Updated on 2024/01/31

写真a

 
YOKOHIRA Tokumi
 
Organization
Faculty of Interdisciplinary Science and Engineering in Health Systems Professor
Position
Professor
External link

Degree

  • Doctor of Engineering ( Osaka University )

Research Interests

  • Communication Protocols

  • Edge Computing

  • Fault Tolerant Networks

  • Cloud Computing

  • Computer Networks

Research Areas

  • Informatics / Theory of informatics

  • Manufacturing Technology (Mechanical Engineering, Electrical and Electronic Engineering, Chemical Engineering) / Communication and network engineering

Education

  • Osaka University   大学院基礎工学研究科   物理系専攻 博士後期課程

    1986.4 - 1989.3

      More details

    Country: Japan

    researchmap

  • Osaka University   大学院基礎工学研究科   物理系専攻 博士前期課程

    1984.4 - 1986.3

      More details

    Country: Japan

    researchmap

  • Osaka University   基礎工学部   情報工学科

    1980.4 - 1984.3

      More details

    Country: Japan

    researchmap

Research History

  • Okayama University   The Graduate School of Interdisciplinary Science and Engineering in Health Systems   Professsor

    2021.4

      More details

    Country:Japan

    researchmap

  • Okayama University   Division of Interdisciplinary Science and Engineering in Health Systems, The Graduate School of Interdisciplinary Science and Engineering in Health Systems   Professor

    2018.4 - 2021.3

      More details

    Country:Japan

    researchmap

  • Okayama University   Division of Medical Bioengineering, The Graduate School of Natural Science and Technology   Professor

    2015.4 - 2018.3

      More details

    Country:Japan

    researchmap

  • Okayama University   Division of Industrial Innovation Sciences, The Graduate School of Natural Science and Technology,   Professor

    2005.4 - 2015.3

      More details

    Country:Japan

    researchmap

  • Okayama University   Department of Communication Network Engineering, Faculty of Engineering   Professor

    2003.7 - 2005.3

      More details

    Country:Japan

    researchmap

  • Okayama University   Department of Communication Network Engineering, Faculty of Engineering   Associate Professor

    2000.4 - 2003.6

      More details

    Country:Japan

    researchmap

  • Okayama University   Department of Information Technology, Faculty of Engineering   Associate Professor

    1994.12 - 2000.3

      More details

  • Okayama University   Department of Information Technology, Faculty of Engineering   Senior Assistant Professor

    1990.5 - 1994.11

      More details

  • Okayama University   Department of Information Technology, Faculty of Engineering   Assistant Professor

    1989.4 - 1990.4

      More details

▼display all

Professional Memberships

 

Papers

  • Statistical Analysis of Effectiveness of Cross-Disciplinary Team’s Practice in Engineering Project Based Learning

    Masaya MIKAMI, Takahiro HIWAKI, Yoshihiro HAGIHARA, Yuya TARUTANI, Tokumi YOKOHIRA

    Journal of JSEE   71 ( 2 )   2_14 - 2_20   2023

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Japanese Society for Engineering Education  

    DOI: 10.4307/jsee.71.2_14

    researchmap

  • An Improvement of an IP Fast Reroute Method Using Multiple Routing Tables Reviewed

    Yuya Tarutani, Masashi Ishigai, Naoto Numata, Yukinobu Fukushima, Tokumi Yokohira

    Journal of Internet Technology   23 ( 6 )   1315 - 1324   2022.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Angle Publishing Co., Ltd.  

    <p>The demand for high Internet availability has increased. As a routing method to recover fast from a single network component (link or node) failure, a method using multiple routing tables has been proposed. In the method, when a component failure occurs, packets which are supposed to pass through the component in the failure free state are rerouted using a backup routing table (backup table: BT) which does not use the component. Thus, it is important to decrease the increased routing cost, and because the method uses multiple BTs, it is also important to decrease the numbers of entries in BTs. In this paper, we propose a new routing method to decrease the increased routing cost. In the conventional method, there are many components that do not fail but are not used for packet forwarding in a BT. In our proposed method, we use such components as much as possible to decrease the increased routing cost. About the decreasing of the numbers of entries in BTs, we simulate packet forwarding for every node-pair and find unnecessary entries which are not used in packet forwarding in any node-pair. Numerical examples show that our proposed method is superior to the conventional method. </p><p> </p>

    DOI: 10.53106/160792642022112306014

    researchmap

  • Consensus Building using Deep Reinforcement Learning for Energy Management

    Yuya Tarutani, Isato Oishi, Yukinobu Fukushima, Tokumi Yokohira

    IEIE Transactions on Smart Processing & Computing   11 ( 4 )   284 - 291   2022.8

     More details

    Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics Engineers of Korea  

    DOI: 10.5573/ieiespc.2022.11.4.284

    researchmap

  • Minimizing the monetary penalty and energy cost of server migration service

    Yukinobu Fukushima, Tatsuya Suda, Tutomu Murase, Yuya Tarutani, Tokumi Yokohira

    Transactions on Emerging Telecommunications Technologies   2022

     More details

    Publishing type:Research paper (scientific journal)  

    Current IaaS (infrastructure as a service) cloud service may not satisfy communication QoS (quality of service) requirements of delay-sensitive network applications, if there is a significant physical distance between a server of the network application (NetApp server) at a data center and its network application clients (NetApp clients). In order to improve communication QoS of NetApp clients, we propose server migration service (SMS) in this article. SMS allows NetApp servers to migrate among different locations in the network (1) to optimally locate themselves in relation to NetApp clients and mitigate the QoS degradation caused by location-related factors (ie, propagation delays on network links) and (2) to optimally distribute traffic load over routers and processing load over (physical) computers and decrease the energy consumption. We develop a mixed-integer programming model that determines when and to which locations NetApp servers migrate to minimize the total operating cost of SMS, that is, the sum of the monetary penalty incurred due to QoS violation and energy cost incurred due to energy consumption, while preventing NetApp servers from excessively migrating and adversely impacting QoS of the non-SMS service that share the resource of the substrate network with SMS. Simulation results show that the model developed in this article achieves up to 42% lower total operating cost of SMS compared to the model that only minimizes the monetary penalty of SMS without considering the energy cost of SMS.

    DOI: 10.1002/ett.4511

    Scopus

    researchmap

  • Throughput Fairness in Congestion Control of Multipath TCP.

    Yu Deguchi, Aoshi Kobayashi, Yuya Tarutani, Yukinobu Fukushima, Tokumi Yokohira

    ICTC   123 - 126   2022

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICTC55196.2022.9952427

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ictc/ictc2022.html#DeguchiKTFY22

  • A Secret Sharing Scheme to Reduce the Total Data Size

    Kuniaki Tsuji, Shiden Kishimoto, Yuya Tarutani, Yukinobu Fukushima, Tokumi Yokohira

    2021 International Conference on Information and Communication Technology Convergence (ICTC)   2021.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ictc52510.2021.9621088

    researchmap

  • A Server Migration Method Using Q-Learning with Dimension Reduction in Edge Computing Reviewed

    Ryo Urimoto, Yukinobu Fukushima, Yuya Tarutani, Tutomu Murase, Tokumi Yokohira

    International Conference on Information Networking   2021-January   301 - 304   2021.1

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Edge computing is a promising computing paradigm that satisfies QoS requirements of delay-sensitive applications. In edge computing, server migration control is indispensable for managing client mobility. As a server migration method for edge computing, the method based on Q-learning has been proposed. However, the method assumes that there is only one application client and the number of destination edge servers is limited to one. In this paper, we propose a server migration method using Q-learning that copes with realistic situations where there are multiple application clients and destination edge servers. The contributions of this paper are as follows: 1) we clarify that, under the situation with multiple application clients and multiple destination edge servers, a straightforward server migration method using Q-learning (RL method) does not scale due to state space explosion, and 2) we propose a server migration method using Q-learning (RL-DR method) that reduces the dimensionality of state space by abstracting the numbers of application clients at all locations into a center of the gravity (COG) of application clients. The simulation results show that 1) RL method shows up to 248% worse performance than conventional server migration methods because of state space explosion and 2) RL-DR method achieves up to 38.3% better performance than the conventional methods.

    DOI: 10.1109/ICOIN50884.2021.9333965

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icoin/icoin2021.html#UrimotoFTMY21

  • Proposal of device control method based on consensus building using reinforcement learning Reviewed

    Isato Oishi, Yuya Tarutani, Yukinobu Fukushima, Tokumi Yokohira

    International Conference on Information Networking   2021-January   451 - 456   2021.1

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Various information is collected from IoT devices through the network. As such device becomes more familiar to the user, services are required to consider the influence of user. However, it is difficult to set the parameters of actuators that build consensus among all users in an environment where people with various preferences coexist. The conventional method minimizes the power consumption under the constraints of the user stress. However, this method has a problem that the calculation overhead is increased as the number of devices and users is increased. In this study, we propose a device control method based on consensus building with reinforcement learning. In the proposed method, the state is reduced by applying reinforcement learning for reducing the calculation overhead. As a result of evaluation, we clarified that our method obtains the device parameters that improve the reward by 1.5 times compared with the conventional method. Moreover, we also clarified that a reward value of 98.6% can be achieved compared to the optimum value.

    DOI: 10.1109/ICOIN50884.2021.9333958

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icoin/icoin2021.html#OishiTFY21

  • An IP Fast Reroute Method against Multiple Node Failures Reviewed

    Naoto Numata, Masashi Ishigai, Yuya Tarutani, Yukinobu Fukushima, Tokumi Yokohira

    International Conference on ICT Convergence   2020-October   714 - 719   2020.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Since network failures have a huge negative impact on our daily life, networks should be recovered from the failures as soon as possible. Although a lot of IP fast reroute methods have been proposed, most methods focus on multiple link failures or a single node failure. This paper proposes an IP fast reroute method which can reroute packets against multiple node failures. The paper is the first paper which deals with multiple node failures in the research area on IP fast reroute. The proposed method generates spanning trees to bypass the failures from a given network topology in network design stage, and reroutes a packet using one of the generated spanning trees every time the packet encounters a node failure in network operation stage. Numerical example shows that such spanning trees can be easily generated using our proposed method.

    DOI: 10.1109/ICTC49870.2020.9289623

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ictc/ictc2020.html#NumataITFY20

  • Performance Evaluation of Feature Encoding Methods in Network Traffic Prediction Using Recurrent Neural Networks Reviewed

    Yusuke Tokuyama, Ryo Miki, Yukinobu Fukushima, Yuya Tarutani, Tokumi Yokohira

    ACM International Conference Proceeding Series   279 - 283   2020.3

     More details

    Publishing type:Research paper (international conference proceedings)  

    © 2020 ACM. Recurrent neural network method considering traffic volume, timestamp and day of the week (RNN-VTD method) is a promising network traffic prediction method because of its high prediction accuracy. The RNN-VTD method encodes timestamp and day of the week, which are categorical data, to numerical data using label encoding. The label encoding, however, gives magnitude to the encoded values, which may cause misunderstanding of recurrent neural network models, and consequently, the prediction accuracy of the RNN-VTD method may be degraded. In this paper, we investigate the effect of using one-hot encoding instead of label encoding for a feature encoding method in the RNN-VTD method. In the one-hot encoding, each input data is encoded to an k-dimensional 0 - 1 vector where k is the number of category types. Because the encoded data do not have magnitude, it is expected that the prediction accuracy of the RNN-VTD method is improved.

    DOI: 10.1145/3395245.3396441

    Scopus

    researchmap

  • A TCP Incast Avoidance Method Based on Retransmission Requests from a Client. Reviewed

    Shiden Kishimoto, Shigeyuki Osada, Yuya Tarutani, Yukinobu Fukushima, Tokumi Yokohira

    2019 International Conference on Information and Communication Technology Convergence(ICTC)   153 - 158   2019

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICTC46691.2019.8939877

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ictc/ictc2019.html#KishimotoOTFY19

  • Determining Server Locations in Server Migration Service to Minimize Monetary Penalty of Dynamic Server Migration Reviewed

    Yukinobu Fukushima, Tutomu Murase, Gen Motoyoshi, Tokumi Yokohira, Tatsuya Suda

    Journal of Network and Systems Management   26 ( 4 )   1 - 41   2018.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer New York LLC  

    In this paper, we propose a new class of service called server migration service (SMS) to augment the existing IaaS (Infrastructure as a Service). SMS allows servers (server-side processes of a network application) to dynamically and automatically migrate as their clients (client-side processes of a network application) change their locations in order to reduce the total monetary penalty that the SMS provider pays to its SMS subscribers when failing to provide them with the guaranteed level of QoS. In this paper, we consider the monetary impact that arises from QoS degradation due to server migration and build an integer programming model to determine when and to which location servers should migrate to minimize the total monetary penalty incurred by the SMS provider. Numerical examples show that SMS achieves up to 96% lower total monetary penalty compared to that without server migration. Numerical examples also show that the integer programming model developed in this paper requires reasonable computation time under realistic parameter settings.

    DOI: 10.1007/s10922-018-9451-6

    Scopus

    researchmap

  • Workplace Capacity Design Using the Minimum Dominating Set in Server Migration Services Reviewed

    Yukinobu Fukushima, Itsuho Goda, Tutomu Murase, Tokumi Yokohira

    The 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2018)   ???-???   2018

  • Link Capacity Provisioning and Server Location Decision in Server Migration Service Reviewed

    Yukinobu Fukushima, Tokumi Yokohira, Tutomu Murase

    Proceedings of the 2018 IEEE 7th International Conference on Cloud Networking, CloudNet 2018   ???-???   2018

     More details

    Publishing type:Research paper (international conference proceedings)  

    © 2018 IEEE. Server migration service (SMS) has been proposed as a new class of service to augment the existing IaaS (Infras-tructure as a Service) cloud service. SMS allows servers (server-side processes of a network application) to dynamically and automatically migrate close to their clients (client-side processes of the network application) in order to reduce the penalty that the SMS provider pays to is SMS subscribers when failing to provide them with the guaranteed level of QoS. In this paper, we tackle a link capacity provisioning and server location decision problem where we consider the sum of link capacity provisioning cost and the penalty as the total expenditure of SMS business, and aim at minimizing the total expenditure. In the problem, we determine how much capacity to add to links, and when and to which location to migrate servers. We formulate the problem as an integer programming model, solve the model, and obtain the optimal link capacities, server locations at each time, and the global optimum value of the total expenditure of SMS business. Numerical examples show that the proposed method decreases the total expenditure of SMS business by up to 49% compared to a conventional method that determines the server locations while fixing the link capacities.

    DOI: 10.1109/CloudNet.2018.8549545

    Scopus

    researchmap

  • The Effect of Using Attribute Information in Network Traffic Prefdiction with Deep Learning Reviewed

    Yusuke Tokuyama, Yukinobu Fukushima, Tokumi Yokohira

    International Conference on ICT Convergence 2018 (ICTC 2018)   ???-???   2018

     More details

  • Backoff Algorithms to Avoid TCP Incast in Data Center Networks Reviewed

    Shigeyuki Osada, Daichi Izumi, Shiden Kishimoto, Yukinobu Fukushima, Tokumi Yokohira

    International Conference on ICT Convergence 2018 (ICTC 2018)   ???-???   2018

     More details

  • Improvement of a TCP incast avoidance method using a fine-grained kernel timer Reviewed

    Shigeyuki Osada, Shogo Wakai, Yukinobu Fukushima, Tokumi Yokohira

    International Conference on Information and Communication Technology Convergence: ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017   2017-   147 - 152   2017.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    When a standard TCP implementation using the minimum retransmission timeout (RTOmin) of 200 ms is used in distributed file systems in data centers, a well-known throughput degradation called TCP Incast occurs, because 200 ms is too large as an RTOmin in data centers. In order to avoid TCP Incast, a TCP implementation using a much smaller RTOmin attained by a fine-grained kernel timer is proposed. However, throughput still decreases in the implementation when the number of servers in distributed file systems is large. In this paper, we propose an improvement method introducing a new TCP option which enables a client to request servers to retransmit packets in a better timing. Numerical examples obtained by extensive simulation runs show the effectiveness of the improved method.

    DOI: 10.1109/ICTC.2017.8190962

    Scopus

    researchmap

  • A Prototype Virtual Network Embedding System Using OpenStack, Reviewed

    Yukinobu Fukushima, Kohei Sato, Itsuo Goda, Heung-Gyoon Ryu, Tokumi Yokohira

    IEIE Transactions on Smart Processing & Computing   6 ( 1 )   60 - 65   2017

     More details

  • Power-Aware server location decision in server migration service Reviewed

    Yukinobu Fukushima, Tokumi Yokohira, Tutomu Murase, Tatsuya Suda

    2016 International Conference on Information and Communication Technology Convergence, ICTC 2016   150 - 155   2016.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    The server migration service (SMS) is an optional service that improves communication QoS of the IaaS cloud service. In the SMS, small-scale data centers (micro data centers) called work places (WPs) are deployed at various locations in the network. In the SMS, a network application (a NW-App) consists of one or more server-side processes of the application (servers) and one or more client-side processes of the application (clients). In the SMS, servers migrate among WPs in order to improve communication QoS between the servers and their clients, unlike in the IaaS cloud service where locations of the servers are always fixed at a data center in the network. In our previous study, we developed an integer programming model and solved it to determine when and to which WPs servers should migrate in the SMS in order to minimize the financial penalty, i.e., SMS provider's financial loss due to degradation of the communication QoS. In this paper, we consider the electricity power cost, an important component of the operational cost of the SMS, in addition to the financial penalty considered in our previous study, in determining when and to which WPs servers should migrate in the SMS. In this paper, we define the operational cost of the SMS as the sum of the financial penalty and electricity power cost and consider a power-Aware server location decision problem in order to minimize the operational cost of the SMS. We formulate the problem as a mixed-integer programming model and solve the model numerically. Numerical examples show that our mixed-integer programming model optimally determines the locations of the servers and decreases the operational cost by up to 15.5% compared to our previous integer programming model, where the power cost was not considered.

    DOI: 10.1109/ICTC.2016.7763457

    Scopus

    researchmap

  • Candidate Path Selection Method for TCP Performance Improvement in Fixed Robust Routing Reviewed

    Yukinobu Fukushima, Takashi Matsumura, Kazutaka Urushibara, Tokumi Yokohira

    IEIE Transactions on Smart Processing & Computing   5 ( 6 )   445 - 453   2016

     More details

  • Modification of an Energy-Efficient Virtual Network Mapping Method for a Load-Dependent Power Consumption Model Reviewed

    Shigeyuki Osada, Ryo Miyayama, Yukinobu Fukushima, Tokumi Yokohira

    WSEAS Transactions on Communications   15   240 - 250   2016

     More details

  • TCP Incast avoidance based on connection serialization in data center networks Reviewed

    Shigeyuki Osada, Ryo Miyayama, Yukinobu Fukushima, Tokumi Yokohira

    International Journal of Computer Networks and Communications   8 ( 4 )   83 - 102   2016

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Academy and Industry Research Collaboration Center (AIRCC)  

    In distributed file systems, a well-known congestion collapse called TCP incast (Incast briefly) occurs because many servers almost simultaneously send data to the same client and then many packets overflow the port buffer of the link connecting to the client. Incast leads to throughput degradation in the network. In this paper, we propose three methods to avoid Incast based on the fact that the bandwidth-delay product is small in current data center networks. The first method is a method which completely serializes connection establishments. By the serialization, the number of packets in the port buffer becomes very small, which leads to Incast avoidance. The second and third methods are methods which overlap the slow start period of the next connection with the current established connection to improve throughput in the first method. Numerical results from extensive simulation runs show the effectiveness of our three proposed methods.

    DOI: 10.5121/ijcnc.2016.8406

    Scopus

    researchmap

  • Prototype Development of a Virtual Network Embedding System Using OpenStack Reviewed

    Itsuho Goda, Kohei Sato, Yukinobu Fukushima, Heung-Gyoon Ryu, Tokumi Yokohira

    The 31st International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2016)   21 - 24   2016

     More details

  • Nonlinearity Sensitivity of FBMC and UFMC Modulation System for the 5G Mobile System Reviewed

    Changyoung An, Heung-Gyoon Ryu, Yukinobu Fukushima, Tokumi Yokohira

    The 31st International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2016)   1 - 4   2016

     More details

  • Performance improvement of an AS-friendly peer selection algorithm for P2P live streaming Reviewed

    Yukinobu Fukushima, Kazuki Kobayashi, Tokumi Yokohira

    International Journal of Computer Networks and Communications   8 ( 1 )   35 - 46   2016

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Academy and Industry Research Collaboration Center (AIRCC)  

    Minimum Physical Hop (MPH) has been proposed as a peer selection algorithm for decreasing inter-AS (Autonomous System) traffic volume in P2P live streaming. In MPH, a newly joining peer selects a peer whose physical hop count (i.e., the number of ASes traversed on the content delivery path) from it is the minimum as its providing peer. However, MPH shows high inter-AS traffic volume when the number of joining peers is large. In this paper, we propose IMPH that tries to further decrease the inter-AS traffic volume by distributing peers with one logical hop count (i.e., the number of peers or origin streaming servers (OSSes) traversed on the content delivery path from an OSS to the peer) to many ASes and encouraging the following peers to find their providing peers within the same AS. Numerical examples show that IMPH achieves at the maximum of 64% lower inter-AS traffic volume than MPH.

    DOI: 10.5121/ijcnc.2016.8103

    Scopus

    researchmap

  • Load Modulation Based MIMO Communication for the Low Complexity and Low Power Consumption Reviewed

    Changyoung An, Heung-Gyoon Ryu, Seung Hwan Lee, Masahiro Umehira, Tokumi Yokohira

    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE)   558 - 561   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In this paper, we design LM-MIMO system using high-order m-PSK modulation and evaluate performance of the system. As simulation results, we can confirm that LM-MIMO system with high-order m-PSK modulation has a similar performance to conventional MIMO system with a number of RF chains.

    DOI: 10.1109/ICCE.2016.7430711

    Web of Science

    researchmap

  • A trail multi-splitting method for throughput improvement in light trail networks Reviewed

    Yukinobu Fukushima, Wenjie Chen, Tokumi Yokohira

    PHOTONIC NETWORK COMMUNICATIONS   30 ( 2 )   178 - 189   2015.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER  

    Light trail networks have been proposed as an extension of lightpath networks in order to enable sub-wavelength bandwidth allocation in WDM networks. The networks need a medium access control (MAC) method to avoid collisions of data transmissions. We have proposed a MAC method which adopts a token-passing mechanism. The method splits one trail into two trails: one upstream trail and one downstream trail and permits independent data transmissions on the trails. However, the method leaves bandwidths of links upstream from the token-holding node idle because the method only splits the original trail into two trails and leaves the upstream trail unsplit. In this paper, we propose a novel token-passing MAC method for further improving trail throughputs. Our proposed method recursively splits the upstream trail, and consequently the original trail can be split into more than two trails. In the proposed method, an appropriate setting of upstream/downstream token-holding times of all nodes is a key factor to successfully accommodate an input traffic. Therefore, we tackle a problem (called a token-holding time decision problem) where we optimize token-holding times of all nodes so that input traffic is successfully accommodated. We formulate the problem as a linear programming model. Numerical examples on maximum effective throughput show that the proposed method is more superior as the ratio of short-hop traffic is higher in input traffic patterns.

    DOI: 10.1007/s11107-015-0509-z

    Web of Science

    researchmap

  • Strict application execution control with hierarchical group management using digital certificates on educational windows PCs Reviewed

    Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira

    Journal of Information Processing   23 ( 4 )   449 - 457   2015.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    We have developed a system (traditional system) to flexibly provide the requested applications environment on educational Windows PCs. The traditional system dynamically controls the execution of applications installed on each educational PC depending on the rules defined by teachers as well as by administrators. The traditional system, however, has a low tolerance for malicious attacks. If the execution file of a certain application is falsified, the corresponding rules already applied become invalid. In addition, though the traditional system has a function to define groups of controlled applications, it does not support hierarchical groups. This reduces the usability of the traditional system. In order to address these issues, this paper proposes a control method of application execution using digital certificates. The proposed method has a high tolerance for the falsification of execution files by controlling their executions based on the reliability of the corresponding digital certificates. It also improves its usability by introducing hierarchical group management utilizing hierarchical structure for digital certificates.

    DOI: 10.2197/ipsjjip.23.449

    Scopus

    researchmap

  • Performance Evaluation of an Energy Efficient Virtual Network Mapping Method-In the case of load-dependent power consumption model- Reviewed

    Yuta Hoshino, Yukinobu Fukushima, Tutomu Murase, Tokumi Yokohira, Tatsuya Suda

    The International Conference on Electronics and Software Science 2015 (ICESS 2015)   134 - 144   2015

     More details

  • An On-line Algorithm to Determine the Location of the Server in a Server Migration Service Reviewed

    Yuta Hoshino, Yukinobu Fukushima, Tutomu Murase, Tokumi Yokohira, Tatsuya Suda

    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE   740 - 745   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In IaaS cloud services, QoS of network applications (NW-Apps) may degrade due to location factors such as significant distance between a server-side application (server) of a NW-App at a data center and a client-side application (client) of the NW-App at a client terminal. In order to shorten the distance and to improve the QoS, server migration services (SMSes) have been proposed. In SMSes, servers may migrate between different computers (called work places, WPs) on a network to prevent QoS degradation caused by the changes of client locations. Although server migrations can improve QoS of NW-Apps, they also generate a huge amount of traffic (server migration traffic) in the network. This paper focuses on a server location decision problem where the location of a server is decided in an on-line manner so that QoS of a NW-App is improved under the constraint that the server migration traffic has to be suppressed below an acceptable level. For the problem, we propose a practical on-line algorithm. The key idea behind the proposed algorithm is that the location of the server is decided with consideration of the QoS degradation in the future. The algorithm defines the averagely good location for the server where the QoS is expected to be relatively good for various client locations. Then, it keeps the range of the server's migration within the returnable range where the server can soon come back to the averagely good location. As a result, the QoS can be always kept as good as the one under the averagely good location. Simulation results show that the proposed algorithm improves QoS of the NW-App by up to 30% compared to a greedy algorithm.

    DOI: 10.1109/CCNC.2015.7158070

    Web of Science

    researchmap

  • Throughput Improvement of TCP Proxies in Network Environment with Wireless LANs Reviewed

    Wang Hui, Yukinobu Fukushima, Tokumi Yokohira

    2014 IEEE REGION 10 SYMPOSIUM   82 - 87   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Split-connection type proxies have been proposed to improve TCP (Transmission Control Protocol) throughput in network environment with wireless LANs. A proxy is placed at the boundary of a wireless LAN (WLAN) and a wired network and it splits a TCP connection into two virtual TCP connections. We proposed a split-connection type proxy called MDA-Proxy (Modified Decreasing-ACK Proxy), which increases throughput of upflows (flows from wireless hosts to wired hosts) by decreasing the number of ACKs in a WLAN. MDA-Proxy uses two parameters, ack_stock and delay_timer, for each connection. The former controls the number of ACKs sent to a WLAN and the latter is used to recover from losses and delays of ACKs in a wired network. However, it is assumed that MDA-Proxy uses fixed values of the two parameters and their automatic tuning in response to network situation remains to be future work. In this paper, we propose a new type of proxy called ASA-Proxy (Ack_Stock Autotunning Proxy), which automatically tunes the two parameters in MDA-Proxy. Ack_stock is tuned comparing throughputs before and after its changing so that throughput of the connection becomes large, and delay_timer is replaced by the normal TCP retransmission timer because it is better than a fixed value of delay_timer for the inference of losses and delays of ACKs in a wired network. Extensive simulation runs show that ASA-Proxy is superior to MDA-Proxy.

    Web of Science

    researchmap

  • A Reroute Method to Recover Fast from Network Failure Reviewed

    Yasuhiro Harada, Wang Hui, Yukinobu Fukushima, Tokumi Yokohira

    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC)   903 - 908   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The demand for high Internet availability has increased. As routing methods to recover fast from a single network component (link or node) failure, methods using multiple routing tables have been proposed. In the methods, when a component failure occurs, packets which are supposed to pass through the component in the failure-free state are rerouted using a routing table (backup table) which does not use the component for packet forwarding. Thus, it is important to decrease the increased routing cost (for example, the number of increased hops of rerouted packets if every link cost is one) due to the reroute as much as possible. In this paper, we propose a new routing method to decrease the increased routing cost. In the conventional methods, there are many components that do not fail but are not used for packet forwarding in a backup table. In our proposed method, we use such components as much as possible, and consequently we try to decrease the increased routing cost. Numerical examples show the effectiveness of our proposed method.

    DOI: 10.1109/ICTC.2014.6983329

    Web of Science

    researchmap

  • Optimization of Maximum Timeout Value in TCP with a Fine-grained Timer for Data Center Networks Reviewed

    Ryo Miyayama, Shigeyuki Osada, Yukinobu Fukushima, Tokumi Yokohira

    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC)   433 - 437   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    When the standard TCP implementation is used in distributed. le systems in data center, a well-known throughput degradation called TCP Incast occurs. In order to avoid TCP Incast, a TCP implementation using a specialized. fine-grained timer is proposed. However, the throughput still decreases in the implementation when the number of servers in distributed. le systems is large. In this paper, we clarify that the cause of the decreasing is that maximum timeout value is too large and optimize the value.

    DOI: 10.1109/ICTC.2014.6983174

    Web of Science

    researchmap

  • Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming Environment Reviewed

    Koki Okamoto, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Tokumi Yokohira

    2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC)   551 - 557   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In recent years, with proliferation of smart phones and tablet PCs, speedup of wireless LAN communication is required for dealing with increase of traffic in wireless networks. However, transmission speed through a wireless network often slows down in comparison with that through a wired network since packets of wireless networks frequently drop due to the influence of surrounding environment such as electromagnetic noise. In this paper, we propose a method to mitigate the impacts caused by packet loss by virtue of SCTP bicasting in lossy multihoming environment with two or more wireless networks. This method bicasts not all packets but only important packets concerning retransmission for efficiency since bicasting all packets would cause congestion. We also implemented a prototype system based on the proposed method. According to the result of performance evaluation experiment, we confirmed the effectiveness of the proposed method by the fact that the prototype system performed faster transmission than normal SCTP transmission even in high packet loss rate environment.

    DOI: 10.1109/COMPSAC.2014.78

    Web of Science

    researchmap

  • Power Efficiency Evaluation of Medium Access Control Methods in Light Trail Networks Reviewed

    Ryo Fukuyama, Yukinobu Fukushima, Tokumi Yokohira

    The 29th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2014)   338 - 341   2014

     More details

  • Performance Evaluation of Overlay Construction Algorithms in Mesh-pull P2P Live Streaming Reviewed

    Yukinobu Fukushima, Tokumi Yokohira

    The 29th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2014)   334 - 337   2014

     More details

  • Power Consumption Evaluation of Light-trail Networks Reviewed

    Yukinobu Fukushima, Tokumi Yokohira

    The 29th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2014)   289 - 292   2014

     More details

  • AS-friendly Peer Selection Algorithm for P2P Live Streaming Reviewed

    Yukinobu Fukushima, Tokumi Yokohira

    International Journal of Multimedia Technology   4 ( 2 )   63 - 73   2014

     More details

  • Improvement of a TCP Incast Avoidance Method for Data Center Networks Reviewed

    Kazutoshi Kajita, Shigeyuki Osada, Yukinobu Fukushima, Tokumi Yokohira

    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS   460 - 465   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In distributed file systems, a well-known congestion collapse called TCP Incast occurs because many servers send data to the same client and then many packets overflow the port buffer of the client link. Incast leads to throughput degradation in the network In our previous work, we have proposed a method to avoid Incast. In the method, we limit the maximum number of simultaneously existing connections to a predetermined constant value. However, we cannot use the method when the data size is small, and because we have not investigated how to optimize the maximum value, Incast may occur if the maximum value is not appropriate. In this paper, we improve the method so that it is applicable regardless of the data size and the maximum value is optimized Numerical results show the effectiveness of our proposed method.

    DOI: 10.1109/ICTC.2013.6675396

    Web of Science

    researchmap

  • Decreasing of the Number of Backup Tables in Multiple Routing Table Method for Fast IP Network Recovery Reviewed

    Daiki Imahama, Yukinobu Fukushima, Tokumi Yokohira

    The 28th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2013)   823 - 826   2013

     More details

  • A Per-burst Traffic Distribution Method for TCP Performance Improvement in Fixed Robust Routing Reviewed

    Yu Sezaki, Yukinobu Fukushima, Takahiro Nabeta, Tokumi Yokohira

    The 28th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2013)   819 - 822   2013

     More details

  • A Multi-splitting Method for Light-trail Networks Reviewed

    Yukinobu Fukushima, Tokumi Yokohira

    The 28th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2013)   803 - 806   2013

     More details

  • A Wavelength and Converter Assignment Scheme using Converter Usage History in Wavelength-Routed Networks Reviewed

    Yukinobu Fukushima, Takahiro Ooishi, Tokumi Yokohira

    International Journal of Computer Networks & Communicationsd   5 ( 4 )   63 - 73   2013

     More details

  • Optimization of Server Locations in Server Migration Service Reviewed

    Yukinobu Fukushima, Tutomu Murase, Tokumi Yokohira, Tatsuya Suda

    The Ninth International Conference on Networking and Services (ICNS 2013)   200 - 206   2013

     More details

  • A Reroute Method Using Multiple Routing Configurations for Fast IP Network Recovery Reviewed

    Daiki Imahama, Yukinobu Fukushima, Tokumi Yokohira

    2013 19TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC): SMART COMMUNICATIONS TO ENHANCE THE QUALITY OF LIFE   433 - 438   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The demands on Internet reliability and availability have increased. As a routing method to recover fast from a single network component (link or node) failure, a method using multiple routing tables has been proposed. In the method, when a component failure occurs, packets which are supposed to pass through the component in no failure state are rerouted using a routing table (backup table) which does not use the component for packet forwarding. Thus, it is important to decrease the increased routing cost (for example, the number of increased hops of rerouted packets if every link cost is one) due to the reroute as much as possible. In this paper, we propose a new routing method to decrease the increased routing cost. In the conventional method, there are such components that do not fail but are not used for packet forwarding in a backup table. In our proposed method, we use such components, and consequently we try to decrease the increased routing cost. Numerical examples show the effectiveness of our proposed method.

    DOI: 10.1109/APCC.2013.6765984

    Web of Science

    researchmap

  • TCP Incast Avoidance Based on Connection Serialization in Data Center Networks Reviewed

    Shigeyuki Osada, Kazutoshi Kajita, Yukinobu Fukushima, Tokumi Yokohira

    2013 19TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC): SMART COMMUNICATIONS TO ENHANCE THE QUALITY OF LIFE   142 - 147   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In distributed file systems, a well-known congestion collapse called TCP Incast occurs because many servers send data to the same client and then many packets overflow the port buffer of the client link. Incast leads to throughput degradation in the network. In this paper, we propose two methods to avoid Incast based on the fact that only one connection can almost fully use the network bandwidth because the bandwidth-delay product is not so large in current data center networks. The first method is a method which completely serializes connection establishments. By the serialization, the number of packets in the port buffer becomes very small, which leads to Incast avoidance. The second method is a method which overlaps the slow start period of the next connection to the current established connection to improve throughput in the first method. Numerical results from extensive simulation runs show the effectiveness of our two proposed methods.

    DOI: 10.1109/APCC.2013.6765931

    Web of Science

    researchmap

  • An Architecture and a MAC Protocol for Throughput Improvement in Light Trail Networks Reviewed

    Wenjie Chen, Yukinobu Fukushima, Tokumi Yokohira

    IEICE TRANSACTIONS ON COMMUNICATIONS   E95B ( 7 )   2330 - 2343   2012.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Light trail architecture is attracting attention as a new optical wavelength-division multiplexing network architecture that can be built with currently available devices and can achieve bandwidth allocation with granularity finer than a wavelength. Because a light trail is a shared medium, we need a medium access control (MAC) protocol to prevent collisions. Although MAC protocols using token passing can prevent collisions, the bandwidths of links that are located upstream of the token holding node are kept idle. We first propose a dynamic light trail splitting method for increasing throughput of a light trail by using such idle bandwidths. Our method splits a trail into upstream and downstream trails at the token holding node, and independent data transmission on the two trails are permitted. As a result, we expect that the split trail architecture will achieve higher throughput than the original non-split trail architecture. The degree of performance improvement with the split trail architecture depends on how appropriately we determine the upstream and downstream token holding times of every transmission node. Thus, we formulate a problem in which we optimize the token holding times to accommodate requested traffic volume as a linear programming problem. We then derive the throughput of the split trail architecture by solving the problem using the NUOPT solver and investigate the degree of improvement over the original architecture. In addition, we evaluate the end-to-end delay of the split trail architecture by simulation. According to numerical examples, the split trail architecture achieves 1) almost the same throughput as the original one for the worst-case traffic pattern where every transmission node sends data to the terminating node of the trail only, 2) about 1.6 times higher throughput for a uniform traffic pattern where every node pair requests the same traffic volume and an extremely unbalanced traffic pattern where only a few node pairs request huge traffic volume, 3) about 1.9 time higher throughput for the split trail architecture's good-case traffic pattern where every transmission node sends data to its adjacent downstream node only, and 4) the end-to-end delay enough to satisfy any application's QoS requirement according to ITU-T Recommendation Y.1541.

    DOI: 10.1587/transcom.E95.B.2330

    Web of Science

    researchmap

  • Throughput Improvement for TCP with a Performance Enhancing Proxy Using a UDP-Like Packet Sending Policy Reviewed

    Hui Wang, Yuichi Nishida, Yukinobu Fukushima, Tokumi Yokohira, Zhen Wu

    IEICE TRANSACTIONS ON COMMUNICATIONS   E95B ( 7 )   2344 - 2357   2012.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    To improve TCP throughput even if the maximum receiving window size is small, a TCP performance enhancing proxy (PEP) using a UDP-like packet sending policy with error control has been proposed. The PEP operates on a router along a TCP connection. When the PEP receives a data packet from the source host, it transmits the packet to the destination host, copies the packet into the local buffer (PEP buffer) in case the packets need to be transmitted and sends a premature ACK acknowledging receipt of the packet to the source host. In the PEP, the number of prematurely acknowledged packets in the PEP buffer is limited to a fixed threshold (watermark) value to avoid network congestion. Although the watermark value should be adjusted to changes in the network conditions, watermark adjusting algorithms have not been investigated. In this paper, we propose a watermark adjusting algorithm the goal of which is to maximize the throughput of each connection as much as possible without excessively suppressing the throughputs of the other connections. In our proposed algorithm, a newly established connection uses the initial watermark value of zero to avoid drastic network congestion and increases the value as long as its throughput increases. In addition, when a new connection is established, every already-established connection halves its watermark value to allow the newly established connection to use some portion of the bandwidth and increases again as long as its throughput increases. We compare the proposed algorithm (CW method) with other methods: the FW method that uses a fixed large watermark value and the NP method that does not use the PER Numerical results with respect to throughput and fairness showed that the CW method is generally superior to the other two methods.

    DOI: 10.1587/transcom.E95.B.2344

    Web of Science

    researchmap

  • Destination selection algorithm in a server migration service Reviewed

    Asato Yamanaka, Yukinobu Fukushima, Tokumi Yokohira, Tutomu Murase, Tatsuya Suda

    Proceedings of the 7th International Conference on Future Internet Technologies, CFI'12   15 - 20   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Using network virtualization technologies for network applications (NW-Apps) consisting of server and clients, we can implement a server migration service where there are many server running environments (working places: WPs) inside a network and servers onWPs can migrate to otherWPs when communication QoSs in some NW-Apps fall off. Because server size is large, the traffic for server migration causes QoS degradation of its background traffic. Thus, it is important to decrease the degree (network impact) of the QoS degradation. In this paper, we propose three destination selection algorithms, MIA (Minimum Impact Algorithm), MRA (Maximum Remaining space Algorithm) and MCA (Maximum Covering Algorithm) that try to decrease the impact while increasing the number of NW-Apps' clients whose SLA (service level agreement) are satisfied. When a server migration is triggered, MIA, MRA and MCA move the server in the WP with the minimum impact, the WP with the maximum remaining space for servers and the WP with the maximum coverage, which is the number of routers under which the corresponding clients can communicate with the server while satisfying the SLA, respectively. Numerical examples show that when the number of accommodatable servers in full-cover WP (a full-cover WP is such WP that communicates with an arbitrary client while satisfying the SLA) is small or there is no full-cover WP, MIA outperforms the others, otherwise MCA outperforms the others. Copyright © 2012 by the Association for Computing Machinery, Inc.

    DOI: 10.1145/2377310.2377315

    Scopus

    researchmap

  • Inter-AS Traffic Volume Reduction by Localizing Delivery for P2P Live Streaming Reviewed

    Kazuki Kobayashi, Yukinobu Fukushima, Tokumi Yokohira

    2012 THIRD INTERNATIONAL CONFERENCE ON NETWORKING AND COMPUTING (ICNC 2012)   156 - 161   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In recent years, there is a big demand for live streaming service over the Internet. As one of the service model, peer-to-peer (P2P) live streaming has been utilized. In the system, it is important to decrease inter-AS (Autonomous System) traffic volume and content delivery delay because the larger volume leads to higher transit cost of ASes and this system treats the live contents, respectively. Therefore, as a conventional peer selection algorithm that tries to decrease them, Minimum Physical Hop (MPH) has been proposed. In MPH, to decrease inter-AS traffic volume, a newly joining peer selects a providing peer with the minimum physical hop count, which is the minimum number of ASes between the providing peer and the newly joining peer. Furthermore, to decrease content delivery delay, if there are several such candidates, it selects a providing peer with the minimum logical hop count, which is the number of Origin Streaming Servers (OSS) or peers passed from an OSS to the peer, from the candidates. However, MPH shows high inter-AS traffic volume when the number of joining peers is large. When we use MPH, candidates for providing peer with large logical hop count tend to swarm in ASes without an OSS while those with small logical hop count do in ASes with an OSS because of the peer selection policy of MPH. As the number of joining peers becomes large, the logical hop counts of the candidates for providing peer in every AS increase. As a result, in the former ASes, the logical hop counts of all the candidates for providing peer reach the upper bound frequently, and the newly joining peer cannot often find its providing peer in the AS, and consequently have to select providing peers in different ASes. In this paper, we improve MPH in order to further decrease the inter-AS traffic volume. In the improved algorithm called Improved Minimum Physical Hop (IMPH), we try to decrease the volume by distributing providing peers with one logical hop count to many ASes. As a result of the evaluation, we show that IMPH achieves to reduce the inter-AS traffic volume by at a maximum of 38% compared to MPH under uniform peer generation distributions.

    DOI: 10.1109/ICNC.2012.31

    Web of Science

    researchmap

  • A Solution to Transmission Halting In a New Flow Control Method TCP-fox Reviewed

    Takumi Shinkai, Wang Hui, Hiroyuki Ishihara, Yuichi Nishida, Yukinobu Fukushima, Tokumi Yokohira

    18TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2012): GREEN AND SMART COMMUNICATIONS FOR IT INNOVATION   806 - 811   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    TCP-fox is a new flow control method for TCP (Transmission Control Protocol) which allows the sender of a connection to send packets over the receive window advertised by the receiver to obtain higher throughput. However, TCP-fox has the problem that it halts sending packets when the receiver uses a receive buffer auto tuning mechanism. In this paper, we investigate the cause of the halting and present a way to avoid it.

    DOI: 10.1109/APCC.2012.6388193

    Web of Science

    researchmap

  • Improvement of an ACK returning method of TCP proxies in network environment with wireless LANs Reviewed

    Naohiro Honda, Wang Hui, Yuichi Nishida, Yukinobu Fukushima, Tokumi Yokohira

    1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012   704 - 708   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    In a network environment including a wireless LAN and a wired network, split-connection type proxies have been proposed to improve TCP (Transmission Control Protocol) throughput. A proxy is placed at the boundary between a wireless LAN and a wired network, and it splits a TCP connection which is established between a host (WSTA) in a wireless LAN and a host (STA) in a wired network into two virtual TCP connections. We have proposed a split-connection proxy called DA-Proxy, and simulation results in our previous works show that although the DA-Proxy can increase throughput of downflows (flows from STAs to WSTAs), throughput of upflows (flows from WSTAs to STAs) is not improved and is almost the same as that of upflows without the proxy. In this paper, we propose a new proxy called MDA-Proxy which tries to increase throughput of upflows by decreasing the number of ACKs in a WLAN and show its effectiveness using simulation results. © 2012 IEEE.

    DOI: 10.1109/GCCE.2012.6379960

    Scopus

    researchmap

  • Hybrid Fixed Robust Routing Taking Account of TCP Performance Reviewed

    Takahiro Nabeta, Yukinobu Fukushima, Tokumi Yokohira

    The 27th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2012), CD-ROM (4 pages)   2012

     More details

  • Optimal TCP Receive Buffer Size under Packet Loss Environment Reviewed

    Kazutoshi Kajita, Takumi Shinkai, Naohiro Honda, Yukinobu Fukushima, Tokumi Yokohira

    The 27th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2012), CD-ROM (4 pages)   2012

     More details

  • Multi-stage change-point detection scheme for large-scale simultaneous events Reviewed

    Yukinobu Fukushima, Tutomu Murase, Masayoshi Kobayashi, Hiroki Fujiwara, Ryohei Fujimaki, Tokumi Yokohira

    COMPUTER COMMUNICATIONS   34 ( 15 )   1810 - 1821   2011.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ELSEVIER SCIENCE BV  

    Change-point detection schemes, which represent one type of anomaly detection schemes, are a promising approach for detecting network anomalies, such as attacks and epidemics by unknown viruses and worms. These events are detected as change-points. However, the schemes generally also detect false-positive change-points caused by other events, such as improper parameter setting of detectors. Therefore there is a requirement for a scheme that detects only true-positive change-points caused by attacks and epidemics by unknown viruses and worms. The true-positive change-points tend to occur simultaneously and intensively in very large numbers, while the false-positive change-points tend to occur independently. Therefore, we expect that the multi-stage change-point detection scheme, which performs change-point detection in a distributed manner and takes account of the correlation among multiple change-points, can exclude false-positive change-points by neglecting those that occur independently. In this paper, we propose the multi-stage change-point detection scheme and introduce a weighting function that gives smaller weight to LDs with higher false-positive rate inferred by GD in order to avoid a set of false-positive alerts generated by the low-accuracy detectors from causing high false-positive rate of the scheme. We evaluate the performance of the scheme by a simulation using the parameter values obtained in an experiment using real random scan worms. In the evaluation, we modify AAWP (Analytical Active Worm Propagation) model so that it can derive the number of infected hosts (i.e., attack hosts) more accurately by considering a failure of infection behavior by random scan worms. The simulation results show that our scheme can achieve an optimal performance (detection rate of 1.0 and false-positive rate of 0) while the stand-alone change-point detection scheme, which does not use the correlation among multiple change-points, cannot attain such optimal performance, and our scheme with alert weighting always shows better detection performance than the scheme without alert weighting. (C) 2011 Elsevier B.V. All rights reserved.

    DOI: 10.1016/j.comcom.2011.05.001

    Web of Science

    researchmap

  • Performance evaluation of TCP over multiple paths in fixed robust routing Reviewed

    Wenjie Chen, Yukinobu Fukushima, Takashi Matsumura, Yuichi Nishida, Tokumi Yokohira

    2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability, CQR 2011   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Fixed robust routing is a promising approach for ISP networks to accommodate variable traffic patterns with low operational complexity. The routing minimizes the maximum link load by distributing traffic of every source-destination pair to multiple paths (multipath routing). The multipath routing can result in performance degradation of TCP because of frequent out-of-order packet arrivals. In this paper, we first investigate the influences of delay differences among multiple paths and ratio of shorter paths among multiple paths on TCP performance with simulation using ns-2. The simulation results clarify that smaller delay difference and lower ratio of shorter paths among multiple paths lead to higher TCP throughput. Based on the investigation results, we next propose fixed robust routing algorithms that try to improve TCP throughput in addition to decreasing the maximum link load. The first algorithm called MDD (Minimum Delay Difference) selects a set of paths with the minimum delay differences between the shortest and the longest paths as candidate paths for every source-destination pair The second algorithm called MDD-LF (Minimum Delay Difference with Limited Fraction) bounds the fraction of traffic routed on the shortest delay path in addition to selecting the same candidate paths as MDD. Simulations using ns-2 show that, compared to a straightforward fixed robust routing that selects k-shortest hop paths as the candidate paths, MDD and MDD-LF achieve about 22% and 27% higher TCP throughput while MDD and MDD-LF produce about 1.7 and 2.3 times higher maximum link load, respectively. © 2011 IEEE.

    DOI: 10.1109/CQR.2011.5996088

    Scopus

    researchmap

  • Optimization of Token Holding Times in Split Light Trail Networks Reviewed

    Wenjie Chen, Yukinobu Fukushima, Tokumi Yokohira

    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011)   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    As a new optical WDM network architecture that can be built with currently available devices and can achieve bandwidth allocation with granularity finer than a wavelength, a light trail architecture attracts attention. Because a light trail is a shared medium, we need a medium access control (MAC) protocol to avoid collisions. Although MAC protocols using token passing can avoid collisions, bandwidths of links that locate upstream of the token holding node are kept idle. In this paper, we first propose a dynamic light trail splitting method in order to increase throughput of a light trail by using those idle bandwidths. Our method splits a trail into the upstream trail and the downstream trail at the token holding node and independent data transmissions on the two trails are permitted. As a result, we expect that the split trail architecture achieves higher maximum throughput than the original non-split trail architecture. The degree of throughput improvement by the split trail architecture depends on how appropriately we set upstream and downstream token holding times of every transmission node. Thus, we formulate a problem to decide the token holding times as a nonlinear programming problem, derive the maximum throughput of the split trail architecture by solving the problem using NUOPT solver, and investigate the degree of improvement compared to the original architecture. According to numerical examples, the split trail architecture achieves 1) almost the same maximum throughput as the original one for its unfavorite traffic pattern where every transmission node sends data to the terminating node of the trail only, 2) about 1.6 times as high maximum throughput for a uniform traffic pattern where every node-pair requests the same traffic volume, and 3) about 1.9 time as high maximum throughput for its favorite traffic pattern where every transmission node sends data to its adjacent downstream node only.

    DOI: 10.1109/GLOCOM.2011.6133810

    Web of Science

    researchmap

  • TCP-fox: A New Flow Control Method for Improving TCP Throughput in Large Bandwidth-Delay Product Networks Reviewed

    Yuichi Nishida, Hiroyuki Ishihara, Wang Hui, Yukinobu Fukushima, Tokumi Yokohira

    International Symposium on Broadband Communication (ISBC) 2010   2010

     More details

  • Performance Evaluation of TCP Proxies in Network Environment Including Wireless LANs Reviewed

    Yuichi Nishida, Wang Hui, Yukinobu Fukushima, Tokumi Yokohira

    The 25th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2010)   1231 - 1234   2010

     More details

  • AS-friendly Peer Selection Algorithms without AS Topology Information in P2P Live Streaming Reviewed

    Yukinobu Fukushima, Yin Tao, Kazuya Inada, Tokumi Yokohira

    The Eighth Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT 2010)   2010

     More details

  • Performance Evaluation of Multi-stage Change-point Detection Scheme with Alert Weighting Reviewed

    Mari Nakagawa, Yukinobu Fukushima, Tutomu Murase, Ryohei Fujimaki, Shunsuke Hirose, Tokumi Yokohira

    TENCON 2010: 2010 IEEE REGION 10 CONFERENCE   785 - 790   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    As a detection method of large-scale simultaneous events (e.g., DDoS attack), a multi-stage change-point detection scheme with alert weighting was proposed. In the scheme, local detectors (LDs), which are deployed on each monitored subnet, try to detect an event by change-point detection. If they do, they send an alert to global detector (GD). Then GD judges whether an event is occurring by comparing the weight sum of the received alerts with an predetermined threshold value. The weight of an alert is set lower for LDs with higher false-positive rate (FPR). Conventional evaluation results only showed that alert weighting improves the performance for particular combination of two kinds of LDs with different FPRs. In this paper, we investigate the effectiveness of alert weighting for various combinations of two kinds of LDs with different FPRs in detail. We first consider the situation where detection rates (DRs) of all LDs are identical. Then, we consider the situation where high-FPR LDs show higher DR than low-FPR LDs, which is more realistic. Simulation results show that 1) alert weighting does not lead to degradation of detection performance and 2) alert weighting is most effective when event scale is moderate in our numerical examples.

    DOI: 10.1109/TENCON.2010.5686586

    Web of Science

    researchmap

  • Early Detection of Increasing Traffic with Distributed Traffic Measurement Reviewed

    Yukinobu Fukushima, Mamoru Niboshi, Tutomu Murase, Ryohei Fujimaki, Shunsuke Hirose, Tokumi Yokohira

    TENCON 2010: 2010 IEEE REGION 10 CONFERENCE   809 - 814   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    With the spread of broadband access lines, many bandwidth-consuming services such as video streaming have appeared. The popularity of these services can cause problems such as the shortage of the Internet backbone capacity, so it is important to detect increasing traffic caused by these services early. Conventional detection method called aggregation method tries to detect increasing traffic by predicting its future traffic volume with linear approximation. However, the aggregation method may not cope with increasing traffic whose growth is more rapid than linear growth. In this paper, we propose an early detection method (partial aggregation method) of increasing traffic under per-subnet based distributed traffic measurement. The method predicts 1) future traffic volume for each address in each subnet and 2) the number of subnets having increasing traffic in the future with a linear approximation. Then, the method estimates future traffic volume for each address as a product of the predicted future traffic volume in each subnet and the predicted subnet number. As a result, the method is expected to cope with rapid growth in traffic volume. Simulation results show that the partial aggregation method can detect increasing traffic earlier than the aggregation method by a maximum of 90 days.

    DOI: 10.1109/TENCON.2010.5686580

    Web of Science

    researchmap

  • A Burst Assembly Methodto Reduce End-to-End Packet Delay in Optical Burst Switching Networks Reviewed

    Yukinobu Fukushima, Wengie Chen, Yasuyuki Fujiwara, Tokumi Yokohira

    WSEAS Transactions on Communications   8 ( 8 )   894 - 903   2009

     More details

  • Dynamic splitting of light trails for increasing throughput in light trail networks Reviewed

    Yukinobu Fukushima, Kota Tanaka, Wenjie Chen, Tokumi Yokohira

    The 24th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2009)   1370 - 1373   2009

     More details

  • Throughput Improvement of TCP using Split-Connection Type Proxies in Network Environment including Wireless LANs Reviewed

    Yuichi Nishida, Wang Hui, Hiroaki Matsumoto, Hiroyuki Ishihara, Tokumi Yokohira, Yukinobu Fukushima

    The 24th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2009   1360 - 1363   2009

     More details

  • Accuracy Improvement of Multi-Stage Change-Point Detection Scheme by Weighting Alerts based on False-Positive Rate Reviewed

    Yukinobu Fukushima, Tutomu Murase, Ryohei Fujimaki, Syunsuke Hirose, Tokumi Yokohira

    CQR: 2009 IEEE INTERNATIONAL WORKSHOP TECHNICAL COMMITTEE AND COMMUNICATIONS QUALITY AND RELIABILITY   29 - +   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    One promising approach for large-scale simultaneous events (e.g., DDoS attacks and worm epidemics) is to use a multi-stage change-point detection scheme. The scheme adopts two-stage detection. In the first stage, local detectors (LDs), which are deployed on each monitored subnet, detects a change point in a monitored metric such as outgoing traffic rate. If an LD detects a change-point, it sends an alert to global detector (GD). In the second stage, GD checks whether the proportion of LDs that send alerts simultaneously is greater than or equal to a threshold value. If so, it judges that large-scale simultaneous events are occurring. In previous studies for the multi-stage change-point detection scheme, it is assumed that weight of each alert is identical. Under this assumption, false-positive rate of the scheme tends to be high when some LDs sends false-positive alerts frequently. In this paper, we weight alerts based on false-positive rate of each LD in order to decrease false-positive rate of the multi-stage change-point detection scheme. In our scheme, GD infers false-positive rate of each LD and gives lower weight to LDs with higher false-positive rate. Simulation results show that our proposed scheme can achieve lower false-positive rate than the scheme without alert weighting under the constraint that detection rate must be 1.0.

    Web of Science

    researchmap

  • Performance Evaluation of Medium Access Control Methods in Light Trail Networks Reviewed

    Yukinobu Fukushima, Kota Tanaka, Tokumi Yokohira

    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,   1421 - 1425   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ELECTRONICS TELECOMMUNICATIONS RESEARCH INST  

    We evaluate performance of two medium access control methods with token passing, LT-FA MAC and ART MAC, in light trail networks. LT-FA MAC aims at coping with bursty packet arrivals while ART MAC aims at decreasing transmission delay. Simulation evaluation is performed in terms of the number of the maximum transmission nodes accommodated on a light trail and the maximum communication distance under the constraints that the bandwidth utilization rate of 90% and the average transmission delay of 100 ms must be achieved. Simulation results show that ART MAC permits about 500-1500km longer communication distance than LT-FA MAC with the same number of transmission nodes on a light trail and ART MAC accommodates about 15-25 more nodes than LT-FA MAC with the same communication distance.

    Web of Science

    researchmap

  • Performance evaluation of AS-friendly peer selection algorithms for P2P live streaming Reviewed

    Yukinobu Fukushima, Kazuya Inada, Yin Tao, Yasuyuki Fujiwara, Tokumi Yokohira

    2009 15th Asia-Pacific Conference on Communications, APCC 2009   866 - 870   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    In this paper, we evaluate the performance of peer selection algorithms: MLH (Minimum Logical Hop) and MPH (Minimum Physical Hop) to increase the number of joining peers and to decrease inter-AS traffic volume in P2P live streaming, where we assume that every peer's logical hop count (the number of providing peers between an origin streaming server and the peer) is limited by a predetermined value in order to keep real-time property of live streaming. In MLH, a newly joining peer selects such providing peers that the logical hop count is minimum to increase the number of joining peers. And then if there are several such providing peers, the newly joining peer selects such providing peers that the number (physical hop count) of ASs between the newly joining peer and each of the providing peers is minimum to decrease the inter-AS traffic volume. In MPH, a newly joining peer selects providing peers in the reverse order of MLH. Simulation results show that MLH achieves about from 20% to 60% more maximum joining peers than MPH, and MPH shows smaller inter-AS traffic volume than MLH when the number of joining peers is small while MLH shows smaller inter-AS traffic volume when the number of joining peers is large. ©2009 IEEE.

    DOI: 10.1109/APCC.2009.5375467

    Scopus

    researchmap

  • Retransmission control in TCP with a Performance Enhancing Proxy Reviewed

    Yuichi Nishida, Wang Hui, Hiroaki Matsumoto, Tokumi Yokohira, Yukinobu Fukushima

    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III   1881 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In order to improve TCP performance in networks with large round trip time, a method using a PEP (Performance Enhancing Proxy) is proposed. In the method, the PEP is located on a intermediate router along a TCP connection, and returns acknowledgment packets (premature ACKs) to the source host instead of the destination host. In previous researches, although a congestion control in the PEP which keeps the number of prematurely acknowledged packets below a threshold (watermark) value has been proposed, packet losses are not taken into account, and consequently performance of the PEP under a packet-loss environment has not been investigated. In this paper, we incorporate a retransmission control to deal with packet losses into the congestion control. The proposed retransmission control mainly has two functions. One is to return duplicate premature ACKs or partial premature ACKs to urge the source host to execute the fast retransmission. The other is to retransmit prematurely acknowledged packets to the destination host, when a timeout occurs or three duplicate acknowledgments and a partial acknowledgment from the destination host are received. Simulation results under a packet-loss environment show that the PEP improves throughput larger as the end-to-end propagation delay becomes larger and throughput with PEP is a maximum of four times as much as throughput without PEP.

    DOI: 10.1109/ICACT.2008.4494152

    Web of Science

    researchmap

  • Performance Evaluation of Multi-Stage Change-Point Detection Scheme against DDoS Attacks by Random Scan Worms Reviewed

    Tutomu Murase, Yukinobu Fukushima, Masayoshi Kobayashi, Sakiko Nishimoto, Ryohei Fujimaki, Tokumi Yokohira

    IEEE Communications Society Communications Quality and Reliability Workshop 2008 (CQR 2008)   2008

     More details

  • Performance evaluation of a multi-stage network event detection scheme against DDoS attacks Reviewed

    Tutornu Murase, Yukinobu Fukushima, Masayoshi Kobayashi, Hiroki Fujiwara, Ryohei Fujimaki, Tokumi Yokohira

    2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES   58 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Change-point detection schemes, which represent one type of anomaly detection schemes, are a promising approach for detecting network anomalies, such as attacks and epidemics by unknown viruses and worms. These events are detected as change-points. However, they generally also detect false-positive change-points caused by other events, such as hardware problems. Therefore there is a requirement for a scheme that detects only true-positive change-points caused by attacks and epidemics by unknown viruses and worms. The true-positive change-points tend to occur simultaneously and intensively in very large numbers, while the false-positive change-points tend to occur independently. We can exclude false-positive change-points by excluding those that occur independently, based on information gathered from the entire network. In this paper, we combine change-point detection schemes with a distributed IDS, and evaluate performance of the combined scheme by a simulation using the parameter values obtained by an experiment using real worms. The simulation results show that the combined scheme detects all the DDoS attacks without any false-positives while we have to tolerate false-positive rate of at least 0.02 to detect all the attacks in a stand-alone IDS scheme.

    DOI: 10.1109/APSITT.2008.4653540

    Web of Science

    researchmap

  • Proposal of a hierarchical heuristic algorithm for node assignment in bidirectional manhattan street networks Reviewed

    Masataka Yonezu, Nobuo Funabiki, Tomoya Kitani, Tokumi Yokohira, Toru Nakanishi, Teruo Higashino

    Systems and Computers in Japan   38 ( 4 )   74 - 83   2007.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In wavelength division multiplexing (WDM) technology, high-speed large-capacity communication is realized by transmitting multiple optical signals with different wavelengths in parallel on an optical fiber. In WDM technology, the logical topology of the network can generally be modified by changing the wavelength assignment to the transmitters and receivers. Thus it is important to develop an algorithm that derives the wavelength assignment that maximizes the transmission efficiency of the network. This paper considers a bidirectional Manhattan street network which has a regular topology, and proposes a hierarchical two-stage heuristic algorithm. In the first stage, the initial solution is derived by hierarchical region division and node assignment to the regions. In the second stage, the solution is improved by simulated annealing (SA). The proposed algorithm is evaluated by simulations of random instances and instances for which optimal solutions are already known. The effectiveness of the proposed algorithm is demonstrated through comparisons to the existing one. © 2007 Wiley Periodicals, Inc.

    DOI: 10.1002/scj.10534

    Scopus

    researchmap

  • Detection of CMOS open node defects by frequency analysis Reviewed

    Hiroyuki Michinishi, Tokumi Yokohira, Takuji Okamoto, Toshifumi Kobayashi, Tsutomu Hondo

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E90D ( 3 )   685 - 687   2007.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    A method to detect open node defects that cannot be detected by the conventional IDDQ test method has previously been proposed employing a sinusoidal wave superposed on the DC supply voltage. The present paper proposes a strategy to improve the detectability of the test method by means of frequency analysis of the supply current. In this strategy. defects are detected by determining whether secondary harmonics of the sinusoidal wave exist in the supply current. The effectiveness of the method is confirmed by experiments on two CMOS NAND gate packages (SSIs).

    DOI: 10.1093/ietisy/e90-d.3.685

    Web of Science

    researchmap

  • Effect of premature ACK transmission timing on throughput in TCP with a performance enhancing proxy Reviewed

    Hui Wang, Shigeyuki Osada, Tokumi Yokohira, Kiyohiko Okayama, Nariyoshi Yamai

    IEICE TRANSACTIONS ON COMMUNICATIONS   E90B ( 1 )   31 - 41   2007.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    In order to improve TCP performance, the use of a PEP (Performance Enhancing Proxy) has been proposed. The PEP operates on a router along a TCP connection. When a data packet arrives at the PEP, it forwards the packet to the destination host, transmits the corresponding ACK (premature ACK) to the source host on behalf of the destination host, and stores a copy of the packet in a local buffer (PEP buffer) in case the packet needs to be retransmitted. In this paper, in accordance with a strategy that keeps the number of prematurely acknowledged packets in the PEP buffer below a fixed threshold (watermark) value, we investigate the relation between the watermark value and the average throughput. Extensive simulations show that the results can be roughly classified into two cases. In the first case, the average throughput becomes larger for larger watermark values and becomes a constant value when the watermark value is over a certain value. In the second case, although the average throughput becomes larger for lager watermark value in the same way, it decreases when the watermark value is over a certain value. We also show that the latter (former) case can occur more easily as the propagation delay in the input side network of the PEP becomes smaller (larger) and the propagation delay in the output side network of the PEP becomes larger (smaller), and also show that the latter (former) case can occur more easily as the transmission speed in the input side network becomes larger (smaller) and the transmission speed in the output side network becomes smaller (larger) while the PEP buffer capacity becomes smaller (larger).

    DOI: 10.1093/ietcom/e90-b.1.31

    Web of Science

    researchmap

  • A Throughput Optimization Algorithm for TCP Connections with Different Routes in Long-Delay Satellite Environments Reviewed

    Nobuto Watanabe, Wang Hui, Shigeyuki Osada, Tokumi Yokohira, Yukinobu Fukushima

    The 25th AIAA International Communications Satellite Systems Conference (ICSSC 2007), Paper No. AIAA 2007-3208 in the Conference CD-ROM (12 pages)   2007

     More details

  • A Wavelength and Converter Assignment Scheme for Decreasing Blocking Probability in Wavelength-Routed Networks Reviewed

    Yukinobu Fukushima, Takahiro Ooishi, Tokumi Yokohira

    The 12th OptoElectronics and Communication Conference and The 16th International Conference on Integrated Optics and Optical Fiber Communication (OECC/IOCC 2007)   454 - 455   2007

     More details

  • Performance evaluation of a multi-stage network event detection scheme for decreasing the false-positive rate for a large number of simultaneous, unknown events Reviewed

    Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira

    Proceedings of the Sixth International Conference on Networking, ICN'07   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Change-point detection schemes are a promising approach for detecting network anomalies, such as attacks and epidemics by unknown viruses and worms. They detect those events as change-points. However, they generally also detect false-positive change-points, those caused by other events such as hardware trouble. A scheme is needed that only detects truepositive change-points, caused by attacks and epidemics. Truepositive change-points tend to occur simultaneously in very large numbers, while false-positive change-points tend to occur sporadically. We can exclude false-positive change-points by excluding change-points that occur sporadically, based on information gathered from the entire network. In this paper, we propose a multi-stage network event detection scheme that aggregates change-point information from distributed IDSs (Intrusion Detection Systems) and detects the true-positive change-points. Simulation results show that, compared to a scheme using only one IDS, our method always yields a smaller false-positive rate under the constraint that the detection rate of the true-positive change-points must exceed 0.99. © 2007 IEEE.

    DOI: 10.1109/ICN.2007.71

    Scopus

    researchmap

  • High-speed calculation of worst-case link delays in the EDD connection admission control scheme Reviewed

    Tokumi Yokohira, Kiyohiko Okayama

    IEICE TRANSACTIONS ON COMMUNICATIONS   E89B ( 7 )   2012 - 2022   2006.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    The EDD connection admission control scheme has been proposed for supporting real-time communication in packet-switched networks. In the scheme, when a connection establishment request occurs, the worst-case link delay in each link along the connection is calculated to determine whether the request can be accepted or not. In order to calculate the worst-case link delay, we must perform a check called the point schedulability check for each of some discrete time instants (checkpoints). Therefore when there are many checkpoints, the worst-case link delay calculation is time-consuming. We have proposed a high-speed calculation method. The method finds some checkpoints for which the point schedulability check need not be performed and removes such unnecessary checkpoints in advance before a connection establishment request occurs, and the check is performed for each of the remaining checkpoints after the request occurs. However, the method is not so effective under the situation that the maximum packet length in networks is large, because the method can find few unnecessary checkpoints under the situation. This paper proposes a new high-speed calculation method. We relax the condition which determines whether or not the point schedulability check need not be performed for each checkpoint in our previous method and derive a new condition for finding unnecessary checkpoints. Using the proposed method based on the new condition, we can increase the number of unnecessary checkpoints compared to our previous method. Numerical examples which are obtained by extensive simulation show that the proposed method can attain as much as about 50 times speedup.

    DOI: 10.1093/ietcom/e89-b.7.2012

    Web of Science

    researchmap

  • A burst assembly method for decreasing end-to-end packet delays in optical burst switching networks Reviewed

    Yukinobu Fukushima, Tokumi Yokohira, Yasuhiro Noine, Kazuteru Nagahara

    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS   459 - +   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Although the offset-time-based scheme can differentiate packet/burst loss rate according to their QoS levels in optical burst switching networks, it increases end-to-end packet delays of packets in a burst with higher QoS level. This is because it increases offset time of bursts in proportional to their QoS levels. In this paper, we propose a burst assembly method that decreases end-to-end packet delays. Our proposed method includes packets that arrive during the offset time into the currently assembled bursts while the conventional method includes them into the burst assembled next time. Simulation results show that our method offers more than 21% delay reduction for bursts with the highest QoS level.

    DOI: 10.1109/ICCT.2006.341915

    Web of Science

    researchmap

  • Throughput optimization in TCP with a performance enhancing proxy Reviewed

    Shigeyuki Osada, Wang Hui, Tokumi Yokohira, Yukinobu Fukushima, Kiyohiko Okayama, Nariyoshi Yamai

    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS   392 - +   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    To improve TCP throughput performance, a method using a PEP (Performance Enhancing Proxy) has been proposed. The PEP operates on a router along a TCP connection. When a data packet arrives at the PEP, it forwards the packet to the destination host, transmits the corresponding ACK (premature ACK) to the source host in behalf of the destination host, and stores a copy of the packet into its own buffer (PEP buffer) in case retransmission of the packet is required. As a congestion control method on the PEP, a method which keeps the number of prematurely acknowledged packets in the PEP buffer below a threshold (watermark) value has been proposed. However, the relation between the watermark value and throughput is not sufficiently investigated, and an optimization method of the watermark value is not proposed. In this paper, we first investigate the relation between the watermark value and the average throughput. Extensive simulations show that the simulation results are roughly classified into two cases. In the first case, the average throughput becomes larger for larger watermark values and becomes a constant value when the watermark is over a certain value. In the second case, although the average throughput becomes larger for larger watermark values in the same way, it decreases when the watermark is over a certain value. Next, based on the results about the relation, we propose an watermark optimization algorithm which can adaptively maximize the average throughput of each connection and also satisfy a fairness condition that the average throughputs of connections are equal to each other.

    DOI: 10.1109/ICCT.2006.341898

    Web of Science

    researchmap

  • Throughput Optimization for TCP with an Active Proxy in Long-Delay Satellite Environments Reviewed

    Wang Hui, Shigeyuki Osada, Tokumi Yokohira, Yukinobu Fukushima, Deng Chaolong, Kiyohiko Okayama, Nariyoshi Yamai

    2006 Joint Conference on Satellite Communications (JC-SAT 2006)   2006

     More details

  • Node placement algorithms in the case that routes are design variables in shuffle-like multihop lightwave networks Reviewed

    T Yokohira, K Okayama

    IEICE TRANSACTIONS ON COMMUNICATIONS   E88B ( 12 )   4578 - 4587   2005.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    The shuffle-like network (SL-Net) is known as a logical topology for WDM-based multihop packet-switched networks. Even if we fix the logical topology to an SL-Net, we can still reposition nodes in the SL-Net by re-tuning wavelengths of transmitters and/or receivers. In conventional node placement algorithms, routes between nodes are assumed to be given. In this paper, we propose two heuristic node placement algorithms for the SL-Net to decrease the average end-to-end packet transmission delay under a given traffic matrix in the case that routes are design variables. The principal idea is to prevent too many traffic flows from overlapping on any link. To attain the idea, in one of the algorithms, a node is selected one by one in a decreasing order of the sums of sending and receiving traffic requirements in nodes, and its placement and routes between the node and all the nodes already placed are simultaneously decided so that the maximum of the amounts of traffic on links at the moment is minimum. In the other algorithm, a node is selected in the same way, and first it is placed so that the average distance between the node and all the nodes already placed is as large as possible, and then routes between the node and all the nodes already placed are decided so that the maximum of the amounts of traffic on links at the moment is minimum. Numerical results for four typical traffic matrices show that either of the proposed algorithms has better performance than conventional algorithms for each matrix, and show that the proposed algorithms, which are based on a jointed optimization approach of node placement and routing, are superior to algorithms which execute node placement and routing as two isolated phases.

    DOI: 10.1093/ietcom/e88-b.12.4578

    Web of Science

    researchmap

  • Node placement algorithms for shuffle-like packet-switched networks with wavelength-division multiplexing Reviewed

    Tokumi Yokohira, Takuji Okamoto

    Electronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi)   88 ( 1 )   72 - 81   2005.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    The shuffle-like network (SL-Net) is known as a logical topology for WDM-based multihop packet-switched networks. We propose two heuristic node placement algorithms for the SL-Net to decrease the average end-to-end packet transmission delay for a given traffic matrix. The principal idea is to prevent too many traffic flows from overlapping on any link. To attain this objective, one algorithm selects nodes one by one in decreasing order of the sums of their sending and receiving traffic requirements, and places them so that the maximum traffic in the links is minimal. The other selects nodes in the same way, and places then so that the average distance among the nodes which have already been placed is as large as possible. Numerical results for four typical traffic matrices show that either of the proposed algorithms has better performance than the conventional algorithms for each matrix. © 2004 Wiley Periodicals, Inc.

    DOI: 10.1002/ecja.10184

    Scopus

    researchmap

  • Performance improvement of TCP using Performance Enhancing Proxies - Effect of premature ACK transmission timing on throughput Reviewed

    Shigeyuki Osada, Tokumi Yokohira, Wang Hui, Kiyohiko Okayama, Nariyoshi Yamai

    APSITT 2005: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, Proceedings   7 - 12   2005

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In order to improve TCP performance, a method using a PEP (Performance Enhancing Proxy) is proposed. The PEP operates on a router along a TCP connection. When a data packet arrives at the PEP, it forwards the packet to the destination host, transmits the corresponding ACK (premature ACK) to the source host in behalf of the destination host and stores the copy of the packet into its own buffer (PEP buffer) in case of the retransmission of the packet. In this paper, under the strategy which keeps the number of packets in the PEP buffer for which premature ACKs have been returned being less than or equal to a fixed threshold value (watermark value), we investigate the relation between the watermark value and the maximum throughput. Extensive simulation runs show that the simulation results are roughly classified into two cases. One case is that the maximum throughput becomes larger for larger watermark value and becomes a constant value when the watermark value is over a value. The other case is that though the maximum throughput becomes larger for lager watermark value in the same way, it reversely decreases when the watermark value is over a value. We also show that the latter (former) case is easier to occur as the propagation delay in the input side network of the PEP becomes smaller (larger) and the propagation delay in the output side network of the PEP becomes larger (smaller) and the PEP buffer capacity becomes smaller (larger).

    Web of Science

    researchmap

  • A multiwindow system for smooth window operations by the combination of drawing-period generation method and display-period generation method Reviewed

    Y Sato, T Yokohira, H Kagotani, T Okamoto, Kayano, I

    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART II-ELECTRONICS   88 ( 1 )   12 - 23   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SCRIPTA TECHNICA-JOHN WILEY & SONS  

    In this paper, the authors propose a multiwindow system that can smoothly execute window operations such as moving, resizing, or scrolling by using a combination of a drawing-time composition method and display-time composition method. Memory for storing the image of the window for which the window operation is to be performed (operation target window) and memory for storing a composite image of all other windows generated by a drawing-time composition method are both established in this system. The image that is displayed on the actual screen is obtained by using a display-time composition method to combine images that were read in parallel from both of these memories to generate the multiwindow image. The authors performed a trial experiment using a 640-pixel by 480-pixel display device to verify that no flicker appeared on the display screen when updating the operation target window. From the results of this trial experiment, they suggested that smooth window operations probably can also be executed for a 1280-pixel by 1024-pixel display device. (C) 2004 Wiley Periodicals, Inc.

    Web of Science

    researchmap

  • A framework for mobile agent systems with the capability of preceding and following users Reviewed

    Tokumi Yokohira, Kiyohiko Okayama, Takashi Murakami, Kayo Takarako

    APSITT 2005: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, Proceedings   89 - 94   2005

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    As one of mobile agent applications, many systems which provide continuous service for users moving on a network have been proposed. In these systems, because a movement of mobile agents is performed after a user movement, users must wait for arrival of mobile agents. To reduce users' waiting time, we propose a fundamental framework for mobile agent systems where an agent can move precedently before a user movement. In our framework, it is assumed that computers are connected on a network and users with rewritable devices move on the network. The framework supports precedent movement of mobile agents based on prediction using movement history of users. Because the prediction may be wrong, the framework also provides the following movement of mobile agents. Moreover, the framework provides a recovery method of mobile agents in service in case that mobile agents disappear due to problems such as their bugs. Because we provide some APIs, via which various functions of our framework are accessed, developers of mobile agent systems can easily use our framework using the APIs. We implemented an experimental agent system using the APIs and confirmed that the framework performed correctly using the experimental system.

    DOI: 10.1109/APSITT.2005.203636

    Web of Science

    researchmap

  • CMOS floating gate defect detection using supply current test with DC power supply superposed by AC component Reviewed

    H Michinishi, T Yokohira, T Okamoto, T Kobayashi, T Hondo

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E87D ( 3 )   551 - 556   2004.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    This paper proposes a new supply current test method for detecting floating gate defects in CMOS ICs. In the method, unusual increase of the supply current caused by defects is promoted by superposing an AC component on the DC power supply. Feasibility of the test is examined by some experiments on four DUTs with an intentionally caused defect. The results showed that our method could detect clearly all the defects, one of which may be detected by neither any functional logic test nor any conventional supply current test.

    Web of Science

    researchmap

  • Improvement of detectability for CMOS floating gate defects in supply current test Reviewed

    H Michinishi, T Yokohira, T Okamoto, T Kobayashi, T Hondo

    ATS 2003: 12TH ASIAN TEST SYMPOSIUM, PROCEEDINGS   406 - 409   2003

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE COMPUTER SOC  

    We already proposed a supply current test method for detecting floating gate defects in CMOS ICs. In the method, increase of the supply current caused by defects is promoted by superposing a sinusoidal signal on the supply voltage. In this study, we propose one way to improve detectability of the method for the defects. They are detected by analyzing the frequency of supply current and judging whether secondary harmonics of the sinusoidal signal exists or not. Effectiveness of our way is confirmed by some experiments.

    DOI: 10.1109/ATS.2003.1250846

    Web of Science

    researchmap

  • 描画時合成方式と表示時合成方式の併用によるスムーズ操作が可能なマルチウィンドウシステム Reviewed

    佐藤洋一郎, 横平徳美, 籠谷裕人, 岡本卓爾, 茅野功

    電子情報通信学会論文誌   2003

     More details

  • シャッフル型波長分割多重方式パケット交換網におけるノード配置アルゴリズム Reviewed

    横平徳美, 岡本卓爾

    電子情報通信学会論文誌   2003

     More details

  • 双方向マンハッタンストリートネットワークのノード配置問題に対する階層型近似アルゴリズムの提案 Reviewed

    米津政隆, 舩曵信生, 木谷友哉, 横平徳美, 中西透, 東野輝夫

    電子情報通信学会論文誌   2003

     More details

  • A quasi-solution state evolution algorithm for channel assignment problems in cellular networks Reviewed

    N Funabiki, T Nakanishi, T Yokohira, S Tajima, T Higashino

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E85A ( 5 )   977 - 987   2002.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    For efficient use of limited electromagnetic wave resource, the assignment of communication channels to call requests is very important in a cellular network. This task has been formulated as an NP-hard combinatorial optimization problem named the channel assignment problem (CAP). Given a cellular network and a set of call requests, CAP requires to find a channel assignment to the call requests such that three types of interference constraints between channels are not only satisfied, but also the number of channels (channel span) is minimized. This paper presents an iterative search approximation algorithm for CAP, called the Quasi-solution state evolution algorithm for CAP (QCAP). To solve hard CAP instances in reasonable time, QCAP evolutes quasi-solution states where a subset of call requests are assigned channels and no more request can be satisfied without violating the constraint QCAP is composed of three stages. The first stage computes the lower bound on the channel span for a given instance. After the second stage greedily generates an initial quasi-solution state, the third stage evolutes them for a feasible channel assignment by iteratively generating best neighborhoods, with help of the dynamic state jump and the gradual span expansion for global convergence. The performance of QCAP is evaluated through solving benchmark instances in literature, where QCAP always finds the optimum or near-optimum solution in very short time. Our simulation results confirm the extensive search capability and the efficiency of QCAP.

    Web of Science

    researchmap

  • A Proposal of a Quasi-Solution State Evolution Algorithm for Channel Assignment Problems Reviewed

    N.Funabiki, T.Nakanishi, T.Yokohira, S.Tajima, T.Higashino

    International Conference on Information Networking 2002   2002

     More details

  • An Optimal Path Selection Algorithm for Static and Mobile Multicast Routing Problems Reviewed

    S.Tajima, M.Fujii, N.Funabiki, T.Yokohira, K.Tsunemura, T.Higashino

    International Conference on Information Networking 2002   2002

     More details

  • CMOS floating gate defect detection using I-DDQ test with DC power supply superposed by AC component Reviewed

    H Michinishi, T Yokohira, T Okamoto, T Kobayashi, T Hondo

    PROCEEDINGS OF THE 11TH ASIAN TEST SYMPOSIUM (ATS 02)   417 - 422   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE COMPUTER SOC  

    In this paper, we propose a new I-DDQ test method for detecting floating gate defects in CMOS ICs. In the method, unusual increase of the supply current caused by defects is promoted by superposing an AC component on the DC power supply. Feasibility of the test is examined by some experiments on four DUTs with an intentionally caused defect. The results showed that our method could detect clearly all the defects, one of which may be detected by neither any functional logic test nor any conventional IDDQ test.

    DOI: 10.1109/ATS.2002.1181747

    Web of Science

    researchmap

  • EDDコネクション受付制御方式における最悪リンク遅延の高速導出法 Reviewed

    横平徳美, 岡本卓爾

    電子情報通信学会論文誌   2002

     More details

  • 静的及びモバイルマルチキャストルーチング問題に対する最適パス選択解法の提案 Reviewed

    藤井雅和, 舩曵信生, 横平徳美, 田島滋人, 常村和史, 東野輝夫

    電子情報通信学会論文誌   2002

     More details

  • A Minimal-state Processing Search Alogorithm for satisfiability problems Reviewed

    Nobuo Funabiki, Tokumi Yokohira, Toru Nakanishi, Shigeto Tajima, Teruo Higashino

    pp.2769-2774   2001.10

     More details

  • EDDコネクション受付制御方式における遅延余裕の一割当法 - 最悪リンク遅延に比例した割当て - Reviewed

    横平徳美, 岡本卓爾

    電子情報通信学会論文誌   2001

     More details

  • モバイル・マルチキャストルーティング問題に対する最適パス選択解法の提案 Reviewed

    常村和史, 田島滋人, 藤井雅和, 中田明夫, 横平徳美, 舩曵信生, 東野輝夫

    マルチメディア通信と分散処理ワークショップ講演集   2001

     More details

  • ネットワークのリンクスケジューリングへのグラフ彩色アプローチ Reviewed

    田島滋人, 舩曵信生, 東野輝夫, 横平徳美, 中西透

    電子情報通信学会技術研究報告, COMP2001-71   2001

     More details

  • Universal Test Complexity of Field-Programmable Gate Arrays Reviewed

    Tokumi Yokohira

    Proc. Fourth Asian Test Symposium (ATS ''95)   pp.259-265   2000.6

     More details

  • LAN,MANにおける波長分割多重パケット交換網の最適化 Reviewed

    横平徳美, 岡本卓爾

    電子情報通信学会論文誌   2000

     More details

  • Testing for the programming circuit of SRAM-based FPGAs Reviewed

    Hiroyuki Michinishi, Tokumi Yokohira, Takuji Okamoto, Tomoo Inoue, Hideo Fujiwara

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E82D ( 6 )   1051 - 1057   1999.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    The programming circuit of SRAM-based FP-GAs consists of the two shift registers. a control circuit and a configuration memory (SRAM) cell array. Because the configuration memory cell array can be easily tested by conventional test methods for RAMs, we focus on testing for the shift registers. We first derive test procedures for the shift registers, which can be done by using only the faculties of the programming circuit, without using additional hardware. Next, we show the validness of the test procedures. Finally, we show all application of the test procedures to test Xilinx XC4025.

    Web of Science

    researchmap

  • Quantitative Analysis of Knee-Joint Spasticity by Pendulum Test Reviewed

    Kazuaki Jikuya, Tokumi Yokohira, Takuji Okamoto, Ken Akashi

    Proc. The 4th Asia-Pacific Conference on Medical and Biological Engineering   p.122   1999

     More details

  • ルーチングマトリクスを有するFPGAの配線領域の検査法 Reviewed

    道西博行, 横平徳美, 岡本卓爾

    電子情報通信学会論文誌   Vol.J82-D-I, No.7, pp.916-924   1999

     More details

  • テーブル参照型FPGAにおける論理ブロックの検査法 Reviewed

    道西博行, 横平徳美, 岡本卓爾, 井上智夫, 藤原秀雄

    電子情報通信学会論文誌   Vol.J79-D-I, No.12, pp.1141-1150   1996.12

     More details

  • A Test Methodology for Interconnect Structures of LUT-based FPGAs Reviewed

    Proceedings of the Fifth Asian Test Symposium   pp.68-74   1996.11

     More details

  • Testing for the Programming Circuit of LUT-Based FPGAs Reviewed

    Hiroyuki Michinishi, Tokumi Yokohira, Takuji Okamoto, Tomoo Inoue, Hideo Fujiwara

    pp.242-247   1996.11

     More details

  • Realization of multiwindow system with high-speed operations of nonrectangular windows Reviewed

    Toshiyuki Maeda, Yoichiro Sato, Tokumi Yokohira, Takuji Okamoto

    Systems and Computers in Japan   27 ( 10 )   48 - 58   1996

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:John Wiley and Sons Inc.  

    This paper describes the realization of the multi-window system, where the framed nonrectangular windows can be operated with a high speed. The body image (the image to be displayed inside the frame) and the frame image (the image to be displayed as the frame), which are stored on the multiport memory, are read out in parallel, being synchronized to the CRT scanning. By selecting pixelwise one of those images, the window image displayed in the window is generated as a framed image. The selection signal for this purpose is generated based on the window shape information stored in the dedicated memory. The multiwindow image is generated by selecting the image to be displayed for each pixel position on CRT using a hardware. A distributed priority encoder is used as the hardware for this purpose. According to the result of construction and experiment, it is expected that the multiwindow system can realize a sufficiently high-speed operation from the practical viewpoint for the 1200 × 1000 CRT screen using the existing circuit technology.

    DOI: 10.1002/scj.4690271005

    Scopus

    researchmap

  • Universal Test Complexity of Field-Programmable Gate Arrays Reviewed

    Tomoo Inoue, Hideo Fujiwara, Hiryouki Michinishi, Tokumi Yokohira, Takuji Okamoto

    Proceeding of the Fourth Asian Test Symposium   pp.259-265   1995.11

     More details

  • The Number of Elements in Minimum Test Set for Locally Exhaustive Testing of Combinational Circuit with Five Outputs Reviewed

    Tokumi Yokohira, Toshimi Shimizu, Hiroyuki Michinishi, Yuuji Suigyama, Takuji Okamoto

    Vol.E78-D, No.7, pp.874-881   1995.7

     More details

  • 非長方形ウィンドウの高速操作機能を備えたマルチウィンドウシステムの実現法 Reviewed

    前田敏行, 佐藤洋一郎, 横平徳美, 岡本卓爾

    電子情報通信学会論文誌   Vol.J78-D-I, No.6, pp.509-518   1995.6

     More details

  • 痙縮患者を対象としたペンドラムテストモデルの精度改善 Reviewed

    軸屋和明, 岡本卓爾, 横平徳美, 明石謙

    電子情報通信学会論文誌   Vol.J78-D-II, No.4, pp.650-660   1995.4

     More details

  • DESIGN ALGORITHM FOR PACKET-SWITCHING NETWORKS WITH DIFFERENT CLASSES OF PACKETS - CAPACITY, PRIORITY, AND FLOW ASSIGNMENT UNDER END-TO-END PACKET DELAY CONSTRAINT Reviewed

    M SUGANO, H TAKASHINA, T YOKOHIRA, T OKAMOTO

    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS   78 ( 2 )   1 - 12   1995.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SCRIPTA TECHNICA-JOHN WILEY & SONS  

    This paper proposes a design algorithm for packet-switching networks with different classes of packets under end-to-end packet delay constraint and a design algorithm for fault-tolerant networks. The former is a heuristic capacity, priority, and flow assignment algorithm which locally minimizes the network cost while satisfying a constraint that the average transmission delay of each class of packets between two arbitrary nodes never exceed a value predetermined for the class.
    This algorithm is composed of three subalgorithms and the cost minimization is pursued by iterating these algorithms as long as the constraint is satisfied. The latter is a design algorithm for a fault-tolerant network which satisfies the foregoing constraint even if an arbitrary single link fails. With this algorithm, an assignment with relatively large cost but satisfying the constraint is obtained first. Then a procedure of reducing the capacity of a link whose effect on cost reduction is great but whose effect on path delay increase is not so great is iterated to reduce the network cost as long as the constraint is satisfied.

    Web of Science

    researchmap

  • Minimum Test Set for Locally Exhaustive Testing of Combinational Circuits with Five Outputs Reviewed

    Tokumi Yokohira, Toshimi Shimizu, Hiroyuki Michinishi, Yuuji Sugiyama, Takuji Okamoto

    pp.280-285   1994.11

     More details

  • う回ルーチングを行う分散形交換ネットワークの性能評価 Reviewed

    横平徳美, 滝広眞利, 井上尚子, 岡本卓爾

    電子情報通信学会論文誌   Vol.J77-B-I, No.3, pp.132-140   1994.3

     More details

  • 多出力組合せ論理回路の局所全数テストのための最小テスト集合の生成-M系列発生器とEXORゲートを用いて- Reviewed

    道西博行, 横平徳美, 岡本卓爾

    電子情報通信学会論文誌   Vol.J77-D-I, No.2, pp.233-241   1994.2

     More details

  • 複数クラスのトラヒックをもつパケット交換ネットワ-クの設計アルゴリズム-End-to-End遅延を考慮した容量・優先度・フロ-割当て-

    菅野正嗣,高科宏光,横平徳美,岡本卓爾

    電子情報通信学会論文誌   Vol.J76-B-I, No.12, pp.922-932   1993.12

     More details

  • Proof that Akers'' Algorithm for Locally Exhaustive Testing Gives Minimum Test Sets of Combinational Circuits with up to Four Outputs. Reviewed

    Hiroyuki Michinishi, Tokumi Yokohira and Takuji Okamoto

    Proceedings of the Second Asian Test Symposium   pp.14-19   1993.11

     More details

  • Minimum Test Set for Locally Exhaustive Testing of Multiple Output Combinational Circuits Reviewed

    Hiroyuki Michinishi, Tokumi Yokohira, Takuji Okamoto

    The Transactions of the IEICE   Vol.E76-D, No.7, pp.791-799   1993.7

     More details

  • Minimum Verification Test Set for Combinational Circuits Reviewed

    Proc. First Asian Test Symposium (ATS ''92)   pp.14-19   1992.11

     More details

  • Effect of timeout retransmissions on end‐to‐end delay in packet switching networks Reviewed

    Hiroshi Inai, Tokumi Yokohira, Masayuki Murata, Hideo Miyahara

    Electronics and Communications in Japan (Part I: Communications)   75 ( 7 )   13 - 21   1992

     More details

    Publishing type:Research paper (scientific journal)  

    An end‐to‐end error recovery scheme is a promising way to obtain low end‐to‐end delays in packet switching networks. However, a too‐short timeout interval may cause unnecessary packet retransmissions even when a packet is transmitted successfully to the receiver. On the other hand, a longer timeout interval may introduce large end‐to‐end delay when a packet is actually lost. Thus, it becomes important to determine an appropriate timeout period in the scheme. This paper analyzes a tandem queueing network system with blocking due to finite capacity in intermediate nodes and investigates the effect of the timeout period on the end‐to‐end delay performance. It is found that there exists the timeout period minimizing the mean packet transmission delay in the end‐to‐end error recovery scheme. The delay performance between end‐to‐end and link‐by‐link error recovery schemes also is compared and it is found that the delay performances of these schemes are influenced significantly by the node‐to‐node delay. Copyright © 1992 Wiley Periodicals, Inc., A Wiley Company

    DOI: 10.1002/ecja.4410750702

    Scopus

    researchmap

  • Simulation of Knee Joint Motions in Spastic and Rigid Patients Reviewed

    Kazuaki Jikuya, Takuji Okamoto, Tokumi Yokohira, Ken Akashi

    Proceedings of the XIIIth International Congress on Biomechanics   pp.273-275   1991.12

     More details

  • Fault Tolerant Packet-Switched Network Design and Its Sensitivity Reviewed

    Tokumi Yokohira, Masashi sugano

    IEEE Transactions on Reliability   40 ( 4 )   452 - 460   1991.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Reliability and performance for telecommunication networks have been traditionally investigated separately in spite of their close relation. A design method integrating them for a reliable packet switched network, called a proofing method, was discussed in previous papers. This paper first presents the proofing method in detail. Then two heuristic design approaches (max-average, max-delay-link) for optimizing network cost in the proofing method are described. In order to verify their effectiveness and applicability, they are compared numerically for three example network topologies. Finally, the sensitivity of these two methods is examined with respect to changes in traffic demand and in link reliability. Numerical results show that the max-delay-link method provides a lower minimum network-cost than does the max-average method, for both a small and a large example network. The answers obtained by these two methods are not highly sensitive to changes either in traffic demand or in link reliability. Thus a network designed by these two methods is robust to a system change which is not considered at a design stage. The max-average method is superior to the max-delay-link method in terms of the sensitivity. Many other sources of failures must be considered in our failure model, eg, node and software faults. Only statistically independent failures are considered. Statistical dependence effects must be included to make the model more realistic. The max-average and max-delay-link methods cannot prevent a state where there are no routes between a particular source and destination node pair. To cope with this, a topological design method must be added to these methods. The computational complexity of these methods needs to be clarified to identify how large a practical problem can be solved using them. © 1991 IEEE.

    DOI: 10.1109/24.93767

    Scopus

    researchmap

  • プロセッサ制御回路におけるシ-ケンサのテスト集合生成法 Reviewed

    的場和男, 横平徳美, 杉山裕二, 岡本卓爾

    電子情報通信学会論文誌   Vol.J74-D-I, No.10, pp.739-748   1991.10

     More details

  • ペンドラムテストにおける膝関節運動の生成機序 Reviewed

    軸屋和明, 岡本卓爾, 横平徳美, 明石謙

    電子情報通信学会論文誌   J74-D-II, No.9, pp.1289-1300   1991.9

     More details

  • Performance evaluation of layered communication protocol Reviewed

    Hiroshi Inai, Tokumi Yokohira, Masayuki Murata, Hideo Miyahara

    Electronics and Communications in Japan (Part I: Communications)   74 ( 4 )   13 - 25   1991.4

     More details

    Publishing type:Research paper (scientific journal)  

    This paper proposes a queueing network model for the layered communication protocol and its approximate analysis method. The performance of the layered communication protocol is evaluated by using the proposed model and analysis. First, the queueing network model is constructed for the connection‐oriented and connectionless data transmissions between peer layers. In each queueing network model, the transmission delay in the lower layer protocol is represented by an infinite‐servor queue. The performance model for the layered communication protocol is constructed by piling up each model. Then an approximate analysis is presented for each queueing network model. Based on the relation to be satisfied by the packet transmission delay in each layer and the throughput between adjacent layers, an approximate analysis of the whole model can be executed iteratively. In numerical examples, the validity of the approximate analysis for the model is shown. The effects of window size, the time‐out period, and receiver buffer size on the transmission delay are discussed. Copyright © 1991 Wiley Periodicals, Inc., A Wiley Company

    DOI: 10.1002/ecja.4410740402

    Scopus

    researchmap

  • パケット交換網における伝送遅延による再送を考慮に入れた性能評価 Reviewed

    稲井寛, 横平徳美, 村田正幸, 宮原秀夫

    電子情報通信学会論文誌   Vol.J74-B-1, No.4, pp.275-282   1991.4

     More details

  • Decentralized priority encoder and its applications Reviewed

    Toshiyuki Maeda, Yoichiro Sato, Tokumi Yokohira, Takuji Okamoto

    Systems and Computers in Japan   22 ( 10 )   9 - 17   1991

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    This paper contains the realization of the decentralized priority encoder (DPE) and presents two application examples. DPE is constructed by placing a module for each device issuing a request and by connecting the outputs from the modules using wired‐OR. Each module has the function to modify the priority dynamically. The request signal from the corresponding device is connected to the input of the module. When the priority of the module M issuing the request is higher than those of any other modules issuing requests, M produces the priority of its request as a binary code on the bus. A data selector can be constructed using DPE, since the data with the highest priority can be selected from a set of data with priorities. This data selector is suited especially to the data selector for image data in the enhanced multiwindow system. Using DPE as the priority comparator, a decentralized independent‐request arbiter with priority is obtained. Copyright © 1991 Wiley Periodicals, Inc., A Wiley Company

    DOI: 10.1002/scj.4690221002

    Scopus

    researchmap

  • Capacity assignment algorithm for packet‐switching network with unreliable links Reviewed

    Tokumi Yokohira, Masashi Sugano, Takeshi Nishida, Hideo Miyahara

    Electronics and Communications in Japan (Part I: Communications)   74 ( 9 )   13 - 20   1991

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In this paper, a link capacity assignment algorithm for a packet switched communication network is presented. This algorithm, called max‐delay‐link algorithm, prevents sharp performance degradation in a network even in case of link failures. An optimal link capacity assignment can be obtained with respect to link cost minimization, subject to the constraint that the average packet network transmission delay does not exceed a predetermined value. Robust networks against failures can be designed by assigning large capacities to links where overflow traffic and packet delay are expected to increase in case of a failure. Several numerical examples also are shown to examine the effectiveness of the algorithm in comparison with the conventional capacity assignment algorithm where link failures are not taken into account. Copyright © 1991 Wiley Periodicals, Inc., A Wiley Company

    DOI: 10.1002/ecja.4410740902

    Scopus

    researchmap

  • パケット交換ネットワ-クにおける回線障害を考慮した容量割当て法 Reviewed

    横平徳美,菅野正嗣,西田竹志,宮原秀夫

    電子情報通信学会論文誌   Vol.J73-B-1, No.10, pp.744-750   1990.10

     More details

  • Test Set for a Multibit Shifter Constructed with Multiplexers Reviewed

    Tokumi Yokohira, Hiroyuki Michinishi, Takuji Okamoto, Yuuji, Sugiyama

    The Transactions of the IEICE   Vol.E73, No.8, pp.1301-1309   1990.8

     More details

  • 分散制御形プライオリティエンコ-ダとその応用 Reviewed

    前田敏行,佐藤洋一郎,横平徳美,岡本卓爾

    電子情報通信学会論文誌   Vol.J73-D-I, No.6, pp.545-552   1990.6

     More details

  • 階層型通信プロトコルの性能評価 Reviewed

    稲井寛, 横平徳美, 村田正幸, 宮原秀夫

    電子情報通信学会論文誌   Vol.J73-B-I, No.5, pp.505-515   1990.5

     More details

  • マルチプレクサを用いて構成したシフタの最小テスト集合 Reviewed

    道西博行, 横平徳美, 岡本卓爾, 杉山裕二

    電子情報通信学会論文誌   Vol.J73-D-I, No.5, pp.532-534   1990.5

     More details

  • END-TO-END PERFORMANCE MODELING FOR LAYERED COMMUNICATION PROTOCOL Reviewed

    H INAI, T NISHIDA, T YOKOHIRA, H MIYAHARA

    IEEE INFOCOM 90, VOLS 1-3   pp.442-449   442 - 449   1990

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:I E E E, COMPUTER SOC PRESS  

    Web of Science

    researchmap

  • 待ち行列網による階層型通信プロトコルの性能評価モデル Reviewed

    稲井寛, 西田竹志, 横平徳美, 宮原秀夫

    電子情報通信学会論文誌   Vol.J72-D-I, No.12, pp.893-901   1989.12

     More details

  • 大規模計算機システムの性能評価手法とその適用例 Reviewed

    稲井寛, 稲井三重, 村田正幸, 横平徳美, 宮原秀夫

    電子情報通信学会論文誌   Vol.J72-A, No.7, pp.1052-1061   1989.7

     More details

  • 回線交換ネットワ-クにおける種々のル-チング方式の安定性の比較 Reviewed

    横平徳美, 宮原秀夫

    電子情報通信学会論文誌   Vol.J71-B, No.12, pp.1411-1418   1988.12

     More details

  • マルチプログラミングシステムにおけるカタストロフィ-現象の解析 Reviewed

    横平徳美, 宮原秀夫

    電子情報通信学会論文誌   Vol.J71-D, No.6, pp.966-973   1988.6

     More details

  • ANALYSIS OF DYNAMIC BEHAVIOR IN P-PERSISTENT CSMA/CD USING CUSP CATASTROPHE Reviewed

    T YOKOHIRA, T NISHIDA, H MIYAHARA

    COMPUTER NETWORKS AND ISDN SYSTEMS   12 ( 5 )   277 - 289   1986.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ELSEVIER SCIENCE BV  

    DOI: 10.1016/0169-7552(86)90059-0

    Web of Science

    researchmap

▼display all

MISC

  • Performance Comparison of TCP Incast Avoidance Methods

    濱田泰誠, 樽谷優弥, 福島行信, 横平徳美

    電子情報通信学会大会講演論文集(CD-ROM)   2022   2022

  • Proposal of equipment control by consensus building considering unknown users

    小形晃平, 樽谷優弥, 福島行信, 横平徳美

    電子情報通信学会大会講演論文集(CD-ROM)   2022   2022

  • Evaluation of an IP Fast Reroute Method for Multiple Failures

    河野貴謙, 樽谷優弥, 福島行信, 横平徳美

    電子情報通信学会大会講演論文集(CD-ROM)   2022   2022

  • Investigation of Throughput Fairness of Multi-path TCP

    出口悠, 樽谷優弥, 福島行信, 横平徳美

    電子情報通信学会大会講演論文集(CD-ROM)   2022   2022

  • A SECRET SHARING METHOD FOR TOTAL DATA REDUCTION

    辻晋明, 樽谷優弥, 福島行信, 横平徳美

    電子情報通信学会大会講演論文集(CD-ROM)   2022   2022

  • Protection method with audio processing against Audio Adversarial Example

    山本泰成, 樽谷優弥, 福島行信, 横平徳美

    電子情報通信学会技術研究報告(Web)   121 ( 66(SP2021 1-23) )   2021

  • A Server Migration Method Using Q learning in Server Migration Service

    瓜本稜, 福島行信, 樽谷優弥, 村瀬勉, 横平徳美

    電気・情報関連学会中国支部連合大会講演論文集(CD-ROM)   71st   2020

  • 多重ルーティング形態法における対象外故障の迂回可能性の検討

    石外将史, 樽谷優弥, 福島行信, 横平徳美

    情報科学技術フォーラム講演論文集   18th   2019

  • マルチパスTCPのスループット公平性の改善

    泉大地, 樽谷優弥, 福島行信, 横平徳美

    情報科学技術フォーラム講演論文集   18th   2019

  • 複数ノード故障に対するIP高速迂回法の検討

    沼田直人, 樽谷優弥, 福島行信, 横平徳美

    情報科学技術フォーラム講演論文集   18th   2019

  • クライアントからの再送要求に基づくTCPインキャスト回避法

    岸本紫電, 長田繁幸, 長田繁幸, 樽谷優弥, 福島行信, 横平徳美

    情報科学技術フォーラム講演論文集   18th   2019

  • 深層学習を用いたネットワークトラフィック予測

    徳山雄丈, 福島行信, 樽谷優弥, 横平徳美

    情報科学技術フォーラム講演論文集   18th   2019

  • サーバ移動サービスシステムのプロトタイプ開発

    高橋謙太, 福島行信, 村瀬勉, 樽谷優弥, 横平徳美

    情報科学技術フォーラム講演論文集   18th   2019

  • サーバ移動サービスにおける最小支配集合を用いたワークプレース容量設計法の性能改善

    伊藤嵩真, 福島行信, 村瀬勉, 横平徳美

    電子情報通信学会大会講演論文集(CD-ROM)   2019   2019

  • Energy-Aware On-line Server Location Decision Algorithm in Server Migration Service

    116 ( 484 )   71 - 76   2017.3

     More details

  • Performance Improvement of an On-line Server Location Decision Algorithm in Server Migration Service

    115 ( 483 )   493 - 498   2016.3

     More details

  • B-6-63 Performance Improvement of an On-line Server Location Decision Algorithm in Server Migration Service

    Sugiyama Hiromichi, Fukushima Yukinobu, Motoyoshi Gen, Murase Tutomu, Yokohira Tokumi

    Proceedings of the IEICE General Conference   2016 ( 2 )   63 - 63   2016.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Strict Application Execution Control with Hierarchical Group Management Using Digital Certificates on Educational Windows PCs

    Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira

    56 ( 6 )   2015.6

     More details

  • Design of Flexible and Strict Application Execution Control using Digital Certification on Educational Windows PCs

    Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira

    IPSJ SIG Technical Reports   2014 ( 3 )   1 - 8   2014.6

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    We have developed an Application Execution Control System (traditional system) which provides individual application environments on each educational PC by controlling its execution. The traditional system uses a hash value of the execution file to control target application. If the execution file is falsified, a rule already set gets invalid. In addition, the traditional system has a function to set rules for multiple application at once. However, it cannot handle multiple groups at once. In order to solve these problems, this paper proposes a control method using digital certificates. It supports strict control and flexible group management by using hierarchical structure of digital certificates.

    CiNii Article

    CiNii Books

    researchmap

  • Light-trail Multi-splitting Method in Light-trail Networks

    FUKUSHIMA Yukinobu, KIKUMOTO Taishi, CHEN Wenjie, YOKOHIRA Tokumi

    IEICE technical report   111 ( 468 )   463 - 468   2012.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    As a new optical network architecture that can be built with currently available devices and can achieve bandwidth allocation with granularity finer than a wavelength, the light-trail architecture attracts attention. For the light-trail architecture using token passing medium access control, the split trail architecture is proposed for improving the throughput. In the architecture, a trail is split into the upstream trail and the downstream trail at the token holding node and independent data transmissions on the two trails are permitted. However, the split trail architecture leaves the bandwidth of links upstream of the upstream-token holding node idle because the split of the trail is driven by the reception of only the downstream-token. In this paper, we propose the multi-split trail architecture for further improving the throughput. Our architecture utilizes the idle bandwidth by splitting the trail driven by the reception of both upstream- and downstream-tokens. We formulate the decision problem of the traffic accommodation where we optimize the token holding times so that the input traffic is successfully accommodated, as a linear programming problem. Then, we derive the maximum effective throughput of the multi-split trail architecture by solving the problem, and investigate the degree of improvement over the split trail architecture. According to numerical examples, the multi-split trail architecture achieves 1) the same maximum effective throughput as the split trail architecture for an uniform traffic pattern where every node pair has the same sending rate, and 2) about 1.93 times as high maximum effective throughput for its favorite traffic pattern where every transmission node sends data to its adjacent downstream node only and their rates are identical.

    CiNii Article

    CiNii Books

    researchmap

  • Destination Selection Algorithms in Server Migration Service

    NAKAGAWA Mari, YAMANAKA Asato, FUKUSHIMA Yukinobu, MURASE Tutomu, YOKOHIRA Tokumi, SUDA Tatsuya

    IEICE technical report   111 ( 232 )   93 - 98   2011.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Server migration service provides network applications (NW Apps) with server running environment on a computer (WP) and service of server migration to another WP where the NW App can attain better QoS when it is degraded. Because the file size of a server is large, the traffic for server migration causes QoS degradation of its background traffic. Thus, it is important to decrease the degree (impact) of the QoS degradation. In this paper, we propose three destination selection algorithms MIA, MRA and MCA that try to decrease the impact while increasing the number of NW App's clients whose SLA are satisfied. When a server migration is triggered, MIA, MRA and MCA move the server to the WP with the minimum impact, the WP with the maximum remaining space for servers and the WP with the maximum communication range where the SLA is satisfied, respectively. Numerical examples show that when there is no full-cover WP (on which a server can communicate with an arbitrary client while satisfying the SLA) or its space is small, MIA outperforms the others, otherwise MCA outperforms the others.

    CiNii Article

    CiNii Books

    researchmap

  • BS-5-13 Server Migration Algorithms Taking Account of Qos in IaaS Cloud Service

    Kanzaki K., Nakagawa M., Fukushima Y., Murase T., Yokohira T., Suda T.

    Proceedings of the IEICE General Conference   2011 ( 2 )   "S - 119"-"S-120"   2011.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Server Push-out Algorithms in Server Migration Service

    KANZAKI Koji, FUKUSHIMA Yukinobu, MURASE Tutomu, YOKOHIRA Tokumi, SUDA Tatsuya

    IEICE technical report   110 ( 449 )   163 - 168   2011.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Server migration service is considered as one of IaaS-typed cloud services. The target of the service is such a application that consists of servers and their clients, and, each server works on a computer called a working place (WP) and can voluntarily migrate to another WP if necessary. However, if the destination WP is full of servers, a server in the WP may be forced to be pushed out of the current WP and migrate to another WP to accept the voluntary immigration server. In this paper, in order to protect some particular servers from experiencing voluntary migration or forced migration much more than the other servers, in the viewpoint of migration fairness, three methods to determine the candidates to be pushed out based on the numbers of voluntary migrations and forced migrations. Next, we propose two methods to determine such one pushed-out server from the candidates that the impact caused by forced migration against the network becomes as small as possible.

    CiNii Article

    CiNii Books

    researchmap

  • Optimization of Token Holding Times in Split Light-trail Networks

    CHEN Wenjie, FUKUSHIMA Yukinobu, YOKOHIRA Tokumi

    IEICE technical report   110 ( 339 )   197 - 202   2010.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    As a new optical network architecture that can be built with currently available devices and can achieve bandwidth allocation with granularity finer than a wavelength, the light trail architecture attracts attention. For the light trail architecture using token passing medium access control, the split trail architecture is proposed. In the architecture, a trail is split into the upstream trail and the downstream trail at the token holding node and independent data transmissions on the two trails are permitted. As a result, we expect that the architecture achieves higher maximum throughput than the original unsplit trail architecture. The degree of throughput improvement by the split trail one depends on how appropriately we set upstream and downstream token holding times of each transmission node. In this paper, we formulate decision problem of the token holding times as a non-linear programming problem, derive the maximum throughput of the split trail architecture by solving the problem using NUOPT solver, and investigate the degree of improvement compared to the original one. According to numerical examples, the split trail architecture achieves 1) the same maximum throughput as the original one for its unfavorite traffic pattern where every transmission node sends data to the terminating node of the trail only, 2) about 1.6 times as high maximum throughput for an uniform traffic pattern where every node pair has the same sending rate, and 3) about 1.9 time as high maximum throughput for its favorite traffic pattern where every transmission node sends data to its adjacent downstream node only.

    CiNii Article

    CiNii Books

    researchmap

  • B-6-40 Performance Evaluation of TCP over Multipath Routing

    Matsumura Takashi, Fukushima Yukinobu, Nishida Yuichi, Yokohira Tokumi

    Proceedings of the Society Conference of IEICE   2010 ( 2 )   40 - 40   2010.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • B-6-92 Early Detection of Increasing Traffic with Distributed Traffic Monitoring

    Niboshi M., Fukushima Y., Murase T., Fujimaki R., Hirose S., Yokohira T.

    Proceedings of the IEICE General Conference   2010 ( 2 )   92 - 92   2010.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Throughput Improvement based on Dynamic Trail Partitioning in Light-Trail Networks

    TANAKA Kota, CHEN Wenjie, FUKUSHIMA Yukinobu, YOKOHIRA Tokumi

    IEICE technical report   109 ( 448 )   479 - 484   2010.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    As a new optical network architecture that can be built with currently available devices, light trail networks attract attention. A trail is an unidirectional communication channel which is set up by reserving a specific wavelength along a route between a source node and a destination node, and packet communication from an arbitrary node to its downstream nodes is possible. Because a trail is a shared medium, we need medium access control (MAC) to avoid collisions of packets. Token passing type MAC methods such as light-trail fair access MAC (LT-FA MAC) and adaptive round time MAC (ART MAC) have been proposed. In those methods, however, downstream bandwidth of the token holding node is only used, and upstream bandwidth becomes idle. In this paper, we try to improve throughput of a trail by using those idle bandwidth effectively in a token passing type MAC method. In order to achieve this, we propose a dynamic trail partitioning method that dynamically partitions a trail into upstream trail and downstream one at the token holding node, and permits parallel transfer of data using two trails. Numerical calculations and simulations show that the dynamic trail partitioning method can improve throughput by a maximum of more than 80%.

    CiNii Article

    CiNii Books

    researchmap

  • Early Detection of Increasing Traffic with Distributed Traffic Measuring

    NIBOSHI Mamoru, FUKUSHIMA Yukinobu, MURASE Tutomu, FUJIMAKI Ryohei, HIROSE Shunsuke, YOKOHIRA Tokumi

    IEICE technical report   109 ( 449 )   331 - 336   2010.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With the spread of broadband access lines, many services making efficient use of them such as video streaming services have appeared. The popularity of these services can cause problems such as the shortage of the Internet backbone capacity, so it is important to detect increasing traffic which cause these problems early. In this paper, we propose an early detection method (partial aggregation method) of increasing traffic under per-subnet based distributed traffic monitoring. The method estimates future overall traffic volume by taking account of estimated traffic volume in all subnets and the estimated number of subnets generating increasing traffic. We compare the proposed method to a previous method (aggregation method) which takes account of estimated traffic volume in all subnets only. The results show that the partial aggregation method can detect increasing traffic earlier than the aggregation method by a maximum of 90 days.

    CiNii Article

    CiNii Books

    researchmap

  • B-6-13 Accuracy Improvement of Multi-Stage Change-Point Detection Scheme Based on Alert Weighting

    Wang En, Fukushima Yukinobu, Murase Tutomu, Fujimaki Ryohei, Hirose Syunsuke, Yokohira Tokumi

    Proceedings of the IEICE General Conference   2009 ( 2 )   13 - 13   2009.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • B-7-32 Performance Evaluation of Light-Trail Networks with Cut-Through Function

    Chen Wenjie, Fukushima Yukinobu, Yokohira Tokumi

    Proceedings of the IEICE General Conference   2009 ( 2 )   176 - 176   2009.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • B-7-30 Performance Evaluation of Medium Access Control Methods in Light Trail Networks

    Tanaka Kota, Fukushima Yukinobu, Yokohira Tokumi

    Proceedings of the IEICE General Conference   2009 ( 2 )   174 - 174   2009.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Performance Evaluation of Peer Selection Algorithms for P2P Live Streaming

    FUJIWARA Yasuyuki, FUKUSHIMA Yukinobu, YIN Tao, INADA Kazuya, YOKOHIRA Tokumi

    IEICE technical report   108 ( 458 )   423 - 428   2009.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we propose two peer selection algorithms to increase the number of joining peers and decrease the traffic amount between ASs in P2P live streaming, where we assume that the number (logical hop count) of relaying peers is limited by a predetermined value in order to keep real-time property of live streaming. In the first method, a newly joining peer selects such providing peers that the logical hop count is minimum to increase the number of joining peers. And then if there are several such providing peers, the newly joining peer selects such providing peers that the number (physical hop count) of ASs between the newly joining peer and each of the providing peers is minimum to decrease the traffic amount between ASs. In the second peer selection method, a newly joining peer selects providing peers in the reverse order of the first selection method. Simulation results show that the former increases the number of joining peers compared to the latter. Moreover, when the number of joining peers is small (large), the traffic amount between ASs in the latter (the former) is smaller.

    CiNii Article

    CiNii Books

    researchmap

  • B-7-73 Performance Comparison of Burst Assembly Methods Assembling Packets Arriving during an Offset Period into a Burst in Optical Burst Switching Networks

    Noine Yasuhiro, Fukushima Yukinobu, Yokohira Tokumi

    Proceedings of the IEICE General Conference   2008 ( 2 )   150 - 150   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • BS-5-2 Detection of Worm Epidemics Based on a Change in the Number of Destination IP Addresses in Multi-Stage Change-Point Detection Scheme

    Niboshi Mamoru, Murase Tutomu, Kobayashi Masayoshi, Fujimaki Ryohei, Fukushima Yukinobu, Yokohira Tokumi

    Proceedings of the IEICE General Conference   2008 ( 2 )   "S - 60"-"S-61"   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Preservation of TCP Communications Considering Macro Mobility of User Terminals

    KIZAWA Masao, NIKUSHI Nobuhiro, OKAYAMA Kiyohiko, YAMAI Nariyoshi, YOKOHIRA Tokumi

    IEICE technical report   106 ( 578 )   43 - 48   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In recent years, inexpensive and lightweight portable terminals such as laptop PCs are spreading, and outdoor Internet services such as wireless hot spots are increasing. Therefore, users can connect to the Internet at various locations by their own terminal. However, if a terminal establishing TCP connections starts to move to another network, there is a problem that TCP connections are aborted due to retransmission timeout and the change of terminal's IP address. In this paper, we propose a method to preserve TCP connections for macro mobility of terminals by hiding the change of IP address from TCP layer using VPN and by preventing retransmission using proxies.

    CiNii Article

    CiNii Books

    researchmap

  • Performance Evaluation of a Multi-Stage Network Anomaly Detection Scheme for Decreasing the False-Positive Rate against a Large Number of Simultaneous, Unknown Events

    MURASE Tutomu, FUKUSHIMA Yukinobu, KOBAYASHI Masayoshi, FUJIWARA Hiroki, YOKOHIRA Tokumi

    IEICE technical report   106 ( 358 )   25 - 30   2006.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Change-point detection schemes are a promising approach for detecting network anomalies such as attacks and infections by unknown viruses and worms. They detect those behaviors as change-points. In general, however, because they also detect false-positive change-points, those caused by other factors such as hardware troubles, we need a scheme that only detects true-positive change-points caused by attacks and infections. True-positive change-points tend to occur simultaneously, and the number of true-positive change-points is very large, while false-positive change-points tend to occur sporadically. We exclude false-positive change-points by neglecting change-points that occur sporadically, based on information gathered from the whole network. In this paper, we propose a multi-stage network anomaly detection scheme that aggregates change-point information from distributed IDSs (Intrusion Detection Systems) and detects the true-positive change-points. Simulation results illustrate that, compared to a scheme using only one IDS, our method always yields a smaller false-positive rate, a reduction of up to 98%, under a constraint that the detection rate of the true-positive change-points must exceed 0.99.

    CiNii Article

    CiNii Books

    researchmap

  • Performance Improvement by using Multiple Burst Header Packets in Optical Burst Switching Networks

    NAGAHARA Kazuteru, YOKOHIRA Tokumi

    IEICE technical report   105 ( 627 )   101 - 104   2006.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In optical burst switching networks, a larger value of the offset time (the time duration between the burst assembly finishing time and the transmission time of the burst) is desirable to decrease packet loss rate. However, a larger offset value introduces a longer delay at edge routers because packet arriving during the offset time are not assembled into the current burst in conventional methods. In this paper, we consider a strategy where a larger offset time is used and packets arriving during the offset time are assembled into the current burst. In order to attain the policy, we propose two methods A and B. In the method A, we estimate the amount of packets arriving duration the offset time and we reserve wavelength channels so that the packets can be transmitted by the current burst. The method A however has a weak point that the reserved time is partly useless when the estimated amount is too large. In order to resolve it, the method B again estimates the amount of arrived packets halfway through the offset time and releases the redundant reserved time when the second estimated amount is less that the first one. Numerical examples shows the effectiveness of the proposed methods, and the method B is superior to the method A when the packet arrival process is the Pareto ON-OFF process.

    CiNii Article

    CiNii Books

    researchmap

  • A High-speed Method for Calculating Worst-case Link Delays in EDD Connection Admission Control Scheme : In the case that many connections with large allowable end-to-end delay are established

    MIYAKE Ryusuke, YOKOHIRA Tokumi

    IEICE technical report   105 ( 470 )   33 - 36   2005.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In order to calculate the worst-case link delays in the EDD (Earliest Due Date) connection admission control scheme, a check called the point schedulability check is necessary for each of finite and discrete time instants (checkpoints). In our previous calculation method, high speed calculation is attained by decreasing an upper bound value of checkpoints. However, the method can not calculate at high speed when many connections with large allowable end-to-end delays are established. The purpose of the paper is to improve the previous method. In this paper, we clarify that we do not have to execute the point schedulability check for an interval of checkpoints which are less than the upper bound value in the previous method, and based on the fact, high speed calculation can be attained. Numerical examples show that the proposed method drastically decreases the calculation time when many connections with large allowable end-to-end delays are established.

    CiNii Article

    CiNii Books

    researchmap

  • Improvement of a Method for Calculating Worst-case Link Delays in EDD Connection Admission Control Scheme

    MIYAKE Ryuusuke, YOKOHIRA Tokumi

    IEICE technical report   105 ( 86 )   53 - 56   2005.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In order to calculate the worst-case link delays in the EDD (Earliest Due Date) connection admission control scheme, a check called the point schedulability check is necessary for each of finite and discrete time in stants (checkpoints). In our previous calculation method, high speed calculation is attained by decreasing a upper bound value of checkpoints. However, the method can not calculate at high speed when networks are temporarily in congested state. The purpose of the paper is to improve the previous method. The upper bound value of the previous method depends on the slope and the intercept of a linear function called a covering function, and its value drastically increases for the small increase of the slope and slowly increases for the small increase of the intercept. Because the previous method uses a covering function whose slope is large in the temporal congested state, the calculation time becomes large. The improved method uses a covering function whose slope is minimum and whose intercept somewhat larger than the previous method, and consequently the upper bound value of checkpoints become smaller. The improved method therefore can attain high speed calculation in the temporal congested state. Numerical examples show that the improved method drastically decrease the calculation time in the temporal congested state.

    CiNii Article

    CiNii Books

    researchmap

  • Node Placement Algorithms for Shuffle-Like WDM Networks : In case that routes are assumed to be design variables

    IZUMI Yoshiki, YOKOHIRA Tokumi, OKAMOTO Takuji

    IEICE technical report   104 ( 60 )   5 - 8   2004.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Two heuristic node placement algorithms, DIST and SPARSE, have been proposed for Shuffle-Like Networks (SL-Nets). Since a route between two nodes is assumed to be given, the algorithms have the problem that traffic amounts over some links may be too large. In this report, we propose two new node placement algorithms, New_DIST and New_SPARSE, in which routes are assumed to be design variables. New_DIST (New_SPARSE) places nodes in the same way as DIST (SPARSE), and selects such a shortest path between two nodes that traffic amounts of links are balanced. Numerical examples for four typical traffic matrices show that the better performance can be obtained by using one of the proposed algorithms for each matrix.

    CiNii Article

    CiNii Books

    researchmap

  • CMOS Floating Gate Defect Detection Using Supply Current Test with DC Power Supply Superposed by AC Component

    MICHINISHI Hiroyuki, YOKOHIRA Tokumi, OKAMOTO Takuji, KOBAYASHI Toshifumi, HONDO Tsutomu

    IEICE Trans. Inf. & Syst., D, March 2004   87 ( 3 )   551 - 556   2004.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper proposes a new supply current test method for detecting floating gate defects in CMOS ICs. In the method, unusual increase of the supply current caused by defects is promoted by superposing an AC component on the DC power supply. Feasibility of the test is examined by some experiments on four DUTs with an intentionally caused defect. The results showed that our method could detect clearly all the defects, one of which may be detected by neither any functional logic test nor any conventional supply current test.

    CiNii Article

    CiNii Books

    researchmap

  • A Delay Margin Assignment Method for EDD Connection Admission Control Scheme : A Method Performing the Assignment When It Is Necessary

    YOKOHIRA Tokumi, YAMASHITA Akira, OKAMOTO Takuji

    IEICE technical report   103 ( 386 )   21 - 24   2003.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In the EDD connection admission control scheme, a connection is established if its allowable end-to-end delay is larger than or equal to the worst-case end-to-end delay, and the timing of assignment of the difference (called a delay margin) between the two delays is an important issue. In conventional assignment methods, the assignment is performed when the connection establishment request is accepted. In this paper, we propose a new assignment method in which the assignment is not performed when the connection establishment request is accepted, and is performed when it is necessary to establish a connection in the future. Simulation results show that the maximum number of established connections by the proposed method is roughly equal to or up to 1.30 times as large as those by conventional ones.

    CiNii Article

    CiNii Books

    researchmap

  • An Assignment Method of end-to-end delay margin in EDD Connection Admission Control Scheme

    Yokohira Tokumi, Ikeda Kazuya, Okamoto Takuji

    Proceedings of the IEICE General Conference   2000 ( 2 )   54 - 54   2000.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Testing of Look-up table FPGAs

    Michinishi Hiroyuki, Yokohira Tokumi, Okamoto Takuji, Inoue Tomoo, Fujiwara Hideo

    Technical report of IEICE. FTS   95 ( 87 )   49 - 56   1995.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper presents a universal testing method which can check whether unprogrammed look-up table FPGAs(Field Programmable Gate Arrays) are fault free or not. Such an FPGA is constructed with four kinds of blocks, configurable logic block, cross-point switch block, switch matrix and IO block. First, configurations and test patterns for testing each block are derived. Second, they are extended so that several blocks of the same kind can be simultaneously tested. The FPGA can be tested with O(N) configurations, where N is the row size (column size) of the FPGA.

    CiNii Article

    CiNii Books

    researchmap

  • A Multiwindow Generation Method for High Speed Window Operations

    Tsunashima N., Sato Y., Yokohira T., Okamoto T.

    Proceedings of the IEICE General Conference   1995 ( 1 )   172 - 172   1995.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • On the Relation between Network Topology and Packet Transmission Delay in Shuffle-Like Switching Network

    Inoue Naoko, Yokohira Tokumi, Okamoto Takuji

    Technical report of IEICE. SSE   93 ( 389 )   49 - 54   1993.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper describes the influence of network topologies on end- to-end packet transmission delays in Shaffie-Like Switching Networks.The network consists of n×2^k nodes.The influence is anal yzed by means of simulation in which n and k are varied in various combinations.And it is carified that,if the number of nodes is held constant,the best topology is obtained at the maximum value of n under the condition that the average minimum end-to-end path length is held near the minimum value.

    CiNii Article

    CiNii Books

    researchmap

  • Performance Comparison of Distributed Type Switching Networks under a Single Link Failure

    Yokohira Tokumi, Takihiro Masatoshi, Inoue Naoko, Okamoto Takuji

    Technical report of IEICE. FTS   93 ( 182 )   1 - 8   1993.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper evaluates performances of two distributed type switching networks,the Manhattan Street Network(MS-Net)and ShuffleNet(SH-Net),by simulation.The performance measure is average end-to-end transmission delay.Packets enter the networks in the order of generation(FIFO mode)or an order determined by their destinations(SCAN mode),and traverse the networks along the routes decided by deflection routing.SCAN mode is superior to FIFO one in either network if it is,fault-free.In both of fault-free case and a single link failure case,SH-Net is superior to MS-Net if SCAN mode is adopted.

    CiNii Article

    CiNii Books

    researchmap

  • MINIMUM TEST SET FOR LOCALLY EXHAUSTIVE TESTING OF MULTIPLE-OUTPUT COMBINATIONAL-CIRCUITS

    H MICHINISHI, T YOKOHIRA, T OKAMOTO

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E76D ( 7 )   791 - 799   1993.7

     More details

    Language:English   Publisher:IEICE-INST ELECTRON INFO COMMUN ENG  

    The locally exhaustive testing of multiple output combinational circuits is the test which provides exhaustive test patterns for each set of inputs on which each output depends. First, this paper presents a sufficient condition under which a minimum test set (MLTS) for the locally exhaustive testing has 2w test patterns, where w is the maximum number of inputs on which any output depends. Next, we clarify that any CUT with up to four outputs satisfies the condition, independently of w and n, where n is the number of inputs of the CUT. Finally, we clarify that any CUT with five outputs also satisfies the condition for 1 less-than-or-equal-to w less-than-or-equal-to 2 or n-2 less-than-or-equal-to w less-than-or-equal-to n.

    Web of Science

    researchmap

  • Testing Processor Control Circuit with Instruction Execution -Minimum Test Set for Sequencer Considering Timing Controller Test-

    1990 ( 81 )   1 - 8   1990.10

     More details

▼display all

Presentations

  • 仮想網マッピングシステムの機能拡張-仮想リンク単位での経路選択の実現-

    電気・情報関連学会中国支部第69回連合大会  2018 

     More details

  • マルチパスTCPにおける輻輳制御方式のスループット公平性の検討

    電気・情報関連学会中国支部第69回連合大会  2018 

     More details

  • IP高速迂回法における想定外故障の迂回可能性の検討

    電気・情報関連学会中国支部第69回連合大会  2018 

     More details

  • Link Capacity Provisioning and Server Location Decision in Server Migration Service

    IEEE International Conference on Cloud Networking (CloudNet 2018)  2018 

     More details

  • The Effect of Using Attribute Information in Network Traffic Prediction with Deep Learning

    International Conference on ICT Convergence 2018 (ICTC 2018)  2018 

     More details

  • Backoff Algorithms to Avoid TCP Incast in Data Center Networks

    International Conference on ICT Convergence 2018 (ICTC 2018)  2018 

     More details

  • マルチパスTCPのスループット公平性の 検討

    電子情報通信学会2018年総合大会  2018 

     More details

  • Workplace Capacity Design Using the Minimum Dominating Set in Server Migration Services

    The 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2018)  2018 

     More details

  • データセンターネットワークにおけるTCPインキャスト回避法の性能改善

    電子情報通信学会2017年総合大会  2017 

     More details

  • Improvement of a TCP Incast Avoidance Method using a Fine-grained Kernel Timer

    International Conference on ICT Convergence 2017 (ICTC 2017)  2017 

     More details

  • 多重ルーティング形態法における予備テーブルのエントリ数の低減

    電子情報通信学会2017年総合大会  2017 

     More details

  • Load Modulation Based MIMO Communication for the Low Complexity and Low Power Consumption

    2016 IEEE International Conference on Consumer Electronics (ICCE 2016)  2016 

     More details

  • Power-Aware Server Lofcation Decision in Server Migration Service

    International Conference on ICT Convergence 2016 (ICTC 2016)  2016 

     More details

  • Prototype Development of a Virtual Network Embedding System Using OpenStack

    The 31st International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2016)  2016 

     More details

  • Nonlinearity Sensitivity of FBMC and UFMC Modulation System for the 5G Mobile System

    The 31st International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2016)  2016 

     More details

  • Performance Evaluation of an Energy Efficient Virtual Network Mapping Method -In the case of load-dependent power consumption model-

    The International Conference on Electronics and Software Science 2015 (ICESS 2015)  2015 

     More details

  • An On-line Algorithm to Determine the Location of the Server in a Server Migration Service

    The 12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015)  2015 

     More details

  • 多重ルーティング形態法における予備テーブルのエントリ数の低減

    第17回IEEE広島支部学生シンポジウム (HISS 2015)  2015 

     More details

  • 消費電力低減を指向した仮想網マッピング手法の性能評価 --機器の消費電力が負荷に応じて変化する場合--

    第17回IEEE広島支部学生シンポジウム (HISS 2015)  2015 

     More details

  • マルチパスTCPにおけるスループット公平性の改善

    第17回IEEE広島支部学生シンポジウム (HISS 2015)  2015 

     More details

  • サーバ移動トラヒックの背景トラヒック への影響に関する実験的評価

    電気・情報関連学会中国支部第66回連合大会  2015 

     More details

  • 複数アプリケーション存在下におけるマルチパスTCPのスループット評価

    電気・情報関連学会中国支部第66回連合大会  2015 

     More details

  • Power Consumption Evaluation of Light-trail Networks

    ITC-CSCC  2014 

     More details

  • 教育用WindowsPCにおけるデジタル証明書を用いた柔軟かつ堅牢なアプリケーション実行制御システムの設計

    情報処理学会インターネットと運用技術研究会研究報告vol.2014-IOT-26  2014 

     More details

  • Throughput Improvement of TCP Proxies in Network Environment with Wireless LANs

    TENSYMP  2014 

     More details

  • サーバ移動サービスにおけるサーバ配置決定アルゴリズム

    電子情報通信学会技術研究報告(NS2014-138)  2014 

     More details

  • ロバストルーティング方式におけるバースト分配方式

    電子情報通信学会技術研究報告(NS2013-240)  2014 

     More details

  • 光トレイルネットワークにおける省電力を指向したトラヒックエンジニアリング手法

    電子情報通信学会技術研究報告(NS2013-235)  2014 

     More details

  • 多重ルーティングテーブル法における迂回経路導出法の改良

    電子情報通信学会2014年総合大会  2014 

     More details

  • Power Efficiency Evaluation of Medium Access Control Methods in Light Trail Networks

    ITC-CSCC  2014 

     More details

  • Performance Evaluation of Overlay Construction Algorithms in Mesh-pull P2P Live Streaming

    ITC-CSCC  2014 

     More details

  • リソースとコストを考慮した仮想網マッピング

    第16回IEEE広島支部学生シンポジウム (HISS 2014)  2014 

     More details

  • IPネットワークにおける故障からの高速回復のためのルート迂回法

    第16回IEEE広島支部学生シンポジウム (HISS 2014)  2014 

     More details

  • 細粒度タイマを用いたTCP におけるバックオフ値の最適化

    第16回IEEE広島支部学生シンポジウム (HISS 2014)  2014 

     More details

  • 光トレイルネットワークにおけるメディアアクセス制御方式の電力性能評価

    第16回IEEE広島支部学生シンポジウム (HISS 2014)  2014 

     More details

  • メッシュプル型P2Pライブストリーミングにおけるオーバーレイネットワーク構築方式の性能評価

    電気・情報関連学会中国支部第65回連合大会  2014 

     More details

  • A Reroute Method to Recover Fast from Network Failure

    International Conference on ICT Convergence 2014 (ICTC 2014)  2014 

     More details

  • Optimization of Maximum Timeout Value in TCP with a Fine-grained Timer for Data Center Networks

    International Conference on ICT Convergence 2014 (ICTC 2014)  2014 

     More details

  • Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming Environment

    2014 IEEE 38th Annual International Computers, Software and Applications Conference (COMPSAC 2014)  2014 

     More details

  • TCP Incast の回避手法の改良

    第15回IEEE広島支部学生シンポジウム (HISS 2013)  2013 

     More details

  • サーバ移動サービスにおける最適サーバ配置

    電子情報通信学会技術研究報告(NS2012-231)  2013 

     More details

  • コネクション直列化によるTCP Incastの回避

    電子情報通信学会技術研究報告(NS2012-208)  2013 

     More details

  • A Reroute Method Using Multiple Routing Configurations for Fast IP Network Recovery

    APCC  2013 

     More details

  • Decreasing of the Number of Backup Tables in Multiple Routing Table Method for Fast IP Network Recovery

    ITC-CSCC  2013 

     More details

  • A Per-burst Traffic Distribution Method for TCP Performance Improvement in Fixed Robust Routing

    ITC-CSCC  2013 

     More details

  • A Multi-splitting Method for Light-trail Networks

    ITC-CSCC  2013 

     More details

  • Optimization of Server Locations in Server Migration Service

    ICNS  2013 

     More details

  • 多重ルーティングテーブル法における予備テーブル数の低減

    電子情報通信学会2013年総合大会  2013 

     More details

  • サーバ移動サービスにおける移動先決定アルゴリズム 〜 複数サーバ移動の場合 〜

    電子情報通信学会技術研究報告(NS2012-232)  2013 

     More details

  • Improvement of a TCP Incast Avoidance Method for Data Center Networks

    ICTC  2013 

     More details

  • ロバストルーティング方式におけるバースト分配方式

    電気・情報関連学会中国支部第64回連合大会  2013 

     More details

  • TCP Incast Avoidance Based on Connection Serialization in Data Center Networks

    APCC  2013 

     More details

  • マルチパスTCPにおける受信バッファ最適化法のスループットへの影響

    第15回IEEE広島支部学生シンポジウム (HISS 2013)  2013 

     More details

  • パケットロス環境下でのTCPの最適受信バッファサイズ

    第14回IEEE広島支部学生シンポジウム (HISS 2012)  2012 

     More details

  • TCPの性能を考慮した複合型ロバストルーティング方式

    電子情報通信学会通信方式研究会  2012 

     More details

  • P2PライブストリーミングにおけるASフレンドリーなピア選択法の性能改善

    電子情報通信学会2012年総合大会  2012 

     More details

  • CAIDA Datasetに基づく国内ASトポロジーの精度検証と改善

    電子情報通信学会2012年総合大会  2012 

     More details

  • TCPスループットを考慮した複合型ロバストルーティング方式

    電子情報通信学会2012年総合大会  2012 

     More details

  • 光トレイルネットワークにおけるトレイル多重分割方式

    電子情報通信学会ネットワークシステム研究会  2012 

     More details

  • Improvement of an ACK Returning Method of TCP Proxies in Network Environment with Wireless LANs

    GCCE  2012 

     More details

  • A Solution to Transmission Halting In a New Flow Control Method TCP-fox

    APCC  2012 

     More details

  • 多重ルーティングテーブルを用いたルート迂回法

    電気・情報関連学会中国支部第63回連合大会  2012 

     More details

  • Destination Selection Algorithm in a Server Migration Service

    CFI  2012 

     More details

  • Optimal TCP Receive Buffer Size under Packet Loss Environment

    ITC-CSCC  2012 

     More details

  • Hybrid Fixed Robust Routing Taking Account of TCP Performance

    ITC-CSCC  2012 

     More details

  • Inter-AS Traffic Volume Reduction by Localizing Delivery for P2P Live Streaming

    ICNC  2012 

     More details

  • Performance Evaluation of TCP over Multiple Paths in Fixed Robust Routing

    IEEE CQR Workshop  2011 

     More details

  • IaaS 型クラウドサービスにおけるQoSを考慮したサーバ移動アルゴリズム

    電子情報通信学会2011年総合大会  2011 

     More details

  • サーバ移動サービスにおけるサーバ追い出しアルゴリズム

    電子情報通信学会情報ネットワーク研究会  2011 

     More details

  • Optimization of Token Holding Times in Split Light Trail Networks

    IEEE GLOBECOM  2011 

     More details

  • P2PライブストリーミングにおけるAS フレンドリーなピア選択法の性能改善

    第13回IEEE広島支部学生シンポジウム (HISS 2011)  2011 

     More details

  • 無線LAN混在環境におけるTCPプロキシのACK返送法の改良

    電気・情報関連学会中国支部第62回連合大会  2011 

     More details

  • サーバ移動サービスにおける移動先決定アルゴリズム

    電子情報通信学会ネットワーク研究会  2011 

     More details

  • P2Pライブストリーミングにおけるピア選択法の性能評価 -部分的なASトポロジーのみが利用できる場合-

    電気・情報関連学会中国支部第61回連合大会  2010 

     More details

  • 分散トラヒック計測に基づく増加トラヒックの早期検出

    電子情報通信学会2010年総合大会  2010 

     More details

  • 分割型光トレイルネットワークにおけるトークン保持時間の最適化

    電子情報通信学会ネットワークシステム研究会  2010 

     More details

  • 分散トラヒック計測に基づく増加トラヒックの早期検出

    電子情報通信学会情報ネットワーク研究会  2010 

     More details

  • 重み付き階層型変化点検出方式の性能評価 -アラートに対する重み付けの有効性の検討-

    コンピュータセキュリティシンポジウム2010  2010 

     More details

  • P2Pライブストリーミングにおけるピア選択法の性能評価 -日本国内におけるASトポロジを利用した評価-

    第12回IEEE広島支部学生シンポジウム (HISS 2010)  2010 

     More details

  • マルチドメイン光パス網におけるスター型抽象化方式

    第12回IEEE広島支部学生シンポジウム (HISS 2010)  2010 

     More details

  • マルチパスルーチングにおけるTCPの性能評価

    電子情報通信学会2010年ソサイエティ大会  2010 

     More details

  • 光トレイルネットワークにおけるトレイルの動的分割によるスループットの向上

    電子情報通信学会ネットワークシステム研究会  2010 

     More details

  • モバイルエージェントフレームワークにおけるデモンストレーション機能の実装

    電気・情報関連学会中国支部第61回連合大会  2010 

     More details

  • 無線LAN混在環境におけるスプリット型TCPプロキシの性能評価

    電気・情報関連学会中国支部第61回連合大会  2010 

     More details

  • 光トレイル網におけるメディアアクセス制御方式の性能評価

    電子情報通信学会2009年総合大会  2009 

     More details

  • アラートの重み付けによる階層型変化点検出方式の精度改善

    電子情報通信学会2009年総合大会  2009 

     More details

  • P2Pライブストリーミングにおけるピア選択方式の性能評価

    電子情報通信学会技術研究報告,IN2008-203  2009 

     More details

  • ユーザ先行・追随型モバイルエージェントフレームワークによるモバイルディレクトリィの実装

    第11回IEEE広島支部学生シンポジウム (HISS 2009)  2009 

     More details

  • P2PライブストリーミングにおけるAS間トラヒックの低減を目指したピア選択法

    電気・情報関連学会中国支部第60回連合大会  2009 

     More details

  • カットスルー機能を備えた光トレイル網の性能評価

    電子情報通信学会2009年総合大会  2009 

     More details

  • TCP性能向上プロキシにおける再送制御の実装,

    第10回IEEE広島支部学生シンポジウム (HISS2008),CD-ROM,C-01,pp.31-34  2008 

     More details

  • モバイルエージェントフレームワークにSQLデータベースを用いた移動予測

    電気・情報関連学会中国支部第59回連合大会,pp.187-188  2008 

     More details

  • 階層型変化点検出機構における宛先IPアドレス数の変化に基づくワーク拡散の検出

    電子情報通信学会2008年総合大会,pp.S60-S61  2008 

     More details

  • 光バースト交換網におけるオフセット期間中の到着パケットもバースト化するバースト生成法の性能比較

    電子情報通信学会2008年総合大会  2008 

     More details

  • 性能向上プロキシを用いたTCPにおける再送制御

    電子情報通信学会技術研究報告,NS2007-68,pp.77-82  2007 

     More details

  • 同時多発する未知イベントに対する情報集約による偽陽性アラート排除検知方法の性能評価

    電子情報通信学会技術研究報告,ICSS2006-16, pp.37-42  2007 

     More details

  • TCP性能改善のための早期ACK返送機能を有するルータの実装

    第9回IEEE広島支部学生シンポジウム (HISS 2007)  2007 

     More details

  • モバイルエージェントフレームワークにおける地図情報を用いた移動予測

    第9回IEEE広島支部学生シンポジウム (HISS 2007)  2007 

     More details

  • バースト交換網におけるバースト長推定に基づくバースト生成法の性能評価

    第9回IEEE広島支部学生シンポジウム (HISS 2007)  2007 

     More details

  • 同時多発イベント検出を目的とした階層型変化点検出機構の性能評価

    電気・情報関連学会中国支部第58回連合大会,pp.379-380  2007 

     More details

  • モバイルエージェントフレームワークにおける地図情報データベースの作成

    電気・情報関連学会中国支部第58回連合大会,pp.334-335  2007 

     More details

  • OBSネットワークにおける複数のヘッダパケットの使用による性能改善

    電子情報通信学会技術研究報告,NS2005-183,pp.101-104  2006 

     More details

  • 同時多発する未知イベントに対する情報集約による偽陽性アラート排除検知方法の性能評価

    電子情報通信学会技術研究報告,IN2006-89,pp.25-30  2006 

     More details

  • ユーザ先行・追随型モバイルエージェントフレームワークにおけサーバの分散化

    第8回IEEE広島支部学生シンポジウム (HISS 2006),pp.139-142  2006 

     More details

  • 性能向上プロキシを用いたTCPの性能評価 -パケットロスが生起する場合-

    第8回IEEE広島支部学生シンポジウム (HISS 2006), pp.97-100  2006 

     More details

  • 性能改善プロキシを用いたTCPにおける公平性の検討

    電気・情報関連学会中国支部第57回連合大会,pp.532-533  2006 

     More details

  • 光バースト交換網におけるエンド間遅延の低減を目指したバースト生成法

    電気・情報関連学会中国支部第57回連合大会,pp.530-531  2006 

     More details

  • 性能向上プロクシを用いたTCPにおけるスループットの最適化

    電子情報通信学会技術研究報告,NS2006-96,pp.145-150  2006 

     More details

  • インテリジェントマークとモバイルエージェントの融合によるユーザ支援手法の構築

    ヒューマンインターフェースシンポジウム2006 (HIS 2006), pp.1181-1184  2006 

     More details

  • ユーザ先行・追随型モバイルエージェントフレームワークにおけるユーザエージエント消失からの回復法

    第7回IEEE広島支部学生シンポジウム,pp.337-340  2005 

     More details

  • 早期ACKパケットの返送によるTCPの性能改善 -複数コネクションが存在する状況での性能評価-

    電子情報通信学会ネットワークシステム研究会,信学技報NS2005-129,pp.87-90  2005 

     More details

  • ユーザ先行・追随型モバイルエージェントフレームワークにおけるサービス断絶状態からの回復法

    電気・情報関連学会中国支部第56回連合大会,pp.227-228  2005 

     More details

  • 早期ACKパケットの返送によるTCPの性能改善

    電子情報通信学会ネットワークシステム研究会,信学技報NS2005-67,pp.25-28  2005 

     More details

  • 長期的なリンクダウン状態に対するTCP通信の維持

    情報処理学会シンポジウムシリーズ(マルチメディア,分散,協調とモバイルシンポジウム (DICOMO 2005)),Vol.2005,No.6,pp.345-348  2005 

     More details

  • EDDコネクション受付制御方式における最悪リンク遅延導出法の改良

    電子情報通信学会ネットワークシステム研究会,信学技報NS2005-37,pp.53-56  2005 

     More details

  • PEPによるTCPの性能改善 --- 早期ACKパケットの返送タイミングがスループットに及ぼす影響 ---

    電子情報通信学会ネットワークシステム研究会,信学技報NS2004-264,pp.103-106  2005 

     More details

  • 長期的なリンクダウン状態に対するTCP通信の維持

    第7回IEEE広島支部学生シンポジウム,pp.357-360  2005 

     More details

  • EDDコネクション受付制御方式における最悪リンク遅延の高速導出法 -許容遅延の大きいコネクションが多数設定される場合-

    電子情報通信学会ネットワークシステム研究会,信学技報NS2005-141,pp.33-36  2005 

     More details

  • EDDコネクション受付制御方式における最悪リンク遅延の高速導出法 --- 負荷が中程度以下の場合

    電子情報通信学会ネットワークシステム研究会  2004 

     More details

  • ユーザ先行・追随型モバイルエージェントシステム構築のためのフレームワーク

    第6回IEEE広島支部学生シンポジウム  2004 

     More details

  • バーストスイッチングにおける波長パス要求保留時間の性能への影響

    電気・情報関連学会中国支部第54回連合大会  2004 

     More details

  • シャッフル型WDMネットワークにおけるノード配置アルゴリズム --- 経路を設計変数とした場合 ---

    電子情報通信学会ネットワークシステム研究会  2004 

     More details

  • EDDコネクション受付制御方式における遅延余裕割当法 -必要が生じたときに割り当てる方法-

    電子情報通信学会ネットワークシステム研究会  2003 

     More details

  • シャッフル型WDMネットワークにおけるノード配置アルゴリズム -経路を設計変数とした場合-

    電気・情報関連学会中国支部第54回連合大会  2003 

     More details

  • EDDコネクション受付制御方式における最悪リンク遅延導出法の高速化

    電子情報通信学会ネットワークシステム研究会  2003 

     More details

  • ネットワーク技術の最新動向(特別講演)

    計測自動制御学会中国支部計測制御シンポジウム2002予稿集  2002 

     More details

  • EDDコネクション受付制御方式における最悪リンク遅延の高速導出法 -パケット長の最大値がコネクションによらず一定の場合-

    電子情報通信学会ネットワークシステム研究会  2002 

     More details

  • ペンドラムテストによる痙縮の定量化手法

    第41回日本エム・イー学会大会論文集  2002 

     More details

  • ペンドラムテストシミュレータによる痙縮の定量化手法

    第17回中国四国リハビリテーション医学研究会  2002 

     More details

  • 相動性筋紡錘モデルの提案

    第25回日本ME学会中国四国支部大会  2002 

     More details

  • シャッフル型波長分割多重方式パケット交換網におけるノード配置アルゴリズム

    電子情報通信学会ネットワークシステム研究会  2002 

     More details

  • CMOSオープン故障の検出に関する研究

    電気・情報関連学会中国支部第53回連合大会  2002 

     More details

  • モジュール化による機能独立を指向したテレビ会議システムの設計

    電気・情報関連学会中国支部第53回連合大会  2002 

     More details

  • ジョセフソン素子による3変数論理関数の一構成法

    電気・情報関連学会中国支部第53回連合大会  2002 

     More details

  • 筋粘弾性におる筋トーヌス低下の評価

    第16回中国四国リハビリテーション医学研究会  2001 

     More details

  • ネットワークのリンクスケジューリングへのグラフ彩色アプローチ

    電子情報通信学会コンピュテーション研究会  2001 

     More details

  • 膝関節反射評価装置の改良 -評価値算出時間の評価-

    第24回日本ME学会中国四国支部大会  2001 

     More details

  • EDDコネクション受付制御方式における最悪リンク遅延の高速導出法 -コネクション設定要求の発生前における処理の高速化-

    電気・情報関連学会中国支部第52回連合大会  2001 

     More details

  • EDDコネクション受付制御方式における最悪リンク遅延の高速導出法

    電子情報通信学会ネットワークシステム研究会  2001 

     More details

  • ペンドラムテストによる痙縮の定量化 -測定系の改良-

    第40回日本エム・イー学会大会  2001 

     More details

  • ペンドラムテストにおける反射の評価 -評価手続き簡略化のための測定系の改良-

    第23回日本ME学会中国四国支部大会  2000 

     More details

  • シャッフル形ネットワークにおけるノード配置アルゴリズム -トラヒック分散を指向したアルゴリズム-

    電気・情報関連学会中国支部第51回連合大会  2000 

     More details

  • 描画時合成方式と表示時合成方式とを併用した高速マルチウィンドウシステム -ウィンドウ親子関係の実現に関する検討-

    電気・情報関連学会中国支部第51回連合大会  2000 

     More details

  • EDDコネクション設定制御方式における遅延余裕の一割当法 -最悪リンク遅延に比例した割当て-

    電子情報通信学会交換システム研究会  2000 

     More details

  • EDDコネクション設定制御方式における遅延余裕の一割当法

    2000年電子情報通信学会総合大会(通信2)  2000 

     More details

  • 膝関節反射評価装置の開発 -ペンドラムテストによる反射評価法の実用化に向けて-

    第15回中国四国リハビリテーション医学研究会  2000 

     More details

  • ペンドラムテスト用チェアーの開発

    第14回中国四国リハビリテーション医学研究会  1999 

     More details

  • ペンドラムテスト時の筋電発火と膝関節加速度波形 -α系亢進とγ系亢進による相違について-

    第22回日本ME学会中国四国支部大会  1999 

     More details

  • 描画時合成方式と表示時合成方式とを併用した高速マルチウィンドウシステム -ウィンドウ操作時間の評価-

    電気・情報関連学会中国支部第50回連合大会  1999 

     More details

  • EDDコネクション設定制御方式における最悪リンク遅延導出法の高速化

    電気・情報関連学会中国支部第50回連合大会  1999 

     More details

▼display all

Awards

  • 電子情報通信学会ネットワークシステム研究専門委員会活動功労賞

    2018  

     More details

    Country:Japan

    researchmap

  • IEICE ESS貢献賞 (電子情報通信学会 基礎境界ソサイエティ 貢献賞)

    2016  

     More details

    Country:Japan

    researchmap

  • 2014 IEEE Region 10 Technical Symposium (TENSYMP 2014) best paper award

    2014  

     More details

  • 第10回HISS記念論文賞受賞

    2008  

     More details

    Country:Japan

    researchmap

Research Projects

  • 分散型交換ネットワークの性能評価に関する研究

    Grant number:05750353  1993

    日本学術振興会  科学研究費助成事業  奨励研究(A)

    横平 徳美

      More details

    Grant amount:\900000 ( Direct expense: \900000 )

    本研究の目的は,分散型交換ネットワークを対象として,ネットワーク内での伝送遅延時間のみならず,エンドユーザで新規に発生したパケットがネットワーク内に送出されるまでの待ち時間をも含めた性能評価を行うための同ネットワークのモデル化手法および解析手法を確立し,最適な分散型交換ネットワークを明らかにすることにある.ここでは,このための基礎研究として,Manhattan Street Network(MS-Net)と呼ばれる分散型交換ネットワークを対象に,以下の研究を行った.
    1.MS-Netにおけるノードのモデルとして,従来のノードモデルに送信バッファを追加した新たなモデルを考え,エンドユーザで新規に発生したパケットは,一旦送信バッファに収容され,次ノードへの中継リンクが使用可能になったとき,ネットワーク内に送出されるとすることにより,エンドユーザで発生したパケットがネットワーク内に送出されるまでの待ち時間の評価を可能にした.
    2.MS-Netは,mxn(m,nは正整数)個のノードで構成されるが,ノード数を固定しても,その形態は一意に決まらず,mとnの値に応じて様々な形態を取り得る.ここでは,mとnの様々な組合せに対して,1.のノードモデルを用いてシミュレーションを行い,ノード数を固定した場合,エンドユーザ間での平均パケット伝送遅延の面からのMS-Netの最適な形態は,mとnの差が最も小さいときの形態であるということを明らかにした.
    以上のように,本研究では,エンドユーザーで発生したパッケトがネットワーク内に送出されるまでの待ち時間を得るためのノードモデルを考え,これを用いたシミュレーション結果により,MS-Netの最適な形態を明らかにした.

    researchmap

  • 高信頼性ネットワークの最適設計法に関する研究

    Grant number:03750291  1991

    日本学術振興会  科学研究費助成事業  奨励研究(A)

    横平 徳美

      More details

    Grant amount:\900000 ( Direct expense: \900000 )

    researchmap

 

Class subject in charge

  • Computer Networks B (2023academic year) Second semester  - 月3~4,木3~4

  • Computer Networks II (2023academic year) Second semester  - 月3~4,木3~4

  • Computer Networks B (2023academic year) Second semester  - 月3~4,木3~4

  • Introduction to Security (2023academic year) 3rd and 4th semester  - 月7~8

  • Introduction to Information Security (2023academic year) 3rd and 4th semester  - 月7~8

  • Data Structures and Algorithms (2023academic year) 1st semester  - 月1~2,木3~4

  • Data Structures and Algorithms (2023academic year) 1st semester  - 月1~2,木3~4

  • Network Architectures I (2023academic year) Prophase  - 水3~4

  • Network Architectures II (2023academic year) Prophase  - 水3~4

  • Network Performance Evaluation (2023academic year) Late  - その他

  • Construction and analyses of big data (2023academic year) Late  - 金1~2

  • Advanced Internship for Interdisciplinary Medical Sciences and Engineering (2023academic year) Year-round  - その他

  • Technical English for Interdisciplinary Medical Sciences and Engineering (2023academic year) Late  - その他

  • Research Works for Interdisciplinary Medical Sciences and Engineering (2023academic year) Year-round  - その他

  • Research Works for Interdisciplinary Medical Sciences and Engineering (2023academic year) Year-round  - その他

  • Multimedia Engineering (2023academic year) Summer concentration  - その他

  • Multimedia Engineering (2023academic year) Summer concentration  - その他

  • Distributed Date Management Training (2023academic year) Summer concentration  - その他

  • Introduction to Medical Devices and Materials (2023academic year) Prophase  - 水1~2

  • Seminar in Information Security (2023academic year) Year-round  - その他

  • Technical Writing and Presentation (2023academic year) Late  - その他

  • Debate Practice with Logical Thinking (2023academic year) Third semester  - 火5~6

  • Communication Protocols II (2023academic year) Second semester  - 月3~4,木3~4

  • Undergraduate Research Experience 2 (2023academic year) special  - その他

  • Computer Networks B (2022academic year) Second semester  - 月3~4,木3~4

  • Computer Networks II (2022academic year) Second semester  - 月3~4,木3~4

  • Introduction to Security (2022academic year) 3rd and 4th semester  - 水7~8

  • Data Structures and Algorithms (2022academic year) 1st semester  - 月1~2,木3~4

  • Data Structures and Algorithms (2022academic year) 1st semester  - 月1~2,木3~4

  • Network Architectures I (2022academic year) Prophase  - 水3~4

  • Network Architectures II (2022academic year) Prophase  - 水3~4

  • Network Performance Evaluation (2022academic year) Late  - その他

  • Construction and analyses of big data (2022academic year) Late  - 金1~2

  • Advanced Internship for Interdisciplinary Medical Sciences and Engineering (2022academic year) Year-round  - その他

  • Technical English for Interdisciplinary Medical Sciences and Engineering (2022academic year) Late  - その他

  • Technical English for Interdisciplinary Medical Sciences and Engineering (2022academic year) Late  - その他

  • Research Works for Interdisciplinary Medical Sciences and Engineering (2022academic year) Year-round  - その他

  • Research Works for Interdisciplinary Medical Sciences and Engineering (2022academic year) Year-round  - その他

  • Multimedia Engineering (2022academic year) Summer concentration  - その他

  • Distributed Date Management Training (2022academic year) Summer concentration  - その他

  • Introduction to Medical Devices and Materials (2022academic year) Prophase  - その他

  • Introduction to Medical Devices and Materials (2022academic year) Prophase  - 水1~2

  • Seminar in Information Security (2022academic year) Year-round  - その他

  • Technical Writing and Presentation (2022academic year) Late  - その他

  • Technical Writing and Presentation (2022academic year) Late  - その他

  • Communication Protocols II (2022academic year) Second semester  - 月3~4,木3~4

  • Computer Networks A (2021academic year) Fourth semester  - 月1,月2,木5,木6

  • Computer Networks B (2021academic year) Second semester  - 月3,月4,木3,木4

  • Computer Networks II (2021academic year) Second semester  - 月3,月4,木3,木4

  • Computer Networks I (2021academic year) Fourth semester  - 月1,月2,木5,木6

  • Introduction to Security (2021academic year) 3rd and 4th semester  - 水7,水8

  • Data Structures and Algorithms (2021academic year) Third semester  - 月1,月2,木5,木6

  • Network Architectures I (2021academic year) Prophase  - 水3~4

  • Network Architectures II (2021academic year) Prophase  - 水3~4

  • Network Performance Evaluation (2021academic year) Late  - その他

  • Construction and analyses of big data (2021academic year) Late  - 金1~2

  • Advanced Internship for Interdisciplinary Medical Sciences and Engineering (2021academic year) Year-round  - その他

  • Technical English for Interdisciplinary Medical Sciences and Engineering (2021academic year) Late  - その他

  • Technical English for Interdisciplinary Medical Sciences and Engineering (2021academic year) Late  - その他

  • Research Works for Interdisciplinary Medical Sciences and Engineering (2021academic year) Year-round  - その他

  • Research Works for Interdisciplinary Medical Sciences and Engineering (2021academic year) Year-round  - その他

  • Distributed Date Management Training (2021academic year) Summer concentration  - その他

  • Introduction to Medical Devices and Materials (2021academic year) Prophase  - その他

  • Introduction to Medical Devices and Materials (2021academic year) Prophase  - 水1~2

  • Seminar in Information Security (2021academic year) Year-round  - その他

  • Technical Writing and Presentation (2021academic year) Late  - その他

  • Technical Writing and Presentation (2021academic year) Late  - その他

  • Communication Protocols II (2021academic year) Second semester  - 月3,月4,木3,木4

  • Communication Protocols I (2021academic year) Fourth semester  - 月1,月2,木5,木6

  • Exercises on Cross-site Scripting Prevention (2020academic year) Summer concentration  - その他

  • Computer Networks A (2020academic year) Fourth semester  - 月1,月2,木5,木6

  • Computer Networks B (2020academic year) Second semester  - 月3,月4,木3,木4

  • Computer Networks II (2020academic year) Second semester  - 月3,月4,木3,木4

  • Computer Networks I (2020academic year) Fourth semester  - 月1,月2,木5,木6

  • Basic of information security E (2020academic year) 3rd and 4th semester  - 水7,水8

  • Data Structures and Algorithms (2020academic year) Third semester  - 月1,月2,木5,木6

  • Network Architectures I (2020academic year) Prophase  - 水3,水4

  • Network Architectures II (2020academic year) Prophase  - 水3,水4

  • Network Performance Evaluation (2020academic year) Late  - その他

  • Construction and analyses of big data (2020academic year) Late  - 金1,金2

  • Advanced Internship for Interdisciplinary Medical Sciences and Engineering (2020academic year) Year-round  - その他

  • Technical English for Interdisciplinary Medical Sciences and Engineering (2020academic year) Late  - その他

  • Research Works for Interdisciplinary Medical Sciences and Engineering (2020academic year) Year-round  - その他

  • Introduction to Medical Devices and Materials (2020academic year) Prophase  - 水1,水2

  • Collision-based Attack on Cryptography for Security Evaluation (2020academic year) Summer concentration  - その他

  • Technical Writing and Presentation (2020academic year) Late  - その他

  • Cryptographic Hardware Security (2020academic year) Fourth semester  - その他

  • Communication Protocols II (2020academic year) Second semester  - 月3,月4,木3,木4

  • Communication Protocols I (2020academic year) Fourth semester  - 月1,月2,木5,木6

▼display all