Thu, Sep 12 AM 10:00 - 11:45 |
|
10:00-10:05 |
Opening Address ( 5 min. ) |
(1) |
10:05-10:35 |
A New Technique to Improve Code Readability by Omitting Similar Source Code Patterns |
Hiroshi Kikuchi, Tetsuro Nishino, Takaaki Goto, Mitsuo Wakatsuki (UEC) |
(2) |
10:35-11:10 |
Visualizing and measuring transition processes of cohesion based on co-occurrence of identifiers |
Hiromasa Iwayama, Jun-ichi Inoue (Hokkaido Univ.) |
(3) |
11:10-11:45 |
Presentation Logic of correction of weak part of student by Text Frame |
Kazuhiro Uenosono (Aoyama Gakuin Univ.), Seiichi Komiya (NII) |
|
11:45-12:45 |
Lunch Break ( 60 min. ) |
Thu, Sep 12 PM 12:45 - 14:25 |
(4) |
12:45-13:15 |
Server-Side Implementation of UML/OCL Assertion |
Sei Tanaka, Hiromi Kobayashi (Tokai Univ.) |
(5) |
13:15-13:50 |
A Study of the Application of Model Checking to Embedded Software Based on Interrupt Processing |
Takanori Sasaki (UEC), Nobukazu Yoshioka (NII), Yasuyuki Tahara, Akihiko Ohsuga (UEC) |
(6) |
13:50-14:25 |
The architecture of business process engine in the Object-oriented Petri Net adoptioning event driveness |
Ryouta Kaneko, Ryohei Hata, Tadashi Iijima (Keio Univ.) |
|
14:25-14:35 |
Break ( 10 min. ) |
Thu, Sep 12 PM 14:35 - 16:20 |
(7) |
14:35-15:10 |
Analysis method for the goals of dependability cases using goal syntax table |
Masanori Matsumura, Shuichiro Yamamoto (Nagoya Univ.) |
(8) |
15:10-15:45 |
A study on consensus and decision-making in Goal-Oriented Requirements Analysis
-- Interdisciplinary approach -- |
Michitaro Okano, Takako Nakatani (Univ. of Tsukuba) |
(9) |
15:45-16:20 |
Consideration about application of the University portal service to Non-Functional Requirements Grades |
Miki Masumoto, Shuichiro Yamamoto (Nagoya Univ) |
|
16:20-16:30 |
Break ( 10 min. ) |
Thu, Sep 12 PM 16:30 - 18:15 |
(10) |
16:30-17:05 |
Consistency check of D-case (dependability case) produced from DFD (data flow diagram) |
Nada Olayan, Shuichiro Yamamoto, vaise Patu, Yutaka Matsuno (Nagoya Univ.) |
(11) |
17:05-17:40 |
A method to verify the applicability of the D-case based on Sequence diagram |
Ding Feng, Shuichiro Yamamoto (Nagoya Univ.) |
(12) |
17:40-18:15 |
Considerations on the relationship between SEMAT and Assurance Case |
Shuichiro Yamamoto (Nagoya Univ.) |
Fri, Sep 13 AM 10:30 - 12:15 |
(13) |
10:30-11:05 |
Acquisition and Application of Stress Level Informaion for Design and Evaluation of User Interaction |
Ayumi Ishii, Tadashi Iijima (Keio Univ.) |
(14) |
11:05-11:40 |
Acquisition and Description Tools for Communication Support Software |
Hiroki Unozawa, Tadashi Iijima (Keio Univ.) |
(15) |
11:40-12:15 |
Knowledge Reconstruction of Geo-Spatial Information for Multi-Agent Simulation |
Junki Yamazaki, Tadashi Iijima (Keio Univ.) |
|
12:15-13:15 |
Lunch Break ( 60 min. ) |
Fri, Sep 13 PM 13:15 - 14:15 |
(16) |
13:15-14:15 |
[Tutorial Invited Lecture]
Current research and future directions of requirements engineering
-- Towards software evolution and self-adaptation -- |
Hiroyuki Nakagawa (UEC) |
|
14:15-14:25 |
Break ( 10 min. ) |
Fri, Sep 13 PM 14:25 - 15:45 |
(17) |
14:25-15:00 |
A Comparative Evaluation on Assurance Case Discriptions for Operation Manuals |
Shota Takama, Shuichiro Yamamoto (Nagoya Univ.) |
(18) |
15:00-15:35 |
A classification method in identifying security patterns for a dependable Security Case
-- From Security Patterns to D-Case -- |
Vaise Patu, Nada Olayan, Shuichiro Yamamoto (Nagoya Univ.) |
|
15:35-15:45 |
Closing Address ( 10 min. ) |