Ruo Ando

According to our database1, Ruo Ando authored at least 32 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An Experiment of Randomized Hints on an Axiom of Infinite-Valued Lukasiewicz Logic.
CoRR, 2022

An experiment of the complexity of sliding block puzzles by 2D heat flow in paramodulation.
CoRR, 2022

2021
Choice of parallelism: multi-GPU driven pipeline for huge academic backbone network.
Int. J. Parallel Emergent Distributed Syst., 2021

2020
A new perspective of paramodulation complexity by solving massive 8 puzzles.
CoRR, 2020

A Curious New Result of Resolution Strategies in Negation-Limited Inverters Problem.
CoRR, 2020

A constrained recursion algorithm for batch normalization of tree-sturctured LSTM.
CoRR, 2020

2019
A lock-free algorithm of tree-based reduction for large scale clustering on GPGPU.
Proceedings of the 2nd International Conference on Artificial Intelligence and Pattern Recognition, 2019

2018
End-to-end Congestion Relief and Physical Layer Security-Aware Routing Design for Ad Hoc Networks in IoT Applications.
J. Inf. Sci. Eng., 2018

Parallel Edge Contraction for Large Nonplanar Graph Clustering.
Proceedings of the 2018 2nd International Conference on Big Data and Internet of Things, 2018

2017
End-to-End Congestion Relief Routing Protocol for Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

2014
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

2012
Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Flaw and Configuration Analysis of Cloud Component Using First Order Logic.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Practical network traffic analysis in P2P environment.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Faster Log Analysis and Integration of Security Incidents Using Knuth-Bendix Completion.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation.
Proceedings of the Security Technology, 2011

2010
Blink: Large-scale P2P network monitoring and visualization system using VM introspection.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis.
Proceedings of the Neural Information Processing. Models and Applications, 2010

Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning.
Proceedings of the Neural Information Processing. Models and Applications, 2010

2009
Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server.
Proceedings of the 2009 International Conference on Complex, 2009

2008
An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Faster Parameter Detection of Polymorphic Viral Code Using Hot List Strategy.
Proceedings of the Advances in Neuro-Information Processing, 15th International Conference, 2008

Hardening Botnet by a Rational Botmaster.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Parallel analysis of polymorphic viral code using automated deduction system.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module.
Proceedings of the Information Security and Cryptology, 2007

2006
Centralized Security Policy Support for Virtual Machine.
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

2005
Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2003
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy.
Proceedings of the Computer Network Security, 2003


  Loading...