Kazuhiko Kato
Kazuhiko Kato
Professor, Departmen of Computer Science, University of Tsukuba
Zweryfikowany adres z cs.tsukuba.ac.jp - Strona główna
Cytowane przez
Cytowane przez
Bitvisor: a thin hypervisor for enforcing i/o device security
T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ...
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009
Anomaly detection using layered networks based on eigen co-occurrence matrix
M Oka, Y Oyama, H Abe, K Kato
Recent Advances in Intrusion Detection: 7th International Symposium, RAID …, 2004
Software safety execution system
K Kato, Y Oyama
US Patent 7,690,023, 2010
Semantics for communication primitives in a polymorphic language
A Ohori, K Kato
Proceedings of the 20th ACM SIGPLAN-SIGACT symposium on Principles of …, 1993
Fast networking with socket-outsourcing in hosted virtual machine environments
H Eiraku, Y Shinjo, C Pu, Y Koh, K Kato
Proceedings of the 2009 ACM symposium on Applied Computing, 310-317, 2009
Softwarepot: An encapsulated transferable file system for secure software circulation
K Kato, Y Oyama
Software Security—Theories and Systems: Mext-NSF-JSPS International …, 2003
Cosmetic side effects of antiepileptic drugs in adults with epilepsy
B Chen, H Choi, LJ Hirsch, J Moeller, A Javed, K Kato, A Legge, ...
Epilepsy & Behavior 42, 129-137, 2015
Power-saving in large-scale storage systems with data migration
K Hasebe, T Niwa, A Sugiki, K Kato
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
Extracting topics from weblogs through frequency segments
M Oka, H Abe, K Kato
Proc. of the Workshop on the Weblogging Ecosystem: Aggregation, Analysis and …, 2006
An approach to mobile software robots for the WWW
K Kato, Y Someya, K Matsubara, K Toumura, H Abe
IEEE Transactions on Knowledge and Data Engineering 11 (4), 526-548, 1999
Persistent caching: an implementation technique for complex objects with object identity
K Kato, T Masuda
IEEE Transactions on Software Engineering 18 (7), 631-645, 1992
Processing of stoichiometric and Ti doped LiNbO3 films with preferred orientation from metal alkoxides
S Hirano, K Kikuta, K Kato
MRS Online Proceedings Library (OPL) 200, 3, 1990
Eigen co-occurrence matrix method for masquerade detection
M Oka, Y Oyama, K Kato
Publications of the Japan Society for Software Science and Technology, 2004
Smart remote procedure calls: Transparent treatment of remote pointers
K Kono, K Kato, T Masuda
14th International Conference on Distributed Computing Systems, 142-151, 1994
Improving agility and elasticity in bare-metal clouds
Y Omote, T Shinagawa, K Kato
Proceedings of the Twentieth International Conference on Architectural …, 2015
An integrated computational infrastructure for a virtual Tokyo concepts and examples
SB Kraines, DR Wallace, Y Iwafune, Y Yoshida, T Aramaki, K Kato, ...
Journal of Industrial Ecology 5 (1), 35-54, 2001
Hypervisor-based prevention of persistent rootkits
Y Chubachi, T Shinagawa, K Kato
Proceedings of the 2010 ACM Symposium on Applied Computing, 214-220, 2010
Logarithmic etale topology theory
K Fujiwara, K Kato
preprint, 1995
A relational database machine based on functional programming concepts
Y Kiyoki, K Kato, T Masuda
Proceedings of 1986 ACM Fall joint computer conference, 969-978, 1986
Tyzzer's disease in mice: Pathologic studies on experimentally infected animals
K Fujiwara, Y Takagaki, K Maejima, K Kato, M Naiki, Y Tajima
The Japanese journal of experimental medicine 33, 183-202, 1963
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20