IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 61  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SC 2022-05-27
Online (University of Aizu) Constructing Knowledge for Machine Learning Projects Using Decision Process Model
Hironori Takeuchi (Musashi Univ.), Shinpei Ogata (Shinshu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Hiroyuki Nakagawa (Osaka Univ.)
 [more] SC2022-6
KBSE, SWIM 2021-05-22
Online Online Enterprise Architecture-based Agile Development Model for Machine Learning Service Systems
Hironori Takeuchi (Musashi Univ.), Shinpei Ogata (Shinsyu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Hiroyuki Nakagawa (Osaka Univ.) KBSE2021-8 SWIM2021-8
 [more] KBSE2021-8 SWIM2021-8
KBSE 2018-03-01
Okinawa   Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base
Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] KBSE2017-50
KBSE, SS, IPSJ-SE [detail] 2016-07-13
Hokkaido   Analyzing Goal Dependencies among Actors using their Domain Model
Haruhiko Kaiya (Kanagawa Univ.) SS2016-4 KBSE2016-10
Information systems are introduced into social activities performed by human and organizations.
Such activities and sy... [more]
SS2016-4 KBSE2016-10
KBSE 2015-09-25
Osaka Bldg.A No.110, IST, Suita campus, Osaka University Towards Separation of Concerns in Screen Transition Modeling -- Case of Business and Usability Features --
Shinpei Ogata, Shohei Kamimori (Shinshu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Kozo Okano (Shinshu Univ.) KBSE2015-33
For requirements analysis in business Web application development employing model driven development approaches, an appr... [more] KBSE2015-33
KBSE, SS, IPSJ-SE [detail] 2015-07-23
Hokkaido   Proposal of EMSsec-Common Problem for Security and Privacy
Takao Okubo (IISEC), Haruhiko Kaiya (Kanagawa Univ.), Hironori Washizaki (Waseda Univ.), Shinpei Ogata (Shinshu Univ.), Yoshio Kakizaki (Dendai Univ.), Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) SS2015-22 KBSE2015-15
 [more] SS2015-22 KBSE2015-15
KBSE 2015-03-05
Tokyo The University of Electro-Communications A Case-based Management System for Secure Software Development Using Software Security Knowledge
Masahito Saito, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-57
In recent years, importance on software security technologies has been recognized and various types of the technologies ... [more] KBSE2014-57
KBSE 2015-01-27
Tokyo Kikai-Shinko-Kaikan Bldg. Case base of secure web application development using software security knowledge base
Atsuo Hazeyama, Masahito Saito (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Azusa Kumagaya (Tokyo Gakugei Univ.), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-47
Importance for software security technologies has been recognized according to increase of services on the Internet. Var... [more] KBSE2014-47
KBSE 2014-03-06
Okinawa Okinawaken-Seinenkaikan Mining of IR method for Traceability Link Recovery
Ryouhei Yuasa, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ) KBSE2013-83
 [more] KBSE2013-83
KBSE 2014-03-07
Okinawa Okinawaken-Seinenkaikan An Android Application Analysis Method for Highlighting Disclosure of Fine-Grained User Information
Takuya Sakashita, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-93
We have proposed a static analysis method of android application to highlight the user information disclosed by the appl... [more] KBSE2013-93
KBSE 2014-01-28
Tokyo Kikai-Shinko-Kaikan Bldg Recovering Traceability for using information retrieved methods
Yuhto Tomii, Kenji Kaijiri, Haruhiko Kaiya, Shinpei Ogata (Shinshu Univ.) KBSE2013-75
 [more] KBSE2013-75
KBSE 2014-01-28
Tokyo Kikai-Shinko-Kaikan Bldg The proposal of the technique of selecting the optimal Error-prone module prediction
Hideaki Uchimiya, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-77
Although various techniques are proposed by Error prone module prediction, there is no technique of becoming the optimal... [more] KBSE2013-77
KBSE 2013-05-30
Kanagawa Keio University Proposal of method mining for the Traceability link recovery
Takeyuki Ueda, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-5
We propose a new method for finding appropriate methods from a variety of methods of the traceability link recovery, and... [more] KBSE2013-5
KBSE 2013-05-30
Kanagawa Keio University A Screen Transition Model for Evaluating Usability Focusing on Function for Saving Inputs
Hiroki Hayakawa, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-6
Usability is important to attract consumers of e-commerce site, etc. A user often re-inputs data by mistakes or by chang... [more] KBSE2013-6
KBSE 2013-03-14
Tokyo Shibaura Institute of Technology Supporting tool for security requirements analysis using asset flows and deployment diagrams
Yusuke Takizawa, Junya Sakai, Haruhiko Kaiya, Shinpei Ogata, Kenji Kaijiri (Sinshu Univ.) KBSE2012-74
 [more] KBSE2012-74
KBSE 2012-11-22
Ishikawa Kanazawa University Security Requirements Analysis under Bring Your Own Device
Yuuji Suzuki, Haruhiko Kaiya, Shinpei Ogata (SU), Takao Okubo, Nobuyuki Kanaya (Fujitsu Lab.), Nobukazu Yoshioka (NII) KBSE2012-47
 [more] KBSE2012-47
KBSE, SS 2012-07-27
Hokkaido Future University Hakodate Evaluation of Error Prone Prediction method by using majority rule
Toshihide Takahashi, Tatusya Ohnishi, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Uni.) SS2012-14 KBSE2012-16
 [more] SS2012-14 KBSE2012-16
SS 2012-03-13
Okinawa Tenbusu-Naha A proposal of web complexity metrics for Ajax and it's trial tool
Yuki Kagaya, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ) SS2011-71
 [more] SS2011-71
SS 2012-03-14
Okinawa Tenbusu-Naha Traceability reconstruction for Software Project -- Application to Real Project --
Manabu Miyashita, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Uni.) SS2011-78
In the course of the development of software and the system, the quality of the document is very important. I come to be... [more] SS2011-78
KBSE 2012-01-23
Tokyo Kikai-Shinko-Kaikan Bldg. Cause-Oriented Vulnerability Analysis of Security Requirements for Web Applications
Hironori Nishino, Junya Sakai, Haruhiko Kaiya, Kenji Kaijiri (SU) KBSE2011-58
Use case models are frequently used to specify requirements for an information system, but such models do not permit us ... [more] KBSE2011-58
 Results 1 - 20 of 61  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan