Updated on 2025/03/27

写真a

 
Kawahara Minoru
 
Organization
Institute for Development of Digital Human Resources (IDDHR) Center for Information Technology, Ehime University (CITE) Professor
Title
Professor
Contact information
メールアドレス
External link

Degree

  • Ph.D. ( Kyoto University )

Research Interests

  • データマイニング

  • 情報流通

  • Overlay network

  • Data mining

  • 情報通信システム

  • Information distribution

  • Information and communication system

  • オーバーレイネットワーク

Research Areas

  • Informatics / Perceptual information processing

Research History

Professional Memberships

Papers

  • Fault-Proneness of Python Programs Tested By Smelled Test Code Reviewed

    Yuki Fushihara, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    Proc. 50th Euromicro Conference on Software Engineering and Advanced Applications   373 - 378   2024.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SEAA64295.2024.00063

    researchmap

  • A Quantitative Investigation of Trends in Confusing Variable Pairs Through Commits: Do Confusing Variable Pairs Survive?

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering   2024.6

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3661167.3661228

    researchmap

  • An Application of Program Slicing and CodeBERT to Distill Variables With Inappropriate Names.

    Yahiro Mori, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    SERA   356 - 361   2024

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SERA61261.2024.10685588

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/sera/sera2024.html#MoriAAYK24

  • An automated detection of confusing variable pairs with highly similar compound names in Java and Python programs

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    Empirical Software Engineering   28 ( 5 )   2023.8

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    Abstract

    Variable names represent a significant source of information regarding the source code, and a successful naming of variables is key to producing readable code. Programmers often use a compound variable name by concatenating two or more words to make it more informative and enhance the code readability. While each compound variable name is descriptive, a collection of them sometimes produces “confusing” variable pairs if their names are highly similar, e.g., “shippingHeight,” vs. “shippingWeight.” A confusing variable pair would adversely affect the code readability because it can cause a misreading or mix-up of variables during the programming or code review activities. Toward automated support for enhancing code readability, this paper conducts a large-scale investigation of compound variable names in Java and Python programs. The investigation collects 116,921,127 pairs of compound-named variables from 1,876 open-source Java projects and 106,943,523 pairs of such variables from 2,427 open-source Python projects. Then, this study analyzes those variable pairs from two perspectives of name similarity: string similarity and semantic similarity. Through an evaluation study with 30 human participants, the data analyses show that both string and semantic similarity can help detect confusing variable pairs in Java and Python programs. In order to distill confusing variable pairs automatically, support tools for detecting confusing variable pairs are also developed in this study.

    DOI: 10.1007/s10664-023-10339-2

    researchmap

    Other Link: https://link.springer.com/article/10.1007/s10664-023-10339-2/fulltext.html

  • Multi proxy anchor family loss for several types of gradients

    Shozo Saeki, Minoru Kawahara, Hirohisa Aman

    Computer Vision and Image Understanding   229   103654 - 103654   2023.3

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Elsevier BV  

    DOI: 10.1016/j.cviu.2023.103654

    researchmap

  • A Comparative Study of Data Collection Periods for Just-In-Time Defect Prediction Using the Automatic Machine Learning Method

    Kosuke OHARA, Hirohisa AMAN, Sousuke AMASAKI, Tomoyuki YOKOGAWA, Minoru KAWAHARA

    IEICE Transactions on Information and Systems   E106.D ( 2 )   166 - 169   2023.2

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2022mpl0002

    researchmap

  • A Comparative Study of Hybrid Fault-Prone Module Prediction Models Using Association Rule and Random Forest.

    Shinnosuke Irie, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    WSSE   33 - 38   2023

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/3631991.3631996

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/wsse/wsse2023.html#IrieAAYK23

  • A Trend Analysis of Test Smells in Python Test Code Over Commit History.

    Yuki Fushihara, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    SEAA   310 - 314   2023

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SEAA60479.2023.00054

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/euromicro/euromicro2023.html#FushiharaAAYK23

  • Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-Grained Repository-Based Co-Evolution Analysis Reviewed

    Tenma Kita, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    Proc. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications   120 - 124   2022.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SEAA56994.2022.00027

    researchmap

  • An Investigation of Compound Variable Names Toward Automated Detection of Confusing Variable Pairs

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)   2021.11

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/asew52652.2021.00036

    researchmap

  • Significance of Emphasized Features for Good Representation on Deep Metric Learning

    Shozo Saeki, Minoru Kawahara, Hirohisa Aman

    2021 IEEE/ACIS 19th International Conference on Software Engineering Research, Management and Applications (SERA)   2021.6

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/sera51205.2021.9509042

    researchmap

  • Novel scotoma detection method using time required for fixation to the random targets

    Nobuyuki Takahashi, Shozo Saeki, Minoru Kawahara, Hirohisa Aman, Eri Nakano, Yuki Mori, Masahiro Miyake, Hiroshi Tamura, Akitaka Tsujikawa

    2021.6

     More details

    Publisher:Cold Spring Harbor Laboratory  

    <title>Abstract</title>We developed a novel scotoma detection system using time required for fixation to the random targets, or the” eye-guided scotoma detection method “. In order to verify the” eye-guided scotoma detection method “, we measured 78 eyes of 40 subjects, and examined the measurement results in comparison with the results of measurement by Humphrey perimetry. The results were as follows: (1) Mariotte scotomas were detected in 100% of the eyes tested; (2) The false-negative rate (the percentage of cases where a scotoma was evaluated as a non-scotoma) was less than 10%; (3) The positive point distribution in the low-sensitivity eyes was well matched. These findings suggested that the novel scotoma detection method in the current study will pave the way for the realization of mass screening to detect pathological scotoma earlier.

    <sec><title>Author summary</title>Conventional perimeters, such as the Goldmann perimeter and Humphrey perimeter, require experienced examiners and space occupying. With either perimeter, subjects’ eye movements need to be strictly fixed to the fixation target of the device. Other perimeters can monitor fixation and automatically measure the visual field. With the eye-guided scotoma detection method proposed in the current study, subjects feel less burdened since they do not have to fixate on the fixation target of the device and can move their eyes freely. Subjects simply respond to visual targets on the display; then, scotomas can be automatically detected. The novel method yields highly accurate scotoma detection through an algorithm that separates scotomas from non-scotomas.

    </sec>

    DOI: 10.1101/2021.06.03.21258101

    researchmap

  • A Comparative Study of Vectorization Approaches for Detecting Inconsistent Method Names

    Tomoya Minehisa, Hirohisa Aman, Tomoyuki Yokogawa, Minoru Kawahara

    Computer and Information Science 2021—Summer   125 - 144   2021

     More details

    Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-79474-3_9

    researchmap

  • A Large-Scale Investigation of Local Variable Names in Java Programs: Is Longer Name Better for Broader Scope Variable?

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    Communications in Computer and Information Science   489 - 500   2021

     More details

    Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-85347-1_35

    researchmap

  • バグ混入予測の精度向上に向けた個人化予測モデルの組合せ手法とその評価 Reviewed

    宮本 敦哉, 阿萬 裕久, 川原 稔

    コンピュータソフトウェア   37 ( 4 )   38 - 49   2020.11

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:日本ソフトウェア科学会  

    DOI: 10.11309/jssst.37.4_38

    researchmap

  • A method for combining personalized bug prediction models toward more accurate bug prediction and its evaluation$

    Atsuya Miyamoto, Hirohisa Aman, Minoru Kawahara

    Computer Software   37 ( 4 )   38 - 49   2020.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Japan Society for Software Science and Technology  

    Source code changes are essential for software evolution. However, a source code change also has a risk of introducing a new bug into the software. To predict such a bug by using features of the code change, researchers have studied various bug prediction models in the past. One of the most noteworthy methods is the personalized bug prediction, which builds a prediction model customized for each developer. Although the personalized bug prediction model is a promising one, it also has a challenge that we cannot make appropriate models for less experienced developers due to the lack of code change (commit) data. Toward a resolution of the challenge, this paper proposes a method for combining two or more personalized bug prediction models. The usefulness of the proposed method is proved by an empirical study with the data from five open-source software development projects.

    DOI: 10.11309/jssst.37.4_50

    Scopus

    researchmap

  • A Comparative Study of Vectorization-Based Static Test Case Prioritization Methods.

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    46th Euromicro Conference on Software Engineering and Advanced Applications(SEAA)   80 - 88   2020

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/SEAA51224.2020.00023

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/euromicro/euromicro2020.html#AmanAYK20

  • Empirical study of abnormality in local variables and its application to fault-prone Java method analysis.

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    J. Softw. Evol. Process.   32 ( 4 )   2020

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/smr.2220

    researchmap

  • A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization.

    Masanao Asato, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    27th Asia-Pacific Software Engineering Conference(APSEC)   475 - 479   2020

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/APSEC51365.2020.00059

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/apsec/apsec2020.html#AsatoAAYK20

  • 他の開発者向けに構築された個人化バグ予測モデルの活用に関する提案 Reviewed

    宮本 敦哉, 阿萬 裕久, 川原 稔

    ソフトウェア工学の基礎 XXVI   3 - 12   2019.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Scalable Laplacian Regularized Least Squares Classification on Anchor Graph Reviewed

    Shozo Saeki, Minoru Kawahara, Hirohisa Aman

    Proc. 2019 IEEE/ACIS 4th International Conference on Big Data, Cloud Computing, Data Science & Engineering   71 - 76   2019.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/BCD.2019.8885337

    researchmap

  • A Survival Analysis-Based Prioritization of Code Checker Warning: A Case Study Using PMD.

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    Big Data, Cloud Computing, and Data Science Engineering, Selected Papers from The 4th IEEE/ACIS International Conference on Big Data, Cloud Computing, Data Science and Engineering   69 - 83   2019

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-030-24405-7_5

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/bcd/bcd2019s.html#AmanAYK19

  • Empirical Study of Fault Introduction Focusing on the Similarity among Local Variable Names.

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    3 - 11   2019

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

    Other Link: https://dblp.uni-trier.de/conf/apsec/2019quasoq

  • フォールト混入のリスク評価に向けたソースコード変更メトリクスの提案 Reviewed

    川上 卓也, 阿萬 裕久, 川原 稔

    ソフトウェア工学の基礎 XXV   47 - 52   2018.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • A Quantitative Analysis on Relationship between an Early-Closed Bug and Its Amount of Clues: A Case Study of Apache Ant Reviewed

    SUNOUCHI Akito, AMAN Hirohisa, KAWAHARA Minoru

    IEICE Transactions on Information and Systems   E101-D ( 10 )   2523 - 2525   2018.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.2018EDL8094

    researchmap

  • Empirical Analysis of Coding Standard Violation Focusing on Its Coverage and Importance Reviewed

    Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara

    Proc. 2018 IEEE 42nd Annual Computer Software and Applications Conference   837 - 838   2018.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/COMPSAC.2018.00145

    researchmap

  • A Topic Model and Test History-Based Test Case Recommendation Method for Regression Testing Reviewed

    Hirohisa Aman, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara

    Proc. 11th IEEE International Conference on Software Testing, Verification and Validation Workshops   392 - 397   2018.4

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICSTW.2018.00079

    researchmap

  • An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application toF ault-ProneP rogram Analysis.

    Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    Int. J. Networked Distributed Comput.   6 ( 3 )   118 - 132   2018

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.2991/ijndc.2018.6.3.1

    researchmap

  • A Doc2Vec-Based Assessment of Comments and Its Application to Change-Prone Method Analysis.

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    643 - 647   2018

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/APSEC.2018.00082

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/apsec/apsec2018.html#AmanAYK18

  • Fault-Prone Source File Analysis Focusing on the Contribution Entropy in Open Source Development.

    Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    7 - 14   2018

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/BCD2018.2018.00010

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/bcd/bcd2018.html#YamauchiAAYK18

  • Fault-Prone Java Method Analysis Focusing on Pair of Local Variables with Confusing Names.

    Keiichiro Tashima, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    154 - 158   2018

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SEAA.2018.00033

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/euromicro/euromicro2018.html#TashimaAAYK18

  • A Decision Tree-Based Model for Judging the Compatibility Between Java Method's Name and Implementation and Its Evaluation. Reviewed

    SUZUKI Sho, AMAN Hirohisa, KAWAHARA Minoru

    Computer Software   35 ( 4 )   115 - 121   2018

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    <p>Toward improving readability of source code, this paper proposes a model for judging the compatibility between Java method's name and its implementation, and conducts empirical studies and a survey to examine its usefulness. The proposed method constructs decision trees with many method's data from various source programs, and judges the compatibility between method's name and its implementation. As the results, a validity of model is confirmed and the judging accuracy (F-measure) is about 80%. It is also confirmed that the judgment by the model approximately dovetails with developers' sense.</p>

    DOI: 10.11309/jssst.35.115

    researchmap

  • 決定木を用いた Java メソッドの名前と実装の適合性評価法の提案 Reviewed

    鈴木 翔, 阿萬 裕久, 川原 稔

    ソフトウェア工学の基礎XXIV   63 - 72   2017.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Empirical Study of Abnormalities in Local Variables of Change-Prone Java Methods

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)   2017.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/issrew.2017.37

    researchmap

  • Empirical Study of Fault-Prone Method's Name and Implementation: Analysis on Three Prefixes---Get, Set and Be Reviewed

    Sho Suzuki, Hirohisa Aman, Minoru Kawahara

    Proc. 2nd International Conference on Big Data, Cloud Computing, Data Science & Engineering   266 - 271   2017.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ACIT-CSII-BCD.2017.20

    researchmap

  • Investigation of Coding Violations Focusing on Authorships of Source Files Reviewed

    Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara

    Proc. 2nd International Conference on Big Data, Cloud Computing, Data Science & Engineering   254 - 259   2017.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ACIT-CSII-BCD.2017.44

    researchmap

  • A Health Index of Open Source Projects Focusing on Pareto Distribution of Developer's Contribution.

    Hirohisa Aman, Aji Ery Burhandenny, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    29 - 34   2017

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IWESEP.2017.14

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/iwesep/iwesep2017.html#AmanBAYK17

  • Change-Prone Java Method Prediction by Focusing on Individual Differences in Comment Density

    ERY BURHANDENNY Aji, AMAN Hirohisa, KAWAHARA Minoru

    IEICE Transactions on Information and Systems   100 ( 5 )   1128 - 1131   2017

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    <p>This paper focuses on differences in comment densities among individual programmers, and proposes to adjust the conventional code complexity metric (the cyclomatic complexity) by using the abnormality of the comment density. An empirical study with nine popular open source Java products (including 103,246 methods) shows that the proposed metric performs better than the conventional one in predicting change-prone methods; the proposed metric improves the area under the ROC curve (AUC) by about 3.4% on average.</p>

    DOI: 10.1587/transinf.2016EDL8224

    researchmap

  • A Test Case Recommendation Method Based on Morphological Analysis, Clustering and the Mahalanobis-Taguchi Method Reviewed

    Hirohisa Aman, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara

    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017   29 - 35   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    This paper focuses on the content of test cases, and categorizes test cases into clusters using the similarity between test cases; their degree of similarity is obtained through a morphological analysis. If there are two similar test cases, they would test the same or similar functionalities in similar but different conditions. Thus, when one of them is run for a regression testing, the remaining one should be run as well, in order to reduce a risk of overlooking regressions. Once a test engineer decides to run a set of test cases, the method proposed in this paper can recommend adding similar test cases to their candidate set. The proposed method also considers the priorities of recommended test cases by using the Mahalanobis-Taguchi method. This paper reports on an empirical study with an industrial software product. The results show that the proposed method is useful to prevent overlooking regressions.

    DOI: 10.1109/ICSTW.2017.9

    Web of Science

    researchmap

  • A Survival Analysis of Source Files Modified by New Developers. Reviewed

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    Product-Focused Software Process Improvement - 18th International Conference, PROFES 2017, Innsbruck, Austria, November 29 - December 1, 2017, Proceedings   10611   80 - 88   2017

     More details

    Publishing type:Part of collection (book)   Publisher:Springer  

    DOI: 10.1007/978-3-319-69926-4_7

    Web of Science

    researchmap

  • An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File

    Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara

    International Journal of Networked and Distributed Computing   5 ( 4 )   211 - 211   2017

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Atlantis Press  

    DOI: 10.2991/ijndc.2017.5.4.3

    researchmap

  • Empirical Analysis of Words in Comments Written for Java Methods.

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    375 - 379   2017

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SEAA.2017.23

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/euromicro/euromicro2017.html#AmanAYK17

  • An Application of the PageRank Algorithm to Commit Evaluation on Git Repository. Reviewed

    Sho Suzuki, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    43rd Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2017, Vienna, Austria, August 30 - Sept. 1, 2017   380 - 383   2017

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE Computer Society  

    DOI: 10.1109/SEAA.2017.24

    Web of Science

    researchmap

  • Examination of Coding Violations Focusing on Their Change Patterns over Releases Reviewed

    Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara

    2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016)   121 - 128   2016.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Code review is an essential activity to ensure the quality of code being developed, and there have been static code checkers for aiding an effective code review. However, such tools have not been actively utilized in the world of programmers due to a lot of coding violations (warning) produced by tools and their false-positiveness. In order to analyze the automatically pointed violations and the actual attentions which programmers paid to those violations, this paper proposes a novel metric-the Index of Programmers' Attention (IPA)-and conducts an empirical study focusing on the change patterns of violations over the releases of popular seven open source software products, under two research questions (RQs): (RQ1) What kind of coding violations are related to the parts that many programmers tend to improve? and what kind of coding violations are likely to be disregarded?; (RQ2) How can we reduce the meaningless violations for programmers by omitting disregarded coding violations?
    The empirical results showed the following findings: (1) important violations (having high IPA values) may vary from project to project; (2) there are some unimportant violations common to different projects, but they are a minority of automatically detected violations (about 12%). Therefore, while many violations may be made by a code checker, most of them are likely to be worthy in improving the code quality, and it is ineffective to reduce the violations by eliminating such unimportant violations.

    DOI: 10.1109/APSEC.2016.29

    Web of Science

    researchmap

  • Local Variables with Compound Names and Comments as Signs of Fault-Prone Java Methods.

    Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara

    4 - 11   2016

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

    Other Link: https://dblp.uni-trier.de/conf/apsec/2016quasoq

  • Application of Mahalanobis-Taguchi Method and 0-1 Programming Method to Cost-Effective Regression Testing Reviewed

    Hirohisa Aman, Yuta Tanaka, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara

    2016 42ND EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA)   240 - 244   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE COMPUTER SOC  

    To enhance the cost effectiveness of regression testing, this paper proposes a method for prioritizing test cases. In general, a test case can be evaluated from various different points of view, therefore whether it is worth it to re-run should be discussed using multi criteria. This paper shows that the Mahalanobis-Taguchi (MT) method is a useful way to successfully integrate different evaluations of a test case. Moreover, this paper proposes to use the 0-1 programming method together with the MT method in order to take into account not only the priority of a test case but also its cost to run. The empirical study with 300 test cases for an industrial software system shows that the combination of the MT method and the 0-1 programming method is more cost-effective than other conventional methods.

    DOI: 10.1109/SEAA.2016.29

    Web of Science

    researchmap

  • Lines of Comments as a Noteworthy Metric for Analyzing Fault-Proneness in Methods. Reviewed

    Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki, Minoru Kawahara

    IEICE Transactions   98-D ( 12 )   2218 - 2228   2015.12

  • テストケースのクラスタリングと 0-1 計画モデルを組み合わせた回帰テストの効率化 Reviewed

    阿萬 裕久, 佐々木 愛美, 中野 隆司, 小笠原 秀人, 佐々木 隆志, 川原 稔

    コンピュータソフトウェア   32 ( 3 )   111 - 125   2015.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.11309/jssst.32.3_111

    researchmap

  • Empirical Analysis of Change-Proneness in Methods Having Local Variables with Long Names and Comments Reviewed

    Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki, Minoru Kawahara

    2015 ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM)   50 - 53   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    This paper focuses on the local variable names and comments that are major artifacts reflecting the programmer's preference. It conducts an empirical analysis on the usefulness of those artifacts in assessing the software quality from the perspective of change-proneness in Java methods developed in six popular open source software products. The empirical results show: (1) a method having a longer named local variable is more change-prone, and (2) the presence of comments inside the method body strengthens the suspicions to be modified after the release. The above artifacts are worthy to find methods which can survive unscathed after the release.

    DOI: 10.1109/ESEM.2015.7321197

    Web of Science

    researchmap

  • オープンソース開発におけるコードクローン含有率の収束傾向に関する調査 Reviewed

    本田 暁, 阿萬 裕久, 佐々木 隆志, 川原 稔

    電子情報通信学会論文誌   J97-D ( 7 )   1213 - 1215   2014.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Multistage Growth Model for Code Change Events in Open Source Software Development: An Example using Development of Nagios Reviewed

    Hirohisa Aman, Akiko Yamashita, Takashi Sasaki, Minoru Kawahara

    2014 40TH EUROMICRO CONFERENCE SERIES ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2014)   207 - 212   2014

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In recent years, many open source software (OSS) products have become popular and widely used in the information technology (IT) business. To successfully run IT business, it is important to properly understand the OSS development status. Having a proper understanding of development status is necessary to evaluate and predict the product quality. However, the OSS development status is not easy to understand, because it is often concurrently developed by many distributed contributors, and its developmental structure is complicated. To aid the understanding of the development status, there is an approach that models the trend of source code change events (evolution) with a growth curve. Although an application of growth curves seems to be a promising approach, there has been a big issue that a single growth curve is often unsuitable for modeling the whole evolution because of its complex evolutionary behavior. This paper proposes a multistage model that divides the whole development period into some stages, and applies a different growth curve to a different stage. The empirical investigation in this paper shows that the switching points of stages have meaningful associations with the release dates.

    DOI: 10.1109/SEAA.2014.47

    Web of Science

    researchmap

  • Empirical analysis of comments and fault-proneness in methods: can comments point to faulty methods? Reviewed

    Hirohisa Aman, Takashi Sasaki, Sousuke Amasaki, Minoru Kawahara

    2014 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM '14, Torino, Italy, September 18-19, 2014   63:1   2014

  • Empirical Analysis of Fault-Proneness in Methods by Focusing on their Comment Lines. Reviewed

    Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki, Minoru Kawahara

    21st Asia-Pacific Software Engineering Conference, APSEC 2014, Jeju, South Korea, December 1-4, 2014. Volume 2: Industry, Short, and QuASoQ Papers   51 - 56   2014

     More details

    Publisher:IEEE  

    DOI: 10.1109/APSEC.2014.93

    researchmap

  • Group replica caching scheme for optical grid networks Reviewed

    Kouji Hirata, Minoru Kawahara

    OPTICAL SWITCHING AND NETWORKING   10 ( 3 )   223 - 232   2013.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ELSEVIER SCIENCE BV  

    This paper proposes a cache replacement scheme named group replica caching for optical grid networks. In optical grid networks, data files for job execution are replicated at multiple servers in order to distribute loads. Clients download these files via lightpaths and store them as necessary. File downloading is blocked when the corresponding lightpath cannot be established. The blocking probability of file downloading depends on location of files. The case where a file is stored in a client is ideal because blocking of lightpath establishments does not occur. However, the storage size of the client is limited. In order to efficiently use storage resources of clients, our proposed scheme focuses on the fact that clients can download files stored in surrounding servers with low blocking probability. The proposed scheme regards a group of storages of a client and its surrounding servers as one storage. In particular, they preferentially store different files. By doing so, the probability that a file is stored at the client or its surrounding servers increases. Through simulation experiments, we show that the proposed scheme improves the blocking probability of file downloading efficiently. (C) 2013 Elsevier B.V. All rights reserved.

    DOI: 10.1016/j.osn.2013.02.006

    Web of Science

    researchmap

  • Contention resolution considering multicast traffic in optically burst-switched WDM networks Reviewed

    Kouji Hirata, Minoru Kawahara

    PHOTONIC NETWORK COMMUNICATIONS   23 ( 2 )   157 - 165   2012.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER  

    This paper proposes a contention resolution scheme considering multicast traffic in optical burst switching (OBS) networks. In OBS networks, for unicast bursts, contention can be avoided by deflection routing. However, deflection routing cannot be applied to multicast bursts because multicast bursts are transmitted along light-trees which are fixed, tree-shaped routes. Therefore, the loss probability of multicast bursts is generally high. To resolve this problem, the proposed scheme introduces an ingenious offset time assignment strategy which completely avoids contention of multicast bursts due to transmissions of unicast bursts by strategically assigning additional offset times. Furthermore, in the proposed scheme, unicast bursts avoid contention with deflection routing. Through simulation experiments, we show that the proposed scheme improves the loss probabilities of both of unicast bursts and multicast bursts.

    DOI: 10.1007/s11107-011-0346-7

    Web of Science

    researchmap

  • Replica caching scheme according to status of neighboring nodes in optical grid networks

    Kouji Hirata, Minoru Kawahara

    2011 International Conference on the Network of the Future   112 - 116   2011.11

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/nof.2011.6126669

    researchmap

  • ROC performance evaluation of web-based bibliographic navigator using extended association rules Reviewed

    M Kawahara, H Kawano

    INTERNET APPLICATIONS   1749   216 - 225   1999

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    It is very effective for search users to provide meaningful keywords which are derived by text mining algorithm. We are developing our search engine "Mondou" using weighted association rules, as the web-based intelligent database navigation system. In this paper, lye focus on the computing cost to derive appropriate keywords, we carefully determine system parameters, such as Minsup and Minconf threshold values. In order to evaluate the performance and characteristics of derived rules, we use the techniques of ROC graph. We propose the ROC analytical model of our search system, and we evaluate the performance of weighted association rules by the ROC convex hull method. Especially, we try to specify the optimal threshold values to derive effective rules from INSPEC database, which is one of the huge bibliographic databases.

    Web of Science

    researchmap

▼display all

Books

  • Mining Association Algorithm with Threshold Based on ROC Analysis(共著)

    Proc. of the 34th Annual Hawaii International Conference on System Sciences(CD-ROM)  2001 

     More details

  • Mining Association Algorithm with Threshold Based on ROC Analysis(共著)

    Proc. of the 34th Annual Hawaii International Conference on System Sciences(CD-ROM)  2001 

     More details

  • テキストマイニング技術を用いた半構造データ可視化システムの構成技術に関わる研究(共著)

    平成10~12年度科学研究費補助金特定領域研究(A)(1)研究成果報告書・発見科学:巨大学術社会情報からの知識発見に関する基礎研究  2001 

     More details

  • Performance Evaluation of Materialized Query Processing

    Proc. of DBWeb2000  2000 

     More details

  • ROC距離に基づく先読み検索手法の提案と性能評価

    Proc.of DBWeb2000  2000 

     More details

  • Performance Evaluation of Materialized Query Processing

    Proc. of DBWeb2000  2000 

     More details

  • The Other Thresholds in the Mining Association Algorithm(共著)

    Proc. of The 14th International Conference on Systems Engineering  2000 

     More details

  • Mondou : Information Navigator with Visual Interface(共著)

    Data Warehousing and Knowledge Discovery  2000 

     More details

  • The Other Thresholds in the Mining Association Algorithm(共著)

    Proc. of The 14th International Conference on Systems Engineering  2000 

     More details

  • Mondou : Information Navigator with Visual Interface(共著)

    Data Warehousing and Knowledge Discovery  2000 

     More details

  • 検索エンジン「問答」におけるデータマイニング要素技術(共著)

    第2回インターネットテクノロジーワークショップ(WIT'99)論文集  1999 

     More details

  • ROC Performance Evaluation of Web-based Bibliographic Navigator using Mining Association Rules(共著)

    Internet Applications, Proc. of 5th International Computer Science Conference (ICSC'99)  1999 

     More details

  • ROC Performance Evaluation of Web-based Bibliographic Navigator using Mining Association Rules(共著)

    Discovery Science, Proc. of Second International Conference (DS'99)  1999 

     More details

  • Performance Evaluation and Visualization of Association Rules using Is Receiver Operating Characteristic Graph(共著)

    Proc. of 1999 International Symposium on Database Applications in Non-Traditional Environments(DANTE'99)  1999 

     More details

  • ROC Performance Evaluation of Web-based Bibliographic Navigator using Mining Association Rules(共著)

    Internet Applications, Proc. of 5th International Computer Science Conference (ICSC'99)  1999 

     More details

  • ROC Performance Evaluation of Web-based Bibliographic Navigator using Mining Association Rules(共著)

    Discovery Science, Proc. of Second International Conference (DS'99)  1999 

     More details

  • Performance Evaluation and Visualization of Association Rules using Is Receiver Operating Characteristic Graph(共著)

    Proc. of 1999 International Symposium on Database Applications in Non-Traditional Environments(DANTE'99)  1999 

     More details

  • The Structure of Text Mining Navigator for Bibliographic Search

    1998 

     More details

  • 文献情報検索支援システムにおける相関ルール選択基準(共著)

    情報処理学会研究報告  1998 

     More details

  • 相関ルールを用いた文献情報検索支援システムのROC性能評価(共著)

    人工知能学会全国大会(第12回)論文集  1998 

     More details

  • 文書データマイニングによる雑誌記事索引データベース検索支援(共著)

    情報学シンポジウム  1998 

     More details

  • Implementation of Bibliographic Navigation System with Text Data Mining(共著)

    Proc. of X(]G0003[) International Conference on Systems Science  1998 

     More details

  • Performance Evaluation of Bibliographic Navigation System with Association Rules in ROC Space

    1998 

     More details

  • ROC Performance Evaluation of Bibliographic Navigation System with Association Rules

    Proc. of the 12th Annual Conference of JSAI  1998 

     More details

  • The Structure of Text Mining Navigator for Bibliographic Search

    1998 

     More details

  • Implementation of Bibliographic Navigation System with Text Data Mining(共著)

    Proc. of X(]G0003[) International Conference on Systems Science  1998 

     More details

  • Performance Evaluation of Bibliographic Navigation System with Association Rules in ROC Space

    1998 

     More details

  • ROC Performance Evaluation of Bibliographic Navigation System with Association Rules

    Proc. of the 12th Annual Conference of JSAI  1998 

     More details

  • Attributa Oriented Mining Algorithm with Entropy-based Cost Functions(共著)

    International Symposium on Cooperative Database Systems for Advanced Applications, Kyoto University  1996 

     More details

  • Evaluation of Index Based Clustering in Spatial Database

    Proceedings of Advanced Database Symposium '96, SIGDBS, IPSJ  1996 

     More details

  • Attributa Oriented Mining Algorithm with Entropy-based Cost Functions(共著)

    International Symposium on Cooperative Database Systems for Advanced Applications, Kyoto University  1996 

     More details

  • Evaluation of Index Based Clustering in Spatial Database

    Proceedings of Advanced Database Symposium '96, SIGDBS, IPSJ  1996 

     More details

  • 空間データベースにおけるクラスタリング検索精度の評価(共著)

    1996 

     More details

▼display all

MISC

  • A Proposal of Data Dependence-Based Metrics for Evaluating Fault Injection Risk.

    KAWAKAMI Takuya, AMAN Hirohisa, KAWAHARA Minoru

    Computer Software   36 ( 4 )   4_32 - 4_38   2019

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    <p>This paper proposes metrics for evaluating the risk of fault injection through a code change. The proposed metrics focus on the data dependence via variables and quantify the extent to which the code change would influence. The empirical study using 7 open source projects shows that the proposed metrics are useful explanatory variables together with conventional metrics in random forest models to predict fault injection commits.</p>

    DOI: 10.11309/jssst.36.4_32

    CiNii Books

    researchmap

  • 大学発 産業界行 シーズ(研究成果)探訪(vol.217)情報通信技術を用いた視野の異常を簡便に発見するシステムの開発

    川原 稔

    愛媛ジャーナル   31 ( 3 )   80 - 83   2017.9

     More details

    Language:Japanese   Publisher:愛媛ジャーナル  

    researchmap

  • Investigation of Developer Counts and Bug Fix Occurrences for Java Source Files : An Analysis Focusing on Dependent Relationships among Source Files

    117 ( 137 )   67 - 72   2017.7

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • A study of Relationship between Java Method Name and Implementation toward Buggy Method Prediction

    116 ( 512 )   25 - 30   2017.3

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • A Quantitative Investigation on Source Code Quality Focusing on Length and Composition of Method Name

    116 ( 128 )   137 - 142   2016.7

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • An Analysis of Open Source Software Project Using Developer's Contribution Based on Lines of Code and Its Entropy

    116 ( 128 )   131 - 136   2016.7

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • On the Relationship Between Developer's Degree of Contribution and Their Source Code Quality in Open Source Development

    ( 2016 )   41 - 42   2016.1

     More details

    Language:Japanese  

    researchmap

  • A Proposal of Cohesion Metrics Focusing on Distance Between Statements in Program Dependency Graph and Its Application to Bug Prediction

    115 ( 421 )   1 - 6   2016.1

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • 変数名とスコープの長さ及びコメントに着目したフォールト潜在性に関する定量的調査

    阿萬 裕久, 天嵜 聡介, 佐々木 隆志, 川原 稔

    ソフトウェアエンジニアリングシンポジウム2015論文集   ( 2015 )   69 - 76   2015.8

     More details

    Language:Japanese  

    researchmap

  • A Quantitative Investigation of Developers' Comment Description Tendencies in Open Source Development

    115 ( 154 )   125 - 130   2015.7

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • An Efficient Regression Testing based on Test Case Clustering and 0&ndash;1 Programming Model

    AMAN Hirohisa, SASAKI Manami, NAKANO Takashi, OGASAWARA Hideto, SASAKI Takashi, KAWAHARA Minoru

    Computer Software   32 ( 3 )   3_111 - 3_125   2015

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    It is ideal to test whether there is a regression in a software system or not by running all available test cases, whenever the system is modified. However, practitioners may not be able to run all test cases due to a lack of time or manpower, and then they usually prioritize the test cases and run some of them in decreasing order of priority. In order to make such regression testings more cost-effective, an application of 0&ndash;1 programming method to plan the regression testing has been studied in the past. While an empirical superiority of the 0&ndash;1 programming method-based testing over the conventional one has been reported, there is an issue of the testing completeness such that only a few functionalities might be tested. Thus, this paper utilizes a clustering technique for a more effective test case selection and proposes to formulate the regression testing as a 0&ndash;1 programming problem having constraints to cover all clusters of the test cases. The empirical work shows that the proposed method can detect regressions with about one-third (1/3) effort of the conventional method.

    DOI: 10.11309/jssst.32.3_111

    researchmap

  • オープンソース開発でのコード修正におけるコーディング規約違反の変化に関する調査

    織田泰輔, 阿萬裕久, 佐々木隆志, 川原稔

    情報処理学会研究報告. ソフトウェア工学研究会報告   2014 ( 3 )   1 - 8   2014.11

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    本稿は静的解析ツールで検出可能なコーディング規約違反に着目し,実際のオープンソース開発においてどういった規約違反が多く検出され,その中でどういった規約違反は結果的に解消されていくのか,あるいは逆に解消されずにそのまま残っていくのかを調査している.調査としては,Java 言語で開発されている 2 種類のオープンソースソフトウェアに対して,それらのリポジトリへのコミットごとに静的解析ツール Checkstyle を適用し,Sun Java コーディング規約に対する違反情報を収集している.分析の結果,二つのソフトウェアにおいて六つの違反項目が共通して多く検出されることが分かり,それらの変化 (改善) の傾向から開発の過程でプログラマがどういった点に注意を払っていたかを考察している.

    CiNii Books

    researchmap

  • オープンソース開発における同一人物によるコード修正と修正間隔に関する定量的調査

    尾田 祐之介, 阿萬 裕久, 川原 稔

    ソフトウェアエンジニアリングシンポジウム2014論文集   2014 ( 2014 )   186 - 187   2014.8

     More details

    Language:Japanese  

    researchmap

  • Hybrid Ranging Method Based on Combination Algorithm of Cycle Figuration Probability and Received Signal Strength Indication

    SAKURADA Masashi, SASAKI Takashi, KAWAHARA Minoru

    The transactions of the Institute of Electronics, Information and Communication Engineers. B   95 ( 2 )   229 - 237   2012.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • An Experimental Study between Web Design and Usability for Visually Impaired People

    TAKAHASHI Nobuyuki, SASAKI Takashi, KAWAHARA Minoru

    IEICE technical report   111 ( 213 )   41 - 46   2011.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    It is required to provide Web pages designed for considering usability which visually impaired people can lean effectively with eラ-ニング. In order to clarify the effectiveness that the Web design gives the usability, it experimented on two kinds of Web designs, witch are tabular formed design and list formed design, to stone-blind, low-vision, and visually normal people. The experiment consists of problems that measures the accomplishment time clicked looking for target links, transition records of focus, and questionnaires. By analyzing the accomplishment time, the transition records, the questionnaires, this paper discusses the consideration points of Web design for visually impaired people. As the results the effectiveness of the Web design was not seen by the stone-blind people like visually normal people. It was impossible to find out any trend in the experiment for low-vision people because the observed data varied widely.

    CiNii Books

    researchmap

  • Contention resolution considering multicast traffic in optical burst switching networks

    HIRATA Kouji, KAWAHARA Minoru

    IEICE technical report   110 ( 448 )   19 - 24   2011.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper proposes a contention resolution scheme considering multicast traffic in optical burst switching (OBS) networks. In OBS networks, for unicast bursts, contention can be avoided by deflection routing. However, deflection routing cannot be applied to multicast bursts because multicast bursts are transmitted along light-trees which are fixed, tree-shaped routes. Therefore, the loss probability of multicast bursts is generally high. To resolve this problem, the proposed scheme introduces an ingenious offset assignment strategy which completely avoids contention of multicast bursts due to transmission of unicast bursts by using additional offset times. Furthermore, in the proposed scheme, unicast bursts avoids contention with deflection routing. Through simulation experiments, we show that the proposed scheme improves the loss probabilities of both of unicast bursts and multicast bursts.

    CiNii Books

    researchmap

  • Parallel and multi-wavelength downloading in optical grid networks

    HIRATA Kouji, KAWAHARA Minoru

    IEICE technical report   110 ( 286 )   1 - 6   2010.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In optical grid networks, data files for job execution are replicated at multiple sites in order to distribute loads. Those replicas can be downloaded in parallel in order to reduce downloading time. Furthermore, each replica can be downloaded with multiple wavelengths. Although they can reduce downloading time, they raise blocking probability of file downloading. This is because they use a lot of wavelength resources and thus often generate bottleneck links. To resolve this problem, this paper proposes a parallel and multi-wavelength downloading scheme for optical grid networks. The proposed scheme provides replica selection, path (route) selection, and wavelength selection for parallel and multi-wavelength downloading. Through simulation experiments, we show that the proposed scheme efficiently improves blocking probability of parallel and multi-wavelength downloading.

    CiNii Books

    researchmap

  • Development of Visual Characteristics Evaluation Kit for Low-Vision PC Users to Optimize Accessibility Settings

    TAKAHASHI Nobuyuki, SASAKI Takashi, KAWAHARA Minoru

    IEICE technical report   110 ( 209 )   61 - 66   2010.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    It is required to clarify each visual characteristics of low vision person to computer display devices and evaluate operational effectiveness on accessibility settings in order to optimize personal computer environments for low vision persons. In this paper a visual characteristics evaluation kit is developed for the above purpose. The kit consists of tools to measure visual resolution to display devices, contrast sensitivity, optimal font size for reading with contrast polarity effect, effective width and type of line, influence that state of mouse pointer gives to operation performance. And the tools are used to evaluate the effectiveness of them by persons with normal eyesight persons and low vision ones. As the results we show the capability of our kit to optimize accessibility settings for low vision PC users.

    CiNii Books

    researchmap

  • Replica selection for parallel and multi-wavelength downloading in optical grid networks

    4th Workshop on Network Control and Optimization (net-coop '10)   82 - 89   2010

     More details

  • Replica selection for parallel and multi-wavelength downloading in optical grid networks

    4th Workshop on Network Control and Optimization (net-coop '10)   82 - 89   2010

     More details

  • Deriving Rules between Learning Behaviors and Results from Learning Management System Logs Based on Data Mining

    MYOGA Keita, SASAKI Takashi, KAWAHARA Minoru

    Journal of the Visualization Society of Japan   29 ( 1 )   83 - 88   2009.7

     More details

    Language:Japanese   Publisher:The Visualization Society of Japan  

    DOI: 10.3154/jvs.29.83

    CiNii Books

    researchmap

  • A Self-Organizing Algorithm Based on Content Similarity for P2P Networks

    ENDO Keiichi, SAITA Kenichi, KAWAHARA Minoru, TAKAHASHI Yutaka

    The IEICE transactions on information and systems   91 ( 6 )   1494 - 1505   2008.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • Encoding for secure computations in distributed interactive real-time applications

    Keiichi Endo, Minoru Kawahara, Yutaka Takahashi

    COMPUTER COMMUNICATIONS   31 ( 9 )   1679 - 1686   2008.6

     More details

    Language:English   Publisher:ELSEVIER SCIENCE BV  

    This paper deals with massively multiplayer online services that are used for user interaction in real time. Although it is possible to distribute the load on a server to the users' computers, the distributed services are more vulnerable to cheating such as data theft. We propose a method for concealing the data from a user who is authorized to manage the data. The method makes it possible to carry out various kinds of operations, keeping both data and program codes concealed. We show that the concealed information cannot be figured out with the knowledge of the original programs or encoding keys possessed by the other users. (C) 2007 Elsevier B.V. All rights reserved.

    DOI: 10.1016/j.comcom.2007.11.002

    Web of Science

    researchmap

  • P2Pネットワークにおける保有コンテンツの類似性を考慮した検索効率向上手法

    遠藤 慶一, 最田 健一, 川原 稔, 高橋 豊

    第69回全国大会講演論文集   2007 ( 1 )   57 - 58   2007.3

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • A Distributed Architecture for Massively Multiplayer Online Services with Peer-to-Peer Support

    IFIP International Federation for Information Processing, Network Control and Engineering for QoS, Security, and Mobility, IV   ( 3 )   57 - 58   2007

     More details

  • A distributed architecture for massively multiplayer online services with peer-to-peer support

    Keiichi Endo, Minoru Kawahara, Yutaka Takahashi

    Network Control and Engineering for Qos, Security and Mobility, IV   229 ( 3 )   147 - 158   2007

     More details

    Language:English   Publisher:SPRINGER  

    This paper deals with Massively Multiplayer Online Services, users of which communicate interactively with one another in real time. At present, this kind of services is generally provided in a Client-Server Model, in which users connect directly with a central iserver managed by a service provider. However, in this model, since a computational load and a communication load concentrate on the central server, high-performance server machines and high-speed data links are required. In this paper, we propose an architecture for distributing the loads by delegating part of the server's function to users' machines, which is based on a Peer-to-Peer Model. When we adopt a Peer-to-Peer Model, we face a security problem. In our research, we let multiple machines of users manage the same data and apply a decision by majority rule. This mechanism adds robustness against halts of users' machines and data tampering by malicious users to the service.

    Web of Science

    researchmap

  • Cheat Prevention for Massively Multiplayer Online Distributed Services

    ENDO KEIICHI, KAWAHARA MINORU, TAKAHASHI YUTAKA

    IPSJ journal   47 ( 4 )   1087 - 1098   2006.4

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    This paper deals with Massively Multiplayer Online Services, users of which communicate interactively with one another in real time. We propose an architecture for distributing loads by transferring part of the server's function to users' machines. We also enumerate possible attacks by malicious users, and evaluate the robustness against them. The main idea to solve security problems is "letting multiple machines manage the same data and applying a decision by majority rule." This mechanism adds robustness to the service against halts of users' machines and cheating such as data tampering by malicious users.

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00010322/

  • A Proposal of Concealing Users' Information Using First-Order Transform on P2P Applications

    ENDO Keiichi, KAWAHARA Minoru, TAKAHASHI Yutaka

    IEICE technical report   105 ( 628 )   107 - 112   2006.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper deals with Massively Multiplayer Online Services, users of which communicate interactively with one another in real time. We propose a method for concealing data held by a user to whom authority for managing the data is delegated. With data and program codes concealed, our method enables various operations such as addition, subtraction, multiplication, and comparison. It is found difficult to decode concealed data by speculating some program codes or colluding with other users.

    CiNii Books

    researchmap

  • A Proposal of Encoded Computations for Distributed Massively Multiplayer Online Services

    Proceedings of ACM SIGCHI International Conference on Advances in Computer Entertainment Technology 2006 (ACE 2006)   CD-ROM   2006

     More details

  • A Proposal of Encoded Computations for Distributed Massively Multiplayer Online Services

    Proceedings of ACM SIGCHI International Conference on Advances in Computer Entertainment Technology 2006 (ACE 2006)   CD-ROM   2006

     More details

  • The concept of regional network for e-Learning infrastructure

    KIMURA Eizen, KAWAHARA Minoru, MURATA Takeshi, TAKAMATSU Yuzo

    IEICE technical report. Social Implications of Technology and Information Ethics   105 ( 319 )   7 - 10   2005.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In recent days, the University redefines its position at the regional in conjunction with the reforming as the independent corporation. The University is expected to do the development educational contents for the city residents, the interaction with elementary school and junior high school for comprehensive education, and the outreach effort. To lead these activities to success, we have to deploy the cost-effective and tailored to our needs regional network. We introduce our approach that we have build the regional IX with the convention of L2 and L3 connection.

    CiNii Books

    researchmap

  • A Distributed Architecture for Massively Multiplayer Online Services with Peer-to-Peer Support : Cheat-Proof Framework

    ENDO Keiichi, KAWAHARA Minoru, TAKAHASHI Yutaka

    36 ( 31 )   91 - 96   2005.3

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    This paper deals with Massively Multiplayer Online Services, users of which communicate interactively with one another in real time. At present, this kind of services is generally provided in a Client-Server Model, in which users connect directly with a central server managed by a service provider. However, in this model, since a computational load and a communication load concentrate on the central server, high-performance server machines and high-speed data links are required. In this paper, we propose an architecture for distributing the loads by delegating part of the server's function to users' machines, which is based on a Peer-to-Peer Model. When we adopt a Peer-to-Peer Model, we face a security problem. In our research, we let multiple machines of users manage the same data and apply a decision by majority rule. This mechanism adds robustness against halts of users' machines and data tampering by malicious users to the service.

    CiNii Books

    researchmap

  • A Distributed Architecture for Massively Multiplayer Online Services with Peer-to-Peer Support

    IFIPNetwork Control and Engineering for QoS, Security and Mobility Conference (NetCon'05)   1   2005

     More details

  • 地域における大学の役割の捉え直しに伴う地域IXの構想について ~ e-Learning・教育コンテンツの地域への開放のインフラとして ~

    信学技報 IEICE Technical Report SITE2005-42(2005-10)   7 - 10   2005

     More details

  • The Architecture and Performance of Topic-Driven P2P Resource Discovery System

    NAKATSUJI Makoto, KAWAHARA Minoru, KAWANO Hiroyuki

    The Transactions of the Institute of Electronics,Information and Communication Engineers.   87 ( 2 )   126 - 136   2004.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • Visualization of IDS data by Heiankyo-View

    ITOH Takayuki, TAKAKURA Hiroki, SAWADA Atsushi, KAWAHARA Minoru, KOYAMADA Koji

    Journal of the Visualization Society of Japan   24 ( 1 )   459 - 462   2004

     More details

    Language:Japanese   Publisher:The Visualization Society of Japan  

    IDS (Intrusion Detection System) is an active research topic for the purpose of cost reduction of security maintenance of computer network. However, existing IDS technologies still have some issues, including enormous log output data, and lack of analysis technologies of complicated behavior of recent intrusions. This report proposes a technique to support understanding and exploration of such behavior of intrusions, by applying an information visualization technique. The technique constructs hierarchical data according to IP addresses of computers in a target network, and visualizes the data by Heiankyo-view, which is a new technique for hierarchical data visualization. By mapping statistics of intrusions onto the visualization display, we could observe some behavior of real intrusions.

    DOI: 10.3154/jvs.24.Supplement1_459

    CiNii Books

    researchmap

  • Hierarchical routing algorithms of topic driven queries over P2P network

    NAKATSUJI Makoto, KISHI Hirofumi, KAWANO Hiroyuki, KAWAHARA Minomu

    IEICE technical report. Data engineering   103 ( 104 )   7 - 12   2003.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    P2P file sharing systems are becoming one of the most popular Internet applications, and occupy a major traffic in Internet. Recently, various searching methods have been changing from filename-based queries to contents-oriented queries. However, P2P distributed systems spend much more response time and consume the wide bandwidth of communication networks. In this paper, we propose techniques to manage routing tables by utilizing the characteristic of queries, so that we try to deal with topic-oriented query mechanisms instead of query broadcasting algorithms. We also adopt hierarchical routing tables in order to reduce the storage and management costs. Based on simulation models, we compare the performances between original query routing algorithm and our proposed algorithm.

    CiNii Books

    researchmap

  • 新聞記事に対する自動分類方式の提案

    近藤 賢二, 川原 稔, 金澤 正憲

    シンポジウム報告集   ( 1 )   37 - 42   2003.3

     More details

    Language:Japanese   Publisher:京都大学学術情報メディアセンター研究開発部  

    CiNii Books

    researchmap

  • Parallel vector computing technique for discovering communities on the very large scale Web graph

    K Kawase, M Kawahara, T Iwashita, H Kawano, M Kawazawa

    DATA WAREHOUSING AND KNOWLEDGE DISCOVERY, PROCEEDINGS   2737   151 - 160   2003

     More details

    Language:English   Publisher:SPRINGER-VERLAG BERLIN  

    The study of the authoritative pages and community discovery from an enormous Web contents has attracted many researchers. One of the link-based analysis, the HITS algorithm, calculates authority scores as the eigenvector of a adjacency matrix created from the Web graph. Although it was considered impossible to compute the eigenvector of a very large scale of Web graph using previous techniques, due to this calculation requires enormous memory space. We make it possible using data compression and parallel computation.

    Web of Science

    researchmap

  • Advanced index refinement by classifiers and distillers in P2P resource discovery

    NAKATSUJI M.

    International Conference on Intelligent Agents Web Technology and Internet Commerce'2003, Vienna   272 - 285   2003

     More details

  • Advanced Index Refinement by Classifiers and Distillers in P2P Resource Discovery

    IAWTIC2003Proceedings of International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC2003)   272 - 285   2003

     More details

  • データマイニングに基づいた文書分類手法の提案

    情報処理学会データベースとWeb 情報システムに関するシンポジウム(DBWeb2003)   203–210   2003

     More details

  • Parallel Vector Computing Technique for the Very Large Scale Web Graph

    DaWaKProceedings of 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK2003)   151–160   2003

     More details

  • Topic-Driven Resource Discovery System in Dynamic Change of Network Topology

    KAWANO Hiroyuki, NAKATSUJI Makoto, KAWAHARA Minoru

    IEICE technical report. Data engineering   102 ( 375 )   13 - 18   2002.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In recent years, many kinds of peer to peer network applications, such as Gnutella, have been developed. However, the first generation of distributed search systems provide only simple search functions, it is difficult to retrieve appropriate contents by query results. Therefore, we propose the architecture of topic-driven distributed search systems, in order to realize advanced score functions using contents analysis, network performance and other attributes. We also develop the distributed index mechanism with classifiers and distillers. In this paper, we consider the problems of search performance which are caused by the bandwidth of networks and the instability of peer to peer network topology. From the view points of next generation internet technologies, we further discuss the architecture of advanced peer-to-peer network applications based on results of our performance studies.

    CiNii Books

    researchmap

  • Extended Association Algorithm Based on ROC Analysis for Visual Information Navigator

    SpringerProgress in Discovery Science   640–649   2002

     More details

  • Extended Association Algorithm Based on ROC Analysis for Visual Information Navigator

    SpringerProgress in Discovery Science   640–649   2002

     More details

  • Performance Evaluation of Materialized Query Processing Based on ROC Distance

    NOMURA KEN, KAWANO HIROYUKI, KAWAHARA MINORU

    42 ( 8 )   56 - 65   2001.7

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    In a process to develop our search engine system, Mondou using data mining technology, it is difficult to show the relationship between a given query and associative keywords by the list indication. In this paper, we visualize this relationship based on ROC distance. Moreover, in order to visualize the relationship between a search result and associative keywords, we try to materialize the query process. we also evaluate the performance of our materialized query processing using semi-structured data.

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00017688/

  • A Proposal of Topic-Driven Resource Discovery System over Peer to Peer Network

    NAKATSUJI MAKOTO, KAWAHARA MINORU, KAWANO HIROYUKI

    IPSJ SIG Notes. ICS   124 ( 41 )   47 - 54   2001.5

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Many network applications over peer to peer network, such as Gnutella, has been developed drastically. However, by using distributed systems with simple search functions, it is difficult to discover suitable information resources and to guarantee practical response time. There fore, in order to realize good network performance and advanced functions with content-based search we introduce the index system showing the characteristic of each file. We propose the topic-oriented search mechanism, which selects optimal search hosts, based on heuristic functions with several indices in each host. We evaluate the performance of our proposed system on a small-scale prototype system.

    CiNii Books

    researchmap

  • Text Mining on Web Search(Special Issue : "Text Mining")

    KAWANO Hiroyuki, KAWAHARA Minoru, Hiroyuki Kawano, Minoru Kawahara

    Journal of the Japanese Society for Artificial Intelligence   16 ( 2 )   212 - 218   2001.3

     More details

    Language:Japanese   Publisher:The Japanese Society for Artificial Intelligence  

    DOI: 10.11517/jjsai.16.2_212

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1004/00005184/

  • Mining Association Algorithm with Improved Threshold Based on ROC Analysis

    IEEEProceedings of 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM’01)   2   703–706   2001

     More details

  • Web検索におけるテキストマイニング(共著)

    人工知能学会誌   16 ( 2 )   212 - 218   2001

     More details

  • Mining association algorithm with improved threshold based on ROC analysis

    M Kawahara, H Kawano

    2001 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING, VOLS I AND II, CONFERENCE PROCEEDINGS   703 - 706   2001

     More details

    Language:English   Publisher:IEEE  

    The mining association algorithm is one of the most popular data mining algorithms to derive association rules at high speed from huge databases. We have been developing navigation systems for semi-structured data like as Web data and bibliographic data. To navigate beginners, our systems give the association rules derived by the algorithm. However, the algorithm tends to derive those rules that contain noises such as stopwords then many systems use noise filters to remove such noises. In order to remove the noises automatically and derive more effective rules, we proposed an algorithm using the true positive rate and the false positive rate of derived rules in a database based on the ROC analysis. In this paper, we make corrections in the parameters to improve the extended mining association algorithm. Moreover we evaluate the performance of our proposed algorithm using a experimental database and show how our proposed algorithm can derive effective association rules. We also show that our proposed algorithms can remove stopwords automatically from raw data.

    Web of Science

    researchmap

  • Mining association algorithm with improved threshold based on ROC analysis

    M Kawahara, H Kawano

    2001 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING, VOLS I AND II, CONFERENCE PROCEEDINGS   2   703 - 706   2001

     More details

    Language:English   Publisher:IEEE  

    The mining association algorithm is one of the most popular data mining algorithms to derive association rules at high speed from huge databases. We have been developing navigation systems for semi-structured data like as Web data and bibliographic data. To navigate beginners, our systems give the association rules derived by the algorithm. However, the algorithm tends to derive those rules that contain noises such as stopwords then many systems use noise filters to remove such noises. In order to remove the noises automatically and derive more effective rules, we proposed an algorithm using the true positive rate and the false positive rate of derived rules in a database based on the ROC analysis. In this paper, we make corrections in the parameters to improve the extended mining association algorithm. Moreover we evaluate the performance of our proposed algorithm using a experimental database and show how our proposed algorithm can derive effective association rules. We also show that our proposed algorithms can remove stopwords automatically from raw data.

    Web of Science

    researchmap

  • Text Mining on Web Search

    Journal of Japanese Society for Artificial Intelligence   16 ( 2 )   212 - 218   2001

     More details

  • Mining Association Algorithm with Threshold Based on ROC Analysis

    IEEEProceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34)   CD-ROM   2001

     More details

  • Proposal and Evaluation of Information Visualization on Bibliographic Navigation System

    NOMURA Ken, KAWANO Hiroyuki, KAWAHARA Minoru

    IPSJ SIG Notes   122 ( 69 )   407 - 414   2000.7

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    In order to retrieve a huge volume of semi-structured data like SGML efficiently, we develop Jave applets for our information navigation systems, Mondou. The applet visualizes ROC graph and document clusters. The ROC graph shows the relationsship between a query and associative keywords derived by mining algorithm. On the other hand, the interface of document clustering is based on the extension of the VIBE system, and it presents the combination of retrieved keywords efficiently. Moreover, we evaluate the performance of our navigation system using INSPEC database.

