NAKAMURA Masahide | |
Center for Mathematical and Data Sciences | |
Professor | |
Engineering / Other Field |
Oct. 2021 Faculty of Engineering, Kobe University, Excellent Educator Award, コロナ禍におけるオンライン対応チーム
Oct. 2021 Kobe University, President's Award
Jun. 2021 第10回日本認知症予防学会学術集会, 浦上賞, 在宅高齢者・認知症当事者を対象とした困り事・対処法共有サービスの研究開発
Dec. 2019 電子情報通信学会, ヒューマンコミュニケーション賞 (HC賞), 在宅高齢者を対象とした「こころ」の見守りサービスの試作と予備的評価
Nov. 2018 International Conference on Signal Processing and Information Security (ICSPIS2018), Best Paper Award, Evaluating Feasibility of Image-Based Cognitive APIs for Home Context Sensing
International society
Jul. 2018 2018 IEEE/ACIS 3rd International Conference on Big Data, Cloud Computing, Data Science & Engineering, Best Paper Award, A Study of Practical Education Program on AI, Big Data, and Cloud Computing through Development of Automatic Ordering System
International society
Feb. 2018 World Data Viz Challenge 2017, ベストプレゼンテーション賞, Kobe Demographics API
International academic award
Oct. 2016 World Data Viz Challenge 2016, ベストプレゼンテーション賞, PRISM:Personalized Real-time Information with Security Map
International academic award
Mar. 2016 情報処理学会・SE研究会, 学生研究賞, ソフトウェア開発者の年齢がプログラム理解速度に及ぼす影響の分析
Japan society
Jan. 2015 電子情報通信学会・IA研究会, 学生研究奨励賞(林), すれちがいシステムのためのアプリケーションフレームワークの一提案
Japan society
Jan. 2015 電子情報通信学会・IA研究会, 学生研究奨励賞(井元), クラウド型HNSにおける家電リモコンサービスの実装
Japan society
Aug. 2014 マルチメディア,分散,協調とモバイル(DICOMO2014)シンポジウム, 野口賞(優秀デモンストレーション賞), クラウドと Web of Things を活用したサービス指向ホームネットワークシステム
Japan society
Nov. 2013 The 14th International Symposium on Advanced Intelligent Systems (ISIS2013), Best Session Paper Award, Using Materialized View as a Service of Scallop4SC for Smart City Application Services
International society
Nov. 2012 電子情報通信学会・LOIS研究会, 研究賞, Implementation and Evaluation of MashMap Framework for Visualizing Location-based Lifelog
Japan society
Nov. 2012 電子情報通信学会・LOIS研究会, 若手研究者賞, Implementing API of Large-scale House Log Data Platform in Smart City
Japan society
Aug. 2012 情報処理学会・MBL研究会, SIG-MBL2012 優秀発表賞受賞, スマートフォンを利用したピークカット促進 アプリケーションの提案と実装
Japan society
Jul. 2005 International Conference on Feature Interactions in Telecommunication Networks and Distributed Systems, ICFI'05, Best Paper Award, Feature Interactions in Integrated Services of Networked Home Appliances -An Object-Oriented Approach-
International society
Aug. 2004 International Conference on E-Business and Telecommunication Networks(ICETE'04), ICETE'04 Best Paper Award, Design and Evaluation of the Home Network Systems Using the Service Oriented Architecture
International society
International conference proceedings
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
International conference proceedings
International conference proceedings
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
To assist personalized healthcare of elderly people, our interest is to develop a virtual caregiver system that retrieves the expression of mental and physical health states through human–computer interaction in the form of dialogue. The purpose of this paper is to implement and evaluate a virtual caregiver system using mobile chatbot. Unlike the conventional health monitoring approach, our key idea is to integrate a rule-based virtual caregiver system (called “Mind Monitoring” service) with the physical, mental, and social questionnaires into the mobile chat application. The elderly person receives one question from the mobile chatbot per day, and answers it by pushing the optional button or using a speech recognition technique. Furthermore, a novel method is implemented to quantify the answers, generate visual graphs, and send the corresponding summaries or advice to the specific elder. In the experimental evaluation, we applied it to eight elderly subjects and 19 younger subjects within 14 months. As main results, its effects were significantly improved by the proposed method, including the above 80% in the response rate, the accurate reflection of their real lives from the responses, and high usefulness of the feedback messages with software quality requirements and evaluation. We also conducted interviews with subjects for health analysis and improvement.
MDPI AG, 18 May 2022, Sensors, 22 (10), 3829 - 3829, English[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
Rule-based systems, which are the typical technology used to realize context-aware services, have been independently implemented in various smart services. The challenges of these systems are the versatility of action, looseness, and the coding that is needed to describe the conditional branches. The purpose of this study was to support the realization of service coordination and smart services using context-aware technology by converting rule-based systems into services. In the proposed method, we designed and implemented the architecture of a new service: Unified Rule-Based Message Delivery Service (Uni-messe), which is an application-neutral rule management and evaluation service for rule-based systems. The core part of the Uni-messe proposal is the combination of a Pub/Sub and a rule-based system, and the proposal of a new event–condition–route (ECR) rule-based system. We applied Uni-messe to an audio information presentation system (ALPS) and indoor location sensing technology to construct concrete smart services, and then compared and evaluated the implementation to “if this then that” (IFTTT), which is a typical service coordination technology. Moreover, we analyzed the characteristics of other rule-based systems that have been serviced in previous studies and compared them to Uni-messe. This study shows that Uni-messe can provide services that simultaneously combine versatility, ease of conditional description, looseness, context independence, and user interface (UI), which cannot be achieved using conventional rule-based system services. By using Uni-messe, advanced heterogeneous distributed service coordination using rule-based systems and the construction of context-aware services can be performed easily.
MDPI AG, 25 Feb. 2022, Energies, 15 (5), 1729 - 1729, English[Refereed]
Scientific journal
Continuous data input is essential for lifelogging services, where users input their daily records. But whether the user can continuously input data depends mainly on the user's motivation. This article presents a new method of introducing gamification in line with the purpose of lifelogging. The authors introduce a comprehensive set of gamification features based on motivation subscales into a lifelogging service. Meanwhile, the authors elucidate which gamification features correspond to which motivation subscales are effective for lifelogging, including intrinsic motivation, introjected regulation, integrated regulation, identified regulation, and external regulation. As a case study, the authors introduce the five gamification features corresponding to each motivation subscale into work support service (WSS) designed to record and review work hours. The authors also compare and evaluate changes in user behavior before and after the introduction of the gamification features. In this way, user motivation for continuous input increases when gamification in the WSS is confirmed.
IGI Global, 01 Jan. 2022, International Journal of Software Innovation, 10 (1), 1 - 27Scientific journal
[Refereed]
In book
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
In PBL, it is often pointed out that it is difficult to qualitatively evaluate the improvement of students' fundamental competencies for working persons. In this study, we propose a method to evaluate students' growth and to improve classes through self-evaluation by students and objective evaluation by a third party as an approach to qualitative evaluation of PBL courses. In the proposed method, we aim to evaluate the validity of the subjective self-evaluation by the students before and after taking the PBL course, based on the objective evaluation. In this paper, we report on the evaluation results of the PBL course in 2017 and 2018 by the proposed method using the self-evaluation of fundamental competencies for working persons before and after taking the PBL course and the objective evaluation through PROG competency test.
Japan Society for Software Science and Technology, 22 Jan. 2021, コンピュータ ソフトウェア, 38 (1), 1_52 - 1_64, Japanese, Domestic magazineScientific journal
[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
© 2020 International Journal of Software Innovation. Social coding platforms (SCPs) have realized spontaneous software evolution, where new source code and ideas are spontaneously proposed by altruistic developers. Although there are many projects operated by active communities performing spontaneous evolution, it is yet unclear that how such successful projects and communities have been formed and governed. This article proposes a method that can investigate the history of every project in the SCP. Introducing the concept of project as a city, the authors consider every project in the SCP as a city, where a government and citizens develop a city through collaborative activities. This research then identifies essential attributes that characterize a state of a city. For each attribute, the authors develop metrics that quantify the state S(p; t) of a project p at time t. An experimental evaluation investigating GitHub projects of famous code editors shows that the proposed metrics well visualize the history of the projects from essential perspectives of a city.
Jul. 2020, International Journal of Software Evolution (IJSI), 8 (3), 35 - 40, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
AiBiC Kansai offers an education course, AiBiC Spiral, designed to develop abilities to solve individual social issues using Big Data, artificial intelligence, and Cloud technologies through teamwork. In this paper, we report on the problems of the environments for the education program and the discrepancies in the expectations on topics and contents found by the analysis of the questionnaire conducted in 2017, and describe the activities and results performed to improve the program in 2018. Through the improvements, we have found that the problem on the program environments has been dissolved. However, as for the discrepancies in the expectations, we have revealed that only some part of the problem was improved and there were still some students found the topics and contents provided by the program were different from their expectations.
Japan Society for Software Science and Technology, 2020, Computer Software, 37 (1), 1_19 - 1_30, Japanese[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
Cognitive API is API of emerging AI-based cloud services, which extracts various contextual information from non-numerical multimedia data including image and audio. Our interest is to apply image-based cognitive APIs to implement smart and affordable context sensing services in a smart home. However, since the existing APIs are trained for general-purpose image recognition, they may not be of practical use in specific configuration of smart homes. In this paper, we therefore propose a method that evaluates the feasibility of cognitive APIs for the home context sensing. In the proposed method, we exploit document similarity measures to see how well tags extracted from given images characterize the original contexts. Using the proposed method, we evaluate practical APIs of Microsoft Azure, IBM Watson, and Google Cloud for recognizing 11 different contexts in our smart home.
IEEE, Nov. 2018, International Conference on Signal Processing and Information Security (ICSPIS2018), 5 - 8, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
Our research group has been studying a speech communication system with a virtual agent (VA), to support person-centered care (PCC) of people with dementia (PWD). The current system uses an unfamiliar avatar for the VA, which causes a limitation in the care effects. In this paper, we develop a novel system that dynamically creates a VA based on a given facial image. The proposed system constructs a three-dimensional model based on facial landmarks within the image. It then stretches and transforms some portions of the 3D model to generate facial expressions. From just a given picture, the proposed system easily generates a communication agent familiar with individual PWD. Hence, it can implement (virtual, but effective) conversations with familiar partners.
Springer Verlag, 2018, Advances in Intelligent Systems and Computing, 722, 216 - 222, English[Refereed]
International conference proceedings
In the practice of scientific nursing care, it is essential to assess the quality and effect of nursing care services, since the caregivers must know whether or not the care was effective for the target person. Currently, however, the assessment relies on human subjective questionnaire and assessment sheets. Hence, it is difficult to justify the quality and effect as such the evidences encouraged in the scientific nursing care. To cope with the problem, this paper proposes Face Emotion Tracker (FET) that evaluates the effect of care as a transition of emotions of a person under care. The proposed system can produce real-time data quantifying emotions of the target person under care, which is more objective and fine-grained clinical data compared to the conventional manual assessment sheets. We then propose a metric that quantifies the quality of care.
Springer Verlag, 2018, Advances in Intelligent Systems and Computing, 722, 267 - 273, English[Refereed]
International conference proceedings
Our research group has been studying person-centered care (PCC) support systems for home elderly care, using contextual information of individual users (called user context). Since the current systems individually manage the user context, reusing the contexts across multiple systems is quite different. In this paper, we propose a new service that uniformly manages the user context, and allows external applications to retrieve necessary user contexts efficiently. More specifically, the proposed service gathers heterogeneous data from different systems, and standardizes the data with a common database with general attributes of when, who, whom, where, what, how, and why. Using a practical use case, we show how the proposed service efficiently manages user contexts.
Springer Verlag, 2018, Advances in Intelligent Systems and Computing, 722, 112 - 118, English[Refereed]
International conference proceedings
Recently, many studies about Activities of Daily Living (ADLs) recognition have been conducted, which can be applied to many real-life, human-centric problems such as eldercare and healthcare. In our previous work, we proposed an ADLs recognition system based on non-intrusive environment sensing for people in One-person Household (OPH). However, the proposed recognition system did not perform well, the micro-averaged and macro-averaged precision of most of the recognition models was only around 60%. In order to improve the quality of the system, in this article, we propose a new ADLs recognition system by integrating environment sensing and Bluetooth Low Energy (BLE) beacon technology and evaluate the new version of the ADLs recognition model by comparing the experimental data collected from a real resident in OPH.
Association for Computing Machinery, 04 Dec. 2017, ACM International Conference Proceeding Series, 330 - 337, English[Refereed]
International conference proceedings
In our previous research, we proposed a security information service, called PRISM, which personalizes the incident information based on living area of individual users. PRISM computes the severity of a given incidents based on distance, time, and type. It then visualizes the incident with the severity on a heat map. In this paper, we extend the functionality of PRISM, in order to analyze street crimes around living area in more details. More specifically, we add three new features to PRISM: showing a past heat map, showing a heat map focused on specified type of incidents, and showing statistics of incidents for every type. Using the extended features, we visualize the dynamic transition of street crimes in a specific area and the whole region. The visualization also reveals the ecology of wild boars. Finally, we also show that PRISM can be used to compare different districts by statistics of street crimes.
Association for Computing Machinery, 04 Dec. 2017, ACM International Conference Proceeding Series, 208 - 214, English[Refereed]
International conference proceedings
Location information is expressed by various formats that depend on services. Location information is divided into two categories: absolute location information (such as latitude/longitude and address), and relative location information (such as distance and direction). Each service that utilizes location information defines location information system individually. Therefore, sharing location informations between the services is difficult. Consequently, reusability of location information decreases. Then, we consider new common location information system, which can beconverted from location information of various systems and expresses location more flexible. In this study, we propose probabilistic location information, which expressed as a combination of area and existence probability. Moreover, we propose the algorithm which calculates probabilistic location information based on geographic coordinate information and pass-by information (PLPA-GP).
Association for Computing Machinery, 04 Dec. 2017, ACM International Conference Proceeding Series, 131 - 135, English[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
Local governments in Japan recently provide security information services for residents, which deliver regional incident information using Email or Web. However, since the conventional services usually provide 'one-for-all' information. users tend to miss important incidents within the flood of information. In this paper, we propose a new security information service, called PRISM (Personalized Real-time Information with Security Map). For given incident information and user's living area, PRISM first computes severity of the incident, based on distance, time, and type of the incident. It then visualizes the incidents with the severity on a heat map. Thus, PRISM provides real-time personalized information adapted to individual situation of users. To illustlate the feasibility, we implement PRISM as a Web application using Hyogo Bouhan Net, and Kobe city facility open data.
Institute of Electrical and Electronics Engineers Inc., 29 Aug. 2017, Proceedings - 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2017, (CFP1779A-USB), 465 - 470, English[Refereed]
International conference proceedings
Pervasive sensing technologies are promising for increasing one-person households (OPH), where the sensors monitor and assist the resident to maintain healthy life rhythm. Towards the practical use, the recognition of activities of daily living (ADL) is an important step. Many studies of the ADL recognition have been conducted so far, for real-life and human-centric applications such as eldercare and healthcare. However, most existing methods have limitations in deployment cost, privacy exposure, and inconvenience for residents. To cope with the limitations, this paper presents a new indoor ADL recognition system especially for OPH. To minimize the deployment cost as well as the intrusions to user and house, we exploit an IoT-based environment-sensing device, called Autonomous Sensor Box (SensorBox) which can autonomously measure 7 kinds of environment attributes. We apply machine-learning techniques to the collected data, and predicts 7 kinds of ADLs. We conduct an experiment within an actual apartment of a single user. The result shows that the proposed system achieves the average accuracy of ADL recognition with more than 88%, by carefully developing the features of environment attributes.
Institute of Electrical and Electronics Engineers Inc., 29 Aug. 2017, Proceedings - 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2017, (CFP1779A-USB), 477 - 482, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
Remote monitoring service for elderly people is an effective method to support elderly people with safe. In this paper, we tackle to reveal the relationships between quality of elderly monitoring service and sensor reliability in remote monitoring service. To achieve the above goal, we propose four step methods, generalization by three-actor model, designing the algorithms of the three-actor and simulation of RMS. Moreover, we construct the elderly model based on the statistics report. Our most important contribution shows that the guideline, which shows the references between sensor accuracy and reliability of RMS. This guideline will provide benefit for RMS service provider and end-user.
TAYLOR & FRANCIS INC, Mar. 2017, INTELLIGENT AUTOMATION AND SOFT COMPUTING, 23 (1), 153 - 159, English[Refereed]
Scientific journal
The dementia counseling is a dementia care that cures physiologically unstable situation of a person with dementia, through receptive and attentive conversations. A person with dementia should receive the counseling as often as possible. However, it is difficult for a limited number of caregivers to spare sufficient time and effort. This motivated us to exploit the virtual agent technology we are developing, for implementing daily dementia counseling system at home. However, our previous system relies on static dialogue scripts. Therefore, it is difficult to realize personcentered conversations that are essential to the dementia counseling. In this paper, we propose a method that dynamically generates personalized dialogues for individual people with dementia. The proposed method extensively uses life history and linked open data (LOD). More specifically, we obtain the life history of a user based on The Center Method, then the system choose appropriate conversation considering the history. During the conversation, the system finds new information in LOD relevant to the response and uses it to develop further conversation. We also implement a prototype to show practical feasibility of the proposed method.
Springer Verlag, 2017, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10287, 161 - 172, English[Refereed]
International conference proceedings
In the emerging super smart society, the flood of large-scale and heterogeneous information makes the digital divide in information reception a more serious problem. In this paper, we present a service, called Tales of Familiar (ToF), which autonomously delivers personalized information to individual end users in the super smart society. In ToF, every user is associated with a familiar, which is an agent working as an exclusive partner of the user. ToF first generates tales, which are narratives delivered by the familiar, from various information sources, such as direct messages, Web information, sensors, and SNS. The generated tales are sifted for individual users based on personal preferences of the users. Finally, the familiar delivers the selected tales using voice, text or images in an appropriate timing. In this paper, we particularly study the concept, the overall architecture, and data schema of ToF.
Springer Verlag, 2017, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10286 (LNCS 10286), 336 - 347, English[Refereed]
International conference proceedings
The ICT-based elderly monitoring systems attract great attention as a promising technology for home elderly care. However, the conventional systems have limitations of deployment cost and invasiveness, the effort of activity labeling, and a lack of communication. To cope with the limitations, we propose a system that captures activities of daily living (ADL) of the elderly, based on speech dialogue triggered by environment changes. Specifically, we deploy Autonomous Sensor Boxes, developed in our previous study, within a house of the elderly. The boxes gather and send house environmental data to the cloud. Then, the Change Finder algorithm is applied to the time-series data, to detect changes in the house online. On detecting a change, the Virtual Agent (VA) in the house asks the elderly what he/she is doing now. The elderly speaks to the VA, by which an ADL is recorded in the system. The proposed system can capture ADL with non-invasive sensing and create an opportunity for communication.
Springer Verlag, 2017, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10287 (LNCS 10287), 183 - 194, English[Refereed]
International conference proceedings
Purpose: The purpose of this paper is to perform large-scale environmental sensing with a lot of Internet of Things (IoT) devices, as typically seen in a Smart City, efficiently and for multiple applications. In this paper, we propose a novel sensing method, called mission-oriented sensing, which accepts multiple and dynamic sensing purposes on a single infrastructure. Design/methodology/approach: The proposed method achieves the purpose by dealing sensing configuration (application’s purpose) as a mission. It realizes sharing single infrastructure by accepting multiple missions in parallel, and it accepts missions’ update anytime. In addition, the sensing platform based on military analogy can command and control a lot of IoT devices in good order, and this realizes mission-oriented sensing above. Findings: Introducing mission-oriented sensing, multiple purpose large-scale sensing can be conducted efficiently. The experimental evaluation with a prototype platform shows the practical feasibility. In addition, the result shows that it is effective to update sensing configuration dynamically. Research limitations/implications: The proposed method focuses aggregating environmental sensor value from a lot of devices, and, thus, it can treat stream data, such as video or audio or control a specific device directly. Originality/value: In proposed method, a single-sensing infrastructure can be used by multiple applications, and it admits heterogeneous devices in a single infrastructure. In addition, the proposed method has less technical restriction and developers can implement actual platform with technologies for context.
Emerald Group Publishing Ltd., 2017, International Journal of Pervasive Computing and Communications, 13 (1), 76 - 91, English[Refereed]
Scientific journal
As typically seen in Smart City, emerging technologies en-able large-scale environment sensing using IoT devices de-ployed in a wide area. From the viewpoint of cost and ef-ficiency, infrastructure of the large-scale environment sens-ing should be shared by multiple applications, with dynam-ically adapting the sensing behavior for difierent purposes. To achieve this, the infrastructure must implement a clever method that can command and control a lot of IoT devices in good order. To implement such multi-purpose large-scale environment sensing, we introduce an analogy of military system. Specifically, we propose a mission-oriented sensing with army hierarchy, where individual IoT devices and their dynamic purposes are regarded as soldiers and missions, re-spectively.
Association for Computing Machinery, 28 Nov. 2016, ACM International Conference Proceeding Series, 414 - 421, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
A Diagnosis explains why a program fails. Making a correct diagnosis is necessary for debugging a practical program, but it requires many efforts to comprehend the program. Supporting program comprehension for making a diagnosis is thus very important Maintainers usually try to comprehend their programs by interacting with debugging tools that permit access to runtime information. These tools should be evaluated based on how they help maintainers' comprehension during the interactions with them. However, most tools are evaluated based only on the final results of maintenance tasks. We are currently developing a method to evaluate the contribution of a supporting tool to a maintainer's internal comprehension process based on the relevance to finding the chain of infection. The relevance is calculated using the trace analysis technology we have developed. In this paper we explain the overview of our evaluation method, and shows its validation by an exploratory experiment. I.
IEEE COMPUTER SOC, 2016, 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 909 - 914, English[Refereed]
International conference proceedings
Supporting deaf and hard of hearing (D/HH) people to understand natural conversation is one of the important activities of social welfare. In our previous paper, we have proposed a multi-modal speech visualization application, which is MIETA in this paper. While the paper proposed the concept of multi-modal speech visualization and its architecture, there is no evaluation about how actually useful MIETA is. In this paper, we conduct a control experiment with actual 9 D/HH people to compare understanding Japanese conversation in three conditions: with MIETA, with sign language interpretation, and with neither tool nor support. Then we conduct questionnaire survey about how they feel through using MIETA. As a result, MIETA highly contributed to understanding and received positive feedbacks from all of subjects.
IEEE, 2016, 2016 4TH INTL CONF ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY/3RD INTL CONF ON COMPUTATIONAL SCIENCE/INTELLIGENCE AND APPLIED INFORMATICS/1ST INTL CONF ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (ACIT-CSII-BCD), 202 - 207, English[Refereed]
International conference proceedings
To fix various dependencies of application development using pass-by detection by a mobile device, we propose Pass-by Framework that handles data with standardization. In this study, we evaluate effects of performance of pass-by detection by differences in methods of implementation the sonar of Pass-by Framework. Therefore, we develop pass by application using Bluetooth Low Energy as a first effort. We then conduct evaluation experiments for confirmation of change pass-by detection behavior depends on the difference of parameters.
IEEE COMPUTER SOC, 2016, 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 891 - 896, English[Refereed]
International conference proceedings
To realize indoor environmental sensing, which is a key technology of providing smart services in smart city, with low cost, our research group has proposed a small IoT device named sensor box. In the previous sensor box, however, it is difficult to deploy for the smart city with some problems. In this paper, we propose an indoor environment sensing service using autonomous sensor box to adapt the previous sensor box for the smart city. To confirm the effectiveness of proposed service, we deploy autonomous sensor boxes on practical indoor environments.
IEEE COMPUTER SOC, 2016, 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 885 - 890, English[Refereed]
International conference proceedings
A number of reminder systems have been developed to help elderly people with dementia. However, the existing reminder systems lack the awareness of human context, the sympathetic human-machine interaction, and the flexibility of personal adaptation. To cope with the limitations, we are currently studying a new reminder service for people with dementia. Specifically, we exploit a BLE-based indoor positioning system to capture the current location and context of the patient. We then use a virtual agent system for rich interactions. Finally, we develop a schedule management system for personalized reminders. To integrate these heterogeneous systems, we re-design and deploy the systems as three services with Web-API: Location Service, Agent Service, and Schedule Service. These services are loosely integrated by Coordinator Service, based on the service-oriented architecture, In this paper, we first present the system architecture, and then discuss the key idea to implement the services. We also demonstrate "reminder at the entrance" as a practical scenario of the proposed services. In order to evaluate the Agent Service, which is a key component of proposed service, we have conducted the a preliminary experiment with 17 people with dementia.
IEEE, 2016, 2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2946 - 2953, English[Refereed]
International conference proceedings
This paper discusses about file size optimization of text-based Web resources with the aim of network traffic reduction. From the perspective of network traffic reduction, wasteful representations written in text-based resources (e.g., indent, line break and comment) should be eliminated by applying any optimization techniques before the deployment. However, there are no common-sense of size optimization for text based resources compared to multimedia resources. Our long-term goal of this research is to create or develop a literacy of size optimization for text-based resources on the Web. In this paper, we organize some existing size optimization techniques with these advantages and disadvantages. Next we conduct an experiment to show the effect of two optimization techniques using three famous JavaScript libraries. Finally, we discuss requirements and measures of server-side size optimization plugin that keeps both continuous of development and code openness of the Web.
IEEE, 2016, PROCEEDINGS 7TH INTERNATIONAL WORKSHOP ON EMPIRICAL SOFTWARE ENGINEERING IN PRACTICE (IWESEP 2016), 36 - 40, English[Refereed]
International conference proceedings
In recently years, many care robots have received a lot of attention to help elderly people. However existing care robots have difficult to adopt personalization. For instance, some programmers have to customize robot program to meet needs of each elderly. Even if a care robot which has a feature of machine learning, it takes a long time to learn a preference for each elderly. In this paper, our goal is to deploy a smart care service integration agent that provides a personalization and integration for each elderly people. Our proposed service consists of three essential components, Virtual Care Giver (VCG), Virtual Care Personalizer (VCP) and Care Template. VCG is a robot agent, where executes care tasks in each home. The VCG is offered care tasks based on care template which Virtual Care Personalizer (VCP) generates. Virtual Care Personalizer (VCP) manages and generates personalization of care tasks the on cloud. Moreover, we deploy Care Template on the cloud which enables to provide the basic care tasks. To demonstrate the feasibility, we consider three kinds of usecase scenarios for two persona people.
IEEE COMPUTER SOC, 2016, 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 897 - 902, English[Refereed]
International conference proceedings
Anomaly detection is a crucial issue for people with dementia and their families to live a safe and comfortable life at home. The elderly monitoring system is a promising solution. However, the conventional systems have limitations in detectable anomalies and support actions, which cannot fully cover individual needs. To achieve more person-centered home care for people with dementia, our research group has been studying environmental sensing with IoT. In this paper, using the environmental sensing, we propose a new service that allows individual users to customize definition of anomaly and corresponding actions. Specifically, borrowing a mechanism of context-aware services, we regard every anomaly observed within the house as a context. We then define every care as an action bound to an anomaly context. This achieves the personalized anomaly detection and care. To demonstrate the feasibility, we implement a prototype system and conduct a practical case study.
SPRINGER INT PUBLISHING AG, 2016, Digital Human Modeling: Applications in Health, Safety, Ergonomics and Risk Management, 9745, 274 - 285, English[Refereed]
International conference proceedings
In recent years, a number of reminder systems have been developed to help elderly people with dementia. However, the existing reminder systems lack the sympathetic human-machine interaction. In this paper, we propose a new reminder service which aims to assist elderly people with dementia using Human Computer Interaction technology. Proposed agent service consists of four components called CareModule, Virtual Agent user interface (VA), ControllService and Memory Aid Client (MAClient). VA is a promising technology for people with dementia since it can assist a patient based on less-mechanical and (simulated) human-to-human conversation. CareModule is consists of functions that provides the generating the user interface and operation for the VA. The ControllService manages the state of transition and that enables to provide the loosely coupled component among the agent services. Memory-Aid Client (MAClient) visualizes reminder information in a screen, and which provides graphical user interface (e.g.,button, list, etc.) to collect responses from a user. In order to evaluate the feasibility and usability of the proposed agent service, we also conduct the experiment evaluation with actual subjects. Based on the experiment evaluation, we also show the validity of proposed agent service.
SPRINGER INT PUBLISHING AG, 2016, Digital Human Modeling: Applications in Health, Safety, Ergonomics and Risk Management, 9745, 357 - 368, English[Refereed]
International conference proceedings
In a ubiquitous network, a variety of things such as environmental sensor, home appliance and mobile phone are connected to an information network, which can be regarded as a service resource. Combined via network, these service resources can provide value-added ubiquitous services anywhere at anytime. In a future ubiquitous network, it is expected to achieve an adaptive service platform, which can dynamically integrate various service resources to provide adaptive and context-aware services. This paper presents a new service registry platform named UBI-REGI, which is used to support efficient and dynamic discovery of service resources in a ubiquitous network. To define the scope of operation within the real world and IT world, UBI-REGI divides every service operation into three categories: source service, transformation service and sink service. Furthermore, UBI-REGI specifies meta-data like physical location or device owner to manage physical devices, in addition to the conventional meta-data like service name, purpose and description. In order to enable UBI-REGI to be easily used by external program, this paper designs and implements UBI-REGI API by using Web service technologies. With this API, external applications can find service resources by queries of service category, location, purpose keywords, and so on. As a case study, this paper demonstrates an environment continue service in a home network system to prove the feasibility of this proposal.
Science and Engineering Research Support Society, 2016, International Journal of Smart Home, 10 (9), 275 - 286, English[Refereed]
Scientific journal
Purpose–The purpose of this paper is to establish an application platform that addresses expensive development cost and effort of indoor location-aware application (InL-Apps) problems caused by tightly coupling between InL-App and indoor positioning systems (IPSs). Design/methodology/approach–To achieve this purpose, in this paper, the authors proposes a Web-based integration framework called Web-based Integration Framework for Indoor Location (WIF4InL). With a common data model, WIF4InL integrates indoor location data obtained from heterogeneous IPS. It then provides application-neutral application programming interface (API) for various InL-Apps. Findings–The authors integrate two different IPS (RedPin and BluePin) using WIF4InL and conduct a comparative study which is based on sufficiency of essential capabilities of location-dependent queries among three systems: RedPin, BluePin and WIF4InL. WIF4InL supports more capabilities for the location-dependent queries. Through the data and operation integration, WIF4InL even enriches the existing proprietary IPS. Originality/value–As WIF4InL allows the loose coupling between IPS and InL-Apps, it significantly improves reusability of indoor location information and operation.
Emerald Group Publishing Ltd., 2016, International Journal of Pervasive Computing and Communications, 12 (1), 49 - 65, English[Refereed]
Scientific journal
Purpose – The purpose of this paper is to develop a facade for seamlessly using locating services and enabling easy development of an application with indoor and outdoor location information without being aware of the difference of individual services. To achieve this purpose, in this paper, a unified locating service, called KULOCS (Kobe-University Unified LOCating Service), which horizontally integrates the heterogeneous locating services, is proposed. Design/methodology/approach–By focusing on technology-independent elements [when], [where] and [who] in location queries, KULOCS integrates data and operations of the existing locating services. In the data integration, a method where the time representation, the locations and the namespace are consolidated by the Unix time, the location labels and the alias table, respectively, is proposed. Based on the possible combinations of the three elements, an application-neutral application programming interface (API) for the operation integration is derived. Findings–Using KULOCS, various practical services are enabled. In addition, the experimental evaluation shows the practical feasibility by comparing cases with or without KULOCS. The result shows that KULOCS reduces the effort of application development, especially when the number of locating services becomes large. Originality/value–KULOCS works as a seamless facade with the underlying locating services, the users and applications consume location information easily and efficiently, without knowing concrete services actually locating target objects.
Emerald Group Publishing Ltd., 2016, International Journal of Pervasive Computing and Communications, 12 (1), 154 - 172, English[Refereed]
Scientific journal
This paper presents a unified locating service, KULOCS, which horizontally integrates the existing heterogeneous locating services. Focusing on technology-independent elements [when], [where] and [who] in querying locations of objects, KULOCS integrates data and operations of the existing services. In the data integration, we propose a method where the time representation, the locations, the namespace of user are consolidated by Unix time, the location labels and the alias table, respectively. We then propose KULOCS-API that integrates operations by all possible combinations of [when], [where] and [who]. Since KULOCS works as a seamless fa, cade to the underlying locating services, clients can consume location information easily and efficiently, without knowing concrete services actually locating target objects. Also, we examine feasibility of two practical value-added services with KULOCS.
SPRINGER INT PUBLISHING AG, 2016, INTERNET OF THINGS: IOT INFRASTRUCTURES, IOT 360, PT II, 170, 44 - 52, English[Refereed]
International conference proceedings
The emerging indoor positioning systems (IPS) enable indoor location-aware applications (InL-App) within indoor space where GPS cannot reach. In most conventional systems, however, IPS and InL-App are tightly coupled, where one system cannot reuse location data or operation of other systems. This fact yields expensive development cost and effort of InL-App. To cope with the problem, this paper propose a cloud-based integration framework, called CIF4InL. With a common data model, CIF4InL integrates indoor location data obtained from heterogeneous IPS. It then provides application-neutral API for various InL-Apps. To evaluate the practical feasibility, we integrate two different IPS (RedPin and BluePin) using CIF4InL, where the applications transparently access the indoor locations gathered by two different IPS. Since CIF4InL allows the loose coupling between IPS and InL-Apps, it significantly improves reusability of indoor location information and operation.
Association for Computing Machinery, Inc, 11 Dec. 2015, 17th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2015 - Proceedings, 548 - 557, English[Refereed]
International conference proceedings
This paper proposes a unified locating service, KULOCS, which horizontally integrates the heterogeneous locating services. Focusing on technology-independent elements [when], [where] and [who] in location queries, KULOCS integrates data and operations of the existing locating services. In the data integration, we propose a method where the time representation, the locations, the namespace are consolidated by Unix time, the location labels and the alias table, respectively. Based on possible combinations of the three elements, we then derive API for the operation integration. In this paper, we also implement KULOCS as a Java Web service and integrate two locating services: GPS-based outdoor locating service and BLE-based indoor locating service. On top of the implementation, we develop application services: Umbrella Reminder Service and Stay Areas Visualization Service. Experimental evaluation shows the practical feasibility by comparing cases with or without KULOCS. Since KULOCS works as a seamless fącade to the underlying locating services, the users and applications consume location information easily and efficiently, without knowing concrete services actually locating target objects.
Association for Computing Machinery, Inc, 11 Dec. 2015, 17th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2015 - Proceedings, 430 - 439, English[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
逆回し (back-in-time) デバッガはプログラムのトレース (実行履歴) を記録して過去の状態の参照を可能する機能を有しており,デバッグに於ける診断のあり方を根本から変える可能性を秘めている.しかしながらその機能を有効に活用するためには,作業者が膨大なトレースの中から適切な実行時点を指定し,その状態の正不正を判定しなければならない.こうした指定や判定は作業者自身のプログラム理解に大きく依存している.オブジェクト指向プログラミングはプログラムの再利用性や拡張性が向上させる反面,コードの理解を困難にする傾向が指摘されている.我々はこうしたオブジェクト指向プログラムに固有な問題を解決するために,外挿診断法 (diagnosis by extrapolation) という手法を提案し,それを実現する逆回しデバッガを開発中である.本手法は指定された時点の実行文脈を,作業者の既知の情報を用いて抽象化する事によって,問題解決を実現する点に最大の特徴を有している.本論文では実用的なプログラムのデバッグ事例を通じて逆回しデバッガが実装すべき機能と手法の有効性の評価方法を考察する.
一般社団法人情報処理学会, Mar. 2015, 情報処理学会研究報告, 205-SE-187 (37), 1 - 8, JapaneseSymposium
[Refereed]
Scientific journal
Home Network System (HNS) is comprised of networked home appliances and sensors to provide value-added and more powerful services. In order to build high-level HNS service by integrating multiple appliances and sensors, our earlier study proposes a method to derive timing constraints context based on Sensor Service Framework (SSF, which deploys sensor devices as web services to achieve easy development of context-aware application). That method divides timing constraints into two types: the sequential timing constraint and the continuous timing constraint. A high-level context can be defined as conditions expression based on the above two types. Moreover, we present a timer service to implement timing constraints context within SSF, and demonstrate how a high-level context with timing constraint is registered and detected in a real home network system. However, to create high-level context with timing constraints, the developer needs to know the details about pre-existing context of HNS, and also needs the ability to analyze and implement complex logic to detect a high-level timing constraints context. This limitation impedes the efficient creation of high-level context in HNS. Therefore, we propose a method to collectively manage the information of a pre-existing context of HNS in this paper, by which the developer can create high-level timing constraints context more easily than before. As a case study, we implement Enter-Leave context and TV Left On context, and execute an evaluation to prove the effectiveness of this proposal.
Science and Engineering Research Support Society, 2015, International Journal of Smart Home, 9 (12), 233 - 244, English[Refereed]
Scientific journal
The convergence of cloud/service computing and M2M/IoT systems provides real-world sensing and actuation as globally distributed Web services. Context-aware services using such Web services (we call them Web Context-Aware Services, Web-CAS) are promising in many systems. However, definition of contexts and Web services to be used highly depend on individual environments and preferences. Therefore, it is essential to have a place for self-management, where individual users can efficiently manage their own Web-CAS by themselves. In this paper, we develop a service platform, called RuCAS platform, which works as PaaS for self-managing Web-CAS. In the platform, contexts and actions are defined by adapting the distributed Web services, and every Web-CAS is managed in form of an ECA (Event-Condition-Action) rule. Through Web-API of RuCAS, individual clients can rapidly create, update, delete and execute custom contexts and services. To support non-expert users, we implement a GUI front-end of the RuCAS platform, called RuCAS. me. A case study of sustainable air-conditioning demonstrates practical feasibility. Finally, we discuss how the RuCAS platform works to achieve self-managing ecosystem of Web-CAS.
SPRINGER INT PUBLISHING AG, 2015, SERVICE-ORIENTED COMPUTING - ICSOC 2014 WORKSHOPS, 8954, 270 - 280, English[Refereed]
International conference proceedings
Supporting deaf and hard of hearing (D/HH) people to understand natural conversation is one of the important activities of social welfare. However, currently the communication support for D/HH people is not enough in Japan. Although existing communication methods, such as sign language and lip-reading, are effective in one-to-one conversation, they have several disadvantages in one-to-many conversation such as meetings or conventions. In order to support D/HH people in understanding conversation, this paper proposes a multi-modal visualization application which provides many aspects of information about speech contents. Concrete examples of visualization modes include displaying subtitles by voice recognition and showing speaker's mouth to assist lip-reading.
IEEE, 2015, 2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), English[Refereed]
International conference proceedings
Developing applications with pass-by communication is usually complex and expensive, since the applications heavily depend on the hardware to detect rendezvous (i.e., proximity) of mobile entities. In order to reduce the complexity and cost of the application development, we propose a device-independent formalization of the pass-by rendezvous of mobile entities in this paper. Specifically, we first define a pass-by rendezvous as a phenomenon, where two mobile entities are closed enough at a certain time. We then derive four properties from the definition to be satisfied within any pass-by systems. The properties allow indirect pass-by rendezvous between mobile entities with different devices. Finally, we apply the proposed method to two different practical systems (Bluetooth Low Energy and GPS). In the case study, we see how the pass-by rendezvous can be implemented in each system, and see how the indirect rendezvous across the two systems can be inferred using the proposed properties.
IEEE, 2015, 2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), English[Refereed]
International conference proceedings
Home Network System (HNS) is a system which provides value-added services by orchestrating household appliances and sensors. In previous work, we have proposed Cloud HNS, which is a new type of HNS based on the concept of Cloud. In this research, we propose IRaaS (Infrared as a Service) that realizes networking control of household appliances controlled by infrared signal, as a Cloud HNS's appliance control service. IRaaS consists of two components, IR Proxy and jRemocon. IR Proxy mediates appliance control on Cloud, and jRemocon transmits an infrared signal in a home. With these components, IRaaS can provide appliance control functions as a service on Cloud. Then, we design and consider elements required for implementing IRaaS, and we also create and test a prototype. Based on these results, we confirm the sufficiency of functions of IRaaS.
IEEE, 2015, 2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), English[Refereed]
International conference proceedings
This paper develops ReceiptLogService Platform, which enables consumers to using their personal purchase receipts, store their receipt logs, and to use the data for various consumer services. The proposed platform consists of three components: receipt scanner, ReceiptLog DB, and ReceiptLog API. The receipt scanner digitizes daily receipts, and the ReceiptLog DB manages the scanned data. The ReceiptLog API provides the receipt log as a service. The API consists of the BasicAPI, which provides fundamental access for the receipt log, whereas the MiningAPI performs a statistical analysis of the receipt log. These APIs are published as Web services, and can used by multiple applications and services for various purposes. We also conduct an experimental evaluation with actual subjects, to confirm the usefulness of services with receipt log.
Fuji Technology Press, 2015, Journal of Advanced Computational Intelligence and Intelligent Informatics, 19 (6), 785 - 795, English[Refereed]
Scientific journal
The recent ubiquitous/pervasive technologies allow general household appliances to be connected within the network at home which is named home network system (HNS, for short). The great advantage of HNS is that it provides more value-added and powerful services by integrating multiple appliances and various sensors. Especially, sensor applications in HNS become much more important technology to build a high-level HNS service. In our earlier study, we have proposed the sensor service framework (SSF, for short) in the home network system for developing context-aware service, which wraps various sensor devices by web services to achieve easy development of context-aware service. In the SSF, a context was defined by a condition over a single sensor, or multiple sensors that derived by logical or arithmetic operations. However, the contexts were limited to the ones that can be defined by current values of the sensors, and can not describe the timing constraint relation in context on using multiple sensor web servers such as "after opening the door for 2 seconds, passed the hall" or "setting on the sofa", and hindered us from creating high-level timing constraints context. In this paper, we propose a method for deriving the timing constraints context bases on the extended study of SSF. We first divide timing constraint in the context into two types: the sequential timing constraint and the continuous timing constraint. By using two types of timing constraint, the high-level context can be defined as conditions by using multiple sensors. After this, we also present a timer service to implement the timing constraints context within the SSF. We finally demonstrate how the high-level contexts with the timing constraints are registered and detected in a real home network system.
Science and Engineering Research Support Society, 2015, International Journal of Smart Home, 9 (8), 151 - 162, English[Refereed]
Scientific journal
Although various smart city projects are launched in all over the world, it is not obvious how to tailor the existing IoT and self-aware technologies for individual services, systematically. One of the reason is due to the lack of common view that can be used to investigate various smart city services across different domains. This paper proposes a domain-neutral execution model and an integrated life-cycle model of smart city services. We first identify essential activities for smart city services based on the city-as-a-state-machine concept. We then adopt goal-oriented thinking which clearly decomposes a goal and a means for each of the essential activities. By doing so, the proposed models can grasp essentials of any smart city service with domain-neutral activities and life cycles, while domain-specific parts can be varied by the means. Using the proposed models, we conduct a case study with smart car parking, where the proposed method compares the four different parking services. Finally, we develop ideas where and how the IoT and self-aware technologies can be applied effectively.
IEEE, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, 289 - 294, English[Refereed]
International conference proceedings
To achieve efficient presence sensing within home network system (HNS), an inexpensive and elastic system that can be shared by various HNS applications is required. This paper presents Presence Sensor Service Framework, which can uniformly manage presence information in various places using various types of sensors. The framework consists of Presence Sensor Device (PSD), Presence Sensor Terminal (PST) and Presence Sensor Aggregator (PSA). A PST monitors PSDs to detect any changes of presence, and notifies a PSA of the changes. Upon the notifications from PSTs, the PSA estimates human presence around each PSD. The estimation process is deployed as Presence Sensor Service (PSS), which is used by various HNS applications. The proposed framework can dynamically add or change sensing places within a HNS by adding PST and PSD as needed. It can also integrate presences in multiple HNSs by deploying PSA on an external cloud. In this paper, we implement a prototype of the proposed framework by using Phidgets sensors and Java Web service. Moreover, we develop a presence visualization application to conduct a preliminary evaluation.
IEEE, 2015, 2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), 109 - 114, English[Refereed]
International conference proceedings
Code-on-demand is an architectural style that a client dynamically downloads a raw script file and executes it on the client-side. This style causes a problem of network traffic because a raw script is not always compiled or minified in advance. Formatting rules, such as indents, line breaks and comments for ensuring human readability, are not necessary to the execution. In order to save wasteful data transfer, it is necessary to minify or optimize the script on the entirety of the Web. In this paper, we explore the potential for JavaScript size reduction with focus on the two reduction approaches: script minification and HTTP compression. The main two research questions are: RQ1: How many percent of websites have reduction potential? RQ2: How much JavaScript size can be reduced on the Web? Our results show that about 40% of total size of JavaScript files used on the top 500 websites can be potentially reduced by a script minification. Moreover, the current JavaScript data traffic is saving over 50% by HTTP compression. If every website was configured to use HTTP compression, we can achieve a reduction rate of 5% to 20%.
IEEE, 2015, 2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC), 127 - 132, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
Indoor positioning system (IPS) identifies positions of various indoor objects, and is a key technology to achieve sophisticated Indoor Location-Aware Services (InLAS). In most conventional systems, InLAS and IPS are tightly coupled. That is, one system does not supposed to reuse indoor location data and program of another system. This makes individual systems complex and difficult to manage. To cope with the problem, we propose Data Model for Indoor Location (DM4InL), which prescribes a common data schema, independent of implementation of IPS or the usage of In-LAS. The proposed DM4InL represents the location of every indoor object in a standard way, by using three kinds of models: location, building and object models. We also design the fundamental API, which implements typical queries to the indoor location data from external applications. The proposed method achieves loose-coupling of InLAS and IPS, which significantly improves the efficiency and reusability in the InLAS development.
Association for Computing Machinery, 03 Nov. 2014, International Conference on Information and Knowledge Management, Proceedings, 25 - 32, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
Smart city services are implemented using various data collected from houses and infrastructure within a city. As the volume and variety of the smart city data becomes huge, individual services have suffered from expensive computation effort and large processing time. In order to reduce the effort and time, this paper proposes a concept of Materialized View as a Service (MVaaS). Using the MVaaS, every application can easily and dynamically construct its own materialized view, in which the raw data is converted and stored in a convenient format with appropriate granularity. Thus, once the view is constructed, the application can quickly access necessary data. In this paper, we design a framework of MVaaS specifically for large-scale house log, managed in a smart-city data platform. In the framework, each application first specifies how the raw data should be filtered, grouped and aggregated. For a given data specification, MVaaS dynamically constructs a MapReduce batch program that converts the raw data into a desired view. The batch is then executed on Hadoop, and the resultant view is stored in HBase. We present case studies using house log in a real home network system. We also conduct an experimental evaluation to compare the response time between cases with and without MVaaS.
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Jul. 2014, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E97D (7), 1709 - 1718, English[Refereed]
Scientific journal
Program debugging forces time consuming tasks to locate defects on maintainers. Many existing supporting methods assume that maintainers can identify erroneous values and objects' states at runtime. However, such assumptions do not always hold in real program debugging. In this paper, we propose a dynamic analysis technique to extract symptoms which suggest a framework misuse in the process to update a state of an object. Symptoms help maintainers by showing which state updates are likely to be unexpected, even if maintainers can not decide if the updated states are correct or not. We developed a prototype tool to extract symptoms. We evaluate our method by applying it to a bug in a practical framework application developed by a third party. Copyright 2014 ACM.
Association for Computing Machinery, 2014, Proceedings of the ACM Symposium on Applied Computing, 1176 - 1178, English[Refereed]
International conference proceedings
Modern cloud services and machine-to-machine (M2M) systems provide various kinds of data via various Web services. Implementing context-aware services integrating such global data are promising in various applications. However, it has been challenging to manage heterogeneous contexts and services defined in various Web services. To cope with this, we design a framework, called RuCAS, which systematically manages every context-aware service in form of ECA (Event Condition-Action) rule. We also develop RuCAS platform, which publishes API of RuCAS as Web service. Using the RuCAS platform, users can define their own contexts with various Web services (e.g., information service, sensor services, networked appliances, etc.). Based on the defined contexts, they can create ECA rules to define custom context aware services. To support users, We also implement a GUI front-end of RuCAS platform, called RuCAS.me. RuCAS.me supports users even if the users are non-expert. A case study in a real home network system demonstrates practical feasibility of RuCAS platform and RuCAS.me. The contribution of this paper is to provide design and implementation details of RuCAS, by which one can fully understand systematic management of context-aware services with Web services.
ASSOC COMPUTING MACHINERY, 2014, 16TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS 2014), 233 - 242, English[Refereed]
International conference proceedings
Managing a home server within individual house is a major obstacle to practical use of home network system (HNS). Delegating the home server to a cloud is a promising approach. However, the conventional multi-tenant SaaS-based solution has the following risks among different households: security/privacy violation, failure propagation and insufficient resource demand. In this paper, we propose a novel cloud-based architecture for the home network system that achieves security isolation, fault isolation and resource isolation. Specifically, we first create a virtual home server for every household using IaaS. On top of every virtual home server, we then create additional virtual machines, each of which contains a single service or application. Finally, using dynamic scaling, we allocate resources needed for individual virtual home servers. Based on the idea, we construct the proposed architecture by three layers: HNS Lite, House Cloud and Service Provider.
IEEE, 2014, 2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 964 - 969, English[Refereed]
International conference proceedings
In the conventional context-aware services of the home network system (HNS), every context has been defined by current (or recent) situations only. Considering past situations in a house would significantly extend the expressive power of the context-aware services. In this paper, we propose a new type of context, called log context, by using house log of the HNS, extensively. The log context is defined with both the current and past situations, where the current situation is obtained by sensors or device status of the HNS while the past situations are derived by queries to the house log. We also develop a system that can derive the log contexts within an actual HNS. To manage individual log contexts efficiently, the system is designed by four layers: application layer, log context layer, log query layer, and DB connector layer. Using the developed system, we evaluate practical log contexts: "It is much colder than yesterday", and "Today is the coldest day for past several years".
ICST, 2014, Proceedings of 3rd International Conference on Context-Aware Systems and Applications, ICCASA 2014, English[Refereed]
International conference proceedings
We have been studying log contexts using large-scale house log collected in home network system (HNS). A log context is defined with both the current and past situations of a house, where the current situation is characterized by the current status of an appliance (or a sensor), while the past situations are derived from the house log. In this paper, we propose context-aware services for smart TVs using the log contexts within HNS. We first present three different types of log contexts derived from smart TV. We then discuss value-added services using such log contexts, assuming that a smart TV is integrated with HNS.
IEEE, 2014, 2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 258 - 259, English[Refereed]
International conference proceedings
We have been studying Cloud HNS, which is a new type of home network system using the cloud. In this paper, we consider value-added services that can be provided by introducing a smart TV as an appliance of Cloud HNS. First, we discuss requirements, role and benefits of a smart TV in the integration with Cloud HNS. Then, we propose concrete scenarios of value-added services achieved by the integration.
IEEE, 2014, 2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 268 - 270, English[Refereed]
International conference proceedings
With the spread of Machine-to-Machine (M2M) systems and cloud services, various kinds of data are available through Web services. A context-aware service recognizes a real-world context from such data and behaves autonomously based on the context. However, it has been challenging to manage contexts and services defined on the heterogeneous and distributed Web services. In this paper, we propose a framework, called RuCAS, which systematically creates and manages context-aware service using various Web services (e.g. information services, sensor services, networked appliances, etc.). The framework describes every context-aware service by an ECA (Event-Condition-Action) rule. For this, an event is a context triggering the service, a condition is a set of contexts to be satisfied for execution, and the action is a set of Web services to be executed by the service. Thus, every context-aware service is simply managed in a uniform manner. Since the RuCAS is published as a Web service, it is easy for various applications to reuse and integrate created contexts and services. As a case study, RuCAS is applied to creating context-aware services in a real home network system.
IEEE, 2014, 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 325 - 330, English[Refereed]
International conference proceedings
Research and development of home network system (called HNS.) is recently a hot topic in the area of ubiquitous computing applications. Orchestrating house-hold appliances (e.g., TVs, DVDs, speakers, air-conditioners, lights, curtains, windows, et al.) via the network, the HNS provides value-added services for home users. In our previous research, we have proposed and developed HNS-VAUI that is the interactive voice user interface using the virtual agent as a HNS user interface. The HNS-VAUI provides a useful interaction in HNS operation for users. However, in some case the proposed system usability declines, because which doesn't have feature to adopt user's personalization. Users don't only have individual home-appliance, but also they have individual favorite interaction via their HNS-VAUI. In this paper, we propose extended HNS-VAUI at the view point of personalization. Concretely speaking, HNS-VAUI can adapt to each user by learning personal preference and behavior rule. In addition to this, we conduct case study to confirm availability.
IEEE, 2014, 2014 WORLD AUTOMATION CONGRESS (WAC): EMERGING TECHNOLOGIES FOR A NEW PARADIGM IN SYSTEM OF SYSTEMS ENGINEERING, 219 - 224, English[Refereed]
International conference proceedings
Recently many frameworks are used in software development without proper documentation, and are misused by application developers in calling framework APIs. Debugging a failure caused by a wrong API call is difficult and requires a proper supporting technique. In our preceding study we developed a dynamic analysis technique to detect possibly unexpected side effects that cause failures. In this paper, we introduce a case study to identify a wrong API call using this technique.
IEEE, 2014, 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 355 - 360, English[Refereed]
International conference proceedings
In order to achieve intuitive and easy operations for home network system (HNS), we have previously proposed user interface with virtual agent (called HNS virtual agent user interface, HNS-VAUI). The HNS-VAUI was implemented with MMDAgent toolkit. A user can operate appliances and services interactively through dialog with a virtual agent in a screen. However, the previous prototype heavily depends on MMDAgent, which causes a tight coupling between HNS operations and agent behaviors, and poor capability of using external information. To cope with the problem, this paper proposes a service-oriented framework that allows the HNS-VAUI to provide richer interaction. Specifically, we decompose the tightly-coupled system into two separate services: MMC Service and MSM service. The MMC service concentrates on controlling detailed behaviors of a virtual agent, whereas the MSM service defines logic of HNS operations and dialog with the agent with richer state machines. The two services are loosely coupled to enable more flexible and sophisticated dialog in the HNS-VAUI. The proposed framework is implemented in a real HNS environment. We also conduct a case study with practical service scenarios, to demonstrate effectiveness of the proposed framework.
IEEE, 2014, 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 343 - 348, English[Refereed]
International conference proceedings
A home network system (HNS) provides value-added services for home users by networking house-hold appliances and sensors. In the conventional architecture, the HNS appliances and services are tightly coupled. It is therefore difficult for users to freely choose their favorite appliances and services. In this paper, we propose a new HNS architecture that accommodates multi-vendor services by extensively using cloud technologies. The new architecture manages individual HNS operations and data as standard services within the cloud. The vendor services must go through the cloud to access the HNS. Thus, loose coupling among the HNS and services can be achieved. As a result, the proposed architecture realizes more flexible HNS beneficial for both users and vendors.
IEEE, 2014, 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 319 - 324, English[Refereed]
International conference proceedings
Smart city provides various value-added services by collecting large-scale data from houses and infrastructures within a city. However, it takes a long time and man-hour and needs knowledge about big data processing for individual applications to use and process the large-scale raw data directly. To reduce the response time, we use the concept of materialized view of database, and materialized view to be as a service. And we propose materialized view to be as as service (MVaaS). In our proposition, a developer of an application can efficiently and dynamically use large-scale data from smart city by describing simple data specification without considering distributed processes and materialized views. In this paper, we design an architecture of MVaaS using MapReduce on Hadoop and HBase KVS. And we demonstrate the effectiveness of MVaaS through three case studies. If these services uses raw data, it needs enormous time of calculation and is not realistic.
Springer Verlag, 2014, Advances in Intelligent Systems and Computing, 271, 51 - 60, English[Refereed]
Scientific journal
To support efficient integration of heterogeneous lifelog service, we have previously proposed and implemented a lifelog mashup platform consisting of the lifelog common data model (LLCDM) and the lifelog mashup API (LLAPI) to access the standardized data. The LLCDM has standardized columns which is application-independent. And it has application-specific data (i.e. JSON format text of API response of a lifelog service) in the < content> column as a plain text. But because the LLCDM repository is implemented using the relational database, we can't access to the < content> column data directory, and select out a particular field of it via the LLAPI. To cope with these problems, we exploited the lifelog mashup platform with the document-oriented No-SQL database MongoDB for the LLCDM repository. And, we conduct a case study developing an application of retrieving Twitter's posts involving URLs.
Springer Verlag, 2014, Advances in Intelligent Systems and Computing, 271, 39 - 49, English[Refereed]
Scientific journal
The goal of this paper is to find an answer that how remote monitoring sensor should be accurate. To achieve the goal, we propose three methods, generalization by three-actor model, design the algorithm of the three-actor and development of RMS simulator. With the three-actor model, we can generalize RMS by interactions among three actors. As the second step, we design the algorithms that how to work the actor in RMS. So we could express how often the elderly become ill. Moreover, using the developed simulator, we could simulate with many patterns of conditions. The result of simulations shows that if the accuracy of the sensor is greater than 0.9990, then the RMS has much more detectionPower.
IEEE, 2014, 2014 IEEE 16TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 31 - 36, English[Refereed]
International conference proceedings
Purpose: The remote monitoring service for elderly people1 is a service that allows a family to monitor an elderly person living in a distant location. Since many countries are faced with an aging society, the remote monitoring service is a promising way to increase the quality of life of individual consumers (i.e., the elderly, the family, and caregivers). Its use is not widespread yet. To achieve satisfactory and sustainable monitoring, the remote monitoring service must be personalized for individuals. A consumer should be able to select his/her service from many choices based on personal needs and preferences. A personalized remote monitoring service will provide a safe and secure social environment in the aging society. With the growth of ubiquitous computing, a wide variety of technologies are now available for personalized remote monitoring services. However, existing studies2 and products are simply taking technology- driven approaches. There is no systematic method to tailor personalized services with appropriate technologies based on individual requirements. The goal of this research is to provide a way to systematically analyze the characteristics of various remote monitoring services in a goal-oriented way. Method: To accomplish the goal, this paper presents a modeling framework of remote monitoring services consisting of two elements: the three-actor model and essential perspectives. Figure 1 shows the three-actor model. In this model, we can generalize various remote monitoring services with three actors (called a subject, a watcher, and a target) and relationships among the actors. The subject monitors the elderly person who is living at a distance. A typical example of a subject is a family or caregiver of an elderly person. The watcher directly watches the elderly person, determines the condition of the elderly person, and notifies the subject of the condition. The watcher can be a person or a machine. The person can be a mailman or an employee of a monitoring service provider. The machine represents a system, which monitors the elderly person. Finally, the target represents a person who is monitored by a subject via a watcher. Thus, the target represents an elderly person. Table 1 shows the proposed essential perspectives with which we systematically analyze individual remote monitoring services. Specifically, every remote monitoring service is analyzed based on perspectives of what, why, who, when, where, and how. The why and what perspectives are described for each service. The other four perspectives are described for the subject, the watcher and the target. The right column represents example results for The World's Smartest Medical Alert service< sup> 3< /sup> , clearly showing the essential characteristics of the service. Results & Discussion: The three-actor model and the essential perspectives provide a first step to systematically analyze remote monitoring services in a goal-oriented way. The proposed method currently focuses on the functional aspect of services. We will present the modeling features and scalability in the conference. Our future work will consider the business aspects (e.g., cost).
International Society for Gerontechnology, 2014, Gerontechnology, 13 (2), 289 - 289, English[Refereed]
International conference proceedings
Smart city provides various value-added services by collecting large-scale data from houses and infrastructures within a city. However, it takes a long time and man-hour and needs knowledge about big data processing for individual applications to use and process the large-scale raw data directly. To reduce the response time, we use the concept of materialized view of database, and materialized view to be as a service. And we propose materialized view to be as as service (MVaaS). In our proposition, a developer of an application can efficiently and dynamically use large-scale data from smart city by describing simple data specification without considering distributed processes and materialized views. In this paper, we design an architecture of MVaaS using MapReduce on Hadoop and HBase KVS. And we demonstrate the effectiveness of MVaaS through three case studies. If these services uses raw data, it needs enormous time of calculation and is not realistic.
Springer Verlag, 2014, Advances in Intelligent Systems and Computing, 271, 51 - 60, English[Refereed]
Scientific journal
[Refereed]
International conference proceedings
A home network system (HNS) coordinates various networked home appliances to achieve value-added services. If multiple services are executed at the same time, functional conflicts between the home appliances may occur. These are known as feature interactions (FIs) in the HNS. We have previously defined two kinds of FIs: appliance interactions and environment interactions. Environment interaction refers to an indirect conflict of different appliances in the home environment, which is generally more difficult to capture than appliance interaction. Due to a lack of an amount of environmental impacts and requirements to be satisfied, the previous definition missed some obvious environment interactions, or mis-detected many acceptable cases. In this paper we try to extend the previous formalization by introducing two new concepts. First we propose an environment impact model, which strictly defines how each appliance operation contributes to the environment properties. Second, we introduce an environment requirement to define the expected environment state achieved by each service. We then re-formalize the environment interaction by a condition such that the accumulated impacts violate the requirement of either of the services. A case study with five practical services successfully detects the interactions that could not be characterized by the previous definition. (C) 2013 Elsevier B.V. All rights reserved.
ELSEVIER SCIENCE BV, Aug. 2013, COMPUTER NETWORKS, 57 (12), 2442 - 2453, English[Refereed]
Scientific journal
Electricity peak shaving is a promising approach to energy saving at home. The conventional peak shaving has been conducted in an automatic and system-centric approach, using the emerging home energy management systems (HEMS). However, for more sustainable energy-saving, it is also important to develop a human-centric approach, which encourages residents to perform energy-saving behaviors by themselves. In this paper, we present a smartphone application, named Peak Cutter, which assists home users to perform spontaneous peak shaving. Cooperating with a home network system, Peak Cutter monitors electricity demand in a house, and notifies the user via a smartphone when the demand exceeds a threshold. The user then checks the current energy consumption of each home appliance, and can remotely turn off some appliances to shave the peak. We have also conducted an experiment, where five subjects tried to save energy of our laboratory using Peak Cutter. It was shown that a certain amount of energy was reduced within the one-week experiment, and that Peak Cutter promoted energy-saving attitudes of most of the subjects. © 2013 IEEE.
2013, International Conference on Wireless and Mobile Computing, Networking and Communications, 273 - 278, English[Refereed]
International conference proceedings
To support mashup of heterogeneous lifelog services, we have previously implemented the lifelog common data model (LLCDM). The previous LLCDM was implemented with MySQL, where various types of application-specific data (e.g., numeric values, text, JSON or XML) were all stored in a 〈content〉 column in a schemaless text format. Any query with application-specific data had to be managed by individual applications.It had also a scalability issue as the data size grew. To cope with the limitations, this paper re-engineers the LLCDM with MongoDB NoSQL database. We extensively use the document-oriented semi-strucuted data schema of MongoDB for representing the 〈content〉 column. We also re-implementWeb-API for the LLCDM which allows queries with both application-specific and neutral attributes. We evaluate performance and complexity of the new system through application development with real sensor data. © 2013 ACM.
2013, ACM International Conference Proceeding Series, 133 - 139, English[Refereed]
International conference proceedings
Smart city provides various value-added services by collecting large-scale data from houses and infrastructures within a city. To use such large-scale raw data, individual applications usually take expensive computation effort and large processing time. To reduce the effort and time, we propose Materialized View as a Service (MVaaS). Using the MVaaS, each application can easily and dynamically construct its own materialized view, in which the raw data is cached in an appropriate format for the application. Once the view is constructed, the application can quickly access necessary data. In this paper, we design a framework of MVaaS specifically for large-scale house log, managed in our smart-city data platform Scallop4SC. In the framework, each application first specifies how the raw data should be filtered, grouped and aggregated. For a given data specification, MVaaS dynamically constructs a MapReduce batch program that converts the raw data into a desired view. The batch is then executed on Hadoop, and the resultant view is stored in HBase. We conduct an experimental evaluation to compare the response time between cases with and without the proposed MVaaS.
IEEE, 2013, 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 311 - 316, English[Refereed]
International conference proceedings
This paper quantifies the difficulty of program analysis based on the information theory. The basic idea is to consider that a program is ultimately obfuscated if instructions appear at random that is, (1) all instructions has an equal frequency of appearance, and (2) there is no pattern observed in the instruction sequence. We quantified (1) based on the entropy and (2) based on the Kolmogorov complexity. We evaluated the feasibility of our proposal through a case study. © 2013, Japan Society for Software Science and Technology. All rights reserved.
2013, Computer Software, 30 (3), 18 - 24, English[Refereed]
Scientific journal
We have proposed a framework named SO-MSR: service-oriented mining software repository, which applied service oriented architecture to MSR. Following the SO-MSR, we have developed a web service, named MetricsWebAPI, for metrics calculation from a variety of software repositories and a variety source codes. In this paper, we develop and propose Metrics Viewer, which is client of Metrics Viewer and is a web application to support personal process improvement. Metrics Viewer provides an interactive user interface for repository file exploring. Moreover the Metrics Viewer visualizes change of source code metrics to support overhead view of personal process. End user can improve their development activities based on software repository data without MSR specific knowledge by using Metrics Viewer. We have conducted a pilot study to evaluate the effect of proposed system for personal process improvement. © 2013 IEEE.
2013, SNPD 2013 - 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 549 - 554, English[Refereed]
International conference proceedings
In past research, we proposed an authentication method that combines actions with spatiotemporal information such as location, time, and distance. With the method, a user succeeds in authentication when he/she performs preset actions such as pushing button n times on preset intervals defined by spatiotemporal information. In this paper, we improve the authentication method using a partial matching method. We propose two kinds of partial matching methods for pushing button and interval. A type I method assumes the number of pushing button is sometimes less than preset count, but the number never exceeds it, and a user never pushes the button out of preset areas. A type II method assumes the number of pushing button is less or more than preset count occasionally, and a user pushes the button out of preset areas. We showed how to calculate FAR when the type I or II is applied. In the experiment, we compared the type I and II methods with a conventional method to evaluate their security. As a result, the type I method improved false acceptance rate (FAR) from 0.097% to 0.053%. The type II method improved FAR from 0.097% to 0.035%.
IEEE, 2013, 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 535 - 542, English[Refereed]
International conference proceedings
Visualizing energy consumption is a useful method that prompts people to perform energy-saving behaviors. Many systems for the energy visualization come onto the market. Since purposes and attitudes to energy saving vary among individuals, it is difficult to satisfy all users by static ready-made visualization. To cope with the problem, this paper presents Personalized Energy Visualization Service (PEVS), which dynamically generates appropriate visualization for individuals based on preferences. PEVS extracts user's requirement with a questionnaire wizard. We design the questionnaire in a goal-oriented fashion, from viewpoints of term, unit and scope. We then consider how to select an appropriate graph from the answer of the questionnaire. An experimental evaluation shows that every subject was able to create a unique personalized visualization easily. © 2013 IEEE.
2013, SNPD 2013 - 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 529 - 534, English[Refereed]
International conference proceedings
Smart city provides various value-added services by collecting large-scale data from houses and infrastructures within a city. However, it takes a long time for individual applications to use and process the large-scale raw data directly. To reduce the response time, we use the concept of materialized view of database. For a given requirement of an application, the proposed method constructs a materialized view for caching the application-specific data. In this paper, we especially develop a method that uses MapReduce for large-scale power consumption data stored in HBase KVS. We conduct an experimental evaluation to compare the response time between cases with and without the materialized view. As a result, the proposed method with materialized view is effective especially when application repeatedly access the same data, or when the application-specific data is derived from a large set of raw data.
IEEE, 2013, 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 523 - 528, English[Refereed]
International conference proceedings
Learning how to use application frameworks effectively becomes important in their widespread use in software development. Learning frameworks is often difficult because of lack of their documentation and their complexity. In order to help framework learning, we propose a behavioral model, called feature component model, which abstracts internal behaviors of framework applications in terms of their behavioral characteristics such as inversion of controls. We apply our behavioral model to an example misuse of a practical framework developed by a third party in order to show its practical usefulness.
IEEE, 2013, 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 511 - 516, English[Refereed]
International conference proceedings
Electricity peak shaving is a promising approach to energy saving at home. The conventional peak shaving has been conducted in an automatic and system-centric approach, using the emerging home energy management systems (HEMS). However, for more sustainable energy-saving, it is also important to develop a human-centric approach, which encourages residents to perform energy-saving behaviors by themselves. In this paper, we present a smartphone application, named Peak Cutter, which assists home users to perform spontaneous peak shaving. Cooperating with a home network system, Peak Cutter monitors electricity demand in a house, and notifies the user via a smartphone when the demand exceeds a threshold. The user then checks the current energy consumption of each home appliance, and can remotely turn off some appliances to shave the peak. We have also conducted an experiment, where five subjects tried to save energy of our laboratory using Peak Cutter. It was shown that a certain amount of energy was reduced within the one-week experiment, and that Peak Cutter promoted energy-saving attitudes of most of the subjects.
IEEE, 2013, 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 273 - 278, English[Refereed]
International conference proceedings
The home network system (HNS, for short) provides value-added and context-aware services for home users, by orchestrating networked home appliances and sensors. Although the HNS services have been developed by system vendors, there exist strong needs that the end-users create their own services according to their convenience. This paper presents a novel service creation environment, called Sensor Service Binder (SSB), which provides a user-friendly interface for creating context-aware services within the HNS. Built on top of the service-oriented HNS, the SSB allows non-expert users to register contexts using the sensors, and to bind the registered context to any operation of the networked appliances. Experimental evaluation with an actual HNS showed that the effort for service creation was reduced to 10% by introducing the proposed SSB. © 2013 Springer-Verlag Berlin Heidelberg.
Springer Verlag, 2013, Studies in Computational Intelligence, 443, 159 - 170, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
Sensor-driven services often cause chain reactions, since one service may generate an environmental impact that automatically triggers another service. We first propose a framework that can formalize and detect such service chains based on ECA (event, condition, action) rules. Although the service chain can be a major source of feature interactions, not all service chains lead to harmful interactions. Therefore, we then propose a method that identifies feature interactions within the service chains. Specifically, we characterize the degree of deviation of every service chain by evaluating the gap between expected and actual service states. An experimental evaluation demonstrates that the proposed method successfully detects 11 service chains and 6 feature interactions within 7 practical sensor-driven services.
MDPI AG, Jul. 2012, SENSORS, 12 (7), 8447 - 8464, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
Scientific journal
様々なサービスを通じて記録された各種ライフログを,ネットワーク越しに統合・集約することで,より高い付加価値をもつサービスへ発展させることが可能である.本論文では,異種ライフログ統合のための標準データモデル(LLCDM),及び標準データモデルにアクセスするためのマッシュアップAPI(LLAPI)を提案する.各種ライフログの記録項目を5W1Hの観点から分類,整理することで,ライフログの種類に強く依存しない中立的なデータモデルを構築する.整理された標準データに対し,汎用的なマッシュアップAPIを設けることで,効率的かつ柔軟なライフログの統合を支援する.LLCDMとLLAPIの有効性を確かめる評価実験として,二つのライフログを統合するアプリケーションを題材とした開発実験を行う.
The Institute of Electronics, Information and Communication Engineers, Apr. 2012, 電子情報通信学会論文誌, J95-D (4), 758 - 768, Japanese[Refereed]
Scientific journal
We propose a new authentication method based on actions and spatiotemporal information such as location, elapsed time, and travel distance of a user. To be authenticated, a user performs certain actions at certain points defined with spatiotemporal information. To apply spatiotemporal information to authentication, it is needed that suppressing probability of authentication failure of regular user, for it is not easy to retry authentication. So we propose partial matching authentication which allows partial mistake of user's authentication procedure. Also, we define combination of spatiotemporal information and action as spatiotemporal character, and formalize security evaluation of our method based on it. In addition, we show security effectiveness of our method with an experiment. The experiment showed that false rejection rate of our method is 0.233% and false acceptance rate is 0.010%.
Japan Society for Fuzzy Theory and Intelligent Informatics, Feb. 2012, 知能と情報 (日本知能情報ファジィ学会誌), 23 (6), 874 - 881, Japanese[Refereed]
Scientific journal
The human interface devices for the home network system (HNS) should be flexible enough to reflect individual preferences and lifestyles of home users. To fill the requirement, this paper presents a novel framework that enables Personal Home Controllers (PHC) on smartphones. The proposed framework is designed so that a user can freely design screen layouts with buttons and pictures, and can define favorite HNS operations on the layouts. The first part of our contribution is PHC Framework, which dynamically implements a PHC based on a given user definition. The second part is PHC Creater, a GUI application which supports the user to create the user definition. The proposed framework is implemented for Android mobile devices. We conduct an experimental evaluation, where subjects create PHCs for operating an actual HNS. The experimental result shows that every subject creates a unique PHC with his favorite motif, and that most subjects find usefulness and pleasure in creating their own PHCs. © 2012 IEEE.
2012, International Conference on Wireless and Mobile Computing, Networking and Communications, 769 - 776, English[Refereed]
International conference proceedings
Object-oriented application frameworks are widely used in order to increase efficiency and reliability in object-oriented software development. Frameworks often expose methods to set up their internal state by application specific code. We put a focus on side effects in frameworks caused by miss-use of such setup methods. In general, side effect is a kind of defect which is difficult to understand and resolve. In this paper, we discuss the importance of object reference structure for understanding runtime processes of side effects. We introduce a side effect example found in a practical framework application developed by a third party. We show how the object reference structure in this example gives us a useful overview to help program understanding.
AMER SOC MECHANICAL ENGINEERS, 2012, 4TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2012), 589 - 594, English[Refereed]
International conference proceedings
Application frameworks are widely used in order to increase efficiency and reliability in object-oriented software development. In this paper we put a focus on side effects caused by misuse of frameworks. A processes of such a side effect often includes cross-border method invocations between an application and its framework, and is difficult to resolve. This paper proposes an approach to visualizing such a side effect as a feature interaction between a framework and its application. This paper shows a case study to apply our approach to a practical framework application, and discuss its practical usefulness.
IEEE COMPUTER SOC, 2012, 2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1, 713 - 716, English[Refereed]
International conference proceedings
In the smart city environment, a wide variety of data are collected from sensors and devices to achieve value-added services. In this paper, we especially focus on data taken from smart houses in the smart city, and propose a platform, called Scallop4SC, that stores and processes the large-scale house data. The house data is classified into log data or configuration data. Since the amount of the log is extremely large, we introduce the Hadoop/MapReduce with a multi-node cluster. On top of this, we use HBase key-value store to manage heterogeneous log data in a schemaless manner. On the other hand, to manage the configuration data, we choose MySQL to process various queries to the house data efficiently. We propose practical data models of the log data and the configuration data on HBase and MySQL respectively. We then show how Scallop4SC works as a efficient data platform for smart city services. We implement a prototype with 12 Lima servers. We conduct an experimental evaluation to calculate device-wise energy consumption, using actual house log recorded for one year in our smart house. Based on the result, we discuss the applicability of Scallop4SC to city-scale data processing.
IEEE, 2012, 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 141 - 148, English[Refereed]
International conference proceedings
The voice control is a promising user interface for the home network system (HNS). In our previous interface, a user had to be equipped with an actual microphone device, which imposed a burden on the user. This paper presents a hands-free voice interface using a microphone array network. The microphone array network enables voice quality enhancement, as well as sound source localization, by networking multiple microphone arrays. Attaching the arrays to the walls or ceiling, users can input voice operations to the HNS from anywhere in the room, without being aware of the microphone devices. We implement a prototype system with a 16ch microphone array, and evaluate the speech recognition rate and the accuracy of sound source localization in a real home network environment. A hands-free operation service and an automatic speech logging service are implemented.
IEEE, 2012, 2012 THIRD INTERNATIONAL CONFERENCE ON NETWORKING AND COMPUTING (ICNC 2012), 195 - 200, English[Refereed]
International conference proceedings
We have been developing a hands-free voice controller for a home network system (HNS) by using microphone arrays. In our current implementation, however, all human-HNS interactions are performed by voice only. Hence, the interactions tend to be mechanical, dreary and uninformative. To achieve richer interactions, we try to introduce the virtual agent technology as a feedback interface of the HNS. In this paper, we implement the virtual agent as a Web service, by using MMDAgent Toolkit extensively. The agent is then integrated with the HNS and microphone arrays in a service-oriented fashion. Finally, we conduct a user experiment with three versions of virtual agents. In the experiment, we evaluate how the virtual agent can enrich the interactions.
IEEE COMPUTER SOC, 2012, 2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1, 342 - 345, English[Refereed]
International conference proceedings
Smart city is a next-generation city planning. In the smart city, some value-added services such as energy saving and optimization of traffic are provided using wide variety of logs collected from various appliances and sensors. We are currently developing a smart city platform, called Scallop4SC, which supports collecting and processing the extremely large-scale log data. This system stores variety of logs on the HBase key-value store, and supports powerful data processing by Hadoop MapReduce. The goal of this paper is to propose service API of Scallop4SC. The API should be implemented as a Web service, which allows heterogeneous clients to access large-scale log (of energy, device and environment), as well as house configuration data of the smart city. In order to cover queries from a variety of applications, we design possible combinations of service type, data type, access type and queries, based on practical service scenarios. As a case study, we present concrete smart city services for energy saving and quality of life improvement. Then, we evaluate how the proposed API can implement these practical services.
IEEE, 2012, 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 815 - 820, English[Refereed]
International conference proceedings
We have previously proposed a service oriented framework, named SO-MSR, which applied SOA (service oriented architecture) for conducting the MSR (mining software repository). The principal concept of SO-MSR is to hide complex and complicated mining procedures to end-users for practical use of MSR. Following the SO-MSR, we have also developed Metrics WebAPI which is a web service for metrics measurement. The purpose of this paper is to evaluate the benefits and limitations of SO-MSR and Metrics WebAPI through a development of client system of Metrics WebAPI. To achieve the goal, we develop a consumer mash up application, named Metrics Viewer, which integrates Metrics WebAPI and Google Chart Tools. This system is a Ajax web application for visualizing software evolution from a revision control system repository. Through the development experiment, we have confirmed that the SO-MSR enables us easy and rapid implementation of client system, easily integrating with other web services and light-weight execution system. © 2012 IEEE.
2012, Proceedings - 2012 4th International Workshop on Empirical Software Engineering in Practice, IWESEP 2012, 35 - 39, English[Refereed]
International conference proceedings
When multiple sensor-driven services are deployed in the same environment, execution of a service may trigger other services, successively. Such chain reactions of services often cause undesirable feature interactions. This paper presents a framework that can characterize and detect the service chains within the home network system (HNS). We first introduce the ECA rules to describe the services, and then propose an environment effect model to capture how each device in the HNS affects the environment. Finally, we develop an algorithm that detects the service chains with concrete enabling conditions. A case study with 7 practical services shows that the proposed method successfully detects 11 service chains, in which 6 harmful feature interactions are identified. © 2012 IEEE.
2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012, 853 - 858, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
In order to support efficient integration of heterogeneous lifelog services, we have previously proposed a lifelog mashup platform consisting of the lifelog common data model (LL-CDM) and the lifelog mashup API (LLAPI) to access the standardized data. However, it had the performance bottleneck, and was poor in the portability. To cope with these problems, we re-engineer the LLCDM and the LLAPI with the relational database MySQL and the Web services, respectively. Furthermore, we evaluate the practical feasibility through an actual development project. © 2011 ACM.
2011, ACM International Conference Proceeding Series, 503 - 506, English[Refereed]
International conference proceedings
In this paper, we try to empirically characterize user's habituation effect of the voice control in the Home Network System (HNS). We propose three kinds of metrics that capture the user's habituation quantitatively: (M1) the time of system speech, (M2) the number of support commands and (M3) the number of mistakes. The experimental results show that the metrics M1 and M2 are reasonable to capture the habituation of the user. © 2011 ACM.
2011, ACM International Conference Proceeding Series, 375 - 378, English[Refereed]
International conference proceedings
In the future ubiquitous network, it is expected to realize an adaptive service platform, which dynamically integrates various service resources to provide adaptive and context-aware services. This paper presents a service registry, called UBI-REGI, in order to support efficient and dynamic discovery of service resources in the ubiquitous network. © 2011 ACM.
2011, ACM International Conference Proceeding Series, 395 - 398, English[Refereed]
International conference proceedings
In this paper, we design and implement a consumer-oriented service platform called ReceiptLogService to store and use their receipt log by consumers. ReceiptLogService assumes receipt data as a lifelog. The receipt lifelog may provide gaining awareness of economic for consumers. We also develop a social network Web application called ReciLog that extensively uses the ReceiptLogService platform. ReciLog extensively supports every end user to review daily life from financial and living aspects. We then conducted an experimental evaluation of the ReciLog with actual subjects. The experimental results showed that it was interesting and useful for end users to review and share the receipt log. © 2011 ACM.
2011, ACM International Conference Proceeding Series, 337 - 340, English[Refereed]
International conference proceedings
Mining software repository is one of important topic in empirical software engineering. A wide variety of mining tools are published on the Web and we can easily apply individual mining approaches. However, there is no supporting system for sharing the mining techniques, procedures, knowledge and know-how. This sharing problem also poses great difficulties for independent validation and experimental replication from mining researchers. The goal of this paper is to provide a framework that supports sharing the repository mining techniques for reducing mining effort and external validation of analysis results. This paper proposes Service Oriented Framework for Mining Software Repository (SOMSR) which applied Service Oriented Architecture (SOA) to the repository mining. Following the SO-MSR, we also develop Metrics Web API which is a prototype system for metrics measurement. Metrics Web API can measure a variety of source code metrics without relying on any types of repositories and programming languages. The proposed system is designed and implemented as a Web service and demonstrated using actual software repository. © 2011 IEEE.
2011, Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011, 13 - 19, English[Refereed]
International conference proceedings
The sensor as a service is an emerging application of the services computing. However, how to implement such sensor services efficiently and reliably is an open issue. This paper presents an application framework, called Sensor Service Framework (SSF), that supports developers to build and deploy sensor services in the home network system (HNS). The SSF prescribes device-neutral features and APIs for the sensor devices to be deployed as Web services. Writing a small amount of code with the SSF, the developer can easily deploy any sensor device as a service in the HNS. The sensor service can provide a standardized access to heterogeneous sensor devices, as well as a context management service with user-defined conditions. We then present a sensor mashup platform (SMuP), which allows the dynamic composition of the existing sensor services. To support non-expert developers, we also implemented a GUI front-end, called Sensor Service Binder (SSB). The proposed technologies are implemented and evaluated in an actual HNS to demonstlate practical feasibility. © 2011 IEEE.
2011, Proceedings - 2011 IEEE International Conference on Services Computing, SCC 2011, 576 - 583, English[Refereed]
International conference proceedings
In order to support legacy migration to the service-oriented architecture (SOA), this paper presents a pragmatic method that derives candidates of services from procedural programs. In the SOA, every service is supposed to be a process (procedure) with (1) open interface, (2) self-containedness, and (3) coarse granularity for business. Such services are identified from the source code and its data flow diagram (DFD), by analyzing data and control dependencies among processes. Specifically, first the DFD must be obtained with reverse-engineering techniques. For each layer of the DFD, every data flow is classified into three categories. Using the data category and control among procedures, four types of dependency are categorized. Finally, six rules are applied that aggregate mutually dependent processes and extract them as a service. A case study with a liquor shop inventory control system extracts service candidates with various granularities. © 2011, IGI Global. All rights reserved.
2011, International Journal of Information Systems in the Service Sector, 3 (4), 54 - 72, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
This paper presents a framework or formalizing and detecting feature interactions (FIs) in the emerging smart home domain We first establish a model of home network system (HNS). where every networked appliance (or the FINS environment) is characterized as an object consisting of properties and methods Then. every HNS service is defined as a sequence of method its of the appliances Within the model. we next formalize two kinds of FIs (a) appliance interactions and (b) environment interactions An appliance interaction occurs when two method invocations conflict on the same appliance, whereas an environment interaction arises when two method invocations conflict indirectly via the environment Finally, we propose offline and online methods that detect FIs before service deployment and during execution respectively Through a case study with seven practical services, it is shown that the proposed framework Is generic enough to capture feature interactions in HNS integrated services We also discuss several FI resolution scheme, within the proposed framework.
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Apr. 2010, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E93D (4), 822 - 833, English[Refereed]
Scientific journal
This paper presents a framework that integrates difïerent kinds of lifelog services. For efficient data mashup, we first propose the lifelog œmmon data model (LLCDM), which normalizes data structures and formats of heterogeneous lifelog records. We derive application-neutral data items by an interrogative analysis of what, why, when, who, where and how. We then implement the lifelog mashup API (LLAPI) to achieve standardized access to heterogeneous lifelogs. A case study of integrating practical lifelog services (Twitter, Flickr and GARMIN Connect) demonstrates the effectiveness of the proposed framework. It was shown that the development effort with the proposed APIs was reduced to 11.9%, compared to the conventional mashup development with the proprietary APIs. Copyright 2010 ACM.
2010, iiWAS2010 - 12th International Conference on Information Integration and Web-Based Applications and Services, 263 - 270, English[Refereed]
International conference proceedings
Background: Software product metrics have been widely used as independent variables for constructing a fault prediction model. However, fault injection depends not only on characteristics of the products themselves, but also on characteristics of developers involved in the project. Aims: The goal of this paper is to study the effects of developer features on software reliability. Method: This paper proposes developer metrics such as the number of code churns made by each developer, the number of commitments made by each developer and the number of developers for each module. By using the eclipse project dataset, we experimentally analyzed the relationship between the number of faults and developer metrics. Second, the effective of developer metrics for performance improvements of fault prediction models were evaluated. Results: The result revealed that the modules touched by more developer contained more faults. Compared with conventional fault prediction models, developer metrics improved the prediction performance. Conclusions: We conclude that developer metrics are good predictor of faults and we must consider the human factors for improving the software reliability.
2010, ACM International Conference Proceeding Series, USB - USB, English[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
Scientific journal
To support legacy migration to service-oriented architecture (SOA), this paper presents a method that derives candidates of SOA services from procedural programs. In SOA, every service is supposed to be a process (procedure) with (1) open interface, (2) self-containedness, (3) coarse granularity for business. We identify such services from the source code and its data flow diagram (DFD), by analyzing data and control dependency among processes. Specifically, we first obtain the DFD with reverse-engineering techniques. For each layer of the DFD we classify every data flow into three categories. Using the data category and control among procedures, we characterize four types of dependency. We finally apply six rules that aggregate mutually dependent procedures and extract them as a service. A case study with a liquor shop inventory control system extracts service candidates with various granularity
IEEE, 2009, 2009 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC 2009), 437 - +, English[Refereed]
International conference proceedings
Home Network System(HNS), which connects home appliances and sensors to networks, has been researched actively. HNs makes it possible to remote-control and monitor home appliances. However, use of these services has been limited to home appliances and sensors in HNS. In this paper, we present integrated services combining RSS documents and HNS with our RSS conversion service. In our service, the hyperlink in each item on an RSS document is replaced to a WebAPI of home appliance control. This converted RSS(integrated RSS) can control home appliances by clicking items in an RSS reader.
INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION, 2009, ICE-B 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 131 - 134, English[Refereed]
International conference proceedings
This paper presents an online detection and resolution method for feature interactions among integrated services in home network systems. To achieve reasonable online detection and resolution, we introduce three new concepts in this paper. Specifically, (a) activation which explicitly defines the execution lifetime of services, (b) mandatory methods which guarantees essential and optional operations in services, and (c) suspend/resume mechanism which allows lower-priority services to sleep temporarily and to wake up later when all conflicting services are terminated. A case study demonstrates the effectiveness of the proposed method.
IOS PRESS, 2009, FEATURE INTERACTIONS IN SOFTWARE AND COMMUNICATION SYSTEMS X, 191 - 206, English[Refereed]
International conference proceedings
A home network system consists of multiple networked appliances, intended to provide more convenient and comfortable living for home users. Before being deployed, one has to guarantee the correctness, the safety, and the security of the system. Here, we present the approach chosen to validate the Java implementation of a home network system. We rely on the Java Modelling Language to formally specify and validate an abstraction of the system. © Springer-Verlag London Limited 2009.
2009, Innovations in Systems and Software Engineering, 5 (3), 181 - 196, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
A home network system consists of multiple networked appliances, intended to provide more convenient and comfortable living for home users. Before being deployed, one has to guarantee the correctness, the safety, and the security of the system. Here, we present the approach chosen to validate the Java implementation of a home network system. We rely on the Java Modelling Language to formally specify and validate an abstraction of the system. © Springer-Verlag London Limited 2009.
2009, Innovations in Systems and Software Engineering, 5 (3), 181 - 196, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
The home network system (HNS, for short) enables the flexible integration of networked home appliances, which achieves value-added integrated services. Assuring safety within such integrated services is a crucial issue to guarantee a high quality of life in smart home. In this paper, we present a novel framework for the safety of the HNS integrated services. We first propose a way to define safety in the context of the integrated services, which is characterized by local safety, global safety, and environment safety. We then propose a method that can validate the above three kinds of safety for given HNS implementations. Exploiting the concept of Design by Contract (DbC, for short), the proposed method represents every safety property as a contract between a provider and a consumer of an HNS object. The contracts are embedded within the implementations, and then are validated through elaborate testing. We implement the method using Java Modeling Language (JML, for short) and JUnit with a test-case generation tool TOBIAS. Using the proposed framework, one can define and validate the safety of HNS integrated services, systematically and efficiently.
Information Processing Society of Japan, 2008, Journal of Information Processing, 16, 38 - 49, English[Refereed]
Scientific journal
The home network system (HNS, for short) is comprised of networked home appliances, which achieves various value-added services for home users. Assuring safety of the HNS and the services is a crucial issue. However, safety properties to be verified against the HNS have been given in an ad-hoc manner This paper presents a systematic method that can derive the verifiable safety properties from a given HNS model and hazard contexts. Specifically, we first define a hazard analysis model for the HNS consisting of four levels of abstractions. We then conduct a goal-oriented analysis to specify logical relations between the adjacent abstraction levels. The analysis yields cause-and-effect chains from the abstract hazard contexts to the concrete attributes and operations of HNS objects (appliances, services, environment). Finally, the safety properties and their responsible operations are derived from the complete model, which give the strong rationale of the safety of the HNS.
IEEE COMPUTER SOC, 2008, FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2, 906 - +, English[Refereed]
International conference proceedings
The home network system (HNS) consists of networked household appliances, intended to provide value-added services. The conventional HNS has been built on the single-vendor system, which severely limits potential of the HNS. To overcome the problem, this paper presents a method that constructs the HNS with multi-vendor appliances. The proposed method-first defines vendor-neutral standard services, with which various HNS applications and services are developed. Then, we exploit a dynamic service binding mechanism, which binds each standard service on a vendor-specific API of an appliance during run-time. With this mechanism, common HNS applications and services can be achieved by various combinations of multi-vendor appliances. Moreover replacing any appliance with another never affects the execution of the applications. We have implemented the proposed method using Apache Axis Web services and Rhino JavaScript engine. The experimental evaluation showed that our implementation works well for a practical HNS with sufficiently small overhead.
IEEE COMPUTER SOC, 2008, 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 275 - +, English[Refereed]
International conference proceedings
This article presents a framework that adapts the conventional home electric appliances with the infrared remote controls (legacy appliances) to the emerging home network system (HNS). The proposed method extensively uses the concept of service-oriented architecture to improve programmatic interoperability among multi-vendor appliances. We first prepare APIs that assist a PC to send infrared signals to the appliances. We then aggregate the APIs within self-contained service components, so that each of the components achieves a logical feature independent of devicelvendor-specific operations. The service components are finally exhibited to the HNS as Web services. As a result, the legacy appliances can be used as distributed components with open interfaces. To demonstrate the effectiveness, we implement an actual HNS and integrated services with multi-vendor legacy appliances.
IGI PUBL, Jan. 2008, INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 5 (1), 82 - 98, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
This paper proposes to use eye movements to characterize the performance of individuals in reviewing software documents. We design and implement a system called DRESREM, which measures and records eye movements of document reviewers. Based on the eye movements captured by eye tracking device, the system computes the line number of the document that the reviewer is currently looking at. The system can also record and play back how the eyes moved during the review process. To evaluate the effectiveness of the system we conducted an experiment to analyze 30 processes of source code review (6 programs, 5 subjects) using the system. As a result, we have identified a particular, pattern called scan, in the subject's eye movements. Quantitative analysis showed that reviewers who did not spend enough time on the scan took more time to find defects on average.
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Oct. 2007, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E90A (10), 2290 - 2300, English[Refereed]
Scientific journal
International conference proceedings
This paper formalizes three kinds of safety to be satisfied by networked appliances and services in the emerging home network system (HNS). The local safety is defined by safety instructions of individual networked appliances. The global safety is specified as required properties of HNS services, which use multiple appliances simultaneously. The environment safety is derived from residential rules in home and surrounding environments. Based on the safety defined, we propose a modeling/validation framework for the safety. Specifically, we first introduce an object-oriented modeling technique to clarify the relationships among the appliances, the services and the home (environment) objects. We then employ the technique of Design by Contract with JML (Java Modeling Language), which achieves systematic safety validation through testing.
SPRINGER-VERLAG BERLIN, 2007, PERVASIVE COMPUTING FOR QUALITY OF LIFE ENHANCEMENT, PROCEEDINGS, 4541, 130 - +, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
This paper presents a method to evaluate the risk of information leakage in software processes for security-sensitive applications. A software process is modeled as a series of sub-processes, each of which produces new work products from input products. Since a process is conducted usually by multiple developers, knowledge of work products is shared among the developers. Through the collaboration, a developer may share with others the knowledge of products that are not related to the process. We capture the transfer of such irrelevant product knowledge as information leakage in a software process. In this paper, we first formulate the problem of information leakage by introducing a formal software process model. Then, we propose a method to derive the probability that each developer d knows each work product p at a given process of software development. The probability reflects the possibility that someone leaked the knowledge of p to d. We also conduct three case studies to show the applicability of leakage to practical settings. In the case studies, we evaluate how the risk of information leakage is influenced by the collaboration among developers, the optimal developer assignment and the structure of the software process. As a result, we show that the proposed method provides a simple yet powerful means to perform quantitative analysis on information leakage in a security-sensitive software process.
Information and Media Technologies Editorial Board, 2006, Information and Media Technologies, 1 (1), 121 - 133, EnglishThe technology of a home network system (HNS) allows integration of several kinds of home appliances to provide a user with value-added integrated services. Development of the integrated HNS services requires implementation of the appliance components (with APIs) and the services, according to each home-network environment. There are various implementation standards such as DLNA, ECHONET OSGi and Jini for the HNS applications. Therefore, even if a developer can choose the optimal one, it's very difficult to develop the integrated services by composing a new HNS implementation. In this paper we propose a model-driven development of integrated HNS service applications. In our former manuscript, platform-independent design language for verifying HNS service scenarios was proposed. Our model-driven development method uses this design language as a meta-model of integrated HNS services. By model transformation to concrete implementation together with verification by SMV(Symbolic Model Checking), productivity and quality of this kind of HNS applications are improved.
IEEE COMPUTER SOC, 2006, ASPEC 2006: 13TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 45 - 52, English[Refereed]
International conference proceedings
This paper presents a system which extensively exploits user's eye gaze information for operating services and appliances in the emerging home network system (HNS). We design and implement the system called AXELLA, which captures user's gaze, then invokes a service operation, and finally announces the response via voice. AXELLA interprets the gaze information together with supplementary information as a gaze context, and triggers a service module associated by a service rule. Thus, a simple gazing activity can be used for various service operations. Service developers (or even home users) can easily develop context-aware HNS services with the eye-gaze-based UI. We demonstrate a practical service called "See and Know" implemented using AXELLA, where a user can acquire the current status information of every appliance just by looking at the appliance. It was shown that the proposed system can reduce the artificial dependency significantly with respect to ease-of-learning and system scalability.
SPRINGER-VERLAG BERLIN, 2006, UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 4239, 13 - 27, English[Refereed]
Scientific journal
This paper presents a framework that adapts the conventional home electric appliances with the infrared remote controls (legacy appliances) to the emerging home network system (HNS). The proposed method extensively uses the concept of service-oriented architecture to improve programmable interoperability among multi-vendor appliances. We first prepare APIs that assist a PC to send infrared signals to the appliances. We then aggregate the APIs within self-contained service components, so that each of the component achieves a logical feature independent of device(or vendor)-specific operations. The service components are finally exported to the HNS as Web services. Thus, the legacy appliances can be used as distributed components with open interfaces. To demonstrate the effectiveness, we also implement an actual HNS and integrated services with multi-vendor legacy appliances.
IEEE COMPUTER SOC, 2006, ICWS 2006: IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 849 - +, English[Refereed]
International conference proceedings
Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-centric approach to give a guideline for employing existing obfuscation methods to disrupt crackers' actions.
ACTA PRESS ANAHEIM, 2006, PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND TECHNOLOGY, 286 - +, English[Refereed]
International conference proceedings
This paper presents a method in which program analysis by a malicious user (attacker) is made difficult by camouflaging (hiding) a large number of instructions contained in the program. In the proposed method, an arbitrary instruction (target) in the program is camouflaged by a different instruction. Using the self-modification mechanism in the program, the original instruction is restored only in a certain period during execution. Even if the attacker attempts an analysis of the range containing the camouflaged instruction, it is impossible for him to correctly understand the original behavior of the program unless he notices the existence of the routine that rewrites the target (restoring routine). In order to make the analysis a success, the range containing the restoring routine must be analyzed, and the attacker is forced to analyze a wider range of the program. The proposed method can easily be automated, and the number of targets can be specified arbitrarily according to the required degree of protection and the acceptable degradation of execution efficiency. (c) 2005 Wiley Periodicals, Inc.
SCRIPTA TECHNICA-JOHN WILEY & SONS, 2006, ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 89 (1), 47 - 59, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which are unique and native characteristics of every class file. For a pair of class files p and q, if q has the same birthmark as p's, q is suspected as a copy of p. Ideally, the birthmarks should satisfy the following properties: (a) preservation - the birthmarks should be preserved even if the original class file is tampered with, and (b) distinction - independent class files must be distinguished by completely different birthmarks. Taking (a) and (b) into account, we propose four types of birthmarks for Java class files. To show the effectiveness of the proposed birthmarks, we conduct three experiments. In the first experiment, we demonstrate that the proposed birthmarks are sufficiently robust against automatic program transformation (93.3876% of the birthmarks were preserved). The second experiment shows that the proposed birthmarks successfully distinguish non-copied files in a practical Java application (97.8005% of given class files were distinguished). In the third experiment, we exploit different Java compilers to confirm that the proposed Java birthmarks are core characteristics independent of compiler-specific issues.
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Sep. 2005, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E88D (9), 2148 - 2158, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
サービス競合(Feature Interactions)とは, 複数の通信サービスを組み合わせたとき, 単独サービスで予期しない動作が発生する不具合を指す.すべてのサービス競合を厳密に検出し, 解消することは, サービス数及びシナリオ数の組合せ爆発により, 非常に困難な問題として知られている.そこで, 本研究では電話通信サービスを対象として, サービス開発の要求段階において, 「競合が起こりがちな」シナリオを低コストで導出するための枠組みを提案する.具体的には, Use Case Maps (UCMs)と呼ばれる要求記述法のスタブプラグインという概念を利用し, 基本電話サービスと付加サービスのシナリオを記述する.その後, UCMs上の三つのパス条件により, サービス競合が発生する可能性の高いシナリオを導出する.UCMsのシンプルなパス解析により, 競合の可能性があるシナリオを大幅に絞り込むことができる.また, 実際の携帯電話サービスに提案法を適用して評価実験を行った.2560の全サービスシナリオに対して, 提案法の適用により競合可能シナリオを148にまで絞り込むことができた.検証の結果, 導出された競合可能シナリオには, 既知のサービス競合がすべて含まれることが分かった.更に, いくつかの新たなサービス競合を発見できた.
The Institute of Electronics, Information and Communication Engineers, Jul. 2005, 電子情報通信学会論文誌, J88-B (7), 1237 - 1247, Japanese[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
This paper presents a framework to specify and verify integrated services of a home network system (HNS). We first develop a modeling language to describe the HNS and the integrated services. Complementing our previous work, the language captures each appliance as an object consisting of properties and methods, encapsulating the underlying protocols and platforms. We then present a method that verifies the integrated services with symbolic model checking, by translating, the proposed language into the SMV (Symbolic Model Verifier) language. Thus, it is possible to validate if the integrated service is specified as intended, automatically and exhaustively. Using the proposed framework, service developers can effectively detect design flaws in a single integrated service, as well as feature interactions among multiple services, in early stages of service development.
IEEE COMPUTER SOC, 2005, 12th Asia-Pacific Software Engineering Conference, Proceedings, 549 - 558, English[Refereed]
International conference proceedings
In the next-generation home network systems (HNS), interoperability among multi-vendor appliances is a challenging issue to implement value-added integrated services. This paper presents a service-oriented framework to enable both evolution of HNS and the appliance interoperability. The key idea is to construct the integrated services by combining the existing services deployed by the appliances. This allows to eliminate the reference model, which had been an obstacle of the evolution of the HNS.
IEEE COMPUTER SOC, 2005, Eighth International Workshop on Principles of Software Evolution, Proceedings, 61 - 64, English[Refereed]
International conference proceedings
This paper proposes a service-centric framework for the feature interaction problem in integrated services of the home network system (HNS). To formalize the HNS, we extensively use an object-oriented approach where each networked appliance (or the HNS environment) is modeled as an object consisting of properties and methods. Based on the model, we define two types of feature interactions: appliance interactions and environment interactions. An appliance interaction occurs on an appliance object when different services try to invoke methods that perform incompatible updates or references for common properties of the appliance. An environment interaction occurs when methods of different appliances indirectly conflict via the environment object. We conduct a case study of offline interaction detection among several practical service scenarios. It is shown that the proposed framework is quite generic enough to capture the potential interactions in the HNS. We also discuss the feasibility to online detection and several resolution schemes.
I O S PRESS, 2005, Feature Interactions in Telecommunications and Software Systems VIII, 236 - 251, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
This paper presents a new method to tackle the feature interaction problem in Internet telephony with the CPL (Call Processing Language) programmable service environment. To cope with the problems of the programmable service, we first propose a notion of semantic warnings, which are guidelines for non-experts to assure semantic correctness of individual CPL scripts. Then, we define feature interactions as semantic warnings over multiple CPL scripts. On the basis of this definition, we propose a method for detecting feature interactions. We conduct an experimental evaluation with an open-source VoIP system. The results show that the proposed method identifies a semantic redundancy in a ready-made feature and five interactions among pairwise combinations of the features. We also discuss the applicability and limitations from the viewpoint of implementation. (C) 2004 Elsevier B.V. All rights reserved.
ELSEVIER SCIENCE BV, Aug. 2004, COMPUTER NETWORKS, 45 (5), 605 - 624, English[Refereed]
Scientific journal
[Refereed]
International conference proceedings
本論文では,プログラムに含まれる多数の命令をカムフラージュ(偽装)することにより,悪意をもったユーザ(攻撃者)によるプログラムの解析を困難にする方法を提案する.提案方法では,プログラム中の任意の命令(ターゲット)を異なる命令で偽装し,プログラムの自己書換え機構を用いて,実行時のある期間においてのみ元来の命令に復元する.攻撃者がカムフラージュされた命令を含む範囲の解析を試みたとしても,ターゲットの書換えを行うルーチン(書換えルーチン)の存在に気づかない限り,プログラムの元来の動作を正しく理解することは不可能である.解析を成功させるためには,書換えルーチンを含む範囲についても解析する必要があり,結果として,攻撃者はより広範囲にわたるプログラムの解析を強いられることとなる.提案方法は自動化が容易であり,要求される保護の強さ,及び,許容される実行効率の低下の度合に応じて,ターゲットの個数を任意に決定できる.
The Institute of Electronics, Information and Communication Engineers, Jun. 2004, 電子情報通信学会論文誌A, J87-A (6), 755 - 767, Japanese[Refereed]
Scientific journal
[Refereed]
International conference proceedings
To detect theft of Java class files efficiently, we have so far proposed a concept of Java birthmarks. Since the birthmarks are unique and native characteristics of every class file, a class file with the same birthmark of another can be easily suspected as a copy. However, performance and tolerance of the birthmarks against sophisticated attacks had not been evaluated well. To clarify these issues, this paper conducts two experiments. In the first experiment, we demonstrate that the proposed birthmarks successfully distinguish non-copied files in practical Java application (97.8005%). The second experiment shows that the proposed birthmarks are quite tolerant of attacks with automatic program optimizers/obfuscators (93.3876%).
ACTA PRESS, 2004, PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 569 - 574, English[Refereed]
International conference proceedings
Feature interaction is the term used in telephony systems to refer to inconsistent conflict between multiple communication services. Feature interaction is considered a major obstacle to developing reliable telephony systems and many approaches have been explored to resolve it. In this paper we present an automatic method for detecting latent feature interaction in service specifications. This method uses bounded model checking as its basis. The basic idea behind bounded model checking is to reduce the detection problem to the propositional satisfiability (SAT) decision problem. For asynchronous systems like telecommunication systems, however, traditional bounded model checking does not work well because resulting propositional formulas tend to become very large. We propose a new encoding scheme to overcome this problem and show the effectiveness through comparative experiments with traditional bounded model checking and other model checking methods.
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Dec. 2003, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E86D (12), 2579 - 2587, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
This paper addresses a problem to detect feature interactions in a CPL (Call Processing Language) programmable service environment on Internet telephony. In the CPL environment, the previous works cannot be directly applied, because of new complications introduced:(a) features created by non-experts and (b) distributed feature provision. To cope with the problem (a), we propose eight types of semantic warnings which guarantee some aspects of semantic correctness in each individual CPL script. Then, as for (b), we present an alternative definition of feature interactions, and propose a method to implement run-time feature interaction detection. The key idea is to define feature interactions as the semantic warnings over multiple CPL scripts, each of which is semantically safe. We also demonstrate tools, called CPL checker and FI simulator, to help users to construct reliable CPL scripts.
I O S PRESS, 2003, FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS VII, 215 - 230, English[Refereed]
International conference proceedings
This paper presents a method to estimate the cost of mental (hand) simulation of programs. In mental simulation, human short-term memory is extensively used to recall and memorize values of variables. When the simulation reaches a variable reference, the simulation can be performed easily if the value is still remembered. However if not, we have to backtrack the simulation until the value is obtained, which is time-consuming. Taking the above observation into consideration, we first present a model, called virtual mental simulation model (VMSM), which exploits a queue representing short-term memory. The VMSM takes one of the abstract processes recall or backtrack, depending on whether the variable is currently stored in the queue or not. Then, applying cost functions to the VMSM, we derive four dynamic metrics reflecting the cost of mental simulation. In our empirical study, the proposed VMSM metrics reveal that the backtrack process for non-constant variables gives a significant impact on the cost of mental simulation. Since the proposed method can be fully automated, it can provide a practical means to estimate the cost of mental simulation, which can be also used as a program comprehension measure.
IEEE COMPUTER SOC, 2003, NINTH INTERNATIONAL SOFTWARE METRICS SYMPOSIUM, PROCEEDINGS, 351 - 360, English[Refereed]
International conference proceedings
In this paper we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously restores the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.
IEEE COMPUTER SOC, 2003, 27TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 170 - 179, English[Refereed]
International conference proceedings
The programmable service for Internet telephony (VolP) allows end-users or third parties to define their own customized services. However, it imposes a serious drawback that service description created by end-users is likely to contain problems that are semantically ambiguous or inconsistent. To cope with this problem, we have so far proposed semantic warnings, which are the guidelines to guarantee the semantic correctness for the CPL (Call Processing Language) programmable service environment. In this paper, we evaluate the proposed semantic warnings with practical VolP system, VOCAL (Vovida Open Communication Application Library). In the experiment, the proposed warnings revealed a semantic redundancy in a ready-made feature of VOCAL. It is also shown that customized features containing the semantic warnings often led VOCAL to problematic situations. Thus, the proposed warnings can help feature provisioning system to detect semantic flaws in programmable service environment.
IEEE COMPUTER SOC, 2003, ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 552 - 561, English[Refereed]
International conference proceedings
The Call Processing Language (CPL in short, RFC2824) is an XML-based language, which provides a flexible mean to create end-user services in the Internet Telephony (VolP). However, the service description by non-experts does not always guarantee reliable services, thus, could be a cause of system faults. This paper first proposes six classes of the semantic warnings within the CPL scripts. For a given CPL script, the semantic warnings identify the sources of ambiguities, redundancies and inconsistencies, even though the script is syntactically well-formed with respect to the Document Type Definition. Next, we address the problem of Feature Interaction (FI, in short) between multiple CPL scripts, which is a kind of inconsistent conflict between services. We characterize the FIs as the semantic warnings over the multiple CPL scripts. Then, we propose a new FI detection method to combine the multiple CPL scripts and to detect script-to-script interactions. We also discuss architecture to detect achieve the run-time detection of FIs.
IEEE COMPUTER SOC, 2003, 2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 283 - 290, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
Feature interaction is a kind of inconsistent conflict between multiple communication services and considered an obstacle to developing reliable telephony systems. In this paper we present an automatic method for detecting feature interactions in service specifications. This method uses bounded model checking, a SAT-based automatic verification technique.
IEEE COMPUTER SOC, 2002, 2002 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 131 - 134, English[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
Feature interactions (FIs, in short) occur when features of different communication services interfere with each other. The FI filtering is a pre-processing before the FI detection, which roughly, identifies FI-prone service combinations based on simple indications of the FIs. We have previously proposed an FI filtering method at requirements stage using Use Case Maps (UCMs). This method identifies FI-prone service combinations by focusing on changes in user's scenarios before/after the service composition, but does not tell which scenarios in the compound services have a potential of FIs. In this paper, as an extension of the previous method, we propose a new method to derive FI-prone scenarios from the FI-prone combinations obtained by the previous method. From many practical FIs, we first make the following two observations: (a) FI tends to occur in scenarios where both services are activated, and (b) FI tends to occur in scenarios where a service bypasses a feature of the other service. Then, based on the observations, we propose heuristics on the UCM scenario paths to derive FI-prone scenarios. An experimental evaluation demonstrates that the derived scenarios successfully cover all scenarios that lead to actual FIs.
IEEE COMPUTER SOC, 2002, PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 237 - 244, English[Refereed]
International conference proceedings
This paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. We adopt PPPoE (Point-to-Point Protocol over Ethernet) for the user authentication, and integrate IDENT mechanism on the PPPoE server,for the user tracking. We conduct performance evaluation with respect to transfer rate and CPU usage. The evaluation shows that the proposed system achieves excellent performance for its deployment cost. As a result, the proposed method could be a good candidate to add network connectivity in campus networks.
IEEE COMPUTER SOC, 2002, 2002 SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT 2002), PROCEEDINGS, 20 - 23, English[Refereed]
International conference proceedings
[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
This paper proposes a new Feature Interaction (FI) filtering method at the requirements level. Fl filtering is to screen out some irrelevant feature combinations before the FI detection process, by using simple indications that certain combinations are likely to cause FI. To achieve this, we extensively utilize a requirement notation method, called Use Case Maps (UCMs), which helps designers to visualize a global picture of call scenarios. Individual features are added to the basic call by using the stub plug-in concept of UCMs. That is, a set of UCMs describing the feature's functionality are plugged into certain parts (called stubs) of the basic call scenario in a "root" UCM. Thus, each feature is characterized by the stub configuration. Then, we propose a composition method of different stub configurations in terms of a matrix, called a stub configuration matrix. Finally we present an FI filtering method for a given combination, which gives a verdict: (a) FI occurs, (b) FI never occurs or (c) FI-prone. Experimental evaluation using examples taken from the recent FI detection contest shows that almost half of the feature combinations can be filtered without costly feature analysis. This suggests that the number of feature combinations to be analyzed with more expensive FI detection methods can be reduced to half by using the proposed method as a front end of the detection process.
IOS PRESS, 2000, FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS VI, 163 - 178, English[Refereed]
International conference proceedings
Feature interaction detection determines whether interactions occur or not between the new and existing telecommunication services. Most of conventional detection methods on state transition model utilize an exhaustive search. The exhaustive search is fundamentally very powerful in the sense that all interactions are exactly detected. However, it may suffer from the state explosion problem due to the exponential growth of the number of states in the model when the number of users and the number of features increase. In order to cope with this problem, we propose a new detection method using a state reduction technique. By means of a symmetric relation, called permutation symmetry, we succeed in reducing the size of the model while preserving the necessary information for the interaction detection. Experimental evaluation shows that, for practical interaction detection with three users, the proposed method achieves about 80% reduction in space and time, and is more scalable than the conventional ones especially for the increase of the number of users in the service.
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Oct. 1999, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, E82D (10), 1352 - 1363, English[Refereed]
Scientific journal
[Refereed]
Scientific journal
Feature Interaction (FI) is known as a kind of inconsistent conflicts between new and existing services on the telecommunication networks. In order to detect and eliminate FI, FI testing is needed which checks whether FI occurs or not for given multiple services. In this paper, we first introduce practical examples of FI and then formulate FI testing problem using finite state machine. Next, we review the conventional testing methods. Since the conventional methods generally utilize exhaustive state enumeration for the testing, thus so-called state explosion problem becomes a bottle-neck for the testing. To avoid this, we propose a new approach by means of P-invariants of Petri net. Theoretically, the P-invariants method provides only necessary condition for FI testing. However, experimental results shows that it essentially works as necessary and sufficient condition for practical services, and that it realizes much more efficient testing than the conventional ones. Therefore, the proposed approach is well applicable to practical FI testing. (C) 1998 Elsevier Sciences B.V. All rights reserved.
ELSEVIER SCIENCE BV, Dec. 1998, INTEGRATION-THE VLSI JOURNAL, 26 (1-2), 211 - 223, English[Refereed]
Scientific journal
Most of conventional interaction detection methods on FSM model utilize an exhaustive search to identify undesirable states at which interactions occur. The exhaustive search is fundamentally very powerful in the sense that all interactions are exactly detected. However, it may suffer From the state explosion problem due to the exponential growth of the FSM when the number of users and the number of features increase. In order to cope with this problem, we propose a new detection method using a state reduction technique of the FSM. By means of a symmetric relation. called permutation symmetry, we succeed in reducing the size of the FSM with preserving the necessary information for the interaction detection. As a result, we can exactly identify any interactions defined on the original FSM with smaller state space and time. Experimental evaluation shows that, for practical interaction detection with three users, the proposed method achieves about 80% reduction in space and time, and is more scalable than the conventional ones especially for the increase of the number of users in the service. Thus, the proposed detection method enables us to verify complex services with many users.
I O S PRESS, 1998, FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS V, 187 - 201, English[Refereed]
International conference proceedings
Design of practical routing protocols is complex and difficult due to complicated requirements of fault-tolerance and flexibility. The protocol is defined to be fault-tolerant if messages can be rerouted via another path when the communication channel fails. In this paper, we propose a new synthesis method for generating a fault-tolerant routing protocol for a given service specification and a network topology. The routing protocol thus obtained adopts a multipath routing augmented with sets, where each set stores the next nodes for routing, and updates the sets according to network topology changes. Additionally, the routing protocol can attain flexibility by the multipath routing mechanism in the sense that only a small amount of changes is needed for addition or deletion of nodes. Finally, we show the effectiveness of the proposed method through an application to a typical routing service of message delivery from a source node to a destination node.
I E E E, COMPUTER SOC PRESS, 1997, THIRD IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 96 - 105, English[Refereed]
International conference proceedings
Non-deterministic feature interaction is one of the most typical feature interactions such as the one between CW & CFV features. The conventional detection algorithm for this interaction generally requires the reachable state enumeration, which may cause the state explosion problem. As a result, it takes a lot of time and space when it is applied to complex services including many users. To resolve this problem, we have already devised a new detection algorithm based on a Petri-Net model. The new method is characterized by the P-invariant of the Petri-Net which is utilized to check the reachability of the states. Since the checking is efficiently carried out without any state enumeration, we can reduce both the time and space drastically. However, the P-invariant generally gives only necessary condition and thus may detect non-determinism which does not actually occur. So, in this paper, Eve evaluate the new algorithm from two viewpoints: detection quality and scalability, through experiments. In the experiments, we have prepared live service specifications for the practical telecommunication services. The experimental results show that the new algorithm achieves such high detection quality that all detected non-determinisms actually occur, and also has a good scalability for complex services such as teleconference including many users. Thus, the Petri-Net based detection method enables us to verify non-deterministic feature interactions in the more complex communication service specification.
I O S PRESS, 1997, FEATURE INTERACTIONS IN TELECOMMUNICATION NETWORKS IV, 138 - 152, English[Refereed]
International conference proceedings
The non-deterministic behaviors in. telecommunication services are well-known. as one of the most typical Feature interactions, and they should be detected and eliminated from the telecommunication service specifications. The conventional analysis method of this nondeterminism is based on reachability analysis. Since the method must exhaustively enumerate all reachable global states, it cannot be applied to the complex communication services which include many users. In this paper, we propose an alternative method based on a Petri-net model. The method constructs a logically equivalent Petri-net for a given service specification, and obtains a set of states which cause the non-deterministic behaviors using rules in the service specification. Then, the method identifies states in the set which are not reachable from the initial slate using P-invariant of the Petri-net, and deletes them from the set. ils P-invariant is utilized as the necessary condition, rue must finally apply reachability analysis to states in the resultant set. Since the number of states in the resultant set may be reduced to relatively small, the new method enables us to analyze the more complex services.
I E E E, COMPUTER SOC PRESS, 1997, IEEE INFOCOM '97 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1253 - 1260, English[Refereed]
International conference proceedings
Constructing communication protocols from component service specifications, each of which specifies a subfunction of the target protocol, enables efficient development of a large and complex communication protocol. Concerning this construction, related techniques have been already proposed: integration of component protocol specifications into a single protocol specification and transformation of service specifications to protocol specifications. However, the integration needs special knowledge of communication protocols, and the transformation requires that a large and complex service specification should be developed as input to produce the target protocol. In order to cope with these problems, this paper proposes a new method which at first integrates component service specifications into a single service specification, and then transforms the service specification into the target protocol by a protocol synthesis technique. The most important point of view is that component integration is performed at the service specification level rather than the protocol specification level. Additionally, we define a class of 'welI-formed' service specification which ensures correctness of the target protocol. As a result, the integration and transformation can be efficiently executed in small state space without special knowledge of communication protocols. Finally, we have shown the effectiveness of the proposed method by constructing a part of the real-life OSI protocol FTAM.
ELSEVIER SCIENCE BV, Dec. 1996, COMPUTER COMMUNICATIONS, 19 (14), 1200 - 1215, English[Refereed]
Scientific journal
[Refereed]
International conference proceedings
[Refereed]
International conference proceedings
In the conventional protocol synthesis, it is generally assumed that primitives in service specifications cannot be executed simultaneously at different Service Access Points (SAPs). Thus if some primitives are executed concurrently, then protocol errors of unspecified receptions occur. In this paper, we try to extend a class of service specifications from which protocol specifications are synthesized by the previous methods. We first introduce priorities into primitives in protocol specification so that it always selects exactly one primitive of the highest priority from a set of primitives that can be executed simultaneously, and executes it. Then, based on this execution ordering, we propose a new protocol synthesis method which can avoid protocol errors due to message collisions, communication competitions and so on. By applying the proposed synthesis method, we can automatically synthesize a protocol specifications from a given service specification which includes an arbitrary number of processes and allows parallel execution of primitives.
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, Oct. 1994, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E77A (10), 1634 - 1645, English[Refereed]
Scientific journal
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Summary national conference
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
[Refereed]
Technical report
Summary national conference
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
Technical report
[Refereed]
Technical report
[Refereed]
Technical report
Technical report
[Refereed]
Summary international conference
[Refereed]
Summary international conference
[Refereed]
Summary international conference
[Refereed]
Summary international conference
[Refereed]
Summary international conference
Summary national conference
Home network system (HNS) provides a variety of value-added services by orchestrating house-hold appliances and sensors. In our previous research, we have proposed Cloud HNS that delegates all of HNS functions to Cloud. In this paper, we propose IRaaS (Infrared as a Service) which controls legacy house-hold appliances based on infrared signal controlling, as a Cloud HNS service. IRaaS is consist of two components, IR Proxy and jRemocon. IR Proxy is a service that delegates control request to jRemocon, and jRemocon is a device that transmits infrared signal to execute appliance control. Using its components, IRaaS executes requested appliance control. Then, we design and consider elements required for implementing IRaaS, and we also create and test a prototype. Based on these results, we discuss the effectiveness of proposed system.
The Institute of Electronics, Information and Communication Engineers, Jan. 2015, 電子情報通信学会技術研究報告, 114 (439, IA2015-79), 67 - 72, JapaneseWe have been developing a novel home network system, called Cloud-HNS, which manages home servers and all the services within a cloud. The HNS services often use house log which is log data gathered from the environment and devices in a house. Since the house log contains security-privacy information, the house log must be managed carefully in cloud-HNS. In this paper, we propose a new architecture to manage the house log in the cloud-HNS. In the proposed architecture, for every house, a dedicated virtual home server manages the private log of the house. Also, a shared virtual city server is deployed to manage public de-identified data. The virtual home server provides home services for individual household, whereas the virtual city server provides smart city services using the data gathered from multiple houses within the city. In this paper, we also develop a prototype system that collects house log in the cloud, using a sensor box and Raspberry Pi.
The Institute of Electronics, Information and Communication Engineers, 24 Oct. 2014, IEICE technical report. SC, Services Computing, 114 (277), 55 - 60, Japanese我々のグループでは,ホームサーバやサービスを全てクラウドで管理する新たなホームネットワークシステム (HNS) 「クラウド型 HNS」 の研究開発を行っている.HNS サービスは宅内の機器や環境のログデータ (住宅 ログ) を利用するが,住宅ログにはセキュリティ・プライバシ情報が含まれるため,クラウドでの管理には注意が必要である.本論文では,クラウド型 HNS において住宅ログを管理するための新たなアーキテクチャを提案する.提案アーキテクチャでは,各家のプライベートなログを管理する仮想ホームサーバと,匿名化された公開可能なログを町単位で管理する仮想シティサーバで構成する.仮想ホームサーバは家ごとのホームサービスを提供し,仮想シティサーバは町中の HNS から収集したデータを活用したスマートシティサービスを提供する.また本論文では,各家からクラウドに住宅ログを収集するシステムをセンサボックスと Raspberry Pi を用いて試作する.We have been dev
17 Oct. 2014, 研究報告教育学習支援情報システム(CLE), 2014 (10), 1 - 6, JapaneseRecently, research and development have been conducted on the Indoor Positioning System (IPS), which identifies locations of various indoor objects. The indoor location is promising to achieve sophisticated Indoor Location-Aware Services (InLAS), and some practical services come onto market. However, the conventional system does not supposed to reuse the data and program of the indoor locations of another system. This makes the system complex and difficult to manage. To cope with the problem, this paper presents Data Model for Indoor Location (DM4InL), which prescribes a common data model independent of implementation of IPS or the usage of InLAS. The proposed DM4InL represents the location of every indoor object in a standard way, by using three kinds of models: position, building and object models. The proposed method achieves loose-coupling of InLAS and IPS, which significantly improves the efficiency and reusability in the InLAS development.
The Institute of Electronics, Information and Communication Engineers, 07 Mar. 2014, IEICE technical report. Life intelligence and office information systems, 113 (479), 101 - 106, JapaneseThe programmable remote control system is a convenient tool that can consolidate multiple controllers of various house-hold appliances. It is also adopted in the emerging home network systems. However, the control signals of appliances are registered and maintained within individual home, which imposes a heavy burden on a home user. To cope with the problem, this paper presents Remocon as a Service (RaaS), an appliance remote controller service using the cloud computing. The key idea is to manage and share all the control signals within the cloud, and provide the signals as service for various users and applications. By using the cloud, RaaS overcomes the problem of the signal registration and management. It also decouples the feature of remote control from user interface, which achieves a variety of remote control applications. In this paper, we focus on the conventional infrared remote control (IrDA), and discuss the architecture, primary databases, and user interface of RaaS. We also implement a prototype of a signal transmission module of RaaS using Raspberry Pi and LIRC, in order to see practical feasibility.
The Institute of Electronics, Information and Communication Engineers, 13 Feb. 2014, 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 113 (432), 1 - 6, JapaneseIn the current information technology society where the cloud services are generally spread, it is a societal and important challenge to promote cloud computing education. In this paper, we propose a framework of virtual load simulation which replicate the response time to conduct auto scalling exercise in cloud education curriculum. The proposed framework replicate the response time of cloud services by using thread waiting methods such as sleep command. This allows us to have experience of virtualized auto scalling situation without actual load to physical computing resources. In addition, we report expertise obtained in an actual auto scaling exercise which conducted as a part of ministry's educational program.
The Institute of Electronics, Information and Communication Engineers, 10 Jan. 2014, IEICE technical report. SC, Services Computing, 113 (376), 7 - 12, JapaneseWe have proposed a logging platform, called Scallop4SC(Scalable Logging Platform for Smart City), for managing various and large-scale log data from smart houses within a smart city. Moreover, we design that Scallop4SC provides MVaaS(Materialized View as a Service), which supports processing and using house log efficiently. In this paper, we implement an architecture of MVaaS using MapReduce on Hadoop and HBase KVS. Concretely, MVaaS automatically generates MapReduce programs with a spec for processing log data. The spec are drawn based on retrieval conditions or processing method for house log. By treating MVaaS, a developer of an application can dynamically create and efficiently access smart city data by only describing data specification for the application.
The Institute of Electronics, Information and Communication Engineers, 19 Dec. 2013, IEICE technical report. Information networks, 113 (363), 95 - 100, JapaneseThe mobile environmental sensing, where mobile users measure surrounding information with hand-held sensors, is a powerful means of the participatory sensing. We are studying the personal sensor box, by which individual user performs personalized mobile sensing with favorite sensors. This paper presents an application framework for the personal sensor box that enhances the flexibility of the applications towards the variety of sensor configurations. The proposed framework consists of three layers: (1) ConcreteSensor Layer, wrapping sensor devices and implementing device-specific operations, (2) AbstractSensor Layer, abstracting the devices with common sensor operations, (3) SensorBox Layer, aggregating multiple sensors and providing measured data for various applications. The proposed framework allows a user to flexibly customize his sensor box, and to easily implement applications using the customized box. We develop a prototype of a personal sensor box with 9 kinds of Phidgets sensors.
The Institute of Electronics, Information and Communication Engineers, 28 Nov. 2013, IEICE technical report. Life intelligence and office information systems, 113 (327), 51 - 56, JapaneseWith the spread of Machine-to-Machine (M2M) and cloud services, we have become to be able to use heterogeneous and distributed data. Implementation of the service which judges the context and controls autonomous from these data is expected. We have previously proposed the framework, which can create and manage in a unified manner context-aware services using heterogeneous and distributed Web services (sensor services, information system, state of appliance services and so on). The proposed framework consists of five layers and we define the context based on the data of the existing Web services, and then define the context-aware service by the ECA rule that is a set of event, condition and action. In this paper, we implement a platform based on the framework. The platform has the functions to register, delete, get and edit elements in each layer and to run the services. We implement these using Java, and publish APIs as the Web service.
The Institute of Electronics, Information and Communication Engineers, Nov. 2013, 電子情報通信学会技術報告, 113 (327, LOIS2013-36), 71 - 76, JapaneseWe have proposed a framework called SO-MSR (Service-Oriented Mining Software Repository), which applied service-oriented architecture to MSR techniques. Following the SO-MSR, we have developed a web service, named MetricsWebAPI, for metrics calculation from a variety of software repositories and a variety source codes. One of the challenges of MetricsWebAPI is low usability in terms of response time for MSR processing requests. The goal of this paper is to improve service interaction for MSR services deployed in SO-MSR. In this paper, we apply a caching mechanism and asynchronous API to MSR services. In MSR processing, all of repository data are past logs and processed result can be reused to other MSR services if once MSR applied to the repository data. Asynchronous API realizes parallel and batch processing to MSR services. We have conducted a experimentalevaluation to confirm the efficiency of applying a caching mechanism to MSR services.
Information Processing Society of Japan (IPSJ), 17 Oct. 2013, IPSJ SIG Notes, 2013 (12), 1 - 6, JapaneseIPSJ Special Interest Group of Software Engineering (SIGSE) holds a workshop focusing on deep discussion among participants once a year. In the fiscal year of 2012, we had a workshop in Nasu, Tochigi prefecture, January 2013. We had a deep discussion about recent issues and future direction of software engineering. In this paper, we report each discussion held in each special theme session and the whole workshop.
Information Processing Society of Japan (IPSJ), 10 Jul. 2013, IPSJ SIG Notes, 2013 (11), 1 - 8, Japanese[Refereed]
We have previously developed a voice control system for a home network system (HNS), using a microphone array technology. Although the microphone array achieved a convenient hands-free controller, a single array had limitations on coverage of sound collection and speech recognition rate. In this paper, we try to overcome the limitations by increasing the number of the microphone arrays. Specifically, we construct a microphone array network using four separate arrays, and enhance algorithms of sound source localization (SSL) and sound source separation (SSS) on the network. We also conduct an experimental evaluation, where precision of SSL and speech recognition rate are evaluated in a real HNS test-bed. As a result, it is shown that the usage of multiple arrays significantly improves the coverage and speech recognition ratio, compared with the previous system.
The Institute of Electronics, Information and Communication Engineers, Jan. 2013, 電子情報通信学会技術研究報告, 112 (388), 19 - 24, English[Refereed]
Our long-term goal is to establish a generic datastore and a service platform for bigdata where heterogeneous applications can share and use the bigdata horizontally. The emerging key-value store (KVS), including HBase, has been proven to be useful for managing the bigdata. However, design of a KVS-based datastore often depends heavily on the application how the data is used and searched. This significantly declines generality and extensibility of the datastore. In this paper, we present a design method of HBase tables that achieves generic data search by various attributes. The key idea is to construct an index table in which all permutations of attribute values are used as row keys, pointing to contents of a main data table. The index table allows efficient data retrieval by any attribute specified by applications. A case study using smart city log illustrates practical feasibility of the method.
The Institute of Electronics, Information and Communication Engineers, 09 Nov. 2012, IEICE technical report. SC, Services Computing, 112 (299), 1 - 6, JapaneseSmart city is a next-generation city planning. In the smart city, some value-added services are provided using wide variety of logs collected from various appliances and sensors. In our previous work, we have been proposed and developed a smart city platform, called Scallop4SC that supports collecting and processing the extremely large-scale log data. This system stores variety of logs on key-value store, and supports the statistical processing of the logs on Hadoop. And we designed a meta-data scheme for smart city configuration information, designed Scallop4SCAPIs for accessing stored logs and meta-data. In this paper, we implement storing house logs and Scallop4SCAPIs based on previous work, and implement concrete application using Scallop4SC. And we discuss about the current state of Scallop4SC.
The Institute of Electronics, Information and Communication Engineers, Nov. 2012, 電子情報通信学会技術研究報告, 112 (305), 27 - 32, JapaneseThe researches of value-added services by using data measured by mobile terminal such as smartphone and GPS are caught on. In these researches, the devices that measure the user such as accelerometer and GPS are mainly used. On the other hand, environmental data like temperature and humidity is measured by fixed devices. It enables to get detailed and valuable information by means of that users privately measure these data by mobile terminal. In this paper, we discuss that what kind of value-added services can be realized by users carrying on the mobile sensors and measuring the environmental data. We also carry out the case study with prototype of mobile sensor.
The Institute of Electronics, Information and Communication Engineers, Nov. 2012, 電子情報通信学会技術研究報告, 112 (307), 1 - 6, JapaneseThis paper reports on "Winter Workshop 2012 in Biwako(WW2012)", which was held at Biwako Conference Center in Hikone, Shiga from January 19 through 20, 2012.
Information Processing Society of Japan (IPSJ), 25 Oct. 2012, IPSJ SIG Notes, 2012 (12), 1 - 8, JapaneseThis paper reports on "Winter Workshop 2012 in Biwako (WW2012)", which was held at Biwako Conference Center in Hikone, Shiga from January 19 through 20, 2012.
The Institute of Electronics, Information and Communication Engineers, 25 Oct. 2012, Technical report of IEICE. SS, 112 (275), 67 - 74, Japanese本研究では,家庭内での省エネを実現方法として,生活者によるピークカットを目指し,個人の省エネ意識を向上するアプリケーション,ピークカッターを提案,実装する.ピークカッターはホームネットワークシステム(HNS)と連携し,消費電力がピークを超えると住人のスマートフォンに通知する.生活者は機器毎の使用電力を画面で確認し,つけっぱなしや無駄な使用があれば,遠隔で機器の電源を制御する.To encourage residents to reduce peak demand of electricity, we propose and implement a smartphone application, named Peak Cutter. This application works within a home network system (HNS), and notices a peak electricity demand via their smartphone. Residents can confirm power consumptions for each home appliance, and can remotely control the home appliacnes.
Aug. 2012, 情報処理学会研究報告, 2012-MBL-63 (4), 1 - 7, JapaneseReport scientific journal
Smart city is a next-generation societal concept which aims to provide low-carbon and sustainable social infrastructure. In the smart city environment, wide variety of city data are retrieved from sensors. Social services are provided from the collected data for smart city residents. In this paper, we propose a smart city platform, called Scallop4SC that supports collecting and using the extremely large-scale log data. The Scallop4SC constructs a distributed multi-node infrastructure using Hadoop and HBase, and provides high-scalablity and high-performance data processing for petabyte scale data. We conduct an experimental performance evaluation of the proposed platform using actual house log obtained in our smart home environment Based on the results, we discuss the applicability of Scallop4SC in city scale log data processing.
The Institute of Electronics, Information and Communication Engineers, Mar. 2012, 電子情報通信学会技術研究報告, 111 (470), 207 - 212, JapaneseWe have previously proposed ReceiptLog, which stores user's purchase histories from daily receipts for various application and services. In this paper, we propose and implement consumer-oriented lifelog mining service, called ReceiptLog mining service. ReceiptLog mining service provide user potential value add information by using user's purchase history. Concretely, we implement mining service which analyzes purchase history from perspective of Recency, Frequency and Monetary.
The Institute of Electronics, Information and Communication Engineers, Mar. 2012, 電子情報通信学会技術研究報告, 111 (470), 189 - 194, JapaneseThis paper presents an application framework, called MashMap framework, which facilitates development of location-based lifelog services. The proposed framework imports various types of location log data, and stores them in a database with the Life Log Common Data Model (LLCDM). A developer first creates a data source consisting of a filter and a display format. The filter extracts necessary data from the database, while the display format defines how the data is shown on the map. The developer then defines a MashMap by choosing a single or multiple data sources. The MashMap is an object, which aggregates several data sources on a single map, shown in the designated display format. The object is finally visualized on a Google Map by MashMap renderer. We conduct a case study developing a travel log review service and a conference history map using MashMap framework.
The Institute of Electronics, Information and Communication Engineers, Mar. 2012, 電子情報通信学会技術研究報告, 111 (470), 183 - 188, JapaneseThe integrated services of the home network system (HNS) orchestrate multiple networked home appliances to achieve value-added and comfortable services for home users. If multiple services are used at the same time, functional conflicts may occur among the services, which results in unexpexted behaviors. This is known as feature interactions (FIs). We defined two kinds of FIs : appliance interactions and environmental interactions. Due to lack of the degree of environmental impact and explicit consideration of requirements, the previous formalization tends to overestimate many acceptable cases as feature interactions. To capture the environment interaction more precisely, this paper introduces an environment impact model, describing how much impact is given to the environment by each appliance operation within a service. We also describe user requirements by environment properties evaluated within the model. Then, the environment interaction is formalized as the unfulfilled requirement caused by the use of multiple services.
The Institute of Electronics, Information and Communication Engineers, Oct. 2011, 電子情報通信学会技術研究報告, 111 (255), 67 - 72, JapaneseWe have been studying and developing the home network system (HNS), which provides value-added services by orchestrating home appliances, equipments and sensors via network. Our HNS periodically records status of every device within the system. The records, called device status log, can be used for various value-added services. In this paper, we implement the system that automatically search various status of home users, using the device status log. Also we demonstrate its feasibility through a case study of detecting energy-wast ing behaviors.
The Institute of Electronics, Information and Communication Engineers, Oct. 2011, 電子情報通信学会技術研究報告 CPSY2011-36, 111 (255), 73 - 78, JapaneseThe home network system (HNS), which provides value-added services by orchestrating networked home appliances, equipments and sensors, attracts great attention to realize the next-generation smart home. Implementing the location-aware services within the the HNS context is one of greatest challenges, where the appropriate services are performed based according to the location of the inhabitants. We have been studying the technologies of sound source localization and sound source separation using networked multiple microphone arrays. In this paper, we conduct a feasibility study of applying the microphone array network to the location-aware services within the HNS. Specifically, we first present three kinds of home services using illustrative examples. We then enumerate three kinds of requirements (accuracy requirement, installation requirement, user requirement), which are essential for implementing the location-aware home services using the microphone array network. In a preliminary experiment, we evaluate the accuracy requirement using an actual microphone array. Moreover, we conduct a directivity shape simulation assuming multiple arrays.
The Institute of Electronics, Information and Communication Engineers, Oct. 2011, 電子情報通信学会技術研究報告, 111 (256), 61 - 66, Japanese2011 年 1 月 20 日,21 日の 2 日間に伊豆・修善寺のラフォーレ修善寺にて開催したウィンターワークショップ 2011・イン・修善寺 (WW2011) の概要について報告するThis paper reports on "Winter Workshop 2011 in Shuzenji(ww2011)" held at LAFORET SHUZENJI HOTEL in Izu City, Shizuoka Prefecture from 20th to 21st January, 2011.
14 Jul. 2011, 研究報告ソフトウェア工学(SE), 2011 (11), 1 - 9, JapaneseWe have been studying the personalized energy-saving behaviors using the Home Network System (HNS). In this paper, we propose a method that finds personalized energy-saving behaviors in air conditioning services. Specifically, we first extract user's preference to energy-saving, air conditioning and appliances, by conducting a preliminary questionnaire. Using the preference of each user, we then formulate an optimization problem on preferred appliance operations and the power consumptions. By solving the problem, we derive a personalized energy-saving air-conditioning service. To demonstrate the effectiveness, we conduct an experiment with fifteen subjects in an actual HNS.
The Institute of Electronics, Information and Communication Engineers, Jul. 2011, 電子情報通信学会技術報告 IN2011-63, Vol. 111, No. 146, pp.105-110 (146), 105 - 110, JapaneseReport scientific journal
We have previously proposed an application framework of personal remote controller, which allows users topersonalize the remote controllers in Home Network System. However, the framework required users to define the layoutin XML format, which is a quite tedious and unreliable task. To cope with the problem, we implement a graphical userinterface, which intuitively supports users to perform efficient creation of the personal remote controller definitions. We also conduct an experimental evaluation, where the subjectscreate own remote controllers on the Android smart phones foran actual home network system.
The Institute of Electronics, Information and Communication Engineers, Jul. 2011, 電子情報通信学会技術研究報告 LOIS2011-11, 111 (152), 13 - 18, JapaneseIn order to support efficient integration of heterogeneous lifelog services, we have previously proposed the lifelog common data model (LLCDM) and the lifelog mashup API (LLAPI). In this paper, we evaluate the efficiency of the LLCDM and the LLAPI through a practical application development project. Specifically, we implement two versions of an integrated lifelog application with and without the LLCDM and the LLAPI. We compare the two versions from viewpoints of the quality of the product as well as the efficiency of the development process.
The Institute of Electronics, Information and Communication Engineers, Jun. 2011, IEICE Technical Report, 111 (107), 29 - 34, EnglishThe voice control is an easy and effective method to operate heterogeneous devices in the home network system (HNS). However, as the user is getting used to the interface, too much feedback from the system annoy the user and decline the usability. In this paper, we empirically evaluate the habituation effect on the voice control in the HNS. Specifically, we characterize the habituation effect by the time since the system begins the feedback until the user issues the next command. Based on the empirical study, we consider a voice feedback method that adapts the individual habituation.
The Institute of Electronics, Information and Communication Engineers, Jun. 2011, IEICE Technical Report, 111 (107), 47 - 52, EnglishWe have previously implemented the receipt service platform, where consumers can digitize their own receipts for various applications and services. In this paper, we develop a consumer-oriented lifelog service, called ReceiptLog, by using the receipt service platform. Using the purchase history obtained from the receipts, the ReceiptLog extensively supports every end user to review daily life from financial and living viewpoints. Moreover, we also study more value-added services by integrating other lifelog services with the ReceiptLog.
The Institute of Electronics, Information and Communication Engineers, Jun. 2011, In IEICE Technical Report, 111 (107), 23 - 28, English[Refereed]
Consumer's past purchase data has been used to tool and to serve for the seller and suppliers of the trend analysis and the sales strategy decision, etc. so far. In this paper, it proposes "consumer-oriented lifelog services" which is used to suport their facet of living and health aspect. Concretely, the end user oneself accumulates receipt information as a life log, and service that supports health aspects on the life side of the user is examined. Moreover, we design API that becomes useful for implementation service. In addition, we think that when oriented-lifelog it aims at the achievement of high service of the additional value or more by combining with other life log services.
The Institute of Electronics, Information and Communication Engineers, Nov. 2010, IEICE technical report, 110 (Vol.110 No.281,pp.95-100), 95 - 100, JapaneseWe have previously proposed the LifeLog Common Data Model (LLCDM) to aggregate heterogeneous lifelog data, and the LifeLog mashup API (LLAPI) to access the standardized data. The LLAPI was implemented as a set of Perl libraries that access the local file system storing XML data of the LLCDM. Therefore, it had a performance bottleneck, and was poor in the portability. To cope with these problems, we re-engineer the LLCDM and the LLAPI with the relational database MySQL and the Web services, respectively. The experimental evaluation shows that the performance of the new implementation achieves 23 to 275 faster than the previous one.
The Institute of Electronics, Information and Communication Engineers, Nov. 2010, 電子情報通信学会技術研究報告, 110 (281), 101 - 106, JapaneseThe home network system (HNS, for short) provides value-added and context-aware services for home users, by orchestrating networked home appliances and sensors. Although the HNS services have been developed by system vendors, there exist strong needs that the end-users create their own services according to their convenience. This paper presents a novel service creation environment, called Sensor Service Binder (SSB), which provides a user-friendly interface for creating context-aware services within the HNS. Built on top of the service-oriented HNS, the SSB allows non-expert users to register contexts using the sensors, and to bind the registered context to any operation of the networked appliances. Experimental evaluation with an actual HNS showed that the effort for service creation was reduced to 10% by introducing the proposed SSB.
The Institute of Electronics, Information and Communication Engineers, 16 Aug. 2010, IEICE technical report, 110 (172), 7 - 12, English2010 年 1 月 21 日,22 日の 2 日間に倉敷市芸文館 (岡山県倉敷市) にて開催したウインターワークショップ 2010・イン・倉敷 (WW2010) の概要について報告するThis paper reports on "Winter Workshop 2010 in Kurashiki (WW2010)" held at Kurashiki Geibunkan in Kurashiki City, Okayama Prefecture from January 21th to the 22th.
情報処理学会, 25 May 2010, 研究報告ソフトウェア工学(SE), 2010 (18), 1 - 8, JapaneseAs one of the major Home Network System, the integrated service of networked home appliances are proposed. When such integrated services are executed simultaneously, functional conflicts can occur between the functions of each appliance. Such conflicts are called Feature Interaction in HNS. In our precedence research, we proposed an feature interaction detection and resolution mechanism based on service-oriented architecture (SOA). In this paper, we propose new software development process for integrated services in HNS. In our process, we adopt a specification template for integrated services, simulation for feature interactions detection and resolution, and automatic transformation service specifications into implementations. In our comparative experiment, we confirmed our development process is more useful to develop reliable integrated services effectively than that of conventional development.
The Institute of Electronics, Information and Communication Engineers, Mar. 2010, 電子情報通信学会技術研究報告, IEICE-109 (IEICE-SS-456), 25 - 30, JapaneseIn the future ubiquitous network, it is expected to realize an adaptive service platform, which dynamically integrates various service resources to provide adaptive and context-aware services. This paper presents a service registry, called Ubi-Regi, in order to support efficient and dynamic discovery of service resources in the ubiquitous network. Ubi-Regi categorizes every service operation into one of three types: Source, Transformation or Sink service, to define the scope of the operation within the real and IT worlds. Also, it associates every resource with the physical location and the goal keywords, so that the resource can be searched by place or purpose. This paper first conducts data modeling of Ubi-Regi. We then design and implement Ubi-Regi APIs as data accessors. We demonstrate its feasibility through a case study of the environment migration service in a home network system.
The Institute of Electronics, Information and Communication Engineers, Mar. 2010, 電子情報通信学会技術研究報告, 109 (456), 19 - 24, JapaneseIn a home network system, a context-aware application is one of the value-added services. The application controls various appliances based on a context which is estimated by various sensors in the home network system. In our precedence research, we proposed "a Sensor Service Binder(SSB)" which facilitate the development of the context-aware applications by integrating the context and the appliance. However, our SSB needs the contexts and the appliances information which are registered by specialist, in advance. In order to register the contexts, a developer must know sensors which is used in the contexts, and define the condition equation by himself. In this paper, we propose SSB 2.0 supporting to register contexts by end-users. The SSB 2.0 realizes a sensor search service with using place information of sensors, and a context search service with using context registration history. Our SSB 2.0 supports a series of the development process from the context registration to the context and appliance integration for the context-aware application.
The Institute of Electronics, Information and Communication Engineers, 03 Dec. 2009, IEICE technical report, 109 (327), 59 - 64, Japanese[Refereed]
This paper reports on "Winter Workshop 2009 in Miyazaki (WW2009)"; held in Miyazaki City from 23rd to 24th January 2009.
一般社団法人情報処理学会, 21 May 2009, IPSJ SIG Notes, 2009 (20), 1 - 7, JapaneseVarious Home Network System (HNS) services are being widely developed. HNS appliance information and its data structure in such conventional services differ. As a result, the services and HNS appliances are tightly-coupled. This causes the implementation of the services becomes more complicated. In this paper, we propose a hierarchical HNS appliance data model for improving reusability. Our data model has three layered structures (1) Standardized appliance class information independent of several HNS environment (2) Appliance information included in a HNS environment independent of services (3) Service-specific appliance information. We applied the data model for multiple services, and verified effectiveness.
The Institute of Electronics, Information and Communication Engineers, 26 Feb. 2009, IEICE technical report, 108 (462), 1 - 6, JapaneseThe building automation system (BAS, for short) provides efficient management features of building equipments as well as various value-added services. According to the progress of network infrastructure, it is expected, in the near future, to achieve more value-added and sophisticated services by integrating multiple BASs over the network. However, the integration of heterogeneous systems yields complexity of the systems as well as the service interaction problem. To cope with these problems, we propose a modeling method for the BAS. Specifically, we characterize a BAS by sets of equipments and service scenarios achieved by the equipments. We then formulate conditions that the system itself operates consistently and compatibly. We also present a method for detecting service interactions between multiple BASs. Using the proposed model, we have conducted a case study, where 10 practical systems and 33 service scenarios were analyzed. Moreover, for 466 pairs of service scenarios, we could successfully detect 34 service interactions.
Information Processing Society of Japan (IPSJ), Mar. 2008, 情報処理学会研究報告, 2008 (29), 179 - 186, JapaneseMany value-added services for building controls have come onto market recently. Most of the conventional systems adopt a closed communication architecture, where each system controls target building equipments by a proprietary protocol. In this paper, we propose a framework that can create new value-added services by integrating the existing systems. To achieve this, we extensively use the service oriented architecture (SOA). We also discuss the safety issues caused by the functional conflicts among heterogeneous services.
The Institute of Electronics, Information and Communication Engineers, Oct. 2007, 電子情報通信学会技術研究報告, 107 (261), 3 - 8, JapaneseThe users of Web service have been given chances to select the high quality services from many services, because of the increase of Web services with the advances of Web service technology. Some technologies which measure the quality of Web service quantitatively are needed to compare the quality as services. However, many existing studies focus on the individual Web service, therefore there is no effective methods of quality measurement is established for integrated Web service. In this paper, we propose a method which estimates the quality statistically as one of the methods of quality measurement for integrated Web service. Associating an operation with each of structural constructs derived, we translate the given workflow into a formula, from which we derive the estimation of the response time and the availability of the composite Web service.
The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106 (578), 465 - 470, JapaneseRecently, some researches and developments of Event Driven Architecture (EDA) are in progress. This architecture is distinctive by invoking Web services by the specific event defined by users. The specification of many EDA frameworks can be complex and huge scale sometimes because it is designed to correspond to every kind of events. Therefore, there is large amount of cost when applying this architecture to the Web service which handles only specific events. In this paper, we propose a Web services invocation framework "WS-Schedule Manager" which is specified with "Time event." The framework invokes a Web service at the specified time after a user set the Web service, parameters and their time schedules. The specification of this framework is compact and lightweight to execute because it is specialized to handle the time driven invocation of Web service, so this framework can be used by embedding various Web service applications. We also consider about some case studies such as wakeup service on Home Network System in this paper.
The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106 (578), 459 - 464, JapaneseHome network system which includes networked home appliances and a home network are becoming popular remarkably. As a result, the several value added services to integrate multiple networked appliances are being provided by the home network system. In this paper, as the kind of a new value added service, we propose a room state migration service. This service supports to integrate the appliance methods when a user moves in the inside of a home which consists of multiple rooms, For example, suppose that a user in a living room moves to a bed room. The following two are examples of the scenario which our service can support. (1) A user continues watching a TV program which was being watched in the living room also in the bed room. (2) A user makes the state of the environment (such as room temperature and brightness) of the bed room the same as the living room. Thus, a user's convenience can be improved with our service supporting the appliance orchestration for making the state of the rooms equal continuously.
The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106 (578), 411 - 416, JapaneseThis technical report proposes a software tamper proofing method called instruction folding. In this method, a set of similar (but sligtly different) instruction sequences is detected in a program, and then, they are integrated (folded) into a single instruction sequence. A self-modifying mechanism is applied to the folded sequence to bridge the gap between those slightly different sequences at run-time. The folded sequence is tamper resistant since tampering affects every functionality where original (similar) instruction sequences were present.
Information Processing Society of Japan (IPSJ), Mar. 2007, 情報処理学会研究報告, ソフトウェア工学研究会, 2007-SE-155 (33), 167 - 174, JapaneseThe recent ubiquitous technologies allow home electric appliances and sensors to be connected with local area network at home. While when we develop such HNS (Home Network System) integrated services and provide them to the users, we must assure that the integrated services are safe for the users, the appliances and the environments. In the normal operations of these appliances are very different from the operations of the HNS, so the development and the implementation of the HNS integrated service need more careful and exact safety measures for the safe operations of the appliances. There is a possibility that the bug and the logic mistake of software cause an accident and serious damage. In order to solute this problem, we present a framework to verify the safety of integrated service of HNS by using the DBC(Design by Contract) and JML(Java Modeling Language)
The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術報告, NS2006-159 (577), 7 - 12, JapaneseCurrently, Home Network System (HNS) attracts a great deal of attention. This system can provide value-added services with connecting various home appliances to the network. We have already developed an integrated service which enables the integrated operation of more than one home appliance with using Web services in our previous study. In this paper, we did an evaluative experiment of the integrated service to show its utility in HNS. In this experiment, we set some typical tasks with operations of the integrated service and consumer appliances, and then we conducted usability testing to operate the appliances by the subjects actually. In the evaluation, we evaluated from the viewpoint of the operation efficiency and the satisfaction rating by comparing the operations of each usual appliances and integrated service in HNS. We were able to confirm that all subjects completed the tasks of the integrated service from this experiment. Moreover, we could obtain the result in which the average operation time was a half or less in the maximum, and the average number of errors was 1/10 or less in the integrated service compared with the usual operation. We were also able to obtain the result that the satisfaction rating of the service was 1.5 times or more high in the integrated service compared with the usual operation in all tasks.
The Institute of Electronics, Information and Communication Engineers, Mar. 2007, 電子情報通信学会技術研究報告, 106 (578), 399 - 404, JapaneseThis paper proposes an authentication method using location and speed information for mobile users. Though passwords or PINs is widely used for authentication, an incorrect user could be authenticated, peeking at a user inputting a password or PIN. With proposed method, users are authenticated when they sequentially pass through some points with specific speed. They are not authenticated when passing speed on the point is different from specific speed. This paper proposes the authentication method and confirms that location and speed information can be used for authentication by exploratory experiment.
The Institute of Electronics, Information and Communication Engineers, Nov. 2006, 電子情報通信学会技術報告, モバイルマルチメディア通信研究専門委員会, 106 (MoMuC2006-55), 11 - 16, Japanese[Refereed]
[Refereed]
[Refereed]
In this paper, we propose a cracker-centric approach to give a realistic guideline for applying software obfuscation methods to disrupt crackers' actions. As a case study, we define a security goal and a threat model for a Java implementation of a cryptomeria cipher (C2) program, and then, based on the model, we describe a guideline to protect secret keys included in the program.
The Institute of Electronics, Information and Communication Engineers, Dec. 2005, 電子情報通信学会技術報告, ソフトウェアサイエンス研究会, 105 (SS2005-59), 25 - 30, JapaneseTo detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which are unique and native characteristics of every class file. For a pair of class files p and q, if q has the same birthmark as p's, q is suspected as a copy of p. Ideally, the birthmarks should satisfy the following properties : (a) preservation - the birthmarks should be preserved even if the original class file is tampered with, and (b) distinction - independent class files must be distinguished by completely different birthmarks. Taking (a) and (b) into account, we propose four types of birthmarks for Java class files. To show the effectiveness of the proposed birthmarks, we conduct three experiments. In the first experiment, we demonstrate that the proposed birthmarks are sufficiently robust against automatic program transformation (93.3876% of the birthmarks were preserved). The second experiment shows that the proposed birthmarks successfully distinguish non-copied files in a practical Java application (97.8005% of given class files were distinguished). In the third experiment, we exploit different Java compilers to confirm that the proposed Java birthmarks are core characteristics independent of compiler-specific issues.
The Institute of Electronics, Information and Communication Engineers, 01 Sep. 2005, IEICE Transactions on Information and Systems, D, 88 (9), 2148 - 2158, EnglishAlthough there exists a lot of studies to evaluate the effectiveness (fault detection rate) of software review techniques, human factors in review process, which are larger factor than the review techniques, are rarely studied. This paper aims to clarify the human factors in code review through an analysis of eye movement of review engineers. As a result of analysis, we found some patterns of eye movement that seem to affect the effectiveness of code review.
The Institute of Electronics, Information and Communication Engineers, Jun. 2005, 信学技報SS2005 12-17, 105 (128), 21 - 26, JapaneseThis paper proposes a general framework, called WS-PROVE (Web Service PROtotyping Validation Environment), for rapid prototyping of Web service applications. In a requirement definition stage, WS-PROVE first abstracts a Web service under development as a dummy, and then integrate the dummy with other dummies or the existing ready-made Web services in arbitrary topologies. For a given configuration including the integration topology, processing time for each service and the network delay, WS-PROVE dynamically connects the Web services. Then, it measures the response time for each service and the whole integrated services. In this paper, we first clarify system requirements of the rapid prototyping system for Web service applications. Then, we present design and implementation of WS-PROVE. Additionally, we conduct a case study to prototype some Web service applications to demonstrate the effectiveness of WS-PROVE.
The Institute of Electronics, Information and Communication Engineers, Mar. 2005, 信学技報, 情報ネットワーク研究会, IN2004-318 (692), 361 - 366, JapaneseIn this paper, we evaluated in experiments the relationship between the quality of Web Service applications and the Web Service Metrics (RFWS, NOWS, and NHTWS) that have been proposed by our research group. First, the performance of Web Service application was measured using WS-PROVE developed so that we could build the prototype of Web Service application topology freely, and considered the relationship with Web Service Metrics. Next, the reliability of Web Service application was calculated using the reliability assessment algorithm "Sum of Disjoint Products (SDP)", and considered the relationship with Web Service Metrics. As a result, we revealed experimentally a relationship between Web Service Metrics and the quality of Web Service applications.
The Institute of Electronics, Information and Communication Engineers, Mar. 2005, 信学技報, 情報ネットワーク研究会, IN2004-319 (692), 367 - 372, JapaneseThis paper presents a method to estimate the cost of mental simulation of programs. In our previous research, we developed a model called virtual mental simulation model (VMSM). It showed that a distance of simulation backtrack significantly influences the cost of mental simulation. Through the subsequent experiments, however, we have found some cases that are not well justified by the distance only. In this paper, we show that updates of variables in a program also have significant correlation to the mental simulation. Then, we propose two new dynamic metrics: Sum in Number of Variable Updates and Variance in Number of Variable Updates. The experimental evaluation shows that the proposed metrics well explain the cases the previous VMSM cannot cover.
The Institute of Electronics, Information and Communication Engineers, Nov. 2004, 電子情報通信学会技術報告, ソフトウェアサイエンス研究会, SS2004-32 (466), 37 - 42, Japanese[Refereed]
[Refereed]
The integrated services are one of the major applications of the home network system. Features of multiple networked appliances are combined to provide more comfortable living for home users. When multiple integrated services are executed simultaneously, the features executed in the services may conflict with each other. This conflict is generally known as the feature interaction problem, which decreases the total quality of services. This paper formulates the feature interaction problem in the integrated services of the home network system. Specifically, we define two types of interactions: device interactions and environment interactions. The device interactions are direct conflicts of features on the same device, whereas, the environment interactions are indirect conflicts on certain environment properties. We conduct a case study of interaction detection to demonstrate the effectiveness of the proposed method.
The Institute of Electronics, Information and Communication Engineers, Oct. 2004, 信学技報, ディペンダブルコンピューティング研究会, DC2004-23 (344), 11 - 16, JapaneseIn this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original binary program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously retrieves the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.
The Institute of Electronics, Information and Communication Engineers, Dec. 2002, 信学技報, 情報セキュリティ研究会, ISEC2002-98 (511), 13 - 19, JapaneseFeature Interactions(FI, in short) are functional conflicts among features of telecommunication services. Since detecting all possible FIs takes huge costs, the technology of FI filtering is emerging, which roughly identifies FI-prone service combinations with simple indications. However, the previous filtering identifies the FI-prone combinations only. It cannot derive concrete scenarios in which potential FIs may exist. So, we have proposed a new scenario derivation method for FI-prone combinations. The goal of this paper is to evaluate the scenario derivation method. The evaluation is conducted with respect to scenario coverage and filtering quality, using specifications of FI detection contest. The result shows that the proposed method have covered all FI scenarios detected in the contest.
The Institute of Electronics, Information and Communication Engineers, 11 Oct. 2001, Technical report of IEICE. SS, 101 (358), 27 - 33, JapaneseThe recent advancement of the Internet technologies prompts the Internet telephony services for practical use. In the Internet telephony, implementation of user-made services is an important concern, and a service description language CPL(Call Processing Language) is proposed in RFC of IETF. Managing such services in the Internet telephony is up to users, thus users can freely deploy very flexible services. However, new types of the feature interaction problem may arise, which are not seen in the traditional centralized telephone network. In order to clarify the feature interaction in the Internet telephony, this paper categorizes functional conflicts of services written in the CPL. Specifically, we focus on a case where the CPL scripts of two services are deployed in the same server. Then, we define four classes of the interactions according to the structure of CPL tags. Also for each class, we discuss some idea towards resolution of the interactions.
The Institute of Electronics, Information and Communication Engineers, 11 Oct. 2001, Technical report of IEICE. SS, 101 (358), 35 - 42, Japanese通信サービスの最も一般的な検証である可到達解析では, 状態数がユーザ数やサービスの複雑さに伴って指数的に増加するため, 検証システム上の主記憶のサイズが実質上検証できるサービスクラスを支配してしまう. この問題に対処するため, 本稿では二次記憶を利用して可到達解析を行う検証系を開発した. 核となる状態列挙には Stern らの方法を利用し, それを改良することによってより一層の効率化を図った.
The Institute of Electronics, Information and Communication Engineers, 13 Aug. 1997, Proceedings of the Society Conference of IEICE, 1997, 17 - 17, JapaneseFeature interaction is known as a kind of conflicts among service functions in the communication system to which new communication services are added. It is strongly required to establish the efficient detection and elimination method for feature interactions. We have already proposed a new detection algorithm Ω for nondeterministic feature interactions, which utilizes P-invariant of Petri-Net. The goal of this paper is to evaluate the usefulness of the proposed method by applying it to practical telecommunication services. The experimental results show that proposed method attains high quality of detection and good scalability, and that it is well applicable to the interaction detections of practical services
The Institute of Electronics, Information and Communication Engineers, 30 May 1997, Technical report of IEICE. SS, 97 (78), 9 - 16, JapaneseRouting Protocol synthesis problem discussed in this paper is the problem to derive a routing protocol specification modeled by FSM from a given routing specification modeled by FSM. In this paper, we propose a synthesis method to solve the routing protocol synthesis problem in connectionless networks such that each message can be delivered from its source node to its destination node through relay nodes even when a node or channel fails. The key ideas of the proposed method are as follows. (1) Primitives exchanged between users and source or destination nodes in the service specification are projected to the protocol specification of each protocol entity. (2) Using the transition synthesis rules transitions for directly delivering messages from the source node to the destination node are generated in the protocol specification of the source and destination nodes. (3) Transitions for delivering message through the loop-free communication paths from the source node to destination node generated in the protocol specification of the related nodes.
The Institute of Electronics, Information and Communication Engineers, Sep. 1996, 信学技報, SSE96-93 (252), 109 - 114, EnglishProtocol synthesis is a method for designing communication protocols reliably and efficiently.The previous synthesis methods assume that primitives cannot be executed simultaneously at different SAPS.If concurrent primitives are executed at the different SAPS,protocol errors of unspecified receptions and dead locks occur. In this paper,we extend a class of service specifications from which protocol specifications are synthesized by the previous methods to a class of service specifications with parallel execution of primitives. We first introduce the priority of primitives such that when parallel execution of primitives occurs the execution assigned higher priority takes precedence over that assigned lower priority. Based on this idea,we propose a new protocol synthesis algorithm for avoiding the protocol errors due to message collision, communication competition and so on. By applying this method,protocol specifications can be automatically synthesized from service specifications which have an arbitrary number of processes and which allow parallel execution of primitives.
The Institute of Electronics, Information and Communication Engineers, Apr. 1994, 信学技報, SSE94-37 (2), 85 - 90, JapaneseScholarly book
Scholarly book
本研究は、大規模多次元データの容易な維持管理ならびに利用が可能なシステムの実現を目的とする。関係データベース(RDB)とクラウドストレージ(NoSQL)の個々の実装に依存せずに各々の利点どうしを相補的に活用するために、個々のRDBやNoSQLを抽象化してミドルウェアで協調動作させ、スケーラブルな多次元データ基盤を実現する。これにより、大規模かつ多種多様、例えばグラフを含む多次元データに対しても、複雑な問い合わせ処理を可能にする。 本年度は、RDBとHBaseの一般的なデータ操作APIを利用した多次元データストアのプロトタイプの初期評価を行った。13台のPCクラスタを利用して1億件のデータベースを利用した評価実験から、任意の次元での範囲クエリならびに集約演算が関係データベースのみあるいはクラウドストレージのみのデータストアよりも十分に高いスループットで実行できることを明らかにした。特にデータの読み書きが混在する場合において、高い性能を示すことが判明した。このプロトタイプに対してデータ要約手法を組込み、さらなる集約演算の高効率化を目指した。そのために多次元ヒストグラムとカーネル密度推定の二つを併用し、計算精度ならびにスループットの向上を試みた。一般に、前者は計算スループットが高いが精度が低く、後者は逆の性質を持ち、互いにトレードオフの関係にある。範囲クエリと格納データの各パーティションとの重複部分の計算精度を調査し、重複部分の体積が小さいときに軽量な多次元ヒストグラムの精度が高いことが判明した。この性質を利用して、気象センサーデータと交通データをそれぞれ用いて集約演算を評価したところ、両者を重複部分の体積に応じて動的に切替えることで、計算精度とスループットの向上が同時に実現できることを明らかにした。
本研究では,さまざまなアプリケーションからデータを利活用する際,これまで考慮されてこなかったデータの品質に関して,データアクセス時に考慮するアプリケーションを容易に開発するためのソフトウェア開発環境を構築する手法を提案するものである.このソフトウェア開発環境基盤は,アプリにより使用法が異なるデータへのアクセス方法・機能を考慮しながら,ソフトウェアを開発できる開発環境全体を指し,アプリごとに異なるデータアクセスを実現するための API 群を備えるよう設計する.また 同時に,効率的なソフトウェア開発を実現可能とするために,API 群のさまざまな利用状況に応じて自律的にデータを整理,実体化する機能をも兼ね備える. 本研究では,NoSQLDB によってデータ管理を行いながら,伝統的に用いられてきた RDB をベースとしたシステムアーキテクチャを踏襲することが一般であるという考えに基づき,このソフトウェア開発環境基盤開発のために,本年度は A) データ活用基盤技術,B) データアクセス基盤技術,の二種類に焦点を当てながら研究を進めた. A) の開発においては,RDB におけるビューの自律的導出技術にはさまざまなアプローチがあるためそのいくつかの実装を行ったが,実装したアプローチの評価実験に時間を要しているばかりか,データ量が小さい場合の評価実験において,一部の評価結果で既存研究に比べ目を見張るほどの高パフォーマンスを得ることが出来なかった.一方,B) の開発は SQuaRE に基づいたサービス API の設計と実装を行うことが主な内容だったため,SQuaRE に基づいた API 開発が行えたか否かだけが問題となるだけである.一点,問題点を挙げるならば,未だ機械学習技術に基づいた SQuaRE に基づく品質の高いサービス開発の実現に向けては検討を始めることが出来なかった点である.
研究項目A:健全で効率的な自発的進化を実現するスマートシティ型ガバナンスフレームワークの開発::自発的進化を促すためのプロジェクト要因や本質的サービスを考察した.プロジェクトの状態,進化を定量的に表現するメトリクスを考案し,GitHubのプロジェクトに対して妥当性検証を始めた(中村).また,「ボットに求められる要件」の妥当性を確認した上で,ボットAPIを実装し,公開に向け洗練した(玉田).更に,データサイエンスのアプローチを念頭に,個人への負荷集中や進化提案の停滞といった自発的進化の阻害要因を検出するモニタリングサービスを実現した(戸田). 研究項目B:ソーシャルオーバーヘッドを低減する人-ボット型協調開発技術の開発::人とボットの協調作業における安心感や信頼感の醸成を促進する「ソーシャル対話モデル」の開発に着手した(大平).また,プロダクトの構造やその利用技術,信頼感,期待感等を加味してHot/Cold Spotを特定し,自発的進化のタイミングを提案する技術を開発した(森崎).更に,GitHub上のプログラマ名鑑ボットを設計し,プログラマの多様な活動のランキングを可能とした(門田).加えて,進化提案ボットの拡張,Social Network Analysisの研究成果の活用にも取り組んだ(伊原). 研究項目C:コミュニティ通貨を基軸としたコミュニティ活性化技術の開発::自発的ソフトウェア進化コミュニティにおける通貨を設計し,ブロックチェーンプラットフォーム「イーサリアム」上で,非中央集権・分散型アプリケーション(DApps)として実装した(畑).また,寄付やゲーミフィケーションの枠組みを利用して,コミュニティ通貨の流通量を増やす方式を,簡単な適用実験を通じて検討した(角田). (かっこ内は主担当研究者)
平成30年度は,これまでの成果を国内外で発表するとともに,提案システムの認識能力を高めてより高度な在宅ケアを可能にする技術を開発した.研究発表に関しては,5月に行われた老年工学国際会議(ISG2018)において,宅内環境センシングと機械学習を用いて高齢者の宅内行動を自動認識する技術や,生活史や生まれ年等の高齢者個人にまつわる情報(個人オントロジ―)を活用した対話生成手法,バーチャル・エージェントを用いて個人適応コミュニケーションケアを実現するシステムVirtual Care Giverを発表した.また,任意の顔写真からバーチャル・エージェントを生成するシステムMPAgent,様々なシステムによる在宅ケアのログを一元管理するLog4Care,顔表情による感情認識を用いてケアの効果を定量的に評価するシステムFace Emotion Trackerを開発,ヒューマン・コンピュータインタラクション国際会議(HCII2018)のデジタル・ヒューマンモデリング会議(DHM2018)にて発表した.今年度開発した新技術としては,個人オントロジーをLinked Data形式で表現し,バーチャル・エージェント(VA)との対話を通して個人オントロジーを動的に構築する手法や,IoTによる行動認識をトリガとして,VAが高齢者に問いかけ,センサでは観測できない心の内を言葉に外化させて記録する「こころ」センシングが挙げられる.また,睡眠と食事の行動ログデータに基づいて個人の生活リズムを表現し,生活の質(QoL)を評価する手法の開発を行った.さらに,様々なアプリと連携可能な顔識別デバイス「顔識別センサボックス」や,画像認識によって宅内コンテキスト認識を行う技法,クラウド上のWebフォームとVAを連携させ,アンケートをVAとの対話に変換するサービスFormroidなどを開発した.
Competitive research funding
In this research, we applied copulas which can consider complex dependencies among multiple features to the areas of information retrieval (IR) and recommender systems, and showed a method to design transparent and highly effective IR and recommender systems. More specifically, we considered a mixture copula model which integrates multiple copulas with a linear combination for building effective IR and recommender systems. To estimate a good mixture copula which affects their effectiveness, we indicated that it is appropriate that a density-based clustering algorithm is applied in the copula estimation phase. In addition, we also developed an efficient top-k algorithm for quickly returning relevant results even if the scoring function is non-linear, such as copulas, and non-monotonic. Moreover, as for recommender systems, we showed that effective recommender systems can also be designed with mixture copulas, when preprocessing feature parameters with a statistical approach.
In this research, we propose a novel location information system that can use location information mutually by converting location information expressed in various forms for each location information system into one representation method called Probabilistic location information. In particular, during this research period, we have proposed what kind of data the probabilistic position information holds, definition of the requirement and method of calculating actual establishing position information.
In this study, we have developed a data access service for applications utilizing big data analytics. This is because the developers of the applications had implemented their own data access services using their inventive approach; however, this task was a factor in preventing the efficient software development. We implemented three types of base technologies for an efficient data access service from the applications utilizing big data analytics, and confirmed the effectiveness of our data access service.
In this research, we have studied a systematic framework for detecting and resolving the "service interaction problem" in smart city. Specifically, we developed a modeling method of smart city services, a framework to formalize, detect and resolve the service interactions, and the service interaction management system for the evaluation. Our contributions include; a method for modeling and detecting service chains and interactions, a formalization, detection and resolution method of environment service interactions, a data platform for managing large-scale log in smart city, context-aware services with real-world data. These achievements have been published as 11 journal papers and 80 oral presentations.
Competitive research funding
Competitive research funding
In this research, we proposed a massively distributed technical framework that support crowd-sourcing and collective intelligence formation in software development. In the crowd-sourcing, software development tasks are outsourced to many unspecified individuals by the Internet technology. The proposed platform consists of two platforms for supporting a multilingual communication and intelligence formation, and for supporting lightweight & massive PDCA cycle execution. Experimental results showed that these sub-platforms have validity and usefulness in terms of supporting the crowd-sourcing and collective intelligence formation in software development. The proposed framework will realize a new massively distributed software development carried by many individuals connected through the Internet technology, and bring risk reduction and quality improvement in software development, by deconstructing the existing multi-layered subcontract system in software development.
Competitive research funding
Competitive research funding
Competitive research funding
In this research, we have studied a systematic framework for assuring safety of ubiquitous network services. In addition to the safety of individual services, we also take the feature interaction problem among multiple services into account. Our contributions include ; the formalization and validation framework of the safety, feature interaction detection for home network services, definition of environment feature interactions with the impact model, service chain detection method, development of practical services and applications. These achievements have been published as22papers and44oral presentations.
Competitive research funding
Competitive research funding
To hide secrets in a computer program, this research proposes a framework to apply existing obfuscation methods to a given program. The result of an experimental evaluation showed that secret information and its clues were all hidden by the proposed framework while conventional obfuscation tools could not thoroughly hide the secrets.
本研究では,ユビキタスネットワークにおける複数のサービス間の機能衝突であるサービス競合問題に焦点をあて,競合問題の形式化,検出方式,解消方式,評価に関する研究を行った.また,ユビキタスアプリケーションの一つである,ホームネットワークシステムを実際に開発し,実システム上でホームネットワークサービスの競合検出,解消方式を実装,評価を行った.一連の研究成果を,論文誌,国際会議,研究会を含め,45編の論文にまとめ発表した.
In modern software development, many of software products are built by combining existing software components and coding only minimal required features. However, selecting necessary components from a number of components is not easy. For instance, Java 2 SDK Standard Edition (J2SE) Version 1.41_02 is widely used by software developers and provides them with 5568 software components (basis classes). From our pilot experiments, we have found that only 4% of the software components of Java 2 SDK were used in typical software development. This result indicates additional coding is still much required, while a variety of software components are currently available to reuse. The goal of our study is to realize an efficient environment for components-based software development. Toward achieving the goal, in this research project, we constructed a system that recommends required software components to developers according to the context of software development. Especially we focused on developing the following elemental technologies: (A). Birthmark: a technology to analyze the development context which means the progress and/or completeness of development, features and/or structures of software itself, and so forth, by extracting the amount of characteristics from target software under development, (B). Collaborative Filtering: a technology to identity and recommend software components which have context similar to target software, and (C). Association Visualization: a visualization technology to provide developers with reasons why the system recommends software components to developers. We integrated the three technologies into a system and evaluated it.
平成17年度は主に次の1,2に従って,研究を行った. 1.携帯電話サービスに対するサービス競合検出実証実験 今日の携帯電話網では,インターネットを利用した様々なサービスが提供されている.そこで,平成15年度,16年度での本研究の成果を踏まえ,実際の携帯電話サービスに対してサービス競合の検出実験を行った.具体的には,まずUse Case Maps(UCMs)と呼ばれる要求記述法を用いて,ある通信キャリアの8種類の携帯電話サービスのサービスシナリオを記述した.次に,複数のサービスを組み合わせた際に,単独サービス時には現れなかったシナリオを洗い出した.これらのシナリオに基づき,実際の携帯電話サービスに加入,実証実験を行った.その結果,24種類のサービス競合が検出され,そのうち13種類がマニュアルに記載されていない新たなサービス競合であることがわかった.この成果をまとめ,国内論文誌および海外論文誌で発表した. 2.ホームネットワークにおけるサービス競合検出法の評価,解消法の考察 平成16年度の成果であるホームネットワークシステムにおけるサービス競合検出法について,サービス競合国際会議(ICFIO5)で発表を行い,最優秀論文賞を受賞した.また,この手法を評価するべく,実際の家電を用いたホームネットワーク環境の設計・実装を行った.また,ホームネットワーク,および,サービスを厳密に記述するための記述言語を開発し,サービス誤りを自動検出する手法の提案も行った.この成果は国際会議論文(APSECO5)として発表した.また,検出されたサービス競合を綿密に解消するために,競合コンテキストに基づく分類手法を提案した。さらに,各分類について,ユーザ問い合わせ,5種類の優先度,サービスロックといった具体的な競合解消スキームの開発を行った.この成果は,国内研究会で発表している.
平成14年度は次の1,2に従って,研究を行った. 1.提案フィルタリング法と検出法との統合 平成13年度に提案したUCMsを用いたフィルタリング法は、「競合がおこりがちな」サービスの組み合わせ、および、競合が疑われる要求レベルのシナリオを導出する。このフィルタリングの導出結果を、サービス競合検出プロセスで効率的に利用する手法の提案を行った。具体的には、インターネット電話(VoIP)のサービス記述言語CPLを用いた開発環境におけるサービス競合検出法を新たに開発した。この方法では、競合がおこりがちなシナリオをCPLスクリプトにおける意味誤りにマッピングし、複数のCPLスクリプト間のサービス競合を「各スクリプト単体では発生しない意味誤り」と定式化する。これにより、競合フィルタリングで得られたシナリオを用いて、CPL間のサービス競合を効率よく検出することが出来た。 2.VoIPサービス競合検出シミュレータの構築 1.で提案した手法を計算機上で実装し、VoIPにおけるサービス競合の検出シミュレーションを行えるシステムを試作した。このシステムは、ユーザ定義のCPLスクリプトを入力すると、提案法に従った競合検出のシミュレーションを行うシステムである。また、このシステムはWebインターフェイスとCGI技術を用いて外部に公開されており、インターネットを通してあらゆるユーザが試用することができる。 以上の成果を5つの国際会議論文(ICOIN-16,ICDSN-2002,ITC-CSCC2002,NCSEC2002,SAINT2003)にまとめ、口頭発表を行った。