In this study, four types of microcontrollers (MCUs) operating under actual operating conditions, in which MCUs are regularly reset, are irradiated with white and quasi-monoenergetic neutron beams using our newly deve...
详细信息
In this study, four types of microcontrollers (MCUs) operating under actual operating conditions, in which MCUs are regularly reset, are irradiated with white and quasi-monoenergetic neutron beams using our newly developed dynamic irradiation test environment. The results of the irradiation tests have good agreement, and show that neutron-induced soft error rates of the MCUs are almost the same, and are within the range of 0.1 to 0.2 FIT. Using the acquired data, the correlation between the characteristics of the running software and the number of soft errors are also analyzed.
In cloud environments, faults and run-time anomalies in the infrastructure can exhaust resources, and impact the performance of all applications that share them. A resource monitoring strategy alone is inadequate sinc...
详细信息
In cloud environments, faults and run-time anomalies in the infrastructure can exhaust resources, and impact the performance of all applications that share them. A resource monitoring strategy alone is inadequate since snapshots of resource usage cannot provide any guarantee of application performance. This paper outlines an approach that enables an application to leverage the vast capacity and elasticity of the cloud to mitigate the deleterious effects of resource exhaustion at a node. It models the application as a network of servers and the flow dynamics of request streams as continuous functions of time, using queuing techniques. The strategy is to compute, for each server, the mean flow rate and the mean holding time and use this to decide among: a) redirecting the flow to another server, b) requesting additional resources from the cloud infrastructure, c) spawning additional server instances, or d) combining server instances to conserve resources. This dynamic re-configurability by scaling improves application fault-tolerance, availability, and resource utilization. (c) 2012 Alcatel-Lucent.
An anaphora is a type of expression whose reference depends upon another referential element. In order to become aware of situations or human intentions by natural language understanding, it is important to estimate c...
详细信息
ISBN:
(纸本)9781479906505
An anaphora is a type of expression whose reference depends upon another referential element. In order to become aware of situations or human intentions by natural language understanding, it is important to estimate correctly what anaphoric expressions indicate. In particular, an anaphora resolution for Japanese demonstrative determiners is critical to be aware of situation, context or a causal relationship in dialogue. Ontology-based similarity has been proposed as a way to identify referential elements;however, a method using ontology alone cannot resolve all anaphoric relations. This paper proposes an anaphora analysis method that uses semantic similarity between different part-of-speech and conceptual dependency structure. This method specializes in resolving clause anaphoric. The evaluation of this method showed 100% accuracy for resolving Japanese demonstrative determiner in counseling dialogue.
This article introduces Telelogin, a two-factor two-path authentication technique for user authentication that uses caller ID (calling number notification function) in addition to user ID and password authentication o...
详细信息
This article introduces Telelogin, a two-factor two-path authentication technique for user authentication that uses caller ID (calling number notification function) in addition to user ID and password authentication over the Internet. This technique achieves highly secure personal authentication through the simple act of making a phone call.
This article describes the personalized-service platform that we are developing for next-generation network services. It can provide a cross-section of information and services selected from a large amount of data acc...
详细信息
This article describes the personalized-service platform that we are developing for next-generation network services. It can provide a cross-section of information and services selected from a large amount of data according to users' preferences and regardless of the type of service. It frees users from the need to actively perform any particular operations, such as entering preferences, and lets them passively receive services that are compatible with their preferences from a large body of information. The key technique for achieving this is user profiling.
The security of mobility voice networks has traditionally been ensured by deploying point-to-point circuit-switched transport between network elements and by isolating the voice infrastructure from the public data net...
详细信息
The security of mobility voice networks has traditionally been ensured by deploying point-to-point circuit-switched transport between network elements and by isolating the voice infrastructure from the public data network. However, with the introduction of new services such as Voice over Internet Protocol (VoIP) and the trend toward IP transport between network elements, this approach is no longer adequate. To guarantee the security of IP-based voice and data networks, both human-to-machine and machine-to-machine interfaces must be secured using an approach that is consistent with industry best practices, and is robust and easy to manage. This paper describes a common infrastructure for managing network element security, encompassing both CDMA2000* 1x and CDMA2000 1x evolution data optimized (1x EV-DO) networks that contain hundreds of individual network elements. The architecture provides a common, centralized infrastructure for security management, including configuration management, data audits, logging, and key distribution. The networks are secured against both internal and external threats by addressing standard security dimensions such as authentication, privacy, non-repudiation, and access control. (C) 2007 Alcatel-Lucent.
This article introduces a conversation-linked navigation system that uses keywords occurring during a telephone conversation to guide users to relevant content on the Internet in a seamless manner in real time.
This article introduces a conversation-linked navigation system that uses keywords occurring during a telephone conversation to guide users to relevant content on the Internet in a seamless manner in real time.
This article outlines NTT's storage centric network system VI (version 1), which offers a safe environment that prevents an enterprise's customer data from leaking and ensures rapid recovery and business conti...
详细信息
This article outlines NTT's storage centric network system VI (version 1), which offers a safe environment that prevents an enterprise's customer data from leaking and ensures rapid recovery and business continuity in the event of a disaster. This system reduces the total cost of ownership through on-demand use of the IT (information technology) resources and unifying PC terminal management.
Open source software (OSS), which was made famous by Linux, has extended to the field of Web application servers: the platform for applications on the World Wide Web. This article introduces the trends of OSS J2EE (Ja...
详细信息
Open source software (OSS), which was made famous by Linux, has extended to the field of Web application servers: the platform for applications on the World Wide Web. This article introduces the trends of OSS J2EE (Java 2 platform, Enterprise Edition) servers based on J2EE specifications the industry standard specification for Web application servers. It also mentions the activities of NTT Information Sharing platform Laboratories aimed at introducing OSS-J2EE servers in enterprises.
The ongoing development of open source software by a worldwide open source community of software developers and users is expected to bring great changes to conventional system development. This article introduces acti...
详细信息
The ongoing development of open source software by a worldwide open source community of software developers and users is expected to bring great changes to conventional system development. This article introduces activities in NTT Laboratories that aim at greater use of open source software.
暂无评论