著者
Mizuki Watanabe Ryotaro Kobayashi Masahiko Kato
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.23, no.5, pp.655-663, 2015 (Released:2015-09-15)
参考文献数
15
被引用文献数
1 1

Currently, Web services are widely utilized to disclose company information, and offer online services and e-commerce. As these services have become an essential part of our everyday lives, the public is greatly inconvenienced when they are disrupted. Denial of service (DoS) attacks exert adverse influences on Web services. We focus on HTTP-GET Flood attacks, which are manually operable DoS attacks. It is possible to simply block manually operable DoS attacks such as F5 attacks on the server side; however, such measures could be noticed by the attackers. Therefore, to prevent the attacker changing their method of attack, it is possible to overcome the attack by redirecting the attack to another system, for which a previous study has proposed a feasible technique located in the service provider. The previous study assumes a correlation between the CPU resource and the request error rate. However, the Web Server actually has multiple resources. Therefore, it is important to be able to control the server resources rather than the CPU and the memory. The operational implementation of the proposed method and the evaluation experiments confirm the effectiveness of the proposed method.
著者
趙 暁婷 高島 健太郎 西本 一志
出版者
Information Processing Society of Japan
雑誌
情報処理学会研究報告. GN, グループウェアとネットワークサービス (ISSN:21888744)
巻号頁・発行日
vol.2018, no.1, pp.1-6, 2018-03-12

アイデア生成の上流過程である発散的思考活動では,幅広い視点から様々な知識や関連情報を収集することが求められる.特に新奇性が高いアイデアを産み出すためには,一見飛躍しているように思える意外な関連性のある知識や情報を得る必要がある.しかしながら,特になんらかの専門的な知識を有する者にとっては,その知識の枠を超えて発想を飛躍させることは容易ではない.この問題を解決するために,本研究では「子供の発想」に注目する.子供はしばしば,大人が思いつかないようなアイデアを思いつく.しかしながら,ほとんどの場合,子供のアイデアは非現実的なものであり,そのままでは役にたたない.そこで,同じ課題に対する子供のアイデアを,専門知識を有する大人に提供し,これを参照しながら実用的なアイデア生成を行う手法を提案する.被験者実験により,提案手法の有効性を検証する. : In the divergent thinking process, an upstream process of idea generation, it is required to collect various knowledge and related information from a wide viewpoint. In particular, in order to produce ideas with high novelty, it is necessary to obtain unexpectedly relevant knowledge and information which seems to be leaping at first glance. However, it is not easy for a person with some specialized knowledge to leap the idea beyond the boundary of that knowledge. In order to solve this problem, we focus on "children's ideas" in this research. Children often come up with ideas that adults cannot think of. However, in most cases, the ideas of children are not feasible and it is not useful as they are. Therefore, we propose a novel divergent thinking method where children's ideas are referred to. We conducted user studies and verified the effectiveness of the proposed method.
著者
Kenichiro Nakai Yasuhiko Takenaga
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.20, no.3, pp.723-726, 2012 (Released:2012-07-15)
参考文献数
9
被引用文献数
3 2

Pandemic is a multi-player board game which simulates the outbreak of epidemics and the human effort to prevent them. It is a characteristic of this game that all the players cooperate for a goal and they are not competitive. We show that the problem to decide if the player can win the generalized Pandemic from the given situation of the game is NP-complete.
著者
Takehiro Wakabayashi Shuji Morisaki Norimitsu Kasai Noritoshi Atsumi Shuichiro Yamamoto
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.28, pp.136-149, 2020 (Released:2020-02-15)
参考文献数
26

This article proposes a tool supported approach to detect omitted requirements that are not implemented in a corresponding architectural design document using difference sets of words or word senses between a software requirements specification document and a software architectural design document. First, the proposed approach extracts sets of single-words, multi-words, and word senses that appear in a requirements specification document but do not appear in the corresponding design document using a natural language processing tool. Then, an architectural design document inspector validates whether each of the specified document with the single-words, multi-words, or word senses are implemented in the corresponding architectural design document using the sets as guides. Evaluation 1 investigated whether omitted requirements can be detected in design documents using the proposed approach. Evaluation 2 investigated the numbers of words that inspectors need to check for the proposed approach. The result of Evaluation 1 shows that omitted requirements are detected in all three pairs for real requirements specification documents and design documents. The result of Evaluation 2 shows that the numbers of words in the difference sets to those in the requirements specification documents vary from 18 to 83 % for the nine pairs of requirements specification documents and design documents.
著者
Tasuku Okui
出版者
Information Processing Society of Japan
雑誌
IPSJ Transactions on Bioinformatics (ISSN:18826679)
巻号頁・発行日
vol.13, pp.1-6, 2020 (Released:2020-01-08)
参考文献数
26
被引用文献数
5

Microbiome data have been obtained relatively easily in recent years, and currently, various methods for analyzing microbiome data are being proposed. Latent Dirichlet allocation (LDA) models, which are frequently used to extract latent topics from words in documents, have also been proposed to extract information on microbial communities for microbiome data. To extract microbiome topics associated with a subject's attributes, LDA models that utilize supervisory information, including LDA with Dirichlet multinomial regression (DMR topic model) or supervised topic model (SLDA, ) can be applied. Further, a Bayesian nonparametric model is often used to automatically decide the number of latent classes for a latent variable model. An LDA can also be extended to a Bayesian nonparametric model using the hierarchical Dirichlet process. Although a Bayesian nonparametric DMR topic model has been previously proposed, it uses normalized gamma process for generating topic distribution, and it is unknown whether the number of topics can be automatically decided from data. It is expected that the total number of topics (with relatively large proportions) can be restricted to a smaller value using the stick-breaking process for generating topic distribution. Therefore, we propose a Bayesian nonparametric DMR topic model using a stick-breaking process and have compared it to existing models using two sets of real microbiome data. The results showed that the proposed model could extract topics that were more associated with attributes of a subject than existing methods, and it could automatically decide the number of topics from the data.
著者
Tetsuro Matsumura Kimio Kuramitsu
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.24, no.2, pp.256-264, 2016 (Released:2016-03-15)
参考文献数
16
被引用文献数
1

Parsing Expression Grammars are a popular foundation for describing syntax. Unfortunately, several syntax of programming languages are still hard to recognize with pure PEGs. Notorious cases appears: typedef-defined names in C/C++, indentation-based code layout in Python, and HERE document in many scripting languages. To recognize such PEG-hard syntax, we have addressed a declarative extension to PEGs. The “declarative” extension means no programmed semantic actions, which are traditionally used to realize the extended parsing behavior. Nez is our extended PEG language, including symbol tables and conditional parsing. This paper demonstrates that the use of Nez Extensions can realize many practical programming languages, such as C, C#, Ruby, and Python, which involve PEG-hard syntax.
著者
Kohei Matsumura Yasuyuki Sumi Mitsuki Sugiya
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.25, pp.361-365, 2017 (Released:2017-05-15)
参考文献数
12
被引用文献数
1

Nonverbal information plays an important role to convey feelings and/or interests of the people in conversations. Since Bibliobattle, a book-review game, has pleasant features to investigate non-verbal information on conversation settings, we conduct a series of experiments on Bibliobattle settings. In Bibliobattle, each speaker presents his/her own recommended book to listeners as a bibliobattler in 5 minutes. At the end of all presentations, everyone votes for the champion book. We analyzed a series of Bibliobattle experiments by video investigation. In the analysis, we focused on the listeners' non-verbal information, in particular, nods, laughs and change postures. Our results showed that there are co-occurrence of nonverbal action among the audience in Bibliobattles. The frequency of co-occurrence of positive non-verbal information were assumed to be excitement of the presentation. However, interestingly, the results showed that the frequency does not affect the result of voting for the champion book in Bibliobattle. We discuss the cause of the results in the paper.
著者
Hiroyuki Tanaka Masahiro Yoshida Koya Mori Noriyuki Takahashi
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.26, pp.87-97, 2018 (Released:2018-02-15)
参考文献数
83
被引用文献数
28

Multi-access Edge Computing (MEC) can be defined as a model for enabling business oriented, cloud computing platform within multiple types of the access network (e.g., LTE, 5G, WiFi, FTTH, etc.) at the close proximity of subscribers to serve delay sensitive, context aware applications. To pull out the most of the potential, MEC has to be designed as infrastructure, to support many kind of IoT applications and their eco system, in addition to sufficiently management mechanism. In this context, various research and standardization efforts are ongoing. This paper provides a comprehensive survey of the state-of-the-art research efforts on MEC domain, with focus on the architectural proposals as infrastracture, the issue of the partitioning of processing among the user devices, edge servers, and a cloud, and the issue of the resource management.
著者
Mina Shiraishi Kozue Ogasawara Tetsuro Kitahara
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.27, pp.683-692, 2019 (Released:2019-11-15)
参考文献数
25
被引用文献数
1

Creating harmony in karaoke by a lead vocalist and a backing vocalist is enjoyable, but backing vocals are not easy for non-advanced karaoke users. First, it is difficult to find musically appropriate submelodies (melodies for backing vocals). Second, the backing vocalist has to practice backing vocals in advance in order to play backing vocals accurately, because singing submelodies is often influenced by the singing of the main melody. In this paper, we propose a backing vocals practice system called HamoKara. This system automatically generates a submelody with a rule-based or probabilistic-model-based method, and provides users with an environment for practicing backing vocals. Users can check whether their pitch is correct through audio and visual feedback. Experimental results show that the generated submelodies are musically appropriate to some degree, and the system helped users to learn to sing submelodies to some extent.
著者
Zhaohao Zeng Ruihua Song Pingping Lin Tetsuya Sakai
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.27, pp.742-751, 2019 (Released:2019-11-15)
参考文献数
37

We tackle Attitude Detection, which we define as the task of extracting the replier's attitude, i.e., a target-polarity pair, from a given one-round conversation. While previous studies considered Target Extraction and Polarity Classification separately, we regard them as subtasks of Attitude Detection. Our experimental results show that treating the two subtasks independently is not the optimal solution for Attitude Detection, as achieving high performance in each subtask is not sufficient for obtaining correct target-polarity pairs. Our jointly trained model AD-NET substantially outperforms the separately trained models by alleviating the target-polarity mismatch problem. By employing pointer networks to consider the target extraction task a boundary prediction problem instead of a sequence labelling problem, the model obtained better performance and faster training/inference than LSTM and LSTM-CRF based models. Moreover, we proposed a method utilising the attitude detection model to improve retrieval-based chatbots by re-ranking the response candidates with attitude features. Human evaluation indicates that with attitude detection integrated, the new responses to the sampled queries are statistically significantly more consistent, coherent, engaging and informative than the original ones obtained from a commercial chatbot.
著者
Nobutaka Kito Kazuyoshi Takagi Naofumi Takagi
出版者
Information Processing Society of Japan
雑誌
IPSJ Transactions on System LSI Design Methodology (ISSN:18826687)
巻号頁・発行日
vol.12, pp.78-80, 2019 (Released:2019-08-01)
参考文献数
11
被引用文献数
4

A conversion method of a netlist consisting of conventional logic gates for superconducting rapid single flux quantum (RSFQ) circuit realization is proposed. The method detects OR gates which can be replaced with confluence buffers (CBs) which converge their input pulses into their outputs. The detection problem of replaceable OR gates is treated as a SAT problem. Each OR gate requires clock input in RSFQ circuits. By replacing OR gates with CBs, wiring for clocking those OR gates are eliminated and the number of active devices known as Josephson junctions is reduced.
著者
Joseph Korpela Ryosuke Miyaji Takuya Maekawa Kazunori Nozaki Hiroo Tamagawa
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.24, no.2, pp.302-313, 2016 (Released:2016-03-15)
参考文献数
26
被引用文献数
2 7

This paper presents a method for evaluating toothbrushing performance using audio data collected by a smartphone. This method first conducts activity recognition on the audio data to classify segments of the data into several classes based on the brushing location and type of brush stroke. These recognition results are then used to compute several independent variables which are used as input to an SVM regression model, with the dependent variables for the SVM model derived from evaluation scores assigned to each session of toothbrushing by a dentist who specializes in dental care instruction. Using this combination of audio-based activity recognition and SVM regression, our method is able to take smartphone audio data as input and output evaluation score estimates that closely correspond to the evaluation scores assigned by the dentist participating in our research.
著者
Johann Knechtel Ozgur Sinanoglu Ibrahim (Abe) M. Elfadel Jens Lienig Cliff C. N. Sze
出版者
Information Processing Society of Japan
雑誌
IPSJ Transactions on System LSI Design Methodology (ISSN:18826687)
巻号頁・発行日
vol.10, pp.45-62, 2017 (Released:2017-08-02)
参考文献数
162
被引用文献数
33

Three-dimensional (3D) integration of electronic chips has been advocated by both industry and academia for many years. It is acknowledged as one of the most promising approaches to meet ever-increasing demands on performance, functionality, and power consumption. Furthermore, 3D integration has been shown to be most effective and efficient once large-scale integration is targeted for. However, a multitude of challenges has thus far obstructed the mainstream transition from “classical 2D chips” to such large-scale 3D chips. In this paper, we survey all popular 3D integration options available and advocate that using an interposer as system-level integration backbone would be the most practical for large-scale industrial applications and design reuse. We review major design (automation) challenges and related promising solutions for interposer-based 3D chips in particular, among the other 3D options. Thereby we outline (i) the need for a unified workflow, especially once full-custom design is considered, (ii) the current design-automation solutions and future prospects for both classical (digital) and advanced (heterogeneous) interposer stacks, (iii) the state-of-art and open challenges for testing of 3D chips, and (iv) the challenges of securing hardware in general and the prospects for large-scale and trustworthy 3D chips in particular.
著者
Bo Sun Xiapu Luo Mitsuaki Akiyama Takuya Watanabe Tatsuya Mori
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.26, pp.212-223, 2018 (Released:2018-02-15)
参考文献数
40
被引用文献数
3

Mobile app stores, such as Google Play, play a vital role in the ecosystem of mobile device software distribution platforms. When users find an app of interest, they can acquire useful data from the app store to inform their decision regarding whether to install the app. This data includes ratings, reviews, number of installs, and the category of the app. The ratings and reviews are the user-generated content (UGC) that affect the reputation of an app. Therefore, miscreants can leverage such channels to conduct promotional attacks; for example, a miscreant may promote a malicious app by endowing it with a good reputation via fake ratings and reviews to encourage would-be victims to install the app. In this study, we have developed a system called PADetective that detects miscreants who are likely to be conducting promotional attacks. Using a 1723-entry labeled dataset, we demonstrate that the true positive rate of detection model is 90%, with a false positive rate of 5.8%. We then applied our system to an unlabeled dataset of 57M reviews written by 20M users for 1M apps to characterize the prevalence of threats in the wild. The PADetective system detected 289K reviewers as potential PA attackers. The detected potential PA attackers posted reviews to 136K apps, which included 21K malicious apps. We also report that our system can be used to identify potentially malicious apps that have not been detected by anti-virus checkers.
著者
Fuyumasa Takatsu Kohei Hiraga Osamu Tatebe
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.25, pp.438-447, 2017 (Released:2017-06-15)
参考文献数
36
被引用文献数
2

The fusion of the research field of high-performance computing (HPC) with that of big data, which has become known as the field of extreme big data, is problematic in that file creation in storage systems such as distributed file systems is not optimized. That is, the large workload leads to simultaneous creations of many files by many processes when creating checkpoints. The need to improve the file creation processes prompted us to design a scale-out distributed file system for post-petascale systems named PPFS. PPFS consists of PPMDS, which is a scale-out distributed metadata server, and PPOSS, which is a scalable distributed storage server for flash storage. The high file creation performance of PPMDS was achieved by using a key-value store for metadata storage and non-blocking distributed transactions to update multiple entries simultaneously. PPOSS depends on PPOST, which is an object storage system that manages the underlying low-level storage, such as Fusion IO ioDrive, a flash device connected through PCI express supporting OpenNVM. The high file creation performance was attained by implementing the PPFS prototype using file creation optimization, termed bulk creation, to reduce the amount of communication between PPMDS and PPOSS. And, to enhance the I/O performance of PPOSS when the client process and PPOSS run on the same node, PPOSS accesses a local storage device directly. The prototype implementation of PPFS with a further file creation optimization called object prefetching achieves 138, 000 Operations Per Second for file creation when using five metadata servers and 128 client processes, thereby exceeding the performance of IndexFS by 2.52 times. With local access optimization, PPOSS reached its limit at a block size of 16KiB, which is an improvement of 1.5 times compared to before optimization. Furthermore, this evaluation indicates that PPFS has a good scalability on file creation and IO performance, that is required for post-petascale systems.
著者
Makito Oku
出版者
Information Processing Society of Japan
雑誌
IPSJ Transactions on Bioinformatics (ISSN:18826679)
巻号頁・発行日
vol.12, pp.9-16, 2019 (Released:2019-03-25)
参考文献数
16
被引用文献数
3

