var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fakashi.starporte.net%2Fpublish_list.bib&fullnames=1&theme=simple&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fakashi.starporte.net%2Fpublish_list.bib&fullnames=1&theme=simple&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fakashi.starporte.net%2Fpublish_list.bib&fullnames=1&theme=simple&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Cloud5GC: Design and Implementation of Scalable and Stateless Mobile Core System on Public Cloud.\n \n \n \n\n\n \n Kunio Akashi; Seiichi Yamamoto; Haruki Sakurai; Koki Ito; Tomohiro Ishihara; Takuji Iimura; Hiroki Watanabe; Keiichi Shima; Katsuhiro Horiba; and Yuji Sekiya.\n\n\n \n\n\n\n . Jan 2024.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{cloud5gc,\n    author = {Kunio Akashi and Seiichi Yamamoto and Haruki Sakurai and Koki Ito and Tomohiro Ishihara and Takuji Iimura and Hiroki Watanabe and Keiichi Shima and Katsuhiro Horiba and Yuji Sekiya },\n    title = {Cloud5GC: Design and Implementation of Scalable and Stateless Mobile Core System on Public Cloud},\n    booktitle = {ICOIN 2024},\n    year = {2024},\n    month = {Jan},\n    volume = {},\n    number = {},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SDNにおけるトラフィック特徴量を用いたランサムウェア検知.\n \n \n \n\n\n \n 棚瀬 健; 明石 邦夫; 関谷 勇司; and 中村 宏.\n\n\n \n\n\n\n 信学技報, 123(397): 385–390. Feb 2024.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{sdn_tanase,\n    author = {棚瀬 健 and 明石 邦夫 and 関谷 勇司 and 中村 宏},\n    title = {SDNにおけるトラフィック特徴量を用いたランサムウェア検知},\n    journal = {信学技報},\n    year = {2024},\n    month = {Feb},\n    pages = {385--390},\n    volume = {123},\n    number = {397},\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n ステートレスな5Gコアネットワークの実現に向けたデータ構造の設計.\n \n \n \n\n\n \n 明石 邦夫; 渡邊 大記; 島 慶一; 長谷川 知也; 村田 達郎; 金谷 知明; 平井 亮次; 西野 泰貴; 山本 成一; 飯村 卓司; 関谷 勇司; and 堀場 勝広.\n\n\n \n\n\n\n 信学技報, 122(407): 121–126. mar 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Proc5gcDB,\n    author = {明石 邦夫 and 渡邊 大記 and 島 慶一 and 長谷川 知也 and 村田 達郎 and 金谷 知明 and 平井 亮次 and 西野 泰貴 and 山本 成一 and 飯村 卓司 and 関谷 勇司 and 堀場 勝広},\n    title = {ステートレスな5Gコアネットワークの実現に向けたデータ構造の設計},\n    journal = {信学技報},\n    year = {2023},\n    month = {mar},\n    pages = {121--126},\n    volume = {122},\n    number = {407},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n per-UE型のMonolithic 5GC - per-UE SMNFの実装と評価.\n \n \n \n\n\n \n 村田 達郎; 金谷 知明; 渡邊 大記; 島 慶一; 長谷川 知也; 平井 亮次; 西野 泰貴; 明石 邦夫; 関谷 勇司; and 堀場 勝広.\n\n\n \n\n\n\n 信学技報, 122(406): 151–156. mar 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{snmf,\n    author = {村田 達郎 and 金谷 知明 and 渡邊 大記 and 島 慶一 and 長谷川 知也 and 平井 亮次 and 西野 泰貴 and 明石 邦夫 and 関谷 勇司 and 堀場 勝広},\n    title = {per-UE型のMonolithic 5GC - per-UE SMNFの実装と評価},\n    journal = {信学技報},\n    year = {2023},\n    month = {mar},\n    pages = {151--156},\n    volume = {122},\n    number = {406},\n}\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n NF型5GCソフトウェアを用いた\\\\ステートレスなプロシージャ型5GCの実装.\n \n \n \n\n\n \n 渡邊 大記; 島 慶一; 長谷川 知也; 村田 達郎; 金谷 知明; 平井 亮次; 西野 泰貴; 明石 邦夫; 山本 成一; 飯村 卓司; 関谷 勇司; and 堀場 勝広.\n\n\n \n\n\n\n 信学技報, 122(406): 430–435. mar 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Proc5gcCP,\n    author = {渡邊 大記 and 島 慶一 and 長谷川 知也 and 村田 達郎 and 金谷 知明 and 平井 亮次 and 西野 泰貴 and 明石 邦夫 and 山本 成一 and 飯村 卓司 and 関谷 勇司 and 堀場 勝広},\n    title = {NF型5GCソフトウェアを用いた\\\\ステートレスなプロシージャ型5GCの実装},\n    journal = {信学技報},\n    year = {2023},\n    month = {mar},\n    pages = {430--435},\n    volume = {122},\n    number = {406},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network.\n \n \n \n\n\n \n Satoshi Okada; Kunio Akashi; Daisuke Miyamoto; Yuji Sekiya; Hideki Takase; and Hiroshi Nakamura.\n\n\n \n\n\n\n Journal of Information Processing, 31: 537-549. 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{SatoshiOkada2023,\n  title={Memory-saving LDoS Attacker Detection Algorithms in Zigbee Network},\n  author={Satoshi Okada and Kunio Akashi and Daisuke Miyamoto and Yuji Sekiya and Hideki Takase\nand Hiroshi Nakamura},\n  journal={Journal of Information Processing},\n  volume={31},\n  number={ },\n  pages={537-549},\n  year={2023},\n  doi={10.2197/ipsjjip.31.537}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Design of Stateless 5G Core Network With Procedural Processing.\n \n \n \n\n\n \n Hiroki Watanabe; Kunio Akashi; Keiichi Shima; and Yuji Sekiya.\n\n\n \n\n\n\n In IEEE International Black Sea Conference on Communications and Networking, Jul 2023. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{blackseacomProc5gc,\n    author = {Hiroki Watanabe and Kunio Akashi and Keiichi Shima and Yuji Sekiya},\n    title = {A Design of Stateless 5G Core Network With Procedural Processing},\n    booktitle={IEEE International Black Sea Conference on Communications and Networking}, \n    year = {2023},\n    month = {Jul},\n    pages = {},\n    volume = {},\n    number = {}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n リアクティブでステートレスな5Gコアネットワークの設計と実装.\n \n \n \n\n\n \n 渡邊 大記; 髙田 敦生; 明石 邦夫; 島 慶一; 関谷 勇司; and 堀場 勝広.\n\n\n \n\n\n\n 信学技報, 123(198): 89–94. oct 2023.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Proc5gcCP2,\n    author = {渡邊 大記 and 髙田 敦生 and 明石 邦夫 and 島 慶一 and 関谷 勇司 and 堀場 勝広},\n    title = {リアクティブでステートレスな5Gコアネットワークの設計と実装},\n    journal = {信学技報},\n    year = {2023},\n    month = {oct},\n    pages = {89--94},\n    volume = {123},\n    number = {198},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Quick Suppression of DDoS Attacks by Frame Priority Control in IoT Backhaul With Construction of Mirai-Based Attacks.\n \n \n \n\n\n \n Rintaro Harada; Naotaka Shibata; Shin Kaneko; Kazuaki Honda; Jun Terada; Yota Ishida; Kunio Akashi; and Toshiyuki Miyachi.\n\n\n \n\n\n\n IEEE Access, 10: 22392-22399. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9718222,\n  author={Harada, Rintaro and Shibata, Naotaka and Kaneko, Shin and Honda, Kazuaki and Terada, Jun and Ishida, Yota and Akashi, Kunio and Miyachi, Toshiyuki},\n  journal={IEEE Access},\n  title={Quick Suppression of DDoS Attacks by Frame Priority Control in IoT Backhaul With Construction of Mirai-Based Attacks},\n  year={2022},\n  volume={10},\n  number={},\n  pages={22392-22399},\n  doi={10.1109/ACCESS.2022.3153067}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n プロシージャ型処理を用いたステートレスな5Gコアネットワークの実現.\n \n \n \n\n\n \n 渡邊 大記; 島 慶一; 長谷川 知也; 村田 達郎; 金谷 知明; 平井 亮次; 西野 泰貴; 明石 邦夫; 山本 成一; 飯村 卓司; 関谷 勇司; and 堀場 勝広.\n\n\n \n\n\n\n 信学技報, 122(310): 54–59. dec 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Procedure5GC,\n    author = {渡邊 大記 and 島 慶一 and 長谷川 知也 and 村田 達郎 and 金谷 知明 and 平井 亮次 and 西野 泰貴 and 明石 邦夫 and 山本 成一 and 飯村 卓司 and 関谷 勇司 and 堀場 勝広},\n    title = {プロシージャ型処理を用いたステートレスな5Gコアネットワークの実現},\n    journal = {信学技報},\n    year = {2022},\n    month = {dec},\n    pages = {54--59},\n    volume = {122},\n    number = {310},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Extensions for Wireless Technology Emulation to Wire-based Network Testbed.\n \n \n \n\n\n \n Toshiyuki Miyachi; Kunio Akashi; Tomoya Inoue; Yota Ishida; Ryosuke Miura; Shinsuke Miwa; Fumihide Kojima; and Hiroaki Harai.\n\n\n \n\n\n\n In 2021 24th International Symposium on Wireless Personal Multimedia Communications (WPMC), pages 1-6, 2021. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9700448,\n  author={Miyachi, Toshiyuki and Akashi, Kunio and Inoue, Tomoya and Ishida, Yota and Miura, Ryosuke and Miwa, Shinsuke and Kojima, Fumihide and Harai, Hiroaki},\n  booktitle={2021 24th International Symposium on Wireless Personal Multimedia Communications (WPMC)},\n  title={Extensions for Wireless Technology Emulation to Wire-based Network Testbed},\n  year={2021},\n  volume={},\n  number={},\n  pages={1-6},\n  doi={10.1109/WPMC52694.2021.9700448}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BluMoon: Bluetooth Low Energy Emulator for Software Testing.\n \n \n \n \n\n\n \n Yumura Tsubasa; Akashi Kunio; Inoue Tomoya; and Tan Yasuo.\n\n\n \n\n\n\n Sensors and Materials, 33(1): 147–169. 1 2021.\n \n\n\n\n
\n\n\n\n \n \n \"BluMoon:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{published_papers/31045462,\ntitle = {BluMoon: Bluetooth Low Energy Emulator for Software Testing},\nauthor = {Tsubasa, Yumura and Kunio, Akashi and Tomoya, Inoue and Yasuo, Tan},\njournal = {Sensors and Materials},\nmonth = {1},\nnumber = {1},\npages = {147--169},\nvolume = {33},\nyear = {2021},\nurl = "https://myukk.org/SM2017/sm_pdf/SM2442.pdf"\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cooperated Traffic Shaping With Traffic Estimation and Path Reallocation to Mitigate Microbursts in IoT Backhaul Network.\n \n \n \n \n\n\n \n Kazuaki Honda; Naotaka Shibata; Rintaro Harada; Yota Ishida; Kunio Akashi; Shin Kaneko; Toshiyuki Miyachi; and Jun Terada.\n\n\n \n\n\n\n IEEE Access, 9: 162190–162196. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"CooperatedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/access/HondaSHIAKMT21,\n  author    = {Kazuaki Honda and\n               Naotaka Shibata and\n               Rintaro Harada and\n               Yota Ishida and\n               Kunio Akashi and\n               Shin Kaneko and\n               Toshiyuki Miyachi and\n               Jun Terada},\n  title     = {Cooperated Traffic Shaping With Traffic Estimation and Path Reallocation\n               to Mitigate Microbursts in IoT Backhaul Network},\n  journal   = {{IEEE} Access},\n  volume    = {9},\n  pages     = {162190--162196},\n  year      = {2021},\n  url       = {https://doi.org/10.1109/ACCESS.2021.3132349},\n  doi       = {10.1109/ACCESS.2021.3132349},\n  timestamp = {Sat, 25 Dec 2021 15:50:17 +0100},\n  biburl    = {https://dblp.org/rec/journals/access/HondaSHIAKMT21.bib},\n  bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n How Beneficial is Peer-to-Peer DMA?.\n \n \n \n \n\n\n \n Ryo Nakamura; Yohei Kuga; and Kunio Akashi.\n\n\n \n\n\n\n In Proceedings of the 11th ACM SIGOPS Asia-Pacific Workshop on Systems, of APSys '20, pages 25–32, New York, NY, USA, 2020. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"HowPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{10.1145/3409963.3410491,\nauthor = {Nakamura, Ryo and Kuga, Yohei and Akashi, Kunio},\ntitle = {How Beneficial is Peer-to-Peer DMA?},\nyear = {2020},\nisbn = {9781450380690},\npublisher = {Association for Computing Machinery},\naddress = {New York, NY, USA},\nurl = {https://doi.org/10.1145/3409963.3410491},\ndoi = {10.1145/3409963.3410491},\nabstract = {This paper revisits Peer-to-Peer DMA (P2P DMA) and investigates its potential for exploitation on Ethernet NICs and NVMe SSDs. The slowing performance improvement of CPUs has led to emergence of peripheral accelerators such as Smart NICs and TPU. P2P DMA presents potential for the efficient integration of multiple peripherals by avoiding data bouncing on main memory. However, P2P DMA has been studied mainly around GPUs, and its improvement has been measured for specific applications. In this paper, we perform experiments to clarify the benefits of using P2P DMA on individual devices, i.e., an Ethernet NIC and an NVMe SSD, from an I/O throughput perspective. We developed a library, called Libpop, for manipulating memory on devices for invoking P2P DMA. Additionally, we integrated Libpop into pcie-bench, which is an FPGA-based benchmark device, netmap for Ethernet NICs, and UNVMe for NVMe SSDs. Experiments with these implementations show that (1) memory writes degrade the throughput of DMA write by 70%, (2) the degradation affects I/O throughput on the devices, and (3) P2P DMA can avoid degradation, but device queues affect throughput on the Ethernet NIC.},\nbooktitle = {Proceedings of the 11th ACM SIGOPS Asia-Pacific Workshop on Systems},\npages = {25–32},\nnumpages = {8},\nkeywords = {PCIe, NVMe SSD, peer-to-peer DMA, ethernet NIC},\nlocation = {Tsukuba, Japan},\nseries = {APSys '20}\n}\n\n
\n
\n\n\n
\n This paper revisits Peer-to-Peer DMA (P2P DMA) and investigates its potential for exploitation on Ethernet NICs and NVMe SSDs. The slowing performance improvement of CPUs has led to emergence of peripheral accelerators such as Smart NICs and TPU. P2P DMA presents potential for the efficient integration of multiple peripherals by avoiding data bouncing on main memory. However, P2P DMA has been studied mainly around GPUs, and its improvement has been measured for specific applications. In this paper, we perform experiments to clarify the benefits of using P2P DMA on individual devices, i.e., an Ethernet NIC and an NVMe SSD, from an I/O throughput perspective. We developed a library, called Libpop, for manipulating memory on devices for invoking P2P DMA. Additionally, we integrated Libpop into pcie-bench, which is an FPGA-based benchmark device, netmap for Ethernet NICs, and UNVMe for NVMe SSDs. Experiments with these implementations show that (1) memory writes degrade the throughput of DMA write by 70%, (2) the degradation affects I/O throughput on the devices, and (3) P2P DMA can avoid degradation, but device queues affect throughput on the Ethernet NIC.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ARIA:シミュレーション・エミュレーション連携基盤を利用したインタラクティブな都市型水害の被害予測システム.\n \n \n \n\n\n \n 廣井 慧; 井上 朋哉; 明石 邦夫; 廣中 颯; 菅野 洋信; 湯村 翼; 宮地 利幸; and 篠田 陽一.\n\n\n \n\n\n\n In 情報処理学会論文誌コンシューマ・デバイス&システム(CDS), volume 10, pages 11–25, may 2020. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{weko_204594_1,\n   author\t = "廣井 慧 and 井上 朋哉 and 明石 邦夫 and 廣中 颯 and 菅野 洋信 and 湯村 翼 and 宮地 利幸 and 篠田 陽一",\n   title\t = "ARIA:シミュレーション・エミュレーション連携基盤を利用したインタラクティブな都市型水害の被害予測システム",\n   booktitle = "情報処理学会論文誌コンシューマ・デバイス&システム(CDS)",\n   year \t = "2020",\n   volume\t = "10",\n   number\t = "2",\n   pages\t = "11--25",\n   month\t = "may"\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Design and Implementation of a Scalable and Flexible Traffic Analysis Platform.\n \n \n \n \n\n\n \n TAKANO Yuuki; MIURA Ryosuke; YASUDA Shingo; AKASHI Kunio; and INOUE Tomoya.\n\n\n \n\n\n\n コンピュータ ソフトウェア, 36(3): 3_85-3_103. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"DesignPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Yuuki2019,\n  title={Design and Implementation of a Scalable and Flexible Traffic Analysis Platform},\n  author={TAKANO Yuuki and MIURA Ryosuke and YASUDA Shingo and AKASHI Kunio and INOUE Tomoya},\n  journal={コンピュータ ソフトウェア},\n  volume={36},\n  number={3},\n  pages={3_85-3_103},\n  year={2019},\n  doi={10.11309/jssst.36.3_85},\n  url = "https://www.jstage.jst.go.jp/article/jssst/36/3/36_3_85/_article/-char/ja/",\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ARIA: Interactive Damage Prediction System for Urban Flood Using Simulation and Emulation Federation Platform.\n \n \n \n \n\n\n \n Kei Hiroi; Tomoya Inoue; Kunio Akashi; Tsubasa Yumura; Toshiyuki Miyachi; Hayate Hironaka; Hironobu Kanno; and Yoichi Shinoda.\n\n\n \n\n\n\n In Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, of UbiComp/ISWC '19 Adjunct, pages 284–287, New York, NY, USA, 2019. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"ARIA:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{10.1145/3341162.3343823,\nauthor = {Hiroi, Kei and Inoue, Tomoya and Akashi, Kunio and Yumura, Tsubasa and Miyachi, Toshiyuki and Hironaka, Hayate and Kanno, Hironobu and Shinoda, Yoichi},\ntitle = {ARIA: Interactive Damage Prediction System for Urban Flood Using Simulation and Emulation Federation Platform},\nyear = {2019},\nisbn = {9781450368698},\npublisher = {Association for Computing Machinery},\naddress = {New York, NY, USA},\nurl = {https://doi.org/10.1145/3341162.3343823},\ndoi = {10.1145/3341162.3343823},\nabstract = {This demonstration shows an interactive urban flood damage prediction system "ARIA" that simulates urban flood, the sufferer, and network failure in an integrated manner. In terms of disaster mitigation, it is important to confirm an affected area and issue an evacuation advisory. ARIA predicts flood damages - the number of sufferers or the locations of flooded roads - and figures out the suitable timing of an evacuation advisory while incorporating actual measurement values like precipitation, river water level and person flow data observed during flood occurrence using data assimilation method. We propose flood damage prediction system, which cooperates conventional proprietary simulators for flood/evacuation/network damage analysis using simulation and emulation federation platform "Smithsonian". ARIA aims to accurately simulate actual disaster phenomena to consider how flood damages affect evacuation behavior based on the mutual impact of road condition and network damage caused by floods.},\nbooktitle = {Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers},\npages = {284–287},\nnumpages = {4},\nkeywords = {simulation, data assimilation, disaster prediction},\nlocation = {London, United Kingdom},\nseries = {UbiComp/ISWC '19 Adjunct}\n}\n\n
\n
\n\n\n
\n This demonstration shows an interactive urban flood damage prediction system \"ARIA\" that simulates urban flood, the sufferer, and network failure in an integrated manner. In terms of disaster mitigation, it is important to confirm an affected area and issue an evacuation advisory. ARIA predicts flood damages - the number of sufferers or the locations of flooded roads - and figures out the suitable timing of an evacuation advisory while incorporating actual measurement values like precipitation, river water level and person flow data observed during flood occurrence using data assimilation method. We propose flood damage prediction system, which cooperates conventional proprietary simulators for flood/evacuation/network damage analysis using simulation and emulation federation platform \"Smithsonian\". ARIA aims to accurately simulate actual disaster phenomena to consider how flood damages affect evacuation behavior based on the mutual impact of road condition and network damage caused by floods.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ARIA: シミュレーション・エミュレーション連携による都市型水害の漸進的被害推定システム.\n \n \n \n\n\n \n 廣井 慧; 井上 朋哉; 明石 邦夫; 湯村 翼; 宮地 利幸; and 篠田 陽一.\n\n\n \n\n\n\n In 日本災害情報学会第21回学会大会, Oct 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings {aria1,\n    author = "廣井 慧 and 井上 朋哉 and 明石 邦夫 and 湯村 翼 and 宮地 利幸 and 篠田 陽一",\n    title = "ARIA: シミュレーション・エミュレーション連携による都市型水害の漸進的被害推定システム",\n    booktitle = "日本災害情報学会第21回学会大会",\n    year = "2019",\n    month = "Oct"\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ARIA: シミュレーション・エミュレーション連携基盤を利用したインタラクティブな都市型水害の被害予測システム.\n \n \n \n\n\n \n 廣井 慧; 井上 朋哉; 明石 邦夫; 湯村 翼; 廣中 颯; 菅野 洋信; 宮地 利幸; and 篠田 陽一.\n\n\n \n\n\n\n In マルチメディア,分散,協調とモバイル(DICOMO2019)シンポジウム, Jul 2019. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings {aria2,\n    author = "廣井 慧 and 井上 朋哉 and 明石 邦夫 and 湯村 翼 and 廣中 颯 and 菅野 洋信 and 宮地 利幸 and 篠田 陽一",\n    title = "ARIA: シミュレーション・エミュレーション連携基盤を利用したインタラクティブな都市型水害の被害予測システム",\n    booktitle = "マルチメディア,分散,協調とモバイル(DICOMO2019)シンポジウム",\n    year = "2019",\n    month = "Jul"\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n BluMoon: Bluetooth Low Energy Emulation System with Software-Implemented Controller.\n \n \n \n \n\n\n \n Tsubasa Yumura; Kunio Akashi; and Tomoya Inoue.\n\n\n \n\n\n\n In 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pages 860-865, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"BluMoon:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{8480294,\n  author={Tsubasa Yumura and Kunio Akashi and Tomoya Inoue},\n  booktitle={2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)}, \n  title={BluMoon: Bluetooth Low Energy Emulation System with Software-Implemented Controller}, \n  year={2018},\n  volume={},\n  number={},\n  pages={860-865},\n  url = {https://ieeexplore.ieee.org/document/8480294}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n AOBAKO: A Testbed for Context-Aware Applications with Physicalizing Virtual Beacons.\n \n \n \n \n\n\n \n Tsubasa Yumura; Masatoshi Enomoto; Kunio Akashi; Futoshi Hirose; Tomoya Inoue; Satoshi Uda; Toshiyuki Miyachi; Yasuo Tan; and Yoichi Shinoda.\n\n\n \n\n\n\n In Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, of UbiComp '18, pages 476–479, New York, NY, USA, 2018. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"AOBAKO:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{10.1145/3267305.3267568,\nauthor = {Yumura, Tsubasa and Enomoto, Masatoshi and Akashi, Kunio and Hirose, Futoshi and Inoue, Tomoya and Uda, Satoshi and Miyachi, Toshiyuki and Tan, Yasuo and Shinoda, Yoichi},\ntitle = {AOBAKO: A Testbed for Context-Aware Applications with Physicalizing Virtual Beacons},\nyear = {2018},\nisbn = {9781450359665},\npublisher = {Association for Computing Machinery},\naddress = {New York, NY, USA},\nurl = {https://doi.org/10.1145/3267305.3267568},\ndoi = {10.1145/3267305.3267568},\nabstract = {In this study, we propose AOBAKO, a testbed for context-aware applications, which focuses on the testing of mobile applications using Bluetooth Low Energy (BLE) for indoor positioning. AOBAKO emulates BLE-beacon communications based on accurate frame-level emulation. In the proposed testbed, the emulation result is transferred to a physical space and beacon frames are emitted via radio waves. AOBAKO makes it possible to verify context awareness in a mobile application and can reduce the cost of a field survey.},\nbooktitle = {Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers},\npages = {476–479},\nnumpages = {4},\nkeywords = {Bluetooth Low Energy, Context Aware, Software Testing},\nlocation = {Singapore, Singapore},\nseries = {UbiComp '18}\n}\n\n
\n
\n\n\n
\n In this study, we propose AOBAKO, a testbed for context-aware applications, which focuses on the testing of mobile applications using Bluetooth Low Energy (BLE) for indoor positioning. AOBAKO emulates BLE-beacon communications based on accurate frame-level emulation. In the proposed testbed, the emulation result is transferred to a physical space and beacon frames are emitted via radio waves. AOBAKO makes it possible to verify context awareness in a mobile application and can reduce the cost of a field survey.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 超大規模無線実験のための無線ネットワークエミュレータの設計.\n \n \n \n\n\n \n 明石 邦夫; 橋本 光世; 井上 朋哉; and 宮地 利幸.\n\n\n \n\n\n\n In IN, volume 118, pages 59–64, Sep 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{network_degisn,\n    author = "明石 邦夫 and 橋本 光世 and 井上 朋哉 and 宮地 利幸",\n    title = "超大規模無線実験のための無線ネットワークエミュレータの設計",\n    pages = "59--64",\n    volume = "118",\n    number = "207",\n    year = "2018",\n    month = "Sep",\n    booktitle = "IN",\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 無線ネットワークエミュレーションにおける電波伝搬シミュレーションの高度化.\n \n \n \n\n\n \n 橋本 光世; 明石 邦夫; and 篠田 陽一.\n\n\n \n\n\n\n In マルチメディア,分散協調とモバイルシンポジウム2018論文集, volume 2018, pages 1192–1197, jun 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{weko_193605_1,\n   author\t = "橋本 光世 and 明石 邦夫 and 篠田 陽一",\n   title\t = "無線ネットワークエミュレーションにおける電波伝搬シミュレーションの高度化",\n   booktitle\t = "マルチメディア,分散協調とモバイルシンポジウム2018論文集",\n   year \t = "2018",\n   volume\t = "2018",\n   number\t = "",\n   pages\t = "1192--1197",\n   month\t = "jun"\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n セグメントルーティングにおけるセグメント階層化.\n \n \n \n\n\n \n 三島 航; 明石 邦夫; 宇多 仁; and 篠田 陽一.\n\n\n \n\n\n\n In マルチメディア,分散協調とモバイルシンポジウム2018論文集, volume 2018, pages 1397–1402, jun 2018. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{weko_193634_1,\n   author\t = "三島 航 and 明石 邦夫 and 宇多 仁 and 篠田 陽一",\n   title\t = "セグメントルーティングにおけるセグメント階層化",\n   booktitle\t = "マルチメディア,分散協調とモバイルシンポジウム2018論文集",\n   year \t = "2018",\n   volume\t = "2018",\n   number\t = "",\n   pages\t = "1397--1402",\n   month\t = "jun"\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Ditto Subsystem : A Case Study for Building Experiment Environment in StarBED Using TopDL.\n \n \n \n\n\n \n Masatoshi Enomoto; Tomoya Inoue; Kunio Akashi; Shinsuke Miwe; Toshiyuki Miyachi; and Daisuke Miyamoto.\n\n\n \n\n\n\n In 2017 European Conference on Electrical Engineering and Computer Science (EECS), pages 415-420, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{8412059,\n  author={Enomoto, Masatoshi and Inoue, Tomoya and Akashi, Kunio and Miwe, Shinsuke and Miyachi, Toshiyuki and Miyamoto, Daisuke},\n  booktitle={2017 European Conference on Electrical Engineering and Computer Science (EECS)}, \n  title={Ditto Subsystem : A Case Study for Building Experiment Environment in StarBED Using TopDL}, \n  year={2017},\n  volume={},\n  number={},\n  pages={415-420},\n  doi={10.1109/EECS.2017.83}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n IoTテストベッドのためのBluetoothエミュレーション基盤の設計.\n \n \n \n\n\n \n 湯村 翼; 明石 邦夫; and 井上 朋哉.\n\n\n \n\n\n\n In 情報処理学会第55回ユビキタスコンピューティングシステム研究会, Aug 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings {bluemoon,\n    author = "湯村 翼 and 明石 邦夫 and 井上 朋哉",\n    title = "IoTテストベッドのためのBluetoothエミュレーション基盤の設計",\n    booktitle = "情報処理学会第55回ユビキタスコンピューティングシステム研究会",\n    year = "2017",\n    month = "Aug"\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n NETorium: High-Fidelity Scalable Wireless Network Emulator.\n \n \n \n \n\n\n \n Kunio Akashi; Tomoya Inoue; Shingo Yasuda; Yuuki Takano; and Yoichi Shinoda.\n\n\n \n\n\n\n In Proceedings of the 12th Asian Internet Engineering Conference, of AINTEC '16, pages 25–32, New York, NY, USA, 2016. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"NETorium:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{10.1145/3012695.3012699,\nauthor = {Akashi, Kunio and Inoue, Tomoya and Yasuda, Shingo and Takano, Yuuki and Shinoda, Yoichi},\ntitle = {NETorium: High-Fidelity Scalable Wireless Network Emulator},\nyear = {2016},\nisbn = {9781450345521},\npublisher = {Association for Computing Machinery},\naddress = {New York, NY, USA},\nurl = {https://doi.org/10.1145/3012695.3012699},\ndoi = {10.1145/3012695.3012699},\nabstract = {Wireless networks take advantage of various technologies that wired networks do not use, such as authentication and ad hoc networks. Although it is important to verify such wireless network technologies, it is expensive or technologically difficult to repeatedly reproduce the wireless environments required for verification. Additionally, large-scale wireless network environments such as IoT environments are also required for verification of wireless technologies. However, conventional verification approaches cannot provide large-scale wireless network environments that, emulate radio propagation or verify actual wireless technologies and applications.We propose NETorium, which provides large-scale wireless network environments that are suitable for verification of wireless network technologies. NETorium comprises Meteor, a radio propagation emulator, and Asteroid, a virtual wireless network software for building virtual wireless network environments that employ hardware emulators in a wired network. Meteor can handle network protocols that, conventional radio propagation emulators cannot and is capable of emulating radio propagation in large-scale wireless network environments. Asteroid constructs virtual wireless networks that can transmit actual wireless frames.We demonstrate that NETorium can handle 1000-node wireless networks; conventional approaches can only handle a maximum of 100 nodes. Additionally, a performance evaluation of a simulated network with WPA2 authentication in the ad hoc mode demonstrates that NETorium can emulate large-scale wireless network environments with high-fidelity.},\nbooktitle = {Proceedings of the 12th Asian Internet Engineering Conference},\npages = {25–32},\nnumpages = {8},\nkeywords = {IoT, testBED, wireless network, network emulation},\nlocation = {Bangkok, Thailand},\nseries = {AINTEC '16}\n}\n\n
\n
\n\n\n
\n Wireless networks take advantage of various technologies that wired networks do not use, such as authentication and ad hoc networks. Although it is important to verify such wireless network technologies, it is expensive or technologically difficult to repeatedly reproduce the wireless environments required for verification. Additionally, large-scale wireless network environments such as IoT environments are also required for verification of wireless technologies. However, conventional verification approaches cannot provide large-scale wireless network environments that, emulate radio propagation or verify actual wireless technologies and applications.We propose NETorium, which provides large-scale wireless network environments that are suitable for verification of wireless network technologies. NETorium comprises Meteor, a radio propagation emulator, and Asteroid, a virtual wireless network software for building virtual wireless network environments that employ hardware emulators in a wired network. Meteor can handle network protocols that, conventional radio propagation emulators cannot and is capable of emulating radio propagation in large-scale wireless network environments. Asteroid constructs virtual wireless networks that can transmit actual wireless frames.We demonstrate that NETorium can handle 1000-node wireless networks; conventional approaches can only handle a maximum of 100 nodes. Additionally, a performance evaluation of a simulated network with WPA2 authentication in the ad hoc mode demonstrates that NETorium can emulate large-scale wireless network environments with high-fidelity.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware.\n \n \n \n \n\n\n \n Yuuki Takano; Ryosuke Miura; Shingo Yasuda; Kunio Akashi; and Tomoya Inoue.\n\n\n \n\n\n\n In 29th Large Installation System Administration Conference (LISA15), pages 25–36, Washington, D.C., November 2015. USENIX Association\n \n\n\n\n
\n\n\n\n \n \n \"SF-TAP:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings {193176,\n    author = {Yuuki Takano and Ryosuke Miura and Shingo Yasuda and Kunio Akashi and Tomoya Inoue},\n    title = {SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware},\n    booktitle = {29th Large Installation System Administration Conference (LISA15)},\n    year = {2015},\n    isbn = {978-1-931971-270},\n    address = {Washington, D.C.},\n    pages = {25--36},\n    url = {https://www.usenix.org/conference/lisa15/conference-program/presentation/takano},\n    publisher = {{USENIX} Association},\n    month = nov,\n    url = "https://www.usenix.org/conference/lisa15/conference-program/presentation/takano",\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 無線網に対応した実時間映像音声伝送制御の検証のための時間推移ネットワークエミュレーションとその用法.\n \n \n \n\n\n \n 村本 衛一 香林 誠; 石井 秀教; 明石 邦夫; 知念 賢一; and 篠田 陽一.\n\n\n \n\n\n\n 理論・実践に立脚したインターネットアーキテクチャ論文特集, J98-B(10): 1060-1069. 10 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article {muramoto,\n    title = "無線網に対応した実時間映像音声伝送制御の検証のための時間推移ネットワークエミュレーションとその用法",\n    author = "村本 衛一 amd 香林 誠 and 石井 秀教 and 明石 邦夫 and 知念 賢一 and 篠田 陽一", \n    journal = "理論・実践に立脚したインターネットアーキテクチャ論文特集",\n    publisher = "電子情報通信学会論文誌B",\n    volume = "J98-B", \n    number = "10", \n    pages = "1060-1069",\n    year = "2015",\n    month = "10"\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Meteor: 大規模ネットワーク実験環境における無線ネットワークエミュレータの設計と実装.\n \n \n \n\n\n \n 明石 邦夫; 井上 朋哉; ラズバン べウラン; and 篠田 陽一.\n\n\n \n\n\n\n 電子情報通信学会論文誌 B, 98(4): 357–372. Apr 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article {meteor,\n    author = "明石 邦夫 and 井上 朋哉 and ラズバン べウラン and 篠田 陽一",\n    title = "Meteor: 大規模ネットワーク実験環境における無線ネットワークエミュレータの設計と実装",\n    journal = "電子情報通信学会論文誌 B",\n    volume = "98",\n    number = "4",\n    pages = "357--372",\n    year = "2015",\n    month = "Apr"\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n On the Impact of Mobile Network Delays on Connection Establishment Performance of a Carrier Grade NAT Device.\n \n \n \n \n\n\n \n Yasuhiro Ohara; Kaname Nishizuka; Ken'ichi Chinen; Kunio Akashi; Makoto Kohrin; Eiichi Muramoto; and Shin Miyakawa.\n\n\n \n\n\n\n In Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference, of AINTEC '14, pages 1–8, New York, NY, USA, 2014. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{10.1145/2684793.2684794,\nauthor = {Ohara, Yasuhiro and Nishizuka, Kaname and Chinen, Ken'ichi and Akashi, Kunio and Kohrin, Makoto and Muramoto, Eiichi and Miyakawa, Shin},\ntitle = {On the Impact of Mobile Network Delays on Connection Establishment Performance of a Carrier Grade NAT Device},\nyear = {2014},\nisbn = {9781450332514},\npublisher = {Association for Computing Machinery},\naddress = {New York, NY, USA},\nurl = {https://doi.org/10.1145/2684793.2684794},\ndoi = {10.1145/2684793.2684794},\nabstract = {IPv4 addresses are nearly exhausted worldwide. For some time until IPv6 becomes pervasive\nas an ultimate solution, deployment of Carrier Grade NAT (CGN) devices becomes necessary,\nespecially in the mobile carriers' networks which anticipate a large and growing number\nof new users. In this context, we tackle the evaluation of the impact of inserting\na CGN device in the network, and in conjunction with the mobile network communication\ndelays. We compare the Connection Establishment Rate (CER) with or without a CGN device,\nalso with or without the emulated mobile network communication delays. Against our\nanticipation, the types of time-varying mobile network delays do not have a significant\nimpact on CER. The effect of the changing delay fades away in the aggregation of many\nuser traffic at the core part of the network, even though the time-varying mobile\nnetwork communication delays are individually and separately emulated for each user.\nTo the best of our knowledge, this is the first to study the relationship between\nthe CGN performance and the mobile network's communication delays. The result suggests\nthat modeling the aggregate traffic trend (such as the constant delay portion in the\nnetwork dynamics) is more important rather than emulating each user's traffic separately.},\nbooktitle = {Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference},\npages = {1–8},\nnumpages = {8},\nkeywords = {Mobile Communication Delay, Benchmark, CGN},\nlocation = {Chiang Mai, Thailand},\nseries = {AINTEC '14}\n}\n\n
\n
\n\n\n
\n IPv4 addresses are nearly exhausted worldwide. For some time until IPv6 becomes pervasive as an ultimate solution, deployment of Carrier Grade NAT (CGN) devices becomes necessary, especially in the mobile carriers' networks which anticipate a large and growing number of new users. In this context, we tackle the evaluation of the impact of inserting a CGN device in the network, and in conjunction with the mobile network communication delays. We compare the Connection Establishment Rate (CER) with or without a CGN device, also with or without the emulated mobile network communication delays. Against our anticipation, the types of time-varying mobile network delays do not have a significant impact on CER. The effect of the changing delay fades away in the aggregation of many user traffic at the core part of the network, even though the time-varying mobile network communication delays are individually and separately emulated for each user. To the best of our knowledge, this is the first to study the relationship between the CGN performance and the mobile network's communication delays. The result suggests that modeling the aggregate traffic trend (such as the constant delay portion in the network dynamics) is more important rather than emulating each user's traffic separately.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Emulation-Based ICT System Resiliency Verification for Disaster Situations.\n \n \n \n\n\n \n Shingo Yasuda; Kunio Akashi; Toshiyuki Miyachi; Razvan Beuran; Yoshiki Makino; Tomoya Inoue; Shinsuke Miwa; and Yoichi Shinoda.\n\n\n \n\n\n\n In 2013 International Conference on Signal-Image Technology Internet-Based Systems, pages 875-882, 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{6727293,\n  author={Yasuda, Shingo and Akashi, Kunio and Miyachi, Toshiyuki and Beuran, Razvan and Makino, Yoshiki and Inoue, Tomoya and Miwa, Shinsuke and Shinoda, Yoichi},\n  booktitle={2013 International Conference on Signal-Image Technology   Internet-Based Systems}, \n  title={Emulation-Based ICT System Resiliency Verification for Disaster Situations}, \n  year={2013},\n  volume={},\n  number={},\n  pages={875-882},\n  doi={10.1109/SITIS.2013.143}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Emulation-based ICT System Resiliency Verification for Disaster Situations.\n \n \n \n\n\n \n Shingo Yasuda; Kunio Akashi; Toshiyuki Miyachi; Razvan Beuran; Yoshiki Makino; Tomoya Inoue; Shinsuke Miwa; and Yoichi Shinoda.\n\n\n \n\n\n\n In Workshop on Resilient Internet based Systems (REIS 2013), of SITIS 2013, pages 2-5, December 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings {building_blocks,\n    author = "Shingo Yasuda and Kunio Akashi and Toshiyuki Miyachi and Razvan Beuran and Yoshiki Makino and Tomoya Inoue and Shinsuke Miwa and Yoichi Shinoda",\n    title = "Emulation-based ICT System Resiliency Verification for Disaster Situations",\n    booktitle = "Workshop on Resilient Internet based Systems (REIS 2013)",\n    series = "SITIS 2013",\n    location = "Kyoto, Japan",\n    pages = "2-5",\n    month = "December",\n    year = "2013"\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Technical Requirements of Experiment Support Software for Huge-Scale Network Environment.\n \n \n \n\n\n \n Yasuda Shingo; Akashi Kunio; Enomoto Masatoshi; Miwa Shinsuke; and Yoichi Shinoda.\n\n\n \n\n\n\n International Journal of Computers and Communications, 7: 99–106. 2013.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article {yasuda_journal,\n    author = "Shingo, Yasuda and Kunio, Akashi and Masatoshi, Enomoto and Shinsuke, Miwa and Yoichi Shinoda",\n    title = "Technical Requirements of Experiment Support Software for Huge-Scale Network Environment",\n    journal = "International Journal of Computers and Communications",\n    series = "id.123",\n    pages = "99--106",\n    issue = "4",\n    volume = "7",\n    year = "2013"\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n On network system evaluation under various failures.\n \n \n \n\n\n \n Toshiyuki Miyachi; Razvan Beuran; Yoshiki Makino; Kunio Akashi; Shingo Yasuda; Tomoya Inoue; Shinsuke Miwa; Satoshi Uda; Yasuo Tan; and Yoichi Shinoda.\n\n\n \n\n\n\n In pages 226–227, 2012. VALUETOOLS\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings {shiva,\n    author = "Toshiyuki Miyachi and Razvan Beuran and Yoshiki Makino and Kunio Akashi and Shingo Yasuda and Tomoya Inoue and Shinsuke Miwa and Satoshi Uda and Yasuo Tan and Yoichi Shinoda",\n    title = "On network system evaluation under various failures",\n    publisher = "VALUETOOLS",\n    year = "2012",\n    pages = "226--227"\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Requirements of Large Data Distribution Mechanism for Large-Scale Network Testbed.\n \n \n \n\n\n \n Yasuda Shingo; Akashi Kunio; Inoue Tomoya; Miyachi Toshiyuki; Miwa Shinsuke; Chinen Ken-ichi; and Shinoda Yoichi.\n\n\n \n\n\n\n In 2nd European Conference of Comupter Science(ECCS11), pages 315–322, Puerto De La Cruz Tenerife, Spain, 2011. WSEAS\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings {yasuda_testbed,\n    author = "Shingo, Yasuda and Kunio, Akashi and Tomoya, Inoue and Toshiyuki, Miyachi and Shinsuke, Miwa and Ken-ichi, Chinen and Yoichi, Shinoda",\n    title = "Requirements of Large Data Distribution Mechanism for Large-Scale Network Testbed",\n    booktitle = "2nd European Conference of Comupter Science(ECCS11)",\n    pages = "315--322",\n    address = "Puerto De La Cruz Tenerife, Spain",\n    publisher = "WSEAS",\n    isbn = "ISBN 978-1-67804-056-5",\n    year = "2011"\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Functional and Performance Verification of Overlay Multicast Applications - A Product Level Approach.\n \n \n \n\n\n \n Thilmee Baduge; Lim Boon Ping; Kunio Akashi; Jason Soong; Ken-ichi Chinen; Ettikan K.; and Eiichi Muramoto.\n\n\n \n\n\n\n In 2010 7th IEEE Consumer Communications and Networking Conference, pages 1-5, 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{5421610,\n  author={Baduge, Thilmee and Ping, Lim Boon and Akashi, Kunio and Soong, Jason and Chinen, Ken-ichi and K. K., Ettikan and Muramoto, Eiichi},\n  booktitle={2010 7th IEEE Consumer Communications and Networking Conference}, \n  title={Functional and Performance Verification of Overlay Multicast Applications - A Product Level Approach}, \n  year={2010},\n  volume={},\n  number={},\n  pages={1-5},\n  doi={10.1109/CCNC.2010.5421610}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n ネットワークエミュレーションツール「dummynet」.\n \n \n \n\n\n \n .\n\n\n \n\n\n\n Volume 64 2010.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@book{published_papers/33695115,\ntitle = {ネットワークエミュレーションツール「dummynet」},\nauthor = {},\nnumber = {10},\npages = {1473--1476},\ndoi = {10.3169/itej.64.1473},\nvolume = {64},\nyear = {2010}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n リンクエミュレータの多重実行の限界値測定.\n \n \n \n\n\n \n 明石 邦夫; 井上 朋哉; 安田 真悟; 村本 衛一; 知念 賢一; 宇多 仁; and 篠田 陽一.\n\n\n \n\n\n\n In pages 33–39, Oct 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ic2009,\n    author = "明石 邦夫 and 井上 朋哉 and 安田 真悟 and 村本 衛一 and 知念 賢一 and 宇多 仁 and 篠田 陽一",\n    title = "リンクエミュレータの多重実行の限界値測定",\n    pages = "33--39",\n    number = "",\n    volume = "",\n    month = {Oct},\n    year = "2009"\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);