Kenji Kono
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [j18]Naohiro Aota, Kenji Kono:
File Systems are Hard to Test - Learning from Xfstests. IEICE Transactions 102-D(2): 269-279 (2019) - [c54]Takafumi Kubota, Yusuke Suzuki, Kenji Kono:
To unify or not to unify: a case study on unified builds (in WebKit). CC 2019: 42-52 - 2018
- [j17]Yusuke Suzuki, Hiroshi Yamada, Shinpei Kato, Kenji Kono:
Cooperative GPGPU Scheduling for Consolidating Server Workloads. IEICE Transactions 101-D(12): 3019-3037 (2018) - [c53]Sho Yuhara, Yusuke Suzuki, Kenji Kono:
An Application Framework for Migrating GPGPU Cloud Applications. CloudCom 2018: 62-66 - [c52]Kenta Ishiguro, Kenji Kono:
Hardening Hypervisors against Vulnerabilities in Instruction Emulators. EuroSec@EuroSys 2018: 7:1-7:6 - 2017
- [c51]Junya Ogasawara, Kenji Kono:
Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices. ACSAC 2017: 542-552 - [c50]Yusuke Suzuki, Hiroshi Yamada, Shinpei Kato, Kenji Kono:
GLoop: an event-driven runtime for consolidating GPGPU applications. SoCC 2017: 80-93 - 2016
- [j16]Takeshi Yoshimura, Kenji Kono:
A Case for Static Analysis of Linux to Find Faults in Interrupt Request Handlers. JIP 24(3): 573-582 (2016) - [j15]Gernot Heiser, Kenji Kono, KyoungSoo Park, Robbert van Renesse:
Report on the Asia-Pacific Systems Workshop 2015 (APSys'15). Operating Systems Review 50(1): 1-2 (2016) - [j14]Yusuke Suzuki, Shinpei Kato, Hiroshi Yamada, Kenji Kono:
GPUvm: GPU Virtualization at the Hypervisor. IEEE Trans. Computers 65(9): 2752-2766 (2016) - [c49]Asraa Abdulrazak Ali Mardan, Kenji Kono:
Containers or Hypervisors: Which Is Better for Database Consolidation? CloudCom 2016: 564-571 - 2015
- [j13]Yusuke Takamatsu, Kenji Kono:
Detection of Visual Clickjacking Vulnerabilities in Incomplete Defenses. JIP 23(4): 513-524 (2015) - [e1]Kenji Kono, Takahiro Shinagawa:
Proceedings of the 6th Asia-Pacific Workshop on Systems, APSys 2015, Tokyo, Japan, July 27-28, 2015. ACM 2015, ISBN 978-1-4503-3554-6 [contents] - 2014
- [j12]Hiroshi Yamada, Shuntaro Tonosaki, Kenji Kono:
Efficient Update Activation for Virtual Machines in IaaS Cloud Computing Environments. IEICE Transactions 97-D(3): 469-479 (2014) - [j11]Hiroshi Yamada, Kenji Kono:
A VMM-Level Approach to Shortening Downtime of Operating Systems Reboots in Software Updates. IEICE Transactions 97-D(10): 2663-2675 (2014) - [c48]Hikaru Horie, Masato Asahara, Hiroshi Yamada, Kenji Kono:
Minimizing WAN Communications in Inter-datacenter Key-Value Stores. IEEE CLOUD 2014: 490-497 - [c47]Akane Koto, Kenji Kono, Hiroshi Yamada:
A Guideline for Selecting Live Migration Policies and Implementations in Clouds. CloudCom 2014: 226-233 - [c46]Takeshi Yoshimura, Kenji Kono:
Who Writes What Checkers? - Learning from Bug Repositories. HotDep 2014 - [c45]Nobuo Kikuchi, Takeshi Yoshimura, Ryo Sakuma, Kenji Kono:
Do Injected Faults Cause Real Failures? A Case Study of Linux. ISSRE Workshops 2014: 174-179 - [c44]Kenji Kono, Shunsuke Miyahara, Hiroshi Yamada, Takeshi Yoshimura:
FoxyFeed: Forging Device-Level Asynchronous Events for Kernel Development. PRDC 2014: 145-154 - [c43]Yusuke Takamatsu, Kenji Kono:
Clickjuggler: Checking for incomplete defenses against clickjacking. PST 2014: 224-231 - [c42]Yusuke Suzuki, Shinpei Kato, Hiroshi Yamada, Kenji Kono:
GPUvm: Why Not Virtualizing GPUs at the Hypervisor? USENIX Annual Technical Conference 2014: 109-120 - 2013
- [j10]Hiroki Shirayanagi, Hiroshi Yamada, Kenji Kono:
Honeyguide: A VM Migration-Aware Network Topology for Saving Energy Consumption in Data Center Networks. IEICE Transactions 96-D(9): 2055-2064 (2013) - [c41]Hiroshi Yamada, Takumi Sakamoto, Hikaru Horie, Kenji Kono:
Request dispatching for cheap energy prices in cloud data centers. CLOUDNET 2013: 210-213 - [c40]Hikaru Horie, Masato Asahara, Hiroshi Yamada, Kenji Kono:
Pangaea: A Single Key Space, Inter-datacenter Key-Value Store. ICPADS 2013: 434-435 - [c39]Hiroshi Yamada, Kenji Kono:
Traveling forward in time to newer operating systems using ShadowReboot. VEE 2013: 121-130 - 2012
- [c38]Takumi Sakamoto, Hiroshi Yamada, Hikaru Horie, Kenji Kono:
Energy-Price-Driven Request Dispatching for Cloud Data Centers. IEEE CLOUD 2012: 974-976 - [c37]Akane Koto, Hiroshi Yamada, Kei Ohmura, Kenji Kono:
Towards unobtrusive VM live migration for cloud computing platforms. APSys 2012: 7 - [c36]
- [c35]Hiroki Shirayanagi, Hiroshi Yamada, Kenji Kono:
Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks. ISCC 2012: 460-467 - [c34]Yusuke Takamatsu, Yuji Kosuga, Kenji Kono:
Automated detection of session management vulnerabilities in web applications. PST 2012: 112-119 - 2011
- [j9]Takahisa Kitagawa, Miyuki Hanaoka, Kenji Kono:
A State-Aware Protocol Fuzzer Based on Application-Layer Protocols. IEICE Transactions 94-D(5): 1008-1017 (2011) - [c33]Hiroshi Yamada, Kenji Kono:
Traveling forward in time to newer operating systems using ShadowReboot. APSys 2011: 12 - [c32]Shuntaro Tonosaki, Hiroshi Yamada, Kenji Kono:
Efficiently Synchronizing Virtual Machines in Cloud Computing Environments. CloudCom 2011: 154-162 - [c31]Kazuya Yamakita, Hiroshi Yamada, Kenji Kono:
Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery. DSN 2011: 169-180 - [c30]Satoshi Iwata, Kenji Kono:
Clustering performance anomalies in web applications based on root causes. ICAC 2011: 221-224 - [c29]Takeshi Yoshimura, Hiroshi Yamada, Kenji Kono:
Can Linux be Rejuvenated without Reboots? WoSAR@ISSRE 2011: 50-55 - 2010
- [j8]Masato Asahara, Kenji Kono, Toshinori Kojima, Ai Hayakawa:
P2P-Based Approach to Finding Replica Server Locations for Alleviating Flash Crowds. IEICE Transactions 93-D(11): 3027-3037 (2010) - [c28]Satoshi Iwata, Kenji Kono:
Narrowing Down Possible Causes of Performance Anomaly in Web Applications. EDCC 2010: 185-190 - [c27]Takahisa Kitagawa, Miyuki Hanaoka, Kenji Kono:
AspFuzz: A state-aware protocol fuzzer based on application-layer protocols. ISCC 2010: 202-208 - [c26]Yusuke Takamatsu, Yuji Kosuga, Kenji Kono:
Automated detection of session fixation vulnerabilities. WWW 2010: 1191-1192
2000 – 2009
- 2009
- [j7]Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono, Takahiro Shinagawa:
Reducing Security Policy Size for Internet Servers in Secure Operating Systems. IEICE Transactions 92-D(11): 2196-2206 (2009) - [c25]Miyuki Hanaoka, Kenji Kono, Toshio Hirotsu:
Performance Improvement by Means of Collaboration between Network Intrusion Detection Systems. CNSR 2009: 262-269 - [c24]Makoto Shimamura, Kenji Kono:
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. DIMVA 2009: 68-87 - [c23]Ai Hayakawa, Masato Asahara, Kenji Kono, Toshinori Kojima:
Efficient Update Propagation by Speculating Replica Locations on Peer-to-Peer Networks. ICPADS 2009: 422-431 - [c22]Toshinori Kojima, Masato Asahara, Kenji Kono, Ai Hayakawa:
Embedding Network Coordinates into the Heart of Distributed Hash Tables. Peer-to-Peer Computing 2009: 155-158 - [c21]Toshihiro Yokoyama, Miyuki Hanaoka, Makoto Shimamura, Kenji Kono:
Simplifying security policy descriptions for internet servers in secure operating systems. SAC 2009: 326-333 - [c20]Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130 - 2008
- [j6]Makoto Shimamura, Miyuki Hanaoka, Kenji Kono:
Filtering False Positives Based on Server-Side Behaviors. IEICE Transactions 91-D(2): 264-276 (2008) - [j5]Akiyoshi Sugiki, Kenji Kono, Hideya Iwasaki:
Tuning mechanisms for two major parameters of Apache web servers. Softw., Pract. Exper. 38(12): 1215-1240 (2008) - [c19]Yoshihisa Abe, Hiroshi Yamada, Kenji Kono:
Enforcing appropriate process execution for exploiting idle resources from outside operating systems. EuroSys 2008: 27-40 - [c18]A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono:
FlexBox: Sandboxing internet servers based on layer-7 contexts. ISCC 2008: 386-391 - 2007
- [j4]Miyuki Hanaoka, Makoto Shimamura, Kenji Kono:
TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems. IEICE Transactions 90-D(12): 2019-2032 (2007) - [c17]Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hishiyama, Yu Takahama:
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. ACSAC 2007: 107-117 - [c16]Masato Asahara, Akio Shimada, Hiroshi Yamada, Kenji Kono:
Finding candidate spots for replica servers based on demand fluctuation. ICPADS 2007: 1-10 - [c15]Miyuki Hanaoka, Kenji Kono, Makoto Shimamura, Satoshi Yamaguchi:
An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection/Prevention Systems. ISCC 2007: 79-86 - [c14]Hiroshi Yamada, Kenji Kono:
FoxyTechnique: tricking operating system policies with a virtual machine monitor. VEE 2007: 55-64 - 2006
- [j3]Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda:
Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation. Systems and Computers in Japan 37(8): 24-37 (2006) - [c13]Makoto Shimamura, Kenji Kono:
Using Attack Information to Reduce False Positives in Network IDS. ISCC 2006: 386-393 - [c12]Hiroshi Yamada, Kenji Kono:
User-level disk-bandwidth control for resource-borrowing network applications. NOMS 2006 - 2005
- [j2]Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda:
Exploiting mobile code for user-transparent distribution of application-level protocols. Systems and Computers in Japan 36(1): 44-57 (2005) - [c11]Akiyoshi Sugiki, Kenji Kono, Hideya Iwasaki:
A Practical Approach to Automatic Parameter-Tuning of Web Servers. ASIAN 2005: 146-159 - 2004
- [j1]Kôki Abe, Takamichi Tateoka, Mitsugu Suzuki, Youichi Maeda, Kenji Kono, Tan Watanabe:
An integrated laboratory for processor organization, compiler design, and computer networking. IEEE Trans. Education 47(3): 311-320 (2004) - [c10]Takahiro Shinagawa, Kenji Kono:
Implementing a secure setuid program. Parallel and Distributed Computing and Networks 2004: 301-309 - 2003
- [c9]Wataru Kaneko, Kenji Kono, Kentaro Shimizu:
Preemptive Resource Management: Defending against Resource Monopolizing DoS. Applied Informatics 2003: 662-669 - [c8]Masakuni Agetsuma, Kenji Kono, Hideya Iwasaki, Takashi Masuda:
Self-configurable Mirror Servers for Automatic Adaptation to Service Demand Fluctuation. ASIAN 2003: 18-32 - 2002
- [c7]Takahiro Shinagawa, Kenji Kono, Takashi Masuda:
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. ISSS 2002: 172-184 - [c6]Takamichi Tateoka, Mitsugu Suzuki, Kenji Kono, Youichi Maeda, Kôki Abe:
An integrated laboratory for computer architecture and networking. WCAE 2002: 21 - 2001
- [c5]Takeshi Morimoto, Kenji Kono, Ikuo Takeuchi:
YabAI: The First Rescue Simulation League Champion. RoboCup 2001: 49-59 - 2000
- [c4]Kenji Kono, Takashi Masuda:
Efficient RMI: Dynamic Specialization of Object Serialization. ICDCS 2000: 308-315
1990 – 1999
- 1999
- [c3]Masahiko Takahashi, Kenji Kono, Takashi Masuda:
Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. ICDCS 1999: 64-73 - 1996
- [c2]Kenji Kono, Kazuhiko Kato, Takashi Masuda:
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management. ECOOP 1996: 295-315 - 1994
- [c1]Kenji Kono, Kazuhiko Kato, Takashi Masuda:
Smart Remote Procedure Calls: Transparent Treatment of Remote Pointers. ICDCS 1994: 142-151
Coauthor Index
last updated on 2019-02-20 21:49 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint