The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eiji Kawai: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eiji Kawai, Ken-ichi Chinen, Suguru Yamaguchi, Hideki Sunahara
    An Analysis of the Number of ICP Packets on the Distributed WWW Caching System. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:234-239 [Conf]
  2. Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi
    A Fast Polling I/O Implementation with Real-time Signals. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:317-322 [Conf]
  3. Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi
    Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2004, pp:134-140 [Conf]
  4. Yutaka Nakamura, Eiji Kawai, Shinji Shimojo, Suguru Yamaguchi, Hideki Sunahara
    The Design and Implementation of a Kernel Monitoring System for Network Servers. [Citation Graph (0, 0)][DBLP]
    SAINT, 2002, pp:14-15 [Conf]
  5. Motohiro Ichikawa, Yutaka Nakamura, Eiji Kawai, Kazutoshi Fujikawa, Hideki Sunahara
    NAS: the NAIST user authorization management system for network accesses in consideration of system administration volunteers. [Citation Graph (0, 0)][DBLP]
    SIGUCCS, 2005, pp:118-121 [Conf]
  6. Takahiro Hirofuchi, Eiji Kawai, Kazutoshi Fujikawa, Hideki Sunahara
    USB/IP - A Peripheral Bus Extension for Device Sharing over IP Network (Awarded FREENIX Track Best Paper Award!). [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 2005, pp:47-60 [Conf]
  7. Nobutatsu Nakamura, Ken-ichiro Fujiyama, Eiji Kawai, Hideki Sunahara
    A Flexible Replication Mechanism with Extended Database Connection Layers. [Citation Graph (0, 0)][DBLP]
    NCA, 2006, pp:212-222 [Conf]

  8. T-PIM: Trusted Password Input Method against Data Stealing Malware. [Citation Graph (, )][DBLP]


  9. BitVisor: a thin hypervisor for enforcing i/o device security. [Citation Graph (, )][DBLP]


  10. A Two-Step Execution Mechanism for Thin Secure Hypervisors. [Citation Graph (, )][DBLP]


  11. Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002