首页 > 最新文献

Ipsj Digital Courier最新文献

英文 中文
High-throughput Automated Image Processing System for Cell Array Observations 单元阵列观测高通量自动图像处理系统
Pub Date : 2007-11-15 DOI: 10.2197/IPSJDC.3.728
D. Tominaga, Fukumi Iguchi, K. Horimoto, Yutaka Akiyama
In many cases of biological observations such as cell array, DNA micro-array or tissue microscopy, primary data are obtained as photographs. Specialized processing methods are needed for each kind of photographs because they have very wide variety, and often needed automated systems for modern high-throughput observations. We developed a fully-automated image processing system for cell array, high-throughput time series observation system for living cells, to evaluate gene expression levels and phenotype changes in time of each cell.
在许多生物观察中,如细胞阵列、DNA微阵列或组织显微镜,主要数据是通过照片获得的。每种类型的照片都需要专门的处理方法,因为它们种类繁多,而且现代高通量观测通常需要自动化系统。我们开发了细胞阵列全自动图像处理系统,活细胞高通量时间序列观察系统,以评估每个细胞的基因表达水平和表型随时间的变化。
{"title":"High-throughput Automated Image Processing System for Cell Array Observations","authors":"D. Tominaga, Fukumi Iguchi, K. Horimoto, Yutaka Akiyama","doi":"10.2197/IPSJDC.3.728","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.728","url":null,"abstract":"In many cases of biological observations such as cell array, DNA micro-array or tissue microscopy, primary data are obtained as photographs. Specialized processing methods are needed for each kind of photographs because they have very wide variety, and often needed automated systems for modern high-throughput observations. We developed a fully-automated image processing system for cell array, high-throughput time series observation system for living cells, to evaluate gene expression levels and phenotype changes in time of each cell.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124116068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Approximate and Fine Adjustments by Hand Motion in an Immersive Environment 沉浸式环境中手部运动近似与精细调节的研究
Pub Date : 2007-11-15 DOI: 10.2197/IPSJDC.3.719
Noritaka Osawa, Xiangshi Ren
Immersive virtual reality (VR) has long been considered an excellent environment in which to manipulate 3D virtual objects. However currently used immersive VR user interfaces have limitations. For example, while direct manipulation by hand is easy to understand and to use for approximate positioning, direct manipulation by hand is not suitable for making fine adjustments to virtual objects in an immersive environment because it is difficult to hold an unsupported hand in midair and then to release an object at a fixed point. We therefore propose a method that combines direct 3D manipulation by hand with a virtual 3D gearbox widget that we recently designed. Using this method, hand manipulation is used first to move virtual objects and place them in an approximate position, and then the widget is used to move them into a precise position. The experimental evaluation showed that this combination of direct manipulation by hand and the proposed gearbox is the best of five tested methods in terms of completion ratio of task and subjective preference.
沉浸式虚拟现实(VR)一直被认为是操纵3D虚拟物体的绝佳环境。然而,目前使用的沉浸式VR用户界面存在局限性。例如,虽然直接用手操作很容易理解,并且可以用于近似定位,但直接用手操作并不适合在沉浸式环境中对虚拟物体进行精细调整,因为很难在半空中握住一只没有支撑的手,然后在固定点释放物体。因此,我们提出了一种方法,结合直接3D操作的手与虚拟3D齿轮箱小部件,我们最近设计。使用这种方法,首先使用手操作来移动虚拟对象并将它们放置在一个近似的位置,然后使用小部件将它们移动到一个精确的位置。实验评价表明,在任务完成率和主观偏好方面,该方法是五种测试方法中最好的。
{"title":"A Study on Approximate and Fine Adjustments by Hand Motion in an Immersive Environment","authors":"Noritaka Osawa, Xiangshi Ren","doi":"10.2197/IPSJDC.3.719","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.719","url":null,"abstract":"Immersive virtual reality (VR) has long been considered an excellent environment in which to manipulate 3D virtual objects. However currently used immersive VR user interfaces have limitations. For example, while direct manipulation by hand is easy to understand and to use for approximate positioning, direct manipulation by hand is not suitable for making fine adjustments to virtual objects in an immersive environment because it is difficult to hold an unsupported hand in midair and then to release an object at a fixed point. We therefore propose a method that combines direct 3D manipulation by hand with a virtual 3D gearbox widget that we recently designed. Using this method, hand manipulation is used first to move virtual objects and place them in an approximate position, and then the widget is used to move them into a precise position. The experimental evaluation showed that this combination of direct manipulation by hand and the proposed gearbox is the best of five tested methods in terms of completion ratio of task and subjective preference.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132238559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal Balanced Semi-Matchings for Weighted Bipartite Graphs 加权二部图的最优平衡半匹配
Pub Date : 2007-10-15 DOI: 10.2197/IPSJDC.3.693
Y. Harada, H. Ono, K. Sadakane, M. Yamashita
The matching of a bipartite graph is a structure that can be seen in various assignment problems and has long been studied. The semi-matching is an extension of the matching for a bipartite graph G =(U ∪ V, E). It is defined as a set of edges, M ⊆ E, such that each vertex in U is an endpoint of exactly one edge in M. The load-balancing problem is the problem of finding a semi-matching such that the degrees of each vertex in V are balanced. This problem is studied in the context of the task scheduling to find a “balanced” assignment of tasks for machines, and an O(¦E¦¦U¦) time algorithm is proposed. On the other hand, in some practical problems, only balanced assignments are not sufficient, e.g., the assignment of wireless stations (users)to access points (APs) in wireless networks. In wireless networks, the quality of the transmission depends on the distance between a user and its AP; shorter distances are more desirable. In this paper, We formulate the min-weight load-balancing problem of finding a balanced semi-matching that minimizes the total weight for weighted bipartite graphs. We then give an optimal condition of weighted semi-matchings and propose an O(¦E¦¦U¦¦V¦) time algorithm.
二部图的匹配是在各种分配问题中都可以看到的一种结构,长期以来一直被研究。半匹配是对二部图G =(U∪V, E)的匹配的扩展。它被定义为一个边的集合,M E,使U中的每个顶点恰好是M中一个边的端点。负载平衡问题是求出一个半匹配,使V中每个顶点的度数平衡的问题。在任务调度的背景下对该问题进行了研究,以寻找机器任务的“平衡”分配,并提出了一个O(………)时间算法。另一方面,在一些实际问题中,仅平衡分配是不够的,例如无线网络中无线站(用户)到接入点(ap)的分配。在无线网络中,传输的质量取决于用户与其AP之间的距离;更短的距离更可取。在本文中,我们提出了最小权值负载平衡问题,即寻找一个使加权二部图的总权值最小的平衡半匹配。在此基础上,给出了加权半匹配的最优条件,并提出了一种O(E…U…V…)时间算法。
{"title":"Optimal Balanced Semi-Matchings for Weighted Bipartite Graphs","authors":"Y. Harada, H. Ono, K. Sadakane, M. Yamashita","doi":"10.2197/IPSJDC.3.693","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.693","url":null,"abstract":"The matching of a bipartite graph is a structure that can be seen in various assignment problems and has long been studied. The semi-matching is an extension of the matching for a bipartite graph G =(U ∪ V, E). It is defined as a set of edges, M ⊆ E, such that each vertex in U is an endpoint of exactly one edge in M. The load-balancing problem is the problem of finding a semi-matching such that the degrees of each vertex in V are balanced. This problem is studied in the context of the task scheduling to find a “balanced” assignment of tasks for machines, and an O(¦E¦¦U¦) time algorithm is proposed. On the other hand, in some practical problems, only balanced assignments are not sufficient, e.g., the assignment of wireless stations (users)to access points (APs) in wireless networks. In wireless networks, the quality of the transmission depends on the distance between a user and its AP; shorter distances are more desirable. In this paper, We formulate the min-weight load-balancing problem of finding a balanced semi-matching that minimizes the total weight for weighted bipartite graphs. We then give an optimal condition of weighted semi-matchings and propose an O(¦E¦¦U¦¦V¦) time algorithm.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"693 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122981742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Architecture and Performance of Dynamic Offloading Mechanism for Maestro2 Cluster Network Maestro2集群网络动态卸载机制的体系结构与性能
Pub Date : 2007-10-15 DOI: 10.2197/IPSJDC.3.683
K. Aoki, K. Wada, Hiroki Maruoka, M. Ono
In this paper, an architecture of software environment to offload user-defined software modules to Maestro2 cluster network, named Maestro dynamic offloading mechanism (MDO), is described. Maestro2 is a high-performance network for clusters. The network interface and the switch of Maestro2 have a general-purpose processor tightly coupled with a dedicated communication hardware. MDO enables the users to offload software modules to both the network interface and the switch. MDO includes a wrapper library with which offload modules can be executed on a host machine without rewriting the program. The overhead and the effectiveness of MDO are evaluated by offloading collective communications.
本文描述了一种将用户自定义软件模块卸载到Maestro集群网络的软件环境体系结构——Maestro动态卸载机制(MDO)。Maestro2是一个高性能的集群网络。Maestro2的网络接口和交换机具有一个通用处理器,与专用通信硬件紧密耦合。MDO允许用户将软件模块卸载到网络接口和交换机上。MDO包括一个包装器库,通过它可以在主机上执行卸载模块,而无需重写程序。通过卸载集体通信,评估了MDO的开销和有效性。
{"title":"Architecture and Performance of Dynamic Offloading Mechanism for Maestro2 Cluster Network","authors":"K. Aoki, K. Wada, Hiroki Maruoka, M. Ono","doi":"10.2197/IPSJDC.3.683","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.683","url":null,"abstract":"In this paper, an architecture of software environment to offload user-defined software modules to Maestro2 cluster network, named Maestro dynamic offloading mechanism (MDO), is described. Maestro2 is a high-performance network for clusters. The network interface and the switch of Maestro2 have a general-purpose processor tightly coupled with a dedicated communication hardware. MDO enables the users to offload software modules to both the network interface and the switch. MDO includes a wrapper library with which offload modules can be executed on a host machine without rewriting the program. The overhead and the effectiveness of MDO are evaluated by offloading collective communications.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131741417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Controlling Dominance Area of Solutions in Multiobjective Evolutionary Algorithms and Performance Analysis on Multiobjective 0/1 Knapsack Problems 多目标进化算法解的优势域控制及多目标0/1背包问题的性能分析
Pub Date : 2007-10-15 DOI: 10.2197/IPSJDC.3.703
Hiroyuki Sato, H. Aguirre, Kiyoshi Tanaka
This work proposes a method to control the dominance area of solutions in order to induce appropriate ranking of solutions for the problem at hand, enhance selection, and improve the performance of MOEAs on combinatorial optimization problems. The proposed method can control the degree of expansion or contraction of the dominance area of solutions using a user-defined parameter S. Modifying the dominance area of solutions changes their dominance relation inducing a ranking of solutions that is different to conventional dominance. In this work we use 0/1 multiobjective knapsack problems to analyze the effects on solutions ranking caused by contracting and expanding the dominance area of solutions and its impact on the search performance of a multi-objective optimizer when the number of objectives, the size of the search space, and the feasibility of the problems vary. We show that either convergence or diversity can be emphasized by contracting or expanding the dominance area. Also, we show that the optimal value of the area of dominance depends strongly on all factors analyzed here: number of objectives, size of the search space, and feasibility of the problems.
本文提出了一种控制解的优势域的方法,以诱导手头问题的解的适当排序,增强选择,提高moea在组合优化问题上的性能。该方法可以通过自定义参数s来控制解的优势区域的扩张或收缩程度。修改解的优势区域会改变它们的优势关系,从而产生不同于传统优势的解排序。本文利用0/1多目标背包问题,分析了当问题的目标数量、搜索空间大小和可行性不同时,解的优势区域收缩和扩大对解排序的影响及其对多目标优化器搜索性能的影响。结果表明,通过缩小或扩大优势域,可以增强收敛性或多样性。此外,我们还表明,支配区域的最优值在很大程度上取决于这里分析的所有因素:目标的数量、搜索空间的大小和问题的可行性。
{"title":"Controlling Dominance Area of Solutions in Multiobjective Evolutionary Algorithms and Performance Analysis on Multiobjective 0/1 Knapsack Problems","authors":"Hiroyuki Sato, H. Aguirre, Kiyoshi Tanaka","doi":"10.2197/IPSJDC.3.703","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.703","url":null,"abstract":"This work proposes a method to control the dominance area of solutions in order to induce appropriate ranking of solutions for the problem at hand, enhance selection, and improve the performance of MOEAs on combinatorial optimization problems. The proposed method can control the degree of expansion or contraction of the dominance area of solutions using a user-defined parameter S. Modifying the dominance area of solutions changes their dominance relation inducing a ranking of solutions that is different to conventional dominance. In this work we use 0/1 multiobjective knapsack problems to analyze the effects on solutions ranking caused by contracting and expanding the dominance area of solutions and its impact on the search performance of a multi-objective optimizer when the number of objectives, the size of the search space, and the feasibility of the problems vary. We show that either convergence or diversity can be emphasized by contracting or expanding the dominance area. Also, we show that the optimal value of the area of dominance depends strongly on all factors analyzed here: number of objectives, size of the search space, and feasibility of the problems.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122016415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance Analysis of Optimized Link State Routing-based Localization 基于链路状态路由的优化定位性能分析
Pub Date : 2007-09-15 DOI: 10.2197/IPSJDC.3.541
T. Takenaka, H. Mineno, Yuichi Tokunaga, N. Miyauchi, T. Mizuno
Node localization obtained by estimating node positions is an essential technique for wireless multi-hop networks. In this paper, we present an optimized link state routing (OLSR)-based localization (ROULA) that satisfies the following key design requirements: (i) independency from anchor nodes, (ii) robustness for non-convex network topology, and(iii) compatibility with network protocol. ROULA is independent from anchor nodes and can obtain the correct node positions in non-convex network topology. In addition, ROULA is compatible with the OLSR network protocol, and it uses the inherent distance characteristic of multipoint relay (MPR) nodes. We reveal the characteristics of MPR selection and the farthest 2-hop node selection used in ROULA, and describe how these node selections contribute to reducing the distance error for a localization scheme without using ranging devices. We used a simulation to specify appropriate MPR_COVERAGE, which is defined to control the number of MPR nodes in OLSR, and give a comparative performance evaluation of ROULA for various scenarios including non-convex network topology and various deployment radii of anchor nodes. Our evaluation proves that ROULA achieves desirable performance in various network scenarios.
通过估计节点位置获得节点定位是无线多跳网络的关键技术。在本文中,我们提出了一种优化的基于链路状态路由(OLSR)的定位(ROULA),它满足以下关键设计要求:(i)与锚节点的独立性,(ii)非凸网络拓扑的鲁棒性,以及(iii)与网络协议的兼容性。ROULA独立于锚节点,可以在非凸网络拓扑中获得正确的节点位置。此外,ROULA兼容OLSR网络协议,并利用多点中继(MPR)节点固有的距离特性。我们揭示了在ROULA中使用的MPR选择和最远2跳节点选择的特点,并描述了这些节点选择如何有助于减少不使用测距设备的定位方案的距离误差。我们通过仿真来指定适当的MPR_COVERAGE,该定义是为了控制OLSR中MPR节点的数量,并对ROULA在非凸网络拓扑和不同锚节点部署半径等不同场景下的性能进行了比较评估。我们的评估证明,ROULA在各种网络场景下都达到了理想的性能。
{"title":"Performance Analysis of Optimized Link State Routing-based Localization","authors":"T. Takenaka, H. Mineno, Yuichi Tokunaga, N. Miyauchi, T. Mizuno","doi":"10.2197/IPSJDC.3.541","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.541","url":null,"abstract":"Node localization obtained by estimating node positions is an essential technique for wireless multi-hop networks. In this paper, we present an optimized link state routing (OLSR)-based localization (ROULA) that satisfies the following key design requirements: (i) independency from anchor nodes, (ii) robustness for non-convex network topology, and(iii) compatibility with network protocol. ROULA is independent from anchor nodes and can obtain the correct node positions in non-convex network topology. In addition, ROULA is compatible with the OLSR network protocol, and it uses the inherent distance characteristic of multipoint relay (MPR) nodes. We reveal the characteristics of MPR selection and the farthest 2-hop node selection used in ROULA, and describe how these node selections contribute to reducing the distance error for a localization scheme without using ranging devices. We used a simulation to specify appropriate MPR_COVERAGE, which is defined to control the number of MPR nodes in OLSR, and give a comparative performance evaluation of ROULA for various scenarios including non-convex network topology and various deployment radii of anchor nodes. Our evaluation proves that ROULA achieves desirable performance in various network scenarios.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126039392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using a Partial Geometric Feature for Similarity Search of 3D Objects 基于局部几何特征的三维物体相似度搜索
Pub Date : 2007-09-15 DOI: 10.2197/IPSJDC.3.674
Yingliang Lu, K. Kaneko, A. Makinouchi
Searching in a spatial database for 3D objects that are similar to a given object is an important task that arises in a number of database applications, for example, in medicine and CAD fields. Most of the existing similarity searching methods are based on global features of 3D objects. Developing a feature set or a feature vector of 3D object using their partial features is a challenging. In this paper, we propose a novel segment weight vector for matching 3D objects rapidly. We also describe a partial and geometrical similarity based solution to the problem of searching for similar 3D objects. As the first step, we split each 3D object into parts according to its topology. Next, we introduce a new method to extract the thickness feature of each part of every 3D object to generate its feature vector and a novel searching algorithm using the new feature vector. Finally, we present a novel solution for improving the accuracy of the similarity queries. We also present a performance evaluation of our stratagem. The experiment result and discussion indicate that the proposed approach offers a significant performance improvement over the existing approach. Since the proposed method is based on partial features, it is particularly suited to searching objects having distinct part structures and is invariant to part architecture.
在空间数据库中搜索与给定对象相似的3D对象是许多数据库应用中出现的重要任务,例如在医学和CAD领域。现有的相似度搜索方法大多是基于三维物体的全局特征。利用三维物体的局部特征来开发其特征集或特征向量是一个具有挑战性的问题。本文提出了一种新的快速匹配三维目标的段权向量。我们还描述了一种基于局部和几何相似性的解决方案来搜索相似的三维物体。作为第一步,我们将每个3D对象根据其拓扑结构分成几个部分。在此基础上,提出了一种提取三维物体各部分厚度特征生成其特征向量的新方法,并提出了一种利用新特征向量进行搜索的新算法。最后,提出了一种提高相似度查询准确率的新方法。我们还对我们的战略进行了绩效评估。实验结果和讨论表明,与现有方法相比,该方法的性能有显著提高。由于该方法是基于局部特征的,因此特别适合搜索具有不同零件结构的对象,并且对零件结构具有不变性。
{"title":"Using a Partial Geometric Feature for Similarity Search of 3D Objects","authors":"Yingliang Lu, K. Kaneko, A. Makinouchi","doi":"10.2197/IPSJDC.3.674","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.674","url":null,"abstract":"Searching in a spatial database for 3D objects that are similar to a given object is an important task that arises in a number of database applications, for example, in medicine and CAD fields. Most of the existing similarity searching methods are based on global features of 3D objects. Developing a feature set or a feature vector of 3D object using their partial features is a challenging. In this paper, we propose a novel segment weight vector for matching 3D objects rapidly. We also describe a partial and geometrical similarity based solution to the problem of searching for similar 3D objects. As the first step, we split each 3D object into parts according to its topology. Next, we introduce a new method to extract the thickness feature of each part of every 3D object to generate its feature vector and a novel searching algorithm using the new feature vector. Finally, we present a novel solution for improving the accuracy of the similarity queries. We also present a performance evaluation of our stratagem. The experiment result and discussion indicate that the proposed approach offers a significant performance improvement over the existing approach. Since the proposed method is based on partial features, it is particularly suited to searching objects having distinct part structures and is invariant to part architecture.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121134184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Universally Composable Client-to-Client General Authenticated Key Exchange 通用可组合的客户端到客户端通用认证密钥交换
Pub Date : 2007-09-15 DOI: 10.2197/IPSJDC.3.555
H. Ota, Kazuki Yoneyama, S. Kiyomoto, Toshiaki Tanaka, K. Ohta
In large-scale networks, users want to be able to communicate securely with each other over a channel that is unreliable. When the existing 2- and 3-party protocols are realized in this situation, there are several problems: a client must hold many passwords and the load on the server concerning password management is heavy. In this paper, we define a new ideal client-to-client general authenticated key exchange functionality, where arbitrary 2-party key exchange protocols are applicable to protocols between the client and server and between servers. We also propose a client-to-client general authenticated key exchange protocol C2C-GAKE as a general form of the client-to-client model, and a client-to-client hybrid authenticated key exchange protocol C2C-HAKE as an example protocol of C2C-GAKE to solve the above problems. In C2C-HAKE, a server shares passwords only with clients in the same realm respectively, public/private keys are used between respective servers, and two clients between different realms share a final session key via the respective servers. Thus, with regard to password management in C2C-HAKE, the load on the server can be distributed to several servers. In addition, we prove that C2C-HAKE securely realizes the above functionality. C2C-HAKE is the first client-to-client hybrid authenticated key exchange protocol that is secure in a universally composable framework with a security-preserving composition property.
在大规模网络中,用户希望能够通过不可靠的信道安全地相互通信。当现有的2方和3方协议在这种情况下实现时,存在几个问题:客户端必须持有许多密码,并且服务器上关于密码管理的负载很大。在本文中,我们定义了一种新的理想客户端到客户端通用认证密钥交换功能,其中任意双方密钥交换协议适用于客户端与服务器之间以及服务器之间的协议。为了解决上述问题,我们提出了客户端到客户端通用认证密钥交换协议C2C-GAKE作为客户端到客户端模型的通用形式,并提出了客户端到客户端混合认证密钥交换协议C2C-HAKE作为C2C-GAKE的示例协议。在C2C-HAKE中,服务器仅与同一领域中的客户端共享密码,在各自的服务器之间使用公钥/私钥,并且位于不同领域的两个客户端通过各自的服务器共享最终会话密钥。因此,对于C2C-HAKE中的密码管理,服务器上的负载可以分配到多个服务器上。此外,我们证明C2C-HAKE安全实现了上述功能。C2C-HAKE是第一个客户端到客户端混合身份验证密钥交换协议,它在具有安全保护组合属性的通用可组合框架中是安全的。
{"title":"Universally Composable Client-to-Client General Authenticated Key Exchange","authors":"H. Ota, Kazuki Yoneyama, S. Kiyomoto, Toshiaki Tanaka, K. Ohta","doi":"10.2197/IPSJDC.3.555","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.555","url":null,"abstract":"In large-scale networks, users want to be able to communicate securely with each other over a channel that is unreliable. When the existing 2- and 3-party protocols are realized in this situation, there are several problems: a client must hold many passwords and the load on the server concerning password management is heavy. In this paper, we define a new ideal client-to-client general authenticated key exchange functionality, where arbitrary 2-party key exchange protocols are applicable to protocols between the client and server and between servers. We also propose a client-to-client general authenticated key exchange protocol C2C-GAKE as a general form of the client-to-client model, and a client-to-client hybrid authenticated key exchange protocol C2C-HAKE as an example protocol of C2C-GAKE to solve the above problems. In C2C-HAKE, a server shares passwords only with clients in the same realm respectively, public/private keys are used between respective servers, and two clients between different realms share a final session key via the respective servers. Thus, with regard to password management in C2C-HAKE, the load on the server can be distributed to several servers. In addition, we prove that C2C-HAKE securely realizes the above functionality. C2C-HAKE is the first client-to-client hybrid authenticated key exchange protocol that is secure in a universally composable framework with a security-preserving composition property.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124352524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Empirical-Analysis Methodology for Information-Security Investment and Its Application to Reliable Survey of Japanese Firms 信息安全投资的实证分析方法及其在日本企业可靠性调查中的应用
Pub Date : 2007-09-15 DOI: 10.2197/IPSJDC.3.585
Wei Liu, Hideyuki Tanaka, Kanta Matsuura
This paper presents a series of empirical analyses of information-security investment based on a reliable survey of Japanese enterprises. To begin with, after showing our methodology for representing the vulnerability level regarding the threat of computer viruses, we verify the re- lation between vulnerability level and the effects of information security investment. Although in the first section there is only a weak empirical support of the investment model, one can understand that the representing methodology is worth attempting in empirical analyses in this research field. In the second section, we verify the relations between the probability of computer virus incidents and adopting a set of information security countermeasures. It is shown that “Defense Measure” associated with “Information Security Policy” and “Human Cultivation” has remarkable effects on virus incidents. At the last step, we analyze the effect of continuous investment in the three security countermeasures. The empirical results suggest that virus incidents were significantly reduced in those enterprises which adopted the three countermeasures both in 2002 and in 2003.
本文在对日本企业进行可靠调查的基础上,对信息安全投资进行了一系列实证分析。首先,在展示了我们关于计算机病毒威胁的脆弱性级别的表示方法之后,我们验证了脆弱性级别与信息安全投资效果之间的关系。虽然在第一部分中,投资模型的实证支持很薄弱,但我们可以理解,在这个研究领域的实证分析中,表征方法是值得尝试的。在第二部分中,我们验证了计算机病毒事件发生概率与采取一套信息安全对策之间的关系。结果表明,“防御措施”与“信息安全政策”和“人的修养”相结合对病毒事件的影响显著。最后一步,分析了三种安全对策中持续投资的效果。实证结果表明,在2002年和2003年采取三种对策的企业中,病毒事件显著减少。
{"title":"Empirical-Analysis Methodology for Information-Security Investment and Its Application to Reliable Survey of Japanese Firms","authors":"Wei Liu, Hideyuki Tanaka, Kanta Matsuura","doi":"10.2197/IPSJDC.3.585","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.585","url":null,"abstract":"This paper presents a series of empirical analyses of information-security investment based on a reliable survey of Japanese enterprises. To begin with, after showing our methodology for representing the vulnerability level regarding the threat of computer viruses, we verify the re- lation between vulnerability level and the effects of information security investment. Although in the first section there is only a weak empirical support of the investment model, one can understand that the representing methodology is worth attempting in empirical analyses in this research field. In the second section, we verify the relations between the probability of computer virus incidents and adopting a set of information security countermeasures. It is shown that “Defense Measure” associated with “Information Security Policy” and “Human Cultivation” has remarkable effects on virus incidents. At the last step, we analyze the effect of continuous investment in the three security countermeasures. The empirical results suggest that virus incidents were significantly reduced in those enterprises which adopted the three countermeasures both in 2002 and in 2003.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127339540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption 可排除祖先的分层id加密及其在广播加密中的应用
Pub Date : 2007-09-15 DOI: 10.2197/IPSJDC.3.610
A. Miyaji
An ID-based encryption (IBE) is a public key cryptosystem, in which a user's public key is given as a user ID. In IBE, only a single center generates all user secret keys, which may give the center a load of burdensome work. A hierarchical ID-based encryption (HIBE) is a kind of IBE and overcomes the problem by delegating a user secret key generation to a lower-level center, in which centers form a hierarchical structure. However, all ancestor nodes in HIBE act as centers. That is, any ancestor as well as the root can generate a secret key for any descendant node and, thus, a cipher text to a node can be decrypted by any ancestor node even if the ancestor does not have the same secret key as that of a target node. In this paper, we propose the concept of ancestor-excludable HIBE, in which ancestors with a level less than the designated one can be excluded from a set of privileged ancestors with a right to decrypt a cipher text to a target node. We also give the functional definition together with the security definition. This notion is denoted by AE-HIBE simply. We present the concrete example of AE-HIBE, which can work with constant-size ciphertext and decryption time, independent of the hierarchy level. We prove that our AE-HIBE is selective-ID-CPA secure in the standard model, which can be converted to be selective-ID-CCA secure by applying a general conversion method. Furthermore, AE-HIBE can be naturally applied to the broadcast encryption to realize the efficient public-key version with the user-key size of O(log2 N) and the transmission rate of O(r) for N users and r revoked users. The user-key size is the smallest at the transmission rate of O(r), up to the present.
基于ID的加密(IBE)是一种公钥加密系统,其中将用户的公钥作为用户ID给出。在IBE中,只有一个中心生成所有用户密钥,这可能会给中心带来繁重的工作。分层的基于id的加密(HIBE)是一种IBE,它通过将用户密钥生成委托给较低级别的中心来克服这个问题,在较低级别的中心中,各中心形成分层结构。然而,HIBE中的所有祖先节点都充当中心。也就是说,任何祖先节点和根节点都可以为任何后代节点生成密钥,因此,任何祖先节点都可以对发送给节点的密文进行解密,即使该祖先节点没有与目标节点相同的密钥。在本文中,我们提出了可排除祖先的HIBE概念,在该概念中,级别小于指定级别的祖先可以从具有将密文解密到目标节点的权利的特权祖先集合中排除。我们还给出了功能定义和安全定义。这个概念被简单地表示为AE-HIBE。我们给出了AE-HIBE的具体示例,它可以在恒定大小的密文和解密时间下工作,而不依赖于层次结构级别。我们证明了我们的AE-HIBE在标准模型下是选择性id - cpa安全的,并且可以用一般的转换方法将其转换为选择性id - cca安全。此外,AE-HIBE可以很自然地应用于广播加密,实现N个用户和r个被撤销用户的用户密钥大小为O(log2n)、传输速率为O(r)的高效公钥版本。在0 (r)的传输速率下,用户密钥的大小是迄今为止最小的。
{"title":"Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption","authors":"A. Miyaji","doi":"10.2197/IPSJDC.3.610","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.610","url":null,"abstract":"An ID-based encryption (IBE) is a public key cryptosystem, in which a user's public key is given as a user ID. In IBE, only a single center generates all user secret keys, which may give the center a load of burdensome work. A hierarchical ID-based encryption (HIBE) is a kind of IBE and overcomes the problem by delegating a user secret key generation to a lower-level center, in which centers form a hierarchical structure. However, all ancestor nodes in HIBE act as centers. That is, any ancestor as well as the root can generate a secret key for any descendant node and, thus, a cipher text to a node can be decrypted by any ancestor node even if the ancestor does not have the same secret key as that of a target node. In this paper, we propose the concept of ancestor-excludable HIBE, in which ancestors with a level less than the designated one can be excluded from a set of privileged ancestors with a right to decrypt a cipher text to a target node. We also give the functional definition together with the security definition. This notion is denoted by AE-HIBE simply. We present the concrete example of AE-HIBE, which can work with constant-size ciphertext and decryption time, independent of the hierarchy level. We prove that our AE-HIBE is selective-ID-CPA secure in the standard model, which can be converted to be selective-ID-CCA secure by applying a general conversion method. Furthermore, AE-HIBE can be naturally applied to the broadcast encryption to realize the efficient public-key version with the user-key size of O(log2 N) and the transmission rate of O(r) for N users and r revoked users. The user-key size is the smallest at the transmission rate of O(r), up to the present.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133335126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Ipsj Digital Courier
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1