Y
Yukihide Inagaki
Researcher at Hitachi
Publications - 45
Citations - 296
Yukihide Inagaki is an academic researcher from Hitachi. The author has contributed to research in topics: Encryption & Host (network). The author has an hindex of 9, co-authored 45 publications receiving 296 citations. Previous affiliations of Yukihide Inagaki include HGST.
Papers
More filters
Patent
Packet routing apparatus and a method of routing a packet
TL;DR: In this paper, a routing unit receives a packet from each port, and uses header information contained in the packet to judge whether the packet should be transmitted to the function unit, and if so, the routing unit adds a first identifier to the packet and transmits it to a transmission unit.
Patent
Packet routing apparatus
TL;DR: In this article, a packet routing apparatus has a plurality of routing units, connected by a first connecting mechanism, consisting of a first routing unit, connected to at least one port, and a second routing unit connected to an extended function processor.
Patent
Information device equipped with cache memories, apparatus and program using the same device
TL;DR: A read cache and a write cache are made up of two kinds of nonvolatile memories whose characteristics are different as mentioned in this paper, and the management tables of data in these caches are stored in the non-volatile memory whose write endurance is high.
Patent
Information processing unit and information processing related units
Hideki Kamimaki,Yukihide Inagaki,Tsuyoshi Nakagawa,Kimura Koichi,Hideaki Gemma,Hitoshi Kawaguchi +5 more
TL;DR: In this paper, the main body of an information processing unit is removed from the port-replicator and the file basestation is replaced with an external storage, such as an FD•D or CD-ROM•D.
Patent
Content data management system and method
Tatsuya Hirai,Yukihide Inagaki +1 more
TL;DR: In this article, a simplified authentication transaction for reconnecting a storage device to a host apparatus that has completed authentication in the past is proposed. But the scheme requires the host device deletes/invalidates or holds the log for the transfer in accordance with non-permission/permission.