The SCEAS System
Navigation Menu

Search the dblp DataBase


Kazuhiko Kato: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kazuhiko Kato, Takashi Masuda
    Persistent Caching: An Implementation Technique for Complex Objects with Object Identity. [Citation Graph (5, 0)][DBLP]
    IEEE Trans. Software Eng., 1992, v:18, n:7, pp:631-645 [Journal]
  2. Yasushi Kiyoki, Takahiro Kurosawa, Peng Liu, Kazuhiko Kato, Takashi Masuda
    Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations. [Citation Graph (1, 8)][DBLP]
    DASFAA, 1989, pp:266-273 [Conf]
  3. Yasushi Kiyoki, Takahiro Kurosawa, Kazuhiko Kato, Takashi Masuda
    The Software Architecture of a Parallel Processing System for Advanced Database Applications. [Citation Graph (1, 10)][DBLP]
    ICDE, 1991, pp:220-229 [Conf]
  4. Yasushi Kiyoki, Kazuhiko Kato, Nobori Yamaguchi, Takashi Masuda
    A Stream-Oriented Approach to Parallel Processing for Deductive Databases. [Citation Graph (1, 0)][DBLP]
    IWDM, 1987, pp:475-488 [Conf]
  5. Hirotake Abe, Kazuhiko Kato
    Sustor: Distributed Storage for Disaster Recovery Using the Small-World Model. [Citation Graph (0, 0)][DBLP]
    CIT, 2006, pp:60- [Conf]
  6. Mizuki Oka, Hiroshi Tsukada, Kazuhiko Kato
    Robin: Extracting Visual and Textual Features from Web Pages. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:765-771 [Conf]
  7. Kenji Kono, Kazuhiko Kato, Takashi Masuda
    An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management. [Citation Graph (0, 0)][DBLP]
    ECOOP, 1996, pp:295-315 [Conf]
  8. Yasushi Kiyoki, Kazuhiko Kato, Takashi Masuda
    A Relational-Database Machine Based on Functional Programming Concepts. [Citation Graph (0, 0)][DBLP]
    FJCC, 1986, pp:969-977 [Conf]
  9. Shigeru Chiba, Kazuhiko Kato, Takeshi Masuda
    Exploiting a Weak Consistency to Implement Distributed Tuple Space. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1992, pp:416-423 [Conf]
  10. Kazuhiko Kato, Takashi Masuda, Yasushi Kiyoki
    A Comprehension-Based Database Language and Its Distributed Execution. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1990, pp:442-449 [Conf]
  11. Kazuhiko Kato, Atsunobu Narita, Shigekazu Inohara, Takashi Masuda
    Distributed Shared Repository: A Unified Approach to Distribution and Persistency. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1993, pp:20-29 [Conf]
  12. Kenji Kono, Kazuhiko Kato, Takashi Masuda
    Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1994, pp:142-151 [Conf]
  13. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato, Kozo Itano
    Name-Level Approach for Egress Network Access Control. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:284-296 [Conf]
  14. Shigekazu Inohara, Kazuhiko Kato, Takashi Masuda
    "Unstable Threads" Kernel Interface for Minimizing the Overhead of Thread Switching. [Citation Graph (0, 0)][DBLP]
    IPPS, 1993, pp:149-155 [Conf]
  15. Hirotake Abe, Kazuhiko Kato
    Security Policy Descriptions Through the Use of Control Structure of a Target Program. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:242-261 [Conf]
  16. Kazuhiko Kato, Yoshihiro Oyama
    SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:112-132 [Conf]
  17. Kazuhiko Kato, Katsuya Matsubara, Yuuichi Someya, Kazumasa Itabashi, Yutaka Moriyama
    PLANET: An Open Mobile Object System for Open Network. [Citation Graph (0, 0)][DBLP]
    ASA/MA, 1999, pp:274-275 [Conf]
  18. Kazuhiko Kato
    Safe and Secure Execution Mechanisms for Mobile Objects. [Citation Graph (0, 0)][DBLP]
    Mobile Object Systems, 1996, pp:201-212 [Conf]
  19. Atsushi Ohori, Kazuhiko Kato
    Semantics for Communication Primitives in an Polymorphic Language. [Citation Graph (0, 0)][DBLP]
    POPL, 1993, pp:99-112 [Conf]
  20. Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato
    Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:223-237 [Conf]
  21. Péter Surányi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, Kazuhiko Kato
    General Virtual Hosting via Lightweight User-Level Virtualization. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:229-236 [Conf]
  22. Katsuya Matsubara, Takahiro Maekawa, Kazuhiko Kato
    Worldwide Component Scripting with the Planet Mobile Object System. [Citation Graph (0, 0)][DBLP]
    WWCA, 1998, pp:56-71 [Conf]
  23. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato
    Capability-Based Egress Network Access Control for Transferring Access Rights. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:488-495 [Conf]
  24. Kazumasa Itabashi, Katsuya Matsubara, Yutaka Moriyama, Yuuichi Someya, Kazuhiko Kato, Tatsuro Sekiguchi, Akinori Yonezawa
    Implementing an applet system without fixing virtual-machine designs. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2003, v:34, n:2, pp:32-42 [Journal]
  25. Kazuhiko Kato
    Persistently Cached B-Trees. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:3, pp:706-720 [Journal]
  26. Kazuhiko Kato, Yuuichi Someya, Katsuya Matsubara, Kunihiko Toumura, Hirotake Abe
    An Approach to Mobile Software Robots for the WWW. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1999, v:11, n:4, pp:526-548 [Journal]
  27. Kazuhiko Kato
    Modeling and Virtualization for Secure Computing Environments. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:196-197 [Conf]
  28. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato
    Capability-based egress network access control by using DNS server. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1275-1282 [Journal]

  29. Simple Certificateless Signature with Smart Cards. [Citation Graph (, )][DBLP]

  30. An Access Control Model for Web-Services That Supports Delegation and Creation of Authority. [Citation Graph (, )][DBLP]

  31. Scribble-a-Secret: Similarity-based password authentication using sketches. [Citation Graph (, )][DBLP]

  32. A Platform for Cooperative Server Backups Based on Virtual Machines. [Citation Graph (, )][DBLP]

  33. Protection and Recovery of Disk Encryption Key Using Smart Cards. [Citation Graph (, )][DBLP]

  34. Fast networking with socket-outsourcing in hosted virtual machine environments. [Citation Graph (, )][DBLP]

  35. Hypervisor-based prevention of persistent rootkits. [Citation Graph (, )][DBLP]

  36. CapaCon: access control mechanism for inter-device communications through TCP connections. [Citation Graph (, )][DBLP]

  37. Optimization of distributed communication in multiprotocol Tuple Space. [Citation Graph (, )][DBLP]

  38. BitVisor: a thin hypervisor for enforcing i/o device security. [Citation Graph (, )][DBLP]

  39. Efficient Anomaly Detection System for Mobile Handsets. [Citation Graph (, )][DBLP]

  40. A Two-Step Execution Mechanism for Thin Secure Hypervisors. [Citation Graph (, )][DBLP]

  41. Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. [Citation Graph (, )][DBLP]

Search in 0.007secs, Finished in 0.010secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002