Kazuhiko Kato
Kazuhiko Kato
Professor, Departmen of Computer Science, University of Tsukuba
Verified email at - Homepage
Cited by
Cited by
Bitvisor: a thin hypervisor for enforcing i/o device security
T Shinagawa, H Eiraku, K Tanimoto, K Omote, S Hasegawa, T Horie, ...
Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on …, 2009
Anomaly detection using layered networks based on eigen co-occurrence matrix
M Oka, Y Oyama, H Abe, K Kato
Recent Advances in Intrusion Detection: 7th International Symposium, RAID …, 2004
Software safety execution system
K Kato, Y Oyama
US Patent 7,690,023, 2010
Semantics for communication primitives in a polymorphic language
A Ohori, K Kato
Proceedings of the 20th ACM SIGPLAN-SIGACT symposium on Principles of …, 1993
Fast networking with socket-outsourcing in hosted virtual machine environments
H Eiraku, Y Shinjo, C Pu, Y Koh, K Kato
Proceedings of the 2009 ACM symposium on Applied Computing, 310-317, 2009
Softwarepot: An encapsulated transferable file system for secure software circulation
K Kato, Y Oyama
International Symposium on Software Security, 112-132, 2002
Power-saving in large-scale storage systems with data migration
K Hasebe, T Niwa, A Sugiki, K Kato
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
Extracting topics from weblogs through frequency segments
M Oka, H Abe, K Kato
Proc. of the Workshop on the Weblogging Ecosystem: Aggregation, Analysis and …, 2006
Subcutaneous injected chitosan induces systemic activation in dogs
S Minami, M Masuda, H Suzuki, Y Okamoto, A Matsuhashi, K Kato, ...
Carbohydrate polymers 33 (4), 285-294, 1997
Eigen co-occurrence matrix method for masquerade detection
M Oka, Y Oyama, K Kato
Publications of the Japan Society for Software Science and Technology, 2004
An approach to mobile software robots for the WWW
K Kato, Y Someya, K Matsubara, K Toumura, H Abe
IEEE Transactions on Knowledge and Data Engineering 11 (4), 526-548, 1999
Persistent caching: an implementation technique for complex objects with object identity
K Kato, T Masuda
IEEE Transactions on Software Engineering 18 (7), 631-645, 1992
Improving agility and elasticity in bare-metal clouds
Y Omote, T Shinagawa, K Kato
Proceedings of the Twentieth International Conference on Architectural …, 2015
Smart remote procedure calls: Transparent treatment of remote pointers
K Kono, K Kato, T Masuda
14th International Conference on Distributed Computing Systems, 142-151, 1994
Effect of chitin on nonwoven fabric implant in tendon healing
Y Okamoto, L Southwood, TS Stashak, RW Norrdin, AW Nelson, S Minami, ...
Carbohydrate polymers 33 (1), 33-38, 1997
Detecting malware signatures in a thin hypervisor
Y Oyama, TTD Giang, Y Chubachi, T Shinagawa, K Kato
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1807-1814, 2012
Hypervisor-based prevention of persistent rootkits
Y Chubachi, T Shinagawa, K Kato
Proceedings of the 2010 ACM Symposium on Applied Computing, 214-220, 2010
Sequential data examination method using Eigen co-occurrence matrix for masquerade detection
M Oka, K Kato
US Patent 7,698,740, 2010
A robot that can engage in both task-oriented and non-task-oriented dialogues
M Nakano, A Hoshino, J Takeuchi, Y Hasegawa, T Torii, K Nakadai, ...
2006 6th IEEE-RAS International Conference on Humanoid Robots, 404-411, 2006
An integrated computational infrastructure for a virtual Tokyo concepts and examples
SB Kraines, DR Wallace, Y Iwafune, Y Yoshida, T Aramaki, K Kato, ...
Journal of Industrial Ecology 5 (1), 35-54, 2001
The system can't perform the operation now. Try again later.
Articles 1–20