We then formulate conditions that the system itself operates consistently and compatibly. We also present a method for detecting service interactions between multiple BASs. Using the proposed model, we have conducted a case study, where 10 practical systems and 33 service scenarios were analyzed. Moreover, for 466 pairs of service scenarios, we could successfully detect 34 service interactions.Information Processing Society of Japan (IPSJ), Mar. 2008, 情報処理学会研究報告, 2008(29) (29), 179 - 186, Japanese
- Mar. 2008, 電子情報通信学会技術研究報告, 107(525) (525), 295 - 300
- Mar. 2008, 電子情報通信学会技術研究報告, 107(525) (525), 289 - 294
- ビル管理システムにおけるサービス指向アーキテクチャの適用 ? 異種サービスの連携と安全性に関する考察 ?Many value-added services for building controls have come onto market recently. Most of the conventional systems adopt a closed communication architecture, where each system controls target building equipments by a proprietary protocol. In this paper, we propose a framework that can create new value-added services by integrating the existing systems. To achieve this, we extensively use the service oriented architecture (SOA). We also discuss the safety issues caused by the functional conflicts among heterogeneous services.The Institute of Electronics, Information and Communication Engineers, Oct. 2007, 電子情報通信学会技術研究報告, 107(261) (261), 3 - 8, Japanese
- BPELワークフローに着目した連携Webサービスの応答速度・稼働率の見積もり手法The users of Web service have been given chances to select the high quality services from many services, because of the increase of Web services with the advances of Web service technology. Some technologies which measure the quality of Web service quantitatively are needed to compare the quality as services. However, many existing studies focus on the individual Web service, therefore there is no effective methods of quality measurement is established for integrated Web service. In this paper, we propose a method which estimates the quality statistically as one of the methods of quality measurement for integrated Web service. Associating an operation with each of structural constructs derived, we translate the given workflow into a formula, from which we derive the estimation of the response time and the availability of the composite Web service.The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106(578) (578), 465 - 470, Japanese
- 時間駆動型Webサービス呼び出しフレームワークWS-Schedule Managerの提案と実装Recently, some researches and developments of Event Driven Architecture (EDA) are in progress. This architecture is distinctive by invoking Web services by the specific event defined by users. The specification of many EDA frameworks can be complex and huge scale sometimes because it is designed to correspond to every kind of events. Therefore, there is large amount of cost when applying this architecture to the Web service which handles only specific events. In this paper, we propose a Web services invocation framework "WS-Schedule Manager" which is specified with "Time event." The framework invokes a Web service at the specified time after a user set the Web service, parameters and their time schedules. The specification of this framework is compact and lightweight to execute because it is specialized to handle the time driven invocation of Web service, so this framework can be used by embedding various Web service applications. We also consider about some case studies such as wakeup service on Home Network System in this paper.The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106(578) (578), 459 - 464, Japanese
- ユーザの移動に伴う機器と環境の状態引き継ぎを実現するホームネットワークシステムの提案Home network system which includes networked home appliances and a home network are becoming popular remarkably. As a result, the several value added services to integrate multiple networked appliances are being provided by the home network system. In this paper, as the kind of a new value added service, we propose a room state migration service. This service supports to integrate the appliance methods when a user moves in the inside of a home which consists of multiple rooms, For example, suppose that a user in a living room moves to a bed room. The following two are examples of the scenario which our service can support. (1) A user continues watching a TV program which was being watched in the living room also in the bed room. (2) A user makes the state of the environment (such as room temperature and brightness) of the bed room the same as the living room. Thus, a user's convenience can be improved with our service supporting the appliance orchestration for making the state of the rooms equal continuously.The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106(578) (578), 411 - 416, Japanese
- 類似した命令列の畳込みによるプログラムの耐タンパ性の向上This technical report proposes a software tamper proofing method called instruction folding. In this method, a set of similar (but sligtly different) instruction sequences is detected in a program, and then, they are integrated (folded) into a single instruction sequence. A self-modifying mechanism is applied to the folded sequence to bridge the gap between those slightly different sequences at run-time. The folded sequence is tamper resistant since tampering affects every functionality where original (similar) instruction sequences were present.Information Processing Society of Japan (IPSJ), Mar. 2007, 情報処理学会研究報告, ソフトウェア工学研究会, 2007-SE-155(33) (33), 167 - 174, Japanese
- SOAシステム構築のための既存システムの再利用性評価We propose a new metric that measures the reusability in case of migrating from legacy system to service-oriented system (SOA), and a method to measure the metric. First of all, we compare two services in functional aspects; the first one, we call this necessary service, is a service which is obtained by analyzing business process using top-down approach. The second one, we call this candidate service, is a service which is obtained by analyzing source codes using bottom-up approach. Then, we analyze how exiting candidate services are reusable to realize necessary services. Finally, we measure the ratio of the reusable legacy system based on size metrics. As a result of applying proposal technique to existing liquor management system, we could confirm that we are able to measure potential reusability ratio of the service in the existing system quantitatively.The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106(578) (578), 471 - 476, Japanese
- JMLを用いたホームネットワークシステムにおける連携サービスの安全性検証に関する提案The recent ubiquitous technologies allow home electric appliances and sensors to be connected with local area network at home. While when we develop such HNS (Home Network System) integrated services and provide them to the users, we must assure that the integrated services are safe for the users, the appliances and the environments. In the normal operations of these appliances are very different from the operations of the HNS, so the development and the implementation of the HNS integrated service need more careful and exact safety measures for the safe operations of the appliances. There is a possibility that the bug and the logic mistake of software cause an accident and serious damage. In order to solute this problem, we present a framework to verify the safety of integrated service of HNS by using the DBC(Design by Contract) and JML(Java Modeling Language)The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術報告, NS2006-159(577) (577), 7 - 12, Japanese
- ホームネットワークにおける家電連携サービスのユーザビリティ評価Currently, Home Network System (HNS) attracts a great deal of attention. This system can provide value-added services with connecting various home appliances to the network. We have already developed an integrated service which enables the integrated operation of more than one home appliance with using Web services in our previous study. In this paper, we did an evaluative experiment of the integrated service to show its utility in HNS. In this experiment, we set some typical tasks with operations of the integrated service and consumer appliances, and then we conducted usability testing to operate the appliances by the subjects actually. In the evaluation, we evaluated from the viewpoint of the operation efficiency and the satisfaction rating by comparing the operations of each usual appliances and integrated service in HNS. We were able to confirm that all subjects completed the tasks of the integrated service from this experiment. Moreover, we could obtain the result in which the average operation time was a half or less in the maximum, and the average number of errors was 1/10 or less in the integrated service compared with the usual operation. We were also able to obtain the result that the satisfaction rating of the service was 1.5 times or more high in the integrated service compared with the usual operation in all tasks.The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106(578) (578), 399 - 404, Japanese
- ホームネットワークシステムにおけるサービス開発へのペルソナシナリオ法の適用と評価Currently, some researches and developments about Home Network System (HNS) which provide more convenient, comfortable life with using various services on the network are in progress. However, there is no service provided which is beneficial and value-added for users, therefore this system has not become popular yet. In this paper, we introduced Persona-and-Scenario method to service development of the system. This method is representative to propose and implement the services because of it is from the viewpoint of the users, not from the viewpoint of the developers. We also implemented "Today's recipe service", which is one of the services extracted by the method. We then took an evaluative experiment by usability testing with some actual users. As a result of the experiment, we found that the assessment of the services we developed was the highest by age 40's mothers who are closest to the main persona we created. We confirmed the utility to apply Persona- and-Scenario method onto services development of the HNS from this result.The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106(578) (578), 405 - 410, Japanese
- Jan. 2007, 2007年暗号と情報セキュリティシンポジウム(SCIS2007)予稿集CD-ROM(講演番号4D1-3)高級言語レベルでの偽装内容の指定が可能なプログラムのカムフラージュ
- Jan. 2007, 暗号と情報セキュリティシンポジウム (SCIS2007)
- Jan. 2007, 情報処理学会ソフトウェア工学研究会ウィンターワークショップ2007・イン・那覇 論文集, 2007(3) (3), 81 - 82
- Nov. 2006, 電子情報通信学会技術報告, IN2006-97, 49 - 54
- 位置と速度を利用した移動体向け認証方式の提案This paper proposes an authentication method using location and speed information for mobile users. Though passwords or PINs is widely used for authentication, an incorrect user could be authenticated, peeking at a user inputting a password or PIN. With proposed method, users are authenticated when they sequentially pass through some points with specific speed. They are not authenticated when passing speed on the point is different from specific speed. This paper proposes the authentication method and confirms that location and speed information can be used for authentication by exploratory experiment.The Institute of Electronics, Information and Communication Engineers, Nov. 2006, 電子情報通信学会技術報告, モバイルマルチメディア通信研究専門委員会, 106(MoMuC2006-55) (MoMuC2006-55), 11 - 16, Japanese
- Nov. 2006, ソフトウェア工学の基礎XIII 日本ソフトウェア科学会FOSE 2006, 103 - 112[Refereed]
- Nov. 2006, ソフトウェア工学の基礎XIII, 日本ソフトウェア科学会 FOSE2006, 113 - 118[Refereed]
- API呼び出しを用いた動的バースマーク本論文では,ソフトウェア盗用の発見・立証を効率的に支援するための動的バースマークを提案する.動的バースマークf(p,I)はソフトウェアpを入力Iで実行した場合のpの振舞いから得られる,pのもつユニークな特徴の集合である.ソフトウェアp,qが存在し,f(p,I)=f(q,I)であれば,qはpの盗用である疑いが強い.本論文では,2種類の動的バースマークを提案する.提案手法では,ソフトウェア実行時のAPI呼出し情報を,個々のソフトウェアの特徴として利用し,API呼出しの順序から実行系列バースマークを,個々のAPIの呼出し頻度から実行頻度バースマークをそれぞれ抽出する.この2種類のバースマークを2種類の実験によって評価した.実験1では,同じ用途の複数のアプリケーションに提案バースマークを適用した.その結果,オリジナルとその改変アプリケーションからは非常に類似したバースマークが得られること,全く独立に実装されたアプリケーションからは,全く異なるバースマークが得られることが分かった.実験2では,提案バースマークは,異なるコンパイラや最適化などに対して強い耐性をもつことが示された.The Institute of Electronics, Information and Communication Engineers, Aug. 2006, 電子情報通信学会論文誌D, J89-D(8) (8), 1751 - 1763, Japanese[Refereed]
- Mar. 2006, 電子情報通信学会技術研究報告, 105(628) (628), 55 - 60
- Mar. 2006, 電子情報通信学会技術研究報告, 105(628) (628), 67 - 72
- Mar. 2006, 電子情報通信学会技術研究報告, 105(628) (628), 61 - 66
- 攻撃タスクを考慮した難読化による暗号プログラムの保護In this paper, we propose a cracker-centric approach to give a realistic guideline for applying software obfuscation methods to disrupt crackers' actions. As a case study, we define a security goal and a threat model for a Java implementation of a cryptomeria cipher (C2) program, and then, based on the model, we describe a guideline to protect secret keys included in the program.The Institute of Electronics, Information and Communication Engineers, Dec. 2005, 電子情報通信学会技術報告, ソフトウェアサイエンス研究会, 105(SS2005-59) (SS2005-59), 25 - 30, Japanese
- Oct. 2005, 信学技報 ソフトウェアサイエンス研究会, SS2005-42, 13 - 18
- Java Birthmarks : Detecting the Software TheftTo detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which are unique and native characteristics of every class file. For a pair of class files p and q, if q has the same birthmark as p's, q is suspected as a copy of p. Ideally, the birthmarks should satisfy the following properties : (a) preservation - the birthmarks should be preserved even if the original class file is tampered with, and (b) distinction - independent class files must be distinguished by completely different birthmarks. Taking (a) and (b) into account, we propose four types of birthmarks for Java class files. To show the effectiveness of the proposed birthmarks, we conduct three experiments. In the first experiment, we demonstrate that the proposed birthmarks are sufficiently robust against automatic program transformation (93.3876% of the birthmarks were preserved). The second experiment shows that the proposed birthmarks successfully distinguish non-copied files in a practical Java application (97.8005% of given class files were distinguished). In the third experiment, we exploit different Java compilers to confirm that the proposed Java birthmarks are core characteristics independent of compiler-specific issues.The Institute of Electronics, Information and Communication Engineers, 01 Sep. 2005, IEICE Transactions on Information and Systems, D, 88(9) (9), 2148 - 2158, English
- 家電機器間の相互接続性を考慮した連携サービスを実現するサービス指向フレームワークの提案With integrated services which make two or more appliances orchestrate, an appliance framework in consideration of an interoperability problem between multi-vendor appliances should be needed. To achieve the interoperability, this paper presents a service-oriented framework for multi-vendor home network systems(HNS). We propose a two-layered design of an appliance, consisting of device and service layers. The device layer corresponds to the physical device of the appliance controlled by vendor-specific interfaces. The service layer exhibits features of the device as self-contained services accessible via device-independent interfaces. In our proposed framework, every integrated services are realized by these appliances appliances which adopt the design. Such self-contained appliances enable high interoperability between them.Information Processing Society of Japan (IPSJ), Jul. 2005, 情処研報, 2005-SE-149(15) (15), 111 - 116, English
- Jun. 2005, ソフトウェア信頼性研究会 第2回ワークショップ
- Jun. 2005, ソフトウェア信頼性研究会 第2回ワークショップ
- プログラマの視線を用いたレビュープロセスの分析Although there exists a lot of studies to evaluate the effectiveness (fault detection rate) of software review techniques, human factors in review process, which are larger factor than the review techniques, are rarely studied. This paper aims to clarify the human factors in code review through an analysis of eye movement of review engineers. As a result of analysis, we found some patterns of eye movement that seem to affect the effectiveness of code review.The Institute of Electronics, Information and Communication Engineers, Jun. 2005, 信学技報SS2005 12-17, 105(128) (128), 21 - 26, Japanese
- Webサービスアプリケーションのプロトタイピング および性能評価のためのシステム開発This paper proposes a general framework, called WS-PROVE (Web Service PROtotyping Validation Environment), for rapid prototyping of Web service applications. In a requirement definition stage, WS-PROVE first abstracts a Web service under development as a dummy, and then integrate the dummy with other dummies or the existing ready-made Web services in arbitrary topologies. For a given configuration including the integration topology, processing time for each service and the network delay, WS-PROVE dynamically connects the Web services. Then, it measures the response time for each service and the whole integrated services. In this paper, we first clarify system requirements of the rapid prototyping system for Web service applications. Then, we present design and implementation of WS-PROVE. Additionally, we conduct a case study to prototype some Web service applications to demonstrate the effectiveness of WS-PROVE.The Institute of Electronics, Information and Communication Engineers, Mar. 2005, 信学技報, 情報ネットワーク研究会, IN2004-318(692) (692), 361 - 366, Japanese
- WS-PROVE を用いたWeb サービスメトリクスの実験的評価In this paper, we evaluated in experiments the relationship between the quality of Web Service applications and the Web Service Metrics (RFWS, NOWS, and NHTWS) that have been proposed by our research group. First, the performance of Web Service application was measured using WS-PROVE developed so that we could build the prototype of Web Service application topology freely, and considered the relationship with Web Service Metrics. Next, the reliability of Web Service application was calculated using the reliability assessment algorithm "Sum of Disjoint Products (SDP)", and considered the relationship with Web Service Metrics. As a result, we revealed experimentally a relationship between Web Service Metrics and the quality of Web Service applications.The Institute of Electronics, Information and Communication Engineers, Mar. 2005, 信学技報, 情報ネットワーク研究会, IN2004-319(692) (692), 367 - 372, Japanese
- Mar. 2005, 信学技報, 情報ネットワーク研究会, IN2004-320, 373 - 378
- Jan. 2005, 第46回プログラミング・シンポジウム報告集, 41 - 50ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの実験的評価
- Jan. 2005, 第46回プログラミング・シンポジウム報告集, 51 - 62
- 変数更新の回数と分散に基づくプログラムのメンタルシミュレーションコスト評価This paper presents a method to estimate the cost of mental simulation of programs. In our previous research, we developed a model called virtual mental simulation model (VMSM). It showed that a distance of simulation backtrack significantly influences the cost of mental simulation. Through the subsequent experiments, however, we have found some cases that are not well justified by the distance only. In this paper, we show that updates of variables in a program also have significant correlation to the mental simulation. Then, we propose two new dynamic metrics: Sum in Number of Variable Updates and Variance in Number of Variable Updates. The experimental evaluation shows that the proposed metrics well explain the cases the previous VMSM cannot cover.The Institute of Electronics, Information and Communication Engineers, Nov. 2004, 電子情報通信学会技術報告, ソフトウェアサイエンス研究会, SS2004-32(466) (466), 37 - 42, Japanese
- Nov. 2004, ソフトウェア工学の基礎XI, 日本ソフトウェア科学会FOSE2004, 157 - 160[Refereed]
- Nov. 2004, ソフトウェア工学の基礎XI, 日本ソフトウェア科学会FOSE2004, 85 - 88[Refereed]
- 家電機器連携サービスにおけるサービス競合検出システムThe integrated services are one of the major applications of the home network system. Features of multiple networked appliances are combined to provide more comfortable living for home users. When multiple integrated services are executed simultaneously, the features executed in the services may conflict with each other. This conflict is generally known as the feature interaction problem, which decreases the total quality of services. This paper formulates the feature interaction problem in the integrated services of the home network system. Specifically, we define two types of interactions: device interactions and environment interactions. The device interactions are direct conflicts of features on the same device, whereas, the environment interactions are indirect conflicts on certain environment properties. We conduct a case study of interaction detection to demonstrate the effectiveness of the proposed method.The Institute of Electronics, Information and Communication Engineers, Oct. 2004, 信学技報, ディペンダブルコンピューティング研究会, DC2004-23(344) (344), 11 - 16, Japanese
- Oct. 2004, コンピュータセキュリティシンポジウム2004論文集 (CSS2004), 2, 775 - 780
- Sep. 2004, 信学技報, ネットワークシステム研究会, NS2004-98, 69 - 74
- Sep. 2004, 信学技報, ネットワークシステム研究会, NS2004-99, 75 - 80
- Mar. 2004, 電子情報通信学会技術研究報告, ネットワークシステム研究会, (NS2003-359) (NS2003-359), 333 - 338
- Mar. 2004, 電子情報通信学会技術研究報告, ネットワークシステム研究会, 2003(NS2003-316) (NS2003-316), 113 - 118Webサービスアプリケーションのソフトウェアメトリクスに関する考察
- Mar. 2004, 電子情報通信学会技術研究報告, ネットワークシステム研究会, 2003(NS2003-315) (NS2003-315), 107 - 112異なる設計・実装法を用いたWebサービスアプリケーションの開発および比較評価
- Jul. 2003, 情報処理学会研究報告, ソフトウェア工学, 143, 9 - 14
- Jul. 2003, 電子情報通信学会技術報告, 情報セキュリティ研究会, (ISEC2003-29) (ISEC2003-29), 127 - 133
- 命令コードの実行時置き換えによるプログラムの解析防止In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original binary program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously retrieves the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.The Institute of Electronics, Information and Communication Engineers, Dec. 2002, 信学技報, 情報セキュリティ研究会, ISEC2002-98(511) (511), 13 - 19, Japanese
- Mar. 2002, 情報処理学会九州支部: 火の国情報シンポジウム2002, 107 - 114教育用計算機システムにおける印刷システムに求められる要求とその実装について
- Experimental Evaluation of Interaction-Prone Scenario Derivation Method in Feature Interaction FilteringFeature Interactions(FI, in short) are functional conflicts among features of telecommunication services. Since detecting all possible FIs takes huge costs, the technology of FI filtering is emerging, which roughly identifies FI-prone service combinations with simple indications. However, the previous filtering identifies the FI-prone combinations only. It cannot derive concrete scenarios in which potential FIs may exist. So, we have proposed a new scenario derivation method for FI-prone combinations. The goal of this paper is to evaluate the scenario derivation method. The evaluation is conducted with respect to scenario coverage and filtering quality, using specifications of FI detection contest. The result shows that the proposed method have covered all FI scenarios detected in the contest.The Institute of Electronics, Information and Communication Engineers, 11 Oct. 2001, Technical report of IEICE. SS, 101(358) (358), 27 - 33, Japanese
- Feature Interaction Classification for Services in CPLThe recent advancement of the Internet technologies prompts the Internet telephony services for practical use. In the Internet telephony, implementation of user-made services is an important concern, and a service description language CPL(Call Processing Language) is proposed in RFC of IETF. Managing such services in the Internet telephony is up to users, thus users can freely deploy very flexible services. However, new types of the feature interaction problem may arise, which are not seen in the traditional centralized telephone network. In order to clarify the feature interaction in the Internet telephony, this paper categorizes functional conflicts of services written in the CPL. Specifically, we focus on a case where the CPL scripts of two services are deployed in the same server. Then, we define four classes of the interactions according to the structure of CPL tags. Also for each class, we discuss some idea towards resolution of the interactions.The Institute of Electronics, Information and Communication Engineers, 11 Oct. 2001, Technical report of IEICE. SS, 101(358) (358), 35 - 42, Japanese
- CPLで記述したサービスのサービス競合の分類The recent advancement of the Internet technologies prompts the Internet telephony services for practical use. In the Internet telephony, implementation of user-made services is an important concern, and a service description language CPL(Call Processing Language)is proposed in RFC of IETF. Managing such services in the Internet telephony is up to users, thus users can freely deploy very flexible services. However, new types of the feature interraction problem may arise, which are not seen in the traditional centralized telephone network. In order to clarify the feature interaction in the Internet telephony, this paper categorizes functional conflicts of services written in the CPL. Specifically, we focus on a case where the CPL scripts of two services are deployed in the same sever. Then, we define four classes of the interactions according to the structure of CPL tags. Also for each class, we discuss some idea towards resolution of the interactions.Information Processing Society of Japan (IPSJ), Oct. 2001, 情処研報, 2001-SE-134(99) (99), 37 - 44, Japanese
- Oct. 2001, 情処研報, 2001-SE-134, 29 - 35
- 生産技術振興協会, Aug. 2001, 生産と技術, 53(1) (1), 19 - 22, Japaneseオタワ大学での研究生活
- Dec. 2000, 平成12年度情報処理教育研究集会, 136 - 138
- Dec. 2000, 平成12年度情報処理教育研究集会, 235 - 238
- Dec. 2000, 平成12年度情報処理教育研究集会, 239 - 242Linuxシステムにおける授業・運用支援系ツールの開発
- Jul. 2000, 第4回ネットワークの変革とソフトウェア研究会
- Jul. 2000, 情報処理学会第61回全国大会, 1, 349 - 350
- May 1998, 信学技報, FTS98-55, 37 - 44
- May 1998, 信学技報, CST98-2, 38611 - 38611, English
- Jan. 1998, 第38回FTC研究会
- Sep. 1997, 電子情報通信学会1997年ソサイエティ大会, D(3) (3), 3 - 3
- A New Memory-Efficient Method for Service Specification Verification Using Disk Storage通信サービスの最も一般的な検証である可到達解析では, 状態数がユーザ数やサービスの複雑さに伴って指数的に増加するため, 検証システム上の主記憶のサイズが実質上検証できるサービスクラスを支配してしまう. この問題に対処するため, 本稿では二次記憶を利用して可到達解析を行う検証系を開発した. 核となる状態列挙には Stern らの方法を利用し, それを改良することによってより一層の効率化を図った.The Institute of Electronics, Information and Communication Engineers, 13 Aug. 1997, Proceedings of the Society Conference of IEICE, 1997, 17 - 17, Japanese
- Experimental Evaluation of Detection Method based on P-Invariant for Non-Deterministic Feature IntaractionsFeature interaction is known as a kind of conflicts among service functions in the communication system to which new communication services are added. It is strongly required to establish the efficient detection and elimination method for feature interactions. We have already proposed a new detection algorithm Ω for nondeterministic feature interactions, which utilizes P-invariant of Petri-Net. The goal of this paper is to evaluate the usefulness of the proposed method by applying it to practical telecommunication services. The experimental results show that proposed method attains high quality of detection and good scalability, and that it is well applicable to the interaction detections of practical servicesThe Institute of Electronics, Information and Communication Engineers, 30 May 1997, Technical report of IEICE. SS, 97(78) (78), 9 - 16, Japanese
- May 1997, 信学技報, SS97-6, 38611 - 38611
