Skip to main content

Showing 1–34 of 34 results for author: Ota, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01553  [pdf, other

    cs.AI

    Fish-bone diagram of research issue: Gain a bird's-eye view on a specific research topic

    Authors: JingHong Li, Huy Phan, Wen Gu, Koichi Ota, Shinobu Hasegawa

    Abstract: Novice researchers often face difficulties in understanding a multitude of academic papers and grasping the fundamentals of a new research field. To solve such problems, the knowledge graph supporting research survey is gradually being developed. Existing keyword-based knowledge graphs make it difficult for researchers to deeply understand abstract concepts. Meanwhile, novice researchers may find… ▽ More

    Submitted 10 July, 2024; v1 submitted 30 April, 2024; originally announced July 2024.

    Comments: This paper has been accepted by IEEE SMC 2024

  2. arXiv:2406.05331  [pdf, other

    cs.RO

    Autonomous Robotic Assembly: From Part Singulation to Precise Assembly

    Authors: Kei Ota, Devesh K. Jha, Siddarth Jain, Bill Yerazunis, Radu Corcodel, Yash Shukla, Antonia Bronars, Diego Romeres

    Abstract: Imagine a robot that can assemble a functional product from the individual parts presented in any configuration to the robot. Designing such a robotic system is a complex problem which presents several open challenges. To bypass these challenges, the current generation of assembly systems is built with a lot of system integration effort to provide the structure and precision necessary for assembly… ▽ More

    Submitted 11 June, 2024; v1 submitted 7 June, 2024; originally announced June 2024.

    Comments: Under submission

  3. arXiv:2403.18960  [pdf, other

    cs.RO

    Robust In-Hand Manipulation with Extrinsic Contacts

    Authors: Boyuan Liang, Kei Ota, Masayoshi Tomizuka, Devesh Jha

    Abstract: We present in-hand manipulation tasks where a robot moves an object in grasp, maintains its external contact mode with the environment, and adjusts its in-hand pose simultaneously. The proposed manipulation task leads to complex contact interactions which can be very susceptible to uncertainties in kinematic and physical parameters. Therefore, we propose a robust in-hand manipulation method, which… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted at ICRA 24

  4. arXiv:2402.04854  [pdf, other

    cs.DL cs.CL cs.LG

    Hierarchical Tree-structured Knowledge Graph For Academic Insight Survey

    Authors: Jinghong Li, Huy Phan, Wen Gu, Koichi Ota, Shinobu Hasegawa

    Abstract: Research surveys have always posed a challenge for beginner researchers who lack of research training. These researchers struggle to understand the directions within their research topic, and the discovery of new research findings within a short time. One way to provide intuitive assistance to beginner researchers is by offering relevant knowledge graphs(KG) and recommending related academic paper… ▽ More

    Submitted 4 July, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: This paper has been accepted by 'The 18TH International Conference on INnovations in Intelligent SysTems and Applications (INISTA 2024)'

  5. arXiv:2312.09038  [pdf, other

    cs.CV cs.DL cs.LG

    Object Recognition from Scientific Document based on Compartment Refinement Framework

    Authors: Jinghong Li, Wen Gu, Koichi Ota, Shinobu Hasegawa

    Abstract: With the rapid development of the internet in the past decade, it has become increasingly important to extract valuable information from vast resources efficiently, which is crucial for establishing a comprehensive digital ecosystem, particularly in the context of research surveys and comprehension. The foundation of these tasks focuses on accurate extraction and deep mining of data from scientifi… ▽ More

    Submitted 4 July, 2024; v1 submitted 14 December, 2023; originally announced December 2023.

    Comments: arXiv admin note: text overlap with arXiv:2305.17401

  6. arXiv:2310.14784  [pdf, other

    cs.LG cs.AI

    An Efficient Imbalance-Aware Federated Learning Approach for Wearable Healthcare with Autoregressive Ratio Observation

    Authors: Wenhao Yan, He Li, Kaoru Ota, Mianxiong Dong

    Abstract: Widely available healthcare services are now getting popular because of advancements in wearable sensing techniques and mobile edge computing. People's health information is collected by edge devices such as smartphones and wearable bands for further analysis on servers, then send back suggestions and alerts for abnormal conditions. The recent emergence of federated learning allows users to train… ▽ More

    Submitted 30 October, 2023; v1 submitted 23 October, 2023; originally announced October 2023.

