Fumiko Satoh

According to our database1, Fumiko Satoh authored at least 21 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Automating Domain Squatting Detection Using Representation Learning.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Multi-factor-based Motion Detection for Server Rack Doors Left Open.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2018
Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

Content Aware Source Code Change Description Generation.
Proceedings of the 11th International Conference on Natural Language Generation, 2018

Bug Localization by Learning to Rank and Represent Bug Inducing Changes.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Modeling Sentiment Polarity in Support Ticket Data for Predicting Cloud Service Subscription Renewal.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

2016
Adaptable Privacy-Preserving Data Curation for Business Process Analysis Services.
Proceedings of the IEEE International Conference on Services Computing, 2016

2013
Total Energy Management System for Cloud Computing.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

2011
Security Policy Composition for Composite Web Services.
IEEE Trans. Serv. Comput., 2011

XBRL Taxonomy for Estimating the Effects of Greenhouse Gas Emissions on Corporate Financial Positions.
Int. J. E Bus. Res., 2011

2010
Validating Security Policy Conformance with WS-Security Requirements.
Proceedings of the Advances in Information and Computer Security, 2010

2009
Static vs. Dynamic Validation of BSP Conformance.
Proceedings of the IEEE International Conference on Web Services, 2009

2008
Methodology and Tools for End-to-End SOA Security Configurations.
Proceedings of the 2008 IEEE Congress on Services, Part I, 2008

Security Policy Composition for Composite Services.
Proceedings of the Eighth International Conference on Web Engineering, 2008

Pattern-based Policy Configuration for SOA Applications.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Generic Security Policy Transformation Framework for WS-Security.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Verifying the Consistency of Security Policies by Abstracting into Security Types.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Syntactic Validation of Web Services Security Policies.
Proceedings of the Service-Oriented Computing, 2007

2006
Adding Authentication to Model Driven Security.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

2004
Single Sign On Architecture with Dynamic Tokens.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

2002
Learning personalized video highlights from detailed MPEG-7 metadata.
Proceedings of the 2002 International Conference on Image Processing, 2002


  Loading...