Updated on 2024/11/29

Information

 

写真a

 
KOIDE HIROSHI
 
Organization
Research Institute for Information Technology Section of Cyber Security for Information Systems Professor
Cyber Security Center (Concurrent)
Graduate School of Information Science and Electrical Engineering Department of Information Science and Technology(Concurrent)
Title
Professor
Contact information
メールアドレス
Profile
received B.E., M.E. and D.E. degrees from the University of Electro Communications, Tokyo, Japan in 1991, 1993 and 1997, respectively. From 1996 to 2001, he was a researcher in the Center for Promotion of Computational Science and Engineering, Japan Atomic Energy Research Institute, Tokyo. From 2001 to 2003, he was a Lecturer in the Division of Communication Systems Engineering, Department of Electrical, Electronic and Computer Engineering, Kyushu Institute of Technology, Kita-Kyushu. From 2017 to 2003, he has been an Associate Professor in the Department of Artificial Intelligence, Faculty of Computer Science and Systems Engineering, Kyushu Institute of Technology, Iizuka. Since April 2017, he has been a Professor in Research Institute for Information Technology and Cyber Security Center, Kyushu University, Fukuoka. His research interests include cyber security, task scheduling, memory management and parallel and distribute computing. He is a member of the ACM, IPSJ, JSSST and IEICE.
Homepage
External link

Degree

  • Doctor of Philosophy in Engineering

Research History

  • Kyushu University Research Institute for Information Technology Professor 

    2017.4 - Present

      More details

    Country:Japan

    researchmap

  • Kyushu Institute of Technology  Associate Professor 

    2009

      More details

  • 九州工業大学 工学(系)研究科(研究院)・情報工学部  講師・助教授 

    2003

      More details

  • 九州工業大学 工学研究科  Lecturer 

    2002

      More details

  • 1996年4月〜2001年3月 日本原子力研究所計算科学技術推進センター 研究員   

    1996年4月〜2001年3月 日本原子力研究所計算科学技術推進センター 研究員

  • 2001年4月〜2003年3月 九州工業大学大学院工学研究科 講師, 2003年4月〜2007年3月 九州工業大学情報工学部 助教授, 2007年4月〜2008年3月 九州工業大学情報工学部 准教授, 2008年4月〜2014年3月 九州工業大学大学院情報工学研究院知能情報工学研究系 准教授, 2014年4月〜2017年3月 九州工業大学大学院情報工学研究院情報創成工学研究系 准教授   

▼display all

Research Interests・Research Keywords

  • Research theme: Dynamic Memory Management

    Keyword: Dynamic Memory Management

    Research period: 2024

  • Research theme: Cybersecurity

    Keyword: Cybersecurity

    Research period: 2024

  • Research theme: Moving Target Defense

    Keyword: Cyber Security, Information System, IoT System, Cyber Attack

    Research period: 2019.5 - 2023.3

  • Research theme: Research on Attack Detection for Network Applications

    Keyword: Cyber Security, Web Application, Web Application Firewall, Honeypot, Attack Detection

    Research period: 2017.4 - 2023.3

  • Research theme: Developing of Auxiliary Environment for Practical Programming Eduction

    Keyword: Education and learning process informatization, Practical programming education, support of programming education, Learning progression, Activities on PC

    Research period: 2017.4 - 2020.4

  • Research theme: Routing Algorithm for Distributed XML Processing

    Keyword: Distributed XML Processing, Routing, PASS Architecture

    Research period: 2017.4 - 2020.3

Awards

  • 優秀発表賞

    2017.8   情報処理学会 情報教育シンポジウム   平成29年8月19日(土)、情報処理学会 情報教育シンポジウム (SSS2017) において、九州工業大学情報工学府の高橋真奈茄・九州大学情報基盤研究開発センター小出洋教授・九州工業大学学習教育センター近藤秀樹助教が優秀発表賞を受賞した。本発表賞は情報教育シンポジウム(SSS)で優秀な発表をした論文の著者(共著者含む)に授与されるものである。受賞した研究は、プログラミングの授業中のつまづきを網羅的で細粒度の活動履歴から視覚化・検出し,教員やTAの教育活動の支援を実現するものである。 【受賞対象】 著 者: 高橋真奈茄・小出洋・近藤秀樹 研究題目:実践的プログラミング教育のための支援環境における活動履歴を用いた活動パターン抽出の試み

Papers

  • Improved Vulnerability Handling Framework to Automatically Fix Vulnerable Web Applications. Reviewed

    Yuki Funaoka, Hiroshi Koide

    CANDARW   208 - 212   2023.12   ISBN:9798350306941

     More details

    Language:English   Publishing type:Research paper (other academic)   Publisher:Proceedings - 2023 11th International Symposium on Computing and Networking Workshops, CANDARW 2023  

    With the spread of smartphones and personal computers, many people are using Web applications. Web applications are subject to various attacks from all over the world through the Internet. However, it is difficult for web application developers to always create secure web applications. This paper aims to support the creation of secure Web applications by automatically fixing vulnerable code with a Web application framework. Therefore, we use a web application framework called VHF (Vulnerability Handling Framework) [1]. We propose to add a new variable to the source code update system, which is part of the VHF functions. By doing so, we hope to reduce the cost of adding methods to fix vulnerabilities in VHF and increase the flexibility of the fix methods. Using an Electronic Commerce site as an example situation, a simple Web application will be created to confirm the effectiveness of the proposed method.

    DOI: 10.1109/CANDARW60564.2023.00042

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/candar/candar2023w.html#FunaokaK23

  • New Perspectives on Data Exfiltration Detection for Advanced Persistent Threats Based on Ensemble Deep Learning Tree. Reviewed

    Xiaojuan Cai, Hiroshi Koide

    WEBIST   276 - 285   2023.11   ISSN:21843252 ISBN:9789897586729

     More details

    Language:English   Publishing type:Research paper (other academic)   Publisher:International Conference on Web Information Systems and Technologies, WEBIST - Proceedings  

    Data exfiltration of Advanced Persistent Threats (APTs) is a critical concern for high-value entities such as governments, large enterprises, and critical infrastructures, as attackers deploy increasingly sophisticated and stealthy tactics. Although extensive research has focused on methods to detect and halt APTs at the onset of an attack (e.g., examining data exfiltration over Domain Name System tunnels), there has been a lack of attention towards detecting sensitive data exfiltration once an APT has gained a foothold in the victim system. To address this gap, this paper analyzes data exfiltration detection from two new perspectives: exfiltration over a command-and-control channel and limitations on exfiltration transfer size, assuming that APT attackers have established a presence in the victim system. We introduce two detection mechanisms (Transfer Lifetime Volatility & Transfer Speed Volatility) and propose an ensemble deep learning tree model, EDeepXGB, based on eXtreme Gradient Boosting, to analyze data exfiltration from these perspectives. By comparing our approach with eight deep learning models (including four deep neural networks and four convolutional neural networks) and four traditional machine learning models (Naive Bayes, Quadratic Discriminant Analysis, Random Forest, and AdaBoost), our approach demonstrates competitive performance on the latest public real-world dataset (Unraveled-2023), with Precision of 91.89%, Recall of 93.19%, and F1-Score of 92.49%.

    DOI: 10.5220/0012181200003584

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/webist/webist2023.html#CaiK23

  • Electric Vehicle Authentication and Secure Metering in Smart Grids Reviewed

    Yutaka Yamaguchi, Dirceu Cavendish, Hiroshi Koide

    Proc. 17th International Conference on Emerging Security Information, Systems and Technologies, SECUREWARE 2023   2023.9

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • Detection and Isolation Malware by Dynamic Routing Moving Target Defense with Proxies Reviewed International journal

    #Kouki Inoue and @Hiroshi Koide

    The 2022 International Conference on Computational Science and Computational Intelligence (CSCI'22: December 14-16, 2022; Las Vegas, USA)   2022.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • 計算状態操作機構を備えたS式ベースJava言語の変換に基づく実装に向けて

    西田, 知広, 八杉, 昌宏, 平石, 拓, 小出, 洋

    情報処理学会論文誌プログラミング(PRO)   15 ( 4 )   3 - 3   2022.9

     More details

    Language:Japanese  

    Towards Transformation-based Implementations of an S-expression-based Java Language That Features Legitimate Execution Stack Access

  • Advances in adversarial attacks and defenses in Intrusion Detection System: A survey Reviewed International journal

    #Mariama Mbow, @Hiroshi Koide and @Kouichi Sakurai

    Proc. The 4th International Conference on Science of Cyber Security - SciSec 2022   2022.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • SecurePublicationSubscriptionFrameworkfor ReliableInformationDissemination Reviewed International journal

    #ShugoYoshimura,#Kouki Inoue, @Dirceu Cavendish, Hirosh iKoide

    Proc. The 2022 IARIA Annual Congress on Frontiers in Science, Technology, Service and Applications, IARIA Congress 2022.   2022.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • An Intrusion Detection System for Imbalanced Dataset Based on Deep Learning. Reviewed

    Mariama Mbow, Hiroshi Koide, Kouichi Sakurai

    CANDAR   38 - 47   2021.11

     More details

    Language:Others   Publishing type:Research paper (other academic)  

    DOI: 10.1109/CANDAR53791.2021.00013

  • KAKOI: A New Tool to Make Simple and Secure Build Cyber Ranges Using Public Cloud Reviewed

    Tomoya Terashima, Masahiro Nakayama, Teruaki Yokoyama, Hiroshi Koide

    2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)   2021.11

     More details

    Language:Others   Publishing type:Research paper (other academic)  

    DOI: 10.1109/candarw53999.2021.00073

  • Applying The Attacks Tracer on Advanced Persistent Threats to Real Networks Reviewed

    Yuya Tajima, Hiroshi Koide

    2021 Ninth International Symposium on Computing and Networking Workshops (CANDARW)   392 - 397   2021.11

     More details

    Language:English   Publishing type:Research paper (other academic)  

  • MTD: Run-time System Call Mapping Randomization Reviewed

    Takeshi Masumoto, Wai Kyi Kyi Oo, Hiroshi Koide

    Proc. 2021 International Workshop on Cyber Security   257 - 263   2021.8

     More details

    Language:Others   Publishing type:Research paper (other academic)  

    DOI: 10.1109/ISCSIC54682.2021.00054

  • A New Feature to Secure Web Applications Reviewed International journal

    #Kohei Kubota, #Wai Kyi Kyi Oo, @Hiroshi Koide

    8th International Symposium on Computing and Networking Workshops, CANDARW 2020   2020.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web application security is one of essential components of any web-based systems. As becoming popular of the Internet makes many web sites be attacked by many kinds of attacks. So, we have to propose a secure framework for web applications. For this reason, we have to propose a web application framework which not only analyzes the source code implemented by web developers, also it can detects the vulnerabilities in the source code dynamically. Although a lot of research works have already proposed detection methods of vulnerabilities in web application attacks, but those are not fully detected because their methods do not use the information of the web applications. Therefore, we propose a new method which analyzes the source code of a web application, and then modifies it if needed, in addition, our method has a detection method of an application's vulnerabilities that are difficult to detect by previous methods. According to our implementation and experiments, it is possible to detect actual attacks, which have been considered difficult to detect, against authentication leaks and SQL injection attacks using dynamic queries.

  • A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Network Reviewed International journal

    #Zhao Hao, @Yaokai Feng, @Hiroshi Koide, @Kouichi Sakurai

    International Journal of Networking and Computing   10 ( 2 )   2020.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • Efficient Shortest Path Routing Algorithms for Distributed XML Processing Reviewed International journal

    #Longjian Ye, @Hiroshi Koide, @Dirceu Cavendish, @Kouichi Sakurai

    Proceedings of the 15th International Conference on Web Information Systems and Technologies, WEBIST 2019   2019.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Proposal and Evaluation of a Security Incident Response Training Method using Programming Reviewed International journal

    #Katsumi Nagai, @Hiroshi Koide, @Kouichi Sakurai

    SIGITE '19: Proceedings of the 20th Annual SIG Conference on Information Technology Education   2019.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Nowadays, there are various cyber-attacks in the world. In terms of dealing with cyber incident, there are many non-technical factors. Table Top Exercises are available for improving it but need some fund, time and trainers who conduct it more smoothly. So, in this work, we propose a security incident response training method using programming. It aims to improve some non-technical skills. Our proposal is actually executed with questionnaires.

  • Analyzing the Effect of Moving Target Defense for a Web System Invited Reviewed International journal

    #Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai

    International Journal of Networking and Computing   2019.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

  • A new design for evaluating moving target defense system Reviewed International journal

    #Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    In Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018   561 - 563   2018.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • Tracing MIRAI malware in networked system Reviewed International journal

    #Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    In Proceedings - 2018 6th International Symposium on Computing and Networking Workshops   534 - 538   2018.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • 実践的プログラミング教育の支援環境における活動履歴を用いた活動パターン抽出の試み Reviewed

    @高橋 真奈茄,小出 洋,@近藤 秀樹

    情報処理学会情報教育シンポジウム論文集   40   247 - 254   2017.8

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

  • An Implementation of Tracing Attacks on Advanced Persistent Threats by Using Actors Model Reviewed International journal

    Murakami, T., Kumano, S. and Koide, H.

    2014.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

  • HTTPプロキシサーバでのCookie挿入によるバックドア通信の検出 Reviewed

    加藤雅彦,小出 洋,金岡 晃,松川博英,前田典彦,岡本栄司

    情報処理学会論文誌   55 ( 9 )   2008 - 2010   2014.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • LSI論理シミュレーションにおけるSIMD並列化手法の提案 Reviewed

    甲斐夏季, 小出 洋

    情報処理学会論文誌 コンピューティングシステム   7 ( 1 )   46 - 56   2014.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

  • Break away from button-UI to gesture operation on touch device Reviewed

    Nobuo Saito, Hiroshi Koide, Hideki Kondo

    Computer Software   30 ( 4 )   36 - 44   2013.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    A web browser application for iOS, Libing, proposes a solution to resolve the problems of complicated button-based user interface (UI). The authors implement a gesture-based UI in Libing to realize simple and plentiful operations. Libing also keeps available display area maximum. Users can memorize correspondence between gestures and operations easily because users can assign arbitrary gestures to any operations and/or URLs flexibly in Libing. Touch-input-devices as typified by smartphones and tablet PCs have become popular recently. The market of these application programs has grown continuously. The most application programs are operated by the button-based UI. We can understand it visually. And the button-based UI is popular because we do not have incorrect operations when buttons are sufficiently large. However if we want to assign a lot of functions to buttons, we have to prepare many small buttons and/or a large area on which we place many buttons. We might have to divide the area to several pages to place all buttons. At least the user experience will be compromised because users have a lot of incorrect operations, available display area is compromised and operations become to be complicated. This study gives a solution to these problems which compromise the user experience.

  • Tracing advanced persistent threats in networked systems

    Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto

    Automated Security Management   179 - 187   2013.1

     More details

    Language:English  

    We herein discuss the modeling of target information systems as well as various attacks, in order to clarify the impact of Advanced Persistent Threats (APTs) and to enable efficient planning of defense strategies to counter APTs.

    DOI: 10.1007/978-3-319-01433-3_11

  • A Mean Value Analysis approach to transaction performance evaluation of multi-server systems Reviewed

    D. Cavendish, Hiroshi Koide, Y. Oie, M. Gerla

    Concurrency Computation Practice and Experience   22 ( 10 )   1267 - 1285   2010.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In this paper, we introduce a Mean Value Analysis (MVA)-based methodology for the performance evaluation of transactions executed in a multi-server distributed system. We first present probabilistic arguments to investigate under which conditions MVA models provide worst-case response times, without large overshoots. Then, we show how to characterize the distributed server system so as to construct a model to predict response times as well as to estimate system capacity. Finally, we exemplify the methodology usage via transactions implemented in two distributed Linux systems.

    DOI: 10.1002/cpe.1582

  • Utilizing multi-networks task scheduler for streaming applications

    Kazumi Yoshinaga, Yoshiyuki Uratani, Hiroshi Koide

    37th International Conference on Parallel Processing Workshops, ICPP 2008 Proceedings - 37th International Conference on Parallel Processing Workshops, ICPP 2008   25 - 30   2008

     More details

    Language:English   Publishing type:Research paper (other academic)  

    This paper proposes and evaluates a new task scheduling method for parallel and distributed applications in an environment consisting of multiple networks having different characteristics. The proposed method can schedule both streaming applications and non-streaming applications effectively at the same time, since it selects the most suitable networks for the communications of tasks and considers the changing loads of the networks. The experimental results show the proposed method reduced the total execution time of a practical streaming application. The dispersion of the execution time was also suppressed even if the network bandwidth was dynamically changing. This characteristic is very important when this method is applied to more complicated task scheduling methods.

    DOI: 10.1109/ICPP-W.2008.16

  • Special section on parallel/distributed processing and systems Reviewed

    Akihiro Fujiwara, Koji Nakano, Hong Chen, Jacir L. Bordim, Satoshi Fujita, Shuichi Ichikawa, Yasushi Inoguchi, Chuzo Iwamoto, Hiroshi Koide, Toshimitsu Masuzawa, Susumu Matsumae, Hiroshi Matsuo, Eiji Miyano, Jun Miyazaki, Masafumi Yamashita

    IEICE Transactions on Information and Systems   E90-D ( 1 )   2007.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietisy/e90-1.1.1

  • A new task scheduling method for distributed programs that require memory management Reviewed

    Hiroshi Koide, Yuji Oie

    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE   18 ( 9 )   941 - 958   2006.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In parallel and distributed applications, it is very likely that object-oriented languages, such as Java and Ruby, and large-scale semistructured data written in XML will be employed. However, because of their inherent dynamic memory management, parallel and distributed applications must sometimes suspend the execution of all tasks running on the processors. This adversely affects their execution on the parallel and distributed platform. In this paper, we propose a new task scheduling method called CP/MM (Critical Path/Memory Management) which can efficiently schedule tasks for applications requiring memory management. The underlying concept is to consider the cost due to memory management when the task scheduling system allocates ready (executable) coarse-grain tasks, or macro-tasks, to processors. We have developed three task scheduling modules, including CP/MM, for a task scheduling system which is implemented on a Java RMI (Remote Method Invocation) communication infrastructure. Our experimental results show that CP/MM can successfully prevent high-priority macro-tasks from being affected by the garbage collection arising from memory management, so that CP/MM can efficiently schedule distributed programs whose critical paths are relatively long. Copyright (c) 2005 John Wiley & Sons, Ltd.

    DOI: 10.1002/cpe.963

  • A new task scheduling method for distributed programs that require memory management Reviewed

    Hiroshi Koide, Yuji Oie

    Concurrency Computation Practice and Experience   18 ( 9 )   941 - 958   2006.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In parallel and distributed applications, it is very likely that object-oriented languages, such as Java and Ruby, and large-scale semistructured data written in XML will be employed. However, because of their inherent dynamic memory management, parallel and distributed applications must sometimes suspend the execution of all tasks running on the processors. This adversely affects their execution on the parallel and distributed platform. In this paper, we propose a new task scheduling method called CP/MM (Critical Path/Memory Management) which can efficiently schedule tasks for applications requiring memory management. The underlying concept is to consider the cost due to memory management when the task scheduling system allocates ready (executable) coarse-grain tasks, or macro-tasks, to processors. We have developed three task scheduling modules, including CP/MM, for a task scheduling system which is implemented on a Java RMI (Remote Method Invocation) communication infrastructure. Our experimental results show that CP/MM can successfully prevent high-priority macro-tasks from being affected by the garbage collection arising from memory management, so that CP/MM can efficiently schedule distributed programs whose critical paths are relatively long.

    DOI: 10.1002/cpe.963

  • Influence of network characteristics on application performance in a grid environment Reviewed

    Yoshinori Kitatsuji, Katsuyuki Yamazaki, Hiroshi Koide, Masato Tsuru, Yuji Oie

    Telecommunication Systems   30 ( 1-3 )   99 - 121   2005.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In grid computing, a key issue is how limited network resources can be shared by communications by various applications more effectively in order to improve application-level performance, e.g., by reducing the completion time for an individual application and/or set of applications. Communication by an application changes the condition of the network resources, which may, in turn, affect communications by other applications, and thus may degrade their performance. In this paper, we examine the characteristics of traffic generated by typical grid applications, and the effect of the round-trip time and bottleneck bandwidth on the application-level performance (i.e., completion time) of these applications. Our experiments showed that the impact of network conditions on the performance of various applications and the impact of application traffic on network conditions differed considerably depending on the application. These results suggest that effective allocation of network resources must take into account the network-related properties of individual applications.

    DOI: 10.1007/s11235-005-4320-5

  • Influence of network characteristics on application performance in a grid environment Reviewed

    Y Kitatsuji, K Yamazaki, H Koide, M Tsuru, Y Oie

    TELECOMMUNICATION SYSTEMS   30 ( 1-3 )   99 - 121   2005.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In grid computing, a key issue is how limited network resources can be shared by communications by various applications more effectively in order to improve application-level performance, e.g., by reducing the completion time for an individual application and/or set of applications. Communication by an application changes the condition of the network resources, which may, in turn, affect communications by other applications, and thus may degrade their performance. In this paper, we examine the characteristics of traffic generated by typical grid applications, and the effect of the round-trip time and bottleneck bandwidth on the application-level performance (i.e., completion time) of these applications. Our experiments showed that the impact of network conditions on the performance of various applications and the impact of application traffic on network conditions differed considerably depending on the application. These results suggest that effective allocation of network resources must take into account the network-related properties of individual applications.

    DOI: 10.1007/s11235-005-4320-5

  • On the influence of network characteristics on application performance in the grid environment Reviewed

    Yoshinori Kitatsuji, Satoshi Katsuno, Katsuyuki Yamazaki, Hiroshi Koide, Masato Tsuru, Yuji Oie

    Lecture Notes in Computer Science   3420 ( I )   9 - 18   2005

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In the Grid computing, it is a key issue how limited network resources are effectively shared by communications of various applications in order to improve the application-level performance, e.g., to reduce the completion time of each application and/or a set of applications. In fact, the communication of an application changes the condition of network resources, which may, in turn, affect the communications in other applications, and thus may deteriorate their performance. In this paper, we examine the characteristics of traffic generated by some typical grid applications, and how the round-trip time and the bottleneck bandwidth affect the application-level performance (i.e., completion time) of these applications. Our experiments show that the impact of network conditions on the application performance and the impact of application traffic on the network conditions are considerably different depending on the application. Those results suggest an effective network resource allocation should take network-related properties of individual applications into consideration.

  • A new task scheduling method for distributed programs which require memory management in grids

    Hiroshi Koide, Yuji Oie

    Proceedings - 2004 International Symposium on Applications and the Internet Workshops (Saint 2004Workshop) Proceedings - 2004 International Symposium on Applications and the Internet Workshops (Saint 2004Workshops)   666 - 673   2004.6

     More details

    Language:English   Publishing type:Research paper (other academic)  

    In the Grid applications, it is very likely that object oriented languages, like Java and Ruby, will be employed as well as large-scale semi-structured data like XML. However, their inherent dynamic memory management has to suspend the execution of all the tasks running on processors when it is invoked. This will adversely affect the Grid computing severely unless the task scheduling system can avoid it with some special mechanism. In this paper, we propose a new task scheduling method, referenced to as CP/MM, which can efficiently schedule tasks for applications requiring memory management. The underlying concept is to consider the cost due to memory management when the task scheduling system allocates ready coarse grain tasks, or macro-tasks, to processors. We have developed three task scheduling modules including an implementation of CP/MM into a task scheduling system is implemented on Java RMI (Remote Method Invocation) communication infrastructure. Moreover, we evaluate the fundamental performance of CP/MM in two ways. The first is the performance evaluation of CP/MM which is applied to a small but practical test application program on a PC cluster. The second is the performance evaluation for test programs which have many tasks with complicated dependency relations on the test bed system consisting of computers on our two campuses located at a distance of approximately 32 km. These experimental results show that CP/MM can successfully prevent high priority macro-tasks from being affected by the garbage collection arising from the memory management, so that CP/MM can efficiently schedule distributed programs whose critical paths are relatively long.

  • HF-STEX and RASSCF calculations on nitrogen K-shell X-ray absorption of purine base and its derivative Reviewed

    Yuji Mochizuki, Hiroshi Koide, Toshiyuki Imamura, Hiroshi Takemiya

    Journal of Synchrotron Radiation   8 ( 2 )   1003 - 1005   2001.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    The nitrogen K-shell X-ray absorption spectra of the purine bases present in nucleic acids, adenine and guanine, were analyzed by using ab initio Hartree-Fock static exchange and restricted-active-space self-consistent-field calculations. A variety of derivative molecules were calculated to investigate the energetic shifts due to environmental effects on the nitrogen atoms. Shake-up excitations were also addressed.

    DOI: 10.1107/S0909049500017696

  • HF-STEX and RASSCF calculations on nitrogen K-shell X-ray absorption of purine base and its derivative Reviewed

    Y Mochizuki, H Koide, T Imamura, H Takemiya

    JOURNAL OF SYNCHROTRON RADIATION   8 ( 2 )   1003 - 1005   2001.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    The nitrogen K-shell X-ray absorption spectra of the purine bases present in nucleic acids, adenine and guanine, were analyzed by using ab initio Hartree-Fock static exchange and restricted-active-space self-consistent-field calculations. A variety of derivative molecules were calculated to investigate the energetic shifts due to environmental effects on the nitrogen atoms. Shake-up excitations were also addressed.

    DOI: 10.1107/S0909049500017696

  • Meta-scheduling for a Cluster of Supercomputers Reviewed

    小出 洋, 平山 俊雄, 村杉 明夫, 林 拓也, 笠原 博徳

    Proc. ICS99 Workshop   63 - 69   1999.6

     More details

    Language:English   Publishing type:Research paper (other academic)  

    Meta-scheduling for a Cluster of Supercomputers

  • A new memory allocation method for shared memory multiprocessors with large virtual address space Reviewed

    H Koide, M Suzuki, Y Nakayama

    CONCURRENCY-PRACTICE AND EXPERIENCE   9 ( 9 )   897 - 914   1997.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    This paper proposes a new memory allocation method for shared memory multiprocessors with large virtual address spaces, An evaluation of its performance is also presented.
    For effective use of shared memory multiprocessors, it is important that no processor's execution is blocked, if several processors simultaneously access a shared variable, their processes are blocked and access to the variable is serialized, Thus, frequent access to shared variables reduces the parallelism, In particular, the parallelism is significantly reduced when a special shared variable - the 'allocation pointer' - is frequently accessed in the dynamic object allocation by an application program, In this paper, we propose a new method for allocating physical memory pages where the allocation pointer is monotonically increased in the virtual address space in contrast to the conventional method, This allows the critical sections for access to the allocation pointer to be executed effectively and atomically by using the fetch-and-add primitive, Our method improves the application program's parallelism by access to the allocation pointer with considerably short blocking time to the process. (C)1997 by John Wiley & Sons, Ltd.

    DOI: 10.1002/(SICI)1096-9128(199709)9:9<897::AID-CPE282>3.0.CO;2-9

▼display all

Books

  • サイバーセキュリティ対応の企業実務:平時・有事における組織的・法的対策の進め方すぎ

    杉山一郎,寺門峻佑,前田典彦,軍司祐介,茂岩裕樹,杉浦翔太,小出 洋,篠原一生,松岡 亮(Role:Joint author)

    中央経済社  2023.9 

     More details

    Language:Japanese   Book type:Scholarly book

  • セキュアなソフトウェアの設計と開発

    ローレン・コンフェルダー, 秋 勇紀,高田新山,小出 洋(Role:Supervisor (editorial))

    2023.8 

     More details

    Language:Japanese   Book type:Scholarly book

  • Combinatorial algorithms

    Knuth, Donald Ervin, 筧, 一彦, 小出, 洋, 有澤, 誠, 和田, 英一

    ドワンゴ,KADOKAWA (発売)  2017.3 

     More details

    Responsible for pages:総ページ数:xiv, 866p   Language:Japanese  

  • Sorting and Searching

    Knuth, Donald Ervin, 石井, 裕一郎, 伊知地, 宏, 小出, 洋, 高岡, 詠子, 田中, 久美子, 長尾, 高弘, 有澤, 誠, 和田, 英一

    ドワンゴ,KADOKAWA (発売)  2015.10 

     More details

    Responsible for pages:総ページ数:xv, 741p   Language:Japanese  

  • The Art of Computer Programming, Volume 4, Fascicle 4: Generating All Trees --- History of Combinational Generation [日本語版]

    有澤誠,和田英一監訳, 小出洋 訳(Role:Joint translator)

    アスキー  2010.5 

     More details

    Language:Japanese   Book type:Scholarly book

  • Generating all trees : history of combinatorial generation

    Knuth, Donald Ervin, 筧, 一彦, 小出, 洋, 有澤, 誠, 和田, 英一

    アスキー・メディアワークス,角川グループパブリッシング (発売)  2010.3 

     More details

    Responsible for pages:総ページ数:vii, 118p   Language:Others  

  • 夏のプログラミング・シンポジウム「夢をかけるプログラミング~世代を超えて/夢の再発見~」報告集

    筧, 捷彦, 伊知地, 宏, 筧, 一彦, 小出, 洋, 安田, 絹子, 情報処理学会

    情報処理学会プログラミング・シンポジウム委員会  2007.1 

     More details

    Responsible for pages:総ページ数:122p   Language:Japanese  

  • Generating all tuples and permutations

    Knuth, Donald Ervin, 小出, 洋, 有澤, 誠, 和田, 英一

    アスキー  2006.11 

     More details

    Responsible for pages:総ページ数:vi, 129p   Language:Japanese  

  • The Art of Computer Programming, Volume 4, Fascicle 2: Generating All Tuples and Permutations[日本語版]

    有澤誠,和田英一監訳, 小出洋 訳(Role:Joint translator)

    アスキー  2006.11 

     More details

    Language:Japanese   Book type:Scholarly book

  • Sorting and searching

    Knuth, Donald Ervin, 石井, 裕一郎, 伊知地, 宏, 小出, 洋, 高岡, 詠子, 田中, 久美子, 長尾, 高弘, 有澤, 誠, 和田, 英一

    アスキー  2006.4 

     More details

    Responsible for pages:総ページ数:xv, 741p   Language:Japanese  

▼display all

Presentations

  • 複数のプロキシを使用した経路変更Moving Target Defenseによるマルウェア検知・隔離

    #井上 幸紀, @小出 洋

    情報処理学会九州支部  2022.3 

     More details

    Event date: 2022.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

    近年のインターネットの普及により社内ネットワークを導入する企業が増加している. こうした社内ネットワークは大きな利便性をもたらすものの, こうした内部ネットワークを標的とするサイバー攻撃やウイルスもまた増加している.さらに,一つのターゲットに狙いを絞り複数の段階を経て長期的かつ計画的に攻撃を行う標的型攻撃による被害も報告されている.こうした標的型攻撃では,攻撃者は標的のネットワーク内部に侵入してもすぐに攻撃を実施するわけではなく,更なる攻撃のため標的ネットワークの構成の把握やバックドアの設置,管理者権限への昇格などを試みる場合が多い.そのため内部に侵入したマルウェアを監視して検知や隔離を行うことにより被害を小さくすることができる.本研究では複数のプロキシノードを切り替えて経路を変化させる Moving Target Defense(MTD) を用いたシステムを構築し, ネットワーク内のマルウェアを検知, 隔離するということを目的とする. この手法によって内部ネットワーク内に侵入し攻撃を行うマルウェアを検知してサイバー攻撃からシステムを防御することが可能になる. 本論文では提案したシステムのモデルを構築し, マルウェア検知と隔離について性能を評価した. その結果, 提案手法が有効であることが確認できた.

  • Anomaly Detection of C&C Traffic using Chebyshev Theorem and Machine learning Based on URL Anomaly features

    #Yihui, Y., @Koide, H., @Sakurai, K

    電子情報通信学会 総合大会  2021.3 

     More details

    Event date: 2021.3

    Language:English   Presentation type:Oral presentation (general)  

    Venue:オンライン   Country:Japan  

  • Adversarial Attack Against Network Intrusion Detection Systems with Deep Learning

    #Mbow Mariama, @Hiroshi Koide,@Kouichi Sakurai

    情報処理学会九州支部火の国シンポジウム  2021.3 

     More details

    Event date: 2021.3

    Language:English   Presentation type:Oral presentation (general)  

    Venue:オンライン(大分大学)   Country:Japan  

  • URLとDNSの異常特性に基づくC&Cトラフィック異常検出システム

    #YAN YIHUI, @櫻井 幸一, @小出 洋

    情報処理学会九州支部火の国シンポジウム  2020.3 

     More details

    Event date: 2020.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:オンライン(九州工業大学)   Country:Japan  

  • ネットワークレベルのMTDによるWebアプリケーションのサイバー攻撃からの防御

    #桝本武志,@小出 洋

    情報処理学会九州支部火の国シンポジウム  2020.3 

     More details

    Event date: 2020.3

    Language:Japanese  

    Country:Japan  

  • 自己隠蔽挙動に基づいたIoTボットの振る舞い検知

    @田島裕也,#小出 洋

    情報処理学会九州支部火の国シンポジウム  2020.3 

     More details

    Event date: 2020.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Country:Japan  

  • 分散環境における拡張性を持つサイバーレンジ構築手法の提案と評価

    @寺嶋友哉,#小出 洋

    情報処理学会九州支部火の国シンポジウム  2020.3 

     More details

    Event date: 2020.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Country:Japan  

  • インシデント対応における非技術的な能力の向上を目的とした訓練の提案と評価

    #長井克海,@小出洋,@櫻井幸一

    2020年暗号と情報セキュリティシンポジウム  2020.1 

     More details

    Event date: 2020.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    Country:Japan  

  • An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS

    Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai

    7th International Symposium on Computing and Networking, CANDAR 2019  2019.11 

     More details

    Event date: 2019.11

    Language:English  

    Venue:Nagasaki   Country:Japan  

    In recent years, the number of cyber attacks has been increasing rapidly and network security has become an important issue. As a vital component of defense against network threats, intrusion detection system (IDS) was introduced and machine learning algorithms have been widely used in such systems for high detection performance. There are several evaluation indices such as false positive rate, false negative rate, and so on. A problem is that these indices are often related to each other. For example, while we try to decrease the false positive rate, the false negative rate often tends to increase, and vice versa. In this study, we proposed an ANN based sequential classifier method to mitigate this problem. Specifically, we try to train ANN to have a low false positive rate, despite which may lead to high false negative rate. Then, the reported negative instances are sent to the next ANN to make a further investigation, where the false negative instances reported at the previous ANN may be classified correctly. In this way, the final false negative rate can also be improved greatly. The results of the experiment shows that the proposed method can bring lower false negative rate and higher accuracy of detection while making the false positive rate at an acceptable level. Moreover, the optimum number of ANNs for our proposal is also investigated and discussed in this study.

  • Proposal and evaluation of a security incident response training method using programming

    Katsumi Nagai, Hiroshi Koide, Kouichi Sakurai

    20th Annual Conference on Information Technology Education, SIGITE 2019  2019.9 

     More details

    Event date: 2019.10

    Language:English  

    Venue:Tacoma   Country:United States  

    Nowadays, there are various cyber-attacks in the world. In terms of dealing with cyber incident, there are many non-technical factors. Table Top Exercises are available for improving it but need some fund, time and trainers who conduct it more smoothly. So, in this work, we propose a security incident response training method using programming. It aims to improve some non-technical skills. Our proposal is actually executed with questionnaires.

  • Efficient shortest path routing algorithms for distributed XML processing

    Ye Longjian, Hiroshi Koide, Dirceu Cavendish, Kouichi Sakurai

    15th International Conference on Web Information Systems and Technologies, WEBIST 2019  2019.1 

     More details

    Event date: 2019.9

    Language:English  

    Venue:Vienna   Country:Austria  

    This paper analyses the problem of efficiently routing XML documents on a network whose nodes are capable of distributed XML processing. The goal of our study is to find network paths for which XML documents' transmission will result in high likelihood that a large portion of the documents be processed within the network, decreasing the amount of XML processing at documents arrival at the destination site. We propose several routing algorithms for single route and multipath routing and evaluate them on a distributed XML network simulation environment. We show the benefits of the proposed XML routing algorithms as compared with widespread minimum hop routing strategy of the Internet.

  • 分散XML処理のための複数経路を用いたルーティングアルゴリズムの提案と評価

    #Longjian Ye,小出 洋,Yaokai Feng,Dirceu Cavendish,櫻井 幸一

    情報処理学会火の国シンポジウム2019予稿集  2019.3 

     More details

    Event date: 2019.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Country:Japan  

  • U2RおよびR2L攻撃の効率的な検出に向けて

    #趙 浩.小出 洋,馮 尭鍇,櫻井 幸一

    情報処理学会火の国シンポジウム2019予稿集  2019.3 

     More details

    Event date: 2019.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Country:Japan  

  • Webアプリケーションのための攻撃手法の収集~攻撃者の誘導手法の実装と評価~

    #久保田 康平,小出 洋

    情報処理学会火の国シンポジウム2019予稿集  2019.3 

     More details

    Event date: 2019.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Country:Japan  

  • A new design for evaluating moving target defense system

    Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018  2018.12 

     More details

    Event date: 2018.11

    Language:English  

    Venue:Takayama   Country:Japan  

    Moving Target Defense (MTD) concept has been a feasible idea for reducing the possibility of attack happening through alternation attack surfaces or diversification the attribute or parameters of a protected system. As a result of applying MTD techniques to the system, an attacker would have more difficulties in exploiting a vulnerabilities of the target system. This study proposes an evaluation method of MTD systems combined with several different MTD techniques. The proposed method is a primary step in designing an evaluation model for the effectiveness of MTD. The main goal is to estimate the attack success ratio on the MTD systems mitigating from threats of executable binary file or malware injection. With the proposed evaluation method, we expect to prove that the MTD technology can enhance the security of a web server, and can be applied in a real-world information system. As our preliminary work done, we set up a prototype framework to validate the proposed work in a pseudo-experimental environment.

  • Tracing MIRAI malware in networked system

    Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai

    6th International Symposium on Computing and Networking Workshops, CANDARW 2018  2018.12 

     More details

    Event date: 2018.11

    Language:English  

    Venue:Takayama   Country:Japan  

    In 2021, it is anticipated that there will be approximately 30 billion Internet of Things (IoT) devices. The tremendous aggregate value of the IoT makes it a tempting and lucrative target for cyber criminals. The breakout of Mirai malware, which compromises poorly secured IoT devices with factory-default username and passphrase to launch Distributed Denial of Service (DDoS) attacks, has raised broad awareness towards the need for increased IoT security. To better defend against Mirai infection and spread, it is critical to know how the malware operates as the first step. In this paper, we give a combined static and dynamic analysis of Mirai, basing on the results of which, we introduce the application of Threat Tracer. Threat tracer is an information system simulator initially developed to help design a system robust against Advanced Persistent Attacks(APT). It offers an intuitive track on how a cyber threat behaves in a complicated networked system. The feedback simultaneously contributes to revealing vulnerabilities of a system. Our work focuses on the replication of Mirai Malware's operating processes in Threat Tracer simulation. By achieving doing so, we believe it could offer a comprehensible description of how Mirai acts. Also, considering the continuous emergence of Mirai variants, the simulation serves as a predictor on upcoming threats' behavior patterns.

  • An Implementation of Moving Target Defense Technology on Web System International conference

    #Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Sakurai Kouichi

    ISIP2018  2018.5 

     More details

    Event date: 2018.5

    Language:English   Presentation type:Oral presentation (general)  

    Venue:Kyushu University, Fukuoka, JAPAN   Country:Japan  

  • 実践的プログラミング教育の支援のための学習者の分類手法の実装と評価

    @近藤 秀樹,@高橋 真奈茄,小出 洋

    情報処理学会プログラミング研究会  2018.2 

     More details

    Event date: 2018.2 - 2018.3

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:東京工業大学 大岡山キャンパス   Country:Japan  

  • Web アプリケーションに対する攻撃検出・防御システム Hoppin の設計・実装

    @野見山賢人,小出 洋

    情報処理学会プログラミング研究会  2018.1 

     More details

    Event date: 2018.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:高知工科大学永国寺キャンパス   Country:Japan  

  • Webアプリケーションのための攻撃検出と防御

    @野見山賢人,小出 洋

    情報処理学会コンピュータセキュリティシンポジウム  2017.10 

     More details

    Event date: 2017.10

    Language:Japanese   Presentation type:Oral presentation (general)  

    Venue:山形国際ホテル   Country:Japan  

  • Research on Attack Detection for Network Applications International conference

    Hiroshi Koide, @Kento Nomiyama

    12th International Conference on Internet Technology  2017.6 

     More details

    Event date: 2017.6

    Language:English   Presentation type:Oral presentation (general)  

    Venue:Kyushu University, Fukuoka, JAPAN   Country:Japan  

  • An implementation of tracing attacks on advanced persistent threats by using actors model

    Takatoshi Murakami, Shuhei Kumano, Hiroshi Koide

    2014 Joint 7th International Conference on Soft Computing and Intelligent Systems, SCIS 2014 and 15th International Symposium on Advanced Intelligent Systems, ISIS 2014  2014.2 

     More details

    Event date: 2014.12

    Language:English  

    Venue:Kitakyushu   Country:Japan  

    Actors model, a general model of concurrent computation, is often used for specified applications. The attacks tracer on advanced persistent threats, APTs, is one of such applications. It investigates the act of information system consists of several elements, like routers, servers, terminals and networked applications. The authors describe an implementation of the attacks tracer by using actors model. The authors also show the actors model is more suitable to implement this application than other previous models.

  • Distributed XML processing over multicore servers

    Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish

    10th International Conference on Web Information Systems and Technologies, WEBIST 2014  2014 

     More details

    Event date: 2014.4

    Language:English  

    Venue:Barcelona   Country:Spain  

    Nowadays, multicore CPU become popular technology to enhance services quality in Web services. This paper characterizes parallel distributed XML processing which can off-load the amount of processing at their servers to networking nodes with varying number of CPU cores. Our implemented distributed XML processing system sends XML documents from a sender node to a server node through relay nodes, which process the documents before arriving at the server. When the relay nodes are connected in tandem, the XML documents are processed in a pipelining manner. When the relay nodes are connected in parallel, the XML documents are processed in a parallel fashion. For well-formedness and grammar validation tasks, the parallel processing reveals inherent advantages compared with pipeline processing regardless of document type, number of CPU cores and processing environment. Moreover, the number of CPU cores impacts efficiency of distributed XML processing via buffer access contention.

  • A SIMD parallelization method for an application for LSI logic simulation

    Natsuki Kai, Ryoji Nishinohara, Hiroshi Koide

    41st International Conference on Parallel Processing Workshops, ICPPW 2012  2012 

     More details

    Event date: 2012.9

    Language:English  

    Venue:Pittsburgh, PA   Country:United States  

    This paper proposes and evaluates a SIMD parallelization method for an application for LSI logic simulation. The proposal method converts a net list into a parallel and distributed program code so as to make the code SIMD parallelized. As experiments to evaluate our proposal method, tasks in SIMD arithmetic logical units on Cell/B.E., and we measure that elapsed time. In the results of experiments, over 80% tasks are SIMD parallelized and the program with a shuffle instruction and a SIMD instruction reduces computation time by over 90%.

  • Distributed XML processing over various topologies Pipeline and parallel processing characterization

    Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish, Yuji Oie

    8th International Conference on Web Information Systems and Technologies, WEBIST 2012  2012 

     More details

    Event date: 2012.4

    Language:English  

    Venue:Porto   Country:Portugal  

    This paper characterizes distributed XML processing on networking nodes. XML documents are sent from a client node to a server node through relay nodes, which process the documents before arriving at the server. According as the node topology, the XML documents are processed in a pipelining manner or a parallel fashion. We evaluate distributed XML processing with synthetic and realistic XML documents on real and virtual environments. Characterization of well-formedness and grammar validation processing via pipelining and parallel models reveals inherent advantages of the parallel processing model.

  • MVA modeling of multi-core server distributed systems

    Yuki Nakamizo, Hiroshi Koide, Kazumi Yoshinaga, Dirceu Cavendish, Yuji Oie

    3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011  2011 

     More details

    Event date: 2011.11 - 2011.12

    Language:English  

    Venue:Fukuoka   Country:Japan  

    In this paper, we propose an extension to our previous MVA based methodology for estimating performance of transactions executed on multi-server systems for multicore servers. The extension is based on the characterization of message processing service times for each server core under zeroload conditions, and building an MVA model that accounts for each available core. Core utilization is characterized, as well as message routing probabilities within the multi-core machine. We illustrate the extended methodology on a prototype multi-server system.

  • Distributed XML processing over various topologies Characterizing XML document processing efficiency

    Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish, Yuji Oie

    7th International Conference on Web Information Systems and Technologies, WEBIST 2011  2012 

     More details

    Event date: 2011.5

    Language:English  

    Venue:Noordwijkerhout   Country:Netherlands  

    This study characterizes distributed XML processing on networking nodes. XML documents are sent from a client node to a server node through relay nodes, which process the documents before arriving at the server. When the relay nodes are connected in tandem, the XML documents are processed in a pipelining manner. When the relay nodes are connected in parallel, the XML documents are processed in a parallel fashion. We evaluate distributed XML processing with synthetic and realistic XML documents. Well-formedness and grammar validation pipelining and parallel processing characterization reveals inherent advantages of the parallel processing model.

  • Characterizing distributed XML processing Moving XML processing from servers to networking nodes

    Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish, Yuji Oie

    7th International Conference on Web Information Systems and Technologies, WEBIST 2011  2011 

     More details

    Event date: 2011.5

    Language:English  

    Venue:Noordwijkerhout   Country:Netherlands  

    This study characterizes distributed XML processing on networking nodes. XML documents are sent from a client node to a server node through relay nodes, which process the documents before arriving at the server. When the relay nodes are connected tandem, the XML documents are processed in a pipelining manner. When the relay nodes are connected parallel, the XML documents are processed in a parallel fashion. Well-formedness and grammar validation pipelining and parallel processing characterization reveals inherent advantages of the parallel processing model.

  • Characterizing transactions with data transfer on multi-server systems

    Kazumi Yoshinaga, Washizu Shohei, Yoshiyuki Uratani, Hiroshi Koide, Dirceu Cavendish, Yuji Oie

    2nd International Conference on Intelligent Networking and Collaborative Systems, INCOS 2010  2010 

     More details

    Event date: 2010.11

    Language:English  

    Venue:Thessaloniki   Country:Greece  

    In this paper, we propose an extension to our previous MVA based methodology for estimating performance of transactions executed on multi-server systems to transactions involving variable data transfers. The extension is based on the characterization of data transfers between servers under zeroload conditions, and a curve fitting step to capture server message processing time dependency with the size of the data transferred. We illustrate the extended methodology on two prototype multiserver systems.

  • Characterizing transactions on multi-server systems

    Dirceu Cavendish, Yuji Oie, Hiroshi Koide, Mario Gerla

    International Conference on Intelligent Networking and Collaborative Systems, INCoS 2009  2009 

     More details

    Event date: 2009.11

    Language:English  

    Venue:Barcelona   Country:Spain  

    In this paper, we demonstrate how to characterize transactions executed on multi-server systems. The characterization is performed with the help of readily available open source components, and is used to build a Mean Value Analysis model in order to estimate transaction response times for arbitrary loads, as well as system capacity. Although an E-Commerce system is used, the characterization method described is applicable to any multi-server system.

  • A mean value analysis approach to transaction performance evaluation on multi-server systems

    Dirceu Cavendish, Yuji Oie, Hiroshi Koide, Mario Gerla

    IEEE Symposium on Computers and Communications 2009, ISCC 2009  2009 

     More details

    Event date: 2009.7

    Language:English  

    Venue:Sousse   Country:Tunisia  

    In this paper, we introduce a Mean Value Analysis based methodology for performance evaluation of transactions executed in a multi server distributed system. We first present probabilistic arguments to investigate under which conditions MVA models provide worst case response times, without large overshoots. Then, we show how to characterize the distributed server system so as to construct a model to predict response times as well as estimate system capacity. Finally, we exemplify the methodology usage via transactions implemented in two distributed Linux systems.

  • An architecture of stampi MPI library on a cluster of parallel computers

    Toshiyuki Imamura, Yuichi Tsujita, Hiroshi Koide, Hiroshi Takemiya

    7th European Parallel Virtual Machine and Message Passing Interface Users’ Group Meeting, PVM/MPI 2000  2000.1 

     More details

    Event date: 2000.9

    Language:English  

    Venue:Balatonfured   Country:Hungary  

    In this paper, we present a communication library which extends an MPI application on a single parallel machine to a cluster of parallel machines. Stampi provides some functionality which are required for constructing distributed applications and environments based on the MPI2 standard with a focus on dynamic process management. Since the mechanism of communication bridge is transparent for users, it is very useful to assemble and link MPI applications on meta-computer systems. Furthermore Stampi supports novel functions; one is the communication between a Java applet to the backend parallel computer. Another is supporting remote file-IO. Both give us a framework of distributed resource management based on an MPI communication infrastructure. This paper covers the architecture of Stampi.

  • Generated order preserving real-time garbage collection

    Hiroshi Koide

    Proceedings of the 1995 2nd International Workshop on Real-Time Computing Systems and Applications  1995 

     More details

    Event date: 1995.10

    Language:English  

    Venue:Tokyo, Jpn   Country:Other  

    This paper proposes a new real-time garbage collection that always preserves the order of object creation. Some programming languages and application programs need to preserve the generated order of objects. The proposed method is the first type of the garbage collection that can be used to make them run in real-time. Since the generated order preserving scavenging garbage collection is partly employed, the complexity of the proposed method is not related to the heap size. The requirements for the real-time processing is also presented.

  • Moa — a fast sliding compaction scheme for a large storage space

    Mitsugu Suzuki, Hiroshi Koide, Motoaki Terashima

    International Workshop on Memory Management, IWMM 1995  1995.1 

     More details

    Event date: 1995.9

    Language:English  

    Venue:Kinross   Country:United Kingdom  

    The design and analysis of a new GC scheme called MOA is presented with its implementation on PLisp (Portable Lisp). MOA is "stop-and-collect" type GC and is based on a Morris's sliding compaction scheme. MOA has the excellent features such as: (1) it can perform sliding compaction with a time proportional nearly to the size of all data objects in use, (2) it requires an additional space of a small size to achieve such a time cost saving, (3) it can skip a GC process for a special cluster called an "anchor", reducing the total GC processing time considerably. MOA has been successfully implemented on PLisp which provides a large amount of storage space. MOA is superior to other GC based on conventional sliding compaction and copying collection, as shown in several experiments.

▼display all

MISC

  • 複数のプロキシを使用した 経路変更Moving Target Defenseによるマルウェア検知・隔離

    井上 幸紀, 小出 洋

    情報処理学会九州支部 火の国シンポジウム2022   2021.3

     More details

    Language:Japanese  

    Detection and isolation malware by dynamic routing Moving Target Defense with proxies

  • Moving Target Defense とサイバーセキュリティ教育 Reviewed

    小出 洋

    (一社)九州テレコム振興センター会員向けWebマガジンKey-Eye   2020.4

     More details

    Language:Japanese  

  • ネットワークレベルのMTDによるWebアプリケーションのサイバー攻撃からの防御

    桝本武志, 小出 洋

    情報処理学会九州支部火の国シンポジウム   2020.3

     More details

    Language:Japanese  

  • 自己隠蔽挙動に基づいたIoTボットの振る舞い検知

    田島裕也, 小出 洋

    情報処理学会九州支部火の国シンポジウム   2020.3

     More details

    Language:Japanese  

  • 分散環境における拡張性を持つサイバーレンジ構築手法の提案と評価

    寺嶋友哉, 小出 洋

    情報処理学会九州支部火の国シンポジウム   2020.3

     More details

    Language:Japanese  

  • インシデント対応における非技術的な能力の向上を目的とした訓練の提案と評価

    長井克海, 小出 洋

    2020年暗号と情報セキュリティシンポジウム   2020.1

     More details

    Language:Japanese  

  • Webアプリケーションフレームワークに組み込むハニーポットの提案

    久保田 康平, 小出 洋

    コンピュータセキュリティシンポジウム2019論文集   2019.10

     More details

    Language:Japanese  

    A Proposal of Web Application Framework Which Has an Embedded Honeypot

  • Webアプリケーションに対する攻撃検出・防御システムHoppinにおける攻撃検出方式の提案

    武子 洸太郎, 小出 洋

    コンピュータセキュリティシンポジウム2019論文集   2019.10

     More details

    Language:Japanese  

    Proposal of Attack Detection Method on Hoppin, Attack Detection and Defense System for Web Applications

  • U2RおよびR2L攻撃の効率的な検出に向けて

    Hao Zhao, 小出 洋, Yaokai Feng, 櫻井 幸一

    情報処理学会 火の国情報シンポジウム2019論文集   2019.3

     More details

    Language:Japanese  

    Towards Efficient Detection of U2R and R2L Attacks using ANN

  • 分散XML処理をための複数経路を用いたルーティングアルゴリズムの提案と評価

    YE LONGJIAN, 小出 洋, Yaokai Feng, Dirceu Cavendish, 櫻井 幸一

    2019.3

     More details

    Language:Japanese  

    Proposal and Evaluation of Multiple Routing Algorithm for Distributed XML Processing

  • Webアプリケーションのための攻撃手法の収集 ~攻撃者の誘導手法の実装と評価~

    久保田 康平, 小出 洋

    情報処理学会火の国情報シンポジウム2019論文集   2019.3

     More details

    Language:Japanese  

    Collecting of Attack Methods for Web Applications

  • 九州大学におけるサイバーセキュリティ人財育成〜「ProSec-IT」の取り組みについて〜 Reviewed

    小出 洋

    九州経済連合会月報「明日の九州・山口」   2018.11

     More details

    Language:Japanese   Publishing type:Article, review, commentary, editorial, etc. (scientific journal)  

  • Webアプリケーションに対する攻撃検出・防御システム--Hoppinの設計・実装--

    野見山賢人, 小出 洋

    情報処理学会論文誌プログラミング(PRO)   2018.6

     More details

    Language:Japanese  

    Design and Implementation of Hoppin, a System Detecting Attacks to Web Applications and Defenses Them
    情報システムに対する攻撃手法が近年変化してきており,特定の組織を対象とした標的型攻撃が増加している.その一方でWebアプリケーション等の情報システムはクラウド環境にも用いられており,より大規模かつ複雑になっている.そのため,運用中の情報システムすべてを把握することが難しくなっている.そこで既存のWebアプリケーションを変更しなくても,Webアプリケーションと密に連携したセキュリティ機能を持つことは有用である.筆者らは既存のWebアプリケーションにハニーポットの機能を持つようにすることで,Webアプリケーションそのものを攻撃から保護し,攻撃の検出と情報収集を可能にするシステムHoppinを提案している.本研究発表では,Hoppinの設計と実装について議論する.Recent cyber-attacks to information systems more sophisticated and more complex. And attacks to organizations are increasing becoming the mainstream Advanced Persistent Threat Attacks. On the other hand, it is difficult to understand all complicated systems, because information systems consisted on web applications use cloud computing and other information technologies so that they become larger scale and more complex. Therefore, it is required to web applications themselves have cyber security functions, because it is difficult to defend all complicated information systems from attacks. We propose Hoppin, a system of method which makes existing web applications honeypots. The system is able to protect for Web application from attacks, detect and collect attack information. In this research, we discuss the design and implementation of Hoppin.

  • 実践的プログラミング教育の支援環境における活動履歴を用いた活動パターン抽出の試み

    高橋 真奈茄, 小出 洋, 近藤 秀樹

    情報教育シンポジウム論文集   2017.8

     More details

    Language:Japanese  

    A Trial of Extracting Activity Pattern by Using Activities on PC on Auxiliary Environment for Practical Programming Education

  • プログラミング学習者の行動ラベル付のためのデータ分析 (ICTを活用した学習環境/一般)

    高橋 真奈茄, 小出 洋, 近藤 秀樹

    日本教育工学会研究報告集   2016.11

     More details

    Language:Japanese  

    An Analysis to Attach Labels to Classify Behaviors of Leaners of Programming

  • 分散XML処理のためのルーティングアルゴリズムの提案

    熊野 修平, Dirceu Cavendish, 小出 洋

    情報処理学会論文誌プログラミング(PRO)   2016.6

     More details

    Language:Japanese  

    A Proposal for Routing Algorithms of Distributed XML Processing
    本発表では分散XML処理を行うことができるノードで構築されたネットワーク上におけるXMLドキュメントのルーティング問題について述べる.本研究の目的は,ドキュメントがより多くネットワーク上で処理される経路を発見し,クライアントでのドキュメント処理を減少させることである.そのため,分散XML処理に適したルーティングアルゴリズムを提案し,ソースルーティングを用いたXMLネットワークシミュレーション環境上で評価を行った.本発表では,現在主流となっている最短経路ルーティングと比較した提案ルーティングアルゴリズムの利点を述べる.This presentation analyses the problem of XML document routing on a network which nodes are capable of distributed XML processing. The goal is to find network paths for which XML document transmission will result in high likelihood that a large portion of the document be processed within the network, decreasing the amount of XML processing at document arrival at the client side. We propose an appropriate routing algorithm, and evaluate it on a distributed XML network simulation environment which supports source routing. We show the benefits of such a scheme, as compared with widespread minimum hop routing strategy.

  • 動的なアプリケーションに対するスケジューリング手法の提案

    三牧 麻美, 小出 洋

    情報処理学会論文誌プログラミング(PRO)   2016.6

     More details

    Language:Japanese  

    A New Task Scheduling Method for Applications Which Produce and/or Delete Tasks Dynamically
    近年,Webアプリケーションのように人の操作によって後からタスクが追加・分割されるような動的なアプリケーションが増加している.このようなアプリケーションを効率良く運用するためには,並列分散環境での運用が有効であり,並列分散環境を用いる場合,実行単位となる各タスクを依存関係に基づいてどのような順番で各計算機に割り当てるかというタスクスケジューリングが重要になる.このためタスク間の依存関係を考慮したスケジューリン手法が多く提案されている.しかしながら,様々なスケジューリング手法が提案されているが,動的なタスクに対して依存関係を表すタスクグラフを対応させてスケジューリングを行うような手法は提案されていない.そこで本発表では,スケジューリング手法の1つであるCP/ETF/MISF法を基に,後からノードが変化させるタスクグラフを用い,タスクグラフの動的な変更に対応できるスケジューリング手法を提案することで,動的なアプリケーションに対するタスクスケジューリングの効率化を目指す.標準タスクグラフを用いて,依存関係を保ったままスケジューリングを行えるようにAkkaのActorモデルで実装し,評価実験を行う.In these years, the dynamic applications which include web applications have been increasing. The applications will dynamically produce, divide and/or delete tasks by human operations. A new task scheduling method will be required to execute these applications in the parallel and distributed environments. Various task scheduling methods have been proposed. But task scheduling methods which permit us to append and delete tasks runtime have not been proposed. In this paper, we propose a new task scheduling method which permits it. And we make dynamic applications execute efficiently. The scheduling method is based on CP/ETF/MISF.

  • 網羅的な記録を用いたプログラミング学習過程の分析 (ICTを活用した学習支援環境・基盤/一般)

    近藤 秀樹, 石田 竹至, 小出 洋

    日本教育工学会研究報告集   2016.3

     More details

    Language:Japanese  

    An analysis of the programming learning process using exhaustive records

  • 反転授業における学習者中心の授業設計を支援するシステムTicketNoteの開発 (学習支援環境とデータ分析/一般)

    原田 悠我, 小出 洋

    日本教育工学会研究報告集   2015.2

     More details

    Language:Japanese  

    Development of TicketNote to Support the Design of Learner Centered Class for a Flipped Classroom

  • トランスポート層におけるインテグレーテッドマルチVPNの提案と遠隔 (情報ネットワーク)

    田坂 祐太, 小出 洋, 乃万 司

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   2014.7

     More details

    Language:Japanese  

    Application to telemedicine and proposed the Integrated Multi-VPN in the transport layer
    The authors propose Integrated Multi-VPN which can connect to several VPNs at same time easily. The proposed method can realize to connect to several VPNs at same time, because it designs the routing dynamically in the transport layer. It is difficult to connect to several VPNs when we use ordinary network technologies, IPSecVPN and SSL-VPN. Our method can be applied to implement secure networks to link multiple hospitals for telemedicine. The authors also conduct demonstrations with virtual environments to evaluate the proposed method for availabilities of telemedicine.

  • YALMS : A Data Structure for Storage and Replay of Multimedia Content in Digital Classes (情報通信マネジメント)

    ZHANIKEEV Marat, KOIDE Hiroshi

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   2014.1

     More details

    Language:English  

    YALMS : A Data Structure for Storage and Replay of Multimedia Content in Digital Classes
    Content in digital classes - a loosely defined aggregation of audiovideo, screen capture, slides, notes and complimentary files - needs a standard format for storage and replay. The closest to this objective is SMIL - a language which can describe the timeline of complex multimedia sessions. The format presented in this paper is part of the larger YALMS educational software and goes one step further than SMIL. The proposed format supports realtime recording, partial updates of content, and finally replay of the entire class. Recording and updates require a server as backend but the class can be replayed directly from storage by a web application.

  • リアルタイムセキュリティコンテスト可視化システムの提案

    原田 悠我, 豊田 美咲, 近藤 秀樹, 小出 洋

    第55回プログラミング・シンポジウム予稿集   2014.1

     More details

    Language:Japanese  

    A proposal of visualization system for security contests

  • YALMS : A Data Structure for Storage and Replay of Multimedia Content in Digital Classes (ライフインテリジェンスとオフィス情報システム)

    ZHANIKEEV Marat, KOIDE Hiroshi

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   2014.1

     More details

    Language:English  

    YALMS : A Data Structure for Storage and Replay of Multimedia Content in Digital Classes
    Content in digital classes - a loosely defined aggregation of audiovideo, screen capture, slides, notes and complimentary files - needs a standard format for storage and replay. The closest to this objective is SMIL - a language which can describe the timeline of complex multimedia sessions. The format presented in this paper is part of the larger YALMS educational software and goes one step further than SMIL. The proposed format supports realtime recording, partial updates of content, and finally replay of the entire class. Recording and updates require a server as backend but the class can be replayed directly from storage by a web application.

  • YALMS : A Group Drive API for Cloud-Based Classrooms (情報ネットワーク)

    ZHANIKEEV Marat, KOIDE Hiroshi

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   2013.11

     More details

    Language:English  

    YALMS : A Group Drive API for Cloud-Based Classrooms
    Although there are many cloud drive APIs and applications (clients mostly) today, they are not optimized for group activities in cloud-based classrooms. Specifically, such APIs are weak in face of realtime interactivity and large data bulks. YALMS is a newly developed open source educational package which in this presentation is augmented with a group drive functionality. This paper poses the optimization problem involved in a group drive in clouds and presents implementations of both server and client sides of the respective API.

  • HTTP Proxyを使ったCookie挿入による不正通信の検出

    加藤 雅彦, 小出 洋, 金岡 晃, 松川 博英, 前田 典彦, 岡本 栄司

    コンピュータセキュリティシンポジウム2013論文集   2013.10

     More details

    Language:Japanese  

    Detection of Suspicious HTTP Communication Based on Cookie Insertion by HTTP Proxy

  • 組織内ネットワークとマルウェアのモデル化データを用いたマルウェア被害分析

    金岡 晃, 加藤 雅彦, 小出 洋, 岡本 栄司

    コンピュータセキュリティシンポジウム2013論文集   2013.10

     More details

    Language:Japanese  

    A Malware Damage Analysis Based on Modeling Data of Local Network in an Organization and Malwares

  • タッチデバイスにおけるボタン式UIからジェスチャ操作への脱却

    齋藤 暢郎, 小出 洋, 近藤 秀樹

    コンピュータソフトウェア   2013.10

     More details

    Language:Japanese  

    Break Away from Button-UI to Gesture Operation on Touch Device
    A web browser application for iOS, Libing, proposes a solution to resolve the problems of complicated button-based user interface (UI). The authors implement a gesture-based UI in Libing to realize simple and plentiful operations. Libing also keeps available display area maximum. Users can memorize correspondence between gestures and operations easily because users can assign arbitrary gestures to any operations and/or URLs flexibly in Libing. Touch-input-devices as typified by smartphones and tablet PCs have become popular recently. The market of these application programs has grown continuously. The most application programs are operated by the button-based UI. We can understand it visually. And the button-based UI is popular because we do not have incorrect operations when buttons are sufficiently large. However if we want to assign a lot of functions to buttons, we have to prepare many small buttons and/or a large area on which we place many buttons. We might have to divide the area to several pages to place all buttons. At least the user experience will be compromised because users have a lot of incorrect operations, available display area is compromised and operations become to be complicated. This study gives a solution to these problems which compromise the user experience.

    DOI: 10.11309/jssst.30.4_36

  • XMLデータヘのストリーミング処理における共有バッファ機構の改善

    浦谷 芳幸, カベンディッシュ ジルセウ, 本間 伸雄, 小出 洋

    電子情報通信学会論文誌. D, 情報・システム = The IEICE transactions on information and systems (Japanese edition)   2013.6

     More details

    Language:Japanese  

    Improving Shared Buffer Architecture for Streaming Data Processing to XML Data
    本研究では,ネットワーク通信時に転送途中のデータに対して中継ノードが行うストリーミングデータ処理を提案し,その効率化を目指す.このために,XML文書の分散処理を例として取り上げ,例証アプリケーションを実装し,その性能評価を行う.この例証アプリケーションは,送信元の計算機から宛先の計算機へXML文書を転送する際,通信を中継するノードでXML文書に対して文法チェックを行うことにより,送信先の計算機では文法チェック済みのXML文書を得ることができる.このアプリケーションを用いた実験と考察の結果をもとに,中継ノードにおいて処理を行うためにデータの一時格納に用いるバッファの更なる改良を試みた.その結果,アプリケーションの性能が改善されたとともに,今後,複数のCPUコアを用いた並列処理に資する有益な結果を得ることができた.

  • 標的型攻撃の対処の現状とこれから

    高橋 正和, 松川 博英, 小出 洋, 宮本 久仁男

    電子情報通信学会技術研究報告. ICSS, 情報通信システムセキュリティ : IEICE technical report   2012.6

     More details

    Language:Japanese  

  • 標的型攻撃の対処の現状とこれから

    高橋 正和, 松川 博英, 小出 洋, 宮本 久仁男

    電子情報通信学会技術研究報告. IA, インターネットアーキテクチャ   2012.6

     More details

    Language:Japanese  

  • 夏のプログラミングシンポジウム

    岩崎英哉, 川中真那, 小出洋, 田中哲朗, 松崎公紀, 三廻部大

    第53回プログラミング・シンポジウム予稿集   2012.1

     More details

    Language:Japanese  

  • 「新しいタイプの攻撃」への対策支援と、そのタスクスケジューリングの手法を用いた並列分散処理化手法の提案

    松浪 拓海, 小出 洋, 金岡 晃, 加藤 雅彦

    第53回プログラミング・シンポジウム予稿集   2012.1

     More details

    Language:Japanese  

    A Proposal of Measure Support for APT and it Parallel Distributed Processing by Task Scheduling Method

  • 新しいタイプの脅威を分析するための情報システムとマルウェアを表現するDSL

    小出 洋, 金岡 晃, 加藤 雅彦

    夏のプログラミング・シンポジウム2011報告集   2012.1

     More details

    Language:Japanese  

    A Domain Specific Language to represent Information Systems and Malware for examining Advanced Persistent Threat

  • 中継計算機で行うストリーミングデータ処理の特性

    浦谷 芳幸, キャベンディシュ ジルセウ, 小出 洋

    電子情報通信学会技術研究報告. NS, ネットワークシステム   2010.11

     More details

    Language:Japanese  

    Characteristics of Streaming Data Processing on Relay Nodes
    A purpose of this study is an efficiency improvement of streaming data processing. For this purpose, we focused distributed XML processing as an example, and implemented an application which processes streaming data on networking nodes. XML documents are sent from a client node to a server node through relay nodes, which process the documents before arriving at the server. When the relay nodes are connected tandem, the documents are processed in a pipelining manner. When the relay nodes are connected parallel, the documents are processed in a parallel fashion. The authors evaluated the distributed XML processing, then characterized it.

  • 大規模資源の管理・制御に関する技術の実証実験 : 新世代ネットワークプラットフォームの実現に向けて

    林 通秋, 竹房 あつ子, 池永 全志, 宮本 崇弘, 小島 功, 嶋村 昌義, 松本 延孝, 中田 秀基, 小出 洋, 高野 了成, カベンディッシュ ジルセウ, 工藤 知宏, 田中 良夫, 西村 公佐

    電子情報通信学会技術研究報告. NS, ネットワークシステム   2010.11

     More details

    Language:Japanese  

    Demonstration of management and control of large scale resources : Toward the establishment of a future network platform
    Towards further penetration of cloud computing services and establishment of future network architectures, a control framework for managing large scale ICT resources is required to provide ICT environments suited for user&#039;s objectives. A resource providing platform managing ICT resources deployed over multiple networks is developed to allocate suited resources for users. Advanced relay node adoptively providing suitable functions (e.g. data cache) is also developed and maintained communication quality under the traffic congestion.

  • 中継計算機でストリーミングデータ処理を行う並列アプリケーションの実装と評価

    浦谷芳幸, 小出洋

    電子情報通信学会技術研究報告   2009.10

     More details

    Language:Japanese  

    Implementation and Evaluation of a Parallel Application which Processes Streaming Data on Relay Nodes

  • 中継計算機でストリーミングデータ処理を行う並列アプリケーションの実装と評価

    浦谷 芳幸, 小出 洋

    電子情報通信学会技術研究報告. NS, ネットワークシステム   2009.10

     More details

    Language:Japanese  

    Implementation and Evaluation of a Parallel Application which Processes Streaming Data on Relay Nodes
    The authors use XML documents as an example and implement and evaluate a parallel application which processes streaming data on relay nodes to promote the efficiency of streaming data processing. In the application source nodes send XML documents to a destination node through many relay nodes. The relay nodes process XML documents in streaming data in pipelined and/or data parallel. Finally, the destination node check all unchecked tags and can receive processed streaming data. The authors discuss characteristics and problems of our application in this paper.

  • B-7-33 北九州市街地における無線ネットワークを利用したICTサービス提供実験(B-7.情報ネットワーク,一般セッション)

    中村 勇太, 田村 瞳, 熊副 和美, 松尾 博章, 井上 雄仁, 小出 洋, 池永 全志, 川原 憲治, 尾家 祐二

    電子情報通信学会ソサイエティ大会講演論文集   2009.9

     More details

    Language:Japanese  

    B-7-33 Experiment on ICT Services with Wireless Networks in Shopping Arcade of Kitakyushu-city

  • 北九州市街地における無線ネットワークを利用したICTサービス提供実験

    中村勇太, 田村瞳, 熊副和美, 松尾博章, 井上雄仁, 小出洋, 池永全志, 川原憲治, 尾家祐二

    電子情報通信学会大会講演論文集   2009.9

     More details

    Language:Japanese  

    北九州市街地における無線ネットワークを利用したICTサービス提供実験

  • Sun SPOTを利用したPBLの実践報告

    小出洋

    PC Conference論文集   2009.8

     More details

    Language:Japanese  

    Sun SPOTを利用したPBLの実践報告

  • 高機能中継ノードによる適応型ネットワークサービスに関する検討(オーバーレイネットワーク,VPN,DDoS,ネットワークセキュリティ,P2P通信,ネットワークソフトウェア,一般)

    嶋村昌義, 池永全志, 小出洋, キャベンディッシュジルセウ, 鶴正人

    電子情報通信学会技術研究報告. NS, ネットワークシステム   2008.9

     More details

    Language:Japanese  

    Adaptive network services enabled by advanced relay node
    Due to explosive growth of Internet usage with diversifying communication technologies and applications, the current Internet is facing serious problems and approaching a turning point. To achieve scalability, diversity and harmony with human society, more effective and flexible sharing schemes of network resource are required. Especially when a number of large-scale distributed applications share the resource, efficacy on comprehensive usage of network, computation, and storage resources is needed from the viewpoint of information processing and application as the ultimate goal. Therefore, reconsideration of coordination and partitioning of functions between networks (providers) and applications (users) becomes a recent research topic. In this paper, we discuss the feasibility and issues of flexible and adaptive network services by introducing advanced relay nodes inside the network.

  • ユーザ-ネットワークインタラクションに基づくユビキタスネットワーク経路制御システムの開発(経路制御,NGN管理,サービス管理,ユーザ管理及び一般)

    夏井宣匡, 吉永一美, 池永全志, 小出洋, 吉田香

    電子情報通信学会技術研究報告. TM, テレコミュニケーションマネジメント   2008.3

     More details

    Language:Japanese  

    User-Network Interaction based Ubiquitous Network management system
    Ubiquitous networks enables us to access any information from anywhere involuntarily. In such environment, the networks should infer the users&#039; unclear request. However, the conventional networks could not treat users&#039; subjective demand. On the other hand, we have developed the multi-class QoS router which can control the class based routing depend on the user&#039;s profile. Therefore, we have proposed the unified system among multi-class QoS routing module, task scheduling module and subjective request inferring module, which can provide the best quality network service to each users. In this paper, we explain the video streaming system which is developed in the Ubila project based on the proposed system, and show the results.

  • 活動履歴を活用するシステムの基本設計と漸次的開発

    近藤秀樹, 小出洋, 三宅芳雄

    情報処理学会論文誌   2007.8

     More details

    Language:Japanese  

    The Basic Design for a System to Utilize the History of Activity and Findings to Develop it Progressively

  • 複数の特性の異なるネットワーク経路を持つ環境におけるストリーミングデータ処理のためのタスクスケジューリング(HPC-3 : スケジューリング)

    吉永一美, 小出洋

    情報処理学会研究報告. [ハイパフォーマンスコンピューティング]   2007.8

     More details

    Language:Japanese  

    A New Task Scheduling Method for Processing of Streaming Data in an Environment Including Several Networks Having Different Characteristics
    This paper proposed and evaluated a new task scheduling method for parallel and distributed applications in an environment including several networks having different characteristics. The proposed method can schedule both streaming applications and non-streaming applications well at a same time, since it selects the most suitable networks for the communications of tasks and considers the changing loads of the networks. In the experimental results, the proposed method reduces the total execution time of a practical streaming application. The dispersion of the execution time is also suppressed even if the network bandwidth is dynamically changing. This characteristic is very useful when this method combines more complicated task scheduling methods.

  • 複数の特性の異なるネットワーク経路を持つ環境におけるストリーミングデータ処理のためのタスクスケジューリング

    吉永一美, 小出洋

    情報処理学会研究報告   2007.8

     More details

    Language:Japanese  

    A New Task Scheduling Method for Processing of Streaming Data in an Environment Including Several Networks Having Different Characteristics

  • 活動履歴を活用するシステムの基本設計と漸次的開発

    近藤 秀樹, 小出 洋, 三宅 芳雄

    情報処理学会論文誌プログラミング(PRO)   2007.8

     More details

    Language:Japanese  

    The Basic Design for a System to Utilize the History of Activity and Findings to Develop it Progressively
    We have developed NecoLogger, a recording-retriving system that records the entire activity of personal computer use. Using NecoLogger, users can retrieve useful information and utilize it for their current problem solving. In this paper we report the overall design of the system and the details of its implementation. We also report the operational findings to show the usefulness of this system. In order to retrieve user activities efficently, we record the textual information of the creen regardless of the applications software by utilizing API hooks in OS. We also record screen images intermittently to restore the entire activity of a user. Logging the user's entire activity requires large amount of data area and it is necessary to reduce the amount to a practical level. We reduce the amount by taking screen shots at the optimal interval. Since our system should be developed extensively in the course of the development, we had to modify data structures quite often to store logging data. We adopted the XML format to meet the requirement. By adopting these methods mentioned above, we have been able to accumulate logging data continuously and have developed the system progressively to meet the newly found requirements based on the actual uses of the system.

  • 履歴の高度利用のための3次元GUIベースの情報環境の開発

    近藤秀樹, 小出洋, 三宅芳雄

    情報処理学会夏のプログラミング・シンポジウム報告集   2007.1

     More details

    Language:Japanese  

    Development of the three dimension GUI based information environment for advanced use for history.

  • Grid 環境におけるネットワーク特性がアプリーケーションの実行性能へ及ぼす影響について

    北辻佳憲, 山崎克之, 小出洋, 鶴正人, 尾家祐二

    電子情報通信学会技術研究報告. NS, ネットワークシステム   2005.2

     More details

    Language:Japanese  

    The Influence on Application Performance by Network Characteristics in Grids
    In the Grid computing, it is a key issue how limited Grid resources are effectively shared by various applications executed in parallel in order to improve the application-level performance. e.g., to reduce the completion time of each application and/or a set of applications. In terms of network resources, the communication of an application changes the condition of network resources, which may, in turn, affect the communications in other applications sharing the identical network resources, and thus may deteriorate their performance. In this paper, we examine the characteristics of traffic generated by some typical grid applications, and how the round-trip time and the bottleneck bandwidth affect the application-level performance (i.e., completion time) of these applications. Our experiments show that the impact of network conditions on the application performance and the impact of application traffic on the network conditions are considerably different depending on the application. Those results suggest an effective network resource allocation should take network-related properties of individual applications into consideration.

  • 資源情報サーバにおける予測手法である類似法の改良と評価(一般講演2)

    平孝則, 小出洋

    情報処理学会研究報告. [ハイパフォーマンスコンピューティング]   2004.12

     More details

    Language:Japanese  

    Evaluation and reform of procedure of prediction in the Resource Information Server
    For the purpose optimum resource assignment in the distributed computing enviornment, we have depeloped the Resource Infomation Server(RIS). RIS gathers resource infomation, CPU and network loads, on a computer on distributed computing, and predicts the future resource. Today RIS system has two kinds of prediction procedure, they are the similary procedure and the average procedure. The first procedure predict by searching the most similar sequence of resource information to a recent trend of resource information. The second procedure predict by calculation average of a recent trend of resource information, we reformed the similar procedure the purpose of improvement it, and search optimized parameter for it. In this paper, a summary of RIS system, reform point for the similary procedure, evaluation and result are described.

  • マルチスレッドを用いてページ転送遅延を隠蔽するソフトウェアDSMシステム

    立川純, 小出洋

    情報処理学会研究報告   2004.7

     More details

    Language:Japanese  

    Hiding remote page access latency with multithreading in Software Distributed Shared Memory system

  • 資源情報サーバの新しい予測手法と性能評価(HPC-12 : 最適化と性能評価)(2004年並列/分散/協調処理に関する『青森』サマー・ワークショップ(SWoPP青森2004) : 研究会・連続同時開催)

    平孝則, 小出洋

    情報処理学会研究報告. [ハイパフォーマンスコンピューティング]   2004.7

     More details

    Language:Japanese  

    Evalution of new procedure of prediction in the Resource Information Server
    For the purpose optimum resource assignment in the distributed computing enviornment, we have depeloped the Resource Infomation Server(RIS). RIS gathers resource infomation, CPU and network loads, on a computer on distributed computing, and predicts the future resource. Old RIS system was implemented C language and STAMPI library. Now RIS system is implemented JAVA and JAVA RMI. Because it isn&#039;t depend the platforms. Procedures to predict future resource information were changed. The similary procedure is based that module predicts it with much smaller error. The average procedure is based that module predicts it with recent trend. In this paper, the implementation of new RIS system, measuring and procedure to predict future the resource infomation, and evalutions of accuracy of prediction of future resource infomation are described.

  • マルチスレッドを用いてページ転送遅延を隠蔽するソフトウェアDSMシステム(HPC-8 : クラスタ)(2004年並列/分散/協調処理に関する『青森』サマー・ワークショップ(SWoPP青森2004) : 研究会・連続同時開催)

    立川純, 小出洋

    情報処理学会研究報告. [ハイパフォーマンスコンピューティング]   2004.7

     More details

    Language:Japanese  

    Hiding remote page access latency with multithreading in Software Distributed Shared Memory system
    We have designed and implemented a software distributed shared memory system, hiding remote page access latency with multithreading. This system consists of two types of thread, computational thread and scheduler thread, which are connected with local TCP socket each other. When the page fault occur by a computational thread, page fault notice is sent to scheduler thread via local socket from page fault handler. After receiving the page fault notice, scheduler thread send a remote page request to home node of requested page, and invoke a computational thread which is not executing currently. The experiment on 16 processors shows that NPB CG benchmark with 4 computational thread runs 17% faster than that with 1 computational thread.

  • Gridにおけるアプリケーションの実行性能へネットワーク特性が及ぼす影響に関する検討

    北辻佳憲, 山崎克之, 鶴正人, 小出洋, 尾家祐二

    電子情報通信学会技術研究報告   2004.5

     More details

    Language:Japanese  

    Study for the Influences of Network Characteristics to Application Performance in the Grid Environment

  • タスク移動による通信最適化を目指したソフトウェア分散共有メモリの設計と実装

    立川純, 小出洋

    情報処理学会研究報告   2003.10

     More details

    Language:Japanese  

    Design and Implementation of Software Distributed Shared Memory system that Realize the Communication Optimization by Task Moving

  • タスク並列処理を用いたソフトウエア分散共有メモリの提案(プロセッサシステムとプログラミング環境)

    立川純, 福田健一郎, 平孝則, 大西淑雅, 佐藤寿倫, 小出洋

    情報処理学会研究報告. [ハイパフォーマンスコンピューティング]   2003.6

     More details

    Language:Japanese  

    T - SDSM : Task - based Software Distributed Shared Memory based on Task - Parallel processing Framework
    In heterogeneous eomputing environments such as PC-Cluster and Grid, it is difficult to execute parallel programs with a high average resource utilzation rate. And also, it is necessary to conceal the heterogeneity from the programmers. Therefore, we propose a new method for the parallel programs based on the shared memory model such as OpenMP. In our method, at the compile time, a parallel source program is translated to a set of tasks and is scanned to generate the function for calculating the memory address accessed by these tasks. The system, T-SDSM, which we propose in this paper realize a shared memory space by calling the function described above. And T-SDSM provides task allocation with a high average resource utilization rate. This paper describes the mechanism of T-SDSM, and reports our ideas about communication optimization technique by T-SDSM.

  • DMMSにおけるマルチメディアメールフォーマットの改良とJavaによるメーラの実装

    横尾徳保, 藤津昭一, 小出洋, 重松保弘

    九州工業大学研究報告 工学   2003.3

     More details

    Language:Japanese  

    Improvement of the Mail Format in the Distributed Multimedia Mail System and Implementation of a Mail User Agent Using Java

  • 分散型マルチメディアメールシステムの開発とその評価

    坂元仁樹, 横尾徳保, 小出洋, 重松保弘

    九州工業大学研究報告. 工学   2003.3

     More details

    Language:Others  

  • 分散型マルチメディアメールシステムの開発とその評価

    坂元 仁樹, 横尾 徳保, 小出 洋, 重松 保弘

    九州工業大学研究報告. 工学   2003.3

     More details

    Language:Japanese  

    Design and Development of a Distributed Multimedia Mail System and its Evaluation

  • 分散型マルチメディアメールシステムの開発とその評価

    坂元仁樹, 横尾徳保, 小出洋, 重松保弘

    九州工業大学研究報告 工学   2003.3

     More details

    Language:Japanese  

    Design and Development of a Distributed Multimedia Mail System and its Evaluation

  • グローバルコンピューティングに関する研究 : Globus Toolkit の導入

    伊藤光祐, 小出洋

    九州工業大学研究報告. 工学   2003.3

     More details

    Language:Japanese  

    Reserch for global computing : Globus Toolkit introduction

  • グローバルコンピューティングに関する研究~Globus Tookitの導入~

    伊藤 光祐, 小出 洋

    九州工業大学研究報告. 工学 = Bulletin of the Kyushu Institute of Technology. Science and technology   2003.3

     More details

    Language:Japanese  

    Research for global computing - Globus Toolkit introduction -

  • グローバルコンピューティングに関する研究~Globus Toolkitの導入~

    伊藤光祐, 小出洋

    九州工業大学研究報告 工学   2003.3

     More details

    Language:Japanese  

    Reserch for global computing-Globus Toolkit introduction-

  • DMMSにおけるマルチメディアメールフォーマットの改良とJavaによるメーラの実装

    横尾徳保, 藤津昭一, 小出洋, 重松保弘

    九州工業大学研究報告. 工学   2003.3

     More details

    Language:Others  

  • DMMSにおけるマルチメディアメールフォーマットの改良とJavaによるメーラの実装

    横尾 徳保, 藤津 昭一, 小出 洋, 重松 保弘

    九州工業大学研究報告. 工学   2003.3

     More details

    Language:Japanese  

    Improvement of the Mail Format in the Distributed Multimedia mail System and Implementation of a Mail User Agent Using Java

  • タスク移動による通信最適化を目指したソフトウェア分散共有メモリの設計と実装(高性能システム)

    立川純, 小出洋

    情報処理学会研究報告. [ハイパフォーマンスコンピューティング]   2003.1

     More details

    Language:Japanese  

    Design and Implementation of Software Distributed Shared Memory system that Realize the Communication Optimization by Task Moving
    This paper describes that the design and implementation detail of runtime system for OpenMP &#039;T-SDSM&#039;. T-SDSM is the software DSM system for hetrogeneous computing environments such as PC-Cluster and Grid, and for distributed computing systems that have synamic load change. T-SDSM has two functions. One is the data caching, and the other is the task moving. The data caching function loads the memory block accessed by the task from remote node, and many other SDSM system has this function. The task moving function move the task to home node that is owner of the memory block accessed by the task. The evaluation result of T-SDSM with laplace program don&#039;t show the effectiveness of communication optimization by the task moving function, because T-SDSM has a large overhead on task execution. However, the evaluation result with critical section show that the effectiveness by task moving.

  • メタスケジューリングのための資源情報サーバの構築

    小出洋, 山岸信寛, 武宮博, 林拓也, 引田雅之, 笠原博徳

    計算工学講演会論文集   2000.5

     More details

    Language:Japanese  

    メタスケジューリングのための資源情報サーバの構築

  • メタスケジューリングのための資源情報サーバの構築

    小出 洋, 山岸 信寛, 武宮 博, 林 拓也, 引田 雅之, 笠原 博徳

    計算工学講演会論文集   2000.5

     More details

    Language:Japanese  

    IMPLEMENTATION OF RESOURCE INFORMATION SERVER FOR META-SCHEDULING

  • 並列分散科学技術計算を支援するソフトウェア・システム(STA)の構築

    武宮 博, 今村 俊幸, 小出 洋

    情報処理   1999.11

     More details

    Language:Japanese  

    Development of a Software System (STA: Seamless Thiking Aid) for Distributed Parallel Scientific Computing

  • 並列分散科学技術計算を支援するソフトウェア・システム(STA)の構築

    武宮 博, 今村 俊幸, 小出 洋

    情報処理   1999.11

     More details

    Language:Japanese  

    Development of a Software System (STA: Seamless Thinking Aid) for Distributed Parallel Scientific Computing

  • トカマクプラズマ計算(NEXT)における異機種並列計算機を結合したハイブリッドコンピューティング

    今村俊幸, 小出洋, 徳田伸二, 武宮博

    計算工学講演会論文集   1999.5

     More details

    Language:Japanese  

    トカマクプラズマ計算(NEXT)における異機種並列計算機を結合したハイブリッドコンピューティング

  • 並列分散科学技術計算環境STA(4) : 異機種並列計算機の統合利用環境の構築

    今村 俊幸, 太田 浩史, 川崎 琢治, 小出 洋, 武宮 博, 樋口 健二, 久野 章則, 笠原 博徳, 相川 裕史

    計算工学講演会論文集   1999.5

     More details

    Language:Japanese  

    DEVELOPMENT OF AN INTEGRATED ENVIRONMENT FOR HETEROGENEOUS PARALLEL COMPUTERS ON STA

  • 並列分散科学技術計算環境STA(3) : 異機種並列計算機間通信ライブラリの構築

    小出 洋, 今村 俊幸, 太田 浩史, 川崎 琢治, 武宮 博, 樋口 健二, 笠原 博徳, 相川 裕史

    計算工学講演会論文集   1999.5

     More details

    Language:Japanese  

    DISTRIBUTED PARALLEL SCIENTIFIC COMPUTING ENVIRONMENT STA (3) : DEVELOPMENT OF A MESSAGE PASSING LIBRARY FOR HETEROGENEOUS PARALLEL COMPUTER CLUSTER

  • 並列分散科学技術計算環境STA(2) : エディタを中心に統合された並列プログラム開発環境PPDEの構築

    太田 浩史, 今村 俊幸, 川崎 琢治, 小出 洋, 武宮 博, 樋口 健二, 笠原 博徳, 相川 裕史

    計算工学講演会論文集   1999.5

     More details

    Language:Japanese  

    DISTRIBUTED PARALLEL SCIENTIFIC COMPUTING ENVIRONMENT STA(2) : DEVELOPMENT OF THE EDITOR-CENTRIC PARALLEL PROGRAM DEVELOPMENT ENVIRONMENT PPDE

  • 並列分散科学技術計算環境STA(1) : 目的及び概要

    武宮 博, 今村 俊幸, 太田 浩史, 川崎 琢治, 小出 洋, 樋口 健二, 笠原 博徳, 相川 裕史

    計算工学講演会論文集   1999.5

     More details

    Language:Japanese  

    DISTRIBUTED PARALLEL SCIENTIFIC COMPUTING ENVIRONMENT STA(1) : OVERVIEW

  • 並列分散科学技術計算の支援環境 SSP

    武宮博, 太田浩史, 今村俊幸, 小出洋, 松田勝之, 樋口健二, 平山俊雄, 笠原博徳

    計算工学講演会論文集   1999.5

     More details

    Language:Japanese  

    並列分散科学技術計算の支援環境 SSP

  • トカマクプラズマ計算(NEXT)における異機種並列計算機を結合したハイブリッドコンピューティング

    今村 俊幸, 小出 洋, 徳田 伸二

    計算工学講演会論文集   1999.5

     More details

    Language:Japanese  

  • OSCARマルチグレイン並列化コンパイラを用いたスーパーコンピュータクラスタのためのメタ・スケジューリング手法

    村杉明夫, 林拓也, 飛田高雄, 小出洋, 笠原博徳

    情報処理学会全国大会講演論文集   1999.3

     More details

    Language:Japanese  

    OSCARマルチグレイン並列化コンパイラを用いたスーパーコンピュータクラスタのためのメタ・スケジューリング手法

  • OSCARマルチグレイン並列化コンパイラを用いたスーパーコンピュータクラスタのためのメタ. スケジューリング手法

    村杉 明夫, 林 拓也, 飛田 高雄, 小出 洋, 笠原 博徳

    全国大会講演論文集   1999.3

     More details

    Language:Japanese  

    Meta-scheduling for a Super computer Cluster using OSCAR Fortran Multigrain Parallelizing Compiler

  • 異機種並列計算機間の通信を支援する並列分散通信ライブラリ : Stampi

    小出 洋, 今村 俊幸, 武宮 博, 平山 俊雄

    年会一般講演   1998.7

     More details

    Language:Japanese  

    Stampi : A Message Passing Library for Distributed Parallel Computing

  • 並例分散科学技術計算環境STA (4) 異機種並列計算機の統合利用環境の構築

    今村俊幸, 太田浩史, 川崎琢治, 小出洋, 武宮博, 樋口健二, 久野章則, 笠原博徳, 相川裕史

    計算工学講演会論文集   1998.5

     More details

    Language:Japanese  

    Development of an integrated environment for heterogeneous parallel computers on STA.

  • 並列分散科学技術計算環境STA (1) 目的及び概要

    武宮博, 今村俊幸, 太田浩史, 川崎琢治, 小出洋, 樋口健二, 笠原博徳, 相川裕史

    計算工学講演会論文集   1998.5

     More details

    Language:Japanese  

    Distributed parallel scientific computing environment STA. (1). Overview.

  • 並列分散科学技術計算環境STA (2) エディタを中心に統合された並列プログラム開発環境PPDEの構築

    太田浩史, 今村俊幸, 川崎琢治, 小出洋, 武宮博, 樋口健二, 笠原博徳, 相川裕史

    計算工学講演会論文集   1998.5

     More details

    Language:Japanese  

    Distributed parallel scientific computing environment STA. (2). Development of the editor-centric parallel program development environment PPDE.

  • 並列分散科学技術計算環境STA (3) 異機種並列計算機間通信ライブラリの構築

    小出洋, 今村俊幸, 太田浩史, 川崎琢治, 武宮博, 樋口健二, 笠原博徳, 相川裕史

    計算工学講演会論文集   1998.5

     More details

    Language:Japanese  

    Distributed parallel scientific computing environment STA. (3). Development of a message passing library for heterogeneous parallel computer cluster.

  • トカマク・プラズマにおけるハイブリッド・シミュレーション

    徳田伸二, 小出洋, 今村俊幸, 松本太郎, 小境博

    日本物理学会講演概要集(年会)   1998.3

     More details

    Language:Japanese  

    Hybrid Simulation in Tokamak Plasma.

  • 異機種並列分散コンピューティングのためのメタ・スケジューリングの構想

    小出洋, 武宮博, 今村俊幸, 太田浩史, 川崎琢治, 樋口健二, 笠原博徳, 相川裕史

    情報処理学会全国大会講演論文集   1998.3

     More details

    Language:Japanese  

    Conception of meta-scheduling for different machine parallel distributed computing.

  • 異機種並列分散コンピューティングのためのメタ・スケジューリングの構想

    小出 洋, 武宮 博, 今村 俊幸, 太田 浩史, 川崎 琢治, 樋口 健二, 笠原 博徳, 相川 裕史

    全国大会講演論文集   1998.3

     More details

    Language:Japanese  

  • 複数の並列計算機上での科学技術計算のための統合利用環境の構築

    武宮 博, 今村 俊幸, 太田浩史, 川崎 琢治, 樋口 健二, 小出 洋

    情報処理学会研究報告ハイパフォーマンスコンピューティング(HPC)   1997.8

     More details

    Language:Japanese  

    Design and Implementation for a New Integrated User Environment for Scientific Computing on a Parallel Computer Cluster
    For the propose of efficient processing of scientific computation which requires enormous computational resources, distributed parallel computing becomes a major interest in the recent years. To develop codes and to execute them on the distributed parallel environment require new infrastructure such as common communication layer between parallel computers. The authors propose a new integrated environment, STA environment version 2, which has the common communication layer and includes required services for the distributed parallel computation. The authors also apply the proposed environment to instances of scientific computation.

  • 途切れの無い思考を支援するプログラミング環境STAの構築

    太田 浩史, 樋口 健二, 武宮 博, 川崎 琢治, 本間 一朗, 小出 洋, 今村 俊幸, 新内 浩介, 谷田貝 洋光, 後藤 志津雄, 秋元 正幸, 浅井 清

    計算工学講演会論文集   1997.5

     More details

    Language:Japanese  

    DEVELOPMENT OF STA(SEAMLESS THINKING AID)PROGRAMMING ENVIRONMENT

  • 広い仮想記憶空間を利用した分散ガーベジコレクション

    小出 洋

    情報処理学会研究報告. PRO, [プログラミング]   1996.8

     More details

    Language:Japanese  

    A Distributed Garbage Collection based on Large Virtual Address Space
    In distributed environments, dynamic object allocation is strongly expected. At this time, garbage collection as an automatic memory management system is indispensable. Under the condition that every processor has a large virtual address space as its own local space, a new distributed garbage collector DC1 proposed in this paper does not spoil the scalability of distributed memory multiprocessors, has an ability to collect all types of data structures of garbage including cycle among several processors, and does not have any run-time overheads. Basically, the proposed collector employs Hughes&#039;s method, but does not propagate time-stamps over reachable objects. Therefore, the proposed collector does not require a space to restore a time-space in every object, and can employ an efficient copying collector as a local collector.

  • 生成順序の保存に基づくコピー方式世代管理の一方法

    小出 洋, 鈴木 貢, 野下浩平

    情報処理学会論文誌   1994.11

     More details

    Language:Japanese  

    An Algorithm of Generational Copying Garbage Collection Based on the Generated -Order- Preserving Property
    We present a new method for generational copying garbage collection. The copying scheme has been widely used for implementing generational garbage collectors. All the previous methods require certain kinds of special tables for handling pointers from old objects to new objects at runtime. Our method requires none of those tables. The basic idea is to compute the boundary between the new region and the old region in order to remove all reverse pointers. By using the generate-order-preserving property, older objects can always be promoted to the old region earlier than younger objects.

  • 生成順序を保存するコピー方式ガーベジコレクションについて

    小出 洋, 野下浩平

    情報処理学会論文誌   1993.11

     More details

    Language:Japanese  

    On the Copying Garbage Collector which Preserves the Generated Order
    A new algorithm for the copying garbage collection is presented, in which generated order of objects in the heap space is always preserved. The basic idea is to sort the set of all pointers to active objects in the destination semispace. The amount of time of this sorting is relatively small if we use a fast sorting algorithm for the set of fixed-sized integers. The basic algorithm is further improved to eliminate the explicit marking bits. A simple bit-table suffices for this purpose, but it requires the cost proportional to the size of the heap space. Another method is presented, which replaces the marking bit with a pair of mutual pointers for each object. The cost of this method depends only on the number of active objects. Some applications of our algorithm are briefly discussed.

▼display all

Professional Memberships

  • 情報処理学会

  • 電気情報通信学会

  • ソフトウェア科学会

  • ACM

Academic Activities

  • 実行委員

    コンピュータセキュリティシンポジウム CSS 2023  ( Japan ) 2023.10 - 2023.11

     More details

    Type:Competition, symposium, etc. 

    Number of participants:1,000

  • 実行委員 International contribution

    SCIS2022 暗号と情報セキュリティシンポジウム  ( Japan ) 2022.1

     More details

    Type:Competition, symposium, etc. 

    Number of participants:1,000

  • Screening of academic papers

    Role(s): Peer review

    2022

     More details

    Type:Peer review 

    Number of peer-reviewed articles in Japanese journals:2

    Proceedings of International Conference Number of peer-reviewed papers:6

  • Screening of academic papers

    Role(s): Peer review

    2021

     More details

    Type:Peer review 

    Number of peer-reviewed articles in Japanese journals:2

    Proceedings of International Conference Number of peer-reviewed papers:6

  • Screening of academic papers

    Role(s): Peer review

    2020

     More details

    Type:Peer review 

    Number of peer-reviewed articles in Japanese journals:2

    Proceedings of International Conference Number of peer-reviewed papers:6

  • プログラム委員長

    AXIES 大学ICT推進協議会年次大会  ( Japan ) 2019.12 - 2020.12

     More details

    Type:Competition, symposium, etc. 

    Number of participants:800

  • 運営委員

    情報処理学会 プログラミング研究会  ( Japan ) 2017.4 - 2020.3

     More details

    Type:Competition, symposium, etc. 

  • 情報処理学会論文誌プログラミング

    2017.4 - 2020.3

     More details

    Type:Academic society, research group, etc. 

  • Screening of academic papers

    Role(s): Peer review

    2017

     More details

    Type:Peer review 

    Number of peer-reviewed articles in Japanese journals:2

    Proceedings of International Conference Number of peer-reviewed papers:6

▼display all

Research Projects

  • 研究開発コンサルティング

    2023.12 - 2024.3

    Research commissions

      More details

    Authorship:Principal investigator  Grant type:Other funds from industry-academia collaboration

  • 情報システムを攻撃から防御するためのMoving Target Defenseに関する研究

    2023.6 - 2024.3

    Research commissions

      More details

    Authorship:Principal investigator  Grant type:Other funds from industry-academia collaboration

  • 寄付金「ProSec-IT/SECKUN事業」

    2023

      More details

    Grant type:Donation

  • 情報システムを攻撃から防御するためのMoving Target Defenseに関する研究

    2021.6 - 2022.3

    Research commissions

      More details

    Authorship:Principal investigator  Grant type:Other funds from industry-academia collaboration

  • サイバー攻撃が困難な情報システムを構築するためのフレームワーク

    2021.4 - 2025.3

    九州大学(日本) 

      More details

    Authorship:Principal investigator 

  • サイバー攻撃が困難な情報システムを構築するためのフレームワーク

    Grant number:21K11888  2021 - 2024

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Authorship:Principal investigator  Grant type:Scientific research funding

  • サイバー攻撃が困難な情報システムを構築するためのフレームワーク

    Grant number:21K11888  2021 - 2024

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • 情報システムを攻撃から防御するためのMoving Target Defenseに関する研究

    2020.6 - 2021.3

    Research commissions

      More details

    Authorship:Principal investigator  Grant type:Other funds from industry-academia collaboration

  • 情報システムを攻撃から防御するためのMoving Target Defenseに関する研究

    2019.11 - 2020.3

    Research commissions

      More details

    Authorship:Principal investigator  Grant type:Other funds from industry-academia collaboration

  • 教育訓練プログラム開発事業(2年開発コース)<<区分 ICTを開発した分野>>委託

    2019 - 2020

    教育訓練プログラム開発事業(2年開発コース)

      More details

    Authorship:Principal investigator  Grant type:Contract research

  • 多次元挙動パターンの高速自動抽出によるサイバー攻撃の検知に関する研究

    Grant number:18K11295  2018 - 2020

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • ネットワークアプリケーションにおける攻撃者の攻撃傾向の検出実験

    2017.6 - 2018.3

    国立情報学研究所(クラウド利活用実証実験) 

      More details

    Authorship:Principal investigator 

    本実証実験では,既存のWebアプリケーションを用いて攻撃者を誘導することにより,Webアプリケーションに対する攻撃手法の収集・分析・Webアプリケーションの保護を可能にすることを目的とする.その目的を達成するために,Webアプリケーションに疑似APIの機能を付加し,アプリケーションをハニーポット化することで攻撃検出を行う手法を提案する.近年,情報システムに対する攻撃手法が変化してきている.特に特定の組織を対象とした標的型攻撃が増加しており,攻撃の主流となっている.その一方でWebアプリケーション等の情報システムは一部クラウド環境等にも用いられるようになり,情報システムのシステム構成等がオンプレミス環境での単独利用に比べ複雑となっている.そのため,現在運用されている情報システムを把握することは難しく,セキュリティ機能を持たせることは困難である.以上のことから,運用されているWebアプリケーションを変更せず,密に連携したセキュリティ機能を持つことが必須である.

  • 企業・官公庁等のIT実務、設計・製造実務における情報セキュリティに関わるプロ人材育成コースの開発・実施

    2017 - 2022

    文部科学省研究拠点形成費等補助金(成長分野を支える情報人材の育成拠点の形成(enPiT) enPiT-Pro)

      More details

    Authorship:Collaborating Investigator(s) (not designated on Grant-in-Aid)  Grant type:Contract research

  • 戦略的国際共同研究プログラム(SICORP) 「国際共同研究拠点(インド)」 「安全なIoTサイバー空間の実現」 International coauthorship

    2016.10 - 2021.9

    国立研究開発法人 科学技術推進機構(日本) 

      More details

    Authorship:Coinvestigator(s) 

  • 計算状態の精密操作に基づく高性能・高信頼システム技術

    Grant number:26280023  2014 - 2018

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • 新しいタイプの攻撃に対するセキュリティ対策を支援する自動トレースの並列分散処理

    Grant number:24500043  2012 - 2015

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • 異種マルチコアプロセッサの効率的な実行を実現するタスク内記憶領域管理機構

    Grant number:21500039  2009 - 2011

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • ネットワーク浸透のための融合技術と進化のための情報ダイナミクスに関する研究

    Grant number:18100001  2006 - 2010

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • 医用画像と医療知識に基づいて自動生成された患者モデルを用いた手術訓練システム

    Grant number:18200008  2006 - 2009

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • ストリーミング処理が含まれる分散プログラムのタスクスケジューリング

    Grant number:18500056  2006 - 2007

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • ネットワークを考慮したグローバルコンピューティングの構築と評価

    Grant number:16016271  2004 - 2005

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • グローバルコンピューティングにおける記憶領域管理を考慮したタスクスケジューリング

    Grant number:15700063  2003 - 2004

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • 各種資源利用状態を考慮するグローバルコンピューティング機構とその応用

    Grant number:15017273  2003

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

  • グローバルコンピューティングのための新たなネットワークサービス提供機構とその性能

    Grant number:14019074  2002

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

      More details

    Grant type:Scientific research funding

▼display all

Educational Activities

  • 2022.4〜 ProSec-IT/SECKUNの主体的実施
    2017.10〜2022.3 enPiT-Pro ProSec-IT の主体的実施
    2019.10〜2020.3 厚生労働省教育訓練プログラムの開発の主体的実施

Class subject

  • 【通年】情報理工学演習

    2024.4 - 2025.3   Full year

  • 【通年】情報理工学研究Ⅰ

    2024.4 - 2025.3   Full year

  • セキュリティエンジニアリング演習

    2024.4 - 2025.3   Full year

  • 情報システムセキュリティ演習

    2024.4 - 2025.3   Full year

  • 情報システムセキュリティ演習Ⅱ

    2024.4 - 2025.3   Full year

  • 情報システムセキュリティ演習Ⅰ

    2024.4 - 2025.3   Full year

  • 【通年】情報理工学講究

    2024.4 - 2025.3   Full year

  • Security Engineering Exercise

    2024.4 - 2025.3   Full year

  • Cyber Security Exercise for Information Systems II

    2024.4 - 2025.3   Full year

  • Cyber Security Exercise for Information Systems I

    2024.4 - 2025.3   Full year

  • 情報理工学読解

    2024.4 - 2024.9   First semester

  • 情報理工学論議Ⅰ

    2024.4 - 2024.9   First semester

  • 情報理工学論述Ⅰ

    2024.4 - 2024.9   First semester

  • 【サイバー】暗号と情報セキュリティ特論

    2024.4 - 2024.6   Spring quarter

  • サイバーセキュリティ基礎論

    2024.4 - 2024.6   Spring quarter

  • サイバーセキュリティ基礎論

    2024.4 - 2024.6   Spring quarter

  • 通信工学通論Ⅱ

    2023.12 - 2024.2   Winter quarter

  • コンピュータシステム通論B

    2023.12 - 2024.2   Winter quarter

  • コンピュータシステム通論Ⅱ

    2023.12 - 2024.2   Winter quarter

  • (後期)コンピュータシステム通論

    2023.10 - 2024.3   Second semester

  • 情報理工学論議Ⅱ

    2023.10 - 2024.3   Second semester

  • 情報理工学論述Ⅱ

    2023.10 - 2024.3   Second semester

  • 通信工学通論Ⅰ

    2023.10 - 2023.12   Fall quarter

  • コンピュータシステム通論A

    2023.10 - 2023.12   Fall quarter

  • コンピュータシステム通論Ⅰ

    2023.10 - 2023.12   Fall quarter

  • 情報システムセキュリティ演習Ⅰ

    2023.4 - 2024.3   Full year

  • Advanced Project Management II

    2023.4 - 2024.3   Full year

  • Advanced Project Management I

    2023.4 - 2024.3   Full year

  • Intellectual Property Management II

    2023.4 - 2024.3   Full year

  • Intellectual Property Management I

    2023.4 - 2024.3   Full year

  • Scientific English Presentation II

    2023.4 - 2024.3   Full year

  • Scientific English Presentation I

    2023.4 - 2024.3   Full year

  • Advanced Seminar in Social Information Systems Engineering

    2023.4 - 2024.3   Full year

  • Adv Semi in Intelligent Information Systems Engineering

    2023.4 - 2024.3   Full year

  • Advanced Research in Advanced Information Technology II

    2023.4 - 2024.3   Full year

  • Advanced Research in Advanced Information Technology I

    2023.4 - 2024.3   Full year

  • 知的情報システム工学特別演習

    2023.4 - 2024.3   Full year

  • 情報知能工学特別講究第二

    2023.4 - 2024.3   Full year

  • 情報知能工学特別講究第一

    2023.4 - 2024.3   Full year

  • Adv Res in Networking Technologies and Applications

    2023.4 - 2024.3   Full year

  • 情報ネットワーク特別講究

    2023.4 - 2024.3   Full year

  • Advanced Seminar in Information Science and Technology

    2023.4 - 2024.3   Full year

  • Advanced Research in Information Science and Technology II

    2023.4 - 2024.3   Full year

  • Advanced Research in Information Science and Technology I

    2023.4 - 2024.3   Full year

  • 情報理工学特別演習

    2023.4 - 2024.3   Full year

  • 情報理工学特別研究Ⅱ

    2023.4 - 2024.3   Full year

  • 情報理工学特別研究Ⅰ

    2023.4 - 2024.3   Full year

  • Advanced Research in Networking Technologies and Application

    2023.4 - 2024.3   Full year

  • 情報ネットワーク特別講究

    2023.4 - 2024.3   Full year

  • Advanced Project Management Technique

    2023.4 - 2024.3   Full year

  • Intellectual Property Management

    2023.4 - 2024.3   Full year

  • Scientific English Presentation

    2023.4 - 2024.3   Full year

  • 先端プロジェクト管理技法

    2023.4 - 2024.3   Full year

  • Advanced Project Management II

    2023.4 - 2024.3   Full year

  • Advanced Project Management I

    2023.4 - 2024.3   Full year

  • Scientific English Presentation II

    2023.4 - 2024.3   Full year

  • Scientific English Presentation I

    2023.4 - 2024.3   Full year

  • Security Engineering Exercise

    2023.4 - 2024.3   Full year

  • Cyber Security Exercise for Information Systems II

    2023.4 - 2024.3   Full year

  • Cyber Security Exercise for Information Systems I

    2023.4 - 2024.3   Full year

  • 【通年】情報理工学講究

    2023.4 - 2024.3   Full year

  • 【通年】情報理工学演習

    2023.4 - 2024.3   Full year

  • 【通年】情報理工学研究Ⅰ

    2023.4 - 2024.3   Full year

  • セキュリティエンジニアリング演習

    2023.4 - 2024.3   Full year

  • セキュリティエンジニアリング演習

    2023.4 - 2024.3   Full year

  • 情報システムセキュリティ演習

    2023.4 - 2024.3   Full year

  • 情報システムセキュリティ演習Ⅱ

    2023.4 - 2024.3   Full year

  • 情報理工学読解

    2023.4 - 2023.9   First semester

  • 情報理工学論議Ⅰ

    2023.4 - 2023.9   First semester

  • 情報理工学論述Ⅰ

    2023.4 - 2023.9   First semester

  • サイバーセキュリティ基礎論

    2023.4 - 2023.6   Spring quarter

  • 暗号と情報セキュリティ特論

    2023.4 - 2023.6   Spring quarter

  • 【サイバー】暗号と情報セキュリティ特論

    2023.4 - 2023.6   Spring quarter

  • 暗号と情報セキュリティ特論

    2023.4 - 2023.6   Spring quarter

  • サイバーセキュリティ基礎論

    2023.4 - 2023.6   Spring quarter

  • コンピュータシステム通論B

    2022.12 - 2023.2   Winter quarter

  • 通信工学通論B

    2022.12 - 2023.2   Winter quarter

  • 情報理工学論議Ⅱ

    2022.10 - 2023.3   Second semester

  • (後期)コンピュータシステム通論

    2022.10 - 2023.3   Second semester

  • 情報理工学論述Ⅱ

    2022.10 - 2023.3   Second semester

  • コンピュータシステム通論A

    2022.10 - 2022.12   Fall quarter

  • 通信工学通論A

    2022.10 - 2022.12   Fall quarter

  • 情報理工学講究

    2022.4 - 2023.3   Full year

  • Cyber Security Exercise for Information Systems I

    2022.4 - 2023.3   Full year

  • Cyber Security Exercise for Information Systems II

    2022.4 - 2023.3   Full year

  • Cyber Security Exercise for Information Systems

    2022.4 - 2023.3   Full year

  • Security Engineering Exercise

    2022.4 - 2023.3   Full year

  • Security Engineering Exercise

    2022.4 - 2023.3   Full year

  • Scientific English Presentation

    2022.4 - 2023.3   Full year

  • Intellectual Property Management

    2022.4 - 2023.3   Full year

  • Exercise in Teaching

    2022.4 - 2023.3   Full year

  • Advanced Project Management Technique

    2022.4 - 2023.3   Full year

  • 情報ネットワーク特別講究

    2022.4 - 2023.3   Full year

  • Adv Res in Networking Technologies and Applications

    2022.4 - 2023.3   Full year

  • 情報知能工学特別講究第一

    2022.4 - 2023.3   Full year

  • 情報知能工学特別講究第二

    2022.4 - 2023.3   Full year

  • 知的情報システム工学特別演習

    2022.4 - 2023.3   Full year

  • Advanced Research in Advanced Information Technology I

    2022.4 - 2023.3   Full year

  • Advanced Research in Advanced Information Technology II

    2022.4 - 2023.3   Full year

  • Adv Semi in Intelligent Information Systems Engineering

    2022.4 - 2023.3   Full year

  • Advanced Seminar in Social Information Systems Engineering

    2022.4 - 2023.3   Full year

  • 情報システムセキュリティ演習Ⅰ

    2022.4 - 2023.3   Full year

  • 情報システムセキュリティ演習Ⅱ

    2022.4 - 2023.3   Full year

  • 情報システムセキュリティ演習

    2022.4 - 2023.3   Full year

  • セキュリティエンジニアリング演習

    2022.4 - 2023.3   Full year

  • セキュリティエンジニアリング演習

    2022.4 - 2023.3   Full year

  • 情報理工学研究Ⅰ

    2022.4 - 2023.3   Full year

  • 情報理工学演習

    2022.4 - 2023.3   Full year

  • 情報理工学論議Ⅰ

    2022.4 - 2022.9   First semester

  • 情報理工学読解

    2022.4 - 2022.9   First semester

  • 情報理工学論述Ⅰ

    2022.4 - 2022.9   First semester

  • 暗号と情報セキュリティ特論

    2022.4 - 2022.6   Spring quarter

  • [Field of Cyber]Adv Cryptography and Information Sec

    2022.4 - 2022.6   Spring quarter

  • Advanced Cryptography and Information Security

    2022.4 - 2022.6   Spring quarter

  • 電気情報工学入門

    2022.4 - 2022.6   Spring quarter

  • サイバーセキュリティ基礎論

    2022.4 - 2022.6   Spring quarter

  • サイバーセキュリティ基礎論

    2022.4 - 2022.6   Spring quarter

  • 暗号と情報セキュリティ特論

    2022.4 - 2022.6   Spring quarter

  • 【サイバー】暗号と情報セキュリティ特論

    2022.4 - 2022.6   Spring quarter

  • コンピュータシステム通論B

    2021.12 - 2022.2   Winter quarter

  • コンピュータシステムⅡB

    2021.12 - 2022.2   Winter quarter

  • コンピュータシステム通論A

    2021.10 - 2022.3   Second semester

  • 情報理工学演示

    2021.10 - 2022.3   Second semester

  • コンピュータシステムⅡ

    2021.10 - 2022.3   Second semester

  • コンピュータシステム通論

    2021.10 - 2022.3   Second semester

  • 情報知能工学演習第三

    2021.10 - 2022.3   Second semester

  • 情報知能工学講究第三

    2021.10 - 2022.3   Second semester

  • 通信工学通論B

    2021.10 - 2022.3   Second semester

  • 通信工学通論A

    2021.10 - 2022.3   Second semester

  • コンピュータシステム通論B

    2021.10 - 2022.3   Second semester

  • コンピュータシステムIIA

    2021.10 - 2021.12   Fall quarter

  • コンピュータシステムⅡA

    2021.10 - 2021.12   Fall quarter

  • コンピュータシステム通論A

    2021.10 - 2021.12   Fall quarter

  • 知的情報システム工学特別演習

    2021.4 - 2022.3   Full year

  • Cyber Security Exercise for Information Systems I

    2021.4 - 2022.3   Full year

  • Cyber Security Exercise for Information Systems II

    2021.4 - 2022.3   Full year

  • [M2]Cyber Security Exercise for Information Systems

    2021.4 - 2022.3   Full year

  • Security Engineering Exercise

    2021.4 - 2022.3   Full year

  • [M2]Security Engineering Exercise

    2021.4 - 2022.3   Full year

  • Scientific English Presentation

    2021.4 - 2022.3   Full year

  • Intellectual Property Management

    2021.4 - 2022.3   Full year

  • Exercise in Teaching

    2021.4 - 2022.3   Full year

  • Advanced Project Management Technique

    2021.4 - 2022.3   Full year

  • Adv Res in Networking Technologies and Applications

    2021.4 - 2022.3   Full year

  • Advanced Research in Advanced Information Technology I

    2021.4 - 2022.3   Full year

  • Advanced Research in Advanced Information Technology II

    2021.4 - 2022.3   Full year

  • Adv Semi in Intelligent Information Systems Engineering

    2021.4 - 2022.3   Full year

  • Advanced Seminar in Social Information Systems Engineering

    2021.4 - 2022.3   Full year

  • 情報システムセキュリティ演習Ⅰ

    2021.4 - 2022.3   Full year

  • 情報システムセキュリティ演習Ⅱ

    2021.4 - 2022.3   Full year

  • [M2]情報システムセキュリティ演習

    2021.4 - 2022.3   Full year

  • セキュリティエンジニアリング演習

    2021.4 - 2022.3   Full year

  • [M2]セキュリティエンジニアリング演習

    2021.4 - 2022.3   Full year

  • 情報理工学研究Ⅰ

    2021.4 - 2022.3   Full year

  • 情報理工学演習

    2021.4 - 2022.3   Full year

  • 情報ネットワーク特別講究

    2021.4 - 2022.3   Full year

  • 情報知能工学特別講究第一

    2021.4 - 2022.3   Full year

  • 情報知能工学特別講究第二

    2021.4 - 2022.3   Full year

  • [M2]情報知能工学講究第二

    2021.4 - 2021.9   First semester

  • 情報理工学読解

    2021.4 - 2021.9   First semester

  • [M2]情報知能工学演習第二

    2021.4 - 2021.9   First semester

  • 暗号と情報セキュリティ特論

    2021.4 - 2021.6   Spring quarter

  • [M2][Field of Cyber]Adv Cryptography and Information Sec

    2021.4 - 2021.6   Spring quarter

  • [M2]Advanced Cryptography and Information Security

    2021.4 - 2021.6   Spring quarter

  • サイバーセキュリティ基礎論

    2021.4 - 2021.6   Spring quarter

  • [M2]【サイバー】暗号と情報セキュリティ特論

    2021.4 - 2021.6   Spring quarter

  • [M2]暗号と情報セキュリティ特論

    2021.4 - 2021.6   Spring quarter

  • コンピュータシステム通論B

    2020.12 - 2021.2   Winter quarter

  • 通信工学通論B

    2020.12 - 2021.2   Winter quarter

  • コンピュータシステム通論B

    2020.10 - 2021.3   Second semester

  • コンピュータシステム通論

    2020.10 - 2021.3   Second semester

  • 情報知能工学演習第一

    2020.10 - 2021.3   Second semester

  • 情報知能工学演習第三

    2020.10 - 2021.3   Second semester

  • 情報知能工学講究第一

    2020.10 - 2021.3   Second semester

  • 情報知能工学講究第三

    2020.10 - 2021.3   Second semester

  • 通信工学通論B

    2020.10 - 2021.3   Second semester

  • 通信工学通論A

    2020.10 - 2021.3   Second semester

  • コンピュータシステム通論A

    2020.10 - 2021.3   Second semester

  • コンピュータシステム通論A

    2020.10 - 2020.12   Fall quarter

  • 通信工学通論A

    2020.10 - 2020.12   Fall quarter

  • Advanced Seminar in Social Information Systems Engineering

    2020.4 - 2021.3   Full year

  • 情報システムセキュリティ演習

    2020.4 - 2021.3   Full year

  • セキュリティエンジニアリング演習

    2020.4 - 2021.3   Full year

  • 情報ネットワーク特別講究

    2020.4 - 2021.3   Full year

  • Adv Res in Networking Technologies and Applications

    2020.4 - 2021.3   Full year

  • 情報知能工学特別講究第一

    2020.4 - 2021.3   Full year

  • 情報知能工学特別講究第二

    2020.4 - 2021.3   Full year

  • Advanced Research in Advanced Information Technology I

    2020.4 - 2021.3   Full year

  • Advanced Research in Advanced Information Technology II

    2020.4 - 2021.3   Full year

  • Adv Semi in Intelligent Information Systems Engineering

    2020.4 - 2021.3   Full year

  • 情報知能工学講究第二

    2020.4 - 2020.9   First semester

  • 【サイバー】暗号と情報セキュリティ特論

    2020.4 - 2020.9   First semester

  • 暗号と情報セキュリティ特論

    2020.4 - 2020.9   First semester

  • 情報知能工学演習第二

    2020.4 - 2020.9   First semester

  • サイバーセキュリティ基礎論

    2020.4 - 2020.6   Spring quarter

  • コンピュータシステム通論B

    2019.12 - 2020.2   Winter quarter

  • 通信工学通論A

    2019.10 - 2020.3   Second semester

  • 情報知能工学演習第一

    2019.10 - 2020.3   Second semester

  • 情報知能工学演習第三

    2019.10 - 2020.3   Second semester

  • 情報知能工学講究第一

    2019.10 - 2020.3   Second semester

  • 情報知能工学講究第三

    2019.10 - 2020.3   Second semester

  • 通信工学通論B

    2019.10 - 2020.3   Second semester

  • (IUPE)Fundamentals of Computer Systems

    2019.10 - 2019.12   Fall quarter

  • コンピュータシステム通論A

    2019.10 - 2019.12   Fall quarter

  • セキュリティエンジニアリング演習

    2019.4 - 2020.3   Full year

  • 情報システムセキュリティ演習

    2019.4 - 2020.3   Full year

  • 情報知能工学講究第二

    2019.4 - 2019.9   First semester

  • サイバーセキュリティ演習

    2019.4 - 2019.9   First semester

  • 【サイバー】暗号と情報セキュリティ特論

    2019.4 - 2019.9   First semester

  • 暗号と情報セキュリティ特論

    2019.4 - 2019.9   First semester

  • 情報知能工学演習第二

    2019.4 - 2019.9   First semester

  • サイバーセキュリティ基礎論

    2019.4 - 2019.6   Spring quarter

  • 通信工学通論

    2018.10 - 2019.3   Second semester

  • コンピュータシステム通論

    2018.10 - 2019.3   Second semester

  • 情報知能工学演習第一

    2018.10 - 2019.3   Second semester

  • 情報知能工学演習第三

    2018.10 - 2019.3   Second semester

  • 情報知能工学講究第一

    2018.10 - 2019.3   Second semester

  • 情報知能工学講究第三

    2018.10 - 2019.3   Second semester

  • セキュリティエンジニアリング演習

    2018.4 - 2019.3   Full year

  • 情報システムセキュリティ演習

    2018.4 - 2019.3   Full year

  • 情報知能工学講究第二

    2018.4 - 2018.9   First semester

  • サイバーセキュリティ演習

    2018.4 - 2018.9   First semester

  • 情報知能工学演習第二

    2018.4 - 2018.9   First semester

  • 情報知能工学講究第二

    2018.4 - 2018.9   First semester

  • サイバーセキュリティ演習

    2018.4 - 2018.9   First semester

  • 暗号と情報セキュリティ特論

    2018.4 - 2018.9   First semester

  • 情報知能工学演習第二

    2018.4 - 2018.9   First semester

  • サイバーセキュリティ基礎論

    2018.4 - 2018.6   Spring quarter

  • サイバーセキュリティ演習

    2017.12 - 2018.2   Winter quarter

  • 情報知能工学講究第三

    2017.10 - 2018.3   Second semester

  • コンピュータシステム通論

    2017.10 - 2018.3   Second semester

  • 情報知能工学演習第一

    2017.10 - 2018.3   Second semester

  • 情報知能工学講究第一

    2017.10 - 2018.3   Second semester

  • サイバーセキュリティ演習

    2017.10 - 2017.12   Fall quarter

▼display all

FD Participation

  • 2024.3   Role:Participation   Title:【シス情FD】高度データサイエンティスト育成事業の取り組みについて

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2023.7   Role:Participation   Title:【シス情FD】若手教員の研究紹介⑨

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2023.5   Role:Participation   Title:【シス情FD】農学研究院で進めているDX教育について

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2022.7   Role:Participation   Title:【シス情FD】若手教員による研究紹介⑤

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2022.6   Role:Participation   Title:【シス情FD】電子ジャーナル等の今後について

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2021.5   Role:Participation   Title:先導的人材育成フェローシップ事業(情報・AI分野)について

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2021.5   Role:Participation   Title:先導的人材育成フェローシップ事業(情報・AI分野)について

    Organizer:University-wide

  • 2020.4   Role:Participation   Title:Moodleを利用したe-Learning実例報告(九州大学電気情報において)

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2020.2   Role:Participation   Title:九州大学工学系改組の現状と今後の予定

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2019.10   Role:Participation   Title:電子ジャーナルの現状と今後の動向に関する説明会

    Organizer:[Undergraduate school/graduate school/graduate faculty]

  • 2019.3   Role:Participation   Title:3ポリシー見直し方針に関する全学FD

    Organizer:University-wide

  • 2017.4   Role:Participation   Title:平成29年度 第1回全学FD(新任教員の研修)

    Organizer:University-wide

▼display all

Visiting, concurrent, or part-time lecturers at other universities, institutions, etc.

  • 2021  九州工業大学大学院情報工学府  Classification:Part-time lecturer  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:前期,後期

  • 2020  九州工業大学大学院情報工学府  Classification:Part-time lecturer  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:前期,後期

  • 2019  九州工業大学大学院情報工学府  Classification:Part-time lecturer  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:前期,後期

  • 2018  九州工業大学情報工学部  Classification:Part-time lecturer  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:後期

  • 2018  九州工業大学大学院情報工学府  Classification:Part-time lecturer  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:前期,後期

  • 2018  九州工業大学情報工学部  Classification:Intensive course  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:9月

  • 2017  九州工業大学情報工学部  Classification:Part-time lecturer  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:後期

  • 2017  九州工業大学大学院情報工学府  Classification:Part-time lecturer  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:前期,後期

  • 2017  九州工業大学情報工学部  Classification:Intensive course  Domestic/International Classification:Japan 

    Semester, Day Time or Duration:9月

▼display all

Other educational activity and Special note

  • 2024  Coaching of Students' Association  ICPCチャレンジ部

     詳細を見る

    顧問教員

  • 2023  Class Teacher  学部

  • 2023  Special Affairs  ProSec-IT/SECKUNの主体的な実施

     詳細を見る

    ProSec-IT/SECKUNの主体的な実施

  • 2022  Class Teacher  学部

  • 2022  Special Affairs  ProSec-IT/SECKUNの主体的な実施

     詳細を見る

    ProSec-IT/SECKUNの主体的な実施

  • 2021  Special Affairs  ProSec-IT/SECKUN の主体的な実施

     詳細を見る

    ProSec-IT/SECKUN の主体的な実施

  • 2019  Special Affairs  厚生労働省教育訓練プログラム開発事業 SECKUN の開発を受託

     詳細を見る

    厚生労働省教育訓練プログラム開発事業 SECKUN の開発を受託

  • 2017  Special Affairs  平成29年度「成長分野を支える情報技術人材の育成拠点の形成(enPiT)」enPiT-Proに7つの連携校とともに共同申請した取り組みが採択された.

     詳細を見る

    平成29年度「成長分野を支える情報技術人材の育成拠点の形成(enPiT)」enPiT-Proに7つの連携校とともに共同申請した取り組みが採択された.

▼display all

Outline of Social Contribution and International Cooperation activities

  • 令和3年6月13日〜  直方市情報公開・個人情報保護審査会委員として委嘱された(再委嘱).
    令和3年4月1日〜 福岡県警サイバー犯罪対策テクニカルアドバイザーとして委嘱された(再委嘱).
    平成31年4月1日〜平成34年3月31日 福岡県警サイバー犯罪対策テクニカルアドバイザーとして委嘱された(再委嘱).
    平成29年4月1日〜平成31年3月31日 福岡県警サイバー犯罪対策テクニカルアドバイザーとして委嘱された.
    令和4年9月〜 佐賀県警サイバー犯罪対策テクニカルアドバイザーとして委嘱された.
    平成29年6月13日〜平成31年6月12日 直方市情報公開・個人情報保護審査会委員として委嘱された.

Social Activities

  • 情報オリンピック日本委員会九州地区レギオ講習会を担当

    2023.4

     More details

    Audience:Infants, Schoolchildren, Junior students, High school students

    Type:Seminar, workshop

  • 地域セキュニティアドバイザとしての活動

    九州経済産業局  ハイブリッド  2022.4

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Seminar, workshop

  • 社会人向けサイバーセキュリティ教育プログラムであるProSec-iTおよび厚労省委委託事業で開発した社会人向けサイバーセキュリティ教育プログラム(SECKUN)を展開,実施した.

    九州大学サイバーセキュリティセンター(主体的に取り組む連携校),情報セキュリティ大学院大学(代表校)  九州大学,オンライン,ハイブリッド  2022.4

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Lecture

  • JST科学の甲子園 情報分野作問分科会 主査

    2022.4

     More details

    Audience:Infants, Schoolchildren, Junior students, High school students

    Type:Other

  • 社会人向けサイバーセキュリティ教育プログラムであるProSec-iTおよび厚労省委委託事業で開発した社会人向けサイバーセキュリティ教育プログラム(SECKUN)を展開,実施した.

    九州大学サイバーセキュリティセンター(主体的に取り組む連携校),情報セキュリティ大学院大学(代表校)  九州大学,オンライン,ハイブリッド  2021.4

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Lecture

    2021年度は,技術系コース22名,技術以外のコース57名が参加した.

  • ProSec-IT(enPiT-Pro)における連携校のひとつとしてサイバーセキュリティに関連する120時間超の履修証明プログラムを実施し,最終的に18名の修了者を輩出した.

    情報セキュリティ大学院大学(代表校)、九州大学サイバーセキュリティセンター(連携大学)  QTnet 会議室,九州大学伊都キャンパス  2020.4

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Other

    ProSec-IT(enPiT-Pro)における連携大学のひとつとして120時間超のサイバーセキュリティに関連する演習中心の履修証明プログラムを社会人に対して提供した.22名が受講し,最終的に25名全員が修了した.代表校も含めて7つある連携大学の中でももっとも受講生を集めており,受講生からも好評を受けることができた.

  • ProSec-IT(enPiT-Pro)における連携校のひとつとしてサイバーセキュリティに関連する120時間超の履修証明プログラムを実施し,最終的に25名の修了者を輩出した.

    情報セキュリティ大学院大学(代表校)、九州大学サイバーセキュリティセンター(連携大学)  QTnet 会議室,九州大学伊都キャンパス  2020.4

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Other

    ProSec-IT(enPiT-Pro)における連携大学のひとつとして120時間超のサイバーセキュリティに関連する演習中心の履修証明プログラムを社会人に対して提供した.22名が受講し,最終的に25名全員が修了した.代表校も含めて7つある連携大学の中でももっとも受講生を集めており,受講生からも好評を受けることができた.

  • ProSec-IT(enPiT-Pro)における連携校のひとつとしてサイバーセキュリティに関連する120時間超の履修証明プログラムを実施し,最終的に22名の修了者を輩出した.

    情報セキュリティ大学院大学(代表校)、九州大学サイバーセキュリティセンター(連携大学)  QTnet 会議室,九州大学伊都キャンパス  2019.4

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Other

    ProSec-IT(enPiT-Pro)における連携大学のひとつとして120時間超のサイバーセキュリティに関連する演習中心の履修証明プログラムを社会人に対して提供した.22名が受講し,最終的に22名全員が修了した.代表校も含めて7つある連携大学の中でももっとも受講生を集めており,受講生からも好評を受けることができた.

  • ISACA共催IT研修会にて講演

    ISACA,日本公認会計士協会中国会  ISACA中国支部会議室  2018.11

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Seminar, workshop

  • ISACA共催IT研修会にて講演

    日本公認会計士協会北部九州会  福岡市 Rubyコンテンツセンター  2018.7

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Seminar, workshop

  • ProSec-IT(enPiT-Pro)における連携校のひとつとしてサイバーセキュリティに関連する120時間超の履修証明プログラムを実施し,最終的に18名の修了者を輩出した.

    情報セキュリティ大学院大学(代表校)、九州大学サイバーセキュリティセンター(連携大学)  九州大学 大橋サテライト  2018.4

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Other

    ProSec-IT(enPiT-Pro)における連携大学のひとつとして120時間超のサイバーセキュリティに関連する演習中心の履修証明プログラムを社会人に対して提供した.18名が受講し,最終的に18名全員が修了した.代表校も含めて7つある連携大学の中でももっとも受講生を集めており,受講生からも好評を受けることができた.

  • 公開講座せきゅトーク2018 in 福岡にて講演

    九州大学サイバーセキュリティセンター  JR博多シティ会議室 会議室3 (JR博多シティ / アミュプラザ博多 9階)  2018.3

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Lecture

    インターネットサービスの犯罪対策として,詐欺ショッピングサイト、カード不正利用、オークション詐欺対策などの紹介を行った.

  • SECCON全国大会にてワークショップを実施

    JNSA  東京電機大学  2018.2

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Seminar, workshop

  • ISACA中国支部にて講演

    ISACA,日本公認会計士協会中国会  ISACA中国支部会議室  2017.11

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Seminar, workshop

  • 脅威と対策研究会情報交換会にて講演

    JNSA  IPA大会議室  2017.11

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Lecture

  • セキュリティ・キャンプ九州 in 福岡2017にて講演

    IPA  LINE Fukuoka株式会社会議室  2017.9

     More details

    Audience:General, Scientific, Company, Civic organization, Governmental agency

    Type:Lecture

▼display all

Media Coverage

  • 本学が2018年度から開講するサイバーセキュリティの人材育成事業(enPiT-Pro)について紹介され,福岡県警との連携についても紹介された. Newspaper, magazine

    日本経済新聞  2018.3

     More details

    本学が2018年度から開講するサイバーセキュリティの人材育成事業(enPiT-Pro)について紹介され,福岡県警との連携についても紹介された.

  • 本学が2018年度から受講生募集を行う社会人エンジニアのための人材育成プログラムであるenPiT-Proが紹介された. Newspaper, magazine

    朝日新聞  2018.1

     More details

    本学が2018年度から受講生募集を行う社会人エンジニアのための人材育成プログラムであるenPiT-Proが紹介された.

  • 本学が2018年度から受講生募集を行う社会人エンジニアのための人材育成事業であるenPiT-Proについての取り組みが紹介された. Newspaper, magazine

    西日本新聞  2017.11

     More details

    本学が2018年度から受講生募集を行う社会人エンジニアのための人材育成事業であるenPiT-Proについての取り組みが紹介された.

Activities contributing to policy formation, academic promotion, etc.

  • 2022.10 - 2024.3  

    INCS-COE委員

Acceptance of Foreign Researchers, etc.

  • Enkora Oy, Finland

    Acceptance period: 2018.6   (Period):2weeks to less than 1 month

    Nationality:Finland

    Business entity:Foreign governments, foreign research institutes, international organizations