53 research outputs found
コンピューター ユーティリティ ニ オケル アドレス スペース ノ コウセイ ニ カンスル ケンキュウ
京都大学0048新制・論文博士工学博士乙第3497号論工博第1032号新制||工||391(附属図書館)UT51-52-N138(主査)教授 清野 武, 教授 萩原 宏, 教授 大野 豊学位規則第5条第2項該当Kyoto UniversityDFA
Task Modeling by the Keywords Extracted from Manual Pages
A task modeling method using keywords related to the functions of commands for intelligent user interfaces is proposed. A task model is a description of functions and operations of the computer. The task model is described as the name of a task in our method. We define the name of a task as the minimal set of common keywords which definitely distinguish the task. For the name of a task, keywords indicating the concepts of each command are needed. Since the order of the number of the keywords is that of the number of the commands, it is much easier to implement this method than a procedural knowledge based one. We also propose a method to extract the keywords automatically from the manual pages, the on-line reference manuals for UNIX. Since almost every command is associated with manual pages, the task names can be easily updated when a new command is added to the system. To show the effectiveness of the task names and the keywords extracted from the manual pages, we direct our attention to users' command histories. We show the effectiveness of these keywords by showing the relationship between the tasks in the history and the task names through statistical analysis
Study on the Throughput Limits over the HDLC Protocol
This paper describes the throughput evaluation of the high level data link control protocol. The analytical models are outlined and the throughput analysis is carried out under fully loaded condition for the following three error recovery schemes: (1)Checkpoint retransmission scheme, (2)SREJ recovery scheme and (3)REJ recovery scheme. We derive the optimal packet text length which achieves the maximum throughput for each error recovery scheme. Also we denote the optimal window size for the checkpoint retransmission scheme
A long-forgotten ‘dinosaur’ bone from a museum cabinet, uncovered to be a Japan\u27s iconic extinct mammal, Paleoparadoxia (Desmostylia, Mammalia)
Here, we report a new ‘discovery’ of a desmostylian fossil in the geological collection at a national university in Japan. This fossil was unearthed over 60 years ago and donated to the university. Owing to the original hand-written note kept with the fossil in combination with interview investigation, we were able to reach two equally possible fossil sites in the town of Tsuchiyu Onsen, Fukushima. Through the interviews, we learned that the fossil was discovered during construction of a debris flow barrier and that it was recognized as a ‘dinosaur’ bone among the locals and displayed in the Village Hall before/until the town experienced a fire disaster in 1954. As scientific findings, the fossil was identified to be a right femur of Paleoparadoxia (Desmostylia), which shows well-preserved muscle scars on the surface. The age was estimated to be 15.9 Ma or younger in zircon-dating. This study shows an excellent case that historical and scientific significances could be extracted from long-forgotten uncatalogued specimens as long as the original information is retained with the specimens
京都大学における遠隔講義システム
本稿では、平成10年2月に導入された京都大学の遠隔講義システムの目的・構成・運用計画について説明し、今後の研究計画について述べる。遠隔講義システムは、(1)京都大学内の13箇所のサテライト講義室にMPEG2エンコーダ/デコーダを設置しATMネットワークを利用して講義映像を伝送するシステムと、(2)ゼミ室レベルでも映像伝送ができるMotion-JPEGを用いた簡易遠隔講義・会議システムの2つのサブシステムから構成される。本稿ではこれらのシステムの概要を述べ、その比較を行う。また、今後の研究計画に関しては、音声による対話が可能な遠隔講義を補助する知的エージェントの開発、および講義の自動ハイパーメディア化について説明する。In this paper, we describe a distance learning system in Kyoto University. This distance learning system consits of two subsystems: (1) a distance lecture system composed of MPEG2 CODEC used in a large-scale ATM network, and (2) a distance meeting system composed of Motion-JPEG CODEC used with high-end PCs. We also explain several research plans for this distance learning system; i.e., (a) developing a support agent for this distance learning system using speech recognition technology, and (b) developing an auto archiver for lecture materials
Recommended from our members
Research and Design of a Routing Protocol in Large-Scale Wireless Sensor Networks
无线传感器网络,作为全球未来十大技术之一,集成了传感器技术、嵌入式计算技术、分布式信息处理和自组织网技术,可实时感知、采集、处理、传输网络分布区域内的各种信息数据,在军事国防、生物医疗、环境监测、抢险救灾、防恐反恐、危险区域远程控制等领域具有十分广阔的应用前景。 本文研究分析了无线传感器网络的已有路由协议,并针对大规模的无线传感器网络设计了一种树状路由协议,它根据节点地址信息来形成路由,从而简化了复杂繁冗的路由表查找和维护,节省了不必要的开销,提高了路由效率,实现了快速有效的数据传输。 为支持此路由协议本文提出了一种自适应动态地址分配算——ADAR(AdaptiveDynamicAddre...As one of the ten high technologies in the future, wireless sensor network, which is the integration of micro-sensors, embedded computing, modern network and Ad Hoc technologies, can apperceive, collect, process and transmit various information data within the region. It can be used in military defense, biomedical, environmental monitoring, disaster relief, counter-terrorism, remote control of haz...学位:工学硕士院系专业:信息科学与技术学院通信工程系_通信与信息系统学号:2332007115216
Unateness, Symmetry and Self-Duality of Boolean Functions Satisfying the Propagation Criterion
Nonlinearity is an important concept for the design of conventional cryptosystems. The propagation criterion(PC) is a nonlinearity criteria of Boolean functions. The aim of this paper is to investigate the relationships between the PC and each one of the unateness, the symmetry and the self-duality. The latter three properties are not desirable for the components of cryptosystems. First, relationships are presented between the unateness and the degree of the PC. It is shown that every Boolean function with four or more variables satisfying the PC of degree 1 is unate in at most two of its variables and that every Boolean function with four or more variables satisfying the PC of degree 2 is not unate in any one of its variables. These results show the incompatibility of the PC and the unateness. Second, relationships between the PC and the symmetry are investigated. It is shown that there exist symmetric functions satisfying the PC of maximum degree. Finally, compatibility of the PC and..
- …