Curriculum Vitaes

Fukuhito Ooshita

  (大下 福仁)

Profile Information

Affiliation
professor, Graduate School of Information Science / School of Social Information Science, University of Hyogo
Degree
Master(Engineering)(Osaka University)

J-GLOBAL ID
200901098024195714
researchmap Member ID
5000049929

External link

Major Papers

 132
  • Quentin Bramas, Hirotsugu Kakugawa, Sayaka Kamei, Anissa Lamani, Fukuhito Ooshita, Masahiro Shibata, Sébastien Tixeuil
    The Computer Journal, Feb 23, 2026  Peer-reviewed
    Abstract We consider a strong variant of the crash fault-tolerant gathering problem called Stand-Up Indulgent Gathering (SUIG), by robots endowed with limited visibility sensors and lights on line-shaped networks. In this problem, a group of mobile robots must eventually gather at a single location, not known beforehand, regardless of the occurrence of crashes. Differently from previous work that considered unlimited visibility, we assume that robots can observe nodes only within a certain fixed distance (i.e. they are myopic), and emit a visible color from a fixed set (i.e. they are luminous), without multiplicity detection. We consider algorithms depending on two parameters related to the initial configuration: $M_{\mathrm{init } }$, which denotes the number of nodes between two border nodes, and $O_{\mathrm{init } }$, which denotes the number of nodes hosting robots. Then, a border node is a node hosting one or more robots that cannot see other robots on at least one side. Our main contribution is to prove that, if $M_{\mathrm{init } }$ or $O_{\mathrm{init } }$ is odd, SUIG can be solved in the fully synchronous model even if crashes occur at a node at any phase of execution (i.e. including within the LCM cycle).
  • Sayaka Kamei, Anissa Lamani, Fukuhito Ooshita, Sébastien Tixeuil, Koichi Wada
    Theory of Computing Systems, 69(1), Jan 24, 2025  Peer-reviewed
    We investigate gathering algorithms for asynchronous autonomous mobile robots moving in uniform ring-shaped networks. Different from most work using the Look-Compute-Move (LCM) model, we assume that robots have limited visibility and lights. That is, robots can observe nodes only within a certain fixed distance, and emit a color from a set of constant number of colors. We consider gathering algorithms depending on two parameters related to the initial configuration: Minit, which denotes the number of nodes between two border nodes, and Ninit, which denotes the number of nodes hosting robots between two border nodes. In both cases, a border node is a node hosting one or more robots that may see other robots on exactly one side. Our main contribution is to prove that, if Minit or Ninit is odd, gathering is always feasible with three or four colors. The proposed algorithms do not require additional assumptions, such as knowledge of the number of robots, multiplicity detection capabilities, or the assumption of towerless initial configurations. These results demonstrate the power of lights to achieve gathering of robots with limited visibility.
  • Fukuhito Ooshita, Naoki Kitamura, Ryota Eguchi, Michiko Inoue, Hirotsugu Kakugawa, Sayaka Kamei, Masahiro Shibata, Yuichi Sudo
    28th International Conference on Principles of Distributed Systems (OPODIS), 12-16, Dec, 2024  Peer-reviewedLead author
    We investigate crash-tolerant perpetual exploration algorithms by myopic luminous robots on ring networks. Myopic robots mean that they can observe nodes only within a certain fixed distance ϕ, and luminous robots mean that they have light devices that can emit a color from a set of colors. The goal of perpetual exploration is to ensure that robots, starting from specific initial positions and colors, move in such a way that every node is visited by at least one robot infinitely often. As a main contribution, we clarify the tight necessary and sufficient number of robots to realize perpetual exploration when at most f robots crash. In the fully synchronous model, we prove that f+2 robots are necessary and sufficient for any ϕ ≥ 1. In the semi-synchronous and asynchronous models, we prove that 3f+3 (resp., 2f+2) robots are necessary and sufficient if ϕ = 1 (resp., ϕ ≥ 2).
  • Jion Hirose, Junya Nakamura, Fukuhito Ooshita, Michiko Inoue
    Concurrency and Computation: Practice and Experience, 36(14), Apr 3, 2024  Peer-reviewed
