Thu, Mar 10 AM 09:00 - 10:15 |
(1) |
09:00-09:25 |
The patterns and variations found through an analysis of change requirements |
Ayaka Kubo, Tsuneo Ajisaka, Naoki Fukuyasu, Naruki Mitsuda, Takuo Matsunobe (Wakayama Univ.) |
(2) |
09:25-09:50 |
Analysis on Semantic Orientation of Source Code |
Akihisa Yamada, Osamu Mizuno (Kyoto Inst. Tech.) |
(3) |
09:50-10:15 |
A supporting method of specifying scenarios using integrated scenario parts |
Kohei Takagi, Atsushi Ohnishi (Ritsumeikan U.) |
|
10:15-10:25 |
Break ( 10 min. ) |
Thu, Mar 10 AM 10:25 - 11:40 |
(4) |
10:25-10:50 |
On the query preservation for nondeterministic tree transducers |
Kazuki Miyahara (NAIST), Kenji Hashimoto (Nagoya Univ.), Hiroyuki Seki (NAIST/Nagoya Univ.) |
(5) |
10:50-11:15 |
An extension of SQL for specifying combinatorial optimization problems |
Yusaku Uchida, Masahiko Sakai, Naoki Nishida (Nagoya Univ.) |
(6) |
11:15-11:40 |
Program Verification Using Non-linear Loop Invariants Generated by Partially Applying an Extended Farkas' Lemma |
Makishi Yanagisawa, Naoki Nishida, Masahiko Sakai (Nagoya Univ.) |
|
11:40-13:00 |
Break ( 80 min. ) |
Thu, Mar 10 PM 13:00 - 14:40 |
(7) |
13:00-13:25 |
XQuery Type Inference under Restricted DTDs |
Kenji Sugimura, Yasunori Ishihara (Osaka Univ.), Kato Hiroyuki (NII), Fujiwara Toru (Osaka Univ.) |
(8) |
13:25-13:50 |
XQuery optimization by avoiding node sorting and duplicate elimination |
Yasunori Ishihara (Osaka Univ.), Hiroyuki Kato (NII), Torsten Grust (Universitaet Tuebingen) |
(9) |
13:50-14:15 |
Introducing and Evaluation of Cleaning Methods into a Code Search and Recommendation Method |
Takeru Uchiyama (FUN), Toshihiro Kamiya (Shimane Univ.), Ayahiko Niimi (FUN) |
(10) |
14:15-14:40 |
Using Word2Vec in Localizing Relevant Files for Bug Reports |
Yukiya Uneno, Osamu Mizuno (Kyoto Inst. Tech.), Eun-Hye Choi (AIST) |
|
14:40-14:50 |
Break ( 10 min. ) |
Thu, Mar 10 PM 14:50 - 16:55 |
(11) |
14:50-15:15 |
A Software Energy Analysis Method Using ExecutableUML |
Ryusuke Yoshimoto, Kenji Hisazumi, Akira Fukuda (Kyushu Univ.) |
(12) |
15:15-15:40 |
Investigation of Differences between Human-Written Patches and Automatically Generated Patches |
Hiroki Nakajima, Haruki Yokoyama, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |
(13) |
15:40-16:05 |
Making Code Clone Benchmark with Integrated Methods |
Yusuke Yuki, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto (Osaka Univ.) |
(14) |
16:05-16:30 |
Reducing Reuse Candidates on Reuse-Based Automated Program Repair Using "Freshness" |
Masahiro Yamamoto, Haruki Yokoyama, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |
(15) |
16:30-16:55 |
CodeConcierge: A Programming Environment Based on Crowd Knowledge |
Yuta Takahashi, Takuya Fukamachi, Naoyasu Ubayashi, Shintaro Hosoai, Yasutaka Kamei (Kyushu Univ.) |
|
- |
|
Fri, Mar 11 AM 09:00 - 10:15 |
(16) |
09:00-09:25 |
An Empirical Study of the Severity of Code Smell Using a Refactoring Dataset |
Tsubasa Saika, Eunjong Choi (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Shusuke Haruna, Katsuro Inoue (Osaka Univ.) |
(17) |
09:25-09:50 |
Establishing Traceability between Requirements, Design and Operation Information in Lifecycle-Oriented Architecture |
Shota Ishibashi, Kenji Hisazumi, Akira Hukuda (Kyushu Univ.) |
(18) |
09:50-10:15 |
Development and evaluation of an embedded modeling tool for supporting the modeling education |
Kaoru Beppu, Kenji Hisazumi, Akira Fukuda (Kyushu Univ.) |
|
10:15-10:25 |
Break ( 10 min. ) |
Fri, Mar 11 AM 10:25 - 13:00 |
(19) |
10:25-10:50 |
An Empirical Study of Debugging Effectiveness Using Stack Overflow |
Yuki Ogihara, Takuya Fukamachi, Naoyasu Ubayashi, Shintaro Hosoai, Yasutaka Kamei (Kyushu Univ.) |
(20) |
10:50-11:15 |
A Prioritization of Combinatorial Testing Using Bayesian Inference |
Shunya Kawabata (Kyoto Inst. Tech.), Eun-Hye Choi (AIST), Osamu Mizuno (Kyoto Inst. Tech.) |
(21) |
11:15-11:40 |
Preliminary Study of Selective Inlining to Find API Usage Patterns Across Multiple Methods |
Yuya Aizawsa, Takashi Kobayashi (Tokyo Tech.) |
|
11:40-13:00 |
Break ( 80 min. ) |
|
- |
|
Fri, Mar 11 PM 13:00 - 14:40 |
(22) |
13:00-13:25 |
Correlation analysis between code clone metrics and project data
-- An application on projects developed based on the same specification -- |
Yoshiki Higo, Hiroaki Murakami, Jiachen Yang, Shinsuke Matsumoto, Shinji Kusumoto (Osaka Univ.), Takeshi Miyake, Takashi Fujinami, Akira Ishibashi, Takashi Hoshino (NTT) |
(23) |
13:25-13:50 |
Analysis of issues on the activities for bug fixes in open source software development and a proposal of their solutions |
Takashi Natsume, Hiroshi Sakai (NTT) |
(24) |
13:50-14:15 |
Code Completion using Machine Learning |
Tetsuo Yamamoto (Nihon Univ.) |
(25) |
14:15-14:40 |
Towards Behavior Verification of Estimation of Self-localization in One-dimensional Systems |
Toshifusa Sekizawa (Nihon Univ.), Kozo Okano (Shinshu Univ.) |