Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
COMP |
2022-03-06 10:00 |
Online |
Online (Online) |
An Ambiguity Hierarchy of Weighted Context-free Grammars Yusuke Inoue, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) COMP2021-31 |
Weighted context-free grammar (WCFG) is a quantitative extension of context-free grammar (CFG). It is known that unambig... [more] |
COMP2021-31 pp.1-7 |
MSS, SS |
2021-01-27 15:00 |
Online |
Online (Online) |
Speeding up combinatorial optimization solver CombSQL+ by introducing Pseudo-Boolean constraints Junichiro Kishi, Masahiko Sakai, Naoki Nishida, Kenji Hashimoto (Nagoya univ.) MSS2020-40 SS2020-25 |
The authors have proposed a solver CombSQL+ for combinatorial optimization problems (COPs) described in extended SQL lan... [more] |
MSS2020-40 SS2020-25 pp.66-71 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2020-03-05 16:30 |
Fukuoka |
Kyushu Institute of Technology (Fukuoka) (Cancelled but technical report was issued) |
Study of Autonomous Door-Handle Operation by a Disaster Response Robot Using RGB-D Camera Image Im Jeonghwang, Takuya Knada, Kazuya Miyakawa, Jun Ohya (Waseda Univ), Hiroyuki Ogata (Seikei Univ), Kenji Hashimoto (Meiji Univ), Sun Xiao, Takashi Matsuzawa, Hiroshi Naitou, Atsuo Takanishi (Waseda Univ) IMQ2019-27 IE2019-109 MVE2019-48 |
In recent years, the demand for robots to work in place of humans in dangerous disaster sites has been increasing. At th... [more] |
IMQ2019-27 IE2019-109 MVE2019-48 pp.63-67 |
SS |
2020-03-04 13:50 |
Okinawa |
(Okinawa) (Cancelled but technical report was issued) |
A Decision Procedure for a Macro Forest Transducer being an Implementation of an XML Schema Mapping Hiroaki Tabata, Masahiko Sakai, Kenji Hashimoto (Nagoya Univ. G. S.) SS2019-43 |
XML Schema Mapping (SM) describes the correspondence between two different XML Schema DTDs using a tree pattern.
A dete... [more] |
SS2019-43 pp.13-18 |
SS |
2019-03-04 16:45 |
Okinawa |
(Okinawa) |
SQL queries for generating input constraints of SMT solvers from descriptions of combinatorial optimization problems Genki Sakanashi, Masahiko Sakai, Naoki Nishida, Kenji Hashimoto (Nagoya Univ.) SS2018-66 |
The authors recently proposed an SQL-based language CombSQL+ for specifying combinatorial optimization problems, and sho... [more] |
SS2018-66 pp.85-90 |
PRMU, CNR |
2019-03-01 10:00 |
Tokushima |
(Tokushima) |
Local path generation using deep reinforcement learning for four-limbed robots in disaster site Toshiki Kurosawa (Waseda Univ.), Hiroyuki Ogata (Seikei Univ.), Takaaki Ohkawauchi, Takashi Matsuzawa, Ohya Jun (Waseda Univ.), Kenji Hashimoto (Meiji Univ), Atsuo Takanishi (Waseda Univ.) PRMU2018-125 CNR2018-48 |
In recent years, the demand for the use of robots in disaster sites has increased. In this paper, we propose and investi... [more] |
PRMU2018-125 CNR2018-48 pp.59-64 |
SS, DC |
2017-10-19 13:45 |
Kochi |
Kochi City Culture-plaza CUL-PORT (Kochi) |
A Direct Update Method for Compressed Data with Top Tree Suguru Nishimura, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2017-22 DC2017-21 |
This paper proposes a direct update method for a data compressed with top tree. For a given compressed data (top DAG) an... [more] |
SS2017-22 DC2017-21 pp.7-12 |
SS, KBSE, IPSJ-SE [detail] |
2017-07-19 10:20 |
Hokkaido |
(Hokkaido) |
Graph compression by tree grammars and direct evaluation of a node selection query on a compressed graph Takeshi Takeda, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2017-1 KBSE2017-1 |
Graphs expressing relationships between real-world data tend to be extremely large, and researches on graph compression ... [more] |
SS2017-1 KBSE2017-1 pp.1-6 |
SS, KBSE, IPSJ-SE [detail] |
2017-07-20 16:15 |
Hokkaido |
(Hokkaido) |
A compiler that translates to Malbolge from a C-language subset containing recursive calls Genki Sakanashi, Shohei Kobe, Masahiko Sakai, Naoki Nishida, Kenji Hashimoto (Nagoya Univ.) SS2017-18 KBSE2017-18 |
Malbolge is an esoteric programming language, which is promising to protect intellectual property rights due to its diff... [more] |
SS2017-18 KBSE2017-18 pp.145-150 |
SS |
2017-03-09 09:55 |
Okinawa |
(Okinawa) |
Logical Formula Simplification and Static Analysis for Quantitative Information Flow Analysis using Model Counting Masato Nakashima, Kenji Hashimoto, Masahiko Sakai, Hiroyuki Seki (Nagoya Univ.) SS2016-61 |
Model counting is one of the promising methods for quantitative information flow analysis. In this paper, we focus on th... [more] |
SS2016-61 pp.7-12 |
SS |
2017-03-10 11:10 |
Okinawa |
(Okinawa) |
Sufficient Conditions for the Decidability of Query Preservation of Non-Linear Topdown Tree Transducers Taka Ishihara, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2016-78 |
Query preservation means that, for given transformation and query, there is some query for transformed data such that on... [more] |
SS2016-78 pp.109-114 |
MSS, SS |
2017-01-27 14:10 |
Kyoto |
Kyoto Institute of Technology (Kyoto) |
A Translation from a Fragment of XPath to Deterministic Selecting Tree Automata with Lookahead Using Schemas Masaya Kawamoto, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) MSS2016-75 SS2016-54 |
XPath is known as a query language for XML documents.
Translating an XPath formula to a deterministic tree automaton ma... [more] |
MSS2016-75 SS2016-54 pp.107-112 |
DC, SS |
2016-10-27 15:30 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. (Shiga) |
Efficiency Improvement in #SMT-based Quantitative Information Flow Analysis Masato Nakashima, Trung Chu Bao, Kenji Hashimoto, Masahiko Sakai, Hiroyuki Seki (Nagoya Univ.) SS2016-26 DC2016-28 |
Model counting is one of the promising methods for quantitative information flow analysis. In this paper, we focus on th... [more] |
SS2016-26 DC2016-28 pp.49-54 |
DC, SS |
2016-10-27 15:55 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. (Shiga) |
A Direct Update Method for XML Documents Including Data Values Compressed by Tree Grammars Ryunosuke Takayama, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) SS2016-27 DC2016-29 |
A tree grammar based compression is known as one of the compression methods for XML documents. Also, methods for updatin... [more] |
SS2016-27 DC2016-29 pp.55-60 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-14 12:40 |
Hokkaido |
(Hokkaido) |
A Method of Tree Compression with Top Trees and Direct Query Evaluation Suguru Nishimura, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2016-10 KBSE2016-16 |
Tree compression methods that utilize the structural information have the advantage that a compressed document can be di... [more] |
SS2016-10 KBSE2016-16 pp.93-98 |
SS |
2016-03-10 10:25 |
Okinawa |
(Okinawa) |
On the query preservation for nondeterministic tree transducers Kazuki Miyahara (NAIST), Kenji Hashimoto (Nagoya Univ.), Hiroyuki Seki (NAIST/Nagoya Univ.) SS2015-79 |
We consider the problem of deciding whether a query can be rewritten by a nondeterministic view. It is known that rewrit... [more] |
SS2015-79 pp.19-24 |
LOIS |
2016-03-03 14:40 |
Okinawa |
Central Community Center, Miyakojima-City (Okinawa) |
An Extension of Update Method without Decompression for Compressed Structured Documents and Its Experimental Evaluation Takeshi Goto, Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) LOIS2015-75 |
XML is a {it de facto} standard for data storage and exchange, and various compression methods for XML documents have be... [more] |
LOIS2015-75 pp.69-74 |
SS, MSS |
2016-01-25 14:00 |
Ishikawa |
Shiinoki-Geihin-Kan (Ishikawa) |
A Verification Tool for k-Secrecy of XML Databases and Its Optimization Takatoshi Asai, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2015-43 SS2015-52 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
MSS2015-43 SS2015-52 pp.47-52 |
SS |
2015-05-12 13:00 |
Kumamoto |
Kumamoto University (Kumamoto) |
Query-Based l-Diversity Chittaphone Phonharath (NAIST), Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2015-14 |
[more] |
SS2015-14 pp.65-70 |
SS |
2015-05-12 13:30 |
Kumamoto |
Kumamoto University (Kumamoto) |
A Verification Method for k-Secrecy of XML Databases by Model Counting Takatoshi Asai, Masanori Uesugi, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2015-15 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
SS2015-15 pp.71-76 |