|
Search the dblp DataBase
Kazuhiko Kato:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kazuhiko Kato, Takashi Masuda
Persistent Caching: An Implementation Technique for Complex Objects with Object Identity. [Citation Graph (5, 0)][DBLP] IEEE Trans. Software Eng., 1992, v:18, n:7, pp:631-645 [Journal]
- Yasushi Kiyoki, Takahiro Kurosawa, Peng Liu, Kazuhiko Kato, Takashi Masuda
Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations. [Citation Graph (1, 8)][DBLP] DASFAA, 1989, pp:266-273 [Conf]
- Yasushi Kiyoki, Takahiro Kurosawa, Kazuhiko Kato, Takashi Masuda
The Software Architecture of a Parallel Processing System for Advanced Database Applications. [Citation Graph (1, 10)][DBLP] ICDE, 1991, pp:220-229 [Conf]
- Yasushi Kiyoki, Kazuhiko Kato, Nobori Yamaguchi, Takashi Masuda
A Stream-Oriented Approach to Parallel Processing for Deductive Databases. [Citation Graph (1, 0)][DBLP] IWDM, 1987, pp:475-488 [Conf]
- Hirotake Abe, Kazuhiko Kato
Sustor: Distributed Storage for Disaster Recovery Using the Small-World Model. [Citation Graph (0, 0)][DBLP] CIT, 2006, pp:60- [Conf]
- Mizuki Oka, Hiroshi Tsukada, Kazuhiko Kato
Robin: Extracting Visual and Textual Features from Web Pages. [Citation Graph (0, 0)][DBLP] APWeb, 2006, pp:765-771 [Conf]
- Kenji Kono, Kazuhiko Kato, Takashi Masuda
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management. [Citation Graph (0, 0)][DBLP] ECOOP, 1996, pp:295-315 [Conf]
- Yasushi Kiyoki, Kazuhiko Kato, Takashi Masuda
A Relational-Database Machine Based on Functional Programming Concepts. [Citation Graph (0, 0)][DBLP] FJCC, 1986, pp:969-977 [Conf]
- Shigeru Chiba, Kazuhiko Kato, Takeshi Masuda
Exploiting a Weak Consistency to Implement Distributed Tuple Space. [Citation Graph (0, 0)][DBLP] ICDCS, 1992, pp:416-423 [Conf]
- Kazuhiko Kato, Takashi Masuda, Yasushi Kiyoki
A Comprehension-Based Database Language and Its Distributed Execution. [Citation Graph (0, 0)][DBLP] ICDCS, 1990, pp:442-449 [Conf]
- Kazuhiko Kato, Atsunobu Narita, Shigekazu Inohara, Takashi Masuda
Distributed Shared Repository: A Unified Approach to Distribution and Persistency. [Citation Graph (0, 0)][DBLP] ICDCS, 1993, pp:20-29 [Conf]
- Kenji Kono, Kazuhiko Kato, Takashi Masuda
Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers. [Citation Graph (0, 0)][DBLP] ICDCS, 1994, pp:142-151 [Conf]
- Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato, Kozo Itano
Name-Level Approach for Egress Network Access Control. [Citation Graph (0, 0)][DBLP] ICN (2), 2005, pp:284-296 [Conf]
- Shigekazu Inohara, Kazuhiko Kato, Takashi Masuda
"Unstable Threads" Kernel Interface for Minimizing the Overhead of Thread Switching. [Citation Graph (0, 0)][DBLP] IPPS, 1993, pp:149-155 [Conf]
- Hirotake Abe, Kazuhiko Kato
Security Policy Descriptions Through the Use of Control Structure of a Target Program. [Citation Graph (0, 0)][DBLP] ISSS, 2003, pp:242-261 [Conf]
- Kazuhiko Kato, Yoshihiro Oyama
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation. [Citation Graph (0, 0)][DBLP] ISSS, 2002, pp:112-132 [Conf]
- Kazuhiko Kato, Katsuya Matsubara, Yuuichi Someya, Kazumasa Itabashi, Yutaka Moriyama
PLANET: An Open Mobile Object System for Open Network. [Citation Graph (0, 0)][DBLP] ASA/MA, 1999, pp:274-275 [Conf]
- Kazuhiko Kato
Safe and Secure Execution Mechanisms for Mobile Objects. [Citation Graph (0, 0)][DBLP] Mobile Object Systems, 1996, pp:201-212 [Conf]
- Atsushi Ohori, Kazuhiko Kato
Semantics for Communication Primitives in an Polymorphic Language. [Citation Graph (0, 0)][DBLP] POPL, 1993, pp:99-112 [Conf]
- Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. [Citation Graph (0, 0)][DBLP] RAID, 2004, pp:223-237 [Conf]
- Péter Surányi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, Kazuhiko Kato
General Virtual Hosting via Lightweight User-Level Virtualization. [Citation Graph (0, 0)][DBLP] SAINT, 2005, pp:229-236 [Conf]
- Katsuya Matsubara, Takahiro Maekawa, Kazuhiko Kato
Worldwide Component Scripting with the Planet Mobile Object System. [Citation Graph (0, 0)][DBLP] WWCA, 1998, pp:56-71 [Conf]
- Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato
Capability-Based Egress Network Access Control for Transferring Access Rights. [Citation Graph (0, 0)][DBLP] ICITA (2), 2005, pp:488-495 [Conf]
- Kazumasa Itabashi, Katsuya Matsubara, Yutaka Moriyama, Yuuichi Someya, Kazuhiko Kato, Tatsuro Sekiguchi, Akinori Yonezawa
Implementing an applet system without fixing virtual-machine designs. [Citation Graph (0, 0)][DBLP] Systems and Computers in Japan, 2003, v:34, n:2, pp:32-42 [Journal]
- Kazuhiko Kato
Persistently Cached B-Trees. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2003, v:15, n:3, pp:706-720 [Journal]
- Kazuhiko Kato, Yuuichi Someya, Katsuya Matsubara, Kunihiko Toumura, Hirotake Abe
An Approach to Mobile Software Robots for the WWW. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 1999, v:11, n:4, pp:526-548 [Journal]
- Kazuhiko Kato
Modeling and Virtualization for Secure Computing Environments. [Citation Graph (0, 0)][DBLP] ASIAN, 2007, pp:196-197 [Conf]
- Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato
Capability-based egress network access control by using DNS server. [Citation Graph (0, 0)][DBLP] J. Network and Computer Applications, 2007, v:30, n:4, pp:1275-1282 [Journal]
Simple Certificateless Signature with Smart Cards. [Citation Graph (, )][DBLP]
An Access Control Model for Web-Services That Supports Delegation and Creation of Authority. [Citation Graph (, )][DBLP]
Scribble-a-Secret: Similarity-based password authentication using sketches. [Citation Graph (, )][DBLP]
A Platform for Cooperative Server Backups Based on Virtual Machines. [Citation Graph (, )][DBLP]
Protection and Recovery of Disk Encryption Key Using Smart Cards. [Citation Graph (, )][DBLP]
Fast networking with socket-outsourcing in hosted virtual machine environments. [Citation Graph (, )][DBLP]
Hypervisor-based prevention of persistent rootkits. [Citation Graph (, )][DBLP]
CapaCon: access control mechanism for inter-device communications through TCP connections. [Citation Graph (, )][DBLP]
Optimization of distributed communication in multiprotocol Tuple Space. [Citation Graph (, )][DBLP]
BitVisor: a thin hypervisor for enforcing i/o device security. [Citation Graph (, )][DBLP]
Efficient Anomaly Detection System for Mobile Handsets. [Citation Graph (, )][DBLP]
A Two-Step Execution Mechanism for Thin Secure Hypervisors. [Citation Graph (, )][DBLP]
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. [Citation Graph (, )][DBLP]
Search in 0.007secs, Finished in 0.010secs
|