Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2020-03-04 13:50 |
Okinawa |
(Okinawa) (Cancelled but technical report was issued) |
A Decision Procedure for a Macro Forest Transducer being an Implementation of an XML Schema Mapping Hiroaki Tabata, Masahiko Sakai, Kenji Hashimoto (Nagoya Univ. G. S.) SS2019-43 |
XML Schema Mapping (SM) describes the correspondence between two different XML Schema DTDs using a tree pattern.
A dete... [more] |
SS2019-43 pp.13-18 |
DC, SS |
2018-10-05 10:50 |
Aichi |
Inuyama City Kokusai-Kanko Center Freud (Aichi) |
Masaki Natsume, Yuya Aizawa (Tokyo Tech.), Noritoshi Atsumi (Kyoto U.), Takashi Kobayashi (Tokyo Tech.) SS2018-24 DC2018-25 |
(To be available after the conference date) [more] |
SS2018-24 DC2018-25 pp.37-42 |
KBSE |
2018-03-01 17:00 |
Okinawa |
(Okinawa) |
Analysis of Specification in Japanese using Natural Language Processing and Review Supporting with Speech Synthesis Kozo Okano, Kazuma Takahashi, Yusuke Naka, Shinpei Ogata (Shinshu Univ.), Toshifusa Sekizawa (Nihon Univ.) KBSE2017-52 |
The requirement specification for software is often described
in a natural language and thus may include ambiguity and ... [more] |
KBSE2017-52 pp.79-84 |
LOIS, ICM |
2018-01-19 10:50 |
Kumamoto |
Sojo University (Kumamoto) |
Dissemination of Student Information Based on XML Schema Seikoh Nishita, Yuji Watanabe (Takushoku Univ.) ICM2017-45 LOIS2017-61 |
FOSTER2 is a student information system that aggregate fragments of student information provided by information servers ... [more] |
ICM2017-45 LOIS2017-61 pp.63-68 |
SS, DC |
2017-10-19 13:45 |
Kochi |
Kochi City Culture-plaza CUL-PORT (Kochi) |
A Direct Update Method for Compressed Data with Top Tree Suguru Nishimura, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2017-22 DC2017-21 |
This paper proposes a direct update method for a data compressed with top tree. For a given compressed data (top DAG) an... [more] |
SS2017-22 DC2017-21 pp.7-12 |
SS, DC |
2017-10-19 14:15 |
Kochi |
Kochi City Culture-plaza CUL-PORT (Kochi) |
A Transformation Method of XQuery Expressions for Evaluation on Compressed XML Documents Jukiya Ogura, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) SS2017-23 DC2017-22 |
While XML documents can easily express data structure, there is a disadvantage that the document size becomes large. For... [more] |
SS2017-23 DC2017-22 pp.13-18 |
SS |
2017-03-10 11:10 |
Okinawa |
(Okinawa) |
Sufficient Conditions for the Decidability of Query Preservation of Non-Linear Topdown Tree Transducers Taka Ishihara, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2016-78 |
Query preservation means that, for given transformation and query, there is some query for transformed data such that on... [more] |
SS2016-78 pp.109-114 |
MSS, SS |
2017-01-27 14:10 |
Kyoto |
Kyoto Institute of Technology (Kyoto) |
A Translation from a Fragment of XPath to Deterministic Selecting Tree Automata with Lookahead Using Schemas Masaya Kawamoto, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) MSS2016-75 SS2016-54 |
XPath is known as a query language for XML documents.
Translating an XPath formula to a deterministic tree automaton ma... [more] |
MSS2016-75 SS2016-54 pp.107-112 |
ICSS |
2016-11-25 14:40 |
Kanagawa |
Institute of Information Security (Kanagawa) |
A fuzz testing method cooperated with threat modeling Yasuhiko Nishio, Tadashi Shiroma (CCDS), Hiroyuki Inoue (CCDS/HCU) ICSS2016-41 |
The purpose of this study is to develop a fuzz testing method that can ensure the IoT security especially automotive sys... [more] |
ICSS2016-41 pp.15-20 |
DC, SS |
2016-10-27 15:55 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. (Shiga) |
A Direct Update Method for XML Documents Including Data Values Compressed by Tree Grammars Ryunosuke Takayama, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) SS2016-27 DC2016-29 |
A tree grammar based compression is known as one of the compression methods for XML documents. Also, methods for updatin... [more] |
SS2016-27 DC2016-29 pp.55-60 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-14 12:40 |
Hokkaido |
(Hokkaido) |
A Method of Tree Compression with Top Trees and Direct Query Evaluation Suguru Nishimura, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2016-10 KBSE2016-16 |
Tree compression methods that utilize the structural information have the advantage that a compressed document can be di... [more] |
SS2016-10 KBSE2016-16 pp.93-98 |
SS |
2016-03-10 13:00 |
Okinawa |
(Okinawa) |
XQuery Type Inference under Restricted DTDs Kenji Sugimura, Yasunori Ishihara (Osaka Univ.), Kato Hiroyuki (NII), Fujiwara Toru (Osaka Univ.) SS2015-82 |
XQuery type inference is an important problem that is useful for query optimization. Howerver, precise type inference fo... [more] |
SS2015-82 pp.37-42 |
LOIS |
2016-03-03 14:40 |
Okinawa |
Central Community Center, Miyakojima-City (Okinawa) |
An Extension of Update Method without Decompression for Compressed Structured Documents and Its Experimental Evaluation Takeshi Goto, Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) LOIS2015-75 |
XML is a {it de facto} standard for data storage and exchange, and various compression methods for XML documents have be... [more] |
LOIS2015-75 pp.69-74 |
SS, MSS |
2016-01-25 14:00 |
Ishikawa |
Shiinoki-Geihin-Kan (Ishikawa) |
A Verification Tool for k-Secrecy of XML Databases and Its Optimization Takatoshi Asai, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2015-43 SS2015-52 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
MSS2015-43 SS2015-52 pp.47-52 |
EMM |
2016-01-18 13:30 |
Miyagi |
Katahira Campus, Tohoku University (Miyagi) |
Data hiding into OOXML documents for suppression of plagiarism Akinori Ito (Tohoku Univ.) EMM2015-62 |
(To be available after the conference date) [more] |
EMM2015-62 pp.7-12 |
CNR |
2015-12-18 14:00 |
Kanagawa |
(Kanagawa) |
Development of a Proxy Server based on RSNP to Retrive Weather and Disarster Information from JMA Sho'ji Suzuki (FUN) CNR2015-28 |
We propose a framework for robots to subscribe weather and disaster information that is used to implement a network base... [more] |
CNR2015-28 pp.71-74 |
SS |
2015-05-12 13:30 |
Kumamoto |
Kumamoto University (Kumamoto) |
A Verification Method for k-Secrecy of XML Databases by Model Counting Takatoshi Asai, Masanori Uesugi, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2015-15 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
SS2015-15 pp.71-76 |
SS |
2015-03-09 13:50 |
Okinawa |
OKINAWAKEN SEINENKAIKAN (Okinawa) |
Removing Possibility of Ambiguous Message Ordering in Sequence Diagram Noa Kusunoki, Kozo Okano, Shinji Kusumoto (Osaka Univ.) SS2014-62 |
This report proposes a method to detect and repair software faults in sequence diagrams which are used for software desi... [more] |
SS2014-62 pp.43-48 |