Kenji Kono
Kenji Kono
Email verificata su
Citata da
Citata da
Bitvisor: a thin hypervisor for enforcing i/o device security
T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ...
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009
Sania: Syntactic and semantic analysis for automated testing against sql injection
Y Kosuga, K Kono, M Hanaoka, M Hishiyama, Y Takahama
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
GPUvm: Why not virtualizing GPUs at the hypervisor?
Y Suzuki, S Kato, H Yamada, K Kono
2014 {USENIX} Annual Technical Conference ({USENIX}{ATC} 14), 109-120, 2014
Honeyguide: A vm migration-aware network topology for saving energy consumption in data center networks
H Shirayanagi, H Yamada, K Kono
IEICE TRANSACTIONS on Information and Systems 96 (9), 2055-2064, 2013
Towards unobtrusive vm live migration for cloud computing platforms
A Koto, H Yamada, K Ohmura, K Kono
Proceedings of the Asia-Pacific Workshop on Systems, 1-6, 2012
Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery
K Yamakita, H Yamada, K Kono
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
Efficient kernel support of fine-grained protection domains for mobile code
M Takahashi, K Kono, T Masuda
Proceedings. 19th IEEE International Conference on Distributed Computing …, 1999
Efficient RMI: Dynamic specialization of object serialization
K Kono, T Masuda
Proceedings 20th IEEE International Conference on Distributed Computing …, 2000
Smart remote procedure calls: Transparent treatment of remote pointers
K Kono, K Kato, T Masuda
14th International Conference on Distributed Computing Systems, 142-151, 1994
Is linux kernel oops useful or not?
T Yoshimura, H Yamada, K Kono
Eighth Workshop on Hot Topics in System Dependability (HotDep 12), 2012
Gpuvm: Gpu virtualization at the hypervisor
Y Suzuki, S Kato, H Yamada, K Kono
IEEE Transactions on Computers 65 (9), 2752-2766, 2015
An integrated laboratory for processor organization, compiler design, and computer networking
K Abe, T Tateoka, M Suzuki, Y Maeda, K Kono, T Watanabe
IEEE Transactions on Education 47 (3), 311-320, 2004
Aspfuzz: A state-aware protocol fuzzer based on application-layer protocols
T Kitagawa, M Hanaoka, K Kono
The IEEE symposium on Computers and Communications, 202-208, 2010
Protected and secure mobile object computing in Planet
K Kato, K Toumura, K Matsubara, S Aikawa, J Yoshida, K Kono, K Taura, ...
Using attack information to reduce false positives in network ids
M Shimamura, K Kono
11th IEEE Symposium on Computers and Communications (ISCC'06), 386-393, 2006
Tuning mechanisms for two major parameters of Apache web servers
A Sugiki, K Kono, H Iwasaki
Software: Practice and Experience 38 (12), 1215-1240, 2008
Foxytechnique: tricking operating system policies with a virtual machine monitor
H Yamada, K Kono
Proceedings of the 3rd international conference on Virtual execution …, 2007
Flexible and efficient sandboxing based on fine-grained protection domains
T Shinagawa, K Kono, T Masuda
International Symposium on Software Security, 172-184, 2002
An implementation method of migratable distributed objects using an RPC technique integrated with virtual memory management
K Kono, K Kato, T Masuda
European Conference on Object-Oriented Programming, 295-315, 1996
Traveling forward in time to newer operating systems using ShadowReboot
H Yamada, K Kono
Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on …, 2013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20