<?xml version="1.0" encoding="Windows-31J"?>
<ArticleSet xmlns="http://www.openarchives.org/OAI/2.0/">
  <Article>
    <Journal>
      <PublisherName>IEEE Computer Society</PublisherName>
      <JournalTitle>Acta Medica Okayama</JournalTitle>
      <Issn>1550-445X</Issn>
      <Volume>1</Volume>
      <Issue/>
      <PubDate PubStatus="ppublish">
        <Year>2005</Year>
        <Month/>
      </PubDate>
    </Journal>
    <ArticleTitle>Optical-drop wavelength assignment problem for wavelength reuse in WDM ring metropolitan area networks</ArticleTitle>
    <FirstPage LZero="delete">999</FirstPage>
    <LastPage>1004</LastPage>
    <Language>EN</Language>
    <AuthorList>
      <Author>
        <FirstName EmptyYN="N">Nobuo</FirstName>
        <LastName>Funabiki</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Megumi</FirstName>
        <LastName>Isogai</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Toru</FirstName>
        <LastName>Nakanishi</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Teruo</FirstName>
        <LastName>Higashino</LastName>
        <Affiliation/>
      </Author>
    </AuthorList>
    <PublicationType/>
    <ArticleIdList>
      <ArticleId IdType="doi"/>
    </ArticleIdList>
    <Abstract>This paper presents a formulation of the optical-drop wavelength assignment problem (ODWAP) and its heuristic algorithm for WDM ring networks. The wavelength-division multiplexing (WDM) technology has been popular in communication societies for providing very large communication bands by multiple lightpaths with different wavelengths on a single optical fiber. Particularly, a double-ring optical network architecture based on the packet-over-WDM technology such as the HORNET architecture has been studied as a next generation platform for metropolitan area networks (MANs). Each node in this architecture is equipped with a wavelength-fixed optical-drop and a tunable transmitter so that a lightpath can be established between any pair of nodes without wavelength conversions. In this paper, we formulate ODWAP for efficient wavelength reuse under heterogeneous traffic in this network. Then, we propose a simple heuristic algorithm for ODWAP. Through extensive simulations, we demonstrate the effectiveness of our approach in reducing waiting times for packet transmissions when a small number of wavelengths are available to retain the network cost for MANs.</Abstract>
    <CoiStatement>No potential conflict of interest relevant to this article was reported.</CoiStatement>
    <ObjectList>
      <Object Type="keyword">
        <Param Name="value">metropolitan area networks</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">optical fibre networks</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">telecommunication network topology</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">telecommunication traffic</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">wavelength division multiplexing</Param>
      </Object>
    </ObjectList>
    <ReferenceList/>
  </Article>
  <Article>
    <Journal>
      <PublisherName/>
      <JournalTitle>Acta Medica Okayama</JournalTitle>
      <Issn/>
      <Volume>1</Volume>
      <Issue/>
      <PubDate PubStatus="ppublish">
        <Year>2005</Year>
        <Month/>
      </PubDate>
    </Journal>
    <ArticleTitle>Compact tree plus algorithms for application-level multicast communications in multihome networks</ArticleTitle>
    <FirstPage LZero="delete"/>
    <LastPage/>
    <Language>EN</Language>
    <AuthorList>
      <Author>
        <FirstName EmptyYN="N">Nobuo</FirstName>
        <LastName>Funabiki</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Megumi</FirstName>
        <LastName>Isogai</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Toru</FirstName>
        <LastName>Nakanishi</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Teruo</FirstName>
        <LastName>Higashino</LastName>
        <Affiliation/>
      </Author>
    </AuthorList>
    <PublicationType/>
    <ArticleIdList>
      <ArticleId IdType="doi"/>
    </ArticleIdList>
    <Abstract>&lt;p&gt;Application-level multicast (ALM) communications replicate packets on host level to deliver them from a single source to multiple clients, so that it can efficiently realize a variety of network applications using moving pictures such as video conferences, distance learning, and video-on-demands. In this paper, we propose the CT+ (compact tree plus) algorithm for finding a better ALM routing tree in terms of delay minimization between hosts. CT+ consists of a tree construction stage from the existing CT algorithm, and a newly added iterative tree improvement stage. Then, we define the extended ALM routing problem and its heuristic algorithm ExCT+, to optimize the effectiveness of the multihome network in ALM communications by selecting multihomed hosts and connections in the ALM routing tree simultaneously. For their evaluations, we construct a network simulation model named MINET (multiple-ISP network simulator), where the topology is composed of multiple ISP backbone networks with IX connections, and the network traffic is generated by following the M/M/1 queuing process. The simulation results using MINET verify the effectiveness of our algorithms.&lt;/p&gt;
</Abstract>
    <CoiStatement>No potential conflict of interest relevant to this article was reported.</CoiStatement>
    <ObjectList>
      <Object Type="keyword">
        <Param Name="value">multicast communication</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">queueing theory</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">telecommunication network routing</Param>
      </Object>
    </ObjectList>
    <ReferenceList/>
  </Article>
  <Article>
    <Journal>
      <PublisherName/>
      <JournalTitle>Acta Medica Okayama</JournalTitle>
      <Issn/>
      <Volume>4</Volume>
      <Issue/>
      <PubDate PubStatus="ppublish">
        <Year>2001</Year>
        <Month/>
      </PubDate>
    </Journal>
    <ArticleTitle>A minimal-state processing search algorithm for satisfiability problems</ArticleTitle>
    <FirstPage LZero="delete">2769</FirstPage>
    <LastPage>2774</LastPage>
    <Language>EN</Language>
    <AuthorList>
      <Author>
        <FirstName EmptyYN="N">Nobuo</FirstName>
        <LastName>Funabiki</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Tokumi</FirstName>
        <LastName>Yokohira</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Toru</FirstName>
        <LastName>Nakanishi</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Shigeto</FirstName>
        <LastName>Tajima</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N">Teruo</FirstName>
        <LastName>Higashino</LastName>
        <Affiliation/>
      </Author>
    </AuthorList>
    <PublicationType/>
    <ArticleIdList>
      <ArticleId IdType="doi"/>
    </ArticleIdList>
    <Abstract>&lt;p&gt;The satisfiability problem (SAT) is a typical NP-complete problem where a wide range of applications has been studied. Given a set of variables U and a set of clauses C, the goal of SAT is to find a truth assignment to variables in U such that every clause in C is satisfied if it exits, or to derive the infeasibility otherwise. This paper presents an approximation algorithm, called a minimal-state processing search algorithm for SAT (MIPS-SAT). MIPS-SAT repeatedly transits minimal states in terms of the cost function for searching a solution through a construction stage and a refinement stage. The first stage greedily generates an initial state composed of as many satisfied clauses as possible. The second stage iteratively seeks a solution while keeping state minimality. The performance of MIPS-SAT is verified through solving DIMACS benchmark instances&lt;/p&gt;
</Abstract>
    <CoiStatement>No potential conflict of interest relevant to this article was reported.</CoiStatement>
    <ObjectList>
      <Object Type="keyword">
        <Param Name="value">SAT</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">heuristic algorithm</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">optimization</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">DIMACS</Param>
      </Object>
      <Object Type="keyword">
        <Param Name="value">   MIPS_SAT.</Param>
      </Object>
    </ObjectList>
    <ReferenceList/>
  </Article>
  <Article>
    <Journal>
      <PublisherName>Faculty of Engineering, Okayama University</PublisherName>
      <JournalTitle>Acta Medica Okayama</JournalTitle>
      <Issn>0475-0071</Issn>
      <Volume>35</Volume>
      <Issue>1-2</Issue>
      <PubDate PubStatus="ppublish">
        <Year>2001</Year>
        <Month/>
      </PubDate>
    </Journal>
    <ArticleTitle>A Group Signature Scheme with Easy Membership Canceling</ArticleTitle>
    <FirstPage LZero="delete">207</FirstPage>
    <LastPage>212</LastPage>
    <Language>EN</Language>
    <AuthorList>
      <Author>
        <FirstName EmptyYN="N">Toru</FirstName>
        <LastName>Nakanishi</LastName>
        <Affiliation/>
      </Author>
      <Author>
        <FirstName EmptyYN="N"/>
        <LastName/>
        <Affiliation/>
      </Author>
    </AuthorList>
    <PublicationType/>
    <ArticleIdList>
      <ArticleId IdType="doi">10.18926/15382</ArticleId>
    </ArticleIdList>
    <Abstract>In the group signature scheme with a trusted party, a verifier can determine whether or not a signature is made by a member of the group, but cannot identify the member who signed the signature. In case of dispute later on, the signer can be identified by the trusted party. However, for efficient group signature schemes proposed so far, removing a member from the group can be not efficiently performed. In this paper, a group signature scheme with an easy membership canceling is proposed. By sending a request to use a resource together with the group signature on it to the manager of the resource, the manager can control anonymous accesses to the resource. In such an application, the proposed group signature scheme is suitable for canceling of the access privilege.</Abstract>
    <CoiStatement>No potential conflict of interest relevant to this article was reported.</CoiStatement>
    <ObjectList/>
    <ReferenceList/>
  </Article>
</ArticleSet>
