IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 36  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
COMP 2022-03-06
10:00
Online Online An Ambiguity Hierarchy of Weighted Context-free Grammars
Yusuke Inoue, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) COMP2021-31
Weighted context-free grammar (WCFG) is a quantitative extension of context-free grammar (CFG). It is known that unambig... [more] COMP2021-31
pp.1-7
MSS, SS 2021-01-27
15:00
Online Online Speeding up combinatorial optimization solver CombSQL+ by introducing Pseudo-Boolean constraints
Junichiro Kishi, Masahiko Sakai, Naoki Nishida, Kenji Hashimoto (Nagoya univ.) MSS2020-40 SS2020-25
The authors have proposed a solver CombSQL+ for combinatorial optimization problems (COPs) described in extended SQL lan... [more] MSS2020-40 SS2020-25
pp.66-71
IE, IMQ, MVE, CQ
(Joint) [detail]
2020-03-05
16:30
Fukuoka Kyushu Institute of Technology
(Cancelled but technical report was issued)
Study of Autonomous Door-Handle Operation by a Disaster Response Robot Using RGB-D Camera Image
Im Jeonghwang, Takuya Knada, Kazuya Miyakawa, Jun Ohya (Waseda Univ), Hiroyuki Ogata (Seikei Univ), Kenji Hashimoto (Meiji Univ), Sun Xiao, Takashi Matsuzawa, Hiroshi Naitou, Atsuo Takanishi (Waseda Univ) IMQ2019-27 IE2019-109 MVE2019-48
In recent years, the demand for robots to work in place of humans in dangerous disaster sites has been increasing. At th... [more] IMQ2019-27 IE2019-109 MVE2019-48
pp.63-67
SS 2020-03-04
13:50
Okinawa
(Cancelled but technical report was issued)
A Decision Procedure for a Macro Forest Transducer being an Implementation of an XML Schema Mapping
Hiroaki Tabata, Masahiko Sakai, Kenji Hashimoto (Nagoya Univ. G. S.) SS2019-43
XML Schema Mapping (SM) describes the correspondence between two different XML Schema DTDs using a tree pattern.
A dete... [more]
SS2019-43
pp.13-18
SS 2019-03-04
16:45
Okinawa   SQL queries for generating input constraints of SMT solvers from descriptions of combinatorial optimization problems
Genki Sakanashi, Masahiko Sakai, Naoki Nishida, Kenji Hashimoto (Nagoya Univ.) SS2018-66
The authors recently proposed an SQL-based language CombSQL+ for specifying combinatorial optimization problems, and sho... [more] SS2018-66
pp.85-90
PRMU, CNR 2019-03-01
10:00
Tokushima   Local path generation using deep reinforcement learning for four-limbed robots in disaster site
Toshiki Kurosawa (Waseda Univ.), Hiroyuki Ogata (Seikei Univ.), Takaaki Ohkawauchi, Takashi Matsuzawa, Ohya Jun (Waseda Univ.), Kenji Hashimoto (Meiji Univ), Atsuo Takanishi (Waseda Univ.) PRMU2018-125 CNR2018-48
In recent years, the demand for the use of robots in disaster sites has increased. In this paper, we propose and investi... [more] PRMU2018-125 CNR2018-48
pp.59-64
SS, DC 2017-10-19
13:45
Kochi Kochi City Culture-plaza CUL-PORT A Direct Update Method for Compressed Data with Top Tree
Suguru Nishimura, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2017-22 DC2017-21
This paper proposes a direct update method for a data compressed with top tree. For a given compressed data (top DAG) an... [more] SS2017-22 DC2017-21
pp.7-12
SS, KBSE, IPSJ-SE [detail] 2017-07-19
10:20
Hokkaido   Graph compression by tree grammars and direct evaluation of a node selection query on a compressed graph
Takeshi Takeda, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2017-1 KBSE2017-1
Graphs expressing relationships between real-world data tend to be extremely large, and researches on graph compression ... [more] SS2017-1 KBSE2017-1
pp.1-6
SS, KBSE, IPSJ-SE [detail] 2017-07-20
16:15
Hokkaido   A compiler that translates to Malbolge from a C-language subset containing recursive calls
Genki Sakanashi, Shohei Kobe, Masahiko Sakai, Naoki Nishida, Kenji Hashimoto (Nagoya Univ.) SS2017-18 KBSE2017-18
Malbolge is an esoteric programming language, which is promising to protect intellectual property rights due to its diff... [more] SS2017-18 KBSE2017-18
pp.145-150
SS 2017-03-09
09:55
Okinawa   Logical Formula Simplification and Static Analysis for Quantitative Information Flow Analysis using Model Counting
Masato Nakashima, Kenji Hashimoto, Masahiko Sakai, Hiroyuki Seki (Nagoya Univ.) SS2016-61
Model counting is one of the promising methods for quantitative information flow analysis. In this paper, we focus on th... [more] SS2016-61
pp.7-12
SS 2017-03-10
11:10
Okinawa   Sufficient Conditions for the Decidability of Query Preservation of Non-Linear Topdown Tree Transducers
Taka Ishihara, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2016-78
Query preservation means that, for given transformation and query, there is some query for transformed data such that on... [more] SS2016-78
pp.109-114
MSS, SS 2017-01-27
14:10
Kyoto Kyoto Institute of Technology A Translation from a Fragment of XPath to Deterministic Selecting Tree Automata with Lookahead Using Schemas
Masaya Kawamoto, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) MSS2016-75 SS2016-54
XPath is known as a query language for XML documents.
Translating an XPath formula to a deterministic tree automaton ma... [more]
MSS2016-75 SS2016-54
pp.107-112
DC, SS 2016-10-27
15:30
Shiga Hikone Kinro-Fukushi Kaikan Bldg. Efficiency Improvement in #SMT-based Quantitative Information Flow Analysis
Masato Nakashima, Trung Chu Bao, Kenji Hashimoto, Masahiko Sakai, Hiroyuki Seki (Nagoya Univ.) SS2016-26 DC2016-28
Model counting is one of the promising methods for quantitative information flow analysis. In this paper, we focus on th... [more] SS2016-26 DC2016-28
pp.49-54
DC, SS 2016-10-27
15:55
Shiga Hikone Kinro-Fukushi Kaikan Bldg. A Direct Update Method for XML Documents Including Data Values Compressed by Tree Grammars
Ryunosuke Takayama, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) SS2016-27 DC2016-29
A tree grammar based compression is known as one of the compression methods for XML documents. Also, methods for updatin... [more] SS2016-27 DC2016-29
pp.55-60
KBSE, SS, IPSJ-SE [detail] 2016-07-14
12:40
Hokkaido   A Method of Tree Compression with Top Trees and Direct Query Evaluation
Suguru Nishimura, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2016-10 KBSE2016-16
Tree compression methods that utilize the structural information have the advantage that a compressed document can be di... [more] SS2016-10 KBSE2016-16
pp.93-98
SS 2016-03-10
10:25
Okinawa   On the query preservation for nondeterministic tree transducers
Kazuki Miyahara (NAIST), Kenji Hashimoto (Nagoya Univ.), Hiroyuki Seki (NAIST/Nagoya Univ.) SS2015-79
We consider the problem of deciding whether a query can be rewritten by a nondeterministic view. It is known that rewrit... [more] SS2015-79
pp.19-24
LOIS 2016-03-03
14:40
Okinawa Central Community Center, Miyakojima-City An Extension of Update Method without Decompression for Compressed Structured Documents and Its Experimental Evaluation
Takeshi Goto, Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) LOIS2015-75
XML is a {it de facto} standard for data storage and exchange, and various compression methods for XML documents have be... [more] LOIS2015-75
pp.69-74
SS, MSS 2016-01-25
14:00
Ishikawa Shiinoki-Geihin-Kan A Verification Tool for k-Secrecy of XML Databases and Its Optimization
Takatoshi Asai, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2015-43 SS2015-52
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more]
MSS2015-43 SS2015-52
pp.47-52
SS 2015-05-12
13:00
Kumamoto Kumamoto University Query-Based l-Diversity
Chittaphone Phonharath (NAIST), Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2015-14
 [more] SS2015-14
pp.65-70
SS 2015-05-12
13:30
Kumamoto Kumamoto University A Verification Method for k-Secrecy of XML Databases by Model Counting
Takatoshi Asai, Masanori Uesugi, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2015-15
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more]
SS2015-15
pp.71-76
 Results 1 - 20 of 36  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan