2009 |
35 | EE | Hideki Eiraku,
Yasushi Shinjo,
Calton Pu,
Younggyun Koh,
Kazuhiko Kato:
Fast networking with socket-outsourcing in hosted virtual machine environments.
SAC 2009: 310-317 |
34 | EE | Takahiro Shinagawa,
Hideki Eiraku,
Kouichi Tanimoto,
Kazumasa Omote,
Shoichi Hasegawa,
Takashi Horie,
Manabu Hirano,
Kenichi Kourai,
Yoshihiro Oyama,
Eiji Kawai,
Kenji Kono,
Shigeru Chiba,
Yasushi Shinjo,
Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security.
VEE 2009: 121-130 |
2008 |
33 | EE | Mitsuhiro Mabuchi,
Yasushi Shinjo,
Akira Sato,
Kazuhiko Kato:
An Access Control Model for Web-Services That Supports Delegation and Creation of Authority.
ICN 2008: 213-222 |
32 | EE | Mizuki Oka,
Kazuhiko Kato,
Yingqing Xu,
Lin Liang,
Fang Wen:
Scribble-a-Secret: Similarity-based password authentication using sketches.
ICPR 2008: 1-4 |
31 | EE | Akiyoshi Sugiki,
Kei Yamatozaki,
Richard Potter,
Kazuhiko Kato:
A Platform for Cooperative Server Backups Based on Virtual Machines.
ISAS 2008: 129-141 |
30 | EE | Kazumasa Omote,
Kazuhiko Kato:
Protection and Recovery of Disk Encryption Key Using Smart Cards.
ITNG 2008: 106-111 |
29 | EE | Yuka Ikebe,
Takehiro Nakayama,
Masaji Katagiri,
Satoshi Kawasaki,
Hirotake Abe,
Takahiro Shinagawa,
Kazuhiko Kato:
Efficient Anomaly Detection System for Mobile Handsets.
SECURWARE 2008: 154-160 |
2007 |
28 | EE | Kazuhiko Kato:
Modeling and Virtualization for Secure Computing Environments.
ASIAN 2007: 196-197 |
27 | EE | Shinichi Suzuki,
Yasushi Shinjo,
Toshio Hirotsu,
Kozo Itano,
Kazuhiko Kato:
Capability-based egress network access control by using DNS server.
J. Network and Computer Applications 30(4): 1275-1282 (2007) |
2006 |
26 | EE | Mizuki Oka,
Hiroshi Tsukada,
Kazuhiko Kato:
Robin: Extracting Visual and Textual Features from Web Pages.
APWeb 2006: 765-771 |
25 | EE | Hirotake Abe,
Kazuhiko Kato:
Sustor: Distributed Storage for Disaster Recovery Using the Small-World Model.
CIT 2006: 60 |
2005 |
24 | EE | Shinichi Suzuki,
Yasushi Shinjo,
Toshio Hirotsu,
Kozo Itano,
Kazuhiko Kato:
Capability-Based Egress Network Access Control for Transferring Access Rights.
ICITA (2) 2005: 488-495 |
23 | EE | Shinichi Suzuki,
Yasushi Shinjo,
Toshio Hirotsu,
Kazuhiko Kato,
Kozo Itano:
Name-Level Approach for Egress Network Access Control.
ICN (2) 2005: 284-296 |
22 | EE | Péter Surányi,
Hirotake Abe,
Toshio Hirotsu,
Yasushi Shinjo,
Kazuhiko Kato:
General Virtual Hosting via Lightweight User-Level Virtualization.
SAINT 2005: 229-236 |
2004 |
21 | EE | Mizuki Oka,
Yoshihiro Oyama,
Hirotake Abe,
Kazuhiko Kato:
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix.
RAID 2004: 223-237 |
2003 |
20 | EE | Hirotake Abe,
Kazuhiko Kato:
Security Policy Descriptions Through the Use of Control Structure of a Target Program.
ISSS 2003: 242-261 |
19 | EE | Kazuhiko Kato:
Persistently Cached B-Trees.
IEEE Trans. Knowl. Data Eng. 15(3): 706-720 (2003) |
18 | EE | Kazumasa Itabashi,
Katsuya Matsubara,
Yutaka Moriyama,
Yuuichi Someya,
Kazuhiko Kato,
Tatsurou Sekiguchi,
Akinori Yonezawa:
Implementing an applet system without fixing virtual-machine designs.
Systems and Computers in Japan 34(2): 32-42 (2003) |
2002 |
17 | EE | Kazuhiko Kato,
Yoshihiro Oyama:
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation.
ISSS 2002: 112-132 |
1999 |
16 | EE | Kazuhiko Kato,
Katsuya Matsubara,
Yuuichi Someya,
Kazumasa Itabashi,
Yutaka Moriyama:
PLANET: An Open Mobile Object System for Open Network.
ASA/MA 1999: 274-275 |
15 | EE | Kazuhiko Kato,
Yuuichi Someya,
Katsuya Matsubara,
Kunihiko Toumura,
Hirotake Abe:
An Approach to Mobile Software Robots for the WWW.
IEEE Trans. Knowl. Data Eng. 11(4): 526-548 (1999) |
1998 |
14 | | Katsuya Matsubara,
Takahiro Maekawa,
Kazuhiko Kato:
Worldwide Component Scripting with the Planet Mobile Object System.
WWCA 1998: 56-71 |
1996 |
13 | EE | Kenji Kono,
Kazuhiko Kato,
Takashi Masuda:
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management.
ECOOP 1996: 295-315 |
12 | | Kazuhiko Kato:
Safe and Secure Execution Mechanisms for Mobile Objects.
Mobile Object Systems 1996: 201-212 |
1994 |
11 | | Kenji Kono,
Kazuhiko Kato,
Takashi Masuda:
Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers.
ICDCS 1994: 142-151 |
1993 |
10 | | Kazuhiko Kato,
Atsunobu Narita,
Shigekazu Inohara,
Takashi Masuda:
Distributed Shared Repository: A Unified Approach to Distribution and Persistency.
ICDCS 1993: 20-29 |
9 | | Shigekazu Inohara,
Kazuhiko Kato,
Takashi Masuda:
"Unstable Threads" Kernel Interface for Minimizing the Overhead of Thread Switching.
IPPS 1993: 149-155 |
8 | | Atsushi Ohori,
Kazuhiko Kato:
Semantics for Communication Primitives in an Polymorphic Language.
POPL 1993: 99-112 |
1992 |
7 | | Shigeru Chiba,
Kazuhiko Kato,
Takeshi Masuda:
Exploiting a Weak Consistency to Implement Distributed Tuple Space.
ICDCS 1992: 416-423 |
6 | EE | Kazuhiko Kato,
Takashi Masuda:
Persistent Caching: An Implementation Technique for Complex Objects with Object Identity.
IEEE Trans. Software Eng. 18(7): 631-645 (1992) |
1991 |
5 | EE | Yasushi Kiyoki,
Takahiro Kurosawa,
Kazuhiko Kato,
Takashi Masuda:
The Software Architecture of a Parallel Processing System for Advanced Database Applications.
ICDE 1991: 220-229 |
1990 |
4 | | Kazuhiko Kato,
Takashi Masuda,
Yasushi Kiyoki:
A Comprehension-Based Database Language and Its Distributed Execution.
ICDCS 1990: 442-449 |
1989 |
3 | EE | Yasushi Kiyoki,
Takahiro Kurosawa,
Peng Liu,
Kazuhiko Kato,
Takashi Masuda:
Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations.
DASFAA 1989: 266-273 |
1987 |
2 | | Yasushi Kiyoki,
Kazuhiko Kato,
Nobori Yamaguchi,
Takashi Masuda:
A Stream-Oriented Approach to Parallel Processing for Deductive Databases.
IWDM 1987: 475-488 |
1986 |
1 | | Yasushi Kiyoki,
Kazuhiko Kato,
Takashi Masuda:
A Relational-Database Machine Based on Functional Programming Concepts.
FJCC 1986: 969-977 |