default search action
Yoshiaki Takata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]So Koide, Yoshiaki Takata, Hiroyuki Seki:
Non-Cooperative Rational Synthesis Problem on Stochastic Games for Positional Strategies. IEICE Trans. Inf. Syst. 107(3): 301-311 (2024) - [j17]Yoshiaki Takata, Akira Onishi, Ryoma Senda, Hiroyuki Seki:
A Subclass of Mu-Calculus with the Freeze Quantifier Equivalent to Büchi Register Automata. IEICE Trans. Inf. Syst. 107(12): 1529-1532 (2024) - [c23]Rindo Nakanishi, Yoshiaki Takata, Hiroyuki Seki:
Verification with Common Knowledge of Rationality for Graph Games. ICTAC 2024: 232-248 - [i7]Yoshiaki Takata, Akira Onishi, Ryoma Senda, Hiroyuki Seki:
A Subclass of Mu-Calculus with the Freeze Quantifier Equivalent to Buchi Register Automata. CoRR abs/2406.11351 (2024) - [i6]Rindo Nakanishi, Yoshiaki Takata, Hiroyuki Seki:
Verification with Common Knowledge of Rationality for Graph Games. CoRR abs/2409.12461 (2024) - [i5]So Koide, Yoshiaki Takata, Hiroyuki Seki:
Non-cooperative rational synthesis problem for probabilistic strategies. CoRR abs/2409.18155 (2024) - 2023
- [j16]Rindo Nakanishi, Yoshiaki Takata, Hiroyuki Seki:
Pumping Lemmas for Languages Expressed by Computational Models with Registers. IEICE Trans. Inf. Syst. 106(3): 284-293 (2023) - [j15]Yoshiaki Takata, Akira Onishi, Ryoma Senda, Hiroyuki Seki:
A Subclass of Mu-Calculus with the Freeze Quantifier Equivalent to Register Automata. IEICE Trans. Inf. Syst. 106(3): 294-302 (2023) - [c22]Rindo Nakanishi, Yoshiaki Takata, Hiroyuki Seki:
A Game-Theoretic Approach to Indistinguishability of Winning Objectives as User Privacy. ICTAC 2023: 36-54 - [i4]Rindo Nakanishi, Yoshiaki Takata, Hiroyuki Seki:
A game-theoretic approach to indistinguishability of winning objectives as user privacy. CoRR abs/2307.00334 (2023) - 2022
- [j14]Yoshiaki Takata, Ryoma Senda, Hiroyuki Seki:
Reduction of Register Pushdown Systems with Freshness Property to Pushdown Systems in LTL Model Checking. IEICE Trans. Inf. Syst. 105-D(9): 1620-1623 (2022) - [j13]Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
Complexity results on register context-free grammars and related formalisms. Theor. Comput. Sci. 923: 99-125 (2022) - [c21]Rindo Nakanishi, Yoshiaki Takata, Hiroyuki Seki:
Active Learning for Deterministic Bottom-Up Nominal Tree Automata. ICTAC 2022: 342-359 - [i3]Yoshiaki Takata, Ryoma Senda, Hiroyuki Seki:
Reduction of Register Pushdown Systems with Freshness Property to Pushdown Systems in LTL Model Checking. CoRR abs/2203.11826 (2022) - [i2]Rindo Nakanishi, Yoshiaki Takata, Hiroyuki Seki:
Active Learning for Deterministic Bottom-up Nominal Tree Automata. CoRR abs/2208.08319 (2022) - 2021
- [j12]Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
Forward Regularity Preservation Property of Register Pushdown Systems. IEICE Trans. Inf. Syst. 104-D(3): 370-380 (2021) - [j11]Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
LTL Model Checking for Register Pushdown Systems. IEICE Trans. Inf. Syst. 104-D(12): 2131-2144 (2021) - [j10]Hiroyuki Seki, Reo Yoshimura, Yoshiaki Takata:
Optimal run problem for weighted register automata. Theor. Comput. Sci. 850: 185-201 (2021) - [c20]Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
Reactive Synthesis from Visibly Register Pushdown Automata. ICTAC 2021: 334-353 - 2020
- [j9]Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
Generalized Register Context-Free Grammars. IEICE Trans. Inf. Syst. 103-D(3): 540-548 (2020)
2010 – 2019
- 2019
- [c19]Hiroyuki Seki, Reo Yoshimura, Yoshiaki Takata:
Optimal Run Problem for Weighted Register Automata. ICTAC 2019: 91-110 - [c18]Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
Generalized Register Context-Free Grammars. LATA 2019: 259-271 - [i1]Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
Complexity Results on Register Pushdown Automata. CoRR abs/1910.10357 (2019) - 2018
- [c17]Ryoma Senda, Yoshiaki Takata, Hiroyuki Seki:
Complexity Results on Register Context-Free Grammars and Register Tree Automata. ICTAC 2018: 415-434 - 2014
- [j8]Pablo Lamilla Álvarez, Yoshiaki Takata:
A Formal Verification of a Subset of Information-Based Access Control Based on Extended Weighted Pushdown System. IEICE Trans. Inf. Syst. 97-D(5): 1149-1159 (2014) - 2013
- [c16]Pablo Lamilla Álvarez, Yoshiaki Takata:
An HBAC-based approximation for IBAC programs. SIN 2013: 277-281 - 2010
- [c15]Yoshiaki Takata, Hiroyuki Seki:
Automatic Generation of History-Based Access Control from Information Flow Specification. ATVA 2010: 259-275
2000 – 2009
- 2009
- [j7]Yoshiaki Takata, Hiroyuki Seki:
Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation. IEICE Trans. Inf. Syst. 92-D(2): 200-210 (2009) - [j6]Yoshiaki Takata, Hiroyuki Seki:
Comparison of the Expressive Power of Language-Based Access Control Models. IEICE Trans. Inf. Syst. 92-D(5): 1033-1036 (2009) - 2008
- [j5]Hisashi Mohri, Ikuya Yasuda, Yoshiaki Takata, Hiroyuki Seki:
New Certificate Chain Discovery Methods for Trust Establishment in Ad Hoc Networks and Their Evaluation. Inf. Media Technol. 3(1): 165-177 (2008) - 2007
- [j4]Isao Yagi, Yoshiaki Takata, Hiroyuki Seki:
A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power. IEICE Trans. Inf. Syst. 90-D(5): 799-807 (2007) - [j3]Isao Yagi, Yoshiaki Takata, Hiroyuki Seki:
A Static Analysis using Tree Automata for XML Access Control. Inf. Media Technol. 2(2): 433-447 (2007) - [c14]Hisashi Mohri, Ikuya Yasuda, Yoshiaki Takata, Hiroyuki Seki:
Certificate Chain Discovery in Web of Trust for Ad Hoc Networks. AINA Workshops (2) 2007: 479-485 - 2006
- [c13]Jing Wang, Yoshiaki Takata, Hiroyuki Seki:
HBAC: A Model for History-Based Access Control and Its Model Checking. ESORICS 2006: 263-278 - [c12]Jun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki:
Integrating presence inference into trust management for ubiquitous systems. SACMAT 2006: 59-68 - 2005
- [j2]Shigeta Kuninobu, Yoshiaki Takata, Naoya Nitta, Hiroyuki Seki:
Policy Controlled System and Its Model Checking. IEICE Trans. Inf. Syst. 88-D(7): 1685-1696 (2005) - [c11]Isao Yagi, Yoshiaki Takata, Hiroyuki Seki:
A Static Analysis Using Tree Automata for XML Access Control. ATVA 2005: 234-247 - 2004
- [c10]Yoshiaki Takata, Takeshi Nakamura, Hiroyuki Seki:
Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool. HICSS 2004 - 2003
- [c9]Yoshiaki Takata, Takeshi Nakamura, Hiroyuki Seki:
Automatic Accessibility Guideline Validation of XML Documents Based on a Specification Language. HCI (4) 2003: 1040-1044 - [c8]Susumu Kiyamura, Yoshiaki Takata, Hiroyuki Seki:
Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition. PPAM 2003: 298-305 - 2002
- [j1]Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue:
An information-leak analysis system based on program slicing. Inf. Softw. Technol. 44(15): 903-910 (2002) - [c7]Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki:
A Specification Language for Distributed Policy Control. ICICS 2002: 386-398 - 2001
- [c6]Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue:
Analysis and Implementation Method of Program to Detect Inappropriate Information Leak. APAQS 2001: 5-12 - [c5]Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki:
An efficient security verification method for programs with stack inspection. CCS 2001: 68-77 - [c4]Shigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue:
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes. ICICS 2001: 292-303 - [c3]Mizuho Ikeda, Yoshiaki Takata, Hiroyuki Seki:
Formal Specification and Implemenation Using a Task Flow Diagram in Interactive System Design. ISAS-SCI (1) 2001: 422-428 - [c2]Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata:
Security verification of programs with stack inspection. SACMAT 2001: 31-40 - 2000
- [c1]Yoshiaki Takata, Kokoro Nakagawa, Hiroyuki Seki:
Flexible Category Structure for Supporting WWW Retrieval. ER (Workshops) 2000: 165-177
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint