The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Akira NAMATAME(2hit)

1-2hit
  • Asymmetric Coordination of Heterogeneous Agents

    Saori IWANAGA  Akira NAMATAME  

     
    PAPER

      Vol:
    E84-D No:8
      Page(s):
    937-944

    Large-scale effects of locally interacting agents are called emergent properties of the system. Emergent properties are often surprising because they can be hard to anticipate the full consequences of even simple forms of interaction. In this paper we address the following questions: how do heterogeneous agents generate emergent coordination, and how do they manage and self-organize macroscopic orders from bottom up without any central authority? These questions will depend crucially on how they interact and adapt their behavior. Agents myopically evolve their behavior based on the threshold rules, which are obtained as the functions of the collective behavior and their idiosyncratic utilities. We obtain the micro-macro dynamics that relate the aggregate behavior with the underlying individual behavior. We show agents' rational behavior combined with the behavior of others produce stable macro behavior, and sometimes unanticipated cyclic behavior. We also consider the roles of conformists and nonconformists to manage emergent macro behavior. As a specific example, we address an emergent and evolutionary approach for designing the efficient network routings.

  • On the Effectiveness of Rate-Limiting Methods to Mitigate Distributed DoS (DDoS) Attacks

    Takanori KOMATSU  Akira NAMATAME  

     
    PAPER

      Vol:
    E90-B No:10
      Page(s):
    2665-2672

    It has been widely observed that high-bandwidth traffic aggregates often occur by flooding-based distributed denial-of-service (DDoS) attacks. Several congestion control methods have been proposed for bandwidth controls. These methods are also considered to be important in order to avoid collapse of network services by DDoS attacks. We perform simulation studies of these well-known crowd management methods in order to minimize the damage caused by DDoS attacks with bandwidth control. Internet topologies have many facets in terms of the focus of the observation. Therefore, we need to conduct simulation of DDoS attacks in different Internet topologies, including the tiers model, the transit-stub model, and the Barabasi-Albert model. Using RED, CHOKe, and pushback with ACC as congestion control methods, we evaluate network resistance against DDoS attacks and similar overflow problems.