- Advanced Software Engineering Methodologies
- Software Engineering Research
- Logic, programming, and type systems
- Software System Performance and Reliability
- Service-Oriented Architecture and Web Services
- Parallel Computing and Optimization Techniques
- Model-Driven Software Engineering Techniques
- Advanced Data Storage Technologies
- Distributed and Parallel Computing Systems
- Distributed systems and fault tolerance
- Real-Time Systems Scheduling
- Software Engineering Techniques and Practices
- Cloud Computing and Resource Management
- Security and Verification in Computing
- Embedded Systems Design Techniques
- Acute Myeloid Leukemia Research
- Scientific Computing and Data Management
- Formal Methods in Verification
- Network Security and Intrusion Detection
- Software Testing and Debugging Techniques
- Hematopoietic Stem Cell Transplantation
- Caching and Content Delivery
- Advanced Malware Detection Techniques
- Myeloproliferative Neoplasms: Diagnosis and Treatment
- Lymphoma Diagnosis and Treatment
University of Tsukuba
1998-2025
Mito Saiseikai General Hospital
2025
University of Tsukuba Hospital
2022-2025
The University of Tokyo
2013-2022
Bunkyo University
2022
Ibaraki Prefectural Central Hospital
2022
Tsukuba International University
2022
Imperial College London
2019
NTT (Japan)
2016
Technical University of Darmstadt
2014
This paper presents a metaobject protocol (MOP) for C++. MOP was designed to bring the power of meta-programming C++ programmers. It avoids penalties on runtime performance by adopting new meta-architecture in which metaobjects control compilation programs instead being active during program execution. allows be used implement libraries efficient, transparent language extensions.
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous components providing virtual hardware devices and sharing protecting system resources among machines (VMs), enlarging the code size of reducing reliability VMMs.This paper introduces hypervisor architecture, called parapass-through, designed to minimize hypervisors by allowing most I/O access from guest operating (OS)...
In this paper, a virtual distributed monitoring environment called HyperSpector is described that achieves secure intrusion detection in computer systems. While multiple systems (IDSes) can protect system from attackers, they increase the number of insecure points protected system. overcomes problem without any additional hardware by using virtualization to isolate each IDS servers it monitors. The IDSes are located machine an VM and server VM. VMs among different hosts connected network. To...
This paper presents our extension to AspectJ for distributed computing. Although allows Java developers modularize a crosscutting concern as an aspect, this shows that some concerns in computing are not modularized simple aspects. Rather, aspects modularizing such tend be code spread over multiple hosts and explicitly communicated across the network. illustrates fact with example of testing program written RMI. To address complexity caused by network communication, proposes The language...
Clone detection across programs written in the same programming language has been studied extensively literature. On contrary, task of detecting clones multiple languages not as much, and approaches based on comparison cannot be directly applied. In this paper, we present a clone method semi-supervised machine learning designed to detect with similar syntax. Our uses an unsupervised approach learn token-level vector representations LSTM-based neural network predict whether two code fragments...
Background: The administration of eltrombopag, used to restore low blood count, demonstrates a positive interference bilirubin levels when analyzed through the diazo assay. However, research on measurements using other methods is limited. Therefore, an enzymatic assay, this study aimed investigate effect serum eltrombopag in patients with aplastic anemia. It further assessed concentration-dependent and vanadate oxidation assays. Methods: Total conjugated concentrations measured assay were...
Abstract Peripheral T-cell lymphoma (PTCL) exhibits a diverse clinical spectrum, necessitating methods to categorize patients based on genomic abnormalities or tumor microenvironment (TME) profiles. We conducted an integrative multiomics study in 129 PTCL patients, performing whole-exome sequencing and identifying three genetic subtypes: C1, C2, C3. C2 was characterized by loss of suppressor genes chromosomal instability, while C1 C3 shared T follicular helper (TFH)-related alterations, with...
As server consolidation using virtual machines (VMs) is carried out, software aging of machine monitors (VMMs) becoming critical. Performance degradation or crash failure a VMM affects all VMs on it. To counteract such aging, proactive technique called rejuvenation has been proposed. A typical example to reboot VMM. However, simply rebooting undesirable because that needs operating systems VMs. In this paper, we propose new for fast VMMs the warm-VM reboot. The enables efficiently only by...
As server consolidation using virtual machines (VMs) is carried out, software aging of machine monitors (VMMs) becoming critical. Since a VMM fundamental for running VMs, its performance degradation or crash failure affects all VMs on top it. To counteract such aging, proactive technique called rejuvenation has been proposed. A simple example to reboot VMM. However, simply rebooting undesirable because that needs operating systems VMs. In this paper, we propose new fast VMMs the warm-VM...
Although aspect-oriented programming (AOP) is becoming widely used, the design of pointcut language and generic reusable description advice are still research topics. To address these topics, this paper presents Josh, which our new AspectJ-like with an extensible a few mechanisms for description. The based on idea open compiler. Since Josh allows defining designator in Java, users can define useful particular application domain. Also, any Java expression to be included body advice. This...
Thyroid dysfunction after bone marrow transplantation (BMT) has been investigated in many studies, and most posttransplant thyroid disorders are now recognized as a late complication of transplantation. However, these studies mainly focused on function BMT, we have little information early changes BMT.We prospectively 57 patients receiving BMT. Serum thyroid-stimulating hormone, free triiodothyronine, thyroxine levels were determined at least monthly the first 3 months, once between 12...
Patients with Parkinson's disease (PD) often suffer from sleep disturbances, including excessive daytime sleepiness (EDS) and rapid eye movement behavior disorder (RBD). These symptoms are also experienced by patients narcolepsy, which is characterized orexin neuronal loss. In PD, a decrease in neurons observed pathologically, but the association between disturbance PD cerebrospinal fluid (CSF) levels still unclear. This study aimed to clarify role of as biomarker PD. CSF samples were...
Infrastructure as a Service (IaaS) provides virtual machines (VMs) to the users and its system administrators often manage user VMs using privileged called management VM. However, are not always trustworthy from users' point of view. If allow outside attackers intrude in VM, can easily steal sensitive information VMs' memory. In this paper, we propose VMCrypt, which preserves data secrecy memory trusted machine monitor. VMCrypt dual view: normal view for VM an encrypted The prevents leaking...