Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvement of message communication in concurrent logic language., , , , , and . PASCO, page 156-164. ACM, (1997)Address Order Violation Detection with Parallel Counting Bloom Filters., , , and . IEICE Trans. Electron., 98-C (7): 580-593 (2015)Low-Overhead Architecture for Security Tag., , , , and . PRDC, page 135-142. IEEE Computer Society, (2009)String-Wise Information Flow Tracking against Script Injection Attacks., , , and . PRDC, page 169-176. IEEE Computer Society, (2009)Base Address Recognition with Data Flow Tracking for Injection Attack Detection., , , , , , and . PRDC, page 165-172. IEEE Computer Society, (2006)A Technique to Eliminate Redundant Inter-Processor Communication on Parallelizing Compiler TINPAR., , , , , , and . Int. J. Parallel Program., 27 (2): 97-109 (1999)FXA: Executing Instructions in Front-End for Energy Efficiency., , , and . IEICE Trans. Inf. Syst., 99-D (4): 1092-1107 (2016)Low-Complexity Bypass Network Using Small RAM., , , , , and . CDES, page 153-159. CSREA Press, (2008)Efficient Goal Scheduling in Concurrent Logic Language using Type-Based Dependency Analysis., , , , , and . ASIAN, volume 1345 of Lecture Notes in Computer Science, page 268-282. Springer, (1997)An Analysis and a Solution of False Conflicts for Hardware Transactional Memory., , , , , and . ICECS, page 529-532. IEEE, (2018)