In this paper, I propose two novel methods for extracting synchronously fluctuated genes (SFGs) from a transcriptome data. Variability and synchrony in biological signals are generally considered to be associated with the system's stability in some sense. However, a standard method for extracting SFGs from a transcriptome data with high reproducibility has not been established. Here, I propose two novel methods for extracting SFGs. The first method has two steps: selection of remarkably fluctuated genes and extraction of synchronized gene clusters. The other method is based on principal component analysis. It has been confirmed that the two methods have high extraction performance for artificial data and a moderate level of reproducibility for real data. The proposed methods will help to extract candidate genes related to the stability and homeostasis in living organisms.
著者
Yasuhiko Asao Erik D. Demaine Martin L. Demaine Hideaki Hosaka Akitoshi Kawamura Tomohiro Tachi Kazune Takahashi
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.25, pp.590-600, 2017 (Released:2017-08-15)
参考文献数
6

We show how to fold a piece of paper and punch one hole so as to produce any desired pattern of holes. Given n points on a piece of paper (finite polygon or infinite plane), we give algorithms to fold the paper flat so that those n points and no other points of paper map to a common location, so that punching one hole and unfolding produces exactly the desired pattern of holes. Furthermore, we can forbid creases from passing through the points (allowing noncircular hole punches). Our solutions use relatively few creases (in some cases, polynomially many), and can be expressed as a linear sequence of folding steps of complexity O(1)—a generalization of simple folds which we introduce.
著者
Hiroshi Yamada Kazuya Murao Tsutomu Terada Masahiko Tsukamoto
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.26, pp.38-47, 2018 (Released:2018-01-15)
参考文献数
15
被引用文献数
1

Competitive karuta is an official Japanese card game and is described as “martial art on the tatami.” Recently, competitive karuta has attracted a great deal of attention among young people. One of characteristic rules of competitive karuta is that there is no referee; therefore players must judge themselves even if the difficult situation arises. Consequently, the players sometimes get into an argument over their judgement, which disrupts the other matches in the room because all the matches proceed in parallel. In this paper, we propose a system that judges the player who took a card first in a competitive karuta match. Our system measures motion data when players take a card by using a wrist-worn accelerometer and gyroscope, and estimates the times when the players touched the card. From the evaluation experiments, 69.2% of rounds were estimated without error and 99.0% of rounds were estimated within 20-ms error. When our system was introduced on the close game, the accuracy of deciding the player taking a card was 75%.
著者
Shotaro Usuzaki Yuki Arikawa Hisaaki Yamaba Kentaro Aburada Shin-Ichiro Kubota Mirang Park Naonobu Okazaki
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.26, pp.257-266, 2018 (Released:2018-03-15)
参考文献数
18

Distributed Denial-of-Service (DDoS) attack detection systems are classified into a signature based approach and an anomaly based approach. However, such methods tend to suffer from low responsiveness. On the other hand, real-time burst detection which is used in data mining offers two advantages over traditional statistical methods. First, it can be used for real-time detection when an event is occurring, and second, it can work with less processing as information about events are compressed, even if a large number of events occur. Here, the authors add the function for attack detection in real-time burst detection technique, and propose a highly responsive DDoS attack detection technique. This paper performs experiments to evaluate its effectiveness, and discusses its detection accuracy and processing performance.
著者
Yuhei Watanabe Takahiro Iriyama Masakatu Morii
出版者
Information Processing Society of Japan
雑誌
Journal of Information Processing (ISSN:18826652)
巻号頁・発行日
vol.25, pp.288-295, 2017 (Released:2017-03-15)
参考文献数
16

WEP has serious vulnerabilities, and they cause various key recovery attacks. Although a more secure protocol such as WPA2 is recommended, according to each research by IPA and Keymans NET, WEP is still widely used because of the lack of knowledge about security of the wireless LAN. On the other hand, it takes large costs to replace a wireless LAN equipment in large-scale facilities. They need a secure method which can be used on their equipment by updating the firmware of WEP. In 2011, Morii, one of us, et al. showed IVs which prevented the Klein attack, the PTW attack, and the TeAM-OK attack. However, they did not present how to obtain such IVs and evaluate security of them. This paper shows the secure method of WEP and how to use it as fast as WEP. We show an IV which prevents the establishment of previous key recovery attacks. Moreover, we show how to use our IV efficiently on the operation of WEP. Our method requires about 1.1 times the processing time for the encryption than WEP. As a result, our method can prevent previous key recovery attacks and realize communication as fast as WEP.