Zum Hauptinhalt springen

Showing 1–7 of 7 results for author: Shima, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.16874  [pdf

    cs.IR cs.AI cs.CL

    Enhancing Retrieval Processes for Language Generation with Augmented Queries

    Authors: Julien Pierre Edmond Ghali, Kosuke Shima, Koichi Moriyama, Atsuko Mutoh, Nobuhiro Inuzuka

    Abstract: In the rapidly changing world of smart technology, searching for documents has become more challenging due to the rise of advanced language models. These models sometimes face difficulties, like providing inaccurate information, commonly known as "hallucination." This research focuses on addressing this issue through Retrieval-Augmented Generation (RAG), a technique that guides models to give accu… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

    Comments: 28 pages, 10 annexes, 2 figures

  2. WebRTC-based measurement tool for peer-to-peer applications and preliminary findings with real users

    Authors: Kosuke Nakagawa, Manabu Tsukada, Keiichi Shima, Hiroshi Esaki

    Abstract: Direct peer-to-peer (P2P) communication is often used to minimize the end-to-end latency for real-time applications that require accurate synchronization, such as remote musical ensembles. However, there are few studies on the performance of P2P communication between home network environments, thus hindering the deployment of services that require synchronization. In this study, we developed a P2P… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: Accepted to 16th Asian Internet Engineering Conference (AINTEC), 2021

  3. Classification of URL bitstreams using Bag of Bytes

    Authors: Keiichi Shima, Daisuke Miyamoto, Hiroshi Abe, Tomohiro Ishihara, Kazuya Okada, Yuji Sekiya, Hirochika Asai, Yusuke Doi

    Abstract: Protecting users from accessing malicious web sites is one of the important management tasks for network operators. There are many open-source and commercial products to control web sites users can access. The most traditional approach is blacklist-based filtering. This mechanism is simple but not scalable, though there are some enhanced approaches utilizing fuzzy matching technologies. Other appr… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

  4. Catching Unusual Traffic Behavior using TF-IDF-based Port Access Statistics Analysis

    Authors: Keiichi Shima

    Abstract: Detecting the anomalous behavior of traffic is one of the important actions for network operators. In this study, we applied term frequency - inverse document frequency (TF-IDF), which is a popular method used in natural language processing, to detect unusual behavior from network access logs. We mapped the term and document concept to the port number and daily access history, respectively, and ca… ▽ More

    Submitted 11 November, 2021; originally announced November 2021.

  5. Classifying DNS Servers based on Response Message Matrix using Machine Learning

    Authors: Keiichi Shima, Ryo Nakamura, Kazuya Okada, Tomohiro Ishihara, Daisuke Miyamoto, Yuji Sekiya

    Abstract: Improperly configured domain name system (DNS) servers are sometimes used as packet reflectors as part of a DoS or DDoS attack. Detecting packets created as a result of this activity is logically possible by monitoring the DNS request and response traffic. Any response that does not have a corresponding request can be considered a reflected message; checking and tracking every DNS packet, however,… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

  6. A Recurrent Probabilistic Neural Network with Dimensionality Reduction Based on Time-series Discriminant Component Analysis

    Authors: Hideaki Hayashi, Taro Shibanoki, Keisuke Shima, Yuichi Kurita, Toshio Tsuji

    Abstract: This paper proposes a probabilistic neural network developed on the basis of time-series discriminant component analysis (TSDCA) that can be used to classify high-dimensional time-series patterns. TSDCA involves the compression of high-dimensional time series into a lower-dimensional space using a set of orthogonal transformations and the calculation of posterior probabilities based on a continuou… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

    Comments: Published in IEEE Transactions on Neural Networks and Learning Systems

    Journal ref: IEEE Transactions on Neural Networks and Learning Systems, Vol. 26, No.12, pp. 3021-3033, 2015

  7. arXiv:1611.03213  [pdf, other

    cs.OH

    Length Matters: Clustering System Log Messages using Length of Words

    Authors: Keiichi Shima

    Abstract: The analysis techniques of system log messages (syslog messages) have a long history from when the syslog mechanism was invented. Typically, the analysis consists of two parts, one is a message template generation, and the other is finding something interesting using the messages classified by the inferred templates. It is important to generate better templates to achieve better, precise, or convi… ▽ More

    Submitted 10 November, 2016; originally announced November 2016.

    ACM Class: H.3.3; C.2.0