Curriculum Vitaes

Jun Kiniwa

  (木庭 淳)

Profile Information

Affiliation
教授, 社会情報科学部, 兵庫県立大学
Degree
博士(工学)(京都大学)

J-GLOBAL ID
201901008524898310
researchmap Member ID
B000362585

Papers

 30
  • Jun Kiniwa, Kensaku Kikuta, Hiroaki Sandoh
    Journal of the Operations Research Society of Japan, 60(4) 479-495, Oct 1, 2017  Peer-reviewed
    We consider a multiagent network model consisting of nodes and edges as cities and their links to neighbors, respectively. Each network node has an agent and priced goods and the agent can buy or sell goods in the neighborhood. Though every node may not have an equal price, we show the prices will reach an equilibrium by iterating buy and sell operations. First, we present a protocol model in which each buying agent makes a bid to the lowest priced goods in the neighborhood and each selling agent selects the highest bid, if any. Second, we derive a sufficient condition which stabilizes price in our model. We also show the equilibrium price can be derived from the total funds and the total goods for any network. This is a special case of the Fisher's quantity equation, thus we can confirm the correctness of our model. We then examine the best bidding strategy is available to our protocol. Third, we analyze stabilization time for path and cycle networks. Finally, we perform simulation experiments for estimating the stabilization time, the number of bidders and the effects of spreading funds. Our model is suitable for investigating the effects of network topologies on price stabilization.
  • Jun Kiniwa, Kikuta,K, Hamada,T
    Search Theory: A Game Theoretic Perspective, 119-134, 2013  Peer-reviewed
  • Jun Kiniwa, Takeshi Koide, Hiroaki Sandoh
    Communications in Computer and Information Science, 358 319-331, 2013  Peer-reviewed
    In 1997, a minority game (MG) was proposed as a non-cooperative iterated game with an odd population of agents who make bids whether to buy or sell. Since then, many variants of the MG have been proposed. However, the common disadvantage in their characteristics is to ignore the past actions beyond a constant memory. So it is difficult to simulate actual payoffs of agents if the past price behavior has a significant influence on the current decision. In this paper we present a new variant of the MG, called an asset value game (AG), and its extension, called an extended asset value game (ExAG). In the AG, since every agent aims to decrease the mean acquisition cost of his asset, he automatically takes the past actions into consideration. The AG, however, is too simple to reproduce the complete market dynamics, that is, there may be some time lag between the price and his action. So we further consider the ExAG by using probabilistic actions, and compare them by simulation. © Springer-Verlag Berlin Heidelberg 2013.
  • Jun Kiniwa, Takeshi Koide, Hiroaki Sandoh
    ICAART: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON AGENTS AND ARTIFICIAL INTELLIGENCE, VOL. 2, 15-22, 2012  Peer-reviewed
    A minority game (MG) is a non-cooperative iterated game with an odd population agents who make bids whether to buy or sell. Based on the framework of MG, several kinds of games have been proposed. However, the common disadvantage nu their characteristics is to neglect past actions. So WC present a new variant of the MG, called an asset value game (AG), in which every agent aims to decrease a mean asset value, that is. an acquisition cost averaged through the past actions. The AG, however, is too simple to reproduce the complete market dynamics. So we further consider an improvement of AG, called an extended asset value game (ExAG), and investigate their features and obtain some results by simulation.
  • Jun Kiniwa, Takeshi Koide, Hiroaki Sandoh
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 388(18) 3879-3891, Sep, 2009  Peer-reviewed
    A non-cooperative iterated multiagent game, called a minority game, and its variations have been extensively studied in this decade. To increase its market similarity, a $-game was presented by observing the current and the next agent's payoffs. However, since the $-game is defined as an offline game, it is difficult to simulate it in practice. So we propose a new online version of the $-game, called a lazy $-game, and analyze the price behavior of the game. First, we reveal the condition of a bubble phenomenon in the lazy $-game. Next, we investigate the price behavior in the lazy $-game and show that there are some upper/lower bounds of the price as long as both the buyers group and the sellers group are nonempty. Then, we consider the similarity between the lazy $-game and the $-game. Finally, we present some simulation results. (C) 2009 Elsevier B.V. All rights reserved.
  • Jun Kiniwa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E92A(4) 1174-1181, Apr, 2009  Peer-reviewed
    Sensor networks have promising applications such as battlefield surveillance, biological detection, and emergency navigation, etc. Crucial problems in sensor networks are energy-efficiency and collision avoidance in wireless communication. To deal with the problems, we consider a self-stabilizing solution to the construction of k disjoint sense-steep trees, where range adjustment and the use of GPS are allowed. Each root is determined by its identifier and is distinguished by its color, the identification of a tree. Using a dominating k-partition rule, each non-root node first determines a color irrelevant to the root. Then, the non-root node determines a parent node that is equally colored with minimal distance. If there is no appropriate parent, the range is extended or shrunk until the nearest parent is determined. Finally, we perform a simulation.
  • Jun Kinwa
    INFORMATION SCIENCES, 176(18) 2603-2623, Sep, 2006  Peer-reviewed
    This paper presents a new method for request-based self-stabilizing token passing. A token is passed via a dynamic BFS (breadth-first search) tree rooted at a requesting process. When one of the tree edges reaches a process that has a token, the process is aware of the occurrence of a request. Then the token is passed towards the root. Even if multiple tokens stay at distinct roots, it can be shown that they will be merged into a single token. Furthermore, each request-rooted tree continues to grow until the request is serviced. As a result, the tree with a request that has long been neglected grows larger and larger, which makes it easier for the requesting process to get a token. Such advantages can be achieved by using bounded memory. We also evaluate the stabilization time and the efficiency of servicing k requests, called k-covering time, of our method. (C) 2005 Elsevier Inc. All rights reserved.
  • J Kiniwa
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 17(4) 389-398, Apr, 2006  Peer-reviewed
    We present a new method for avoiding false privileges with the aid of stable storage. The method is motivated by the commitment in database systems. The commit guarantees that a write operation to stable storage has successfully completed. Since programs are stored in stable storage in self-stabilization, we assume that the stable values are also free from any transient fault. They sometimes give us additional information on whether a state is faulty or not. Using the stable values, we can improve our previous weakly time-adaptive protocol. We analyze the efficiency and the safety of our method and compare it with previously proposed ones. Furthermore, we extend our method by keeping an old version of stable values and show its usefulness.
  • Jun Kiniwa, Masafumi Yamashita
    Parallel Processing Letters, 16(1) 53-61, Mar, 2006  Peer-reviewed
    For bidirectional rings, there have been proposed self-stabilizing mutual exclusion protocols, which are either time-adaptive (i.e., efficient in recovery) or 1-latent (i.e., efficient in legal execution) but not both. This paper proposes a randomized self-stabilizing mutual exclusion protocol that inherits both of the advantages from them: It is 1-latent in the sense that the privilege is circulated in a linear round (i.e., very intuitively, the privilege is transferred from a process to another by a "step"), provided that the system always stays in legitimate configurations, and is weakly time-adaptive in the sense that the system stabilizes from any configuration c in O(f) steps with a high probability, where f is the number of corrupted processes in c. It also guarantees with a high probability that there is at most one privilege even while converging to a legitimate configuration. © World Scientific Publishing Company.
  • Jun Kiniwa, Nagamochi,H
    Kobe Univ. Commerce, Working Paper, 196, 2004  
  • J Kiniwa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E85A(5) 949-956, May, 2002  Peer-reviewed
    Most conventional studies on self-stabilization have been indifferent to the vulnerability under convergence. This paper investigates how mutual exclusion property can be achieved in self-stabilizing rings even for illegitimate configurations. We present a new method which uses a state with a large state space to detect faults. If some faults are detected, every process is reset and not given a privilege. Even if the reset values are different between processes, our protocol mimics the behavior of Dijkstra's unidirectional K-state protocol. Then we have a fast and safe mutual exclusion protocol. Simulation study also examines its performance.
  • Jun Kiniwa
    Kobe Univ. Commerce, Working Paper, 192(140) 1-7, 2002  
    This paper presents a new method for constructing a virtual ring in distributed systems. The feature of our method is that the ring is constructed as a background job of the usual token passing. It uses a way of returning to the starting node without backtracking. Since the token circulates on the virtual ring again and again, it will be improved and eventually approach a hamiltonian cycle if exists. Since our method uses two tokens, one for developing a new ring and another for mutual exclusion, it tolerates the loss of a token by a modified Misra's method.
  • Jun Kiniwa, Kikuta,K, Tamaki,M, Hamada,T
    Kobe Univ. Commerce, Working Paper, 188, 2002  
  • J Kiniwa, T Hamada, D Mizoguchi
    IEEE TRANSACTIONS ON COMPUTERS, 50(9) 972-983, Sep, 2001  Peer-reviewed
    This paper studies the effects of reordering page requests for multisize page caching. First, we consider a "semi-online" model, where an input queue keeps requests which will be processed in the future. It is assumed that they arrive during the processing time of miss requests. We develop an efficient page replacement algorithm which shifts some page requests in the queue. Second, we analyze the miss ratios of two methods, the nonshifting method and our shifting method, under the semi-online model. The analysis assumes that the input/output ratio of the queue is in equilibrium. Third, we compare our method with the other algorithms by simulation.
  • Jun Kiniwa, Akihiro Tanaka, Takeshi Irie
    The review of the Kobe University of Commerce, 52(5) 15-21, Mar, 2001  
  • Jun Kiniwa
    Mar, 2000  Peer-reviewed
  • Jun Kiniwa, Naoki Katoh
    Kobe Univ. Commerce, Working Paper, 168, 1997  
  • Jun Kiniwa, Naoki Katoh
    Kobe Univ. Commerce, Working Paper, 137, 1993  
  • 木庭 淳
    商大論集, 第43巻(第6号) 101-124, Mar, 1992  
  • 木庭 淳, 加藤直樹
    電子情報通信学会論文誌(D), J75-D-I(2) 98-106, Feb, 1992  Peer-reviewed
  • 木庭 淳, 加藤直樹
    電子情報通信学会論文誌(D), J74-D-I(12) 858-868, Dec, 1991  Peer-reviewed
  • 木庭 淳
    神戸商科大学創立60周年記念論文集, 367-380, Mar, 1990  
  • Jun Kiniwa, Naoki Katoh
    Systems and Computers in Japan, 20(12) 91-100, 1989  Peer-reviewed
  • 木庭 淳, 加藤直樹
    電子情報通信学会論文誌(D), J71-D(11) 2388-2395, Nov, 1988  Peer-reviewed
  • 木庭 淳
    商大論集, 第39巻(第5,6号) 117-135, Mar, 1988  
  • 木庭 淳, 西尾(旧姓室, 章治郎, 長谷川利治
    電子情報通信学会論文誌(D), J70-D(1) 30-41, Jan, 1987  Peer-reviewed
  • 木庭 淳
    Master Thesis, Kyoto Univ.  

Misc.

 1

Presentations

 95

Research Projects

 12