Waseda University

Displaying 1-15 of 15 results

  • White Papers // Sep 2011

    Hybrid RFID - OWC With an Adaptive Priority Transmission Scheme

    This paper presents hybrid RFID - OWC with an adaptive priority transmission scheme. In this model, the authors apply Optical Wireless Communication (OWC) for transmitting confidential information to a Radio Frequency IDentification (RFID) reader. Since OWC provides high security, this improves the security of the system. The priority of information...

    Provided By Waseda University

  • White Papers // Aug 2011

    Consistency Control to Manage Dynamic Contents Over Vehicular Communication Networks

    To improve driving comfort and provide entertainment services, Vehicular Communication Networks (VCNs) have appeared as an emerging solution, which consists of Road-Side Units (RSUs) and On-Board Units (OBUs) to distribute multimedia contents. However, as most of OBUs always request the stored contents in the RSUs, how to update the contents...

    Provided By Waseda University

  • White Papers // Jul 2011

    Mitigating DDoS Attacks Using Protection Nodes in Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) allow mobile hosts to form a communication network without a prefixed infrastructure. Although it provides high flexibility, it also brings more challenges for MANETs to fight against malicious attacks. However, the property of mobility and redundancy also inspires new ideas to design defence strategy. In...

    Provided By Waseda University

  • White Papers // May 2011

    A Multiple Response Approach for Adaptive Learning Service With Context-Based Multimedia Contents

    Learners can benefit more from the emerging ubiquitous computing technology in more learning scenarios beyond traditional computer-based e-learning system. But due to the great diversity of device specification, learning contents, and mobile context existing today, learners may have a poor learning experience in the ubiquitous computing technology-enhanced learning (u-learning) environment....

    Provided By Waseda University

  • White Papers // Mar 2011

    Multicast Source Handover Scheme Based on Proxy Router Discovery

    To support multicast over Mobile IP networks, the IETF proposed two schemes, namely Bi-directional Tunneling (MIP-BT) and Remote Subscription (MIP-RS). MIP-BT provides mobility by establishing bi-directional tunnel from home agent to mobile node's care-of address. Although it does not require multicast tree reconstruction, it suffers from redundant routing that causes...

    Provided By Waseda University

  • White Papers // Mar 2011

    A Routing-Aware Handover Scheme for Mobile IP

    One of the main issues of Mobile IPv6 is handover latency that causes service disruption time. Although plenty of proposals significantly reduce the service disruption time, they suffer from redundant routing that causes packet mis-ordering and bandwidth consumption during the process of inter-domain handover. In this paper, the authors propose...

    Provided By Waseda University

  • White Papers // Mar 2011

    Debt, Ownership Structure, And R&D Investment: Evidence From Japan

    Financial factors and ownership structure are both part of the determinants of corporate R&D investment. Considering listed firms in the R&D intensive industries during the 2000s, this paper examines whether financial factors and ownership structure explain R&D investment in Japan. Following the methodology of Brown et al. (2009), which extends...

    Provided By Waseda University

  • White Papers // Oct 2010

    Online Self-Diagnosis Self-Recovery Infrastructure for Embedded Systems

    Complexity of monolithic kernel of existing operating systems results in security exploits inevitably. When it is compromised, manual recovery from kernel-level attacks is usually time-consuming. The whole process is expected to be automatic and supported in system level. The requirement becomes more necessary for modern embedded systems, which lack such...

    Provided By Waseda University

  • White Papers // Sep 2010

    A Location Aware Virtual Infrastructure for VANETs

    The dynamical network topology is the source of most challenges in VANETs (Vehicle Ad hoc NETworks). In urban area, however, it is feasible to meet the challenge by taking advantage of the heavy traffic. This paper proposes a Location Aware Virtual Infrastructure (LAVI) based on recognition memory. Combining the memory...

    Provided By Waseda University

  • White Papers // Jan 2010

    Multicasting Correlated Multiple Sources to Multiple Sinks Over a Noisy Network

    The problem of network coding for multicasting a single source to multiple sinks has first been studied by Ahlswede, Cai, Li and Yeung in 2000, in which they have established the celebrated max-flow mini-cut theorem on non-physical information flow over a network of independent channels. On the other hand, in...

    Provided By Waseda University

  • White Papers // Dec 2009

    Bayesian Forecasting of WWW Traffic on the Time Varying Poisson Model

    Traffic forecasting from past observed traffic data with small calculation complexity is one of important problems for planning of servers and networks. Focusing on World Wide Web (WWW) traffic as fundamental investigation, this paper would deal with Bayesian forecasting of network traffic on the time varying Poisson model from a...

    Provided By Waseda University

  • White Papers // Jul 2009

    Pattern Classification Analysis Of Corporate Quality In IT Industry

    Quality is an attribute which is not important only for products, but also related to management and a company itself. The development and promotion of personnel resources are indispensable in improving the quality of the management and a company. The management quality relates deeply to a corporate culture and a...

    Provided By Waseda University

  • White Papers // Jul 2009

    Mobile Ad-Hoc Network Based Relaying Data System for Oceanic Flight Routes in Aeronautical Communications

    This paper proposes a reliable system to overcome the weakness of current the HF radio communication system for oceanic aeronautical flight routes. This system uses only one aeronautical VHF channel with air-to-air radio relay system based on local mobile Ad-hoc networks. For access to/from all aircrafts in the system, a...

    Provided By Waseda University

  • White Papers // Jun 2009

    A Low-Cost Reconfigurable Architecture for AES Algorithm

    This paper proposes a low-cost reconfigurable architecture for AES algorithm. The proposed architecture separates SubBytes and MixColumns into two parallel data path, and supports different bit-width operation for this two data path. As a result, different number of S-box can be supported in this architecture. The throughput and power consumption...

    Provided By Waseda University

  • White Papers // Jun 2009

    Diagnosis Support of Embedded Systems Based on Virtualization

    In this paper, a runtime diagnosis infrastructure is presented for embedded systems. Different from existing methods of tracing system logs offline, the research focuses on analyzing system kernel data structures from runtime memory against predefined constraints periodically. The prototype system is developed based on a system virtualization layer, above on...

    Provided By Waseda University

  • White Papers // Aug 2011

    Consistency Control to Manage Dynamic Contents Over Vehicular Communication Networks

    To improve driving comfort and provide entertainment services, Vehicular Communication Networks (VCNs) have appeared as an emerging solution, which consists of Road-Side Units (RSUs) and On-Board Units (OBUs) to distribute multimedia contents. However, as most of OBUs always request the stored contents in the RSUs, how to update the contents...

    Provided By Waseda University

  • White Papers // Sep 2011

    Hybrid RFID - OWC With an Adaptive Priority Transmission Scheme

    This paper presents hybrid RFID - OWC with an adaptive priority transmission scheme. In this model, the authors apply Optical Wireless Communication (OWC) for transmitting confidential information to a Radio Frequency IDentification (RFID) reader. Since OWC provides high security, this improves the security of the system. The priority of information...

    Provided By Waseda University

  • White Papers // Mar 2011

    Multicast Source Handover Scheme Based on Proxy Router Discovery

    To support multicast over Mobile IP networks, the IETF proposed two schemes, namely Bi-directional Tunneling (MIP-BT) and Remote Subscription (MIP-RS). MIP-BT provides mobility by establishing bi-directional tunnel from home agent to mobile node's care-of address. Although it does not require multicast tree reconstruction, it suffers from redundant routing that causes...

    Provided By Waseda University

  • White Papers // Mar 2011

    A Routing-Aware Handover Scheme for Mobile IP

    One of the main issues of Mobile IPv6 is handover latency that causes service disruption time. Although plenty of proposals significantly reduce the service disruption time, they suffer from redundant routing that causes packet mis-ordering and bandwidth consumption during the process of inter-domain handover. In this paper, the authors propose...

    Provided By Waseda University

  • White Papers // Oct 2010

    Online Self-Diagnosis Self-Recovery Infrastructure for Embedded Systems

    Complexity of monolithic kernel of existing operating systems results in security exploits inevitably. When it is compromised, manual recovery from kernel-level attacks is usually time-consuming. The whole process is expected to be automatic and supported in system level. The requirement becomes more necessary for modern embedded systems, which lack such...

    Provided By Waseda University

  • White Papers // Jan 2010

    Multicasting Correlated Multiple Sources to Multiple Sinks Over a Noisy Network

    The problem of network coding for multicasting a single source to multiple sinks has first been studied by Ahlswede, Cai, Li and Yeung in 2000, in which they have established the celebrated max-flow mini-cut theorem on non-physical information flow over a network of independent channels. On the other hand, in...

    Provided By Waseda University

  • White Papers // Dec 2009

    Bayesian Forecasting of WWW Traffic on the Time Varying Poisson Model

    Traffic forecasting from past observed traffic data with small calculation complexity is one of important problems for planning of servers and networks. Focusing on World Wide Web (WWW) traffic as fundamental investigation, this paper would deal with Bayesian forecasting of network traffic on the time varying Poisson model from a...

    Provided By Waseda University

  • White Papers // Jun 2009

    A Low-Cost Reconfigurable Architecture for AES Algorithm

    This paper proposes a low-cost reconfigurable architecture for AES algorithm. The proposed architecture separates SubBytes and MixColumns into two parallel data path, and supports different bit-width operation for this two data path. As a result, different number of S-box can be supported in this architecture. The throughput and power consumption...

    Provided By Waseda University

  • White Papers // Mar 2011

    Debt, Ownership Structure, And R&D Investment: Evidence From Japan

    Financial factors and ownership structure are both part of the determinants of corporate R&D investment. Considering listed firms in the R&D intensive industries during the 2000s, this paper examines whether financial factors and ownership structure explain R&D investment in Japan. Following the methodology of Brown et al. (2009), which extends...

    Provided By Waseda University

  • White Papers // Jul 2011

    Mitigating DDoS Attacks Using Protection Nodes in Mobile Ad Hoc Networks

    Mobile Ad Hoc NETworks (MANETs) allow mobile hosts to form a communication network without a prefixed infrastructure. Although it provides high flexibility, it also brings more challenges for MANETs to fight against malicious attacks. However, the property of mobility and redundancy also inspires new ideas to design defence strategy. In...

    Provided By Waseda University

  • White Papers // Sep 2010

    A Location Aware Virtual Infrastructure for VANETs

    The dynamical network topology is the source of most challenges in VANETs (Vehicle Ad hoc NETworks). In urban area, however, it is feasible to meet the challenge by taking advantage of the heavy traffic. This paper proposes a Location Aware Virtual Infrastructure (LAVI) based on recognition memory. Combining the memory...

    Provided By Waseda University

  • White Papers // May 2011

    A Multiple Response Approach for Adaptive Learning Service With Context-Based Multimedia Contents

    Learners can benefit more from the emerging ubiquitous computing technology in more learning scenarios beyond traditional computer-based e-learning system. But due to the great diversity of device specification, learning contents, and mobile context existing today, learners may have a poor learning experience in the ubiquitous computing technology-enhanced learning (u-learning) environment....

    Provided By Waseda University

  • White Papers // Jun 2009

    Diagnosis Support of Embedded Systems Based on Virtualization

    In this paper, a runtime diagnosis infrastructure is presented for embedded systems. Different from existing methods of tracing system logs offline, the research focuses on analyzing system kernel data structures from runtime memory against predefined constraints periodically. The prototype system is developed based on a system virtualization layer, above on...

    Provided By Waseda University

  • White Papers // Jul 2009

    Mobile Ad-Hoc Network Based Relaying Data System for Oceanic Flight Routes in Aeronautical Communications

    This paper proposes a reliable system to overcome the weakness of current the HF radio communication system for oceanic aeronautical flight routes. This system uses only one aeronautical VHF channel with air-to-air radio relay system based on local mobile Ad-hoc networks. For access to/from all aircrafts in the system, a...

    Provided By Waseda University

  • White Papers // Jul 2009

    Pattern Classification Analysis Of Corporate Quality In IT Industry

    Quality is an attribute which is not important only for products, but also related to management and a company itself. The development and promotion of personnel resources are indispensable in improving the quality of the management and a company. The management quality relates deeply to a corporate culture and a...

    Provided By Waseda University