• 571 引用
  • 12 h指数
1994 …2020

年単位の研究成果

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
Article
2004

An integrated laboratory for processor organization, compiler design, and computer networking

Abe, K., Tateoka, T., Suzuki, M., Maeda, Y., Kono, K. & Watanabe, T., 2004 8 1, : : IEEE Transactions on Education. 47, 3, p. 311-320 10 p.

研究成果: Article

20 引用 (Scopus)

Minimizing Privileged Code in Setuid Programs using Fine-grained Protection Domains.

Shinagawa, T., Kono, K. & Masuda, T., 2004 1, : : Computer Software. 21, 2, p. 107-113 7 p.

研究成果: Article

2005

Exploiting mobile code for user-transparent distribution of application-level protocols

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2005 1 1, : : Systems and Computers in Japan. 36, 1, p. 44-57 14 p.

研究成果: Article

2006

Basic mechanism of elastic server groups - Dynamic adaptation to load fluctuation

Agetsuma, M., Kono, K., Iwasaki, H. & Masuda, T., 2006 7 1, : : Systems and Computers in Japan. 37, 8, p. 24-37 14 p.

研究成果: Article

2007

An extensible protocol-processing code generator from definitions of application-layer protocols

Abe, K., Iwasaki, H. & Kono, K., 2007 6 11, : : Computer Software. 24, 2, p. 150-163 14 p.

研究成果: Article

Automatic Tuning of the Keep-alive Parameter of Web Servers based on Request-waiting Intervals.

Sugiki, A., Kono, K. & Iwasaki, H., 2007 1, : : Computer Software. 24, 2, p. 68-78 11 p.

研究成果: Article

TCP reassembler for layer7-aware network intrusion detection/prevention systems

Hanaoka, M., Shemamura, M. & Kono, K., 2007 12, : : IEICE Transactions on Information and Systems. E90-D, 12, p. 2019-2032 14 p.

研究成果: Article

3 引用 (Scopus)
2008

Filtering false positives based on server-side behaviors

Shimamura, M., Hanaoka, M. & Kono, K., 2008 2, : : IEICE Transactions on Information and Systems. E91-D, 2, p. 264-276 13 p.

研究成果: Article

1 引用 (Scopus)

Tuning mechanisms for two major parameters of Apache web servers

Sugiki, A., Kono, K. & Iwasaki, H., 2008 10 1, : : Software - Practice and Experience. 38, 12, p. 1215-1240 26 p.

研究成果: Article

9 引用 (Scopus)
2009

Reducing security policy size for internet servers in secure operating systems

Yokoyama, T., Hanaoka, M., Shimamura, M., Kono, K. & Shinagawa, T., 2009, : : IEICE Transactions on Information and Systems. E92-D, 11, p. 2196-2206 11 p.

研究成果: Article

Why is it (thought) so difficult to write Software Papers?

Gondow, K., Akashi, O., Ichiji, H., Iwasaki, H., Kono, K., Toyoda, M. & Ueda, K., 2009, : : Computer Software. 26, 4, p. 17-29 13 p.

研究成果: Article

2010

P2P-Based approach to finding replica server locations for alleviating flash crowds

Asaharata, M., Kono, K., Kojima, T. & Hayakawaf, A., 2010 11, : : IEICE Transactions on Information and Systems. E93-D, 11, p. 3027-3037 11 p.

研究成果: Article

2011

Amberate: A framework for automated vulnerability scanners for web applications

Kosuga, Y. & Kono, K., 2011 12 8, : : Computer Software. 28, 4, p. 175-195 21 p.

研究成果: Article

2 引用 (Scopus)

A state-aware protocol fuzzer based on application-layer protocols

Kitagawa, T., Hanaoka, M. & Kono, K., 2011 5, : : IEICE Transactions on Information and Systems. E94-D, 5, p. 1008-1017 10 p.

研究成果: Article

2012

Lightweight recovery from kernel failures using phase-based reboot

Yamakita, K., Yamada, H. & Kono, K., 2012 6 15, : : IPSJ Online Transactions. 5, 1, p. 59-70 12 p.

研究成果: Article

MashCache: Taming flash crowds by using their good features

Horie, H., Asahara, M., Yamada, H. & Kono, K., 2012, : : IPSJ Online Transactions. 5, 1, p. 21-33 13 p.

研究成果: Article

2013

Automatically checking for session management vulnerabilities in web applications

Takamatsu, Y., Kosuga, Y. & Kono, K., 2013 7 30, : : IPSJ Online Transactions. 6, 1, p. 17-27 11 p.

研究成果: Article

12 引用 (Scopus)

Traveling forward in time to newer operating systems using shadowreboot

Yamada, H. & Kono, K., 2013 8, : : ACM SIGPLAN Notices. 48, 7, p. 121-130 10 p.

研究成果: Article

1 引用 (Scopus)

Using fault injection to analyze the scope of error propagation in linux

Yoshimura, T., Yamada, H. & Kono, K., 2013 7 30, : : IPSJ Online Transactions. 6, 1, p. 55-64 10 p.

研究成果: Article

2014

Efficient update activation for virtual machines in iaas cloud computing environments

Yamada, H., Tonosaki, S. & Kono, K., 2014 1 1, : : IEICE Transactions on Information and Systems. E97-D, 3, p. 469-479 11 p.

研究成果: Article

1 引用 (Scopus)

Screening legitimate and fake/crude antivirus software

Kasuya, M. & Kono, K., 2014 1 1, : : IPSJ Online Transactions. 7, 2014, p. 43-51 9 p.

研究成果: Article

2015

Detection of visual clickjacking vulnerabilities in incomplete defenses

Takamatsu, Y. & Kono, K., 2015 7 15, : : Journal of information processing. 23, 4, p. 513-524 12 p.

研究成果: Article

2016

GPUvm: GPU Virtualization at the Hypervisor

Suzuki, Y., Kato, S., Yamada, H. & Kono, K., 2016 9 1, : : IEEE Transactions on Computers. 65, 9, p. 2752-2766 15 p., 7349172.

研究成果: Article

16 引用 (Scopus)

Report on the Asia-Pacific systems workshop 2015 (APSys'15)

Heiser, G., Kono, K., Park, K. & Van Renesse, R., 2016 3 11, : : Operating Systems Review (ACM). 50, 1, p. 1-2 2 p.

研究成果: Article

2018

Cooperative GPGPU scheduling for consolidating server workloads

Suzuki, Y., Yamada, H., Kato, S. & Kono, K., 2018 12 1, : : IEICE Transactions on Information and Systems. E101D, 12, p. 3019-3037 19 p.

研究成果: Article

1 引用 (Scopus)
2019
2020
公開

Logging inter-thread data dependencies in linux kernel

Kubota, T., Aota, N. & Kono, K., 2020 7 1, : : IEICE Transactions on Information and Systems. E103D, 7, p. 1633-1646 14 p.

研究成果: Article

公開
公開