Thu, Mar 6 AM Session 1 10:30 - 12:20 |
|
10:30-10:35 |
Opening Address ( 5 min. ) |
(1) |
10:35-11:10 |
A Method for Facilitating the Analysis of Counterexamples in Model Checking |
Yoshitaka Aoki (Nihon Unisys), Saeko Matsuura (Shibaura Inst. of Tech.) |
(2) |
11:10-11:45 |
A Case Study on Predicting Requirements Changes |
Takako Nakatani, Yuko Koiso (Univ. of Tsukuba), Keiichi Katamine (Kyushu Inst. of Tech.), Toshihiko Tsumaki (NII) |
(3) |
11:45-12:20 |
End-User-Initiative Development for Web Application
-- The Implementation of Business Logic -- |
Xu Jie, Takeshi Chusho (Meiji Univ.) |
|
12:20-13:05 |
Break ( 45 min. ) |
Thu, Mar 6 PM Session 2 13:05 - 15:25 |
(4) |
13:05-13:40 |
Toward Conducting the Discussion for Understanding and Validity Check of Sftware Requirements
-- A Proposal of a Model to Structuralize and Record the Contents of the Discussion -- |
Seiichi Komiya (NII) |
(5) |
13:40-14:15 |
Mining of IR method for Traceability Link Recovery |
Ryouhei Yuasa, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ) |
(6) |
14:15-14:50 |
Guidelines for Class-Diagram Design based on English Sentence Patterns and Functional Dependency |
Shigeo Kaneda, Akio Ida, Takamasa Sakai (Doshisha Univ.) |
(7) |
14:50-15:25 |
Conceptual class diagram creation support system based on conversion method from a Japanese description to simple sentences |
Satoshi Kumatani, Takamasa Sakai, Shigeo Kaneda (Doshisha Univ.) |
|
15:25-15:35 |
Break ( 10 min. ) |
Thu, Mar 6 PM Session 3 15:35 - 17:50 |
(8) |
15:35-16:10 |
A consideration on method to assure business process with D-Case |
Kenta Murai, Shuichiro Yamamoto (Nagoya Univ.) |
(9) |
16:10-16:45 |
A method to assure the sufficiency of testing using D-Case |
Hideaki Oobayashi, Shuichiro Yamamoto (Nagoya Univ) |
(10) |
16:45-17:15 |
Equivalent Mutants Detection Method Using Symbolic Execution |
Takaya Ueshiba, Weitao Wang, Hirohide Haga (Doshisha Univ.) |
(11) |
17:15-17:50 |
The Study of Combinatorial Software Testing Technique to Respond to the Changes of Test-Strategy |
Masahiro Ooba, Kenta Sasaki, Hisashi Fukutake, Kuniya Sato, Tomohiko Takagi, Rihito Yaegashi (Kagawa Univ.) |
Fri, Mar 7 AM Session 4 09:50 - 11:35 |
(12) |
09:50-10:25 |
Scenario Retrieval Method using Differential Scenarios
-- Development of Visualization tool of Differential Scenario -- |
Eiji Shiota, Atsushi Ohnishi (Ritsumeikan Univ.) |
(13) |
10:25-11:00 |
Road Hazard Sharing System by Using Mobile Ad Hoc Network for Multiple Cyclists |
Yusuke Tabata, Akira Yamamoto, Yuta Kawachi, Shohei Asada, Shigeo Kaneda (Doshisha Univ.) |
(14) |
11:00-11:35 |
Event extraction from video data of football games using qualitatve spatio-temporal representation |
Masaki Sakaida, Takanori Kiyose, Kazuko Takahashi (Kwansei Gakuin Univ.) |
|
11:35-12:35 |
Break ( 60 min. ) |
Fri, Mar 7 PM Session 5 12:35 - 14:55 |
(15) |
12:35-13:10 |
An Android Application Analysis Method for Highlighting Disclosure of Fine-Grained User Information |
Takuya Sakashita, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) |
(16) |
13:10-13:45 |
An Implementation Methodology for Business Systems Based on Unidirectional Constraint Propagation
-- A Case Study of Local Tax Processing -- |
Hiromasa Yano, Hiroki Kuwayama, Shigeo Kaneda (Doshisha Univ.) |
(17) |
13:45-14:20 |
A proposal of the D-Case review method by extracting word relationship |
Masanori Matsumura, Shuichiro Yamamoto (Nagoya Univ.) |
(18) |
14:20-14:55 |
Software-Aided Feature Selection for Open Source Software by Applying Brainstorming Methodology Based on Existing Open Source Software |
Md. Mahfuzus Salam Khan, Takaaki Goto, Tetsuro Nishino (Univ. of Electro-Comm.) |
|
14:55-15:05 |
Break ( 10 min. ) |
Fri, Mar 7 PM Session 6 15:05 - 17:30 |
(19) |
15:05-15:40 |
Applying the Multidimensional Scaling for Assignment Responsibilities to the Objects
-- Approaching from the Artifacts of the Soft Systems Methodology -- |
Akio Ida, Shigeo Kaneda (Doshisha Univ.) |
(20) |
15:40-16:15 |
A proposal for developing architecture model based on requirements model |
Shuichiro Yamamoto (Nagoya Univ.) |
(21) |
16:15-16:50 |
Search method for supporting creation of trace links between documents |
Makoto Kakuta, Gengo Suzuki (NTT), Syuuhei Watanabe (NTT Comware), Toshifumi Enomoto, Nobuyuki Kobayashi (NTT) |
(22) |
16:50-17:25 |
Extension of Business Process Representation by Introduction of Timed-Arc into Object-oriented Petri Net |
Tadashi Iijima (Keio Univ.) |
|
17:25-17:30 |
Ending Address ( 5 min. ) |