    Comments: submitted to IEEE OJCS in Oct. 2023, under review

  7. arXiv:2309.14552  [pdf, other

    cs.RO cs.AI cs.LG

    Tactile Estimation of Extrinsic Contact Patch for Stable Placement

    Authors: Kei Ota, Devesh K. Jha, Krishna Murthy Jatavallabhula, Asako Kanezaki, Joshua B. Tenenbaum

    Abstract: Precise perception of contact interactions is essential for fine-grained manipulation skills for robots. In this paper, we present the design of feedback skills for robots that must learn to stack complex-shaped objects on top of each other (see Fig.1). To design such a system, a robot should be able to reason about the stability of placement from very gentle contact interactions. Our results demo… ▽ More

    Submitted 23 March, 2024; v1 submitted 25 September, 2023; originally announced September 2023.

    Comments: Accepted at ICRA2024

  8. arXiv:2306.15644  [pdf, other

    cs.CL

    Style-transfer based Speech and Audio-visual Scene Understanding for Robot Action Sequence Acquisition from Videos

    Authors: Chiori Hori, Puyuan Peng, David Harwath, Xinyu Liu, Kei Ota, Siddarth Jain, Radu Corcodel, Devesh Jha, Diego Romeres, Jonathan Le Roux

    Abstract: To realize human-robot collaboration, robots need to execute actions for new tasks according to human instructions given finite prior knowledge. Human experts can share their knowledge of how to perform a task with a robot through multi-modal instructions in their demonstrations, showing a sequence of short-horizon steps to achieve a long-horizon goal. This paper introduces a method for robot acti… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

    Comments: Accepted to Interspeech2023

  9. A Framework For Refining Text Classification and Object Recognition from Academic Articles

    Authors: Jinghong Li, Koichi Ota, Wen Gu, Shinobu Hasegawa

    Abstract: With the widespread use of the internet, it has become increasingly crucial to extract specific information from vast amounts of academic articles efficiently. Data mining techniques are generally employed to solve this issue. However, data mining for academic articles is challenging since it requires automatically extracting specific patterns in complex and unstructured layout documents. Current… ▽ More

    Submitted 2 July, 2024; v1 submitted 27 May, 2023; originally announced May 2023.

    Comments: This paper has been accepted at 'The International Symposium on Innovations in Intelligent Systems and Applications 2023 (INISTA 2023)'

  10. Wital: A COTS WiFi Devices Based Vital Signs Monitoring System Using NLOS Sensing Model

    Authors: Xiang Zhang, Yu Gu, Huan Yan, Yantong Wang, Mianxiong Dong, Kaoru Ota, Fuji Ren, Yusheng Ji

    Abstract: Vital sign (breathing and heartbeat) monitoring is essential for patient care and sleep disease prevention. Most current solutions are based on wearable sensors or cameras; however, the former could affect sleep quality, while the latter often present privacy concerns. To address these shortcomings, we propose Wital, a contactless vital sign monitoring system based on low-cost and widespread comme… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Comments: Accepted by IEEE THMS

    Journal ref: IEEE Transactions on Human-Machine Systems,2023

  11. arXiv:2303.06034  [pdf, other

    cs.RO cs.AI cs.LG

    Tactile-Filter: Interactive Tactile Perception for Part Mating

    Authors: Kei Ota, Devesh K. Jha, Hsiao-Yu Tung, Joshua B. Tenenbaum

    Abstract: Humans rely on touch and tactile sensing for a lot of dexterous manipulation tasks. Our tactile sensing provides us with a lot of information regarding contact formations as well as geometric information about objects during any interaction. With this motivation, vision-based tactile sensors are being widely used for various robotic perception and control tasks. In this paper, we present a method… ▽ More

    Submitted 5 June, 2023; v1 submitted 10 March, 2023; originally announced March 2023.

    Comments: Accepted at RSS2023

  12. arXiv:2212.11133  [pdf, other

    cs.CR

    Device-Bind Key-Storageless Hardware AI Model IP Protection: A PUF and Permute-Diffusion Encryption-Enabled Approach

    Authors: Qianqian Pan, Mianxiong Dong, Kaoru Ota, Jun Wu

    Abstract: Machine learning as a service (MLaaS) framework provides intelligent services or well-trained artificial intelligence (AI) models for local devices. However, in the process of model transmission and deployment, there are security issues, i.e. AI model leakage due to the unreliable transmission environments and illegal abuse at local devices without permission. Although existing works study the int… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

    Comments: 12 pages, 9 figures, 4 tables

    MSC Class: 68M25

  13. arXiv:2210.12521  [pdf, other

    cs.RO cs.AI cs.CV

    H-SAUR: Hypothesize, Simulate, Act, Update, and Repeat for Understanding Object Articulations from Interactions

    Authors: Kei Ota, Hsiao-Yu Tung, Kevin A. Smith, Anoop Cherian, Tim K. Marks, Alan Sullivan, Asako Kanezaki, Joshua B. Tenenbaum

    Abstract: The world is filled with articulated objects that are difficult to determine how to use from vision alone, e.g., a door might open inwards or outwards. Humans handle these objects with strategic trial-and-error: first pushing a door then pulling if that doesn't work. We enable these capabilities in autonomous agents by proposing "Hypothesize, Simulate, Act, Update, and Repeat" (H-SAUR), a probabil… ▽ More

    Submitted 22 October, 2022; originally announced October 2022.

  14. arXiv:2206.01011  [pdf, other

    cs.LG cs.AI

    Policy Gradient Algorithms with Monte Carlo Tree Learning for Non-Markov Decision Processes

    Authors: Tetsuro Morimura, Kazuhiro Ota, Kenshi Abe, Peinan Zhang

    Abstract: Policy gradient (PG) is a reinforcement learning (RL) approach that optimizes a parameterized policy model for an expected return using gradient ascent. While PG can work well even in non-Markovian environments, it may encounter plateaus or peakiness issues. As another successful RL approach, algorithms based on Monte Carlo Tree Search (MCTS), which include AlphaZero, have obtained groundbreaking… ▽ More

    Submitted 4 July, 2024; v1 submitted 2 June, 2022; originally announced June 2022.

    Comments: Accepted to Reinforcement Learning Conference (RLC) 2024

  15. arXiv:2203.14708  [pdf, other

    cs.CV cs.AI cs.LG cs.RO

    Object Memory Transformer for Object Goal Navigation

    Authors: Rui Fukushima, Kei Ota, Asako Kanezaki, Yoko Sasaki, Yusuke Yoshiyasu

    Abstract: This paper presents a reinforcement learning method for object goal navigation (ObjNav) where an agent navigates in 3D indoor environments to reach a target object based on long-term observations of objects and scenes. To this end, we propose Object Memory Transformer (OMT) that consists of two key ideas: 1) Object-Scene Memory (OSM) that enables to store long-term scenes and object semantics, and… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: 7 pages, 3 figures, Accepted at ICRA 2022

  16. arXiv:2202.10338  [pdf, other

    cs.LG

    UAV Base Station Trajectory Optimization Based on Reinforcement Learning in Post-disaster Search and Rescue Operations

    Authors: Shiye Zhao, Kaoru Ota, Mianxiong Dong

    Abstract: Because of disaster, terrestrial base stations (TBS) would be partly crashed. Some user equipments (UE) would be unserved. Deploying unmanned aerial vehicles (UAV) as aerial base stations is a method to cover UEs quickly. But existing methods solely refer to the coverage of UAVs. In those scenarios, they focus on the deployment of UAVs in the post-disaster area where all TBSs do not work any longe… ▽ More

    Submitted 17 February, 2022; originally announced February 2022.

  17. arXiv:2202.08972  [pdf, other

    cs.LG cs.AI

    Deep Reinforcement Learning Based Multi-Access Edge Computing Schedule for Internet of Vehicle

    Authors: Xiaoyu Dai, Kaoru Ota, Mianxiong Dong

    Abstract: As intelligent transportation systems been implemented broadly and unmanned arial vehicles (UAVs) can assist terrestrial base stations acting as multi-access edge computing (MEC) to provide a better wireless network communication for Internet of Vehicles (IoVs), we propose a UAVs-assisted approach to help provide a better wireless network service retaining the maximum Quality of Experience(QoE) of… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

    Comments: 10 pages, 10 figures

  18. arXiv:2112.04682  [pdf, other

    cs.LG

    Clairvoyance: Intelligent Route Planning for Electric Buses Based on Urban Big Data

    Authors: Xiangyong Lu, Kaoru Ota, Mianxiong Dong, Chen Yu, Hai Jin

    Abstract: Nowadays many cities around the world have introduced electric buses to optimize urban traffic and reduce local carbon emissions. In order to cut carbon emissions and maximize the utility of electric buses, it is important to choose suitable routes for them. Traditionally, route selection is on the basis of dedicated surveys, which are costly in time and labor. In this paper, we mainly focus atten… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

    Comments: 13 pages,12 figures

  19. arXiv:2109.04307  [pdf, other

    cs.LG cs.AI cs.RO

    OPIRL: Sample Efficient Off-Policy Inverse Reinforcement Learning via Distribution Matching

    Authors: Hana Hoshino, Kei Ota, Asako Kanezaki, Rio Yokota

    Abstract: Inverse Reinforcement Learning (IRL) is attractive in scenarios where reward engineering can be tedious. However, prior IRL algorithms use on-policy transitions, which require intensive sampling from the current policy for stable and optimal performance. This limits IRL applications in the real world, where environment interactions can become highly expensive. To tackle this problem, we present Of… ▽ More

    Submitted 22 May, 2022; v1 submitted 9 September, 2021; originally announced September 2021.

    Comments: ICRA2022

  20. arXiv:2105.09679  [pdf, ps, other

    cond-mat.dis-nn cs.LG q-bio.NC stat.ML

    Improved Neuronal Ensemble Inference with Generative Model and MCMC

    Authors: Shun Kimura, Keisuke Ota, Koujin Takeda

    Abstract: Neuronal ensemble inference is a significant problem in the study of biological neural networks. Various methods have been proposed for ensemble inference from experimental data of neuronal activity. Among them, Bayesian inference approach with generative model was proposed recently. However, this method requires large computational cost for appropriate inference. In this work, we give an improved… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

    Comments: 23 pages, 8 figures, partially overlapped with arXiv:1911.06509

    Journal ref: J. Stat. Mech. (2021) 063501

  21. arXiv:2105.09579  [pdf, other

    cs.LG stat.ML

    Aggregate Learning for Mixed Frequency Data

    Authors: Takamichi Toda, Daisuke Moriwaki, Kazuhiro Ota

    Abstract: Large and acute economic shocks such as the 2007-2009 financial crisis and the current COVID-19 infections rapidly change the economic environment. In such a situation, the importance of real-time economic analysis using alternative datais emerging. Alternative data such as search query and location data are closer to real-time and richer than official statistics that are typically released once a… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

  22. arXiv:2102.07920  [pdf, other

    cs.LG cs.AI cs.RO

    Training Larger Networks for Deep Reinforcement Learning

    Authors: Kei Ota, Devesh K. Jha, Asako Kanezaki

    Abstract: The success of deep learning in the computer vision and natural language processing communities can be attributed to training of very deep neural networks with millions or billions of parameters which can then be trained with massive amounts of data. However, similar trend has largely eluded training of deep reinforcement learning (RL) algorithms where larger networks do not lead to performance im… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

    Comments: Under submission

  23. arXiv:2011.07193  [pdf, other

    cs.LG cs.AI cs.RO

    Data-Efficient Learning for Complex and Real-Time Physical Problem Solving using Augmented Simulation

    Authors: Kei Ota, Devesh K. Jha, Diego Romeres, Jeroen van Baar, Kevin A. Smith, Takayuki Semitsu, Tomoaki Oiki, Alan Sullivan, Daniel Nikovski, Joshua B. Tenenbaum

    Abstract: Humans quickly solve tasks in novel systems with complex dynamics, without requiring much interaction. While deep reinforcement learning algorithms have achieved tremendous success in many complex tasks, these algorithms need a large number of samples to learn meaningful policies. In this paper, we present a task for navigating a marble to the center of a circular maze. While this system is very i… ▽ More

    Submitted 15 February, 2021; v1 submitted 13 November, 2020; originally announced November 2020.

