Shinji Shimojo

ORCID: 0000-0003-2348-7408
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed and Parallel Computing Systems
  • Software-Defined Networks and 5G
  • Peer-to-Peer Network Technologies
  • Multimedia Communication and Technology
  • Caching and Content Delivery
  • Scientific Computing and Data Management
  • Cloud Computing and Resource Management
  • Network Traffic and Congestion Control
  • Advanced Optical Network Technologies
  • Parallel Computing and Optimization Techniques
  • Mobile Agent-Based Network Management
  • Video Analysis and Summarization
  • Interconnection Networks and Systems
  • Advanced Data Storage Technologies
  • IPv6, Mobility, Handover, Networks, Security
  • IoT and Edge/Fog Computing
  • Image and Video Quality Assessment
  • Energy Efficient Wireless Sensor Networks
  • Human Mobility and Location-Based Analysis
  • Service-Oriented Architecture and Web Services
  • Context-Aware Activity Recognition Systems
  • Optical Network Technologies
  • Recommender Systems and Techniques
  • Network Security and Intrusion Detection
  • EEG and Brain-Computer Interfaces

Aomori University
2023-2025

Software (Spain)
2025

Osaka University
2014-2023

Cyber University
2003-2022

Asahi Intecc (Japan)
2018

National Institute of Information and Communications Technology
2008-2017

Korea Institute of Science & Technology Information
2010

Osaka Electro-Communication University
2010

National Institute on Consumer Education
2009-2010

NTT (Japan)
2010

10.1109/imcom64595.2025.10857564 article EN 2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM) 2025-01-03

Current collaborative filtering can't represent various aspects of users' interests. We propose a recommendation method in which user can find new interests that are partially similar to the user's taste. Partial similarity is an aspect preference projected by community belongs. developed television program system performs such with serendipity, conducted actual experiment and evaluated its results.

10.1109/mmmc.2005.5 article EN 2005-04-01

With the popularization of today's mobile devices, environment that enables us to publish and utilize information independent location time has been actualized. In future, various kinds sensors such as GPS well network-enabled appliances will also be connected Internet. By utilizing acquired from these network terminals, advanced context-aware services produced. For realizing services, we focus on management retrieval using a Peer-to-Peer (P2P) network. this paper, propose location-based P2P...

10.1109/saintw.2005.1620013 article EN 2006-05-06

The deployment of hybrid wide-area OpenFlow networks is essential for the gradual integration technology into existing networks. Integration necessary because it impractical to replace such with OpenFlow-enabled ones at once. On other hand, design, deployment, and operation are often conducted intuitively without in-depth technical considerations. In this paper, we systematically discuss aspects architecture based on our experience so far in developing JGN2plus JGN-X, which nation-wide...

10.1587/transcom.e96.b.108 article EN IEICE Transactions on Communications 2012-12-31

It is expected that clean-slate network designs will be implemented for wide-area applications. Multi-tenancy in OpenFlow networks an effective method to supporting a design, because the cost-effectiveness improved by sharing of substrate networks. To guarantee programmability tenants, complete flow space (i.e., header values data packets) virtualization necessary. Wide-area typically have multiple administrators. We therefore need implement over administration In existing techniques, third...

10.1109/ewsdn.2014.28 article EN 2014-09-01

Recently, IoT (Internet of Things) security is a critical issue while big trend where huge number devices would be connected to the Internet. We focus on protecting physical from illegal access by intruders and give basic analysis for fundamental gaps between embedded softwares. clarify that difficulty in implementing both device functions same device. also propose Agent Platform mechanism separate devies run isolated cloud environment. The based Dripcast which transparent programming...

10.1109/compsac.2017.156 article EN 2017-07-01

This paper proposes two types of fragmentation aware spectrum assignment for fully-distributed GMPLS framework. The cut-avoidance approach achieves lower blocking probability and the block-assign improves performance more when requested slot sizes are known.

10.1364/ofc.2015.tu2b.3 article EN Optical Fiber Communication Conference 2015-01-01

Nowadays, supercomputers play an essential role in high-performance computing. In general, modern supercomuputers are built as a cluster system, which is system of multiple computers interconnected on network. coding parallel program such MPI (Message Passing Interface) utilized. this paper, we aim to reduce the execution time Allreduce, frequently used collective communication many simulation codes. To end, have integrated network programmability by Software Defined Networking into...

10.1109/hpcsim.2014.6903768 article EN 2014-07-01

A new material particle dynamical domain decomposition method MPD/sup 3/ has been developed. The is suitable for a large scale parallel molecular dynamic simulation on heterogeneous computing net. Performance of the algorithm tested in various environments, such as PC clusters, super computer and grid. It shown that highly-adaptive both clusters grid even if other programs are running same environment.

10.1109/ccgrid.2005.1558650 article EN 2005-01-01

The current paper aims to provide numerical and experimental flow data relevant for physical modelling of human fricative sound production due the interaction airflow with teeth. A simplified upper incisor-palate geometry is derived from typical morphological features. inserted in a rectangular channel which width-to-height ratio yields 4. obstruction degree presence incisor 70%. Numerical are obtained large eddy simulations. Experimental gathered single-sensor anemometry on rigid plaster...

10.1142/s1758825110000603 article EN International Journal of Applied Mechanics 2010-06-01

In recent years, an evolutionary change occurred in the digital world when various social networking sites became popular. This led to a big increase of users who share their activities form. A huge amount information has become available, providing researchers with unique insight into behavior and entire population. The use Geo-tagged media data emerging trend represent user actions behaviour at specific geographical locations. However, inaccuracies from often limits utility this source...

10.1109/bigdata47090.2019.9006477 article EN 2021 IEEE International Conference on Big Data (Big Data) 2019-12-01

This paper discusses the scalability issues of networked virtual environments (net-VEs). A most important problem net-VEs is that performance system remarkably deteriorated when users increase in number. To solve this problem, we proposed two methods. The first method tries to equalize load each server by dynamically adjusting size space managed server. second reduce amount operations changing a management unit space. evaluate methods, developed multiple-server game called "CittaTron"....

10.1109/pacrim.2001.953557 article EN 2002-11-13

With the development of distributed computing technology and cloud technology, amount data is rising dramatically, as well number datacenters, where we keep these for long periods. In TCP protocol still widely used in most network traffic. On other hand, can also result severe goodput collapse a high bandwidth low latency datacenter environment. One problems called incast problem. order to efficiently utilize systems such environments, some traffic control mechanisms should be very...

10.1109/compsacw.2013.106 article EN 2013-07-01

Smart buildings with a large number of installed IoT devices require access control systems to manage by people. However, the design and implementation for each building tends be very complex due users managed. To solve this problem, paper proposes an ontology-based framework capability automatically construct functions in smart buildings. This also new scheme using web ontologies based on role-based (RBAC) reduce administrative burden. We have implemented prototype system features at Minoh...

10.1109/icce56470.2023.10043384 article EN 2023 IEEE International Conference on Consumer Electronics (ICCE) 2023-01-06

10.1167/1.3.478 article EN cc-by-nc-nd Journal of Vision 2010-03-14

In the Skip Graph, which is a structured overlay network that supports range retrievals, key supposed to consist of single value. Therefore, Graph cannot perform range-to-range retrievals. present research, we extend enabling it retain as key, and propose Range-Key can We also implement proposed scheme evaluate on PlanetLab.

10.1109/glocom.2010.5683641 article EN 2010-12-01

In this paper, we propose a lightweight multi-receiver encryption scheme for the device to communications on Internet of Things (IoT) applications. order individual user control disclosure range his/her own data directly and prevent sensitive personal trusted third party, proposed uses device-generated public keys. For mutual authentication, party generates Schnorr-like identity-based partial private keys users. The provides source message integrity, replay-attack prevention implicit...

10.1109/compsac.2017.20 article EN 2017-07-01
Coming Soon ...