The 2nd COE Postdoctoral and Doctoral Researchers
Technical Presentation

Date: Thursday, May. 26, 2005
Time: 13:30 - 15:30
Place: L1 Lecture Room
Language: English (Oral Presentation), English/Japanese (Question)
Chairperson: Mika Naganawa (Image Processing Laboratory : PD),
Hiroshi Igaki (Software Engineering Lab. : PD)

Program (20 mins each: 15 mins presentation and 5 mins discussion)

  1. "A Class of Linear Space Compactors for Enhanced Diagnostic"
    Thomas Clouqueur ( コンピュータ設計学講座 : PD )
    Thomas Clouqueur ( Computer Design and Test Laboratory: PD )

    [Abstract]
    Testing of VLSI circuits is challenged by the increasing volume of test data that add constraints on tester memory and impact test application time substantially. Space compactors are commonly used to reduce that test volume by one or two orders of magnitude. However, such level of compaction reduces the quality of the diagnostic of faults because it is difficult to identify the locations of errors in the compacted response. In this presentation, we will introduce a design for space compaction that can be used in pass/fail mode but also in diagnostic mode with enhanced performance by trading off compaction ratio for diagnostic ability. We will analyze the properties of the compactors and evaluate their performance through simulations.
    Top
  2. "Considerations of the Fundamental Experiment of the ad-hoc Network Operation"
    島田 秀輝 (インターネット・アーキテクチャ講座 : PD)
    Hideki Shimada (Internet Architecture and Systems Laboratory: PD)

    [Abstract]
    Ad-hoc network is the network that mobile terminals are configured autonomously. The challenge of configuring the ad-hoc network is the routing mechanism. Many routing mechanisms are proposed and standardized recently by IETF MANET working group. These standardized routing protocol are divided into two types, Proactive MANET Protocol (PMP) and Reactive MANET protocol (RMP). OLSR, one of PMP, and AODV, one of RMP, are completed to standardize and are implemented on the several architectures.
    We have ever investigated the property of the ad-hoc network on the network simulator inside the computers.To have been standardized the routing protocol, MANET technology will become to be used in the real space such as the sensor network and the home network. Consequently, we have operated and investigated the ad-hoc network in the real space by using existing implementations of the MANET routing protocol. In this presentation, we report the results of the fundamental experiments and propose the important technology that has been acquired through this operation of MANET.
    Top
  3. "What You Look At Is What You Control:A Universal Remote Control Based on Gaze Measurement Technology"
    竹村 憲太郎 (ロボティクス講座 : D3)
    Kentaro Takemura (Robotics Laboratory: PD)

    [Abstract]
    Nowadays, every home appliance has its own remote control.However this is inefficient since we have to use multiple remote controls even when we just want to turn on/off them. In this research, we propose a simple and intuitive interface called “A Gaze-Based Universal Remote Control” based on the gaze measurement technology. The concept of the interface is “what you look at is what you control” which enables you to control multiple appliances using one device such as a mouse connected to the computer. The feasibility of the proposed interface is confirmed through experiments using a prototype system.
    Top
  4. "A Software Protection Method Based on Instruction Camouflage"
    神崎 雄一郎 (ソフトウェア工学講座 : D3)
    Yuichiro Kanzaki (Software Engineering Laboratory: D3)

    [Abstract]
    I will be talking about a method for protecting software against illegal reverse engineering, by instruction camouflage. Our method first overwrites the original instructions with dummy instructions. Then, the binary program restores the original instructions within a certain period of execution, by autonomously replacing the dummy instructions with the original ones. This drastically increases the complexity of the code analysis, since the analysis fails if the dummy instructions are inspected as they are. In this presentation, I will show and discuss a 'camouflaged program' that contains a secret key of C2, a Feistel network-based block cipher designed for use in the area of digital entertainment content protection.
    Top
  5. "Telepresence System Using a Locomotion and High-resolution Videos"
    池田 聖 (視覚情報メディア講座:D3)
    Sei Ikeda (Vision and Media Computing Laboratory: D3)

    [Abstract]
    Telepresence system using real images provides us with a realistic field of view and a rich sense of presence in a remote site. In this paper, we propose a new design of telepresence system in which a user experiences to move his/her view position along a curved and straight path such as a road. In the system, four kinds of approaches improve a user's sense of presence in a remote site. Their approaches are about generation of image contents using an omnidirectional multi-camera system and about presentation of the generated contents using a locomotion interface. Evaluation using a questionnaire indicates that the proposed approaches are effective in the applications where a user often changes the speed of his/her walking.
    Top

21st Century COE Program
NAIST Graduate School of Information Science