研究者業績

木庭 淳

Jun Kiniwa

基本情報

所属
兵庫県立大学 社会情報科学部 教授
学位
博士(工学)(京都大学)

J-GLOBAL ID
201901008524898310
researchmap会員ID
B000362585

論文

 30
  • Jun Kiniwa, Kensaku Kikuta, Hiroaki Sandoh
    Journal of the Operations Research Society of Japan 60(4) 479-495 2017年10月1日  査読有り
    We consider a multiagent network model consisting of nodes and edges as cities and their links to neighbors, respectively. Each network node has an agent and priced goods and the agent can buy or sell goods in the neighborhood. Though every node may not have an equal price, we show the prices will reach an equilibrium by iterating buy and sell operations. First, we present a protocol model in which each buying agent makes a bid to the lowest priced goods in the neighborhood and each selling agent selects the highest bid, if any. Second, we derive a sufficient condition which stabilizes price in our model. We also show the equilibrium price can be derived from the total funds and the total goods for any network. This is a special case of the Fisher's quantity equation, thus we can confirm the correctness of our model. We then examine the best bidding strategy is available to our protocol. Third, we analyze stabilization time for path and cycle networks. Finally, we perform simulation experiments for estimating the stabilization time, the number of bidders and the effects of spreading funds. Our model is suitable for investigating the effects of network topologies on price stabilization.
  • 木庭 淳, 菊田健作, 濱田年男
    Search Theory: A Game Theoretic Perspective 119-134 2013年  査読有り
  • Jun Kiniwa, Takeshi Koide, Hiroaki Sandoh
    Communications in Computer and Information Science 358 319-331 2013年  査読有り
    In 1997, a minority game (MG) was proposed as a non-cooperative iterated game with an odd population of agents who make bids whether to buy or sell. Since then, many variants of the MG have been proposed. However, the common disadvantage in their characteristics is to ignore the past actions beyond a constant memory. So it is difficult to simulate actual payoffs of agents if the past price behavior has a significant influence on the current decision. In this paper we present a new variant of the MG, called an asset value game (AG), and its extension, called an extended asset value game (ExAG). In the AG, since every agent aims to decrease the mean acquisition cost of his asset, he automatically takes the past actions into consideration. The AG, however, is too simple to reproduce the complete market dynamics, that is, there may be some time lag between the price and his action. So we further consider the ExAG by using probabilistic actions, and compare them by simulation. © Springer-Verlag Berlin Heidelberg 2013.
  • Jun Kiniwa, Takeshi Koide, Hiroaki Sandoh
    ICAART: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL. 2 15-22 2012年  査読有り
    A minority game (MG) is a non-cooperative iterated game with an odd population agents who make bids whether to buy or sell. Based on the framework of MG, several kinds of games have been proposed. However, the common disadvantage nu their characteristics is to neglect past actions. So WC present a new variant of the MG, called an asset value game (AG), in which every agent aims to decrease a mean asset value, that is. an acquisition cost averaged through the past actions. The AG, however, is too simple to reproduce the complete market dynamics. So we further consider an improvement of AG, called an extended asset value game (ExAG), and investigate their features and obtain some results by simulation.
  • Jun Kiniwa, Takeshi Koide, Hiroaki Sandoh
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS 388(18) 3879-3891 2009年9月  査読有り
    A non-cooperative iterated multiagent game, called a minority game, and its variations have been extensively studied in this decade. To increase its market similarity, a $-game was presented by observing the current and the next agent's payoffs. However, since the $-game is defined as an offline game, it is difficult to simulate it in practice. So we propose a new online version of the $-game, called a lazy $-game, and analyze the price behavior of the game. First, we reveal the condition of a bubble phenomenon in the lazy $-game. Next, we investigate the price behavior in the lazy $-game and show that there are some upper/lower bounds of the price as long as both the buyers group and the sellers group are nonempty. Then, we consider the similarity between the lazy $-game and the $-game. Finally, we present some simulation results. (C) 2009 Elsevier B.V. All rights reserved.
  • Jun Kiniwa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E92A(4) 1174-1181 2009年4月  査読有り
    Sensor networks have promising applications such as battlefield surveillance, biological detection, and emergency navigation, etc. Crucial problems in sensor networks are energy-efficiency and collision avoidance in wireless communication. To deal with the problems, we consider a self-stabilizing solution to the construction of k disjoint sense-steep trees, where range adjustment and the use of GPS are allowed. Each root is determined by its identifier and is distinguished by its color, the identification of a tree. Using a dominating k-partition rule, each non-root node first determines a color irrelevant to the root. Then, the non-root node determines a parent node that is equally colored with minimal distance. If there is no appropriate parent, the range is extended or shrunk until the nearest parent is determined. Finally, we perform a simulation.
  • Jun Kinwa
    INFORMATION SCIENCES 176(18) 2603-2623 2006年9月  査読有り
    This paper presents a new method for request-based self-stabilizing token passing. A token is passed via a dynamic BFS (breadth-first search) tree rooted at a requesting process. When one of the tree edges reaches a process that has a token, the process is aware of the occurrence of a request. Then the token is passed towards the root. Even if multiple tokens stay at distinct roots, it can be shown that they will be merged into a single token. Furthermore, each request-rooted tree continues to grow until the request is serviced. As a result, the tree with a request that has long been neglected grows larger and larger, which makes it easier for the requesting process to get a token. Such advantages can be achieved by using bounded memory. We also evaluate the stabilization time and the efficiency of servicing k requests, called k-covering time, of our method. (C) 2005 Elsevier Inc. All rights reserved.
  • J Kiniwa
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 17(4) 389-398 2006年4月  査読有り
    We present a new method for avoiding false privileges with the aid of stable storage. The method is motivated by the commitment in database systems. The commit guarantees that a write operation to stable storage has successfully completed. Since programs are stored in stable storage in self-stabilization, we assume that the stable values are also free from any transient fault. They sometimes give us additional information on whether a state is faulty or not. Using the stable values, we can improve our previous weakly time-adaptive protocol. We analyze the efficiency and the safety of our method and compare it with previously proposed ones. Furthermore, we extend our method by keeping an old version of stable values and show its usefulness.
  • Jun Kiniwa, Masafumi Yamashita
    Parallel Processing Letters 16(1) 53-61 2006年3月  査読有り
    For bidirectional rings, there have been proposed self-stabilizing mutual exclusion protocols, which are either time-adaptive (i.e., efficient in recovery) or 1-latent (i.e., efficient in legal execution) but not both. This paper proposes a randomized self-stabilizing mutual exclusion protocol that inherits both of the advantages from them: It is 1-latent in the sense that the privilege is circulated in a linear round (i.e., very intuitively, the privilege is transferred from a process to another by a "step"), provided that the system always stays in legitimate configurations, and is weakly time-adaptive in the sense that the system stabilizes from any configuration c in O(f) steps with a high probability, where f is the number of corrupted processes in c. It also guarantees with a high probability that there is at most one privilege even while converging to a legitimate configuration. © World Scientific Publishing Company.
  • 木庭 淳
    商大論集 55(5) 23-35 2004年3月  
  • 木庭 淳, 永持仁
    Kobe Univ. Commerce, Working Paper 196 2004年  
  • J Kiniwa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E85A(5) 949-956 2002年5月  査読有り
    Most conventional studies on self-stabilization have been indifferent to the vulnerability under convergence. This paper investigates how mutual exclusion property can be achieved in self-stabilizing rings even for illegitimate configurations. We present a new method which uses a state with a large state space to detect faults. If some faults are detected, every process is reset and not given a privilege. Even if the reset values are different between processes, our protocol mimics the behavior of Dijkstra's unidirectional K-state protocol. Then we have a fast and safe mutual exclusion protocol. Simulation study also examines its performance.
  • 木庭 淳
    Kobe Univ. Commerce, Working Paper 192(140) 1-7 2002年  
    分散システムにおいて仮想リングを構築する新方法について述べる。我々の方法の特徴は通常のトークン伝達を行っている間にバックグラウンドジョブとして仮想リングを改良するというもので、拡張型の深さ優先探索手法を利用している。トークンは仮想リングを何度も周回するので、仮想リングはしだいに改良され、(もし存在するなら)ハミルトン閉路に近づく。我々の方法は主に2つのトークンを使う。すなわち1つはより短い新しいリングを構築するためのものであり、いま1つは相互排除のためのものである。従ってMisraの方法を修正して用いることにより、トークンの消失にも耐えることができる。
  • 木庭 淳, 菊田健作, 玉置光司
    Kobe Univ. Commerce, Working Paper 188 2002年  
  • J Kiniwa, T Hamada, D Mizoguchi
    IEEE TRANSACTIONS ON COMPUTERS 50(9) 972-983 2001年9月  査読有り
    This paper studies the effects of reordering page requests for multisize page caching. First, we consider a "semi-online" model, where an input queue keeps requests which will be processed in the future. It is assumed that they arrive during the processing time of miss requests. We develop an efficient page replacement algorithm which shifts some page requests in the queue. Second, we analyze the miss ratios of two methods, the nonshifting method and our shifting method, under the semi-online model. The analysis assumes that the input/output ratio of the queue is in equilibrium. Third, we compare our method with the other algorithms by simulation.
  • 木庭 淳, 田中章裕, 入江豪
    商大論集 52(5) 15-21 2001年3月  
  • 木庭 淳
    183 2001年  査読有り
  • 木庭 淳
    神戸商科大学創立70周年記念論文集 2000年3月  査読有り
  • 木庭 淳, 加藤直樹
    Kobe Univ. Commerce, Working Paper 168 1997年  
  • 木庭 淳
    京都大学学位論文 1993年5月  
  • 木庭 淳, 加藤直樹
    Kobe Univ. Commerce, Working Paper 137 1993年  
  • 木庭 淳
    商大論集 第43巻(第6号) 101-124 1992年3月  
  • 木庭 淳, 加藤直樹
    電子情報通信学会論文誌(D) J75-D-I(2) 98-106 1992年2月  査読有り
  • 木庭 淳, 加藤直樹
    電子情報通信学会論文誌(D) J74-D-I(12) 858-868 1991年12月  査読有り
  • 木庭 淳
    神戸商科大学創立60周年記念論文集 367-380 1990年3月  
  • Jun Kiniwa, Naoki Katoh
    Systems and Computers in Japan 20(12) 91-100 1989年  査読有り
  • 木庭 淳, 加藤直樹
    電子情報通信学会論文誌(D) J71-D(11) 2388-2395 1988年11月  査読有り
  • 木庭 淳
    商大論集 第39巻(第5,6号) 117-135 1988年3月  
  • 木庭 淳, 西尾(旧姓室, 章治郎, 長谷川利治
    電子情報通信学会論文誌(D) J70-D(1) 30-41 1987年1月  査読有り
  • 木庭 淳
    Master Thesis, Kyoto Univ.  

MISC

 1

講演・口頭発表等

 95

共同研究・競争的資金等の研究課題

 12