Learn More
Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous components for providing virtual hardware devices and for sharing and protecting system resources among virtual machines (VMs), enlarging the code size of and reducing the reliability of(More)
Graphics processing units (GPUs) provide orders-ofmagnitude speedup for compute-intensive data-parallel applications. However, enterprise and cloud computing domains, where resource isolation of multiple clients is required, have poor access to GPU technology. This is due to lack of operating system (OS) support for virtualizing GPUs in a reliable manner.(More)
Polyamidoamine dendrimers having poly(ethylene glycol) grafts were designed as a novel drug carrier which possesses an interior for the encapsulation of drugs and a biocompatible surface. Poly(ethylene glycol) monomethyl ether with the average molecular weight of 550 or 2000 was combined to essentially every chain end of the dendrimer of the third or fourth(More)
With the recent rapid increase in interactive Web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats. The SQL injection attack allows an attacker to access the underlying database, execute arbitrary commands at intent, and receive a dynamically generated output, such as HTML Web(More)
We have previously developed the succinylated poly(glycidol)-modified liposome which becomes fusigenic under weakly acidic condition. In this report, we describe that complexation of this pH-sensitive, fusigenic liposome with a lipoplex consisting of 3beta-(N-(N',N'-dimethylaminoethane) carbamoyl)cholesterol, dioleoylphosphatidylethanolamine and plasmid DNA(More)
Live migration of virtual machines (VMs) is an attractive technique for managing cloud computing platforms such as those for load balancing and maintenance of physical machines. However, the execution of live migration significantly consumes computational resources on the source and destination, thus causing <i>migration noise</i> that degrades the(More)
Executable content poses a threat of unauthorized access because it contains program code running on the user’s machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This(More)
Previously, as a new type of pH-sensitive liposome, we prepared egg yolk phosphatidylcholine (EYPC) liposomes bearing succinylated poly(glycidol), that is a poly(ethylene glycol) derivative having carboxyl groups, and showed that fusion ability of the liposomes increases under weakly acidic and acidic conditions (Kono, K., Zenitani, K. and Takagishi, T.(More)
Temperature-sensitive liposomes are considered to be a promising tool to achieve site-specific delivery of drugs. These liposomes have been prepared using lipids whose membranes undergo a gel-to-liquid crystalline phase transition a few degrees above physiological temperature. However, recently, temperature-sensitization of liposomes has been attempted(More)
We have developed poly(amidoamine) (PAMAM) dendrimers that have poly(ethylene glycol) (PEG) grafts at all dendrimer chain ends. To obtain PEG-modified dendrimers with sites for conjugation of anticancer drugs for this study, we prepared PAMAM G4 dendrimers that have a glutamic acid (Glu) residue at every chain end of dendrimer; PEG chains were attached to(More)