    CiNii Books

    researchmap

  • Proposal and Evaluation of Information Visualization on Bibliographic Navigation System

    NOMURA Ken, KAWANO Hiroyuki, KAWAHARA Minoru

    IEICE technical report. Data engineering   100 ( 228 )   31 - 38   2000.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In order to retrieve a huge volume of semi-structured data like SGML efficiently, we develop Java applets for our information navigation system, Mondou. The applet visualizes ROC graph and document clusters. The ROC graph shows the relationship between a query and associative keywords derived by mining algorithm. On the other hand, the interface of document clustering is based on the extension of the VIBE system, and it presents the combination of retrieved keywords efficiently. Moreover, we evaluate the performance of our navigation system using INSPEC database.

    CiNii Books

    researchmap

  • Development and Evaluation of Information Visualization on Bibliographic Navigator

    NOMURA Ken, KAWAHARA Minoru, KAWANO Hiroyuki

    14   406 - 407   2000.7

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • The Other Thresholds in the Mining Association Algorithm(共著)

    SYSTEMS SCIENCE   26 ( 2 )   95 - 109   2000

     More details

  • Mondou: Information Navigatorwith Visual Interface, DataWarehousing and Knowledge Discovery

    Second International Conference, DaWaK 2000. Proceedings   425–430   2000

     More details

  • The Other Thresholds in the Mining Association Algorithm(共著)

    SYSTEMS SCIENCE   26 ( 2 )   95 - 109   2000

     More details

  • An Application of Text Mining: Bibliographic Navigator Powered by Extended Association Rules

    IEEEProc. of 33’th Hawaii International Conference on Systems Science (HICSS-33)   CD-ROM   2000

     More details

  • Performance Evaluation and Visualization of Association Rules using ROC Graph on Semi-Structured Data

    Proc. of Fourth Pacific-Asia Conference on Knowledge Discovery and DataMining (PAKDD’2000)   1   2000

     More details

  • An Application of Text Mining: Bibliographic Navigator Powered by Extended Association Rules

    IEEEProc. of 33’th Hawaii International Conference on Systems Science (HICSS-33)   CD-ROM   2000

     More details

  • Performance Evaluation and Visualization of Association Rules using ROC Graph on Semi-Structured Data

    Proc. of Fourth Pacific-Asia Conference on Knowledge Discovery and DataMining (PAKDD’2000)   1   2000

     More details

  • Mondou: Information Navigatorwith Visual Interface, DataWarehousing and Knowledge Discovery

    Second International Conference, DaWaK 2000. Proceedings   425–430   2000

     More details

  • テキストマイニング技術を用いた半構造データ可視化システムの構成技術に関わる研究(共著)

    発見科学:巨大学術社会情報からの知識発見に関する基礎研究   292 - 295   2000

     More details

  • Performance Evaluation of Bibliographic Navigation System with Association Rules from ROC Convex Full Method

    KAWAHARA MINORU, KAWANO HIROYUKI

    40 ( 3 )   105 - 113   1999.2

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    We have been constructing bibliographic navigators using association rules. In order to provide effective knowledge for naive users, it is very important to decide several threshold values for mining rules. In this paper, we focus on the techniques of ROC graph to evaluate the characteristics of derived rules. By using the ROC convex full method, we can estimate appropriate threshold values to derive association rules for keywords.

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00017799/

  • Performance Evaluation of Bibliographic Navigation System with Materialized Association Rules

    KAWAHARA Minoru, KAWANO Hiroyuki

    The Transactions of the Institute of Electronics,Information and Communication Engineers.   82 ( 1 )   165 - 173   1999.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • Document Navigation System using Text Mining Algorithms

    KAWANO Hiroyuki, KAWAHARA Minoru

    Proceedings of Annual Conference, Japan Society of Information and Knowledge   7 ( 0 )   15 - 20   1999

     More details

    Language:Japanese   Publisher:Japan Society of Information and Knowledge  

    Many knowledge discovery tools have been developed using data mining, the integrating technologies of machine learging, database, statistics and others. We have been constructing "mondou" search systems based on extended association rules. In this paper, we discusse the experimental results of text mining applied for web hyper texts, INSPEC database, and magazines and articles index data in the National Diet Library. First of all, we express about the efficient strategies in order to derive association rules. Next, we discuss the relation between the threshold values and association rules, and we focus on the techniques of ROC (Reciever Operating Characteristics) graph to evaluate the characteristics of derived rules. By using the ROC convex full method, we can estimate appropriate threshold values to derive association rules for keywords.

    DOI: 10.2964/jsikproc.7.0_15

    CiNii Books

    researchmap

  • テキストマイニング技術を用いた半構造データ可視化システムの構成技術に関わる研究-統合情報検索システム「問答」における研究開発-(共著)

    「発見科学」A05-班平成11年度第一回会議講演要旨集   31 - 40   1999

     More details

  • テキストマイニング技術を用いた半構造データ可視化システムの構成技術に関わる研究(共著)

    「発見科学」A05-班平成11年度第二回会議講演要旨集   31 - 40   1999

     More details

  • Document Navigation System using Text Mining Algorithm

    15 - 20   1999

     More details

  • Performance Evaluation and Visualization of Association Rules using Receiver Operating Characteristic Graph

    Proc. of 1999 International Symposium on Database Applications in Non-Traditional Environments (DANTE’99)   334–342   1999

     More details

  • Mining association algorithm based on ROC convex hull method in bibliographic navigation system

    M Kawahara, H Kawano

    DISCOVERY SCIENCE, PROCEEDINGS   1721   333 - 334   1999

     More details

    Language:English   Publisher:SPRINGER-VERLAG BERLIN  

    Web of Science

    researchmap

  • ROC Performance Evaluation of Web-based Bibliographic Navigator using Mining Association Rules

    IEEEInternet Applications, Proc. of 5th International Computer Science Conference, ICSC’99   216–225   1999

     More details

  • Performance Evaluation of Bibliographic Navigation System with Association Rules from ROC Convex Hull Method

    Transactions of the IPSJ : Database   40 ( S1G3 )   105 - 113   1999

     More details

  • Performance Evaluation and Visualization of Association Rules using Receiver Operating Characteristic Graph

    Proc. of 1999 International Symposium on Database Applications in Non-Traditional Environments (DANTE’99)   334–342   1999

     More details

  • ROC Performance Evaluation of Web-based Bibliographic Navigator using Mining Association Rules

    IEEEInternet Applications, Proc. of 5th International Computer Science Conference, ICSC’99   216–225   1999

     More details

  • Performance Evaluation of Bibliographic Navigation System with Association Rules from ROC Convex Hull Method

    Transactions of the IPSJ : Database   40 ( S1G3 )   105 - 113   1999

     More details

  • Document Navigation System using Text Mining Algorithm

    15 - 20   1999

     More details

  • Performance Evaluation of Bibliographic Navigation System with Materialized Association Rules

    Transactions of the IEICE D-I   ( J82-1 )   165 - 173   1999

     More details

  • 相関ルール実体化を行う文献情報検索支援システムの性能評価

    電子情報通信学会論文誌D-I   ( J82-1 )   165 - 173   1999

     More details

  • Performance Evaluation of Bibliographic Navigation System with Association Rules in ROC Space

    KAWAHARA Minoru, KAWANO Hiroyuki

    IPSJ SIG Notes   116 ( 1 )   135 - 142   1998.7

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    We have been constructing bibliographic navigators using association rules. In order to provide effective knowledge for naive users, it is very important to decide several threshold values for mining rules. In this paper, we focus on the techniques of ROC graph to evaluate the characteristics of derived rules. By using the ROC space, we can estimate appropriate threshold values to derive association rules for keywords.

    CiNii Books

    researchmap

  • ROC Performance Evaluation of Bibliographic Navigation System with Association Rules

    KAWAHARA Minoru, KAWANO Hiroyuki

    12   445 - 446   1998.6

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Data Mining Technologies for Bibliographic Navigation System

    KAWAHARA Minoru, KAWANO Hiroyuki, HASEGAWA Toshiharu

    Transactions of Information Processing Society of Japan   39 ( 4 )   878 - 887   1998.4

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Without background and domain knowledge, it is generally difficult for naive users to retrieve appropriate results from bibliographic databases. The one of difficulties is due to the ambiguousness of keywords in search queries. In this paper, in order to knowledge of keywords space, we extend one of the data mining algorithms which discovers association rules from the bibliographic database, and we modify search queries using derived rules. Moreover, we have to refine derived rules, and we try to apply our proposed algorithm to different databases and derive different rule sets in the other view of different domains. We also develop a prototype of mining system for bibliographic navigation based on full text database, and evaluate the effectiveness of our proposed algorithms.

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00013125/

  • Implementation of Bibliographic Navigation System with Text Data Mining

    Systems Science   24 ( 3 )   101 - 118   1998

     More details

  • 文献データベース情報検索に対するデータマイニング技術の適用

    情報処理学会論文誌   39 ( 4 )   878 - 887   1998

     More details

  • Implementation of Bibliographic Navigation System with Text Data Mining

    Systems Science   24 ( 3 )   101 - 118   1998

     More details

  • 文書デ-タマイニングによる雑誌記事索引デ-タベ-ス検索支援 (『1998年情報学シンポジウム』プログラム--WWW情報検索・電子図書館・セキュリティ・著作権・マルチメディア情報流通・感性情報処理) -- ((セッション7)情報検索と知識獲得)

    河野 浩之, 川原 稔, 長谷川 利治

    情報学シンポジウム講演論文集   ( 1998 )   121 - 128   1998

     More details

    Language:Japanese   Publisher:〔日本学術会議〕  

    researchmap

  • Data Mining Technologies for Bibliographic Navigation System

    39 ( 4 )   878 - 887   1998

     More details

  • Implementation of Bibliographic Navigation System with Association Rules

    KAWAHARA Minoru, KAWANO Hiroyuki

    IEICE technical report. Artificial intelligence and knowledge-based processing   97 ( 416 )   19 - 24   1997.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    It is generally difficult for naive users to retrieve appropriate bibliographies from bibliographic databases, even if they have background and domain knowledge. One of the reason of the difficulty is that value of the attribute is not limited in certain values. In this paper, we describe about an implementation of our bibliographic navigation system with the mining association algorithm which was extended from one of the data mining algorithms by us. In order to provide more helpful knowledge, we categorize the attributes and extend the mining association algorithms which discover relevance to a keywords space. By our algorithms, interesting rules are derived from relationships between several categorized attributes in a database. We also verify the performance of our proposed algorithms on our practical bibliographic navigation system.

    CiNii Books

    researchmap

  • Navigating System for Bibliographic Databases : Search Interface by Mondou

    KAWANO Hiroyuki, KAWAHARA Minoru

    IPSJ SIG Notes   46 ( 68 )   49 - 56   1997.7

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Without background and domain knowledge, it is generally difficult for naive search users to retrieve appropriate bibliographies from bibliographic databases. In this paper, in order to provide more helpful knowledge including associative keywords, we extend the algorithm to derive association rules, which plays very important roles in the area of data mining researches. Moreover, we develop a navigation system using textual data mining algorithms, and verify the effectiveness of our proposed algorithms. We also consider the effectiveness of data mining for bibliographic search.

    CiNii Books

    researchmap

  • Implementation of Bibliographic Navigator with Association Rules

    KAWAHARA Minoru, KAWANO Hiroyuki

    IEICE technical report. Data engineering   97 ( 161 )   109 - 114   1997.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Without background and domain knowledge, it is generally difficult for naive users to retrieve appropriate bibliographies from a bibliographic database. One of the reason of the difficulty is that value of the attribute is not limited in certain values. In this paper, in order to provide more helpful knowledge, we categorize the attributes and extend the mining association algorithms which discover relevance to a keywords space. By our algorithms, interesting rules are derived from relationships between several categorized attributes in a database. We also propose algorithms in order to modify an initial query with keywords, which are specified by users' view. Moreover, we develop a navigator using textual data mining algorithms, and verify the effectiveness of our proposed algorithms.

    CiNii Books

    researchmap

  • Implementation of Bibliographic Navigator with Association Rules

    KAWAHARA Minoru, KAWANO Hiroyuki

    IPSJ SIG Notes   113 ( 64 )   239 - 244   1997.7

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Without background and domain knowledge, it is generally difficult for naive users to retrieve appropriate bibliographies from a bibliographic database. One of the reason of the difficulty is that value of the attribute is not limited in certain values. In this paper, in order to provide more helpful knowledge, we categorize the attributes and extend the mining association algorithms which discover relevance to a keywords space. By our algorithms, interesting rules are derived from relationships between several categorized attributes in a database. We also propose algorithms in order to modify an initial query with keywords, which are specified by users' view. Moreover, we develop a navigator using textual data mining algorithms, and verify the effectiveness of our proposed algorithms.

    CiNii Books

    researchmap

  • 時空間デ-タベ-スに対する属性指向問い合わせ処理

    大田 浩史, 川原 稔, 河野 浩之

    人工知能基礎論研究会   ( 29 )   42 - 47   1997.6

     More details

    Language:Japanese   Publisher:人工知能学会  

    CiNii Books

    researchmap

  • Structure of the Navigation System using Association Rules in Bibliographic Databases

    KAWAHARA Minoru, KAWANO Hiroyuki, HASEGAWA Toshiharu

    IPSJ SIG Notes   112 ( 38 )   33 - 40   1997.5

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Without background and domain knowledge, it is generally difficult for naive users to retrieve appropriate bibliographies from bibliographic databases. In this paper, in order to provide more helpful knowledge, we extend the mining association algorithms which discover relevance to a keywords space. By our algorithms, interesting rules are derived from relationships between several attributes in heterogeneous databases. We also propose algorithms in order to modify an initial query with keywords, which are specified by users' view. Moreover, we develop a navigation system using textual data mining algorithms and agent communication, and verify the effectiveness of our proposed algorithms.

    CiNii Books

    researchmap

  • Navigating System for Bibliographic Databases : Search Interface by Mondou

    97-46   49 - 56   1997

     More details

  • Structure of the Nabigation System using Association Rules in Bibliographic Databases

    97-112   33 - 40   1997

     More details

  • Implementation of Bibliographic Nabigation System with Association Rules

    97 ( 416 )   19 - 24   1997

     More details

  • Implementation of Bibliographic Nabigator with Association Rules

    97-113   239 - 244   1997

     More details

  • Implementation of Bibliographic Nabigation System with Association Rules

    97 ( 416 )   19 - 24   1997

     More details

  • 雑誌記事索引データペースのナビゲーション-「問答」による分析-(共著)

    情報処理学会研究報告   97-46   49 - 56   1997

     More details

  • Structure of the Nabigation System using Association Rules in Bibliographic Databases

    97-112   33 - 40   1997

     More details

  • Evaluation of Index Based Clustering Method in Spatial Database

    53 ( 0 )   19 - 20   1996.9

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • 空間データ発掘によるクラスタ発見手法の精度評価

    第53回全国大会講演論文集,(社)情報処理学会   3   19 - 20   1996

     More details

  • Attribute-oriented mining algorithm with entropy-based cost functions

    Proceedings of the International Symposium on Cooperative Database Systems for Advanced Applications   265–268   1996

     More details

  • Evaluation of Index Based Clastering Method in Spatial Database

    3   19 - 20   1996

     More details

  • Attribute-oriented mining algorithm with entropy-based cost functions

    Proceedings of the International Symposium on Cooperative Database Systems for Advanced Applications   265–268   1996

     More details

  • A MONTE-CARLO SIMULATION OF THE EVACUATION PROCESS IN THE MOLECULAR-FLOW REGIME

    M KIMATA, H IIYORI, M KAWAHARA, AB VILLAFLOR

    JAPANESE JOURNAL OF APPLIED PHYSICS PART 1-REGULAR PAPERS SHORT NOTES & REVIEW PAPERS   27 ( 6 )   1071 - 1076   1988.6

     More details

    Language:English   Publisher:JAPAN J APPLIED PHYSICS  

    Web of Science

    researchmap

  • A Monte Carlo Simulation of the Evacuation Process in the Molecular Flow Regime

    Japanese Journal of Applied Physics   1071–1076   1988

     More details

▼display all

Research Projects

  • Basic research on the measurement of visual characteristics using information devices

    2018.4 - 2021.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Kawahara Minoru

      More details

    Grant amount:\4420000 ( Direct Cost: \3400000 、 Indirect Cost:\1020000 )

    We researched and developed a new conceptual method for measuring the field of view using information devices such as tablets and smartphones, and developed measurement algorithms and a measurement system. We were able to obtain patents in Japan, the U.S., Germany, and China for this technology. By using this new concept of visual field measurement, it will be possible for anyone to measure the visual field easily using an information device, which will enable early detection of visual impairment such as glaucoma, which will not only reduce the progression of symptoms, but will also enable us to cope with visual impairment in an aging society.

    researchmap

  • Basic Research of Information Oriented Optimizing e-Learning System for Low-Vision Users

    2014.4 - 2017.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    KAWAHARA Minoru, TAKAHASHI nobuyuki

      More details

    Grant amount:\4810000 ( Direct Cost: \3700000 、 Indirect Cost:\1110000 )

    We have made researches and developments for building an optimal environment that supports low-vision users to use output devices such as displays to be used in e-learning. And technology methods to measure easily precisely the visual characteristics of users by using information devices.

    researchmap

  • Basic Research of Constructing e-Learning System for Low-Vision Users

    2011 - 2013

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    KAWAHARA Minoru

      More details

    Grant amount:\5330000 ( Direct Cost: \4100000 、 Indirect Cost:\1230000 )

    We have made researches and developments for building an optimal environment that supports low-vision users to use output devices such as displays to be used in e-learning. And technology methods to measure easily precisely the visual characteristics of users by using information devices.

    researchmap

  • Research on Large-Scale Distributed Content Discovery and Delivery Networks

    2006 - 2009

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    TAKAHASHI Yutaka, KAWAHARA Minoru, KASAHARA Shoji, MASUYAMA Riroyuki, ADACHI Naotoshi, SASAKI Takashi, ENDO Keiichi

      More details

    Grant amount:\17200000 ( Direct Cost: \14500000 、 Indirect Cost:\2700000 )

    We developed mathematical models and performance analysis methodologies to evaluate the quality of service (QoS) of large-scale content discovery and delivery systems. In terms of those models, we evaluated the transmission delay and packet/frame loss probability as performance measures. We also evaluated the effectiveness of packet-level forward error correction (FEC) which plays a key role for quick recovery from possible packet losses caused by buffer overflow and transmission error while carrying real-time traffic and one-to-many traffic.

    researchmap

  • proactive/reactive併用送信誤り回復方式に関する研究

    2004 - 2005

    日本学術振興会  科学研究費助成事業  萌芽研究

    高橋 豊, 河野 浩之, 川原 稔, 笠原 正治, 増山 博之

      More details

    Grant amount:\3400000 ( Direct Cost: \3400000 )

    実時間制約の強いコンテンツをQoS保証しながら円滑に送信するために、そのパス上でのパケット廃棄確率とスループットを性能予測する方法論の確立を行った.主な具体的成果としては次のものがある.
    1.バースト的なパケット・ストリームを数学的にモデル化するためにDAR(1)を用い、ルータあるいは受信ノードにおけるバッファ内パケット数分布の過渡解析手法を開発した。この方法の特徴は、バースト性を表現する数学的な精密さとパラメータ・フィッティングの容易さである。これによりストリーミング型の送信において重要な性能評価指標である、パケットのオーバフロー、アンダーフロー確率の過渡的振る舞いを定量的に解析することが可能になった.
    2.実時間制約の強いコンテンツ送信に向けたreactiveな送信誤り制御を開発し、その性能評価を行った.これにより,実時間制約が強く帯域が十分である場合にはFECに重きをおき,ネットワーク内遅延の減少した場合にはARQを主体にし、FECによるオーバヘッドが削減でき、帯域を節約できる高効率・高信頼の送信誤り回復が可能になるが,そのための適切な切り替えを可能とする性能評価手法の開発を行った.加えてマルチキャスト環境で再送リクエストがネットワークの輻輳を招くことを防ぐ工夫にも言及した.

    researchmap

  • Webマイニング技術を用いたピアツーピア情報フィルタリングに関する研究

    2004 - 2005

    日本学術振興会  科学研究費助成事業  特定領域研究

    河野 浩之, 後藤 邦夫, 川原 稔

      More details

    Grant amount:\10000000 ( Direct Cost: \10000000 )

    ピアツーピアネットワークを利用する情報流通形態の重要性は高まっており,その情報検索手法も,単純な検索からコンテンツべースの検索に発展している.しかし,問合せ応答時間,問合せパケットによるネットワーク帯域圧迫に関する問題は解決されていない.そこで,本研究では,分散型インデックス技術とは異なる技術として,JXTAのクエリー・ルーチング機能の発展を試みた.具体的には,問合せ要求に情報資源の特性を記述し,問合せに合致する情報資源を持つピアから検索ピアへ返送される応答内容を各ピアのルーチング機構により学習を行う.そして,問合せ転送時に,問合せとそのルーチング情報を照合し,隣接ピアの中でどのピアに問合せを転送するのが適切であるかを判断し転送する手法である.
    我々は,階層型問合せルーチング機能としての提案を行い,プロトタイプシステム実装,さらに,階層型ネットワークルーチング機構に対する解析モデルを用いた性能評価を行った.これらの結果に基づいて,提案システムのスケーラビリティなどに関する検討を行なった.そして,階層型問合せルーチング機構の特性,転送遅延時間のある実ネットワークにおけるP2P情報フィルタリングシステムのスケーラビリティや安定性などに関する性能評価に関する知見を得た.
    また,小規模なPCクラスタを用いたP2Pネットワーク環境下で,プロトタイプシステムの実装と実行を行った.P2Pシステムの各種性能評価を行うために,転送遅延機能をもつルータを用いたインターネットエミュレーション環境を構築した.実験環境は,実ネットワーク環境に近いネットワーク構築を行うため,転送遅延ルータ用PC上にNistNetを利用した転送遅延ルータを相互接続したものである.

    researchmap

  • Category Classification and Effective Retrieval Based on Data Mining Technique

    2003 - 2006

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    KAWAHARA Minoru

      More details

    Grant amount:\3600000 ( Direct Cost: \3600000 )

    It is very difficult to categorize articles in such as newspapers. In order to categorize such articles into pre-classified categorizes effectively, we use association rules derived from the original data and then can improve the categorizing precision. On the other hand, it is also important technology to delivery content over the world and retrieve them. And we have proposed techniques to delivery and retrieve content over Peer-to-Peer network effectively with considering security.

    researchmap

  • Webマイニング技術を用いたピアツーピア情報フィルタリングに関する研究

    2003

    日本学術振興会  科学研究費助成事業  特定領域研究

    河野 浩之, 川原 稔

      More details

    Grant amount:\5000000 ( Direct Cost: \5000000 )

    近年,ピアツーピアネットワークによる情報流通形態が普及しつつあり,情報検索手法も,ファイル名のみの検索から,コンテンツベースの検索に発展しているが,超分散環境における応答時間,さらに,問合せパケットによるネットワーク帯域圧迫が問題となっている.そこで,P2Pシステムの特性を生かした分類子・抽出子を用いた情報フィルタリング技術の提案を行ってきた.あわせて,ピア型ネットワークにおける情報フィルタリング機構が,実ネットワークのもつ様々な変動,例えば,ルーチングに伴うトポロジーや帯域の変動により,影響を受けることに考慮した研究を進めてきた.
    そこで,本年度は,典型的な分散型インデックス技術では,効率的な情報フィルタリングの実現が難しいことに注意しながら,JXTAのクエリルーチング機能を発展させる検討を進めた.具体的には,問合せに要求する情報資源の特性を反映した記述を与え,各ピアで問合せに合致する情報資源を持つピアから検索ピアへ送り返される問合せ応答の内容を監視する.そして,隣接ピアを経由して到達可能な複数のピアの蓄積データの特性を蓄積しておき,問合せを受け取ったときに,問合せとその蓄積情報を照合し,隣接ピアの中でどのピアに問合せを転送するのが適切であるかを判断し,転送先に対するルーチングを行う手法を提案した.そして,この手法を,階層型問合せルーチング機能として提案し,階層型ネットワークルーチング機構に対して解析モデルを用いた性能評価を行うことで,提案システムのスケーラビリティなどに関する検討を行なった.

    researchmap

  • Development of a Content Delivery Network for Next Generation and its Performance Analysis

    2002 - 2005

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    TAKAHASHI Yutaka, KAWANO Hiroyuki, KAWAHARA Minoru, KASAHARA Shoji, MASUYAMA Hiroyuki

      More details

    Grant amount:\14700000 ( Direct Cost: \14700000 )

    We have carried out our research actively towards developing a highly efficient content delivery network from theoretical point of view. Some of our achievements are listed below.
    ・We have investigated the impact of long-range dependence arising in traffic on the performance of real-time content delivery.
    ・We have proposed a channel allocation algorithm for a cellular network which allocates channel bandwidth efficiently giving higher priority to voice calls and derived performance measures such as packet loss probability, transmission delay and call loss probability.
    ・We have developed a mathematical model called a 'polling model' to evaluate the performance of Bluetooth technology for the last hop of content delivery and analytically derived the transmission delay and throughput of the model.
    ・We have analyzed the performance of some variants of FEC which are based on XOR and clarified the relationship among 1)the number of symbols taken together in a XOR operation, 2)its probability distribution if it is random, 3)the ratio of redundancy to the original data set, 4)the channel error rate 5)the successful transmission probability.
    ・We have considered the performance of a hybrid FEC/ARQ for the recovery from packet losses and bit errors in real-time content distribution.
    ・We have proposed an autonomous self-organization algorithm for distributed content delivery systems using overlay networks and demonstrated its usefulness.
    ・We have developed a mathematical model and its performance analysis for the appropriate design and dimensioning of playout delay and buffer size taking network delay caused by congestion into consideration.
    ・We have developed a fundamental technique to estimate the traffic volume and distributions of hop counts and round trip time between peers in overlay networks and carried out experimental tests in real networks.

    researchmap

  • Webマイニング技術を用いたピアツーピア情報フィルタリングに関する研究

    2002

    日本学術振興会  科学研究費助成事業  特定領域研究

    河野 浩之, 川原 稔

      More details

    Grant amount:\6000000 ( Direct Cost: \6000000 )

    P2Pネットワークにおける情報検索機構の拡張を行うことは,適切な情報流通支援となる.そこで,以下の観点から研究を進めた.
    【1.Webマイニングアルゴリズムの研究強化】
    分散Webマイニングアルゴリズム,P2Pコンテンツを視野にいれたWebマイニングアルゴリズムの研究開発を継続し,P2Pネットワークのトポロジー変化に関わる問題解決を図るために,問合せルーチング機能の拡張を提案した.
    【2.P2P情報フィルタリング機構の実装】
    PCサーバ上にプロトタイプシステムを実装し,P2P情報資源に対するインデックスと情報フィルタリング機構の性能評価を行った.特に,コンテンツの多重度・重要度を利用した指標の改善を図った.
    【3.P2P環境下のWeb情報統合技術のPCクラスタへの実装】
    P2P環境下のWeb情報統合と検索を実現するプロトタイプシステムの基本的性能を評価し,基礎的な検証実験から発展させるために,複数のP2Pクライアントを導入した検証実験のためのシステム構築を行った.

    researchmap

  • Distributed Cooperative Information Filtering by using Data Mining Techniques

    2001 - 2004

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    KAWANO Hiroyuki, KAWAHARA Minoru

      More details

    Grant amount:\3500000 ( Direct Cost: \3500000 )

    Researches of knowledge discovery and data mining from electronic data are important, we are trying to propose data mining algorithms, to implement web search systems for semi-structured data including bibliographic information and to develop information visualizing interface for amount of data.
    In this research, based on our previous research results of implementing "Mondou (RCA.AU)" search engine, we focus on more sophisticated cooperative distributed information filtering mechanisms. Firstly, we describe several results, such as web data analysis for reducing search costs, propose of new search model by using characteristic structures of web hyperlink graphs, frameworks of cooperative distributed information filtering systems over P2P network. Furthermore, we try to develop information systems based on statistical data of web archiving system of NDL (National Diet Library).
    In this report, we introduce web information retrieval systems, data mining tools and background research issues of information filtering techniques. Next, we describe our research results of several web mining algorithms, and partial results of cooperative distributed information filtering systems over P2P network. Finally, we try to extend our research results for management and operation of web archiving systems.

    researchmap

  • Webマイニング技術を用いたピアツーピア情報フィルタリング

    2001

    日本学術振興会  科学研究費助成事業  特定領域研究(C)

    河野 浩之, 川原 稔

      More details

    Gnutellaのようなピュア型のP2Pシステムの分散検索性能を向上させるために「Webマイニング技術を用いたピアツーピア情報フィルタリング」に関する基礎研究を行った.なお,研究者らが,これまでに行った研究内容は,「Webマイニングアルゴリズムの研究開発」と「P2P除法フィルタリング手法の研究開発」に分けることができる.そして,研究者らが1995年以後行ってきたWeb検索エンジン「問答」と直接関連する前者の研究を踏まえて,新たなプラットホームであるP2Pネットワーク上のリソースに適用する後者の研究を遂行した.
    1.Webマイニングアルゴリズムの研究開発の成果
    XMLなどの半構造データのメタ情報を活用したクラスタリングアルゴリズムや相関ルール導出アルゴリズムを基礎に,P2P環境下でより分散して配置される情報資源に利用可能なマイニング技術を視野に入れた研究を行った.処理データとして,Webページのハイパーリンクのアンカー情報を利用した.
    2.P2P情報フィルタリング手法の研究開発の成果
    P2Pクライアントに蓄積された情報資源に対し,データマイニング技術を用いたフィルタリング手法を提案した.特に,情報資源の効率的選択を支援するために,検索ユーザのプリファレンスとコンテンツの情報ベクトルを利用した指標の開発を,分類子・抽出子の技術を基礎に研究を進めた.
    上記に関わる研究報告を,情報処理学会知能と複雑系研究会,ならびに,情報処理学会データベースシステム研究会の「データベースとWeb情報システムに関するシンポジウム(DBWeb2001)」において行った.

    researchmap

  • ROC解析を応用した知識獲得アルゴリズムの客観的性能評価手法の研究

    2000 - 2001

    日本学術振興会  科学研究費助成事業  奨励研究(A)

    川原 稔

      More details

    Grant amount:\2200000 ( Direct Cost: \2200000 )

    知識獲得に用いる上述の高速アルゴリズムでは,アルゴリズムで用いられるパラメータを予め設定する必要があるが,それらは経験的に与えているのが現状である.アルゴリズムの評価においても,同じパラメータに対して異なるアルゴリズムによる導出結果に対する比較評価に主眼が置かれており,獲得された知識に対する客観的な評価方法は,まだ完全には確立していない.本研究では,獲得された知識を客観的に評価する判断基準を確立し,それを基にパラメータの設定により獲得される知識の性能評価を行い,各種アルゴリズムにおいて最良の知識獲得が行えるパラメータの設定判断基準を与えることを目的とし研究を行った.
    制御分野の信号処理で「警告漏れ」と「誤警告」のような警告エラーにおける閾値に関する研究としてROC(Receiver Operating Characteristics)解析があるが,この手法を,Web文書や文献情報などの半構造データからの知識獲得を行う各種アルゴリズムに対して「検索漏れ」と「誤検索」に着目して適用し,経験的な判断基準の設定を必要としない知識獲得アルゴリズムの研究開発を行った.
    研究開発した手法を実際的なデータに基づいて定量的に評価するため,Webデータおよび文献二次情報データに対しての性能評価を行い,適用手法が様々なタイプのデータに適用可能となるように一般化を行った.その結果,知識として有用であるかの判断基準を設定することが可能となり,その判断基準を基にして最も知識として有用と考えられるルール導出が可能なアルゴリズムの開発が確認された.また,開発したアルゴリズムが効率よくノイズを自動的に除去可能であることが確認され,未知の情報に対しての情報フィルタリングとして機能することも併せて確認することができた.

    researchmap

  • テキストマイニング技術を用いた半構造データ可視化システムの構成技術に関わる研究

    1999

    日本学術振興会  科学研究費助成事業  特定領域研究(A)

    河野 浩之, 川原 稔

      More details

    Grant amount:\2100000 ( Direct Cost: \2100000 )

    本年度は,半構造データ検索における可視化システムの有効性を検証するために次の研究を行った.
    1.データマイニングアルゴリズムおよび可視化アルゴリズムの研究開発
    半構造データから導出されたルールを可視化するために必要なアルゴリズムの検討を行った.まず,ルール提示には,ROC性能評価とサポート値を用いた三次元表示を基本として,fisheye技法を用いて,一覧性の高い表示を試みた.さらに,検索式との対応関係を理解しやすいようにVIBEで用いられているクラスタリング処理を拡張し,検索結果表示を試みた.
    2.提案したアルゴリズムのプロトタイプシステムへの実装
    京都大学大型計算機センターのグラフィックスワークステーションSGI ONYXなどから利用できる形で,ルールを可視化するアルゴリズムの実装を行った.なお,汎用性を考慮して,可視化を含む検索処理をJava appletによって実装した.
    3.プロトタイプシステムへのデータ入力および処理
    実装したプロトタイプシステムに,INSPECデータベース,国会図書館の雑誌記事索引を蓄積し,検索処理に関わる実験ならびに性能評価を行った.なお,ネットワーク上から得られたWebデータもあわせて利用できるようにした.
    4.研究成果の発表および報告
    提案したアルゴリズム,および,プロトタイプシステムの研究開発成果を,国際会議などで報告した.

    researchmap

▼display all