- Detection algorithm for non-deterministic feature interactions using Petri-netFeature interaction is known as a kind of conflicts of service functions, Which arise when a new communication service is added to the existing communication system. For feature interactions, it is strongly required to establish the systematic detection and elimination method. Since the conventional detection methods generally require the state enumeration based on reachability analysis, and thus cause the state explosion problem, they cannot be applied to complex service specifications assuming many users. In order to overcome this problem and detect non-deterministic feature interactions, We have already proposed a new detection algorithm Ω based on a Petri-Net model. By using P-invariant of the Petri-Net, the algorithm Ω can detect the non-deterministic interactions without any state enumeration. The goal of this paper is to give the formal proofs for the correctness of the algorithm Ω. Then we also discuss the applicability of the P-invariant to other types of feature interactions.The Institute of Electronics, Information and Communication Engineers, Mar. 1997, 信学技報, SS96-57(600) (600), 38611 - 38611, English
- A synthesis method for fault-tolerant multipath routing protocols in connectionless networksRouting Protocol synthesis problem discussed in this paper is the problem to derive a routing protocol specification modeled by FSM from a given routing specification modeled by FSM. In this paper, we propose a synthesis method to solve the routing protocol synthesis problem in connectionless networks such that each message can be delivered from its source node to its destination node through relay nodes even when a node or channel fails. The key ideas of the proposed method are as follows. (1) Primitives exchanged between users and source or destination nodes in the service specification are projected to the protocol specification of each protocol entity. (2) Using the transition synthesis rules transitions for directly delivering messages from the source node to the destination node are generated in the protocol specification of the source and destination nodes. (3) Transitions for delivering message through the loop-free communication paths from the source node to destination node generated in the protocol specification of the related nodes.The Institute of Electronics, Information and Communication Engineers, Sep. 1996, 信学技報, SSE96-93(252) (252), 109 - 114, English
- Jul. 1996, 信学技報, IN96-33, 13 - 20, EnglishAn analysis method of non-determinism in telecommunication service specifications using a high level Petri-net model
- Mar. 1996, 信学技報, SSE95-152, 217 - 224, English
- Sep. 1995, 第2回通信ソフトウェア研究会
- Jun. 1995, 第1回通信ソフトウェア研究会
- Dec. 1994, 第5回通信ソフトウェア工学研究会
- 複数のプリミティブが並列実行可能なサービス仕様からのプロトコル仕様の自動合成Protocol synthesis is a method for designing communication protocols reliably and efficiently.The previous synthesis methods assume that primitives cannot be executed simultaneously at different SAPS.If concurrent primitives are executed at the different SAPS,protocol errors of unspecified receptions and dead locks occur. In this paper,we extend a class of service specifications from which protocol specifications are synthesized by the previous methods to a class of service specifications with parallel execution of primitives. We first introduce the priority of primitives such that when parallel execution of primitives occurs the execution assigned higher priority takes precedence over that assigned lower priority. Based on this idea,we propose a new protocol synthesis algorithm for avoiding the protocol errors due to message collision, communication competition and so on. By applying this method,protocol specifications can be automatically synthesized from service specifications which have an arbitrary number of processes and which allow parallel execution of primitives.The Institute of Electronics, Information and Communication Engineers, Apr. 1994, 信学技報, SSE94-37(2) (2), 85 - 90, Japanese
- Joint work, IGI Global, Feb. 2010, EnglishService-Oriented Architecture for Migrating Legacy Home Appliances to Home Network System: Principle and ApplicationsScholarly book
- Joint editor, IOS Press, Jun. 2009, EnglishFeature Interactions in Software and Communication Systems XScholarly book
■ Research Themes
- 日本学術振興会, 科学研究費助成事業, 基盤研究(A), 神戸大学, Apr. 2025 - Mar. 2029, Principal investigatorHealthy Memory Twin: 自分のデータで記憶障害に備えるスマートシステム
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Grant-in-Aid for Scientific Research (B), Niigata University of Health and Welfare, 01 Apr. 2024 - 31 Mar. 2028Understanding Brain Mechanisms Associated with Conversion and Reversion of Mild Cognitive Impairment and Development to Dementia Prevention
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Grant-in-Aid for Scientific Research (B), Doshisha University, 01 Apr. 2023 - 31 Mar. 2028A Study on Entity Identification and Utilization in Cross-Dataset
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Grant-in-Aid for Scientific Research (B), Kobe University, Apr. 2024 - Mar. 2028Developing an Early Assistance System for Dementia by Finger Dexterity Assessment Using XAI technology
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Grant-in-Aid for Scientific Research (B), Tokyo Institute of Technology, 01 Apr. 2023 - 31 Mar. 2027A Study on View Constuction for Application-oriented Graph Knowledge Base
- Japan Science and Technology Agency (JST), Strategic International Collaborative Research Program (SICORP), Japan - Taiwan Communication Research (CR), Kobe University, Apr. 2024 - Mar. 2027
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Grant-in-Aid for Scientific Research (S), Nara Institute of Science and Technology, 31 Aug. 2020 - 31 Mar. 2025Fundamental and Innovative Technologies for Next-Generation Software Ecosystems(1)プロダクトのアップサイクリング:マイクロサービス化によるプログラムコードの資産化 アップサイクリングの候補を増やす手法として、GitHubにおける後継・関連プロジェクトの探索技術を開発した。また、人工知能やプログラム難読化など、自動生成技術によって作り出されたプログラム(ソースコード)の価値を評価するために、ソースコードの独自性、信頼性、実行速度などの品質特性を計測する技術を開発した。 (2)人とAIの適材適所配置:人とAIの適格性評価,ベンチマーキング チームによるソフトウェア開発運用を想定し、信頼できる開発運用者に求められる行動特性(コンピテンシー)を同定すると共に、GitHub上の活動から計測可能なメトリクスとして定義した。また、ソフトウェアライブラリ間の依存関係と開発運用者の貢献度の関係、および、プロジェクトへの新規参入者による初期貢献の定量的評価を通じて、開発運用者の適格性を「貢献」という観点で定量化すると共に、プロジェクトの健全性や持続可能性との関係を明らかにした。 (3)外部技術情報ともリンクする品質管理:ブロックチェーン技術を用いた情報集約 GitHub Discussions、GitHub Sponsors profile、GitHub Advisory Databaseなどを対象として、詳細な技術情報の分析や情報取得の自動化の技術を開発した。また、外部技術情報ともリンクした品質管理の主要な機能の一つとして、ソフトウェア更新支援技術の検討,開発を進めた.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Kobe University, 01 Apr. 2020 - 31 Mar. 2024A model development taking advantage of engineering technology for family caregivers caring for people with dementia in Asian Pacific Rim countries本研究では、認知症高齢者と家族介護者の生体情報(ストレス等)、睡眠及び行動・生活環境を、客観的デバイスを用いて24時間継続して縦断的に調査する。これにPC版Virtual Agent(VA)とのコミュニケーションを通した家族介護者の日々の質的データを統合して認知症高齢者と家族介護者の詳細な生活状況を把握する。 本年度は、システム情報学研究科と共同でVAのシステム構築を行った。VAが家族介護者へ声掛けを行う際の具体的発言内容と声掛けの時間・タイミングについて検討し、研究者が実際に試用して最終版を完成させた。Hamon(心拍・ストレス・体調等)、眠りスキャン、アクチグラフ(活動量)の作動とデータ蓄積状況を確認した後、1組の認知症でない高齢者夫婦で1週間すべての機器を用いて予備調査を実施した。環境・行動センシングの作動状況やVAの問いかけ・タイミング、Hamonによるストレスデータ収集のためのトランスミッタとiPhoneの接続状況、質問紙調査の内容と記載日時の確認等を行った。また、機器や使用方法などの理解を容易にするため、VA、アクチグラフ、ストレス測定用ウェア等に関する説明書を作成した。 本研究はタイ王国、中国でも実施予定であることから、中国語とタイ語で音声会話できるMP Agent技術の開発も手掛けた。英語、日本語、中国語、タイ語バージョンを入力し、音声認識とその音声を複製するサンプル試作を行った。現在COVID-19により海外での現地調査や予備調査を実施できない状況にあるが、環境が整い次第、タイ語版・中国語版VAを完成させ予備調査を実施していく予定である。
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C), Grant-in-Aid for Scientific Research (C), Niigata University of Health and Welfare, 01 Apr. 2020 - 31 Mar. 2023Development and evaluation of mile cognitive impairment screening system for community and home現在、神経心理学的検査の記録と評価は紙媒体での遂行後に主観的評価で行われているが、我々は手書きにて描かれた対象をデータ化して保存する電子ドローイングシステムを開発した。これにより、描画課題の遂行過程と筆圧を電子データで保存し、遂行過程の詳細な評価を容易にし、遂行課程を可視化することで認知症スクリーニングの可能性について検討することが可能となる。今回、描画遂行課程の特徴から認知機能の自動推定手法について検討した。 対象は物忘れを主訴として医療機関を受診し、MMSE、ADAS、時計描画課題(CDT)、図形模写課題(CCT)を実施できた90名(平均年齢81.2±5.6歳、男性35名、女性55名)を対象に とした。ワコム社製スマートパッドを使用し、データの電子保存用専用ソフトウェアを作成した。データは1/133秒単位で座標と筆圧が保存され、CDTとCCTの秒数、ストローク数、描画速度などの特徴量を算出した。 従属変数をMMSEとしてステップワイズ法による重回帰分析を行ったところ、CDT速度の最小値、CCTストロークの数、CDT筆圧の最大値、CCT筆圧の最大値、CDT速度の最大値が説明変数として抽出された。また、従属変数をADASとしてステップワイズ法による重回帰分析を行ったところ、CCT筆圧の中央値、CDTのペンが離れていた時間が説明変数として抽出された。CDTとCCTの描画過程を電子保存し、特徴量を抽出することでMMSEやADASなどの認知機能を推定できる可能性が示唆された。
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A), Grant-in-Aid for Scientific Research (A), Kobe University, 01 Apr. 2019 - 31 Mar. 2023Assisting self care and mutual aid of elderly people with dementia at home based on mind externalization2020年度の成果は,前年度に開発した「こころ」センシング基盤を活用して様々な自助支援サービスを開発したことである.まず,スマートフォンアプリのLINEを活用して,高齢者の内的状態をアセスメントする「こころ」の見守りサービスを実装した.このサービスでは,高齢者の身体,精神,社交の3つの側面から,健康状態を尋ねる質問を作成し,LINEのチャットボットが高齢者に問いかけて状態を取得するものである.実装したサービスを,50代~80代の8名の高齢者,および,20代~40名の19名の非高齢者に対して,14か月の運用評価を行った. また,在宅の認知症当事者とその家族介護者を支援するために,宅内に簡易なセンサ付きスピーカーを設置し,場所と時間に応じた情報提示を行うシステムALPSを提案・実装した.ALPSでは,家族介護者がECAルールによって,情報提示の場所,時刻・曜日,内容を細かく設定でき,世帯ごとに異なる困りごとに柔軟に適応した情報提示が可能になっている. 互助支援サービスとして,高齢者の困り事とその対処法をコミュニティで共有するWebアプリケーションCompass4SLの研究開発も進めた.Compass4SLでは,高齢者がシステムに困りごとを入力し,対処法を検索できるとともに,支援する人が自身の知っている対処法を登録・共有する.対処法を見た高齢者は実際にその方法を試し評価を行うことで,困り事とその対処法が集合知として蓄積されていく. さらに,IoTやセンサを活用した宅内環境・行動センシングの技術開発にも注力した.定点カメラとコンピュータビジョン技術を用いて,寝たきりの高齢者を対象とした身体活動量を骨格センシングによって計測する手法や,宅内画像内で場所を矩形で定義し,そこに利用者が入ったかどうかを検知するBounding Box as a Locationサービス等を開発した.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Kyoto Institute of Technology, 01 Apr. 2019 - 31 Mar. 2022Research on a support system for consensus building with people with dementia - medical consent, property management as an example -In the early stages of dementia, the will of the person with dementia is respected, but in the middle and later stages, the person's family members make decisions and make judgments because of the dementia person's declining ability to understand, and in many cases, the dementia person's wishes are left behind. In response to these problems, the purpose of this study was to conduct research and development of human augmentation technology based on AI, robotics, and other technologies to support the expression of intentions and emotions by people with dementia. We then examined the ethical, legal, and social acceptability of the human-enhanced intentions of people with dementia, and the economic impact on medical care, with medical professionals, psychologists, and economists.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Tokyo Institute of Technology, 01 Apr. 2018 - 31 Mar. 2022An Implementation of Scalable and High Performance Multidimensional Data Store本研究は、大規模多次元データの容易な維持管理ならびに利用が可能なシステムの実現を目的とする。関係データベース(RDB)とクラウドストレージ(NoSQL)の個々の実装に依存せずに各々の利点どうしを相補的に活用するために、個々のRDBやNoSQLを抽象化してミドルウェアで協調動作させ、スケーラブルな多次元データ基盤を実現する。これにより、大規模かつ多種多様、例えばグラフを含む多次元データに対しても、複雑な問い合わせ処理を可能にする。 本年度は、RDBとHBaseの一般的なデータ操作APIを利用した多次元データストアのプロトタイプの初期評価を行った。13台のPCクラスタを利用して1億件のデータベースを利用した評価実験から、任意の次元での範囲クエリならびに集約演算が関係データベースのみあるいはクラウドストレージのみのデータストアよりも十分に高いスループットで実行できることを明らかにした。特にデータの読み書きが混在する場合において、高い性能を示すことが判明した。このプロトタイプに対してデータ要約手法を組込み、さらなる集約演算の高効率化を目指した。そのために多次元ヒストグラムとカーネル密度推定の二つを併用し、計算精度ならびにスループットの向上を試みた。一般に、前者は計算スループットが高いが精度が低く、後者は逆の性質を持ち、互いにトレードオフの関係にある。範囲クエリと格納データの各パーティションとの重複部分の計算精度を調査し、重複部分の体積が小さいときに軽量な多次元ヒストグラムの精度が高いことが判明した。この性質を利用して、気象センサーデータと交通データをそれぞれ用いて集約演算を評価したところ、両者を重複部分の体積に応じて動的に切替えることで、計算精度とスループットの向上が同時に実現できることを明らかにした。
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Doshisha University, 01 Apr. 2018 - 31 Mar. 2022A Study on Development Software Environment for Data Utilization Apps本研究では,さまざまなアプリケーションからデータを利活用する際,これまで考慮されてこなかったデータの品質に関して,データアクセス時に考慮するアプリケーションを容易に開発するためのソフトウェア開発環境を構築する手法を提案するものである.このソフトウェア開発環境基盤は,アプリにより使用法が異なるデータへのアクセス方法・機能を考慮しながら,ソフトウェアを開発できる開発環境全体を指し,アプリごとに異なるデータアクセスを実現するための API 群を備えるよう設計する.また 同時に,効率的なソフトウェア開発を実現可能とするために,API 群のさまざまな利用状況に応じて自律的にデータを整理,実体化する機能をも兼ね備える. 本研究では,NoSQLDB によってデータ管理を行いながら,伝統的に用いられてきた RDB をベースとしたシステムアーキテクチャを踏襲することが一般であるという考えに基づき,このソフトウェア開発環境基盤開発のために,本年度は A) データ活用基盤技術,B) データアクセス基盤技術,の二種類に焦点を当てながら研究を進めた. A) の開発においては,RDB におけるビューの自律的導出技術にはさまざまなアプローチがあるためそのいくつかの実装を行ったが,実装したアプローチの評価実験に時間を要しているばかりか,データ量が小さい場合の評価実験において,一部の評価結果で既存研究に比べ目を見張るほどの高パフォーマンスを得ることが出来なかった.一方,B) の開発は SQuaRE に基づいたサービス API の設計と実装を行うことが主な内容だったため,SQuaRE に基づいた API 開発が行えたか否かだけが問題となるだけである.一点,問題点を挙げるならば,未だ機械学習技術に基づいた SQuaRE に基づく品質の高いサービス開発の実現に向けては検討を始めることが出来なかった点である.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research, Grant-in-Aid for Scientific Research (A), Nara Institute of Science and Technology, 01 Apr. 2017 - 31 Mar. 2020Development of Basic Technologies for Accelerating Spontaneous Software EvolutionWe developed the basic technology to realize a platform that accelerates a unique software development paradigm, so-called "Spontaneous Software Evolution," widely, stably, and sustainably way. Specifically, we designed and prototyped a control mechanism (governance framework) that takes smart cities as the model, a set of support bots to improve the efficiency of evolution proposals under the mechanism, and a community currency to motivate individual developers and activate the development community.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Kobe University, 01 Apr. 2016 - 31 Mar. 2020, Principal investigatorThe goal of this research is to develop a practical and affordable system that achieves the Person-Centered Care (PCC), which is an ideal principle of professional nursing facilities, within daily scenes of in-home dementia care. To achieve the goal, we have studied essential technologies for four different service layers: (1) sensing service, (2) context reasoning service, (3) care planning and creation service, (4) agent service. These services are integrated by the service oriented architecture. We have implemented these services using IoT, cloud, agent and machine learning technologies, and conducted empirical evaluation with practical settings. The achievements and deliverable of this research are taken over by a subsequent project, newly funded by Grant-in-Aid for Scientific Research (A).Competitive research funding
