Kazuhiko Kato

Orcid: 0000-0001-7143-6328

Affiliations:
  • University of Tsukuba, Japan


According to our database1, Kazuhiko Kato authored at least 89 papers between 1986 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Method for Promoting the Introduction of DevSecOps to Improve Security Quality.
Proceedings of the Advances in Networked-based Information Systems, 2023

Priority-MPTCP: A Novel Multipath Data Transfer Method for V2V Communication.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

2022
Analysis of Optimal File Placement for Energy-Efficient File-Sharing Cloud Storage System.
IEEE Trans. Sustain. Comput., 2022

NVKVS: Non-Volatile Memory Optimized Key-Value Separated LSM-Tree.
J. Inf. Process., 2022

2021
Live Migration in Bare-Metal Clouds.
IEEE Trans. Cloud Comput., 2021

Hadoop Data Reduction Framework: Applying Data Reduction at the DFS Layer.
IEEE Access, 2021

2020
Multi-tier Power-Saving Method in Cloud Storage Systems for Content Sharing Services.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2020

HDRF: Hadoop data reduction framework for hadoop distributed file system.
Proceedings of the APSys '20: 11th ACM SIGOPS Asia-Pacific Workshop on Systems, 2020

2019
Early Churn User Classification in Social Networking Service Using Attention-Based Long Short-Term Memory.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2019

Early Turnover Prediction of New Restaurant Employees from Their Attendance Records and Attributes.
Proceedings of the Database and Expert Systems Applications, 2019

Augmented Recreational Volleyball Court: Supporting the Beginners' Landing Position Prediction Skill by Providing Peripheral Visual Feedback.
Proceedings of the 10th Augmented Human International Conference 2019, 2019

2018
Fault Tolerance in the Traffic Management System of a Last-mile Transportation Service.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018

A Flexible Data Migration Strategy for Power Savings in Distributed Storage Systems.
Proceedings of the 7th International Conference on Smart Cities and Green ICT Systems, 2018

Unified hardware abstraction layer with device masquerade.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

2017
The unpredictable structure of risk chains using association rule mining.
Proceedings of the 18th IEEE/ACIS International Conference on Software Engineering, 2017

Deadlock Detection in the Scheduling of Last-Mile Transportation Using Model Checking.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

HayACK: Exploiting Characteristically Diverse Paths to Achieve Quick ACKing in MPTCP.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

BMCArmor: A Hardware Protection Scheme for Bare-Metal Clouds.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

2016
A Game Theoretic Approach to Power Reduction in Distributed Storage Systems.
J. Inf. Process., 2016

How the nature of web services drives vocabulary creation in social tagging.
CoRR, 2016

Model Checking of BPMN Models for Reconfigurable Workflows.
CoRR, 2016

Testing device drivers against hardware failures in real environments.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
Power-Saving in Storage Systems for Cloud Data Sharing Services with Data Access Prediction.
IEICE Trans. Inf. Syst., 2015

OS-Independent Live Migration Scheme for Bare-Metal Clouds.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Improving Agility and Elasticity in Bare-metal Clouds.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
Risk assessment quantification in life log service.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

A Study of Risk Assessment Quantification in Cloud Computing.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Using a Potential Game for Power Reduction in Distributed Storage Systems.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Highly Available Primary-Backup Mechanism for Internet Services with Optimistic Consensus.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Power-saving in storage systems for Internet hosting services with data access prediction.
Proceedings of the International Green Computing Conference, 2013

Cooperation, Congestion and Chaos in Concurrent Computation.
Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, 2013

2012
Transparent VPN failure recovery with virtualization.
Future Gener. Comput. Syst., 2012

Detecting malware signatures in a thin hypervisor.
Proceedings of the ACM Symposium on Applied Computing, 2012

Power-Aware Autonomous Distributed Storage Systems for Internet Hosting Service Platforms.
Proceedings of the Cloud Computing - Third International Conference, 2012

2011
An Extensible Cloud Platform Inspired by Operating Systems.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

Self-Stabilizing Passive Replication for Internet Service Platforms.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
Dynamic grid quorum: a reconfigurable grid quorum and its power optimization algorithm.
Serv. Oriented Comput. Appl., 2010

Practical and Secure Recovery of Disk Encryption Key Using Smart Cards.
IEICE Trans. Inf. Syst., 2010

CapaCon: access control mechanism for inter-device communications through TCP connections.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Hypervisor-based prevention of persistent rootkits.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Kumoi: A High-Level Scripting Environment for Collective Virtual Machines.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Using a Hypervisor to Migrate Running Operating Systems to Secure Virtual Machines.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Power-Saving in Large-Scale Storage Systems with Data Migration.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Name-Based Address Mapping for Virtual Private Networks.
IEICE Trans. Commun., 2009

BitVisor: a thin hypervisor for enforcing i/o device security.
Proceedings of the 5th International Conference on Virtual Execution Environments, 2009

Dynamic grid quorum: A novel approach for minimizing power consumption without data migration in grid quorums.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

A Two-Step Execution Mechanism for Thin Secure Hypervisors.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Fast networking with socket-outsourcing in hosted virtual machine environments.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Efficient Anomaly Detection System for Mobile Handsets.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Protection and Recovery of Disk Encryption Key Using Smart Cards.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A Platform for Cooperative Server Backups Based on Virtual Machines.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

Scribble-a-Secret: Similarity-based password authentication using sketches.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

An Access Control Model for Web-Services That Supports Delegation and Creation of Authority.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

Simple Certificateless Signature with Smart Cards.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Capability-based egress network access control by using DNS server.
J. Netw. Comput. Appl., 2007

Tour de Blog.
Proceedings of the First International Conference on Weblogs and Social Media, 2007

Modeling and Virtualization for Secure Computing Environments.
Proceedings of the Advances in Computer Science, 2007

2006
A Robot That Can Engage in Both Task-Oriented and Non-Task-Oriented Dialogues.
Proceedings of the 2006 6th IEEE-RAS International Conference on Humanoid Robots, 2006

Robin: Extracting Visual and Textual Features from Web Pages.
Proceedings of the Frontiers of WWW Research and Development, 2006

Sustor: Distributed Storage for Disaster Recovery Using the Small-World Model.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
General Virtual Hosting via Lightweight User-Level Virtualization.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

A chat information service system using a humanoid robot.
Proceedings of the IEEE International Workshop on Robot and Human Interactive Communication, 2005

Name-Level Approach for Egress Network Access Control.
Proceedings of the Networking, 2005

Capability-Based Egress Network Access Control for Transferring Access Rights.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

2004
Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

2003
Persistently Cached B-Trees.
IEEE Trans. Knowl. Data Eng., 2003

Implementing an applet system without fixing virtual-machine designs.
Syst. Comput. Jpn., 2003

Security Policy Descriptions Through the Use of Control Structure of a Target Program.
Proceedings of the Software Security, 2003

2002
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation.
Proceedings of the Software Security -- Theories and Systems, 2002

1999
An Approach to Mobile Software Robots for the WWW.
IEEE Trans. Knowl. Data Eng., 1999

PLANET: An Open Mobile Object System for Open Network.
Proceedings of the 1st International Symposium on Agent Systems and Applications / 3rd International Symposium on Mobile Agents (ASA/MA '99), 1999

1998
Worldwide Component Scripting with the Planet Mobile Object System.
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1998

1996
Safe and Secure Execution Mechanisms for Mobile Objects.
Proceedings of the Mobile Object Systems, 1996

An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management.
Proceedings of the ECOOP'96, 1996

1994
Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers.
Proceedings of the 14th International Conference on Distributed Computing Systems, 1994

1993
Semantics for Communication Primitives in an Polymorphic Language.
Proceedings of the Conference Record of the Twentieth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1993

"Unstable Threads" Kernel Interface for Minimizing the Overhead of Thread Switching.
Proceedings of the Seventh International Parallel Processing Symposium, 1993

Distributed Shared Repository: A Unified Approach to Distribution and Persistency.
Proceedings of the 13th International Conference on Distributed Computing Systems, 1993

1992
Persistent Caching: An Implementation Technique for Complex Objects with Object Identity.
IEEE Trans. Software Eng., 1992

Exploiting a Weak Consistency to Implement Distributed Tuple Space.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

1991
Optimization of distributed communication in multiprotocol Tuple Space.
Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing, 1991

The Software Architecture of a Parallel Processing System for Advanced Database Applications.
Proceedings of the Seventh International Conference on Data Engineering, 1991

A thread facility based on user/kernel cooperation in the XERO operating system.
Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, 1991

1990
A Comprehension-Based Database Language and Its Distributed Execution.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1990), May 28, 1990

1989
Implementation and Experiments of an Extensible Parallel Processing System Supporting User Defined Database Operations.
Proceedings of the International Symposium on Database Systems for Advanced Applications, 1989

1987
A Stream-Oriented Approach to Parallel Processing for Deductive Databases.
Proceedings of the Database Machines and Knowledge Base Machines, 1987

1986
A stream-oriented approach to distributed query processing in a local area network.
Proceedings of the 1986 ACM SIGSMALL/PC symposium on Small systems, 1986

A Relational-Database Machine Based on Functional Programming Concepts.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986


  Loading...