Mon, Jan 27 AM 10:30 - 11:50 |
(1) |
10:30-11:10 |
Return Route Support System Using Multiple Mobile Agents |
Naoki Yatsuyanagi, Yasushi Kambayashi (Nippon Inst. of Tech.) |
(2) |
11:10-11:50 |
A Proposal on Answer Sentence Generation Method for Question Answering Using Statistical Machine Translation |
Tessei Yamada, Tatsuya Arakawa (Gunma NCT) |
Mon, Jan 27 PM 13:00 - 14:20 |
(3) |
13:00-13:40 |
Path generation for CG-Character using invisible agents |
Shohei Kawamura, Terumasa Aoki (Tohoku Univ.) |
(4) |
13:40-14:20 |
Development of Support Systems for Reading of Novels Using Question Answering Technology |
Satoru Okada, Tatsuya Arakawa (Gunma NCT) |
Mon, Jan 27 PM 14:30 - 15:50 |
(5) |
14:30-15:10 |
Applying Personal Software Process to Requirements Process |
Hiroya Itoga (Ritsumeikan Univ.) |
(6) |
15:10-15:50 |
A Task Completion Criteria Design Method based on the Activity Description |
Shuichiro Yamamoto (Nagoya Univ.) |
Mon, Jan 27 PM 16:00 - 18:00 |
(7) |
16:00-18:00 |
[Tutorial Invited Lecture]
An Introduction of Assurance Case |
Yutaka Matsuno (UEC) |
Tue, Jan 28 AM 10:00 - 12:00 |
(8) |
10:00-10:40 |
A Study on validation in AND decomposition of goal-oriented analysis |
Michitaro Okano, Takako Nakatani (Univ. of Tsukuba) |
(9) |
10:40-11:20 |
Test viewpoint model for test requirement analysis |
Yasuharu Nishi (Univ. of Electro-Comm.) |
(10) |
11:20-12:00 |
Detailed Operational Profile Generation Using a Place/transition Net and Software Execution Histories |
Tomohiko Takagi, Takuya Arao (Kagawa Univ.) |
Tue, Jan 28 PM 13:00 - 15:40 |
(11) |
13:00-13:40 |
Recovering Traceability for using information retrieved methods |
Yuhto Tomii, Kenji Kaijiri, Haruhiko Kaiya, Shinpei Ogata (Shinshu Univ.) |
(12) |
13:40-14:20 |
A Concept of Context Computing
-- Methodology about Information sharing and Personalization -- |
Tomonori Makino (Nihon Unisys), Tadao Michimura (Fuji Xerox), Atsushi Iizawa (RICOH IT Solutions), Shigeru Kobayashi (AITC), Noriaki Izumi (AIST) |
(13) |
14:20-15:00 |
The proposal of the technique of selecting the optimal Error-prone module prediction |
Hideaki Uchimiya, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) |
(14) |
15:00-15:40 |
An Evaluation on the Modifiability of Model Driven Security Requirements Analysis Method based on Common Criteria |
Atsushi Noro, Saeko Matsuura (Shibaura Inst. of Tech.) |