    Summary In this work, we study the gathering problem to make multiple agents, who are initially scattered in arbitrary networks, meet at the same node. The network has agents with unique identifiers (IDs), and of them are weakly Byzantine agents that behave arbitrarily, except for falsifying their identifiers. These agents behave in synchronous rounds, and they may start an algorithm at different rounds. Each agent cannot leave information at a node. We propose herein a deterministic algorithm that efficiently achieves gathering with a simultaneous termination having a small number of non‐Byzantine agents. The proposed algorithm concretely works in rounds if the agents know the upper bound on the number of nodes, and at least non‐Byzantine agents exist, where is the length of the largest ID among agents, and is the number of rounds required to explore any network composed of nodes. The literature presents two efficient gathering algorithms with a simultaneous termination. The first algorithm assumes that agents know the number of nodes and achieves the gathering in rounds in the presence of any number of Byzantine agents, where is the length of the largest ID among non‐Byzantine agents. The second algorithm assumes both that agents know and that at least non‐Byzantine agents exist, and it achieves the gathering in rounds. The proposed algorithm is faster than the first existing algorithm and requires fewer non‐Byzantine agents than the second existing algorithm if is given to agents. We propose herein a new technique to simulate a Byzantine consensus algorithm for synchronous message‐passing systems on agent systems to reduce the number of agents.
  • Daisuke Yokota, Yuichi Sudo, Fukuhito Ooshita, Toshimitsu Masuzawa
    42nd ACM Symposium on Principles of Distributed Computing (PODC), Jun 16, 2023  Peer-reviewed
  • Shota Nagahama, Fukuhito Ooshita, Michiko Inoue
    Information and Computation, 292 105036-105036, Jun, 2023  Peer-reviewed
  • Yotam Ashkenazi, Shlomi Dolev, Sayaka Kamei, Yoshiaki Katayama, Fukuhito Ooshita, Koichi Wada
    Theoretical Computer Science, 954 113755-113755, Apr, 2023  Peer-reviewed
  • Fukuhito Ooshita, Sébastien Tixeuil
    Information and Computation, 285 104702-104702, May, 2022  Peer-reviewedLead author
  • Jion Hirose, Junya Nakamura, Fukuhito Ooshita, Michiko Inoue
    IEICE Transactions on Information and Systems, E105-D(3) 541-555, Mar, 2022  Peer-reviewed
  • Yuichi Sudo, Fukuhito Ooshita, Taisuke Izumi, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    IEEE Transactions on Parallel and Distributed Systems, 31(11) 2620-2632, Nov 1, 2020  Peer-reviewed
  • Masahiro Shibata, Norikazu Kawata, Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    Theoretical Computer Science, 822 92-109, Jun, 2020  Peer-reviewed
  • Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa, Ajoy K. Datta, Lawrence L. Larmore
    Theoretical Computer Science, 806 617-631, Feb, 2020  Peer-reviewed
  • Sudo Yuichi, Ooshita Fukuhito, Kakugawa Hirotsugu, Masuzawa Toshimitsu, Datta Ajoy K, Larmore Lawrence L
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 30(6) 1359-1373, Jun, 2019  Peer-reviewed
  • Masahiro Shibata, Toshiya Mega, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    Journal of Parallel and Distributed Computing, 119 92-106, Sep 1, 2018  Peer-reviewed
  • Tsuyoshi Gotoh, Yuichi Sudo, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    38th IEEE International Conference on Distributed Computing Systems(ICDCS), 775-785, Jul, 2018  Peer-reviewed
  • Masahiro Shibata, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    Theoretical Computer Science, 705 9-30, Jan 1, 2018  Peer-reviewed
  • Masahiro Shibata, Toshiya Mega, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    PROCEEDINGS OF THE 2016 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'16), 415-424, Jul, 2016  Peer-reviewed
  • Yuma Asada, Fukuhito Ooshita, Michiko Inoue
    Journal of Graph Algorithms and Applications, 20(1) 59-78, Feb, 2016  Peer-reviewed
  • Masahiro Shibata, Shinji Kawai, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    THEORETICAL COMPUTER SCIENCE, 617 1-11, Feb, 2016  Peer-reviewed
  • Fukuhito Ooshita, Sebastien Tixeuil
    THEORETICAL COMPUTER SCIENCE, 568 84-96, Feb, 2015  Peer-reviewed
  • Fukuhito Ooshita, Shinji Kawai, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(5) 1289-1296, May, 2014  Peer-reviewed
  • Taisuke Izumi, Tomoko Izumi, Sayaka Kamei, Fukuhito Ooshita
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 24(4) 716-723, Apr, 2013  Peer-reviewed
  • Daisuke Baba, Tomoko Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    THEORETICAL COMPUTER SCIENCE, 478 118-126, Mar, 2013  Peer-reviewed
  • Yuichi Sudo, Junya Nakamura, Yukiko Yamauchi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    THEORETICAL COMPUTER SCIENCE, 444 100-112, Jul, 2012  Peer-reviewed
  • Yukiko Yamauchi, Sayaka Kamei, Fukuhito Ooshita, Yoshiaki Katayama, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    INFORMATION SCIENCES, 180(10) 1802-1816, May, 2010  Peer-reviewed
  • Daisuke Kadono, Tomoko Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    AD HOC NETWORKS, 8(1) 63-76, Jan, 2010  Peer-reviewed
  • Tomoko Suzuki, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    THEORETICAL COMPUTER SCIENCE, 393(1-3) 90-101, Mar, 2008  Peer-reviewed

Misc.

 63
  • 五島 剛, 首藤 裕一, 大下 福仁, 角川 裕次, 増澤 利光
    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117(269) 37-44, Oct 27, 2017  
  • 河田 倫和, 柴田 将拡, 首藤 裕一, 大下 福仁, 角川 裕次, 増澤 利光
    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117(269) 29-36, Oct 27, 2017  
  • INOUE Michiko, OOSHITA Fukuhito, TIXEUIL Sebastien
    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117(248) 61-66, Oct 19, 2017  
  • INOUE Michiko, OOSHITA Fukuhito, TIXEUIL Sebastien
    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 117(249) 61-66, Oct 19, 2017  
  • Rentaro Watanabe, Yonghwan Kim, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    Jan, 2016  
  • 柴田 将拡, 大下 福仁, 角川 裕次
    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報, 115(84) 107-114, Jun 12, 2015  
  • RI Jun, SHIBATA Masahiro, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, MASUZAWA Toshimitsu
    IEICE technical report. Theoretical foundations of Computing, 114(199) 61-68, Sep 2, 2014  
    We introduce a concept of agent groups and formulate the group gossiping problem. An (agent) group is a set of agents that work together to attain a single objective. For example, agents created by a single application form one group. Since multiple applications are executed in a single mobile agent system, there exist multiple groups in such a system. In this case, it is useful to support cooperation among agents in each group. From this motivation, we formulate the group gossiping problem. The group gossiping problem requires each agent to collect information of all agents in its group. Since information to be collected is private and precious, no agents want to expose the information to other groups. For this reason, agents can exchange only control information (e.g., counter values or IDs) with other groups. In this setting, we aim to minimize the total number of moves to solve the group gossiping problem. As a result, we show the asymptotically tight upper and lower bounds for several network topologies.
  • ITO Rumi, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, MASUZAWA Toshimitsu
    IEICE technical report. Theoretical foundations of Computing, 114(19) 13-20, Apr 24, 2014  
    An overlay network is induced by virtual links constructed over underlying physical networks. Virtual links enable us to build any topology regardless of the underlying physical network, which allows us to construct the overlay networks with desirable properties. A chordal ring network is commonly used as overlay networks since it allows efficient routing and lookup, load balancing, and high connectivity. Furthermore, overlay networks are expected to adapt to node join/leave, and network failures/recovery, therefore it is desired to implement self-stabilizing overlay networks. In this paper, we propose a memory-efficient self-stabilizing algorithm for constructing an overlay chordal ring network.
  • TAKATSU Shusuke, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, MASUZAWA Toshimitsu
    IEICE technical report. Theoretical foundations of Computing, 113(488) 69-76, Mar 10, 2014  
    We propose a safely-converging self-organization of a Breadth-First-Search spanning tree (BFS tree) with many leaves in virtual grid networks. A virtual grid network is obtained by virtually dividing a wireless network into a grid of geographical square regions (cells) and selecting a single node as a router at each cell. In this paper, we propose a self-organization, which can transform any given spanning tree to a BFS tree with many leaves by repeatedly applying local updates on the tree. This method satisfies safe-convergence, that is, the maintained structure forms a spanning tree at any time during the convergence.
  • Nakagawaji Katsuyuki, Ooshita Fukuhito, Kakugawa Hirotsugu, Masuzawa Toshimitsu
    Proceedings of the IEICE General Conference, 2014(2) 560-560, Mar 4, 2014  
  • 石井 朝葉, 金 鎔煥, 中村 純哉, 大下 福仁, 角川 裕次, 増澤 利光
    情報処理学会研究報告, 2012-HPC-136(20) 1-7, Sep, 2012  
  • Masahiro Shibata, Shinji Kawai, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    IEICE technical report. Theoretical foundations of Computing, 112(24) 17-24, May, 2012  
    In this paper we consider the partial rendezous of mobile agents in asynchronous rings , which requires, for a given input g, that each agent meets (g-1) agents in some node. We propose two algorithms to solve the partial rendezvous problem. One algorithm is deterministic and assumes unique ID of each agent. The other is randomized and assumes anonymous agents. The ditermistic algorithm requires the number of agents' moves O (gn),which is optimal, where n is the number of nodes.
  • Toshiya Mega, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    IEICE technical report. Theoretical foundations of Computing, 112(24) 9-16, May, 2012  
    In this report, we consider uniform deployment algorithms for mobile agents, which guarantee that all agents are spread uniformly on a ring network. We propose algorithms for the whiteboard model and the token model, and analyze the memory requirement, the time complexity, and the total number of moves. We also prove the lower bound of the total number of moves required to achive the uniform deployment. This result shows that our algorithms are asymptotically optimal in terms of the total number of moves.
  • Shinji Kawai, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa
    Structural Information and Communication Complexity - 19th International Colloquium(SIROCCO), 303-314, Mar, 2012  
  • KIYOKAWA Kiyoshi, MORIYAMA Koichi, HATANAKA Masahide, HOSODA Kazufumi, OKADA Masashi, SHIGETA Hironori, ISHIHARA Yasunori, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, KURIHARA Satoshi
    SYSTEMS, CONTROL AND INFORMATION, 56(1) 14-20, Jan, 2012  Peer-reviewed
  • 岡崎祐也, 大下福仁, 角川裕次, 増澤利光
    平成23年度 情報処理学会関西支部 支部大会 講演論文集, 2011, Sep 22, 2011  
  • 和田悦朗, 大下福仁, 角川裕次, 増澤利光
    第73回全国大会講演論文集, 2011(1) 331-332, Mar 2, 2011  
    一様充填問題を解決するにあたり,自律移動が可能なロボティックセンサエージェント(以下,RSAと呼ぶ)を利用した方法がある.RSAを利用する手法には,対象領域の性質やRSAの性能の違いにより,多数のモデルが存在する.本稿では,格子型にモデル化を行った領域を扱い,議論を進めていく.また,対象領域の格子型へのモデル化の他に,対象領域の形状やアゴリズムの制約により,複数のモデルに分類し,各モデルにおいて求められるRSAの性能比較を行う.更に,分類したモデルの下で,それぞれ適用可能な提案アルゴリズムを紹介する.
  • 植村奈緒子, 大下福仁, 角川裕次, 増澤利光
    全国大会講演論文集, 2011(1) 253-255, Mar 2, 2011  
    本研究ではセンサネットワークを用いたトラッキングを扱う.<br />トラッキングとは移動体の位置情報を監視し,<br />ユーザに与えることである.また,センサネットワークでは<br />エネルギー消費を抑えることが望まれており,<br />送信されるメッセージ数を少なくすることが重要である.<br />多くの既存研究では,センサネットワーク内の1ノードを<br />データ保管用のノードとして設定することで,<br />ユーザが効率的に情報を収集することを提案している.<br />しかし,これらの手法ではユーザが必要としない時にも,<br />データ収集のためのメッセージを必要とする.<br />本研究では,データ保管用のノードを特定しないことにより,<br />ネットワーク全体でのメッセージ数を削減する手法を提案する.
  • 藤原啓, 長瀧寛之, 大下福仁, 角川裕次, 増澤利光
    第73回全国大会講演論文集, 2011(1) 467-468, Mar 2, 2011  
    本研究では,UNIXコマンドを実際に使用しながら効率的に学習することが可能なシステムを提案する.提案システムでは,学習者の入力したコマンド列に対して,同数かより少ないコマンドで置換可能な効率的なコマンド列を提案する.学習者が次にどのコマンドを入力すべきか分からない時には,次に入力すべきコマンドの候補を提示する.これにより学習者はシステムが提示したコマンドに関する知識の習得することが可能となる.次に,提案システムを利用して2人の学習者の入力履歴を比較し相互学習を行うこれによりシステムが適切に助言出来なかった場合にも,他の学習者の入力履歴から,学習者が新たな知識を習得することを期待できる.本発表では,提案システムの紹介・評価結果について説明する.
  • 川合慎治, 大下福仁, 角川裕次, 増澤利光
    平成22年度情報処理学会関西支部支部大会講演論文集, 2010, Sep 22, 2010  
  • IPSJ SIG Technical Report, Vol.2010-CE-105, No.2, 2010  
  • Technical Report of IPSJ, vol.2010-AL-125, no.4, pp.1-8, 2010  
  • Technical Report of IEICE (COMP2009-58), pp.57-64, 2010  
  • TAKADA ATSUSHI, YAMAUCHI YUKIKO, OOSHITA FUKUHITO, KAKUGAWA HIROTSUGU, MASUZAWA TOSHIMITSU
    Technical Report of IPSJ, vol.2010-AL-128, no.3, pp.1-8(3) 1-8, 2010  
  • 首藤 裕一, 馬場 大輔, 中村 純哉, 大下 福仁, 角川 裕次, 増澤 利光
    信学技報, 109(465) 57-64, 2010  
  • 中井 亮, 中村 純哉, 櫟 粛之, 大下 福仁, 角川 裕次, 増澤 利光
    第5回情報科学ワークショップ 予稿集, 147-150, Sep, 2009  
  • Technical Report of IPSJ, vol.2009-AL-124, no.5, pp.1-8, 2009  
  • Proceedings of 2009 International Symposium on Nonlinear Theory and its Applications (NOLTA), 2009  
  • Technical Report of IPSJ, vol.2009, no.3, pp.79-84, 2009  
  • Technical Report of IEICE (ET2009-86), vol.109, no.335, pp.199-204, 2009  
  • 中村 純哉, 櫟 粛之, 大下 福仁, 角川 裕次, 増澤 利光
    第5回情報科学ワークショップ 予稿集, 12, 2009  
  • HAYASHI Masahiro, NAGATAKI Hiroyuki, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, MASUZAWA Toshimitsu
    IPSJ SIG Notes, 2008(13) 119-126, Feb 17, 2008  
    In this paper, we propose HAKASE system which supports online discussion in collaborative learning. Specifically, HAKASE supports collaborative learning of the following style: Learners search useful online documents on the Web in advance. Then, they discuss online with HAKASE, like online chat. During a discussion, HAKASE presents appropriate online documents that learners found in advance. HAKASE system gives online discussion space in which learners easily make use of online documents, and at the same time, it makes learners be aware that opinion must be stated based on reasons, specifically, online documents that support their opinion. We implemented a prototype system of HAKASE, and evaluated it. This paper reports outline of implementation of HAKASE and evaluation of test operation.
  • Technical Report of IPSJ (2008-DPS-134), Vol. 2008, No. 21, pp. 219-224, 2008  
  • Proceedings of the 1st International Workshop on Technologies for Ambient Information Society, 2008  
  • Technical Report of IPSJ (2008-DPS-134), 2008  
  • Technical Report of IEICE (NS2008-38), 2008  
  • FURUKAWA Masahiro, SUZUKI Tomoko, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, MASUZAWA Toshimitsu
    IPSJ SIG Notes, 2007(19) 37-40, Mar 3, 2007  
    An f-resilient distributed algorithm solves a problem correctly if there are at most f faulty processes in a system. In this paper, we propose a tool to support understanding of f-resilient distributed algorithms. Our tool presents two similar executions of an algorithm: the one is an execution with f+1 faults in which the algorithm cannot solve the problem, and the other is an execution with f or f+1 faults in which the algorithm solves the problem. Users can easily understand the strategy for tolerating faults by comparing the executions. In addition, we present a method to reduce constructing time for the executions, and show by experiments that they are constructed in practical time.
  • MORIKAWA Masakazu, SUZUKI Tomoko, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, MASUZAWA Toshimitsu
    IPSJ SIG Notes, 2007(16) 357-362, Mar 2, 2007  
    A connected sensor cover is extremely useful to monitor an area in sensor networks: a connected sensor cover is a sub set of connected sensors, which covers the area to be monitored with the sensors' sensing regions. It is known that the connected sensor cover problem, which requires to find a connected sensor cover with the smallest number of sensors, is NP-hard. A connected sensor cover algorithm was proposed. However, the larger the area to be monitored is, the more it takes to find a connected sensor cover since only one sensor starts the algorithm. Therefore, in this paper, we proposed an algorithm, in which multiple sensors concurrently elect sensors to be included in a connected sensor cover. We show by simulation that the proposed algorithm finds a connected sensor cover with small number of sensors within a sufficiently short time.
  • NISHIKAWA Gen, YAMAUCHI Yukiko, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, MASUZAWA Toshimitsu
    IPSJ SIG Notes, 2007(16) 177-182, Mar 1, 2007  
    A Self-stabilizing protocol converges to the desired behavior regardless of an arbitary initial configuration. Thus, a self-stabilizing protocol has strong fault tolerance. However, to apply self-stabilizing protocols in dynamic networks such as mobile ad hoc networks, it is necessary to highly adapt topology changes. Chen et. al. introduced a self-stabilizing mutual exclusion protocol for mobile ad hoc networks that is adaptive for node mobility. However, it has less adaptability for node departuref[1]. In this paper we propose a self-stabilizing mutual exclusion protocol that improves adaptability for node departure of [1], and adaptability for node mobility and departure is evaluated by simulation.
  • ITO Ryota, NAGATAKI Hiroyuki, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, MASUZAWA Toshimitsu
    IEICE technical report, 106(507) 81-86, Jan 19, 2007  
    We propose an auto-generation method of error-correction exercises based on "Learning from mistakes" for algorithm learning. In this exercise, learners try to correct the given source code including faults and think the algorithm over. Our goal is to insert automatically well-designed faults that contribute to deepen the learners' comprehension of algorithms. We implemented the prototype, and evaluated the quality of the injected faults by comparing them with the faults carefully inserted for learners by algorithm experts. Moreover, we present the results of practicing exercises in lectures.
  • Technical Report of IPSJ (2007-MPS-67), vol.2007, no.128, pp.231-234, 2007  
  • Technical Report of IPSJ(2007-MPS-67), vol.2007, no.128, pp.227-230, 2007  
  • vol.106, no.566,pp.29-36, 2007  
  • INUI Koji, SUZUKI Tomoko, OOSHITA Fukuhito, KAKUGAWA Hirotsugu, MASUZAWA Toshimitsu
    IEICE technical report, 106(418) 39-44, Dec 7, 2006  
    One of the most efficient approaches to allocation and searching of objects in Peer-to-Peer (P2P) networks is distributed hash tables (DHTs). As multiple path based methods for improving fault tolerance of the DHTs, the multi-path and the wide-path methods have been proposed. However, the multi-path method requires smaller cost for its implementation, but its fault tolerance is not sufficient. In contrast, the wide-path method can achieve high fault tolerance but it requires larger cost. Therefore, in this paper, we propose a new hybrid approach and apply it to Chord that is one of the most fundamental DHTs. We show by mathematical analyses and simulations that the proposed metohd can attain sufficient fault tolerance with smaller cost than the pervious methods.

Major Research Projects

 19