Segui
Kenji Kono
Kenji Kono
Altri nomi河野 健二
Email verificata su ics.keio.ac.jp
Titolo
Citata da
Citata da
Anno
Bitvisor: a thin hypervisor for enforcing i/o device security
T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ...
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009
3442009
{GPUvm}: Why Not Virtualizing {GPUs} at the Hypervisor?
Y Suzuki, S Kato, H Yamada, K Kono
2014 USENIX Annual Technical Conference (USENIX ATC 14), 109-120, 2014
282*2014
Sania: Syntactic and semantic analysis for automated testing against sql injection
Y Kosuga, K Kono, M Hanaoka, M Hishiyama, Y Takahama
Twenty-third annual computer security applications conference (ACSAC 2007 …, 2007
1662007
Honeyguide: A vm migration-aware network topology for saving energy consumption in data center networks
H Shirayanagi, H Yamada, K Kono
IEICE TRANSACTIONS on Information and Systems 96 (9), 2055-2064, 2013
782013
Towards unobtrusive vm live migration for cloud computing platforms
A Koto, H Yamada, K Ohmura, K Kono
Proceedings of the Asia-Pacific Workshop on Systems, 1-6, 2012
752012
Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery
K Yamakita, H Yamada, K Kono
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
592011
Efficient kernel support of fine-grained protection domains for mobile code
M Takahashi, K Kono, T Masuda
Proceedings. 19th IEEE International Conference on Distributed Computing …, 1999
521999
Aspfuzz: A state-aware protocol fuzzer based on application-layer protocols
T Kitagawa, M Hanaoka, K Kono
The IEEE symposium on Computers and Communications, 202-208, 2010
422010
Efficient RMI: Dynamic specialization of object serialization
K Kono, T Masuda
Proceedings 20th IEEE International Conference on Distributed Computing …, 2000
402000
Gpuvm: Gpu virtualization at the hypervisor
Y Suzuki, S Kato, H Yamada, K Kono
IEEE Transactions on Computers 65 (9), 2752-2766, 2015
392015
Smart remote procedure calls: Transparent treatment of remote pointers
K Kono, K Kato, T Masuda
14th International Conference on Distributed Computing Systems, 142-151, 1994
331994
Is linux kernel oops useful or not?
T Yoshimura, H Yamada, K Kono
Eighth Workshop on Hot Topics in System Dependability (HotDep 12), 2012
292012
An integrated laboratory for processor organization, compiler design, and computer networking
K Abe, T Tateoka, M Suzuki, Y Maeda, K Kono, T Watanabe
IEEE Transactions on Education 47 (3), 311-320, 2004
272004
拡張コンポーネントのためのカーネルによる細粒度軽量保護ドメインの実現
品川高廣, 河野健二, 高橋雅彦, 益田隆司
情報処理学会論文誌 40 (6), 2596-2606, 1999
251999
Traveling forward in time to newer operating systems using shadowreboot
H Yamada, K Kono
Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on …, 2013
232013
Protected and secure mobile object computing in Planet
K Kato
2nd ECOOP Workshop on Mobile Object Systems, 319-326, 1996
201996
Using attack information to reduce false positives in network ids
M Shimamura, K Kono
11th IEEE Symposium on Computers and Communications (ISCC'06), 386-393, 2006
192006
Automated detection of session management vulnerabilities in web applications
Y Takamatsu, Y Kosuga, K Kono
2012 Tenth Annual International Conference on Privacy, Security and Trust …, 2012
182012
Tuning mechanisms for two major parameters of Apache web servers
A Sugiki, K Kono, H Iwasaki
Software: Practice and Experience 38 (12), 1215-1240, 2008
182008
Do injected faults cause real failures? A case study of Linux
N Kikuchi, T Yoshimura, R Sakuma, K Kono
2014 IEEE International Symposium on Software Reliability Engineering …, 2014
172014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20