Yasuyuki TAHARA

Department of InformaticsAssociate Professor
Cluster I (Informatics and Computer Engineering)Associate Professor

Degree

  • Master of Science, The University of Tokyo
  • Doctor of Information and Computer Science, Waseda University

Research Keyword

  • ソフトウェア基礎理論
  • セキュリティの形式検証
  • Formal Verification of Security
  • 圏論
  • Category Theory
  • Formal Semantics
  • Algebraic Models
  • Fundamental Theories of Software
  • Security RE
  • Secure Systems Engineering
  • Requirements Engineering (Goal-Oriented RE in particular)
  • Formal Verification (Model Checking in particular)
  • Software Engineering
  • 形式的意味論
  • 代数モデル
  • セキュリティ要求分析
  • セキュアなシステムの開発手法
  • 要求工学(特にゴール指向要求分析)
  • 形式検証(特にモデル検査)
  • ソフトウェア工学

Field Of Study

  • Informatics, Software

Career

  • 01 Apr. 2016
    Graduate School of Informatics and Engineering, Associate Professor
  • 01 Apr. 2008 - 31 Mar. 2016
    Graduate School of Information Systems, The University of Electro-Communications, Associate Professor
  • 01 Apr. 2007 - 31 Mar. 2008
    National Institute of Informatics, Associate Professor by Special Appointment
  • 01 Aug. 2004 - 31 Mar. 2007
    National Institute of Informatics, Associate Professor by Special Appointment
  • 01 Jun. 2003 - 31 Jul. 2004
    National Institute of Informatics, Scientific Research Support Staff
  • 01 Apr. 2002 - 31 May 2003
    Knowledge Media Laboratory, Corporate Research and Development Center, Toshiba Corporation, Research Specialist
  • 01 Apr. 2000 - 31 Mar. 2002
    Computer and Network Systems Laboratory, Corporate Research and Development Center, Toshiba Corporation, Research Specialist
  • 01 Jul. 1994 - 31 Mar. 2000
    Systems and Software Engineering Laboratory, Corporate Research and Development Center, Toshiba Corporation, Research Specialist
  • 01 Apr. 1994 - 30 Jun. 1994
    Systems and Software Engineering Laboratory, Corporate Research and Development Center, Toshiba Corporation, Employee
  • 01 May 1991 - 31 Mar. 1994
    Systems and Software Engineering Laboratory, Toshiba Corporation, Employee

Educational Background

  • Apr. 1989 - Mar. 1991
    The University of Tokyo, School of Science, Department of Mathematics

Member History

  • Apr. 2021 - Present
    情報システム技術委員会1号委員, 電気学会, Society
  • Apr. 2019 - Present
    実践的IT教育研究会 運営委員, 日本ソフトウェア科学会, Society
  • 01 Apr. 2018 - 31 Mar. 2022
    情報処理学会論文誌「数理モデル化と応用」編集委員, 情報処理学会, Society
  • 01 Apr. 2018 - 31 Mar. 2019
    実践的IT教育研究会 運営委員会 主査, 日本ソフトウェア科学会, Society
  • 01 Apr. 2012 - 31 Mar. 2016
    情報処理学会論文誌「数理モデル化と応用」編集委員, 情報処理学会, Society
  • 01 Apr. 2008 - 31 Mar. 2013
    情報処理学会ソフトウェア工学研究会運営委員, 情報処理学会, Society

Award

  • Nov. 2023
    IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)
    Federated Learning Algorithm Handling Missing Attributes
    IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS) Best Paper Award, Keiichiro Oishi;Yuichi Sei;Yasuyuki Tahara;Akihiko Ohsuga
    International society
  • Sep. 2023
    合同エージェントワークショップ&シンポジウム2023(JAWS2023)
    擬人化タスクにおけるカラーパレットを用いた条件付き画像生成手法の挙動分析
    奨励賞, 徐 江林;折原 良平;清 雄一;田原 康之;大須賀 昭彦
    Japan society
  • Sep. 2023
    合同エージェントワークショップ&シンポジウム2023(JAWS2023)
    音声と3DMMに基づくマスクを除去した顔画像の推定
    優秀賞, 赤塚 哲丸;折原 良平;清 雄一;田原 康之;大須賀 昭彦
    Japan society
  • Sep. 2023
    IEEE Computer Society Japan Chapter
    音声と3DMMに基づくマスクを除去した顔画像の推定
    JAWS Young Researcher Award, 赤塚 哲丸
    International academic award
  • May 2023
    JP生きがい振興財団
    類似語を利用した複合語型隠語の検出
    警察研究論文奨励賞「情報通信研究の部」最優秀賞, 羽田 拓朗;清 雄一;田原 康之;大須賀 昭彦
    Publisher
  • Mar. 2023
    第15回データ工学と情報マネジメントに関するフォーラム(DEIM2023)
    深層強化学習を用いた文章の言い換えによる駄洒落生成モデルの検討
    学生プレゼンテーション賞, 南 智仁;清 雄一;田原 康之;大須賀 昭彦
    Japan society
  • Jan. 2023
    情報処理学会
    送信ドメイン認証を用いた送信者レピュテーションの構築手法とフィードバックループの提案
    情報処理学会論文誌ジャーナル/JIP特選論文, 櫻庭秀次;依田みなみ;清雄一;田原康之;大須賀昭彦
    Official journal
  • Dec. 2022
    電子情報通信学会
    l-多様性を満たすためのグルーピングとダミー追加を組み合わせたアルゴリズム
    電子情報通信学会 人工知能と知識処理研究会 研究奨励賞, 大石慶一朗;清雄一;田原康之;大須賀昭彦
  • Sep. 2022
    日本ソフトウェア科学会、情報処理学会、人工知能学会、電子情報通信学会
    類似語を利用した複合語型隠語の検出
    SMASH22 (Symposium on Multi Agent Systems for Harmonization 2022) Summer Symposium 奨励賞, 羽田拓朗;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2022
    情報処理学会ソフトウェア工学研究会, ソフトウェア工学に関するトップジャーナルやトップカンファレンスへのチャレンジを奨励するため,それらに掲載された論文に授与する.本論文はトップジャーナルである IEEE Transactions on Software Engineering に掲載された.
    Towards scalable model checking of reflective systems via labeled transition systems
    卓越研究賞, 鄭 顕志,田原 康之,大須賀 昭彦
    Japan society, Japan
  • Jul. 2022
    情報処理学会
    組込みシステム向け障害解析環境の効率改善
    情報処理学会 2022年度山下記念研究賞, 長野岳彦;小口琢夫;吉岡信和;田原康之;大須賀昭彦
    Japan society
  • Feb. 2022
    電子情報通信学会
    深層学習による汎用性の高いピアノリダクション自動生成技術
    電子情報通信学会 人工知能と知識処理研究会 研究奨励賞, 星雄輝;折原良平;清雄一;田原康之;大須賀昭彦
  • Feb. 2022
    日本ソフトウェア科学会、情報処理学会、人工知能学会、電子情報通信学会
    人の存在確率を考慮した位置情報プライバシ保護手法の提案
    SMASH22 (Symposium on Multi Agent Systems for Harmonization 2022) Winter Symposium 準優秀賞, 石禾里帆;清雄一;田原康之;大須賀昭彦
  • Sep. 2021
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    深層学習による汎用性を考慮したピアノリダクションの自動生成
    SMASH21 (Symposium on Multi Agent Systems for Harmonization 2021) Summer Symposium 奨励賞, 星雄輝;折原良平;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2021
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    ファインチューニングを利用した少量音声からの韻律転送の試み
    SMASH21 (Symposium on Multi Agent Systems for Harmonization 2021) Summer Symposium 奨励賞, 徳島大河;折原良平;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2021
    情報処理学会
    組込みシステム向け障害解析環境の効率改善
    第32回コンシューマ・デバイス&システム(CDS)研究会 優秀発表賞, 長野岳彦;小口琢夫;吉岡信和;田原康之;大須賀昭彦
    Japan society
  • Jun. 2021
    Codewords Detection in Microblogs Focusing on Differences in Word Use Between Two Corpora, 3rd IEEE International Conference on Computing, Electronics & Communications Engineering (iCCECE)
    JP生きがい振興財団警察研究論文奨励賞, 羽田拓朗;清雄一;田原康之;大須賀昭彦
  • Sep. 2020
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    次元間の関係に着目したドメインオントロジーに基づく異種データ間の関連性発見
    SMASH20 (Symposium on Multi Agent Systems for Harmonization 2020) Summer Symposium ベストプレゼンテーション賞, 塚越雄登;江上周作;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2020
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    次元間の関係に着目したドメインオントロジーに基づく異種データ間の関連性発見
    SMASH20 (Symposium on Multi Agent Systems for Harmonization 2020) Summer Symposium 学生奨励賞, 塚越雄登;江上周作;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2020
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    IoT環境における機械学習のポイズニング攻撃に対して攻撃を逆利用した防御手法
    SMASH20 (Symposium on Multi Agent Systems for Harmonization 2020) Summer Symposium ベストプレゼンテーション賞, 千葉智樹;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2020
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    IoT環境における機械学習のポイズニング攻撃に対して攻撃を逆利用した防御手法
    SMASH20 (Symposium on Multi Agent Systems for Harmonization 2020) Summer Symposium 学生奨励賞, 千葉智樹;清雄一;田原康之;大須賀昭彦
    Japan society
  • Oct. 2019
    情報処理学会
    Linked Dataを用いた俯瞰的な多肢選択式問題自動生成手法の提案
    情報処理学会論 文誌ジャーナル/JIP特選論文, 奥原史佳;清雄一;田原康之;大須賀昭彦
    Official journal
  • Feb. 2019
    日本ソフトウェア科学会
    学内駐輪環境に関するナレッジグラフ生成と欠損推定手法適用の試み
    マルチエージェントと協調計算研究会 (MACC) 最優秀発表賞, 塚越雄登;川村隆浩;清雄一;田原康之;大須賀昭彦
    Japan society
  • Dec. 2018
    電子情報通信学会
    2次元迷路課題における進化的計算を利用したマルチタスク深層強化学習
    人工知能と知識処理研究会 研究奨励賞, 今井翔太;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2018
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    Linked Dataを用いたカリキュラムベースの多肢選択式問題自動生成手法の提案
    第17回 合同エージェントワークショップ&シンポジウム2018 (JAWS2018) 学生奨励賞, 奥原史佳;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2018
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    サッカーのパス網分析における中心性測定の新指標
    第17回 合同エージェントワークショップ&シンポジウム2018 (JAWS2018) 学生奨励賞, 神畠正稔;折原良平;清雄一;田原康之;大須賀昭彦
    Japan society
  • Feb. 2018
    日本ソフトウェア科学会
    パーチェス法を用いたエージェントシミュレーションによる金融機関の合併に関するシステミックリスクへの影響分析
    マルチエージェントと協調計算研究会 (MACC) 最優秀発表賞, 加藤秀紀;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2017
    日本ソフトウェア科学会
    モデル検査による設計検証
    第6回解説論文賞, 吉岡 信和;田辺 良則;田原 康之;長谷川 哲夫;磯部 祥尚
    Official journal
  • Dec. 2016
    日本ソフトウェア科学会
    シンスライシングを用いたWEB アプリのための設定ファイル参照ミス検知手法の試作と評価
    ソフトウェア工学の基礎ワークショップ (FOSE2016) 貢献賞(ショートペーパー部門), 依田みなみ;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2016
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    オートエンコーダを利用した複数話者の声質変換
    第15回 合同エージェントワークショップ&シンポジウム2016 (JAWS2016) 優良論文賞, 関井祐介;折原良平;小島圭介;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2016
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    文字レベル深層学習による日本語テキストの分類と転移学習
    第15回 合同エージェントワークショップ&シンポジウム2016 (JAWS2016) 優秀発表賞, 佐藤挙斗;折原良平;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2016
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    家庭におけるペット-ロボットインタラクション □ロボットの世話行動による犬の行動変化の調査□
    第15回 合同エージェントワークショップ&シンポジウム2016 (JAWS2016) 優秀発表賞, 鈴木もとこ;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2016
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    Linked Dataによる楽曲特徴量の収集・分析基盤の構築
    第15回 合同エージェントワークショップ&シンポジウム2016 (JAWS2016) 優秀発表賞, 上原有里;川村隆浩;江上周作;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2016
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    オンラインレビューサイトにおけるレビュー解析精度向上に向けた皮肉文判別
    第15回 合同エージェントワークショップ&シンポジウム2016 (JAWS2016) 奨励論文賞, 鈴木翔太;折原良平;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2016
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    オートエンコーダを利用した複数話者の声質変換
    第15回 合同エージェントワークショップ&シンポジウム2016 (JAWS2016) 優秀発表賞, 関井祐介;折原良平;小島圭介;清雄一;田原康之;大須賀昭彦
    Japan society
  • Sep. 2016
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    家庭におけるペット-ロボットインタラクション □ロボットの世話行動による犬の行動変化の調査□
    第15回 合同エージェントワークショップ&シンポジウム2016 (JAWS2016) 優良論文賞, 鈴木もとこ;清雄一;田原康之;大須賀昭彦
    Japan society
  • Jul. 2016
    情報処理学会
    家庭におけるペット□ロボットインタラクション □ロボットは犬の世話をすることができるのか□
    マルチメディア、分散、協調とモバイル(DICOMO2016)シンポジウム優秀プレゼンテーション賞, 鈴木もとこ;清雄一;田原康之;大須賀昭彦
    Japan society
  • Mar. 2016
    放置自転車LOD
    Linked Open Data Challenge Japan 2015 データセット部門 最優秀賞, 江上周作;川村隆浩;清雄一;田原康之;大須賀昭彦
    Publisher
  • Mar. 2016
    電子情報通信学会
    ゴール指向洗練パターン駆動によるユースケースモデリング
    電子情報通信学会論文誌 学生論文特集秀逸論文, 本田耕三;平山秀昭;中川博之;田原康之;大須賀昭彦
    Official journal
  • Nov. 2015
    10th International Conference on Software Engineering Advances (ICSEA2015) Best Paper Award, 長野岳彦;芹沢一;吉岡信和;田原康之;大須賀昭彦
    International society
  • Oct. 2015
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    投票行動時系列データ解析に基づく意思決定戦略の分析
    第14回 合同エージェントワークショップ&シンポジウム2015 (JAWS2015) 奨励賞, 樋口尚吾;折原良平;清雄一;田原康之;大須賀昭彦
    Japan society
  • Oct. 2015
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    Twitterにおけるミスコミュニケーションの解消に向けて -ユーザの期待する反応に応じたツイート分類-
    第14回 合同エージェントワークショップ&シンポジウム2015 (JAWS2015) 奨励賞, 植田智明;折原良平;清雄一;田原康之;大須賀昭彦
    Japan society
  • Nov. 2014
    The 4th Joint International Semantic Technology Conference (JIST2014) Best Poster Award, 横尾亮平;川村隆浩;清雄一;田原康之;大須賀昭彦
    International society
  • Nov. 2013
    The 3rd Joint International Semantic Technology Conference JIST2013) Best Poster & Demo Award, 田代和浩;川村隆浩;清雄一;中川博之;田原康之;大須賀昭彦
    International society
  • Mar. 2013
    情報処理学会
    テンプレートを用いた法的要求抽出・モデリングの実現に向けて
    情報処理学会 第179回ソフトウェア工学研究会 学生研究賞, 吉田豊;中川博之;田原康之;大須賀昭彦
    Japan society
  • Oct. 2012
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    CRFを用いたメディア情報の抽出とLinked Data化 □ソーシャルメディアとマスメディアの比較事例□
    第11回 合同エージェントワークショップ&シンポジウム2012 (JAWS2012) 学生優秀論文賞, 越川兼地;川村隆浩;中川博之;田原康之;大須賀昭彦
    Japan society
  • Nov. 2011
    International Conference on Network Technologies Communications (NTC 2011) Best Student Paper Award, 浜本一知;田原康之;大須賀昭彦
    International society
  • Oct. 2010
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    携帯端末上での拡張現実を用いた植物推薦エージェント
    第9回 合同エージェントワークショップ&シンポジウム2010(JAWS10)ベストポスター賞, 三代謙仁;川村隆浩;中川博之;田原康之;大須賀昭彦
    Japan society
  • Oct. 2010
    日本ソフトウェア科学会,電子情報通信学会,情報処理学会,人工知能学会,IEEE CS
    教師あり学習を用いたレビューサイトからの意見抽出
    第9回 合同エージェントワークショップ&シンポジウム2010(JAWS10)学生奨励賞, 田中俊行;グェンミンティ;中川博之;田原康之;大須賀昭彦
    Japan society
  • Oct. 2009
    情報処理学会、日本ソフトウェア科学会、電子情報通信学会、人工知能学会 共催
    自律システム実現に向けたアーキテクチャの構築
    第8回 合同エージェントワークショップ&シンポジウム2009(JAWS09)優秀論文賞, 西村一彦;中川博之;中山健;田原康之;大須賀昭彦
    Japan society

Paper

  • A Model-Driven Approach for Designing and Validation of ABAC Policies
    Duc-Hieu Nguyen; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2024), to appear, May 2024, Peer-reviwed
    International conference proceedings
  • The Proposal of Countermeasures for DeepFake Voices on Social Media Considering Waveform and Text Embedding
    Yuta Yanagi; Ryohei Orihara; Yasuyuki Tahara; Yuichi Sei; Tanel Alumäe; Akihiko Ohsuga
    Annals of Emerging Technologies in Computing, 8, 2, 15-31, Apr. 2024, Peer-reviwed, True, with international co-author(s)
    Scientific journal
  • Minimizing Noise in Location Privacy Protection Through Equipment Error Consideration
    Riho Isawa; Yuicih Sei; Yasuyuki Tahara; Akihiko Ohsuga
    International Journal of Electrical and Computer Engineering Systems, 15, 3, 285-296, Mar. 2024, Peer-reviwed, True
    Scientific journal
  • Proposal of a Cosmetic Product Recommendation Method with Review Text that is Predicted to Be Write by Users.
    Natsumi Baba; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    ICAART (3), 609-616, Feb. 2024, Peer-reviwed
    International conference proceedings
  • An Analysis of Knowledge Representation for Anime Recommendation Using Graph Neural Networks.
    Yuki Saito; Shusaku Egami; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    ICAART (2), 243-252, Feb. 2024, Peer-reviwed
    International conference proceedings
  • Algorithm to Satisfy l-diversity by Combining Dummy Records and Grouping
    Keiichiro Oishi; Yuichi Sei; Andrew J; Yasuyuki Tahara; Akihiko Ohsuga
    Security and Privacy, Feb. 2024, Peer-reviwed, True, with international co-author(s)
    Scientific journal
  • StyleMap を用いた事前学習済み StyleGAN による画像編集
    本田 爽; 折原 良平; 清 雄一; 田原 康之; 大須賀 昭彦
    情報処理学会論文誌, 情報処理学会, 65, 1, Jan. 2024, Peer-reviwed
    Japanese
  • 少数サンプルから多様なゲームステージを生成するGANの学習手法の提案
    高田 宗一郎; 清 雄一; 田原 康之; 大須賀 昭彦
    情報処理学会論文誌, 情報処理学会, 65, 1, Jan. 2024, Peer-reviwed
    Japanese
  • セマンティックセグメンテーションを利用した GAN Inversion による背景画像の編集手法の提案
    石幡 柊介; 折原 良平; 清 雄一; 田原 康之; 大須賀 昭彦
    情報処理学会論文誌, 情報処理学会, 65, 1, Jan. 2024, Peer-reviwed
    Japanese
  • サッカーにおけるポジショニングの修正を行う遺伝的アルゴリズムモデルの提案
    神宮司 祐哉; 清 雄一; 田原 康之; 大須賀 昭彦
    情報処理学会論文誌, 情報処理学会, 65, 1, Jan. 2024, Peer-reviwed
    Japanese
  • Data-driven OCL Invariant Patterns-based Process Model Exploration for Process Mining
    Duc-Hieu Nguyen; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Dec. 2023, Peer-reviwed
  • A Scalable Middleware for IoT Vulnerability Detection
    Minami Yoda; Shigeo Nakamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Dec. 2023, Peer-reviwed
  • Federated Learning Algorithm Handling Missing Attributes
    Keiichiro Oishi; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    6th IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), 146-151, Nov. 2023, Peer-reviwed
    International conference proceedings
  • A Middleware to Improve Analysis Coverage in IoT Vulnerability Detection
    Minami Yoda; Shigeo Nakamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    6th IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), 103-107, Nov. 2023, Peer-reviwed
    International conference proceedings
  • Estimation of Unmasked Face Images Based on Voice and 3DMM
    Tetsumaru Akatsuka; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    25th Australasian Joint Conference on Artificial Intelligence (AJCAI 2023), to appear, 239-251, Nov. 2023, Peer-reviwed
    International conference proceedings, English
  • Towards scalable model checking of reflective systems via labeled transition systems
    Kenji Tei; Yasuyuki Tahara; Akihiko Ohsuga
    IEEE Transactions on Software Engineering, 49, 3, 1299-1322, Mar. 2023, Peer-reviwed
    Scientific journal, English
  • A k-Anonymization Method for Social Network Data with Link Prediction
    Risa Sugai; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 9th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications, 493-500, Feb. 2023, Peer-reviwed
    International conference proceedings
  • Rumor Detection in Tweets Using Graph Convolutional Networks
    Takumi Takei; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 15th International Conference on Agents and Artificial Intelligence, SCITEPRESS - Science and Technology Publications, 397-404, Feb. 2023, Peer-reviwed
    International conference proceedings
  • GAN Inversion with Editable StyleMap
    So Honda; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 15th International Conference on Agents and Artificial Intelligence, SCITEPRESS - Science and Technology Publications, 389-396, Feb. 2023, Peer-reviwed
    International conference proceedings
  • Diverse Level Generation for Tile-Based Video Game using Generative Adversarial Networks from Few Samples
    Soichiro Takata; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 15th International Conference on Agents and Artificial Intelligence, SCITEPRESS - Science and Technology Publications, 326-333, Feb. 2023, Peer-reviwed
    International conference proceedings
  • Proposal of a Signal Control Method Using Deep Reinforcement Learning with Pedestrian Traffic Flow
    Akimasa Murata; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 15th International Conference on Agents and Artificial Intelligence, SCITEPRESS - Science and Technology Publications, 319-325, Feb. 2023, Peer-reviwed
    International conference proceedings
  • Background Image Editing with HyperStyle and Semantic Segmentation
    Syuusuke Ishihata; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 15th International Conference on Agents and Artificial Intelligence, SCITEPRESS - Science and Technology Publications, 293-300, Feb. 2023, Peer-reviwed
    International conference proceedings
  • Predicting Visual Importance of Mobile UI Using Semantic Segmentation
    Ami Yamamoto; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 15th International Conference on Agents and Artificial Intelligence, SCITEPRESS - Science and Technology Publications, 260-266, Feb. 2023, Peer-reviwed
    International conference proceedings
  • Generation of Facial Images Reflecting Speaker Attributes and Emotions Based on Voice Input
    Kotaro Koseki; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 15th International Conference on Agents and Artificial Intelligence, SCITEPRESS - Science and Technology Publications, 99-105, Feb. 2023, Peer-reviwed
    International conference proceedings
  • Detection of Compound-Type Dark Jargons Using Similar Words
    Takuro Hada; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 15th International Conference on Agents and Artificial Intelligence, SCITEPRESS - Science and Technology Publications, 427-437, Feb. 2023, Peer-reviwed
    International conference proceedings
  • Sender Reputation Construction Method And Feedback Loop Using Sender Authentication
    櫻庭 秀次; 依田 みなみ; 清 雄一; 田原 康之; 大須賀 昭彦
    情報処理学会論文誌, 情報処理学会, 64, 1, 13-23, 15 Jan. 2023, 迷惑メール対策を目的として,送信ドメイン認証技術を用いた送信者レピュテーションの構築手法とフィードバックループについて提案する.送信者レピュテーションは,メールの送信元情報を用いて受け取りを判断するための情報であるが,その中で受け取るべき正規のメール送信元を収集することは簡単ではない.本論文では,転送メールの送信サーバが正規のメール送信元と考え,転送メールをメール受信時に送信ドメイン認証の結果を用いて判断する手法を示す.この転送メールの判断手法には課題が残っており,メール転送時に送信元情報を書き換える転送メールについては判断できない.本論文では,送信ドメイン認証の結果を用いて,メール転送時に送信元情報を書き換える転送メールについても判断できる手法を追加した,送信者レピュテーションの構築手法について示す.また送信者レピュテーションは,正規のメール送信元から送信される迷惑メールに対応できないという課題がある.この課題を改善するためには,迷惑メールの受信側からメールの送信元へ通知を行うフィードバックループが有効である.本論文では,通知の信頼性を向上させるために送信ドメイン認証を利用する手法を示す.送信者レピュテーションの構築手法の有効性を評価するために,実際のメールサービスでの受信記録情報を用いて適用し,より多くの受け取るべきメールを判定できることを示した.これらの手法により,迷惑メール対策において必要なメールがより確実に届き,送信者レピュテーションを悪用する正規のメールサーバの不正利用を改善することが可能となる.
    We propose a sender reputation construction method and feedback loop using sender authentication technology for the purpose of preventing unsolicited emails. Sender reputation is information for judging receipt by using the sender information of mail, but it is not easy to collect the legitimate mail sender to be received in it. In this paper, the sender of the forwarded email is considered to be the legitimate email sender. We show a method to judge forwarded mail by using the result of sender authentication when receiving mail. There are still issues with this method of determining forwarded mail, and it is not possible to judge forwarded mail that rewrites the sender information when forwarding mail. In this paper, we show a method of constructing sender reputation by adding a method that can judge forwarded mail that rewrites the sender information at the time of mail forwarding by using the result of sender authentication. In addition, sender reputation has the problem that it cannot handle unsolicited emails sent from legitimate email sources. In order to improve this problem, a feedback loop that notifies the sender of the email from the receiver of the junk email is effective. In this paper, we show a method that uses sender authentication to improve the reliability of notifications. In order to evaluate the effectiveness of the sender reputation construction method, we applied it using the reception record information of the actual mail service, and showed that more mails to be received can be determined. With these methods, it is possible to more reliably receive the emails necessary for anti-spam measures, and to improve the unauthorized use of legitimate mail servers that abuse sender reputation.
    Japanese
  • Inspection of The Classifying Performance of The Deepfake Voices by The Latest Text-to-Speech Models
    Yuta Yanagi; Ryohei Orihara; Yasuyuki Tahara; Yuichi Sei; Tanel Alumäe; Akihoko Ohsuga
    2nd Interdisciplinary Conference on Mechanics, Computers and Electrics (ICMCE), 1, ---, Oct. 2022, Peer-reviwed
    International conference proceedings, English
  • Proposal of middleware to support the development of IoT firmware analysis tools
    Minami Yoda; Shuji Sakuraba; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    14th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE), Springer, 1, ---, Aug. 2022, Peer-reviwed
    International conference proceedings, English
  • Detection of Plaintext Login Information in Firmware
    Minami Yoda; Shuji Sakuraba; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proc. IEEE International Conference on Consumer Electronics – Taiwan (ICCE-TW 2022), IEEE, ICCE-TW2022, 523-524, Jul. 2022, Peer-reviwed
    International conference proceedings, English
  • 組込みシステム向け障害解析環境の効率改善
    長野岳彦; 小口琢夫; 吉岡信和; 田原康之; 大須賀昭彦
    情報処理学会論文誌:コンシューマ・デバイス&システム, 12, 2, May 2022, Peer-reviwed
    Scientific journal, Japanese
  • Step-by-Step Acquisition of Cooperative Behavior in Soccer Task
    Takashi Abe; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Journal of Advances in Information Technology, ENGINEERING & TECHNOLOGY PUBLISHING, 13, 2, 147-154, Feb. 2022, Peer-reviwed, In this research, soccer task is investigated among the numerous tasks of deep reinforcement learning. The soccer task requires cooperative behavior. However, it is difficult for the agents to acquire the behavior, because a reward is sparsely given. Moreover, the behaviors of the allies and opponents must be considered by the agents. In addition, in the soccer task, if the agents attempt to acquire high-level cooperative behavior from low-level movements, such as ball kicking, a huge amount of time will be needed to learn a model. In this research, we conduct experiments in which reward shaping and curriculum learning are incorporated into deep reinforcement learning. This enables the agents to efficiently acquire cooperative behavior from low-level movements in a soccer task. The findings of this research indicate that reward shaping and curriculum learning with a designer's domain knowledge positively influence the agent's attempt to acquire cooperative behavior from low-level movements.
    Scientific journal, English
  • コーパス間の類似語の差異に着目したマイクロブログにおける隠語検出
    羽田拓朗; 清雄一; 田原康之; 大須賀昭彦
    電気学会論文誌C, 142, 2, 177-189, Feb. 2022, Peer-reviwed
    Scientific journal, Japanese
  • Versatile Automatic Piano Reduction Generation System by Deep Learning
    Yuki Hoshi; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    2nd International Conference on Advanced Research in Computing (ICARC), 1, 67-71, Feb. 2022, Peer-reviwed
    International conference proceedings, English
  • Prosody Transfer from a Small Amount of Voice using Fine Tuning,
    Taiga Tokushima; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    2nd International Conference on Advanced Research in Computing (ICARC), 1, 37-42, Feb. 2022, Peer-reviwed
    International conference proceedings, English
  • Detecting Hardcoded Login Information from User Input
    Minami Yoda; Shuji Sakuraba; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    40th IEEE International Conference on Consumer Electronics (ICCE), IEEE, 1, 104-105, Jan. 2022, Peer-reviwed
    International conference proceedings, English
  • Improvement of Legitimate Mail Server Detection Method using Sender Authentication
    Shuji Sakuraba; Minami Yoda; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proc. 18th IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA2021), IEEE, SERA2021, 10-14, Jun. 2021, Peer-reviwed, Anti-spam measures include methods for determining unsolicited email from the email content and methods for using sender information. If it can be determined from the sender's IP address of sender information and the sender's domain name whether the email should be received, it is possible to reduce the processing of the spam filter by the email content that has a high processing load for the determination. This study uses sender authentication technology to identify the sender of forwarded email. We consider that the sender of this forwarded email is the legitimate email sender to receive, and propose to use these as an allow list. In this paper, we propose a method to further improve the method we proposed and reduce misjudgment of the allow list. We verified that this new method is effective by using the log information of the emails actually received.
    International conference proceedings, English
  • キャンパスオントロジーに基づく異種データ間の相関検出
    塚越雄登; 江上周作; 清雄一; 田原康之; 大須賀昭彦
    電気学会論文誌C, 141, 11, 1222-1233, Jun. 2021, Peer-reviwed
    Scientific journal, Japanese
  • A Countermeasure Method Using Poisonous Data Against Poisoning Attacks on IoT Machine Learning
    Tomoki Chiba; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    International Journal of Semantic Computing, 15, 2, 215-240, Jun. 2021, Peer-reviwed
    Scientific journal, English
  • 送信ドメイン認証を用いた送信者レピュテーション構築手法の提案
    櫻庭秀次; 依田みなみ; 清雄一; 田原康之; 大須賀昭彦
    情報処理学会論文誌, 62, 5, 1173-1183, May 2021, Peer-reviwed
    Scientific journal, Japanese
  • Codeword Detection Focusing on Differences in Similar Words Between Two Corpora of Microblogs
    Takuro Hada; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Annals of Emerging Technologies in Computing (AETiC), International Association for Educators and Researchers (IAER), 5, 2, 90-102, Apr. 2021, Peer-reviwed, Recently, the use of microblogs in drug trafficking has surged and become a social problem. A common method applied by cyber patrols to repress crimes, such as drug trafficking, involves searching for crime-related keywords. However, criminals who post crime-inducing messages maximally exploit “codewords” rather than keywords, such as enjo kosai, marijuana, and methamphetamine, to camouflage their criminal intentions. Research suggests that these codewords change once they gain popularity; thus, effective codeword detection requires significant effort to keep track of the latest codewords. In this study, we focused on the appearance of codewords and those likely to be included in incriminating posts to detect codewords with a high likelihood of inclusion in incriminating posts. We proposed new methods for detecting codewords based on differences in word usage and conducted experiments on concealed-word detection to evaluate the effectiveness of the method. The results showed that the proposed method could detect concealed words other than those in the initial list and to a better degree than the baseline methods. These findings demonstrated the ability of the proposed method to rapidly and automatically detect codewords that change over time and blog posts that instigate crimes, thereby potentially reducing the burden of continuous codeword surveillance.
    Scientific journal, English
  • Classifying COVID-19 Conspiracy Tweets with Word Embedding and BERT.
    Yuta Yanagi; Ryohei Orihara; Yasuyuki Tahara; Yuichi Sei; Akihiko Ohsuga
    MediaEval, CEUR-WS.org, 2021
    International conference proceedings
  • Sender Reputation Construction Method using Sender Authentication
    Shuji Sakuraba; Minami Yoda; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    1st IEEE International Conference on Data Science and Computer Application (ICDSCA), 1, 369-373, 2021, Peer-reviwed
    International conference proceedings, English
  • Acquisition of Cooperative Behavior in a Soccer Task Using Reward Shaping
    Takashi Abe; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    International Conference on Innovation in Artificial Intelligence (ICIAI), ACM, 1, 145-150, 2021, Peer-reviwed
    International conference proceedings, English
  • Detection of the Hardcoded Login Information from Socket and String Compare Symbols
    Minami Yoda; Shuji Sakuraba; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Annals of Emerging Technologies in Computing (AETiC), International Association for Educators and Researchers (IAER), 5, 1, 28-39, Jan. 2021, Peer-reviwed, Internet of Things (IoT) for smart homes enhances convenience; however, it also introduces the risk of the leakage of private data. TOP10 IoT of OWASP 2018 shows that the first vulnerability is ”Weak, easy to predict, or embedded passwords.” This problem poses a risk because a user can not fix, change, or detect a password if it is embedded in firmware because only the developer of the firmware can control an update. In this study, we propose a lightweight method to detect the hardcoded username and password in IoT devices using a static analysis called Socket Search and String Search to protect from first vulnerability from 2018 OWASP TOP 10 for the IoT device. The hardcoded login information can be obtained by comparing the user input with strcmp or strncmp. Previous studies analyzed the symbols of strcmp or strncmp to detect the hardcoded login information. However, those studies required a lot of time because of the usage of complicated algorithms such as symbolic execution. To develop a lightweight algorithm, we focus on a network function, such as the socket symbol in firmware, because the IoT device is compromised when it is invaded by someone via the Internet. We propose two methods to detect the hardcoded login information: string search and socket search. In string search, the algorithm finds a function that uses the strcmp or strncmp symbol. In socket search, the algorithm finds a function that is referenced by the socket symbol. In this experiment, we measured the ability of our proposed method by searching six firmware in the real world that has a backdoor. We ran three methods: string search, socket search, and whole search to compare the two methods. As a result, all methods found login information from five of six firmware and one unexpected password. Our method reduces the analysis time. The whole search generally takes 38 mins to complete, but our methods finish the search in 4-6 min.
    Scientific journal, English
  • Ontology-Based Correlation Detection among Heterogeneous Data Sets: A Case Study of University Campus Issues
    Yuto Tsukagoshi; Shusaku Egami; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), IEEE, 25-32, Dec. 2020, Peer-reviwed
    International conference proceedings, English
  • A Defense Method against Poisoning Attacks on IoT Machine Learning Using Poisonous Data
    Tomoki Chiba; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), IEEE, 84-91, Dec. 2020, Peer-reviwed
    International conference proceedings, English
  • Knowledge Graph Completion to Solve University Campus Issues
    Yuto Tsukagoshi; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Journal of Data Intelligence, Rinton Press, 1, 3, 333-350, Sep. 2020, Peer-reviwed
    Scientific journal, English
  • 社会課題解決に向けたナレッジグラフと欠損推定手法の提案 ~学内駐輪環境改善の試み~
    塚越 雄登; 川村 隆浩; 清 雄一; 田原 康之; 大須賀 昭彦
    電気学会論文誌C, 電気学会, 140, 8, 905-915, 01 Aug. 2020, Peer-reviwed
    Scientific journal, Japanese
  • 位置情報とタイムスタンプの有用性を調整可能な移動軌跡匿名化手法
    千葉 智樹; 清 雄一; 田原 康之; 大須賀 昭彦
    電気学会論文誌C, 電気学会, 140, 8, 956-963, 01 Aug. 2020, Peer-reviwed
    Scientific journal, Japanese
  • Semantic Diversity: Privacy Considering Distance Between Values of Sensitive Attribute
    Keiichiro Oishi; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Computers & Security, Elsevier BV, 94, 1-18, Jul. 2020, Peer-reviwed
    Scientific journal, English
  • Codewords Detection in Microblogs Focusing on Differences in How Words are Used Between Two Corpora
    Takuro Hada; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    3rd IEEE International Conference on Computing, Electronics & Communications Engineering (iCCECE 2020), IEEE, 1, 103-108, 2020, Peer-reviwed, In recent years, drug trafficking using microblogs has risen and become a social problem. A common method of cyber patrols for cracking down on crimes, such as drug trafficking, involves searching for crime-related keywords. However, criminals who post crime-inducing messages make maximum use of "codewords" rather than keywords, such as enjo kosai, marijuana, and methamphetamine, to camouflage their criminal intentions. Research suggests that these codewords change once they become popular; therefore, searching for a specific word requires significant effort to keep track of the latest codewords. In this study, we focused on the appearance of codewords and those likely to be included in incriminating posts with aim to detect codewords with the high likelihood of inclusion in incriminating posts. We proposed new methods for detecting codewords based on differences in word usage and conducted experiments on concealed-word detection in order to evaluate method effectiveness. The results showed that the proposed method was capable of detecting concealed words other than those in the initial list and to better degree relative to baseline methods. These findings demonstrated the ability of the proposed method to rapidly and automatically detect codewords that change over time and blog posts that induce crimes, thereby potentially reducing the burden of continuous monitoring of codewords.
    International conference proceedings, English
  • Detection of the hardcoded login information from socket symbols
    Minami Yoda; Shuji Sakuraba; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    3rd IEEE International Conference on Computing, Electronics & Communications Engineering (iCCECE 2020), IEEE, 1, 33-38, 2020, Peer-reviwed, Internet of Things (IoT) for smart homes enhances the convenience of our life; however, it also introduces the risk of leakage of privacy data in the house. A user wants to protect their privacy data from leakage. However, the analysis of IoT devices requires technical knowledge; therefore, it is challenging for the users to detect any vulnerability by themselves. In this study, we propose a lightweight method to detect the hardcoded username and password in IoT devices using static analysis. This method can detect the 1st vulnerability from 2018 OWASP TOP 10 for the IoT device. The hardcoded login information can be obtained by comparing the user input with strcmp or strncmp. Thus, previous studies analyzed the symbols of strcmp or strncmp to detect the hardcoded login information. However, these studies require time because of the usage of complicated algorithms such as symbolic execution. To develop a lightweight algorithm, we focus on a network function, such as the socket symbol in firmware, because the IoT device is compromised when it is invaded by someone via the Internet. We propose two methods to detect the hardcoded login information, i.e., string search and socket search. In string searching, it finds a function that uses strcmp or strncmp symbol. In socket searching, it finds a function that is referenced by socket symbol. In the experiment, we measured the ability of our method by searching six firmware in the real world that has a backdoor. we ran three methods: string search, socket search, and whole search to compare two methods. As a result, all methods found login information from four of six firmware. Our method reduces an analysis time that when the whole search takes 38mins to complete, our methods finish 4-6min.
    International conference proceedings, English
  • Why Do Users Choose a Hotel over Others? Review Analysis Using Interpretation Method of Machine Learning Models
    Takayuki Onogawa; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    IEEE International Conference Big Data Analytics (ICBDA 20201), IEEE, 1, 354-362, 2020, Peer-reviwed
    International conference proceedings, English
  • Adaptation Plan Policy in Traffic Routing for Priority Vehicle
    Krishna Priawan Hardinda; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    International Conference on Artificial Intelligence in Information and Communication (ICAIIC 2020), IEEE, 1, 113-118, 2020, Peer-reviwed
    International conference proceedings, English
  • Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process with Video Encoding
    Tatsuki Fujii; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 3rd International Conference on Applications of Intelligent Systems(APPIS), ACM, 1, 1-5, 2020, Peer-reviwed
    International conference proceedings, English
  • Model smoothing using virtual adversarial training for speech emotion estimation using spontaneity
    Masashi Aizawa; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 12th International Conference on Agents and Artificial Intelligence(ICAART2020), SCITEPRESS - Science and Technology Publications, 2, 587-594, 2020, Peer-reviwed
    International conference proceedings, English
  • Hair Shading Style Transfer for Manga with cGAN
    Masashi Aizawa; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 12th International Conference on Agents and Artificial Intelligence(ICAART2020), SCITEPRESS - Science and Technology Publications, 2, 570-577, 2020, Peer-reviwed
    International conference proceedings, English
  • Knowledge Graph of University Campus Issues and Application of Completion Methods
    Yuto Tsukagoshi; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of 21st ACM International Conference on Information Integration and Web-based Applications & Services (iiWAS2019), ACM, 304-312, Dec. 2019, Peer-reviwed, (accepted)
    International conference proceedings, English
  • Linked Dataを用いた俯瞰的な多肢選択式問題自動生成手法の提案
    奥原 史佳; 清 雄一; 田原 康之; 大須賀 昭彦
    情報処理学会論文誌, 情報処理学会, 60, 10, 1738-1756, 15 Oct. 2019, Peer-reviwed
    Scientific journal, Japanese
  • Do You Like Sclera? Sclera-region Detection and Colorization for Anime Character Line Drawings
    Masashi Aizawa; Yuichi Sei; Yasuyuki Tahara; Ryohei Orihara; Akihiko Ohsuga
    International Journal of Networked and Distributed Computing, 7, 3, 113-112, 05 Aug. 2019, Peer-reviwed
    Scientific journal, English
  • “Never fry carrots without chopping” Generating Cooking Recipes from Cooking Videos Using Deep Learning Considering Previous Process
    Tatsuki Fujii; Yuichi Sei; Yasuyuki Tahara; Ryohei Orihara; Akihiko Ohsuga
    International Journal of Networked and Distributed Computing, 7, 3, 107-112, 05 Aug. 2019, Peer-reviwed
    Scientific journal, English
  • Self-Adaptation for Heterogeneous Client-Server Online Games
    Satoru Yamagata; Hiroyuki Nakagawa; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Studies in Computational Intelligence (outstanding papers at 18th IEEE/ACIS International Conference on Computer and Information Science), Springer, 65-79, Aug. 2019, Peer-reviwed
    International conference proceedings, English
  • Mis.Config: Finding Misreferred Configuration Bugs In Web Application Using Thin Slicing
    Minami Yoda; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Studies in Computational Intelligence (outstanding papers at 18th IEEE/ACIS International Conference on Computer and Information Science), Springer, 47-64, Aug. 2019, Peer-reviwed
    International conference proceedings, English
  • Multi-task Deep Reinforcement Learning with Evolutionary Algorithm and Policy Gradients Method in 3D Control Tasks.
    Shota Imai; Yuichi Sei; Yasuyuki Tahara; Ryohei Orihara; Akihiko Ohsuga
    2019 IEEE International Conference on Big Data(BCD), IEEE, 100-105, 2019
    International conference proceedings
  • New Indicator for Centrality Measurements in Passing-network Analysis of Soccer
    Masatoshi Kanbata; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 11th International Conference on Agents and Artificial Intelligence(ICAART2018), SciTePress, 2, 616-623, 2019, Peer-reviwed
    International conference proceedings, English
  • Transforming the Emotion in Speech using a Generative Adversarial Network
    Kenji Yasuda; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 11th International Conference on Agents and Artificial Intelligence(ICAART2018), SciTePress, 2, 427-434, 2019, Peer-reviwed
    International conference proceedings, English
  • Generation of Multiple Choice Questions Including Panoramic Information using Linked Data
    Fumika Okuhara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 11th International Conference on Agents and Artificial Intelligence(ICAART2018), SciTePress, 1, 110-120, 2019, Peer-reviwed
    International conference proceedings, English
  • A Method for Goal Model Repair Based on Process Mining
    Hiroki Horita; Hideaki Hirayama; Takeo Hayase; Yasuyuki Tahara; Akihiko Ohsuga
    20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), IEEE, 1, 121-126, 2019, Peer-reviwed
    International conference proceedings, English
  • サッカーPK戦における ゲーム理論上の最適戦略とプロの戦略との差異に関する考察
    小泉 昂也; 折原 良平; 清 雄一; 田原 康之; 大須賀 昭彦
    電子情報通信学会論文誌, 電子情報通信学会, J101-D, 9, 01 Sep. 2018, Peer-reviwed
    Scientific journal, Japanese
  • パーチェス法を用いたエージェントシミュレーションによる金融機関の合併に関するシステミックリスクへの影響分析
    加藤 秀紀; 清 雄一; 田原 康之; 大須賀 昭彦
    電子情報通信学会論文誌, 電子情報通信学会, J101-D, 9, 01 Sep. 2018, Peer-reviwed
    Scientific journal, Japanese
  • Text Classification and Transfer Learning based on Character-level Deep Convolutional Neural Networks
    Minato Sato; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Agents and Artificial Intelligence (Revised selected papers from ICAART 2017), Springer, 60-81, Jun. 2018, Peer-reviwed, Invited
    International conference proceedings, English
  • 決定木学習を利用したビジネスプロセス実行ログ検証のための論理式の生成
    堀田 大貴; 平山 秀昭; 早瀬 健夫; 田原 康之; 大須賀 昭彦
    電子情報通信学会論文誌, 電子情報通信学会, J101-D, 3, 530-538, 01 Mar. 2018, Peer-reviwed
    Scientific journal, Japanese
  • Do Professional Football Players Follow the Optimal Strategies in Penalty Shootout?
    Takaya Koizumi; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 10th International Conference on Agents and Artificial Intelligence(ICAART2018), SciTePress, 2, 454-461, 2018, Peer-reviwed
    International conference proceedings, English
  • Factors Affecting Accuracy in Image Translation based on Generative Adversarial Network
    Fumiya Yamashita; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 10th International Conference on Agents and Artificial Intelligence(ICAART2018), SciTePress, 2, 446-453, 2018, Peer-reviwed
    International conference proceedings, English
  • Agent-based Simulation Model Embedded Accounting's Purchase Method; Analysis on the Systemic Risk of Mergers and Acquisitions between Financial Institutions
    Hidenori Kato; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 10th International Conference on Agents and Artificial Intelligence(ICAART2018), SciTePress, 1, 168-175, 2018, Peer-reviwed
    International conference proceedings, English
  • Anonymization and Analysis of Horizontally and Vertically Divided User Profile Databases with Multiple Sensitive Attributes
    Yuki Ina; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    13th IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI2018), IEEE, 8, 262-267, 2018, Peer-reviwed
    International conference proceedings, English
  • 家庭におけるペット-ロボットインタラクション~ロボットのふるまいに対する犬の行動調査~
    鈴木 もとこ; 清 雄一; 田原 康之; 大須賀 昭彦
    情報処理学会論文誌, 情報処理学会, 59, 11, 1799-1807, 15 Nov. 2017, Peer-reviwed, 今後ロボットが家庭に普及するために,人間とペットとロボットの3者が良い関係を築くことが大切である.我々は人とのインタラクションを目的に作られたロボットがペットと家庭で共生するために,ロボットにペットが好む行動をさせ,ペットがロボットをより好むようにすることを目標とする.本研究では,犬の世話行動をするロボットに注目した.世話行動をするケアロボットと世話行動をしないノンケアロボットの2台を用意し,ロボットが世話行動を行った後に犬がどちらのロボットをより好むか調査した.具体的には,ロボットが行う犬の世話行動は,飼い主へのアンケート結果をもとに餌やりとボール遊びの2種類とした.結果,犬は餌やりの世話行動をするケアロボットをノンケアロボットよりも有意に好むことが分かった.一方でボール遊びの世話行動については,ロボットとボール遊びをする犬としない犬の2群に分けられ,ボール遊びをする犬はボール遊びの世話行動をするケアロボットをノンケアロボットより有意に好むことが明らかになった.この知見は今後,家庭におけるロボットのペットに対する関わり方の指針となることが期待される.It is important for human beings, pets and robots to establish a good relationship in order for robots become popular to homes in the future. We are supposed to coexist between humans and robots that were made for human interaction at home. Then, let the robot take actions preferred by the pet and aim to make the robot more preferably by the pet. In this research, we focused on robots that take care of dogs. We used two robots that take care actions robot and non-care action robot, and surveyed which robot the dog likes more preferably after the robot takes care action. Specifically, the behavior of robot was two types of feeding and ball play based on the questionnaire result of the owner. As a result, it became clear that the dog significantly prefers the care robot which takes care of bait feeding than the non-care robot. On the other hand, as for the behavior of taking care of the ball play, it is divided into two groups: a dog which play ball with a robot, a dog which does not play ball with a robot. It became clear that dogs playing balls significantly prefer care robots to take care of ball playing than non-care robots. It is expected that this finding will be a guide for how robots are involved in pets at home.
    Scientific journal, Japanese
  • Formal Verification of Dynamic Evolution Processes of UML Models Using Aspects
    Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Proceedings - 2017 IEEE/ACM 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2017, Institute of Electrical and Electronics Engineers Inc., 152-162, 03 Jul. 2017, Peer-reviwed, The rapidly changing requirements and environments of system operation demand dynamic changes to systems with as short downtimes as possible. System availability is a relevant feature for such dynamic changes, which we call dynamic evolution. One of the most promising approaches to highly available dynamic evolution is dynamic aspect weaving, a technique of aspect-oriented programming technology. It enables part of a program to dynamically change without stopping its execution. Another feature relevant to dynamic evolution is the assurance of correctness of evolution. However, this is not easy for dynamic evolution, mainly because the evolution process is rather complicated. Formal modeling and verification (specifically, model checking) are other promising technologies. Many researchers have proposed various approaches to model and verify dynamic evolution. However, highly available dynamic evolution processes tend to be too complicated to verify with existing techniques because such processes need to be simultaneously controlled with system functionalities and the operations for evolution that include dynamic aspect weaving. We propose a formal verification tool called CAMPer that analyzes the unified modeling language (UML) models of dynamic evolution processes that consist of multiple steps with sophisticated control that includes dynamic aspect weaving. This tool is able to verify functional requirements for the processes that would be complicated to attain high availability. Our approach uses the Maude specification language to systematically express dynamic evolution and dynamic aspect weaving by using reflection. We also used a model checker for Maude to verify the evolution processes. We conducted experiments using an example Tele Assistance System (TAS) to demonstrate the advantages of our approach and evaluate its feasibility.
    International conference proceedings, English
  • Fast Many-to-One Voice Conversion using Autoencoders
    Yusuke Sekii; Ryohei Orihara; Keisuke Kojima; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    ICAART: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2, SCITEPRESS, 2, 164-174, 2017, Peer-reviwed, Most of voice conversion (VC) methods were dealing with a one-to-one VC issue and there were few studies that tackled many-to-one / many-to-many cases. It is difficult to prepare the training data for an application with the methods because they require a lot of parallel data. Furthermore, the length of time required to convert a speech by Deep Neural Network (DNN) gets longer than pre-DNN methods because the DNN-based methods use complicated networks. In this study, we propose a VC method using autoencoders in order to reduce the amount of the training data and to shorten the converting time. In the method, higher-order features are extracted from acoustic features of source speakers by an autoencoder trained with source speakers' data. Then they are converted to higher-order features of a target speaker by DNN. The converted higher-order features are restored to the acoustic features by an autoencoder trained with data drawn from the target speaker. In the evaluation experiment, the proposed method outperforms the conventional VC methods that use Gaussian Mixture Models (GMM) and DNNs in both one-to-one conversion and many-to-one conversion with a small training set in terms of the conversion accuracy and the converting time.
    International conference proceedings, English
  • Japanese Text Classification by Character-level Deep ConvNets and Transfer Learning
    Minato Sato; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    ICAART: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2, SCITEPRESS, 2, 175-184, 2017, Peer-reviwed, Temporal (one-dimensional) Convolutional Neural Network ( Temporal CNN, ConvNet) is an emergent technology for text understanding. The input for the ConvNets could be either a sequence of words or a sequence of characters. In the latter case there are no needs for natural language processing that depends on a language such as morphological analysis. Past studies showed that the character-level ConvNets worked well for news category classification and sentiment analysis / classification tasks in English and romanized Chinese text corpus. In this article we apply the character-level ConvNets to Japanese text understanding. We also attempt to reuse meaningful representations that are learned in the ConvNets from a large-scale dataset in the form of transfer learning, inspired by its success in the field of image recognition. As for the application to the news category classification and the sentiment analysis and classification tasks in Japanese text corpus, the ConvNets outperformed N-gram-based classifiers. In addition, our ConvNets transfer learning frameworks worked well for a task which is similar to one used for pre-training.
    International conference proceedings, English
  • An Observation of Behavioral Changes of Indoor Dogs in Response to Caring Behavior by Humanoid Robots Can Dogs and Robots Be Companions?
    Motoko Suzuki; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    ICAART: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2, SCITEPRESS, 2, 481-488, 2017, Peer-reviwed, The aim of our research is to build good relationships between pets and robots at home. We aim to promote of positive interaction between pets and robots. Recently, robots have been become popular with the general populace. There is a lot of research in human-robot interaction. We pay attention to pets that live in houses with humans. It is required for pets to like robots for positive interactions between pets and robots to exist. In this paper, we examine that 1) a robot can take care of dog, and 2) dogs and robots can be companion by caring behavior of robots toward dogs. In our experiment, we used two robots. One of the robots takes care of a dog, while the other does not. We observed which robot the dog chooses to interact with and had seventeen dogs participate in this study. We performed this statistical test to judge whether the dogs treated the robots with any significant differences.
    International conference proceedings, English
  • Sarcasm Detection Method to Improve Review Analysis
    Shota Suzuki; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    ICAART: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 2, SCITEPRESS, 2, 519-526, 2017, Peer-reviwed, Currently, classifying sarcastic sentences into positive and negative sentiments has been a difficult problem and an important task. The sarcastic sentences could indicate negative meaning by using positive expressions, or positive meaning by using negative expressions. Sarcasm is a special kind of sentiment that comprise of words which mean the opposite of what you really want to say, especially in order to insult or wit someone, to show irritation, or to be funny. Therefore, determining sarcasm is an important task in order to correctly classify the sentence. In this paper, we propose an approach to detect sarcasm. First, we apply dependency parsing to amazon review data. After that, we classify phrases in the sentence into the proposed phrase based on the sequence of part-of-speech as proposed by Bharti et al. After being classified into either one of the phrase types, it is determined whether each phrase is positive or negative. If the emotions of the situation phrases and the sentiment phrases are different, the sentence is determined to be a "sarcasm". Using the above method, the experimental result shows the effectiveness of our method as compared with the the existing research.
    International conference proceedings, English
  • Proposal of l-Diversity Algorithm Considering Distance between Sensitive Attribute Values
    Keiichiro Oishi; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    The 8th IEEE Symposium on Computational Intelligence and Data Mining (CIDM2017), IEEE, 1, 2065-2072, 2017, Peer-reviwed
    International conference proceedings, English
  • User participatory construction of open hazard data for preventing bicycle accidents
    Ryohei Kozu; Takahiro Kawamura; Shusaku Egami; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 10675, 289-303, 2017, Peer-reviwed, Recently, bicycle-related accidents, e.g., collision accidents at intersection increase and account for approximately 20% of all traffic accidents in Japan
    thus, it is regarded as one of the serious social problems. However, the Traffic Accident Occurrence Map released by the Japanese Metropolitan Police Department is currently based on accident information records, and thus there are a number of near-miss events, which are overlooked in the map but will be useful for preventing the possible accidents. Therefore, we detect locations with high possibility of bicycle accidents using user participatory sensing and offer them drivers and government officials as Open Hazard Data (OHD) to prevent future bicycle accident. This paper uses smartphone sensors to obtain data for acceleration, location, and handle rotation information. Then, by classifying those data with convolutional neural networks, it was confirmed that the locations, where sudden braking occurred can be detected with an accuracy of 80%. In addition, we defined an RDF model for OHD that is currently publicly available. In future, we plan to develop applications using OHD, e.g., notifying alerts when users are approaching locations where near-miss events have occurred.
    International conference proceedings, English
  • 放置自転車問題解決に向けた循環型LOD構築システムの提案
    江上周作; 川村隆浩; 清雄一; 田原康之; 大須賀昭彦
    人工知能学会論文誌, (株) オーム社, 31, 1, AI30-K_1-AI30-K_12, Nov. 2016, Peer-reviwed
    Scientific journal, Japanese
  • Sake Selection Support Application for Countryside Tourism
    Teruyuki Iijima; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Transactions on Large-Scale Data and Knowledge-Centered Systems XXVII, Springer, 9860, 19-30, Sep. 2016, Peer-reviwed
    Scientific journal, English
  • A Solution to Visualize Open Urban Data for Illegally Parked Bicycles
    Shusaku Egami; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Transactions on Large-Scale Data and Knowledge-Centered Systems XXVII, Springer, 9860, 129-141, Sep. 2016, Peer-reviwed
    Scientific journal, English
  • Goal achievement analysis based on LTL checking and decision tree for improvements of PAIS
    Hiroki Horita; Hideaki Hirayama; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the ACM Symposium on Applied Computing, Association for Computing Machinery, 04-08-, 1214-1216, 04 Apr. 2016, Peer-reviwed, Process aware information system (PAIS) is important in the recent business environment. Developments of PAIS need to consider contexts about technical and business elements. They are needed to develop PAIS effectively (e.g. monitoring environment and constructing adequate business process). Process mining is an important method for analyzing a business environment and utilizing PAIS development and improvement. LTL checking is an important method for checking a specific property to be satisfied with business processes, but correctly writing formal language like LTL is difficult. In this paper, we use LTL checking and prediction based on decision-tree learning for checking goal achievement, false detection and oversight detection. It helps writing properly LTL formula for representing the correct goal property. We conducted a case study using a real life log of traffic fine management process in Italy.
    International conference proceedings, English
  • ゴール指向洗練パターン駆動によるユースケースモデリング
    本田 耕三; 平山 秀昭; 中川 博之; 田原 康之; 大須賀 昭彦
    電子情報通信学会論文誌, 電子情報通信学会, J99-D, 3, 238-254, 01 Mar. 2016, Peer-reviwed
    Scientific journal, Japanese
  • 組込み向け進化型ソフトウェアの効率的な拡張性強化手法
    佐々木 隆益; 吉岡 信和; 田原 康之; 大須賀 昭彦
    情報処理学会論文誌, 情報処理学会, 57, 2, 730-744, Feb. 2016, Peer-reviwed, 市場ニーズの変化速度に対応した製品開発プロセスとしてアジャイル開発プロセスのようなライトウェイトな開発プロセスが台頭してきている.アジャイルも含め,このような進化型ソフトウェアは,継続的にリファクタリングを施しながらの機能開発を行う.特に組込みシステムでは,関連するハードウェアの個別進化に対しても,システムとしての対応が必要であり,拡張性や可変性の設計がなされていないと,製品リリースが進むにつれ,メンテナンス性の悪化を引き起こしやすくなる.本稿では継続的に発生する将来の機能追加において,システムの拡張性を強化する情報の提供を目的とし,ソースコードから,自動的に拡張性の構造を抽出し,拡張性を強化すべき箇所を特定,強化方法を提示する手法を提案する.さらに継続的に機能追加された実際の製品コードに対し,提案手法を適用した結果,提案手法の有効性を確認することができた.Light weight development processes like Agile have emerged in response to rapidly changing market requirements. However software evolution processes including Agile are inadequate for software in embedded systems, as software undergoes frequent refactoring, targeting only immediate requirements. As a result maintainability decreases because the system is not designed to respond to changes in the associated hardware. In this paper, we propose a method for improving of extensibility. We also propose a technique for detecting and suggesting extensible design pattern automatically. Our approach is based on analyses of the call graph and the inheritance structure of source code to identify a layer structure that is specific to embedded software. These techniques provide us with objective and quantitative information about extensibility. We applied the proposal method to an actual product's code continuously and could verify an improvement in system's extensibility.
    Scientific journal, Japanese
  • A solution to visualize open urban data for illegally parked bicycles
    Shusaku Egami; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 9860, 129-141, 2016, Peer-reviwed, The illegal parking of bicycles is becoming an urban problem in Japan and other countries. We believe the data publication of such urban problems on the Web as Open Data will contribute to solving the problems. However, Open Data sets available for the illegally parked bicycles are coarse and in various formats, and then it is difficult to develop information services using the data. In this study, we thus build an ecosystem that generates Open Urban Data in Link Data format by socially collecting the data, complementing the missing data, and then visualizing the data to facilitate and raise social awareness of the problem. In our experiment, 747 pieces of information on the illegally parked bicycles in Tokyo were collected, and then we estimated the unknown number of the illegally parked bicycles with 64.3% accuracy. Then, we published the data as the Open Data, and also a web application, which visualizes the distribution of the illegally parked bicycles on a map.
    International conference proceedings, English
  • Iterative Improvement of Human Pose Classification Using Guide Ontology
    Kazuhiro Tashiro; Takahiro Kawamura; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, E99D, 1, 236-247, Jan. 2016, Peer-reviwed, The objective of this paper is to recognize and classify the poses of idols in still images on the web. The poses found in Japanese idol photos are often complicated and their classification is highly challenging. Although advances in computer vision research have made huge contributions to image recognition, it is not enough to estimate human poses accurately. We thus propose a method that refines result of human pose estimation by Pose Guide Ontology (PGO) and a set of energy functions. PGO, which we introduce in this paper, contains useful background knowledge, such as semantic hierarchies and constraints related to the positional relationship between body parts. Energy functions compute the right positions of body parts based on knowledge of the human body. Through experiments, we also refine PGO iteratively for further improvement of classification accuracy. We demonstrate pose classification into 8 classes on a dataset containing 400 idol images on the web. Result of experiments shows the efficiency of PGO and the energy functions; the F-measure of classification is 15% higher than the non-refined results. In addition to this, we confirm the validity of the energy functions.
    Scientific journal, English
  • Estimation of Interpersonal Relationships in Movies
    Yuta Ohwatari; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG, E99D, 1, 128-137, Jan. 2016, Peer-reviwed, In many movies, social conditions and awareness of the issues of the times are depicted in any form. Even if fantasy and science fiction are works far from reality, the character relationship does mirror the real world. Therefore, we try to understand social conditions of the real world by analyzing the movie. As a way to analyze the movies, we propose a method of estimating interpersonal relationships of the characters, using a machine learning technique called Markov Logic Network (MLN) from movie script databases on the Web. The MLN is a probabilistic logic network that can describe the relationships between characters, which are not necessarily satisfied on every line. In experiments, we confirmed that our proposed method can estimate favors between the characters in a movie with F-measure of 58.7%. Finally, by comparing the relationships with social indicators, we discussed the relevance of the movies to the real world.
    Scientific journal, English
  • Linked data collection and analysis platform for music information retrieval
    Yuri Uehara; Takahiro Kawamura; Shusaku Egami; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 10055, 127-135, 2016, Peer-reviwed, There has been extensive research on music information retrieval (MIR), such as signal processing, pattern mining, and information retrieval. In such studies, audio features extracted from music are commonly used, but there is no open platform for data collection and analysis of audio features. Therefore, we build the platform for the data collection and analysis for MIR research. On the platform, we represent the music data with Linked Data, which are in a format suitable for computer processing, and also link data fragments to each other. By adopting the Linked Data, the music data will become easier to publish and share, and there is an advantage that complex music analysis will be facilitated. In this paper, we first investigate the frequency of the audio features used in previous studies on MIR for designing the Linked Data schema. Then, we build a platform, that automatically extracts the audio features and music metadata from YouTube URIs designated by users, and adds them to our Linked Data DB. Finally, the sample queries for music analysis and the current record of music registrations in the DB are presented.
    International conference proceedings, English
  • Linked Data Collection and Analysis Platform of Audio Features
    Yuri Uehara; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Workshop and Poster of the 6th Joint International Semantic Technology Conference (JIST), CEUR-WS.org, 2016, 78-81, 2016, Peer-reviwed
    International conference proceedings, English
  • Process Mining Approach Based on Partial Structures of Event Logs and Decision Tree Learning
    Hiroki Horita; Hideaki Hirayama; Takeo Hayase; Yasuyuki Tahara; Akihiko Ohsuga
    PROCEEDINGS 2016 5TH IIAI INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS IIAI-AAI 2016, IEEE, 2016, 113-118, 2016, Peer-reviwed, Process mining techniques are able to improve processes by extracting knowledge from event logs commonly available in today 's information systems. In the area, it is important to verify whether business goals can be satisfied. LTL (Linear Temporal Logic) verification is an important means for checking the goals automatically and exhaustively. However, writing formal language like LTL is difficult, and the properties by which the user's intentions are not reflected sufficiently have bad influence on the verification results. Therefore, it is needed to help writing correct LTL formula for users who do not have sufficient domain knowledge and knowledge of mathematical logic. We propose an approach for goal achievement prediction based on decision tree learning. It is conducted focusing on partial structures represented as event order relations of each trace. The proposed technique is evaluated on a phone repair process log.
    International conference proceedings, English
  • Schema Design of Illegally Parked Bicycles LOD
    Shusaku Egami; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    PROCEEDINGS 2016 5TH IIAI INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS IIAI-AAI 2016, IEEE, 2016, 692-697, 2016, Peer-reviwed, Illegally parked bicycles are a social problem in Japan and other countries. Illegally parked bicycles obstruct vehicles, cause road accidents, encourage thefts, and disfigure streets. In order to solve the challenge posed by illegally parked bicycles, we realized that it is necessary to collect and republish the data as reusable format. Therefore, we collected the number of illegally parked bicycles, location information, time, and factors. Then, we integrated and republished these data as Linked Open Data (LOD) on the Web. In this paper, we described a schema design of illegally parked bicycles LOD and a methodology of designing LOD schema. Furthermore, we collected data from SNS and website of municipality, and built the LOD of 21,898 triples.
    International conference proceedings, English
  • Business Process Verification and Restructuring LTL Formula Based on Machine Learning Approach
    Hiroki Horita; Hideaki Hirayama; Takeo Hayase; Yasuyuki Tahara; Akihiko Ohsuga
    COMPUTER AND INFORMATION SCIENCE, SPRINGER INT PUBLISHING AG, 656, 89-102, 2016, Peer-reviwed, It is important to deal with rapidly changing environments (regulations, customer behavior change, and process improvement etc.) to keep achieving business goals. Therefore, verification for business process in various phases are needed to make sure of goal achievements. LTL (Linear Temporal Logic) verification is an important method for checking a specific property to be satisfied with business processes, but correctly writing formal language like LTL is difficult. Lacks of domain knowledge and knowledge of mathematical logics have bad influence on writing LTL formulas. In this paper, we use LTL verification and prediction based on decision tree learning for verification of specific properties. Furthermore, we helps writing properly LTL formula for representing the correct desirable property using decision tree constrction. We conducted a case study for evaluations.
    International conference proceedings, English
  • Visualization of Open Urban Data for Illegally Parked Bicycles
    Shusaku Egami; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    CompleXity: Technology for Complex Urban Systems in the 49th Hawaii International Conference on System Sciences (HICSS-49), 2016, 2016, Peer-reviwed
    International conference proceedings, English
  • Sake selection support application for countryside tourism
    Teruyuki Iijima; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 9860, 19-30, 2016, Peer-reviwed, For the upcoming Tokyo Olympic Paralympic Games in 2020, the number of foreign tourists coming to Japan is expected to rise. However, there has been a problem with tourists becoming less likely to visit places outside of the urban areas. In order to solve this issue, a commitment has been made by the government to use “Sake Brewery Tour” to draw tourists to less populated areas. The purpose of this study is to find a way to encourage foreign interest to sake and sake brewers, and participant in “Sake Brewery Tours”. We developed an application for the foreign tourists who are not much interested in sake. The approach of the study involved the presentation of sake selection in connection with wines, which have surprising similarities to the sakes, and encourage the tourists access sake brewer sites. 20 test users used the application, and the average screen residence time was 55 (sec) including the sake brewer sites, which was longer than the application for comparison, which shows the sake information alone. Therefore, we confirmed that the users come to have an interest in sake and sake brewers by showing the surprising connections with wine.
    International conference proceedings, English
  • リファインメントパターンを利用したKAOSゴールモデルからBPMNモデルへの変換
    堀田 大貴; 本田 耕三; 平山 秀昭; 清 雄一; 中川 博之; 田原 康之; 大須賀 昭彦
    コンピュータソフトウェア, 岩波書店, 32, 4, 141-160, Nov. 2015, Peer-reviwed
    Scientific journal, Japanese
  • News Curation Service using Semantic Graph Matching
    Ryohei Yokoo; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proc. of SEMAPRO 2015, IARIA, 2015, 25-31, 19 Jul. 2015, Peer-reviwed
    International conference proceedings, English
  • 意外性のあるレシピを推薦するエージェントの提案
    池尻 恭介; 清 雄一; 中川 博之; 田原 康之; 大須賀 昭彦
    電子情報通信学会論文誌, 電子情報通信学会, J98-D, 12, 971-981, Jun. 2015, Peer-reviwed
    Scientific journal, Japanese
  • 語句間の意味的リレーションに基づくキュレーションエージェント
    横尾 亮平; 川村 隆浩; 清 雄一; 田原 康之; 大須賀 昭彦
    電子情報通信学会論文誌, 電子情報通信学会, J98-D, 12, 982-991, Jun. 2015, Peer-reviwed
    Scientific journal, Japanese
  • Activity Recognition for Dogs Using Off-the-Shelf Accelerometer
    Tatsuya Kiyohara; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of ICAART 2015, SciTePress, 2015, 100-110, 09 Jan. 2015, Peer-reviwed
    International conference proceedings, English
  • CGMにおける炎上の分析とその応用
    岩崎 祐貴; 折原 良平; 清 雄一; 中川 博之; 田原 康之; 大須賀 昭彦
    人工知能学会論文誌, (株) オーム社, 30, 1, 1-9, Jan. 2015, Peer-reviwed
    Scientific journal, Japanese
  • Estimation of Character Diagram from Open-Movie Databases for Cultural Understanding
    Yuta Ohwatari; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    2015 IEEE 9TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), IEEE, 2015, 208-215, 2015, Peer-reviwed, In many movies, cultures, social conditions, and awareness of the issues of the times are depicted in any form. Even if fantasy and SF are works far from reality, the stories do mirror the real world. Therefore, we assumed to be able to understand social conditions and cultures of the real world by analyzing the movie. As a way to analyze the film, we decided to estimate the interpersonal relationships between the characters in the movies. In this paper, we propose a method of estimating interpersonal relationships of the characters using Markov Logic Network from movie script databases on the Web. Markov Logic Network is a probabilistic logic network that can describe the relationships between characters, which are not necessarily satisfied on every occasion. In experiments, we confirmed that our proposed method can estimate favors between the characters in a movie with a precision of 64.2%. Finally, by comparing the estimated relationships with social indicators, we discussed the relevance of the movie to the real world.
    International conference proceedings, English
  • Activity Recognition for Dogs Based on Time-series Data Analysis
    Tatsuya Kiyohara; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    AGENTS AND ARTIFICIAL INTELLIGENCE, ICAART 2015, SPRINGER INT PUBLISHING AG, 9494, 163-184, 2015, Peer-reviwed, Dogs are one of the most popular pets in the world, and more than 10 million dogs are bred annually in Japan now [4]. Recently, primitive commercial services have been started that record dogs' activities and report them to their owners. Although it is expected that an owner would like to know the dog's activity in greater detail, a method proposed in a previous study has failed to recognize some of the key actions. The demand for their identification is highlighted in responses to our questionnaire. In this paper, we show a method to recognize the actions of the dog by attaching only one off-the-shelf acceleration sensor to the neck of the dog. We apply DTW-D which is the state-of-the-art time series data search technique for activity recognition. Application of DTW-D to activity recognition of an animal is unprecedented according to our knowledge, and thus is the main contribution of this study. As a result, we were able to recognize eleven different activities with 75.1% classification F-measure. We also evaluate the method taking account of real-world use cases.
    International conference proceedings, English
  • Decision Making Strategy Based on Time Series Data of Voting Behavior
    Shogo Higuchi; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    AI 2015: ADVANCES IN ARTIFICIAL INTELLIGENCE, SPRINGER-VERLAG BERLIN, 9457, 229-241, 2015, Peer-reviwed, In gambling such as horse racing, we are sometimes able to peep peculiar voting behavior by a punter with the advantageous information closely related to the results. The punter is often referred as an insider. In this study, our goal is to propose a reasonable investment strategy by peeping insiders' decision-making based on the time series odds data in horse racing events held by JRA. We have found the conditions that the rate of return is more than 642 % for races whose winner's prize money is 20 million yens or more. That suggests the possibility of Knowledge Peeping.
    International conference proceedings, English
  • Towards the Elimination of the Miscommunication Between Users in Twitter
    Tomoaki Ueda; Ryohei Orihara; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    AI 2015: ADVANCES IN ARTIFICIAL INTELLIGENCE, SPRINGER-VERLAG BERLIN, 9457, 589-595, 2015, Peer-reviwed, In recent years, a Twitter response from another user who does not share the intentions and expectations of the original poster may cause discomfort and stress, which is a social phenomenon known as SNS fatigue. For example, a user may receive answers that are different from her/his expectation after the user posts a question on the timeline. In the background of such responses there is a miscommunication between users. In order to resolve the problem, it is important to know what the original poster expected as responses to her/his tweet. In this paper, we propose a classification method of tweets according to the response that users expect, and experimentally evaluate it. As a result, we have shown that tweets which the poster does not expect any replies can be classified with 76.2 % of the average precision.
    International conference proceedings, English
  • Performance Exploring Using Model Checking A Case Study of Hard Disk Drive Cache Function
    Takehiko Nagano; Kazuyoshi Serizawa; Nobukazu Yoshioka; Yasuyuki Tahara; Akihiko Ohsuga
    The Tenth International Conference on Software Engineering Advances (ICSEA), 2015, 31-39, 2015, Peer-reviwed
    International conference proceedings, English
  • A Method for Efficient Extensibility Improvements in Embedded Software Evolution
    Takanori Sasaki; Nobukazu Yoshioka; Yasuyuki Tahara; Akihiko Ohsuga
    7th International Conference on Software Technology and Engineering (ICSTE), 2015, 12, 1375-1388, 2015, Peer-reviwed
    International conference proceedings, English
  • Towards Goal-Oriented Conformance Checking
    Hiroki Horita; Hideaki Hirayama; Yasuyuki Tahara; Akihiko Ohsuga
    International Conference on Software Engineering and Knowledge Engineering (SEKE), KSI Research Inc. and Knowledge Systems Institute Graduate School, 2015, 722-724, 2015, Peer-reviwed
    International conference proceedings, English
  • Estimation of Character Diagram from Open Movie Database using Markov Logic Network
    Yuta Ohwatari; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 4th Joint International Semantic Technology Conference, Springer, 2014, 124-127, 09 Nov. 2014, Peer-reviwed
    International conference proceedings, English
  • News Recommendation based on Semantic Relations between Events
    Ryohei Yoko; Takahiro Kawamura; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the 4th Joint International Semantic Technology Conference, Springer, 2014, 128-131, 09 Nov. 2014, Peer-reviwed
    International conference proceedings, English
  • Human Pose Guide Ontologyを用いた静止画像内人物のポーズ分類
    田代 和浩; 川村 隆浩; 清 雄一; 中川 博之; 田原 康之; 大須賀 昭彦
    コンピュータソフトウェア, 岩波書店, 31, 3, 58-69, Aug. 2014, Peer-reviwed
    Scientific journal, Japanese
  • 希少性と一般性に基づいた意外性のある食材の抽出
    池尻 恭介; 清 雄一; 中川 博之; 田原 康之; 大須賀 昭彦
    コンピュータソフトウェア, 岩波書店, 31, 3, 70-78, Aug. 2014, Peer-reviwed
    Scientific journal, Japanese
  • ソフトウェア再利用に向けた共通ゴール判別手法の提案
    中村 祐貴; 本田 耕三; 中川 博之; 田原 康之; 大須賀 昭彦
    コンピュータソフトウェア, 岩波書店, 31, 2, 67-84, May 2014, Peer-reviwed
    Scientific journal, Japanese
  • Music Recommender Adapting Implicit Context Using ‘renso’ Relation among Linked Data
    Mian Wang; Takahiro Kawamura; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Journal of Information Processing (JIP), Information Processing Society of Japan, 22, 2, 279-288, Apr. 2014, Peer-reviwed
    Scientific journal, English
  • Surprising Recipe Extraction Based on Rarity and Generality of Ingredients
    Kyosuke Ikejiri; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proc. of ICAART 2014, SciTePress, 2014, 428-436, Mar. 2014, Peer-reviwed
    International conference proceedings, English
  • Identification of Flaming and Its Applications in CGM: Case Studies toward Ultimate Prevention
    Yuki Iwasaki; Ryohei Orihara; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proc. of ICAART 2014, SciTePress, 2014, 639-644, Mar. 2014, Peer-reviwed
    International conference proceedings, English
  • Music recommender adapting implicit context using 'renso' relation among Linked Data
    Mian Wang; Takahiro Kawamura; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Journal of Information Processing, Information Processing Society of Japan, 22, 2, 279-288, 2014, Peer-reviwed, The existing music recommendation systems rely on user's contexts or content analysis to satisfy the users' music playing needs. They achieved a certain degree of success and inspired future researches to get more progress. However, a cold start problem and the limitation to the similar music have been pointed out. Therefore, this paper proposes a unique recommendation method using a 'renso' alignment among Linked Data, aiming to realize the music recommendation agent in smartphone. We first collect data from Last.fm, Yahoo! Local, Twitter and LyricWiki, and create a large scale of Linked Open Data (LOD), then create the 'renso' relation on the LOD and select the music according to the context. Finally, we confirmed an evaluation result demonstrating its accuracy and serendipity. © 2014 Information Processing Society of Japan.
    Scientific journal, English
  • Software development PBL focusing on communication using Scrum
    Satoru Kizaki; Yasuyuki Tahara; Akihiko Ohsuga
    2014 IIAI 3RD INTERNATIONAL CONFERENCE ON ADVANCED APPLIED INFORMATICS (IIAI-AAI 2014), IEEE, 662-669, 2014, Peer-reviwed, In this paper, we improved the PBL (Project-Based Learning) environment aiming at the collaborative-software development education by industry-university cooperation. In the fiscal year 2011, the agile technique adopted as the software development process, and the small-scale project was fried. However, there were problems like the shortage of communication between members, the customers and difference of a member's technical capabilities and the burden was placed to the individual. In the fiscal year 2012/2013, in order to solve these problems, the development process "Scrum" was adopted. We analyzed the result of projects. In the result, Scrum was being able to perform problem solving in which the member's diversity was harnessed. It could carry out improved relations as the team by the positive participation in customer's projects. And, it could build the communication base by "making the place team". Therefore, we understood using Scrum for success of projects.
    International conference proceedings, English
  • A MAPE Loop Control Pattern for Heterogeneous Client/Server Online Games
    Satoru Yamagata; Hiroyuki Nakagawa; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    International Conference on Software Engineering & Knowledge Engineering (SEKE), Knowledge Systems Institute Graduate School, 742-743, 2014, Peer-reviwed
    International conference proceedings, English
  • Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software
    Takanori Sasaki; Nobukazu Yoshioka; Yasuyuki Tahara; Akihiko Ohsuga
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014, SPRINGER-VERLAG BERLIN, 466, 252-269, 2014, Peer-reviwed, Light weight development processes like Agile have emerged in response to rapidly changing market requirements. However such processes are inadequate for software in embedded systems. As embedded software undergoes frequent refactoring, targeting only immediate requirements. As a result maintainability decreases because the system is not designed to respond to changes in the associated hardware. In this paper, we propose a method for detection of variation points and variability mechanisms. We also propose a technique for evaluation of flexibility to changes. Our approach is based on analyses of the call graph and the inheritance structure of source code to identify a layer structure that is specific to embedded software. These techniques provide us with objective and quantitative information about costs of adding functionality. We applied the proposal method to an actual product's code before and after the refactoring and could verify an improvement in system's variability.
    International conference proceedings, English
  • Context-Aware Music Recommendation with Serendipity Using Semantic Relations
    Mian Wang; Takahiro Kawamura; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    SEMANTIC TECHNOLOGY, SPRINGER-VERLAG BERLIN, 8388, 17-32, 2014, Peer-reviwed, A goal for the creation and improvement of music recommendation is to retrieve users' preferences and select the music adapting to the preferences. Although the existing researches achieved a certain degree of success and inspired future researches to get more progress, problem of the cold start recommendation and the limitation to the similar music have been pointed out. Hence we incorporate concept of serendipity using 'renso' alignments over Linked Data to satisfy the users' music playing needs. We first collect music-related data from Last. fm, Yahoo! Local, Twitter and LyricWiki, and then create the 'renso' relation on the Music Linked Data. Our system proposes a way of finding suitable but novel music according to the users' contexts. Finally, preliminary experiments confirm balance of accuracy and serendipity of the music recommendation.
    International conference proceedings, English
  • Transformation approach from KAOS goal models to BPMN models using refinement patterns
    Hiroki Horita; Kozo Honda; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the ACM Symposium on Applied Computing, Association for Computing Machinery, 2014, 1023-1024, 2014, Peer-reviwed, It is important to make sure that software satisfies stakeholders' requirements. However, as software has been getting more large-scale and complicated in recent years, it has certainly become more difficult to satisfy requirements. Even if there are goal-oriented requirements analysis approaches as techniques to systematically satisfy stakeholders' requirements, it is still difficult to maintain consistency of goal models and other requirements artifacts. In this paper, we propose a transformation approach that transforms models of KAOS, a well-known goal modeling methodology, into preliminary BPMN models by using refinement pattern of KAOS in a systematic way. It can assure consistency between systematically defined user's requirements and their realization process. Copyright 2014 ACM.
    International conference proceedings, English
  • Refinement of Ontology-constrained Human Pose Classification
    Kazuhiro Tashiro; Takahiro Kawamura; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    2014 IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), IEEE, 2014, 60-67, 2014, Peer-reviwed, In this paper, we propose an image classification method that recognizes several poses of idol photographs. The proposed method takes unannotated idol photos as input, and classifies them according to their poses based on spatial layouts of the idol in the photos. Our method has two phases; the first one is to estimate the spatial layout of ten body parts (head, torso, upper and lower arms and legs) using Eichner's Stickman Pose Estimation. The second one is to classify the poses of the idols using Bayesian Network classifiers. In order to improve accuracy of the classification, we introduce Pose Guide Ontology (PGO). PGO contains useful background knowledge, such as semantic hierarchies and constraints related to the positional relationship between the body parts. The location information of body parts is amended by PGO. We also propose iterative procedures for making further refinements of PGO. Finally, we evaluated our method on a dataset consisting of 400 images in 8 poses, and the final results indicated that F-measure of the classification has become 15% higher than non-amended results.
    International conference proceedings, English
  • Towards Software Evolution for Embedded Systems Based on MAPE Loop Encapsulation
    Hiroyuki Nakagawa; Takumitsu Kudo; Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS (SASO), IEEE, 2014, 203-204, 2014, Peer-reviwed, Software evolution is an essential activity that adapts existing software to changes in requirements. Because of recent rapid requirements changes, systems are strongly required to evolve even if the target systems are embedded systems, whose implementation code is generally hard to be changed. This paper discusses the feasibility of applying self-adaptation mechanism for software evolution. We use the MAPE loop mechanism to evolve embedded systems without changing code inside the existing systems. This paper also reports preliminary results that we experimentally evolved a cleaning robot by following our approach. Our demonstrations show a part of additional behaviors as the results of software evolution that makes the cleaning robot possible to move obstacles. We also discuss the future directions of software evolution for embedded systems with the self-adaptive mechanism.
    International conference proceedings, English
  • メディア情報のLinked Data 化と活用事例の提案
    川村 隆浩; 越川 兼地; 中川 博之; 清 雄一; 田原 康之; 大須賀 昭彦
    電子情報通信学会論文誌, 電子情報通信学会, J96-D, 12, 531-542, Dec. 2013, Peer-reviwed
    Scientific journal, Japanese
  • Classification of Idol Photography Based on Pose Guide Ontology
    Kazuhiro Tashiro; Takahiro Kawamura; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proc. of JIST 2013, 2013, Nov. 2013, Peer-reviwed
    International conference proceedings, English
  • タグクラスタ多様化による未知性を考慮した推薦手法の提案
    藤原 誠; 中川 博之; 田原 康之; 大須賀 昭彦
    電子情報通信学会論文誌, The Institute of Electronics, Information and Communication Engineers, J96-D, 3, 531-542, Mar. 2013, Peer-reviwed, 近年推薦システムの研究において,その有用性は予測精度(適合率,再現率)の高さとされていたが,既存の推薦方法では,ユーザは予測精度の高さだけでは満足しないということが報告されている.したがって,今後の推薦システムの課題として,未知性や意外性といった予測精度以外の新たな観点が重要とされている.こうした課題を踏まえ,本論文では推薦リストの未知性という観点に着目し,ユーザの嗜好に合致するが,まだ知らないコンテンツの発見を促す推薦手法を提案する.多面的に付与されたタグの話題単位で推薦リストを多様化することにより,予測精度を維持しつつ,未知性を向上させる.評価実験の結果,推薦リストの約6割に嗜好に合致し,かつ知らないコンテンツが含まれ,未知性の高い推薦が実現できていることを確認した.
    Scientific journal, Japanese
  • Toward information sharing of natural disaster: Proposal of timeline action network
    The-Minh Nguyen; Takahiro Kawamura; Yasuyuki Tahara; Akihiko Ohsuga
    Communications in Computer and Information Science, Springer Verlag, 358, 145-157, 2013, Peer-reviwed, In emergency situations such as earthquake, typhoon, it is important to share people's actions in real-time. Therefore, in this paper, we first design a timeline action network based on Web Ontology Language (OWL) in order to represent these actions in real-time. We then use our previous work to automatically collect data for the action network from Twitter. Finally, we propose a novel action-based collaborative filtering, which predicts missing activity data, in order to complement this timeline action network. Moreover, with a combination of collaborative filtering and natural language processing (NLP), our method can deal with minority actions such as successful actions. Based on evaluation of tweets which related to the massive Tohoku earthquake, we indicated that our timeline action network can share useful action patterns in real-time. Not only earthquake disaster, our research can also be applied to other disasters and business models, such as typhoon, travel, marketing, etc. © Springer-Verlag Berlin Heidelberg 2013.
    International conference proceedings, English
  • Towards solving an obstacle problem by the cooperation of UAVs and UGVs
    Shigeo Nakamura; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the ACM Symposium on Applied Computing, ACM, 2013, 77-82, 2013, Peer-reviwed, We study a heterogeneous autonomous robot team composed of UAVs (Unmanned Air Vehicles) and UGVs (Unmanned Ground Vehicles) cooperate with each other to carry out global tasks. We introduce the system that UAVs and UGVs remove obstacles cooperatively. In our system, there are multiple type UGVs that have good points and shortcomings, and these UGVs remove a obstacle that block the way. Therefore, our systems can deal with more value of obstacles than existing systems. However our system is more complicated and has many problems to be solved. Therefore, we clarified the problems that our system need to be realized and implemented the robots. The system determines some ways to remove the obstacles using the aerial photograph taken by the UAV and the information of the obstacles by the UGVs, and then outputs a processed aerial photograph and some ways to remove the obstacles. The experimental results reminded us some necessary things for to carry out our goal. Our study has the goal that the autonomous robot team explores under unknown environment such as planetary explorations, or performs search and rescue operations in disaster areas. Copyright 2013 ACM.
    International conference proceedings, English
  • Designing loss-aware fitness function for ga-based algorithmic trading
    Yuya Arai; Ryohei Orihara; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Studies in Computational Intelligence, Springer Verlag, 489, 107-114, 2013, Peer-reviwed, In these days, an algorithmic trading in stock or foreign exchange (henceforth forex) market is in fashion, and needs for automatically performing stable asset management are growing. Machine learning techniques are increasingly used to construct trading rules of the algorithmic trading, as researches on the algorithmic trading advance. Our study aims to build an automatic trading agent, and in this paper, we concentrate in designing a module which determines trading rules by machine learning. We use Genetic Algorithm (henceforth GA), and we build trading rules by learning parameters of technical indices. Our contribution in this paper is that we propose new fitness functions in GA, in order to make them robuster to change of market trends. Although profits were used as a fitness function in the previous study, we propose the fitness functions which pay more attention to not making a loss than to gaining profits. As a result of our experiment using real TSE(Tokyo Stock Exchange) data for eight years, the proposed method has outperformed the previous method in terms of gained profits. © 2013 Springer International Publishing Switzerland.
    Scientific journal, English
  • Towards semi-automatic identification of functional requirements in legal texts for public administration
    Yutaka Yoshida; Kozo Honda; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Frontiers in Artificial Intelligence and Applications, IOS Press, 259, 175-184, 2013, Peer-reviwed, There is a need for the development of systems that are compliant with laws in public administration, because their administrative activities are based on laws. When new laws are made or existing laws are amended, however, civil servants need to develop or modify the systems in the short time before the laws are issued. Related work in requirements elicitation from the legal texts includes approaches using ontology but there are difficulties in building an ontology for practical use. In this paper we propose pre-defined templates with the expression of functional requirements to identify legal texts, including their functional requirements, and a support tool consisting of two functions, one for automatic summary creation from complicated legal texts and one for the suggestion of the legal texts, including their functional requirements. We have also applied this approach to Japanese laws and have evaluated its accuracy. Our research revealed that using this approach can identify functional requirements with high accuracy. © 2013 The authors and IOS Press.
    International conference proceedings, English
  • Extraction and Estimation of Human Activity from Twitter for Information Sharing in Disaster
    The-Minh Nguyen; Takahiro Kawamura; Yasuyuki Tahara; Akihiko Ohsuga
    Special Issue on Computational Intelligence and Data Mining, Journal of Convergence Information Technology, Advanced Institute of Convergence IT, 8, 11, 707-715, 2013, Peer-reviwed
    Scientific journal, English
  • Support for Video Hosting Service Users using Folksonomy and Social Annotation
    Katsunori Ishino; Ryohei Orihara; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proc. of the 2012 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2012), IEEE Computer Society, 472-479, Dec. 2012, Peer-reviwed
    International conference proceedings, English
  • 服飾オントロジーを用いたECサイトにおけるユーザデザイン嗜好の推定と評価
    全泰賢; 川村隆浩; 中川博之; 田原康之; 大須賀昭彦
    情報処理学会論文誌, 53, 11, 2485-2493, Nov. 2012, Peer-reviwed
    Scientific journal, Japanese
  • フォークソノミーとソーシャルアノテーションを用いた動画共有サービス利用支援の試み
    石野克徳; 折原良平; 中川博之; 田原康之; 大須賀昭彦
    情報処理学会論文誌, 53, 11, 2494-2506, Nov. 2012, Peer-reviwed
    Scientific journal, Japanese
  • Evaluation of Flexibility to Changes Focusing on the Variable Structures in Legacy Software
    Takanori Sasaki; Nobukazu Yoshioka; Yasuyuki Tahara; Akihiko Ohsuga
    Proc. of JCKBSE 2014, Springer, 2012, 171-180, Aug. 2012, Peer-reviwed
    International conference proceedings, English
  • Building a Timeline Network for Evacuation in Earthquake Disaster
    The-Minh Nguyen; Takahiro Kawamura; Yasuyuki Tahara; Akihiko Ohsuga
    The AAAI 2012 Workshop on Semantic Cities, AAAI Press, 15-20, Jul. 2012, Peer-reviwed
    International conference proceedings, English
  • Privacy Protection by Anonymizing Based on Status of Provider and Community
    Kazutomo Hamamoto; Yasuyuki Tahara; Akihiko Ohsuga
    GSTF Journal on Computing, 2, 1, 169-176, Apr. 2012, Peer-reviwed
    Scientific journal, English
  • Methods for Privacy Protection Considering Status of Service Provider and User Community
    Kazutomo Hamamoto; Yasuyuki Tahara; Akihiko Ohsuga
    INFORMATION SECURITY TECHNOLOGY FOR APPLICATIONS, SPRINGER-VERLAG BERLIN, 7161, 98-113, 2012, Peer-reviwed, Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. That becomes serious especially when a user receives user centric services from a service provider by offering personal information, because the service can be of a higher quality if the user provides more personal information despite the increase of privacy violation risk. Therefore, this paper proposes a privacy protection method that realizes avoidance of unwanted information disclosure by controlling disclosable attributes according to the results from monitoring two elements: user background information of the provider and user community status. The monitoring is done before disclosing individual attributes corresponding to the privacy policy (i.e., the required anonymity level) by each user. The validity of the proposed methods was confirmed by a desk model.
    International conference proceedings, English
  • Self-supervised capturing of users' activities from weblogs
    The-Minh Nguyen; Takahiro Kawamura; Yasuyuki Tahara; Akihiko Ohsuga
    International Journal of Intelligent Information and Database Systems, 6, 1, 61-76, Jan. 2012, Peer-reviwed, The goal of this paper is to describe a method to automatically extract all basic attributes namely actor, action, object, time and location which belong to an activity from Japanese weblogs. Sentences retrieved from weblogs are often diversified, complex, syntactically wrong, have emoticons and new words. There are some works that have tried to extract users' activities in sentences retrieved from web and weblogs. However, these works have several limitations, such as inability of extracting infrequent activities, high setup cost, limitation on the types of sentences that can be handled, necessary of preparing a list of object and action. To resolve these problems, we propose a novel approach that treats the activity extraction as a sequence labelling problem, and automatically makes its own training data. This approach can extract infrequent activities, and has advantages such as scalability, and unnecessary any hand-tagged data. Since it does not require to fix the positions and the number of the attributes in activity sentences, this approach can extract all attributes, with high recall. Copyright © 2011 Inderscience Enterprises Ltd.
    Scientific journal, English
  • BUILDING A TIME SERIES ACTION NETWORK FOR EARTHQUAKE DISASTER
    The-Minh Nguyen; Takahiro Kawamura; Yasuyuki Tahara; Akihiko Ohsuga
    ICAART: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL 1, SCITEPRESS, 100-108, 2012, Peer-reviwed, Since there is 87% of chance of an approximately 8.0-magnitude earthquake occurring in the Tokai region of Japan within the next 30 years; we are trying to help computers to recommend suitable action patterns for the victims if this massive earthquake happens. For example, the computer will recommend "what should do to go to a safe place", "how to come back home", etc. To realize this goal, it is necessary to have a collective intelligence of action patterns, which relate to the earthquake. It is also important to let the computers make a recommendation in time, especially in this kind of emergency situation. This means these action patterns should to be collected in real-time. Additionally, to help the computers understand the meaning of these action patterns, we should build the collective intelligence based on web ontology language (OWL). However, the manual construction of the collective intelligence will take a large cost, and it is difficult in the emergency situation. Therefore, in this paper, we first design a time series action network. We then introduce a novel approach, which can automatically collects the action patterns from Twitter for the action network in realtime. Finally, we propose a novel action-based collaborative filtering, which predicts missing activity data, to complement this action network
    International conference proceedings, English
  • Dynamic reconfiguration in self-adaptive systems considering non-functional properties
    Hisayuki Horikoshi; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the ACM Symposium on Applied Computing, ACM, 1144-1150, 2012, Peer-reviwed, Self-adaptive systems have recently been receiving much attention because of their ability to cope with the changes of environment, failures, and unanticipated events. These systems need an adaptation mechanism, which automatically computes the possible configurations, and decides the most appropriate configuration to fit the environment. In particular, the satisfaction of non-functional requirements must be considered when selecting the best reconfiguration. However, there are trade-off problems among non-functional requirements. Moreover, the adaptation mechanisms are typically developed separately from the components to be implemented, and it complicates the construction of such systems. We propose (1) a feature-oriented analysis technique, which can identify adaptation points, and calculate the contribution to non-functional goals of the configuration
    (2) a component specification model, which extends an architectural description language for self-adaptation
    (3) a reconfiguration framework aimed to reduce the complexity of the reconfiguration and generate the best configuration at run-time. We evaluate the feasibility of our framework by four different scenarios, and show that our framework reduces the complexity of the reconfiguration, and solves the trade-off problem among non-functional requirements. © 2012 ACM.
    International conference proceedings, English
  • Goal-oriented approach to creating class diagrams with OCL constraints
    Sombat Chanvilai; Kozo Honda; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings of the ACM Symposium on Applied Computing, ACM, 1051-1056, 2012, Peer-reviwed, Consistency between various phases of the software development process is an important aspect in software engineering. Without this aspect, software products may not satisfy users' needs. The cause of the inconsistency is that users' requirements may not be sufficiently reflected in software products. We consider this situation as a gap between the requirements and the products. We focus on the early phases of the software development, because we need to deal with the problem before the inconsistency in the early phases affects the later phases. KAOS has been attracting attentions and UML has been widely adopted, in the early phases, for requirements analysis and design respectively. However, the requirements analysis phase and the design phase are often practiced separately which may cause a gap between them. In this paper, we propose a systematic approach, to reduce the gap between the requirement analysis phase and the design phase, by generating UML class diagram and OCL constraints from the KAOS model. We propose transformation rules between operation models and class diagrams and rules for producing OCL constraints from the KAOS model. In addition, we carried out a case study to confirm the validity of this approach. © 2012 ACM.
    International conference proceedings, English
  • Goal-Oriented Robustness Analysis
    Kozo Honda; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, IOS PRESS, 240, 171-180, 2012, Peer-reviwed, In the upstream software development processes, from requirements definition to design, one of the most important tasks is to make the requirements completely satisfied in the design process, therefore actually realizing the required system. Thus, a seamless connection between the requirements model and the design model is very effective to completely realize user requirements. KAOS [1] is one of the typical methodologies of Goal-oriented requirements engineering [2]. It elicits and builds up the requirements systematically and exhaustively. ICONIX process [3] designs a system using UML diagrams. In the ICONIX process, requirements are reviewed using use case models, and then designed with class and sequence diagrams to realize the use cases through robustness diagrams. Based on these methodologies, this paper presents an approach to transfer as much information as possible from KAOS requirements models to preliminary design of system behaviors in ICONIX. Our approach allows the use case models and robustness diagrams to reflect the requirements of the KAOS model with the refinement patterns. We also conducted a case study where flight reservations in an international airline were modeled for the requirements definition and the preliminary design. We could find every requirements defined by the KAOS model in the use case models and the robustness diagrams. Our approach was confirmed to be feasible through this case study.
    International conference proceedings, English
  • ユーザ背景情報およびコミューニティ状況を考慮した匿名度制御によるプライバシ保護エージェントの提案
    浜本一知; 田原康之; 大須賀昭彦
    電子情報通信学会論文誌 「ソフトウェアエージェントとその応用」特集号, The Institute of Electronics, Information and Communication Engineers, J94-D, 11, 1812-1824, Nov. 2011, Peer-reviwed, ライフログなどの個人情報を提供し,プロバイダより情報推薦などの個人サービスを受ける場合,多くの個人情報を提供することで更に品質の高い個人サービスを受けることができる反面,情報の漏えいや流用などによるプライバシ侵害の危険性も増える.そこで本論文では,ユーザごとに設定する希望匿名度に対応する属性を開示する前に,匿名度に影響を及ぼす二つの要素,(1)プロバイダのユーザ背景情報,(2)コミュニティの状況,をチェックし匿名度に反映させることで開示属性を調整し,結果,無用な情報開示を避けることを特徴とするプライバシ保護エージェントを提案する.(1),(2)それぞれにおいて,課題を分析し,解決への提案手法について述べ,(1)は事例モデルによる実験的机上検証,(2)は歩行者モデルを用いたコミュニティを想定し机上検証により,提案手法の妥当性と有効性を確認した.
    Scientific journal, Japanese
  • コンテンツ投稿型SNSにおける未知性と意外性を考慮した推薦エージェントの提案
    住元宗一朗; 中川博之; 田原康之; 大須賀昭彦
    電子情報通信学会論文誌 「ソフトウェアエージェントとその応用」特集号, The Institute of Electronics, Information and Communication Engineers, J94-D, 11, 1800-1811, Nov. 2011, Peer-reviwed, 近年増加したコンテンツ投稿型SNSでは日々膨大にコンテンツが増え続けるため,嗜好には合っているもののユーザが見逃してしまうようなコンテンツは少なくない.また,多くの推薦技術では精度を重視するあまり,その推薦結果に面白みがないという課題がある.本論文では,主に音楽,イラスト,詩等の創作者向けであるコンテンツ投稿型SNSにおける未知性,意外性を考慮した推薦手法について述べる.未知性に関しては,質の高いコンテンツを投稿する投稿者(有力投稿者)に注目し,コンテンツの質を確保しつつもロングテールのテール部分に属する,ユーザがまだ知らないコンテンツを推薦する.意外性に関しては,多くのコンテンツ投稿型SNSで利用されているFolksonomyを利用する.以上の二つの推薦部からなる推薦エージェントを提案し,イラスト投稿型SNSであるPixivの実データを用い,未知性,意外性に関する評価実験を実施した.その結果,推薦リストの6割に未知性,意外性のあるコンテンツが含まれ,本研究の有効性が確かめられた.
    Scientific journal, Japanese
  • 携帯端末上での拡張現実を用いた植物推薦エージェントGreen-Thumb Phoneの開発
    三代謙仁; 川村隆浩; 中川博之; 田原康之; 大須賀昭彦
    電子情報通信学会論文誌 「ソフトウェアエージェントとその応用」特集号, The Institute of Electronics, Information and Communication Engineers, J94-D, 11, 1791-1799, Nov. 2011, Peer-reviwed, 近年,食や環境への意識の高まりから野菜作りやインテリアグリーンに関心が集まっている.しかし,都市の限られた環境で緑を育てるのは容易ではなく,その環境に適した植物を選択するには専門的な知識が必要ということもあり,不用意に繁茂させたり,逆に枯らしてしまうケースも多い.また,インテリア/エクステリアとしては周辺環境との調和が気になるが,成長時の生い茂った姿を想像するのは素人には難しい.そこで本論文では,携帯電話のセンサを用いて,植裁スペースの環境(日照,温度,気温等)に適した植物を推薦するエージェントシステムの開発について述べる.また,本システムでは,推薦した植物の成長した姿を3DCGで表示するという拡張現実手法を用いて,周辺の景観とマッチするかどうかを視覚的に確認することもできる.これにより,植物や園芸に関する特別な知識がなくとも,環境に適しており,かつ周辺の景観との調和のとれた植物を選ぶことが可能となる.今回の実験では約70%の精度で適した植物を推薦できることを確認できた.
    Scientific journal, Japanese
  • インタラクション・シーケンスに着目した商品検索目的抽出エージェントの開発
    川村隆浩; ワコラ; 中川博之; 田原康之; 大須賀昭彦
    電子情報通信学会論文誌 「ソフトウェアエージェントとその応用」特集号, The Institute of Electronics, Information and Communication Engineers, J94-D, 11, 1783-1790, Nov. 2011, Peer-reviwed, e-Commerceの急速な発展を背景に,Web検索結果への検索連動型広告(スポンサーリンクなど)が広告配信手段として注目されている.しかし,ユーザの検索意図と異なる広告の配信は,長期的に見てユーザの不快感を招き,逆効果となるリスクがある.そこで,ユーザの検索行動から検索の目的を推測し,適切な情報を提供することが重要となってきている.これまでも検索結果に対するユーザのブラウザ側の操作(インタラクション)に注目した研究は行われているが,一連のインタラクションの前後関係を考慮した研究は行われていない.そこで,本研究では商品検索結果に対するユーザのインタラクションシーケンスに着目し,検索の目的を購入目的か,情報収集目的かに分類するエージェントを提案する.実験により,先行手法と提案手法を組み合わせることにより,商品検索目的の抽出精度を10%以上向上できることを確認した.
    Scientific journal, Japanese
  • センチメント分析とトピック抽出によるマイクロブログからの評判傾向抽出
    橋本和幸; 中川博之; 田原康之; 大須賀昭彦
    電子情報通信学会論文誌 「ソフトウェアエージェントとその応用」特集号, The Institute of Electronics, Information and Communication Engineers, J94-D, 11, 1762-1772, Nov. 2011, Peer-reviwed, 近年,政策やサービスなどの評判を調査するためにアンケート形式による調査が増加しているが,回収率が低落傾向にあることや,人的コストが増加するなどの問題が生じている.一方,Web上にはユーザの意見を含む評価情報が多数存在している.そこで本研究では,評判傾向予測システムの構築を目的として評判傾向の時間的変化とその原因をマイクロブログから抽出する評判傾向抽出エージェントの実現を目指す.特に本論文では,評判傾向の抽出と評判傾向が変化した原因の抽出に注力する.評価情報の感情を抽出するセンチメント分析に着目し,回帰式から評判傾向の変化点を抽出した後に,変化点におけるトピックをチャンキングにより抽出する手法を提案する.本手法は,従来の評価判定法であるp/n判定にセンチメント分析を組み合わせることで,p/n判定単体よりも人手による調査と相関の高い時系列変化を抽出できる点が特徴であり,政治及びテレビドラマに関するコンテンツを対象に実際の支持率,視聴率に対する評価実験を実施した結果,政治(自由度調整済決定係数R'^2(p/n判定単体:0.22,提案手法:0.60)),テレビドラマ(自由度調整済決定係数R'^2(p/n判定単体:0.26,提案手法:0.56))ともに相関の高い時系列変化を抽出できることが確認できた.
    Scientific journal, Japanese
  • 評判分析システムのための教師あり学習を用いた意見抽出
    田中俊行; グェンミンティ; 中川博之; 田原康之; 大須賀昭彦
    電子情報通信学会論文誌 「ソフトウェアエージェントとその応用」特集号, The Institute of Electronics, Information and Communication Engineers, J94-D, 11, 1751-1761, Nov. 2011, Peer-reviwed, インターネットの普及に伴い,Web上には商品やサービス(対象物)に対する多くの評判情報が蓄積されている.しかし,誰でも発信できるが故に,情報は膨大となり,それら全てに目を通すことは利用者にとって多大な負担となる.そのような背景から,レビューから意見を自動的に抽出する研究が盛んに行われており,意見を<対象物,評価視点(属性),評価値>の三つ組と捉え抽出する研究も行われている.しかしながら多くの研究は,評価視点や評価値の抽出に辞書を用いており,ジャンルごとに必要となる辞書の構築のためのコストは小さいとはいえない.また,単に辞書を用いてマッチングを行っただけでは,精度が上がらないのが現状である.そこで本論文では,教師あり学習を用いて,レビューサイトから意見を抽出する手法を提案する.提案手法は,従来の手法のように大規模な辞書をあらかじめ用意する必要がないため,コストを大幅に抑えることが可能である.実験の結果,辞書をあらかじめ用意しない既存手法と比較して,最大で適合率は約26%,再現率は約47%向上した.また,既存研究では個別の辞書を必要とするような他ジャンルに対して本手法を適用した結果,ほぼ変わらない精度で抽出することができ,他ジャンルへの適用の可能性を示すことができた.
    Scientific journal, Japanese
  • Privacy Protection by Anonymizing Based on Status of Provider and Community
    Hamamoto,K; Tahara,Y; Ohsuga,A
    Proc. 2nd Annual International Conference on Network Technologies Security (NTC2011), 65-71, Nov. 2011, Peer-reviwed
    International conference proceedings, English
  • 自律システム実現に向けたアーキテクチャの構築
    西村一彦; 中川博之; 田原康之; 大須賀昭彦
    人工知能学会論文誌, 26, 1, 107-115, Jan. 2011, Peer-reviwed
    Scientific journal, Japanese
  • オントロジー構築サービスONTOMOの開発 -固有名詞抽出によるインスタンスとプロパティ自動推薦エージェントの評価-
    川村隆浩; 沈偉; 中川博之; 田原康之; 大須賀昭彦
    人工知能学会論文誌, 26, 1, 116-126, Jan. 2011, Peer-reviwed
    Scientific journal, Japanese
  • 条件付確率場と自己教師あり学習を用いた行動属性の自動抽出と評価
    グェンミンティ; 川村隆浩; 中川博之; 田原康之; 大須賀昭彦
    人工知能学会論文誌, The Japanese Society for Artificial Intelligence, 26, 1, 166-178, Jan. 2011, Peer-reviwed, In our definition, human activity can be expressed by five basic attributes: actor, action, object, time and location. The goal of this paper is describe a method to automatically extract all of the basic attributes and the transition between activities derived from sentences in Japanese web pages. However, previous work had some limitations, such as high setup costs, inability to extract all attributes, limitation on the types of sentences that can be handled, and insufficient consideration interdependency among attributes. To resolve these problems, this paper proposes a novel approach that uses conditional random fields and self-supervised learning. Given a small corpus sample as input, it automatically makes its own training data and a feature model. Based on the feature model, it automatically extracts all of the attributes and the transition between the activities in each sentence retrieved from the Web corpus. This approach treats activity extraction as a sequence labeling problem, and has advantages such as domain-independence, scalability, and does not require any human input. Since it is unnecessary to fix the number of elements in a tuple, this approach can extract all of the basic attributes and the transition between activities by making only a single pass. Additionally, by converting to simpler sentences, the approach can deal with complex sentences retrieved from the Web. In an experiment, this approach achieves high precision (activity: 88.9%, attributes: over 90%, transition: 87.5%).
    Scientific journal, Japanese
  • Building earthquake semantic network by mining human activity from Twitter
    The-Minh Nguyen; Kenji Koshikawa; Takahiro Kawamura; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings - 2011 IEEE International Conference on Granular Computing, GrC 2011, IEEE Computer Society, 496-501, 2011, Peer-reviwed, Since there is 87% of chance of an approximately 8.0 Richter earthquake occurring in the Tokai region of Japan in next 30 years
    we are trying to help computers to recommend the most suitable action patterns for the victims if this massive disaster happens. For example, the computer will recommend "what should do to go to a safe place", "how to come back home", etc. To realize this goal, it is necessary to have a collective intelligence of action patterns, which relate to the earthquake. Additionally, to help the computers understand the meaning of these action patterns, we should build the collective intelligence based on OWL (Web Ontology Language). However, the manual construction of the collective intelligence will take a large cost. Therefore, in this paper, we firstly design an earthquake semantic network. Secondly, we propose a novel approach, which can automatically collects the action patterns from Twitter for the semantic network. © 2011 IEEE.
    International conference proceedings, English
  • Building an earthquake evacuation ontology from twitter
    Isabel Shizu Miyamae Iwanaga; The-Minh Nguyen; Takahiro Kawamura; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings - 2011 IEEE International Conference on Granular Computing, GrC 2011, IEEE Computer Society, 306-311, 2011, Peer-reviwed, During the massive Tohoku earthquake, while landlines and mobile phone lines got stuck, Twitter were used to exchange information about evacuation. On 11 March, the number of tweets from Japan dramatically increased to about 33 million, 1.8 times higher than the average figure. However, since texts on Twitter are unstructured data, are more complex than other text media, it is difficult to find a suitable evacuation center. Not only information in Twitter, people but also need to combine other information such as map information, shop information to find the suitable evacuation center. Since it takes much time to do these tasks, these manual processing are not suitable in the emergency status. Therefore, we need an approach to help computers to understand the meaning of evacuation, and to provide the most suitable evacuation center based on earthquake victims' behaviors in real-time. In this paper, we firstly design an earthquake evacuation ontology. Secondly, we indicate that by using this ontology, computers can provide the most suitable evacuation center based on earthquake victims' behaviors in real-time. © 2011 IEEE.
    International conference proceedings, English
  • ONTOMO: Web Service for Ontology Building - Evaluation of Ontology Recommendation using Named Entity Extraction
    Kawamura,T; Shin,I; Nakagawa,H; Tahara,Y; Ohsuga,A
    Proc. of IADIS International Conference WWW/INTERNET 2010 (ICWI 2010), 101-111, Oct. 2010, Peer-reviwed
    International conference proceedings, English
  • 大規模組織におけるソフトウェアプロセス改善活動の適用評価 ~10年間の実践に基づく考察~
    小笠原秀人; 藤巻昇; 艸薙匠; 田原康之; 大須賀昭彦
    情報処理学会論文誌, 情報処理学会, 51, 9, 1805-1815, Sep. 2010, Peer-reviwed
    Scientific journal, Japanese
  • Self-Supervised Mining of Human Activity from CGM
    The-Minh Nguyen; Takahiro Kawamura; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proc. 11th International Workshop on Knowledge Management and Acquisition for Smart Systems and Services (PKAW 2010), Springer, LNAI6232, 61-72, Aug. 2010, Peer-reviwed
    International conference proceedings, English
  • Rewriting Logic Model of Compositional Abstraction of Aspect-Oriented Software
    Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Proc. of Foundations of Aspect-Oriented Languages Workshop 2010 (FOAL 2010), 53-62, Mar. 2010, Peer-reviwed
    International conference proceedings, English
  • Human Activity Mining Using Conditional Radom Fields and Self-Supervised Learning.
    Nguyen Minh The; Takahiro Kawamura; Hiroyuki Nakagawa; Ken Nakayama; Yasuyuki Tahara; Akihiko Ohsuga
    Intelligent Information and Database Systems, Second International Conference, ACIIDS, Hue City, Vietnam, March 24-26, 2010. Proceedings, Part I, Springer, 140-149, 2010, Peer-reviwed
    International conference proceedings
  • ONTOMO: Web-based Ontology Building System
    I. Shin; T. Kawamura; H. Nakagawa; K. Nakayama; Y. Tahara; A. Ohsuga
    Proceedings of 25th Annual ACM Symposium on Applied Computing (SAC 2010), ACM, 1442-1443, 2010, Peer-reviwed
    International conference proceedings, English
  • AUTOMATIC MINING OF HUMAN ACTIVITY AND ITS RELATIONSHIPS FROM CGM
    Nguyen Minh The; Takahiro Kawamura; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    ICSOFT 2010: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 1, SCITEPRESS, 285-292, 2010, Peer-reviwed, The goal of this paper is to describe a method to automatically extract all basic attributes namely actor, action, object, time and location which belong to an activity, and the relationships (transition and cause) between activities in each sentence retrieved from Japanese CGM (consumer generated media). Previous work had some limitations, such as high setup cost, inability of extracting all attributes, limitation on the types of sentences that can be handled, insufficient consideration of interdependency among attributes, and inability of extracting causes between activities. To resolve these problems, this paper proposes a novel approach that treats the activity extraction as a sequence labeling problem, and automatically makes its own training data. This approach has advantages such as domain-independence, scalability, and unnecessary hand-tagged data. Since it is unnecessary to fix the positions and the number of the attributes in activity sentences, this approach can extract all attributes and relationships between activities by making only a single pass over its corpus. Additionally, by converting to simpler sentences, removing stop words, utilizing html tags, google map api, and wikipedia, the proposed approach can deal with complex sentences retrieved from Japanese CGM.
    International conference proceedings, English
  • NicoScene: Video Scene Search by Keywords Based on Social Annotation
    Yasuyuki Tahara; Atsushi Tago; Hiroyuki Nakagawa; Akihiko Ohsuga
    ACTIVE MEDIA TECHNOLOGY, SPRINGER-VERLAG BERLIN, 6335, 461-474, 2010, Peer-reviwed, As there are increasing needs to view a huge number of videos on the Web in short time, the video summary technology is actively investigated. However, there exists trade-offs of costs and precision of summaries. In this paper, we propose a system called NicoScene to search desirable scenes from the videos provided in a video hosting service called Nico Nico Douga. We use the feature of the service in which we can attach comments to videos and treat the comments as social annotation. By some experiments, we demonstrate the advantages of NicoScene in particular the search precisions.
    International conference proceedings, English
  • Automatic mining of human activity attributes from weblogs
    Nguyen Minh The; Takahiro Kawamura; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Proceedings - 9th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2010, IEEE Computer Society, 633-638, 2010, Peer-reviwed, In this paper, we define an activity by five basic attributes: actor, action, object, time and location. The goal of this paper is to describe a method to automatically extract all attributes in each sentence retrieved from Japanese weblogs. Previous work had some limitations, such as high setup cost, inability of extracting all attributes, limitation on the types of sentences that can be handled, and insufficient consideration of interdependency among attributes. To resolve these problems, this paper proposes a novel approach that uses conditional random fields and self-supervised learning. This approach treats the activity extraction as a sequence labeling problem, and has advantages such as domain-independence, scalability, and does not require any hand-tagged data. Since it is unnecessary to fix the positions and the number of the attributes in activity sentences, this approach can extract all attributes by making only a single pass over its corpus. Additionally, by converting to simpler sentences, the proposed approach can deal with complex sentences retrieved from Japanese weblogs. In an experiment, this approach achieves high precision (activity: 88.87%, attributes: over 90%). © 2010 IEEE.
    International conference proceedings, English
  • Capturing Users' Buying Activity at Akihabara Electric Town from Twitter
    The-Minh Nguyen; Takahiro Kawamura; Yasuyuki Tahara; Akihiko Ohsuga
    COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, PT II, SPRINGER-VERLAG BERLIN, 6422, 163-171, 2010, Peer-reviwed, The goal of this paper is to describe a method to automatically capture users' buying activity at Akihabara electric town in each sentence retrieved from twitter. Sentences retrieved from twitter are often diversified, complex, syntactically wrong, have ernoticons and new words. There are some works that have tried to extract users' activities in sentences retrieved from weblogs and twitter. However, these works have some limitations, such as inability of extracting infrequent activities, high setup cost, limitation on the types of sentences that can be handled, necessary of preparing a list of object, action and syntax patterns. To resolve these problems, we propose a novel approach that treats the activity extraction as a sequence labeling problem, and automatically makes its own training data. This approach can extract infrequent activities, and has advantages such as scalability, unnecessary any hand-tagged data.
    International conference proceedings, English
  • Evolution of a course on model checking for practical applications
    Yasuyuki Tahara; Nobukazu Yoshioka; Kenji Taguchi; Toshiaki Aoki; Shinichi Honiden
    ACM SIGCSE Bulletin, 41, 2, 38-44, Jun. 2009, Peer-reviwed
    Scientific journal, English
  • ONTOMO: Development of Ontology Building Service Evaluation of Instance Recommendation Using Proper Noun Extraction
    I. Shin; Takahiro Kawamura; Hiroyuki Nakagawa; Ken Nakayama; Yasuyuki Tahara; Akihiko Ohsuga
    PRINCIPLES OF PRACTICE IN MULTI-AGENT SYSTEMS, SPRINGER-VERLAG BERLIN, 5925, 143-+, 2009, Peer-reviwed, In the research area of web technologies, ontologies are recently widely used. By using ontologies, We can share common understanding of the structure of information among people or software agents and enable reuse of domain knowledge. However. the difficulties in building ontologies have been pointed out and its costs are raising problems currently. To build an ontology, we must determine the domain that the ontology will cover, and define taxonomy, properties, instances of the ontology. It is very difficult and time consuming to build them without any tools. In this paper, we propose ONTOMO that enables Internet users to take part in building ontologies as a part of collective intelligence. In particular, we present an instance recommendation mechanism based on the editing history of multiple users together with experimental evaluations.
    International conference proceedings, English
  • A hierarchical mobile agent framework and its application to multimedia contents
    Fuyuki Ishikawa; Nobukaza Yoshioka; Yasuyuki Tahara; Shinichi Honiden
    Systems and Computers in Japan, 38, 1, 1-17, Jan. 2007, Peer-reviwed, A hierarchical mobile agent is a model that extends the standard mobile agent. In this model it is possible for an agent to migrate inside another agent and parent-child relations can be constructed (the host agent being the parent). By means of such agent synthesis, it is possible to integrate different functionality and have agents interact with one another with no need for remote communications. Even when an agent migrates, it is possible to maintain the relations between parent and child stably over a long period of time. In this paper we focus on the task of controlling these parent-child relations and propose the MAFEH framework designed to simplify related tasks. This frame-work has two special characteristics. One consists of the parent-child agreement specification that expresses the agreement regarding the behavior between parent and child. The other consists of the interaction behavior description specification that facilitates the description of the processes by which individual interactive partners can be searched for, enter into combinations, and disassociate themselves from each other. In this paper we also present an application of the MAFEH framework demonstrating how an agent that encapsulates mobile contents can combine with other agents that provide different contents and services. © 2006 Wiley Periodicals, Inc.
    Scientific journal, English
  • Top SE: Education Program of Japan to Produce Superarchitects Who Can Apply Software Engineering Tools to Practical Development
    Shinichi Honiden; Yasuyuki Tahara; Nobukazu Yoshioka; Kenji Taguchi
    Proceedings of the 29th International Conference on Software Engineering, IEEE Computer Society, 708-718, 2007
    International conference proceedings, English
  • Common Terminology for Systemitization of Goal-oriented Requirements Engineering
    Yasuyuki Tahara; Shinichi Nagano; Nobukazu Yoshioka; Shinichi Honiden
    Transactions of Information Processing Society of Japan, 47, 2, 596-608, Feb. 2006, Peer-reviwed
    Scientific journal, Japanese
  • Common Terminology Model and Patterns of Goal-oriented Requirements Engineering Methodologies
    Yasuyuki Tahara; Shinichi Nagano; Nobukazu Yoshioka; Shinichi Honiden
    Transactions of Information Processing Society of Japan, 48, 3, 1417-1430, Feb. 2006, Peer-reviwed
    Scientific journal, Japanese
  • ソフトウェア設計に対するモデル駆動型検証プロセス
    長野 伸一; 吉岡 信和; 田原 康之; 本位田 真一
    Transactions of Information Processing Society of Japan, Information Processing Society of Japan (IPSJ), 47, 1, 193-208, Jan. 2006, Peer-reviwed, This paper proposes a model-driven verification process that is yet another software process. Generally, verification is a very difficult task that calls for practical tips and experiences. However, no verification processes have been established systematically along with the tips and experiences. As a result, it is still difficult for software developers without enough experiences to begin on the verification task. The proposed process is a solution to this issue. It is defined as transformation procedures of intermediate products yielded during verification, systematizing the order and the contents of the activities needed for verification. The process has the following two advantages. First, it makes clear how to use the practical tips of verification. Second, the inverse images of the model transformation procedures result in the definition of debugging process for detecting design faults. We also illustrate a case study of application of three verification process instances using three model checkers, SPIN, Cadence SMV, and LTSA, respectively, to digital appliance control software. With the results of the applications, we evaluate the advantages and the effects of our proposed process.
    Scientific journal, Japanese
  • Formal model of mobile BPEL4WS process
    Fuyuki Ishikawa; Yasuyuki Tahara; Nobukazu Yoshioka; Shinichi Honiden
    International Journal of Business Process Integration and Management, 1, 3, 192-209, 2006, Peer-reviwed, Web services technology provides the basis for interoperability, dynamic discovery and integration of distributed components. On the other hand, mobile agents have been utilised for achievement of local interactions with distributed components or selection of resources to use, with their ability to migrate from one host to another. This work presents a general framework for 'Mobile Web Services' (MWSs), which is a web service with migration ability. In our framework, a MWS is composed of a combination of (1) Business Process Execution Language for Web Services (BPEL4WS) process description as interaction flow, (2) service components to carry and (3) rules for migration behaviours. This paper focuses on a formal model of our framework, which helps us discuss whether our introduction of migration behaviours meets desirable properties. In this paper, we show that our framework preserves the original semantics of BPEL4WS. We also discuss extension of our framework for fault tolerance of hosts and its satisfaction of desirable properties. Copyright © 2006 Inderscience Enterprises Ltd.
    Scientific journal, English
  • IOM/T : An Interaction Description Language
    土肥 拓生; 吉岡 信和; 田原 康之; 本位田 真一
    電子情報通信学会論文誌 「ソフトウェアエージェントとその応用」特集号, The Institute of Electronics, Information and Communication Engineers, J88-D-I, 9, 1299-1311, Sep. 2005, Peer-reviwed, 近年, ネットワークの拡大に伴い情報の流通速度の高速化が進んでいる. それに伴いソフトウェアが扱うべきデータも大量・複雑になり, 環境の変化に対する変更も頻繁に生じるようになってきている. そのため, すべてを人間が把握した上で処理することは難しくなり, それを補うために自律性・協調性などの人間的な要素がソフトウェアにも求められるようになる. そして, マルチエージェントシステムはこのようなソフトウェアに対する解決策の一つとなる. マルチエージェントシステムにおいて重要な要素の一つは協調性, すなわち, インタラクションである. しかしながら, 既存の実装言語では表現力が不足しており, インタラクションの設計と実装の隔たりが大きい. そこで, 本論文では, インタラクションを実装するために必要な要素を検証するとともに, その理念に基づいて設計したインタラクション記述言語IOM/Tを提案する. IOM/Tを用いることにより, 設計をもとにインタラクションを開発することが容易になる.
    Scientific journal, Japanese
  • 階層構造制御に注目したモバイルエージェントフレームワークとそのマルチメディア応用
    石川 冬樹; 吉岡 信和; 田原 康之; 本位田真一
    電子情報通信学会論文誌 「ソフトウェアエージェントとその応用」特集号, The Institute of Electronics, Information and Communication Engineers, J88-D-I, 9, 1402-1417, Sep. 2005, Peer-reviwed, 階層型モバイルエージェントはモバイルエージェントを拡張したモデルである. そのモデルでは, エージェントが他のエージェント内に移動し, 親子関係を構築することができる(受入れ先のエージェントが親である). このようなエージェントの合成によりエージェントは機能の統合を実現できるとともに, 特にリモート通信を用いずにローカルで相互作用し, エージェントが移動を行った場合でもその関係を長期にわたり安定して維持することができる. 本研究では, この親子関係の制御に注目し, それを容易とすることを目指したMAFEHフレームワークを提案する. このフレームワークは二つの特徴をもつ. 一つは, 親子間の振舞いに関する同意事項を表すParent-Child Agreementである. もう一つは, 個々の相互作用の相手の検索, 合成, その解除という流れの詳細を容易に記述するためのInteraction Behavior Descriptionである. 本研究では更にMAFEHフレームワークの適用例として, マルチメディアコンテンツをカプセル化したエージェントが, 他のコンテンツや様々なサービスを提供するエージェントと合成を行うという応用を示す.
    Scientific journal, Japanese
  • Common Metamodel of Goal-Oriented Requirements Engineering Methodologies
    Yasuyuki Tahara; Shinichi Nagano; Nobukazu Yoshioka; Shinichi Honiden
    Proc. of The Third International Workshop on Comparative Evaluation in Requirements Engineering (CERE 2005), 1, Aug. 2005, Peer-reviwed
    International conference proceedings, English
  • IOM/T : An Interaction Description Language
    Takuo DOI; Nobukazu Yoshioka; Yasuyuki Tahara; Shinichi Honiden
    Proc. of The Fourth International Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS 2005), ACM, 778-785, Jul. 2005, Peer-reviwed
    International conference proceedings, English
  • Agent Synthesis: Partnership and Agreement in Cooperative Mobile Agents
    Fuyuki Ishikawa; Nobukazu Yoshioka; Yasuyuki Tahara; Shinichi Honiden
    Proc. of The Fourth International Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS 2005), ACM, 1267-1268, Jul. 2005, Peer-reviwed
    International conference proceedings, English
  • Developing Service-Oriented Compounds of Cooperative Mobile Agents
    Fuyuki Ishikawa; Nobukazu Yoshioka; Yasuyuki Tahara; Shinichi Honiden
    Proc. of The Workshop on Service-Oriented Computing and Agent-Based Engineering (SOCABE'2005), 1, Jul. 2005, Peer-reviwed
    International conference proceedings, English
  • Framework for Hierarchical Mobile Agents: Toward Service-Oriented Agent Compound
    Fuyuki Ishikawa; Nobukazu Yoshioka; Yasuyuki Tahara; Shinichi Honiden
    Proc. of the 7th International Conference on Enterprise Information Systems (ICEIS-2005), 275-282, May 2005, Peer-reviwed
    International conference proceedings, English
  • Visual Support of Model Checking and Development of Distributed Systems
    Yasuyuki Tahara; Nobukazu Yoshioka; Akihiko Ohsuga; Shinichi Honiden
    Transactions of Information Processing Society of Japan, 46, 2, 459-469, Feb. 2005, Peer-reviwed
    Scientific journal, Japanese
  • Bridging the gap between AUM/T and implementation using IOM/T
    T Doi; N Yoshioka; Y Tahara; S Honiden
    PROGRAMMING MULTI-AGENT SYSTEMS, SPRINGER-VERLAG BERLIN, 3346, 147-162, 2005, Peer-reviwed, Multi-agent systems are attractive means for developing complex software systems. However, multi-agent systems themselves tend to be complex, and certain difficulties exist in developing them. One of the difficulties is the gap between design and implementation especially for interaction protocols. In this paper, we propose a new interaction protocol description language called IOM/T. Interaction protocols described using IOM/T have clear correspondence with AUML sequence diagrams and the description can be consolidated into a single unit of IOM/T code. Then, we show how the process of implementing Java-based agent-platform code from AUML design can be carried out, and how IOM/T effectively bridges the gap between design and implementation.
    Scientific journal, English
  • Mobile and cooperative compounds of multimedia services
    F Ishikawa; N Yoshioka; Y Tahara; S Honiden
    2005 IEEE International Conference on Services Computing, Vol 1, Proceedings, IEEE COMPUTER SOC, 129-136, 2005, Peer-reviwed, This work proposes a novel model where multimedia contents with their related services (business processes and functions) are packaged together as mobile agents. This is intended to enable content providers both to encapsulate their contents and to provide value-added services, for flexible content editing, delivery, and presentation. In addition, agents encapsulating contents/services can contain other agents in themselves (synthesis of agents). A mobile agent compound integrating multiple contents/services can be thus dynamically formed, in which multiple agents work cooperatively and migrate together as a unit. This paper also describes our proposed MAFEH/WS framework for the model. Agents in the model can be developed by incorporating simple parameter settings for synthesis control into business process descriptions in BPEL4WS.
    International conference proceedings, English
  • A framework for synthesis of web services and mobile agents
    Fuyuki Ishikawa; Yasuyuki Tahara; Nobukazu Yoshioka; Shinichi Honiden
    International Journal of Pervasive Computing and Communications, Emerald Group Publishing Ltd., 1, 3, 227-245, 2005, Peer-reviwed, A general framework for mobile Web services - which are Web services with the ability to migrate from one host to another - is proposed. In this framework, a mobile Web service is composed of a combination of a BPEL process description, service components to be carried, and migration behavior descriptions using simple but expressive rules. The semantics of the descriptions are defined using Mobile Ambients, namely, a formal model of concurrent mobile processes. With this framework, it is thus possible to add or change migration behaviors without having to modify the BPEL process. © Emerald Group Publishing Limited.
    Scientific journal, English
  • Pigeon: a Specification Language for Mobile Agent Applications
    Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Proc. of the Third International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS'04), IEEE Computer Society, 3, 1356-1357, Jul. 2004, Peer-reviwed
    International conference proceedings, English
  • Bridging the Gap between AUML and Implementation using FOPL
    Takuo Doi; Nobukazu Yoshioka; Yasuyuki Tahara; Shinichi Honiden
    Proc. of the Second International Workshop on Programming Multi-Agent Systems(ProMAS 2004), 69-78, Jul. 2004, Peer-reviwed
    International conference proceedings, English
  • Toward Synthesis of Web Services and Mobile Agents
    Fuyuki Ishikawa; Nobukazu Yoshioka; Yasuyuki Tahara; Shinichi Honiden
    Proc. of AAMAS'2004 Workshop on Web Services and Agent-based Engineering (WSABE 2004), 48-55, Jul. 2004, Peer-reviwed
    International conference proceedings, English
  • Webサービス連携のためのモバイルエージェント動作記述
    石川 冬樹; 田原 康之; 吉岡 信和; 本位田 真一
    情報処理学会論文誌「オブジェクト指向とWeb 技術」特集号, 45, 6, 1614-1629, Jun. 2004, Peer-reviwed
    Scientific journal, Japanese
  • Mobile Agent System for Web Services Integration in Pervasive Networks
    Fuyuki Ishikawa; Nobukazu Yoshioka; Yasuyuki Tahara; Shinichi Honiden
    Proc. of the 1st International Workshop on Ubiquitous Computing (IWUC 2004), INSTICC Press, 38-47, Apr. 2004, Peer-reviwed
    International conference proceedings, English
  • Behavior descriptions of mobile agents for web services integration
    F Ishikawa; Y Tahara; N Yoshioka; S Honiden
    IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, IEEE COMPUTER SOC, 342-349, 2004, Peer-reviwed, Web Services technology for interoperability, dynamic discovery and integration of distributed components is to be applied in various environments, such as networks of relatively narrow and unstable wireless connections. However, in such environments it is necessary to deal with resource limitation. Our work adopts mobile agent technology in response to this problem and presents a mobile agent frame work for Web Services integration. This framework utilizes BPEL (Business Process Execution Language for Web Services) for description of the integration logic, and provides declarative descriptions for physical behaviors (migration and cloning). This facilitates addition or change of physical behaviors according to the environmental conditions while preserving the integration logic. This paper especially focuses on formal definition and discussion of our framework.
    International conference proceedings, English
  • A Formal Model of Active Contents Based on the Ambient Calculus
    Yasuyuki Tahara; Nobukazu Yoshioka; Shinichi Honiden
    Proc. of the fifth International Workshop on Mobile Agents for Telecommunication Applications (MATA 2003), Springer, 132-141, Oct. 2003, Peer-reviwed
    International conference proceedings, English
  • Specification Language Pigeon for Mobile Agent Applications
    Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    The transactions of the Institute of Electronics, Information and Communication Engineers. D-I, The Institute of Electronics, Information and Communication Engineers, J86-D-I, 8, 532-542, Aug. 2003, Peer-reviwed, モバイルエージェント技術が普及するにつれて,実適用にあたり,例えば開放型のネットワーク上を動き回るため動作の把握が困難であることや,セキュリテイの確保が従来のシステムに比べて難しいなど,多くの問題が浮かび上がってきている.このような問題を解決する手段として,形式仕様技術が注目されており,モバイルエージェント向けの仕様記述言語や,そのための理論的基盤となる計算モデルがいくつか提案されている.しかし,モバイルエージェントアプリケーションの仕様を効果的に記述・利用するためには,その記述言語にもカスタマイズ機能や高度な記述能力が要求されるが,従来の言語では対応していない.そこで本論文では,モバイルエージェントアプリケーションの仕様記述に必要な,カスタマイズ機能や高度な記述能力を実現した言語Pigeonを提案する.Pigeonは,仕様記述言語として,動作仕様と要求仕様の分離や,前者から後者の体系へのモデル化を変更可能とすることにより,カスタマイズ機能を実現する.また,リフレクション機能により,高度な記述能力を実現する.また本論文では,Pigeonを電子カタログアプリケーションに適用し,更に他の言語と比較することにより,Pigeonの評価を行う.
    Scientific journal, Japanese
  • Secure and Efficient Mobile Agent Application Development Using Patterns
    Yasuyuki Tahara; Nobukazu Yoshioka; Akihiko Ohsuga; Shinichi Honiden
    Transactions of Information Processing Society of Japan, 44, 6, 1483-1497, Jun. 2003, Peer-reviwed
    Scientific journal, Japanese
  • Mobile Agent Security with the IPEditor Development Tool and the Mobile UNITY Language
    Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Transactions of Information Processing Society of Japan, Information Processing Society of Japan (IPSJ), 43, 6, 1582-1597, Jun. 2002, Peer-reviwed, Many people consider that there are many problems in development of practical applications of mobile agents that move around the network and do their tasks. For example, security is one of the biggest problems. In this paper, we assert that this issue can be effectively managed by using IPEditor, the development support tool of mobile multi-agent applications that we have been released, and Mobile UNITY, a formal specification language of mobile agent applications. In our method, IPEditor helps developers to design applications with visual supports of agent behaviors. We translate an IPEditor model to a Mobile UNITY program that is the formal specification of the agent behaviors. In addition, we describe the requirements by the Mobile UNITY logic notation. Thus we can verify the requirements by proving that the mobile UNITY program, therefore the IPEditor model, satisfies the mobile UNITY logic notation. We present examples including an electronic catalog (e-catalog) application and illustrate the effectiveness of our proposal.
    Scientific journal, Japanese
  • Mobile Agent Security with the IPEditor, Development Tool and the Mobile UNITY Language
    Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Proc. of the fifth International Conference on Autonomous Agents (Agents2001), ACM, 656-662, May 2001, Peer-reviwed
    International conference proceedings, English
  • Secure and Efficient Mobile Agent Application Reuse Using Patterns
    Yasuyuki Tahara; Nobukazu Yoshioka; Akihiko Ohsuga; Shinichi Honiden
    Proceedings of the 2001 symposium on Software reusability: putting software reuse in context, ACM, 78-85, May 2001, Peer-reviwed
    International conference proceedings, English
  • Security for mobile agents
    Nobukazu Yoshioka; Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, 1957, 223-234, 2001, Peer-reviwed, In view of the proliferation and expansion of wide-area open networks such as the intranets and extra-nets, agent technology is attracting greater attention. However, as yet there is well-established and widely used method of developing safe and secure agent systems. In this paper, we propose a methodology that supports the step-by-step development of mobile agent systems while ensuring consideration of security issues. This approach results in a robust infrastructure for practical system development, and by supporting calculation of various costs allows efficiency and security tradeoffs to be objectively evaluated. © 2001 Springer Berlin Heidelberg.
    International conference proceedings, English
  • Behavior patterns for mobile agent systems from the development process viewpoint
    Y Tahara; A Ohsuga; S Honiden
    5TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, IEEE COMPUTER SOC, 239-242, 2001, Peer-reviwed, As wide-area open networks like the Internet and intranets grow larger mobile agent technology is attracting more attention. Agents are units of software that can deal with environmental changes and the various requirements of open networks through features such as autonomy: mobility: intelligence, cooperation, and reactivity? However; since the usual development methods of the agent systems are not sufficiently investigated, the technology is not yet widespread. In the previous papers, we introduced behavior patterns for mobile agent systems and the development method The behavior patterns represent typical and recurring structures and behaviors of agents. The patterns are classified according to their appropriate architectural levels and the degree to which they depend on specific agent platforms. In this paper we evaluate the advantages of our method from the development process viewpoints. Our evaluation focuses on the development efficiency: the applicability, the extensibility and the understandability of our method.
    International conference proceedings, English
  • Bee-gent: Bonding and Encapsulation Enhancement Agent Framework for Development of Distributed Systems
    Takahiro Kawamura; Yasuyuki Tahara; Tetsuo Hasegawa; Akihiko Ohsuga; Shinichi Honiden
    Systems and Computers in Japan, John Wiley & Sons, Inc., 31, 13, 42-56, Dec. 2000, Peer-reviwed
    Scientific journal, English
  • Agent Communication Language Patterns And Their Tool Support
    Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Proc. of International ICSC Symposium on Multi-Agents and Mobile Agents in Virtual Organizations and E-Commerce (MAMA2000), #1574 351, Dec. 2000, Peer-reviwed
    International conference proceedings, English
  • Mobile Agent System Development Method Based on Behavior Patterns
    Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Transactions of Information Processing Society of Japan, 40, 12, 4319-4332, Dec. 1999, Peer-reviwed
    Scientific journal, Japanese
  • Agent System Development Method based on Agent Patterns
    Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Proceedings of the 21st International Conference on Software Engineering, ACM, 356-367, May 1999, Peer-reviwed
    International conference proceedings, English
  • Algebraic Semantics of Reflection in Object-Orientated
    Yasuyuki Tahara; Fumihiro Kumeno; Akihiko Ohsuga; Shinichi Honiden
    Transactions of Information Processing Society of Japan, 38, 4, 826-834, Apr. 1997, Peer-reviwed
    Scientific journal, Japanese
  • Plangent - An Intelligent Multiagent System for Network Computing
    Yasuyuki Tahara; Masanori Hattori; Akihiko Ohsuga; Yasuo Nagai; Yutaka Irie; Shinichi Honiden
    Proc. of the SECOND INTERNATIONAL CONFERENCE ON MULTIAGENT SYSTEMS (ICMAS '96), 460, Dec. 1996, Peer-reviwed
    International conference proceedings, English
  • An algebraic semantics of reflective objects
    Yasuyuki Tahara; Fumihiro Kumeno; Akihiko Ohsuga; Shinichi Honiden
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Verlag, 1049, 173-189, 1996, Peer-reviwed, Reflection or metalevel architecture has received attention in recent years, since this approach provides functional extension and dynamic adaptation of computer systems. In this paper, we propose a technique to introduce reflection into a kind of algebraic system called rewriting logic. Since rewriting logic can model concurrent object-oriented systems, our technique enables modeling of reflective object-oriented systems including metaobjects and metaobject protocols. A framework for developing denotational semantics is given based on a category-theoretic model. We present some problems for finishing our semantics which remain unsolved.
    International conference proceedings, English
  • Evolutional Agents: Field Oriented Programming Language, Flage
    Fumihiro Kumeno; Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Proc. Asia Pacific Software Engineering Conference (APSEC'95), IEEE Computer Society, APSEC1995, 189-198, Dec. 1995, Peer-reviwed
    International conference proceedings, English
  • Formal Semantics of Agent Evolution in Language Flage
    Yasuyuki Tahara; Fumihiro Kumeno; Akihiko Ohsuga; Shinichi Honiden
    Proc. France-Japan Workshop Object-Based Parallel and Distributed Computing (OBPDC'95), Springer, OBPDC, LNCS1107, 329-348, Jun. 1995, Peer-reviwed
    International conference proceedings, English
  • Flage: Field-oriented Language for AGEnt model
    Fumihiro Kumeno; Yasuyuki Tahara; Akihiko Ohsuga; Shinichi Honiden
    Proc. 3rd Int. Conf. on Software Reuse (ICSR'94), IEEE Computer Society, ICSR1994, 198-199, Nov. 1994, Peer-reviwed
    International conference proceedings, English

MISC

  • ライブ配信サイトTwitchにおける人気配信者の要因の分析
    佐藤大樹,清雄一,田原康之,大須賀昭彦
    Mar. 2024, 第16回データ工学と情報マネジメントに関するフォーラム (DEIM Forum), Japanese, Summary national conference
  • マルチプレイヤRPGにおいて人間らしいプレイスタイルをとるゲームAIの提案
    藤山仁聖,清雄一,田原康之,大須賀昭彦
    Mar. 2024, 第16回データ工学と情報マネジメントに関するフォーラム (DEIM Forum), Japanese, Summary national conference
  • ボール奪取と攻撃の防御に基づくアクションによるサッカー選手の攻守評価
    前島涼弥,清雄一,田原康之,大須賀昭彦
    Mar. 2024, 第16回データ工学と情報マネジメントに関するフォーラム (DEIM Forum), Japanese, Summary national conference
  • バドミントンの試合データを用いたショットの成功確率予測
    美濃岡知樹,清雄一,田原康之,大須賀昭彦
    Mar. 2024, 第16回データ工学と情報マネジメントに関するフォーラム (DEIM Forum), Japanese, Summary national conference
  • スケッチによるマスク不要の表情差分生成手法の提案
    佐々木嵩仁,清雄一,田原康之,大須賀昭彦
    Mar. 2024, 第16回データ工学と情報マネジメントに関するフォーラム (DEIM Forum), Japanese, Summary national conference
  • 人体キーポイントを用いて映像に整合する楽器音を生成するモデルの提案
    岡野日翔,清雄一,田原康之,大須賀昭彦
    Mar. 2024, 第16回データ工学と情報マネジメントに関するフォーラム (DEIM Forum), Japanese, Summary national conference
  • 意外性のある意見がもたらすエコーチェンバー現象の分析
    中川啓,清雄一,田原康之,大須賀昭彦
    Mar. 2024, 第16回データ工学と情報マネジメントに関するフォーラム (DEIM Forum), Japanese, Summary national conference
  • インターネットスラングを考慮した大規模言語モデルを用いた感情分析手法の提案
    関優花,清雄一,田原康之,大須賀昭彦
    Mar. 2024, 第16回データ工学と情報マネジメントに関するフォーラム (DEIM Forum), Japanese, Summary national conference
  • ポジティブな単語を含んだ煽り・誹謗中傷目的のコメント検出方法の提案
    佐藤豪,清雄一,田原康之,大須賀 昭彦
    Mar. 2024, 第16回データ工学と情報マネジメントに関するフォーラム (DEIM Forum), Japanese, Summary national conference
  • 大規模条件付き画像生成モデルを用いたテキストによる出力制御可能なアイコン線画彩色
    宮内 洸希; 折原 良平; 清 雄一; 田原 康之; 大須賀 昭彦
    Sep. 2023, 合同エージェントワークショップ&シンポジウム (JAWS) 2023, 信学技報 123, 190, 201-206, Japanese, Summary national conference
  • 音声と3DMMに基づくマスクを除去した顔画像の推定
    赤塚 哲丸; 折原 良平; 清 雄一; 田原 康之; 大須賀 昭彦
    Sep. 2023, 合同エージェントワークショップ&シンポジウム (JAWS) 2023, 信学技報 123, 190, 187-193, Japanese, Summary national conference
  • 複数データソースを統合したアニメーション作品のナレッジグラフに基づく作品推薦
    齋藤 悠貴; 折原 良平; 清 雄一; 田原 康之; 大須賀 昭彦
    Sep. 2023, 合同エージェントワークショップ&シンポジウム (JAWS) 2023, 信学技報 123, 190, 172-179, Japanese, Summary national conference
  • 化粧品レビュー文の特徴自動スコアリングを用いたレビュー文付きアイテム推薦の研究
    馬場 菜摘; 清 雄一; 田原 康之; 大須賀 昭彦
    Sep. 2023, 合同エージェントワークショップ&シンポジウム (JAWS) 2023, 信学技報 123, 190, 167-171, Japanese, Summary national conference
  • 擬人化タスクにおけるカラーパレットを用いた条件付き画像生成手法の挙動分析
    徐 江林; 折原 良平; 清 雄一; 田原 康之; 大須賀 昭彦
    Sep. 2023, 合同エージェントワークショップ&シンポジウム (JAWS) 2023, 信学技報 123, 190, 101-108, Japanese, Summary national conference
  • 測定機器の誤差を利用した効果的な位置情報プライバシ保護手法の提案
    石禾 里帆; 清 雄一; 田原 康之; 大須賀 昭彦
    Sep. 2023, 合同エージェントワークショップ&シンポジウム (JAWS) 2023, 信学技報 123, 190, 77-82, Japanese, Summary national conference
  • 述語の意味によるクラスタリングを用いたシーングラフ生成
    太田 雅輝; 鵜飼 孝典; 江上 周作; 清 雄一; 田原 康之; 大須賀 昭彦; 福田 賢一郎
    Aug. 2023, 第60回人工知能学会セマンティックウェブとオントロジー研究会, SIG-SWO-060-02, 1-6, Japanese, Summary national conference
  • シーングラフ生成におけるロングテール問題解決に向けたデータサンプリング手法の検討
    太田 雅輝; 鵜飼 孝典; 江上 周作; 清 雄一; 田原 康之; 大須賀 昭彦; 福田 賢一郎
    Mar. 2023, 第59回セマンティックウェブとオントロジー研究会, 2023, SWO-059, 09, Japanese, Summary national conference
  • Backdoor Detection Based On Network Functions For IoT Devices
    依田みなみ; 櫻庭秀次; 山本純一; 清雄一; 清雄一; 田原康之; 大須賀昭彦
    2020, 電子情報通信学会技術研究報告, 119, 437(ICSS2019 68-107)(Web), 0913-5685, 202002224715945078
  • Frontiers of Software Engineering - The Era of Software-Defined Everything -:10. Self-adaptive Software in Era of IoT
    中川 博之; 鄭 顕志; 田原 康之
    Jul. 2017, 情報処理, 58, 8, 702-704, Japanese, Invited, Introduction commerce magazine
  • Linked Dataによる楽曲特徴量の収集・分析基盤の構築
    上原有里; 川村隆浩; 江上周作; 清雄一; 田原康之; 大須賀昭彦
    Sep. 2016, 合同エージェントワークショップ&シンポジウム2016 (JAWS2016), 262-269, Japanese, Peer-reviwed, Summary national conference
  • ゴール指向洗練パターン駆動によるユースケースモデリング
    本田耕三; 平山秀昭; 中川博之; 田原康之; 大須賀昭彦
    01 Mar. 2016, 電子情報通信学会論文誌 D(Web), J99-D, 3, 238‐254 (WEB ONLY), Japanese, 1881-0225, 201602202783800917
  • 社会課題解決に向けた循環型オープンデータ構築システムの提案
    江上周作; 川村隆浩; 清雄一; 田原康之; 大須賀昭彦
    Oct. 2015, 合同エージェントワークショップ&シンポジウム2015 (JAWS2015), 274-281, Japanese, Peer-reviwed, Summary national conference
  • 意外性のあるレシピを推薦するエージェントの提案
    池尻恭介; 清雄一; 中川博之; 田原康之; 大須賀昭彦
    01 Jun. 2015, 電子情報通信学会論文誌 D(Web), J98-D, 6, 971-981 (WEB ONLY), Japanese, 1881-0225, 201502204954116578
  • D-9-25 Evacuation Plan Recommendation Using Miniblogs (2) : Application of Self-Adaptive System Approach
    Tahara Yasuyuki; Ohsuga Akihiko; Kawamura Takahiro; Sei Yuichi; Nakagawa Hiroyuki; Yoshioka Nobukazu; Matsumoto Kazunori; Isshiki Masao
    The Institute of Electronics, Information and Communication Engineers, 24 Feb. 2015, Proceedings of the IEICE General Conference, 2015, 1, 142-142, Japanese, 110009944927, AN10471452
  • ミニブログを利用した避難行動推薦(2)―自己適応システム技術の適用―
    田原康之; 大須賀昭彦; 川村隆浩; 清雄一; 中川博之; 吉岡信和; 松本一教; 一色正男
    24 Feb. 2015, 電子情報通信学会大会講演論文集(CD-ROM), 2015, ROMBUNNO.D-9-25, Japanese, 1349-144X, 201502208196368301
  • ミニブログを利用した避難行動推薦(3)―プライバシ保護データマイニングの適用―
    清雄一; 大須賀昭彦; 田原康之; 川村隆浩; 中川博之; 吉岡信和; 松本一教; 一色正男
    24 Feb. 2015, 電子情報通信学会大会講演論文集(CD-ROM), 2015, ROMBUNNO.D-9-26, Japanese, 1349-144X, 201502228082383700
  • ミニブログを利用した避難行動推薦(1)―システム概要―
    大須賀昭彦; 田原康之; 川村隆浩; 清雄一; 中川博之; 吉岡信和; 松本一教; 一色正男
    24 Feb. 2015, 電子情報通信学会大会講演論文集(CD-ROM), 2015, ROMBUNNO.D-9-24, Japanese, 1349-144X, 201502275670535906
  • モデル検査による設計検証
    吉岡 信和; 田辺 良則; 田原 康之; 長谷川 哲夫; 磯部 祥尚
    Dec. 2014, 日本ソフトウェア科学会コンピュータソフトウェア, 31, 4, 4_40-4_65, Japanese, Introduction scientific journal, 0289-6540
  • Support system for smartphone application development based on analysis of user reviews
    Yuichi Sei; Yasuyuki Tahara; Akihiko Ohsuga
    A number of smartphone applications have been developed these days. However, it is difficult to develop smartphone applications without bugs because they are used in various platforms and environments. Moreover, requirements elicitation is also difficult because various persons may use the smartphone applications. In this paper, we propose an algorithm for eliciting requirements and detecting bugs early by analyzing user reviews posted in review site of smartphone applications., Information Processing Society of Japan (IPSJ), 06 Nov. 2014, IPSJ SIG Notes, 2014, 4, 1-8, Japanese, 110009840462, AN10112981
  • Music Recommender Adapting Implicit Context Using 'renso' Relation among Linked Data
    Mian Wang; Takahiro Kawamura; Yuichi Sei; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    The existing music recommendation systems rely on user's contexts or content analysis to satisfy the users' music playing needs. They achieved a certain degree of success and inspired future researches to get more progress. However, a cold start problem and the limitation to the similar music have been pointed out. Therefore, this paper proposes a unique recommendation methodusing a 'renso' alignment among Linked Data, aiming to realize the music recommendation agent in smartphone. We first collect data from Last.fm, Yahoo! Local, Twitter and LyricWiki, and create a large scale of Linked Open Data (LOD), then create the 'renso' relation on the LOD and select the music according to the context. Finally, we confirmed an evaluation result demonstrating its accuracy and serendipity.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)DOI http://dx.doi.org/10.2197/ipsjjip.22.279------------------------------The existing music recommendation systems rely on user's contexts or content analysis to satisfy the users' music playing needs. They achieved a certain degree of success and inspired future researches to get more progress. However, a cold start problem and the limitation to the similar music have been pointed out. Therefore, this paper proposes a unique recommendation methodusing a 'renso' alignment among Linked Data, aiming to realize the music recommendation agent in smartphone. We first collect data from Last.fm, Yahoo! Local, Twitter and LyricWiki, and create a large scale of Linked Open Data (LOD), then create the 'renso' relation on the LOD and select the music according to the context. Finally, we confirmed an evaluation result demonstrating its accuracy and serendipity.------------------------------This is a preprint of an article intended for publication Journal ofInformation Processing(JIP). This preprint should not be cited. Thisarticle should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)DOI http://dx.doi.org/10.2197/ipsjjip.22.279------------------------------, 15 Apr. 2014, 情報処理学会論文誌, 55, 4, English, 1882-7764, 110009752428, AN00116647
  • A Requirements Analysis Method for potential customers with Morphological Analysis
    GIRIER Yoko; 本田耕三; 中川博之; 田原康之; 大須賀昭彦
    12 Mar. 2014, 情報処理学会研究報告(Web), 2014, SE-183, WEB ONLY VOL.2014-SE-183,NO.8, Japanese, 201502244743519049
  • メディア情報のLinked Data化と活用事例の提案
    川村隆浩; 越川兼地; 中川博之; 清雄一; 田原康之; 大須賀昭彦
    01 Dec. 2013, 電子情報通信学会論文誌 D, J96-D, 12, 2987-2999, Japanese, 1880-4535, 201302247762536676
  • C/S型オンラインゲームの自己適応化に向けたMAPEループ構成パターンの提案
    山縣慧; 中川博之; 清雄一; 田原康之; 大須賀昭彦
    27 Nov. 2013, 情報処理学会シンポジウムシリーズ(CD-ROM), 2013, 6, ROMBUNNO.11, Japanese, 1882-0840, 201402287049245466
  • Toward Self-Adaptation of the Automatic Cleaning Robot
    工藤拓光; 中川博之; 清雄一; 田原康之; 大須賀昭彦
    26 Nov. 2013, 情報処理学会研究報告(Web), 2013, EMB-31, WEB ONLY VOL.2013-EMB-31,NO.5, Japanese, 201502292254822230
  • A Study of the Application of Model Checking to Embedded Software Based on Interrupt Processing
    SASAKI Takanori; YOSHIOKA Nobukazu; TAHARA Yasuyuki; OHSUGA Akihiko
    Detecting errors from incorrect interrupt processing when testing embedded systems is difficult because same scenario can not be reproduced. It is possible to resolve the problem using Model Checking. However there are not enough researches to suggest that Model Checking is effective and practical for hardware-dependent systems. In this paper, we clarify the necessity of the system modeling including hardware and propose the framework of interrupt processing designed by Promela language. This method was applied for ARP protocol behavior and confirmed that it is able to execute the Model Checking effectively for the software engineers who don't know the hardware systems and model checking., The Institute of Electronics, Information and Communication Engineers, 12 Sep. 2013, Technical report of IEICE. KBSE, 113, 215, 19-24, Japanese, 0913-5685, 110009824818, AN10386841
  • A Proposal of Calculation Method of Surprising Value of Recipe Based on Ingredient
    池尻恭介; 清雄一; 中川博之; 田原康之; 大須賀昭彦
    05 Sep. 2013, 電子情報通信学会技術研究報告, 113, 214(DE2013 33-48), 1-6, Japanese, 0913-5685, 201302209122592627
  • Practice of the software development PBL which thought communication as important based on Scrum
    木崎 悟; 田原 康之; 大須賀 昭彦
    02 Sep. 2013, ソフトウェアエンジニアリングシンポジウム2013論文集, 2013, 1-6, Japanese, 170000078057
  • Towards Legal Requirements Elicitation and Modeling using Templates
    吉田 豊; 中川 博之; 田原 康之; 大須賀 昭彦
    行政機関における各種業務システムは,法令に基づいた業務を処理することから,法令を遵守したシステムを開発する必要がある.しかし,法令の条文は自然言語で記述され,曖昧性や複雑性のみならず,関連する規定が膨大で理解が困難となっている.法令からの要求獲得においてはオントロジーを用いる手法等が提案されているが [1],その構築の困難さ等において実用面での課題がある.そこで本稿では,テンプレートを用いた法的要求抽出及び抽出した要求のモデリングを実現するための手法を提案する.There is a need for a system development that must be complied with law in government sectors, because their administrative activities are based on law. However, legal texts are written in natural language with ambiguities, complexities and also have a lot of articles that makes engineers hard to understand. Related work in requirements elicitation from legal texts includes approaches using ontology[1]. However there are difficulties to make ontology on practical use. In this paper we present an initial approach for requirements elicitation from legal texts using templates and a modeling technique from those elicited requirements., 04 Mar. 2013, 研究報告ソフトウェア工学(SE), 2013-SE-179, 27, 1-8, Japanese, 110009550830
  • Considerations on an Embedded Board Emulator Development Efficiency Method Based on Goal-oriented Requirements Analysis
    GIRIER Yoko; 本田耕三; 中川博之; 田原康之; 大須賀昭彦
    15 Feb. 2013, 情報処理学会研究報告(CD-ROM), 2012, 5, ROMBUNNO.OS-123,NO.11, Japanese, 2186-2583, 201302267669724625
  • The approach of code review support environment which extended CCBR in an agile software development PBL
    木崎 悟; 田原 康之; 大須賀 昭彦
    本研究では,アジャイル型ソフトウェア開発PBL における学習者のコードレビュー支援を目的とする.実社会のコードレビューは,レビュアーは経験豊富なエンジニアが担当し,経験の少ないエンジニアを指導することが適切である.コードレビューにより,ソフトウェア品質を高めると同時に開発スキルの向上を図ることができる. PBL では学生同士がレビューすることが前提となる.しかし,実務経験がない学生の場合,レビュアーの選定が難しい.また,何を基準とするのか,どこからレビューするかわからないといった問題が起こり,コードレビューを実施しても指摘できる箇所も不十分となってしまう.このため本論文では,ソフトウェア開発における既存のレビュー手法 (CCBR) をソフトウェア開発 PBL 向けに拡張し,プロジェクト成果物のソフトウェア品質と学習者の教育効果を高めるコードレビューのモデルを提案する.In this paper, we aim to support a student's code review support in an agile software development PBL. An engineer with abundant experience takes charge of reviewer, and the code review of an actual world guides an engineer with little experience. Therefore, we can raise software quality, and it can be improvement in development skill. In PBL, students review each other. However, selection of reviewer is difficult when it is a student without an experience in actual business. Moreover, they become insufficient which can be pointed out even if it enforces a code review. For this reason, the existing review technique (CCBR) in software development is extended for a software development PBL, and the model of a code review which heightens a software quality of a project product and a student's education effect is proposed., 01 Feb. 2013, 研究報告コンピュータと教育(CE), 2013, 9, 1-8, Japanese, 110009527293, AN10096193
  • Verification by model checking for resource contention issues by the Web applications with asynchronous communication
    都丸卓也; 本田耕三; 中川博之; 田原康之; 大須賀昭彦
    21 Jan. 2013, 電子情報通信学会技術研究報告, 112, 419(KBSE2012 58-68), 53-58, Japanese, 0913-5685, 201302287354132119
  • Common Goal Identication for Software Reuse
    中村 祐貴; 本田 耕三; 中川 博之; 田原 康之; 大須賀 昭彦
    17 Jan. 2013, ウィンターワークショップ2013・イン・那須 論文集, 2013, 61-62, Japanese, 170000074384
  • CGMにおける炎上の同定とその応用
    岩崎祐貴; 折原良平; 清雄一; 中川博之; 田原康之; 大須賀昭彦
    2013, 人工知能学会全国大会論文集(CD-ROM), 27th, ROMBUNNO.1J3-OS-22A-4, Japanese, 1347-9881, 201302261692605350
  • Linked Dataを用いたソーシャルメディア×マスメディアの比較実験
    田代和浩; 王冕; 越川兼地; 西村悟史; 森田武史; 長野伸一; 清雄一; 中川博之; 田原康之; 川村隆浩; 大須賀昭彦
    2013, 人工知能学会全国大会論文集(CD-ROM), 27th, ROMBUNNO.2N1-OS-10D-3, Japanese, 1347-9881, 201302293901224856
  • O-003 Consideration of problems and measures of system configuration and management in cloud computing environment
    中林 寿文; 田原 康之; 大須賀 昭彦
    Forum on Information Technology, 04 Sep. 2012, 情報科学技術フォーラム講演論文集, 11, 4, 351-354, Japanese, 110009622240, AA1242354X
  • Requirements Analysis Models to Integrate Requirements Specifications for Software Product Lines
    GIRIER Yoko; 本田耕三; 中川博之; 田原康之; 大須賀昭彦
    15 Aug. 2012, 情報処理学会研究報告(CD-ROM), 2012, 2, ROMBUNNO.SE-177,NO.1, Japanese, 2186-2583, 201202253315000184
  • Improving Recommendation Novelty based on Tag Cluster Diversification
    藤原誠; 中川博之; 田原康之; 大須賀昭彦
    15 Apr. 2012, 情報処理学会研究報告(CD-ROM), 2011, 6, ROMBUNNO.ICS-167,NO.4, Japanese, 2186-2583, 201202224489492698
  • 特定ユーザの作曲ログデータと付加情報を用いた作曲支援
    金子裕司; 中川博之; 田原康之; 大須賀昭彦
    08 Mar. 2012, 情報処理学会シンポジウム論文集, 2012, 3 (CD-ROM), ROMBUNNO.3EXB-36, Japanese, 1344-0640, 201202210976191848
  • 閲覧中のニュース記事に対するブログ記事から主張を抽出して提示するシステムの提案
    佐藤大輔; 中川博之; 田原康之; 大須賀昭彦
    01 Nov. 2011, 電子情報通信学会論文誌 D, J94-D, 11, 1773-1782, Japanese, 1880-4535, 201102224823262260
  • Design Technique for Self-adaptive Systems Using Architecture Description Language
    堀越永幸; 中川博之; 田原康之; 大須賀昭彦
    15 Jun. 2011, 情報処理学会研究報告(CD-ROM), 2011, 1, ROMBUNNO.SE-172,NO.8, Japanese, 2186-2583, 201102220123994213
  • A Proposal for Building Semantic Network by Mining Human Activity from Web
    NGUYEN The-Minh; ITOU Masahiro; KAWAMURA Takahiro; TAHARA Yasuyuki; OHSUGA Akihiko
    The final goal of this paper is to help computers recommend the most suitable action patterns based on user's behaviors. To realize this goal, it is necessary to have a collective intelligence of action patterns. Additionally, we need to understand how to collect activity data, how to express or define each activity. Since it will take a large cost, it is not practical to build this collective intelligence of action patterns in advance. Therefore, in this paper, we propose a novel approach, which can automatically build the collective intelligence of action patterns by mining human activities from web., The Institute of Electronics, Information and Communication Engineers, 19 May 2011, IEICE technical report, 111, 70, 39-44, Japanese, 0913-5685, 110008726043, AN10013061
  • Visual-K: a prototype for a visualization tool modeling goal-oriented RE methodology KAOS
    ジリエ陽子; 本田耕三; 中川博之; 田原康之; 大須賀昭彦
    15 Apr. 2011, 情報処理学会研究報告(CD-ROM), 2010, 6, ROMBUNNO.SE-171,NO.29, Japanese, 2186-2583, 201102269989100423
  • シーソー型インタフェースを用いた評判比較システムの開発
    田中俊行; NGUYEN The‐Minh; 中川博之; 田原康之; 大須賀昭彦
    03 Mar. 2011, 情報処理学会シンポジウム論文集, 2011, 3, 479-482, Japanese, 1344-0640, 201102230578201543
  • スマートフォン向け植物推薦サービスGreen‐Thumb Phoneの開発~モバイルセンサーと拡張現実を用いた植栽環境との調和性推定~
    三代謙仁; 川村隆浩; 中川博之; 田原康之; 大須賀昭彦
    03 Mar. 2011, 情報処理学会シンポジウム論文集, 2011, 3, 449-452, Japanese, 1344-0640, 201102240785865295
  • 未知性と意外性を考慮したイラスト推薦システムの提案:3D表示を用いたイラスト推薦インターフェース
    住元宗一朗; 中川博之; 田原康之; 大須賀昭彦
    03 Mar. 2011, 情報処理学会シンポジウム論文集, 2011, 3, 519-522, Japanese, 1344-0640, 201102263366784714
  • インタラクション・シーケンスに着目したユーザの商品検索の目的の抽出に関する検討と実装
    VA Kora; 川村隆浩; 中川博之; 田原康之; 大須賀昭彦
    03 Mar. 2011, 情報処理学会シンポジウム論文集, 2011, 3, 577-580, Japanese, 1344-0640, 201102273725190154
  • Automatic Extraction of Human Activity Attributes from Twitter
    MINH THE Nguyen; KAWAMURA Takahiro; TAHARA Yasuyuki; OHSUGA Akihiko
    The goal of this paper is to describe a method to automatically extract all basic attributes namely actor, action, object, time and location which belong to an activity, in each sentence retrieved from Twitter. Previous work had some limitations, such as inability of extracting infrequent activities, high setup cost, inability of extracting all attributes. To resolve these problems, this paper proposes a novel approach that treats the activity extraction as a sequence labeling problem, and automatically makes its own training data. This approach can extract infrequent activities, and has advantages such as domain-independence, scalability, and unnecessary hand-tagged data., The Institute of Electronics, Information and Communication Engineers, 18 Jun. 2010, IEICE technical report, 110, 105, 19-23, Japanese, 0913-5685, 110007890098, AN10013061
  • ニコニコ探検くらぶ:ソーシャルアノテーションとキーワード群に基づく動画要約
    多胡厚津史; 中川博之; 田原康之; 大須賀昭彦
    22 Feb. 2010, 情報処理学会シンポジウム論文集, 2010, 4, 47-50, Japanese, 1344-0640, 201002287103896770
  • モデル検査によるAjaxアプリケーション検証
    玉田和洋; 中川博之; 田原康之; 大須賀昭彦
    21 Jan. 2010, 情報処理学会シンポジウム論文集, 2010, 3, 139-140, Japanese, 1344-0640, 201002274426324801
  • Self-Supervised Mining Human Activity from the Web
    MINH THE Nguyen; 川村隆浩; 中川博之; 田原康之; 大須賀昭彦
    15 Jan. 2010, 電子情報通信学会技術研究報告, 109, 386(AI2009 19-29), 19-24, Japanese, 0913-5685, 201002249387820990
  • CGMからの自己教師あり学習と条件付確率場を用いた人間行動マイニング
    THE Nguyen Minh; 川村隆浩; 中川博之; 田原康之; 大須賀昭彦
    2010, 人工知能学会全国大会論文集(CD-ROM), 24th, ROMBUNNO.1D1-3, Japanese, 1347-9881, 201002275210703448
  • Development of Ontology Building Service ONTOMO Evaluation of instance recommendation prototype
    SHIN I; 川村隆浩; 中川博之; 中山健; 田原康之; 大須賀昭彦
    09 Jan. 2009, 電子情報通信学会技術研究報告, 108, 382(AI2008 41-44), 13-19, Japanese, 0913-5685, 200902294308436140
  • Report on Winter Workshop 2008 in Dogo
    Hirohisa Aman; Toshiaki Aoki; Atsushi Sawada; Shinichiro Yamamoto; Noritoshi Atsumi; Junko Shirogane; Naohiko Uramoto; Takahide Matsutsuka; Eiichi Hanyuuda; Hironori Washizaki; Makoto Nonaka; Nobukazu Yoshioka; Yasuyuki Tahara
    Jun. 2008, IPSJ Technical Report, Japanese, Meeting report
  • TopSE : An Education Program based on Computer Science
    HONIDEN Shinichi; KUMENO Fumihiro; TAHARA Yasuyuki; WASHIZAKI Hironori
    Information Processing Society of Japan (IPSJ), 15 Nov. 2007, IPSJ Magazine, 48, 11, 1264-1272, Japanese, 0447-8053, 110006530797, AN00116625
  • Teaching How to Write Security Target of Common Criteria Using the i* Methodology
    TAHARA Yasuyuki; TAGUCHI Kenji; HONIDEN Shinichi
    Security is one of the most widespread and common problem in everyday life. Security breach at companies is reported almost everyday and users of computer systems are busy updating security patches against vulnerabilities of their computer systems. These problems are caused by human errors and faults of physical devices but the majority of them are due to the defects of the software systems. The best way to reduce them is to find and fix them in earlier stage of the software development, especially in the requirements elicitation and analysis phases. Thus we incorporate a security requirements analysis course in our project, called TopSE, to teach advanced software engineers. In particular, we treat ISO/IEC15408 (Common Criteria for Information Technology Security Evaluation, CC) and teach a method to write Security Target (ST) that is a type of document used in the security evaluation process of CC. In this paper, we describe how our teach the method based on i^* that is a goal-oriented requirements analysis methodology., Information Processing Society of Japan (IPSJ), 02 Nov. 2007, IPSJ SIG Notes, 2007, 107, 7-14, English, 0919-6072, 110006531760, AN10112981
  • Is it possible to teach the modeling technique?
    TSUMAKI Toshihiko; KAIYA Haruhiko; TAHARA Yasuyuki; YOSHIOKA Nobukazu; TAGUCHI Kenji; HONIDEN Shinichi
    Modeling a target domain is one of most significant but difficult works in the requirements engineering. Because, main activity of the modeling is abstruction and the abstraction depend on cognition style of each engineer. It is a big issue whether incresing of modeling ability is possible or not. In NII, we are trying to teach the modeling ability by various methods. In this paper, we report the tipical problems of models presented by i^* method education and discuss about the modeling education., Information Processing Society of Japan (IPSJ), 02 Nov. 2007, IPSJ SIG Notes, 2007, 107, 15-22, Japanese, 0919-6072, 110006531761, AN10112981
  • Visual Development Tool for the Multi-Agent Framework Bee-gent
    田原 康之; 長野 伸一; 吉岡 信和; 川村 隆浩; 長谷川 哲夫; 大須賀 昭彦; 本位田 真一
    28 Sep. 1999, 全国大会講演論文集, 59, 253-254, Japanese, 110002894699, AN00349328
  • Be-gent : Bonding Enhancement Agent Framework for Development of Distributed Systems
    KAWAMURA Takahiro; TAHARA Yasuyuki; HASEGAWA Tetsuo; OHSUGA Akihiko; HONIDEN Shinichi
    Interoperability between different kinds of systems is becoming a more important issue as computer networks expand. In this paper, we propose Be-gent (Bonding Enhancement Agent), a Distributed System Development Framework which aims to provide coordination and communication between RDBMS, legacy system, package software, and so on. Be-gent has Interaction Protocols which describe mutual relationship of elements of Distributed System. Our approach is to divide Interaction Protocols into two parts. One is the global flow for total problem solving. Another is the local flow depending on the system. Moreover mediation agents, which have Mobility, coordinate the behaviors of each system according to the former flow. We show a case to develop by using Be-gent, and examine the improvement of maintenancibility when modifying how to coordinate and/or restructuring the component of Distributed Systems., The Institute of Electronics, Information and Communication Engineers, 30 Nov. 1998, IEICE technical report. Artificial intelligence and knowledge-based processing, 98, 436, 55-62, Japanese, 110003187029, AN10013061
  • 第1回ソフトウェア工学の基礎ワークショップ(FOSE '94)
    田原 康之; Yasuyuki Tahara; Systems and Software Engineering Laboratory Research and Development Center Toshiba Corp.
    日本ソフトウェア科学会, 16 Jan. 1996, コンピュータソフトウェア = Computer software, 13, 1, 85-90, Japanese, 0289-6540, 110003743906, AN10075819
  • An Analysis of Simulation between Petri Nets through Rewriting Logic
    TAHARA Yasuyuki; HONIDEN Shinichi
    Rewriting logic has been proposed as a unified model of parallel and concurrent computation, especially concurrent object-oriented computation and agent oriented computation. In this paper, we present a category-theoretic technique in which simulation relation between concurrent processes described by rewriting logic is analyzed. In this technique, simulation relation is represented by morphisms in the category of concurrent processes. Moreover, this technique is shown to be applicable to Petri nets by modeling them by rewriting logic. By this method, it is acknowledged that our technique is applicable to Petri nets including multi-loops whose treatment is limited in other techniques., The Institute of Electronics, Information and Communication Engineers, 25 Nov. 1995, IEICE transactions on fundamentals of electronics, communications and computer sciences, 78, 11, 1498-1503, English, 0916-8508, 110003207447, AA10826239
  • Flage Kernel Language
    粂野 文洋; 佐藤 仁孝; 田原 康之; 大須賀 昭彦; 本位田 真一
    本稿では、環境の変化に柔軟に適応するソフトウェアを構築するために提案したFlageアーキテクチャのカーネル言語を提示する。Flageカーネル言語は並行オブジェクトモデルをベースとした言語であり、エージェントと場を記述する機能を提供している。以降でエージェントおよび場の定義方法を概説し、場に対するエージェント動作を述べる。, 20 Sep. 1995, 全国大会講演論文集, 51, 217-218, Japanese, 110002878162, AN00349328
  • An Algebraic Model in Flage Architecture
    田原 康之; 粂野 文洋; 大須賀 昭彦; 本位田 真一
    エージェントモデルを記述するためのFlageアーキテクチャは、能動的に動作する主体であるエージェントが場を渡り歩きながら、メタレベルアーキテクチャに基づいて、環境変化に対し自動的かつ柔軟に適応するシステムの構築を目的としている。しかし、そのような適応メカニズムを開放型ネットワークにおける現実的なソフトウェア開発ということを考慮した場合、高信頼性を保証するために、検証技術を実現する必要がある。そこで本稿では、そのような検証技術の理論的基盤としての、Flageアーキテクチャの代数モデルについて論ずる。Flageに類似したエージェントモデルの代数モデルとして、書換え論理がある。書換え論理は、並行オブジェクト指向の定式化のための枠組として提案されているが、制約の表現など、エージェントモデルのための枠組として捉えることも可能である。更に、カテゴリ論に基づく宣言的な意味論が与えられているので、検証を行うのにも適している。しかし、書換え論理では、Flageに特徴的なメタレベルアーキテクチャを完全に定式化することが困難である。一方本稿では、書換え論理をベースとしながらも、メタレベルアーキテクチャをも扱ったモデルを提案する。本モデルでは、動的な記述の変更に対し、代数的な意味論を与えることができる。なお本モデルは、カテゴリで意味を与えることにより、メタレベル操作を代数的に扱うことが可能となっている。, 20 Sep. 1995, 全国大会講演論文集, 51, 219-220, Japanese, 110002878164, AN00349328
  • An Agent Oriented Language Flage
    Tahara Yasuyuki; Kumeno Fumihiro; Ohsuga Akihiko; Honiden Shinici
    An agent oriented language Flage with which we can specify cooperative software architecture is proposed. Cooperative software architecture consists of several agents and Flage is used to specify the agents and the communication of them. In Flage, each agent has its meta-hierarchy which enables specification of flexible behaviors. There are also fields which represent range of cooperation. Moreover, since mathematical semantics based on category theory is given, it is possible to assure validity of programs by rigorous verification. In this paper, the specification and semantics of Flage is explaind., Information Processing Society of Japan (IPSJ), 20 Jan. 1994, 情報処理学会研究報告. [プログラミング-言語基礎実践-], 94, 7, 9-16, Japanese, 110002942835, AN10464060
  • Agent oriented language Flage (2) : Language design
    大須賀 昭彦; 田原 康之; 粂野 文洋; 本位田 真一
    本稿では,マルチエージェシトに基づく仕様記述言語Flageの言語仕様について述べる.Flageは,柔軟なソフトウェア構造を記述するための仕様記述言語で,メタ構造や場の概念によってソフトウェアの協調的な生成.変更過程を記述できる点に特徴がある., 27 Sep. 1993, 全国大会講演論文集, 47, 29-30, Japanese, 110002896040, AN00349328
  • Agent oriented language Flage(1) : conception
    本位田 真一; 大須賀 昭彦; 粂野 文洋; 田原 康之
    協調型ソフトウェア・アーキテクチャを記述するためのエージェント指向仕様記述言Flageについて述べる.協調型ソフトウェア・アーキテクチャは複数のエージェントから構成され,Flageはエージェントおよぴエージェント間通信の仕様記述に用いられる.本稿では,まず,協調型ソフトウア・アーキテクチャおよびその基本構成要素であるエージェント・モデルを明らかにした上で,その仕様記述言語への要件について述べる.そして,最後に,提案するFlageの特徴をこの要件を踏まえてまとめる., 27 Sep. 1993, 全国大会講演論文集, 47, 27-28, Japanese, 110002896039, AN00349328
  • Agent oriented language Flage (3) : Semantics Based on Category Theory
    田原 康之; 粂野 文洋; 大須賀 昭彦; 本位田 真一
    本研究においては、柔らかなソフトウェアを記述するための仕様記述言語Flageを提案している。本稿では、Flageの形式的な意味論について論じる。Flageは、次のような特徴を持つ。1.マルチエージェン卜計算に基づく仕様記述言語である。2.エージェントは、環境の変化に柔軟に対処しながら計算を行う。そのために、メタレベル階層を持つことにより、エージェントの挙動の制御を柔軟に記述することを可能にしている。また複数のエージェントからなる場の概念及びブロードキャストの機能を備えることにより、エージェント間の協調的動作が可能である。そこで本研究においては、以下のようにFlageの意味論を展開している。1.上記1により、マルチエージェント計算のカテゴリ論的モデルを構築することにした。即ち、システムの状態を対象とし、状態遷移を射とするカテゴリにより意味を与えた。2.上記2の特徴を表現するためのモデルとして、FIage構造を提案した。第2章は、Flage構造について詳述する。第3章では、Flageの記述からFlage構造への翻訳を与えることにより、Flageの意味論を考察する。第4章では、従来の研究との比較を行う。最後に第5章では、まとめと今後の課題について述べる。, 27 Sep. 1993, 全国大会講演論文集, 47, 31-32, Japanese, 110002896041, AN00349328

Books and other publications

  • マルチエージェントによる自律ソフトウェア設計・開発
    大須賀 昭彦; 田原 康之; 中川 博之; 川村 隆浩
    Scholarly book, Japanese, Joint work, 第2章 自律ソフトウェア設計のためのエージェント技術,第6章 自律Webアプリケーション, コロナ社, 21 Jul. 2017, 9784339028188, 近年,柔軟性のある高度なソフトウェアの実用化が期待されている。本書では,マルチエージェント技術を応用した低コストかつ高品質なソフトウェア開発手法について,基礎的なものから最新の技術に至るまで幅広く紹介する。
  • Performance Model Verification by UPPAAL
    Akihiko Ohsuga (Supervisor; Tetsuo Hasegawa; Yasuyuki Tahara; Yoshinao Isobe
    Japanese, Joint work, 第4章 ケーススタディ(1) オートクラッチ車ギア制御, Kindai kagaku sha Co., Ltd., 28 Sep. 2012
  • Basics of Software Science
    Yuzuru Tanaka; Su; Yoshinao Isobe; Fumihiro Kumeno; Taketoshi Sakuraba; Kenji Taguchi; Yasuyuki Tahara
    Japanese, Joint work, 第3章 並行プログラム―並行性に特有の概念と知識を学ぶ 第8章 モデル検査実装―検証モデル記述のノウハウを利用する 第9章 抽象解釈―モデル検査の複雑さを軽減する, Kindai kagaku sha Co., Ltd., 26 Sep. 2008
  • Design Model Verification by SPIN
    Masami Hagiya (Supervisor; Nobukazu Yoshioka; Toshiaki Aoki; Yasuyuki Tahara
    Japanese, Joint work, 第7章 検証の実践:抽象化・効率化・デバッグ, Kindai kagaku sha Co., Ltd., 26 Sep. 2008

Lectures, oral presentations, etc.

  • Towards Flexible And Safe IoT Software with Formal Verification
    Yasuyuki Tahara
    Keynote oral presentation, International Conference on Health Informatics, Intelligent Systems And Networking Technologies (HINT ‘24), Invited
    14 Mar. 2024
    14 Mar. 2024- 15 Mar. 2024
  • Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems
    Yasuyuki Tahara
    Invited oral presentation, 日本ソフトウェア科学会第40回大会, Invited
    12 Sep. 2023- 14 Sep. 2023
  • ラベル付き遷移系に基づくリフレクティブなシステムのスケーラブルなモデル検査に向けて
    田原康之
    Invited oral presentation, 情報科学技術フォーラム(FIT), Invited
    06 Sep. 2023- 08 Sep. 2023
  • Towards Scalable Model Checking of Reflective Systems via Labeled Transition Systems
    Yasuyuki Tahara
    Invited oral presentation, ソフトウェアエンジニアリングシンポジウム(SES), Invited
    23 Aug. 2023- 25 Aug. 2023
  • ゴールモデルの構造に基づいた共通ゴール判別手法の提案
    中村 祐貴; 本田 耕三; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, ソフトウェア工学の基礎ワークショップ FOSE 2012, ソフトウェア工学の基礎XIX, 大分県由布市
    Dec. 2012
  • CRFを用いたメディア情報の抽出とLinked Data化 ~ ソーシャルメディアとマスメディアの比較事例 ~
    越川 兼地; 川村 隆浩; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2012(JAWS-2012)論文集, 合同エージェントワークショップ&シンポジウム2012(JAWS-2012)論文集, 静岡県掛川市
    Oct. 2012
  • Twitter上のフォロー関係を用いた信頼性の高い未知コンテンツの推薦
    折笠 裕樹; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2012(JAWS-2012)論文集, 合同エージェントワークショップ&シンポジウム2012(JAWS-2012)論文集, 静岡県掛川市
    Oct. 2012
  • GAを用いたシステムトレードにおける損失に着目した適合度関数の設定
    新井 佑弥; 折原 良平; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2012(JAWS-2012)論文集, 合同エージェントワークショップ&シンポジウム2012(JAWS-2012)論文集, 静岡県掛川市
    Oct. 2012
  • UAVとUGVの協調動作による障害物撤去に向けて
    仲村 滋夫; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2012(JAWS-2012)論文集, 合同エージェントワークショップ&シンポジウム2012(JAWS-2012)論文集, 静岡県掛川市
    Oct. 2012
  • 非機能特性を考慮した自己適応システムの動的再構成手法の提案
    堀越永幸; 中川博之; 田原康之; 大須賀昭彦
    Public symposium, Japanese, ソフトウェア工学の基礎ワークショップ FOSE 2011, ソフトウェア工学の基礎XVII, 青森県青森市
    Nov. 2011
  • モデル検査のためのオブジェクト制約言語を用いた外部環境モデルの構築のための考察
    吉池弘樹; 本田耕三; 中川博之; 田原康之; 大須賀昭彦
    Public symposium, Japanese, ソフトウェア工学の基礎ワークショップ FOSE 2011, ソフトウェア工学の基礎XVII, 青森県青森市
    Nov. 2011
  • Support for Generating UML Class Diagrams and OCL Constraints from KAOS Model
    Sombat Chanvilai; Kozo Honda; Hiroyuki Nakagawa; Yasuyuki Tahara; Akihiko Ohsuga
    Public symposium, Japanese, ソフトウェア工学の基礎ワークショップ FOSE 2011, ソフトウェア工学の基礎XVII, 青森県青森市
    Nov. 2011
  • フォークソノミーとソーシャルアノテーションを用いた動画シーンへのラベリング
    石野 克徳; 折原 良平; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 静岡県熱海市
    Oct. 2011
  • 服飾系ECサイトにおける商品閲覧履歴に基づいたデザイン嗜好の推定と商品検索システムの提案
    全 泰賢; 川村 隆浩; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 静岡県熱海市
    Oct. 2011
  • 震災時の効率的な避難のための行動推薦エージェントReady for 87\%の提案(1)~避難計画オントロジーの設計~
    ミヤマエ イワナガ; イサベル シズ; グェン ミン テイ; 川村 隆浩; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 静岡県熱海市
    Oct. 2011
  • 震災時の効率的な避難のための行動推薦エージェントReady for 87\%の提案(2)~時系列避難行動ネットワークの構築~
    グェン ミン テイ; 越川 兼地; 川村 隆浩; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 静岡県熱海市
    Oct. 2011
  • 震災時の効率的な避難のための行動推薦エージェントReady for 87\%の提案(3)~行動ネットワークを用いた避難行動の推薦~
    伊藤 雅博; グェン ミン テイ; 川村 隆浩; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 合同エージェントワークショップ&シンポジウム2011(JAWS-2011)論文集, 静岡県熱海市
    Oct. 2011
  • 未知性と意外性を考慮したイラスト推薦システムの提案: 3D表示を用いたイラスト推薦インタフェース
    住元 宗一朗; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, インタラクション 2011, インタラクション 2011 予稿集, 東京
    Mar. 2011
  • インタラクション・シーケンスに着目したユーザの商品検索 の目的の抽出に関する検討と実装
    ワ コラ; 川村 隆浩; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, インタラクション 2011, インタラクション 2011 予稿集, 東京
    Mar. 2011
  • スマートフォン向け植物推薦サービスGreen-Thumb Phoneの開発 ~モバイルセンサーと拡張現実を用いた植栽環境との調和性推定~
    三代 謙仁; 川村 隆浩; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, インタラクション 2011, インタラクション 2011 予稿集, 東京
    Mar. 2011
  • シーソー型インタフェースを用いた評判比較システムの開発
    田中 俊行; グェン ミンティ; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, インタラクション 2011, インタラクション 2011 予稿集, 東京
    Mar. 2011
  • ケーススタディ:KAOS/UMLモデリング
    本田耕三; 中川博之; 田原康之; 大須賀昭彦
    Public symposium, Japanese, ソフトウェア工学の基礎ワークショップ FOSE 2010, ソフトウェア工学の基礎XVI, 新潟県南魚沼郡
    Nov. 2010
  • 教師あり学習を用いたレビューサイトからの意見抽出
    田中 俊行; グェンミンティ; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2010(JAWS-2010), 合同エージェントワークショップ&シンポジウム2010(JAWS-2010)論文集, 北海道富良野市
    Oct. 2010
  • コンテンツ投稿型SNS における未知性と意外性を考慮した推薦エージェントの提案
    住元 宗一朗; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2010(JAWS-2010), 合同エージェントワークショップ&シンポジウム2010(JAWS-2010)論文集, 北海道富良野市
    Oct. 2010
  • 携帯端末上での拡張現実を用いた植物推薦エージェントGreen-ThumbPhoneの開発
    三代 謙仁; 川村 隆浩; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2010(JAWS-2010), 合同エージェントワークショップ&シンポジウム2010(JAWS-2010)論文集, 北海道富良野市
    Oct. 2010
  • マイクロブログを用いた評判傾向抽出法の提案
    橋本 和幸; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2010(JAWS-2010), 合同エージェントワークショップ&シンポジウム2010(JAWS-2010)論文集, 北海道富良野市
    Oct. 2010
  • 閲覧中のニュース記事に対するブログの主張を提示するシステムの提案
    佐藤 大輔; 中川 博之; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 合同エージェントワークショップ&シンポジウム2010(JAWS-2010), 合同エージェントワークショップ&シンポジウム2010(JAWS-2010)論文集, 北海道富良野市
    Oct. 2010
  • 集合匿名化によりプライバシに配慮した個人情報開示制御手法の提案
    浜本 一知; 田原 康之; 大須賀 昭彦
    Oral presentation, Japanese, 日本ソフトウェア科学会 ネットワークが創発する知能研究会 JWEIN10 講演論文集,日本ソフトウェア科学会 ネットワークが創発する知能研究会 JWEIN10
    Aug. 2010
  • ニコシーン: ソーシャルアノテーションとキーワード群に基づく動画シーン検索
    多胡 厚津史; 中川 博之; 中山 健; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09), 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09) 論文集, 宮城県刈田郡
    Oct. 2009
  • 条件付確率場と自己教師あり学習を用いた行動属性の自動抽出と評価
    グェン ミンティ; 川村 隆浩; 中川 博之; 中山 健; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09), 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09) 論文集, 宮城県刈田郡
    Oct. 2009
  • 自律システム実現に向けたアーキテクチャの構築
    西村 一彦; 中川 博之; 中山 健; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09), 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09) 論文集, 宮城県刈田郡
    Oct. 2009
  • オントロジー構築サービスONTOMO の開発 固有名詞抽出によるインスタンスとプロパティ自動推薦エージェントの評価
    沈 偉; 川村 隆浩; 中川 博之; 中山 健; 田原 康之; 大須賀 昭彦
    Public symposium, Japanese, 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09), 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09) 論文集, 宮城県刈田郡
    Oct. 2009
  • 統合的自己適応型セキュリティアーキテクチャの提案
    田原 康之; 中川 博之; 中山 健; 大須賀 昭彦
    Public symposium, Japanese, 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09), 第8回 合同エージェントワークショップ&シンポジウム2009 (JAWS09) 論文集, 宮城県刈田郡
    Oct. 2009
  • 階層プランニングによるWebサービスの自動合成
    西村一彦; 中川博之; 中山健; 田原康之; 大須賀昭彦
    Public symposium, Japanese, ソフトウェアエンジニアリングシンポジウム2008 (SES2008), ソフトウェアエンジニアリング最前線2008, 東京
    Oct. 2008
  • オントロジー構築サービスONTOMOの開発
    沈偉; 川村隆浩; 中川博之; 中山健; 田原康之; 大須賀昭彦
    Public symposium, Japanese, 第7回 合同エージェントワークショップ&シンポジウム2008 (JAWS08), 第7回 合同エージェントワークショップ&シンポジウム2008 (JAWS08) 論文集, 滋賀県大津市
    Oct. 2008

Courses

  • Media Science and Engineering Laboratory
    The University of Electro-Communications
  • メディア情報学実験
    電気通信大学
  • コンピュータネットワーク
    The University of Electro-Communications
  • コンピュータネットワーク
    電気通信大学
  • Graduate Technical English
    The University of Electro-Communications
  • 大学院技術英語
    電気通信大学
  • ユビキタスネットワーク
    The University of Electro-Communications
  • ユビキタスネットワーク
    The University of Electro-Communications
  • 情報メディアシステム
    The University of Electro-Communications
  • 情報メディアシステム
    電気通信大学
  • システム設計特論2
    電気通信大学
  • Advanced System Design II
    The University of Electro-Communications
  • システム設計特論2
    電気通信大学
  • Calculus Ⅰ
    The University of Electro-Communications
  • Calculus 1
    The University of Electro-Communications
  • 微分積分学第一
    電気通信大学
  • Advanced System Design 2
    The University of Electro-Communications
  • システム設計基礎論2
    電気通信大学
  • システム設計基礎論2
    電気通信大学
  • Fundamentals of System Design 2
    The University of Electro-Communications

Affiliated academic society

  • 電気学会
  • Information Processing Society of Japan
  • Japan Society for Software Science and Technology

Research Themes

  • 生成AI遍在社会におけるプライバシ保護基盤の創成
    清 雄一; 石川冬樹; 松崎 和賢; 田原康之; 大須賀昭彦
    日本学術振興会, 科学研究費助成事業, 電気通信大学, 基盤研究(A), 24H00714
    Apr. 2024 - Mar. 2028
  • SNS・IoT・オープンデータ融合マイニングによる施策に対する人々の行動変化予測
    大須賀 昭彦
    日本学術振興会, 科学研究費助成事業, 電気通信大学, 基盤研究(B), Coinvestigator, 23H03688
    Apr. 2023 - Mar. 2027
  • ユビキタス機械学習社会におけるプライバシ保護基盤
    清 雄一
    基盤研究(B), Coinvestigator, 21H03496
    Apr. 2021 - Mar. 2025
  • IoT向け自律協調自己適応機構とその形式検証手法の研究
    田原 康之
    Scientific research (B), general, Principal investigator, IoTにおいては保守作業が必要となるが,IoTのユーザは一般に適切な知識を持っていないため,保守作業は困難となることが多い.そこで保守の自動化技術である自己適応技術の適用が有望と考えられるが,次の課題がある:(1)対応の必要がある環境変化をいかに検出するか,(2)IoTにおいていかに自己適応を行うか,(3)自己適応が正しく行われたことをIoT全体としていかに保証するか,(4)自己適応の結果から生じる新たなプライバシ侵害リスクをいかに防ぐか.そこで本研究では,複数の自己適応機構の協調により課題(1)と(2)を,形式検証技術により課題(3)を,そして協調自己適応機構におけるプライバシ保護の仕組みの確立により課題(4)を解決する.さらに以上の各項目を達成するための手法を統合して,IoT向け自律協調自己適応ミドルウェアを確立し,実システムを想定した例題アプリケーションを通じて実験評価を行い,成果を世界に向けて発信する., 18H03229
    01 Apr. 2018 - 31 Mar. 2021
  • 適応型プライバシ保護機能を有するIoTデータ解析基盤
    清 雄一
    挑戦的研究(萌芽), Coinvestigator, 18K19835
    Jun. 2018 - Mar. 2021
  • Research on Big Data Magnifying Glasses for Data Processing Considering Emergency Levels
    Akihiko Ohsuga
    Challenging exploratory research, Coinvestigator, 近年注目されているビッグデータのリアルタイムな活用においては、データの抽象度・範囲と、計算コストとの、およびプライバシ情報漏洩リスクとのトレードオフの扱いが重要な課題であるが、これらへの要求は状況の緊急度によって刻一刻と変化するため、変化に対し処理を即座に適応させる必要がある。本研究では、そのような適応を実現する手法を、虫眼鏡でデータを見ることに倣って実現する。すなわち通常はデータやプライバシ情報の詳細は見ずに広範囲を見ることができる状態で処理を行い、緊急度が高まった場面ではあたかも虫眼鏡で拡大したかのように、狭い範囲に対してデータやプライバシ情報の詳細を見て処理できるようにする。これにより前述のトレードオフに対するバランス調整が容易に可能となる。本研究ではこの手法をビッグデータ虫眼鏡と呼び、そのような適応を可能とするメカニズムを明らかにし、ミドルウェアとして利用可能とすることを目指す。, 16K12411
    01 Apr. 2016 - 31 Mar. 2018
  • アスペクト指向 models@run.time システムの効率的な実行時形式検証
    田原 康之
    Scientific research (C), general, Principal investigator, 26330081
    01 Apr. 2014 - 31 Mar. 2017
  • ミニブログを利用した災害時避難行動推薦システムのためのクラウドミドルウェアの研究
    Scientific research (B), general, Coinvestigator
    2012 - 2015
  • Research on Verification Methods of Self-Adaptive Systems Using Goal-Oriented Requirements Specifications
    Scientific research (C), general, Principal investigator
    2011 - 2013
  • Research on Design Verification Process Using Model Checking
    Scientific research (C), general, Principal investigator
    2007 - 2008

Academic Contribution Activities

  • ソフトウェア工学の基礎ワークショップ FOSE 2024 プログラム委員
    Academic society etc, Others, 28 Nov. 2024 - 30 Nov. 2024
  • The 10th International Conference on Cloud Computing and Services Science (CLOSER) 2024 プログラム委員
    Academic society etc, Others, 02 May 2024 - 04 May 2024
  • 第9回 実践的IT教育シンポジウム rePiT2024プログラム委員
    Academic society etc, Others, 03 Feb. 2024 - 04 Feb. 2024
  • 情報処理学会 論文誌「ソフトウェア工学」特集 編集委員
    Academic society etc, Others, 情報処理学会, 31 Jul. 2023 - 17 Jan. 2024
  • ソフトウェア工学の基礎ワークショップ FOSE 2023 プログラム委員
    Academic society etc, Others, 09 Nov. 2023 - 11 Nov. 2023
  • The 10th International Conference on Cloud Computing and Services Science (CLOSER) 2023 プログラム委員
    Academic society etc, Others, 26 Apr. 2023 - 28 Apr. 2023
  • 第9回 実践的IT教育シンポジウム rePiT2023プログラム委員
    Academic society etc, Others, 04 Feb. 2023 - 05 Feb. 2023
  • 情報処理学会 論文誌「ソフトウェア工学」特集 編集委員
    Academic society etc, Others, 情報処理学会, 26 Jul. 2022 - 16 Jan. 2023
  • ソフトウェア工学の基礎ワークショップ FOSE 2022 プログラム委員
    Academic society etc, Others, 10 Nov. 2022 - 12 Nov. 2022
  • The 9th International Conference on Cloud Computing and Services Science (CLOSER) 2022
    Academic society etc, Others, 27 Apr. 2022 - 29 Apr. 2022
  • 学術雑誌関係(編集委員など) 情報処理学会論文誌「数理モデル化と応用」
    Others, Apr. 2012 - 31 Mar. 2022, 編集委員
  • ソフトウェア工学の基礎ワークショップ FOSE 2021
    Academic society etc, Others, 11 Nov. 2021
  • The 9th International Conference on Cloud Computing and Services Science (CLOSER) 2021
    Academic society etc, Others, 28 Apr. 2021
  • 第6回 実践的IT教育シンポジウム rePiT2021
    Academic society etc, Others, 20 Jan. 2021
  • ソフトウェア工学の基礎ワークショップ FOSE 2020
    Academic society etc, Others, 19 Nov. 2020
  • The 9th International Conference on Cloud Computing and Services Science (CLOSER) 2020
    Academic society etc, Others, 07 May 2020
  • 第6回 実践的IT教育シンポジウム rePiT2020
    Academic society etc, Others, 22 Jan. 2020
  • ソフトウェア工学の基礎ワークショップ FOSE 2019
    Academic society etc, Others, 28 Nov. 2019
  • ソフトウェアエンジニアリングシンポジウム 2019
    Academic society etc, Others, 29 Aug. 2019
  • The 8th International Conference on Cloud Computing and Services Science (CLOSER) 2019
    Academic society etc, Others, 02 May 2019
  • 第5回 実践的IT教育シンポジウム rePiT2019
    Academic society etc, Others, 23 Jan. 2019
  • ソフトウェア工学の基礎ワークショップ FOSE 2018
    Academic society etc, Others, 15 Nov. 2018
  • ソフトウェアエンジニアリングシンポジウム 2018
    Academic society etc, Others, 05 Sep. 2018
  • 日本ソフトウェア科学会第35回大会
    Academic society etc, Others, 29 Aug. 2018
  • The 8th International Conference on Cloud Computing and Services Science (CLOSER) 2018
    Academic society etc, Others, 19 Mar. 2018
  • ソフトウェア工学の基礎ワークショップ FOSE 2017
    Academic society etc, Others, 01 Dec. 2017
  • ソフトウェアエンジニアリングシンポジウム 2017
    Academic society etc, Others, 31 Aug. 2017
  • The 7th International Conference on Cloud Computing and Services Science (CLOSER) 2017
    Academic society etc, Others, 24 Apr. 2017
  • ソフトウェア工学の基礎ワークショップ FOSE 2016
    Academic society etc, Others, 23 Nov. 2016
  • The 1st International Workshop for Models and Modelling on Security and Privacy (WM2SP-16)
    Academic society etc, Others, 14 Nov. 2016
  • ソフトウェアエンジニアリングシンポジウム 2016
    Academic society etc, Others, 31 Aug. 2016
  • The 6th International Conference on Cloud Computing and Services Science (CLOSER) 2016
    Academic society etc, Others, 23 Apr. 2016
  • The 30th Annual ACM Symposium on Applied Computing (SAC '16) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, 04 Apr. 2016
  • ソフトウェア工学の基礎ワークショップ FOSE 2015
    Academic society etc, Others, 26 Nov. 2015
  • ソフトウェアエンジニアリングシンポジウム 2015
    Academic society etc, Others, 07 Sep. 2015
  • The 5th International Conference on Cloud Computing and Services Science (CLOSER) 2015
    Academic society etc, Others, 20 May 2015
  • The 30th Annual ACM Symposium on Applied Computing (SAC '15) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, 13 Apr. 2015
  • ソフトウェア工学の基礎ワークショップ FOSE 2014
    Academic society etc, Others, 11 Dec. 2014
  • ソフトウェアエンジニアリングシンポジウム 2014
    Academic society etc, Others, 01 Sep. 2014
  • The 4th International Conference on Cloud Computing and Services Science (CLOSER) 2014
    Academic society etc, Others, 03 Apr. 2014
  • The 29th Annual ACM Symposium on Applied Computing (SAC '14) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, 24 Mar. 2014
  • ソフトウェア工学の基礎ワークショップ FOSE 2013
    Academic society etc, Others, 28 Nov. 2013
  • ソフトウェアエンジニアリングシンポジウム 2013
    Academic society etc, Others, 09 Sep. 2013
  • The 3rd International Conference on Cloud Computing and Services Science (CLOSER) 2013
    Academic society etc, Others, 08 May 2013
  • The 28th Annual ACM Symposium on Applied Computing (SAC '13) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, 18 Mar. 2013
  • ソフトウェア工学の基礎ワークショップ FOSE 2012
    Academic society etc, Others, 13 Dec. 2012
  • ソフトウェアエンジニアリングシンポジウム 2012
    Academic society etc, Others, 27 Aug. 2012
  • The 2nd International Conference on Cloud Computing and Services Science (CLOSER) 2012
    Academic society etc, Others, 18 Apr. 2012
  • The 27th Annual ACM Symposium on Applied Computing (SAC '12) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, 26 Mar. 2012
  • ソフトウェア工学の基礎ワークショップ FOSE 2011
    Academic society etc, Others, 24 Nov. 2011
  • ソフトウェアエンジニアリングシンポジウム 2011
    Academic society etc, Others, 12 Sep. 2011
  • The 1st International Conference on Cloud Computing and Services Science (CLOSER) 2011
    Academic society etc, Others, 07 May 2011
  • The 26th Annual ACM Symposium on Applied Computing (SAC '11) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, 21 Mar. 2011
  • ソフトウェア工学の基礎ワークショップ FOSE 2010
    Academic society etc, Others, 18 Nov. 2010
  • ソフトウェアエンジニアリングシンポジウム 2010
    Academic society etc, Others, 30 Aug. 2010
  • The 25th Annual ACM Symposium on Applied Computing (SAC '10) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, Mar. 2010
  • The 16th Asia-Pacific Software Engineering Conference (APSEC'09)
    Academic society etc, Others, Dec. 2009
  • ソフトウェア工学の基礎ワークショップ FOSE 2009
    Academic society etc, Others, Nov. 2009
  • The 3nd Workshop on Software Patterns and Quality (SPAQu'09)
    Academic society etc, Others, Oct. 2009
  • ソフトウェアエンジニアリングシンポジウム 2009
    Academic society etc, Others, Sep. 2009
  • 第8回情報科学技術フォーラム (FIT '09)
    Academic society etc, Others, Sep. 2009
  • 第164回ソフトウェア工学研究発表会 合同研究発表会
    Academic society etc, Others, May 2009
  • The 24th Annual ACM Symposium on Applied Computing (SAC '09) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, Mar. 2009
  • The 15th Asia-Pacific Software Engineering Conference (APSEC'08)
    Academic society etc, Others, Dec. 2008
  • The 2008 International Conference On Embedded and Ubiquitous Computing (EUC 2008)
    Academic society etc, Others, Dec. 2008
  • The 2nd Workshop on Software Patterns and Quality (SPAQu'08)
    Academic society etc, Others, Oct. 2008
  • The 23rd Annual ACM Symposium on Applied Computing (SAC '08) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, Mar. 2008
  • ウインターワークショップ 2008 ・イン・道後「ディペンダブルソフトウェア」 セッション
    Academic society etc, Others, Jan. 2008
  • The 1st Workshop on Software Patterns and Quality (SPAQu'07)
    Academic society etc, Others, Dec. 2007
  • The 14th Asia-Pacific Software Engineering Conference (APSEC'07)
    Academic society etc, Others, Dec. 2007
  • ソフトウェアエンジニアリングシンポジウム 2007
    Academic society etc, Others, Aug. 2007
  • The 22nd Annual ACM Symposium on Applied Computing (SAC '07) Special Track on Coordination Models, Languages and Architectures
    Academic society etc, Others, Mar. 2007
  • The 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006)
    Academic society etc, Others, Sep. 2006
  • The 1st Japanese Workshop on Requirements Engineering Tools (JWRET)
    Academic society etc, Others, Sep. 2006
  • The 2004 IEEE International Conference on Web Services (ICWS 2004)
    Academic society etc, Others, 06 Jul. 2004