Thu, Mar 1 AM 09:55 - 11:00 |
|
09:55-10:00 |
Opening ( 5 min. ) |
(1) |
10:00-10:20 |
Spam Review Detection Based on Sentiment Analysis |
Yao Cuhao, Wang Jiahong, Kodama Eiichiro (iwate pu) |
(2) |
10:20-10:40 |
Goal Model Construction Based on a Flow of Questions |
Hironori Shimada, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya (Osaka Univ.) |
(3) |
10:40-11:00 |
Improvement and implementation of a natural language processing based goal classification method for the KAOS goal model |
Masaki Ishimaru, Hideharu Kojima, Tatsuhiro Tsuchiya (Osaka Univ) |
|
11:00-11:10 |
Break ( 10 min. ) |
Thu, Mar 1 AM 11:10 - 12:10 |
(4) |
11:10-11:30 |
Design and Implementation of Tangible User Interface using RFID and Wireless LAN |
Ryota Tomita, Hirohide Haga (Doshisha Univ.) |
(5) |
11:30-11:50 |
Introduction of recursive description to Puzzle Programming System |
Taiki Minamino, Hirohide Haga (Doshisha Univ) |
(6) |
11:50-12:10 |
An Application Design Methodology with Normalized Classes by using Existence Dependency and Version Management |
Xiangtao Liu, Yusuke Morimoto, Akio Ida, Shigeo Kaneda (Doshisha Univ.) |
|
12:10-13:40 |
Break ( 90 min. ) |
Thu, Mar 1 PM 13:40 - 14:40 |
(7) |
13:40-14:00 |
Development Support of User Interfaces Adaptive to Usage Environment |
Seika Tanaka (Waseda Univ.), Hajime Iwata (KAIT), Junko Shirogane (Tokyo Woman's Christian Univ.), Yoshiaki Fukazawa (Waseda Univ.) |
(8) |
14:00-14:20 |
Quantification of bicycle behavior using center of curvature and adaptation to slalom courses |
Takahashi Ryoichi, Kaneda Shigeo (DoshishaUniv) |
(9) |
14:20-14:40 |
Dynamic Margin Calculation Using Stability of CPU Utilization in Virtual Machine Load Prediction |
Ryu Sakamoto (Waseda Univ.), Ryuichi Takahashi (Ibaraki Univ.), Yoshiaki Fukazawa (Waseda Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Thu, Mar 1 PM 14:50 - 16:20 |
(10) |
14:50-15:20 |
Automatic Test Code Generation for Extract Method Refactoring |
Ko Miyake, Tetsuo Kamina, Katsuhisa Maruyama (Ritsumeikan Univ) |
(11) |
15:20-15:50 |
Ripple effect analysis of data flow diagram in modification of data flow requirements |
JO Heayyoung, Takayuki Omori, Hiroya Itoga, Atsushi Ohnishi (Ritsumeikan Univ.) |
(12) |
15:50-16:20 |
Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base |
Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) |
|
16:20-16:30 |
Break ( 10 min. ) |
Thu, Mar 1 PM 16:30 - 17:30 |
(13) |
16:30-17:00 |
Trial and Evaluation of D-Case Workshop |
Yuto Onuma, Yutaka Matsuno (NU) |
(14) |
17:00-17:30 |
Analysis of Specification in Japanese using Natural Language Processing and Review Supporting with Speech Synthesis |
Kozo Okano, Kazuma Takahashi, Yusuke Naka, Shinpei Ogata (Shinshu Univ.), Toshifusa Sekizawa (Nihon Univ.) |
Fri, Mar 2 AM 09:30 - 10:30 |
(15) |
09:30-10:00 |
Support Tool for Collaborating on Screen Transition Modeling and Web Layout Design
-- Use of Website Builder employing Front-End Framework -- |
Kohei Iwahori, Shinpei Ogata, Kozo Okano (Shinshu Univ.) |
(16) |
10:00-10:30 |
The Game Contents of Information Security Education |
Tsukasa Hirose, Takako Nakatani (The Open Univ) |
|
10:30-10:40 |
Break ( 10 min. ) |
Fri, Mar 2 AM 10:40 - 11:40 |
(17) |
10:40-11:10 |
A consideration of the technique to estimate the rules from stored data automatically |
Akio Jin, Takuya Saruwatari, Masayuki Inoue, Teruko Miyata, Daisuke Hamuro (NTT), Noriaki Izumi (AIST) |
(18) |
11:10-11:40 |
Identification of Aggregation Roots and Providing Monotonous Views by Applying Existence Dependency Analysis to the Business Fulfilments |
Akio Ida, Shigeo Kaneda, Yusuke Morimoto, Liu Xiangtao (Doshisha Unic.) |
|
11:40-13:10 |
Break ( 90 min. ) |
Fri, Mar 2 PM 13:10 - 14:10 |
(19) |
13:10-13:40 |
Using the Word List by Semantic Principles in Free Guide Word HAZOP Process |
Tsuneo Nakanishi, Kenji Yoshimura, Hokuto Ototake, Toshifumi Tanabe, Hiroki Furusho (Fukuoka Univ.) |
(20) |
13:40-14:10 |
Extraction of Simple Sentences from Technical Documents using Japanese Unification Grammar |
Kenji Yoshimura, Tsuneo Nakanishi, Hokuto Ototake, Toshifumi Tanabe, Hiroki Furusho (Fukuoka Univ.) |
|
14:10-14:20 |
Break ( 10 min. ) |
Fri, Mar 2 PM 14:20 - 15:50 |
(21) |
14:20-14:50 |
A Study on a Programming Framework for Self-Adaptive Systems
-- Dynamic Verification Considering Time Constraints -- |
Hiroki Tsuda, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya (Osaka Univ.) |
(22) |
14:50-15:20 |
Comparison of Productivity Based on Subjective Evaluation of Software Engineers |
Yoshiki Usui, Shigeo Kaneda, Yoshifumi Nakata (Doshisha Univ.), Katsutoshi Furuta (Kansai Gaidai Univ.) |
(23) |
15:20-15:50 |
A Constraint Optimization Method for Cloud Service Composition |
Shridhar Choudhary, Kosaku Kimura, Atsuji Sekiguchi (FLL) |
|
15:50-16:00 |
Break ( 10 min. ) |
Fri, Mar 2 PM 16:00 - 17:00 |
(24) |
16:00-16:30 |
Moral Education of Adults for Information Ethics |
Keiichiro Abe (HCC), Takako Nakatani (OUJ) |
(25) |
16:30-17:00 |
Analysis of “Hiyari-Hatto” Incidents Reported by Maintenance Service Engineers |
Nobuhiko Mizusawa (Fujitsu Fsas), Takako Nakatani (OUJ) |
|
17:00-17:05 |
Closing ( 5 min. ) |