default search action
Kazuhiko Kato
Person information
- affiliation: University of Tsukuba, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c72]Junya Yamamoto, Hirotake Abe, Kenta Yamasawa, Kazuhiko Kato:
Priority-MPTCP: A Novel Multipath Data Transfer Method for V2V Communication. CANDARW 2023: 348-352 - [c71]Shigeaki Tanimoto, Yusuke Okuwaki, Kazuhiko Kato, Tsutomu Kounosu, Hironori Takuma, Masao Toyama:
Method for Promoting the Introduction of DevSecOps to Improve Security Quality. NBiS 2023: 361-370 - 2022
- [j16]Ryan Nathanael Soenjoto Widodo, Hiroki Ohtsuji, Erika Hayashi, Eiji Yoshida, Hirotake Abe, Kazuhiko Kato:
NVKVS: Non-Volatile Memory Optimized Key-Value Separated LSM-Tree. J. Inf. Process. 30: 332-342 (2022) - [j15]Fumio Machida, Koji Hasebe, Hirotake Abe, Kazuhiko Kato:
Analysis of Optimal File Placement for Energy-Efficient File-Sharing Cloud Storage System. IEEE Trans. Sustain. Comput. 7(1): 75-86 (2022) - 2021
- [j14]Ryan Nathanael Soenjoto Widodo, Hirotake Abe, Kazuhiko Kato:
Hadoop Data Reduction Framework: Applying Data Reduction at the DFS Layer. IEEE Access 9: 152704-152717 (2021) - [j13]Takaaki Fukai, Takahiro Shinagawa, Kazuhiko Kato:
Live Migration in Bare-Metal Clouds. IEEE Trans. Cloud Comput. 9(1): 226-239 (2021) - 2020
- [c70]Ryan Nathanael, Soenjoto Widodo, Hirotake Abe, Kazuhiko Kato:
HDRF: Hadoop data reduction framework for hadoop distributed file system. APSys 2020: 122-129 - [c69]Horleang Choeng, Koji Hasebe, Hirotake Abe, Kazuhiko Kato:
Multi-tier Power-Saving Method in Cloud Storage Systems for Content Sharing Services. GECON 2020: 142-154
2010 – 2019
- 2019
- [c68]Koya Sato, Yuji Sano, Mai Otsuki, Mizuki Oka, Kazuhiko Kato:
Augmented Recreational Volleyball Court: Supporting the Beginners' Landing Position Prediction Skill by Providing Peripheral Visual Feedback. AH 2019: 15:1-15:9 - [c67]Koya Sato, Mizuki Oka, Kazuhiko Kato:
Early Turnover Prediction of New Restaurant Employees from Their Attendance Records and Attributes. DEXA (1) 2019: 277-286 - [c66]Koya Sato, Mizuki Oka, Kazuhiko Kato:
Early Churn User Classification in Social Networking Service Using Attention-Based Long Short-Term Memory. PAKDD (Workshops) 2019: 45-56 - 2018
- [c65]Iori Yoneji, Takaaki Fukai, Takahiro Shinagawa, Kazuhiko Kato:
Unified hardware abstraction layer with device masquerade. SAC 2018: 1102-1108 - [c64]Koji Hasebe, Sho Takai, Kazuhiko Kato:
A Flexible Data Migration Strategy for Power Savings in Distributed Storage Systems. SMARTGREENS 2018: 352-357 - [c63]Koji Hasebe, Shohei Sasaki, Kazuhiko Kato:
Fault Tolerance in the Traffic Management System of a Last-mile Transportation Service. VEHITS 2018: 552-557 - 2017
- [c62]Takaaki Fukai, Satoru Takekoshi, Kohei Azuma, Takahiro Shinagawa, Kazuhiko Kato:
BMCArmor: A Hardware Protection Scheme for Bare-Metal Clouds. CloudCom 2017: 322-330 - [c61]Yusuke Morikoshi, Hirotake Abe, Kazuhiko Kato:
HayACK: Exploiting Characteristically Diverse Paths to Achieve Quick ACKing in MPTCP. CloudCom 2017: 383-390 - [c60]Koji Hasebe, Mitsuaki Tsuji, Kazuhiko Kato:
Deadlock Detection in the Scheduling of Last-Mile Transportation Using Model Checking. DASC/PiCom/DataCom/CyberSciTech 2017: 423-430 - [c59]Yusuke Makino, Kazuhiko Kato, Shigeaki Tanimoto:
The unpredictable structure of risk chains using association rule mining. SNPD 2017: 507-511 - 2016
- [j12]Koji Hasebe, Takumi Sawada, Kazuhiko Kato:
A Game Theoretic Approach to Power Reduction in Distributed Storage Systems. J. Inf. Process. 24(1): 173-181 (2016) - [c58]Satoru Takekoshi, Takahiro Shinagawa, Kazuhiko Kato:
Testing device drivers against hardware failures in real environments. SAC 2016: 1858-1864 - [i2]Koya Sato, Mizuki Oka, Yasuhiro Hashimoto, Takashi Ikegami, Kazuhiko Kato:
How the nature of web services drives vocabulary creation in social tagging. CoRR abs/1604.07993 (2016) - [i1]Juan Carlos Polanco Aguilar, Koji Hasebe, Manuel Mazzara, Kazuhiko Kato:
Model Checking of BPMN Models for Reconfigurable Workflows. CoRR abs/1607.00478 (2016) - 2015
- [j11]Koji Hasebe, Jumpei Okoshi, Kazuhiko Kato:
Power-Saving in Storage Systems for Cloud Data Sharing Services with Data Access Prediction. IEICE Trans. Inf. Syst. 98-D(10): 1744-1754 (2015) - [c57]Yushi Omote, Takahiro Shinagawa, Kazuhiko Kato:
Improving Agility and Elasticity in Bare-metal Clouds. ASPLOS 2015: 145-159 - [c56]Takaaki Fukai, Yushi Omote, Takahiro Shinagawa, Kazuhiko Kato:
OS-Independent Live Migration Scheme for Bare-Metal Clouds. UCC 2015: 80-89 - 2014
- [c55]Koji Hasebe, Naofumi Nishita, Kazuhiko Kato:
Highly Available Primary-Backup Mechanism for Internet Services with Optimistic Consensus. IC2E 2014: 410-416 - [c54]Koji Hasebe, Takumi Sawada, Kazuhiko Kato:
Using a Potential Game for Power Reduction in Distributed Storage Systems. IC2E 2014: 550-555 - [c53]Shigeaki Tanimoto, Ryota Sato, Kazuhiko Kato, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
A Study of Risk Assessment Quantification in Cloud Computing. NBiS 2014: 426-431 - [c52]Shigeaki Tanimoto, Ken Takahashi, Taro Yabuki, Kazuhiko Kato, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai:
Risk assessment quantification in life log service. SNPD 2014: 1-6 - 2013
- [c51]Mizuki Oka, Takashi Ikegami, Alexander Woodward, Yiqing Zhu, Kazuhiko Kato:
Cooperation, Congestion and Chaos in Concurrent Computation. ECAL 2013: 498-504 - [c50]Jumpei Okoshi, Koji Hasebe, Kazuhiko Kato:
Power-saving in storage systems for Internet hosting services with data access prediction. IGCC 2013: 1-10 - 2012
- [j10]Yohei Matsuhashi, Takahiro Shinagawa, Yoshiaki Ishii, Nobuyuki Hirooka, Kazuhiko Kato:
Transparent VPN failure recovery with virtualization. Future Gener. Comput. Syst. 28(1): 78-84 (2012) - [c49]Jumpei Okoshi, Koji Hasebe, Kazuhiko Kato:
Power-Aware Autonomous Distributed Storage Systems for Internet Hosting Service Platforms. CloudComp 2012: 52-61 - [c48]Yoshihiro Oyama, Tran Truong Duc Giang, Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato:
Detecting malware signatures in a thin hypervisor. SAC 2012: 1807-1814 - 2011
- [c47]Koji Hasebe, Kei Yamatozaki, Akiyoshi Sugiki, Kazuhiko Kato:
Self-Stabilizing Passive Replication for Internet Service Platforms. NTMS 2011: 1-6 - [c46]Akiyoshi Sugiki, Kazuhiko Kato:
An Extensible Cloud Platform Inspired by Operating Systems. UCC 2011: 306-311 - 2010
- [j9]Kazumasa Omote, Kazuhiko Kato:
Practical and Secure Recovery of Disk Encryption Key Using Smart Cards. IEICE Trans. Inf. Syst. 93-D(5): 1080-1086 (2010) - [j8]Munetoshi Ishikawa, Koji Hasebe, Akiyoshi Sugiki, Kazuhiko Kato:
Dynamic grid quorum: a reconfigurable grid quorum and its power optimization algorithm. Serv. Oriented Comput. Appl. 4(4): 245-260 (2010) - [c45]Koji Hasebe, Tatsuya Niwa, Akiyoshi Sugiki, Kazuhiko Kato:
Power-Saving in Large-Scale Storage Systems with Data Migration. CloudCom 2010: 266-273 - [c44]Tsutomu Nomoto, Yoshihiro Oyama, Hideki Eiraku, Takahiro Shinagawa, Kazuhiko Kato:
Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines. COMPSAC 2010: 37-46 - [c43]Akiyoshi Sugiki, Kazuhiko Kato, Yoshiaki Ishii, Hiroki Taniguchi, Nobuyuki Hirooka:
Kumoi: A High-Level Scripting Environment for Collective Virtual Machines. ICPADS 2010: 322-329 - [c42]Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato:
Hypervisor-based prevention of persistent rootkits. SAC 2010: 214-220 - [c41]Mitsuhiro Mabuchi, Yasushi Shinjo, Koji Hasebe, Akira Sato, Kazuhiko Kato:
CapaCon: access control mechanism for inter-device communications through TCP connections. SAC 2010: 706-712
2000 – 2009
- 2009
- [j7]Péter Surányi, Yasushi Shinjo, Kazuhiko Kato:
Name-Based Address Mapping for Virtual Private Networks. IEICE Trans. Commun. 92-B(1): 200-208 (2009) - [c40]Hideki Eiraku, Yasushi Shinjo, Calton Pu, Younggyun Koh, Kazuhiko Kato:
Fast networking with socket-outsourcing in hosted virtual machine environments. SAC 2009: 310-317 - [c39]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
A Two-Step Execution Mechanism for Thin Secure Hypervisors. SECURWARE 2009: 129-135 - [c38]Munetoshi Ishikawa, Koji Hasebe, Akiyoshi Sugiki, Kazuhiko Kato:
Dynamic grid quorum: A novel approach for minimizing power consumption without data migration in grid quorums. SOCA 2009: 1-8 - [c37]Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130 - 2008
- [c36]Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi:
Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers. APSCC 2008: 1225-1230 - [c35]Kazumasa Omote, Atsuko Miyaji, Kazuhiko Kato:
Simple Certificateless Signature with Smart Cards. EUC (2) 2008: 431-436 - [c34]Mitsuhiro Mabuchi, Yasushi Shinjo, Akira Sato, Kazuhiko Kato:
An Access Control Model for Web-Services That Supports Delegation and Creation of Authority. ICN 2008: 213-222 - [c33]Mizuki Oka, Kazuhiko Kato, Yingqing Xu, Lin Liang, Fang Wen:
Scribble-a-Secret: Similarity-based password authentication using sketches. ICPR 2008: 1-4 - [c32]Akiyoshi Sugiki, Kei Yamatozaki, Richard Potter, Kazuhiko Kato:
A Platform for Cooperative Server Backups Based on Virtual Machines. ISAS 2008: 129-141 - [c31]Kazumasa Omote, Kazuhiko Kato:
Protection and Recovery of Disk Encryption Key Using Smart Cards. ITNG 2008: 106-111 - [c30]Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa, Kazuhiko Kato:
Efficient Anomaly Detection System for Mobile Handsets. SECURWARE 2008: 154-160 - 2007
- [j6]Mizuki Oka, Kazuhiko Kato:
Anomaly Detection Using Integration Model of Vector Space and Network Representation. Inf. Media Technol. 2(3): 762-772 (2007) - [j5]Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:
Capability-based egress network access control by using DNS server. J. Netw. Comput. Appl. 30(4): 1275-1282 (2007) - [c29]Kazuhiko Kato:
Modeling and Virtualization for Secure Computing Environments. ASIAN 2007: 196-197 - [c28]Atsushi Hoshino, Mizuki Oka, Kazuhiko Kato:
Tour de Blog. ICWSM 2007 - 2006
- [c27]Hirotake Abe, Kazuhiko Kato:
Sustor: Distributed Storage for Disaster Recovery Using the Small-World Model. CIT 2006: 60 - [c26]Mizuki Oka, Hiroshi Tsukada, Kazuhiko Kato:
Robin: Extracting Visual and Textual Features from Web Pages. APWeb 2006: 765-771 - [c25]Mikio Nakano, Atsushi Hoshino, Johane Takeuchi, Yuji Hasegawa, Toyotaka Torii, Kazuhiro Nakadai, Kazuhiko Kato, Hiroshi Tsujino:
A Robot That Can Engage in Both Task-Oriented and Non-Task-Oriented Dialogues. Humanoids 2006: 404-411 - 2005
- [c24]Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:
Capability-Based Egress Network Access Control for Transferring Access Rights. ICITA (2) 2005: 488-495 - [c23]Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato, Kozo Itano:
Name-Level Approach for Egress Network Access Control. ICN (2) 2005: 284-296 - [c22]Atsushi Hoshino, Kazuhiko Kato, Johane Takeuchi, Hiroshi Tsujino:
A chat information service system using a humanoid robot. RO-MAN 2005: 468-473 - [c21]Péter Surányi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, Kazuhiko Kato:
General Virtual Hosting via Lightweight User-Level Virtualization. SAINT 2005: 229-236 - 2004
- [c20]Mizuki Oka, Yoshihiro Oyama, Hirotake Abe, Kazuhiko Kato:
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. RAID 2004: 223-237 - 2003
- [j4]Kazumasa Itabashi, Katsuya Matsubara, Yutaka Moriyama, Yuuichi Someya, Kazuhiko Kato, Tatsurou Sekiguchi, Akinori Yonezawa:
Implementing an applet system without fixing virtual-machine designs. Syst. Comput. Jpn. 34(2): 32-42 (2003) - [j3]Kazuhiko Kato:
Persistently Cached B-Trees. IEEE Trans. Knowl. Data Eng. 15(3): 706-720 (2003) - [c19]Hirotake Abe, Kazuhiko Kato:
Security Policy Descriptions Through the Use of Control Structure of a Target Program. ISSS 2003: 242-261 - 2002
- [c18]Kazuhiko Kato, Yoshihiro Oyama:
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation. ISSS 2002: 112-132
1990 – 1999
- 1999
- [j2]Kazuhiko Kato, Yuuichi Someya, Katsuya Matsubara, Kunihiko Toumura, Hirotake Abe:
An Approach to Mobile Software Robots for the WWW. IEEE Trans. Knowl. Data Eng. 11(4): 526-548 (1999) - [c17]Kazuhiko Kato, Katsuya Matsubara, Yuuichi Someya, Kazumasa Itabashi, Yutaka Moriyama:
PLANET: An Open Mobile Object System for Open Network. ASA/MA 1999: 274-275 - 1998
- [c16]Katsuya Matsubara, Takahiro Maekawa, Kazuhiko Kato:
Worldwide Component Scripting with the Planet Mobile Object System. WWCA 1998: 56-71 - 1996
- [c15]Kenji Kono, Kazuhiko Kato, Takashi Masuda:
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management. ECOOP 1996: 295-315 - [c14]Kazuhiko Kato:
Safe and Secure Execution Mechanisms for Mobile Objects. Mobile Object Systems 1996: 201-212 - 1994
- [c13]Kenji Kono, Kazuhiko Kato, Takashi Masuda:
Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers. ICDCS 1994: 142-151 - 1993
- [c12]Kazuhiko Kato, Atsunobu Narita, Shigekazu Inohara, Takashi Masuda:
Distributed Shared Repository: A Unified Approach to Distribution and Persistency. ICDCS 1993: 20-29 - [c11]Shigekazu Inohara, Kazuhiko Kato, Takashi Masuda:
"Unstable Threads" Kernel Interface for Minimizing the Overhead of Thread Switching. IPPS 1993: 149-155 - [c10]Atsushi Ohori, Kazuhiko Kato:
Semantics for Communication Primitives in an Polymorphic Language. POPL 1993: 99-112 - 1992
- [j1]Kazuhiko Kato, Takashi Masuda:
Persistent Caching: An Implementation Technique for Complex Objects with Object Identity. IEEE Trans. Software Eng. 18(7): 631-645 (1992) - [c9]Shigeru Chiba, Kazuhiko Kato, Takeshi Masuda:
Exploiting a Weak Consistency to Implement Distributed Tuple Space. ICDCS 1992: 416-423 - 1991
- [c8]Shigekazu Inohara, Kazuhiko Kato, Atsunobu Narita, Takashi Masuda:
A thread facility based on user/kernel cooperation in the XERO operating system. COMPSAC 1991: 398-405 - [c7]Yasushi Kiyoki, Takahiro Kurosawa, Kazuhiko Kato, Takashi Masuda:
The Software Architecture of a Parallel Processing System for Advanced Database Applications. ICDE 1991: 220-229 - [c6]Shigeru Chiba, Kazuhiko Kato, Takashi Masuda:
Optimization of distributed communication in multiprotocol Tuple Space. SPDP 1991: 282-285 - 1990
- [c5]Kazuhiko Kato, Takashi Masuda, Yasushi Kiyoki:
A Comprehension-Based Database Language and Its Distributed Execution. ICDCS 1990: 442-449
1980 – 1989
- 1989
- [c4]Yasushi Kiyoki, Takahiro Kurosawa, Peng Liu, Kazuhiko Kato, Takashi Masuda:
Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations. DASFAA 1989: 266-273 - 1987
- [c3]Yasushi Kiyoki, Kazuhiko Kato, Nobori Yamaguchi, Takashi Masuda:
A Stream-Oriented Approach to Parallel Processing for Deductive Databases. IWDM 1987: 475-488 - 1986
- [c2]Yasushi Kiyoki, Kazuhiko Kato, Takashi Masuda:
A Relational-Database Machine Based on Functional Programming Concepts. FJCC 1986: 969-977 - [c1]Yasushi Kiyoki, Kazuhiko Kato, Takashi Masuda:
A stream-oriented approach to distributed query processing in a local area network. SIGSMALL 1986: 146-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 22:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint