|
|
All Technical Committee Conferences (All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS, DC |
2017-10-19 14:15 |
Kochi |
Kochi City Culture-plaza CUL-PORT |
A Transformation Method of XQuery Expressions for Evaluation on Compressed XML Documents Jukiya Ogura, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) SS2017-23 DC2017-22 |
While XML documents can easily express data structure, there is a disadvantage that the document size becomes large. For... [more] |
SS2017-23 DC2017-22 pp.13-18 |
SS |
2016-03-10 10:25 |
Okinawa |
|
On the query preservation for nondeterministic tree transducers Kazuki Miyahara (NAIST), Kenji Hashimoto (Nagoya Univ.), Hiroyuki Seki (NAIST/Nagoya Univ.) SS2015-79 |
We consider the problem of deciding whether a query can be rewritten by a nondeterministic view. It is known that rewrit... [more] |
SS2015-79 pp.19-24 |
SS, MSS |
2016-01-25 14:00 |
Ishikawa |
Shiinoki-Geihin-Kan |
A Verification Tool for k-Secrecy of XML Databases and Its Optimization Takatoshi Asai, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2015-43 SS2015-52 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
MSS2015-43 SS2015-52 pp.47-52 |
SS |
2015-05-12 13:30 |
Kumamoto |
Kumamoto University |
A Verification Method for k-Secrecy of XML Databases by Model Counting Takatoshi Asai, Masanori Uesugi, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2015-15 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
SS2015-15 pp.71-76 |
SS |
2009-08-06 11:30 |
Hokkaido |
Kitami Institute of Technology |
Formalization of AST Conversion for Applying CASE Tools to Other Programming Languages. Isamu Hasegawa (Nomura Research Institute, Ltd.), Katsuhiko Gondow (Tokyo Inst. of Tech.) SS2009-14 |
Development of parsers are increased according to the increase of the demand of CASE tools, in recent years. However, ev... [more] |
SS2009-14 pp.13-18 |
SS |
2008-12-19 11:15 |
Kochi |
Kochi Univiersity of Technology |
XML Processing Techniqes Based on Tree Automata Yoshiaki Takata (Kochi Univ. of Tech.), Hiroyuki Seki (Nara Inst. of Scei and Tech.) SS2008-46 |
Tree automata, which are finite automata over trees, have been investigated in various research areas for a long time. ... [more] |
SS2008-46 pp.43-50 |
DE |
2007-07-02 15:45 |
Miyagi |
Akiu hot springs (Sendai) |
Generating XML document transformers according to XML schema evolution based on the tree-embedding relation Masaki Yoshida, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) DE2007-39 |
Given an update operation sequence for schema evolution based on the tree-embedding relation, the method of generating X... [more] |
DE2007-39 pp.103-108 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|