The search functionality is under construction.

Author Search Result

[Author] Yutaka MATSUSHITA(4hit)

1-4hit
  • TINA-Based Scalable Model for Personal Mobility Service

    Yuzo KOGA  Hiroshi SHIGENO  Choong SEON HONG  Yutaka MATSUSHITA  

     
    PAPER

      Vol:
    E83-A No:7
      Page(s):
    1308-1317

    In order to realize universal service access of mobile users on the global telecommunication environment, we have to consider the scalable networking architecute based on the distributed object computing technologies. In this paper, we apply TINA to the promising networking architecture, and propose TINA-based scalable model for realizing personal mobility service, which especially focuses on making access to telecommunication services from any legacy systems that do not support such the new environment, using a downloadable module in an end terminal, as well as considering load balance of a whole system. Our proposed model also focuses on exchanging personal infomation of mobile users between different administrative domains, by separating the already-specified user profile information objects into two parts, which are the domain-common part and domain-specific part, and propose secure exchange procedure.

  • A Video Copyright Protection System Based on ContentID

    Jiying ZHAO  Rina HAYASAKA  Ryoji MURANOI  Masahito ITO  Yutaka MATSUSHITA  

     
    PAPER-Image Processing, Image Pattern Recognition

      Vol:
    E83-D No:12
      Page(s):
    2131-2141

    In this paper, we define content-identifier (ContentID) to represent the characteristics of shot. The ContentID carries both positional and temporal color information. Based on the concept of ContentID, we propose a video retrieval method. The method is robust to compression, format conversion, frame dropping and noise such as watermark and so on. Furthermore, based on our retrieval method, we implemented a copyright protection system for digital video using spread-spectrum based watermarking technique.

  • An Interworking Architecture between TINA-Like Model and Internet for Mobility Services

    Yuzo KOGA  Choong Seon HONG  Yutaka MATSUSHITA  

     
    PAPER-System architecture

      Vol:
    E80-B No:10
      Page(s):
    1393-1400

    In this paper, we propose a scalable service networking architecture as a TINA-like environment for providing flexibly various mobility services. The proposed architecture provides an environment that enables the advent of service providers and rapidly introduces multimedia applications, considering networks scalability. For supporting customized mobility services, this architecture adopts a new service component, which we call Omnipresent Personal Environment Manager (OpeMgr). In order to support mobile users who move between heterogeneous networks, for instance, between the TINA-like environment and the Internet environment, we propose a structure of a gateway. In addition, the proposed architecture uses the fixed and mobile agent approaches for supporting the user's mobility, and we evaluated their performances with comparing those approaches.

  • Active Countermeasure Platform against DDoS Attacks

    Dai KASHIWA  Eric Y. CHEN  Hitoshi FUJI  Shuichi MACHIDA  Hiroshi SHIGENO  Ken-ichi OKADA  Yutaka MATSUSHITA  

     
    PAPER-Applications of Information Security Techniques

      Vol:
    E85-D No:12
      Page(s):
    1918-1928

    Distributed Denial of Service (DDoS) attacks are a pressing problem on the Internet as demonstrated by recent attacks on major e-commerce servers and ISPs. Since the attack is highly distributed, an effective solution must be formulated with a distributed approach. Recently, some solutions, in which intermediate network nodes filter or shape congested traffic, have been proposed. These solutions may decrease the congested traffic, but they still cause "collateral victims problem," that is, legitimate packets may be discarded mistakenly. In this paper, we propose Active Countermeasure Platform to minimize traffic congestion and to address the collateral victim problem using the Active Networks paradigm, which incorporates programmability into intermediate network nodes. Our platform can prevent overloading of the target and consuming the network bandwidth of both the backbone and the protected site autonomously. In addition, it can improve the collateral victim problem based on user policy. This paper shows the concept of our platform, system design and evaluation of the effectiveness using a prototype.