If you made any changes in Pure these will be visible here soon.

Research Output 1994 2019

  • 472 Citations
  • 10 h-Index
  • 52 Conference contribution
  • 34 Article
  • 1 Chapter
Filter
Article
2019

File systems are hard to test — Learning from XFStests

Aota, N. & Kono, K., 2019 Feb 1, In : IEICE Transactions on Information and Systems. 2, p. 269-279 11 p.

Research output: Contribution to journalArticle

Testing
2018

Cooperative GPGPU scheduling for consolidating server workloads

Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2018 Dec 1, In : IEICE Transactions on Information and Systems. E101D, 12, p. 3019-3037 19 p.

Research output: Contribution to journalArticle

Servers
Scheduling
Graphics processing unit
Multiplexing
Consolidation
2016

A case for static analysis of linux to find faults in interrupt request handlers

Yoshimura, T. & Kono, K., 2016, In : Journal of Information Processing. 24, 3, p. 573-582 10 p.

Research output: Contribution to journalArticle

Static analysis
Availability
Linux
8 Citations (Scopus)

GPUvm: GPU Virtualization at the Hypervisor

Suzuki, Y., Kato, S., Yamada, H. & Kono, K., 2016 Sep 1, In : IEEE Transactions on Computers. 65, 9, p. 2752-2766 15 p., 7349172.

Research output: Contribution to journalArticle

Virtualization
Graphics Processing Unit
Virtual Machine
Trade-offs
Graphics processing unit

Report on the Asia-Pacific systems workshop 2015 (APSys'15)

Heiser, G., Kono, K., Park, K. & Van Renesse, R., 2016 Mar 11, In : Operating Systems Review (ACM). 50, 1, p. 1-2 2 p.

Research output: Contribution to journalArticle

2015

Detection of visual clickjacking vulnerabilities in incomplete defenses

Takamatsu, Y. & Kono, K., 2015 Jul 15, In : Journal of Information Processing. 23, 4, p. 513-524 12 p.

Research output: Contribution to journalArticle

2014

A VMM-level approach to shortening downtime of operating systems reboots in software updates

Yamada, H. & Kono, K., 2014 Oct 1, In : IEICE Transactions on Information and Systems. E97D, 10, p. 2663-2675 13 p.

Research output: Contribution to journalArticle

Computer operating systems
Virtual machine
1 Citation (Scopus)

Efficient update activation for virtual machines in iaas cloud computing environments

Yamada, H., Tonosaki, S. & Kono, K., 2014, In : IEICE Transactions on Information and Systems. E97-D, 3, p. 469-479 11 p.

Research output: Contribution to journalArticle

Cloud computing
Chemical activation
Servers
Virtual machine
Internet

Screening legitimate and fake/crude antivirus software

Kasuya, M. & Kono, K., 2014, In : IPSJ Online Transactions. 7, 2014, p. 43-51 9 p.

Research output: Contribution to journalArticle

Screening
Data storage equipment
Program processors
Malware
Experiments
2013

Automatically checking for session management vulnerabilities in web applications

Takamatsu, Y., Kosuga, Y. & Kono, K., 2013, In : IPSJ Online Transactions. 6, 1, p. 17-27 11 p.

Research output: Contribution to journalArticle

Experiments
10 Citations (Scopus)

Honeyguide: A VM migration-aware network topology for saving energy consumption in data center networks

Shirayanagi, H., Yamada, H. & Kono, K., 2013 Sep, In : IEICE Transactions on Information and Systems. E96-D, 9, p. 2055-2064 10 p.

Research output: Contribution to journalArticle

Consolidation
Energy utilization
Switches
Topology
Fault tolerance

Traveling forward in time to newer operating systems using shadowreboot

Yamada, H. & Kono, K., 2013 Aug, In : ACM SIGPLAN Notices. 48, 7, p. 121-130 10 p.

Research output: Contribution to journalArticle

Linux
Virtual machine

Using fault injection to analyze the scope of error propagation in linux

Yoshimura, T., Yamada, H. & Kono, K., 2013, In : IPSJ Online Transactions. 6, 1, p. 55-64 10 p.

Research output: Contribution to journalArticle

Linux
Computer operating systems
Data structures
Computer systems
Availability
2012

Clustering performance anomalies based on similarity in processing time changes

Iwata, S. & Kono, K., 2012, In : IPSJ Online Transactions. 5, 1, p. 1-12 12 p.

Research output: Contribution to journalArticle

Processing
Industry
Servers

Lightweight recovery from kernel failures using phase-based reboot

Yamakita, K., Yamada, H. & Kono, K., 2012, In : IPSJ Online Transactions. 5, 1, p. 59-70 12 p.

Research output: Contribution to journalArticle

Recovery
Computer systems
Availability
Experiments
Linux

MashCache: Taming flash crowds by using their good features

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012, In : IPSJ Online Transactions. 5, 1, p. 21-33 13 p.

Research output: Contribution to journalArticle

Metadata
Explosions
Websites
Servers
Chemical analysis
2011
2 Citations (Scopus)

Amberate: A framework for automated vulnerability scanners for web applications

Kosuga, Y. & Kono, K., 2011, In : Computer Software. 28, 4, p. 175-195 21 p.

Research output: Contribution to journalArticle

A state-aware protocol fuzzer based on application-layer protocols

Kitagawa, T., Hanaoka, M. & Kono, K., 2011 May, In : IEICE Transactions on Information and Systems. E94-D, 5, p. 1008-1017 10 p.

Research output: Contribution to journalArticle

Network protocols
HTTP
Servers
Specifications
Experiments
2010

Introduction to the special issue on software papers

Izumi, J., Ichiji, H., Kono, K., Gondow, K., Toyoda, M. & Banbara, M., 2010, In : Computer Software. 27, 4, p. 1 1 p.

Research output: Contribution to journalArticle

P2P-Based approach to finding replica server locations for alleviating flash crowds

Asaharata, M., Kono, K., Kojima, T. & Hayakawaf, A., 2010 Nov, In : IEICE Transactions on Information and Systems. E93-D, 11, p. 3027-3037 11 p.

Research output: Contribution to journalArticle

Servers
Internet
2009

Reducing security policy size for internet servers in secure operating systems

Yokoyama, T., Hanaoka, M., Shimamura, M., Kono, K. & Shinagawa, T., 2009, In : IEICE Transactions on Information and Systems. E92-D, 11, p. 2196-2206 11 p.

Research output: Contribution to journalArticle

Computer operating systems
Servers
Internet
Access control
HTTP

Why is it (thought) so difficult to write Software Papers?

Gondow, K., Akashi, O., Ichiji, H., Iwasaki, H., Kono, K., Toyoda, M. & Ueda, K., 2009, In : Computer Software. 26, 4, p. 17-29 13 p.

Research output: Contribution to journalArticle

2008
1 Citation (Scopus)

Filtering false positives based on server-side behaviors

Shimamura, M., Hanaoka, M. & Kono, K., 2008 Feb, In : IEICE Transactions on Information and Systems. E91-D, 2, p. 264-276 13 p.

Research output: Contribution to journalArticle

Intrusion detection
Servers
Computer monitors
8 Citations (Scopus)

Tuning mechanisms for two major parameters of Apache web servers

Sugiki, A., Kono, K. & Iwasaki, H., 2008 Oct, In : Software - Practice and Experience. 38, 12, p. 1215-1240 26 p.

Research output: Contribution to journalArticle

Servers
Tuning
Computer operating systems
Availability
2007

An extensible protocol-processing code generator from definitions of application-layer protocols

Abe, K., Iwasaki, H. & Kono, K., 2007, In : Computer Software. 24, 2, p. 150-163 14 p.

Research output: Contribution to journalArticle

Servers
Network protocols
Processing
HTTP
Computer systems

Automatic Tuning of the Keep-alive Parameter of Web Servers based on Request-waiting Intervals.

Sugiki, A., Kono, K. & Iwasaki, H., 2007, In : Computer Software. 24, 2, p. 68-78 11 p.

Research output: Contribution to journalArticle

Servers
Tuning
Internet
Degradation
Costs

Introduction to the special issue on software papers

Akashi, O., Ichiji, H., Iwasaki, H., Kono, K., Gondow, K. & Toyoda, M., 2007, In : Computer Software. 24, 4, p. 1 1 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

TCP reassembler for layer7-aware network intrusion detection/prevention systems

Hanaoka, M., Shemamura, M. & Kono, K., 2007 Dec, In : IEICE Transactions on Information and Systems. E90-D, 12, p. 2019-2032 14 p.

Research output: Contribution to journalArticle

Intrusion detection
Transparency
Copying
Program processors
Servers
2006

Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2006 Jul, In : Systems and Computers in Japan. 37, 8, p. 24-37 14 p.

Research output: Contribution to journalArticle

Dynamic Adaptation
Servers
Server
Fluctuations
Internet
2005

Exploiting mobile code for user-transparent distribution of application-level protocols

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2005 Jan, In : Systems and Computers in Japan. 36, 1, p. 44-57 14 p.

Research output: Contribution to journalArticle

Network protocols
Distributed Environment
Convert
Servers
Server
2004
19 Citations (Scopus)

An integrated laboratory for processor organization, compiler design, and computer networking

Abe, K., Tateoka, T., Suzuki, M., Maeda, Y., Kono, K. & Watanabe, T., 2004 Aug, In : IEEE Transactions on Education. 47, 3, p. 311-320 10 p.

Research output: Contribution to journalArticle

networking
Students
organization
student
evaluation

Minimizing Privileged Code in Setuid Programs using Fine-grained Protection Domains.

Shinagawa, T., Kono, K. & Masuda, T., 2004, In : Computer Software. 21, 2, p. 107-113 7 p.

Research output: Contribution to journalArticle

2003
7 Citations (Scopus)
Computer Systems
Technology
Computer operating systems
Computer systems
kernel
Internet
Mirror
Mirrors
Servers
Server