Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Takehiro Tokuda is active.

Publication


Featured researches published by Takehiro Tokuda.


international conference on web engineering | 2008

A Method for Integration of Web Applications Based on Information Extraction

Hao Han; Takehiro Tokuda

Integration of Web services from different Web sites has brought new creativity and functionality to Web applications. These integration technologies, called mashup or mixup, have made a shift in Web service development and created a new generation of widely popular and successful Web services such as Google Maps API and YouTube Data API. However, the integration is limited to the Web sites that provide the open Web service APIs, and currently, most existing Web sites do not provide Web services. In this paper, we present a method to integrate the general Web applications. For this purpose, we propose a Web information extraction method to generate the virtual Web service functions from Web applications at client side. Our implementation shows that the general Web applications can be also integrated easily.


IEEE Transactions on Services Computing | 2011

Security Policy Composition for Composite Web Services

Fumiko Satoh; Takehiro Tokuda

An application based on the Service-Oriented Architecture (SOA) consists of an assembly of services, which is referred to as a composite service. A composite service can be implemented from other composite services, and hence, the application could have a recursive structure. Securing an SOA application is an important nonfunctional requirement. However, specifying a security policy for a composite service is not easy because the policy should be consistent with the policies of the external services invoked in the composite process. Therefore, this paper proposes a security policy composition mechanism that uses the existing policies of the external services. Our contribution is defining the process-independent policy composition rules and providing a method for semiautomatically creating a security policy of the composite service. Our method supports two approaches of policy composition: top-down and bottom-up. Our study makes it possible to verify the consistency of the policies without increasing a developers workload, even if the composite service has a recursive structure.


international conference on web engineering | 2008

WIKE: A Web Information/Knowledge Extraction System for Web Service Generation

Hao Han; Takehiro Tokuda

We have a tremendous amount of information/knowledge available on the Web today. We often have a situation in which we need to collect partial contents of a whole page from one or a number of Web sites. Examples are collection of capital city names and population data from country profile sites or collection of company names and their industrial fields from finance sites. We present WIKE, a system for partial information extraction from Web pages without programming. We also give its applications to Web service generation.


international conference on web engineering | 2008

Security Policy Composition for Composite Services

Fumiko Satoh; Takehiro Tokuda

An application based Service-Oriented Architecture(SOA) consists of an assembly of external services and the application is called as a composite service. Acomposite service could be implemented by other composite services hence the application could have a recursive structure, which is one of the features of SOA application. Securing an SOA application is an important non-functional requirement. However, specifying a security policy of a composite service is not so easy because the policy should keep the consistency with other policies of external services which are invoked in the process. We need the way to assure the consistency of policies, but the concrete way is not developed yet to specify a consistent policy for a composite service. Therefore, this paper proposes a security policy composition mechanism from existing policies of external services. Our contribution is creating a security policy of a composite service automatically based on predicate logic, with support for two approaches of policy composition: bottom-up and top-down. Also, we focus on three kinds of security policies, such as a Data Protection Policy, an Access Control Policy, and a Composite Process Policy, and propose the policy composition rules for each policy. Our mechanism makes it possible to validate the consistency of policies by inference without increasing a developers workload, even if a composite service has a recursive structure.


ieee symposium on human centric computing languages and environments | 2003

A visual approach for generating server page type Web applications based on template method

Mitsuhisa Taguchi; Tetsuya Suzuki; Takehiro Tokuda

A number of Web application generators have been proposed for automating management of the consistency and the security of Web applications. These approaches, however, concentrate on server program type architecture and it is difficult to apply them to server page type architecture. In this paper, extending the model for server program type Web applications, we propose Web transition diagrams for server page type Web applications. Then we present a Web application generator which generates server page type Web applications from our Web transition diagrams based on template method. Our system enables us to generate typical server page type Web applications by visual operations without procedural programming. Each generated Web page document has program codes for basic session management and input/output checks.


international conference on web engineering | 2012

News-Topic oriented hashtag recommendation in twitter based on characteristic co-occurrence word detection

Feng Xiao; Tomoya Noro; Takehiro Tokuda

Hashtags, which started to be widely used since 2007, are always utilized to mark keywords in tweets to categorize messages and form conversation for topics in Twitter. However, it is hard for users to use hashtags for sharing their opinions/interests/comments for their interesting topics. In this paper, we present a new approach for recommending news-topic oriented hashtags to help Twitter users easily join the conversation about news topics in Twitter. We first detect topic-specific informative words co-occurring with a given target word, which we call characteristic co-occurrence words, from news articles to form a vector for representing the news topic. Then by creating a hashtag vector based on tweets with the same hashtag, we calculate the similarity between these two vectors and recommend hashtags of high similarity scores with the news topic. Experimental results show that our approach could recommend hashtags which are highly relevant to the news topics, helping users share their tweets with others in Twitter.


ieee symposium on human centric computing languages and environments | 2003

A visual approach to development of Web services providers/requestors

Komkamol Jamroendararasame; Tetsuya Suzuki; Takehiro Tokuda

An idea of automatic construction of Web applications from templates has already been proposed by Jamroendararasame et al. (2001, 2002) and Taguchiet al. (2002). A software system called T-Web system has been implemented based on the idea to automatically generate typical Web applications made of various technologies such as CGI, Java servlet, JSP, and ASP, without manual programming. This paper presents an extension of the above mentioned idea in two different areas, construction of Web services and construction of Web applications that behave as Web services requestors. Based on T-Web system for JSP/servlet Web applications (Jamroendararasame et al., 2002), we implement the T-Web system that provides features for Web developers to design and generate Web services written in Java language, typical JSP/servlet Web applications, and JSP/servlet Web applications behaving as Web services requestors.


international conference on web engineering | 2004

Comparison of Two Approaches for Automatic Construction of Web Applications: Annotation Approach and Diagram Approach

Mitsuhisa Taguchi; Kornkamol Jamroendararasame; Kazuhiro Asami; Takehiro Tokuda

In order to support development of consistent and secure Web applications, we have designed a number of Web application generators. These generators can be classified into two types of approaches: annotation approach and diagram approach. In this paper, we try to make the roles of these generators clear, and compare two approaches in terms of target applications, developing processes and target users. While both approaches are powerful and flexible enough to construct typical Web applications efficiently, we may select the most appropriate generator according to the characteristics of the application and the developing process.


international world wide web conferences | 2010

Deep mashup: a description-based framework for lightweight integration of web contents

Hao Han; Junxia Guo; Takehiro Tokuda

In this paper, we present a description-based mashup framework for lightweight integration of Web contents. Our implementation shows that we can integrate not only the Web services but also the Web applications easily, even the Web contents dynamically generated by client-side scripts.


international conference on web engineering | 2010

Partial information extraction approach to lightweight integration on the web

Junxia Guo; Prach Chaisatien; Hao Han; Tomoya Noro; Takehiro Tokuda

We present partial information extraction approach to light-weight integration on the Web. Our approach allows us to extract dynamic contents created by scripts as well as static HTML contents. Our approach has three application areas: automatic generation of Web services from Web applications, automatic integration of Web applications with Web services on desktop computers, and automatic integration of mobile phone applications with Web applications and Web services on mobile phones.

Collaboration


Dive into the Takehiro Tokuda's collaboration.

Top Co-Authors

Avatar

Tomoya Noro

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tetsuya Suzuki

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yoshimichi Watanabe

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hannu Jaakkola

Tampere University of Technology

View shared research outputs
Top Co-Authors

Avatar

Junxia Guo

Beijing University of Chemical Technology

View shared research outputs
Top Co-Authors

Avatar

Bin Liu

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Mitsuhisa Taguchi

Tokyo Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge