Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MSS, SS |
2015-01-27 08:55 |
Tottori |
|
Direct Update of XML Documents Compressed by Tree Grammars Takeshi Goto (Nagoya Univ.), Takahiro Onoue (NAIST), Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2014-81 SS2014-45 |
XML is a de facto standard for data storage and exchange, and various compression methods for XML documents have been pr... [more] |
MSS2014-81 SS2014-45 pp.73-78 |
SS |
2014-10-23 16:15 |
Kochi |
Kochi city culture-plaza cul-port |
Query Evaluation and Update on XML Documents Compressed by Tree Grammars Takahiro Onoue (NAIST), Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ), Minoru Ito (NAIST) SS2014-28 |
XML documents often contain same repetitive substructures and various compression methods have been proposed. This paper... [more] |
SS2014-28 pp.17-22 |
EMCJ, IEE-EMC |
2014-06-20 13:25 |
Hyogo |
Kobe Univ. |
A Fundamental Study on Derivation of EMI from Through Silicon Vias (TSV) Masashi Kawakami, Kenji Hashimoto (UEC), Kimitoshi Murano (Tokai Univ.), Yoshio Kami, Fengchao Xiao (UEC) EMCJ2014-14 |
In recent years, through-silicon via (TSV) technology has attracted attention in the field of 3D packaging technology.
... [more] |
EMCJ2014-14 pp.25-30 |
ICD |
2014-04-18 10:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
A 7ns-Access-Time 25μW/MHz 128kb SRAM for Low-Power Fast Wake-Up MCU in 65nm CMOS with 27fA/b Retention Current Toshikazu Fukuda, Koji Kohara, Toshiaki Dozaka, Yasuhisa Takeyama, Tsuyoshi Midorikawa (Toshiba), Kenji Hashimoto, Ichiro Wakiyama (TOSMEC), Shinji Miyano, Takehiko Hojo (Toshiba) ICD2014-12 |
Low leakage 128kb SRAM with 65 nm technology that consumes only 3.5nA (27fA/b) in the retention mode is fabricated. Oper... [more] |
ICD2014-12 pp.59-64 |
SS |
2014-03-11 13:30 |
Okinawa |
Tenbusu Naha |
On Detecting Useless Transition Rules of Constrained Tree Automata Yasuhiro Nakano, Naoki Nishida, Masahiko Sakai, Toshiki Sakabe, Keiichirou Kusakari, Kenji Hashimoto (Nagoya Univ.) SS2013-77 |
Reduction completeness of terms is proved many times in a theorem proving method for constrained term rewriting systems ... [more] |
SS2013-77 pp.31-36 |
SS, MSS |
2014-01-31 10:20 |
Aichi |
|
Runtime Control of a Program based on Quantitative Information Flow Bao Trung Chu (NAIST), Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2013-63 SS2013-60 |
Quantitative information flow is a new notion based on
information theory for expressing how much the program
leaks in... [more] |
MSS2013-63 SS2013-60 pp.71-76 |
SS |
2013-01-10 13:00 |
Okinawa |
|
The validity problem of positive XPath queries with sibling axes in the presence of DTDs Yohei Kusunoki (Osaka Univ.), Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) |
In this paper, we discuss the complexity of the validity for positive XPath queries under the presence of DTDs. A given ... [more] |
SS2012-46 pp.1-6 |
SS, IPSJ-SE |
2012-11-01 10:50 |
Hiroshima |
Hiroshima City University |
Node Query Preservation for Deterministic Linear Top-Down Tree Transducers Kazuki Miyahara, Kenji Hashimoto, Hiroyuki Seki (NAIST) SS2012-38 |
A fundamental concern of XML document transformation is that the information contained in each source document is preser... [more] |
SS2012-38 pp.13-18 |
SS |
2012-03-14 09:00 |
Okinawa |
Tenbusu-Naha |
Decidability of Query Preservation for Deterministic Linear Top-Down Tree Transducers Ryuta Sawada (Osaka Univ.), Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) SS2011-75 |
When updating an XML schema, it is desirable that the new schema preserve the expressive power of the old one. The query... [more] |
SS2011-75 pp.109-114 |
SS |
2012-03-14 09:25 |
Okinawa |
Tenbusu-Naha |
Combining the tractability of duplicate-free DTDs and disjunction-capsuled DTDs for XPath satisfiability with sibling axes Yasunori Ishihara (Osaka Univ.), Shogo Shimizu (AIIT), Kenji Hashimoto (NAIST), Toru Fujiwara (Osaka Univ.) SS2011-76 |
This paper demonstrates a new subclass of DTDs,
called DC/DF-DTDs, under which XPath
satisfiability with child, descen... [more] |
SS2011-76 pp.115-120 |
SS |
2011-06-30 13:30 |
Overseas |
Korea Univ. (Seoul) |
Static Analysis for k-secrecy against Inference Attacks Chittaphone Phonharath, Kenji Hashimoto, Hiroyuki Seki (NAIST) SS2011-4 |
[more] |
SS2011-4 pp.17-22 |
SS |
2010-12-15 09:00 |
Gunma |
Ikaho-Onsen Hotel Tenbo |
The Validity Problem of Positive XPath Queries in the Presence of DTDs Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) SS2010-47 |
We discuss the validity problem for positive XPath queries in the presence of DTDs. A given query $p$ is valid under a D... [more] |
SS2010-47 pp.49-54 |
DE |
2007-07-02 15:45 |
Miyagi |
Akiu hot springs (Sendai) |
Generating XML document transformers according to XML schema evolution based on the tree-embedding relation Masaki Yoshida, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) DE2007-39 |
Given an update operation sequence for schema evolution based on the tree-embedding relation, the method of generating X... [more] |
DE2007-39 pp.103-108 |
DE |
2007-07-02 16:10 |
Miyagi |
Akiu hot springs (Sendai) |
Translating XPath queries according to XML schema evolution based on the tree-embedding relation Takuji Morimoto, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) DE2007-40 |
A method is proposed for translating queries in a subclass of XPath according to XML schema evolution based on the tree-... [more] |
DE2007-40 pp.109-114 |
DE |
2006-07-12 14:45 |
Niigata |
HOTEL SENKEI |
Security Verification against Attacks using Type Inference on XML Databases Fumikazu Takasuka, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) |
Inference attacks mean that an attacker tries to infer the execution result of a query unauthorized to the attacker (i.e... [more] |
DE2006-47 pp.151-156 |
DE, DC |
2004-10-19 14:00 |
Tokyo |
Tokyo Institute of Technology |
Schema update operations preserving the expressive power in XML databases Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) |
This paper proposes schema update operations preserving the expressive power in XML databases. In this paper, the inform... [more] |
DE2004-118 DC2004-33 pp.25-30 |