default search action
Hajime Tazaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c20]Kenichi Yasukata, Hajime Tazaki, Pierre-Louis Aublin:
Exit-Less, Isolated, and Shared Access for Virtual Machines. ASPLOS (3) 2023: 224-237 - [c19]Kenichi Yasukata, Hajime Tazaki, Pierre-Louis Aublin, Kenta Ishiguro:
zpoline: a system call hook mechanism based on binary rewriting. USENIX ATC 2023: 293-300 - 2021
- [c18]Hajime Tazaki, Akira Moroo, Yohei Kuga, Ryo Nakamura:
How to design a library OS for practical containers? VEE 2021: 15-28
2010 – 2019
- 2018
- [c17]Ryo Nakamura, Yuji Sekiya, Hajime Tazaki:
Grafting sockets for fast container networking. ANCS 2018: 15-27 - [c16]Viet-Hoang Tran, Hajime Tazaki, Quentin De Coninck, Olivier Bonaventure:
Voice-Activated Applications and Multipath TCP: A Good Match? TMA 2018: 1-6 - 2017
- [c15]Motomu Utsumi, Hajime Tazaki, Hiroshi Esaki:
/dev/stdpkt: A Service Chaining Architecture with Pipelined Operating System Instances in a Unix Shell. AINTEC 2017: 8-15 - 2016
- [e2]Thomas Henderson, Eric Gamess, Brian Swenson, Hajime Tazaki:
Proceedings of the Workshop on ns-3, WNS3 '16, Seattle, WA, USA, June 15-16, 2016. ACM 2016, ISBN 978-1-4503-4216-2 [contents] - 2015
- [e1]Nicola Baldo, Eric Gamess, Peter D. Barnes Jr., Hajime Tazaki:
Proceedings of the 2015 Workshop on ns-3, WNS3 '15, Barcelona, Spain, May 13-14, 2015. ACM 2015, ISBN 978-1-4503-3375-7 [contents] - 2014
- [j4]Daniel Câmara, Hajime Tazaki, Emilio Mancini, Thierry Turletti, Walid Dabbous, Mathieu Lacage:
DCE: Test the real code of your protocols and applications over simulated networks. IEEE Commun. Mag. 52(3): 104-110 (2014) - [c14]Daisuke Miyamoto, Takuji Iimura, Gregory Blanc, Hajime Tazaki, Youki Kadobayashi:
EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits. BADGERS@ESORICS 2014: 56-65 - [c13]Hajime Tazaki, Kazuya Okada, Yuji Sekiya, Youki Kadobayashi:
MATATABI: Multi-layer Threat Analysis Platform with Hadoop. BADGERS@ESORICS 2014: 75-82 - [c12]Takuji Iimura, Daisuke Miyamoto, Hajime Tazaki, Youki Kadobayashi:
NECOMAtter: curating approach for sharing cyber threat information. CFI 2014: 19:1-19:2 - [c11]Emilio Pasquale Mancini, Hardik Soni, Thierry Turletti, Walid Dabbous, Hajime Tazaki:
Demo abstract: realistic evaluation of kernel protocols and software defined wireless networks with DCE/ns-3. MSWiM 2014: 335-337 - [c10]Thanasis Petsas, Kazuya Okada, Hajime Tazaki, Gregory Blanc, Pawel Pawlinski:
A Trusted Knowledge Management System for Multi-layer Threat Analysis. TRUST 2014: 214-215 - 2013
- [c9]Hajime Tazaki, Frédéric Urbani, Emilio Mancini, Mathieu Lacage, Daniel Câmara, Thierry Turletti, Walid Dabbous:
Direct code execution: revisiting library OS architecture for reproducible network experiments. CoNEXT 2013: 217-228 - [c8]Hajime Tazaki, Emilio Mancini, Daniel Câmara, Thierry Turletti, Walid Dabbous:
MSWIM demo abstract: direct code execution: increase simulation realism using unmodified real implementations. MOBIWAC 2013: 29-32 - [c7]Hajime Tazaki, Frédéric Urbani, Thierry Turletti:
DCE cradle: simulate network protocols with real stacks for better realism. SimuTools 2013: 153-158 - 2012
- [c6]Hajime Tazaki, Rodney Van Meter, Ryuji Wakikawa, Noriyuki Shigechika, Keisuke Uehara, Jun Murai:
Floating ground architecture: overcoming the one-hop boundary of current mobile internet. ANCS 2012: 187-198 - [c5]Ved P. Kafle, Ruidong Li, Hajime Tazaki, Hiroaki Harai:
Network mobility management in HIMALIS architecture of future networks. GLOBECOM Workshops 2012: 998-1003 - [c4]Kenji Fujikawa, Hajime Tazaki, Hiroaki Harai:
Inter-AS Locator Allocation of Hierarchical Automatic Number Allocation in a 10, 000-AS Network. SAINT 2012: 68-73 - [c3]Hajime Tazaki, Hitoshi Asaeda:
DNEmu: Design and Implementation of Distributed Network Emulation for Smooth Experimentation Control. TRIDENTCOM 2012: 162-177 - 2011
- [j3]Hajime Tazaki, Rodney Van Meter, Ryuji Wakikawa, Keisuke Uehara, Jun Murai:
NAT-MANEMO: Route Optimization for Unlimited Network Extensibility in MANEMO. Inf. Media Technol. 6(2): 610-620 (2011) - [j2]Hajime Tazaki, Rodney Van Meter, Ryuji Wakikawa, Keisuke Uehara, Jun Murai:
NAT-MANEMO: Route Optimization for Unlimited Network Extensibility in MANEMO. J. Inf. Process. 19: 118-128 (2011) - 2010
- [j1]Hajime Tazaki, Rodney Van Meter, Ryuji Wakikawa, Thirapon Wongsaardsakul, Kanchana Kanchanasut, Marcelo Dias de Amorim, Jun Murai:
MANEMO Routing in Practice: Protocol Selection, Expected Performance, and Experimental Evaluation. IEICE Trans. Commun. 93-B(8): 2004-2011 (2010)
2000 – 2009
- 2009
- [c2]Hajime Tazaki, Rodney Van Meter, Ryuji Wakikawa, Thirapon Wongsaardsakul, Kanchana Kanchanasut, Marcelo Dias de Amorim, Jun Murai:
Selecting an appropriate routing protocol for in-field MANEMO experiments. PE-WASUN 2009: 101-107 - 2008
- [c1]Kanchana Kanchanasut, Thirapon Wongsaardsakul, Manutsiri Chansutthirangkool, Anis Laouiti, Hajime Tazaki, Khandakar Rashedul Arefin:
DUMBO II: a V-2-I emergency network. AINTEC 2008: 37-38
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint