default search action
Masahiro Yasugi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Masahiro Yasugi, Kento Emoto, Tasuku Hiraishi:
Designing Restartable Exception Handling Mechanisms for Implementing Efficient and Safe High-level Languages. J. Inf. Process. 32: 436-450 (2024) - [c25]Masahiro Yasugi, Tasuku Hiraishi, Chihiro Takeuchi:
Portable Implementations of Work Stealing. HPC Asia 2024: 12-22 - 2022
- [j17]Zhengyang Bai, Tasuku Hiraishi, Akihiro Ida, Masahiro Yasugi:
Parallelization of Matrix Partitioning in Hierarchical Matrix Construction on Distributed Memory Systems. J. Inf. Process. 30: 742-754 (2022) - [c24]Zhengyang Bai, Tasuku Hiraishi, Akihiro Ida, Masahiro Yasugi, Keiichiro Fukazawa:
Construction of Hierarchical Matrix on Distributed Memory Systems using a Task Parallel Language. CANDARW 2022: 48-54 - [c23]Yusuke Shiki, Masahiro Yasugi, Tasuku Hiraishi:
Evaluating and Analyzing Irregular Tree Search in the Tascell and HOPE Parallel Programming Languages. PDCAT 2022: 262-272 - 2021
- [j16]Ryusuke Nakashima, Masahiro Yasugi, Hiroshi Yoritaka, Tasuku Hiraishi, Seiji Umatani:
Work-stealing Strategies That Consider Work Amount and Hierarchy. J. Inf. Process. 29: 478-489 (2021)
2010 – 2019
- 2019
- [j15]Masahiro Yasugi, Reichi Ikeuchi, Tasuku Hiraishi, Tsuneyasu Komiya:
Evaluating Portable Mechanisms for Legitimate Execution Stack Access with a Scheme Interpreter in an Extended SC Language. J. Inf. Process. 27: 177-189 (2019) - [j14]Zhengyang Bai, Tasuku Hiraishi, Hiroshi Nakashima, Akihiro Ida, Masahiro Yasugi:
Parallelization of Matrix Partitioning in Construction of Hierarchical Matrices using Task Parallel Languages. J. Inf. Process. 27: 840-851 (2019) - [j13]Hiroshi Yoritaka, Ken Matsui, Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani:
Probabilistic guards: A mechanism for increasing the granularity of work-stealing programs. Parallel Comput. 82: 19-36 (2019) - [c22]Masahiro Yasugi, Daisuke Muraoka, Tasuku Hiraishi, Seiji Umatani, Kento Emoto:
HOPE: A Parallel Execution Model Based on Hierarchical Omission. ICPP 2019: 77:1-77:11 - [c21]Ryusuke Nakashima, Hiroshi Yoritaka, Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani:
Extending a Work-Stealing Framework with Priorities and Weights. IA3@SC 2019: 9-16 - 2017
- [j12]Shingo Okuno, Tasuku Hiraishi, Hiroshi Nakashima, Masahiro Yasugi, Jun Sese:
Parallelization of Extracting Connected Subgraphs with Common Itemsets in Distributed Memory Environments. J. Inf. Process. 25: 256-267 (2017) - 2016
- [j11]Tasuku Hiraishi, Shingo Okuno, Masahiro Yasugi:
An Implementation of Exception Handling with Collateral Task Abortion. J. Inf. Process. 24(2): 439-449 (2016) - [c20]Daisuke Muraoka, Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani:
Evaluation of an MPI-Based Implementation of the Tascell Task-Parallel Language on Massively Parallel Systems. ICPP Workshops 2016: 161-170 - [c19]Hiroshi Yoritaka, Ken Matsui, Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani:
Extending a Work-Stealing Framework with Probabilistic Guards. ICPP Workshops 2016: 171-180 - [c18]Shingo Okuno, Tasuku Hiraishi, Hiroshi Nakashima, Masahiro Yasugi, Jun Sese:
Reducing Redundant Search in Parallel Graph Mining Using Exceptions. IPDPS Workshops 2016: 328-337 - 2015
- [j10]Seiji Umatani, Tomoharu Ugawa, Masahiro Yasugi:
Design and Implementation of a Java Bytecode Manipulation Library for Clojure. J. Inf. Process. 23(5): 716-729 (2015) - 2014
- [j9]Shingo Okuno, Tasuku Hiraishi, Hiroshi Nakashima, Masahiro Yasugi, Jun Sese:
Parallelization of Extracting Connected Subgraphs with Common Itemsets. Inf. Media Technol. 9(3): 233-250 (2014) - [c17]Masahiro Yasugi:
On Efficient Load Balancing for Irregular Applications. Concurrent Objects and Beyond 2014: 239-250 - 2013
- [c16]Masahiro Yasugi, Yuki Matsuda, Tomoharu Ugawa:
A proper performance evaluation system that summarizes code placement effects. PASTE 2013: 41-48 - 2012
- [j8]Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani, Taiichi Yuasa:
Parallel Graph Traversals using Work-Stealing Frameworks for Many-core Platforms. Inf. Media Technol. 7(1): 73-84 (2012) - [j7]Haruna Nishiwaki, Tomoharu Ugawa, Seiji Umatani, Masahiro Yasugi, Taiichi Yuasa:
SEAN: Support Tool for Detecting Rule Violations in JNI Coding. Inf. Media Technol. 7(4): 1353-1358 (2012) - [j6]Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani, Taiichi Yuasa:
Parallel Graph Traversals using Work-Stealing Frameworks for Many-core Platforms. J. Inf. Process. 20(1): 128-139 (2012) - 2011
- [c15]Seiji Umatani, Masahiro Yasugi, Taiichi Yuasa:
Abstract Machines for Safe Ambients in Wide-Area and Mobile Networks. COORDINATION 2011: 172-186 - 2010
- [c14]Masahiro Yasugi, Tasuku Hiraishi, Seiji Umatani, Taiichi Yuasa:
Dynamic Graph Traversals for Concurrent Rewriting Using Work-Stealing Frameworks for Multicore Platforms. ICPADS 2010: 406-414 - [c13]Shingo Yuasa, Masahiro Yasugi:
Validating low-level instructions for fixnums using BDDs. ILC 2010: 11-20 - [c12]Masahiro Yasugi, Tsuneyasu Komiya, Tasuku Hiraishi, Seiji Umatani:
Managing continuations for proper tail recursion. ILC 2010: 65-72
2000 – 2009
- 2009
- [c11]Tasuku Hiraishi, Masahiro Yasugi, Seiji Umatani, Taiichi Yuasa:
Backtracking-based load balancing. PPoPP 2009: 55-64 - 2008
- [c10]Tomoharu Ugawa, Masahiro Yasugi, Taiichi Yuasa:
Replication-Based Incremental Compaction. ISORC 2008: 516-524 - 2007
- [c9]Tasuku Hiraishi, Masahiro Yasugi, Taiichi Yuasa:
Experience with SC: transformation-based implementation of various extensions to C. ILC 2007: 20 - 2006
- [j5]Masahiro Yasugi:
A Type System and Compilation Techniques for Concurrent Objects. Inf. Media Technol. 1(1): 15-32 (2006) - [j4]Seiji Umatani, Hirokazu Shobayashi, Masahiro Yasugi, Taiichi Yuasa:
Efficient and Portable Implementation of Java-style Exception Handling in C. Inf. Media Technol. 1(2): 809-818 (2006) - [j3]Tasuku Hiraishi, Masahiro Yasugi, Taiichi Yuasa:
A Transformation-Based Implementation of Lightweight Nested Functions. Inf. Media Technol. 1(2): 833-850 (2006) - [c8]Masahiro Yasugi, Tasuku Hiraishi, Taiichi Yuasa:
Lightweight Lexical Closures for Legitimate Execution Stack Access. CC 2006: 170-184 - [c7]Ryo Hanai, Tomoharu Ugawa, Masashi Yoneda, Masahiro Yasugi, Taiichi Yuasa:
Memory usage improvement using runtime alias detection. Trends in Functional Programming 2006: 129-144 - 2005
- [j2]Takuya Katayama, Tatsuo Nakajima, Taiichi Yuasa, Tomoji Kishi, Shin Nakajima, Shuichi Oikawa, Masahiro Yasugi, Toshiaki Aoki, Mitsutaka Okazaki, Seiji Umatani:
Highly Reliable Embedded Software Development Using Advanced Software Technologies. IEICE Trans. Inf. Syst. 88-D(6): 1105-1116 (2005) - [c6]Hideaki Saiki, Yoshiharu Konaka, Tsuneyasu Komiya, Masahiro Yasugi, Taiichi Yuasa:
Real-Time GC in JeRTyTmVM Using the Return-Barrier Method. ISORC 2005: 140-148 - 2003
- [c5]Tomoharu Ugawa, Nobuhisa Minagawa, Tsuneyasu Komiya, Masahiro Yasugi, Taiichi Yuasa:
Lazy Stack Copying and Stack Copy Sharing for the Efficient Implementation of Continuations. APLAS 2003: 410-426 - [c4]Seiji Umatani, Masahiro Yasugi, Tsuneyasu Komiya, Taiichi Yuasa:
Pursuing Laziness for Efficient Implementation of Modern Multithreaded Languages. ISHPC 2003: 174-188
1990 – 1999
- 1998
- [c3]Masahiro Yasugi, Shegeyuki Eguchi, Kazuo Taki:
Eliminating Bottlenecks on Parallel Systems using Adaptive Objects. IEEE PACT 1998: 80-87 - 1994
- [c2]Masahiro Yasugi, Satoshi Matsuoka, Akinori Yonezawa:
The Plan-Du Style Compilation Technique for Eager Data Transfer in Thread-Based Execution. IFIP PACT 1994: 57-66 - 1993
- [j1]Akinori Yonezawa, Satoshi Matsuoka, Masahiro Yasugi, Kenjiro Taura:
Implementing concurrent object-oriented languages on multicomputers. IEEE Parallel Distributed Technol. Syst. Appl. 1(2): 49-61 (1993) - 1992
- [c1]Masahiro Yasugi, Satoshi Matsuoka, Akinori Yonezawa:
ABCL/onEM-4: a new software/hardware architecture for object-oriented concurrent computing on an extended dataflow supercomputer. ICS 1992: 93-103
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint