詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: "NetBSD"
55件中 1-20の結果を表示しています
  • Tetsuya KANDA, Takashi ISHIO, Katsuro INOUE
    IEICE Transactions on Information and Systems
    2015年 E98.D 巻 6 号 1185-1193
    発行日: 2015/06/01
    公開日: 2015/06/01
    ジャーナル フリー
    Once a software product has been released, a large number of software products may be derived from an original single product. Management and maintenance of product variants are important, but those are hardly cared because developers do not make efforts for the further maintainability in the initial phase of software development. However, history of products would be lost in typical cases and developers have only source code of products in the worst case. In this paper, we approximate the evolution history of software products using source code of them. Our key idea is that two successive products are the most similar pair of products in evolution history, and have many similar source files. We did an experiment to compare the analysis result with actual evolution history. The result shows 78% (on average) of edges in the extracted trees are consistent with the actual evolution history of the products.
  • *石井 充
    経営情報学会 全国研究発表大会要旨集
    2022年 202111 巻 2E2-4
    発行日: 2022/01/31
    公開日: 2022/01/27
    会議録・要旨集 フリー

    オープンソース開発においては,LinuxやApacheなどのいくつかのプロジェクトが成功を収めている.特に,Linuxにおいては,開発プロジェクト全体を統括できるリーダーが存在しているという特徴が指摘されている.しかしながら,オープンソースの開発手法においては,開発者は営利的な目的を有しておらず,相互に緩く結合されているため,プロジェクトの運営にあたっては,リーダーシップは必要ないという指摘もなされている.この二つの指摘は相互に矛盾するようにも思われる.本研究では,階層構造を有するエージェントモデルに基づき,オープンソース開発プロジェクトにおけるリーダーシップの効果について調査した結果を述べる.

  • Seondong HEO, Soojin LEE, Bumsoon JANG, Hyunsoo YOON
    IEICE Transactions on Information and Systems
    2017年 E100.D 巻 1 号 118-129
    発行日: 2017/01/01
    公開日: 2017/01/01
    ジャーナル フリー

    Research on intrusion-tolerant systems (ITSs) is being conducted to protect critical systems which provide useful information services. To provide services reliably, these critical systems must not have even a single point of failure (SPOF). Therefore, most ITSs employ redundant components to eliminate the SPOF problem and improve system reliability. However, systems that include identical components have common vulnerabilities that can be exploited to attack the servers. Attackers prefer to exploit these common vulnerabilities rather than general vulnerabilities because the former might provide an opportunity to compromise several servers. In this study, we analyze software vulnerability data from the National Vulnerability Database (NVD). Based on the analysis results, we present a scheme that finds software combinations that minimize the risk of common vulnerabilities. We implement this scheme with CSIM20, and simulation results prove that the proposed scheme is appropriate for a recovery-based intrusion tolerant architecture.

  • Hajime TAZAKI, Rodney VAN METER, Ryuji WAKIKAWA, Thirapon WONGSAARDSAKUL, Kanchana KANCHANASUT, Marcelo DIAS DE AMORIM, Jun MURAI
    IEICE Transactions on Communications
    2010年 E93.B 巻 8 号 2004-2011
    発行日: 2010/08/01
    公開日: 2010/08/01
    ジャーナル 認証あり
    Motivated by the deployment of post-disaster MANEMO (MANET for NEMO) composed of mobile routers and stations, we evaluate two candidate routing protocols through network simulation, theoretical performance analysis, and field experiments. The first protocol is the widely adopted Optimized Link State Routing protocol (OLSR) and the second is the combination of the Tree Discovery Protocol (TDP) with Network In Node Advertisement (NINA). To the best of our knowledge, this is the first time that these two protocols are compared in both theoretical and practical terms. We focus on the control overhead generated when mobile routers perform a handover. Our results confirm the correctness and operational robustness of both protocols. More interestingly, although in the general case OLSR leads to better results, TDP/NINA outperforms OLSR both in the case of sparse networks and in highly mobile networks, which correspond to the operation point of a large set of post-disaster scenarios.
  • Ayumi BANNO, Fumio TERAOKA
    IEICE Transactions on Communications
    2008年 E91.B 巻 10 号 3194-3204
    発行日: 2008/10/01
    公開日: 2010/03/01
    ジャーナル 認証あり
    This paper proposes a protocol called νLIN6 which supports both network mobility and host mobility in IPv6. There are several proposals to support network mobility and host mobility. Network Mobility (NEMO) Basic Support Protocol has several problems such as pinball routing, large header overhead due to multiple levels of tunneling, and a single point of failure. Optimized NEMO (ONEMO) and Mobile IP with Address Translation (MAT) are solutions to provide route optimization, but they generate a lot of signaling messages at a handover. In νLIN6, packet relay is required only once regardless of the nested level in network mobility while optimal routing is always provided in host mobility. A fixedsized extension header is used in network mobility while there is no header overhead in host mobility. νLIN6 is more tolerant of network failure and mobility agent failure than NEMO Basic Support Protocol. It also allows ordinary IPv6 nodes to communicate with mobile nodes and nodes in the mobile network. We implemented νLIN6 on
    NetBSD
    2.0 Release. Our measurement results showed νLIN6 can provide host mobility and network mobility with low overhead.
  • Masao TANABE, Hirofumi AKAIKE, Masaki AIDA, Masayuki MURATA, Makoto IMASE
    IEICE Transactions on Communications
    2012年 E95.B 巻 3 号 866-875
    発行日: 2012/03/01
    公開日: 2012/03/01
    ジャーナル 認証あり
    As a result of the rapid development of the Internet in recent years, network security has become an urgent issue. Distributed denial of service (DDoS) attacks are one of the most serious security issues. In particular, 60 percent of the DDoS attacks found on the Internet are TCP attacks, including SYN flood attacks. In this paper, we propose adaptive timer-based countermeasures against SYN flood attacks. Our proposal utilizes the concept of soft-state protocols that are widely used for resource management on the Internet. In order to avoid deadlock, a server releases resources using a time-out mechanism without any explicit requests from its clients. If we change the value of the timer in accordance with the network conditions, we can add more flexibility to the soft-state protocols. The timer is used to manage the resources assigned to half-open connections in a TCP 3-way handshake mechanism, and its value is determined adaptively according to the network conditions. In addition, we report our simulation results to show the effectiveness of our approach.
  • Masaya Sato, Taku Omori, Toshihiro Yamauchi, Hideo Taniguchi
    International Journal of Networking and Computing
    2023年 13 巻 2 号 273-286
    発行日: 2023年
    公開日: 2023/07/08
    ジャーナル オープンアクセス
    The behavior of virtual machine (VM) programs are monitored by virtual machine monitors (VMMs) for security purposes. System calls are frequently used as a monitoring point. To monitor the system calls, the VMM inserts a breakpoint, called a hook point, into the memory of the monitored VM. The hook points are determined based on experimental knowledge. However, reading the source codes of operating systems (OSes) requires specialized knowledge. In addition, the appropriate hook point differs among OSes and OS versions. Analyzing the source code in each OS update is impractical. Searching for the appropriate hook point for various OSes is also difficult. To address these problems, we propose a method for estimating the hook point using a memory analysis technique. The proposed method acquires the memory of the monitored VM and then searches for an appropriate instruction appropriate to hook. The search instructions depend on the processor architecture. In addition, we also proposed a method for searching the appropriate instruction using a single step execution. This version reduces the cost for searching the instructions and improve robustness for various Linux versions. The experimental results showed that the proposed method precisely estimates the hook point for various OS versions and OSes. In addition, the overhead of the proposed method is small, considering the boot time of the monitored VM.
  • 熊谷 悠平, 永山 聖希, 藤原 健志, 吉田 和幸
    電気関係学会九州支部連合大会講演論文集
    2010年 2010 巻 03-1P-07
    発行日: 2010年
    公開日: 2012/02/24
    会議録・要旨集 フリー
    ネットワーク上の攻撃者は攻撃対象を見つけるためにスキャン攻撃を行う傾向がある.スキャン攻撃とは,攻撃者が攻撃対象のサーバやサービスについての情報を収集する行為である.我々は,scan攻撃を検知するシステムを運用している.本論文では,検知した攻撃者への応答をZebraサーバのblack holeインターフェースへ向けることにより応答パケットを遮断し,情報を与えないようにする手法について述べる.この方法ではネットワークルーティングの特性を利用するため,LANスイッチ等への負担を軽減できる.
  • 米田 孝弘, 村本 衛一, 許 志彰, 小西 一暢, 川原 豊樹
    コンピュータ ソフトウェア
    2007年 24 巻 2 号 2_55-2_67
    発行日: 2007年
    公開日: 2007/06/30
    ジャーナル フリー
    This paper proposes a novel transport-layer protocol called Sender Initiated Congestion Control (SICC) which provides congestion control for Small Group Multicast (SGM). SGM is an effective solution for carrying a large number of simultaneous small-sized group communications. We provide simulated and experimental results to show that SICC is capable of achieving fast congestion avoidance and significantly increases throughput at receivers while still remaining TCP friendly. In SICC, multiple transmission rates are pre-defined as constant values for a given session, and each rate is associated with a different SICC CLASS. Each CLASS corresponds to an SGM group containing receivers with similar acceptable sending rates. The acceptable sending rate of each receiver is estimated at the sender using TCP-Friendly Rate Control (TFRC) in response to the loss event rate reported by the receiver. Based on receiver's reports, the rate that a sender uses to transmit packets to a receiver can be dynamically changed by assigning the receiver to one of the other SICC CLASS. These are the first reported results for congestion control in SGM.
  • Hisanobu Tomari, Kei Hiraki
    IPSJ Online Transactions
    2011年 4 巻 217-227
    発行日: 2011年
    公開日: 2011/10/14
    ジャーナル フリー
    Power consumption has become an important factor in the design of high-performance computer systems. The power consumption of newer systems is now published but is unknown for many older systems. Data for only two or three generations of systems are insufficient for projecting the performance/power of future systems. We measured the performance and power consumption of 70 computer systems from 1989 to 2011. Our collection of computers included desktop and laptop personal computers, workstations, handheld devices and supercomputers. This is the first paper reporting the performance and power consumption of systems over twenty years, using a uniform method. The primary benchmark we used was Dhrystone. We also used NAS Parallel Benchmarks and CPU2006 suite. The Dhrystone/power ratio was found to be growing exponentially. The data we obtained indicates that the Dhrystone result and the CINT2006 in SPEC CPU2006 correlate closely. The NAS Parallel Benchmarks and CFP2006 results also correlate. Using the trend of Dhrystone/power that we obtained, we predict that the Dhrystone/power ratio will reach 2, 963 VAX MIPS/Watt in 2018, when exaflops machines are expected to appear.
  • Hizir Sofyan, Edi Muttaqin, Muhammad Subianto
    日本計算機統計学会シンポジウム論文集
    2012年 26 巻
    発行日: 2012/11/01
    公開日: 2017/07/15
    会議録・要旨集 フリー
    The rapid growth of information and communication technology (ICT) gives a lot of alternatives in supporting human work. ICT plays an important role in teaching and learning process. A learning system that uses ICT is called E-Learning. Statistics is still considered as a spooky subject by most of students, especially the first year students. On the other hand, it is a mandatory subject. To solve this problem, a web based statistical learning system, namely RWikiStat 2.0, has been created. It is an open source system for statistical learning supported by the technology of Wiki, and R statistical software as its statistical engine. This system is the improvement of the previous one.
  • 藤久 裕司
    高圧力の科学と技術
    1999年 9 巻 1 号 65-70
    発行日: 1999/02/20
    公開日: 2009/08/07
    ジャーナル フリー
    An x-ray powder diffraction technique with an imaging plate area detector is now widely used in various experimental fields including high pressure research. We developed a computer program named PIP capable of converting two-dimensional powder image to one-dimensional pattern. An aim of this program is to prepare easily, quickly, and user friendly one-dimensional diffraction patterns available for structure analysis such as Rietveld method. In this report, we answer some questions about PIP frequently asked by users.
  • Nobuo TAKAHASHI, Tomofumi TAKAMATSU
    Annals of Business Administrative Science
    2013年 12 巻 3 号 123-137
    発行日: 2013/06/15
    公開日: 2013/06/15
    ジャーナル オープンアクセス
    From 1992 to 1994, BSD which was UNIX developed at the University of California, Berkeley (UC Berkeley), found itself involved in a license-related lawsuit filed by AT&T. At around the same time, the GNU project, which developed a UNIX-like free software not infringing on the AT&T license, was nearing completion—the “jigsaw puzzle"—with the exception of the kernel. Linux, a free UNIX-style software kernel with open source code free from the AT&T license made its appearance as the desired kernel becoming the “last piece" of the puzzle. A UNIX-type operating system is an aggregate of single function programs called tools, which are easily substitutable. Under these conditions, the free software system, noted for being “UNIX running on a PC," was completed in a short span of time. Essential to the success of Linux was its miraculous release timing. It goes without saying that this phenomenon is unlikely to be repeated even under ideal conditions of it being free of charge and open source.
  • 呉 明壽, 相澤 清晴
    映像情報メディア学会年次大会講演予稿集
    2001年 2001 巻 25-16
    発行日: 2001/08/27
    公開日: 2017/05/24
    会議録・要旨集 フリー
    A large-scale image sensing extended over very wide area can be realized by numerous image sensors, however, tremendous volume of data can cause adverse effects to the system such as network congestion. As a result, the system performance will be greatly deteriorated. One of the feasible ways to cope with such problem is to use smart image sensors as image acquisition devices because they can reduce the data volume on sensor level. In this paper, as a practical solution, we propose dynamic data rate control by adjusting spatial or temporal resolution with sampling-variant smart image sensors. Simulation results show that this scheme can provide an efficient use of network resources while preserving main objects in the scenes.
  • 寧 培楠, 汪 志成, 大貝 晴俊
    電気関係学会九州支部連合大会講演論文集
    2009年 2009 巻 06-2A-07
    発行日: 2009年
    公開日: 2011/01/20
    会議録・要旨集 フリー
    自動駐車制御には様々な方法が研究されているが、それらには安全性の問題が残っており、完全自動には到っていない。本研究ではテストロボットの試作を行い、障害物(他車)や人の飛び出しなどを検知する安全自動駐車システムの開発を行った。
    本研究では試作した走行ロボットに距離センサーや人体検出センサーを搭載し、それを利用して自動車庫入れと障害物検知による安全走行を実現するため、駐車目標の探索、走行経路の計算、障害物検知方法を検討した。そして、自動的に駐車場所を探索し、人の飛び出しなどを検知する機能を持った安全かつ安全自動駐車制御をMatlab上にシミュレーションし、走行ロボットで検証している。
  • Tsung-Han LIN, Yuki KINEBUCHI, Tatsuo NAKAJIMA
    IEICE Transactions on Information and Systems
    2012年 E95.D 巻 12 号 2821-2832
    発行日: 2012/12/01
    公開日: 2012/12/01
    ジャーナル フリー
    In this paper, we propose a virtualization architecture for a multi-core embedded system to provide more system reliability and security while maintaining performance and without introducing additional special hardware supports or implementing a complex protection mechanism in the virtualization layer. Embedded systems, especially consumer electronics, have often used virtualization. Virtualization is not a new technique, as there are various uses for both GPOS (General Purpose Operating System) and RTOS (Real Time Operating System). The surge of the multi-core platforms in embedded systems also helps consolidate the virtualization system for better performance and lower power consumption. Embedded virtualization design usually uses two approaches. The first is to use the traditional VMM, but it is too complicated for use in the embedded environment without additional special hardware support. The other approach uses the microkernel, which imposes a modular design. The guest systems, however, would suffer from considerable modifications in this approach, as the microkernel allows guest systems to run in the user space. For some RTOSes and their applications originally running in the kernel space, this second approach is more difficult to use because those codes use many privileged instructions. To achieve better reliability and keep the virtualization layer design lightweight, this work uses a common hardware component adopted in multi-core embedded processors. In most embedded platforms, vendors provide additional on-chip local memory for each physical core, and these local memory areas are only private to their cores. By taking advantage of this memory architecture, we can mitigate the above-mentioned problems at once. We choose to re-map the virtualization layer's program on the local memory, called SPUMONE, which runs all guest systems in the kernel space. Doing so, it can provide additional reliability and security for the entire system because the SPUMONE design in a multi-core platform has each instance installed on a separate processor core. This design differs from traditional virtualization layer design, and the content of each SPUMONE is inaccessible to the others. We also achieve this goal without adding overhead to the overall performance.
  • 木村 明裕, 井上 喜雄, 芝田 京子
    中国四国支部総会・講演会 講演論文集
    2006年 2006.44 巻 1108
    発行日: 2006/02/23
    公開日: 2017/06/19
    会議録・要旨集 フリー
  • 辻野 匠
    海洋調査技術
    2006年 18 巻 2 号 2_27-2_38
    発行日: 2006年
    公開日: 2011/06/16
    ジャーナル フリー
    This article introduces a conversion method from paper-based seismic profiles to SEG-Y formatted degital data. This method employs two free software, NetPBM and Seismic Unix which work on Unix-like OS. The principle is 1) scanning paper-based profiles to obtain pixel images conposed of 8 bit charactor, 2) conversion of trace data format from character to floating and 3) paste of SEG-Y header to floating trace data. Paper-based profiles drown by line scan recorder were successfully converted to trace-by-pixel SEG-Y data. Paper based wiggle profiles were converted firstly to trace-by-pixel SEG-Y data, and then to trace-by-trace SEG-Y data, by using horizontal trace sum of trace-by-pixel data. Quality of these data was examined and proofed that they are tolerable to be used, though they have restriction of paper. SEG-Y convertied data would provide additional analyses; deconvolution, migration, seismic attribute analyses, and would be ready for interpretation softwares.
  • 郭 孝範, 堀内 岳人
    映像情報メディア学会誌
    2008年 62 巻 7 号 985-988
    発行日: 2008/07/01
    公開日: 2010/07/01
    ジャーナル フリー
  • *大江 寛次郎, 菊池 真紀, 井上 健司
    自動制御連合講演会講演論文集
    2008年 51 巻 335
    発行日: 2008年
    公開日: 2009/04/14
    会議録・要旨集 フリー
    我々は,3つのモードを切り替えることで高い作業移動能力を発揮する6脚ロボットを開発した.本論文では,動力学シミュレータODEを用い,段差登り能力を解析する.はじめに,通常の平地移動に用いている6脚トライポッド歩容による段差登りをシミュレーションし,踏破可能な段差の高さを解析する.次に,より高い段差を登るための歩容を提案し,胴体を水平にした状態で登ることのできる段差の最大高さを求める.
feedback
Top