|
Search the dblp DataBase
Eiji Kawai:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Eiji Kawai, Ken-ichi Chinen, Suguru Yamaguchi, Hideki Sunahara
An Analysis of the Number of ICP Packets on the Distributed WWW Caching System. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 1999, pp:234-239 [Conf]
- Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi
A Fast Polling I/O Implementation with Real-time Signals. [Citation Graph (0, 0)][DBLP] NCA, 2004, pp:317-322 [Conf]
- Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi
Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling. [Citation Graph (0, 0)][DBLP] Parallel and Distributed Computing and Networks, 2004, pp:134-140 [Conf]
- Yutaka Nakamura, Eiji Kawai, Shinji Shimojo, Suguru Yamaguchi, Hideki Sunahara
The Design and Implementation of a Kernel Monitoring System for Network Servers. [Citation Graph (0, 0)][DBLP] SAINT, 2002, pp:14-15 [Conf]
- Motohiro Ichikawa, Yutaka Nakamura, Eiji Kawai, Kazutoshi Fujikawa, Hideki Sunahara
NAS: the NAIST user authorization management system for network accesses in consideration of system administration volunteers. [Citation Graph (0, 0)][DBLP] SIGUCCS, 2005, pp:118-121 [Conf]
- Takahiro Hirofuchi, Eiji Kawai, Kazutoshi Fujikawa, Hideki Sunahara
USB/IP - A Peripheral Bus Extension for Device Sharing over IP Network (Awarded FREENIX Track Best Paper Award!). [Citation Graph (0, 0)][DBLP] USENIX Annual Technical Conference, FREENIX Track, 2005, pp:47-60 [Conf]
- Nobutatsu Nakamura, Ken-ichiro Fujiyama, Eiji Kawai, Hideki Sunahara
A Flexible Replication Mechanism with Extended Database Connection Layers. [Citation Graph (0, 0)][DBLP] NCA, 2006, pp:212-222 [Conf]
T-PIM: Trusted Password Input Method against Data Stealing Malware. [Citation Graph (, )][DBLP]
BitVisor: a thin hypervisor for enforcing i/o device security. [Citation Graph (, )][DBLP]
A Two-Step Execution Mechanism for Thin Secure Hypervisors. [Citation Graph (, )][DBLP]
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.003secs
|