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Tokyo Institute of Technology, 01 Apr. 2015 - 31 Mar. 2018High Precision Information Retrieval and Recommendation based on CopulasIn this research, we applied copulas which can consider complex dependencies among multiple features to the areas of information retrieval (IR) and recommender systems, and showed a method to design transparent and highly effective IR and recommender systems. More specifically, we considered a mixture copula model which integrates multiple copulas with a linear combination for building effective IR and recommender systems. To estimate a good mixture copula which affects their effectiveness, we indicated that it is appropriate that a density-based clustering algorithm is applied in the copula estimation phase. In addition, we also developed an efficient top-k algorithm for quickly returning relevant results even if the scoring function is non-linear, such as copulas, and non-monotonic. Moreover, as for recommender systems, we showed that effective recommender systems can also be designed with mixture copulas, when preprocessing feature parameters with a statistical approach.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Challenging Exploratory Research, Grant-in-Aid for Challenging Exploratory Research, Kobe University, 01 Apr. 2015 - 31 Mar. 2018Development of platform of new information location system using probabilistic location informationIn this research, we propose a novel location information system that can use location information mutually by converting location information expressed in various forms for each location information system into one representation method called Probabilistic location information. In particular, during this research period, we have proposed what kind of data the probabilistic position information holds, definition of the requirement and method of calculating actual establishing position information.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Doshisha University, 01 Apr. 2014 - 31 Mar. 2018A Study on A Data Access Service for Applications utilizing Big Data AnalyticsIn this study, we have developed a data access service for applications utilizing big data analytics. This is because the developers of the applications had implemented their own data access services using their inventive approach; however, this task was a factor in preventing the efficient software development. We implemented three types of base technologies for an efficient data access service from the applications utilizing big data analytics, and confirmed the effectiveness of our data access service.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C), Grant-in-Aid for Scientific Research (C), Kobe University, 01 Apr. 2012 - 31 Mar. 2015, Principal investigatorIn this research, we have studied a systematic framework for detecting and resolving the "service interaction problem" in smart city. Specifically, we developed a modeling method of smart city services, a framework to formalize, detect and resolve the service interactions, and the service interaction management system for the evaluation. Our contributions include; a method for modeling and detecting service chains and interactions, a formalization, detection and resolution method of environment service interactions, a data platform for managing large-scale log in smart city, context-aware services with real-world data. These achievements have been published as 11 journal papers and 80 oral presentations.Competitive research funding
- 川西記念新明和教育財団, 研究助成金, Apr. 2014 - Mar. 2015, Principal investigatorヴァーチャルエージェントを用いた個人適応型見守りサービスの研究Competitive research funding
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Nara Institute of Science and Technology, 01 Apr. 2011 - 31 Mar. 2014A massively distributed technical framework that support crowd-sourcing and collective intelligence formation in software developmentIn this research, we proposed a massively distributed technical framework that support crowd-sourcing and collective intelligence formation in software development. In the crowd-sourcing, software development tasks are outsourced to many unspecified individuals by the Internet technology. The proposed platform consists of two platforms for supporting a multilingual communication and intelligence formation, and for supporting lightweight & massive PDCA cycle execution. Experimental results showed that these sub-platforms have validity and usefulness in terms of supporting the crowd-sourcing and collective intelligence formation in software development. The proposed framework will realize a new massively distributed software development carried by many individuals connected through the Internet technology, and bring risk reduction and quality improvement in software development, by deconstructing the existing multi-layered subcontract system in software development.
- 関西エネルギー・リサイクル科学研究振興財団, 若手奨励研究, Apr. 2012 - Mar. 2013, Principal investigatorホームネットワークを用いた個人適応型省エネ行動推薦システムの開発と評価Competitive research funding
- ひょうご科学技術協会, 奨励研究助成, Apr. 2011 - Mar. 2012, Principal investigatorユーザプロファイルとライフログを活用した「個人適応型省エネ行動」の推薦Competitive research funding
- 科学研究費補助金/若手研究(B), Apr. 2009 - Mar. 2012, Principal investigatorCompetitive research funding
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B), Grant-in-Aid for Young Scientists (B), Kobe University, 2009 - 2011Guaranteeing Safety of Ubiquitous Services with Feature InteractionsIn this research, we have studied a systematic framework for assuring safety of ubiquitous network services. In addition to the safety of individual services, we also take the feature interaction problem among multiple services into account. Our contributions include ; the formalization and validation framework of the safety, feature interaction detection for home network services, definition of environment feature interactions with the impact model, service chain detection method, development of practical services and applications. These achievements have been published as22papers and44oral presentations.
- 科学研究費補助金/若手研究(B), Apr. 2007 - Mar. 2009, Principal investigatorCompetitive research funding
- 日本学術振興会, 日仏交流促進事業(SAKURAプログラム), Apr. 2007 - Mar. 2009, Principal investigatorユビキタスサービスにおける安全性とセキュリティに関する研究Competitive research funding
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (C), Grant-in-Aid for Scientific Research (C), Nara Institute of Science and Technology, 2007 - 2009A Framework for Software ObfuscationTo hide secrets in a computer program, this research proposes a framework to apply existing obfuscation methods to a given program. The result of an experimental evaluation showed that secret information and its clues were all hidden by the proposed framework while conventional obfuscation tools could not thoroughly hide the secrets.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Young Scientists (B), Grant-in-Aid for Young Scientists (B), 2006 - 2008Research on Feature Interactions in Ubiquitous Network本研究では,ユビキタスネットワークにおける複数のサービス間の機能衝突であるサービス競合問題に焦点をあて,競合問題の形式化,検出方式,解消方式,評価に関する研究を行った.また,ユビキタスアプリケーションの一つである,ホームネットワークシステムを実際に開発し,実システム上でホームネットワークサービスの競合検出,解消方式を実装,評価を行った.一連の研究成果を,論文誌,国際会議,研究会を含め,45編の論文にまとめ発表した.
- Japan Society for the Promotion of Science, Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B), Grant-in-Aid for Scientific Research (B), Nara Institute of Science and Technology, 2005 - 2007A Software Component Recommendation System Based on Development ContextIn modern software development, many of software products are built by combining existing software components and coding only minimal required features. However, selecting necessary components from a number of components is not easy. For instance, Java 2 SDK Standard Edition (J2SE) Version 1.41_02 is widely used by software developers and provides them with 5568 software components (basis classes). From our pilot experiments, we have found that only 4% of the software components of Java 2 SDK were used in typical software development. This result indicates additional coding is still much required, while a variety of software components are currently available to reuse. The goal of our study is to realize an efficient environment for components-based software development. Toward achieving the goal, in this research project, we constructed a system that recommends required software components to developers according to the context of software development. Especially we focused on developing the following elemental technologies: (A). Birthmark: a technology to analyze the development context which means the progress and/or completeness of development, features and/or structures of software itself, and so forth, by extracting the amount of characteristics from target software under development, (B). Collaborative Filtering: a technology to identity and recommend software components which have context similar to target software, and (C). Association Visualization: a visualization technology to provide developers with reasons why the system recommends software components to developers. We integrated the three technologies into a system and evaluated it.
- 日本学術振興会, 科学研究費助成事業 若手研究(B), 若手研究(B), 奈良先端科学技術大学院大学, 2003 - 2005インターネットにおけるサービス競合の検出・解消に関する研究平成17年度は主に次の1,2に従って,研究を行った. 1.携帯電話サービスに対するサービス競合検出実証実験 今日の携帯電話網では,インターネットを利用した様々なサービスが提供されている.そこで,平成15年度,16年度での本研究の成果を踏まえ,実際の携帯電話サービスに対してサービス競合の検出実験を行った.具体的には,まずUse Case Maps(UCMs)と呼ばれる要求記述法を用いて,ある通信キャリアの8種類の携帯電話サービスのサービスシナリオを記述した.次に,複数のサービスを組み合わせた際に,単独サービス時には現れなかったシナリオを洗い出した.これらのシナリオに基づき,実際の携帯電話サービスに加入,実証実験を行った.その結果,24種類のサービス競合が検出され,そのうち13種類がマニュアルに記載されていない新たなサービス競合であることがわかった.この成果をまとめ,国内論文誌および海外論文誌で発表した. 2.ホームネットワークにおけるサービス競合検出法の評価,解消法の考察 平成16年度の成果であるホームネットワークシステムにおけるサービス競合検出法について,サービス競合国際会議(ICFIO5)で発表を行い,最優秀論文賞を受賞した.また,この手法を評価するべく,実際の家電を用いたホームネットワーク環境の設計・実装を行った.また,ホームネットワーク,および,サービスを厳密に記述するための記述言語を開発し,サービス誤りを自動検出する手法の提案も行った.この成果は国際会議論文(APSECO5)として発表した.また,検出されたサービス競合を綿密に解消するために,競合コンテキストに基づく分類手法を提案した。さらに,各分類について,ユーザ問い合わせ,5種類の優先度,サービスロックといった具体的な競合解消スキームの開発を行った.この成果は,国内研究会で発表している.
- 日本学術振興会, 科学研究費助成事業 若手研究(B), 若手研究(B), 2001 - 2002要求レベルにおける通信サービス競合フィルタリング技術に関する研究平成14年度は次の1,2に従って,研究を行った. 1.提案フィルタリング法と検出法との統合 平成13年度に提案したUCMsを用いたフィルタリング法は、「競合がおこりがちな」サービスの組み合わせ、および、競合が疑われる要求レベルのシナリオを導出する。このフィルタリングの導出結果を、サービス競合検出プロセスで効率的に利用する手法の提案を行った。具体的には、インターネット電話(VoIP)のサービス記述言語CPLを用いた開発環境におけるサービス競合検出法を新たに開発した。この方法では、競合がおこりがちなシナリオをCPLスクリプトにおける意味誤りにマッピングし、複数のCPLスクリプト間のサービス競合を「各スクリプト単体では発生しない意味誤り」と定式化する。これにより、競合フィルタリングで得られたシナリオを用いて、CPL間のサービス競合を効率よく検出することが出来た。 2.VoIPサービス競合検出シミュレータの構築 1.で提案した手法を計算機上で実装し、VoIPにおけるサービス競合の検出シミュレーションを行えるシステムを試作した。このシステムは、ユーザ定義のCPLスクリプトを入力すると、提案法に従った競合検出のシミュレーションを行うシステムである。また、このシステムはWebインターフェイスとCGI技術を用いて外部に公開されており、インターネットを通してあらゆるユーザが試用することができる。 以上の成果を5つの国際会議論文(ICOIN-16,ICDSN-2002,ITC-CSCC2002,NCSEC2002,SAINT2003)にまとめ、口頭発表を行った。
- 日本学術振興会, 科学研究費助成事業 特別研究員奨励費, 特別研究員奨励費, 大阪大学, 1998 - 1999通信サービスにおけるフィーチャーインタラクションのモデル化と解析に関する研究