Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NC, IBISML, IPSJ-MPS, IPSJ-BIO [detail] |
2019-06-17 15:40 |
Okinawa |
Okinawa Institute of Science and Technology |
Gaze behavior analysis in source code comprehension through comparison with attention models Kiyoka Ikea (Kyoto Women's Univ.), Takatomi Kubo, Yoshiharu Ikutani, Hideaki Hata, Nishanth Koganti, Takeshi Itoh, Kenichi Matsumoto (NAIST), Yuki Maruno (Kyoto Women's Univ.), Kazushi Ikeda (NAIST) NC2019-7 |
Many gaze behavior analyses have been conducted in order to clarify the programmers’ cognitive processes. However, there... [more] |
NC2019-7 p.29 |
NS, IN (Joint) |
2017-03-03 15:10 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Dynamic resource control scheme for anomal traffic prevention. Hidetoshi Kawaguchi, Yuichi Ishihara, Kenichiro Matsumoto (NTT) IN2016-152 |
We propose a scheme that controls resource to prevent anomal traffic and validate its effect by experiments.
Research o... [more] |
IN2016-152 pp.329-334 |
DC, SS |
2016-10-28 10:45 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
Software Reuse Detection Using Binary Program Compression Kosuke Kamimura (NAIST), Akito Monden (Okayama Univ.), Hideaki Hata, Kenichi Matsumoto (NAIST) SS2016-32 DC2016-34 |
Open source software (OSS) is obtainable and reusable by anyone, while software plagiarism (i.e. code reuse without lice... [more] |
SS2016-32 DC2016-34 pp.85-90 |
DC, SS |
2016-10-28 11:45 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
A Study of the Growth of Programmers with Online Judge Archives Yusaku Noriyuki, Takao Nakagawa, Hideaki Hata, Kenichi Matsumoto (NAIST) SS2016-34 DC2016-36 |
An online judge is an online system that provides programming problems and an environment for compiling and testing subm... [more] |
SS2016-34 DC2016-36 pp.97-101 |
PRMU |
2016-10-21 14:10 |
Miyazaki |
|
Open Data in Software Engineering Field
-- Open Data for Source Code Review -- Takuto Norikane, Akinori Ihara, Toshiki Hirao, Kenichi Matsumoto (NAIST) PRMU2016-104 |
[more] |
PRMU2016-104 pp.73-78 |
KBSE |
2013-01-29 16:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Module Classification and Selection for Software Fault Prediction Makoto Mori, Akito Monden (NAIST), Yasutaka Kamei (Kyushu Univ.), Ken-ichi Matsumoto (NAIST) KBSE2012-68 |
To prioritize testing effort, it is important to predict fault-prone modules that are likely to contain a fault.
To bui... [more] |
KBSE2012-68 pp.59-64 |
IN, NS (Joint) |
2011-03-04 13:00 |
Okinawa |
Okinawa Convention Center |
A Study on Application of HSS in Fixed IP Network
-- A Study on OPEX Reduction of SIP Server Migration -- Hidemasa Takahashi, Hirozumi Takesue, Koji Tanida, Kenichiro Matsumoto (NTT) NS2010-234 |
NGN (Next Generation Network) is an unified network of data and voice communication services based on IP. Now NGN commer... [more] |
NS2010-234 pp.399-402 |
IN, NS (Joint) |
2011-03-04 13:20 |
Okinawa |
Okinawa Convention Center |
A Study on Routing Method Using ENUM in Next Generation Network Koji Tanida, Kenichiro Matsumoto, Hidefumi Nakamura (NTT) NS2010-235 |
In IMS based NGN, 3GPP specifies that the domain name of destination network returned from ENUM is used for routing with... [more] |
NS2010-235 pp.403-406 |
SS |
2010-03-08 15:20 |
Kagoshima |
Kagoshima Univ. |
Empirical Evaluation of Bug Density Prediction Model to Low Granularity Modules Yasutaka Kamei, Shinsuke Matsumoto, Akito Monden, Ken-ichi Matsumoto (NAIST) SS2009-72 |
To clarify the effects of bug module prediction on integration test,this paper experimentally evaluates the performance ... [more] |
SS2009-72 pp.145-150 |
NS, IN (Joint) |
2010-03-05 09:10 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A study on service contention control in NGN SIP server Yuichi Ishihara, Kenichiro Matsumoto, Hidehiro Arimitsu (NTT Corp.) NS2009-216 |
NTT is proceeding with implementation of the Next Generation Network (NGN) that is based on the Internet Protocol (IP) a... [more] |
NS2009-216 pp.305-310 |
KBSE |
2009-11-27 13:00 |
Shimane |
Shimane Univ. |
An analysis of relationship between software bug and variable name Hiroyuki Yamamoto, Yasutaka Kamei, Shinsuke Matsumoto, Akito Monden, Ken-ichi Matsumoto (NAIST) KBSE2009-42 |
Variable names used in each software module could be used as indicators of software bugs in the module because (1) names... [more] |
KBSE2009-42 pp.67-71 |
KBSE |
2009-11-27 13:35 |
Shimane |
Shimane Univ. |
Detection of Source Code Reuse based on Code Clone Metrics Satoshi Okahara (NAIST), Yuki Manabe (Osaka Univ.), Hiroki Yamauchi, Akito Monden, Ken-ichi Matsumoto (NAIST) KBSE2009-43 |
[more] |
KBSE2009-43 pp.73-78 |
KBSE |
2009-11-27 14:55 |
Shimane |
Shimane Univ. |
An Analysis of How Programmers Use Breakpoint in Debugging Takuro Yoshimura, Yasutaka Kamei (NAIST), Hidetake Uwano (NNCT), Akito Monden, Ken-ichi Matsumoto (NAIST) KBSE2009-45 |
Debugging performance greatly depends on the programmers'debugging skill.
If factors concerning the debugging performan... [more] |
KBSE2009-45 pp.85-90 |
SS |
2009-08-06 14:00 |
Hokkaido |
Kitami Institute of Technology |
Software Classification According to their Functionality based on Used Classes Tomoyoshi Ushimado, Akito Monden (NAIST), Haruaki Tamada (Kyoto Sangyo Univ), Ken-ichi Matsumoto (NAIST) SS2009-17 |
In software development, to implement given functional specifications, developers generally use class files from well-kn... [more] |
SS2009-17 pp.31-36 |
IN, NS (Joint) |
2009-03-04 15:20 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
A study on AS coordination function of SIP server in NGN Yuichi Ishihara, Tsutomu Ito, Kenichiro Matsumoto, Hidehiro Arimitsu (NTT) NS2008-183 |
NTT is proceeding with implementation of the Next Generation Network (NGN) that is based on the Internet Protocol (IP) a... [more] |
NS2008-183 pp.229-232 |
SS |
2008-12-18 14:30 |
Kochi |
Kochi Univiersity of Technology |
Experimentally Deriving Probability of Program Piracy based on Length of Code Clone Satoshi Okahara (Nara Inst. of Sence and Tech.), Yuki Manabe (Osaka Univ.), Hiroki Yamauchi, Akito Monden, Ken-ichi Matsumoto (Nara Inst. of Sence and Tech.), Katsuro Inoue (Osaka Univ.) SS2008-40 |
[more] |
SS2008-40 pp.7-11 |
SS |
2008-10-17 09:20 |
Yamanashi |
University of Yamanashi, Kofu Campus |
An analysis of relationship between code clone length and software reliability Hiroki Sato, Yasutaka Kamei, Hidetake Uwano, Akito Monden, Shinji Kawaguchi, Masataka Nagura, Ken-ichi Matsumoto, Hajimu Iida (NAIST) SS2008-34 |
A code clone that is duplicated code section in source files makes software maintenance more difficult. However, to our ... [more] |
SS2008-34 pp.43-48 |
SS |
2008-08-01 10:00 |
Hokkaido |
Future University-Hakodate |
A Code Review Technique to Reduce Regression Test Cases for Omitted Fault Koichi Tamura, Yasutaka Kamei, Hidetake Uwano, Shuuji Morisaki, Tomoko Matsumura, Ken-ichi Matsumoto (NAIST) SS2008-23 |
Some faults need many re-testing for fixing faults in test phase. These faults increase cost and delay of release, and m... [more] |
SS2008-23 pp.61-66 |
NS, IN (Joint) |
2008-03-07 15:00 |
Okinawa |
Bankoku Shinryokan |
Supporting End-Users for Creating Integrated Services in Home Network System Jun-ichi Sekimoto (NAIST), Masahide Nakamura, Hiroshi Igaki (Kobe Univ.), Ken-ichi Matsumoto (NAIST) IN2007-207 |
The integrated services are applications of the home network system, which provide value-added features with integrating... [more] |
IN2007-207 pp.289-294 |
NS, IN (Joint) |
2008-03-07 15:20 |
Okinawa |
Bankoku Shinryokan |
Implementing Multi-Vendor Home Network System Using Dynamic Service Binding Mechanism Yusuke Fukuoka, Takashi Nishioka (NAIST), Masahide Nakamura, Hiroshi Igaki (Kobe Univ.), Ken-ichi Matsumoto (NAIST) IN2007-208 |
This paper presents a method that constructs the home network system (HNS) with multi-vendor networked home appliances. ... [more] |
IN2007-208 pp.295-300 |