


default search action
Ruo Ando
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i6]Ruo Ando, Yoshiyasu Takefuji:
An experiment of the complexity of sliding block puzzles by 2D heat flow in paramodulation. CoRR abs/2201.03301 (2022) - [i5]Ruo Ando, Yoshiyasu Takefuji:
An Experiment of Randomized Hints on an Axiom of Infinite-Valued Lukasiewicz Logic. CoRR abs/2204.08512 (2022) - 2021
- [j3]Ruo Ando, Youki Kadobayashi, Hiroki Takakura:
Choice of parallelism: multi-GPU driven pipeline for huge academic backbone network. Int. J. Parallel Emergent Distributed Syst. 36(6): 609-622 (2021) - [i4]Ruo Ando, Youki Kadobayashi, Hiroki Takakura:
Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic Backbone Network. CoRR abs/2106.12863 (2021) - 2020
- [i3]Ruo Ando, Yoshiyasu Takefuji:
A constrained recursion algorithm for batch normalization of tree-sturctured LSTM. CoRR abs/2008.09409 (2020) - [i2]Ruo Ando, Yoshiyasu Takefuji:
A Curious New Result of Resolution Strategies in Negation-Limited Inverters Problem. CoRR abs/2011.00775 (2020) - [i1]Ruo Ando, Yoshiyasu Takefuji:
A new perspective of paramodulation complexity by solving massive 8 puzzles. CoRR abs/2012.08231 (2020)
2010 – 2019
- 2019
- [c24]Ruo Ando:
A lock-free algorithm of tree-based reduction for large scale clustering on GPGPU. AIPR 2019: 129-133 - 2018
- [j2]Yang Xu, Jia Liu, Ruo Ando, Norio Shiratori:
End-to-end Congestion Relief and Physical Layer Security-Aware Routing Design for Ad Hoc Networks in IoT Applications. J. Inf. Sci. Eng. 34(4): 1015-1030 (2018) - [c23]Ruo Ando:
Parallel Edge Contraction for Large Nonplanar Graph Clustering. BDIOT 2018: 61-64 - 2017
- [c22]Jia Liu, Yang Xu, Ruo Ando, Hiroki Takakura, Yifei Xu:
Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks. NaNA 2017: 80-86 - [c21]Yang Xu, Jia Liu, Ruo Ando, Norio Shiratori:
End-to-End Congestion Relief Routing Protocol for Ad Hoc Networks. NaNA 2017: 87-92 - 2014
- [c20]Yuuki Takano, Satoshi Ohta, Takeshi Takahashi
, Ruo Ando, Tomoya Inoue:
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. PST 2014: 48-56 - 2012
- [j1]Ruo Ando, Kazushi Takahashi, Kuniyasu Suzaki:
Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 120-137 (2012) - [c19]Ruo Ando:
Flaw and Configuration Analysis of Cloud Component Using First Order Logic. AsiaJCIS 2012: 104-108 - 2011
- [c18]Ruo Ando, Kuniyasu Suzaki:
A Lightweight Access Log Filter of Windows OS Using Simple Debug Register Manipulation. FGIT-SecTech 2011: 215-227 - [c17]Ruo Ando, Shinsuke Miwa
:
Faster Log Analysis and Integration of Security Incidents Using Knuth-Bendix Completion. ICONIP (2) 2011: 28-36 - [c16]Tao Ban, Shanqing Guo, Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Practical network traffic analysis in P2P environment. IWCMC 2011: 1801-1807 - [c15]Gregory Blanc
, Ruo Ando, Youki Kadobayashi:
Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection. NTMS 2011: 1-6 - 2010
- [c14]Tao Ban, Ruo Ando, Youki Kadobayashi:
A Fast Kernel on Hierarchial Tree Structures and Its Application to Windows Application Behavior Analysis. ICONIP (2) 2010: 267-274 - [c13]Ruo Ando, Kang Byung, Youki Kadobayashi:
Log Analysis of Exploitation in Cloud Computing Environment Using Automated Reasoning. ICONIP (2) 2010: 337-343 - [c12]Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
Blink: Large-scale P2P network monitoring and visualization system using VM introspection. NCM 2010: 351-358
2000 – 2009
- 2009
- [c11]Ruo Ando:
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server. CISIS 2009: 633-638 - [c10]Ruo Ando, Zonghua Zhang, Youki Kadobayashi, Yoichi Shinoda:
A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration. DASC 2009: 95-102 - [c9]Ruo Ando:
Automated Log Analysis of Infected Windows OS Using Mechanized Reasoning. ICONIP (2) 2009: 540-547 - 2008
- [c8]Zonghua Zhang
, Ruo Ando, Youki Kadobayashi:
Hardening Botnet by a Rational Botmaster. Inscrypt 2008: 348-369 - [c7]Ruo Ando:
Faster Parameter Detection of Polymorphic Viral Code Using Hot List Strategy. ICONIP (1) 2008: 555-562 - [c6]Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. ICYCS 2008: 2222-2229 - 2007
- [c5]Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. ICISC 2007: 131-143 - [c4]Ruo Ando:
Parallel analysis of polymorphic viral code using automated deduction system. SNPD (2) 2007: 585-592 - 2006
- [c3]Anh-Quynh Nguyen, Ruo Ando, Yoshiyasu Takefuji:
Centralized Security Policy Support for Virtual Machine. LISA 2006: 79-87 - 2005
- [c2]Ruo Ando, Yoshiyasu Takefuji
:
Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection. CANS 2005: 85-95 - 2003
- [c1]Ruo Ando, Yoshiyasu Takefuji
:
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy. MMM-ACNS 2003: 424-427
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint