Skip to main content
Michiaki Tatsubori

Michiaki Tatsubori

IBM, IBM Research - Africa, Faculty Member
This paper addresses the Terms of Service (ToS) in a contract between a service provider and a client. To generally handle any types of agreement between parties, several approaches have been proposed by researchers and proprietary... more
This paper addresses the Terms of Service (ToS) in a contract between a service provider and a client. To generally handle any types of agreement between parties, several approaches have been proposed by researchers and proprietary vendors. However, the description of a typical ToS usually involves legal terms and expressions that are quite difficult both for developers and machines (programs) to represent and understand. To address this difficulty in the real world, we propose standardized semantic definitions of common ToS patterns that are supported by three-layer descriptions in a ToS: descriptions for developers, for lawyers, and for machines. We borrow this concept from the Creative Commons (CC) licenses, which are standardized licenses with three-layer descriptions for distributing copyrighted creative content, and apply it to licensed Web-based services. We have ported the primitive components in the CC licenses for ToS purposes, and combined them to produce 6 feasible licenses as a Service Commons, typical ToS patterns for free-of-charge services.
Research Interests:
False positives and negatives are inevitable in real-world classification problems. In general, machine-learning-based business process automation is still viable with reduced classification accuracy due to such false decisions, thanks to... more
False positives and negatives are inevitable in real-world classification problems. In general, machine-learning-based business process automation is still viable with reduced classification accuracy due to such false decisions, thanks to business models that replace human decision processes with automated decision processes covering the costs of introducing automation and the losses from rare mistakes by the automation with the profits from relatively large savings in human-factor costs. However, under certain conditions, it is possible for attackers to outsmart a classifier at a reasonable cost and thus destroy the business model that the learner system depends on. Attackers may eventually detect the misclassifica-tion cases they can benefit from and try to create similar inputs that will be misclassified by the unaware learner system. We call adversaries of this type " opportunistic adversaries ". This paper specifies the environmental patterns that can expose vulnerabilities to opportunistic adversaries and presents some likely business scenarios for these threats. Then we propose a countermeasure algorithm to detect such attacks based on change detection in the post-classification data distributions. Experimental results show that our algorithm has higher detection accuracy than other approaches based on outlier detection or change-point detection.
Research Interests:
Driving in developing cities presents numerous challenges. Traffic congestion and traffic accidents are the most visible challenges which are caused by different underlying factors. Two chief factors are poorly planned and maintained... more
Driving in developing cities presents numerous challenges. Traffic congestion and traffic accidents are the most visible challenges which are caused by different underlying factors. Two chief factors are poorly planned and maintained roadway infrastructure and the decisions made by the drivers. Drivers are constantly forced to negotiate road hazards, like potholes, unlabeled speed bumps as well as moving obstacles, like pushcarts, motorcycles, and animals. Current Usage Based Insurance (UBI) models do not include the context which in many cities may be paramount to understanding driver behavior. This article presents the Context-based Driver Score (CDS) model as a unified model for scoring a driver based on a unique formulation of context that includes road quality. We demonstrate the CDS model on a real-world use case in Nairobi, Kenya, where waste-collection trucks were instrumented with smartphones in order to collect inertial and telematic data. We present an analysis of the CDS model and driver behaviors in contexts that include weather, time-of-day, and road quality. Our results show that the distribution of driving behaviors, like harsh braking and swerving, vary greatly based on the context and the definition of the CDS model. Ultimately, this work aims to extend the utility and scalability of UBI models in order to make them more suitable for deployment in developing cities.
Research Interests:
Since the cloud computing advent a few years ago this paradigm has proved itself to be extremely successive in the industrial sector. IT and business managers agree that this form of highly-dynamic provision of IT services will play a... more
Since the cloud computing advent a few years ago this paradigm has proved itself to be extremely successive in the industrial sector. IT and business managers agree that this form of highly-dynamic provision of IT services will play a major role in the IT world during the next decades. Several business models have already been developed and implemented, including also dynamic pricing schemes. Given that, we analyze in this work two distinct reservation system approaches from related areas and how they can be applied to the cloud computing scenario. We state the different requirements and set up a realistic implementable model in order to enable cloud vendors to improve their revenues.
Research Interests:
Traffic congestion in developing cities like Nairobi, Kenya can be significantly impacted by the presence of Moving Traffic Obstacles (MTOs). These MTOs are those events that temporarily exist on the road, moving with or against the... more
Traffic congestion in developing cities like Nairobi, Kenya can be significantly impacted by the presence of Moving Traffic Obstacles (MTOs). These MTOs are those events that temporarily exist on the road, moving with or against the direction of traffic at slower speeds. They include two-wheelers, pushcarts, animals, and pedestrians, which have quite different influence on traffic compared with static obstacles, such as potholes and speed bumps. As Smartphones and supporting 3G infrastructures are wide spread even in developing countries, recent studies enabled frugal traffic obstacle data collection from smartphones in probe cars. Assuming the sparse and errorful observation of traffic obstacles, we propose an MTO detection algorithm extending an image analysis technique called Probabilistic Hough Transform for probabilistic observations as input. Based on our experiences with a small set of real-world data collected in a smartphone-based probe car project with Nairobi City County, we conducted experiments with simulated observation data to see the effectiveness of the algorithm.
Research Interests:
ABSTRACT XML fills a critical role in many software infrastructures such as SOA (Service-Oriented Architecture), Web Services, and Grid Computing. In this paper, we propose a high performance XML parser used as a fundamental component to... more
ABSTRACT XML fills a critical role in many software infrastructures such as SOA (Service-Oriented Architecture), Web Services, and Grid Computing. In this paper, we propose a high performance XML parser used as a fundamental component to increase the viability of such infrastructures even for mission-critical business applications. We previously proposed an XML parser based on the notion of differential processing under the hypothesis that XML documents are similar to each other, and in this paper we enhance this approach to achieve higher performance by leveraging static information as well as dynamic information. XML schema languages can represent the static information that is used for optimizing the inside state transitions. Meanwhile, statistics for a set of instance documents are used as dynamic information. These two approaches can be used in complementary ways. Our experimental results show that each of the proposed optimization techniques is effective and the combination of multiple optimizations is especially effective, resulting in a 73.2% performance improvement compared to our earlier work.
An enterprise service-oriented architecture is typically realized on a messaging infrastructure called an Enterprise Service Bus (ESB). An ESB is a bus which delivers messages from service requesters to service providers. Since it sits... more
An enterprise service-oriented architecture is typically realized on a messaging infrastructure called an Enterprise Service Bus (ESB). An ESB is a bus which delivers messages from service requesters to service providers. Since it sits between the service requesters and providers, it is not appropriate to use any existing capacity planning methodology for servers, such as modeling, to estimate an ESB's capacity. There are programs which run on an ESB called mediation modules. Their functionalities vary and depend on how people use the ESB. This creates difficulties for capacity planning and performance evaluation. This paper proposes a performance evaluation methodology and techniques for ESBs. We actually run the ESB on a real machine while providing a pseudo-environment around it. In order to ease setting up the environment we provide ultra-light service requestors and service providers for the ESB under test. We show that the proposed mock environment can be set up with practical hardware resources available at the time of hardware resource assessment. Our experimental results showed that the testing results with our mock environment are equivalent to the results in the real environment.
The performance of server-side applications is becoming increasingly important as more applications exploit the Web application model. Extensive work has been done to improve the performance of individual software components such as Web... more
The performance of server-side applications is becoming increasingly important as more applications exploit the Web application model. Extensive work has been done to improve the performance of individual software components such as Web servers and programming language runtimes. This paper describes a novel approach to boost Web application performance by improving inter-process communication between a programming language runtime and Web server runtime. The approach reduces redundant processing for memory copying and the context switch overhead between user space and kernel space by exploiting the zero-copy data transfer methodology, such as the sendfile system call. In order to transparently utilize this optimization feature with existing Web applications, we propose enhancements of the PHP runtime, FastCGI protocol, and Web server. Our proposed approach achieves a 126 % performance improvement with microbenchmarks and a 44 % performance improvement for a standard Web benchmark, S...
XML fills a critical role in many software infrastructures such as SOA (Service-Oriented Architecture), Web Services, and Grid Computing. In this paper, we propose a high performance XML parser used as a fundamental component to increase... more
XML fills a critical role in many software infrastructures such as SOA (Service-Oriented Architecture), Web Services, and Grid Computing. In this paper, we propose a high performance XML parser used as a fundamental component to increase the viability of ...
ABSTRACT The configuration of non-functional requirements, such as security, has become important for SOA applications, but the configuration process has not been discussed comprehensively. In current development processes, the security... more
ABSTRACT The configuration of non-functional requirements, such as security, has become important for SOA applications, but the configuration process has not been discussed comprehensively. In current development processes, the security requirements are not considered in upstream phases and a developer at a downstream phase is responsible for writing the security configuration. However, configuring security requirements properly is quite difficult for developers because the SOA security is cross-domain and all required information is not available in the downstream phase. To resolve this problem, we clarify how to configure security in the SOA application development process, and define the developer's roles in each phase. Additionally, supporting technologies to generate security configurations are proposed: Model-Driven Security and Pattern-based Policy Configuration. Our contribution is proposing a methodology for end-to-end security configuration for SOA applications and tools for generating detailed security configurations from the requirements specified in upstream phases model transformations, making it possible to configure security properly without increasing developers' workloads.
Since the cloud computing advent a few years ago this paradigm has proved itself to be extremely successive in the industrial sector. IT and business managers agree that this form of highly-dynamic provision of IT services will play a... more
Since the cloud computing advent a few years ago this paradigm has proved itself to be extremely successive in the industrial sector. IT and business managers agree that this form of highly-dynamic provision of IT services will play a major role in the IT world during the next decades. Several business models have already been developed and implemented, including also
An enterprise service-oriented architecture is typically realized on a messaging infrastructure called an Enterprise Service Bus (ESB). An ESB is a bus which delivers messages from service requesters to service providers. Since it sits... more
An enterprise service-oriented architecture is typically realized on a messaging infrastructure called an Enterprise Service Bus (ESB). An ESB is a bus which delivers messages from service requesters to service providers. Since it sits between the service requesters and providers, it is not appropriate to use any existing capacity planning methodology for servers, such as modeling, to estimate an ESB's capacity. There are programs which run on an ESB called mediation modules. Their functionalities vary and depend on how people use the ESB. This creates difficulties for capacity planning and performance evaluation. This paper proposes a performance evaluation methodology and techniques for ESBs. We actually run the ESB on a real machine while providing a pseudo-environment around it. In order to ease setting up the environment we provide ultra-light service requestors and service providers for the ESB under test. We show that the proposed mock environment can be set up with practical hardware resources available at the time of hardware resource assessment. Our experimental results showed that the testing results with our mock environment are equivalent to the results in the real environment.

And 55 more