    Comments: Under submission

  24. arXiv:2011.00155  [pdf, other

    cs.RO cs.AI cs.LG

    Deep Reactive Planning in Dynamic Environments

    Authors: Kei Ota, Devesh K. Jha, Tadashi Onishi, Asako Kanezaki, Yusuke Yoshiyasu, Yoko Sasaki, Toshisada Mariyama, Daniel Nikovski

    Abstract: The main novelty of the proposed approach is that it allows a robot to learn an end-to-end policy which can adapt to changes in the environment during execution. While goal conditioning of policies has been studied in the RL literature, such approaches are not easily extended to cases where the robot's goal can change during execution. This is something that humans are naturally able to do. Howeve… ▽ More

    Submitted 5 November, 2020; v1 submitted 30 October, 2020; originally announced November 2020.

    Comments: 15 pages, 5 figures. Accepted at CoRL 2020

  25. arXiv:2003.01641  [pdf, other

    cs.LG cs.RO stat.ML

    Efficient Exploration in Constrained Environments with Goal-Oriented Reference Path

    Authors: Kei Ota, Yoko Sasaki, Devesh K. Jha, Yusuke Yoshiyasu, Asako Kanezaki

    Abstract: In this paper, we consider the problem of building learning agents that can efficiently learn to navigate in constrained environments. The main goal is to design agents that can efficiently learn to understand and generalize to different environments using high-dimensional inputs (a 2D map), while following feasible paths that avoid obstacles in obstacle-cluttered environment. To achieve this, we… ▽ More

    Submitted 3 March, 2020; originally announced March 2020.

    Comments: 8 pages, 10 figures

  26. arXiv:2003.01629  [pdf, other

    cs.LG cs.RO stat.ML

    Can Increasing Input Dimensionality Improve Deep Reinforcement Learning?

    Authors: Kei Ota, Tomoaki Oiki, Devesh K. Jha, Toshisada Mariyama, Daniel Nikovski

    Abstract: Deep reinforcement learning (RL) algorithms have recently achieved remarkable successes in various sequential decision making tasks, leveraging advances in methods for training large deep networks. However, these methods usually require large amounts of training data, which is often a big problem for real-world applications. One natural question to ask is whether learning good representations for… ▽ More

    Submitted 26 June, 2020; v1 submitted 3 March, 2020; originally announced March 2020.

    Comments: 11 pages, 10 figures. Accepted to ICML 2020

  27. arXiv:1903.05751  [pdf, other

    stat.ML cs.LG cs.RO

    Trajectory Optimization for Unknown Constrained Systems using Reinforcement Learning

    Authors: Kei Ota, Devesh K. Jha, Tomoaki Oiki, Mamoru Miura, Takashi Nammoto, Daniel Nikovski, Toshisada Mariyama

    Abstract: In this paper, we propose a reinforcement learning-based algorithm for trajectory optimization for constrained dynamical systems. This problem is motivated by the fact that for most robotic systems, the dynamics may not always be known. Generating smooth, dynamically feasible trajectories could be difficult for such systems. Using sampling-based algorithms for motion planning may result in traject… ▽ More

    Submitted 3 March, 2020; v1 submitted 13 March, 2019; originally announced March 2019.

    Comments: 8 pages, 6 figures, Accepted to IROS 2019

  28. arXiv:1903.05534  [pdf, other

    cs.GT

    Robustness against Agent Failure in Hedonic Games

    Authors: Ayumi Igarashi, Kazunori Ota, Yuko Sakurai, Makoto Yokoo

    Abstract: We study how stability can be maintained even after any set of at most k players leave their groups, in the context of hedonic games. While stability properties ensure an outcome to be robust against players' deviations, it has not been considered how an unexpected change caused by a sudden deletion of players affects stable outcomes. In this paper, we propose a novel criterion that reshapes stabi… ▽ More

    Submitted 20 March, 2019; v1 submitted 13 March, 2019; originally announced March 2019.

    Comments: 17 pages

  29. arXiv:1710.03889  [pdf, ps, other

    cs.HC

    Air Mounted Eyepiece: Design Methods for Aerial Optical Functions of Near-Eye and See-Through Display using Transmissive Mirror Device

    Authors: Yoichi Ochiai, Kazuki Otao, Hiroyuki Osone

    Abstract: We propose a novel method to implement an optical see-through head mounted display which renders real aerial images with a wide viewing angle, called an Air Mounted Eyepiece (AME). To achieve the AMD design, we employ an off-the-shelf head mounted display and Transmissive Mirror Device (TMD) which is usually used in aerial real imaging systems. In the proposed method, we replicate the function of… ▽ More

    Submitted 10 October, 2017; originally announced October 2017.

    Comments: 7 pages

  30. arXiv:1408.4817  [pdf, ps, other

    cs.GT cs.NI

    A Game-Theoretic Approach to Energy-Efficient Resource Allocation in Device-to-Device Underlay Communications

    Authors: Zhenyu Zhou, Mianxiong Dong, Kaoru Ota, Ruifeng Shi, Zhiheng Liu, Takuro Sato

    Abstract: Despite the numerous benefits brought by Device-to-Device (D2D) communications, the introduction of D2D into cellular networks poses many new challenges in the resource allocation design due to the co-channel interference caused by spectrum reuse and limited battery life of User Equipments (UEs). Most of the previous studies mainly focus on how to maximize the Spectral Efficiency (SE) and ignore t… ▽ More

    Submitted 20 August, 2014; originally announced August 2014.

    Comments: submitted to IET Communications. arXiv admin note: substantial text overlap with arXiv:1405.1963, arXiv:1407.1556

  31. Energy Efficiency and Spectral Efficiency Tradeoff in Device-to-Device (D2D) Communications

    Authors: Zhenyu Zhou, Mianxiong Dong, Kaoru Ota, Jun Wu, Takuro Sato

    Abstract: In this letter, we investigate the tradeoff between energy efficiency (EE) and spectral efficiency (SE) in device-to-device (D2D) communications underlaying cellular networks with uplink channel reuse. The resource allocation problem is modeled as a noncooperative game, in which each user equipment (UE) is self-interested and wants to maximize its own EE. Given the SE requirement and maximum trans… ▽ More

    Submitted 6 July, 2014; originally announced July 2014.

    Comments: 8 pages, 6 figures, long version paper of IEEE Wireless Communications Letters, accepted for publication. arXiv admin note: text overlap with arXiv:1405.1963

  32. arXiv:1405.6200  [pdf, ps, other

    cs.DC cs.CR

    HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center

    Authors: Mianxiong Dong, He Li, Kaoru Ota, Haojin Zhu

    Abstract: In cloud data center, shared storage with good management is a main structure used for the storage of virtual machines (VM). In this paper, we proposed Hybrid VM storage (HVSTO), a privacy preserving shared storage system designed for the virtual machine storage in large-scale cloud data center. Unlike traditional shared storage, HVSTO adopts a distributed structure to preserve privacy of virtual… ▽ More

    Submitted 23 May, 2014; originally announced May 2014.

    Comments: 7 pages, 8 figures, in proceeding of The Second International Workshop on Security and Privacy in Big Data (BigSecurity 2014)

  33. Distributed Interference-Aware Energy-Efficient Resource Allocation for Device-to-Device Communications Underlaying Cellular Networks

    Authors: Zhenyu Zhou, Mianxiong Dong, Kaoru Ota, Jun Wu, Takuro Sato

    Abstract: The introduction of device-to-device (D2D) into cellular networks poses many new challenges in the resource allocation design due to the co-channel interference caused by spectrum reuse and limited battery life of user equipments (UEs). In this paper, we propose a distributed interference-aware energy-efficient resource allocation algorithm to maximize each UE's energy efficiency (EE) subject to i… ▽ More

    Submitted 22 July, 2014; v1 submitted 3 May, 2014; originally announced May 2014.

    Comments: 6 pages, 3 figures, IEEE GLOBECOM 2014

  34. arXiv:1405.0660  [pdf, ps, other

    cs.CR cs.NI

    NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security

    Authors: Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, Guangwei Wang

    Abstract: Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security. Under the new environment, however, this approach can not meet the needs of cloud security. New cloud… ▽ More

    Submitted 4 May, 2014; originally announced May 2014.

    Comments: 10pages, 10figures