IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Software Science (SS)  (Searched in: 2005)

Search Results: Keywords 'from:2005-12-19 to:2005-12-19'

[Go to Official SS Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 21  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SS 2005-12-19
13:00
Kochi Kochi Women's University Development of a clock level simulator by reusable code design
Kazuya Fukuhara, Toshimitsu Inomata, Masakazu Soga (Iwate Prefectural Univ.)
 [more] SS2005-55
pp.1-6
SS 2005-12-19
13:30
Kochi Kochi Women's University Extension of Automatic Visualization Tool "Avis" for Structure of Classes
Yoshihiro Kita, Takanori Kawasoe, Tetsuro Katayama (Univ. of Miyazaki)
As the demand for software is increasing more rapidly, the demand for the number of programmers is escalating.
It is i... [more]
SS2005-56
pp.7-12
SS 2005-12-19
14:00
Kochi Kochi Women's University Extraction of Conversion Rules from UML Diagrams to Java Source Codes and a Prototype of Conversion Tool
Kiyohito Shimomura, Tetsuro Katayama (Univ. of Miyazaki)
UML (Unified Modeling Language) is often used at the requirements analysis and the design.
However, in describing sour... [more]
SS2005-57
pp.13-18
SS 2005-12-19
14:30
Kochi Kochi Women's University Secrecy Verification by Transforming Cryptographic Protocol Descriptions to Coloured Petri Nets
Daisuke Okuya, Toshiki Sakabe, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.)
Verification of the safety of cryptographic protocols can be
mechanized by reducing the safety to the reachability of C... [more]
SS2005-58
pp.19-24
SS 2005-12-19
15:15
Kochi Kochi Women's University Obfuscating Cipher Programs against Primary Attacking Tasks
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto (NAIST)
In this paper, we propose a cracker-centric approach to give a realistic guideline for applying software obfuscation met... [more] SS2005-59
pp.25-30
SS 2005-12-19
15:45
Kochi Kochi Women's University Applying an Intercultural Collaboration Support Tool to Software Requirements Elicitation Meetings
Akinori Tsuji, Yusuke Koyama, Masao Ohira, Ken-ichi Matsumoto (NAIST)
One of the biggest challenges in requirements engineering is to resolve the issue that customers cannot explicitly repre... [more] SS2005-60
pp.31-36
SS 2005-12-19
16:15
Kochi Kochi Women's University A Study of Relationship between Class Cohesion and Source Code Changing Rate
Junichi Yamashita, Hirohisa Aman (Graduate School of Ehime Univ.)
Cohesion is an important quality attribute of software module.
It means a strength of functional relationships among mo... [more]
SS2005-61
pp.37-42
SS 2005-12-19
16:45
Kochi Kochi Women's University A Method to Find Differences between Two Programs for Syntax based Versioning Systems
Naoki Fukuyasu, Atsushi Yoshida (Wakayama Univ.)
Versioning systems are essential for software development. Existing versioning systems such as CVS have repositories bas... [more] SS2005-62
pp.43-48
SS 2005-12-20
09:00
Kochi Kochi Women's University identifying of an object from different viewpoints using its attributes in the computing environments
Fumiko Kouda (univ.ofTokyo), Takashi Chikayama (univ.of Tokyo)
Suppose we wish to distinguish from computer objects by their own attributes relating to one's purpose or viewpoint,
... [more]
SS2005-63
pp.1-6
SS 2005-12-20
09:30
Kochi Kochi Women's University Pseudo Adaptive Methods
Noriki Amano (JAIST)
An adaptive method means a method which is dynamically selected epending on the types of its arguments and the runtime s... [more] SS2005-64
pp.7-12
SS 2005-12-20
10:15
Kochi Kochi Women's University Enhancing Dependency Pair Method by Strong Computability in Simply-Typed Term Rewriting Systems
Keiichirou Kusakari, Masahiko Sakai (Nagoya Univ.)
We enhance the dependency pair method to prove termination by recursive structure analysis in the simply-typed term rewr... [more] SS2005-65
pp.13-18
SS 2005-12-20
10:45
Kochi Kochi Women's University FTA - Product Line Engineering Collaboration
Atsushi Noda, Tsuneo Nakanishi, Akira Fukuda (Kyushu Univ.)
In product line software engineering, the developers recognize
functional and non-functional features of the product me... [more]
SS2005-66
pp.19-24
SS 2005-12-20
11:15
Kochi Kochi Women's University Type Judgement System for Communication Error in Distributed JoinJAVA Programs
Masaki Saeki, Toshiki Sakabe, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.)
The distributed JoinJAVA is the Join-Calculus extended by adding JAVA
fragments as sequential processes. It enables us ... [more]
SS2005-67
pp.25-30
SS 2005-12-20
13:00
Kochi Kochi Women's University Metrics for effort estimation on contracting maintenance service
Kenichi Kobayashi, Toshiaki Yoshino (Fujitsu Labs.), Katsuro Inoue, Yasuhiro Hayase (Osaka Univ.), , (Fujitsu Labs.)
In software maintenance, we define a new metrics "Impact Scale" which is based on the size of the change impact in maint... [more] SS2005-68
pp.31-36
SS 2005-12-20
13:30
Kochi Kochi Women's University Exploration of scale-freeness of use-relations of software components
Makoto Ichii, Makoto Matsushita, Katsuro Inoue (Osaka Univ.)
Scale-freeness is a graph property in which the number of edges connected to each vertex is under so-called power-law. T... [more] SS2005-69
pp.37-42
SS 2005-12-20
14:00
Kochi Kochi Women's University A Layered Architecture of Formal Specification
Xiaojing Zhang, Yoichi Omori, Keijiro Araki (Kyushu Univ.)
Software productline extracts similarities of a series of products, thus a specification of a product can be applied to ... [more] SS2005-70
pp.43-48
SS 2005-12-20
14:30
Kochi Kochi Women's University Supporting Method for Insertion of Behaviors based on Security Requirements to Scenarios
Hiroya Itoga, Atsushi Ohnishi (Ritsumeikan Univ.)
Security requirements which requested from some audit standards are difficult to understand and to check for stakeholder... [more] SS2005-71
pp.49-54
SS 2005-12-20
15:00
Kochi Kochi Women's University A Software Process Tailoring System based on Quantitative Management Plans
Kazumasa Hikichi, Hajimu Iida, Ken-ichi Matsumoto (NAIST)
Many organizations are introducing quantitative management in software development process. This paper proposes a suppor... [more] SS2005-72
pp.55-60
SS 2005-12-20
15:45
Kochi Kochi Women's University *
Yasuhiro Hayase, Makoto Matsushita, Shinji Kusumoto, Katsuro Inoue (Osaka Univ.), Kenichi Kobayashi, Toshiaki Yoshino (Fujitsu Lab.)
A software vendor sometimes contracts the maintenance of a software product that other software vendors gave up maintain... [more] SS2005-73
pp.61-66
SS 2005-12-20
16:15
Kochi Kochi Women's University Characterizing software projects unpredictable by effort estimation models
Koji Toda, Masateru Tsunoda, Akito Monden, Ken-ichi Matsumoto (NAIST)
Effort prediction is necessary for project manegers to make software development plan. To predict development effort, va... [more] SS2005-74
pp.67-72
 Results 1 - 20 of 21  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan