Skip to main content

Showing 1–5 of 5 results for author: Miyamoto, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.17428  [pdf, other

    cs.CY cs.HC

    Metaverse Perspectives from Japan: A Participatory Speculative Design Case Study

    Authors: Michel Hohendanner, Chiara Ullstein, Dohjin Miyamoto, Emma Fukuwatari Huffman, Gudrun Socher, Jens Grossklags, Hirotaka Osawa

    Abstract: Currently, the development of the metaverse lies in the hands of industry. Citizens have little influence on this process. Instead, to do justice to the pluralism of (digital) societies, we should strive for an open discourse including many different perspectives on the metaverse and its core technologies such as AI. We utilize a participatory speculative design (PSD) approach to explore Japanese… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Journal ref: Proceedings of the ACM on Human-Computer Interaction 2024, Volume 8, Issue CSCW2

  2. arXiv:2203.14188  [pdf, ps, other

    cs.LG cs.CY cs.DC

    mdx: A Cloud Platform for Supporting Data Science and Cross-Disciplinary Research Collaborations

    Authors: Toyotaro Suzumura, Akiyoshi Sugiki, Hiroyuki Takizawa, Akira Imakura, Hiroshi Nakamura, Kenjiro Taura, Tomohiro Kudoh, Toshihiro Hanawa, Yuji Sekiya, Hiroki Kobayashi, Shin Matsushima, Yohei Kuga, Ryo Nakamura, Renhe Jiang, Junya Kawase, Masatoshi Hanai, Hiroshi Miyazaki, Tsutomu Ishizaki, Daisuke Shimotoku, Daisuke Miyamoto, Kento Aida, Atsuko Takefusa, Takashi Kurimoto, Koji Sasayama, Naoya Kitagawa , et al. (8 additional authors not shown)

    Abstract: The growing amount of data and advances in data science have created a need for a new kind of cloud platform that provides users with flexibility, strong security, and the ability to couple with supercomputers and edge devices through high-performance networks. We have built such a nation-wide cloud platform, called "mdx" to meet this need. The mdx platform's virtualization service, jointly operat… ▽ More

    Submitted 26 March, 2022; originally announced March 2022.

  3. Classification of URL bitstreams using Bag of Bytes

    Authors: Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi

    Abstract: Protecting users from accessing malicious web sites is one of the important management tasks for network operators. There are many open-source and commercial products to control web sites users can access. The most traditional approach is blacklist-based filtering. This mechanism is simple but not scalable, though there are some enhanced approaches utilizing fuzzy matching technologies. Other appr… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

  4. Classifying DNS Servers based on Response Message Matrix using Machine Learning

    Authors: Keiichi Shima, Ryo Nakamura, Kazuya Okada, Tomohiro Ishihara, Daisuke Miyamoto, Yuji Sekiya

    Abstract: Improperly configured domain name system (DNS) servers are sometimes used as packet reflectors as part of a DoS or DDoS attack. Detecting packets created as a result of this activity is logically possible by monitoring the DNS request and response traffic. Any response that does not have a corresponding request can be considered a reflected message; checking and tracking every DNS packet, however,… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

  5. arXiv:2008.06813  [pdf, other

    cs.CR

    Attributes affecting user decision to adopt a Virtual Private Network (VPN) app

    Authors: Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley

    Abstract: A Virtual Private Network (VPN) helps to mitigate security and privacy risks of data transmitting on unsecured network such as public Wi-Fi. However, despite awareness of public Wi-Fi risks becoming increasingly common, the use of VPN when using public Wi-Fi is low. To increase adoption, understanding factors driving user decision to adopt a VPN app is an important first step. This study is the fi… ▽ More

    Submitted 15 August, 2020; originally announced August 2020.

    Comments: First published in the 22nd International Conference on Information and Communications Security (ICICS 2020), Copenhagen, Denmark