|
Search the dblp DataBase
Kenji Kono:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wataru Kaneko, Kenji Kono, Kentaro Shimizu
Preemptive Resource Management: Defending against Resource Monopolizing DoS. [Citation Graph (0, 0)][DBLP] Applied Informatics, 2003, pp:662-669 [Conf]
- Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda
Self-configurable Mirror Servers for Automatic Adaptation to Service Demand Fluctuation. [Citation Graph (0, 0)][DBLP] ASIAN, 2003, pp:18-32 [Conf]
- Akiyoshi Sugiki, Kenji Kono, Hideya Iwasaki
A Practical Approach to Automatic Parameter-Tuning of Web Servers. [Citation Graph (0, 0)][DBLP] ASIAN, 2005, pp:146-159 [Conf]
- Kenji Kono, Kazuhiko Kato, Takashi Masuda
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management. [Citation Graph (0, 0)][DBLP] ECOOP, 1996, pp:295-315 [Conf]
- Kenji Kono, Kazuhiko Kato, Takashi Masuda
Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers. [Citation Graph (0, 0)][DBLP] ICDCS, 1994, pp:142-151 [Conf]
- Kenji Kono, Takashi Masuda
Efficient RMI: Dynamic Specialization of Object Serialization. [Citation Graph (0, 0)][DBLP] ICDCS, 2000, pp:308-315 [Conf]
- Masahiko Takahashi, Kenji Kono, Takashi Masuda
Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. [Citation Graph (0, 0)][DBLP] ICDCS, 1999, pp:64-73 [Conf]
- Makoto Shimamura, Kenji Kono
Using Attack Information to Reduce False Positives in Network IDS. [Citation Graph (0, 0)][DBLP] ISCC, 2006, pp:386-393 [Conf]
- Takahiro Shinagawa, Kenji Kono, Takashi Masuda
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:172-184 [Conf]
- Takahiro Shinagawa, Kenji Kono
Implementing a secure setuid program. [Citation Graph (0, 0)][DBLP] Parallel and Distributed Computing and Networks, 2004, pp:301-309 [Conf]
- Takeshi Morimoto, Kenji Kono, Ikuo Takeuchi
YabAI: The First Rescue Simulation League Champion. [Citation Graph (0, 0)][DBLP] RoboCup, 2001, pp:49-59 [Conf]
- Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda
Exploiting mobile code for user-transparent distribution of application-level protocols. [Citation Graph (0, 0)][DBLP] Systems and Computers in Japan, 2005, v:36, n:1, pp:44-57 [Journal]
- Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda
Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation. [Citation Graph (0, 0)][DBLP] Systems and Computers in Japan, 2006, v:37, n:8, pp:24-37 [Journal]
- Hiroshi Yamada, Kenji Kono
FoxyTechnique: tricking operating system policies with a virtual machine monitor. [Citation Graph (0, 0)][DBLP] VEE, 2007, pp:55-64 [Conf]
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. [Citation Graph (, )][DBLP]
Performance Improvement by Means of Collaboration between Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. [Citation Graph (, )][DBLP]
Narrowing Down Possible Causes of Performance Anomaly in Web Applications. [Citation Graph (, )][DBLP]
Finding candidate spots for replica servers based on demand fluctuation. [Citation Graph (, )][DBLP]
An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems. [Citation Graph (, )][DBLP]
FlexBox: Sandboxing internet servers based on layer-7 contexts. [Citation Graph (, )][DBLP]
Embedding Network Coordinates into the Heart of Distributed Hash Tables. [Citation Graph (, )][DBLP]
Simplifying security policy descriptions for internet servers in secure operating systems. [Citation Graph (, )][DBLP]
Automated detection of session fixation vulnerabilities. [Citation Graph (, )][DBLP]
BitVisor: a thin hypervisor for enforcing i/o device security. [Citation Graph (, )][DBLP]
Enforcing appropriate process execution for exploiting idle resources from outside operating systems. [Citation Graph (, )][DBLP]
User-level disk-bandwidth control for resource-borrowing network applications. [Citation Graph (, )][DBLP]
Search in 0.021secs, Finished in 0.022secs
|