scispace - formally typeset
Search or ask a question
Institution

University of Electro-Communications

EducationTokyo, Japan
About: University of Electro-Communications is a education organization based out in Tokyo, Japan. It is known for research contribution in the topics: Laser & Robot. The organization has 8041 authors who have published 16950 publications receiving 235832 citations. The organization is also known as: UEC & Denki-Tsūshin Daigaku.


Papers
More filters
Proceedings ArticleDOI
11 Mar 2009
TL;DR: A hypervisor architecture, called parapass-through, designed to minimize the code size of hypervisors by allowing most of the I/O access from the guest operating system (OS) to pass-through the hypervisor, while the minimum access necessary to implement security functionalities is completely mediated by thehypervisor.
Abstract: Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous components for providing virtual hardware devices and for sharing and protecting system resources among virtual machines (VMs), enlarging the code size of and reducing the reliability of the VMMs.This paper introduces a hypervisor architecture, called parapass-through, designed to minimize the code size of hypervisors by allowing most of the I/O access from the guest operating system (OS) to pass-through the hypervisor, while the minimum access necessary to implement security functionalities is completely mediated by the hypervisor. This architecture uses device drivers of the guest OS to handle devices, thereby reducing the size of components in the hypervisor to provide virtual devices. This architecture also allows to run only single VM on it, eliminating the components for sharing and protecting system resources among VMs.We implemented a hypervisor called BitVisor and a parapass-through driver for enforcing storage encryption of ATA devices based on the parapass-through architecture. The experimental result reveals that the hypervisor and ATA driver require approximately 20 kilo lines of code (KLOC) and 1.4 KLOC respectively.

204 citations

Journal ArticleDOI
TL;DR: In this paper, the authors pin down the origin of the coexistence of large thermopower and the low resistivity in Na x CoO 2, revealing that not just the density of states (DOS), the effective mass, nor the band width, but the peculiar shape of the 1 g band referred to as the "pudding mold" type, which consists of a dispersive portion and a somewhat flat portion, is playing an important role in this phenomenon.
Abstract: In the present study, we pin down the origin of the coexistence of the large thermopower and the low resistivity in Na x CoO 2 . It is revealed that not just the density of states (DOS), the effective mass, nor the band width, but the peculiar shape of the a 1 g band referred to as the “pudding mold” type, which consists of a dispersive portion and a somewhat flat portion, is playing an important role in this phenomenon. The present study provides a new guiding principle for designing good thermoelectric materials.

204 citations

Proceedings ArticleDOI
01 Dec 2015
TL;DR: This paper presents how to encrypt a linear controller using modified homomorphic encryption schemes based on public-key RSA and ElGamal encryption systems and confirms that only the scrambled parameters and signals can be seen in the controller device of the security-enhanced networked control system.
Abstract: This paper proposes a new concept of controller encryption for enhancement of the cyber-security of networked control systems and presents how to encrypt a linear controller using our modified homomorphic encryption schemes based on public-key RSA and ElGamal encryption systems. A remarkable advantage of the controller encryption is to be able to conceal several informations processed inside the controller device, such as controller parameters, references (recipes), measurements, control commands, and parameters of plant models in the internal model principal, maintaining an original function of the controller. Therefore, even if malicious users hacked the controller device by unauthorized accesses, it would take much time and cost to decipher and steal the control system's information. Finally, numerical examples confirm that only the scrambled parameters and signals can be seen in the controller device of the security-enhanced networked control system.

203 citations

Proceedings ArticleDOI
25 Jun 2001
TL;DR: The stability of Takagi-Sugeno fuzzy models via the so-called fuzzy Lyapunov function which is a multiple Lyap unov function is discussed, which gives the stability conditions for open-loop fuzzy systems.
Abstract: This paper discusses the stability of Takagi-Sugeno fuzzy models via the so-called fuzzy Lyapunov function which is a multiple Lyapunov function. The fuzzy Lyapunov function is defined by fuzzily blending quadratic Lyapunov functions. Based on a fuzzy Lyapunov approach, we gives the stability conditions for open-loop fuzzy systems. All the conditions derived here are represented in terms of linear matrix inequalities (LMIs) and contain upper bounds of the time derivative of premise membership functions as LMI variables. Hence, the treatment of the upper bounds play an important and effective role in system analysis and design. In addition, relaxed stability conditions are also derived by considering the property of the time derivative of premise membership functions. Several analysis and design examples illustrate the utility of the fuzzy Lyapunov approach.

202 citations

Journal ArticleDOI
TL;DR: A lower bound on the probability of decoding error for a quantum communication channel is presented, from which the strong converse to the quantum channel coding theorem is immediately shown.
Abstract: A lower bound on the probability of decoding error for a quantum communication channel is presented, from which the strong converse to the quantum channel coding theorem is immediately shown. The results and their derivations are mostly straightforward extensions of the classical counterparts which were established by Arimoto (1973), except that more careful treatment is necessary here due to the noncommutativity of operators.

201 citations


Authors

Showing all 8079 results

NameH-indexPapersCitations
Mildred S. Dresselhaus136762112525
Matthew Nguyen131129184346
Juan Bisquert10745046267
Dapeng Yu9474533613
Riichiro Saito9150248869
Shun-ichi Amari9049540383
Shigeru Nagase7661722099
Ingrid Verbauwhede7257521110
Satoshi Hasegawa6970822153
Yu Qiao6948429922
Yukio Tanaka6874419942
Zhijun Li6861414518
Iván Mora-Seró6723523229
Kazuo Tanaka6353527559
Da Xing6362414766
Network Information
Related Institutions (5)
Tokyo Institute of Technology
101.6K papers, 2.3M citations

93% related

Waseda University
46.8K papers, 837.8K citations

93% related

National Chiao Tung University
52.4K papers, 956.2K citations

90% related

NEC
57.6K papers, 835.9K citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202317
202258
2021644
2020815
2019908
2018837