Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC, SS |
2015-10-13 13:20 |
Nara |
Todaiji Culture Center (Nara) |
Design and Development of the Method Generating Business Process Diagrams Tadashi Tanaka, Hideaki Ito, Yuichiro Nakagawa, Ryota Mibe (Hitachi) SS2015-35 DC2015-25 |
In recent years, along with the enlargement of the legacy systems, project delay and profit loss are getting worse. Ther... [more] |
SS2015-35 DC2015-25 pp.1-5 |
DC, SS |
2015-10-13 13:50 |
Nara |
Todaiji Culture Center (Nara) |
A Description of Recursive Hybrid Automata by HCCS Yuto Kawakita, Yuen Shoji (Nagoya Univ.) SS2015-36 DC2015-26 |
We present a formal description of recursive hybrid automata, RHA for short, by HCCS proposed by Schneider et.el., which... [more] |
SS2015-36 DC2015-26 pp.7-12 |
DC, SS |
2015-10-13 14:30 |
Nara |
Todaiji Culture Center (Nara) |
Improving the greedy approach to constructing combinatorial test suites Teru Ohashi, Tatsuhiro Tsuchiya (Osaka Univ.) SS2015-37 DC2015-27 |
This paper discusses an optimization of the greedy approach for
constructing test suites for combinatorial interaction... [more] |
SS2015-37 DC2015-27 pp.13-15 |
DC, SS |
2015-10-13 15:00 |
Nara |
Todaiji Culture Center (Nara) |
The Dual System Consisting of Two Modules Which Depend on Each Other in State Recovery Phase Aromhack Saysanasongkham, Satoshi Fukumoto (Tokyo Metropolitan Univ.) SS2015-38 DC2015-28 |
This paper discusses the reliability evaluation for 1-out-of-2 system with two-stage repair modes, i.e., hardware restor... [more] |
SS2015-38 DC2015-28 pp.17-21 |
DC, SS |
2015-10-13 15:30 |
Nara |
Todaiji Culture Center (Nara) |
Detection of Wormhole Attack on Wireless Sensor Network in Low Power Operation Takashi Minohara, Kyosuke Nishiyama (Takushoku Univ.) SS2015-39 DC2015-29 |
Wireless sensor networks(WSN) which employ a large number of wireless
sensor nodes to monitor physical or environmenta... [more] |
SS2015-39 DC2015-29 pp.23-28 |
DC, SS |
2015-10-14 09:30 |
Nara |
Todaiji Culture Center (Nara) |
An investigation into the behavior of the novice programmers based on build histories in Software Development Practice Naoki Kawashima, Kenji Fujiwara (NAIST), Hiroshi Igaki (OIT), Norihiro Yoshida (NU), Hajimu Iida (NAIST) SS2015-40 DC2015-30 |
Building is one of the most important parts of software development process.
However, since it is rarely taught about b... [more] |
SS2015-40 DC2015-30 pp.29-34 |
DC, SS |
2015-10-14 10:00 |
Nara |
Todaiji Culture Center (Nara) |
Proposal of the Method Generating Business Data Derivation Logic Keishi Oshima, Yui Watanabe, Shuhei Nojiri, Motoyasu Takabatake, Ryota Mibe, Hiroyasu Nishiyama (Hitachi) SS2015-41 DC2015-31 |
[more] |
SS2015-41 DC2015-31 pp.35-39 |
DC, SS |
2015-10-14 10:40 |
Nara |
Todaiji Culture Center (Nara) |
Towards Comprehension of Refactoring Tasks with Arbitrary-Granularity-Model Code Clone Detection Toshihiro Kamiya (Fun) SS2015-42 DC2015-32 |
Abstract This study describes an extended method of AGM code-clone detection for understanding refactroing. The proposed... [more] |
SS2015-42 DC2015-32 pp.41-46 |
DC, SS |
2015-10-14 11:10 |
Nara |
Todaiji Culture Center (Nara) |
Memoization Refactoring based on Purity Analysis Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) SS2015-43 DC2015-33 |
Memoization refactoring is a refactoring pattern that caches the result of a given function and returns the same result ... [more] |
SS2015-43 DC2015-33 pp.47-52 |