Author of the publication

A Study on Efficient Access Control for XML Ducuments.

, and . ICDE Workshops, page 1230. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Yoshikawa, Masatoshi
add a person with the name Yoshikawa, Masatoshi
 

Other publications of authors with the same name

ILOG: Declarative Creation and Manipulation of Object Identifiers., and . VLDB, page 455-468. Morgan Kaufmann, (1990)Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations., , , and . CoRR, (2017)Metadata management for integration and analysis of earth observation data., , , and . ICUIMC, page 123-130. ACM, (2009)XML Query Processing Using a Schema-Based Numbering Scheme., and . XSym, volume 3186 of Lecture Notes in Computer Science, page 21-34. Springer, (2004)A Relevant Score Normalization Method Using Shannon's Information Measure., , , , and . ICADL, volume 3815 of Lecture Notes in Computer Science, page 311-316. Springer, (2005)A Ranking Scheme for XML Information Retrieval Based on Benefit and Reading Effort., and . ICADL, volume 4822 of Lecture Notes in Computer Science, page 230-240. Springer, (2007)Behavior Analysis of Object-Oriented Databases: Method Structure, Execution Trees, and Reachability (Extended Abstract)., , and . FODO, volume 367 of Lecture Notes in Computer Science, page 371-388. Springer, (1989)Greedy Approximation Algorithms for Generalized Maximum Flow Problem towards Relation Extraction in Information Networks., , and . TJJCCGG, volume 8296 of Lecture Notes in Computer Science, page 132-142. Springer, (2012)A Method of Improving Feature Vector for Web Pages Reflecting the Contents of Their Out-Linked Pages., , , and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 891-901. Springer, (2002)Protecting Spatiotemporal Event Privacy in Continuous Location-Based Services., , , , and . CoRR, (2019)