The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Japan, along with many developed countries, is facing severe social problems caused by a declining birth rate. Gradual shrinkage of the working population has brought shortages of workers performing various services such as elderly care. Women are potential workers, but social assistance of working women remains insufficient. Social services such as elderly care and support for working women must...
To reduce the loads of network administrators and to ensure the tasks, we have proposed AIR-NMS, which is a network management support system (NMS) based on Active Information Resource (AIR). In AIR-NMS, various information resources (e.g., state information of a network, practical knowledge of network management) are combined with software agents which have the knowledge and functions for supporting...
To reduce the work load of network administrators, e.g., fault detection/recovery, performance analysis and security maintenance etc., knowledge-based intelligent support system for network administrator based on active information resource (AIR-NMS) have been proposed. In this paper, we describe some design pattern and some implemented examples of activated information resource (AIR) on network administration...
To reduce the loads imposed on network administrators, we have proposed AIR-NMS, which is a network management support system (NMS) based on Active Information Resource (AIR). In AIR-NMS, various information resources (e.g., state information of a network, practical knowledge of network management) are combined with software agents which have the knowledge and functions for supporting the utilization...
In this paper, we propose an overlay authentication network for active utilization of private information. The proposed network realizes safe registration and usage of users' private information. In addition, the proposed network realizes the distributed management and utilization of users' private information. These features enable services which utilize users' private information. In this paper,...
Collaborative work environments which are using augmented reality have been expected to realize effective collaborative works. However, the construction of these environments has a limitation, because devices which do not have an ability of sensing the real-space information cannot be used for these environments. To break this limitation, we propose the construction scheme of 3D symbiotic environment...
Traffic classification is an essential task for network management. Thus many researchers have paid attention to initial sub-flow features based classifiers for achieving online traffic classification. However, the existing classifiers cannot classify traffic effectively in mobile IP network, because they cannot always capture the initial sub-flow when a communicating node moves and its point of attachment...
Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize control two schemes were proposed: RBAC (role-based access control) and TRBAC (temporal role-based access control) by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities because of maintenance costs...
For rapid deployment of multicast application, Application Layer Multicast (ALM) is an alternate choice of IP multicast, as it supports group communication independent of network layer support. Previous studies on ALM mainly focused on achieving high throughput for bandwidth intensive applications and unfairness of communication quality is still a serious issue in multi-source communication. In this...
In this paper, we propose a flexible open 3D digital space combination scheme based on the concept of Symbiotic Computing which we have been promoting. Existing 3D collaborative work supporting systems have some limitations with their 3D digital space construction and inter-application cooperation because these systems have basically closed nature. To break these limitations, we are developing symbiotic...
In this paper, we propose an open 3D shared space construction scheme based on the concept of symbiotic computing which we have been promoting. Existing 3D collaborative work supporting systems have some limitations with their 3D shared space construction and inter-application cooperation because these systems are basically closed nature. To break these limitations, we are developing symbiotic collaborative...
In recent years, P2P networks have been evolving at a rapid pace. Authentication of nodes in P2P networks, however, remains a difficult task to conduct efficiently. In this paper, we therefore propose a new authentication method called hash-based distributed authentication method (HDAM). HDAM realizes a decentralized efficient mutual authentication mechanism for each pair of nodes in the P2P network...
We propose a new knowledge sharing scheme to effectively support networked cooperative works in this paper. Our scheme controls information flow from real space (RS) to digital space (DS) and reverse direction, based on the concept of "symbiotic computing". In practice, our scheme controls the availability of shared workspace in DS for cooperative works, according to the situation of tasks...
In this paper, we propose a log summarizing method to help a network manager to recognize and handle a network event. Our method can accurately extract only necessary information in real-time by stepwise information extraction technique. This feature can help the network manager to handle an event quickly with less management burden. With our experimental results, we show that our method has the ability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.