[Home] [Japanese/$B4A;z(B] [English]

$B?7>k!!Lw(B(Yasushi Shinjo)$B$NO@J8(B

  1. Chung-Fan Yang and Yasushi Shinjo: "Compounded Real-Time Operating Systems for Rich Real-Time Applications", in IEEE Access,13,https://doi.org/10.1109/ACCESS.2025.3538561, vol., pp.26079-26104 (2025).
  2. Jun Ishiguro, Yasushi Shinjo and Akifumi Soyama: "Controlled Copying of Persistent Data Between end Users' SGX Enclaves over an Untrusted Network", 2024 International Symposium on Parallel Computing and Distributed Systems (PCDS),https://doi.org/10.1109/PCDS61776.2024.10743591, pp.1-10 (2024).
  3. Yasushi Shinjo, Taiki Watanabe, Yi Zhou, Kazuki Takarada, and Masahiro Nakamura: "Implementing Censorship-Resistant Trusted Email Using Blockchain Technology", 2024 International Symposium on Parallel Computing and Distributed Systems (PCDS),https://doi.org/10.1109/PCDS61776.2024.10743338, pp.1-7 (2024).
  4. $BM{(B $BqbbO(B, $B?7>k(B $BLw(B, $BCNG0(B $B7ELo(B: "VPN $B$rMQ$$$?%f!<%64V$N(B IP $B%"%I%l%98r49$K$h$k8!1\$H%f!<%6%H%i%C%-%s%0$NKI;_$NDs0F(B", $B>pJs=hM}3X2qBh(B36$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2024) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2024).
  5. $B@6?e(B $B3$Bg(B, $B?7>k(B $BLw(B: "Web$B%V%i%&%6$KI=<($5$l$?%Z!<%8FbMF$r7k9g$9$k$?$a$N%U%!%$%k%7%9%F%`(B", $B>pJs=hM}3X2qBh(B36$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2024), pp.50-59 (2024).
  6. $B@6?e(B $B3$Bg(B, $B1:@n(B $B9@2p(B, $B?7>k(B $BLw(B: "$BCpJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2025-OS-163, 10 pages (2024).
  7. Feng Han, Yasushi Shinjo: "Towards Developing Multi-Personal-Nodes Application", IPSJ 36th Computer System Symposium (ComSys2024) Poster Session , 2 pages (2024).
  8. Yao Li, Yasushi Shinjo: "Towards Building Computing Clusters of Web Browsers", IPSJ 36th Computer System Symposium (ComSys2024) Poster Session , 2 pages (2024).
  9. $B0lLZ(B $BM42p(B, $B?7>k(B $BLw(B, $BA>;3(B $BZv;K(B: "$B5!L)pJs4IM}$N$?$a$N9b$$2DMQ@-$r;}$D%m%0%5!<%P$N@_7W(B", $B>pJs=hM}3X2qBh(B36$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2024) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2024).
  10. $B9b66(B $B=YB@O/(B, $Bld(B $B?e|*(B, $B?7>k(B $BLw(B: "$BIt20$N35G0$K4p$E$/C/$G$b;H$($k%"%/%;%9@)8f$NpJs=hM}3X2qBh(B36$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2024) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2024).
  11. Akihiro Shoji and Yasushi Shinjo: "Implementation method of non-bypassable PC application firewalls using virtualization technologies", In Proceedings of the 25th IEEE International Conference on High Performance Computing and Communications,https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys60770.2023.00066, pp.435-442 (2023).
  12. $BA>;3(B $BZv;K(B, $B?7>k(B $BLw(B, $B@P9u(B $B=_(B: "$B%G!<%?$N%3%T!<@)8B$HMxMQ5-O?Ds6!$N5!L)pJs=hM}3X2qBh(B35$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2023) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2023).
  13. $B;3CO(B $BGnG7!$?7>k(B $BLw(B: "$B5!L)pJs=hM}3X2qBh(B34$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2022) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2022).
  14. $B@P9u(B $B=_(B, $B?7>k(B $BLw(B: "$B%$%s%?!<%M%C%H$GMxMQ2DG=$J5!L)pJs=hM}3X2qBh(B34$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2022), pp.1-10 (2022).
  15. $BEOIt(B $BB@4x(B, $B?7>k(B $BLw(B, $B<~(B $B5#(B, $BJuED(B $B0l4u(B, $BCfB<(B $B8xMN(B: "$BJ,;6BfD"5;=Q(BEthereum$B$rMQ$$$?4F;k$d8!1\$K6/$$?.Mj$G$-$k%a!<%k$NpJs=hM}3X2q%0%k!<%W%&%'%"$H%M%C%H%o!<%/%5!<%S%9%o!<%/%7%g%C%W(B2022 (GN Workshop 2022), pp.112-119 (2022).
  16. $B;3ED(B $BM55.(B, $B:4F#(B $BAo(B, $B?7>k(B $BLw(B, $B@1Ln(B $B8|(B: "$B%2!<%`$GF@$i$l$?(BPC$B>e$N%^%&%9$N50@W$rMQ$$$?8D?M<1JL$N8!F$(B", $B>pJs=hM}3X2q8&5f2qJs9p%3%s%T%e!<%?%;%-%e%j%F%#(B(CSEC),2022-CSEC-96, 6 pages (2022).
  17. $BK'2l(B $B0jLo!$?7>k(B $BLw!$<~(B $B5#!$JuED(B $B0l4u!$CfB<(B $B8xMN!$:4F#(B $BAo!$Cf0f1{(B: "$BJ,;6BfD"5;=Q$rMQ$$$?%9%J%C%W%7%g%C%HG[?.$K$h$kJ,;6%U%!%$%k%7%9%F%`$NpJs=hM}3X2qBh(B34$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2022) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2022).
  18. $B?\F#(B $BOB51!$?7>k(B $BLw(B: "$B%*%U%i%$%s$GpJs=hM}3X2qBh(B34$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2022) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2022).
  19. $B;TG7@%(B $Bk(B $BLw(B, $B;05\(B $B=(]$H$7$?5!3#3X=,$K$h$k<+8J$i$7$$DL?.$N<1JLpJs=hM}3X2qO@J8;o(B:, Vol.62, No.3, pp.838-847 (2021).
  20. $BEOItB@4x(B, $B?7>kLw(B, $B<~5#(B, $BJuED0l4u(B: "$BJ,;6BfD"5;=Q$K$h$k?.Mj$G$-$kEE;R%a!<%k$H$=$l$rMxMQ$7$?EE;R=PHG$NpJs=hM}3X2qBh(B33$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2021) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2021).
  21. $BBg<<(B $B9bHA(B , $B?7>k(B $BLw(B , $BCf0f(B $B1{(B , $B;05\(B $B=(pJs$K$h$k%Y%$%8%"%s%U%#%k%?$rMQ$$$?(BWeb$B%5!<%P?.MQEYH=Dj(B", $B>pJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT),2021-IOT-52(17), 8 pages (2021).
  22. $BJuED(B $B0l4u(B, $B<~(B $B5#(B, $B?7>k(B $BLw(B, $BNS(B $BCW1s(B, $BCfB<(B $B8xMN(B: "$B%V%m%C%/%A%'!<%s5;=Q(BEthereum$B$rMQ$$$?%=!<%7%c%k%3%_%e%K%1!<%7%g%s%A%c%M%k(B", $B>pJs=hM}3X2qBh(B33$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2021), pp.37-47 (2021).
  23. $B6-(B $BI"N<(B, $B?7>k(B $BLw(B: "$B%f!<%6%H%i%C%-%s%0$rKI$0$?$a$NO"F0$7$FF0:n$9$k(BWeb$B%V%i%&%6$N(BFirefox$B$K$*$1$kpJs=hM}3X2qBh(B33$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2021), pp.57-66 (2021).
  24. $B@P9u=_(B, $B?7>kLw(B: "$B%3%s%T%e!<%?4V$K$*$1$k%G!<%?0\F0$N5!L)pJs=hM}3X2qBh(B33$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2021) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2021).
  25. $B>1;JL@MN(B, $B?7>kLw(B: "$B2>A[7W;;5!$H2>A[%9%$%C%A$rMQ$$$?%P%$%Q%9IT2DG=$J%"%W%j%1!<%7%g%s%l%Y%k!&%U%!%$%"%&%)!<%k$NDs0F(B", $B>pJs=hM}3X2qBh(B33 $B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2021) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2021).
  26. Chung-Fan Yang and Yasushi Shinjo: "Obtaining hard real-time performance and rich Linux features in a compounded real-time operating system by a partitioning hypervisor", In Proceedings of the 16th ACM International Conference on Virtual Execution Environments,https://doi.org/10.1145/3381052.3381323, pp.59-72 (2020).
  27. $B?9(B $B8x4u(B, $B?7>k(B $BLw(B, $BCf0f(B $B1{(B, $B;05\(B $B=(pJs=hM}3X2q%$%s%?!<%M%C%H$H1?MQ5;=Q%7%s%]%8%&%`(B, pp.71-78 (2020).
  28. Yi Zhou, Yasushi Shinjo, Kazuki Takarada and Zhiyuan Lin: "Towards Exchanging Connection Information by Using the Blockchain Technology for Decentralized Social Networking Services", IPSJ 32th Computer System Symposium (ComSys2020) Poster Session, 2 pages (2020).
  29. $BJuED(B $B0l4u(B, $B?7>k(B $BLw(B, $B<~(B $B5#(B, $BNS(B $BCW1s(B: "$BJ,;6BfD"$rMQ$$$?%=!<%7%c%k%3%_%e%K%1!<%7%g%s%A%c%M%k$NpJs=hM}3X2qBh(B32$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2020) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2020).
  30. $B6-(B $BI"N<(B, $B?7>k(B $BLw(B: "$B%f!<%6%H%i%C%-%s%0$rKI$0$?$a$NO"F0$7$FF0:n$9$k(BWeb$B%V%i%&%6$NDs0F(B", $B>pJs=hM}3X2qBh(B32$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2020) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2020).
  31. $B2CF#(B $BIw2j(B, $B?7>k(B $BLw(B: "Intel SGX$B$rMxMQ$7$?<+8JGK2u!&=P8=%G!<%?$NpJs=hM}3X2qBh(B32$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2020), pp.42-51 (2020).
  32. $BCf0f(B $B1{(B, $B@P0f(B $B9(2B(B, $B?7>k(B $BLw(B: "Yacc$B5-=R$+$i(BPEG$B$X$N%H%i%s%9%l!<%?$NpJs=hM}3X2qO@J8;o%W%m%0%i%_%s%0(B(PRO),p.24, Vol.13, No.1 (2020).
  33. Zhaoxin Wu and Yasushi Shinjo: "Improving Web Browsing Experience with Personalized Edge Computing", In the 4th International Workshop on Multi-access Edge Computing and Networking (MECN-2019),https://doi.org/10.1109/IUCC/DSCI/SmartCNS.2019.00149, pp.723-730 (2019).
  34. $B2CF#(B $BIw2j(B, $B?7>k(B $BLw(B: "$B5!L)pJs=hM}3X2qBh(B31$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2019) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2019).
  35. $B?9(B $B8x4u(B, $B?7>k(B $BLw(B, $BCf0f(B $B1{(B, $B;05\(B $B=(pJs=hM}3X2q%$%s%?!<%M%C%H$H1?MQ5;=Q%7%s%]%8%&%`(B $B%]%9%?!<%;%C%7%g%s(B, pp.120-121 (2019).
