Fri, Nov 10 AM 10:00 - 12:00 |
(1) |
10:00-10:30 |
On securing open networks through trust and reputation - architecture, challenges and solutions |
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
(2) |
10:30-11:00 |
Fast Algorithms for inclusion check in a sequence set to extract |
Hiroki Ichikawa, Koji Iwanuma, Hidetomo Nabeshima (Uni. of Yamanashi) |
(3) |
11:00-11:30 |
Sequential Pattern Mining for Web Access Logs |
Osamu Yoshida, Koji Iwanuma, Hidetomo Nabeshima (Univ. of Yamanashi) |
(4) |
11:30-12:00 |
Automatic Mapping Mechanism for OWL Ontologies and Its Evaluation |
Takamichi Sakai, Tadashi Araragi (NTT) |
Fri, Nov 10 PM 13:20 - 16:55 |
(5) |
13:20-13:50 |
[Tutorial Invited Lecture]
Verification Methods for Security Protocols (1)
-- Typical Errors in Security Proofs for Key Exchange Protocols -- |
Kenji Imamoto (Kyushu Univ.) |
(6) |
13:50-14:35 |
[Tutorial Lecture]
Verification Methods for Security Protocols (2)
-- Around Abadi-Rogaway logic -- |
Tadashi Araragi (NTT CS labs) |
|
14:35-14:45 |
Break ( 10 min. ) |
(7) |
14:45-15:15 |
On the combination of functionalities for key exchange protocol |
Kenji Imamoto (Kyushu Univ.), Tadashi Araragi (NTT), Kouichi Sakurai (Kyushu Univ.) |
(8) |
15:15-15:45 |
Mechanization of Task-PIOA based Proving Procedure for Realization of Ideal Functionality |
Tadashi Araragi (NTT) |
|
15:45-15:55 |
Break ( 10 min. ) |
(9) |
15:55-16:25 |
Consistency analysis between state charts and sequence charts by model checking |
Tetsuo Hasegawa (Waseda Univ. / Toshiba), Yoshiaki Fukazawa (Waseda Univ.) |
(10) |
16:25-16:55 |
Compiling Prioritized Circumscription into General Disjunctive Programs by Integration of Guess and Check Programs |
Toshiko Wakaki (Shibaura Institute of Technology), Kazuo Tomita (NTT) |