The SCEAS System
Navigation Menu

Search the dblp DataBase


Kenji Kono: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wataru Kaneko, Kenji Kono, Kentaro Shimizu
    Preemptive Resource Management: Defending against Resource Monopolizing DoS. [Citation Graph (0, 0)][DBLP]
    Applied Informatics, 2003, pp:662-669 [Conf]
  2. Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda
    Self-configurable Mirror Servers for Automatic Adaptation to Service Demand Fluctuation. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2003, pp:18-32 [Conf]
  3. Akiyoshi Sugiki, Kenji Kono, Hideya Iwasaki
    A Practical Approach to Automatic Parameter-Tuning of Web Servers. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2005, pp:146-159 [Conf]
  4. Kenji Kono, Kazuhiko Kato, Takashi Masuda
    An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management. [Citation Graph (0, 0)][DBLP]
    ECOOP, 1996, pp:295-315 [Conf]
  5. Kenji Kono, Kazuhiko Kato, Takashi Masuda
    Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1994, pp:142-151 [Conf]
  6. Kenji Kono, Takashi Masuda
    Efficient RMI: Dynamic Specialization of Object Serialization. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:308-315 [Conf]
  7. Masahiko Takahashi, Kenji Kono, Takashi Masuda
    Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1999, pp:64-73 [Conf]
  8. Makoto Shimamura, Kenji Kono
    Using Attack Information to Reduce False Positives in Network IDS. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:386-393 [Conf]
  9. Takahiro Shinagawa, Kenji Kono, Takashi Masuda
    Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:172-184 [Conf]
  10. Takahiro Shinagawa, Kenji Kono
    Implementing a secure setuid program. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2004, pp:301-309 [Conf]
  11. Takeshi Morimoto, Kenji Kono, Ikuo Takeuchi
    YabAI: The First Rescue Simulation League Champion. [Citation Graph (0, 0)][DBLP]
    RoboCup, 2001, pp:49-59 [Conf]
  12. Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda
    Exploiting mobile code for user-transparent distribution of application-level protocols. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2005, v:36, n:1, pp:44-57 [Journal]
  13. Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda
    Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2006, v:37, n:8, pp:24-37 [Journal]
  14. Hiroshi Yamada, Kenji Kono
    FoxyTechnique: tricking operating system policies with a virtual machine monitor. [Citation Graph (0, 0)][DBLP]
    VEE, 2007, pp:55-64 [Conf]

  15. Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. [Citation Graph (, )][DBLP]

  16. Performance Improvement by Means of Collaboration between Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]

  17. Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. [Citation Graph (, )][DBLP]

  18. Narrowing Down Possible Causes of Performance Anomaly in Web Applications. [Citation Graph (, )][DBLP]

  19. Finding candidate spots for replica servers based on demand fluctuation. [Citation Graph (, )][DBLP]

  20. An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems. [Citation Graph (, )][DBLP]

  21. FlexBox: Sandboxing internet servers based on layer-7 contexts. [Citation Graph (, )][DBLP]

  22. Embedding Network Coordinates into the Heart of Distributed Hash Tables. [Citation Graph (, )][DBLP]

  23. Simplifying security policy descriptions for internet servers in secure operating systems. [Citation Graph (, )][DBLP]

  24. Automated detection of session fixation vulnerabilities. [Citation Graph (, )][DBLP]

  25. BitVisor: a thin hypervisor for enforcing i/o device security. [Citation Graph (, )][DBLP]

  26. Enforcing appropriate process execution for exploiting idle resources from outside operating systems. [Citation Graph (, )][DBLP]

  27. User-level disk-bandwidth control for resource-borrowing network applications. [Citation Graph (, )][DBLP]

Search in 0.021secs, Finished in 0.022secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002