Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Satoshi Hieda is active.

Publication


Featured researches published by Satoshi Hieda.


international conference on distributed computing systems workshops | 2004

An extensible browser architecture for mobile terminals

Yoshinori Saida; Hiroshi Chishima; Satoshi Hieda; Naoki Sato; Yukikazu Nakamoto

The number of mobile terminals with a Web browser has increased in recent years, and many diverse mobile services using the Internet have evolved. However, there are still limitations such as that it is difficult to change or replace browser functionalities in mobile terminals. This is a factor in service providers being unable to freely provide services. We propose an extensible browser architecture (EBA) to extend the browser functions. The EBA consists of two layers: browser foundation and browser application layer. The browser foundation layer provides the core functions of the browser as Java class libraries. The browser applications, which are written in the Java language and downloadable, utilize modules using the browser class libraries in the browser foundation layer to provide a variety of browser applications. Several applications demonstrate the effectiveness of the EBA.


international symposium on object component service oriented real time distributed computing | 2003

Design of SMIL browser functionality in mobile terminals

Satoshi Hieda; Yoshinori Saida; Hiroshi Chishima; Naoki Sato; Yukikazu Nakamoto

SMIL is a markup language which enables us to describe multimedia contents. This paper proposes a design model of SMIL browser functionality for mobile terminals whose resources are limited. We introduce SMIL Component, which is based on attachable software architecture to a pre-installed generic web browser. This leads to reduce memory size that SMIL Component consumes and bring high adaptability of SMIL Component for various web browsers. We implement SMIL Component and evaluate RAM sizes and presentation delays. As a result, we found out that SMIL Component can be useful for MMS presentations on mobile terminals.


software technologies for embedded and ubiquitous systems | 2007

Making middleware secure on embedded terminals

Yoshiharu Asakura; Atsushi Honda; Satoshi Hieda; Hiroshi Chishima; Naoki Sato

Recently more embedded terminals have begun to use a general-purpose OS such as Linux. These terminals can perform various functions, such as downloading applications. Since these applications maybe malicious, it is necessary to protect terminals against them and to ensure stability of services provided by the terminals. We have proposed a security enhanced middleware model for embedded terminals based on Linux (SEMMETL). The SEMMETL offers client identification, access control for each application and resource control for each application. The security enhanced X server (SEN XServer) is an example of our proposed SEMMETL. By applying the SEMMETL to middleware, we can enhance the security of embedded terminals and ensure stability.


Archive | 2005

Access control management method, access control management system and terminal device with access control management function

Satoshi Hieda


Archive | 2011

Communication system, control device, processing rule setting method, packet transmission method, and program

Junichi Yamato; Takayuki Hama; Satoshi Hieda; Satoshi Uchida


Archive | 2011

Communication system, control apparatus, processing rule setting method, packet transmitting method and program

Junichi Yamato; 大和 純一; Takayuki Hama; 崇之 浜; Satoshi Hieda; 稗田 諭士; Satoshi Uchida; 智 内田


Archive | 2012

Computer, communication system, network connection switching method, and program

Satoshi Hieda


Archive | 2009

Cpu emulation system, cpu emulation method, and recording medium having a cpu emulation program recorded thereon

Satoshi Hieda


Archive | 2008

MEMORY SHARING SYSTEM

Satoshi Hieda


Archive | 2006

Access right checking system, access right checking method, and access right checking program

Satoshi Hieda

Researchain Logo
Decentralizing Knowledge