Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE |
2024-03-15 15:15 |
Okinawa |
Okinawa Prefectual General Welfare Center (Primary: On-site, Secondary: Online) |
Bayesian Statistical Analysis of Commit History Data Using WBIC for OSS Evolution Analysis Toru Sugiyama, Takako Nakatani (OUJ) KBSE2023-90 |
This paper utilizes the latest advancements in computational Bayesian statistics to analyze the commit histories of Open... [more] |
KBSE2023-90 pp.138-142 |
NS, IN (Joint) |
2024-03-01 10:10 |
Okinawa |
Okinawa Convention Center |
On Game Theoretic Mining Task Offloading in Decentralized Applications Kota Yamada, Takanori Hara, Shoji Kasahara (NAIST) NS2023-198 |
With the increasing demand for blockchain-based Decentralized Applications (DApps), mining increas- ingly grows in impor... [more] |
NS2023-198 pp.154-159 |
SANE |
2024-01-19 13:50 |
Miyagi |
(Primary: On-site, Secondary: Online) |
Ground Penetrating Radar Development and application to Humanitarian demining in Ukraine Motoyuki Sato, Ryuma Saito (ALISys) SANE2023-98 |
The mine detection sensor "ALIS", which is a combination of ground penetrating radar (GPR) and metal detector, is equipp... [more] |
SANE2023-98 pp.47-52 |
DE, IPSJ-DBS |
2023-12-26 14:00 |
Tokyo |
Institute of Industrial Science, The University of Tokyo |
Interpretation of unsupervised clustering based on XAI Yu Sasaki, Fumiaki Saitoh (CIT) DE2023-28 |
Explainable Artificial Intelligence (XAI) aims to introduce transparency and interpretability into the decision-making o... [more] |
DE2023-28 pp.1-6 |
IBISML |
2023-12-21 10:30 |
Tokyo |
National Institute of Informatics (Primary: On-site, Secondary: Online) |
Badminton Rally Analysis Using LSTM Atsushi Yoshinaga, Masato Kiyama, Motoki Amagasaki (Kumamoto Univ.) IBISML2023-35 |
In this study, we analyze badminton rallies as a tactical support technology for sports using AI. In badminton, it is re... [more] |
IBISML2023-35 pp.31-36 |
LOIS, SITE, ISEC |
2023-11-09 13:55 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
ISEC2023-58 SITE2023-52 LOIS2023-16 |
With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] |
ISEC2023-58 SITE2023-52 LOIS2023-16 pp.26-32 |
ET |
2023-09-08 09:40 |
Osaka |
Osaka Metropolitan University / Online (Primary: On-site, Secondary: Online) |
Survey on learning-state-estimation methods using learning trace data Yoshihiro Hayashi, Kimihiko Miyazaki, Masashi Kudo, Yamana Hayato (Waseda Univ.) ET2023-13 |
In recent years, the use of online learning platforms and learning applications has increased rapidly due to the spread ... [more] |
ET2023-13 pp.1-8 |
NLC |
2023-09-07 16:20 |
Osaka |
Osaka Metropolitan University. Nakamozu Campus. (Primary: On-site, Secondary: Online) |
Estimation of sentence boundaries in texts on business performance Kaito Takano, Kei Nakagawa (NAM), Hiroyuki Sakai (Seikei Univ.) NLC2023-13 |
In order to maintain a healthy market for financial instruments, listed companies are required to disclose corporate inf... [more] |
NLC2023-13 pp.69-74 |
SS, KBSE, IPSJ-SE [detail] |
2023-07-22 09:55 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Exploring the Magnetic or Sticky Nature of GitHub Ecosystems: NPM, PyPI, and Rubygems Shurong Sun, Olivier Nourry, Dong Wang, Yasutaka Kamei (Kyushu Univ.) SS2023-17 KBSE2023-28 |
Software ecosystems consist of a number of software projects that are developed and evolve within a shared environment. ... [more] |
SS2023-17 KBSE2023-28 pp.92-97 |
SC |
2023-03-17 11:05 |
Tokyo |
NII (Primary: On-site, Secondary: Online) |
Automatic Detection of Fire Causes for Text Mining of Fire Report Kento Matsuba (Kobe Univ.), Sachio Saiki (Kochi Univ. of Tech.), Masahide Nakamura (Kobe Univ.) SC2022-41 |
Fire departments across Japan are facing the retirement of a large number of firefighters. So passing on skills and know... [more] |
SC2022-41 pp.16-21 |
ICM |
2023-03-17 10:40 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
[Invited Talk]
Introduction of trial on network design for mission-critical video contribution services Nobuaki Kadowaki, Yosuke Tanaka, Masao Nishie (NTT Com) ICM2022-54 |
Our infrastructure all over Japan has provided real-time video transmission services that delivers live video securely i... [more] |
ICM2022-54 pp.55-60 |
KBSE |
2023-03-17 14:10 |
Hiroshima |
JMS ASTERPLAZA (Primary: On-site, Secondary: Online) |
Analyzing Business Processes by Automatically Detecting KPI Thresholds Based on Trace Variants Taro Takei, Hiroki Horita (Ibaraki Univ.) KBSE2022-66 |
One method for analyzing complex business processes is to filter event logs by KPI thresholds to extract only specific p... [more] |
KBSE2022-66 pp.73-78 |
SS |
2023-03-14 18:25 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A feature analysis of merged change requests on a version Mizuki Uenaka, Akinori Ihara (Wakayama Univ.), Yutaro Kashiwa (NAIST) SS2022-60 |
Large software development projects have a large number of the source code change requests on a daily basis. Developers ... [more] |
SS2022-60 pp.79-84 |
SS |
2023-03-15 11:00 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Investigation of software development history using a configuration management tool for defect prediction Takayuki Zukawa (Kyoto Inst. Tech.), Masanari Kondo (Kyushu Univ.), Eunjong Choi, Osamu Mizuno (Kyoto Inst. Tech.) SS2022-64 |
As software becomes more widely used, Infrastructure as Code (IaC) is becoming increasingly popular for eliminating the ... [more] |
SS2022-64 pp.103-108 |
SS |
2023-03-15 13:20 |
Okinawa |
(Primary: On-site, Secondary: Online) |
SS2022-66 |
Refactoring refers to modifying a program without changing its external behavior in order to simplify its internal struc... [more] |
SS2022-66 pp.115-120 |
RCC, ISEC, IT, WBS |
2023-03-14 16:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Proposal for a privacy-preserving frequency estimation method Naoki Kawahara, Atsuko Miyaji (Osaka Univ.), Tomoaki Mimoto (ATR) IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 |
Differential privacy is one of the methods used to protect personal data by adding noise to personal data and its analys... [more] |
IT2022-97 ISEC2022-76 WBS2022-94 RCC2022-94 pp.187-194 |
ET |
2023-03-15 10:45 |
Tokushima |
Tokushima University (Primary: On-site, Secondary: Online) |
The implementation of a text analysis function using AI services on the course introduction module. Toshikazu Iitaka (Kumamoto Gakuen Univ) ET2022-83 |
The author has developed modules that are functioning on the Contents Management System. And the author has investigated... [more] |
ET2022-83 pp.148-153 |
R |
2023-03-10 13:50 |
Hiroshima |
(Primary: On-site, Secondary: Online) |
Failure Sign Detection by State Path Analysis for Fare Collection System
-- Evaluation by Sequential Pattern Mining with Mechatronics Knowledge -- Ken Ueno, Misato Ishikawa, Yuko Kobayashi, Takamitsu Sunaoshi (Toshiba), Kiyoku Endo (Toshiba Automation Systems Service) R2022-50 |
To detect failure sign on Fare Collection System (FCS) which has low failure rate accurately, we need the mechatronics k... [more] |
R2022-50 pp.13-18 |
KBSE |
2023-01-19 14:40 |
Ishikawa |
(Primary: On-site, Secondary: Online) |
Fairness-aware human resource allocation for runtime business process Nayuta Egashira, Hiroki Horita (Ibaraki Univ.) KBSE2022-46 |
Predictive business process monitoring improves the work efficiency of a running business process based on the analysis ... [more] |
KBSE2022-46 pp.19-24 |
KBSE |
2023-01-20 13:45 |
Ishikawa |
(Primary: On-site, Secondary: Online) |
Toward Analyzing OSS Developers Contributing to the Removal of Technical Debt in Multiple Projects Junya Hishikawa, Daisuke Fukumoto, Soratouch Pornmaneerattanatri, Yutaro Kashiwa, Toshiki Hirao (NAIST), Kenji Fujiwara (TCU), Hajimu Iida (NAIST) KBSE2022-52 |
In recent years, it has been reported that a large amount of technical debt in systems hinders Digital Transformation (D... [more] |
KBSE2022-52 pp.52-57 |