Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NLP |
2021-12-17 11:15 |
Oita |
J:COM Horuto Hall OITA |
Investigation on Distance Between Probability Distributions in Trust Region Policy Optimization Kenta Sugaya, Hidehiro Nakano (Tokyo City Univ.) NLP2021-46 |
In this paper, we propose a method to change Kullback-Leibler Divergence to Jensen-Shannon Divergence that used in Trust... [more] |
NLP2021-46 pp.18-21 |
R |
2021-07-17 13:25 |
Online |
Virtual |
Numerical Analysis for Inspection Policies which Minimize the Expected Cost Rate Satoshi Mizutani, Toshio Nakagawa (AIT) R2021-17 |
We consider some modified sequential inspection policies which minimize the expected cost rates
and show its numerical ... [more] |
R2021-17 pp.7-11 |
R |
2021-05-28 15:00 |
Online |
Online |
Numerical Comparison and Consideration for Redundant System using Extended Age Replacement Policy Satoshi Mizutani, Toshio Nakagawa (AIT) R2021-6 |
This chapter considers optimal replacement policies with random times to replace redundant systems. Especially, it is as... [more] |
R2021-6 pp.30-34 |
NC, MBE (Joint) |
2021-03-04 16:50 |
Online |
Online |
A3C with Deterministic Policy Gradient Yu Takahagi, Yukari Yamauchi (Nihon Univ.) NC2020-63 |
Mnih et al. proposed a learning method called Asynchronous Advantage Actor-Critic (A3C). This method explores asynchrono... [more] |
NC2020-63 pp.117-120 |
SITE, IA, IPSJ-IOT [detail] |
2021-03-02 13:55 |
Online |
Online |
Mutual Secrecy of Attributes and Authorization Policies in Identity Federation Satsuki Nishioka, Yasuo Okabe (Kyoto Univ.) SITE2020-53 IA2020-49 |
In modern Web services, authentication federation that separates the Identity Provider (IdP), which centrally manages au... [more] |
SITE2020-53 IA2020-49 pp.93-100 |
IT |
2020-12-02 10:00 |
Online |
Online |
Policy Optimization Based on Bayesian Decision Theory in Learning Period on Markov Decision Process Naoki Ichijo, Yuta Nakahara, Yuto Motomura, Toshiyasu Matsushima (Waseda Univ.) IT2020-31 |
In Markov decision process(MDP) problems with an unknown transition probability, a learning agent has to learn the unkno... [more] |
IT2020-31 pp.38-43 |
PN |
2020-08-25 10:50 |
Online |
Online |
Policy Gradient-based Deep Reinforcement Learning for Deadline-aware Data Transfer over Wide Area Networks Masaki Notoya, Kohei Shiomoto (Tokyo City Univ.), Takashi Kurimoto (NII) PN2020-21 |
Deadline-aware job scheduling problems have been attracting attention in the application domains of scientific workflows... [more] |
PN2020-21 pp.49-56 |
NS, IN (Joint) |
2020-03-06 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
IOTA-Based Access Control Framework for the Internet of Things Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2019-230 |
With the rapid dissemination of the Internet of Things (IoT), the number of resources deployed in IoT systems such as d... [more] |
NS2019-230 pp.295-300 |
PN |
2020-03-03 09:00 |
Kagoshima |
(Cancelled but technical report was issued) |
Research of Scheduling Method Considering Traffic-Characteristics for Data Center Wide Area Network(DC-WAN) Takashi Arakawa, Kohei Shiomoto (TCU), Takashi Kurimoto (NII) PN2019-61 |
Recent years, the demand for efficient use of Data-Center Wide Area Network (DC-WAN) is increasing.
Since delay affects... [more] |
PN2019-61 pp.51-58 |
ICSS, IPSJ-SPT |
2020-03-03 11:20 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications Motoi Hayashi, Atsuko Miyaji (Osaka Univ.) ICSS2019-103 |
In recent years, online shopping is getting more and more popular and has been used by many users all over the world. On... [more] |
ICSS2019-103 pp.301-306 |
R |
2019-11-28 15:35 |
Osaka |
Central Electric Club |
A Note on Optimal Rejuvenation Policies for Non-Markovian Availability Models with Aperiodic Checkpointing Junjun Zheng (Ritsumeikan Univ.), Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2019-47 |
In this paper, we present non-Markovian availability models for capturing the dynamics of system behavior of an operatio... [more] |
R2019-47 pp.23-28 |
MVE |
2019-08-30 09:50 |
Aichi |
|
A thought of idea-method using "Fuben_eki" for planning measures by cooperations. Yasuo Nosaka (HAKUHODO), Hiroshi Kawakami (Kyoto Univ.), Masamitsu Momose (HAKUHODO), Takashi Akiyama (UP), Makiko Okita (Tamagawa Univ.) MVE2019-16 |
We review the methodology for applying the " Fuben-eki" (i.e., the viewpoint of aiming for a system design that provides... [more] |
MVE2019-16 pp.61-66 |
CS |
2019-07-05 11:50 |
Kagoshima |
Amami City Social Welfare Center |
Reflecting user location to caching based on network delay in NDN Naoki Yamaguchi (Waseda Univ.) CS2019-45 |
At the time of design of the Internet, the content request that currentry occupies most of the traffic was not assumed.I... [more] |
CS2019-45 pp.147-152 |
RCS |
2019-06-19 14:55 |
Okinawa |
Miyakojima Hirara Port Terminal Building |
Policy Gradient Reinforcement Learning for Reducing Transmission Delay in EDCA Masao Shinzaki, Yusuke Koda, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura (Kyoto Univ.) RCS2019-52 |
This paper proposes a packet mapping algorithm among Access Categories (ACs) in Enhanced Distributed Channel Access (EDC... [more] |
RCS2019-52 pp.91-96 |
R |
2019-05-24 14:30 |
Aichi |
Aichi Institute of Technology, Motoyama Campus |
Optimal Maintenance Policy of Social Infrastructures considering Maintenance Delay Kodo Ito, Takumi Kishida (Tottori Univ.), Toshio Nakagawa (Aichi Institute of Technology) R2019-4 |
Today, the maintenance of various kinds of infrastructures are important and difficult issue because the national budget... [more] |
R2019-4 pp.17-22 |
IBISML |
2019-03-05 14:30 |
Tokyo |
RIKEN AIP |
Efficient Exploration by Variational Information Maximizing Exploration on Reinforcement Learning Kazuki Doi, Keigo Okawa (Gifu Univ.), Motoki Shiga (Gifu Univ./JST/RIKEN) IBISML2018-107 |
In reinforcement learning,the policy function may not be optimized properly if the observed state space is limited to lo... [more] |
IBISML2018-107 pp.17-22 |
IN, NS (Joint) |
2019-03-05 14:30 |
Okinawa |
Okinawa Convention Center |
A Study on Virtual Resource Allocation method System considering CPU pinning policies Makoto Hamada (NTT) NS2018-267 |
In the allocation of CPU resources of the virtual machine, it is possible to allocate only the processes that want to gu... [more] |
NS2018-267 pp.433-436 |
IN, NS (Joint) |
2019-03-05 15:40 |
Okinawa |
Okinawa Convention Center |
Optimal policy rule application method for each IoT device Kaori Kurita, Hiroki Iwahashi, Hidetaka Nishihara, Kazuhiro Matsuo (NTT) NS2018-292 |
In recent years, due to diversification of IoT devices connected to the Internet, control of flexible communication serv... [more] |
NS2018-292 pp.569-574 |
AI |
2019-02-22 11:10 |
Tokyo |
|
Open standard and opened standardization process Yoshiaki Fukami (Rikkyo Univ.) AI2018-39 |
Standard specifications that realize mutual availability in data distribution are indispensable for cooperation between ... [more] |
AI2018-39 pp.11-15 |
NS |
2019-01-17 14:50 |
Nagasaki |
Nagasaki Prefectural Art Museum |
A Study on Cache Decision Policy using User Tastes Tsukasa Kitamura (Kansai Univ.), Noriaki Kamiyama (Fukuoka Univ.), Miki Yamamoto (Kansai Univ.) NS2018-180 |
Today, the majority of internet traffic is video traffic such as YouTube and NetFlix. Placing copy of original video con... [more] |
NS2018-180 pp.13-18 |