Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Masahiro Hiji"'
Publikováno v:
Computers, Vol 12, Iss 2, p 27 (2023)
With the proliferation of IoT sensors and devices, storing collected data in the cloud has become common. A wide variety of data with different purposes and forms are not directly stored in the cloud but are sent to the cloud via edge servers. At the
Externí odkaz:
https://doaj.org/article/b3efa21fd28d41bfa0180e397c6edfd3
Publikováno v:
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).
Publikováno v:
Gaming, Simulation and Innovations: Challenges and Opportunities ISBN: 9783031099588
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::186fff2479ff77063472813bcccc8ae8
https://doi.org/10.1007/978-3-031-09959-5_20
https://doi.org/10.1007/978-3-031-09959-5_20
Autor:
Tokuyasu Kakuta, Masahiro Hiji, Kenji Sugawara, Yotaro Miyanishi, Thierry Gidel, Yutaro Taki, Claude Moulin, Shgieru Fujita, Norio Shiratori
Publikováno v:
CSCWD
This paper presents the concept of Digital Ji-in, a framework for managing permanent digital identiers whose structure is based on a peer to peer network. The origin of the term Digital-Ji-in is explained in the paper. We describe several types of id
Publikováno v:
Translational Systems Sciences ISBN: 9789811620102
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6504f52868d59a2b14b6e73f487fade5
https://doi.org/10.1007/978-981-16-2011-9_12
https://doi.org/10.1007/978-981-16-2011-9_12
Autor:
Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto
Publikováno v:
Cryptology and Network Security ISBN: 9783030925475
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3f2533b8fbc0f2ef913113d043d0ad7a
https://doi.org/10.1007/978-3-030-92548-2_16
https://doi.org/10.1007/978-3-030-92548-2_16
Autor:
Yuichi Hashi, Kazuhiko Kikuchi, Norio Shiratori, Yotaro Miyanishi, Shigeru Fujita, Masahiro Hiji
Publikováno v:
CANDAR (Workshops)
Various research and development efforts have been made to implement cyber-physical systems, aiming to maintain the associations between digital and physical identities (such as sensors, events, or people). In this study, we consider a scenario with
Publikováno v:
Computational Science and Its Applications – ICCSA 2020 ISBN: 9783030588106
ICCSA (4)
ICCSA (4)
In the current cloud, VM migration that moves VMs between physical host machines is indispensable. For cloud providers, before shutting down the physical host machines for maintenance, migration is used to temporarily save VMs to other physical host
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::06bcf07ca5d2d648b36b5399e0dafdc3
https://doi.org/10.1007/978-3-030-58811-3_16
https://doi.org/10.1007/978-3-030-58811-3_16
Autor:
Toshihiro Uchibayashi, Masahiro Hiji, Shoichiro Sasaki, Takuo Suganuma, Seira Hidano, Shintaro Narisada, Shinsaku Kiyomoto
Publikováno v:
Cryptology and Network Security ISBN: 9783030654108
CANS
CANS
Attacks on machine learning systems such as malware detectors and recommendation systems are becoming a major threat. Data poisoning attacks are the primary method used; they inject a small amount of poisoning points into a training set of the machin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::32d57b18d251c5510b3accde5f6d64f9
https://doi.org/10.1007/978-3-030-65411-5_4
https://doi.org/10.1007/978-3-030-65411-5_4
Publikováno v:
DASC/PiCom/DataCom/CyberSciTech
In recent years, the use of the cloud has become one of the essential elements when constructing a system for deploying web services. By combining serverless cloud services, various web services can be performed without building servers. However, ser