Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NC, MBE (Joint) |
2024-03-12 10:50 |
Tokyo |
The Univ. of Tokyo (Primary: On-site, Secondary: Online) |
Data Description Formats for Efficient Reverse Engineering of Brain Computational Functions Hiroshi Yamakawa, Yoshimasa Tawatsuji (Tokyo Univ.), Tatsuya Miyamoto (Waseda Univ.), Naoya Arakawa, Yuta Ashihara, Ayako Fukawa (WBAI), Koichi Takahashi (RIKEN), Yutaka Matsuo (Tokyo Univ.) NC2023-52 |
In the current situation where neuroscience knowledge is still insufficient, a bidirectional design that integrates both... [more] |
NC2023-52 pp.53-58 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-29 16:25 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Recovering build-reproducible Dockerfile based on Docker image analysis Ayaka Kinoshita, Takashi Kobayashi (Tokyo Tech.) SS2022-16 KBSE2022-26 |
Since the software depends on external libraries and other software, it is necessary to define an execution environment ... [more] |
SS2022-16 KBSE2022-26 pp.91-96 |
SS |
2019-03-04 14:45 |
Okinawa |
|
Machine learning based requirements description analysis technique for creating backlogs Ryo Ishizuka, Hironori Washizaki (Waseda Univ.), Shinobu Saito, saori ouji (NTT SIC) SS2018-62 |
A large amount of demands are sent by users during systems operation. The project manager should identify the features r... [more] |
SS2018-62 pp.61-66 |
SS, KBSE, IPSJ-SE [detail] |
2017-07-20 15:25 |
Hokkaido |
|
On the Extraction of State Transition Tables from an Embedded Software System and Analysis Support Ryota Yamamoto, Norihiro Yoshida (Nagoya Univ.), Nao Aoki (JASA), Hiroaki Takada (Nagoya Univ.) SS2017-16 KBSE2017-16 |
It is hard to understand legacy code for an embedded software system. It leads much cost for maintaining and reusing the... [more] |
SS2017-16 KBSE2017-16 pp.133-138 |
ICSS |
2016-11-25 14:40 |
Kanagawa |
Institute of Information Security |
A fuzz testing method cooperated with threat modeling Yasuhiko Nishio, Tadashi Shiroma (CCDS), Hiroyuki Inoue (CCDS/HCU) ICSS2016-41 |
The purpose of this study is to develop a fuzz testing method that can ensure the IoT security especially automotive sys... [more] |
ICSS2016-41 pp.15-20 |
ISEC, LOIS, SITE |
2016-11-08 15:00 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
Data Output UI Specification Extraction using Differences of Texts in HTML Documents Daisuke Tashiro, Ryota Mibe (Hitachi) ISEC2016-67 SITE2016-57 LOIS2016-45 |
In a enterprise system redevelopment project, it is important to get correct specification of an existing system. Howev... [more] |
ISEC2016-67 SITE2016-57 LOIS2016-45 pp.89-94 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-13 10:50 |
Hokkaido |
|
Extracting State Transition Tables from an Embedded Software System Ryota Yamamoto, Norihiro Yoshida (Nagoya Univ.), Akihiko Takeda (JASA), Nobuyuki Tachi, Hiroaki Takada (Nagoya Univ.) SS2016-3 KBSE2016-9 |
It is hard to understand legacy code for an embedded software system. It leads much cost for maintaining and reusing the... [more] |
SS2016-3 KBSE2016-9 pp.13-18 |
LOIS, ISEC, SITE |
2015-11-06 14:50 |
Kanagawa |
Kanagawa Univ. |
Input UI Specification Recovery using Web Operation Monitoring Daisuke Tashiro, Katsuro Kikuchi, Ryota Mibe (Hitachi) ISEC2015-43 SITE2015-30 LOIS2015-37 |
In development and operation of enterprise system, it is important to understand specifications of existing system. Obso... [more] |
ISEC2015-43 SITE2015-30 LOIS2015-37 pp.47-52 |
KBSE |
2015-03-05 13:45 |
Tokyo |
The University of Electro-Communications |
Abstraction and Difference Detection of UML Sequence Diagrams in Program Before and After the Updating Shoichi Miyagi, Shohei Maruyama, Yoshikazu Ueda (Ibaraki Univ.) KBSE2014-55 |
Since sequence diagram produced by reverse engineering is details, it is difficult to compare the diagram with the abstr... [more] |
KBSE2014-55 pp.19-24 |
KBSE |
2015-01-26 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Investigation of a Reverse Engineering Method for Verifying Source Code with a Use Case Model
-- A Case of an ASP.NET Application -- Shinpei Ogata (Shinshu Univ.), Yoshitaka Aoki (SIT), Satoshi Yazawa (VR), Saeko Matsuura (SIT) KBSE2014-42 |
Traceability between a requirements specification and source code should be kept but it’s difficult. Verifying that the ... [more] |
KBSE2014-42 pp.19-24 |
NLC |
2014-06-14 13:55 |
Fukuoka |
Kyushu Institute of Technology |
Reverse Engineering Twitter Hashtag Algorithm Marat Zhanikeev (Kyushu Inst. of Tech.) NLC2014-3 |
Twitter today markets itself through neat infographics where it explains how its main features -- specifically, the hash... [more] |
NLC2014-3 pp.13-16 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 15:35 |
Ishikawa |
Hotel Rurikoh |
Fingerprinting in Executable Files for Tracking Illegal Uploaders Masayuki Tsubouchi, Yasuo Okabe (Kyoto Univ.) SITE2013-74 IA2013-99 |
Nowadays illegal uploading of digital contents is a serious problem. Some software venders have solved this issue by aut... [more] |
SITE2013-74 IA2013-99 pp.189-193 |
SS, IPSJ-SE |
2013-10-25 14:10 |
Ishikawa |
|
And/Or/Call Graph and Its Application to Source-Code Search Toshihiro Kamiya (Future Univ. Hakodate) SS2013-47 |
To realize a code search of which a searched concept consists of multiple modules (or source files), this paper presents... [more] |
SS2013-47 pp.173-178 |
SS, KBSE |
2013-07-26 16:50 |
Hokkaido |
|
Improving Applicability to Large-Scale Products of a Code-Clone Detetion Method Based on an Arbitrary-Granularity Function Model Toshihiro Kamiya (Future Univ. Hakodate) SS2013-35 KBSE2013-35 |
A clone-detection method, which authors have proposed, is to generate all possible execution paths of a target program i... [more] |
SS2013-35 KBSE2013-35 pp.133-137 |
SS |
2013-05-10 09:30 |
Kagawa |
Kagawa University (Saiwaimachi) |
A Code-Clone Detection Method from Bytecode Based on Arbitrary-Granularity Function Model Toshihiro Kamiya (Future Univ. Hakodate) SS2013-8 |
One of the primal purposes of code-clone detection methods is to detect the code fragments of a software product that ne... [more] |
SS2013-8 pp.43-48 |
KBSE |
2013-03-14 11:25 |
Tokyo |
Shibaura Institute of Technology |
Abstraction Method of UML Sequence Diagram Based on Execution Trace Shouichi Miyagi, Kouji Kamijo, Yoshikazu Ueda (Ibaraki Univ.) KBSE2012-71 |
In order to take the correspondence between each elements of program and design document, there is a way to create a seq... [more] |
KBSE2012-71 pp.13-18 |
KBSE |
2010-11-25 10:10 |
Shizuoka |
Faculty of Infomatics, Shizuoka Univ. |
Extracting Use Case from Screen Transition Pattern for a Migration of Enterprise Information Systems Shunsuke Kurihara, Hisaharu Ishii, Rie Sakai, Shinichi Nakagawa (NTT), Hiroyuki Sato (NTT Resonant Inc,) KBSE2010-33 |
The paper proposes a method construct UML use-case diagrams from screen transition diagrams by using mining sequence pat... [more] |
KBSE2010-33 pp.61-66 |
SS |
2009-08-06 11:00 |
Hokkaido |
Kitami Institute of Technology |
A Prototype Implementation of Reverse-Engineering Toolkit: Remics Toshihiro Kamiya (AIST) SS2009-13 |
This paper briefly introduces the current status of a toolkit named Remics. This toolkit aims that software developers m... [more] |
SS2009-13 pp.7-11 |
SS |
2009-03-03 10:45 |
Saga |
Saga University |
A Software Design Support Tool Perseus with Reverse Engineering Function Naoya Saisho, Tetsuro Kakeshita (Saga Univ.) SS2008-56 |
In software development, a design and implementation must be separated and software should be developed systematically. ... [more] |
SS2008-56 pp.49-54 |
SITE, IPSJ-EIP |
2008-05-30 13:00 |
Tochigi |
Utsunomiya University |
Re-consideration of Copyright and Fare-use Naonori Kato (Niigata Univ) |
There are the acts to control the rights of copyrights in Japanese Copyright act(From section 30 to 50).But recently, Su... [more] |
SITE2008-1 pp.1-6 |