-
Masami Hagiya, Koichi Takahashi, Mitsuharu Yamamoto, Takahiro Sato
Session ID: 1A-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
In our previous work, we proposed a method based on temporal logic for abstracting link structures consisting of cells pointing to one another. Cells are abstracted by abstract cells representing truth or falsity of each of the temporal formulas specified in advance, and an entire link structure is abstracted by a set of abstract cells. In this work, we tried to apply the method to analyze cellular automata. In order to abstract this new state of the link structure, we introduced the operations to split and merge abstract cells. By this method, we successfully analyzed simple one-dimensional (and two-dimensional) cellular automata. In this talk, we also explain the satisfiability of the two-way CTL (computation tree logic), which is used as a basis of the method.
View full abstract
-
Yoshihiko Futamura, Zenjiro Konishi, Kazuaki Maeho, Masahiko Kawabe
Session ID: 1A-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
We present a method to generate a suffix trie st(p) from a naive O(mn) pattern matcher nm(p,t) and a text
t by Generalized Partial Computation (GPC). The generated st(p) runs in O(m) time where
m and
n stand for the length of pattern
p and text
t, respectively. The size of st(p) is O(n) while the one of the residual program produced by a conventional partial evaluater is O(n
2).
View full abstract
-
Takuma Murakami, Shingo Nishioka, Zhenjiang Hu, Akihiko Takano
Session ID: 1A-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Norio Kato, Kazunori Ueda
Session ID: 1A-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Shingo Yajima, Takahiko Nagata, Norio Kato, Kazunori Ueda
Session ID: 1A-5
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
LMNtal is a language model based on hierarchical graph rewriting. It is intended to allow uniform and concise description of various forms of computation including distributed processing.LMNtal is a multiset rewriting language featuring fine-grained concurrency. However, how to implement it correctly and efficiently is not clear because: (i) the multisets can be structuredusing membranes, (ii) each membrane can have its own set of local rewrite rules, and (iii) sets of rewrite rules can migrate.This paper describes the runtime system of a prototype LMNtal implementation that uses multiple stacks. The runtime system can be executed using multiple virtual machines, making it amenable todistributed implementation. The prototype is under development using Java and Ruby.
View full abstract
-
SHIN-YA NISHIZAKI, TOMOYUKI UEDA
Session ID: 1B-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Akihito Nagata, Naoki Kobayashi, Akinori Yonezawa
Session ID: 1B-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Munehiro Takimoto
Session ID: 1B-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
We propose an approach to efficiently detect equalitiesamong SSA form expressions based on checking extended dominancerelation, called generalized dominance relation.Our technique checks the generalized dominance relationbased on the depth of control flow graph without up-edges.Since reachability to relevant points of dominance relation isexpected by the depth of the points, relevant points unreachablealong control flow graph edges can be ignored, and it is enoughto traverse dominator tree edges.We show the efficiency of our technique as compared with thedataflow analysis approach.
View full abstract
-
Tasuku Hiraishi, Masahiro Yasugi, Tsuneyasu Komiya, Taiichi Yuasa
Session ID: 1B-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Hayato Kawashima, Katsuhiko Gondow
Session ID: 1B-5
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Akiyoshi Sugiki, Kenji Kono, Hideya Iwasaki, Takashi Masuda
Session ID: 1C-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Satoshi Watanabe, Takayuki Ito, Tadachika Ozono, Toramatsu Shintani
Session ID: 1C-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
XIAO SHAO, Takehiro Tokuda
Session ID: 1C-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Shinobu Miyazato, Shinji Kono
Session ID: 1C-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
When connecting and using two or more applications on a network, usually, a server is prepared in the center of a network. Each client communicates with other clients through a server. However, in such a network topology, if the number of clients increase, server will impossible to process message from clients. As an example, Using Remote Editing Protocol between the text editors connected in a ring, the whole edit state is held. We propose the method of enabling interactive editing between text editors.
View full abstract
-
Shigeki Hagihara, Naoki Yonezaki
Session ID: 1C-5
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
It is supposed that multiple bidders participate in auctions and every biddershould be treated fairly. We nowadays find online auctions everywhere, and itis desirable to verify their fairness property. The fairness can be consideredas the property that any bidder can not behave dishonestly and the propertythat bidders are never treated wrongfully. In this paper, we formalize auctionprotocols and the fairness properties to be verified by using the framework ofstrand space introduced by F.J.T.Fabrega. We also consider characteristics offairness properties and show that some of the properties can be considered asone of agreement properties which are most popular properties of securityprotocols.
View full abstract
-
Hiroya Itoga, Kouji Kitamoto, Atsushi Ohnishi
Session ID: 1D-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
Security can be guaranteed with software specification which includes security requirements. Scenarios make it clear among stakeholders that concrete ways to defend from attacks when they are used on requirements elicitation. Furthermore, the scenarios give some actual cases for testing the software to detect the vulnerabilities. However, it is difficult for general users to describe a scenario with security requirements. In this paper the authors propose a method to guarantee the security with appending exceptional scenarios to the normal scenario; the exceptional scenarios are automatically generated and these express the behaviour of evil actors and the reactions against them. The evil actors are assumed to attack to the typical or system specific vulnerabilities.
View full abstract
-
Kozo Matsushita, Masami Hagiya
Session ID: 1D-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
Proof-carrying authentication is a method for implementing general-purpose access control systems. In this method, a client requesting an access control sends a proof that he has a right to obtain the control, and a server checks the proof and gives the control to the client if the proof is correct. The burden at the server side is light because only a proof checker needs to be implemented. In this research, we are implementing proof-carrying authentication on cellular phones by building a transformer that generates a proof checker in Java from a description of a logical system expressed in logical framework. In this paper, we describe the overview of the transformer and a simple example application using proof-carrying authentication on cellular phones.
View full abstract
-
Yukinobu Mine, Hironori Hiraishi, Fumio Mizoguchi
Session ID: 1D-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Toshiyuki HIRATA, Takayuki ITO, Susumu KUNIFUJI
Session ID: 1D-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
JUNJI SATO, TAKASHI IMAIZUMI
Session ID: 1D-5
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Katsunobu Takahashi, Katsuhisa Maruyama
Session ID: 1E-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Noritoshi Atsumi, Shinichiro Yamamoto, Kiyoshi Agusa
Session ID: 1E-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Nao Akagawa, Nobuyuki Kaneko, Hideaki Nakamoto, Yoshiaki Ogawa, Kiyosh ...
Session ID: 1E-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Nobuyuki Kaneko, Nao Akagawa, Hideaki Nakamoto, Yoshiaki Ogawa, Kiyosh ...
Session ID: 1E-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Tadayoshi Sato, Tetsuo Tamai
Session ID: 1E-5
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
Implementations of design patterns on object-oriented programming languages lack modularity of pattern codes and its invasive nature makes the participating classes mutually dependent. This alienates reuse of codes and obstruct software evolution. We proposed a role-based computation model Epsilon, which can modularize pattern codes of design pattens and reduce its invasive nature. Thus, it enhances reusability of design patterns and their participating classes. This leads to promotion of software evolution.
View full abstract
-
Shin NAKAJIMA, Tetsuo TAMAI
Session ID: 2A-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
JAAS is a basis for user-centric access control, and is an infrastructuresoftware to implement high-level security policy. It, however, requires someamount of programming as well as grant relationships stored declaratively ina policy file. Therefore, verifying that the high-level requirement is correclyimplemented in Java programs. This paper proposes to use Alloy, a formalspecification and analysis tool, for descriptions and verifications of high-levelsecurity policy with an example case of encoding LBAC on JAAS.
View full abstract
-
Atsushi Ohori, Tomoyuki Higuchi
Session ID: 2A-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Koji Hasebe, Mitsuhiro Okada, Jean-Pierre Jouannaud, Antoine Kremer, R ...
Session ID: 2A-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
We give a method for safety verification of real-time system by means of Linear Logic. Our method is applied especially to a system in which a number of agents and/or time constraint conditions can be changed dynamically. We illustrate a method to find a conjecture of safety condition in our framework, using a simple example.
View full abstract
-
Ken Satoh
Session ID: 2A-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Akihiro Yamamoto
Session ID: 2A-5
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Jianjun Zhao
Session ID: 2B-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Tetsuo Yokoyama, Zhenjiang Hu, Masato Takeichi
Session ID: 2B-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Yuji Mizobuchi, Toshiharu Nakaya, masataka sassa
Session ID: 2B-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Certifying Consistency of a Maildir Folder Library
Kiyoshi Yamada, Akira Sasaki, Tomoyuki Mochizuki, Takuo Watanabe
Session ID: 2B-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Tomohiro Kimura, Takeshi Hagiwara
Session ID: 2B-5
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Takafumi Yamaya, Yuta Nagata, Hiromitsu Hattori, Takayuki Ito, Toramat ...
Session ID: 2C-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Yusuke Hiraoka, Tomoharu Hasegawa, Yoshinobu Bochi, Takayuki Ito, Tora ...
Session ID: 2C-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Hironori Hiraishi, Fumio Mizoguchi
Session ID: 2C-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Atsushi TAKAHASHI, Takashi IMAIZUMI
Session ID: 2C-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Takashi Masuyama, Peschanski Frederic, Yoshihiro Oyama, Akinori Yoneza ...
Session ID: 2C-5
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Makoto Yokoo
Session ID: 2D-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Akira Sadoyama, Shinji Kono, Ryuji Kosugi
Session ID: 2D-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
On a current online game systems, it use centralized server usually.However, if the game user increase to millions of units, in some case, A processing of the server becomes very slow and hinders game progress.So, we have proposed a framework using Agent.On some high spec PC, it operates the game process and network communication instead of video game machine.We suggest a communication protocol thatrealize online games and reduce trafficon the network between Agents which change dynamically.
View full abstract
-
Hiromitsu Hattori, Takayuki Ito, Tadachika Ozono, Toramatsu Shintani
Session ID: 2D-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Yasuto Mukai, Atsushi Isomura, Hiromitsu Hattori, Takayuki Ito, Torama ...
Session ID: 2D-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Akihumi MIYAZAKI, Takashi IMAIZUMI
Session ID: 2E-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Katsuya Fujiwara, Takeshi Chusho, Hideo Tamamoto
Session ID: 2E-2
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Tomoaki Ishiyama, Kouichi Ono, Yoshiaki Fukazawa
Session ID: 2E-3
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Mitsuhisa Taguchi, Takehiro Tokuda
Session ID: 2E-4
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
Toshihiro Yamaguchi, Takayuki Ito, Toramatsu Shintani
Session ID: 2E-5
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
-
KAZUKO TAKAHASHI
Session ID: 3A-1
Published: 2003
Released on J-STAGE: December 17, 2003
CONFERENCE PROCEEDINGS
FREE ACCESS
This paper presents a reasoning method on such a phenomenon thata property holding in some region is propagatedto another region.SRCC is an extention of RCC so that it can handle the integration of spatial and semantic data.In this paper,we present an algrithm that finds the spatial relationbetween the regionswhen the relative relation of the attibute of some region and that of anotheris given.Using the algorithm,we can determine the place where a newly introduced region is placed.In this paper,we show an application to a problem of propagation of the contamination.
View full abstract