Thu, Oct 27 AM 11:00 - 16:45 |
(1) |
11:00-11:25 |
ZDD-based test case generation method for high strength combinatorial interaction testing |
Teru Ohashi, Tatsuhiro Tsuchiya (Osaka Univ) |
(2) |
11:25-11:50 |
Model Checking of Fault Tolerant Systems Using Abstract Timestamps |
Shinya Nakano, Tatsuhiro Tsuchiya (Osaka Univ.) |
(3) |
11:50-12:15 |
Faster Wait-free Randomized Consensus with an Oblivious Adversary for MRSW Register Model |
Sen Moriya (Kindai Univ.), Michiko Inoue (NAIST) |
|
12:15-13:15 |
Lunch Break ( 60 min. ) |
(4) |
13:15-13:40 |
Error Correction Method for Interblock Burst Error of PPM Compression |
Takuya Muroi, Masato Kitakami (Chiba Univ.) |
(5) |
13:40-14:05 |
Single Limited-Magnitude Error Correcting Codes Using Integer Residue Ring of Large Order |
Shohei Kotaki, Masato Kitakami (Chiba Univ.) |
(6) |
14:05-14:30 |
Note on Data Aggregation on Smart Grid Communications Considering Fault Tolerance and Privacy |
Ryota Ogasawara, Masayuki Arai (Nihon Univ.) |
(7) |
14:30-14:55 |
Model Based Test Case Generation for Web Application Using Model Checking |
Hirokazu Kasahara, Tomoyuki Yokogawa, Yoichiro Sato, Kazutami Arimoto (Okayama Pref. Univ.) |
|
14:55-15:05 |
Break ( 10 min. ) |
(8) |
15:05-15:30 |
Towards a Zone-based Verification for DTPDA with Clock Freezing |
Sho Hiraoka, Shoji Yuen (Nagoya Univ.) |
(9) |
15:30-15:55 |
Efficiency Improvement in #SMT-based Quantitative Information Flow Analysis |
Masato Nakashima, Trung Chu Bao, Kenji Hashimoto, Masahiko Sakai, Hiroyuki Seki (Nagoya Univ.) |
(10) |
15:55-16:20 |
A Direct Update Method for XML Documents Including Data Values Compressed by Tree Grammars |
Ryunosuke Takayama, Kenji Hashimoto, Seki Hiroyuki (Nagoya Univ.) |
(11) |
16:20-16:45 |
|
Koichi Asano, Shinya Masuda, Mitsuhiro Ogata, Kazumasa Kobayashi (NTT DOCOMO), Atsufumi Tate, Satoru Hirayama (SEC) |
Fri, Oct 28 AM 09:30 - 12:35 |
(12) |
09:30-09:55 |
|
|
(13) |
09:55-10:20 |
|
Soichi Sumi, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |
(14) |
10:20-10:45 |
Software Reuse Detection Focusing on Text in Binary Code |
Satoshi Watanabe, Akito Monden (Okayama U.), Haruaki Tamada (Kyoto Sangyo U.), Yuichiro Kanzaki (NIT, Kumamoto College) |
(15) |
10:45-11:10 |
Software Reuse Detection Using Binary Program Compression |
Kosuke Kamimura (NAIST), Akito Monden (Okayama Univ.), Hideaki Hata, Kenichi Matsumoto (NAIST) |
|
11:10-11:20 |
Break ( 10 min. ) |
(16) |
11:20-11:45 |
Software Bug Analysis Based on Archetypal Analysis |
Keisuke Takimoto, Akito Monden (Okayama U.), Saya Onoue, Hideaki Hata (NAIST), Yasutaka Kamei (Kyushu U.) |
(17) |
11:45-12:10 |
A Study of the Growth of Programmers with Online Judge Archives |
Yusaku Noriyuki, Takao Nakagawa, Hideaki Hata, Kenichi Matsumoto (NAIST) |
(18) |
12:10-12:35 |
|
Naoto Ogura, Shinsuke Matsumoto (Osaka Univ.), Hideaki Hata (NAIST), Shinji Kusumoto (Osaka Univ.) |