Print edition: ISSN 0913-5685
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
AI2006-12
On securing open networks through trust and reputation - architecture, challenges and solutions
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
pp. 1 - 6
AI2006-13
Fast Algorithms for inclusion check in a sequence set to extract
Hiroki Ichikawa, Koji Iwanuma, Hidetomo Nabeshima (Uni. of Yamanashi)
pp. 7 - 12
AI2006-14
Sequential Pattern Mining for Web Access Logs
Osamu Yoshida, Koji Iwanuma, Hidetomo Nabeshima (Univ. of Yamanashi)
pp. 13 - 18
AI2006-15
Automatic Mapping Mechanism for OWL Ontologies and Its Evaluation
Takamichi Sakai, Tadashi Araragi (NTT)
pp. 19 - 24
AI2006-16
[Tutorial Invited Lecture]
Verification Methods for Security Protocols (1)
-- Typical Errors in Security Proofs for Key Exchange Protocols --
Kenji Imamoto (Kyushu Univ.)
pp. 25 - 28
AI2006-17
On the combination of functionalities for key exchange protocol
Kenji Imamoto (Kyushu Univ.), Tadashi Araragi (NTT), Kouichi Sakurai (Kyushu Univ.)
pp. 29 - 33
AI2006-18
Mechanization of Task-PIOA based Proving Procedure for Realization of Ideal Functionality
Tadashi Araragi (NTT)
pp. 35 - 39
AI2006-19
Consistency analysis between state charts and sequence charts by model checking
Tetsuo Hasegawa (Waseda Univ. / Toshiba), Yoshiaki Fukazawa (Waseda Univ.)
pp. 41 - 46
AI2006-20
Compiling Prioritized Circumscription into General Disjunctive Programs by Integration of Guess and Check Programs
Toshiko Wakaki (Shibaura Institute of Technology), Kazuo Tomita (NTT)
pp. 47 - 52
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.