thu. june fri. june · 2017. 4. 26. · inter-university research corporation / research...

32
National Institute of Informatics OPEN HOUSE 2012 2012Thu. 7 13 : 0 020:00 Fri. 8 10:30 17:00 National Center for Sciences Supported by:Chiyoda-City Co-organized by:National Archives of Japan, Tokyo Association of Dealers in Old Books Place Time Admission free 2 -1- 2 Hitotsubashi, Chiyoda-ku, Tokyo Hitotsubashi Hall 2F) Opening Opening Address Report on the activity of NII Director General at NII Masao SAKAUCHI 13 : 00~13 : 30 Keynote Lecture From Augmented Reality to Augmented Human: Human Evolution and Information technology Professor at Interfaculty Initiative in Information Studies, The University of Tokyo, Deputy Director of Sony Computer Science Laboratories Jun REKIMOTO The way we see the world Associate Professor at NII Imari SATOH The advanced research on network infrastructure and society SINET broadening the network of scientists Professor at NII Shigeo URUSHIDANI Work in the Future Managing Director Enterprise Google Shinichi ABE Understanding Language ― Why Difficult for Computers? Associate Professor at NII Yusuke MIYAO Origins of language and emotion Professor at The University of Tokyo, Direction at JST-ERATO, Team Leader, RIKEN-BSI Kazuo OKANOYA 13:30~14:30 Keynote Lecture 16:00~17:00 Public Lecture 18:30~20:00 Conference Room / 2nd Floor Hall 2F) Demo&Experience corner / Poster Exhibitions 14:00~18:30 Intercommunication Time 17:00~18:30 Hitotsubashi Hall 2F) Invited Lecture 11:00~12:00 Keynote Lecture 13:30~14:30 Keynote Lecture 15:00~16:00 Conference Room / 2nd Floor Hall 2F) Demo&Experience corner / Poster Exhibitions 10:30~17:00 Special Conference Room 1F) Security of smartphone used in universities 14:40~15:50 Briefing session about entrance examination of graduate school 17:00~19:00 7 Thu. June 8 Fri. June From Thu. June 7 to Fri . June 8 , 2012

Upload: others

Post on 01-Jan-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

人と社会

をつなぐ情報学

Na

t i on

al I n

s t i t ut e

of I n

f orm

at i c s O

PE

N H

OU

SE

20

12

国立情報学研究所

オープンハウス2012

研究成果発表・一般公開

Thu. 7 13:00~20:00Fr i . 8 10:30~17:00

National Center forSciences

Supported by:Chiyoda-CityCo-organized by:National Archives of Japan,         Tokyo Association of Dealers in Old Books

Place

Time

Inter-University Research Corporation / Research Organization of Information and Systems

National Institute of Informatics

Admission free

2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430  TEL:+81-3 -4212-2131 FAX :+81-3 -4212-2150

2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo

[email protected]

■ Hitotsubashi Hall(2F)

Opening Opening Address ・ Report on the activity of NIIDirector General at NII Masao SAKAUCHI

13:00~13:30

13:00

14:00

15:00

16:00

17:00

18:00

19:00

20:00

13:00~ Opening Opening Address ・ Report on the activity of NII

KeynoteLecture

From Augmented Reality to Augmented Human: Human Evolution and Information technologyProfessor at Interfaculty Initiative in Information Studies, The University of Tokyo, Deputy Director of Sony Computer Science Laboratories Jun REKIMOTO

The way we see the worldAssociate Professor at NII  Imari SATOH

The advanced research on network infrastructure and society~SINET broadening the network of scientists~Professor at NII  Shigeo URUSHIDANI

Work in the FutureManaging Director Enterprise Google  Shinichi ABE

Understanding Language ― Why Difficult for Computers?Associate Professor at NII  Yusuke MIYAO

Origins of language and emotionProfessor at The University of Tokyo, Direction at JST-ERATO,Team Leader, RIKEN-BSI Kazuo OKANOYA

13:30~14:30

KeynoteLecture

16:00~17:00

PublicLecture

18:30~20:00

■ Conference Room / 2nd Floor Hall(2F)Demo&Experience corner /Poster Exhibitions

14:00~18:30

Intercommunication Time17:00~18:30

■ Hitotsubashi Hall(2F)

InvitedLecture

11:00~12:00

KeynoteLecture

13:30~14:30

KeynoteLecture

15:00~16:00

■ Conference Room / 2nd Floor Hall(2F)

Demo&Experience corner / Poster Exhibitions10:30~17:00

■ Special Conference Room(1F)Security of smartphone used in universities

14:40~15:50

Briefing session about entrance examination of graduate school

17:00~19:00

7Thu.June

7Thu.June

8Fri.June

8Fri.June

Contact e-mail

The program according to the hall

Hitotsubashi Hall Conference Room 2nd Floor Hall Special ConferenceRoom Small conference room

Director General at NII Masao SAKAUCHI

14:00~18:30Demo&Experience corner /Poster Exhibitions

14:40~15:50Security of smartphone used in universities

17:00~19:00Briefing session about entrance examination of graduate school

17:00~18:30Intercommunication Time

13:30~14:30 Keynote LectureFrom Augmented Reality to Augmented Human: Human Evolution and Information technologyProfessor at Interfaculty Initiative in Information Studies, The University of Tokyo, Deputy Director of Sony Computer Science Laboratories Jun REKIMOTO

16:00~17:00 Keynote LectureThe way we see the worldAssociate Professor at NII Imari SATOH

15:00~15:20 Yusheng JI

Presentation

Presentation

15:20~15:40 Nobuhiro FURUYAMA

18:30~20:00 Public LectureThe advanced research on network infrastructure and society~SINET broadening the network of scientists~Professor at NII Shigeo URUSHIDANI

10:00

11:00

12:00

13:00

14:00

15:00

16:00

17:00

11:00~12:00 Invited Lecture

Hitotsubashi Hall Conference Room 2nd Floor Hall Special ConferenceRoom Small conference room

Work in the FutureManaging Director Enterprise Google Shinichi ABE

13:30~14:30 Keynote LectureUnderstanding Language ― Why Difficult for Computers?Associate Professor at NII Yusuke MIYAO

15:00~16:00 Keynote LectureOrigins of language and emotionProfessor at The University of Tokyo, Direction at JST-ERATO, Team Leader, RIKEN-BSI Kazuo OKANOYA

10:30~17:00Demo&Experience corner /Poster Exhibitions

12:30~12:50 Kenro AIHARA

12:50~13:10 Ken SATOH

From

Thu. June7to

Fri. June8,2012

Page 2: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

32 O P E N H O U S E 2 012O P E N H O U S E 2 012

National Institute of Informatics

OPEN HOUSE 2012 F loor guide map

Principles of Informatics Presenting researches to discover new principles,theories and methods in informatics.

Information Systems Architecture Dealing with the research issues in software / hardware architectures for human life.

Digital Content and Media Sciences Conducting researches on various types of media, such as text and video in terms ofanalysis, creation, compilation and application which makes our life better.

Information and Society Bringing on researches of connection between social life and digital information.

Others Special Exhibition

Graduate University for Advanced Studies Development and OperationDemo/Experience corner

1F

WC(WOMEN)

WC(MEN)

1F

HitotsubashiHall

Conference Room〈Poster Exhibition〉

2nd Floor Hall

Smallconference

room

Lecture reception

Entrance

Smokingroom

Elevatorhall

Restcorner

Entrance

Porch

2F

Special Conference

Room

Reception Desk

904

Restroom

701 702 703 704 705

Presentations

1F

2F103

104

105

106

110

111 113 802 801 606 605 604 603 602 601 901112

410 411 412 413 414 415 416 417 418 419 420 421 422

423501 502 503 504 505 506 507 508 424

201 202 203 204 205 206 207 208 209 210101102

211

212

213

214

215

216

217

903 902

402 401 301 302 303 304 305 306 307 308 309 310 311 312

317 315316 314 313403 404 405 406 407 408 409 318Waterserver

Waterserver

Waterserver

Elevatorhall

Smokingroom

WC(MEN)

WC(WOMEN)

WC(WOMEN)

WC(MEN)

Page 3: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

32 O P E N H O U S E 2 012O P E N H O U S E 2 012

National Institute of Informatics

OPEN HOUSE 2012 F loor guide map

Principles of Informatics Presenting researches to discover new principles,theories and methods in informatics.

Information Systems Architecture Dealing with the research issues in software / hardware architectures for human life.

Digital Content and Media Sciences Conducting researches on various types of media, such as text and video in terms ofanalysis, creation, compilation and application which makes our life better.

Information and Society Bringing on researches of connection between social life and digital information.

Others Special Exhibition

Graduate University for Advanced Studies Development and OperationDemo/Experience corner

1F

WC(WOMEN)

WC(MEN)

1F

HitotsubashiHall

Conference Room〈Poster Exhibition〉

2nd Floor Hall

Smallconference

room

Lecture reception

Entrance

Smokingroom

Elevatorhall

Restcorner

Entrance

Porch

2F

Special Conference

Room

Reception Desk

904

Restroom

701 702 703 704 705

Presentations

1F

2F103

104

105

106

110

111 113 802 801 606 605 604 603 602 601 901112

410 411 412 413 414 415 416 417 418 419 420 421 422

423501 502 503 504 505 506 507 508 424

201 202 203 204 205 206 207 208 209 210101102

211

212

213

214

215

216

217

903 902

402 401 301 302 303 304 305 306 307 308 309 310 311 312

317 315316 314 313403 404 405 406 407 408 409 318Waterserver

Waterserver

Waterserver

Elevatorhall

Smokingroom

WC(MEN)

WC(WOMEN)

WC(WOMEN)

WC(MEN)

Page 4: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

54 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture/Session ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 8・9

Poster Exhibitions : Core time/ The hall map ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 14・15

Activity detection of passive entities from ambient FM-radio signals Yusheng JI ・・・・・・・ 10Perceptual and Dynamical coupling in Human-Human Coordination System Nobuhiro FURUYAMA ・・・・・ 10Behavior-based Recommender for Wanderers in Town Kenro AIHARA ・・・・・・・・・・・・・・・・・ 11PROLEG : Implementation of Ultimate Fact Theory in Civil Litigation by Logic Programming Ken SATOH ・・・・・ 11

101         LODAC : Building the Open Social Semantic Web Platform for Academic Resources Hideaki Takeda ・・・・ 12

102         SIGVerse:the SicioIntelligenesis simulator Tetsunari Inamura ・・・・・・・・・・・・・・・・・・・・ 12

103         edubase Cloud : An IT laboratory where you can test your ideas without restraint Shigetoshi Yokoyama ・・・ 12

104         Research on security technologies for overcoming analog-hole problem Isao Echizen ・・・・・・・ 12

105         CI-Communigram Andres Frederic ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 13

106~110         Cyber Social Simulation based on the 3D Internet Helmut Prendinger ・・・・・・・・ 13

111         Challenge to Bridging the Semantic Gap via Video Media Content Analysis Shin'ichi Satoh ・・・・・・ 13

112         Network Navigator Tetsuro Kobayashi , Tsutomu Suzuki ・・・・・・・・・・・・・・・・・・・・・・・・・ 13

113         The research and development of web-based cognitive diagnostic tests for children Yuan SUN ・・・・ 13

201 Making The Hitchhiker's Guide to the Galaxy of Chemical Reactions Hiroko Satoh ・・・・・・・・・・・・・・・・・・ 16

202 An Effective Queue Management Scheme for Opportunistic Networks Md. Enamul Haque ・・・・・・・・・・・ 16

203 Simple Parallel Algorithms for Tree Functions Kunihiko Sadakane ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 16

204 TLCA Open Problem 20 Makoto Tatsuta ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 16

205 WebELS:Cloud-Based General Purpose e-Communication Platform Haruki Ueno ・・・・・・・・・・・・・・・・・・・ 16

206 PROLEG : Implementation of Ultimate Fact Theory in Civil Litigation by Logic Programming Ken Satoh ・・・・・・・ 16

207 The Mathematics of Free Word Order Makoto Kanazawa ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 17

208 Properties and applications of polariton Bose-Einstein condensation Yoshihisa Yamamoto ・・・・・・・・・・・ 17

209 Future information society created by quantum information technologies Global Research Center for Quantum Information Center ・・・・ 17

210 Quantum computer implementations : from ion traps to Bose-Einstein condensates Tim Byrnes ・・・・・・・・・・ 17

211 Building a quantum internet: From small devices to large systems Kae Nemoto ・・・・・・・・・・・・・・・・・・・・・ 17

212 Integrating Various Information with Semantics Ryutaro Ichise ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 17

213 Blind source separation based on auxiliary function method Nobutaka Ono ・・・・・・・・・・・・・・・・・・・・・・・・ 18

Contents

301 GRACE Center : Center for Global Research in Advanced Software Science and Engineering Shinichi Honiden ・・・・・ 19302 TopSE : Intellectual Manufacturing Education Program based on Science Shinichi Honiden ・・・・・・・・・ 19303 cultivation of engineers who will create future e-Society Shigetoshi Yokoyama ・・・・・・・・・・・・・・・・・・・・・ 19304 Research on Development Methods for Secure Software Nobukazu Yoshioka ・・・・・・・・・・・・・・・・・・・・・・ 19305 Extracting Transition Models of Web Systems Using Static Analysis Techniques Shinichi Honiden ・・・・・・・ 19306 Formal Methods for Reliable and Efficient Software Development Shinichi Honiden ・・・・・・・・・・・・・・・・・・・・ 19307 Interconnection Techniques for ULP-HPC Michihiro Koibuchi ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 20308 An Internet router that receives, shares, and sends valuable information Michihiro Koibuchi ・・・・・・・・ 20309 Software Engineering – Scientific Approach to Complexity Shin Nakajima ・・・・・・・・・・・・・・・・・・・・・・・・・ 20310 Implementing automotive control systems based on dependable Network-on-Chip architecture Tomohiro Yoneda ・・・・・・ 20311 Bidirectionalization of Graph Transformation and its Application to Bidirectional Model Transformation Soichiro Hidaka ・・・・・ 20312 Research on Software Development based on Bidirectional Model Transformation Zhenjiang Hu ・・・・・ 20313 Screwdriver : A Parallelism-Oblivious MapReduce Programming Framework Zhenjiang Hu ・・・・・・・・・・ 21314 Automatic Parallelization of Graph Queries with MapReduce Zhenjiang Hu ・・・・・・・・・・・・・・・・・・・・・・・・・ 21315 Using ambient audio in secure mobile phone communication Stephan Sigg ・・・・・・・・・・・・・・・・・・・・・・・ 21316 Shared Multi Modal Sensor Network Kenji Tei ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 21317 Solutions to Environmental Problems By Computer Science Ichiro Satoh ・・・・・・・・・・・・・・・・・・・・・・・・・・ 21318 Data Structure for the Key-Value Store applied to SSD Shoichiro Asano ・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 21

401 Quality Analysis and Assurance in Combinations of Services and Clouds Fuyuki Ishikawa ・・・・・・・・・ 22402 A visualization method to assess the risk of websites Isao Echizen ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 22403 COMMUNIGRAM-NET Andres Frederic ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 22404 Light field processing and effective compression based on decomposition of blurs Kazuya Kodama ・・・・・・・ 22405 Building database of academic language for sign language Kouhei Kikuchi ・・・・・・・・・・・・・・・・・・・・・・・ 22406 Building Japanese Sign Language Corpus:An Approach to Changing Language Awareness Between Deaf and Hearing Mayumi Bono ・・・・ 22407 Analysis of the submission process to miniblog Keizo Oyama ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 23408 Analysis of user browsing behavior and application of mass knowledge based on social media data Hao Han ・・・・・・・・・ 23409 Connecting the world with immersive visual communication Gene Cheung ・・・・・・・・・・・・・・・・・・・・・・・・ 23410 Text analysis and reading assistance based on reader’s eye-movement information Akiko Aizawa ・・・・・・・・・・ 23411 Linking an abstract with paragraph in full-text, and extracting semantic relations between papers and

concepts for a deep understanding of academic papers Akiko Aizawa ・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 23412 Text processing and retrieval techniques to support information access to mathematical content Akiko Aizawa ・・・・ 23413 Digital Silk Road Project : Digital Archive of Cultural Heritage Asanobu Kitamoto ・・・・・・・・・・・・・・・・・・ 24414 Crisis Informatics Asanobu Kitamoto ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 24

Lecture/Session

Presentation

Demo/ Experience corner

Poster Exhibitions

214 Projectability of transition-relevance places based on prosodic features in spontaneous Japanese conversation Yuichi Ishimoto ・・・・ 18215 The travelling tournament problem – Applications to Japanese Professional Baseball Scheduling Ken-ichi Kawarabayashi ・・・・ 18216 Near real time public health protection with DIZIE and BioCaster Nigel Collier ・・・・・・・・・・・・・・・・・・・・・・ 18217 Hypothesizing by Meta-level Abduction and Constraint Solving by Efficient Reasoning Engines Katsumi Inoue ・・・・・ 18

Principles of Informatics

Principles of Informatics

Principles of Informatics

Principles of Informatics

Information Systems ArchitectureInformation Systems Architecture

Information Systems Architecture

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Information and Society

Information and Society

Information and Society

Page 5: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

54 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture/Session ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 8・9

Poster Exhibitions : Core time/ The hall map ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 14・15

Activity detection of passive entities from ambient FM-radio signals Yusheng JI ・・・・・・・ 10Perceptual and Dynamical coupling in Human-Human Coordination System Nobuhiro FURUYAMA ・・・・・ 10Behavior-based Recommender for Wanderers in Town Kenro AIHARA ・・・・・・・・・・・・・・・・・ 11PROLEG : Implementation of Ultimate Fact Theory in Civil Litigation by Logic Programming Ken SATOH ・・・・・ 11

101         LODAC : Building the Open Social Semantic Web Platform for Academic Resources Hideaki Takeda ・・・・ 12

102         SIGVerse:the SicioIntelligenesis simulator Tetsunari Inamura ・・・・・・・・・・・・・・・・・・・・ 12

103         edubase Cloud : An IT laboratory where you can test your ideas without restraint Shigetoshi Yokoyama ・・・ 12

104         Research on security technologies for overcoming analog-hole problem Isao Echizen ・・・・・・・ 12

105         CI-Communigram Andres Frederic ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 13

106~110         Cyber Social Simulation based on the 3D Internet Helmut Prendinger ・・・・・・・・ 13

111         Challenge to Bridging the Semantic Gap via Video Media Content Analysis Shin'ichi Satoh ・・・・・・ 13

112         Network Navigator Tetsuro Kobayashi , Tsutomu Suzuki ・・・・・・・・・・・・・・・・・・・・・・・・・ 13

113         The research and development of web-based cognitive diagnostic tests for children Yuan SUN ・・・・ 13

201 Making The Hitchhiker's Guide to the Galaxy of Chemical Reactions Hiroko Satoh ・・・・・・・・・・・・・・・・・・ 16

202 An Effective Queue Management Scheme for Opportunistic Networks Md. Enamul Haque ・・・・・・・・・・・ 16

203 Simple Parallel Algorithms for Tree Functions Kunihiko Sadakane ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 16

204 TLCA Open Problem 20 Makoto Tatsuta ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 16

205 WebELS:Cloud-Based General Purpose e-Communication Platform Haruki Ueno ・・・・・・・・・・・・・・・・・・・ 16

206 PROLEG : Implementation of Ultimate Fact Theory in Civil Litigation by Logic Programming Ken Satoh ・・・・・・・ 16

207 The Mathematics of Free Word Order Makoto Kanazawa ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 17

208 Properties and applications of polariton Bose-Einstein condensation Yoshihisa Yamamoto ・・・・・・・・・・・ 17

209 Future information society created by quantum information technologies Global Research Center for Quantum Information Center ・・・・ 17

210 Quantum computer implementations : from ion traps to Bose-Einstein condensates Tim Byrnes ・・・・・・・・・・ 17

211 Building a quantum internet: From small devices to large systems Kae Nemoto ・・・・・・・・・・・・・・・・・・・・・ 17

212 Integrating Various Information with Semantics Ryutaro Ichise ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 17

213 Blind source separation based on auxiliary function method Nobutaka Ono ・・・・・・・・・・・・・・・・・・・・・・・・ 18

Contents

301 GRACE Center : Center for Global Research in Advanced Software Science and Engineering Shinichi Honiden ・・・・・ 19302 TopSE : Intellectual Manufacturing Education Program based on Science Shinichi Honiden ・・・・・・・・・ 19303 cultivation of engineers who will create future e-Society Shigetoshi Yokoyama ・・・・・・・・・・・・・・・・・・・・・ 19304 Research on Development Methods for Secure Software Nobukazu Yoshioka ・・・・・・・・・・・・・・・・・・・・・・ 19305 Extracting Transition Models of Web Systems Using Static Analysis Techniques Shinichi Honiden ・・・・・・・ 19306 Formal Methods for Reliable and Efficient Software Development Shinichi Honiden ・・・・・・・・・・・・・・・・・・・・ 19307 Interconnection Techniques for ULP-HPC Michihiro Koibuchi ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 20308 An Internet router that receives, shares, and sends valuable information Michihiro Koibuchi ・・・・・・・・ 20309 Software Engineering – Scientific Approach to Complexity Shin Nakajima ・・・・・・・・・・・・・・・・・・・・・・・・・ 20310 Implementing automotive control systems based on dependable Network-on-Chip architecture Tomohiro Yoneda ・・・・・・ 20311 Bidirectionalization of Graph Transformation and its Application to Bidirectional Model Transformation Soichiro Hidaka ・・・・・ 20312 Research on Software Development based on Bidirectional Model Transformation Zhenjiang Hu ・・・・・ 20313 Screwdriver : A Parallelism-Oblivious MapReduce Programming Framework Zhenjiang Hu ・・・・・・・・・・ 21314 Automatic Parallelization of Graph Queries with MapReduce Zhenjiang Hu ・・・・・・・・・・・・・・・・・・・・・・・・・ 21315 Using ambient audio in secure mobile phone communication Stephan Sigg ・・・・・・・・・・・・・・・・・・・・・・・ 21316 Shared Multi Modal Sensor Network Kenji Tei ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 21317 Solutions to Environmental Problems By Computer Science Ichiro Satoh ・・・・・・・・・・・・・・・・・・・・・・・・・・ 21318 Data Structure for the Key-Value Store applied to SSD Shoichiro Asano ・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 21

401 Quality Analysis and Assurance in Combinations of Services and Clouds Fuyuki Ishikawa ・・・・・・・・・ 22402 A visualization method to assess the risk of websites Isao Echizen ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 22403 COMMUNIGRAM-NET Andres Frederic ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 22404 Light field processing and effective compression based on decomposition of blurs Kazuya Kodama ・・・・・・・ 22405 Building database of academic language for sign language Kouhei Kikuchi ・・・・・・・・・・・・・・・・・・・・・・・ 22406 Building Japanese Sign Language Corpus:An Approach to Changing Language Awareness Between Deaf and Hearing Mayumi Bono ・・・・ 22407 Analysis of the submission process to miniblog Keizo Oyama ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 23408 Analysis of user browsing behavior and application of mass knowledge based on social media data Hao Han ・・・・・・・・・ 23409 Connecting the world with immersive visual communication Gene Cheung ・・・・・・・・・・・・・・・・・・・・・・・・ 23410 Text analysis and reading assistance based on reader’s eye-movement information Akiko Aizawa ・・・・・・・・・・ 23411 Linking an abstract with paragraph in full-text, and extracting semantic relations between papers and

concepts for a deep understanding of academic papers Akiko Aizawa ・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 23412 Text processing and retrieval techniques to support information access to mathematical content Akiko Aizawa ・・・・ 23413 Digital Silk Road Project : Digital Archive of Cultural Heritage Asanobu Kitamoto ・・・・・・・・・・・・・・・・・・ 24414 Crisis Informatics Asanobu Kitamoto ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 24

Lecture/Session

Presentation

Demo/ Experience corner

Poster Exhibitions

214 Projectability of transition-relevance places based on prosodic features in spontaneous Japanese conversation Yuichi Ishimoto ・・・・ 18215 The travelling tournament problem – Applications to Japanese Professional Baseball Scheduling Ken-ichi Kawarabayashi ・・・・ 18216 Near real time public health protection with DIZIE and BioCaster Nigel Collier ・・・・・・・・・・・・・・・・・・・・・・ 18217 Hypothesizing by Meta-level Abduction and Constraint Solving by Efficient Reasoning Engines Katsumi Inoue ・・・・・ 18

Principles of Informatics

Principles of Informatics

Principles of Informatics

Principles of Informatics

Information Systems ArchitectureInformation Systems Architecture

Information Systems Architecture

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Information and Society

Information and Society

Information and Society

Page 6: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

76 O P E N H O U S E 2 012O P E N H O U S E 2 012

NII on Twitter. (^o^)/

Follow us to get more tweets on NII and Informatics!

NII-related Twitter accounts (^_-)~From research papers to typhoons, we are providing every piece of information you need to know about.~

501 A new horizon in informatics opened up by computers getting to the heart of human intelligence required in university entrance exams Noriko Arai ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 26

502 The Semantics of Fictional Descriptions Teruo Koyama ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 26503 Body-Environment System as a foundation of communication Nobuhiro Furuyama ・・・・・・・・・・・・・・・・・・・ 26504 Academic research in press reports Masaki Nishizawa ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 26505 International Standard of Japanese Romanization Akira Miyazawa ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 26506 NII Testbeds and Community for Information Access Technologies (NTCIR) Noriko Kando ・・・・・・・・・・・・ 26507 Towards Better Understanding and Support for the User's Exploratory Search Noriko Kando ・・・・・・・・・・ 27508 A research on interactive educational material for information security learning. Hitoshi Okada ・・・・・・・・ 27

601 Position estimation method for moving vehicles using RFIDs Togashi Hiroaki ・・・・・・・・・・・・・・・・・・・・・・・ 27602 Design and Evaluation of Tag Caching Routers Architecture ( TCR ) with Folksonomy-based Searches Hiroshi Kurose ・・・・・ 27603 How the social mobility affect the effectiveness of reputation? Takahisa Suzuki ・・・・・・・・・・・・・・・・・・・・・・ 27604 Factors Influencing Consumer Acceptance of Cross-Border Electronic Commerce Vanessa Rocio Bracamonte Lesma ・・・・ 28605 Multi-hop MAC protocols for Energy Harvesting Sensor Networks Kien Nguyen ・・・・・・・・・・・・・・・・・・・・・・ 28606 Eye-gaze pattern prediction for networked video streaming. Yunlong FENG ・・・・・・・・・・・・・・・・・・・・・・・・・ 28

701 Construction of the Next-Generation Academic Information Infrastructure Scholarly and Academic Information Div., NII ・・・・・ 28702 SINET4:Science Information NETwork 4 Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII ・・・・・ 28703 Development of nationwide collaboration environment by GakuNin

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII ・・・・・・・・・・・・・・・・・・・・・・・ 29704 Authentication System for Convenient, Reliable and Secure Access to Distributed Supercomputers (HPCI)

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII ・・・・・・・・・・・・・・・・・・・・・・・ 29705 CSI : Cyber Science Infrastructure Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII ・・・・ 29

801 Outline of Department of Informatics and entrance exam guide for 2012 fiscal year Research Promotion Division ・・・・・・・・ 29802 where We Create a Place to Promote Informatics NII Shonan Meeting ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 29

901 National Archives of Japan, Digital Archive :“Past is Prologue” National Archives of Japan ・・・・・・・・・・・・・ 30902 “Nihon-No-Furuhon-Ya ”( Old Japanese Book Shop System): search site for antipue books Tokyo Association of Dealers in Old Books ・・・ 30903 Research Organization of Information and Systems Research Organization of Information and Systems ・・・・・・・・・・ 30904 Study on future reading environment powered by association Research Center for Informatics of Association ・・・・・ 30

With putting hash tag #NIInow in your tweets, those tweets will automaticallybe projected on screen which will stand somewhere on the floor!

URL http://twitter.com/jouhoukenHash tag for our openhouse 2012 #NIInow

NII Shonan Meeting@shonanmtg

NTCIR@NTCIR

NII Scholarly and Academic Information Navigator "CiNii"@cinii_jp

Global Health Monitor "Biocaster"@biocaster

Webcat Plus@webcatplus

KAKEN Database of Grants-in-Aid for Scientific Research@kaken_nii

edubase Stream@edubasejp

Education Program for Top Software Engineers@TOP_SE

Open Cloud Architecture for Academia Forum@opencarf

Special Interest Group for SocioIntelliGenesis@SIGVerse

Futtekitter@futtekitter

Strong Winds Information@AMeDASWind

Heavy Rain Information@AMeDASRain

Typhoon Information@DigitalTyphoon

Next-Generation Academic Information Infrastructure@nii_content

Researchmap@researchmapbot

415~417 Multi-Step k-Nearest Neighbor Search Using Intrinsic Dimension Xiguo MA ・・・・・・・・・・・・・・・・・・・・ 24416 : Fast Similarities in Factorized Tensors Michael NETT417 : Rank-Based Similarity Search:Reducing the Dimensional Dependence Michael E. HOULE

418~419 Boosting the Efficiency of Target Face Recognition through Image Hybridization Michael E. HOULE ・・・・・・ 24419 : Knowledge Propagation in Large Image Databases Using Neighborhood Information Jichao SUN

420 The Illumination Model for Nearest Neighbor Classification Michael E. HOULE ・・・・・・・・・・・・・・・・・・・・・・・ 25421 Efficiently Finding Significant Coefficients in Factorized Tensors Michael NETT ・・・・・・・・・・・・・・・・・・・・・ 25422 Modeling Reality based on Fluorescent Components Imari Satoh ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 25423 Guiding visual attention using saliency-based image editing Akihiro Sugimoto ・・・・・・・・・・・・・・・・・・・・・・ 25424 Photometric metric under unknown lighting for range image registration Akihiro Sugimoto ・・・・・・・・・・・・ 25

Information and Society

Others

Special Exhibition

Graduate University for Advanced Studies

Development and Operation

Page 7: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

76 O P E N H O U S E 2 012O P E N H O U S E 2 012

NII on Twitter. (^o^)/

Follow us to get more tweets on NII and Informatics!

NII-related Twitter accounts (^_-)~From research papers to typhoons, we are providing every piece of information you need to know about.~

501 A new horizon in informatics opened up by computers getting to the heart of human intelligence required in university entrance exams Noriko Arai ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 26

502 The Semantics of Fictional Descriptions Teruo Koyama ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 26503 Body-Environment System as a foundation of communication Nobuhiro Furuyama ・・・・・・・・・・・・・・・・・・・ 26504 Academic research in press reports Masaki Nishizawa ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 26505 International Standard of Japanese Romanization Akira Miyazawa ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 26506 NII Testbeds and Community for Information Access Technologies (NTCIR) Noriko Kando ・・・・・・・・・・・・ 26507 Towards Better Understanding and Support for the User's Exploratory Search Noriko Kando ・・・・・・・・・・ 27508 A research on interactive educational material for information security learning. Hitoshi Okada ・・・・・・・・ 27

601 Position estimation method for moving vehicles using RFIDs Togashi Hiroaki ・・・・・・・・・・・・・・・・・・・・・・・ 27602 Design and Evaluation of Tag Caching Routers Architecture ( TCR ) with Folksonomy-based Searches Hiroshi Kurose ・・・・・ 27603 How the social mobility affect the effectiveness of reputation? Takahisa Suzuki ・・・・・・・・・・・・・・・・・・・・・・ 27604 Factors Influencing Consumer Acceptance of Cross-Border Electronic Commerce Vanessa Rocio Bracamonte Lesma ・・・・ 28605 Multi-hop MAC protocols for Energy Harvesting Sensor Networks Kien Nguyen ・・・・・・・・・・・・・・・・・・・・・・ 28606 Eye-gaze pattern prediction for networked video streaming. Yunlong FENG ・・・・・・・・・・・・・・・・・・・・・・・・・ 28

701 Construction of the Next-Generation Academic Information Infrastructure Scholarly and Academic Information Div., NII ・・・・・ 28702 SINET4:Science Information NETwork 4 Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII ・・・・・ 28703 Development of nationwide collaboration environment by GakuNin

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII ・・・・・・・・・・・・・・・・・・・・・・・ 29704 Authentication System for Convenient, Reliable and Secure Access to Distributed Supercomputers (HPCI)

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII ・・・・・・・・・・・・・・・・・・・・・・・ 29705 CSI : Cyber Science Infrastructure Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII ・・・・ 29

801 Outline of Department of Informatics and entrance exam guide for 2012 fiscal year Research Promotion Division ・・・・・・・・ 29802 where We Create a Place to Promote Informatics NII Shonan Meeting ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 29

901 National Archives of Japan, Digital Archive :“Past is Prologue” National Archives of Japan ・・・・・・・・・・・・・ 30902 “Nihon-No-Furuhon-Ya ”( Old Japanese Book Shop System): search site for antipue books Tokyo Association of Dealers in Old Books ・・・ 30903 Research Organization of Information and Systems Research Organization of Information and Systems ・・・・・・・・・・ 30904 Study on future reading environment powered by association Research Center for Informatics of Association ・・・・・ 30

With putting hash tag #NIInow in your tweets, those tweets will automaticallybe projected on screen which will stand somewhere on the floor!

URL http://twitter.com/jouhoukenHash tag for our openhouse 2012 #NIInow

NII Shonan Meeting@shonanmtg

NTCIR@NTCIR

NII Scholarly and Academic Information Navigator "CiNii"@cinii_jp

Global Health Monitor "Biocaster"@biocaster

Webcat Plus@webcatplus

KAKEN Database of Grants-in-Aid for Scientific Research@kaken_nii

edubase Stream@edubasejp

Education Program for Top Software Engineers@TOP_SE

Open Cloud Architecture for Academia Forum@opencarf

Special Interest Group for SocioIntelliGenesis@SIGVerse

Futtekitter@futtekitter

Strong Winds Information@AMeDASWind

Heavy Rain Information@AMeDASRain

Typhoon Information@DigitalTyphoon

Next-Generation Academic Information Infrastructure@nii_content

Researchmap@researchmapbot

415~417 Multi-Step k-Nearest Neighbor Search Using Intrinsic Dimension Xiguo MA ・・・・・・・・・・・・・・・・・・・・ 24416 : Fast Similarities in Factorized Tensors Michael NETT417 : Rank-Based Similarity Search:Reducing the Dimensional Dependence Michael E. HOULE

418~419 Boosting the Efficiency of Target Face Recognition through Image Hybridization Michael E. HOULE ・・・・・・ 24419 : Knowledge Propagation in Large Image Databases Using Neighborhood Information Jichao SUN

420 The Illumination Model for Nearest Neighbor Classification Michael E. HOULE ・・・・・・・・・・・・・・・・・・・・・・・ 25421 Efficiently Finding Significant Coefficients in Factorized Tensors Michael NETT ・・・・・・・・・・・・・・・・・・・・・ 25422 Modeling Reality based on Fluorescent Components Imari Satoh ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ 25423 Guiding visual attention using saliency-based image editing Akihiro Sugimoto ・・・・・・・・・・・・・・・・・・・・・・ 25424 Photometric metric under unknown lighting for range image registration Akihiro Sugimoto ・・・・・・・・・・・・ 25

Information and Society

Others

Special Exhibition

Graduate University for Advanced Studies

Development and Operation

Page 8: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

98 O P E N H O U S E 2 012O P E N H O U S E 2 012

Presentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Exhibitions

Poster ExhibitionsLectu

re / Session

Lecture / Sessio

n

15:00~16:00

We communicate using language and emotion. Both of these mental tools are highly developed in humans, but both of these are acquired through the process of evolution. Here we discuss origins of language and emotion based on communicative behavior in non-human animals.

Origins of language and emotion

Kazuo OKANOYA

13:30~14:30

We can see "computers understand language", in applications like automatic translation and speech recognition interfaces. In this talk, I will describe what "language understanding" means, and how computers try to understand language.

Understanding Language ― Why Difficult for Computers?Associate Professor at NII

Yusuke MIYAO

11:00~12:00

Cloud computing is transforming the way companies do business, helping them work better together. And accelerating innovation, increasing mobility and creating success through social collaboration. We show Google's vision and introduce latest products and services like Google Apps, Search Appliance and Earth& Maps with many success stories.

Work in the FutureManaging DirectorEnterpriseGoogle

Shinichi ABE

18:30~20:00

Network infrastructure is essential to connect people to the society. In the fie ld of advanced sc ient ific research , the u l t rah igh-speed network infrastructure is required for researchers across the nation to use a large-scale laboratory equipment communally and to transfer vast amount of data. In this class, we explain the system and use of SINET, comparing with general infrastructures. In addition, we show how SINET withstood the Greate East Japan Earthquake and its furue direction.

The advanced research on network infrastructure and society~SINET broadening the network of scientists~

Professor at NII

Shigeo URUSHIDANI

Lecture/SessionHitotsubashi Hall(2F)/ Special Conference Room(1F)/ Small conference room(2F)

13:00~13:30 Opening Address ・ Report on the activity of NIIDirector General at NII

Masao SAKAUCHI

16:00~17:00

The appearance of an object is greatly influenced by its surface materials as well as the surrounding illumination, and it is essential for computer vision tasks to be able to predict its variation. In this talk, I will introduce image-based and inverse-lighting approaches to modeling real-world illumination and objects’ reflectance from images taken under varying lighting conditions.

The way we see the worldAssociate Professor at NII

Imari SATOH

Thursday,June7 Friday,June8Hitotsubashi Hall(2F) Hitotsubashi Hall(2F)

Hitotsubashi Hall(2F)Hitotsubashi Hall(2F)

Hitotsubashi Hall(2F)

Special ConferenceRoom(1F)

13:30~14:30

Can we evolve ourselves with our technology? Augmented Reality (AR) enhances the real world with information technology, but ultimately it would be used to enhance humans, as I call “Augmented Human” (AH). Abilities for augmentation are not limited to intellectual ones, but physical skills and health can be included. In this talk I discuss the direction of AH with our ongoing research projects.

From Augmented Reality to Augmented Human: Human Evolution and Information technology

Jun REKIMOTO

Opening

Keynote Lecture

Public Lecture

14:40~15:50 While a smartphone is a convenient device and its use increases in universities, information leakage is possible in case the device is left, lost, or stolen.Also, security countermeasures are required, since a smartphone has a risk of viruses and malwares as same as a PC. This session will discuss on security countermeasures and good use of smart phones.

Invited Lecture

Keynote Lecture

Security of smartphone used in universities

Professor at Interfaculty Initiative in Information Studies, The University of Tokyo, Deputy Director of Sony Computer Science Laboratories

Professor at The University of Tokyo, Direction at JST-ERATO, Team Leader, RIKEN-BSI

Page 9: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

98 O P E N H O U S E 2 012O P E N H O U S E 2 012

Presentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Exhibitions

Poster ExhibitionsLectu

re / Session

Lecture / Sessio

n

15:00~16:00

We communicate using language and emotion. Both of these mental tools are highly developed in humans, but both of these are acquired through the process of evolution. Here we discuss origins of language and emotion based on communicative behavior in non-human animals.

Origins of language and emotion

Kazuo OKANOYA

13:30~14:30

We can see "computers understand language", in applications like automatic translation and speech recognition interfaces. In this talk, I will describe what "language understanding" means, and how computers try to understand language.

Understanding Language ― Why Difficult for Computers?Associate Professor at NII

Yusuke MIYAO

11:00~12:00

Cloud computing is transforming the way companies do business, helping them work better together. And accelerating innovation, increasing mobility and creating success through social collaboration. We show Google's vision and introduce latest products and services like Google Apps, Search Appliance and Earth& Maps with many success stories.

Work in the FutureManaging DirectorEnterpriseGoogle

Shinichi ABE

18:30~20:00

Network infrastructure is essential to connect people to the society. In the fie ld of advanced sc ient ific research , the u l t rah igh-speed network infrastructure is required for researchers across the nation to use a large-scale laboratory equipment communally and to transfer vast amount of data. In this class, we explain the system and use of SINET, comparing with general infrastructures. In addition, we show how SINET withstood the Greate East Japan Earthquake and its furue direction.

The advanced research on network infrastructure and society~SINET broadening the network of scientists~

Professor at NII

Shigeo URUSHIDANI

Lecture/SessionHitotsubashi Hall(2F)/ Special Conference Room(1F)/ Small conference room(2F)

13:00~13:30 Opening Address ・ Report on the activity of NIIDirector General at NII

Masao SAKAUCHI

16:00~17:00

The appearance of an object is greatly influenced by its surface materials as well as the surrounding illumination, and it is essential for computer vision tasks to be able to predict its variation. In this talk, I will introduce image-based and inverse-lighting approaches to modeling real-world illumination and objects’ reflectance from images taken under varying lighting conditions.

The way we see the worldAssociate Professor at NII

Imari SATOH

Thursday,June7 Friday,June8Hitotsubashi Hall(2F) Hitotsubashi Hall(2F)

Hitotsubashi Hall(2F)Hitotsubashi Hall(2F)

Hitotsubashi Hall(2F)

Special ConferenceRoom(1F)

13:30~14:30

Can we evolve ourselves with our technology? Augmented Reality (AR) enhances the real world with information technology, but ultimately it would be used to enhance humans, as I call “Augmented Human” (AH). Abilities for augmentation are not limited to intellectual ones, but physical skills and health can be included. In this talk I discuss the direction of AH with our ongoing research projects.

From Augmented Reality to Augmented Human: Human Evolution and Information technology

Jun REKIMOTO

Opening

Keynote Lecture

Public Lecture

14:40~15:50 While a smartphone is a convenient device and its use increases in universities, information leakage is possible in case the device is left, lost, or stolen.Also, security countermeasures are required, since a smartphone has a risk of viruses and malwares as same as a PC. This session will discuss on security countermeasures and good use of smart phones.

Invited Lecture

Keynote Lecture

Security of smartphone used in universities

Professor at Interfaculty Initiative in Information Studies, The University of Tokyo, Deputy Director of Sony Computer Science Laboratories

Professor at The University of Tokyo, Direction at JST-ERATO, Team Leader, RIKEN-BSI

Page 10: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1110 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / SessionD

emo/Experience corner

Poster Exhibitions

Lecture / SessionPresen

tatio

nD

emo/Experience corner

Poster Exhibitions

Presen

tatio

n

Presentation2nd Floor Hall

Thursday,June7 Friday,June8

15:00~15:20

Yusheng JI Stephan SiggShuyu Shi

Yusheng JI Stephan SiggShuyu Shi

Situation detection using ambient radio signals

Activity detection of passive entities from ambient FM-radio signals

Situation detection using ambient radio signals

Activity detection of passive entities from ambient FM-radio signals

Nobuhiro FURUYAMAPerceptual and Dynamical coupling in Human-Human Coordination System

15:00~15:20

The amplitude of a received RF-signal is affected by physical phenomena such as, for instance, reflection, refraction or scattering, induced by objects and individuals in the signal propagation path. Activities performed by an individual in the proximity of a receiver will induce a characteristic pattern on these features. We investigate the use of the radio frequency channel to detect activities of non-actively transmitting individuals in proximity. In particular, we describe a passive device-free recognition system, utilizing amplitude-based features of a FM radio signal to recognize and classify activities and situations in indoor environments.

15:20~15:40

NobuhiroFURUYAMA

Perceptual and Dynamical coupling in Human-Human Coordination SystemIt is crucial to achieve between-person movement synchronization in music or sport performance as well as in daily cooperative activities, but the principle underlying it has not been fully understood yet. If we can grasp the regularities we should be able not only to apply the knowledge to education, physical, occupational, speech, or psychological therapies, etc., but also to design human-agent synchronization. In this presentation I will introduce to you studies on human movement synchronization, including our own contribution to the topic.

15:20~15:40

12:30~12:50

Kenro AIHARA

Kenro AIHARA

How can user experience be enhanced by using a location-based mobile application?

Behavior-based Recommender for Wanderersin Town

How can user experience be enhanced by using a location-based mobile application?

Behavior-based Recommender for Wanderers in Town

Ken SATOHCan computer reason about law?

PROLEG:Implementation of Ultimate Fact Theory in Civil Litigation by Logic Programming

This presentation shows a pilot study that aims to develop a location-based service with a smartphone application, which gives recommendation for users in town and visualized information for local business players to capture the situation of the town. The application not only gives information around the location where a user is but also collects his/her behavior logs even in background mode. Using the recommendation model based on behavioral-cost and such behavior logs, recommendation can be calculated.

12:30~12:50

12:50~13:10

Ken SATOH

Can computer reason about law?

PROLEG : Implementation of Ultimate Fact Theory in Civil Litigation by Logic ProgrammingIn this presentation, we show an implantation of the ultimate fact theory in civil litigation by logic programming. The ultimate fact theory is a decision tool for a judge under incomplete information by attaching the burden of proof for each ultimate fact in civil code. We show correspondence between logic programming and ultimate fact theory and use it for an implementation of the theory by logic programming.

12:50~13:10

Principles of Informatics

Principles of Informatics

Information Systems Architecture

Information Systems Architecture

Digital Content and Media Sciences

Digital Content and Media Sciences

Information and Society

Information and Society

Page 11: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1110 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / SessionD

emo/Experience corner

Poster Exhibitions

Lecture / SessionPresen

tatio

nD

emo/Experience corner

Poster Exhibitions

Presen

tatio

n

Presentation2nd Floor Hall

Thursday,June7 Friday,June8

15:00~15:20

Yusheng JI Stephan SiggShuyu Shi

Yusheng JI Stephan SiggShuyu Shi

Situation detection using ambient radio signals

Activity detection of passive entities from ambient FM-radio signals

Situation detection using ambient radio signals

Activity detection of passive entities from ambient FM-radio signals

Nobuhiro FURUYAMAPerceptual and Dynamical coupling in Human-Human Coordination System

15:00~15:20

The amplitude of a received RF-signal is affected by physical phenomena such as, for instance, reflection, refraction or scattering, induced by objects and individuals in the signal propagation path. Activities performed by an individual in the proximity of a receiver will induce a characteristic pattern on these features. We investigate the use of the radio frequency channel to detect activities of non-actively transmitting individuals in proximity. In particular, we describe a passive device-free recognition system, utilizing amplitude-based features of a FM radio signal to recognize and classify activities and situations in indoor environments.

15:20~15:40

NobuhiroFURUYAMA

Perceptual and Dynamical coupling in Human-Human Coordination SystemIt is crucial to achieve between-person movement synchronization in music or sport performance as well as in daily cooperative activities, but the principle underlying it has not been fully understood yet. If we can grasp the regularities we should be able not only to apply the knowledge to education, physical, occupational, speech, or psychological therapies, etc., but also to design human-agent synchronization. In this presentation I will introduce to you studies on human movement synchronization, including our own contribution to the topic.

15:20~15:40

12:30~12:50

Kenro AIHARA

Kenro AIHARA

How can user experience be enhanced by using a location-based mobile application?

Behavior-based Recommender for Wanderersin Town

How can user experience be enhanced by using a location-based mobile application?

Behavior-based Recommender for Wanderers in Town

Ken SATOHCan computer reason about law?

PROLEG:Implementation of Ultimate Fact Theory in Civil Litigation by Logic Programming

This presentation shows a pilot study that aims to develop a location-based service with a smartphone application, which gives recommendation for users in town and visualized information for local business players to capture the situation of the town. The application not only gives information around the location where a user is but also collects his/her behavior logs even in background mode. Using the recommendation model based on behavioral-cost and such behavior logs, recommendation can be calculated.

12:30~12:50

12:50~13:10

Ken SATOH

Can computer reason about law?

PROLEG : Implementation of Ultimate Fact Theory in Civil Litigation by Logic ProgrammingIn this presentation, we show an implantation of the ultimate fact theory in civil litigation by logic programming. The ultimate fact theory is a decision tool for a judge under incomplete information by attaching the burden of proof for each ultimate fact in civil code. We show correspondence between logic programming and ultimate fact theory and use it for an implementation of the theory by logic programming.

12:50~13:10

Principles of Informatics

Principles of Informatics

Information Systems Architecture

Information Systems Architecture

Digital Content and Media Sciences

Digital Content and Media Sciences

Information and Society

Information and Society

Page 12: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1312 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / SessionPoster Exhibitions

Lecture / SessionPresentation

Poster Exhibitions

PresentationDem

o/Experience corner

Demo/Experience corner

Information and Society

Information and Society

Information Systems Architecture

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Principles of Informatics

Principles of Informatics

Demo/Experience cornerConference Room(2F)

Connecting Society and Academia with Data

Hideaki Takeda  Ikki OhmukaiLODAC:Building the Open Social Semantic Web Platform for Academic Resources

The aim of the project is to provide an open and flexible platform for academic resources with Linked Open Data (LOD). LOD is the emerging technology which can realize the huge network of data just as the web realizes the huge network for documents. We are currently developing various LOD data silos, e.g., museum collections and biological species information. We are also developing some applications such as Yokohama Art Spot which is a mashup of local information from different data silos.

101

Robot simulator to cultivate social intelligence

Tetsunari InamuraSIGVerse:the SicioIntelligenesis simulator

SIGVerse is a open software platform in order to design and investigate symbiosis society by human and robot. Multiple users can design robot agent and throw it in virtual environments to make social interaction. This system is world’s first simulator that can integrate simulations of 1)physical motion and behavior, 2)vision, auditory and kinesthetic sense perception, and 3)social interaction. One of the most distinguishing applications of the simulator is to investigate physical and social interaction such as eye contact/gesture based communication.

102

Academic Cloud for Cloud education and research

Shigetoshi Yokoyama  Nobukazu Yoshioka, Masaru Nagakuedubase Cloud : An IT laboratory where you can test your ideas without restraint

edubase Cloud can create an environment in which you can acquire necessary IT resources when needed, and can test your ideas without restraint. Utilization of Cloud in the actual training grounds is expected, from basic technology of Cloud to Project Base Learning in the IT field.And also, edubase Cloud is a place to learn essential advanced technological capabilities to manage and develop the Cloud platform. edubase Cloud offers the most advanced IT environment and serves as the driving force to accelerate the development of leading IT specialists.

103

"Don't film it!" - technology to prevent unauthorized copying of displays -

Isao EchizenResearch on security technologies for overcoming analog-hole problem

We have developed a new technology by applying this technology to the unauthorized copying of displays. This technology facilitates copyright protection for picture and image content and prevents disclosure of confidential and personal information through the unauthorized copying of displays by simply equipping existing displays with a unit to prevent unauthorized copying, without adding any new functions to digital cameras. In addition to preventing disclosure of confidential and personal information through the unauthorized copying of displays, an issue that is becoming more important, it is expected that this new technology will have broad application for preventing unauthorized photographing of works of art, factory equipment, and other objects subject to photographic restrictions.

104

Collective Intelligence based social project management

Andres Frederic  Hideto Kojima (Nickom Ltd.,Japan)

CI-Communigram

CI-COMMUNIGRAM is a collective intelligence-based platform for doing projects to foster innovation, knowledge creation and sharing, productivity and personal engagement.

105

How to access large-scale video archive?

Shin'ichi Satoh  Norio Katayama, Hiroshi Mo, Duy-Dinh LeChallenge to Bridging the Semantic Gap via Video Media Content Analysis

Video content-based retrieval is indispensable to access necessary information from broadcast videos or video archives in the internet. We are addressing video content-based retrieval for large-scale video archives via automatic extraction of video content information using video semantic analysis. This requires to solve so-called the bridging the semantic gap, which is known to be very challenging task, and we are tackling this issue using several techniques including image analysis, machine learning, and information retrieval. We will demonstrate our video search engine enabled by our research outcome.

111

A smartphone application for visualizing mobile communication

Tetsuro Kobayashi , Tsutomu Suzuki  Noboru Sonehara

Network Navigator

Network Navigator is an application for android smartphones. From communication logs in a mobile phone, this application visualizes your relationship with your family, friends, acquaintances and so on. Communication logs are encrypted and used for academic research. You can touch and try the functions of Network Navigator at the demo section.

112

Assessment for learning in the e-Society

Yuan SUN  Ikko KAWAHASHI, Koken OZAKI

The research and development of web-based cognitive diagnostic tests for children

In K-12 schools learning support is required to suit the needs of individual children. That is what we need to measure and diagnose children’s mastery status of pre-defined skills, thereby providing them with detailed information regarding their specific strengths and weaknesses. Cognitive diagnostic test systems are the possible ways to aid teachers to direct students to more individualized remediation and help children to make self-study efficiently. A demo of elementary school math test will be shown as a part of the research.

113

Helmut Prendinger  Cyber Social Simulation based on the 3D Internet

"Unveiling the Mystery of Traffic Congestion", "Will Ubiquitous Eco-driving Increase Environmental Impact?", "First-Person Simulation and Training of Bio-Security", "Automatically Generating Realistic Disaster Evacuation Behavior", "Automated Text to Dialogue Generation for Better Understanding Clinical Guidelines"

106~110

Eurico Doirado , Marconi Madruga , Nahum Alvarez ,Kugamoorthy Gajananan , Pascal Kuyten

Page 13: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1312 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / SessionPoster Exhibitions

Lecture / SessionPresentation

Poster Exhibitions

PresentationDem

o/Experience corner

Demo/Experience corner

Information and Society

Information and Society

Information Systems Architecture

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Principles of Informatics

Principles of Informatics

Demo/Experience cornerConference Room(2F)

Connecting Society and Academia with Data

Hideaki Takeda  Ikki OhmukaiLODAC:Building the Open Social Semantic Web Platform for Academic Resources

The aim of the project is to provide an open and flexible platform for academic resources with Linked Open Data (LOD). LOD is the emerging technology which can realize the huge network of data just as the web realizes the huge network for documents. We are currently developing various LOD data silos, e.g., museum collections and biological species information. We are also developing some applications such as Yokohama Art Spot which is a mashup of local information from different data silos.

101

Robot simulator to cultivate social intelligence

Tetsunari InamuraSIGVerse:the SicioIntelligenesis simulator

SIGVerse is a open software platform in order to design and investigate symbiosis society by human and robot. Multiple users can design robot agent and throw it in virtual environments to make social interaction. This system is world’s first simulator that can integrate simulations of 1)physical motion and behavior, 2)vision, auditory and kinesthetic sense perception, and 3)social interaction. One of the most distinguishing applications of the simulator is to investigate physical and social interaction such as eye contact/gesture based communication.

102

Academic Cloud for Cloud education and research

Shigetoshi Yokoyama  Nobukazu Yoshioka, Masaru Nagakuedubase Cloud : An IT laboratory where you can test your ideas without restraint

edubase Cloud can create an environment in which you can acquire necessary IT resources when needed, and can test your ideas without restraint. Utilization of Cloud in the actual training grounds is expected, from basic technology of Cloud to Project Base Learning in the IT field.And also, edubase Cloud is a place to learn essential advanced technological capabilities to manage and develop the Cloud platform. edubase Cloud offers the most advanced IT environment and serves as the driving force to accelerate the development of leading IT specialists.

103

"Don't film it!" - technology to prevent unauthorized copying of displays -

Isao EchizenResearch on security technologies for overcoming analog-hole problem

We have developed a new technology by applying this technology to the unauthorized copying of displays. This technology facilitates copyright protection for picture and image content and prevents disclosure of confidential and personal information through the unauthorized copying of displays by simply equipping existing displays with a unit to prevent unauthorized copying, without adding any new functions to digital cameras. In addition to preventing disclosure of confidential and personal information through the unauthorized copying of displays, an issue that is becoming more important, it is expected that this new technology will have broad application for preventing unauthorized photographing of works of art, factory equipment, and other objects subject to photographic restrictions.

104

Collective Intelligence based social project management

Andres Frederic  Hideto Kojima (Nickom Ltd.,Japan)

CI-Communigram

CI-COMMUNIGRAM is a collective intelligence-based platform for doing projects to foster innovation, knowledge creation and sharing, productivity and personal engagement.

105

How to access large-scale video archive?

Shin'ichi Satoh  Norio Katayama, Hiroshi Mo, Duy-Dinh LeChallenge to Bridging the Semantic Gap via Video Media Content Analysis

Video content-based retrieval is indispensable to access necessary information from broadcast videos or video archives in the internet. We are addressing video content-based retrieval for large-scale video archives via automatic extraction of video content information using video semantic analysis. This requires to solve so-called the bridging the semantic gap, which is known to be very challenging task, and we are tackling this issue using several techniques including image analysis, machine learning, and information retrieval. We will demonstrate our video search engine enabled by our research outcome.

111

A smartphone application for visualizing mobile communication

Tetsuro Kobayashi , Tsutomu Suzuki  Noboru Sonehara

Network Navigator

Network Navigator is an application for android smartphones. From communication logs in a mobile phone, this application visualizes your relationship with your family, friends, acquaintances and so on. Communication logs are encrypted and used for academic research. You can touch and try the functions of Network Navigator at the demo section.

112

Assessment for learning in the e-Society

Yuan SUN  Ikko KAWAHASHI, Koken OZAKI

The research and development of web-based cognitive diagnostic tests for children

In K-12 schools learning support is required to suit the needs of individual children. That is what we need to measure and diagnose children’s mastery status of pre-defined skills, thereby providing them with detailed information regarding their specific strengths and weaknesses. Cognitive diagnostic test systems are the possible ways to aid teachers to direct students to more individualized remediation and help children to make self-study efficiently. A demo of elementary school math test will be shown as a part of the research.

113

Helmut Prendinger  Cyber Social Simulation based on the 3D Internet

"Unveiling the Mystery of Traffic Congestion", "Will Ubiquitous Eco-driving Increase Environmental Impact?", "First-Person Simulation and Training of Bio-Security", "Automatically Generating Realistic Disaster Evacuation Behavior", "Automated Text to Dialogue Generation for Better Understanding Clinical Guidelines"

106~110

Eurico Doirado , Marconi Madruga , Nahum Alvarez ,Kugamoorthy Gajananan , Pascal Kuyten

Page 14: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1514 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Poster Exhibitions :Core time/ The hall map Conference Room(2F)

Thursday,June714:30~15:15

15:15~16:00

17:00~18:30

We are setting core hours for every categories.If you have some questions or want to discuss with researchers, please refer to the timetable below.

Friday,June810:30~11:00

12:00~12:45

14:30~15:00

16:00~17:00

12:45~13:30

Core time

Conference Room

201~217 301~318

401~424 501~508

801~802

901~904

601~606

701~705

101~113

廊下(会議場)

1F

904

Restroom

701 702 703 704 705

Presentations

103

104

105

106

110

111 113 802 801 606 605 604 603 602 601 901112

410 411 412 413 414 415 416 417 418 419 420 421 422

423501 502 503 504 505 506 507 508 424

201 202 203 204 205 206 207 208 209 210101102

211

212

213

214

215

216

217

903 902

402 401 301 302 303 304 305 306 307 308 309 310 311 312

317 315316 314 313403 404 405 406 407 408 409 318Waterserver

Waterserver

Waterserver

1F

904

ウォーターサーバー

Principles of Informatics

Principles of Informatics

Principles of Informatics

Principles of Informatics

Principles of Informatics

Principles of Informatics

Information Systems Architecture

Information Systems Architecture

Information Systems Architecture

Information Systems Architecture

Information Systems Architecture

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Information and Society

Information and Society

Information and Society

Information and Society

Information and Society

Special Exhibition

Special Exhibition

Special Exhibition

Special Exhibition

Graduate University for Advanced Studies

Graduate University for Advanced Studies

Graduate University for Advanced Studies

Graduate University for Advanced Studies

Graduate University for Advanced Studies

Development and Operation

Development and Operation

Development and Operation

Development and Operation

Development and Operation

Information Systems Architecture

Digital Content and Media Sciences Information and Society

Others

Special Exhibition

Graduate University for Advanced Studies

Development and Operation

Demo/Experience corner

Page 15: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1514 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Poster Exhibitions :Core time/ The hall map Conference Room(2F)

Thursday,June714:30~15:15

15:15~16:00

17:00~18:30

We are setting core hours for every categories.If you have some questions or want to discuss with researchers, please refer to the timetable below.

Friday,June810:30~11:00

12:00~12:45

14:30~15:00

16:00~17:00

12:45~13:30

Core time

Conference Room

201~217 301~318

401~424 501~508

801~802

901~904

601~606

701~705

101~113

廊下(会議場)

1F

904

Restroom

701 702 703 704 705

Presentations

103

104

105

106

110

111 113 802 801 606 605 604 603 602 601 901112

410 411 412 413 414 415 416 417 418 419 420 421 422

423501 502 503 504 505 506 507 508 424

201 202 203 204 205 206 207 208 209 210101102

211

212

213

214

215

216

217

903 902

402 401 301 302 303 304 305 306 307 308 309 310 311 312

317 315316 314 313403 404 405 406 407 408 409 318Waterserver

Waterserver

Waterserver

1F

904

ウォーターサーバー

Principles of Informatics

Principles of Informatics

Principles of Informatics

Principles of Informatics

Principles of Informatics

Principles of Informatics

Information Systems Architecture

Information Systems Architecture

Information Systems Architecture

Information Systems Architecture

Information Systems Architecture

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Digital Content and Media Sciences

Information and Society

Information and Society

Information and Society

Information and Society

Information and Society

Special Exhibition

Special Exhibition

Special Exhibition

Special Exhibition

Graduate University for Advanced Studies

Graduate University for Advanced Studies

Graduate University for Advanced Studies

Graduate University for Advanced Studies

Graduate University for Advanced Studies

Development and Operation

Development and Operation

Development and Operation

Development and Operation

Development and Operation

Information Systems Architecture

Digital Content and Media Sciences Information and Society

Others

Special Exhibition

Graduate University for Advanced Studies

Development and Operation

Demo/Experience corner

Page 16: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1716 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Poster ExhibitionsConference Room(2F)

Chemical Reaction Prediction and Design

Hiroko SatohMaking The Hitchhiker's Guide to the Galaxy of Chemical Reactions

Chemical reactions occur as a result of complicated interactions between several factors concerning properties of reactants and conditions such as temperature. This broad diversity makes the problem extremely difficult. Solving the reaction prediction problem entails finding a solution from a huge number of possibilities. In

this sense, it is said that predicting a reaction is similar to finding out a lost precious item in a desert. Chemists must seek ways to reach the solution within an acceptable time by reducing the space in a rational way. We report here our attempt to use chemical information for making a guide to the galaxy of chemical reactions.

201

Toward General Computation with GPU

Kunihiko SadakaneSimple Parallel Algorithms for Tree Functions

Tree functions are the ones defined by weights of tree nodes. The value of the function f(v) for a node v is defined by the weight w(v) of the node and function values of v's chidren v1,...,vk, namely, f(v) = w(v) × (f(v1) + ... + f(vk)).

This research proposes a simple algorithm for computing a tree function in O(n/p + log p) time for an n node tree on the EREW-PRAM model with p processors. Because of its simplicity, it is easy to implement it on GPGPU.

203

Lambda-Calculus and Type Theory

Makoto TatsutaTLCA Open Problem 20

This paper answers TLCA Open Problem 20, which is finding a type system that characterizes hereditary permutators. First this paper shows that there does not exist such a type system by showing that the set of hereditary permutators is

not recursively enumerable. Secondly this paper gives a best- possible solution by providing a countably infinite set of types such that a term has every type in the set if and only if the term is a hereditary permutator.

204

Create a Closer Relationship in Society and World by e-Communication

Haruki Ueno  Arjurie John Berena, Sila Chunwijitra, Naonori Katoh, Hisashi Okada, Yoshihito Gotoh, Yoshiyuki Kinjoh, Masaki Mori, Hideomi Koinuma

WebELS:Cloud-Based General Purpose e-Communication Platform

By using WebELS, a cloud-based general purpose e-communincation platform, a variety of activities on educa t i on , pub l i ca t i on , mee t i ng , bus iness and

informat ion shar ing are avai lable for "every-one, every-where, every-time" in community and world with your personal computer through Internet.

205

Can a computer reason about law?

Ken SatohPROLEG : Implementation of Ultimate Fact Theory in Civil Litigation by Logic Programming

In this presentation, we show an implantation of the u l t ima te f ac t t heo r y i n c i v i l l i t i ga t i on by l og ic programming. The ultimate fact theory is a decision tool for a judge under incomplete information by attaching

the burden of proof for each ultimate fact in civil code. We show correspondence between logic programming and ultimate fact theory and use it for an implementation of the theory by logic programming.

206

Congestion control in Opportunistic networks

Md. Enamul Haque  Shigeki YamadaAn Effective Queue Management Scheme for Opportunistic Networks

Effective queue management carries much significance for better congestion control and avoidance in networks like opportunistic network. However, it is quite difficult to design such management scheme for this network due to mobility and absence of end to end connectivity. In this poster, a queue management scheme has

been presented which is a variant of weighted fair queuing. This scheme intelligently stores and delivers messages based on the weight calculated from local information. Preliminary simulation results of this scheme showed effective and encouraging performance compare to first in first out (FIFO) scheme.

202

Understanding Natural Language Through Formal Language Theory

Makoto KanazawaThe Mathematics of Free Word Order

Formal language theory studies mathematical properties of sets of strings of symbols. As dry as it may sound, it sometimes brings surprising insights about the nature of human language.

The recent solution to a longstanding open problem about a very simple formal language called “MIX” may help explain why nobody speaks a language with completely free word order.

207

Quantum computer viewed from optical interferometer

Global Research Center for Quantum Information Center  Yoshihisa Yamamoto, Shoko Utsunomiya, Tim Byrnes, Tomoyuki Horikiri, Kenichiro Kusudo, Yan Kai, Kenta Takata

Future information society created by quantum information technologies

It is expected that information processing, communication, metrology and precision measurement technologies can be g reat ly advanced by in t roduc ing the fundamenta l principles of quantum mechanics. Japanese cabinet selected the quantum information processing project as

one of its 30 FIRST programs in 2009 at NII installed the g loba l r esea rch cen te r on quan tum in fo rma t i on processing to promote the research of this area. We will provide a review on those two organizations and explain the quantum principles at their application areas.

209

What is a quantum computer made of?

Tim Byrnes  Alexey PyrkovQuantum computer implementations: from ion traps to Bose-Einstein condensates

Many of us have heard of a quantum computer, but it is hard to imagine what th is would real ly look l ike. Would i t be something that would fit inside a laptop, or would it occupy an entire room like the first computers did? The answer to this is still unknown, because researchers across the world are trying

many different approaches to try and build a quantum computer. We describe the various approaches to quantum computing, including ion traps, superconducting qubits, and quantum dots inside semiconductors. We also describe a new approach that we are working on, using Bose-Einstein condensates.

210

Can we build a quantum computer?

Kae Nemoto  Simon Devitt, Mark Everitt, Ashley Stephens, Shiro Saito, Norikazu Mizuochi, W. J. Munro, Kouichi SembaBuilding a quantum internet: From small devices to large systems

To realize a quantum computer, we need to be able to manipulate a large number of quantum qubits with high precision. This sounds a difficult task to achieve but it must meet before we can realize any quantum information processing systems. However given that the fundamental mechanism underlying the manipulation

of qubits are all quite similar, it is now vital that we pin down the key elements of our building blocks and how this can be used to design a system. In the poster, we illustrate how one can build a quantum computer network from a simple module and illustrate recent experimental progress towards its construction.

211

Using quantum physics to solve difficult physical and computational problems

Yoshihisa Yamamoto  Shoko Utsunomiya, Tim Byrnes, Michael Fraser, Tomoyuki Horikiri, Kenichiro Kusudo, Yan Kai, Kenta Takata, Yasuhiro Matsuo, Md Javed Rouf Talukder, Yorihiro Nobuta, Koki Matsushita

Properties and applications of polariton Bose-Einstein condensation

When many Bose particles enter a single quantum state, a Bose-Einstein condensate (BEC) is formed. A BEC has the properties of a microscopic state, while being a macroscopic phenomenon. Due to many particles sharing the same state, it is also resistant to noise. Our group is investigating the

p roper t ies o f BECs fo rmed in a so l id s ta te us ing a semiconductor quantum well. We have also proposed methods of using such a BEC to attack complex information and quantum physics problems. The posters will explain some experimental results and potential applications.

208

Presenting researches to discover new principles,theories and methods in informatics.

How to use large amount of information with diversity?

Ryutaro Ichise  Raul Ernesto Menendez Mora, Lankeshwara Munasinghe, Lihua ZhaoIntegrating Various Information with Semantics

It is easy to obtain large amount of various information nowadays. In order to use such information efficiently, we need to i n teg ra te i t w i th semant ics . I n th i s

presentation, we show semantic technologies for the problem.

212

Principles of Informatics

Page 17: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1716 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Poster ExhibitionsConference Room(2F)

Chemical Reaction Prediction and Design

Hiroko SatohMaking The Hitchhiker's Guide to the Galaxy of Chemical Reactions

Chemical reactions occur as a result of complicated interactions between several factors concerning properties of reactants and conditions such as temperature. This broad diversity makes the problem extremely difficult. Solving the reaction prediction problem entails finding a solution from a huge number of possibilities. In

this sense, it is said that predicting a reaction is similar to finding out a lost precious item in a desert. Chemists must seek ways to reach the solution within an acceptable time by reducing the space in a rational way. We report here our attempt to use chemical information for making a guide to the galaxy of chemical reactions.

201

Toward General Computation with GPU

Kunihiko SadakaneSimple Parallel Algorithms for Tree Functions

Tree functions are the ones defined by weights of tree nodes. The value of the function f(v) for a node v is defined by the weight w(v) of the node and function values of v's chidren v1,...,vk, namely, f(v) = w(v) × (f(v1) + ... + f(vk)).

This research proposes a simple algorithm for computing a tree function in O(n/p + log p) time for an n node tree on the EREW-PRAM model with p processors. Because of its simplicity, it is easy to implement it on GPGPU.

203

Lambda-Calculus and Type Theory

Makoto TatsutaTLCA Open Problem 20

This paper answers TLCA Open Problem 20, which is finding a type system that characterizes hereditary permutators. First this paper shows that there does not exist such a type system by showing that the set of hereditary permutators is

not recursively enumerable. Secondly this paper gives a best- possible solution by providing a countably infinite set of types such that a term has every type in the set if and only if the term is a hereditary permutator.

204

Create a Closer Relationship in Society and World by e-Communication

Haruki Ueno  Arjurie John Berena, Sila Chunwijitra, Naonori Katoh, Hisashi Okada, Yoshihito Gotoh, Yoshiyuki Kinjoh, Masaki Mori, Hideomi Koinuma

WebELS:Cloud-Based General Purpose e-Communication Platform

By using WebELS, a cloud-based general purpose e-communincation platform, a variety of activities on educa t i on , pub l i ca t i on , mee t i ng , bus iness and

informat ion shar ing are avai lable for "every-one, every-where, every-time" in community and world with your personal computer through Internet.

205

Can a computer reason about law?

Ken SatohPROLEG : Implementation of Ultimate Fact Theory in Civil Litigation by Logic Programming

In this presentation, we show an implantation of the u l t ima te f ac t t heo r y i n c i v i l l i t i ga t i on by l og ic programming. The ultimate fact theory is a decision tool for a judge under incomplete information by attaching

the burden of proof for each ultimate fact in civil code. We show correspondence between logic programming and ultimate fact theory and use it for an implementation of the theory by logic programming.

206

Congestion control in Opportunistic networks

Md. Enamul Haque  Shigeki YamadaAn Effective Queue Management Scheme for Opportunistic Networks

Effective queue management carries much significance for better congestion control and avoidance in networks like opportunistic network. However, it is quite difficult to design such management scheme for this network due to mobility and absence of end to end connectivity. In this poster, a queue management scheme has

been presented which is a variant of weighted fair queuing. This scheme intelligently stores and delivers messages based on the weight calculated from local information. Preliminary simulation results of this scheme showed effective and encouraging performance compare to first in first out (FIFO) scheme.

202

Understanding Natural Language Through Formal Language Theory

Makoto KanazawaThe Mathematics of Free Word Order

Formal language theory studies mathematical properties of sets of strings of symbols. As dry as it may sound, it sometimes brings surprising insights about the nature of human language.

The recent solution to a longstanding open problem about a very simple formal language called “MIX” may help explain why nobody speaks a language with completely free word order.

207

Quantum computer viewed from optical interferometer

Global Research Center for Quantum Information Center  Yoshihisa Yamamoto, Shoko Utsunomiya, Tim Byrnes, Tomoyuki Horikiri, Kenichiro Kusudo, Yan Kai, Kenta Takata

Future information society created by quantum information technologies

It is expected that information processing, communication, metrology and precision measurement technologies can be g reat ly advanced by in t roduc ing the fundamenta l principles of quantum mechanics. Japanese cabinet selected the quantum information processing project as

one of its 30 FIRST programs in 2009 at NII installed the g loba l r esea rch cen te r on quan tum in fo rma t i on processing to promote the research of this area. We will provide a review on those two organizations and explain the quantum principles at their application areas.

209

What is a quantum computer made of?

Tim Byrnes  Alexey PyrkovQuantum computer implementations: from ion traps to Bose-Einstein condensates

Many of us have heard of a quantum computer, but it is hard to imagine what th is would real ly look l ike. Would i t be something that would fit inside a laptop, or would it occupy an entire room like the first computers did? The answer to this is still unknown, because researchers across the world are trying

many different approaches to try and build a quantum computer. We describe the various approaches to quantum computing, including ion traps, superconducting qubits, and quantum dots inside semiconductors. We also describe a new approach that we are working on, using Bose-Einstein condensates.

210

Can we build a quantum computer?

Kae Nemoto  Simon Devitt, Mark Everitt, Ashley Stephens, Shiro Saito, Norikazu Mizuochi, W. J. Munro, Kouichi SembaBuilding a quantum internet: From small devices to large systems

To realize a quantum computer, we need to be able to manipulate a large number of quantum qubits with high precision. This sounds a difficult task to achieve but it must meet before we can realize any quantum information processing systems. However given that the fundamental mechanism underlying the manipulation

of qubits are all quite similar, it is now vital that we pin down the key elements of our building blocks and how this can be used to design a system. In the poster, we illustrate how one can build a quantum computer network from a simple module and illustrate recent experimental progress towards its construction.

211

Using quantum physics to solve difficult physical and computational problems

Yoshihisa Yamamoto  Shoko Utsunomiya, Tim Byrnes, Michael Fraser, Tomoyuki Horikiri, Kenichiro Kusudo, Yan Kai, Kenta Takata, Yasuhiro Matsuo, Md Javed Rouf Talukder, Yorihiro Nobuta, Koki Matsushita

Properties and applications of polariton Bose-Einstein condensation

When many Bose particles enter a single quantum state, a Bose-Einstein condensate (BEC) is formed. A BEC has the properties of a microscopic state, while being a macroscopic phenomenon. Due to many particles sharing the same state, it is also resistant to noise. Our group is investigating the

p roper t ies o f BECs fo rmed in a so l id s ta te us ing a semiconductor quantum well. We have also proposed methods of using such a BEC to attack complex information and quantum physics problems. The posters will explain some experimental results and potential applications.

208

Presenting researches to discover new principles,theories and methods in informatics.

How to use large amount of information with diversity?

Ryutaro Ichise  Raul Ernesto Menendez Mora, Lankeshwara Munasinghe, Lihua ZhaoIntegrating Various Information with Semantics

It is easy to obtain large amount of various information nowadays. In order to use such information efficiently, we need to i n teg ra te i t w i th semant ics . I n th i s

presentation, we show semantic technologies for the problem.

212

Principles of Informatics

Page 18: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1918 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Predicting end-of-utterance in Japanese

Yuichi Ishimoto

Projectability of transition-relevance places based on prosodic features in spontaneous Japanese conversation

In spontaneous conversations, we can maintain smooth transfers from one speaker to another without gaps. This means that we unconsciously predict the ends of utterances in some way. It is considered that auxiliary verbs (such as /desu/ and /masu/) and sentence-final particles (such as /ne/ and /yo/), which

placed at the end of the sentence as a syntactic factor, indicate the ends of utterances in Japanese. However, we cannot always use the elements to find the ends, because utterances without such elements exist. The aim of this study is to clarify acoustic features for predicting the ends of utterances.

214

Applying Theory (Mathematics) to optimize difficult problems in the real world.

Ken-ichi Kawarabayashi  Richard Hoshino, JSPS Fellow.

The travelling tournament problem – Applications to Japanese Professional Baseball Scheduling

We apply mathematical tools to solve some hard practical problems. For example, we try to create a distance-optimal scheduling for the traveling tournament problem, i.e, each

team plays every other team twice, once at its home and once at away.

215

Extracting desired sound from mixture sound

Nobutaka OnoBlind source separation based on auxiliary function method

In a real environment, various sounds are present and we usually here mixture of them. For example, even if you try to use the speech recognition function of PC, not only your voice but sound from TV close to you may be inputed togather. Even if you try to record the piano performance of

your daughter at a concert, noisy sneezing of a man next to your seat may be recorded together. Aiming to recognize only target signal from mixutre sound, and edit or modify it as you like, we have developed a technique to fast separate mixutre sound into each of source with multiple microphones.

213

Promote world-leading research, education and practice for cutting-edge software engineering

Shinichi HonidenGRACE Center: Center for Global Research in Advanced Software Science and Engineering

GRACE Center is a world-leading software research center in NII engaged in research, education and practical work in alliances with research organizations in Japan and overseas and as part of industry-academia

collaboration. GRACE center seeks to put in place the foundations of 21st century software, while developing world-class researchers and engineers who will go on to play central roles in the next generation.

301

edubase Infrastructure Service for Cutting Edge IT Education

Shigetoshi Yokoyama  Nobukazu Yoshioka, Masaru Nagaku

cultivation of engineers who will create future e-Society

GRACE Center provides edubase Cloud, Space for education environment for IT specialist, and Portal as a portal site aimed at continuously disseminating and developing good IT educat ional mater ia ls . These

services aim at cultivating the leading IT specialists who have the abi l i ty to take the ini t iat ive in software development in companies and other entities.

303

How to embed Security in Software?

Nobukazu YoshiokaResearch on Development Methods for Secure Software

The security has a great affect on modern society, as exemplified by personal information leakages and attacks on systems in recent years. Compared to other types of products and infrastructures, the technologies to enhance the security of information systems

have not yet reached the stage of being adequate.This research aims to integrate security into software development methods to establish security software engineering technologies.

304

Toward Reliable and Efficient Web System Developments

Shinichi Honiden  Yuta Maezawa, Kazuki Nichiura

Extracting Transition Models of Web Systems Using Static Analysis Techniques

Many applications have been Web ones. Due to these demands, problems rely on early developments of complex Web systems. We propose static analysis techniques to extract transition models from Web systems. With these models, developers can understand

such complex behavior of the systems and f ind erroneous behavior. Additionally, they can leverage page transitions of the systems into view transitions of smartphone applications. Our aim is to support reliable and efficient Web system developments.

305

Scientifically Derive and Ensure Quality of Software

Shinichi Honiden  Yoshinori Tanabe, Fuyuki Ishikawa, Jiang Fan, Tsutomu Kobayashi

Formal Methods for Reliable and Efficient Software Development

Our research is focusing on Formal Methods for re l i ab le and e f f i c ien t so f tware deve lopment , i n pa r t icu la r on a Method fo r Get t ing T raceab i l i t y between Speci f icat ion in Natura l Language and

Re f i n emen t - b a s e d F o rma l S p ec i f i c a t i o n , a n d Automated Code Generat ion f rom Descr ipt ion of Function Definitions on Theorem Proving.

306

Deliver Scientific Approaches to the Field of Manifacturing

Shinichi Honiden  Yoshinori Tanabe, Nobukazu Yoshioka, Fuyuki Ishikawa

TopSE: Intellectual Manufacturing Education Program based on Science

The Top SE Project is a practical education program aiming to cul t ivate sof tware engineers who have acquired highly advanced development techniques based on the concept, “intellectual manufacturing education

based on science.” The students experience application of learnt techniques to practical problems through their graduation studies, in addition to lectures provided by professionals from universities and companies.

302

Dealing with the research issues in software /hardware architectures for human life.

BioCaster : Global Media Monitoring for Public Health Protection

Nigel Collier  Son Doan, VO Ho Bao Khanh, Shang Shu

Near real time public health protection with DIZIE and BioCaster

Making a rapid and timely response to disasters requires high quality information. The Internet is a low cost, real time and plentiful information source that is now used in publ ic health protect ion systems. The JST funded BioCaster project detects infectious disease outbreaks and chemical and radionuclear releases using news

media reports. We have expanded the system’s capability to 12 languages and over 300 types of diseases/hazards. DIZIE, funded by NII’s Grand Challenge fund, extends our work by looking for early signs of human health problems in Twitter. We report high correlation with gold standard data for influenza from CDC.

216

Let’s Hypothesize and Reason!

Katsumi Inoue  Tomoya Tanjo, Takehide Soh, Andrei Doncescu, Nicolas Maudet

Hypothesizing by Meta-level Abduction and Constraint Solving by Efficient Reasoning Engines

We show a framework to discover unknown patterns, laws, and information from databases using logic-based Artificial Intelligence. Given a new observation, it is necessary to make a hypothesis that is accommodated to the existing knowledge. In this research, we will clarify the principle of

hypothesis formation and apply it to discovery of scientific knowledge. We wil l also propose methods to solve arithmetic constraints by using SAT solvers as efficient reasoning engines. Here we demonstrate our approaches to analyze metabolic pathways of Escherichia coli.

217

Information Systems Architecture

Page 19: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

1918 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Predicting end-of-utterance in Japanese

Yuichi Ishimoto

Projectability of transition-relevance places based on prosodic features in spontaneous Japanese conversation

In spontaneous conversations, we can maintain smooth transfers from one speaker to another without gaps. This means that we unconsciously predict the ends of utterances in some way. It is considered that auxiliary verbs (such as /desu/ and /masu/) and sentence-final particles (such as /ne/ and /yo/), which

placed at the end of the sentence as a syntactic factor, indicate the ends of utterances in Japanese. However, we cannot always use the elements to find the ends, because utterances without such elements exist. The aim of this study is to clarify acoustic features for predicting the ends of utterances.

214

Applying Theory (Mathematics) to optimize difficult problems in the real world.

Ken-ichi Kawarabayashi  Richard Hoshino, JSPS Fellow.

The travelling tournament problem – Applications to Japanese Professional Baseball Scheduling

We apply mathematical tools to solve some hard practical problems. For example, we try to create a distance-optimal scheduling for the traveling tournament problem, i.e, each

team plays every other team twice, once at its home and once at away.

215

Extracting desired sound from mixture sound

Nobutaka OnoBlind source separation based on auxiliary function method

In a real environment, various sounds are present and we usually here mixture of them. For example, even if you try to use the speech recognition function of PC, not only your voice but sound from TV close to you may be inputed togather. Even if you try to record the piano performance of

your daughter at a concert, noisy sneezing of a man next to your seat may be recorded together. Aiming to recognize only target signal from mixutre sound, and edit or modify it as you like, we have developed a technique to fast separate mixutre sound into each of source with multiple microphones.

213

Promote world-leading research, education and practice for cutting-edge software engineering

Shinichi HonidenGRACE Center: Center for Global Research in Advanced Software Science and Engineering

GRACE Center is a world-leading software research center in NII engaged in research, education and practical work in alliances with research organizations in Japan and overseas and as part of industry-academia

collaboration. GRACE center seeks to put in place the foundations of 21st century software, while developing world-class researchers and engineers who will go on to play central roles in the next generation.

301

edubase Infrastructure Service for Cutting Edge IT Education

Shigetoshi Yokoyama  Nobukazu Yoshioka, Masaru Nagaku

cultivation of engineers who will create future e-Society

GRACE Center provides edubase Cloud, Space for education environment for IT specialist, and Portal as a portal site aimed at continuously disseminating and developing good IT educat ional mater ia ls . These

services aim at cultivating the leading IT specialists who have the abi l i ty to take the ini t iat ive in software development in companies and other entities.

303

How to embed Security in Software?

Nobukazu YoshiokaResearch on Development Methods for Secure Software

The security has a great affect on modern society, as exemplified by personal information leakages and attacks on systems in recent years. Compared to other types of products and infrastructures, the technologies to enhance the security of information systems

have not yet reached the stage of being adequate.This research aims to integrate security into software development methods to establish security software engineering technologies.

304

Toward Reliable and Efficient Web System Developments

Shinichi Honiden  Yuta Maezawa, Kazuki Nichiura

Extracting Transition Models of Web Systems Using Static Analysis Techniques

Many applications have been Web ones. Due to these demands, problems rely on early developments of complex Web systems. We propose static analysis techniques to extract transition models from Web systems. With these models, developers can understand

such complex behavior of the systems and f ind erroneous behavior. Additionally, they can leverage page transitions of the systems into view transitions of smartphone applications. Our aim is to support reliable and efficient Web system developments.

305

Scientifically Derive and Ensure Quality of Software

Shinichi Honiden  Yoshinori Tanabe, Fuyuki Ishikawa, Jiang Fan, Tsutomu Kobayashi

Formal Methods for Reliable and Efficient Software Development

Our research is focusing on Formal Methods for re l i ab le and e f f i c ien t so f tware deve lopment , i n pa r t icu la r on a Method fo r Get t ing T raceab i l i t y between Speci f icat ion in Natura l Language and

Re f i n emen t - b a s e d F o rma l S p ec i f i c a t i o n , a n d Automated Code Generat ion f rom Descr ipt ion of Function Definitions on Theorem Proving.

306

Deliver Scientific Approaches to the Field of Manifacturing

Shinichi Honiden  Yoshinori Tanabe, Nobukazu Yoshioka, Fuyuki Ishikawa

TopSE: Intellectual Manufacturing Education Program based on Science

The Top SE Project is a practical education program aiming to cul t ivate sof tware engineers who have acquired highly advanced development techniques based on the concept, “intellectual manufacturing education

based on science.” The students experience application of learnt techniques to practical problems through their graduation studies, in addition to lectures provided by professionals from universities and companies.

302

Dealing with the research issues in software /hardware architectures for human life.

BioCaster : Global Media Monitoring for Public Health Protection

Nigel Collier  Son Doan, VO Ho Bao Khanh, Shang Shu

Near real time public health protection with DIZIE and BioCaster

Making a rapid and timely response to disasters requires high quality information. The Internet is a low cost, real time and plentiful information source that is now used in publ ic health protect ion systems. The JST funded BioCaster project detects infectious disease outbreaks and chemical and radionuclear releases using news

media reports. We have expanded the system’s capability to 12 languages and over 300 types of diseases/hazards. DIZIE, funded by NII’s Grand Challenge fund, extends our work by looking for early signs of human health problems in Twitter. We report high correlation with gold standard data for influenza from CDC.

216

Let’s Hypothesize and Reason!

Katsumi Inoue  Tomoya Tanjo, Takehide Soh, Andrei Doncescu, Nicolas Maudet

Hypothesizing by Meta-level Abduction and Constraint Solving by Efficient Reasoning Engines

We show a framework to discover unknown patterns, laws, and information from databases using logic-based Artificial Intelligence. Given a new observation, it is necessary to make a hypothesis that is accommodated to the existing knowledge. In this research, we will clarify the principle of

hypothesis formation and apply it to discovery of scientific knowledge. We wil l also propose methods to solve arithmetic constraints by using SAT solvers as efficient reasoning engines. Here we demonstrate our approaches to analyze metabolic pathways of Escherichia coli.

217

Information Systems Architecture

Page 20: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2120 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

ULP-HPC: Ultra-Low-Power High-Performance Computing

Michihiro Koibuchi  Ikki FujiwaraInterconnection Techniques for ULP-HPC

The power consumption of high-performance computing (HPC) becomes a limiting factor to develop HPC systems, as the performance is improved. We have proposed the ULP (Ultra Low Power)-HPC that will improve by 1,000 times the power

efficiency by 10 years in collaboration with Tokyo Institute of Technology, U of Tokyo, and U of Electro-Communications. This study proposes and evaluates interconnection technique that is one of main components of the ULP-HPC. 

307

Facing up to the complexity of software-intensive systems

Shin NakajimaSoftware Engineering – Scientific Approach to Complexity

No definite way is found to reduce the complexity of sof tware- intensive systems, which resul ts in low reliability of them. The problem of their complexity becomes a major risk of our daily life as such systems

are geared to p rov id ing new serv ices in d iverse appl icat ion sectors . Looking in to sources of the complexity is the sole way to start with. Some of the on-going efforts will be discussed.

309

Constructing networks on chips

Tomohiro Yoneda  Chammika Mannakkara , Vijay HolimathImplementing automotive control systems based on dependable Network-on-Chip architecture

In automotive control systems, many and various types of ECUs (Electronic Control Units) are used and placed everywhere in automobiles. This causes serious problems such that the weight of the connection cable reaches tens of kilos, and thus the running fuel cost

and the manufacturing cost are badly affected. This research project will develop a new centralized and dependable approach where many ECUs are contained in one chip using dependable Network-on-Chip architecture, with only sensors and actuators left in original places.

310

A Proposal of Database Architecture Facing Info-Plosion

Shoichiro Asano  Junji Yamada (The University of Tokyo)

Data Structure for the Key-Value Store applied to SSD

Recently, fast and large capacity SSD has been applied to large database such as Key-Value Store. However, from the nature of NAND Flash memories, performance

improvement on write operation still needs researches. We propose an efficient and fast index structure using Bloom Filters in order to assist sequential write on SSD.

318Software Evolution with Bidirectional Transformation

Zhenjiang Hu  Soichiro Hidaka, Hiroyuki Kato, Kazuyuki Asada, Keisuke Nakano, Isao SasanoResearch on Software Development based on Bidirectional Model Transformation

Model transformations are a key element in the OMG's Model Driven Development agenda, providing a standard way to represent and transform software artifacts such as requirements, design models, program code, tests, configuration files, and documentation in software development. However, after a transformation is applied, the source and the target models usually co-exist and evolve

independently. How to propagate modifications correctly across models in different formats and guarantee system consistency remains an open problem. This project aims to solve this problem based on bidirectional model transformation. The success of the project would lead to a novel formal method for evolutionary software development, and a trusty tool for artifact synchronization.

312

Make an Internet that safely uses non-visible information in addition to its protect

Michihiro Koibuchi  Shin-ichi Ishida, Koichi Inoue, Ikki Fujiwara, Hideyuki Kawashima (U of Tsukuba), Masashi Tadokoro (NTT), Keisuke Iwasaki (Hitachi JTE), Hiroaki Nishi (Keio U)

An Internet router that receives, shares, and sends valuable information

Web , senso r i n fo rma t i on , mach ines and th i ngs communicate each other via Internet. To safely integrate and utilize a rich variety of valuable information, we

research a service-oriented router that receives, shares, and sends open information in addit ion to packet transfer.

308

High level Parallel Programming

Zhenjiang Hu  Yu Liu

Screwdriver: A Parallelism-Oblivious MapReduce Programming Framework

Goog l e ' s MapReduce i s a u s e f u l a nd popu l a r programming model for data-intensive distributed parallel computing. But how to systematically develop and optimize parallel programs with MapReduce remains as a challenge. We propose a high-level framework for systematically developing MapReduce programs, making

use of the calculational theory of semiring-fusion. In this framework, users focus on writing specification of their problems, and then an efficient parallel algorithm can be automatically derived and implemented as a MapReduce program. With this, users need neither to care about parallelism nor to have deep knowledge of MapReduce.

313

Securing mobile devices

Stephan Sigg  Ngu Nguyen , An Huynh , Yusheng Ji

Using ambient audio in secure mobile phone communication

We study the use of ambient audio as a seed to non-interactively and communication-free generate a secure cryptographic key among mobile distributed devices. We have implemented an ambient audio-based secure device pairing on android mobile phones. This poster discusses practical problems we encountered

r e l a t e d t o h a r d w a r e , e n v i r o nm e n t a n d t i m e synchronisation, introduces approaches for feature generation and details results from our experimental case studies. In the case studies, we consider the impact of inter -device distance on the qual i ty of generated keys.

315

Toward Share Infrastructure for Digitalizing Physical World

Kenji Tei  Susumu Toriumi, Valentina Baljak, Ryo Shimizu

Shared Multi Modal Sensor Network

Multimodal sensor network has much attracts as a shared infrastructure for collecting sensor data about space in the real world. In this poster presentation, we introduce research topics related to the multimodal

sensor network; 1) self-diagnosis of data failure to improve quality of sensor data, 2) self-adaptive task allocation for multimodal sensor network, and 3) software development process for multimodal sensor network.

316

Ichiro SatohSolutions to Environmental Problems By Computer Science

By computer science, we try to solve problems in the real world, e.g., the reduction of fuel consumption and CO2 em i s s i on by p r og r amming l anguages and

code-optimization in compilers, and small and easy CO2 emission trading.

317

Graph transformation that can propagate modifications bidirectionally

Soichiro Hidaka  Zhenjiang Hu, Kazuyuki Asada, Hiroyuki Kato, Kazutaka Matsuda (Tohoku University), Keisuke Nakano (University of Electro-Communicaions), Isao Sasano (Shibaura Institute of Technology)

Bidirectionalization of Graph Transformation and its Application to Bidirectional Model Transformation

Model transformation in model-driven software development plays an important role in formal treatment of development process. I t has been considered diff icult to realize in a systematic manner in the development process to compose la rger t rans fo rmat ion f rom smal l t rans fo rmat ions and propagating modification to the model in both direction (not

only from source to destination but also backwards), due to the complexity in the process. We cope with this problem by bidirectionalizing an existing graph transformation language that is already compositional and has clear formal semantics. The proved wel l -behavedness of our system enhances robustness of software development process.

311

Parallel Processing of Large Graphs

Zhenjiang Hu  Yu LIU, Tao Zan

Automatic Parallelization of Graph Queries with MapReduce

How to parallel a graph query is a nontrivial problem. Here we give an approach to parallel graph query such that query can be computed efficiently. Our approach is based on an well known graph query language called UnQL. UnQL is a language

for querying semistructured graph database. But normal queries can not be parallelized directly. Here we give a suitable set of queries which can be decomposed. Then compute these queries using MapReduce framework in highly parallel way.

314

Page 21: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2120 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

ULP-HPC: Ultra-Low-Power High-Performance Computing

Michihiro Koibuchi  Ikki FujiwaraInterconnection Techniques for ULP-HPC

The power consumption of high-performance computing (HPC) becomes a limiting factor to develop HPC systems, as the performance is improved. We have proposed the ULP (Ultra Low Power)-HPC that will improve by 1,000 times the power

efficiency by 10 years in collaboration with Tokyo Institute of Technology, U of Tokyo, and U of Electro-Communications. This study proposes and evaluates interconnection technique that is one of main components of the ULP-HPC. 

307

Facing up to the complexity of software-intensive systems

Shin NakajimaSoftware Engineering – Scientific Approach to Complexity

No definite way is found to reduce the complexity of sof tware- intensive systems, which resul ts in low reliability of them. The problem of their complexity becomes a major risk of our daily life as such systems

are geared to p rov id ing new serv ices in d iverse appl icat ion sectors . Looking in to sources of the complexity is the sole way to start with. Some of the on-going efforts will be discussed.

309

Constructing networks on chips

Tomohiro Yoneda  Chammika Mannakkara , Vijay HolimathImplementing automotive control systems based on dependable Network-on-Chip architecture

In automotive control systems, many and various types of ECUs (Electronic Control Units) are used and placed everywhere in automobiles. This causes serious problems such that the weight of the connection cable reaches tens of kilos, and thus the running fuel cost

and the manufacturing cost are badly affected. This research project will develop a new centralized and dependable approach where many ECUs are contained in one chip using dependable Network-on-Chip architecture, with only sensors and actuators left in original places.

310

A Proposal of Database Architecture Facing Info-Plosion

Shoichiro Asano  Junji Yamada (The University of Tokyo)

Data Structure for the Key-Value Store applied to SSD

Recently, fast and large capacity SSD has been applied to large database such as Key-Value Store. However, from the nature of NAND Flash memories, performance

improvement on write operation still needs researches. We propose an efficient and fast index structure using Bloom Filters in order to assist sequential write on SSD.

318Software Evolution with Bidirectional Transformation

Zhenjiang Hu  Soichiro Hidaka, Hiroyuki Kato, Kazuyuki Asada, Keisuke Nakano, Isao SasanoResearch on Software Development based on Bidirectional Model Transformation

Model transformations are a key element in the OMG's Model Driven Development agenda, providing a standard way to represent and transform software artifacts such as requirements, design models, program code, tests, configuration files, and documentation in software development. However, after a transformation is applied, the source and the target models usually co-exist and evolve

independently. How to propagate modifications correctly across models in different formats and guarantee system consistency remains an open problem. This project aims to solve this problem based on bidirectional model transformation. The success of the project would lead to a novel formal method for evolutionary software development, and a trusty tool for artifact synchronization.

312

Make an Internet that safely uses non-visible information in addition to its protect

Michihiro Koibuchi  Shin-ichi Ishida, Koichi Inoue, Ikki Fujiwara, Hideyuki Kawashima (U of Tsukuba), Masashi Tadokoro (NTT), Keisuke Iwasaki (Hitachi JTE), Hiroaki Nishi (Keio U)

An Internet router that receives, shares, and sends valuable information

Web , senso r i n fo rma t i on , mach ines and th i ngs communicate each other via Internet. To safely integrate and utilize a rich variety of valuable information, we

research a service-oriented router that receives, shares, and sends open information in addit ion to packet transfer.

308

High level Parallel Programming

Zhenjiang Hu  Yu Liu

Screwdriver: A Parallelism-Oblivious MapReduce Programming Framework

Goog l e ' s MapReduce i s a u s e f u l a nd popu l a r programming model for data-intensive distributed parallel computing. But how to systematically develop and optimize parallel programs with MapReduce remains as a challenge. We propose a high-level framework for systematically developing MapReduce programs, making

use of the calculational theory of semiring-fusion. In this framework, users focus on writing specification of their problems, and then an efficient parallel algorithm can be automatically derived and implemented as a MapReduce program. With this, users need neither to care about parallelism nor to have deep knowledge of MapReduce.

313

Securing mobile devices

Stephan Sigg  Ngu Nguyen , An Huynh , Yusheng Ji

Using ambient audio in secure mobile phone communication

We study the use of ambient audio as a seed to non-interactively and communication-free generate a secure cryptographic key among mobile distributed devices. We have implemented an ambient audio-based secure device pairing on android mobile phones. This poster discusses practical problems we encountered

r e l a t e d t o h a r d w a r e , e n v i r o nm e n t a n d t i m e synchronisation, introduces approaches for feature generation and details results from our experimental case studies. In the case studies, we consider the impact of inter -device distance on the qual i ty of generated keys.

315

Toward Share Infrastructure for Digitalizing Physical World

Kenji Tei  Susumu Toriumi, Valentina Baljak, Ryo Shimizu

Shared Multi Modal Sensor Network

Multimodal sensor network has much attracts as a shared infrastructure for collecting sensor data about space in the real world. In this poster presentation, we introduce research topics related to the multimodal

sensor network; 1) self-diagnosis of data failure to improve quality of sensor data, 2) self-adaptive task allocation for multimodal sensor network, and 3) software development process for multimodal sensor network.

316

Ichiro SatohSolutions to Environmental Problems By Computer Science

By computer science, we try to solve problems in the real world, e.g., the reduction of fuel consumption and CO2 em i s s i on by p r og r amming l anguages and

code-optimization in compilers, and small and easy CO2 emission trading.

317

Graph transformation that can propagate modifications bidirectionally

Soichiro Hidaka  Zhenjiang Hu, Kazuyuki Asada, Hiroyuki Kato, Kazutaka Matsuda (Tohoku University), Keisuke Nakano (University of Electro-Communicaions), Isao Sasano (Shibaura Institute of Technology)

Bidirectionalization of Graph Transformation and its Application to Bidirectional Model Transformation

Model transformation in model-driven software development plays an important role in formal treatment of development process. I t has been considered diff icult to realize in a systematic manner in the development process to compose la rger t rans fo rmat ion f rom smal l t rans fo rmat ions and propagating modification to the model in both direction (not

only from source to destination but also backwards), due to the complexity in the process. We cope with this problem by bidirectionalizing an existing graph transformation language that is already compositional and has clear formal semantics. The proved wel l -behavedness of our system enhances robustness of software development process.

311

Parallel Processing of Large Graphs

Zhenjiang Hu  Yu LIU, Tao Zan

Automatic Parallelization of Graph Queries with MapReduce

How to parallel a graph query is a nontrivial problem. Here we give an approach to parallel graph query such that query can be computed efficiently. Our approach is based on an well known graph query language called UnQL. UnQL is a language

for querying semistructured graph database. But normal queries can not be parallelized directly. Here we give a suitable set of queries which can be decomposed. Then compute these queries using MapReduce framework in highly parallel way.

314

Page 22: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2322 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

How do we tweet?

Keizo Oyama  Shuichi NakawataseAnalysis of the submission process to miniblog

407

What comes out content analysis of academic papers?

Akiko Aizawa  Li Yuan, Akihiro Kameda, Kiyoko Uchiyama

Linking an abstract with paragraph in full-text, and extracting semantic relations between papers and concepts for a deep understanding of academic papers

Two fundamenta l researches fo r a deep and e f f ic ien t understanding of academic papers based on content analysis are introduced. (1) Research for displaying the corresponding paragraph in reading an abstract. To help researchers find the content that they might be interested in, we can link every

sentence in abstract with its corresponding paragraph in the ful l - text of an art icle. (2)Research on semantic relat ion extraction: semantic relations between academic papers and concepts are extracted from an analysis that focuses on related work descriptions in papers based on lexico-syntactic patterns.

411

Computer aided understanding of mathematical expressions

Akiko Aizawa  Minh-Quoc Nghiem, Giovanni Yoko Kristianto, Yuichiro Matsubayashi

Text processing and retrieval techniques to support information access to mathematical content

Mathematical formulae often play an essential role in scientific information dissemination. However, due to their unique representations, mathematical formulae can hardly be manipulated with existing text processing techniques. Based on this, we introduce our attempt to assist retrieval and unde rs tand ing o f ma themat ica l con ten t . Ou r

presentation include such topics as: extracting definitions of mathematical formulae by analyzing surrounding natural language text; semantic analysis of mathematical formulae using a statistical machine translation-based method; and also our recent attempt to construct a new evaluation dataset for mathematical content access.

412

How to use the knowledge hidden in Micro-blog data?

Hao Han

Analysis of user browsing behavior and application of mass knowledge based on social media data

We study the news browsing behavior on the micro-blog comparing to usual Web based on the analysis of net view data and twitter data. We also present various

appl icat ions of the mass knowledge/informat ion acquired from social media data.

408

Science of reading behavior: how and what do you read?

Akiko Aizawa  Hara, Pascual Martinez-Gomez, Chen Chen, Tomita, KanoText analysis and reading assistance based on reader’s eye-movement information

How does human r ead t e x t s , and wha t t ypes o f information does he/she obtain to understand the content of the texts? The aim of our research is to answer these questions by matching reader’s eye-movement information

with semantic structures of sentences, and consequently to achieve deeper text analysis or to bring more useful assistance to human reading. Our presentation wil l introduce ongoing research activities in our group.

410

Quality-Assured Service Combinations in the Era of "From Owning to Using''

Fuyuki Ishikawa  Ryuichi Takahashi, Adrian Klein, Florian WagnerQuality Analysis and Assurance in Combinations of Services and Clouds

More and more systems are constructed by leveraging web services and clouds provided by external parties. Our research tackles problems in quality analysis and

assurance of service combinations involved in such systems, from both viewpoints of artificial intelligence and software engineering.

401

Can rays go through walls and pillars by image processing?

Kazuya Kodama  Takashi SakamotoLight field processing and effective compression based on decomposition of blurs

When we would like to reuse inexpensive but narrow spaces for cultural activities such as plays, concerts and movies, our sight is often limited significantly by pillars and walls. However, in the near future, Japanese cities should be much

more compact by reusing them effectively because of our population composition. We introduce novel technologies of image processing for light field transmission beyond pillars and walls, which enable us to solve the visual problems.

404

How dose informatics support discussions in sign language?

Kouhei KikuchiBuilding database of academic language for sign language

The goal of this project is to collect various types of academic language/technical terms from a range of research fields and to appropriately find equivalent expressions in Japanese Sign Language. In recent years, as Deaf people increasingly

participate in academic fields, they discuss various subjects by directly using a lot of technical terms that are originally expressed by verbal or text. This project creates a database to appropriately translate various technical terms in sign language.

405

How do Information Technologies Capture “Living Language” ?

Mayumi Bono  Kouhei Kikuchi

Building Japanese Sign Language Corpus:An Approach to Changing Language Awareness Between Deaf and Hearing

The goal of this project is to create a corpus of JSL in order to offer a research environment where we treat JSL as a resource for linguistic studies. In Japan, we have a natural language other than spoken Japanese, that is, Japanese Sign Language (JSL). Recent studies recognize a sign language as an independent

language. Corpora of various sign languages have been built and studied around the world. Because sign language does not have its own written system, the language is changing rapidly its structure and use in the Deaf community. Therefore, it is an important task to keep a record of the language for the future.

406

How do children assess the risk of websites?

Isao Echizen  Tomoko KajiyamaA visualization method to assess the risk of websites

Since children cannot live in a safe cyberspace environment forever, they should be taught how to identify risky websites. An effective approach to helping children assess website risk is to provide an environment in which children can better assess a website’s features and determine for themselves the risk of accessing the site.

We have now developed a visualization system applying our r ing-structured graphical search interface for mult i - faceted metadata. This system has a high possibility to help children understand website features and thereby identify risky websites by operating search facets for websites' appearance and structure.

402

NoE on Social Project Management

Andres Frederic  Rajkumar Kannan, Asanee Kawatrakul, Kenneth Brown, William Grosky, Epaminondas Kapetanios, Fernando Ferri, Jarbas Lopes Cardoso

COMMUNIGRAM-NET

COMMUNIGRAM-NET is a Network of Excellence (NoE), which aims at integrating research and best practices that is currently conducted by leading research groups and educational organisations in the field of Social Project

Management. Collaboration in the field of social project management, collective intelligence and knowledge creation is in the core of the COMMUNIGRAM-NET Network of Excellence.

403

Research on video compression and network transport

Gene CheungConnecting the world with immersive visual communication

Modern video systems, capable of capturing time-synchronized images from multiple viewpoints, show potential of enabling new immersive user experience. However, the dramatic increase in required transmission bandwidth remains a practical

difficulty. In this research, to realize networked immersive visual communication, we focus on three themes: 3D video representation & compression, loss- and delay-resilient video transport, and real-time interactive video customization.

409

Digital Content and Media SciencesConducting researches on various types of media, such as text and video in terms ofanalysis, creation, compilation and application which makes our life better.

Page 23: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2322 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

How do we tweet?

Keizo Oyama  Shuichi NakawataseAnalysis of the submission process to miniblog

407

What comes out content analysis of academic papers?

Akiko Aizawa  Li Yuan, Akihiro Kameda, Kiyoko Uchiyama

Linking an abstract with paragraph in full-text, and extracting semantic relations between papers and concepts for a deep understanding of academic papers

Two fundamenta l researches fo r a deep and e f f ic ien t understanding of academic papers based on content analysis are introduced. (1) Research for displaying the corresponding paragraph in reading an abstract. To help researchers find the content that they might be interested in, we can link every

sentence in abstract with its corresponding paragraph in the ful l - text of an art icle. (2)Research on semantic relat ion extraction: semantic relations between academic papers and concepts are extracted from an analysis that focuses on related work descriptions in papers based on lexico-syntactic patterns.

411

Computer aided understanding of mathematical expressions

Akiko Aizawa  Minh-Quoc Nghiem, Giovanni Yoko Kristianto, Yuichiro Matsubayashi

Text processing and retrieval techniques to support information access to mathematical content

Mathematical formulae often play an essential role in scientific information dissemination. However, due to their unique representations, mathematical formulae can hardly be manipulated with existing text processing techniques. Based on this, we introduce our attempt to assist retrieval and unde rs tand ing o f ma themat ica l con ten t . Ou r

presentation include such topics as: extracting definitions of mathematical formulae by analyzing surrounding natural language text; semantic analysis of mathematical formulae using a statistical machine translation-based method; and also our recent attempt to construct a new evaluation dataset for mathematical content access.

412

How to use the knowledge hidden in Micro-blog data?

Hao Han

Analysis of user browsing behavior and application of mass knowledge based on social media data

We study the news browsing behavior on the micro-blog comparing to usual Web based on the analysis of net view data and twitter data. We also present various

appl icat ions of the mass knowledge/informat ion acquired from social media data.

408

Science of reading behavior: how and what do you read?

Akiko Aizawa  Hara, Pascual Martinez-Gomez, Chen Chen, Tomita, KanoText analysis and reading assistance based on reader’s eye-movement information

How does human r ead t e x t s , and wha t t ypes o f information does he/she obtain to understand the content of the texts? The aim of our research is to answer these questions by matching reader’s eye-movement information

with semantic structures of sentences, and consequently to achieve deeper text analysis or to bring more useful assistance to human reading. Our presentation wil l introduce ongoing research activities in our group.

410

Quality-Assured Service Combinations in the Era of "From Owning to Using''

Fuyuki Ishikawa  Ryuichi Takahashi, Adrian Klein, Florian WagnerQuality Analysis and Assurance in Combinations of Services and Clouds

More and more systems are constructed by leveraging web services and clouds provided by external parties. Our research tackles problems in quality analysis and

assurance of service combinations involved in such systems, from both viewpoints of artificial intelligence and software engineering.

401

Can rays go through walls and pillars by image processing?

Kazuya Kodama  Takashi SakamotoLight field processing and effective compression based on decomposition of blurs

When we would like to reuse inexpensive but narrow spaces for cultural activities such as plays, concerts and movies, our sight is often limited significantly by pillars and walls. However, in the near future, Japanese cities should be much

more compact by reusing them effectively because of our population composition. We introduce novel technologies of image processing for light field transmission beyond pillars and walls, which enable us to solve the visual problems.

404

How dose informatics support discussions in sign language?

Kouhei KikuchiBuilding database of academic language for sign language

The goal of this project is to collect various types of academic language/technical terms from a range of research fields and to appropriately find equivalent expressions in Japanese Sign Language. In recent years, as Deaf people increasingly

participate in academic fields, they discuss various subjects by directly using a lot of technical terms that are originally expressed by verbal or text. This project creates a database to appropriately translate various technical terms in sign language.

405

How do Information Technologies Capture “Living Language” ?

Mayumi Bono  Kouhei Kikuchi

Building Japanese Sign Language Corpus:An Approach to Changing Language Awareness Between Deaf and Hearing

The goal of this project is to create a corpus of JSL in order to offer a research environment where we treat JSL as a resource for linguistic studies. In Japan, we have a natural language other than spoken Japanese, that is, Japanese Sign Language (JSL). Recent studies recognize a sign language as an independent

language. Corpora of various sign languages have been built and studied around the world. Because sign language does not have its own written system, the language is changing rapidly its structure and use in the Deaf community. Therefore, it is an important task to keep a record of the language for the future.

406

How do children assess the risk of websites?

Isao Echizen  Tomoko KajiyamaA visualization method to assess the risk of websites

Since children cannot live in a safe cyberspace environment forever, they should be taught how to identify risky websites. An effective approach to helping children assess website risk is to provide an environment in which children can better assess a website’s features and determine for themselves the risk of accessing the site.

We have now developed a visualization system applying our r ing-structured graphical search interface for mult i - faceted metadata. This system has a high possibility to help children understand website features and thereby identify risky websites by operating search facets for websites' appearance and structure.

402

NoE on Social Project Management

Andres Frederic  Rajkumar Kannan, Asanee Kawatrakul, Kenneth Brown, William Grosky, Epaminondas Kapetanios, Fernando Ferri, Jarbas Lopes Cardoso

COMMUNIGRAM-NET

COMMUNIGRAM-NET is a Network of Excellence (NoE), which aims at integrating research and best practices that is currently conducted by leading research groups and educational organisations in the field of Social Project

Management. Collaboration in the field of social project management, collective intelligence and knowledge creation is in the core of the COMMUNIGRAM-NET Network of Excellence.

403

Research on video compression and network transport

Gene CheungConnecting the world with immersive visual communication

Modern video systems, capable of capturing time-synchronized images from multiple viewpoints, show potential of enabling new immersive user experience. However, the dramatic increase in required transmission bandwidth remains a practical

difficulty. In this research, to realize networked immersive visual communication, we focus on three themes: 3D video representation & compression, loss- and delay-resilient video transport, and real-time interactive video customization.

409

Digital Content and Media SciencesConducting researches on various types of media, such as text and video in terms ofanalysis, creation, compilation and application which makes our life better.

Page 24: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2524 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Principles of knowledge discovery and data mining

Michael E. HouleThe Illumination Model for Nearest Neighbor Classification

The disciplines of machine learning and data mining continue to grapple with fundamental issues in the area of knowledge representation. Many important tasks in data analysis, such as similarity search, classification, and clustering, depend on the interplay between data features and similarity measures. This presentation introduces a

new model of nearest neighbor classification that starts from the premise that featurization should be scale invariant. Under this premise, the influence of individual training points on the classification can be shown to resemble many physical phenomena, most notably the way in which light sources combine to illuminate objects.

420

Fluorescence: Common Phenomena observed in Many Objects

Imari Satoh  Han Shuai , Takahiro Okabe, Yoichi Sato (University of Tokyo)Modeling Reality based on Fluorescent Components

Fluorescence is a very common phenomenon observed in many objects, from natural gems and corals, to many kinds of paper we write on, and even our clothes. We show that the color appearance of such objects seen under different lighting can be represented as a l inear combinat ion o f re f lect ive and

fluorescent components. The linear model enables us to effectively separate these two components using images taken under two different unknown illuminations. We also propose a novel technique called bispectral photometric stereo that makes an effective use of fluorescence for shape reconstruction.

422

Efficient identification of patterns in data

Michael Nett  Michael E. Houle, Hisashi Kashima (U.Tokyo)Efficiently Finding Significant Coefficients in Factorized Tensors

Many practical applications in data mining and machine learning use (low-rank) tensor factorizations to infer knowledge in higher-order settings providing large amounts of contextual information. At some stage most approaches face the challenge of extracting a subset of tensor

coefficients considered most significant to the particular application. In this paper we propose and evaluate several algorithms that solve or approximate this optimization problem with respect to a wide class of notions of what constitutes the significance of a coefficient.

421

High fidelity 3D modeling of real objects

Akihiro Sugimoto  Diego ThomasPhotometric metric under unknown lighting for range image registration

We derive a new photometric metric for evaluating the correctness of a given rigid transformation aligning two overlapping range images captured under unknown, distant and general illumination. We estimate the surrounding illumination and albedo values of points of the two range images from the point correspondences induced by the

input transformation. We then synthesize the color of both range images using albedo values transferred using the point correspondences to compute the photometr ic re-projection error. This way allows us to accurately register two range images by finding the transformation that minimizes the photometric re-projection error.

424

How change the research of Cultural Heritage by Digitizing?

Asanobu Kitamoto  Yoko Nishimura, Tomohiro Ikezaki, Victoria López, Kinji OnoDigital Silk Road Project: Digital Archive of Cultural Heritage

The purpose of Digital Silk Road Project is to digitize the cultural heritage of Silk Road, and realize information infrastructure as web sites for researchers and the general public to search and learn. How evolve the system to share

the knowledge obtained by digitizing? As an example, we present our recent results on the construction of Silk Road historical ruins database, to share the new result of discovering historical ruins using digitized old maps.

413

Information for surviving crisis such as typhoons and earthquakes

Asanobu KitamotoCrisis Informatics

Today our lives could be affected by a variety of natural disasters such as typhoons and earthquakes, in addition to other disasters such as nuclear disasters, and people are now seeking ways to obtain information to survive crises. How

can we improve our response to crises through information acquisition, processing, dissemination, and presentation? The poster discusses potential contribution from informatics, which is based on the variety of massive amount of data.

414

416:

419:

417:

Efficient retrieval of similar data items

Xiguo Ma  Michael E. Houle, Michael Nett , Vincent Oria (NJIT) Note : NJIT = New Jersey Institute of Technology

Multi-Step k-Nearest Neighbor Search Using Intrinsic Dimension

Michael Nett  Michael E. Houle, Hisashi Kashima ( U.Tokyo)Fast Similarities in Factorized Tensors

Michael E. Houle  Michael Nett ( U.Tokyo, NII)Rank-Based Similarity Search :Reducing the Dimensional Dependence

Most existing solutions for similarity search fail in handling queries with respect to high-dimensional distance functions or adaptable distance functions. For such situations, multi-step search approaches have been proposed which consist of two stages: filtering and refinement. The filtering stage of the state-of-the-art multi-step search algorithm of Seidl and Kriegel is known to produce the minimum number of candidates needed in order to guarantee a

correct query result; however, it may still produce an unacceptably large number of candidates. We present a heuristic multi-step search algorithm that utilizes a measure of intrinsic dimension, the (generalized) expansion dimension, as the basis of an early termination condition. Experimental results show that our heuristic approach is able to obtain significant improvements while losing very little in the accuracy of the query results.

Researchers currently apply methods and models for higher-order tensors to solve prediction and recommendation problems on moderately-sized data sets involving a small number of modes. However, a significant hindrance in fully realizing the potential of those methods is a lack of scalability on the client side: even when low-rank representations are provided, client applications are quickly

rendered infeasible by the space requirements. We consider the problem of efficiently computing common similarity measures between entities expressed by fibers or slices within a given factorized tensor, based on the linear kernel. We show that after appropriate preprocessing, the linear kernel can be efficiently computed independently of the size and dimensions of the input tensor.

Virtually all known distance-based similarity search indices make use of some form of numerical constraints on similarity values for pruning and selection. The use of numerical constraints can lead to large variations in the numbers of objects examined in the execution of a query, making it difficult to control the execution costs. This presentation introduces a probabilistic data structure for similarity search, the rank cover tree

(RCT), that entirely avoids the use of numerical constraints. The experimental results for the RCT, together with a probabilistic analysis, shows that purely combinatorial methods for similarity search are capable of meeting or exceeding the level of performance of state-of-the-art methods that make use of numerical constraints.

415~417

Jichao Sun  Michael E. Houle, Vincent Oria (NJIT), Shin’ichi SatohKnowledge Propagation in Large Image Databases Using Neighborhood Information

418~419

Effective classification of images

Michael E. Houle  Michael Nett (U.Tokyo), Vincent Oria (NJIT), Shin’ichi Satoh, Jichao Sun(NJIT)Boosting the Efficiency of Target Face Recognition through Image Hybridization

One of the great challenges in security is the ability to efficiently and accurately recognize individuals of interest from images or video streams. Face recognition of target individuals is problematic due to the high-dimensional representations of faces that are necessary for high accuracy, and the need to avoid the erroneous identification of targets.

One popular way of reducing false positive errors is by searching for targets within a large database dominated by control images. In this presentation, we propose techniques for boosting the efficiency of handling identification queries by means of hybridizations between target faces and control faces.

Existing solutions to adding semantic information to an image database are labor intensive and not always accurate. We aim to reduce to a minimum the level of human intervention in the semantic annotation of images while preserving accuracy. Ideally, only one copy of each object of interest would be labeled manual ly , and the labels would then be propagated

automatically to all other occurrences of the objects in the database. To that end, we propose a neighborhood-based influence propagation approach KProp which builds a voting model and propagates the knowledge associated to some objects to similar objects. We applied KProp in classification of three image datasets and provide experimental results.

Drawing visual attention

Akihiro Sugimoto  Aiko HagiwaraGuiding visual attention using saliency-based image editing

The information system that assists human activities involves natural interface with human beings as its important part. Gaze information strongly reflects his/her interest or attention and thus gaze-based interface is promising. In particular, if we can smoothly guide his/her visual attention toward a

target without interrupting his/her current visual attention, the usefulness of gaze-based interface will be highly enhanced. To realize such an interface, this presentation proposes a method for editing an image, given a region in the image, to synthesize an image in which the region is most salient.

423

Page 25: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2524 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Principles of knowledge discovery and data mining

Michael E. HouleThe Illumination Model for Nearest Neighbor Classification

The disciplines of machine learning and data mining continue to grapple with fundamental issues in the area of knowledge representation. Many important tasks in data analysis, such as similarity search, classification, and clustering, depend on the interplay between data features and similarity measures. This presentation introduces a

new model of nearest neighbor classification that starts from the premise that featurization should be scale invariant. Under this premise, the influence of individual training points on the classification can be shown to resemble many physical phenomena, most notably the way in which light sources combine to illuminate objects.

420

Fluorescence: Common Phenomena observed in Many Objects

Imari Satoh  Han Shuai , Takahiro Okabe, Yoichi Sato (University of Tokyo)Modeling Reality based on Fluorescent Components

Fluorescence is a very common phenomenon observed in many objects, from natural gems and corals, to many kinds of paper we write on, and even our clothes. We show that the color appearance of such objects seen under different lighting can be represented as a l inear combinat ion o f re f lect ive and

fluorescent components. The linear model enables us to effectively separate these two components using images taken under two different unknown illuminations. We also propose a novel technique called bispectral photometric stereo that makes an effective use of fluorescence for shape reconstruction.

422

Efficient identification of patterns in data

Michael Nett  Michael E. Houle, Hisashi Kashima (U.Tokyo)Efficiently Finding Significant Coefficients in Factorized Tensors

Many practical applications in data mining and machine learning use (low-rank) tensor factorizations to infer knowledge in higher-order settings providing large amounts of contextual information. At some stage most approaches face the challenge of extracting a subset of tensor

coefficients considered most significant to the particular application. In this paper we propose and evaluate several algorithms that solve or approximate this optimization problem with respect to a wide class of notions of what constitutes the significance of a coefficient.

421

High fidelity 3D modeling of real objects

Akihiro Sugimoto  Diego ThomasPhotometric metric under unknown lighting for range image registration

We derive a new photometric metric for evaluating the correctness of a given rigid transformation aligning two overlapping range images captured under unknown, distant and general illumination. We estimate the surrounding illumination and albedo values of points of the two range images from the point correspondences induced by the

input transformation. We then synthesize the color of both range images using albedo values transferred using the point correspondences to compute the photometr ic re-projection error. This way allows us to accurately register two range images by finding the transformation that minimizes the photometric re-projection error.

424

How change the research of Cultural Heritage by Digitizing?

Asanobu Kitamoto  Yoko Nishimura, Tomohiro Ikezaki, Victoria López, Kinji OnoDigital Silk Road Project: Digital Archive of Cultural Heritage

The purpose of Digital Silk Road Project is to digitize the cultural heritage of Silk Road, and realize information infrastructure as web sites for researchers and the general public to search and learn. How evolve the system to share

the knowledge obtained by digitizing? As an example, we present our recent results on the construction of Silk Road historical ruins database, to share the new result of discovering historical ruins using digitized old maps.

413

Information for surviving crisis such as typhoons and earthquakes

Asanobu KitamotoCrisis Informatics

Today our lives could be affected by a variety of natural disasters such as typhoons and earthquakes, in addition to other disasters such as nuclear disasters, and people are now seeking ways to obtain information to survive crises. How

can we improve our response to crises through information acquisition, processing, dissemination, and presentation? The poster discusses potential contribution from informatics, which is based on the variety of massive amount of data.

414

416:

419:

417:

Efficient retrieval of similar data items

Xiguo Ma  Michael E. Houle, Michael Nett , Vincent Oria (NJIT) Note : NJIT = New Jersey Institute of Technology

Multi-Step k-Nearest Neighbor Search Using Intrinsic Dimension

Michael Nett  Michael E. Houle, Hisashi Kashima ( U.Tokyo)Fast Similarities in Factorized Tensors

Michael E. Houle  Michael Nett ( U.Tokyo, NII)Rank-Based Similarity Search :Reducing the Dimensional Dependence

Most existing solutions for similarity search fail in handling queries with respect to high-dimensional distance functions or adaptable distance functions. For such situations, multi-step search approaches have been proposed which consist of two stages: filtering and refinement. The filtering stage of the state-of-the-art multi-step search algorithm of Seidl and Kriegel is known to produce the minimum number of candidates needed in order to guarantee a

correct query result; however, it may still produce an unacceptably large number of candidates. We present a heuristic multi-step search algorithm that utilizes a measure of intrinsic dimension, the (generalized) expansion dimension, as the basis of an early termination condition. Experimental results show that our heuristic approach is able to obtain significant improvements while losing very little in the accuracy of the query results.

Researchers currently apply methods and models for higher-order tensors to solve prediction and recommendation problems on moderately-sized data sets involving a small number of modes. However, a significant hindrance in fully realizing the potential of those methods is a lack of scalability on the client side: even when low-rank representations are provided, client applications are quickly

rendered infeasible by the space requirements. We consider the problem of efficiently computing common similarity measures between entities expressed by fibers or slices within a given factorized tensor, based on the linear kernel. We show that after appropriate preprocessing, the linear kernel can be efficiently computed independently of the size and dimensions of the input tensor.

Virtually all known distance-based similarity search indices make use of some form of numerical constraints on similarity values for pruning and selection. The use of numerical constraints can lead to large variations in the numbers of objects examined in the execution of a query, making it difficult to control the execution costs. This presentation introduces a probabilistic data structure for similarity search, the rank cover tree

(RCT), that entirely avoids the use of numerical constraints. The experimental results for the RCT, together with a probabilistic analysis, shows that purely combinatorial methods for similarity search are capable of meeting or exceeding the level of performance of state-of-the-art methods that make use of numerical constraints.

415~417

Jichao Sun  Michael E. Houle, Vincent Oria (NJIT), Shin’ichi SatohKnowledge Propagation in Large Image Databases Using Neighborhood Information

418~419

Effective classification of images

Michael E. Houle  Michael Nett (U.Tokyo), Vincent Oria (NJIT), Shin’ichi Satoh, Jichao Sun(NJIT)Boosting the Efficiency of Target Face Recognition through Image Hybridization

One of the great challenges in security is the ability to efficiently and accurately recognize individuals of interest from images or video streams. Face recognition of target individuals is problematic due to the high-dimensional representations of faces that are necessary for high accuracy, and the need to avoid the erroneous identification of targets.

One popular way of reducing false positive errors is by searching for targets within a large database dominated by control images. In this presentation, we propose techniques for boosting the efficiency of handling identification queries by means of hybridizations between target faces and control faces.

Existing solutions to adding semantic information to an image database are labor intensive and not always accurate. We aim to reduce to a minimum the level of human intervention in the semantic annotation of images while preserving accuracy. Ideally, only one copy of each object of interest would be labeled manual ly , and the labels would then be propagated

automatically to all other occurrences of the objects in the database. To that end, we propose a neighborhood-based influence propagation approach KProp which builds a voting model and propagates the knowledge associated to some objects to similar objects. We applied KProp in classification of three image datasets and provide experimental results.

Drawing visual attention

Akihiro Sugimoto  Aiko HagiwaraGuiding visual attention using saliency-based image editing

The information system that assists human activities involves natural interface with human beings as its important part. Gaze information strongly reflects his/her interest or attention and thus gaze-based interface is promising. In particular, if we can smoothly guide his/her visual attention toward a

target without interrupting his/her current visual attention, the usefulness of gaze-based interface will be highly enhanced. To realize such an interface, this presentation proposes a method for editing an image, given a region in the image, to synthesize an image in which the region is most salient.

423

Page 26: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2726 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

How is the result of academic research reported?

Masaki Nishizawa  Yuan SunAcademic research in press reports

504

Olympic Games for Information Access Technology

Noriko Kando  Akiko Aizawa, Daisuke Ishikawa, Hideo Joho, Tsuneaki Kato, Teruko Mitamura, Yusuke Miyao, Douglas Oard, Tetsuya Sakai, Mark Sanderson, Koichi Takeda

NII Testbeds and Community for Information Access Technologies (NTCIR)

Information Access technologies like information retrieval, question answering consist the integral part of social infrastructure for the better human life. NTCIR has been provided large-scale research infrastructure for testing and comparative evaluation to encourage technology

transfer, open, speedup the research and development of these technologies as an international joint research with about 120 research groups from 16 countries. Through the 15-years activities, NTCIR has produced various new challenges and breakthrough of the technological limits.

506

Information, Language and Standards

Akira MiyazawaInternational Standard of Japanese Romanization

Japanese romanization is an old issue. But, recently, a proposal for revision of Japanese romanization standard (ISO 3602) was issued in ISO/TC46 (Information and Documentation). Here,

the history and issues around Japanese romanization are introduced and discussed from the viewpoint of representation of information using characters and languages.

505

Estimating position of vehicles using RFIDs

Togashi Hiroaki  Yamada ShigekiPosition estimation method for moving vehicles using RFIDs

GPS is widely used for estimating position of several objects. However, GPS has problems when it is used for estimating position of vehicles; Its accuracy in height direction is not suff icient and i t cannot estimate

vehicular position in tunnel. Proposed method achieved enough accuracy for estimating which lane the vehicle is running, by placeing RFIDs in high density only on road boundaries (0.5-meter intervals).

601

Cooperative society and reputation.

Takahisa Suzuki  Tetsuro KobayashiHow the social mobility affect the effectiveness of reputation?

Repu t a t i on can be u t i l i z ed t o c r ea t e coope r a t i v e relationships not only in stable relationships such as among office members but in mobile relationships such as with strangers in Web. We investigate the difference of the

effects of reputations between in the stable context and in the mobile context. It shows that effects of using reputations tend to extend personal networks in the stable context and tend to confine personal networks in the mobile context.

603

For stable video-content viewing under rapidly changing environment of content popularity.

Hiroshi Kurose  Yamada Shigeki

Design and Evaluation of Tag Caching Routers Architecture (TCR) with Folksonomy-based Searches

Reputations of computer generated media (CGM) contents tend to propagate to many people very rapidly through popular Social Networking Service (SNS). Content viewing by viewers may be interrupted due to high-loads on servers and networks because many viewers may view popular contents simultaneously. To cope with this problem, we propose a Tag Caching Router

(TCR) architecture that supports folksonomies-based search and content caching for CGM content. The performance of the TCR architecture was evaluated and compared with other existing schemes by performing a simulation for CGM content searches and downloads under a rapidly changing environment of content popularity.

602

How People Search Information

Noriko Kando  Hitomi Egusa, Makiko Miwa, Hitomi Saito, Masao Takaku, Mayumi Toshima, Garkavis Vikotrs, Masaharu Yoshioka

Towards Better Understanding and Support for the User's Exploratory Search

How a user understand, search, learn during search, and so lve the p rob lem? we have tack led on such a fundermental problem under information retrieval through various user experiments. I t is along the research

direction targeting to "SmartIR", which is one of the Six grand challenges proposed at SWIRL 2012, Strategic Workshop on Information Retrieval Research by 50 international IR experts.

507

How to make Internet safe?

Hitoshi OkadaA research on interactive educational material for information security learning.

It is needed for the internet users to learn the knowledge of internet security. This material provides interactive 14 stories acted by 4 cartoon characters of University students. This e-learning material was written by NII

Security Policy Promotion Team, with the help of NII co-research members. We introduce a new content named “Information Resilience Studies” as well.

508

Elucidating the meanings of fictional descriptions

Teruo KoyamaThe Semantics of Fictional Descriptions

From the logical point of view, fictional descriptions have been regarded to be meaningless, because their t ruth value may not be t rue. However, in the real situation, truth values of descriptions are not always

clear, and in abductive inferences, it is important to tread descriptions with uncertain truth values. In this research we d iscuss about the t reatment o f the meanings of fictional descriptions.

502

Environment×body→mind

Nobuhiro Furuyama  Hiroyasu Mssaki,Kentaro Kodama, Wataru Arihisa, Ryosaku MakinoBody-Environment System as a foundation of communication

Although the traditional theory of behavior considers “body” as being governed by a central nervous/command system such as brain or mind, recent findings in motor control and/or human action suggest that body-environment system exhibits spontaneous behavioral pattern. Based on this view

we study coordinated movement within- and between-person, natural conversation and psychotherapeutic counseling.These research projects are meant to contribute to physical, occupational, speech therapy, psychotherapeutic counseling, education, and human-machine interaction.

503

Bringing on researches of connection between social lifeand digital information.

Can a robot get into the University of Tokyo?

Noriko Arai  Akiko Aizawa, Tetsunari Inamura, Takeaki Uno, Noriko Kando, Shinichi Sato, Yusuke Miyao, Ai Kawazoe, Takuya Matsuzaki, Yoshinobu Kano, Ran Tian, Masanori Togashi, Tadayoshi Hara, Hikaru Yokono

A new horizon in informatics opened up by computers getting to the heart of human intelligence required in university entrance exams

We will introduce the NII grand challenge project known as “Can a robot get into the University of Tokyo?” This pro ject a ims to add a new dimension to the cur rent information technology and bring a deeper understanding of

human intelligence, by setting a concrete goal: development of a computer which is able to pass university entrance exams. We will show major difficulties and challenges we are facing, and introduce several promising approaches.

501

Information and Society

Graduate University for Advanced Studies

Page 27: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2726 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

How is the result of academic research reported?

Masaki Nishizawa  Yuan SunAcademic research in press reports

504

Olympic Games for Information Access Technology

Noriko Kando  Akiko Aizawa, Daisuke Ishikawa, Hideo Joho, Tsuneaki Kato, Teruko Mitamura, Yusuke Miyao, Douglas Oard, Tetsuya Sakai, Mark Sanderson, Koichi Takeda

NII Testbeds and Community for Information Access Technologies (NTCIR)

Information Access technologies like information retrieval, question answering consist the integral part of social infrastructure for the better human life. NTCIR has been provided large-scale research infrastructure for testing and comparative evaluation to encourage technology

transfer, open, speedup the research and development of these technologies as an international joint research with about 120 research groups from 16 countries. Through the 15-years activities, NTCIR has produced various new challenges and breakthrough of the technological limits.

506

Information, Language and Standards

Akira MiyazawaInternational Standard of Japanese Romanization

Japanese romanization is an old issue. But, recently, a proposal for revision of Japanese romanization standard (ISO 3602) was issued in ISO/TC46 (Information and Documentation). Here,

the history and issues around Japanese romanization are introduced and discussed from the viewpoint of representation of information using characters and languages.

505

Estimating position of vehicles using RFIDs

Togashi Hiroaki  Yamada ShigekiPosition estimation method for moving vehicles using RFIDs

GPS is widely used for estimating position of several objects. However, GPS has problems when it is used for estimating position of vehicles; Its accuracy in height direction is not suff icient and i t cannot estimate

vehicular position in tunnel. Proposed method achieved enough accuracy for estimating which lane the vehicle is running, by placeing RFIDs in high density only on road boundaries (0.5-meter intervals).

601

Cooperative society and reputation.

Takahisa Suzuki  Tetsuro KobayashiHow the social mobility affect the effectiveness of reputation?

Repu t a t i on can be u t i l i z ed t o c r ea t e coope r a t i v e relationships not only in stable relationships such as among office members but in mobile relationships such as with strangers in Web. We investigate the difference of the

effects of reputations between in the stable context and in the mobile context. It shows that effects of using reputations tend to extend personal networks in the stable context and tend to confine personal networks in the mobile context.

603

For stable video-content viewing under rapidly changing environment of content popularity.

Hiroshi Kurose  Yamada Shigeki

Design and Evaluation of Tag Caching Routers Architecture (TCR) with Folksonomy-based Searches

Reputations of computer generated media (CGM) contents tend to propagate to many people very rapidly through popular Social Networking Service (SNS). Content viewing by viewers may be interrupted due to high-loads on servers and networks because many viewers may view popular contents simultaneously. To cope with this problem, we propose a Tag Caching Router

(TCR) architecture that supports folksonomies-based search and content caching for CGM content. The performance of the TCR architecture was evaluated and compared with other existing schemes by performing a simulation for CGM content searches and downloads under a rapidly changing environment of content popularity.

602

How People Search Information

Noriko Kando  Hitomi Egusa, Makiko Miwa, Hitomi Saito, Masao Takaku, Mayumi Toshima, Garkavis Vikotrs, Masaharu Yoshioka

Towards Better Understanding and Support for the User's Exploratory Search

How a user understand, search, learn during search, and so lve the p rob lem? we have tack led on such a fundermental problem under information retrieval through various user experiments. I t is along the research

direction targeting to "SmartIR", which is one of the Six grand challenges proposed at SWIRL 2012, Strategic Workshop on Information Retrieval Research by 50 international IR experts.

507

How to make Internet safe?

Hitoshi OkadaA research on interactive educational material for information security learning.

It is needed for the internet users to learn the knowledge of internet security. This material provides interactive 14 stories acted by 4 cartoon characters of University students. This e-learning material was written by NII

Security Policy Promotion Team, with the help of NII co-research members. We introduce a new content named “Information Resilience Studies” as well.

508

Elucidating the meanings of fictional descriptions

Teruo KoyamaThe Semantics of Fictional Descriptions

From the logical point of view, fictional descriptions have been regarded to be meaningless, because their t ruth value may not be t rue. However, in the real situation, truth values of descriptions are not always

clear, and in abductive inferences, it is important to tread descriptions with uncertain truth values. In this research we d iscuss about the t reatment o f the meanings of fictional descriptions.

502

Environment×body→mind

Nobuhiro Furuyama  Hiroyasu Mssaki,Kentaro Kodama, Wataru Arihisa, Ryosaku MakinoBody-Environment System as a foundation of communication

Although the traditional theory of behavior considers “body” as being governed by a central nervous/command system such as brain or mind, recent findings in motor control and/or human action suggest that body-environment system exhibits spontaneous behavioral pattern. Based on this view

we study coordinated movement within- and between-person, natural conversation and psychotherapeutic counseling.These research projects are meant to contribute to physical, occupational, speech therapy, psychotherapeutic counseling, education, and human-machine interaction.

503

Bringing on researches of connection between social lifeand digital information.

Can a robot get into the University of Tokyo?

Noriko Arai  Akiko Aizawa, Tetsunari Inamura, Takeaki Uno, Noriko Kando, Shinichi Sato, Yusuke Miyao, Ai Kawazoe, Takuya Matsuzaki, Yoshinobu Kano, Ran Tian, Masanori Togashi, Tadayoshi Hara, Hikaru Yokono

A new horizon in informatics opened up by computers getting to the heart of human intelligence required in university entrance exams

We will introduce the NII grand challenge project known as “Can a robot get into the University of Tokyo?” This pro ject a ims to add a new dimension to the cur rent information technology and bring a deeper understanding of

human intelligence, by setting a concrete goal: development of a computer which is able to pass university entrance exams. We will show major difficulties and challenges we are facing, and introduce several promising approaches.

501

Information and Society

Graduate University for Advanced Studies

Page 28: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2928 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Introduction of the Graduate School (SOKENDAI: Chiyoda Campus)

Research Promotion DivisionOutline of Department of Informatics and entrance exam guide for 2012 fiscal year

NI I es tab l i shes Depa r tmen t o f I n fo rmat ics , Schoo l o f Multidisciplinary Science at  Graduate University for Advanced Studies (SOKENDAI), and offers both 5 year and 3 year doctoral programs. These 2 courses make the best use of the specialty of NII that is pioneering and international research institutions of informatics, and aims at the promotion of the excellent talent who leads "Knowledge society" of the 21st century.

It is located in the center of Tokyo, this good location enable busy students with job come to NII easier to learn and research. It has been registered more than 60 students, 30% of them are international students, and about half of the Japanese students are working students.We guide the outline of Department of Informatics and entrance exam for October 2012 and April 2013.

801

The Wave of Informatics Spreads, from Shonan to the World at Large

NII Shonan Meetingwhere We Create a Place to Promote Informatics

The residential informatics seminars held in the small town of Dagstuhl, in the southwest of Germany, offer researchers a place to exchange ideas and discuss the issues they are currently working on, playing an important role in the promotion of the

informatics field. February of last year marked the holding of the first “NII Shonan Meeting”, modeled on the Dagstuhl seminars and total 12 seminars were held. Through the seminars, we intend that Japan becomes a center of informatics in Asia.

802

Promoting establishment of next-generation information infrastructure indispensable to the academic community

Scholarly and Academic Information Div., NIIConstruction of the Next-Generation Academic Information Infrastructure

NII, in close collaboration with university is attempting to generate and secure content that are indispensable to the academic community, and to build an information infrastructure that will give added value to and broadly transmit these content. Specifically, NII provide comprehensive academic content

services, including GeNii(NII Scholarly and Academic Information Portal) and NACSIS-CAT/ILL(Catalog Information Service : Cataloging System / Interlibrary Loan System). NII also support for construction of institutional repositories collecting, preserving, and disseminating research produced in universities.

701

Construction of the Cyber Science Infrastructure(CSI)for academic research and educational activities at universities.

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NIICSI : Cyber Science Infrastructure

NII is promoting the construction of the Cyber Science Infrastructure (CSI) through cooperation with universities and other organizations.CSI means an information environment that incorporates and utilizes various research activities and results from

un i ve r s i t i e s and r e sea rch i n s t i t u t i ons - such as supercomputers and other distinctive scientific utilities and resources, scientific software and databases, and human resources - over a super high-speed network, transcending the borders of organizations or scientific fields.

705

GakuNin realizes collaborative research environment beyond the barrier between different organizations

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NIIDevelopment of nationwide collaboration environment by GakuNin

The Academic Access Management Federat ion in Japan (GakuNin), through ties to university authentication infrastructure, is a system that brings about, as well as intra-school services, one-stop authentication of affi l iated universities, external academic cloud services and industrial electronic journals. Through the use of GakuNin, with one account, users can use all

the academic resources on the network.In this presentation we introduce the system which manages various groups of GakuNin users beyond the barrier between different organizations. We also present several examples of associated services in production for collaborative research activity.

703

Enabling a wide range of users to easily utilize distributed supercomputers including "K Computer"

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII

Authentication System for Convenient, Reliable and Secure Access to Distributed Supercomputers (HPCI)

High Performance Computing Infrastructure (HPCI) aims to build computational environment, which meet the needs of various users in academics and industries, by federating the K computer in Kobe as a core system and supercomputers in universities and research institutes in Japan.NII operates the authentication system, including the certificate

authority, in HPCI. The authentication system enables single sign-on to computing and storage resources using digital certificates. The user is able to access the resources in a secure and convenient way.Additionally NII operates SINET4 provides network infrastructure in HPCI for using remote supercomputers and shar ing large experimental data.

704

To provide a greater variety of network services and to respond more flexibly to changes in users' requirements

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NIISINET4:Science Information NETwork 4

Science Information NETwork (SINET) is an information and communication network connecting universities and research ins t i tu t ions th roughout Japan. S INET4 commenced operation in April 2011. We provide higher

network speed, diverse services, higher edge node s t ab i l i t y , h i ghe r access l i n es and uppe r l a ye r deployment. The "SINET Promotion Office" promotes the use of service as well as last year.

702

What are the factors that affect consumer intention to purchase on foreign websites?

Vanessa Rocio Bracamonte LesmaFactors Influencing Consumer Acceptance of Cross-Border Electronic Commerce

Cross-border electronic commerce has additional complexities when compared with domestic e-commerce, both from the vendor and the consumer point-of-view. The situation of buying from foreign websites brings into play different factors that could 

affect the purchase intention of the consumer. This research will attempt to measure the differences in purchase intention when the consumer is faced with a foreign website. An experiment will be conducted using mock websites with different characteristics.

604

Sensor Networks

Kien Nguyen  Yusheng Ji

Multi-hop MAC protocols for Energy Harvesting Sensor Networks

Energy harvesting is a candidate to bypass the biggest challenge in Wireless Sensor Networks (WSN), namely saving power. The nodes in an energy harvesting WSN can be supplied energy from their surrounding environment. In such networks, a MAC protocol needs to achieve maximum performances while keeping the amount of

energy consumption below the one of energy supply. On the other hand, multi-hop MAC protocols have been proven to be very efficient in traditional WSNs. In this work, we investigate performances of a state-of-the-art multi-hop MAC protocol and show that the protocol has potential to be applied in energy harvesting WSNs.

605

We know what you want to see!

Yunlong FENG  Gene Cheung, Yusheng Ji

Eye-gaze pattern prediction for networked video streaming.

For networked media systems, eye-gaze tracking has been widely used to improve viewer’s perception. But how to lower the end-to-end reaction delay in gaze-based networked video streaming is stil l a challenge. We

proposed a novel gaze prediction strategy based on viewer’s state to estimate future gaze locations to improve the prediction performance.

606

OthersDevelopment and Operation

Page 29: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

2928 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

Introduction of the Graduate School (SOKENDAI: Chiyoda Campus)

Research Promotion DivisionOutline of Department of Informatics and entrance exam guide for 2012 fiscal year

NI I es tab l i shes Depa r tmen t o f I n fo rmat ics , Schoo l o f Multidisciplinary Science at  Graduate University for Advanced Studies (SOKENDAI), and offers both 5 year and 3 year doctoral programs. These 2 courses make the best use of the specialty of NII that is pioneering and international research institutions of informatics, and aims at the promotion of the excellent talent who leads "Knowledge society" of the 21st century.

It is located in the center of Tokyo, this good location enable busy students with job come to NII easier to learn and research. It has been registered more than 60 students, 30% of them are international students, and about half of the Japanese students are working students.We guide the outline of Department of Informatics and entrance exam for October 2012 and April 2013.

801

The Wave of Informatics Spreads, from Shonan to the World at Large

NII Shonan Meetingwhere We Create a Place to Promote Informatics

The residential informatics seminars held in the small town of Dagstuhl, in the southwest of Germany, offer researchers a place to exchange ideas and discuss the issues they are currently working on, playing an important role in the promotion of the

informatics field. February of last year marked the holding of the first “NII Shonan Meeting”, modeled on the Dagstuhl seminars and total 12 seminars were held. Through the seminars, we intend that Japan becomes a center of informatics in Asia.

802

Promoting establishment of next-generation information infrastructure indispensable to the academic community

Scholarly and Academic Information Div., NIIConstruction of the Next-Generation Academic Information Infrastructure

NII, in close collaboration with university is attempting to generate and secure content that are indispensable to the academic community, and to build an information infrastructure that will give added value to and broadly transmit these content. Specifically, NII provide comprehensive academic content

services, including GeNii(NII Scholarly and Academic Information Portal) and NACSIS-CAT/ILL(Catalog Information Service : Cataloging System / Interlibrary Loan System). NII also support for construction of institutional repositories collecting, preserving, and disseminating research produced in universities.

701

Construction of the Cyber Science Infrastructure(CSI)for academic research and educational activities at universities.

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NIICSI : Cyber Science Infrastructure

NII is promoting the construction of the Cyber Science Infrastructure (CSI) through cooperation with universities and other organizations.CSI means an information environment that incorporates and utilizes various research activities and results from

un i ve r s i t i e s and r e sea rch i n s t i t u t i ons - such as supercomputers and other distinctive scientific utilities and resources, scientific software and databases, and human resources - over a super high-speed network, transcending the borders of organizations or scientific fields.

705

GakuNin realizes collaborative research environment beyond the barrier between different organizations

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NIIDevelopment of nationwide collaboration environment by GakuNin

The Academic Access Management Federat ion in Japan (GakuNin), through ties to university authentication infrastructure, is a system that brings about, as well as intra-school services, one-stop authentication of affi l iated universities, external academic cloud services and industrial electronic journals. Through the use of GakuNin, with one account, users can use all

the academic resources on the network.In this presentation we introduce the system which manages various groups of GakuNin users beyond the barrier between different organizations. We also present several examples of associated services in production for collaborative research activity.

703

Enabling a wide range of users to easily utilize distributed supercomputers including "K Computer"

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NII

Authentication System for Convenient, Reliable and Secure Access to Distributed Supercomputers (HPCI)

High Performance Computing Infrastructure (HPCI) aims to build computational environment, which meet the needs of various users in academics and industries, by federating the K computer in Kobe as a core system and supercomputers in universities and research institutes in Japan.NII operates the authentication system, including the certificate

authority, in HPCI. The authentication system enables single sign-on to computing and storage resources using digital certificates. The user is able to access the resources in a secure and convenient way.Additionally NII operates SINET4 provides network infrastructure in HPCI for using remote supercomputers and shar ing large experimental data.

704

To provide a greater variety of network services and to respond more flexibly to changes in users' requirements

Academic Infrastructure Div., Cyber Science Infrastructure Development Dept., NIISINET4:Science Information NETwork 4

Science Information NETwork (SINET) is an information and communication network connecting universities and research ins t i tu t ions th roughout Japan. S INET4 commenced operation in April 2011. We provide higher

network speed, diverse services, higher edge node s t ab i l i t y , h i ghe r access l i n es and uppe r l a ye r deployment. The "SINET Promotion Office" promotes the use of service as well as last year.

702

What are the factors that affect consumer intention to purchase on foreign websites?

Vanessa Rocio Bracamonte LesmaFactors Influencing Consumer Acceptance of Cross-Border Electronic Commerce

Cross-border electronic commerce has additional complexities when compared with domestic e-commerce, both from the vendor and the consumer point-of-view. The situation of buying from foreign websites brings into play different factors that could 

affect the purchase intention of the consumer. This research will attempt to measure the differences in purchase intention when the consumer is faced with a foreign website. An experiment will be conducted using mock websites with different characteristics.

604

Sensor Networks

Kien Nguyen  Yusheng Ji

Multi-hop MAC protocols for Energy Harvesting Sensor Networks

Energy harvesting is a candidate to bypass the biggest challenge in Wireless Sensor Networks (WSN), namely saving power. The nodes in an energy harvesting WSN can be supplied energy from their surrounding environment. In such networks, a MAC protocol needs to achieve maximum performances while keeping the amount of

energy consumption below the one of energy supply. On the other hand, multi-hop MAC protocols have been proven to be very efficient in traditional WSNs. In this work, we investigate performances of a state-of-the-art multi-hop MAC protocol and show that the protocol has potential to be applied in energy harvesting WSNs.

605

We know what you want to see!

Yunlong FENG  Gene Cheung, Yusheng Ji

Eye-gaze pattern prediction for networked video streaming.

For networked media systems, eye-gaze tracking has been widely used to improve viewer’s perception. But how to lower the end-to-end reaction delay in gaze-based networked video streaming is stil l a challenge. We

proposed a novel gaze prediction strategy based on viewer’s state to estimate future gaze locations to improve the prediction performance.

606

OthersDevelopment and Operation

Page 30: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

3130 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

National Archives of JapanNational Archives of Japan, Digital Archive:“Past is Prologue”

National Archives of Japan (NAJ) launched “Digital Archive” from 2005 , providing catalogue database and some of its holdings in digital images. With the concept of “ubiquitous internet service,” the system is based on

the next generation of digital archival standards, such as JPEG2000 and EAD/XML. NAJ holds demonstrations and displays of “Digital Archives,” with its precursor, Japan Center for Asian Historical Records (JACAR).

901

To pursue a new era of academic research

Research Organization of Information and SystemsResearch Organization of Information and Systems

The Research Organ iza t ion o f In fo rmat ion and Sys tems establishes and operates a core research institute for promoting integrated research on a global level in the areas of polar sciences, informatics, statistical mathematics, and genetics, in collaboration with the research communities at universities and

other organizations all over Japan. The Organization also aims to conduct integrated research across disciplines by addressing, from the perspectives of information and systems, issues involving complex phenomena of life, Earth, the natural environment, human society, and other areas, as critical issues for the 21st century.

903

Reading Space in the Future

Research Center for Informatics of Association  Nara National Museum, Fujita Museum of Art,Digital Publishing Initiatives Japan, hon.jp, Association Press

Study on future reading environment powered by association

Currently, there are several big projects for digitizing millions of books in Japan. We propose new methods for establishing meaningful links between old and contemporary memory of the culture. In this corner, we demonstrate the digital scroll

system for browsing 190m length linear paper scroll, which is a national treasure of Japan. And we also demonstrate the e-reading environment where every browsing text can automatically be linked to the outside references.

904

Tokyo Association of Dealers in Old Books

Tokyo Association of Dealers in Old Books“Nihon-No-Furuhon-Ya ”(Old Japanese Book Shop System) : search site for antipue books

Tokyo Association of Dealers in Old Books launched an antiquarian database in 1998, and this database has been appreciated ever since by researchers and book lovers nat ionwide. Now, the burn ing issue I how

antiquarian bookshops with rich philological knowledge can cooperate with the young generation, which can make full use of computers. “Nihon-No-Furuhon-Ya” is now in the process of development.

902

MEMOSpecial Exhibition

Page 31: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

3130 O P E N H O U S E 2 012O P E N H O U S E 2 012

Lecture / Session

Lecture / SessionPresentation

PresentationD

emo/

Experience corner

Dem

o/Experience corner

Poster Ex

hib

itions

Poster Ex

hib

itions

National Archives of JapanNational Archives of Japan, Digital Archive:“Past is Prologue”

National Archives of Japan (NAJ) launched “Digital Archive” from 2005 , providing catalogue database and some of its holdings in digital images. With the concept of “ubiquitous internet service,” the system is based on

the next generation of digital archival standards, such as JPEG2000 and EAD/XML. NAJ holds demonstrations and displays of “Digital Archives,” with its precursor, Japan Center for Asian Historical Records (JACAR).

901

To pursue a new era of academic research

Research Organization of Information and SystemsResearch Organization of Information and Systems

The Research Organ iza t ion o f In fo rmat ion and Sys tems establishes and operates a core research institute for promoting integrated research on a global level in the areas of polar sciences, informatics, statistical mathematics, and genetics, in collaboration with the research communities at universities and

other organizations all over Japan. The Organization also aims to conduct integrated research across disciplines by addressing, from the perspectives of information and systems, issues involving complex phenomena of life, Earth, the natural environment, human society, and other areas, as critical issues for the 21st century.

903

Reading Space in the Future

Research Center for Informatics of Association  Nara National Museum, Fujita Museum of Art,Digital Publishing Initiatives Japan, hon.jp, Association Press

Study on future reading environment powered by association

Currently, there are several big projects for digitizing millions of books in Japan. We propose new methods for establishing meaningful links between old and contemporary memory of the culture. In this corner, we demonstrate the digital scroll

system for browsing 190m length linear paper scroll, which is a national treasure of Japan. And we also demonstrate the e-reading environment where every browsing text can automatically be linked to the outside references.

904

Tokyo Association of Dealers in Old Books

Tokyo Association of Dealers in Old Books“Nihon-No-Furuhon-Ya ”(Old Japanese Book Shop System) : search site for antipue books

Tokyo Association of Dealers in Old Books launched an antiquarian database in 1998, and this database has been appreciated ever since by researchers and book lovers nat ionwide. Now, the burn ing issue I how

antiquarian bookshops with rich philological knowledge can cooperate with the young generation, which can make full use of computers. “Nihon-No-Furuhon-Ya” is now in the process of development.

902

MEMOSpecial Exhibition

Page 32: Thu. June Fri. June · 2017. 4. 26. · Inter-University Research Corporation / Research Organization of Information and Systems National Institute of Informatics e 2 -12 Hitotsubashi,

人と社会

をつなぐ情報学

Na

t i on

al I n

s t i t ut e

of I n

f orm

at i c s O

PE

N H

OU

SE

20

12

国立情報学研究所

オープンハウス2012

研究成果発表・一般公開

Thu. 7 13:00~20:00Fr i . 8 10:30~17:00

National Center forSciences

Supported by:Chiyoda-CityCo-organized by:National Archives of Japan,         Tokyo Association of Dealers in Old Books

Place

Time

Inter-University Research Corporation / Research Organization of Information and Systems

National Institute of Informatics

Admission free

2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430  TEL:+81-3 -4212-2131 FAX :+81-3 -4212-2150

2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo

[email protected]

■ Hitotsubashi Hall(2F)

Opening Opening Address ・ Report on the activity of NIIDirector General at NII Masao SAKAUCHI

13:00~13:30

13:00

14:00

15:00

16:00

17:00

18:00

19:00

20:00

13:00~ Opening Opening Address ・ Report on the activity of NII

KeynoteLecture

From Augmented Reality to Augmented Human: Human Evolution and Information technologyProfessor at Interfaculty Initiative in Information Studies, The University of Tokyo, Deputy Director of Sony Computer Science Laboratories Jun REKIMOTO

The way we see the worldAssociate Professor at NII  Imari SATOH

The advanced research on network infrastructure and society~SINET broadening the network of scientists~Professor at NII  Shigeo URUSHIDANI

Work in the FutureManaging Director Enterprise Google  Shinichi ABE

Understanding Language ― Why Difficult for Computers?Associate Professor at NII  Yusuke MIYAO

Origins of language and emotionProfessor at The University of Tokyo, Direction at JST-ERATO,Team Leader, RIKEN-BSI Kazuo OKANOYA

13:30~14:30

KeynoteLecture

16:00~17:00

PublicLecture

18:30~20:00

■ Conference Room / 2nd Floor Hall(2F)Demo&Experience corner /Poster Exhibitions

14:00~18:30

Intercommunication Time17:00~18:30

■ Hitotsubashi Hall(2F)

InvitedLecture

11:00~12:00

KeynoteLecture

13:30~14:30

KeynoteLecture

15:00~16:00

■ Conference Room / 2nd Floor Hall(2F)

Demo&Experience corner / Poster Exhibitions10:30~17:00

■ Special Conference Room(1F)Security of smartphone used in universities

14:40~15:50

Briefing session about entrance examination of graduate school

17:00~19:00

7Thu.June

7Thu.June

8Fri.June

8Fri.June

Contact e-mail

The program according to the hall

Hitotsubashi Hall Conference Room 2nd Floor Hall Special ConferenceRoom Small conference room

Director General at NII Masao SAKAUCHI

14:00~18:30Demo&Experience corner /Poster Exhibitions

14:40~15:50Security of smartphone used in universities

17:00~19:00Briefing session about entrance examination of graduate school

17:00~18:30Intercommunication Time

13:30~14:30 Keynote LectureFrom Augmented Reality to Augmented Human: Human Evolution and Information technologyProfessor at Interfaculty Initiative in Information Studies, The University of Tokyo, Deputy Director of Sony Computer Science Laboratories Jun REKIMOTO

16:00~17:00 Keynote LectureThe way we see the worldAssociate Professor at NII Imari SATOH

15:00~15:20 Yusheng JI

Presentation

Presentation

15:20~15:40 Nobuhiro FURUYAMA

18:30~20:00 Public LectureThe advanced research on network infrastructure and society~SINET broadening the network of scientists~Professor at NII Shigeo URUSHIDANI

10:00

11:00

12:00

13:00

14:00

15:00

16:00

17:00

11:00~12:00 Invited Lecture

Hitotsubashi Hall Conference Room 2nd Floor Hall Special ConferenceRoom Small conference room

Work in the FutureManaging Director Enterprise Google Shinichi ABE

13:30~14:30 Keynote LectureUnderstanding Language ― Why Difficult for Computers?Associate Professor at NII Yusuke MIYAO

15:00~16:00 Keynote LectureOrigins of language and emotionProfessor at The University of Tokyo, Direction at JST-ERATO, Team Leader, RIKEN-BSI Kazuo OKANOYA

10:30~17:00Demo&Experience corner /Poster Exhibitions

12:30~12:50 Kenro AIHARA

12:50~13:10 Ken SATOH

From

Thu. June7to

Fri. June8,2012