Author of the publication

Search Experiment of Business-Rule by Dynamic Constraint Algebra.

, , and . ICDE Workshops, page 1272. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Iwaihara, Mizuho
add a person with the name Iwaihara, Mizuho
 

Other publications of authors with the same name

Few-Shot Multi-label Aspect Category Detection Utilizing Prototypical Network with Sentence-Level Weighting and Label Augmentation., and . DEXA (2), volume 14147 of Lecture Notes in Computer Science, page 363-377. Springer, (2023)Lightweight Efficient Multi-keyword Ranked Search over Encrypted Cloud Data using Dual Word Embeddings., and . CoRR, (2017)Revision graph extraction in Wikipedia based on supergram decomposition., and . OpenSym, page 10:1-10:6. ACM, (2013)Suggesting Specific Segments as Link Targets in Wikipedia., and . ICADL, volume 10075 of Lecture Notes in Computer Science, page 394-405. Springer, (2016)WikiReviz: An Edit History Visualization for Wiki Systems., and . APWeb, volume 8709 of Lecture Notes in Computer Science, page 670-673. Springer, (2014)Iterative algorithm for inferring entity types from enumerative descriptions., and . WWW (Companion Volume), page 1285-1290. ACM, (2014)Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents., , and . DASFAA (1), volume 5981 of Lecture Notes in Computer Science, page 299-306. Springer, (2010)Towards Translating Authorizations for Transformed XML Documents., , and . WISE, page 291-300. IEEE Computer Society, (2002)Secure Interoperability between Cooperating XML Systems by Dynamic Role Translation., , and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 866-875. Springer, (2003)Detecting Information Leakage in Updating XML Documents of Fine-Grained Access Control., and . DEXA, volume 4080 of Lecture Notes in Computer Science, page 286-296. Springer, (2006)