
Kenji Tei- National Institute of Informatics
Kenji Tei
- National Institute of Informatics
About
104
Publications
22,493
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
611
Citations
Current institution
Publications
Publications (104)
Human-robot collaboration has become increasingly complex and dynamic, highlighting the need for effective and intuitive communication. Two communication strategies for robots have been explored: (i) global-perspective strategy to share an overview of task progress, aimed at achieving consensus on completed and upcoming tasks; and (ii) local-perspe...
In the evolution of software systems, especially in domains like autonomous vehicles, dynamic user preferences are critical yet challenging to accommodate. Existing methods often misrepresent these preferences, either by overlooking their dynamism or overburdening users as humans often find it challenging to express their objectives mathematically....
Social media platforms frequently impose restrictive policies to moderate user content, prompting the emergence of creative evasion language strategies. This paper presents a multi-agent framework based on Large Language Models (LLMs) to simulate the iterative evolution of language strategies under regulatory constraints. In this framework, partici...
External human-machine interfaces (eHMIs) are expected to improve pedestrian interactions with automated vehicles (AVs) and foster greater social acceptance. While earlier research has primarily focused on refining eHMI designs by examining different modalities and color preferences, determining the most effective eHMI location on vehicles remains...
In the studies of self-adaptive systems (SAS), requirement relaxation is a well-studied approach to adjust or disable certain requirements in response to requirement unsatisfaction or requirement conflicts, allowing the system to maintain core functionalities while temporarily reducing service quality. The recent integration of Guaranteeable Requir...
Self-adaptive systems (SASs) are designed to handle changes and uncertainties through a feedback loop with four core functionalities: monitoring, analyzing, planning, and execution. Recently, generative artificial intelligence (GenAI), especially the area of large language models, has shown impressive performance in data comprehension and logical r...
Diffusion models, which leverage stochastic processes to capture complex data distributions effectively, have shown their performance as generative models, achieving notable success in image-related tasks through iterative denoising processes. Recently, diffusion models have been further applied and show their strong abilities in planning tasks, le...
People with color vision deficiency often face challenges in distinguishing colors such as red and green, which can complicate daily tasks and require the use of assistive tools or environmental adjustments. Current support tools mainly focus on presentation-based aids, like the color vision modes found in iPhone accessibility settings. However, of...
Despite considerable research efforts on handling uncertainty in self-adaptive systems, a comprehensive understanding of the precise nature of uncertainty is still lacking. This paper summarises the findings of the 2023 Bertinoro Seminar on Uncertainty in Self- Adaptive Systems, which aimed at thoroughly investigating the notion of uncertainty, and...
The Value Iteration Network (VIN) is a neural network widely used in path-finding reinforcement learning problems. The planning module in VIN enables the network to understand the nature of a problem, thus giving the network an impressive generalization ability. However, reinforcement learning (RL) with VIN can not guarantee efficient training due...
Modern systems suffer system faults in both hardware and software. Requirement degradation is a widely applied redundant-design approach to deal with system fault by degrading or disabling (non-critical) requirements. However, due to the environment's unpredictability, it is unrealistic for engineers to prepare such redundant designs for unforeseen...
In this paper, we address the challenges faced by Value Iteration Networks (VIN) in handling larger input maps and mitigating the impact of accumulated errors caused by increased iterations. We propose a novel approach, Value Iteration Networks with Gated Summarization Module (GS-VIN), which incorporates two main improvements: (1) employing an Adap...
In automated planning, a plan is synthesized to achieve the given goals in the assumed operational environment. However, during the plan’s execution, the operational environment may changes so that replanning a new plan is necessary against the changing environment. In some situations, it is impossible to achieve some goals anyhow; in other situati...
A self-learning adaptive system (SLAS) uses machine learning to enable and enhance its adaptability. Such systems are expected to perform well in dynamic situations. For learning high-performance adaptation policy, some assumptions must be made on the environment-system dynamics when information about the real situation is incomplete. However, thes...
“Human-hydroponics coexistence” is becoming a real scenario for indoor gardening and artificial ecological systems. Existing industry-use studies have focused on hydroponic cultivation under the assumption of a stable environment and no human interference. Thus, these studies are not suitable for “human-hydroponics coexistence” because “environment...
In event-based systems, safety properties are critical requirements to prevent the system from bad things happen. However, safety properties may be violated because of the runtime system functional fault. From the viewpoint of a self-adaptive system, such a system should be requirement-aware and changes its behavior to satisfy the designed requirem...
Discrete event controllers are at the heart of many software systems that require continuous operation. Changing these controllers at runtime to cope with changes in its execution environment or system requirements change is a challenging open problem. In this paper we address the problem of dynamic update of controllers in reactive systems. We pre...
Self-adaptive systems alter their behavior in response to environmental changes to continually satisfy their requirements. Self-adaptive systems employ an environment model, which should be updated during runtime to maintain consistency with the real environment. Although some techniques have been proposed to learn environment model based on execut...
This chapter presents an overview of the ClouT concept, the project, and the ClouT reference architecture for smart cities. ClouT's overall concept is to leverage Cloud Computing as an enabler to bridge the Internet of Things with Internet of People via Internet of Services. ClouT aims to establish an efficient communication and collaboration platf...
In many application domains, continuous operation is a desirable attribute for software-intensive systems. As the environment or system requirements change, so the system should change and adapt without stopping or unduly disturbing its operation. There is, therefore, a need for sound engineering techniques that can cope with dynamic change. In thi...
Find the dataset at the link:
https://www.dropbox.com/s/l98aln9g87caatk/datasets-release-v3.zip?dl=0
In pervasive computing environments, wireless sensor networks (WSNs) play an important role, collecting reliable and accurate context information so that applications are able to provide services to users on demand. In such environments, sensors should be self-adaptive by taking correct decisions based on sensed data in real-time. However, sensor d...
To meet future demands for wireless sensor network (WSN) software, both experts and average software developers should be involved in WSN software development. However, WSN software development is difficult for the average software developer because data processing-related design and network-related design are tangled in the software. Here, we prop...
Wireless sensor networks (WSNs) play important roles in systems that interact with the real world (e.g., cyber-physical systems and internet of things). To mitigate the complex nature of WSNs, many platforms at different abstraction levels (e.g., abstraction of hardware, communications, and individual nodes) have been proposed in the last decade. W...
Applications in wireless sensor networks (WSNs) sometimes cannot deliver the quality required by users due to packet loss and node leaving. There is a trade-off between energy and quality: increasing quality requires energy, and decreasing energy invites a lack of quality. To adjust the trade-off, actions which make changes to the energy and qualit...
Home cleaning robots have become popular. Most of the home cleaning robots are based on ground vehicles. While the cleaning robots based on ground vehicles can vacuum or wash floors robustly and efficiently, but they only clean on floors, not on stairs or furnitures. In this demo, we show a new concept of cleaning robot, called HoppingDuster. Hoppi...
In pervasive computing environments, wireless sensor networks play an important infrastructure role, collecting reliable and accurate context information so that applications are able to provide services to users on demand. In such environments, sensors should be self-adaptive by taking correct decisions based on sensed data in real-time in a decen...
Wireless Sensor Network (WSN) deployment experiences show that collected data is prone to be faulty. Faults are due to internal and external influences, such as calibration, low battery, environmental interference and sensor aging. However, only few solutions exist to deal with faulty sensory data in WSN. We develop a statistical approach to detect...
In systems that require several services to collaborate, specifying coordination protocols is vital, but costly. Additionally, several properties, which are derived from laws, regulations, requirements, etc., must be satisfied. Coordination protocol composition approaches construct specific protocols in a cost effective manner in accordance with th...
Primary task of wireless sensor networks is to deliver reliable and accurate information about the phenomena of interest. However, faults are a frequent occurrence and their accumulation affects the quality of service significantly. This leads to a shorter effective lifetime of the network. In this work, we propose a framework for the fault toleran...
Wireless Sensor Network (WSN) deployment experiences show that collected data is prone to be faulty. Faults are due to internal and external influences, such as calibration, low battery, environmental interference and sensor aging. However, only few solutions exist to deal with faulty sensory data in WSN. We develop a statistical approach to detect...
Wireless Sensor Network (WSN) deployment experiences show that data collected is prone to be imprecise and faulty due to internal and external influences, such as battery drain, environmental interference, sensor aging. An early detection of such faults is necessary for the effective operation of the sensor network. We focus on identifying data fau...
This paper introduces a declarative agent-oriented language for Ambient Intelligence – S-CLAIM – that allows programming reactive or cognitive mobile agents in a simple, easy-to-use manner while meeting AmI requirements. Based on a hierarchical representation of the agents, the language offers a natural solution to achieve context-sensitivity. S-CL...
Model-driven development (MDD) facilitates the development of wireless sensor network (WSN) applications because MDD can deal with models at the abstraction level to the concrete level. In the MDD for WSN applications, the developers model the dataflow at the abstract level and model the designs of a communication and task assignment at the concret...
Wireless Sensor Network (WSN) deployment experiences show that data collected is prone to be imprecise and faulty due to internal and external influences, such as battery drain, environmental interference, sensor aging. An early detection of such faults is necessary for the effective operation of the sensor network. In this preliminary work, we pro...
Pervasive applications incorporate physical components that are exposed to everyday use and a large number of conditions and external factors that can lead to faults and failures. It is also possible that application requirements change during deployment and the network needs to adapt to a new context. Consequently, pervasive systems must be capabl...
In order to develop Wireless Sensor Network (WSN) applications, it is necessary to develop prototypes in a low-cost way and to optimize application performance. Existing development approaches enable to develop a low-cost prototype by concealing the detail of WSN from the developers. However, there is a trade-off between the development cost of pro...
In pervasive computing environment (Satyanarayanan, 2001), common context management system, that make context of the real world be shared among the context-aware applications, is required to reduce development cost of each context-aware applications. A wireless sensor network (WSN) will be a key infrastructure for the context management system. To...
In e-Business, agents need to coordinate with each other. Coordination protocols that specify the defining orders of message passing are very important. The scale of e-Business grows with the advancement of technology, and the number of agents involved continues to increase. Specifying the coordination protocols for so many participating agents is...
In a sensor network, the technique that limits the number of sensors used for observation is effective to reduce the energy consumption of each sensor. To limit the number of sensors without sacrificing observation accuracy, an appropriate sensor combination must be selected by evaluating the observation effectiveness of various combinations. Howev...
Multi-agent systems need protocols to coordinate among agents implemented by different owners. However, specifying coordination protocols for many participating agents is a complex task. A protocol composition approach, which can reduce the complexity of specifying such a coordination protocol, must specify how to compose coordination protocols in...
In-network processing is a powerful technique for reducing network traffic in an ad hoc network where network efficiency is a critical issue. When an in-network process collects data from multiple data sources, the node hosting the in-network process should be carefully selected to reduce network traffic. Existing metrics used to select the host no...
In ubiquitous computing scenarios, applications pro-actively support user activities by changing their behavior according to their contexts which for example represent the physical environment. Realizing such applications inherently calls for new development methodologies. In this paper, we present a survey on application development in ubiquitous...
In recent years point of interest (POI) database is maintained with high update frequency. However the system relies on manual registration of POI information, therefore there still is a gap between database and real-world POI. This paper proposes the system that identifies POI automatically from floating car data (FCD). We describe basic concept a...
Middleware for wireless sensor network (WSN) abstracts a network as an entity and hides programming difficulties from programmers. Many middlewares have been proposed, but they use different programming languages to manipulate functions in WSNs. This inhibits usability when manipulating multiple WSNs managed by different middlewares, because the pr...
With the spread of mobile phones, the use of Mobile Ad- hoc NETworks (MANETs) for disaster recovery finally becomes feasible.
Information retrieval from the catastrophic place is attended in an energy-efficient manner using the Geographically Bound
Mobile Agent (GBMA) model. The GBMA, which is a mobile agent on MANETs that retrieves geographically...