  36. $BBg<<(B $B9bHA(B, $B?7>k(B $BLw(B, $BCf0f(B $B1{(B, $B;05\(B $B=(pJs$rMQ$$$?(BWeb$B%5!<%P$N?.MQEY;;Dj$K4X$9$k8!F$(B", $BBh(B12$B2s>pJs=hM}3X2q%$%s%?!<%M%C%H$H1?MQ5;=Q%7%s%]%8%&%`(B $B%]%9%?!<%;%C%7%g%s(B, pp.108-109 (2019).
  37. $B;TG7@%(B $Bk(B $BLw(B, $B;05\(B $B=(]$H$7$?5!3#3X=,$K$h$k<+8J$i$7$/$J$$DL?.$N<1JLpJs=hM}3X2q%$%s%?!<%M%C%H$H1?MQ5;=Q%7%s%]%8%&%`(B, pp.9-16 (2019).
  38. $BCfB<(B $B8xMN(B, $B?7>k(B $BLw(B: "$BJ,;6BfD"5;=Q$rMQ$$$?J,;6%U%!%$%k%7%9%F%`$N9=A[(B", $B>pJs=hM}3X2qBh(B31$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2019) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2019).
  39. $B2OLn(B $B>"(B, $B?7>k(B $BLw(B, $BCfB<(B $B8xMN(B, $B;0B<(B $B8-pJs=hM}3X2qBh(B31$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2019), pp.62-75 (2019).
  40. Oscar Garcia, Yasushi Shinjo and Calton Pu: "Achieving Consistent Real-Time Latency at Scale in a Commodity Virtual Machine Environment Through Socket Outsourcing-Based Network Stacks", IEEE Access,https://doi.org/10.1109/ACCESS.2018.2877296, Vol.6, pp.69961-69977 (2018).
  41. Oscar Garcia, Yasushi Shinjo, and Calton Pu: "Implementation and Comparative Evaluation of an Outsourcing Approach to Real-Time Network Services in Commodity Hosted Environments", In Proceedings of SCF International Conference on Cloud Computing (Cloud 2018),https://doi.org/10.1007/978-3-319-94295-7_13 , pp.189-205 (2018).
  42. Kohei Ito, Akira Sato, Shuji Sannomiya, Kenichi Yoshida, Yasushi Shinjo: "Cardinality-Based Abnormal Traffic Classification Using Packet Sampling", In Proceedings of the 2018 International Conference on Parallel and Distributed Processing Techniques & Applications (PDPTA 2018), pp.242-248 (2018).
  43. Kodai Watanabe, Akira Sato, Shuji Sannomiya, Yasushi Shinjo: "Network Node Classification Based on DNS Query Analysis", In Proceedings of the 2018 International Conference on Parallel and Distributed Processing Techniques & Applications (PDPTA 2018), pp.235-241 (2018).
  44. Chung-Fan Yang, Oscar Garcia, Yasushi Shinjo: "Achieving consistent real-time latency in a collocated commodity virtual machine environment by LLC partitioning", In 1st Workshop on Efficient Real-time Data Network in conjunction with 39th IEEE Real-Time Systems Symposium (RTSS 2018), 6 pages (2018).
  45. $B;0B<(B $B8-k(B $BLw(B, $BD%(B $B@$?=(B: "$B%3%s%F%J5;=Q$rMQ$$$?%5!<%S%9$4$H$K3VN%$5$l$?4D6-$r;}$D(BWeb$B%V%i%&%6(B", $B>pJs=hM}3X2qBh(B30$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2018), pp.37-46 (2018).
  46. $B;3Lg(B $B:L(B, $B:4F#(B $BAo(B, $B?7>k(B $BLw(B: "$B%@!<%/%M%C%H08DL?.J,@O$K$h$k%M%C%H%o!<%/4IM}pJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT),2018-IOT-40(31), 6 pages (2018).
  47. $BD%(B $B@$?=(B, $B?7>k(B $BLw(B, $B;0B<(B $B8-pJs5Z$S8D?M<1JL;R$r4^$`%U%!%$%k$HDL?.$r8!=P$9$k$?$a$NAP;R$N4D6-(B", $B>pJs=hM}3X2qBh(B30$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2018), pp.29-36 (2018).
  48. $B2OLn(B $B>"(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B: "DOM$BLZ$NF14|$r;Y1g$9$kJ,;67?(BWeb$B%V%i%&%6$NDs0F(B", $B>pJs=hM}3X2qBh(B30$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2018) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2018).
  49. $BBg<<(B $B9bHA(B, $B?7>k(B $BLw(B, $B;05\(B $B=(ZL@=q>pJs$rMQ$$$?0-@-(BWeb$B%5!<%P$N8!=P(B", $BBh(B11$B2s>pJs=hM}3X2q%$%s%?!<%M%C%H$H1?MQ5;=Q%7%s%]%8%&%`(B $B%]%9%?!<%;%C%7%g%s(B,p.45 (2018).
  50. $B;TG7@%(B $Bk(B $BLw(B, $B;05\(B $B=(pJs=hM}3X2q%$%s%?!<%M%C%H$H1?MQ5;=Q%7%s%]%8%&%`(B $B%]%9%?!<%;%C%7%g%s(B,p.44 (2018).
  51. $B:YED(B $B>-Bg(B, $BCf0f(B $B1{(B, $B:4F#(B $BAo(B, $B?7>k(B $BLw(B: "$B3HD%2DG=$J9=J82r@O4o@8@.7O$K$h$k9=J8%(%i!<=hM}5!G=$NpJs=hM}3X2qO@J8;o(B:$B%W%m%0%i%_%s%0(B(PRO), Vol.10, No.1, pp.1-13 (2017).
  52. Meng Li and Yasushi Shinjo: "Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers", In Proceedings of the 2017 VI International Conference on Network,Communication and Computing (ICNCC 2017), pp.125-134 (2017).
  53. Yasushi Shinjo, Sota Naito, Xiao Kunyao, Akira Sato: "ABnews: A fast private social messaging system using untrusted storage and attribute-based encryption", IEEE 15th Annual Conference on Privacy,Security and Trust (PST 2017), 10 pages (2017).
  54. $BEDCf(B $BAOk(B $BLw(B: "$B%N!<%I4VDL?.$,2DG=$J%\%i%s%F%#%"%3%s%T%e!<%F%#%s%0(B", $B>pJs=hM}3X2qBh(B29$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2017), pp.96-104 (2017).
  55. $BEDEh(B $B9'9%(B, $B?7>k(B $BLw(B: "$B%"%9%Z%/%H;X8~%W%m%0%i%_%s%0$rMQ$$$?FC2=$K$h$k%W%m%;%94VDL?.$N9bB.2=$NDs0F(B", $B>pJs=hM}3X2qBh(B29$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2017), pp.58-68 (2017).
  56. $BD%(B $B@$?=(B, $B?7>k(B $BLw(B, $B;0B<(B $B8-pJs$r4^$`%U%!%$%k$HDL?.$r8!=P$9$k$?$a$NAP;R$N4D6-$NDs0F(B", ", $B>pJs=hM}3X2qBh(B29$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B (2017).
  57. $B0KF#(B $B97J?(B, $B:4F#(B $BAo(B, $B?7>k(B $BLw(B: "$B%"%/%;%9%9%$%C%A$K$FpJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT),2017-IOT-37(10), 8 pages (2017).
  58. $B;3Lg(B $B:L(B, $B:4F#(B $BAo(B, $B?7>k(B $BLw(B: "$BAH?%FbH/%@!<%/%M%C%H08DL?.J,@O$K$h$k%M%C%H%o!<%/4IM}pJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT),2017-IOT-37(9), 7 pages (2017).
  59. $BEOIt(B $B9LBg(B, $B:4F#(B $BAo(B, $B?7>k(B $BLw(B: "DNS$B%/%(%j$NJ,@O$K$h$k%5!<%P$HHs%5!<%P$N<1JL(B", $B>pJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT),2017-IOT-37(12), 8 pages (2017).
  60. $B;0B<(B $B8-kLw(B, $BD%(B $B@$?=(B: "Web $B%5!<%S%9$4$H$K3VN%$5$l$?%V%i%&%8%s%04D6-$NDs0F(B", $B>pJs=hM}3X2qBh(B29$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2017) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2017).
  61. Yasushi Shinjo, Wataru Ishida and Jinpeng Wei: "Implementing a parallel world model using Linux containers for efficient system administration", IEEE Second International Workshop on Container Technologies and Container Clouds (WoC 2016), 7 pages (2016).
  62. Yasushi Shinjo, Naoki Kainuma, Daiyuu Nobori, and Akira Sato: "Magic Mantle using Social VPNs against Centralized Social Networking Services", IEEE 14th Annual Conference on Privacy,Security and Trust (PST 2016), pp.341-348 (2016).
  63. Lai Rongchang and Yasushi Shinjo: "Sweets: A Decentralized Social Networking Service Application Using Data Synchronization on Mobile Devices", The 12th International Conference on Collaborative Computing: Networking,Applications and Worksharing (CollaborateCom 2016), pp.188-198 (2016).
  64. $B;3K\(B $BNJM5!$?7>kLw!$(BOscar Fernando Garcia Alvarado: "Reverse VMRPC$B$K$h$k%2%9%H(BOS$B$NA`:n(B", $B>pJs=hM}3X2qBh(B28$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2016), pp.60-71 (2016).
  65. Meng Li and Yasushi Shinjo: "A Proposal for Implementing Mobile Applications Using Untrusted Servers", $B>pJs=hM}3X2qBh(B28$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2016) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2016).
  66. $BEDEh(B $B9'9%!$?7>k(B $BLw!$:4F#Ao!$Cf0f1{(B: "AOP $B$rMQ$$$?FC2=$K$h$k%W%m%;%94VDL?.$N9bB.2=$NDs0F(B", $B>pJs=hM}3X2qBh(B28$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2016) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2016).
  67. $BEDCf(B $B@55,!$?7>k(B $BLw!$:4F#(B $BAo!$Cf0f(B $B1{(B: " $B<+N'E*$J%=!<%7%c%k(BVPN$B$N@_7W$HpJs=hM}3X2qBh(B28$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2016), pp.137-146 (2016).
  68. $BB}0f(B $BGn!$?7>k(B $BLw!$:4F#Ao!$Cf0f1{(B: "$BJ,;67?(B SNS $B$N$?$a$N6&DL%i%s%G%V!&%]%$%s%H!&%$%s%?!<%U%'!<%9$NpJs=hM}3X2qBh(B28$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2016), pp.110-120 (2016).
  69. $BEP(B $BBgM7(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B: "SoftEther VPN Server: $B%^%k%A%W%m%H%3%kBP1~$N%/%m%9%W%i%C%H%U%)!<%`$J%*!<%W%s%=!<%9(BVPN$B%5!<%P(B", $B%=%U%H%&%'%"2J3X2q(B $B%3%s%T%e!<%?%=%U%H%&%'%"(B, Vol.32, No.4, pp.3-30 (2015).
  70. Ake Koomsin and Yasushi Shinjo: "Running Application Specific Kernel Code by a Just-In-Time Compiler", The 8th ACM Workshop on Programming Languages and Operating Systems (PLOS 2015), pp.15-20 (2015).
  71. Ake Koomsin and Yasushi Shinjo: "lua_syscall: Specializing Operating System Kernels by Using the Lua Language", 6th ACM SIGOPS AsiaPacific Workshop on Systems (APSys 2015), 2 pages (2015).
  72. $B:4F#Ao(B, $B:4F#@;(B, $BCf0f1{(B, $B?7>kLw(B: "TLS/SSL$B%W%m%H%3%k$rBP>]$H$7$?HFMQ%O%K!<%]%C%H%7%9%F%`$NpJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT),2015-IOT-29(18), 8 pages (2015).
  73. $BIpF#42!"?yLn1IFs!"@%@nE55W!"_7K\=a!"?7>kLw(B: "$BD47?2>A[7W;;5!%b%K%?$N$?$a$N%7%j%"%k@\B3$rMQ$$$?(BOS$B4VDL?.(B", $B>pJs=hM}3X2qBh(B77$B2sA49qBg2q9V1iO@J8=8(B,2K-02 (2015).
  74. $BB}0f(B $BGn!$?7>k(B $BLw!$:4F#Ao!$Cf0f1{(B: "$BJ,;67?(BSNS$B4pHW$N$?$a$N6&DL%i%s%G%V!&%]%$%s%H!&%$%s%?!<%U%'!<%9$NDs0F(B", $B>pJs=hM}3X2qBh(B27$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2015) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2015).
  75. $BCL(B $B%(%s(B, $B?7>k(B $BLw(B, $BM{(B $B1S(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B: "$BJ,;67?(BWeb$B%V%i%&%6$K$*$1$k1s3V2q5D%7%9%F%`$NpJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2015-OS-135 (2015).
  76. $B@PED9R!$?7>kLw!$:4F#Ao!$Cf0f1{(B: " Linux $B$K$*$1$k2>A[2=5;=Q$rMQ$$$?@$3&(B OS $B$NpJs=hM}3X2qBh(B27$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2015), 11 pages (2015).
  77. Daiyuu Nobori and Yasushi Shinjo: "VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls", 11th USENIX Symposium on Networked Systems Design and Implementation, pp.229-241 (2014).
  78. Yasushi Shinjo, Xiao Kunyao, Naoki Kainuma, Daiyuu Nobori, and Akira Sato: "Friend News System: A Modern Implementation of Usenet over Social VPNs", 7th IEEE International Conference on Social Computing and Networking, pp.432-440 (2014).
  79. Teruo Koyanagi and Yasushi Shinjo: "A Fast and Compact Hybrid Memory Resident Datastore for Text Analytics with Autonomic Memory Allocation", the 5th International Conference on Information and Communication Systems (ICICS 2014), 7 pages (2014).
  80. $B:4F#Ao(B, $B>.@nCRLi(B, $B?7>kLw(B, $B5HED7r0l(B: "$BC^GHBg3X$K$*$1$k%O%K!<%]%C%H$rMQ$$$?ITE,@Z$J(BSSH$B%"%/%;%9$N<}=8$H$=$N2r@O(B", $B>pJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT),2014-IOT-25(17), 6 pages (2014).
  81. $B_/(B $B?JbO(B, $B?7>k(B $BLw(B, $BM{(B $B1S(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B: "$BJ,;67?(B Web$B%V%i%&%6$K$*$1$k%3%a%s%H6&M-%"%W%j%1!<%7%'%s$NpJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2014-OS-131-8, 6 pages (2014).
  82. $B@PED9R!$?7>kLw!$:4F#Ao!$Cf0f1{(B: "$B2>A[2=5;=Q$K$h$k@$3&(B OS $B$NpJs=hM}3X2qBh(B26$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2014) $B%]%9%?!<%;%C%7%g%s(B, 2 pages (2014).
  83. $BM{(B $B1S(B, $B?7>k(B $BLw(B, $B_/(B $B?JbO(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B: "$B%=!<%7%c%k(B SQL $B%G!<%?%Y!<%9$rMQ$$$?%"%W%j%1!<%7%g%s$N3+H/(B", $B>pJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2014-OS-131-5, 7 pages (2014).
  84. $B3$>BD>5*(B, $B?7>kLw(B, $BEPBgM7(B, $B>S_c`v(B, $B:4F#Ao(B, $BCf0f1{(B: "$B%W%i%$%P%7$rJ]8n$9$k$?$a$N(BVPN $B$rMQ$$$?(B $B%=!<%7%c%k%"%W%j%1!<%7%g%spJs=hM}3X2qBh(B26$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2014), pp.3-15 (2014).
  85. $B:4F#(B $BAo(B, $B]/0f(B $B9'0l(B, $B5HED(B $B7r0l(B, $B?7>k(B $BLw(B: "$B9bEY$JMxMQZ$,MxMQ2DG=$J%M%C%H%o!<%/$rBP>]$H$7$?=@Fp$J%"%/%;%9@)8f$N0lpJs=hM}3X2qO@J8;o(B($B%8%c!<%J%k(B), Vol.54, No.3, pp.1099-1108 (2013).
  86. $B?eLnM$kLw!":4F#Ao!"Cf0f1{(B: "SocialSocket$B$NDs0F(B", $B>pJs=hM}3X2qBh(B25$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2013),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2013).
  87. $B?\F#PR0l(B, $B:4F#Ao(B, $B]/0f9'0l(B, $B?7>kLw(B: "$B%M%C%H%o!<%/9=@.JQ99$rDI@W2DG=$H$9$k%M%C%H%o!<%/4IM};Y1g%7%9%F%`(B", $B>pJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT) 2013-IOT-20(33), 6 pages (2013).
  88. $B?\F#(B $BPR0l(B, $B?7>k(B $BLw(B, $B]/0f(B $B9'0l(B, $B:4F#(B $BAo(B, $B>S(B $B_c`v(B, $BCf0f(B $B1{(B: "$B%=!<%7%c%k%M%C%H%o!<%/$rMxMQ$7$?(B SQL $B%G!<%?%Y!<%9$NAj8_MxMQ(B", $B>pJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2013-OS-127(1), 10 pages (2013).
  89. $B>S(B $B_c`v(B, $B?7>k(B $BLw(B, $B]/0f(B $B9'0l(B, $B:4F#(B $BAo(B, $B?\F#(B $BPR0l(B, $BCf0f(B $B1{(B: "$B%=!<%7%c%k%k!<%?$rMQ$$$?%M%C%H%K%e!<%9%7%9%F%`$NpJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2013-OS-127(2), 9 pages (2013).
  90. $B]/0f(B $B9'0l(B, $B3$>B(B $BD>5*(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $B?\F#(B $BPR0l(B, $B>S(B $B_c`v(B, $BCf0f1{(B: "$B0BA4$J2HDm8~$1%=!<%7%c%k%k!<%?$NpJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2013-OS-127(3), 7 pages (2013).
  91. $B?7>kLw!">>2<(B $B@58c(B: "BitVisor$B$K$*$1$k%2%9%H(BOS$B!&J]8n%I%a%$%s!&(BUSB $B%I%s%0%k4V$N1s3VpJs=hM}3X2q(BBitVisor Summit 2 (2013).
  92. $B3$>BD>5*!"?7>kLw!"EPBgM7!"]/0f9'0l!":4F#Ao!"Cf0f1{(B: "SoftEther VPN$B$rMQ$$$?%=!<%7%c%k%"%W%j%1!<%7%g%spJs=hM}3X2qBh(B25 $B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2013),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2013).
  93. $B>.4XBYM5!"?7>kLw!":4F#Ao!"Cf0f1{(B: "$BJ,;67?(BWeb$B%V%i%&%6>e$GF0:n$9$k(BRuby$B%"%W%j%1!<%7%g%s$N$?$a$NDL?.5!G=(B", $B>pJs=hM}3X2qBh(B25$B2s%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2013),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2013).
  94. $B>.Lx(B $B8w@8(B, $B5HED(B $B0l(B, $B3$Ln(B $BM5Li(B, $B?7>k(B $BLw(B: "LOUDS$B%H%i%$$N%*%s%i%$%s9=C[$N$?$a$N%V%k!<%`%U%#%k%?9=C[K!(B", $B>pJs=hM}3X2qO@J8;o(B:$B%3%s%T%e!<%F%#%s%0%7%9%F%`(B(ACS), Vol.5, No.2 (ACS 37), pp.1-9 (2012).
  95. $BBg669(k(B $BLw(B, $BsnF#(B $B9d(B: "$B2>A[7W;;5!$K$*$1$k%=%1%C%H%"%&%H%=!<%7%s%0$rMQ$$(BIPv4/IPv6$BJQ49$N2A(B", $B>pJs=hM}3X2qO@J8;o(B:$B%3%s%T%e!<%F%#%s%0%7%9%F%`(B(ACS), Vol.5, No.3 (ACS 38), pp.30-41 (2012).
  96. Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Akiyoshi Sugiki and Kozo Itano: "A P2P Approach to Scalable Network Booting", The Third International Conference on Networking and Computing, pp.201-207 (2012).
  97. Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Koichi Sakurai and Kozo Itano: "A Simple Collaborative Method in Web Proxy Access Control for Supporting Complex Authentication Mechanisms", The 8th International Conference on Collaborative Computing: Networking,Applications and Worksharing (CollaborateCom 2012), pp.190-199 (2012).
  98. $BCSED(B $BD>k(B $BLw(B, $BHDLn(B $B9N;0(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B: "$B%3!<%k%P%C%/$K4p$E$/(B World Wide Web $B%"!<%-%F%/%A%c$NDs0F(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2012), 10 pages (2012).
  99. $B;08M(B $B7r0l(B, $BsnF#(B $B9d(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$B%=%1%C%H%"%&%H%=!<%7%s%0$rE,MQ$7$?2>A[7W;;5!$G$N%i%$%V%^%$%0%l!<%7%g%s$NpJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2012),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2012).
  100. $B>.@6?e(B $B<"(B, $B?7>k(B $BLw(B, $BHDLn(B $B9N;0(B, $B\F\[(B $B1Q>86(B $B9nLo(B: "$BCfN)E*(BVMM $B$K$h$kF02hA|$rBP>]$H$7$?Cx:n8"J]8n(B", $B>pJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H(B $B%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2012-OS-123(8), 8 pages (2012).
  101. $B>S(B $B_c`v(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$BJ,;67?(BWeb$B%V%i%&%6$K$*$1$k%M%C%H%K%e!<%9%7%9%F%`$NpJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2012),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2012).
  102. $B9bED(B $B??8c(B , $B:4F#(B $BAo(B , $BCf0f(B $B1{(B , $B?yLZ(B $B>O5A(B , $B?7>k(B $BLw(B: "$B%l%$%F%s%7$N0c$$$rMxMQ$7$?%M%C%H%V!<%HG[?.4D6-$N6I=jE*$J@Z$jBX$(pJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT),2012-IOT-16(12), 6 pages (2012).
  103. $B]/0f(B $B9'0l(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$B%=!<%7%c%k!&%k!<%?$NDs0F(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2012),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2012).
  104. $B?\F#(B $BPR0l(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $BHDLn(B $B9N;0(B, $BCf0f(B $B1{(B: "$BJ,;67?(BWeb$B%V%i%&%6$N$?$a$N%=!<%7%c%k(B SQL$B%G!<%?%Y!<%9$NDs0F(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2012),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2012).
  105. $B]/0f9'0l(B, $B:4F#Ao(B, $B5HED7r0l(B, $B?7>kLw(B: "$BG'>Z$r%"%&%H%=!<%9$9$k%M%C%H%o!<%/%9%$%C%A$N5!G=@_7W(B", $B>pJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT),2012-IOT-17(9), 6 pages (2012).
  106. $B>.@6?e(B $B<"(B, $B?7>k(B $BLw(B, $BHDLn(B $B9N;0(B, $B\F\[(B $B1Q>86(B $B9nLo(B: "BitVisor$B$K$h$kF02hA|$rBP>]$H$7$?Cx:n8"J]8n(B", $B>pJs=hM}3X2q(BBitVisor Summit (2012).
  107. $B3T(B $BHt(B, $B@D>B(B $BH<k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$BJ,;67?(BWeb$B%V%i%&%6$NDL?.5!G=$H6(D4F02h;kD0%"%W%j%1!<%7%g%s(B", $B>pJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H(B $B%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2012-OS-123(3), 8 pages (2012).
  108. $B?yK\Bn:H(B, $B?7>kLw(B, $BCf0f1{(B, $BHDLn9N;0(B, $B:4F#Ao(B: "$B%P%$%H%3!<%IJQ49$K$h$k(BActionScript$B%W%m%0%i%`$N%^%k%A%9%l%C%I2=(B", $B>pJs=hM}3X2qO@J8;o(B:$B%W%m%0%i%_%s%0(B(PRO), Vol.4, No.3, pp.68-83 (2011).
  109. $B>.Lx(B $B8w@8(B, $B5HED(B $B0l(B, $B3$Ln(B $BM5Li(B, $B?7>k(B $BLw(B: "$B4J7i%G!<%?9=B$$N%*%s%i%$%s9=C[$H%V%k!<%`%U%#%k%?$K$h$k8!:w@-G=$N8~>e(B", $B>pJs=hM}3X2qO@J8;o(B:$B%G!<%?%Y!<%9(B(TOD), Vol.4, No.4 (TOD 52), pp.1-10 (2011).
  110. Yasushi Shinjo, Fei Guo, Naoya Kaneko, Takejiro Matsuyama, Tatsuya Taniuchi, Akira Sato: "A Distributed Web Browser as a Platform for Running Collaborative Applications", The 7th International Conference on Collaborative Computing: Networking,Applications and Worksharing (CollaborateCom 2011), pp.278-286 (2011).
  111. Jinpeng Wei, Feng Zhu, Yasushi Shinjo: "Static Analysis Based Invariant Detection for Commodity Operating Systems", The 7th International Conference on Collaborative Computing: Networking,Applications and Worksharing (CollaborateCom 2011), pp.287-296 (2011).
  112. $BBg669(k(B $BLw(B, $BsnF#(B $B9d(B: "$B2>A[7W;;5!$K$*$1$k%=%1%C%H%"%&%H%=!<%7%s%0$rMQ$$$?(BIPv4/IPv6$BJQ49$NpJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2011), pp.95-104 (2011).
  113. $B>.Lx(B $B8w@8(B, $B5HED(B $B0l(B, $B3$Ln(B $BM5Li(B, $B?7>k(B $BLw(B: "LOUDS$B%H%i%$$N%*%s%i%$%s9=C[$N$?$a$N%V%k!<%`%U%#%k%?9=C[K!(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2011), pp.33-41 (2011).
  114. $B:4F#(B $BAo(B, $B9bED(B $B??8c(B, $BFAED(B $B@;;R(B, $BJ?ED(B $B40(B, $BCf;3(B $BCN;N(B, $B??Cf(B $B9'9T(B, $B?7>kLw(B: "$B%-%*%9%/C]$K$7$?%7%s%0%k%5%$%s%*%s%7%9%F%`$N1?MQ$H2]Bj(B ", $B>pJs=hM}3X2q8&5f2qJs9p%$%s%?!<%M%C%H$H1?MQ5;=Q(B(IOT) 2011-IOT-15(1), 6 pages (2011).
  115. $B?yK\Bn:H(B, $B?7>kLw(B, $BCf0f1{(B, $BHDLn9N;0(B, $B:4F#Ao(B: "$B%P%$%H%3!<%IJQ49$K$h$k(BActionScript$B%W%m%0%i%`$N%^%k%A%9%l%C%I2=(B", $B>pJs=hM}3XBh(B82$B2s%W%m%0%i%_%s%08&5fH/I=2q(B (2011).
  116. $B3T(B $BHt!$@D>B(B $BH<k(B $BLw!$:4F#(B $BAo!$Cf0f(B $B1{!$HDLn(B $B9N;0(B: "$BJ,;67?%V%i%&%6$K$*$1$kDL?.5!G=$N@_7W(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2011),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2011).
  117. $B@D>B(B $BH<k(B $BLw!$:4F#(B $BAo!$Cf0f(B $B1{!$HDLn(B $B9N;0(B: "$BJ,;67?%V%i%&%6$K$*$1$k6(D4F02h;kD0%"%W%j%1!<%7%g%s$N3+H/(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2011),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2011).
  118. $B>>2<(B $B@58c(B, $B?7>k(B $BLw(B, $B\F\[(B $B1Q>86(B $B9nLo(B, $BEl(B $BM*(B: "$BCfN)E*2>A[7W;;5!%b%K%?$K$h$kBQ%?%s%Q!<%G%P%$%9$N%"%/%;%i%l!<%?$NpJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H(B $B%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2011-OS-118(9), 8 pages (2011).
  119. $B8M:W(B $BMW(B, $B?7>k(B $BLw(B, $BsnF#(B $B9d(B, $BK-2,(B $BBs(B, $BHDLn(B $B9N;0(B: "$B%[%9%H7?2>A[7W;;5!$K$*$1$k%a%b%j4IM}$N%"%&%H%=!<%7%s%0$NDs0F(B", $B>pJs=hM}3X2q8&5f2qJs9p(B,$B%7%9%F%`%=%U%H%&%'%"$H(B $B%*%Z%l!<%F%#%s%0!&%7%9%F%`8&5f2q(B(OS),2011-OS-119(9), 7 pages (2011).
  120. $BGO^<=<7<(B, $B9bED??8c(B, $B>.Bt7r;K(B, $BK-2,Bs(B, $B>>0f7E8g(B, $B:4F#Ao(B, $B?7>kLw(B, $B2CF#OBI'(B: "$BMxMQpJs=hM}3X2qO@J8;o(B, Vol.51, No.3, pp.974-988 (2010).
  121. $BGr@P(B $B8wN4(B, $B?7>k(B $BLw(B, $BsnF#(B $B9d(B, $BK-2,(B $BBs(B, $B8^L@(B $B>-9,(B: "$B6(D47?2>A[7W;;5!%b%K%?$H$=$N(B Linux KVM $B$K$*$1$kpJs=hM}3X2qO@J8;o(B:$B%3%s%T%e!<%F%#%s%0%7%9%F%`(B(ACS), Vol.3, No.2 (ACS 30), pp.147-162 (2010).
  122. Mitsuhiro Mabuchi, Yasushi Shinjo, Koji Hasebe, Akira Sato, Kazuhiko Kato: "CapaCon: Access Control Mechanism for Inter-Device Communications through TCP connections", ACM Symposium on Applied Computing (SAC2010), pp.706-712 (2010).
  123. Satoshi Matsumoto, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano, Yusuke Shomura, and Kenichi Yoshida: "A Method for Analyzing Network Traffic Using Cardinality Information with Firewall Logs", IEEE-CS and IPSJ International Symposium on Applications and the Internet (SAINT 2010),The First Workshop on Company,Campus and Community Networking (C3NET 2010), pp.245-248 (2010).
  124. Yasushi Shinjo, Daisuke Kamikawa, Akira Sato: "Collaboration by Passing Access Rights for Personal Protected Web Resources", The 6th International Conference on Collaborative Computing: Networking,Applications and Worksharing (CollaborateCom 2010), 10 pages (2010).
  125. $B:4F#(B $BAo(B, $B9bED(B $B??8c(B, $BCf0f(B $B1{(B, $B?7>k(B $BLw(B: "$B1s3V%M%C%H%o!<%/@-G=!&5!G=?GCG%7%9%F%`$N9=A[(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2010-IOT-9-12, 5 pages (2010).
  126. $B9bED??8c!$6b;RD>Lp!$c7F#9d!$:4F#Ao!$?7>kLw!$Cf0f1{!$HDLn9N;0(B: "UPKI$BG'>ZO"7H4pHW$rMQ$$$?(BWeb$B%"%/%;%9@)8f(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2010-IOT-8-38, 6 pages (2010).
  127. Teruo Koyanagi, Yosuke Ozawa, and Yasushi Shinjo: "Generation of Specialized Cache Expiration Rules by Static Analysis of Workflows for Memory Reduction", IPSJ Transactions on Programming, Vol.3, No.2, pp.52-52 (2010).
  128. $BJ]EDk(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$B2>A[7W;;5!$K$*$1$k%=%1%C%H%"%&%H%=!<%7%s%0$K$h$k(B $B%*!<%P%l%$%M%C%H%o!<%/$NMxMQ(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2010),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2010).
  129. $B9bED(B $B??8c(B, $B:4F#(B $BAo(B, $B?7>k(B $BLw(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$BG'>Z%G%P%$%9$rMQ$$$?(BOS$B$N5/F0!&=*N;@)8f(B", $B>pJs=hM}3X2qO@J8;o(B, Vol.50, No.3, pp.1043-1052 (2009).
  130. $BGO^<=<7<(B, $BCSEh=S(B, $B@n:j?N;L(B, $B5HLn=cJ?(B, $B>>0f7E8g(B, $B?7>kLw(B, $B:4F#Ao(B, $B>e@nBg2p(B, $B2CF#OBI'(B: "CaStor$B!'(BWeb$B;q8;$KBP$9$k%1!<%Q%S%j%F%#$N4IM}!&G[I[$r9T$&(BWeb$B%5!<%P(B", $B>pJs=hM}3X2qO@J8;o(B, Vol.50, No.8, pp.1856-1869 (2009).
  131. Peter Suranyi, Yasushi Shinjo, and Kazuhiko Kato: "Name-based Address Mapping for Virtual Private Network", IEICE Trans, Vol.E92-B, No.01, pp.200-208 (2009).
  132. Hideki Eiraku, Yasushi Shinjo, Calton Pu, Younggyun Koh, Kazuhiko Kato: "Fast Networking with Socket-Outsourcing in Hosted Virtual Machine Environments", ACM Symposium on Applied Computing (SAC2009), pp.310-317 (2009).
  133. Yasushi Shinjo, Keigo Matsui, Takuya Sugimoto, and Akira Sato: "An Anti-Spam Scheme Using Capability-Based Access Control", 5th IEEE LCN Workshop on Security in Communication Networks (SICK) (SICK 2009), pp.907-914 (2009).
  134. Younggyun Koh, Calton Pu, Yasushi Shinjo, Hideki Eiraku, Go Saito, Daiyuu Nobori: "Improving Virtualized Windows Network Performance by Delegating Network Processing", The 8th IEEE International Symposium on Network Computing and Applications (IEEE NCA09), pp.203-210 (2009).
  135. Takahiro Shinagawa, Hideki Eiraku, Kouichi Tanimoto,Kazumasa Omote, Syoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai, Yoshihiro Ohyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato: "BitVisor: A Thin Hypervisor for Enforcing I/O Device Security", The 2009 ACM International Conference on Virtual Execution Environments, pp.121-130 (2009).
  136. $BK-2,(B $BBs(B, $B?7>k(B $BLw(B, $BsnF#(B $B9d(B: "$B%[%9%H7?2>A[7W;;5!4D6-$K$*$1$k%U%!%$%kF~=PNO$N(BVFS$B%"%&%H%=!<%7%s%0$K$h$k9bB.2=(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2009), pp.33-40 (2009).
  137. $BGO^<=<7<(B, $B>.Bt7r;K(B, $B9bED??8c(B, $BK-2,Bs(B, $B>>0f7E8g(B, $B:4F#Ao(B, $B?7>kLw(B, $B2CF#OBI'(B: "$B;}$A9~$_(B PC $B$rBP>]$H$7$?%M%C%H%o!<%/MxMQ5v2D8"8B$N0Q>y$r2DG=$K$9$k%"%/%;%9@)8f%a%+%K%:%`$NpJs=hM}3X2q8&5f2qJs9p(B2009-IOT-004-31, pp.179-184 (2009).
  138. $B8M:W(B $BMW(B, $B>.Bt7r;K(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$B2>A[7W;;5!$K$*$1$k%a%b%j4IM}$N%"%&%H%=!<%7%s%0$NDs0F(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2009),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2009).
  139. $B?eLn(B $B5.;K(B, $BK-2,(B $BBs(B, $B>.Bt(B $B7r;K(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$B2>A[7W;;5!$K$*$1$k(BFreeBSD$B$N%U%!%$%k%7%9%F%`$N%"%&%H%=!<%7%s%0(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2009),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2009).
  140. $BBg66(B $B9(k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$B2>A[7W;;5!$K$*$1$k%=%1%C%H%"%&%H%=!<%7%s%0$K$h$k(BIPv4/IPv6$B%H%i%s%9%l!<%?(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2009),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2009).
  141. $B>>K\(B $BCR(B, $B:4F#(B $BAo(B, $B?7>k(B $BLw(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B, $B@5B<(B $BM:2p(B, $B5HED(B $B7r0l(B: "$B%;%C%7%g%s>pJs$rMQ$$$?%H%i%U%#%C%/$N2r@O$K4X$9$k8&5f(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2009),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2009).
  142. $B9bED??8c(B, $B:4F#Ao(B, $B?7>kLw(B, $BCf0f1{(B, $BHDLn9N;0(B: "$BG'>Z%G%P%$%9$rMQ$$$?(BOS $B$N5/F0!&=*N;@)8f%7%9%F%`$K$*$1$k5/F0;~4V$NC;=L(B", $B>pJs=hM}3X2q8&5f2qJs9p(B 2009-IOT-004-27, pp.155-160 (2009).
  143. $B0$GHO"(B $BNI>0(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$B%[%9%H6(D4$K$h$k(BSSH$B%Q%9%o!<%IAmEv$?$j967b$NKI8f(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2009),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2009).
  144. $B8E66(B $BDgG7(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$B8zN(E*$JB?8@8l4V%*%V%8%'%/%H8r49pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2009),$B%]%9%?!<%;%C%7%g%s(B, 2 pages (2009).
  145. $B?7>kLw(B, $B9b66M3D>(B: "$B2>A[7W;;5!$K$*$1$kF~=PNOL?Na$N0l3g=hM}$K$h$kF~=PNO$N9bB.2=(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2009-OS-111-13, 8 pages (2009).
  146. Mitsuhiro Mabuchi, Yasushi Shinjo, Akira Sato, and Kazuhiko Kato: "An Access Control Model for Web-Services that Supports Delegation and Creation of Authority", The 7th International Conference on Networking (ICN'08), pp.213-222 (2008).
  147. $B>>;3(B $BC]k(B $BLw!$:4F#(B $BAo!$Cf0f(B $B1{!$HDLn(B $B9N;0(B: "$B%U%!%$%k$N@$Be4IM}$K$h$k>pJsN.@)8f$NDs0F(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2008),$B%]%9%?!<%;%C%7%g%s(B (2008).
  148. $BGO^<=<7<(B, $BCSEh=S(B, $B@n:j?N;L(B, $B5HLn=cJ?(B, $B>>0f7E8g(B, $B?7>kLw(B,$B:4F#Ao(B, $B2CF#OBI'(B: "$B4{B8$N(BWeb$B;q8;$KBP$9$k%1!<%Q%S%j%F%#$N4IM}!&G[I[$r9T$&%5!<%P$NpJs=hM}3X2q8&5f2qJs9p(B2008-OS-107-6, pp.41-48 (2008).
  149. $B;3K\M*Je(B, $B?7>kLw(B, $B\F\[1QA[7W;;5!$K$*$1$k%G%P%$%9%(%_%e%l!<%7%g%s$NFC2=$K$h$k9bB.2=(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2008-OS-107-14, pp.103-110 (2008).
  150. $B;3K\M*Je!$?7>k!!Lw!$\F\[1QA[7W;;5!$K$*$1$k%G%P%$%9%(%_%e%l!<%7%g%s$NItJ,I>2A$rMQ$$$?9bB.2=(B", $BBh(B70$B2s>pJs=hM}3X2qA49qBg2q9V1iO@J8=8(B,1P-1 (2008).
  151. $B9b66M3D>!$?7>k!!Lw!$\F\[1QA[7W;;$N9bB.2=(B", $BBh(B70$B2s>pJs=hM}3X2qA49qBg2q9V1iO@J8=8(B,1P-2 (2008).
  152. $B8^L@>-9,!$?7>k!!Lw!$Gr@P8wN4!$:4F#!!Ao!$Cf0f!!1{!$HDLn9N;0(B: "$B6(D47?2>A[7W;;5!$K$*$1$k%[%9%H8F$S=P$75!9=(B", $BBh(B70$B2s>pJs=hM}3X2qA49qBg2q9V1iO@J8=8(B,1P-6 (2008).
  153. $BGr@P8wN4!$?7>k!!Lw!$8^L@>-9,!$HDLn9N;0!$:4F#!!Ao!$Cf0f!!1{(B: "$B6(D47?2>A[7W;;5!$N$?$a$NFs=E(BOS$B%7%'%k(B", $BBh(B70$B2s>pJs=hM}3X2qA49qBg2q9V1iO@J8=8(B,1P-7 (2008).
  154. $BK-2,!!Bs!$?7>k!!Lw!$:4F#!!Ao!$Cf0f!!1{!$HDLn9N;0(B: "$B2>A[7W;;5!$N%2%9%H(BOS$B$K$*$1$k%U%!%$%k%"%/%;%9$KBP$9$k9b?e=`%j%s%/$NpJs=hM}3X2qA49qBg2q9V1iO@J8=8(B,1P-8 (2008).
  155. $BEP!!BgM7!$2CF#OBI'!$?7>k!!Lw!$HDLn9N;0!$:4F#!!Ao!$Cf0f!!1{(B: "PC$B>e$GF0:n$9$k%9%1!<%i%V%k$J(BIP$B%M%C%H%o!<%/pJs=hM}3X2qA49qBg2q9V1iO@J8=8(B,1Y-8 (2008).
  156. $B9bED??8c!$:4F#!!Ao!$?7>k!!Lw!$Cf0f!!1{!$HDLn9N;0(B: "USB$B%H!<%/%sG'>Z$rMQ$$$?(BOS$B$N0BA4$J5/F0@)8f(B", $BBh(B70$B2s>pJs=hM}3X2qA49qBg2q9V1iO@J8=8(B,2Y-7 (2008).
  157. $B?yK\Bn:H!$?7>k!!Lw!$>>0f7E8g!$:4F#!!Ao!$Cf0f!!1{!$HDLn9N;0(B: "$BEE;R%a!<%k$KBP$9$k%1!<%Q%S%j%F%#$K4p$E$/%"%/%;%9@)8f$NpJs=hM}3X2qA49qBg2q9V1iO@J8=8(B,3ZB-1 (2008).
  158. $B>>0f7E8g!$?7>k!!Lw!$?yK\Bn:H!$:4F#!!Ao!$Cf0f!!1{!$HDLn9N;0(B: "$B%1!<%Q%S%j%F%#$K4p$E$/%"%/%;%9@)8f$N$?$a$N%1!<%Q%S%j%F%#4IM}5!9=(B", $BBh(B70$B2s>pJs=hM}3X2qA49qBg2q9V1iO@J8=8(B,3ZB-2 (2008).
  159. Syahir Ahmad$B!$(BYasushi Shinjo, Kozu Itano, Akira Sato, and Hisashi Nakai: "An Internet File-system for Random-access to protected data", The 70th National Convention of IPSJ (Information Processing Society of Japan),5Y-4 (2008).
  160. $B9bED??8c(B, $B:4F#Ao(B, $B?7>kLw(B, $BCf0f1{(B, $BHDLn9N;0(B: "$BG'>Z%G%P%$%9$rMQ$$$?(BOS $B$N0BA4$J5/F0@)8f(B", $B>pJs=hM}3X2q8&5f2qJs9p(B 2008-IOT-001-14, Vol.2008, No.37, pp.77-82 (2008).
  161. $BIJ@n9bW"(B, $B\F\[1Q=0l(B, $BJ]M}9>9b;V(B, $BJ?Ln3X(B, $B8wMh7r0l(B, $BBg;37C90(B, $B2O9g1I<#(B, $B2OLn7rFs(B, $B@iMU<"(B, $B?7>kLw(B, $B2CF#OBI'(B: "$B=`%Q%9%9%k!<7?2>A[%^%7%s%b%K%?(BBitVisor$B$N@_7W$HpJs=hM}3X2q8&5f2qJs9p(B2008-OS-109-10, pp.69-76 (2008).
  162. $BGr@P(B $B8wN4!$?7>k(B $BLw!$8^L@(B $B>-9,!$:4F#(B $BAo(B, $BCf0f(B $B1{(B, $BHDLn(B $B9N;0(B: "$B6(D47?2>A[7W;;5!$K$*$1$k%[%9%H(BOS$B$N%U%!%$%k$X$N%"%/%;%9(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2008),$B%]%9%?!<%;%C%7%g%s(B (2008).
  163. $BsnF#(B $B9d!$?7>k(B $BLw!$\F\[(B $B1QA[7W;;5!$K$*$1$k%"%&%H%=!<%7%s%0$N$?$a$N%2%9%H(B-$B%[%9%H4V(BRPC", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2008),$B%]%9%?!<%;%C%7%g%s(B (2008).
  164. $B6b;R(B $BD>Lp!$?7>k(B $BLw!$:4F#(B $BAo!$Cf0f(B $B1{!$HDLn(B $B9N;0(B: "$B%$%s%9%?%s%H%a%C%;%s%8%c$rMQ$$$?%M%C%H%o!<%/%U%!%$%k%7%9%F%`$NpJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2008),$B%]%9%?!<%;%C%7%g%s(B (2008).
  165. $B>.Bt(B $B7r;K!$@FF#(B $B9d!$\F\[(B $B1Qk(B $BLw!$:4F#(B $BAo!$Cf0f(B $B1{!$HDLn(B $B9N;0(B: "$B%[%9%H7?2>A[7W;;5!$K$*$1$k%?%$%^@:EY8~>epJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2008),$B%]%9%?!<%;%C%7%g%s(B (2008).
  166. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato and Kozo Itano: "Capability-based Egress Network Access Control by using DNS Server ", Journal of Network and Computer Applications (JNCA),Elsevier, Vol.30, No.4, pp.1275-1282 (2007).
  167. $B>>0f(B $B7E8g(B, $B:4F#(B $BAo(B, $B?7>k(B $BLw(B, $BHDLn(B $B9N;0(B, $BGO^<=<7<(B, $B2CF#OBI'(B: "Web $B%Z!<%8$KBP$9$k%1!<%Q%S%j%F%#$rMQ$$$?%"%/%;%9@)8f$N%W%m%-%7$K$h$kpJs=hM}3X2q8&5f2qJs9p(B2007-OS-105-13, pp.95-102 (2007).
  168. $B\F\[(B $B1Qk(B $BLw(B, $B2CF#(B $BOBI'(B: "$B%+!<%M%k!&%l%Y%k!&%3!<%I$K$h$k%f!<%6!&%l%Y%k(BVMM$B$N0\?"@-$N8~>e(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2007-OS-104-03, pp.17-24 (2007).
  169. $BBgLZ(B $B70(B, $B?7>k(B $BLw(B, $B:4F#(B $BAo(B,$BHDLn(B $B9N;0(B, $BGO^<(B $B=<7<(B: "XML Web$B%5!<%S%9$N$?$a$NJ,;67?%*%Z%l!<%F%#%s%0!&%7%9%F%`(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2007-OS-104-10, pp.67-74 (2007).
  170. $B8^L@(B $B>-9,!$?7>k(B $BLw!$Gr@P(B $B8wN4!$:4F#(B $BAo!$Cf0f(B $B1{!$HDLn(B $B9N;0!!(B: "$B%[%9%H(BOS$B$H6(D4$7$FF0:n$9$k2>A[7W;;5!$NDs0F(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2007),$B%]%9%?!<%;%C%7%g%s(B (2007).
  171. $BGO^<(B $B=<7<(B, $B?7>k(B $BLw!$:4F#(B $BAo(B, $BBgLZ(B $B70(B, $B2CF#(B $BOBI'(B: "$B%1!<%Q%S%j%F%#4p$E$/%"%/%;%9@)8f$r;}$D%9%1%8%e!<%k4IM}%"%W%j%1!<%7%g%s$N%/%i%$%"%s%H(B", $BF|K\%=%U%H%&%'%"2J3X2qBh(B10$B2s%W%m%0%i%_%s%0$*$h$S1~MQ$N%7%9%F%`$K4X$9$k%o!<%/%7%g%C%W(B(SPA X),$B%]%9%?!<%;%C%7%g%s(B (2006).
  172. $BDMED(B $B9'B@O:!$?7>k(B $BLw!$:4F#(B $BAo!$5\CO(B $BNO!$HDLn(B $B9N;0(B: "$B$f$k$$F14|$H$$$&35G0$K4p$E$/O"B3%a%G%#%"1iAU%W%m%0%i%`$NF14|pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2006),$B%]%9%?!<%;%C%7%g%s(B (2006).
  173. $B>>0f(B $B7E8g!$?7>k(B $BLw!$:4F#(B $BAo!$HDLn(B $B9N;0(B: "Web$B%Z!<%8$KBP$9$k%1!<%Q%S%j%F%#$rMQ$$$?%"%/%;%9@)8f(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2006),$B%]%9%?!<%;%C%7%g%s(B (2006).
  174. $BBgLZ(B $B70!$?7>k(B $BLw!$:4F#(B $BAo!$HDLn(B $B9N;0!$GO^<(B $B=<90(B: "XML Web$B%5!<%S%9$N$?$a$NJ,;6(BOS", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2006),$B%]%9%?!<%;%C%7%g%s(B (2006).
  175. $BGO^<(B $B=<7<(B, $B?7>k(B $BLw!$2CF#(B $BOBI'(B: "$B%1!<%Q%S%j%F%#$K4p$E$/%"%/%;%9@)8f$r;}$D%9%1%8%e!<%k4IM}%"%W%j%1!<%7%g%s(B", $BF|K\%=%U%H%&%'%"2J3X2qBh(B9$B2s%W%m%0%i%_%s%0$*$h$S1~MQ$N%7%9%F%`$K4X$9$k%o!<%/%7%g%C%W(B(SPA 2006),$B%]%9%?!<%;%C%7%g%s(B (2006).
  176. $BGO^<(B $B=<7<(B, $B?7>k(B $BLw!$BgLZ(B $B70(B, $B2CF#(B $BOBI'(B: "$B%1!<%Q%S%j%F%#$K4p$E$/%"%/%;%9@)8f$r;}$D%9%1%8%e!<%k4IM}%"%W%j%1!<%7%g%s$N9=A[(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2006-OS-102-02, pp.9-16 (2006).
  177. Yasushi Shinjo and Calton Pu: "Achieving Efficiency and Portability in Systems Software: A Case Study on POSIX-Compliant Multithreaded Programs", IEEE Transactions on Software Engineering, Vol.31, No.9, pp.785-800 (2005).
  178. Peter Suranyi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, and Kazuhiko Kato: "General Virtual Hosting via Lightweight User-mode Virtualization", IEEE-CS and IPSJ International Symposium on Applications and the Internet (SAINT 2005), pp.229-236 (2005).
  179. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato and Kozo Itano: "Name-Level Approach for Egress Network Access Control", The 4th IEEE International Conference on Networking (ICN'05), pp.284-296 (2005).
  180. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato and Kozo Itano: "Capability-based Egress Network Access Control for Transferring Access Rights", The International Conference on Information Technology and Applications (ICITA-2005), pp.488-495 (2005).
  181. Yasushi Shinjo: "Capability-based Access Control for Networks with DNS", The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP05),Poster Session, pp.1-1 (2005).
  182. Suranyi Peter$B!$(B Shinjo Yasushi$B!$(B Abe Hirotake$B!$(BKato Kazuhiko: "System Support for Software Updates on Virtual Private Servers", IPSJ Computer System Symposium (ComSys2005), pp.21-28 (2005).
  183. $B:#N$(B $BK.IW!$?7>k(B $BLw!$NkLZ(B $B??0l!$HDLn(B $B9N;0!$2CF#(B $BOBI'(B: "$B%a%C%;!<%8$N5-O?$H:F@8$K$h$k%$%s%?!<%M%C%H%(%_%e%l!<%7%g%s$NpJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2005), pp.65-72 (2005).
  184. $B>>K\(B $B9-;V!$?7>k(B $BLw!$5\CO(B $BNO(B: "$BF02hA|%9%H%j!<%`$KBP$9$k%1!<%Q%S%j%F%#$K4p$E$/%"%/%;%9@)8f(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2005),$B%]%9%?!<%;%C%7%g%s(B (2005).
  185. $B\F\[(B $B1Qk(B $BLw!$2CF#(B $BOBI'(B: "$BJ#9g%O%$%Q%P%$%6$K$h$k2>A[7W;;5!$N9bB.2=(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2005),$B%]%9%?!<%;%C%7%g%s(B (2005).
  186. Yasushi Shinjo: "An Access Control Mechanism for SetNS, a Name Service based on Set of Symbols", European Japanese Conference on Information Modeling and Knowledge Bases, pp.305-314 (2004).
  187. $B>.AR(B $BE/>k(B $BLw!$N)KY(B $BF;><(B: "DOM$B%W%m%0%i%`$+$i(BSAX$B%W%m%0%i%`$X$N<+F0JQ49(B", $BF|K\%=%U%H%&%'%"2J3X2qBh(B7$B2s%W%m%0%i%_%s%0$*$h$S1~MQ$N%7%9%F%`$K4X$9$k%o!<%/%7%g%C%W(B (2004).
  188. $B?7>kLw(B: "XML Web $B%5!<%S%9$N$?$a$NBg0hE*%a!<%k!&%U%!%$%k!&%7%9%F%`(B", $BF|K\%=%U%H%&%'%"2J3X2qBh(B3$B2s%W%m%0%i%_%s%0$*$h$S1~MQ$N%7%9%F%`$K4X$9$k%5%^!<%o!<%/%7%g%C%W(B(SPA-Summer 2004),$B%]%9%?!<%;%C%7%g%s(B (2004).
  189. $BNkLZ??0l(B, $B:#N$K.IW(B, $B?7>kLw(B, $BHDLn9N;0(B: "$B4{B8$N%U%!%$%k%7%9%F%`$H?FOB@-$N9b$$@$3&(BOS$B$N(BLinux Kernel$B$K$*$1$k $B:#N$K.IW(B, $BNkLZ??0l(B, $B?7>kLw(B, $BHDLn9N;0(B: "$BF0E*%j%s%/$H%Q%1%C%H%U%#%k%?$rMQ$$$?@$3&(BOS $B$N%M%C%H%o!<%/5!G=$N $B?7>k(B $BLw(B, $B0$It!!Ao(B, $BHDLn(B $B9N;0(B: "XML Web $B%5!<%S%9$N$?$a$NBg0hE*%U%!%$%k!&%5!<%S%9$NDs0F(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2004-OS-96-03, pp.15-22 (2004).
  190. Legendre Arnaud and Yasushi Shinjo: " Implementation of Mediators for XML Web Services", Japan Society for Software Science and Technology (JSSST) The Third Summer Workshop on Systems for Programming and Applications (SPA-Summer 2004),Poster Session (2004).
  191. $B>.ARE/><(B, $B?7>k(B $BLw!$N)KY(B $BF;><(B: "$B@)8B$5$l$?(BDOM$B%W%m%0%i%`$+$i(BSAX$B%W%m%0%i%`$X$N<+F0JQ49(B $B$K$*$1$k=PNO@)8f(B", $BF|K\%=%U%H%&%'%"2J3X2qBh(B3$B2s%W%m%0%i%_%s%0$*$h$S1~MQ$N%7%9%F%`$K4X$9$k%5%^!<%o!<%/%7%g%C%W(B(SPA-Summer 2004),$B%]%9%?!<%;%C%7%g%s(B (2004).
  192. $B1|;39RJ?(B, $B?7>k(B $BLw!$HDLn(B $B9N;0(B: " Web$B%"%W%j%1!<%7%g%s$H@\B3;X8~%"%W%j%1!<%7%g%s$K$*$$$F%7%s%0%k%5%$%s%*%s$rZJ}<0(B", $BF|K\%=%U%H%&%'%"2J3X2qBh(B3$B2s%W%m%0%i%_%s%0$*$h$S1~MQ$N%7%9%F%`$K4X$9$k%5%^!<%o!<%/%7%g%C%W(B(SPA-Summer 2004),$B%]%9%?!<%;%C%7%g%s(B (2004).
  193. $B\F\[1Qk!!Lw(B, $B2CF#OBI'(B: "$B%f!<%6%l%Y%k(BOS$B$N$?$a$N%f!<%6%l%Y%k%M%C%H%o!<%/5!G=(B", $B>pJs=hM}3X2q(B $BBh(B3$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT 2004),B-028, pp.161-162 (2004).
  194. $B:#N$K.IW(B, $B?7>k!!Lw(B, $BNkLZ??0l(B, $BHDLn9N;0(B, $B2CF#OBI'(B: "$B%M%C%H%o!<%/%"%W%j%1!<%7%g%s$r%F%9%H$9$k$?$a$NDL?.5-O?:F@85!G=(B", $B>pJs=hM}3X2q(B $BBh(B3$B2s>pJs2J3X5;=Q%U%)!<%i%`(B (FIT 2004),B-032 (2004).
  195. $B\F\[(B $B1Qk(B $BLw(B, $B2CF#(B $BOBI'(B: "LilyVM: $B%f!<%6%l%Y%k(B OS $B$N$?$a$N7ZNL(B VM", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2004),$B%]%9%?!<%;%C%7%g%s(B (2004).
  196. $B1|;3(B $B9RJ?(B, $B?7>k(B $BLw(B, $BHDLn(B $B9N;0(B: "Web$B%"%W%j%1!<%7%g%s$*$h$S@\B3;X8~%"%W%j%1!<%7%g%s$NN>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2004),$B%]%9%?!<%;%C%7%g%s(B (2004).
  197. $B9>H+N49T(B, $B?7>k(B $BLw(B, $BHDLn(B $B9N;0(B: "$B;z7A%G!<%?$N6&M-$H>pJs8r49$,2DG=$JF0E*3HD%2DG=J8;z=89g(BDCS", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B(ComSys2004),$B%]%9%?!<%;%C%7%g%s(B (2004).
  198. Yasushi Shinjo, Toshiyuki Kubo, and Calton Pu: "Efficient Mediators with Closures for Handling Dynamic Interfaces in an Imperative Language", Information and Software Technology, Vol.46, No.5, pp.351-357 (2003).
  199. $BNkLZ??0l(B, $B?7>kLw(B, $B8wMh7r0l(B, $BHDLn9N;0(B, $B@iMU<"(B: "$B%f!<%68"8BJQ995!9=$rMxMQ$7$?0BA4$J%$%s%H%i%M%C%H%5!<%P$NpJs=hM}3X2qO@J8;o(B:$B%3%s%T%e!<%F%#%s%0%7%9%F%`(B(ACS), Vol.44, No.SIG10(ACS 2), pp.86-96 (2003).
  200. $B?7>kLw(B, $B@>Hx(B $B9n8J(B, $BHDLn9N;0(B: "SetNS : $B5-9f$N=89g$K4p$E$/L>A0%5!<%S%9(B", $B>pJs=hM}3X2qO@J8;o(B:$B%3%s%T%e!<%F%#%s%0%7%9%F%`(B(ACS), Vol.44, No.SIG 11(ACS 3), pp.201-214 (2003).
  201. $B;G7(B, $B?7>kLw(B, $BHDLn9N;0(B, $B@iMU<"(B: "$B%M%C%H%o!<%/$N4F;k5;=Q$rMQ$$$?%U%!%$%k99?7MzNrJ]B8%7%9%F%`$NpJs=hM}3X2qO@J8;o(B:$B%3%s%T%e!<%F%#%s%0%7%9%F%`(B(ACS), Vol.44, No.SIG10(ACS 2), pp.76-85 (2003).
  202. Yasushi Shinjo, Yoshinori Nakata, and Kozo Itano: "Securing RPC with a reference monitor", International Symposium on Software Security (ISSS 2003),Springer LNCS 3233, pp.262-280 (2003).
  203. Yasushi Shinjo, Toshiyuki Kubo, and Calton Pu: "Efficient Mediators through Dynamic Code Generation: a Method and an Experiment", The Eighteenth Annual ACM Symposium on Applied Computing (SAC 2003), pp.1147-1154 (2003).
  204. Hideki Eiraku and Yasushi Shinjo: "Running BSD Kernels as User Processes by Partial Emulation and Rewriting of Machine Instructions", USENIX BSDCon 2003 Conference (BSDCon'03), pp.91-102 (2003).
  205. $BBgDM(B $B5*;R(B,$B@iMU(B $B<"(B,$B?7>k(B $BLw(B,$BHDLn(B $B9N;0(B: "$B0BA4$J%b%P%$%k%(!<%8%'%s%H%7%9%F%`(B Flyingware $B$N$?$a$N2>A[%G%#%9%/$N $B\F\[(B $B1Qk(B $BLw(B: "$B5!3#8lL?Na$N@EE*$JJQ49$K$h$k%*%Z%l!<%F%#%s%0!&%7%9%F%`$N%f!<%6!&%W%m%;%9$H$7$F$N $B\F\[(B $B1Qk(B $BLw(B: "$B%f!<%6%l%Y%k(B BSD $B$N$?$a$N7ZNL(B VM", BSD Conference Japan 2003 (2003).
  206. $B1|;3(B $B9RJ?!$?7>k(B $BLw!$NkLZ(B $B??0l!$HDLn(B $B9N;0(B: "IPv6$B3HD%%X%C%@$rMQ$$$?IU2CE*$J%5!<%S%9$NDs6!(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2003-OS-93-10, pp.67-74 (2003).
  207. $B0$It!!Ao!$?7>k(B $BLw!$HDLn(B $B9N;0(B: "XML Web$B%5!<%S%9$N$?$a$N%3!<%k%P%C%/MQ%U%!%$%k%5!<%P(B", $B>pJs=hM}3X2q(B $B%3%s%T%e!<%?%7%9%F%`%7%s%]%8%&%`%]%9%?! $B@P0f(B $B9'1R(B, $B?7>k(B $BLw(B, $BHDLn(B $B9N;0(B: "$B%W%m%;%9%H%l!<%95!G=$rMQ$$$?@$3&(BOS$B$NpJs=hM}3X2qO@J8;o(B, Vol.43, No.6, pp.1702-1714 (2002).
  208. $B\F\[(B $B91B@O:(B, $B?7>k(B $BLw(B, $BHDLn(B $B9N;0(B: "$B%7%9%F%`!&%3!<%k$KBP$9$k%i%C%Q(B/$B%j%U%!%l%s%9!&%b%K%?(BSysGuard$B$N@_7W$HpJs=hM}3X2qO@J8;o(B, Vol.43, No.6, pp.1690-1701 (2002).
  209. Yasushi Shinjo, Kotaro Eiraku, Atsushi Suzuki, Kozo Itano, and Calton Pu: "Enhancing Access Control with SysGuard, a Reference Monitor Supporting Portable and Composable Kernel Module", IEEE 2002 Pacific Rim International Symposium on Dependable Computing (PRDC 2002), pp.167-176 (2002).
  210. $BBgDM(B $B5*;R(B,$B@iMU(B $B<"(B,$B?7>k(B $BLw(B,$BHDLn(B $B9N;0(B: "Flyingware: $B%P%$%H%3!<%IJQ49$K$h$k0BA4$J%(!<%8%'%s%H$N $BNkLZ(B $B??0l(B,$B8wMh(B $B7r0l(B,$B@iMU(B $B<"(B,$B?7>k(B $BLw(B,$BHDLn(B $B9N;0(B: "$B%/%i%$%"%s%H$N%f!<%6G'>Z>pJs$rMQ$$$?%5!<%P%W%m%;%9$N8"8BJQ995!9=(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2002-OS-89-11, Vol.2002, No.89, pp.79-86 (2002).
  211. $B?7>k(B $BLw(B, $BCfED(B $B5HK!(B, $BHDLn(B $B9N;0(B: "$B%7%9%F%`!&%3!<%k!&%l%Y%k$G$N(BRPC$B$KBP$9$k%"%/%;%9@)8f$N6/2=(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2002-OS-90-13, pp.95-102 (2002).
  212. $B@P0f(B $B9'1R!"?7>k(B $BLw!"HDLn(B $B9N;0(B: "$B%W%m%;%9%H%l!<%95!G=$rMQ$$$?@$3&(BOS$B$NpJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B, pp.89-96 (2001).
  213. $B;G7(B, $B?7>k(B $BLw(B, $B@iMU(B $B<"(B, $BHDLn(B $B9N;0(B: "$B%M%C%H%o!<%/$N4F;k$K$h$k%P%C%/%"%C%W%7%9%F%`$NpJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B, pp.57-64 (2001).
  214. $B\F\[(B $B91B@O:!"?7>k(B $BLw!"HDLn9N;0(B: "$B9b$$>pJs@8B8G=NO$rpJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B, pp.49-56 (2001).
  215. $B\F\[(B, $B?7>k(B, $BHuD^(B, $BCfED(B, $BHDLn(B: "$B9b$$>pJs@8B8G=NO$r $B?7>kLw(B, $B@>Hx9n8J(B, $BHDLn9N;0(B: "$B5-9f$N=89g$K4p$E$/L>A0%5!<%S%9(BSetNS $B$NpJs=hM}3X2q8&5f2qJs9p(B2001-OS-88-8 (SWoPP-2001), Vol.2001, No.78, pp.51-58 (2001).
  216. $B?7>k(B: "$B30It%W%m%0%i%`$H%-%c%C%7%s%0$rMxMQ$7$?BO@Q2DG=HFMQ%U%#%k%?!&%U%!%$%k!&%*%V%8%'%/%H$NpJs=hM}3X2qO@J8;o(B, Vol.41, No.6, pp.1708-1722 (2000).
  217. $B\F\[(B, $B?7>k(B, $BHDLn(B: "$B0LCV>pJs$rMxMQ$7$?%7%9%F%`!&%3!<%k!&%l%Y%k$N%"%/%;%9@)8f(B", $B>pJs=hM}3X2q8&5f2qJs9p(B2000-OS-84-29, Vol.2000, No.84, pp.213-220 (2000).
  218. Jun Sun, Yasushi Shinjo and Kozo Itano: "The Implementation of a Distributed File System Supporting the Parallel World Model", The Third International Workshop on Advanced Parallel Processing Technologies, pp.43-47 (1999).
  219. Yasushi Shinjo and Calton Pu: "Developing Correct and Efficient Multithreaded Programs with Thread-Specific Data and a Partial Evaluator", Work in Progress Session,17th ACM Symposium on Operating Systems Principles, 2 pages (1999).
  220. $B@P0f(B, $B?7>k(B, $B@>Hx(B, $BB9(B, $BHDLn(B: "$BJBNs@$3&%b%G%k$K4p$E$/#O#S$N%7%9%F%`%3!<%k%H%l!<%9$K$h$kpJs=hM}3X2q8&5f2qJs9p(B99-OS-81-15, Vol.99, No.81, pp.83-88 (1999).
  221. $B?7>k(B, $BB<>>(B: "$B5-9f$N=89g$K4p$E$/L>A0%5!<%S%9$NDs0F(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B, Vol.98, pp.9-16 (1998).
  222. Y.Shinjo and Y.Kiyoki: "A lightweight process facility supporting meta-level programming", Parallel Computing, Vol.22, No.11, pp.1429-1454 (1997).
  223. Y.Shinjo: "The World Wide Shell based on The Object-Stacking Model", The Worldwide Computing and Its Applications '97 (WWCA97), 16 pages (1997).
  224. $B?7>k!"B9(B: "$BJBNs@$3&%b%G%k$K4p$E$/%*%Z%l!<%F%#%s%0!&%7%9%F%`(B", $B>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B, Vol.97, pp.95-100 (1997).
  225. $BKLEg(B, $B?7>k(B, $B2'D9(B: "$B%*%V%8%'%/%H$NBO@Q%b%G%k$K4p$E$/H>F)L@%G%#%l%/%H%j!&%*%V%8%'%/%H(B", $BF|K\%=%U%H%&%'%"2J3X2qBh#1#32sBg2q(B,27-15-A3, pp.449-452 (1996).
  226. $BF#;^(B $BN49T(B, $B?7>k(B $BLw(B, $BHDLn(B $B9N;0(B: "$B%W%m%;%9$N%0%k!<%W2=$K$h$k%9%1%8%e!<%j%s%0$H%U%!%$%k$N%"%/%;%9@)8fJ}<0(B", $B>pJs=hM}3X2q(B $B8&5fJs9p(B 96-OS-74-35, pp.201-206 (1996).
  227. $B9BJ%(B, $B?7>k(B, $B2'D9(B: "$BAFN3EYEj5!E*=hM}$r;Y1g$9$k%*%Z%l!<%F%#%s%0!&%7%9%F%`$K$*$1$k%W%m%;%9@8@.$NJ}<0(B", $BF|K\%=%U%H%&%'%"2J3X2qBh#1#32sBg2q(B,26-14-C3, pp.241-244 (1996).
  228. $BJUEZL>(B, $BF#0f(B, $B?7>k(B, $B2'D9(B: "$B%F%l%U%)%s(BJJY$B$rMQ$$$?;~9o%5!<%P$N2A(B", $BF|K\%=%U%H%&%'%"2J3X2qBh#1#32sBg2q(B,25-15-A4, pp.85-89 (1996).
  229. Y.Shinjo, S.Zakimi and S.Kyan: "Object-Stacking in the World-Wide Web", IEEE 4th International Workshop on Object Orientation in Operating Systems (I-WOOOS'95), pp.210-219 (1995).
  230. Y.Shinjo: "Stackable Filter HTTP Objects", Fourth International World Wide Web Conference,Poster Session, pp.1-1 (1995).
  231. $B9BJ%(B, $B?7>k(B, $BaDbC(B, $B:,O)LC(B, $B4n20Ip(B, $B2'D9(B: "$BEj5!E*=hM}$r;Y1g$9$k%*%Z%l!<%F%#%s%0!&%7%9%F%`$K$*$1$k@$3&$H%W%m%;%9$NA`:n(B", $B>pJs=hM}3X2q8&5f2qJs9p(B95-OS-69-18, Vol.95, No.69, pp.103-108 (1995).
  232. $B4n@%(B, $B?7>k(B, $B4n20Ip(B: "$BO"7k2DG=%&%#%s%I%&!&%*%V%8%'%/%H(B", $B>pJs=hM}3X2q8&5f2qJs9p(B95-SE-102-23, Vol.95, No.11, pp.129-134 (1995).
  233. $BaDbC(B, $B?7>k(B, $B:,O)LC(B, $B9BJ%(B, $B4n20Ip(B, $B2'D9(B: "$BEj5!E*=hM}$r;Y1g$9$k%*%Z%l!<%F%#%s%0!&%7%9%F%`$K$*$1$k%U%!%$%k!&%7%9%F%`(B", $B>pJs=hM}3X2q8&5f2qJs9p(B95-OS-70-3, Vol.95, No.70, pp.17-24 (1995).
  234. $B:,O)LC(B, $BaD>k(B, $B?7>k(B, $B9BJ%(B, $B4n20Ip(B, $B2'D9(B: "$B@$3&$N(BDAG $B$rMxMQ$7$?Ej5!E*(Bmake $B$NpJs=hM}3X2q8&5f2qJs9p(B95-OS-70-4, Vol.95, No.70, pp.25-32 (1995).
  235. $B?7>k(B, $B@6LZ(B: "$BJBNs$*$h$SJ,;61~MQ%W%m%0%i%`$rBP>]$H$7$?J,;67?#O#S!!#R#e#S#C(B", $B>pJs=hM}3X2q3X2q;o>pJs=hM}(B, Vol.36, No.8, pp.721-725 (1995).
  236. $B?7>k(B: "The World-Wide Web$B$K$*$1$k%*%V%8%'%/%H$NBO@Q(B", JAIN Consortium $BBh(B6$B2s8&5f2q(B (1995).
  237. $BKLEg(B, $B?7>k(B, $B2'D9(B: "$B%*%V%8%'%/%H$NBO@Q%b%G%k$K4p$E$/9b5!G=%G%#%l%/%H%j!&%*%V%8%'%/%H(B", $B>pJs=hM}3X2q8&5f2qJs9p(B95-OS-69-19, Vol.95, No.69, pp.109-114 (1995).
  238. $B?7>k(B: "$B%U%!%$%k!&%7%9%F%`$K$*$1$k%*%V%8%'%/%H$NO"7k(B", $BF|K\%=%U%H%&%'%"2J3X2qBh#1#12s%*%V%8%'%/%H;X8~7W;;%o!<%/%7%g%C%W(BWOOC'95 (1995).
  239. Y.Shinjo, K.Onaga and Y.Kiyoki: "RPC and Rendezvous library with lightweight processes", 1994 Joint Technical Conference on Circuits/Systems,Computer and Communications (JTC-CSCC'94),B7-7, pp.995-1000 (1994).
  240. $B?7>k(B: "$B%*%V%8%'%/%H$NBO@Q!&O"7k%b%G%k(B", $BBh#62s>pJs=hM}3X2q%3%s%T%e!<%?%7%9%F%`!&%7%s%]%8%&%`(B, Vol.94, No.10, pp.31-38 (1994).
  241. $B?7>k(B, $B@6LZ(B: "$B7ZNL%W%m%;%9$rMxMQ$9$k1~MQ%W%m%0%i%`$N3+H/$H@-G=I>2A$N;Y1g(B", $B>pJs=hM}3X2q8&5f2qJs9p(B94-OS-62-5, Vol.94, No.13, pp.33-40 (1994).
  242. $BEgB^(B, $B?7>k(B, $B2'D9(B: "$B%*%V%8%'%/%H$NBO@Q%b%G%k$K4p$E$/4V@\%*%V%8%'%/%H$NpJs=hM}3X2q8&5f2qJs9p(B94-OS-65-15, Vol.94, No.64, pp.113-120 (1994).
  243. $B:,O)LC(B, $BaDbC(B, $B?7>k(B, $B4n20Ip(B, $B2'D9(B: "$BAFN3EYEj5!E*JBNs=hM}$r;Y1g$9$k%*%Z%l!<%F%#%s%0!&%7%9%F%`$N9=A[(B", SWoPP'94,$B>pJs=hM}3X2q8&5f2qJs9p(B94-ARC-107-12, Vol.94, No.66, pp.89-96 (1994).
  244. $B?7>k(B, $BIp@n(B, $B2'D9(B: "$B%*%V%8%'%/%H$NBO@Q!&O"7k%b%G%k$K4p$E$/%&%#%s%I%&!&%7%9%F%`(B", $B>pJs=hM}3X2qBh#4#82sA49qBg2q9V1iO@J8=8(B(5),2K-8,pp. (1994).
  245. $B?7>k(B: "$B%*%V%8%'%/%H$NBO@Q$HO"7k(B", $BF|K\%=%U%H%&%'%"2J3X2qBh#1#02s%*%V%8%'%/%H;X8~7W;;%o!<%/%7%g%C%W(BWOOC'94 Work in Progress Session (1994).
  246. $B?7>k(B, $B@6LZ(B: "$B2>A[%W%m%;%C%5$rDs6!$9$k%*%Z%l!<%F%#%s%0!&%7%9%F%`!&%+!<%M%k$N9=@.K!(B", $B>pJs=hM}3X2qO@J8;o(B, Vol.34, No.3, pp.478-488 (1993).
  247. Yasushi Shinjo,Yasushi Kiyoki: "The New Semantics Provided by an Object-Stacking Shell", Work in Progress Session,14th ACM Symposium on Operating Systems Principles, 2 pages (1993).
  248. $B4#It(B, $B?7>k(B, $B@6LZ(B: "$B%*%V%8%'%/%HBO@Q%b%G%k$K4p$E$/%U%!%$%k!&%5!<%P$NpJs=hM}3X2q8&5f2qJs9p(B93-OS-58, Vol.93, No.27, pp.9-16 (1993).
  249. Yasushi Shinjo,Yasushi Kiyoki: "A Shell and Generic Filter File Server Based on the Object-Stacking Model", IEEE 3rd International Workshop On Object-Orientation in Operating Systems (1993).
  250. $B?7>k(B, $B@6LZ(B: "$BJBNs%W%m%0%i%`$rBP>]$H$7$?7ZNL%W%m%;%9$NpJs=hM}3X2qO@J8;o(B, Vol.33, No.1, pp.64-73 (1992).
  251. Y.Shinjo and Y.Kiyoki: "Harmonizing a Distributed Operating System with Parallel and Distributed Applications", IEEE 1st International Symposium on High Performance Distributed Computing (HPDC-1), pp.114-123 (1992).
  252. Y.Shinjo and Y.Kiyoki: "The Object-Stacking Model for Structuring Object-Based Systems", IEEE 2nd International Workshop on Object Orientation in Operating Systems (I-WOOOS'92), pp.328-340 (1992).
  253. $B?7>k(B, $B@6LZ(B: "$B%*%V%8%'%/%H$NBO@Q$KE,$7$?#R#P#C%9%?%V@8@.4o(B", $B>pJs=hM}3X2qBh#4#42sA49qBg2q9V1iO@J8=8!J#4!K(B,2G-1, pp.15-16 (1992).
  254. $BJR>e(B, $B?7>k(B, $B@6LZ(B: "$BJBNs=hM}4D6-$KE,$7$?%W%m%;%9!&%5!<%P$HJBNs%7%'%k$NpJs=hM}3X2qBh#4#42sA49qBg2q9V1iO@J8=8(B,2G-2, pp.17-18 (1992).
  255. Y.Shinjo and Y.Kiyoki: "ReSC: A Distributed Operating System for Parallel and Distributed Applications", IEEE First International Conference on Parallel and Distributed Information Systems (PDIS), pp.171-171 (1991).
  256. $B?7>k(B: "$BJ,;67?#O#S!!#R#e#S#C$K$*$1$k%G!<%?%Y!<%9=hM}$N;Y1g(B", $BEE;R>pJsDL?.3X2q%G!<%?%Y!<%9%o!<%/%7%g%C%WO@J8=8(B, pp.118-123 (1991).
  257. $B?7>k(B, $B@6LZ(B: "$BJ,;67?%*%Z%l!<%F%#%s%0!&%7%9%F%`$K$*$1$k%*%V%8%'%/%H$NBO@Q(B", $B>pJs=hM}3X2qBh#4#22sA49qBg2q9V1iO@J8=8!J#4!K(B,3K-8, pp.15-16 (1991).
  258. Y.Shinjo and Y.Kiyoki: "Multiple Views of the ReSC Distributed Operating System", Workshop on Object Orientation in Operating Systems at OOPSLA/ECOOP'90 (0th I-WOOOS), 5 pages (1990).
  259. $B?7>k(B, $B@6LZ(B, $B1WED(B: "$BJBNs!&J,;6=hM}4D6-$rBP>]$H$7$?#O#S(B $B#R#e#S#C$K$*$1$kJ,;6%*%W%F%#%^%$%6(B", $B>pJs=hM}3X2qBh#4#02sA49qBg2q9V1iO@J8=8(B,5G-3 (1990).
  260. $B?7>k(B, $B@6LZ(B: "$B#R#e#S#C(B: $BJBNs%"%W%j%1!<%7%g%s$N$?$a$N%*%Z%l!<%F%#%s%0!&%7%9%F%`(B", $B>pJs=hM}3X2qBh#3#92sA49qBg2q9V1iO@J8=8(B,6P-2, pp.1247-1248 (1989).
  261. $B?7>k(B, $B@6LZ(B: "$B%G!<%?%Y!<%9$NJBNs=hM}$r;Y1g$9$k%*%Z%l!<%F%#%s%0!&%7%9%F%`$N4pK\5!G=(B", $B>pJs=hM}3X2q8&5f2qJs9p(B,89-OS-44,89-DBS-73 (1989).
  262. $B?7>k(B, $B@6LZ(B, $BN-(B, $B1WED(B: "$B%G!<%?%Y!<%9$*$h$SCN<1%Y!<%9$rBP>]$H$7$?%9%H%j!<%`;X8~7?JBNs=hM}7O$N6&M-%a%b%j!&%^%7%s>e$X$NpJs=hM}3X2q%"%I%P%s%9%H%G!<%?%Y!<%9%7%9%F%`!&%7%s%]%8%&%`O@J8=8(B, Vol.88, No.9, pp.117-126 (1988).
  263. $B?7>k(B: "$BL)7k9gJBNs=hM}%7%9%F%`>e$G%9%H%j!<%`;X8~7?4X781i;;=hM}$r$9$k:]$N;q8;3dEv$F(B", $BBh#2#12s>pJs=hM}3X2q $B?7>k(B, $BED8U(B, $B9bLn(B, $BJ!ED(B, $B4X(B: "$BJ,;6%7%9%F%`#A#g#o#r#a!]#I$N%f!<%64D6-(B", $B>pJs=hM}3X2qBh#3#62sA49qBg2q9V1iO@J8=8(B,4D-9, pp.325-326 (1988).

Last updated: 2025/04/18 18:21:38
Yasushi Shinjo / <yas@cs.tsukuba.ac.jp>