Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2020-03-04 13:50 |
Okinawa |
(Cancelled but technical report was issued) |
A Decision Procedure for a Macro Forest Transducer being an Implementation of an XML Schema Mapping Hiroaki Tabata, Masahiko Sakai, Kenji Hashimoto (Nagoya Univ. G. S.) SS2019-43 |
XML Schema Mapping (SM) describes the correspondence between two different XML Schema DTDs using a tree pattern.
A dete... [more] |
SS2019-43 pp.13-18 |
LOIS, ICM |
2018-01-19 10:50 |
Kumamoto |
Sojo University |
Dissemination of Student Information Based on XML Schema Seikoh Nishita, Yuji Watanabe (Takushoku Univ.) ICM2017-45 LOIS2017-61 |
FOSTER2 is a student information system that aggregate fragments of student information provided by information servers ... [more] |
ICM2017-45 LOIS2017-61 pp.63-68 |
SS |
2017-03-10 11:10 |
Okinawa |
|
Sufficient Conditions for the Decidability of Query Preservation of Non-Linear Topdown Tree Transducers Taka Ishihara, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2016-78 |
Query preservation means that, for given transformation and query, there is some query for transformed data such that on... [more] |
SS2016-78 pp.109-114 |
MSS, SS |
2017-01-27 14:10 |
Kyoto |
Kyoto Institute of Technology |
A Translation from a Fragment of XPath to Deterministic Selecting Tree Automata with Lookahead Using Schemas Masaya Kawamoto, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) MSS2016-75 SS2016-54 |
XPath is known as a query language for XML documents.
Translating an XPath formula to a deterministic tree automaton ma... [more] |
MSS2016-75 SS2016-54 pp.107-112 |
SS |
2016-03-10 13:00 |
Okinawa |
|
XQuery Type Inference under Restricted DTDs Kenji Sugimura, Yasunori Ishihara (Osaka Univ.), Kato Hiroyuki (NII), Fujiwara Toru (Osaka Univ.) SS2015-82 |
XQuery type inference is an important problem that is useful for query optimization. Howerver, precise type inference fo... [more] |
SS2015-82 pp.37-42 |
SS, MSS |
2016-01-25 14:00 |
Ishikawa |
Shiinoki-Geihin-Kan |
A Verification Tool for k-Secrecy of XML Databases and Its Optimization Takatoshi Asai, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2015-43 SS2015-52 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
MSS2015-43 SS2015-52 pp.47-52 |
SS |
2015-05-12 13:30 |
Kumamoto |
Kumamoto University |
A Verification Method for k-Secrecy of XML Databases by Model Counting Takatoshi Asai, Masanori Uesugi, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2015-15 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
SS2015-15 pp.71-76 |
SS |
2012-03-14 09:00 |
Okinawa |
Tenbusu-Naha |
Decidability of Query Preservation for Deterministic Linear Top-Down Tree Transducers Ryuta Sawada (Osaka Univ.), Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) SS2011-75 |
When updating an XML schema, it is desirable that the new schema preserve the expressive power of the old one. The query... [more] |
SS2011-75 pp.109-114 |
SS |
2011-10-27 14:20 |
Ishikawa |
JAIST |
DAO Design Pattern for Multi-version Schema of XML Database Toshifumi Enomoto, Gengo Suzuki, Nobuyuki Kobayashi, Masashi Yamamuro (NTT) SS2011-29 |
(To be available after the conference date) [more] |
SS2011-29 pp.13-18 |
PRMU, DE |
2011-06-06 17:50 |
Kanagawa |
|
Structuring and Storing Waka Data in An XML Database System Ryoko Shirai (Doshisha Univ), Atsushi Keyaki (NAIST), Kenji Hatano (Doshisha Univ) DE2011-14 PRMU2011-45 |
In the research field of Japanese classical literature, researchers had
usually analyzed waka poetries manually, so tha... [more] |
DE2011-14 PRMU2011-45 pp.79-84 |
SS |
2008-12-19 11:15 |
Kochi |
Kochi Univiersity of Technology |
XML Processing Techniqes Based on Tree Automata Yoshiaki Takata (Kochi Univ. of Tech.), Hiroyuki Seki (Nara Inst. of Scei and Tech.) SS2008-46 |
Tree automata, which are finite automata over trees, have been investigated in various research areas for a long time. ... [more] |
SS2008-46 pp.43-50 |
AI, IPSJ-DC |
2008-11-27 10:30 |
Okinawa |
|
Command line interface and intuitive XML operation Michitaka Aramoto (Ad-Sol Nissin Corp.) |
There is a lot of kinds of XML data as Web service and a data file that exists in on Internet and the enterprise, and th... [more] |
AI2008-27 pp.19-24 |
CS, IN, NS (Joint) |
2008-09-11 15:10 |
Miyagi |
Tohoku University |
Design and Implementation of XQuery capable XDMS Yasuhiro Araki, Hiroyuki Morikawa (Univ. Tokyo) IN2008-52 |
Authors are designing Ubiquitous Service Platform which extends coverage and data utilize for sensor network with fix an... [more] |
IN2008-52 pp.51-56 |
LOIS, IPSJ-DC |
2007-07-27 16:05 |
Hokkaido |
Future University-Hakodate |
A Method for Generating a Post-Encryption Schema for a Schema Validation of Encrypted XML Data Kojiro Nakayama, Michiko Oba (Hitachi), Norihisa Komoda (Osaka Univ.) |
If XML data is partially encrypted using XML Encryption, we cannot perform shcema validation because the data is no long... [more] |
OIS2007-26 pp.71-76 |
DE |
2007-07-02 15:45 |
Miyagi |
Akiu hot springs (Sendai) |
Generating XML document transformers according to XML schema evolution based on the tree-embedding relation Masaki Yoshida, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) DE2007-39 |
Given an update operation sequence for schema evolution based on the tree-embedding relation, the method of generating X... [more] |
DE2007-39 pp.103-108 |
DE |
2007-07-02 16:10 |
Miyagi |
Akiu hot springs (Sendai) |
Translating XPath queries according to XML schema evolution based on the tree-embedding relation Takuji Morimoto, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) DE2007-40 |
A method is proposed for translating queries in a subclass of XPath according to XML schema evolution based on the tree-... [more] |
DE2007-40 pp.109-114 |
LOIS, IPSJ-DC |
2006-07-28 13:15 |
Yamagata |
Faculty of Engineering Yamagata University |
Proposal of Schema Validation Method for Encrypted XML Data Kojiro Nakayama (Hitachi), Michitaka Aramoto (Ad-Sol Nissin), Michiko Oba (Hitachi) |
XML Security is necessary to ensure the end-to-end security of web services. To provide the confidentiality against the ... [more] |
OIS2006-15 pp.31-37 |
LOIS, IPSJ-DC |
2006-07-28 13:40 |
Yamagata |
Faculty of Engineering Yamagata University |
Implementation of Schema Validation Mechanism Using XSLT for Encrypted XML Data Michitaka Aramoto (Ad-Sol Nissin), Kojiro Nakayama, Michiko Oba (Hitachi) |
The XML data from which the part is encrypted cannot perform of the schema verification because validity to the schema i... [more] |
OIS2006-16 pp.39-45 |
DE |
2006-07-12 15:05 |
Niigata |
HOTEL SENKEI |
XML Document Retrieval that Specifies Content and Structure Norimasa Terada (Nagoya Univ.), Toshiyuki Shimizu, Masatoshi Yoshikawa (Kyoto Univ.) |
XML is one of markup languages to describe documents, data structure and meanings. Today, XML is more and more widely us... [more] |
DE2006-48 pp.157-162 |
PRMU, DE |
2005-06-17 14:50 |
Hokkaido |
Hokkaido Univ. |
Finding an Optimum Edit Script between an XML Document and a Regular Tree Grammar Nobutaka Suzuki (Univ. of Tsukuba) |
So far many algorithms for finding an optimum edit script between two XML documents have been proposed, but few studies ... [more] |
DE2005-25 PRMU2005-46 pp.69-74 |