The SCEAS System
Navigation Menu

Search the dblp DataBase


Hiroyuki Seki: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hiroyuki Seki, Yasunori Ishihara, Minoru Ito
    Authorization Analysis of Queries in Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    DOOD, 1995, pp:521-538 [Conf]
  2. Hiroyuki Seki, Ryuichi Nakanishi, Yuichi Kaji, Sachiko Ando, Tadao Kasami
    Parallel Multiple Context-Free Grammars, Finite-State Translation Systems, and Polynomial-Time Recognizable Subclasses of Lexical-Functional Grammars. [Citation Graph (0, 0)][DBLP]
    ACL, 1993, pp:130-139 [Conf]
  3. Hisashi Mohri, Ikuya Yasuda, Yoshiaki Takata, Hiroyuki Seki
    Certificate Chain Discovery in Web of Trust for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:479-485 [Conf]
  4. Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue
    Analysis and Implementation Method of Program to Detect Inappropriate Information Leak. [Citation Graph (0, 0)][DBLP]
    APAQS, 2001, pp:5-12 [Conf]
  5. Isao Yagi, Yoshiaki Takata, Hiroyuki Seki
    A Static Analysis Using Tree Automata for XML Access Control. [Citation Graph (0, 0)][DBLP]
    ATVA, 2005, pp:234-247 [Conf]
  6. Masahiro Higuchi, Osamu Shirakawa, Hiroyuki Seki, Mamoru Fujii, Tadao Kasami
    A Verification Procedure via Invariant for Extended Communicating Finite-State Machines. [Citation Graph (0, 0)][DBLP]
    CAV, 1992, pp:384-395 [Conf]
  7. Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki
    An efficient security verification method for programs with stack inspection. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:68-77 [Conf]
  8. Naoya Nitta, Hiroyuki Seki
    An Extension of Pushdown System and Its Model Checking Method. [Citation Graph (0, 0)][DBLP]
    CONCUR, 2003, pp:278-292 [Conf]
  9. Yoshiaki Takata, Kokoro Nakagawa, Hiroyuki Seki
    Flexible Category Structure for Supporting WWW Retrieval. [Citation Graph (0, 0)][DBLP]
    ER (Workshops), 2000, pp:165-177 [Conf]
  10. Jing Wang, Yoshiaki Takata, Hiroyuki Seki
    HBAC: A Model for History-Based Access Control and Its Model Checking. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:263-278 [Conf]
  11. Yoshiaki Takata, Takeshi Nakamura, Hiroyuki Seki
    Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  12. Yasunori Ishihara, Hiroyuki Seki, Minoru Ito
    Type-Consistency Problems for Queries in Object-Oriented Databases. [Citation Graph (0, 12)][DBLP]
    ICDT, 1997, pp:364-378 [Conf]
  13. Shigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue
    An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:292-303 [Conf]
  14. Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki
    A Specification Language for Distributed Policy Control. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:386-398 [Conf]
  15. Kazuhiro Kosuge, Hiroyuki Seki, Tomohiro Oosumi
    Calibration of Coordinate System for Decentralized Coordinated Motion Control of Multiple Manipulators. [Citation Graph (0, 0)][DBLP]
    ICRA, 1998, pp:3297-3302 [Conf]
  16. Mizuho Ikeda, Yoshiaki Takata, Hiroyuki Seki
    Formal Specification and Implemenation Using a Task Flow Diagram in Interactive System Design. [Citation Graph (0, 0)][DBLP]
    ISAS-SCI (1), 2001, pp:422-428 [Conf]
  17. Susumu Kiyamura, Yoshiaki Takata, Hiroyuki Seki
    Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition. [Citation Graph (0, 0)][DBLP]
    PPAM, 2003, pp:298-305 [Conf]
  18. Hitoshi Ohsaki, Hiroyuki Seki, Toshinori Takai
    Recognizing Boolean Closed A-Tree Languages with Membership Conditional Rewriting Mechanism. [Citation Graph (0, 0)][DBLP]
    RTA, 2003, pp:483-498 [Conf]
  19. Hiroyuki Seki, Toshinori Takai, Youhei Fujinaka, Yuichi Kaji
    Layered Transducing Term Rewriting System and Its Recognizability Preserving Property. [Citation Graph (0, 0)][DBLP]
    RTA, 2002, pp:98-113 [Conf]
  20. Toshinori Takai, Yuichi Kaji, Hiroyuki Seki
    Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability. [Citation Graph (0, 0)][DBLP]
    RTA, 2000, pp:246-260 [Conf]
  21. Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata
    Security verification of programs with stack inspection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:31-40 [Conf]
  22. Jun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki
    Integrating presence inference into trust management for ubiquitous systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:59-68 [Conf]
  23. Yuichi Kaji, Ryuchi Nakanishi, Hiroyuki Seki, Tadao Kasami
    The Computational Complexity of the Universal Recognition Problem for Parallel Multiple Context-Free Grammars. [Citation Graph (0, 0)][DBLP]
    Computational Intelligence, 1994, v:10, n:, pp:440-452 [Journal]
  24. Yuki Kato, Hiroyuki Seki, Tadao Kasami
    On the Generative Power of Grammars for RNA Secondary Structure. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:53-64 [Journal]
  25. Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue
    An information-leak analysis system based on program slicing. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2002, v:44, n:15, pp:903-910 [Journal]
  26. Yasunori Ishihara, Shougo Shimizu, Hiroyuki Seki, Minoru Ito
    Refinements of Complexity Results on Type Consistency for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2001, v:62, n:4, pp:537-564 [Journal]
  27. Katsuro Inoue, Hiroyuki Seki, Kenichi Taniguchi, Tadao Kasami
    Compiling and Optimizing Methods for the Functional Language ASL/F. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1986, v:7, n:3, pp:297-312 [Journal]
  28. Yasunori Ishihara, Shin Ishii, Hiroyuki Seki, Minoru Ito
    Temporal Reasoning about Two Concurrent Sequences of Events. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2004, v:34, n:2, pp:498-513 [Journal]
  29. Hiroyuki Seki, T. Matsumura, Mamoru Fujii, Tadao Kasami
    On Multiple Context-Free Grammars. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1991, v:88, n:2, pp:191-229 [Journal]
  30. Katsuro Inoue, Hiroyuki Seki, Hikaru Yagi
    Analysis of Functional Programs to Detect Run-Time Garbage Cells. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1988, v:10, n:4, pp:555-578 [Journal]
  31. Hitoshi Ohsaki, Hiroyuki Seki
    Languages Modulo Normalization. [Citation Graph (0, 0)][DBLP]
    FroCos, 2007, pp:221-236 [Conf]
  32. Yasunori Ishihara, Toshiyuki Morita, Hiroyuki Seki, Minoru Ito
    An equational logic based approach to the security problem against inference attacks on object-oriented databases. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2007, v:73, n:5, pp:788-817 [Journal]

  33. Automatic Generation of History-Based Access Control from Information Flow Specification. [Citation Graph (, )][DBLP]

  34. Throughput Performance of Pre-coding MIMO Transmission with Multi-Beam Selection. [Citation Graph (, )][DBLP]

  35. Prediction of Protein Beta-Sheets: Dynamic Programming versus Grammatical Approach. [Citation Graph (, )][DBLP]

  36. Throughput Performance of Downlink MIMO Transmission with Multi-Beam Selection using a Novel Codebook. [Citation Graph (, )][DBLP]

  37. Chomsky-Schützenberger-Type Characterization of Multiple Context-Free Languages. [Citation Graph (, )][DBLP]

  38. Events and Sightings. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002