Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SWIM |
2014-05-23 13:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Special Talk]
A Perspective to Business Requirements Engineering Mikio Aoyama (Nanzan Univ.) SWIM2014-1 |
This article discusses the key concepts and technologies of business requirements engineering, which is a system of tech... [more] |
SWIM2014-1 pp.1-6 |
ICSS, IPSJ-SPT |
2014-03-28 14:45 |
Okinawa |
Meio Univiersity |
System Security Analysis using Dependency Relationship on Cloud Yoshiro Wataguchi, Nobuyuki Kanaya (FUJITSU labs), Takao Okubo (IISEC) ICSS2013-93 |
Recently, many systems are developed using the cloud computing environment. In those systems, an operator of a SaaS uses... [more] |
ICSS2013-93 pp.231-236 |
KBSE |
2014-03-06 11:10 |
Okinawa |
Okinawaken-Seinenkaikan |
A Case Study on Predicting Requirements Changes Takako Nakatani, Yuko Koiso (Univ. of Tsukuba), Keiichi Katamine (Kyushu Inst. of Tech.), Toshihiko Tsumaki (NII) KBSE2013-80 |
Requirements of software are sometimes added and changed through the development phases. In this paper, we explored reas... [more] |
KBSE2013-80 pp.7-12 |
KBSE |
2014-03-07 09:50 |
Okinawa |
Okinawaken-Seinenkaikan |
Scenario Retrieval Method using Differential Scenarios
-- Development of Visualization tool of Differential Scenario -- Eiji Shiota, Atsushi Ohnishi (Ritsumeikan Univ.) KBSE2013-90 |
In a scenario-based software development, a lot of scenarios should be described in order to clarify the whole behaviors... [more] |
KBSE2013-90 pp.67-72 |
KBSE |
2014-01-27 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Applying Personal Software Process to Requirements Process Hiroya Itoga (Ritsumeikan Univ.) KBSE2013-69 |
In this paper author proposes a method to apply personal software process to requirements process. Personal software pr... [more] |
KBSE2013-69 pp.25-30 |
KBSE |
2014-01-28 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
An Evaluation on the Modifiability of Model Driven Security Requirements Analysis Method based on Common Criteria Atsushi Noro, Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2013-78 |
Requirements analysis is complicated because in requirements analysis of the system is a security request as well as a f... [more] |
KBSE2013-78 pp.77-82 |
KBSE |
2013-11-02 10:50 |
Ehime |
Ehime University |
A Framework of Predicting Requirements Changes Takako Nakatani (Univ. of Tsukuba), Toshihiko Tsumaki (NII) KBSE2013-61 |
Software requirements are changed by various factors. Social factors can be those factors, since the decision of people ... [more] |
KBSE2013-61 pp.43-48 |
SS, KBSE |
2013-07-26 13:40 |
Hokkaido |
|
Verification of Feasibility by Model Checking Techniques Applied to UML Requirements Analysis Model Yoshitaka Aoki (Nihon Unisys), Shinpei Ogata (Shinshu Univ.), Saeko Matsuura (Shibaura Inst. of Tech.) SS2013-29 KBSE2013-29 |
A key to success of developing high quality software products is to define valid and feasible requirements specification... [more] |
SS2013-29 KBSE2013-29 pp.97-102 |
KBSE |
2013-03-14 13:35 |
Tokyo |
Shibaura Institute of Technology |
Using Multi-Dimensional Goal Graphs for Clarifying Requirements Structure Wataru Inoue, Shinpei Hayashi (Tokyo Inst. of Tech.), Takanori Ugai (Fujitsu Lab.), Motoshi Saeki (Tokyo Inst. of Tech.) KBSE2012-73 |
In this paper, we propose a multi-dimensional extension of goal graphs in goal-oriented requirements analysis in order t... [more] |
KBSE2012-73 pp.25-30 |
KBSE |
2013-03-14 14:45 |
Tokyo |
Shibaura Institute of Technology |
Test Case Design Method to Guarantee the Feasibility of the Requirements Based on the Simulation Ryo Shikimi (Shibaura Inst. of Tech.), Shinpei Ogata (Shinshu Univ.), Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2012-75 |
To enhance mutual understanding between developers and customers and to guarantee the feasibility of the requirements de... [more] |
KBSE2012-75 pp.37-42 |
KBSE |
2013-01-28 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Understanding and discription of Business based on the "Billiard-Ball" model
-- Yet Another Model for Understanding Business Event -- Akio Ida, Shigeo Kaneda (Doshisha Univ.) KBSE2012-59 |
In order to convert into a use-case model from huge Japanese requirement description written in the request for proposal... [more] |
KBSE2012-59 pp.7-12 |
KBSE |
2013-01-28 16:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
A Consideration on Introducing Responsibility Attributes to Dependability Case Yutaka Matsuno, Shuichiro Yamamoto (Nagoya Univ.) KBSE2012-61 |
Although dependability case is attracted to assure system safety and availability, methods and guidelines how to describ... [more] |
KBSE2012-61 pp.19-24 |
KBSE |
2012-11-22 15:30 |
Ishikawa |
Kanazawa University |
A Proposal on AsWas-AsIs Analysis Method with Qualitative Reseach Masahiro Watanabe (NISSAN MOTOR), Takako Nakatani (GSSM, Univ. of Tsukuba) KBSE2012-46 |
When we build a business system, we must analyze requirements of the core and peripheral stakeholders.
In requirements ... [more] |
KBSE2012-46 pp.49-54 |
KBSE, SS |
2012-07-27 13:30 |
Hokkaido |
Future University Hakodate |
Integration Method of UML Requirement Analytical Model and Security Requirement Analysis based on Common Criteria Atsushi Noro (Shibaura Inst. of Tech.), Shinpei Ogata (Shinshu Univ.), Saeko Matsuura (Shibaura Inst. of Tech.) SS2012-13 KBSE2012-15 |
Analyzing security requirements for a system at an early stage of development is effective in developing a system with l... [more] |
SS2012-13 KBSE2012-15 pp.19-24 |
KBSE |
2012-05-26 14:45 |
Kanagawa |
Keio University |
Android-UI Automatic Prototyping from UML Requirements Specifications Shunsuke Matsui (Shibaura Inst. of Tech.), Shinpei Ogata (Shinshu Univ.), Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2012-11 |
With the rapid spread of smartphones, there has been an increase in developing smartphone applications.
Thus, the smar... [more] |
KBSE2012-11 pp.63-68 |
KBSE |
2012-01-23 12:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A research study about business rules written in requirements definition documents Manabu Sato, Jun Hagiwara, Shinobu Saito (NTT DATA) KBSE2011-55 |
Requirements analysis of an enterprise system development must include business requirements around the system to be dev... [more] |
KBSE2011-55 pp.13-18 |
KBSE |
2012-01-23 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Check-list to discover the Defects of Interaction by using UML Scenarios Shinpei Ogata, Saeko Matsuura (SIT) KBSE2011-57 |
Requirements Analysis (RA) for the interaction between users and a system is important to realize enterprise system so t... [more] |
KBSE2011-57 pp.25-30 |
KBSE |
2012-01-23 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cause-Oriented Vulnerability Analysis of Security Requirements for Web Applications Hironori Nishino, Junya Sakai, Haruhiko Kaiya, Kenji Kaijiri (SU) KBSE2011-58 |
Use case models are frequently used to specify requirements for an information system, but such models do not permit us ... [more] |
KBSE2011-58 pp.31-36 |
KBSE |
2011-09-21 13:00 |
Overseas |
Ocean Grand Hotel Jeju |
Requirements Elicitationusing Abduction Toshihiko Tsumaki (NII) KBSE2011-27 |
Application of information system is rapidly spreading to various areas: the infrastructure of society, the saving of hu... [more] |
KBSE2011-27 pp.19-24 |
KBSE |
2011-09-22 09:00 |
Overseas |
Ocean Grand Hotel Jeju |
Interactive Test Data Development Tool for Validating Requirements Analysis Model Ryo Shikimi, Shinpei Ogata, Saeko Matsuura (Shibaura Inst. of Tech.) KBSE2011-32 |
To define the validated requirements specification by the customers, we have proposed a requirements analysis method in ... [more] |
KBSE2011-32 pp.49-54 |