Tue, Dec 14 PM 13:40 - 18:00 |
(1) |
13:40-14:10 |
A Project Scheduling Method based on Conceptual Framework using Load-Capacity for Project Design |
Akinori Saito (JAIST), Takumi Kusanagi (TOSHIBA/JAIST), Koichiro Ochimizu (JAIST) |
(2) |
14:10-14:40 |
Development and Evaluation of Effort Estimation Tool to Compare Results from Multiple Estimation Methods |
Katsuma Ubukata (Osaka Univ.), Takeshi Kakimoto (Kagawa NCT), Shinji Kusumoto (Osaka Univ.) |
(3) |
14:40-15:10 |
An Empirical Study on Relationship between Change History of Method Comments and Method Bugs |
Hideaki Hata (Osaka Univ.), Osamu Mizuno (Kyoto Institute of Tech.), Tohru Kikuno (Osaka Univ.) |
|
15:10-15:20 |
Break ( 10 min. ) |
(4) |
15:20-15:50 |
An Abstract Data Type Database Management System
-- as the Kernel of an Operating System -- |
Kazutoshi Shima, Kunihiko Nishi, Jun Okui (Kinki Univ.), Hiroyuki Seki (NAIST) |
(5) |
15:50-16:20 |
An Abstract Data Type Description Language |
Kunihiko Nishi, Kazutoshi Shima, Jun Okui (Kinki Univ.), Hiroyuki Seki (NAIST) |
(6) |
16:20-16:50 |
On non-termination proof of right-linear and right-shallow term rewriting systems based on forward narrowing |
Tatsuya Hattori, Masahiko Sakai, Naoki Nishida, Keiichirou Kusakari, Toshiki Sakabe (Nagoya Univ.) |
|
16:50-17:00 |
Break ( 10 min. ) |
(7) |
17:00-17:30 |
An Injection Vulnerability Analysis of Web Applications using String-Taint Analysis |
Tatsunori Houan, Kazuya Onai, Seikoh Nishita (Takushoku Univ.) |
(8) |
17:30-18:00 |
Secure User-Role Assignment in Cross-Organizational Role-Based Access Control |
Yuki Tomotani, Yuichi Kaji, Hiroyuki Seki (NAIST) |
Wed, Dec 15 AM 09:00 - 12:15 |
(9) |
09:00-09:30 |
The Validity Problem of Positive XPath Queries in the Presence of DTDs |
Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) |
(10) |
09:30-10:00 |
Seamless reuse support using source code corpus |
Tetsuo Yamamoto (Ritsumeikan Univ.), Norihiro Yoshida (NAIST), Yoshiki Higo (Osaka Univ.) |
(11) |
10:00-10:30 |
Identifying and Visualization Refactoring Candidates for Extract Method using Program Dependence Graph |
Tomoko Kanemitsu, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |
|
10:30-10:45 |
Break ( 15 min. ) |
(12) |
10:45-11:15 |
Towards Detecting Code Clones that are Scattered on Multiple Methods |
Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |
(13) |
11:15-11:45 |
Toward measuring modifications of class diagram based on version change information |
Shinya Yamada, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |
(14) |
11:45-12:15 |
Finding Code Portions According to Functionality using Cohesion |
Masataka Kinoshita, Norihiro Yoshida, Hajimu Iida (NAIST) |