Hajime Tazaki

Orcid: 0000-0002-6524-2954

According to our database1, Hajime Tazaki authored at least 23 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
zpoline: a system call hook mechanism based on binary rewriting.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

Exit-Less, Isolated, and Shared Access for Virtual Machines.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2021
How to design a library OS for practical containers?
Proceedings of the VEE '21: 17th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2021

2018
Voice-Activated Applications and Multipath TCP: A Good Match?
Proceedings of the Network Traffic Measurement and Analysis Conference, 2018

Grafting sockets for fast container networking.
Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems, 2018

2017
/dev/stdpkt: A Service Chaining Architecture with Pipelined Operating System Instances in a Unix Shell.
Proceedings of the Asian Internet Engineering Conference, 2017

2014
DCE: Test the real code of your protocols and applications over simulated networks.
IEEE Commun. Mag., 2014

A Trusted Knowledge Management System for Multi-layer Threat Analysis.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

Demo abstract: realistic evaluation of kernel protocols and software defined wireless networks with DCE/ns-3.
Proceedings of the 17th ACM International Conference on Modeling, 2014

NECOMAtter: curating approach for sharing cyber threat information.
Proceedings of the International Conference of Future Internet 2014, 2014

MATATABI: Multi-layer Threat Analysis Platform with Hadoop.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits.
Proceedings of the Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2014

2013
DCE cradle: simulate network protocols with real stacks for better realism.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

MSWIM demo abstract: direct code execution: increase simulation realism using unmodified real implementations.
Proceedings of the MobiWac'13, 2013

Direct code execution: revisiting library OS architecture for reproducible network experiments.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
DNEmu: Design and Implementation of Distributed Network Emulation for Smooth Experimentation Control.
Proceedings of the Testbeds and Research Infrastructure. Development of Networks and Communities, 2012

Inter-AS Locator Allocation of Hierarchical Automatic Number Allocation in a 10, 000-AS Network.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Network mobility management in HIMALIS architecture of future networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Floating ground architecture: overcoming the one-hop boundary of current mobile internet.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2012

2011
NAT-MANEMO: Route Optimization for Unlimited Network Extensibility in MANEMO.
J. Inf. Process., 2011

2010
MANEMO Routing in Practice: Protocol Selection, Expected Performance, and Experimental Evaluation.
IEICE Trans. Commun., 2010

2009
Selecting an appropriate routing protocol for in-field MANEMO experiments.
Proceedings of the 6th ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2009

2008


  Loading...