2009 | ||
---|---|---|
35 | EE | Hideki Eiraku, Yasushi Shinjo, Calton Pu, Younggyun Koh, Kazuhiko Kato: Fast networking with socket-outsourcing in hosted virtual machine environments. SAC 2009: 310-317 |
34 | EE | Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato: BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130 |
2008 | ||
33 | EE | Mitsuhiro Mabuchi, Yasushi Shinjo, Akira Sato, Kazuhiko Kato: An Access Control Model for Web-Services That Supports Delegation and Creation of Authority. ICN 2008: 213-222 |
32 | EE | Mizuki Oka, Kazuhiko Kato, Yingqing Xu, Lin Liang, Fang Wen: Scribble-a-Secret: Similarity-based password authentication using sketches. ICPR 2008: 1-4 |
31 | EE | Akiyoshi Sugiki, Kei Yamatozaki, Richard Potter, Kazuhiko Kato: A Platform for Cooperative Server Backups Based on Virtual Machines. ISAS 2008: 129-141 |
30 | EE | Kazumasa Omote, Kazuhiko Kato: Protection and Recovery of Disk Encryption Key Using Smart Cards. ITNG 2008: 106-111 |
29 | EE | Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa, Kazuhiko Kato: Efficient Anomaly Detection System for Mobile Handsets. SECURWARE 2008: 154-160 |
2007 | ||
28 | EE | Kazuhiko Kato: Modeling and Virtualization for Secure Computing Environments. ASIAN 2007: 196-197 |
27 | EE | Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato: Capability-based egress network access control by using DNS server. J. Network and Computer Applications 30(4): 1275-1282 (2007) |
2006 | ||
26 | EE | Mizuki Oka, Hiroshi Tsukada, Kazuhiko Kato: Robin: Extracting Visual and Textual Features from Web Pages. APWeb 2006: 765-771 |
25 | EE | Hirotake Abe, Kazuhiko Kato: Sustor: Distributed Storage for Disaster Recovery Using the Small-World Model. CIT 2006: 60 |
2005 | ||
24 | EE | Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato: Capability-Based Egress Network Access Control for Transferring Access Rights. ICITA (2) 2005: 488-495 |
23 | EE | Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato, Kozo Itano: Name-Level Approach for Egress Network Access Control. ICN (2) 2005: 284-296 |
22 | EE | Péter Surányi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, Kazuhiko Kato: General Virtual Hosting via Lightweight User-Level Virtualization. SAINT 2005: 229-236 |
2004 | ||
21 | EE | Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato: Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. RAID 2004: 223-237 |
2003 | ||
20 | EE | Hirotake Abe, Kazuhiko Kato: Security Policy Descriptions Through the Use of Control Structure of a Target Program. ISSS 2003: 242-261 |
19 | EE | Kazuhiko Kato: Persistently Cached B-Trees. IEEE Trans. Knowl. Data Eng. 15(3): 706-720 (2003) |
18 | EE | Kazumasa Itabashi, Katsuya Matsubara, Yutaka Moriyama, Yuuichi Someya, Kazuhiko Kato, Tatsurou Sekiguchi, Akinori Yonezawa: Implementing an applet system without fixing virtual-machine designs. Systems and Computers in Japan 34(2): 32-42 (2003) |
2002 | ||
17 | EE | Kazuhiko Kato, Yoshihiro Oyama: SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation. ISSS 2002: 112-132 |
1999 | ||
16 | EE | Kazuhiko Kato, Katsuya Matsubara, Yuuichi Someya, Kazumasa Itabashi, Yutaka Moriyama: PLANET: An Open Mobile Object System for Open Network. ASA/MA 1999: 274-275 |
15 | EE | Kazuhiko Kato, Yuuichi Someya, Katsuya Matsubara, Kunihiko Toumura, Hirotake Abe: An Approach to Mobile Software Robots for the WWW. IEEE Trans. Knowl. Data Eng. 11(4): 526-548 (1999) |
1998 | ||
14 | Katsuya Matsubara, Takahiro Maekawa, Kazuhiko Kato: Worldwide Component Scripting with the Planet Mobile Object System. WWCA 1998: 56-71 | |
1996 | ||
13 | EE | Kenji Kono, Kazuhiko Kato, Takashi Masuda: An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management. ECOOP 1996: 295-315 |
12 | Kazuhiko Kato: Safe and Secure Execution Mechanisms for Mobile Objects. Mobile Object Systems 1996: 201-212 | |
1994 | ||
11 | Kenji Kono, Kazuhiko Kato, Takashi Masuda: Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers. ICDCS 1994: 142-151 | |
1993 | ||
10 | Kazuhiko Kato, Atsunobu Narita, Shigekazu Inohara, Takashi Masuda: Distributed Shared Repository: A Unified Approach to Distribution and Persistency. ICDCS 1993: 20-29 | |
9 | Shigekazu Inohara, Kazuhiko Kato, Takashi Masuda: "Unstable Threads" Kernel Interface for Minimizing the Overhead of Thread Switching. IPPS 1993: 149-155 | |
8 | Atsushi Ohori, Kazuhiko Kato: Semantics for Communication Primitives in an Polymorphic Language. POPL 1993: 99-112 | |
1992 | ||
7 | Shigeru Chiba, Kazuhiko Kato, Takeshi Masuda: Exploiting a Weak Consistency to Implement Distributed Tuple Space. ICDCS 1992: 416-423 | |
6 | EE | Kazuhiko Kato, Takashi Masuda: Persistent Caching: An Implementation Technique for Complex Objects with Object Identity. IEEE Trans. Software Eng. 18(7): 631-645 (1992) |
1991 | ||
5 | EE | Yasushi Kiyoki, Takahiro Kurosawa, Kazuhiko Kato, Takashi Masuda: The Software Architecture of a Parallel Processing System for Advanced Database Applications. ICDE 1991: 220-229 |
1990 | ||
4 | Kazuhiko Kato, Takashi Masuda, Yasushi Kiyoki: A Comprehension-Based Database Language and Its Distributed Execution. ICDCS 1990: 442-449 | |
1989 | ||
3 | EE | Yasushi Kiyoki, Takahiro Kurosawa, Peng Liu, Kazuhiko Kato, Takashi Masuda: Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations. DASFAA 1989: 266-273 |
1987 | ||
2 | Yasushi Kiyoki, Kazuhiko Kato, Nobori Yamaguchi, Takashi Masuda: A Stream-Oriented Approach to Parallel Processing for Deductive Databases. IWDM 1987: 475-488 | |
1986 | ||
1 | Yasushi Kiyoki, Kazuhiko Kato, Takashi Masuda: A Relational-Database Machine Based on Functional Programming Concepts. FJCC 1986: 969-977 |