Information and Systems-Artificial Intelligence and Knowledge-Based Processing(Date:2006/11/03)

Presentation
表紙

,  

[Date]2006/11/3
[Paper #]
目次

,  

[Date]2006/11/3
[Paper #]
On securing open networks through trust and reputation-architecture, challenges and solutions

Yufeng Wang,  Yoshiaki Hori,  Kouichi SAKURAI,  

[Date]2006/11/3
[Paper #]AI2006-12
Fast Algorithms for inclusion check in a sequence set to extract maximal sequences

Hiroki ICIHKAWA,  Koji IWANUMA,  Hidetomo NABESHIMA,  

[Date]2006/11/3
[Paper #]AI2006-13
Sequential Pattern Mining for Web Access Logs : Analysis of page-staying time sequences

Osamu YOSHIDA,  Koji IWANUMA,  Hidetomo NABESHIMA,  

[Date]2006/11/3
[Paper #]AI2006-14
Automatic Mapping Mechanism for OWL Ontologies and Its Evaluation

Takamichi SAKAI,  Tadashi ARARAGI,  

[Date]2006/11/3
[Paper #]AI2006-15
Verification Methods for Security Protocols (1) : Typical Errors in Security Proofs for Key Exchange Protocols

Kenji IMAMOTO,  

[Date]2006/11/3
[Paper #]AI2006-16
On the combination of functionalities for key exchange protocol

Kenji IMAMOTO,  Tadashi ARARAGI,  Kouichi SAKURAI,  

[Date]2006/11/3
[Paper #]AI2006-17
Mechanization of Task-PIOA based Proving Procedure for Realization of Ideal Functionalities

Tadashi ARARAGI,  

[Date]2006/11/3
[Paper #]AI2006-18
Consistency analysis between state charts and sequence charts by model checking

Tetsuo HASEGAWA,  Yoshiaki FUKAZAWA,  

[Date]2006/11/3
[Paper #]AI2006-19
Compiling Prioritized Circumscription into General Disjunctive Programs by Integration of Guess and Check Programs

Toshiko WAKAKI,  Kazuo TOMITA,  

[Date]2006/11/3
[Paper #]AI2006-20
複写される方へ

,  

[Date]2006/11/3
[Paper #]
Notice about Photocopying

,  

[Date]2006/11/3
[Paper #]
奥付

,  

[Date]2006/11/3
[Paper #]