Updated on 2024/09/05

写真a

 
SASABE,Masahiro
 
Organization
Faculty of Informatics Professor
Title
Professor
External link

Degree

  • Ph.D. (Information Science) ( 2006.3   Osaka University )

Research Interests

  • Advanced Information Networking

  • Network Optimization

  • Human-Harmonized Systems

  • Network Functions Virtualization

  • Mathematical Optimization

  • Selfish yet Optimal Control

  • Game Theory

  • Content Delivery

  • Automatic Evacuation Guiding

Research Areas

  • Informatics / Computer system

  • Informatics / Information network

Research History

  • Kansai University   Faculty of Informatics   Professor

    2023.4

      More details

  • Nara Institute of Science and Technology   Graduate School of Science and Technology   Associate Professor

    2018.4 - 2023.3

      More details

  • Nara Institute of Science and Technology   Graduate School of Information Science   Associate Professor

    2014.4 - 2018.3

      More details

  • Osaka University   Graduate School of Engineering   Assistant Professor

    2007.7 - 2014.3

      More details

  • Osaka University   Cybermedia Center   Assistant Professor

    2007.4 - 2007.6

      More details

    Country:Japan

    researchmap

  • Osaka University   Cybermedia Center   Assistant Professor

    2004.7 - 2007.3

      More details

  • Japan Society for the Promotion of Science   Research Fellowship for Young Scientists

    2003.9 - 2004.6

      More details

▼display all

Papers

  • On Practicality of Kernel Packet Processing Empowered by Lightweight Neural Network and Decision Tree

    Takanori Hara, Masahiro Sasabe

    2023 14th International Conference on Network of the Future (NoF)   2023.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/nof58724.2023.10302811

    researchmap

  • An Evolutionary Game Theoretic Analysis of Cybersecurity Investment Strategies for Smart-Home Users against Cyberattacks

    N’guessan Yves Roland Douha, Masahiro Sasabe, Yuzo Taenaka, Youki Kadobayashi

    Applied Sciences (Switzerland)   13 ( 7 )   2023.4

     More details

    Publishing type:Research paper (scientific journal)  

    In the digital era, smart-home users face growing threats from cyberattacks that threaten their privacy and security. Hence, it is essential for smart-home users to prioritize cybersecurity education and training to secure their homes. Despite this, the high cost of such training often presents a barrier to widespread adoption and accessibility. This study aims to analyze the costs and benefits associated with various cybersecurity investment strategies for smart-home users in the context of cyberattacks. The study utilizes evolutionary game theory to model a game comprised of three populations: smart-home users, stakeholders, and attackers. We derive and analyze the replicator dynamics of this game to determine the evolutionarily stable strategy (ESS). Furthermore, we investigate the impacts of the costs and benefits of cybersecurity investment and cyberattack costs on the ESS. The findings indicate that incurring costs for cybersecurity training is beneficial for smart-home users to protect their homes and families. However, the training costs must be low and affordable for smart-home users in order to ensure their participation and engagement. Additionally, providing rewards for commitment to cybersecurity is crucial in sustaining interest and investment over the long term. To promote cybersecurity awareness and training for smart-home users, governments can incorporate it as a priority in national cybersecurity plans, provide subsidies for training costs, and incentivize good cybersecurity practices.

    DOI: 10.3390/app13074645

    Scopus

    researchmap

  • On robustness against evacuees’ unexpected movement in automatic evacuation guiding

    Jun Kawahara, Takanori Hara, Masahiro Sasabe

    Computers and Electrical Engineering   105   108531 - 108531   2023.1

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Elsevier BV  

    DOI: 10.1016/j.compeleceng.2022.108531

    researchmap

  • Resource-Efficient and Availability-Aware Service Chaining and VNF Placement with VNF Diversity and Redundancy

    Takanori HARA, Masahiro SASABE, Kento SUGIHARA, Shoji KASAHARA

    IEICE Transactions on Communications   2023

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transcom.2023wwp0003

    researchmap

  • Speedy and Efficient Service Chaining and Function Placement Based on Lagrangian Heuristics for Capacitated Shortest Path Tour Problem

    Takanori Hara, Masahiro Sasabe

    Journal of Network and Systems Management   31 ( 1 )   2022.12

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    DOI: 10.1007/s10922-022-09715-y

    researchmap

    Other Link: https://link.springer.com/article/10.1007/s10922-022-09715-y/fulltext.html

  • Path reachability including distance-constrained detours

    Masahiro Sasabe, Miyu Otani, Takanori Hara, Shoji Kasahara

    Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability   1748006X2211336 - 1748006X2211336   2022.11

     More details

    Publishing type:Research paper (scientific journal)   Publisher:SAGE Publications  

    When nodes and/or links are down in a network, the network may not function normally. Most of the existing work focuses on the reachability between two nodes along a path, that is, path reliability, and that through arbitrary paths, that is, network reliability. However, in case of wireless multi-hop networks and road networks, it may be inefficient or difficult to recalculate a path from the source to the destination when a failure occurs at an intermediate link in the path. In such cases, we can expect that the reachability between two nodes will improve by taking a detour from the entry of the failure link (i.e. failure point) to the destination without traversing the failure link. Since the detour may also increase the communication/travel delay, in this paper, we propose a new path metric (i.e. path reachability including distance-constrained detours), which consists of the conventional path reachability and the reachability along distance-constrained detours under arbitrary link failures in the original path. We first prove the two important characteristics: (1) the proposed metric is exactly the same as the network reliability in case of no distance constraint and (2) it is upper bounded by the diameter constrained network reliability. Through numerical results using a grid network and more realistic networks (i.e. wireless networks and a road network), we show the fundamental characteristics of the proposed metric and analyze the goodness of several representative paths in terms of the proposed metric as well as the conventional metrics (i.e. path length and path reachability).

    DOI: 10.1177/1748006x221133600

    researchmap

    Other Link: http://journals.sagepub.com/doi/full-xml/10.1177/1748006X221133600

  • Deep Reinforcement Learning with Graph Neural Networks for Capacitated Shortest Path Tour based Service Chaining

    Takanori Hara, Masahiro Sasabe

    2022 18th International Conference on Network and Service Management (CNSM)   2022.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.23919/cnsm55787.2022.9965166

    researchmap

  • Lagrangian Heuristics for Capacitated Shortest Path Tour Problem Based Online Service Chaining

    Takanori Hara, Masahiro Sasabe

    NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium   2022.4

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/noms54207.2022.9789758

    researchmap

  • Cost-Efficient Blockchain-Based Access Control for the Internet of Things

    Christopher Wiraatmaja, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara

    2021 IEEE Global Communications Conference (GLOBECOM)   2021.12

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/globecom46510.2021.9685205

    researchmap

  • Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach

    Masahiro Sasabe

    Peer-to-Peer Networking and Applications   2021.7

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media {LLC}  

    DOI: 10.1007/s12083-021-01182-7

    researchmap

  • Intelligent Mining Pool Selection in the Case of Unobservable Block Withholding Attack

    Kentaro Fujita, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara

    2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)   2021.5

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icbc51069.2021.9461125

    researchmap

  • Block diffusion delay attack and its countermeasures in a Bitcoin network Reviewed

    Masahiro Sasabe, Masanari Yamamoto, Yuanyu Zhang, Shoji Kasahara

    International Journal of Network Management   32 ( 3 )   1 - 21   2021.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/nem.2190

    researchmap

  • Capacitated Shortest Path Tour Problem-Based Integer Linear Programming for Service Chaining and Function Placement in NFV Networks

    Masahiro Sasabe, Takanori Hara

    IEEE Transactions on Network and Service Management   18 ( 1 )   104 - 117   2021.3

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers (IEEE)  

    DOI: 10.1109/tnsm.2020.3044329

    researchmap

  • Mining Pool Selection under Block WithHolding Attack

    Kentaro Fujita, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara

    APPLIED SCIENCES-BASEL   11 ( 4 )   2021.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:MDPI  

    In current Proof-of-Work (PoW) blockchain systems, miners usually form mining pools to compete with other pools/miners in the mining competition. Forming pools can give miners steady revenues but will introduce two critical issues. One is mining pool selection, where miners select the pools to join in order to maximize their revenues. The other is a Block WithHolding (BWH) attack, where pools can inject part of their hash/mining power into other pools to obtain additional revenues without contributing to the mining process of the attacked pools. Reasoning that the BWH attack will have significant impacts on the pool selection, we therefore investigate the mining pool selection issue in the presence of a BWH attack in this paper. In particular, we model the pool selection process of miners as an evolutionary game and find the Evolutionarily Stable States (ESSs) of the game (i.e., stable pool population states) as the solutions. Previous studies investigated this problem from the perspective of pool managers and neglected the revenues from attacked pools (attacking revenues), leading to less accurate and insightful findings. This paper, however, focuses on the payoffs of miners and carefully takes the attacking revenues into consideration. To demonstrate how the problem is solved, we consider the scenario with two mining pools and further investigate the case where one pool attacks the other and the case where the two pools attack each other. The results in this paper show that pools can attract more miners to join by launching a BWH attack and the attack power significantly affects the stable pool populations.

    DOI: 10.3390/app11041617

    Web of Science

    researchmap

  • Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework.

    Yuanyu Zhang, Mirei Yutaka, Masahiro Sasabe, Shoji Kasahara

    IEEE Internet Things J.   8 ( 8 )   6372 - 6384   2021

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/JIOT.2020.3033434

    researchmap

  • An Incentivization Mechanism with Validator Voting Profile in Proof-of-Stake-Based Blockchain

    Takeaki MATSUNAGA, Yuanyu ZHANG, Masahiro SASABE, Shoji KASAHARA

    IEICE Transactions on Communications   E105.B ( 2 )   228 - 239   2021

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transcom.2021cep0004

    researchmap

  • Multi-Agent Distributed Route Selection under Consideration of Time Dependency among Agents' Road Usage for Vehicular Networks

    Takanori HARA, Masahiro SASABE, Shoji KASAHARA

    IEICE Transactions on Communications   E105.B ( 2 )   140 - 150   2021

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transcom.2021cet0001

    researchmap

  • Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things.

    Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara

    CoRR   abs/2103.04016   2021

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/corr/corr2103.html#abs-2103-04016

  • AsthaNet: Co-Creating Network Solution for Socio-Economic Development of Disconnected Communities

    Kabir, K. Habibul, Khan, Ashraful Alam, Ahmed, Ashir, Sasabe, Masahiro, Kabir, K. Hasibul

    International Journal of Humanitarian Technology   1 ( 2 )   172 - 209   2020.10

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1504/IJHT.2020.10034657

    researchmap

  • IOTA-Based Access Control Framework for the Internet of Things

    Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara

    2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)   2020.9

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/brains49436.2020.9223293

    researchmap

  • Capacitated Refuge Assignment for Speedy and Reliable Evacuation

    Takanori Hara, Masahiro Sasabe, Taiki Matsuda, Shoji Kasahara

    ISPRS International Journal of Geo-Information   9 ( 7 )   442 - 442   2020.7

     More details

    Publishing type:Research paper (scientific journal)   Publisher:MDPI AG  

    When a large-scale disaster occurs, each evacuee should move to an appropriate refuge in a speedy and safe manner. Most of the existing studies on the refuge assignment consider the speediness of evacuation and refuge capacity while the safety of evacuation is not taken into account. In this paper, we propose a refuge assignment scheme that considers both the speediness and safety of evacuation under the refuge capacity constraint. We first formulate the refuge assignment problem as a two-step integer linear program (ILP). Since the two-step ILP requires route candidates between evacuees and their possible refuges, we further propose a speedy and reliable route selection scheme as an extension of the existing route selection scheme. Through numerical results using the actual data of Arako district of Nagoya city in Japan, we show that the proposed scheme can improve the average route reliability among evacuees by 13.6% while suppressing the increase of the average route length among evacuees by 7.3%, compared with the distance-based route selection and refuge assignment. In addition, we also reveal that the current refuge capacity is not enough to support speedy and reliable evacuation for the residents.

    DOI: 10.3390/ijgi9070442

    researchmap

  • Optimality analysis of locality-aware tit-for-tat-based P2P file distribution Reviewed

    Yohei Nishi, Masahiro Sasabe, Shoji Kasahara

    Peer-to-Peer Networking and Applications   13 ( 5 )   1 - 16   2020.6

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    DOI: 10.1007/s12083-020-00925-2

    researchmap

    Other Link: http://link.springer.com/article/10.1007/s12083-020-00925-2/fulltext.html

  • Shortest path tour problem based integer linear programming for service chaining in NFV networks

    Masahiro Sasabe, Takanori Hara

    Proceedings of the 2020 IEEE Conference on Network Softwarization: Bridging the Gap Between AI and Network Softwarization, NetSoft 2020   114 - 121   2020.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    Network functions virtualization (NFV) is a new paradigm to achieve flexible and agile network services by decoupling network functions from proprietary hardware and running them on generic hardware as virtual network functions (VNFs). In the NFV network, a certain network service can be modeled as a sequence of VNFs, called a service chain. Given a connection request (origin node, destination node, and service chain requirement, which is a sequence of functions), the service chaining problem aims to find an appropriate service path, which starts from the origin and ends with the destination while executing the VNFs at the intermediate nodes in the required order. Some existing work noticed that the service chaining problem was similar to the shortest path tour problem (SPTP). To the best of our knowledge, this is the first work that exactly formulates the service chaining problem as an SPTP-based integer linear program (ILP). Through numerical results, we show the SPTP-based ILP can support 1.30-1.77 times larger scale systems than the existing ILP.

    DOI: 10.1109/NetSoft48620.2020.9165364

    Scopus

    researchmap

  • Mathematical epidemiological analysis of dynamics of delay attacks on pull-based competitive information diffusion Reviewed

    Masahiro Sasabe

    Computer Networks   107383 - 107383   2020.6

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Elsevier BV  

    DOI: 10.1016/j.comnet.2020.107383

    researchmap

  • Exploiting Smart Contracts for Capability-Based Access Control in the Internet of Things Reviewed

    Yuta Nakamura, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara

    Sensors   20 ( 6 )   1793 - 1793   2020.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:MDPI AG  

    Due to the rapid penetration of the Internet of Things (IoT) into human life, illegal access to IoT resources (e.g., data and actuators) has greatly threatened our safety. Access control, which specifies who (i.e., subjects) can access what resources (i.e., objects) under what conditions, has been recognized as an effective solution to address this issue. To cope with the distributed and trust-less nature of IoT systems, we propose a decentralized and trustworthy Capability-Based Access Control (CapBAC) scheme by using the Ethereum smart contract technology. In this scheme, a smart contract is created for each object to store and manage the capability tokens (i.e., data structures recording granted access rights) assigned to the related subjects, and also to verify the ownership and validity of the tokens for access control. Different from previous schemes which manage the tokens in units of subjects, i.e., one token per subject, our scheme manages the tokens in units of access rights or actions, i.e., one token per action. Such novel management achieves more fine-grained and flexible capability delegation and also ensures the consistency between the delegation information and the information stored in the tokens. We implemented the proposed CapBAC scheme in a locally constructed Ethereum blockchain network to demonstrate its feasibility. In addition, we measured the monetary cost of our scheme in terms of gas consumption to compare our scheme with the existing Blockchain-Enabled Decentralized Capability-Based Access Control (BlendCAC) scheme proposed by other researchers. The experimental results show that the proposed scheme outperforms the BlendCAC scheme in terms of the flexibility, granularity, and consistency of capability delegation at almost the same monetary cost.

    DOI: 10.3390/s20061793

    researchmap

  • Impact of Locality-awareness on Tit-for-Tat-based P2P File Distribution Reviewed

    Yohei Nishi, Masahiro Sasabe, Shoii Kasahara

    2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)   1 - 6   2020.1

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ccnc46108.2020.9045338

    researchmap

  • Topological Influence on Optimality of Tit-for-Tat Based P2P Content Distribution

    Sasabe, Masahiro

    Peer-to-Peer Networking and Applications   13 ( 1 )   243 - 254   2020.1

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s12083-019-00763-x

    researchmap

  • A multi-objective optimization model for production and transportation planning in a marine shrimp farming supply chain network

    Masahiro Sasabe, Mr.Chaimongkol Limpianchob, Shoji Kasahara

    International Journal of Operational Research   1 ( 1 )   1 - 1   2020

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Inderscience Publishers  

    DOI: 10.1504/ijor.2020.10034355

    researchmap

  • Selfish Yet Optimal Routing by Adjusting Perceived Traffic Information of Road Networks

    Takanori Hara, Masahiro Sasabe, Shoji Kasahara

    IEEE Open Journal of Intelligent Transportation Systems   1   120 - 133   2020

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers (IEEE)  

    DOI: 10.1109/ojits.2020.3019935

    researchmap

  • Attribute-Based Access Control for Smart Cities: A Smart Contract-Driven Framework.

    Yuanyu Zhang, Mirei Yutaka, Masahiro Sasabe, Shoji Kasahara

    CoRR   abs/2009.02933   2020

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/corr/corr2009.html#abs-2009-02933

  • Mining Pool Selection Problem in the Presence of Block Withholding Attack.

    Kentaro Fujita, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara

    IEEE International Conference on Blockchain(Blockchain)   321 - 326   2020

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/Blockchain50366.2020.00047

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/blockchain2/blockchain2020.html#FujitaZSK20

  • A push strategy optimisation model for a marine shrimp farming supply chain network

    Chaimongkol Limpianchob, Masahiro Sasabe, Shoji Kasahara

    International Journal of Operational Research   39 ( 2 )   262 - 277   2020

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Inderscience Enterprises Ltd.  

    Marine shrimp farming operations in Southeast Asia are still traditional and need to be improved in efficiency. In this paper, we first model a marine shrimp supply chain network, which consists of suppliers, farms, distribution centres, traders, and consumers. We also develop a mixed-integer linear programming under the push strategy framework in order to maximise the farmer's profit. Through a sensitivity analysis, we examine how the increase in costs affects the profits. The computational results are presented to demonstrate the feasibility of a real case of smart marine shrimp farming.

    DOI: 10.1504/IJOR.2020.109757

    Scopus

    researchmap

  • Capability-Based Access Control for the Internet of Things: An Ethereum Blockchain-Based Scheme Reviewed

    Yuta Nakamura, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara

    2019 IEEE Global Communications Conference (GLOBECOM)   2019.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/globecom38437.2019.9013321

    researchmap

  • Using Ethereum Blockchain for Distributed Attribute-Based Access Control in the Internet of Things Reviewed

    Mirei Yutaka, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara

    2019 IEEE Global Communications Conference (GLOBECOM)   2019.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/globecom38437.2019.9014155

    researchmap

  • Collaborative spectrum sensing mechanism based on user incentive in cognitive radio networks Reviewed

    Masahiro Sasabe, Tomohiro Nishida, Shoji Kasahara

    Computer Communications   147   1 - 13   2019.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Elsevier BV  

    DOI: 10.1016/j.comcom.2019.08.012

    researchmap

  • Geographical risk analysis based path selection for automatic, speedy, and reliable evacuation guiding using evacuees’ mobile devices Reviewed

    Takanori Hara, Masahiro Sasabe, Shoji Kasahara

    Journal of Ambient Intelligence and Humanized Computing   10 ( 6 )   2291 - 2300   2019.6

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    ? 2018 Springer-Verlag GmbH Germany, part of Springer Nature It has been highly expected to achieve speedy and reliable evacuation guiding under large scale disasters. As for the speedy evacuation, an automatic evacuation guiding scheme has been proposed, which is a reactive approach based on implicit interactions among evacuees, their mobile devices, and networks. In this scheme, an evacuation route is given by the shortest path, which may not be safe. In this paper, we propose a speedy and reliable path selection based on the geographical risk map for the existing automatic evacuation guiding, which is a proactive approach that allows evacuees to evacuate speedily while avoiding encounters with blocked road segments as much as possible. First, the proposed scheme enumerates candidates of short paths from the evacuee’s current location to the refuge. Then, it selects the most reliable one from the candidates by taking into account road blockage probabilities, each of which is an estimated probability that the corresponding road is blocked under a certain disaster. Through simulation experiments, we show that the proposed scheme can improve the safety of evacuation in terms of the number of encounters with blocked road segments while keeping both the average and maximum evacuation times unchanged, compared with the shortest path selection. We further demonstrate how the proactive function, i.e., geographical risk analysis, and the reactive function, i.e., information sharing, contribute to the system performance.

    DOI: 10.1007/s12652-018-0826-z

    researchmap

    Other Link: http://link.springer.com/article/10.1007/s12652-018-0826-z/fulltext.html

  • IoTに向けたEthereumブロックチェーンを用いたCapability-Based Access Controlの実装 ~ アクションレベルでのCapabilityの構築

    中村優太, 張 元玉, 笹部昌弘, 笠原正治

    NS研究会   IEICE-118 ( 465 )   349 - 354   2019.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • IoTのための柔軟な分散型属性ベース・アクセス制御の実現 ~ Ethereumブロックチェーンベースのフレームワーク

    豊 美玲, 張 元玉, 笹部昌弘, 笠原正治

    NS研究会   IEICE-118 ( 465 )   343 - 348   2019.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Analysis of optimal piece flow in tit-for-tat-based P2P streaming Reviewed

    Masahiro Sasabe

    Computer Networks   139   60 - 69   2018.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Elsevier B.V.  

    BitTorrent, which is one of the successful Peer-to-Peer (P2P) file distribution systems, adopts the tit-for-tat (TFT) strategy in game theory to encourage cooperation among peers, i.e., each peer has to provide fragments of the original file, called pieces, to others so as to retrieve its demanding pieces from them. Because the TFT strategy can restrict free riding behavior of peers, there are also several TFT-based P2P streaming systems and the performance of such existing systems has been analyzed. However, optimal piece flow in TFT-based P2P streaming has not been revealed yet. In this paper, a discrete-time model of TFT-based P2P streaming is first developed and integer linear programming (ILP) is formulated to determine the optimal piece flow where the average play-out delay is minimized. By solving the ILP using existing solver, i.e., CPLEX, we can obtain numerical examples of optimal piece flow. The analysis of obtained optimal piece flow reveals that (1) optimal piece selection is based on the balance between in-order piece retrieving and the rarest-first piece retrieving, (2) optimal peer selection depends on the upload capacities of peers and the stage of streaming, (3) the number of pieces does not affect the system performance, (4) the maximum play-out delay can be bounded by the ratio of the number of peers to the server's upload capacity, and (5) how the relaxation of TFT constraint can improve the system performance.

    DOI: 10.1016/j.comnet.2018.04.004

    Scopus

    researchmap

  • Automatic evacuation guiding scheme based on implicit interactions between evacuees and their mobile nodes Reviewed

    Nobuhisa Komatsu, Masahiro Sasabe, Jun Kawahara, Shoji Kasahara

    GeoInformatica   22 ( 1 )   127 - 141   2018.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer New York LLC  

    When large-scale disasters occur, evacuees have to evacuate to safe places quickly. They, however, may not be able to afford to obtain sufficient information for their evacuations under such emergent situations. In this paper, we propose an automatic evacuation guiding scheme using evacuees’ mobile nodes, e.g., smart phones. The key idea to achieve automatic evacuation guiding is implicit interactions between evacuees and their mobile nodes. Each mobile node tries to navigate its evacuee by presenting an evacuation route. At the same time, it can also trace the actual evacuation route of the evacuee as the trajectory by measuring his/her positions periodically. The proposed scheme automatically estimates blocked road segments from the difference between the presented evacuation route and the actual evacuation route, and then recalculates the alternative evacuation route. In addition, evacuees also share such information among them through direct wireless communication with other mobile nodes and that with a server via remaining communication infrastructures. Through simulation experiments, we show that 1) the proposed scheme works well when the degree of damage is high and/or road segments are continuously blocked, 2) the average evacuation time can be improved even in small penetration ratio of the proposed system, and 3) the direct wireless communication can support many evacuations at almost the same level as the communication infrastructure when the number of evacuees becomes large.

    DOI: 10.1007/s10707-016-0270-1

    Scopus

    researchmap

  • A push strategy optimization model for a marine shrimp farming supply chain network Reviewed

    Limpianchob, C, Sasabe, M, Kasahara, S

    International Journal of Operational Research   1 ( 1 )   1 - 1   2018

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Inderscience Publishers  

    DOI: 10.1504/ijor.2020.10022448

    researchmap

  • Road Network Risk Analysis Considering People Flow under Ordinal and Evacuation Situations Reviewed

    Sasabe, M, Fujii, K, Kasahara, S

    Environment and Planning B: Urban Analytics and City Science   47 ( 5 )   759 - 774   2018

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SAGE Publications  

    Both pre-disaster approaches, e.g., mitigation and preparedness, and post-disaster approaches, e.g., response and recovery, play important roles to mitigate the damage from large-scale disasters. From the viewpoint of disaster response, there have been studies on evacuation guiding schemes and applications using evacuees’ mobile devices, e.g., smart phones. On the other hand, disaster preparedness has also been studied mainly on geographical information analysis, e.g., road blockage probability and people flow data. The road blockage probability is the probability that the corresponding road is blocked due to collapse of roadside buildings when an earthquake occurs. The people flow data express the people flow in usual time. In this paper, with the help of evacuation guiding schemes, road blockage probability, and people flow data, we propose a road network risk analysis approach that considers people flow in both ordinary and evacuation situations, which can be used to as a tool to strengthen the urban fabric for fostering better evacuees’ responses in disaster situations. First, the proposed approach derives ordinary road demand, which is the degree of road usage at a certain interval in an ordinary situation, from the people flow data. Then, it calculates evacuation road demand, i.e., the degree of road usage at a certain interval in an evacuation situation, by extending the edge betweenness centrality under the assumption that people located according to the ordinary road demand move to refuges along their evacuation paths. Finally, it detects roads with high risk of encountering blocked road segments by combining the road blockage probability and evacuation road demand. Through numerical experiments under a case study of Arako area of Nagoya city in Japan, we show the proposed approach can detect such high-risk roads. Furthermore, we show the detected roads spatially change according to the people flow in ordinary situations, evacuation behavior, and disaster occurrence time.

    DOI: 10.1177/2399808318802940

    researchmap

    Other Link: http://journals.sagepub.com/doi/full-xml/10.1177/2399808318802940

  • Maximizing communication opportunity for collaborative spectrum sensing in cognitive radio networks Reviewed

    Tomohiro Nishida, Masahiro Sasabe, Shoji Kasahara

    2017 27th International Telecommunication Networks and Applications Conference, ITNAC 2017   2017-   1 - 6   2017.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    In cognitive radio networks, secondary users (SUs) must accurately sense the spectrum of primary user (PU) to acquire their own communication opportunities without interfering PU's communication. Collaborative spectrum sensing (CSS) among SUs can improve the probability to detect PU's communication, compared to non-collaborative spectrum sensing, where each SU senses signal independently. In this paper, we propose a communication opportunity maximization scheme for CSS in multiple PUs cognitive radio networks. First, we define an objective function that represents SU's communication opportunity and a constraint on miss detection probability. In the proposed scheme, each SU forms a group with other SUs to meet the constraint and maximize its own communication opportunity according to the objective function and the constraint. Through simulation experiments with a two-PU scenario, we show that the proposed scheme can improve the ratio of winning SUs, that can use PU's channel, to the whole SUs, in comparison with the non-collaborative spectrum sensing. We also show that it can quickly increase the overall throughput of winning SUs up to the theoretical upper bound.

    DOI: 10.1109/ATNAC.2017.8215373

    Scopus

    researchmap

  • Congestion-aware route selection in automatic evacuation guiding based on cooperation between evacuees and their mobile nodes Reviewed

    Yuki Kasai, Masahiro Sasabe, Shoji Kasahara

    Eurasip Journal on Wireless Communications and Networking   2017 ( 1 )   2017.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer International Publishing  

    When a large-scale disaster occurs, evacuees have to evacuate to safe places quickly. For this purpose, an automatic evacuation guiding scheme based on cooperation between evacuees and their mobile nodes has been proposed. The previous work adopts shortest-distance based route selection and does not consider the impact of traffic congestion caused by evacuation guiding. In this paper, we propose congestion-aware route selection in the automatic evacuation guiding. We first adopt a traffic congestion model where each evacuee’s moving speed on a road is determined by the population density of the road and his/her order among evacuees traveling in the same direction. Based on this congestion model, each evacuee’s mobile node estimates the cost, i.e., traveling time, of each road in the area. Each mobile node collects information about blocked road segments and positions of other evacuees through communication infrastructures or other mobile nodes. Based on the obtained information, it calculates and selects the smallest-cost route. Through simulation experiments, we show that the congestion-aware route selection can reduce both average and maximum evacuation times compared to the shortest-distance-based route selection, especially under highly congested situations. Furthermore, we show that the congestion-aware route selection can work well even under highly damaged situations where only direct wireless communication among mobile nodes is available.

    DOI: 10.1186/s13638-017-0948-6

    Scopus

    researchmap

  • An Offline Mobile Application for Automatic Evacuation Guiding in Outdoor Environments Reviewed

    Itoi, Junki, Sasabe, Masahiro, Kawahara, Jun, Kasahara, Shoji

    Scientific Phone Apps and Mobile Devices   3 ( 1 )   1 - 10   2017.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1186/s41070-017-0013-1

    researchmap

  • Short and reliable path selection for automatic evacuation guiding based on interactions between evacuees and their mobile devices Reviewed

    Takanori Hara, Masahiro Sasabe, Shoji Kasahara

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   10486   33 - 44   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    When large-scale disasters occur, evacuees have to evacuate to a refuge quickly. For this purpose, there has been proposed an automatic evacuation guiding scheme based on implicit interactions among evacuees, their mobile devices, and networks. In this scheme, an evacuation route is obtained as the shortest path, which may not be safe. In this paper, we propose a short and reliable path selection for existing automatic evacuation guiding, which allows evacuees to evacuate quickly while avoiding encounters with blocked road segments as much as possible. First, the proposed scheme calculates k-shortest (k≥ 1) paths from the current location to the destination, with the help of the existing algorithm. Then, it selects the most reliable one from the candidates by taking into account road blockage probabilities, each of which is an estimated probability that the corresponding road is blocked under a certain disaster. Through simulation experiments, we show that the proposed scheme can reduce the number of encounters with blocked road segments with an appropriate value of k, while keeping the average/maximum evacuation time compared with the shortest path selection.

    DOI: 10.1007/978-3-319-65515-4_3

    Scopus

    researchmap

  • A Simple Algorithm of Centralized Flow Management for Data Centers Reviewed

    Andrei E. Tuchin, Masahiro Sasabe, Shoji Kasahara

    2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC)   268 - 273   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In this paper, we consider a data-flow management mechanism for data center networks, in which a centralized controller called arbiter manages data flows. We propose a simple algorithm for the arbiter to distribute flows over different time points and paths, in a preemptive scheduling and traffic load-balancing manner. The proposed algorithm is based on table-driven resource reservation, in which states of all the links in a data-center network are registered in a single table, and its information is updated whenever a new flow-request arrives at the arbiter. We evaluate the performance of the proposed algorithm through simulation experiments, investigating bit allocation rate and flow allocation rate, under different flow-size distributions. Numerical results show that the proposed algorithm can achieve high bit allocation rate without collisions. It is also shown that the proposed algorithm can allocate many flows within a small time interval even when the variance of flow-size is large.

    DOI: 10.1109/APCC.2016.7581436

    Web of Science

    researchmap

  • On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees' Mobile Nodes Reviewed

    Nobuhisa Komatsu, Masahiro Sasabe, Shoji Kasahara

    MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS, (MOBIWIS 2016)   9847   213 - 221   2016

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER INT PUBLISHING AG  

    We have proposed an automatic evacuation guiding scheme based on cooperation between evacuees and their mobile nodes. In the previous work, we assume that information about blocked road segments is shared among mobile nodes through Epidemic routing, which is a Delay Tolerant Network (DTN) routing protocol. In this paper, we propose an information sharing scheme called On-Demand Direct Delivery, which can reduce the network load compared to Epidemic routing. Since each evacuee moves to a safe place, he/she will require the information about blocked road segments in the region from the current position to the safe place. The proposed scheme selectively retrieves the information about blocked road segments in that region, through Direct Delivery. Through simulation experiments, we show the proposed scheme can keep the effectiveness of evacuation guiding with reduction of network load to about 1/36, compared to Epidemic routing.

    DOI: 10.1007/978-3-319-44215-0_17

    Web of Science

    researchmap

  • Location-Aware Utility-Based Routing for Store-Carry-Forward Message Delivery Reviewed

    Tomotaka Kimura, Tsubasa Matsuura, Masahiro Sasabe, Takahiro Matsuda, Tetsuya Takine

    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN)   2015-January   194 - 199   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    One of the most important technical problems in store-carry-forward routing is to reduce the number of message copies in networks without increasing the message delivery delay. In order to solve this problem, we focus on utility-based routing schemes, where for a message, utility of a node indicates its proximity to the destination node of the message. Utility-based routing schemes are promising when relay nodes, i.e., nodes with the message (copy), have sufficient opportunities to encounter other nodes. On the other hand, when relay nodes are in extremely sparse areas of nodes and they have few opportunities to encounter other nodes, the routing schemes do not work effectively. This observation naturally leads us to propose a location-aware utility-based routing scheme. The proposed scheme combines a utility-based routing scheme with location-aware probabilistic forwarding, where the forwarding probability is determined based on both node utility and node density at the contact location. With several simulation scenarios, we evaluate the performance of the proposed scheme in terms of the mean number of copies in the network and the mean message delivery delay.

    DOI: 10.1109/ICOIN.2015.7057881

    Web of Science

    researchmap

  • Automatic Evacuation Guiding Scheme Using Trajectories of Mobile Nodes Reviewed

    Nobuhisa Komatsu, Masahiro Sasabe, Jun Kawahara, Shoji Kasahara

    MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS   9228   3 - 14   2015

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPRINGER-VERLAG BERLIN  

    When large-scale disasters occur, evacuees have to evacuate to safe places quickly. In this paper, we propose an automatic evacuation guiding scheme using mobile nodes of evacuees. Each node tries to navigate its evacuee by presenting an evacuation route. It can also trace the actual evacuation route of the evacuee as the trajectory by measuring his/her positions periodically. The proposed scheme automatically estimates blocked road segments from the difference between the presented evacuation route and the actual evacuation route, and then recalculates the alternative evacuation route. In addition, evacuees also share such information among them through direct wireless communication with other mobile nodes and that with a server via remaining communication infrastructures. Through simulation experiments, we show that 1) the effectiveness of the proposed scheme becomes high with the increase of degree of damage and 2) the effect of information sharing through communication infrastructures is higher than that through direct wireless communication.

    DOI: 10.1007/978-3-319-23144-0_1

    Web of Science

    researchmap

  • Analysis of Optimal Scheduling in Tit-for-Tat-Based P2P File Distribution Reviewed

    Masashi Hasegawa, Masahiro Sasabe, Tetsuya Takine

    IEICE TRANSACTIONS ON COMMUNICATIONS   E97B ( 12 )   2650 - 2657   2014.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Peer-to-Peer (P2P) file distribution systems can efficiently disseminate massive contents, such as disk images of operating systems, from a server to many users in a piece-by-piece manner. In particular, the BitTorrent protocol optimizes each peer's download speed by applying the tit-for-tat (TFT) strategy, where each peer preferentially uploads piece(s) to peer(s) from which it can download missing pieces faster. To the best of our knowledge, however, the optimality of TFT-based P2P file distribution has not been studied sufficiently. In this paper, we aim to understand the optimal scheduling in TFT-based P2P file distribution. First, we develop a discrete-time model of TFT-based P2P file distribution and formulate its optimal scheduling as a two-step integer linear programming problem. The first step is to minimize the average file retrieval time among peers, and the second step is to improve fairness among peers. We analyze the optimal solution obtained by the existing solver and reveal the characteristics of the optimal scheduling. Specifically, we show that it is crucial to distribute pieces from the server indirectly to peers with large upload capacity via those with small upload capacity.

    DOI: 10.1587/transcom.E97.B.2650

    Web of Science

    researchmap

  • 遭遇端末と遭遇地点の特性に基づく蓄積運搬転送型ルーチング

    木村共孝, 松浦翼, 笹部昌弘, 松田崇弘, 滝根哲哉

    電子情報通信学会技術報告   2014.7

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • Tracking pedestrians across multiple microcells based on successive Bayesian estimations Reviewed

    Yoshiaki Taniguchi, Masahiro Sasabe, Takafumi Watanabe, Hirotaka Nakano

    Scientific World Journal   2014   2014

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Hindawi Publishing Corporation  

    We propose a method for tracking multiple pedestrians using a binary sensor network. In our proposed method, sensor nodes are composed of pairs of binary sensors and placed at specific points, referred to as gates, where pedestrians temporarily change their movement characteristics, such as doors, stairs, and elevators, to detect pedestrian arrival and departure events. Tracking pedestrians in each subregion divided by gates, referred to as microcells, is conducted by matching the pedestrian gate arrival and gate departure events using a Bayesian estimation-based method. To improve accuracy of pedestrian tracking, estimated pedestrian velocity and its reliability in a microcell are used for trajectory estimation in the succeeding microcell. Through simulation experiments, we show that the accuracy of pedestrian tracking using our proposed method is improved by up to 35% compared to the conventional method.

    DOI: 10.1155/2014/719029

    Scopus

    PubMed

    researchmap

  • Tracking Pedestrians across Multiple Microcells Based on Successive Bayesian Estimations Reviewed

    Yoshiaki Taniguchi, Masahiro Sasabe, Takafumi Watanabe, Hirotaka Nakano

    SCIENTIFIC WORLD JOURNAL   2014

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:HINDAWI PUBLISHING CORPORATION  

    We propose a method for tracking multiple pedestrians using a binary sensor network. In our proposed method, sensor nodes are composed of pairs of binary sensors and placed at specific points, referred to as gates, where pedestrians temporarily change their movement characteristics, such as doors, stairs, and elevators, to detect pedestrian arrival and departure events. Tracking pedestrians in each subregion divided by gates, referred to as microcells, is conducted by matching the pedestrian gate arrival and gate departure events using a Bayesian estimation-based method. To improve accuracy of pedestrian tracking, estimated pedestrian velocity and its reliability in a microcell are used for trajectory estimation in the succeeding microcell. Through simulation experiments, we show that the accuracy of pedestrian tracking using our proposed method is improved by up to 35% compared to the conventional method.

    DOI: 10.1155/2014/719029

    Web of Science

    researchmap

  • Continuous-Time Analysis of the Simple Averaging Scheme for Global Clock Synchronization in Sparsely Populated MANETs Reviewed

    Masahiro Sasabe, Tetsuya Takine

    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS   31 ( 4 )   782 - 793   2013.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    In sparsely populated mobile ad hoc networks (MANETs), mobile nodes are chronically isolated each other and they meet very occasionally. Global clock synchronization among nodes in such networks is a challenging problem because reference clock information cannot be disseminated promptly over nodes due to the lack of stable connections among nodes. In recent years, averaging-based algorithms for distributed global clock synchronization have been studied. In this paper, we conduct the continuous-time analysis of the simplest one, called the simple averaging scheme, where two mobile nodes exchange their local clock times when they meet and adjust their own clocks to the average of them. Through the analysis and simulation experiments, we reveal how the clock accuracy of nodes and meeting rates among them affect the rate of convergence to the steady state and the accuracy of clock synchronization in steady state.

    DOI: 10.1109/JSAC.2013.130414

    Web of Science

    researchmap

  • Bayesian Estimation-Based Pedestrian Tracking in Microcells Reviewed

    Yoshiaki Taniguchi, Masahiro Sasabe, Satoshi Aihara, Hirotaka Nakano

    SCIENTIFIC WORLD JOURNAL   2013   2013

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:HINDAWI PUBLISHING CORP  

    We consider a pedestrian tracking system where sensor nodes are placed only at specific points so that the monitoring region is divided into multiple smaller regions referred to as microcells. In the proposed pedestrian tracking system, sensor nodes composed of pairs of binary sensors can detect pedestrian arrival and departure events. In this paper, we focus on pedestrian tracking in microcells. First, we investigate actual pedestrian trajectories in a microcell on the basis of observations using video sequences, after which we prepare a pedestrian mobility model. Next, we propose a method for pedestrian tracking in microcells based on the developed pedestrian mobility model. In the proposed method, we extend the Bayesian estimation to account for time-series information to estimate the correspondence between pedestrian arrival and departure events. Through simulations, we show that the tracking success ratio of the proposed method is increased by 35.8% compared to a combinatorial optimization-based tracking method.

    DOI: 10.1155/2013/187479

    Web of Science

    PubMed

    researchmap

  • Nonlinear integer programming formulation for quasi-optimal grouping of clusters in ferry-assisted DTNs* Reviewed

    Masahiro Sasabe, K. Habibul Kabir, Tetsuya Takine

    IEICE Transactions on Communications   E96-B ( 8 )   2076 - 2083   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    Communication among isolated networks (clusters) in delay tolerant networks (DTNs) can be supported by a message ferry, which collects bundles from clusters and delivers them to a sink node. When there are lots of distant static clusters, multiple message ferries and sink nodes will be required. In this paper, we aim to make groups, each of which consists of physically close clusters, a sink node, and a message ferry. Our objective is minimizing the overall mean delivery delay of bundles in consideration of both the offered load of clusters and distances between clusters and their sink nodes. Based on existing work, we first model this problem as a nonlinear integer programming. Using a commercial nonlinear solver, we obtain a quasi-optimal grouping. Through numerical evaluations, we show the fundamental characteristics of grouping, the impact of location limitation of base clusters, and the relationship between delivery delay and the number of base clusters. © 2013 The Institute of Electronics, Information and Communication Engineers.

    DOI: 10.1587/transcom.E96.B.2076

    Scopus

    researchmap

  • Perfect cell partitioning scheme for micro-cellular networks Reviewed

    Masahiro Sasabe, Hirotaka Nakano

    Journal of Communications   7 ( 10 )   749 - 757   2012

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    A perfect cell partitioning (PCP) scheme is described for controlling the transmission power of base stations in a cellular communication system to prevent radio frequency interference among adjacent base stations. A base station using this scheme can use its entire frequency range, while one using the conventional scheme can use only a quarter of it. Simulation and analytic results showed that the PCP scheme is more effective than the conventional one when the node density is lower than 6. However, the probability of successful communication is relatively low. A modified version of this scheme in which the base station sacrifices the nodes near its border has a significantly higher probability. Simulation and analytic results showed that the success probability of the modified scheme is as much as 0.67 higher than that of the original one when the occupation ratio is 1.2 and that a base station using the modified scheme can use its frequency range more effectively than one using the original or conventional scheme. © 2012 ACADEMY PUBLISHER.

    DOI: 10.4304/jcm.7.10.749-757

    Scopus

    researchmap

  • Integer programming formulation for grouping clusters in ferry-assisted DTNs Reviewed

    K. Habibul Kabir, Masahiro Sasabe, Tetsuya Takine

    Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012   1125 - 1130   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Communication among isolated networks (clusters) in delay tolerant networks (DTNs) can be supported by a message ferry, which collects bundles from clusters and delivers them to a sink node. When there are lots of distant static clusters, multiple message ferries and sink nodes will be required. In this paper, we aim to make groups each of which consists of physically close clusters, a sink node, and a message ferry. Our main objective is minimizing the overall mean delivery delay of bundles in consideration of both offered load of clusters and distance between clusters and their sink nodes. We first model this problem as a nonlinear integer programming, based on the knowledge obtained in our previous work. Because it might be hard to solve this problem directly, we take two-step optimization approach based on linear integer programming, which yields an approximate solution of the problem. Through numerical results, we show the two-step optimization approach works well. © 2012 IEEE.

    DOI: 10.1109/WAINA.2012.160

    Scopus

    researchmap

  • Self-organized data aggregation among selfish nodes in an isolated cluster Reviewed

    K. Habibul Kabir, Masahiro Sasabe, Tetsuya Takine

    Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering   87   264 - 275   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    This paper considers a delay tolerant network, where a message ferry travels multiple isolated clusters, collects data from nodes in the clusters, and finally delivers the data to a sink node. In our previous work, we proposed a self-organized data aggregation technique for collecting data from nodes efficiently, which can automatically accumulate data from cluster members to a limited number of cluster members called aggregators. The proposed scheme was developed based on the evolutionary game theoretic approach, in order to take account of the inherent selfishness of the nodes for saving their own battery life. The number of aggregators can be controlled to a desired value by adjusting the energy that the message ferry supplies to the aggregators. In this paper, we further examine the proposed system in terms of success of data transmission and system survivability. We first introduce a new type of game model with retransmissions. Through both theoretic and simulation approaches, we then reveal feasible parameter settings which can achieve a system with desirable characteristics: Stability, survival, and successful data transfer. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.

    DOI: 10.1007/978-3-642-32615-8_27

    Scopus

    researchmap

  • Optimal visiting order of isolated clusters in dtns to minimize the total mean delivery delay of bundles Reviewed

    K. Habibul Kabir, Masahiro Sasabe, Tetsuya Takine

    Numerical Algebra, Control and Optimization   1 ( 4 )   563 - 576   2011.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    In delay tolerant networks (DTNs), the opportunity of communication among isolated networks (clusters) can be provided by a message ferry which moves around the network to proactively collect bundles and deliver them to a sink node. When there are lots of distant static clusters, the message ferry should visit them efficiently to minimize the mean delivery delay of bundles. In this paper, we propose an algorithm for determining the optimal visiting order of isolated static clusters in DTNs. We show that the minimization problem of the overall mean delivery delay in our system is reduced to that of the weighted mean waiting time in the conventional polling model. We then solve the problem with the help of an existing approach to the polling model and obtain a quasi-optimal balanced sequence representing the visiting order. Through numerical examples, we show that the proposed visiting order is effective when arrival rates at clusters and/or distances between clusters and the sink are heterogeneous.

    DOI: 10.3934/naco.2011.1.563

    Scopus

    researchmap

  • Power Control Methods for Improving Spatial Reuse in TDMA-Based Wireless Mesh Networks

    Hasegawa, Go, Hidekuma, Toshiaki, Sasabe, Masahiro, Nakano, Hirotaka

    ISRN Communications and Networking   2011   1 - 12   2011.6

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.5402/2011/970943

    researchmap

  • User selfishness vs. file availability in P2P file-sharing systems: Evolutionary game theoretic approach Reviewed

    Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata

    PEER-TO-PEER NETWORKING AND APPLICATIONS   3 ( 1 )   17 - 26   2010.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER  

    In a Peer-to-Peer (P2P) file-sharing system, a node finds and retrieves its desired file. If multiple nodes cache the same file to provide others, we can achieve a dependable file-sharing system with low latency and high file availability. However, a node has to spend costs, e. g., processing load or storage capacity, on caching a file. Consequently, a node may selfishly behave and hesitate to cache a file. In such a case, unpopular files are likely to disappear from the system. In this paper, we aim to reveal whether effective caching in the whole system emerges from autonomous and selfish node behavior. We discuss relationship between selfish node behavior and system dynamics by using evolutionary game theory. Through theoretic analysis, we show that a file-sharing system can be robust to file disappearance depending on a cost and demand model for caching even if nodes behave selfishly. Furthermore, we also conduct several simulation-based analysis in terms of network structures, evolving network, load balancing, and system stability. As a result, we demonstrate that a file-sharing system with good properties, i.e., robustness to file disappearance, low search latency, well load-balancing, and high stability, can be achieved independent of network structures and dynamics.

    DOI: 10.1007/s12083-009-0045-7

    Web of Science

    researchmap

  • Evolutionary Game Theoretic Approach to Self-Organized Data Aggregation in Delay Tolerant Networks Reviewed

    K. Habibul Kabir, Masahiro Sasabe, Tetsuya Takine

    IEICE TRANSACTIONS ON COMMUNICATIONS   E93B ( 3 )   490 - 500   2010.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Custody transfer in delay tolerant networks (DTNs) provides reliable end-to-end data delivery by delegating the responsibility of data transfer among special nodes (custodians) in a hop-by-hop manner However. storage congestion occurs when data increases and/or the network is partitioned into multiple sub-networks for a long time The storage congestion can be alleviated by message ferries which move around the network and proactively collect data from the custodians In such a scenario. data should be aggregated to some custodians so that message ferries can collect them effectively In this paper. we propose a scheme to aggregate data into selected custodians. called aggregators. in a fully distributed and autonomous manner with the help of evolutionary game theoretic approach Through theoretical analysis and several simulation experiments. taking account of the uncooperative behavior of nodes, we show that aggregators can be selected in a self-organized manner and the number of aggregators can he controlled to a desired value

    DOI: 10.1587/transcom.E93.B.490

    Web of Science

    researchmap

  • Load-Balanced and Interference-Aware Spanning Tree Construction Algorithm for TDMA-Based Wireless Mesh Networks Reviewed

    Hiroshi Tokito, Masahiro Sasabe, Go Hasegawa, Hirotaka Nakano

    IEICE TRANSACTIONS ON COMMUNICATIONS   E93B ( 1 )   99 - 110   2010.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Wireless mesh networks have been attracting many users in recent years. By connecting base stations (mesh nodes) with wireless connections, these network can achieve a wide-area wireless environment with flexible configuration and low cost at the risk of radio interference between wireless links. When we utilize wireless mesh networks as infrastructures for Internet access, all network traffic from mobile nodes goes through a gateway node that is directly connected to the wired network. Therefore, it is necessary to distribute the traffic load by deploying multiple gateway nodes. In this paper, we propose a spanning tree construction algorithm for TDMA-based wireless mesh networks with multiple gateway nodes so as to maximize the traffic volume transferred between the mesh network and the Internet (system throughput) by taking account of the traffic load on the gateway nodes, the access link capacity and radio interference. Through a performance evaluation, we show that the proposed algorithm increases the system throughput regardless of the bottleneck position and achieves up to 3.1 times higher system throughput than a conventional algorithm.

    DOI: 10.1587/transcom.E93.B.99

    Web of Science

    researchmap

  • Evolutionary game theory-based evaluation of P2P file-sharing systems in heterogeneous environments Reviewed

    Masahiro Sasabe, Yusuke Matsuda, Tetsuya Takine

    International Journal of Digital Multimedia Broadcasting   2010   2010

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Peer-to-Peer (P2P) file sharing is one of key technologies for achieving attractive P2P multimedia social networking. In P2P file-sharing systems, file availability is improved by cooperative users who cache and share files. Note that file caching carries costs such as storage consumption and processing load. In addition, users have different degrees of cooperativity in file caching and they are in different surrounding environments arising from the topological structure of P2P networks. With evolutionary game theory, this paper evaluates the performance of P2P file sharing systems in such heterogeneous environments. Using micro-macro dynamics, we analyze the impact of the heterogeneity of user selfishness on the file availability and system stability. Further, through simulation experiments with agent-based dynamics, we reveal how other aspects, for example, synchronization among nodes and topological structure, affect the system performance. Both analytical and simulation results show that the environmental heterogeneity contributes to the file availability and system stability. © 2010 Yusuke Matsuda et al.

    DOI: 10.1155/2010/369814

    Scopus

    researchmap

  • Simulation-Based Evaluation of P2P File-Sharing Systems underHeterogeneous Environments: Evolutionary Game Theoretic Approach Reviewed

    Yusuke Matsuda, Masahiro Sasabe, Tetsuya Takine

    Proceedings of the 2009 International Symposium on Nonlinear Theory and its Applications (NOLTA'09)   2009.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Real-Time Measurement of Frequently Distributed Files in P2P File-Sharing Systems

    MATSUMORI Tomoya, SASABE Masahiro, TAKINE Tetsuya

    IEICE technical report   109 ( 79 )   5 - 10   2009.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Since files are directly exchanged between nodes in P2P file-sharing systems such as Winny and Bittorrent, it is difficult to comprehensively grasp the system conditions and control the system dynamics. In this paper, we design and implement a system that can achieve real-time measurement of files which are highly interested and frequently distributed over the Winny network. We introduce a node for the measurement into the Winny network and passively measure queries passing through the node with low measurement overhead and high adaptability to the changes of network conditions. To achieve the real-time measurement, we combine the sliding window method and frequent pattern mining. The experimental results show that we can clearly reveal the transition of frequently distributed files in real-time.

    CiNii Books

    researchmap

  • Load-balanced and interference-aware spanning tree construction algorithm for TDMA-based wireless mesh networks

    TOKITO Hiroshi, SASABE Masahiro, HASEGAWA Go, NAKANO Hirotaka

    IEICE technical report   108 ( 481 )   1 - 6   2009.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Wireless mesh networks have been attracting many users in recent years. By connecting base stations (mesh nodes) with each other via wireless connections, they can achieve a wide-area wireless environment with flexible-configuration and low-cost properties at the risk of radio interference between wireless links. When we utilize the wireless mesh networks as an infrastructure for Internet access, all network traffic from mobile nodes goes through a gateway node which is directly connected to the wired network. Therefore, we need to distribute the traffic load by deploying multiple gateway nodes. In this paper, we propose a spanning tree construction algorithm for TDMA-based wireless mesh networks with multiple gateway nodes, which aims to maximize the traffic going to wired network (system throughput) by taking account of the traffic load on the gateway nodes, the access link capacity and the radio interference. Through simulation experiments, we show that the proposed algorithm increases the system throughput regardless of the bottleneck position and achieves up to 3.1 times higher system throughput than the conventional algorithm.

    CiNii Books

    researchmap

  • Power control methods considering radio interference and path length for wireless mesh networks

    HIDEKUMA Toshiaki, HASEGAWA Go, SASABE Masahiro, NAKANO Hirotaka

    IEICE technical report   108 ( 481 )   7 - 12   2009.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Wireless Mesh Networks (WMNs) have attracted significant interest as a cost-effective wireless network infrastructure. However, the efficiency of wireless resource utilization decreases by radio interference when multiple transmissions in an interference region occur simultaneously. One of possible solutions for this problem is to control the transmission power of mesh nodes. In this report, we propose a power control method of wireless mesh nodes for increasing spatial reuse in WMNs with TDMA MAC protocol. The proposed method decreases radio interference, considering the ill-effect of the increase in path length by cutting too many wireless links. Numerical evaluation results reveal that the proposed method decreases the frame length by up to 27% with non-sensitive parameter setting.

    CiNii Books

    researchmap

  • A Simple Scheme for Relative Time Synchronization in Delay Tolerant MANETs Reviewed

    Masahiro Sasabe, Tetsuya Takine

    2009 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS 2009)   395 - 396   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In mobile ad hoc networks (MANETs), time synchronization can be achieved by distributing time information among nodes. This type of time synchronization, however, does not work well under considerable long delay caused by sparse population. In this paper, we propose a simple yet effective scheme for relative time synchronization. When two mobile nodes meet, they exchange their clock information and adjust their own clocks to the average. Through simulation experiments, we show that the variance of the difference between the local and reference times remains within a certain finite range that depends on the frequency of nodes' meetings.

    DOI: 10.1109/INCOS.2009.20

    Web of Science

    researchmap

  • Degree-Based Power Control Method for Increasing Spatial Reuse in TDMA-based Wireless Mesh Networks Reviewed

    Toshiaki Hidekuma, Go Hasegawa, Masahiro Sasabe, Hirotaka Nakano

    2009 EIGHTH INTERNATIONAL CONFERENCE ON NETWORKS   121 - 126   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Wireless Mesh Networks (WMNs) have attracted significant interest as a cost-effective wireless network infrastructure. However, the efficiency of wireless resource utilization decreases by radio interference when multiple transmissions in an interference region. occur simultaneously. So decreasing radio interference is one of the major problems in wireless network. In the present paper, we propose a degree-based power control method of wireless mesh, nodes to enhance spatial reuse in WMNs with TDMA MAC protocol. The proposed method is an attempt to reduce the radio interference and improve the spatial reuse of the WMN by decreasing the transmission power of mesh. nodes, while maintaining the network connectivity at a certain level. Numerical evaluation results reveal that the proposed method decreases the frame length by up to 22%.

    DOI: 10.1109/ICN.2009.22

    Web of Science

    researchmap

  • Routing method for gateway load balancing in wireless mesh networks Reviewed

    Hiroshi Tokito, Masahiro Sasabe, Go Hasegawa, Hirotaka Nakano

    2009 EIGHTH INTERNATIONAL CONFERENCE ON NETWORKS   127 - 132   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Wireless mesh networks have been attracting many users in recent years to achieve a wide-area wireless environment with flexible-configuration and low-cost properties by connecting base stations (mesh nodes) with. each other via wireless connections. When the wireless mesh networks are aired as an infrastructure for Internet access, all network traffic from. mobile nodes go through a gateway node which is directly connected to the wired network. Therefore, we need to distribute the entire traffic load by deploying multiple gateway nodes and each mesh node should select a gateway node to access the Internet according to its traffic load, processing power, and access link capacity. In this paper, we propose a routing method that distributes the traffic load on the gateway nodes. Through several simulations, we show that the proposed method can. uniformly distribute the traffic load on gateway nodes, keeping the tune complexity and suppressing an increase in the path length at most 15 % compared to the conventional shortest path routing.

    DOI: 10.1109/ICN.2009.21

    Web of Science

    researchmap

  • Design and Analysis of Self-Organized Data Aggregation Using Evolutionary Game Theory in Delay Tolerant Networks Reviewed

    K. Habibul Kabir, Masahiro Sasabe, Tetsuya Takine

    2009 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS & WORKSHOPS   375 - 380   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In delay tolerant networks (DTNs), custody transfer mechanism provides reliable end-to-end data transfer in which special nodes (custodians) transfer data with custody in a hop-by-hop manner As a result, storage congestion occurs when data with custody increases and/or the network, is partitioned into multiple sub-networks for a long time. The storage congestion can be alleviated with the help of message ferries. In such a scenario, data should be aggregated to some custodians so that message ferries can effectively collect them. In this paper, we propose a scheme to aggregate data into selected custodians, called aggregators, in a fully distributed and autonomous manner by, using evolutionary game theoretical approach where we can also control the number of aggregators to a desired value.

    DOI: 10.1109/WOWMOM.2009.5282459

    Web of Science

    researchmap

  • Improving Success Ratio of Object Search in Highly-Dynamic Mobile P2P Networks Reviewed

    Kei Takeshita, Masahiro Sasabe, Hirotaka Nakano

    IEICE TRANSACTIONS ON COMMUNICATIONS   E91B ( 12 )   3851 - 3859   2008.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Mobile Ad Hoc Networks (MANETs) are temporal and infrastructure-independent wireless networks that consist of mobile nodes. For instance, a MANET can be used as an emergent network for communication among people when a disaster occurred. Since there is no central server in the network, each node has to find out its desired information (objects) by itself. Constructing a mobile Peer-to-Peer (P2P) network over the MANET can support the object search, Some researchers proposed construction schemes of mobile P2P networks, such as Ekta and MADPastry. They integrated DHT-based application- layer routing and network-layer routing to increase search efficiency. Furthermore, MADPastry proposed a clustering method which groups the overlay nodes according to their physical distance. However, it has also been pointed out that the search efficiency deteriorates in highly dynamic environments where nodes quickly move around. In this paper. we focus on route disappearances in the network layer which cause the deterioration of scar h efficiency. We describe the detail of this problem and evaluate quantitatively it through simulation experiments. We extend MADPastry by introducing a method sharing objects among nodes in a cluster. Through simulation experiments, we show that the proposed method can achieve tip to 2.5 times larger success rate of object search than MADPastry.

    DOI: 10.1093/ietcom/e91-b.12.3851

    Web of Science

    researchmap

  • How Does User Heterogeneity Affect Performance of P2P Caching?: Evolutionary Game Theoretic Approach Reviewed

    Masahiro Sasabe, Yusuke Matsuda, Tetsuya Takine

    Proc. of 1st International Workshop on Technologies for Ambient Information Society (TAIS 2008)   2008.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Study on Performance Evaluation of P2P File Sharing under Heterogeneous User Environments : Evolutionary Game Theoretic Approach

    MATSUDA Yusuke, SASABE Masahiro, TAKINE Tetsuya

    IEICE technical report   108 ( 203 )   51 - 56   2008.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In Peer-to-Peer (P2P) file sharing systems, file availability is improved by users cooperatively caching and sharing files. However, many users may hesitate to cache files cooperatively due to the cost for caching, such as storage consumption, processing load, and bandwidth consumption. In such a case, unpopular files are likely to disappear from the system. In this paper, we reveal how the selfish user behavior affects the system performance using evolutionary game theoretic approach. Specifically, we focus on situations where users are heterogeneous in terms of aggressiveness in cooperative caching. Analytical results show that the user heterogeneity contributes to the stability of file availability.

    CiNii Books

    researchmap

  • A Study on Performance Evaluation of P2P File Sharing under Heterogeneous User Environments: Evolutionary Game Theoretic Approach

    Yusuke Matsuda, Masahiro Sasabe, Tetsuya Takine

    IEICE technical report   108 ( 203 )   51 - 56   2008.9

     More details

    Language:Japanese   Publishing type:Research paper (other academic)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In Peer-to-Peer (P2P) file sharing systems, file availability is improved by users cooperatively caching and sharing files. However, many users may hesitate to cache files cooperatively due to the cost for caching, such as storage consumption, processing load, and bandwidth consumption. In such a case, unpopular files are likely to disappear from the system. In this paper, we reveal how the selfish user behavior affects the system performance using evolutionary game theoretic approach. Specifically, we focus on situations where users are heterogeneous in terms of aggressiveness in cooperative caching. Analytical results show that the user heterogeneity contributes to the stability of file availability.

    CiNii Books

    researchmap

  • Tracking moving objects across multiple regions by successive bayesian estimation

    WATANABE Takafumi, SASABE Masahiro, NAKANO Hirotaka

    IEICE technical report   107 ( 524 )   353 - 358   2008.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we focus on tracking moving objects in a building using a binary-sensor network. In buildings, there are multiple points where objects temporarily change their velocities, such as doors and stairs. We call these points as gates. We assume that the velocity of an object does not almost change before and after passing a gate. We first divide the entire area in a building into multiple sub-regions each of which has gates as their entrances. To track objects in a sub-region, we apply the conventional method based on a Bayesian estimation. The conventional method conducts object tracking using statistically obtained information on object velocities. We expect that we can improve accuracy of object tracking by proposing a method to share the velocity information among sub-regions. Through simulation experiments, we demonstrate that the accuracy of object tracking has a maximum of 35% improvements compared with the conventional method.

    CiNii Books

    researchmap

  • Improving Success Ratio of Object Search in Highly-Dynamic Mobile P2P Networks

    TAKESHITA Kei, SASABE Masahiro, NAKANO Hirotaka

    IEICE technical report   107 ( 445 )   1 - 6   2008.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With the wide spread of mobile devices, information discovery methods over mobile ad hoc networks (MANETs) are required. Recent studies have revealed that integrating a distributed hash table (DHT) substrate and network-layer routing can increase search efficiency. Furthermore, some researchers have additionally proposed a clustering method which groups the overlay nodes according to their physical distance. However, it has also been pointed out that the search efficiency deteriorates in highly dynamic environments. In this paper, we propose a method sharing pointers among nodes in a cluster. Through simulation experiments, we show that the proposed method improves the success ratio of object search up to 40% compared with existing method.

    CiNii Books

    researchmap

  • Mobile P2P Networks for Highly Dynamic Environments Reviewed

    Kei Takeshita, Masahiro Sasabe, Hirotaka Nakano

    2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS   453 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    With the wide spread of mobile devices, information discovery methods over mobile ad hoc networks (MANETs) are required. Recent studies have revealed that integrating a distributed hash table (DHT) substrate and network-layer routing can increase search efficiency. Furthermore, some researchers have proposed a clustering method which groups the overlay nodes according to their physical distance. However, it has also been pointed out that the search efficiency deteriorates in highly dynamic environments. In this paper, we propose a method sharing pointers among nodes in a cluster. Through simulation experiments, we show that the proposed method improves the success ratio of object search up to 40% compared with existing method.

    DOI: 10.1109/PERCOM.2008.38

    Web of Science

    researchmap

  • High-Speed Collective Readout of Large Quantities of Moving Electronic Tags Using the Response Probability Control Method Reviewed

    Hirotaka Nakano, Masahiro Sasabe

    IEEE SYSTEMS JOURNAL   1 ( 2 )   160 - 167   2007.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC  

    When more than two electronic tags respond to a reader request, the request fails. This is referred to as the collision problem. To overcome this problem, a novel electronic tag readout method, termed the response probability control method (RPCM), is proposed in this paper. In the RPCM, the reader indicates the response probability of a request, ensuring rapid and simultaneous readout of multiple electronic tags. We have already reported the basic RPCM characteristics for a large number of nonmoving electronic tags. In this paper, the extended characteristics of electronic tags located on a conveyor belt are simulated and a portion of them is analyzed. The RPCM and the existing dynamic framed slotted ALOHA (DFSA) method are compared. The simulation demonstrated that, in the case of nonmoving electronic tags, the readout of the RPCM is 1.6 times faster than that of DFSA, while in the case of moving electronic tags, it is more than 2.5 times faster.

    DOI: 10.1109/JSYST.2007.907681

    Web of Science

    researchmap

  • Rapid Readout of Multiple RFIDs by Response Probability Control Method

    NAKANO Hirotaka, NAGATE Wataru, HIRANO Yusuke, SASABE Masahiro

    The IEICE transactions on electronics C   90 ( 6 )   491 - 501   2007.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • 領域に対するノードの出入りを考慮した移動モデル(メディア品質,品質評価モデル,信頼性,セキュリティ,ユビキタス/ブロードバンドネットワークの品質,一般)

    相原聖, 笹部昌弘, 中野博隆

    電子情報通信学会技術研究報告. CQ, コミュニケーションクオリティ   107 ( 19 )   19 - 24   2007.4

     More details

    本稿では,BluetoothやZigBeeなどセル範囲の小さな通信方式を対象としたサービス領域において,領域の境界におけるノードの動きから領域内のノード分布を推定するモデルを提案する.提案モデルでは,領域に対するノードの出入りを観測し,領域内のノードの移動を再現する.まず,ノードとして人に着目し,実際に人が通行する場所を観測した.観測結果から,領域内におけるノードの移動軌跡が直線で近似できること,移動速度が正規分布に従うことが分かった.さらに,ノードの侵入位置と離脱位置の対応付けを推測する方法として,組み合わせ最適化及びベイズ推定を利用した推定法を提案した.評価の結果,対応付けの再現率は,組み合わせ最適化による推定法では0.736,ベイズ推定法では1となった.

    researchmap

  • Improvement of the Capacity of Wireless Networks by Optimizing Communication Distance

    TOKITO Hiroshi, SASABE Masahiro, NAKANO Hirotaka

    IEICE technical report   106 ( 578 )   95 - 100   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    As the number of nodes increases, the capacity of ad-hoc wireless networks is constrained by radio interference. Especially, when a source node cannot directly communicate with its destination node, every packet has to travel through one or more relay nodes. The throughput decreases as the number of relayed hop count increases. To effectively use the limited radio resources, we propose a scheme that a node avoids radio interference among its adjacent nodes by appropriately controlling its transmission power. In this case, the capacity is expected to quite improve when each node sets distance to physical distance to the next hop. However, this may be difficult to realize in practical environments. In this paper, through analysis and simulation experiments, we examine the optimal communication distance to maximize the network capacity when all nodes take the same communication distance. Results showed that the communication distance to maximize the network capacity depends on the node density. We further showed that the network capacity is independent of the node density. In addition, the proposed scheme could improve the network capacity up to 2.1 times higher than the traditional scheme.

    CiNii Books

    researchmap

  • Caching Algorithms using Evolutionary Game Theory in a File-Sharing System

    SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki

    IEICE technical report   106 ( 461 )   97 - 102   2007.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In a P2P file-sharing system, a node finds and retrieves its desired file. If multiple nodes cache the same file to provide others, we can achieve a file-sharing system with low latency and high file availability. However, a node has to spend costs, e.g., processing load or storage capacity, on caching of a file. Consequently, a node may selfishly behave and hesitate to cache a file. In such a case, there is a possibility that unpopular files disappear from the system. In this paper, we aim to accomplish effective caching in the whole system that emerges from autonomous and selfish node behaviors. We first discuss relationship between selfish node behaviors and system dynamics according to evolutionary game theory. As a result, we show that a file-sharing system can be robust to file disappearance depending on a model of cost and demand for caching even if nodes behave selfishly.

    CiNii Books

    researchmap

  • Caching Algorithms using Evolutionary Game Theory in a File-Sharing System

    SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki

    IEICE technical report   106 ( 461 )   97 - 102   2007.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In a P2P file-sharing system, a node finds and retrieves its desired file. If multiple nodes cache the same file to provide others, we can achieve a file-sharing system with low latency and high file availability. However, a node has to spend costs, e.g., processing load or storage capacity, on caching of a file. Consequently, a node may selfishly behave and hesitate to cache a file. In such a case, there is a possibility that unpopular files disappear from the system. In this paper, we aim to accomplish effective caching in the whole system that emerges from autonomous and selfish node behaviors. We first discuss relationship between selfish node behaviors and system dynamics according to evolutionary game theory. As a result, we show that a file-sharing system can be robust to file disappearance depending on a model of cost and demand for caching even if nodes behave selfishly.

    CiNii Books

    researchmap

  • Mobility model based on incoming and outgoing nodes to an area Reviewed

    S. Aihara, M. Sasabe, H. Nakano

    International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archives   36   2007.1

     More details

    ? 2007 International Society for Photogrammetry and Remote Sensing. All rights reserved. In this paper, we propose a mobility model which estimates a node distribution in a service area from node flows on the boundary of the area. Our model targets new wireless communication techniques, such as Bluetooth and ZigBee, whose transmission ranges, called cells, are relatively small. The proposed model reproduces the mobility of nodes in an area by the observation of the incoming and outgoing nodes to the area. At first, we focus on a person as a node and observe an area where people actually pass through. From the observation results, we show that a node moves along with an approximately straight line with a velocity following a normal distribution. Furthermore, we propose two methods that estimate correspondences between incoming and outgoing events to the area; combinatorial optimization based method (COM) and Bayesian estimation based method (BEM). As a result, the reproduction ratio of COM is 0.736, and that of BEM is 1.

    researchmap

  • A caching algorithm using evolutionary game theory in a file-sharing system Reviewed

    Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata

    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3   1055 - 1060   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    In a P2P file-sharing system, a node finds and retrieves its desired file. If multiple nodes cache the same file to provide others, we can achieve a file-sharing system with low latency; and high file availability However, a node has to spend costs, e.g., processing load or storage capacity, on caching of a file. Consequently, a node may selfishly behave and hesitate to cache a file. In such a case, there is a possibility that unpopular files disappear from the system. In this paper, we aim to accomplish effective caching in the whole system that emerges from autonomous and selfish node behavior We first discuss relationship between selfish node behavior and system dynamics according to evolutionary game theory As a result, we show that a file-sharing system can be robust to file disappearance depending on a cost and demand model for caching even if nodes behave selfishly.

    DOI: 10.1109/ISCC.2007.4381627

    Web of Science

    researchmap

  • Improvement of the Capacity of Wireless Networks by Optimizing Communication Distance Reviewed

    Hiroshi Tokito, Masahiro Sasabe, Hirotaka Nakano

    MWCN 07: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON MOBILE AND WIRELESS COMMUNICATION NETWORKS   11 - +   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    As the number of nodes increases, the capacity of ad-hoc wireless networks is constrained by radio interference. Especially when a source node cannot directly communicate with its destination node, every packet has to travel through one or more intermediate nodes. The throughput decreases as the number of relayed hop count increases. To effectively use the limited radio resources, we propose a scheme that a node avoids radio interference among its adjacent nodes by appropriately controlling its transmission power. In this case, the network capacity is expected to quite improve when each node sets its communication distance to physical distance to the next intermediate node. However, this may be difficult to realize in practical environments. In this paper, we examine the optimal communication distance to maximize the network capacity when all nodes take the same communication distance. Results showed that the communication distance to maximize the network capacity depended on the node density. We further showed that the network capacity was independent of the node density. In addition, the proposed scheme could improve the network capacity up to 2.1 times higher than the traditional scheme.

    DOI: 10.1109/ICMWCN.2007.4668171

    Web of Science

    researchmap

  • Transmission power control for avoiding cell overlapping in micro-cellular networks Reviewed

    Akiko Miyagawa, Masahiro Sasabe, Hirotaka Nakano

    WINSYS 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS   45 - +   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL & COMMUNICATION  

    In a cellular system, a base station can smoothly communicate with nodes in its cell by avoiding overlap of frequency range with its adjacent cells. From the viewpoint of graph theory, that needs to divide the original frequency range into at least four sub-ranges. This leads to deteriorate the transmission rate. To tackle this problem, we propose Complete Cell Partitioning (CCP) that enables a base station to use the whole of the original frequency range by avoiding overlap of its own cell with the adjacent cells. CCP is achieved by appropriately controlling the transmission power on base stations. We first analytically derive success probability of CCP when nodes are randomly located in the whole region. Then, we verify the analysis by comparing with simulation results. The analytical and simulation results show that CCP enables to use the original frequency range more effectively than the traditional cellular system regardless of the number of nodes in a cell.

    Web of Science

    researchmap

  • A Construction Method of a Low-Diameter, Location-Aware, and Resilient P2P Network

    SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki

    IEICE technical report   105 ( 628 )   131 - 136   2006.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Since a peer searches for its desired file in a P2P file sharing system, the structure of an overlay network determines the effectiveness of search in terms of network load and search latency. In this paper, based on the Barabasi-Albert (BA) model, we propose a novel method to construct a low-diameter and location-aware overlay network where peers can find physically-close providers without introducing much load on underlying physical networks. We also propose a rewiring method to improve the structure of the overlay network and a recovery method to cope with random peer departures and malicious attacks. Through several simulation experiments using real physical topologies, we found that the proposed methods could construct a resilient overlay network that improved reachability up to 60% compared with BA model while shortening physical distance from neighboring peers.

    CiNii Books

    researchmap

  • LLR: A construction scheme of a low-diameter, location-aware, and resilient P2P network Reviewed

    Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata

    2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING   210 - +   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Since a peer searches for its desired file in a P2P file sharing system, the structure of an overlay network determines the effectiveness of search. In this paper, based on the Barabasi-Albert (BA) model, we propose a novel scheme (LLR) to construct a low-diameter and location-aware overlay network where peers can easily find physically-close file holders. LLR has a rewiring method to improve the structure of an overlay network and a recovery method to cope with disappearance of peers. Through several simulation experiments using real physical topologies, we found that LLR could construct an overlay network that had the higher reachability than BA and the higher correlation between physical and logical distances.

    DOI: 10.1109/COLCOM.2006.361863

    Web of Science

    researchmap

  • High-speed readout method of ID information on a large amount of electronic tags Reviewed

    Wataru Nagate, Masahiro Sasabe, Hirotaka Nakano

    NEXT-GENERATION COMMUNICATION AND SENSOR NETWORKS 2006   6387   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPIE-INT SOC OPTICAL ENGINEERING  

    An electronic tag such as RFID is expected to create new services that cannot be achieved by the traditional bar code. Specifically, in a distribution system, simultaneous readout method of a large amount of electronic tags embedded in products is required to reduce costs and time. In this paper, we propose novel methods, called Response Probability Control (RPC), to accomplish this requirement. In RPC, a reader firstly sends an ID request to electronic tags in its access area. It succeeds reading information on a tag only if other tags do not respond. To improve the readout efficiency, the reader appropriately controls the response probability in accordance with the number of tags. However, this approach cannot entirely avoid a collision of multiple responses. When a collision occurs, ID information is lost. To reduce the amount of lost data, we divide the ID registration process into two steps. The reader first gathers the former part of the original ID, called temporal ID, according to the above method. After obtaining the temporal ID, it sequentially collects the latter part of ID, called remaining ID, based on the temporal ID. Note that we determine the number of bits of a temporal ID in accordance with the number of tags in the access area so that each tag can be distinguishable. Through simulation experiments, we evaluate RPC in terms of the readout efficiency. Simulation results show that RPC can accomplish the readout efficiency 1.17 times higher than the traditional method where there are a thousand of electronic tags whose IDs are 128 bits.

    DOI: 10.1117/12.685791

    Web of Science

    researchmap

  • Information gathering system based on combination of random and selective accesses for ubiquitous environments Reviewed

    Yusuke Hirano, Masahiro Sasabe, Hirotaka Nakano

    NEXT-GENERATION COMMUNICATION AND SENSOR NETWORKS 2006   6387   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPIE-INT SOC OPTICAL ENGINEERING  

    In this paper, we focus on an information gathering system where a reader continuously collects information from mobile nodes in its access area, such as environmental information cameras and sensors. We assume that a mobile node is relatively tiny and does not have a high-precision antenna to sense carriers emitted by other nodes. Although a random access method like ALOHA can be easily used, it has disadvantages of transmission efficiency and energy consumption. To tackle these problems, we propose a novel method that is a combination of random and selective accesses. At first, a reader sends an ID request to all nodes. Then, each node replies its ID to the reader at a response probability involved in the request. Finally, the reader selectively gathers information from nodes according to the obtained ID lists. In our method, non-registered nodes and non-deleted nodes affect the system performance. The non-registered node is a node that is in the access area but its ID is not registered to the reader. The non-deleted node is a node that leaves the area but its ID is still registered to the reader. In this paper, we first derive their numbers by an analysis using the Inversion Formula of Palm Calculus. Then, we conduct simulation experiments to verify the analysis. Simulation results show that the proposed method performs well in a wide range of mobility by appropriately controlling the response probability.

    DOI: 10.1117/12.685666

    Web of Science

    researchmap

  • Adaptive and robust P2P media streaming Reviewed

    Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata

    WSEAS Transactions and Communications   4 ( 7 )   425 - 430   2005.7

     More details

    Publishing type:Research paper (scientific journal)  

    With the growth of computing power and the proliferation of broadband Internet access, the use of media streaming has become widely diffused. In this paper, based on our previous work, we propose a Peer-to-Peer (P2P) media streaming system that can provide a large number of users with continuous media streaming services while dynamically adapting to peer departures and changes in network conditions. For this purpose, we propose a new media retrieval method that dynamically switches provider peers. Through several simulation experiments, we show that the proposed media retrieval method improves the completeness of media playout compared with previous methods. Furthermore, we also show that our search method is more robust to peer departures than flooding methods.

    Scopus

    researchmap

  • Adaptive media streaming on P2P networks Reviewed

    Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata

    Proceedings of Australian Telecommunication Networks and Applications Conference (ATNAC 2004)   2004.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Effective methods for scalable and continuous media streaming on peer-to-peer networks Reviewed

    M Sasabe, N Wakamiya, M Murata, H Miyahara

    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS   15 ( 6 )   549 - 558   2004.11

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:WILEY-BLACKWELL  

    With the growth of computing power and the proliferation of broadband access to the internet, the use of media streaming has become widely diffused. By using the peer-to-peer (P2P) communication architecture, media streaming can be expected to smoothly react to changes in network conditions and user demands for media streams. In this paper, to achieve continuous and scalable media streaming, we introduce our scalable media search and in-time retrieval methods. Through several simulation experiments, we show that our methods can accomplish continuous media play-out for popular media streams without introducing extra load on the system. However, we also show that an LRU cache replacement algorithm cannot provide users with continuous media play-out for unpopular media streams. To tackle this problem, we take inspiration from biological systems to propose a new cache replacement algorithm that considers the balance between supply and demand for media streams. We demonstrate that our proposed algorithm can improve the continuity of media play-out compared with LRU. Furthermore, we find that the proposed algorithm can adapt to changes in the popularity of various media. Copyright (C) 2004 AEI.

    DOI: 10.1002/ett.1014

    Web of Science

    researchmap

  • Third International Conference on Peer-to-Peer Computing (P2P 2003) Reviewed

    SASABE Masahiro

    Systems, control and information   48 ( 2 )   75 - 75   2004.2

     More details

    Language:Japanese   Publisher:Institute of Systems, Control and Information Engineers  

    CiNii Books

    researchmap

  • Media streaming on P2P networks with bio-inspired cache replacement algorithm Reviewed

    M Sasabe, N Wakamiya, M Murata, H Miyahara

    BIOLOGICALLY INSPIRED APPROACHES TO ADVANCED INFORMATION TECHNOLOGY   3141   380 - 395   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    With the growth of computing power and the proliferation of broadband access to the Internet, the use of media streaming has become widely diffused. By using the P2P communication architecture, media streaming can be expected to smoothly react to changes in network conditions and user demands for media streams. To achieve continuous and scalable media streaming, we proposed scalable media search and retrieval methods in our previous work. However, through several simulation experiments, we have shown that an LRU (Least Recently Used) cache replacement algorithm cannot provide users with continuous media play-out for unpopular media streams. In this paper, inspired by biological systems, we propose a new algorithm that considers the balance between supply and demand for media streams. Through several simulation experiments, it has been shown that our proposed algorithm could improve the completeness of media play-out compared with LRU.

    Web of Science

    researchmap

  • Scalable Methods for Media Streaming on Peer-to-Peer Networks

    SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki, MIYAHARA Hideo

    IEICE technical report. Communication systems   103 ( 313 )   71 - 76   2003.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With the growth of computing power and the proliferation of broadband access to the Internet, media streaming has widely diffused. By using the P2P communication architecture, media streaming can be expected to smoothly react to network conditions and changes in user demands for media-streams. In this paper, we propose efficient methods to achieve continuous and scalable media streaming system. In our mechanisms, a media stream is divided into blocks for efficient use of network bandwidth and storage space. We propose scalable search methods, algorithms to determine an optimum provider peer from search results, and a caching algorithm considering on the balance between supply and demand for media streams. Through several simulation experiments, it was shown that proposed mechanisms could accomplish continuous media streaming without deteriorating the system scalability.

    CiNii Books

    researchmap

  • Scalable Methods for Media Streaming on Peer-to-Peer Networks

    SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki, MIYAHARA Hideo

    IEICE technical report   103 ( 309 )   71 - 76   2003.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With the growth of computing power and the proliferation of broadband access to the Internet, media streaming has widely diffused. By using the P2P communication architecture, media streaming can be expected to smoothly react to network conditions and changes in user demands for media-streams. In this paper, we propose efficient methods to achieve continuous and scalable media streaming system. In our mechanisms, a media stream is divided into blocks for efficient use of network bandwidth and storage space. We propose scalable search methods, algorithms to determine an optimum provider peer from search results, and a caching algorithm considering on the balance between supply and demand for media streams. Through several simulation experiments, it was shown that proposed mechanisms could accomplish continuous media streaming without deteriorating the system scalability.

    CiNii Books

    researchmap

  • Scalable Methods for Media Streaming on Peer-to-Peer Networks

    SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki, MIYAHARA Hideo

    IEICE technical report. Information networks   103 ( 311 )   71 - 76   2003.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With the growth of computing power and the proliferation of broadband access to the Internet, media streaming has widely diffused. By using the P2P communication architecture, media streaming can be expected to smoothly react to network conditions and changes in user demands for media-streams. In this paper, we propose efficient methods to achieve continuous and scalable media streaming system. In our mechanisms, a media stream is divided into blocks for efficient use of network bandwidth and storage space. We propose scalable search methods, algorithms to determine an optimum provider peer from search results, and a caching algorithm considering on the balance between supply and demand for media streams. Through several simulation experiments, it was shown that proposed mechanisms could accomplish continuous media streaming without deteriorating the system scalability.

    CiNii Books

    researchmap

  • Proxy Caching Mechanisms with Quality Adjustment for Video Streaming Services Reviewed

    Masahiro Sasabe, Yoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murata, Hideo Miyahara

    IEICE Transactions on Communications   E86-B   1849 - 1858   2003.1

     More details

    The proxy mechanism widely used in WWW systems offers low-delay data delivery by means of "proxy server." By applying proxy mechanisms to video streaming system, we expect that high-quality and low-delay video distribution can be accomplished without introducing extra load on the system. In addition, it is effective to adapt the quality of cached video data appropriately in the proxy if user requests are diverse due to heterogeneity in terms of the available bandwidth, end-system performance, and user's preferences on the perceived video quality. In this paper, we propose proxy caching mechanisms to accomplish high-quality and low-delay video streaming services, In our proposed system, a video stream is divided into blocks for efficient use of cache buffer. A proxy cache server is assumed to be able to adjust the quality of cached or retrieved video blocks to requests through video filters. We evaluate our proposed mechanisms in terms of the required buffer size, the play-out delay and the video quality through simulation experiments. Furthermore, to verify the practicality of our mechanisms, we implement our proposed mechanisms on a real system and conducted experiments. Through evaluations from several performance aspects, it is shown that our proposed mechanisms can provide users with a low-latency and high-quality video streaming service in a heterogeneous environment.

    researchmap

  • Scalable and continuous media streaming on peer-to-peer networks Reviewed

    M Sasabe, N Wakamiya, M Murata, H Miyahara

    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS   92 - 99   2003

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE COMPUTER SOC  

    With the growth of computing power and the proliferation of broadband access to the Internet, media streaming has widely diffused. Although the proxy caching technique is one method to accomplish effective media streaming, it cannot adapt to the variations of user locations and diverse user demands. By using the P2P communication architecture, media streaming can be expected to smoothly react to network conditions and changes in user demands for media-streams. In this paper, we propose efficient methods to achieve continuous and scalable media streaming system. In our mechanisms, a media stream is divided into blocks for efficient use of network bandwidth and storage space. We propose two scalable search methods and two algorithms to determine an optimum provider peer from search results. Through several simulation experiments, we show that the FLS method can perform continuous media play-out while reducing the amount of search traffic to 1/6 compared with full flooding.

    DOI: 10.1109/PTP.2003.1231508

    Web of Science

    researchmap

  • Implementation and Evaluation of Proxy Caching Mechanisms with Video Quality Adjustment

    TANIGUCHI Yoshiaki, SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki, MIYAHARA Hideo

    Technical report of IEICE. CQ   102 ( 191 )   41 - 46   2002.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The proxy mechanism widely used in WWW systems offers low-delay data delivery by means of "proxy server". By applying proxy mechanisms to the video streaming system, we expect that high-quality and low-delay video distribution can be accomplished without introducing extra load on a system. In addition, it is effective for proxy to adapt the quality of cached video data to users requests if requests are diverse due to heterogeneity in terms of the available bandwidth, end-system performance, and user's preferences on the perceived video quality. We have proposed proxy caching mechanisms to accomplish the high-quality and highly-interactive video streaming services. In our proposed system, a video stream is divided into blocks for efficient use of a cache buffer. A proxy server is assumed to be able to adjust the quality of a cached or retrieved video block to a request through video filters. In this paper, to verify the practicality of our mechanisms, we implemented them on a real system and conducted experiments. Through evaluations from several performance aspects, it was shown that our proposed mechanisms can provide users with a video streaming service in a heterogeneous environment.

    CiNii Books

    researchmap

  • Implementation and Evaluation of Proxy Caching Mechanisms with Video Quality Adjustment

    TANIGUCHI Yoshiaki, SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki, MIYAHARA Hideo

    ITE Technical Report   26 ( 0 )   41 - 46   2002

     More details

    Language:Japanese   Publisher:The Institute of Image Information and Television Engineers  

    The proxy mechanism widely used in WWW systems offers low-delay data delivery by means of "proxy server". By applying proxy mechanisms to the video streaming system, we expect that high-quality and low-delay video distribution can be accomplished without introducing extra load on a system. In addition, it is effective for proxy to adapt the quality of cached video data to users requests if requests are diverse due to heterogeneity in terms of the available bandwidth, end-system performance, and user's preferences on the perceived video quality. We have proposed proxy caching mechanisms to accomplish the high-quality and highly-interactive video streaming services. In our proposed system, a video stream is divided into blocks for efficient use of a cache buffer. A proxy server is assumed to be able to adjust the quality of a cached or retrieved video block to a request through video filters. In this paper, to verify the practicality of our mechanisms, we implemented them on a real system and conducted experiments. Through evaluations from several performance aspects, it was shown that our proposed mechanisms can provide users with a video streaming service in a heterogeneous environment.

    DOI: 10.11485/itetr.26.48.0_41

    CiNii Books

    researchmap

  • Caching mechanisms for proxy cache with quality adaptation

    SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki, MIYAHARA Hideo

    IEICE technical report   101 ( 121 )   31 - 36   2001.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The proxy mechanism is now widely used in WWW system in order to offer low-delay data delivery with an assistance of the "proxy server". By applying the proxy mechanism to video transfer, we can expect a low-delay and interactive video streaming service provided without intoroducing extra load on the stream. In addition, if the proxy appropriately adapts the quality of cached video data to the requested quality, video streams can be delivered to users by considering their heterogeneous QoS requirements. In this paper, we consider mechanisms of data retrieval, prefetching and replacement for the proxy cache. Through simulation experiments, we show that our proposed proxy caching mechanism achieves a high-quality and low-delay video distribution which meeting user's demand.

    CiNii Books

    researchmap

  • Proxy caching mechanisms with video quality adjustment Reviewed

    M Sasabe, N Wakamiya, M Murata, H Miyahara

    INTERNET MULTIMEDIA MANAGEMENT SYSTEMS II   4519   276 - 284   2001

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SPIE-INT SOC OPTICAL ENGINEERING  

    The proxy mechanisms widely used in WWW systems offer low-delay data delivery by a means of "proxy server". By applying the proxy mechanism to the video transfer, we expect a real-time and interactive video streaming without introducing extra load on the system. In addition, if the proxy appropriately adjusts the quality of cached video data to the user's demand, video streams can be delivered to users considering their heterogeneous QoS requirements. In this paper, we propose proxy caching mechanisms that can achieve a high-quality video transfer considering the user's demand and the available bandwidth. In our system, a video stream is divided into pieces. The proxy caches them in local buffer, adjusts their quality if necessary, transmits them to users, replaces them with cached data, and retrieves them from the video server, considering user's requirement. We evaluate the proposed video caching mechanisms and compare their performance in terms of the required buffer size, the play-out delay and the video quality. Consequently, the validity of the video quality adjustment in the proxy is confirmed.

    DOI: 10.1117/12.434278

    Web of Science

    researchmap

▼display all

MISC

  • On collaborative spectrum sensing mechanism based on system load and detection performance in cognitive radio networks

    117 ( 204 )   61 - 66   2017.9

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Transmission opportunity based group formation of secondary users for collaborative spectrum sensing in cognitive radio networks with multiple primary users

    116 ( 484 )   499 - 504   2017.3

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • On Path Selection Considering Length and Reliability for Automatic Evacuation Guiding Based on Interactions between Evacuees and Their Mobile Nodes

    116 ( 484 )   517 - 522   2017.3

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Automatic evacuation guiding scheme based on implicit interactions between evacuees and their mobile nodes

    Komatsu Nobuhisa, Sasabe Masahiro, Kawahara Jun, Kasahara Shoji

    2016.8

     More details

    Language:English   Publisher:Springer  

    researchmap

  • On Congestion-Aware Route Selection for Automatic Evacuation Guiding Based on Cooperation between Evacuees and Their Mobile Nodes

    116 ( 161 )   1 - 6   2016.7

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Design, implementation, and evaluation of an offline evacuation guiding application considering positioning errors of mobile nodes

    115 ( 496 )   1 - 6   2016.3

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Evaluation of influence of a mobility model based on person trip data on DTN routing

    115 ( 496 )   13 - 18   2016.3

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • On Information Sharing Scheme for Automatic Evacuation Guiding System Based on Cooperation between Evacuees and Their Mobile Nodes

    115 ( 496 )   7 - 12   2016.3

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Distributed Cooperative Control for Speedy and Effective Coverage in Mobile Sensor Networks

    115 ( 408 )   79 - 84   2016.1

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • B-15-8 Design of an evacuation guiding application based on cooperation between an evacuee and a mobile node

    Itoi Junki, Sasabe Masahiro, Kawahara Jun, Kasahara Shoji

    Proceedings of the Society Conference of IEICE   2015 ( 1 )   391 - 391   2015.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • Poster : On Controllable Tit-for-Tat-Based P2P File Distribution

    115 ( 130 )   33 - 38   2015.7

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Path Enumeration Algorithm Using Zero-Suppressed Binary Decision Diagram for Path Selection in Overlay Networks

    115 ( 130 )   51 - 54   2015.7

     More details

    Language:Japanese  

    CiNii Books

    researchmap

  • Self-Organizing Resource Allocation Scheme Using Evolutionary Game Theoretic Approach for Large-Scale Distributed Systems

    YAMAGIWA Shingo, SASABE Masahiro, TAKINE Tetsuya

    IEICE technical report   114 ( 477 )   529 - 534   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Large distributed systems, such as peer-to-peer networks and wireless sensor networks, provide users with multiple services by using lots of computational resources. Because such resources are limited, it is important to allocate them dynamically in response to users' demands. Centralized resource allocation schemes, however, have a potential drawback of scalability. In this paper, we propose a decentralized resource allocation scheme, where agents, which are running on the computational resources, autonomously determine services to provide. Specifically, we apply evolutionary game theory to achieve self-organizing resource allocation. Through analysis and simulation experiments, we show the effectiveness of the proposed scheme in terms of convergence accuracy, spatial distribution of service share, and stability.

    CiNii Books

    researchmap

  • Overlay Multicast with Peak Traffic Constraints for Inter-Data Center Communication

    KANEKO Motoki, SASABE Masahiro, TAKINE Tetsuya

    IEICE technical report   114 ( 477 )   161 - 166   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, service providers have been using data centers (DCs) to provide cloud services. When they use multiple DCs, which are geographically distributed, they require communication for maintenance operations among them, e.g., synchronization and update. Because such maintenance operations need to send identical data from one source to multiple destinations, we apply overlay multicast. Note that main traffic yielded by cloud services temporally changes and the charge for access links is determined by their peak traffic. In this paper, we aim to maximize the amount of overlay multicast traffic under the constraint of the peak traffic. We first formulate our problem as a linear programming. We further propose a scheme for estimating the peak traffic. Through simulation experiments, we show the effectiveness of the proposed method in terms of the amount of overlay multicast traffic and peak traffic.

    CiNii Books

    researchmap

  • Visiting Order Considering Proximity between Clusters in Ferry-Assisted DTNs

    IZUMI Yoshiaki, SASABE Masahiro, TAKINE Tetsuya

    IEICE technical report   114 ( 477 )   523 - 528   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, it is required to construct inexpensive communication infrastructures in rural areas and emergency networks in disaster areas. In such environments, there are multiple isolated clusters, such as villages in rural areas or emergency shelters in disaster areas. In this paper, we focus on ferry-assisted DTNs in which a special mobile node called a message ferry visits clusters to support communication with external networks through a special cluster, called a base cluster, which has access links. In the ferry assisted DTNs, visiting order of the message ferry determines the mean delivery delay of data (bundles), which is the average time interval from the generation of a bundle in a cluster to the completion of its delivery to the base cluster. In this paper, we propose a hybrid visiting order method that combines the two types of existing visiting order in consideration of the proximity between clusters. Through simulation experiments, we evaluate the effectiveness of the proposed method in terms of the average delivery delay.

    CiNii Books

    researchmap

  • Monitoring Control Using Optimal Stopping Rule in Mobile Sensor Networks

    WATANABE Kazuma, SASABE Masahiro, TAKINE Tetsuya

    IEICE technical report   114 ( 477 )   577 - 582   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In recent years, there have been many studies on monitoring in mobile sensor networks, e.g., disaster prevention, crime prevention, environmental monitoring, and ecosystem monitoring. Because mobile sensors are usually powered by batteries, it is important to achieve monitoring with low power consumption. In this paper, we propose a monitoring scheme composed of two phases: search phase and observation phase. In the search phase, mobile sensors aim to discover important places speedily. After that, they continue to observe the important places in the observation phase. Under the assumption that importance values of places in a monitoring area are inde- pendent and identically distributed according to a uniform distribution, we formulate the optimal phase transition to be an optimal stopping problem and derive the optimal phase transition rule. Through both the numerical and simulation experiments, we show the effectiveness of the proposed scheme.

    CiNii Books

    researchmap

  • BI-4-5 Unconscious cooperation based control of P2P file distribution

    Sasabe Masahiro

    Proceedings of the IEICE General Conference   2015 ( 2 )   "SS - 78"-"SS-79"   2015.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • BS-8-2 On detection of outlier trajectories in evacuation guiding system using trajectories of mobile terminals

    Otsuki Kohei, Kawahara Jun, Sasabe Masahiro, Kasahara Shoji

    Proceedings of the IEICE General Conference   2015 ( 2 )   "S - 156"-"S-157"   2015.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

  • Proposal and Evaluation of Evacuation Guiding Scheme Using Trajectories of Mobile Terminals

    KOMATSU Nobuhisa, SASABE Masahiro, KAWAHARA Jun, KASAHARA Shoji

    Technical report of IEICE. CQ   114 ( 404 )   101 - 106   2015.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    When large-scale disasters occur, evacuees have to evacuate to safe places quickly. In this paper, we propose an evacuation guiding scheme using mobile terminals of evacuees. Each terminal tries to navigate its evacuee by presenting an evacuation route. It can also trace the actual evacuation route of the evacuee as the trajectory by measuring his/her positions periodically. The proposed scheme automatically estimates blocked road segments from the difference between the presented evacuation route and actual evacuation route, then recalculates the alternative evacuation route. In addition, evacuees also share such information among them through communication with other mobile terminals and that with a server via communication infrastructures. Through simulation experiments, we evaluate fundamental characteristics of the proposed scheme, impact of degree of disaster, and effect of information sharing.

    CiNii Books

    researchmap

  • Distributed cooperative control for speedy coverage in mobile sensor networks

    WATANABE Kazuma, SASABE Masahiro, TAKINE Tetsuya

    Technical report of IEICE. CQ   114 ( 131 )   45 - 50   2014.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    In recent years, mobile sensor networks have been expected to realize environmental monitoring and ecosystem monitoring. It is desirable that mobile sensors autonomously cooperate with each other in a distributed manner such that they can cover important locations in the target area. Game theoretical approaches have been attracting many researchers to achieve such distributed cooperative control. In the game theoretical approaches, we need to design a game model and a learning algorithm. The game model should be designed to enhance the accuracy of coverage in steady state. The learning algorithm should be designed to lead the system to appropriate steady states, independent of initial states. In this paper, we propose a learning algorithm where mobile sensors efficiently explore the area by sharing their search histories and speedily move to their appropriate locations. Through simulation experiments, we demonstrate that the proposed algorithm can achieve high accuracy of coverage even when each mobile sensor explores a limited range of the entire area.

    CiNii Books

    researchmap

  • Analysis of Optimal Scheduling in Tit-for-Tat-based P2P File Distribution

    HASEGAWA Masashi, SASABE Masahiro, TAKINE Tetsuya

    IEICE technical report   113 ( 472 )   167 - 172   2014.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Peer-to-Peer (P2P) file distribution systems can efficiently disseminate massive contents, such as disk images of operating systems, to many users in a piece-by-piece manner. In particular, BitTorrent protocol optimizes each peer's download speed by applying tit-for-tat (TFT) strategy, where each peer preferentially uploads piece(s) to peer(s) from which it can download missing pieces faster. To the best of our knowledge, however, it has not been sufficiently studied on the optimality of such TFT-based P2P file distribution. In this paper, we aim to figure out the optimal scheduling in the TFT-based P2P file distribution. First, we formulate the scheduling in TFT-based P2P file distribution as a integer linear programming, where the variables are piece transfers between peers at each time and the objective function is the minimization of the average file retrieving time among peers. Through the analysis of the optimal solution obtained by the existing solver, we reveal the characteristics of the optimal scheduling.

    CiNii Books

    researchmap

  • DS-2-2 Network Environment Adaptive Store-Carry-Forward Routing

    Kimura Tomotaka, Matsuura Tsubasa, Sasabe Masahiro, Matsuda Takahiro, Takine Tetsuya

    Proceedings of the IEICE General Conference   2014 ( 1 )   "S - 24"-"S-25"   2014.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    J-GLOBAL

    researchmap

  • Tree-Set Selection for High-Speed Multicast in Overlay Networks with Linear Capacity Constraints

    MIZUGUCHI Hiroaki, SASABE Masahiro, TAKINE Tetsuya

    IEICE technical report. Information networks   112 ( 393 )   51 - 56   2013.1

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Because overlay networks for inter-data center communication are composed of reliable nodes, high-speed overlay multicast is expected to be realized using the information about the underlying IP networks. In this paper, we aim to achieve the high-speed multicast based on multiple trees by taking account of the IP-level interference between them. We first formulate the tree-set selection problem for high-speed multicast in overlay networks with linear capacity constraints. We further propose a space-efficient heuristic algorithm to solve this problem. Through numerical results, we show that the heuristic algorithm can obtain quasi-optimal tree set.

    CiNii Books

    researchmap

  • Grouping clusters to minimize the total mean delivery delay of bundles in ferry-assisted DTNs

    KABIRI K. Habibul, SASABE Masahiro, TAKINE Tetsuya

    電子情報通信学会技術研究報告. NS, ネットワークシステム   111 ( 408 )   87 - 92   2012.1

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Communication among isolated networks (clusters) in delay tolerant networks (DTNs) can be supported by a message ferry, which collects bundles from clusters and delivers them to a sink node. When there are lots of distant static clusters, multiple message ferries and sink nodes will be required. In this paper, we aim to make groups each of which consists of physically close clusters, a sink node, and a message ferry. Our main objective is minimizing the overall mean delivery delay of bundles in consideration of both offered load of clusters and distance between clusters and their sink nodes. We first model this problem as a nonlinear integer programming, based on the knowledge obtained in our previous work. Because it might be hard to solve this problem directly, we take two-step optimization approach based on linear integer programming, which yields an approximate solution of the problem. Through numerical results, we show the two-step optimization approach works well.

    CiNii Books

    researchmap

  • Evaluation of user behavior and system availability based on measurement of BitTorrent

    GODA Shin, SASABE Masahiro, TAKINE Tetsuya

    IEICE technical report   110 ( 116 )   85 - 90   2010.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Each user in the Peer-to-Peer (P2P) file-sharing systems potentially tends to maximize its own benefit rather than the overall system efficiency and performance. On the other hand, there are lots of indistinct points left in the users' selfish behavior and its influence on the system performance. In this paper, we measure the BitTorrent system, which is one of the most famous P2P file-sharing systems, and evaluate users' behavior and system availability. The measurement is conducted through communications with a tracker which manages information about peers sharing the files and with each of those peers. The measurement result shows that about half of users stop opening the file to the public within several hours after completing the file retrieval. In addition, we show that the system is supported not only by a few peers that remain to be providers of the file for a long term, but also by most peers that are temporal suppliers during their own file retrieval.

    CiNii Books

    researchmap

  • Power control method for increasing capacity in wireless mesh networks

    IEICE technical report   108 ( 151 )   61 - 66   2008.7

     More details

    Language:Japanese  

    researchmap

  • SB-10-2 Cache Replacement Algorithm for P2P Media Streaming(SB-10. Latest Trends on Broadband Contents Delivery Technologies)

    SASABE Masahiro, WAKAMIYA Naoki, MURATA Masayuki, MIYAHARA Hideo

    Proceedings of the IEICE General Conference   2004 ( 2 )   "SE - 3"-"SE-4"   2004.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Books

    researchmap

▼display all

Research Projects

  • Sustainable NFV Networking based on Mathematical Optimization and Spatio-Temporal GNN

    Grant number:22H03586  2022.4 - 2025.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

      More details

    Grant amount:\17420000 ( Direct Cost: \13400000 、 Indirect Cost:\4020000 )

    researchmap

  • Analysis of Interruption Risk of Information Diffusion in Consensus Formation based on Bitcoin-like Competitive Information Diffusion

    Grant number:19KT0045  2019.7 - 2022.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Sasabe Masahiro

      More details

    Grant amount:\4290000 ( Direct Cost: \3300000 、 Indirect Cost:\990000 )

    With the help of blockchain technology, the cryptocurrency system Bitcoin achieves consensus on the ledger among anonymous users in a distributed manner. We focus on the interruption risk of the competitive information diffusion mechanism, which plays one of the key roles in achieving the tamper-proof nature of blockchain. In particular, with the help of the deterministic nonlinear model for the propagation of infectious diseases in mathematical epidemiology, we have developed standby-interrupted-retrieved-attackable (SIRA) models. Through numerical evaluation, we have quantitatively revealed the interruption risk and further proposed countermeasures against it.

    researchmap

  • Informatics Study on Ultra-Scalable Blockchain Technology

    Grant number:19H01103  2019.4 - 2023.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

      More details

    Grant amount:\45500000 ( Direct Cost: \35000000 、 Indirect Cost:\10500000 )

    researchmap

  • Selfish yet Optimal Service Chaining in NFV Networks

    Grant number:19K11942  2019.4 - 2022.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Sasabe Masahiro

      More details

    Grant amount:\4290000 ( Direct Cost: \3300000 、 Indirect Cost:\990000 )

    Network functions virtualization (NFV) technologies have been expected to realize diverse services in a flexible manner. In NFV networks, a certain network service can be realized as a sequence of one or more functions (i.e., service chain). The construction problem of a service chain is called service chaining, which causes resource competition among users. In this research, we have first revealed that the service chaining and function placement can be modeled as a capacitated shortest path tour problem based integer linear program (CSPTP-based ILP) and have proposed selfish yet optimal control to realize the social optimal even under selfish decision making by each user.

    researchmap

  • Autonomous Distributed Cooperation Mechanism for Wireless Networks with an Explosive Number of Wireless Nodes

    Grant number:15H04008  2015.4 - 2019.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    Kasahara Shoji, SASABE Masahiro, KAWAHARA Jun, ZHANG Yuanyu

      More details

    Grant amount:\16770000 ( Direct Cost: \12900000 、 Indirect Cost:\3870000 )

    In this research project, we considered autonomous distributed mechanisms for cooperative sensing in cognitive radio networks with an extremely huge number of wireless nodes. We proposed two schemes: collaborative spectrum sensing mechanism based on system load and detection performance of wireless nodes, and a coalition formation method based on machine learning technique. In the former scheme, we developed the merge-split algorithm with incentive mechanism under game theory, while the latter was developed with Multi-Armed Bandit problem. We investigated the performance of proposed methods by simulation experiments, validating those effectiveness quantitatively.

    researchmap

  • Study on Controllable P2P Content Distribution Based on Game Theoretic Approach

    Grant number:15K00126  2015.4 - 2018.3

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    SASABE Masahiro

      More details

    Grant amount:\4680000 ( Direct Cost: \3600000 、 Indirect Cost:\1080000 )

    In peer-to-peer (P2P) content distribution, users' nodes, called peers, send received fragments of the original file, i.e., pieces, to others, which can alleviate the server's load. Tit-for-tat (TFT) strategy in game theory can encourage cooperation among peers, i.e., each peer has to provide fragments of the original file, called pieces, to others so as to retrieve its demanding pieces from them. In this study, we reveal that the server's indirect control of P2P content distribution can be achieved by the combination of server's piece sending strategy and TFT constraint among peers.

    researchmap

  • Relative clock synchronization in Delay Tolerant Network

    Grant number:22700070  2010 - 2012

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Young Scientists (B)

    SASABE Masahiro

      More details

    Grant amount:\3770000 ( Direct Cost: \2900000 、 Indirect Cost:\870000 )

    In delay tolerant networks, global clock synchronization among nodes is a challenging problem because reference clock information cannot be disseminated promptly over nodes due to the lack of stable connections among nodes. We proposed averaging-based algorithms for distributed global clock synchronization, where two mobile nodes exchange their local clock times when they meet and adjust their own clocks to the average of them. We further conducted the continuous-time analysis and revealed how the clock accuracy of nodes and meeting rates among them affect the rate of convergence to the steady state and the accuracy of clock synchronization in steady state.

    researchmap

  • Research on Information Transfer in Challenged Networks

    Grant number:22500056  2010 - 2012

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    TAKINE Tetsuya, MATSUDA Takahiro, SASABE Masahiro

      More details

    Grant amount:\4290000 ( Direct Cost: \3300000 、 Indirect Cost:\990000 )

    Research on information transfer in challenged networks was conducted. We developed a buffer management scheme in sparsely populated mobile ad hocnetworks, aiming to maximize the delivery ratio and to minimize the mean delivery delay.We also developed a method of finding relay nodes so as to minimize the mean deliverydelay, which utilizes local information only available at each node. We also developedsystem parameter optimization methods for layered 3D underwater sensor networks withsingle-copy routing and epidemic routing. Furthermore, we developed methods of findingan optimal visiting order of clusters and grouping clusters in ferry-assisted delay tolerantnetworks in order to minimize the mean delivery delay.

    researchmap

  • Realization of Large-Scale Distributed Systems Robust Against Selfish User Behavior

    Grant number:20700061  2008 - 2009

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Young Scientists (B)

    SASABE Masahiro

      More details

    Grant amount:\2860000 ( Direct Cost: \2200000 、 Indirect Cost:\660000 )

    I focused on P2P file-sharing systems as an example of large-scale distributed systems and examined the relationship between selfish user behavior and system performance. I first made modeling of the selfish user behavior under the framework of game theory, then revealed how the interactions among selfish users affects the system performance with the help of evolutionary game theory. Through mathematical analyses and simulation evaluations, we can achieve robust file-sharing systems against file disappearance independent of the degree of user selfishness when each user rationally behaves : He/she keeps and shares a file only when the file is likely to disappear from the network without his/her help.

    researchmap

  • Implementation and evaluation of simultaneous readout of huge quantities of electronic tags

    Grant number:19360173  2007 - 2008

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    NAKANO Hirotaka, HASEGAWA Go, SASABE Masahiro

      More details

    Grant amount:\7800000 ( Direct Cost: \6000000 、 Indirect Cost:\1800000 )

    researchmap

  • Network control methods for information networks having power-law degree distribution

    Grant number:18200004  2006 - 2008

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

    MURATA Masayuki, TAKINE Tetsuya, WAKAMIYA Naoki, HASEGAWA Go, ARAKAWA Shinichi, SASABE Masahiro

      More details

    Grant amount:\38870000 ( Direct Cost: \29900000 、 Indirect Cost:\8970000 )

    researchmap

  • P2PネットワークにおけるユーザQoSを考慮した検索手法に関する研究

    Grant number:17700058  2005 - 2007

    日本学術振興会  科学研究費助成事業  若手研究(B)

    笹部 昌弘

      More details

    Grant amount:\3700000 ( Direct Cost: \3700000 )

    本年度は大きく分けて2つの研究成果を得た.
    1つ目は,協力的なキャッシングによる,低遅延かつファイル可用性の高いファイル共有システムの実現である.ファイル共有システムを構成するノードはユーザ端末であり,それぞれが利己的に振る舞うと,十分にファイルがキャッシュされず,特に人気の低いファイルがシステムから消失するなどの問題が発生する可能性がある.昨年度の成果により,キャッシングに対するコストと需要のモデルによっては,ノードが利己的に振る舞ったとしてもファイル可用性の高い,低遅延なファイル共有システムが実現可能であることを示した.本年度は,さらにユーザごとのファイルのキャッシングに対する協力性が異なる,すなわちユーザが多様である状況に着目し,適切なキャッシングの実現可能性について検討した.現実的な環境では,非協力的なユーザが多数,協力的なユーザが少数を占めると考えられるため,ユーザの多様性をZipf則でモデル化した.個々の振る舞いがシステム全体としての特性に与える影響を明らかにすることのできる進化ゲーム理論を用いることで,ユーザの多様性が大きいほどファイル可用性は低下するものの,ある一定の値に収束し,またシステム全体としては安定することを示した.
    2つ目は,モバイル環境下でのP2Pファイル共有システムにおける検索効率の向上手法の提案である.災害発生時,イベント会場での催事などインフラが使用できない状況では,端末間で一時的に構築した無線ネットワーク上でファイルや情報を発見するための仕組みが必要となる.本研究では,分散ハッシュテーブル(DHT)とファイルの複製技術を組み合わせた手法を用いることで,ノードの移動による高変動な環境下においても高いファイル検索成功率を実現できることを示した.

    researchmap

  • P2P型通信アーキテクチャにもとづく動画像配信システムに関する研究

    Grant number:03J50671  2003 - 2004

    日本学術振興会  科学研究費助成事業  特別研究員奨励費

    笹部 昌弘

      More details

    Grant amount:\1700000 ( Direct Cost: \1700000 )

    昨年度は,ピアの移動・消失およびネットワークの輻輳といったシステム変動が発生しない理想的な環境における提案手法の基本特性を明らかにした.しかしながら,実際のネットワークにおいてはそうしたシステム変動による影響を考慮する必要があるため,本年度はシステム変動が発生する環境下においても途切れない動画像再生を実現するために,昨年度における提案手法(従来手法)を改良・拡張した.
    1.ピアの移動・消失およびネットワークの輻輳を考慮した適切な取得先ピアの選択・切替手法
    ピアの移動・消失およびネットワークの輻輳はいずれの場合においても動画像転送に利用可能な帯域および遅延の変化としてみなすことができる.こうしたシステム変動による帯域の低下や遅延の増大は動画像再生中の途切れにつながるため,観測・計測された利用可能な帯域および遅延をもとに動的に適切な取得先ピアを決定,切り替えるための仕組みが必要となる.本研究では,取得先の切替が必要であると判断する基準を明らかにするとともに,切替が必要と判断された場合の適切な切替先の決定手法について提案した.
    2.ピアの移動・消失による,動画像データ検索時の発見確率の低下を抑えるための手法
    従来手法では,過去の検索履歴をもとに検索対象となるピアを決定していた.このことにより,システム内のピア数が増大しても検索対象となるピア数の増加を抑えることができ,その結果ネットワーク内を流れる検索トラヒック量を低く抑えることが可能となった.しかしながら,ピアの移動・消失が発生すると,過去の検索履歴の信頼度が低下してしまう.この問題に対して,本研究では検索対象となるピアを絞り込むための判断基準の改良を行った.ピアの移動・消失を予測することは難しいため,それらが発生した場合においても出来る限り検索が成功するようにする必要がある.本研究では,所望のデータに対して過去の検索履歴に複数の所有者が存在する場合には検索対象となるピアをそれらに限定し,そうでなければ検索対象を広げるという手法を提案した.
    上記の提案手法を計算機によるシミュレーションを通して評価し,動画像再生の連続性の観点から,改良手法が従来手法に比べて有効であることを示した.さらに,ネットワーク内のキャッシュ容量とメディアの種類の関係について,改良手法の適用領域も明らかにした.

    researchmap

▼display all