IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 22  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NC, MBE
(Joint)
2024-03-12
10:50
Tokyo The Univ. of Tokyo
(Primary: On-site, Secondary: Online)
Data Description Formats for Efficient Reverse Engineering of Brain Computational Functions
Hiroshi Yamakawa, Yoshimasa Tawatsuji (Tokyo Univ.), Tatsuya Miyamoto (Waseda Univ.), Naoya Arakawa, Yuta Ashihara, Ayako Fukawa (WBAI), Koichi Takahashi (RIKEN), Yutaka Matsuo (Tokyo Univ.) NC2023-52
In the current situation where neuroscience knowledge is still insufficient, a bidirectional design that integrates both... [more] NC2023-52
pp.53-58
SS, IPSJ-SE, KBSE [detail] 2022-07-29
16:25
Hokkaido Hokkaido-Jichiro-Kaikan (Sapporo)
(Primary: On-site, Secondary: Online)
Recovering build-reproducible Dockerfile based on Docker image analysis
Ayaka Kinoshita, Takashi Kobayashi (Tokyo Tech.) SS2022-16 KBSE2022-26
Since the software depends on external libraries and other software, it is necessary to define an execution environment ... [more] SS2022-16 KBSE2022-26
pp.91-96
SS 2019-03-04
14:45
Okinawa   Machine learning based requirements description analysis technique for creating backlogs
Ryo Ishizuka, Hironori Washizaki (Waseda Univ.), Shinobu Saito, saori ouji (NTT SIC) SS2018-62
A large amount of demands are sent by users during systems operation. The project manager should identify the features r... [more] SS2018-62
pp.61-66
SS, KBSE, IPSJ-SE [detail] 2017-07-20
15:25
Hokkaido   On the Extraction of State Transition Tables from an Embedded Software System and Analysis Support
Ryota Yamamoto, Norihiro Yoshida (Nagoya Univ.), Nao Aoki (JASA), Hiroaki Takada (Nagoya Univ.) SS2017-16 KBSE2017-16
It is hard to understand legacy code for an embedded software system. It leads much cost for maintaining and reusing the... [more] SS2017-16 KBSE2017-16
pp.133-138
ICSS 2016-11-25
14:40
Kanagawa Institute of Information Security A fuzz testing method cooperated with threat modeling
Yasuhiko Nishio, Tadashi Shiroma (CCDS), Hiroyuki Inoue (CCDS/HCU) ICSS2016-41
The purpose of this study is to develop a fuzz testing method that can ensure the IoT security especially automotive sys... [more] ICSS2016-41
pp.15-20
ISEC, LOIS, SITE 2016-11-08
15:00
Fukui Community Hall & AOSSA Mall, Fukui Data Output UI Specification Extraction using Differences of Texts in HTML Documents
Daisuke Tashiro, Ryota Mibe (Hitachi) ISEC2016-67 SITE2016-57 LOIS2016-45
In a enterprise system redevelopment project, it is important to get correct specification of an existing system. Howev... [more] ISEC2016-67 SITE2016-57 LOIS2016-45
pp.89-94
KBSE, SS, IPSJ-SE [detail] 2016-07-13
10:50
Hokkaido   Extracting State Transition Tables from an Embedded Software System
Ryota Yamamoto, Norihiro Yoshida (Nagoya Univ.), Akihiko Takeda (JASA), Nobuyuki Tachi, Hiroaki Takada (Nagoya Univ.) SS2016-3 KBSE2016-9
It is hard to understand legacy code for an embedded software system. It leads much cost for maintaining and reusing the... [more] SS2016-3 KBSE2016-9
pp.13-18
LOIS, ISEC, SITE 2015-11-06
14:50
Kanagawa Kanagawa Univ. Input UI Specification Recovery using Web Operation Monitoring
Daisuke Tashiro, Katsuro Kikuchi, Ryota Mibe (Hitachi) ISEC2015-43 SITE2015-30 LOIS2015-37
In development and operation of enterprise system, it is important to understand specifications of existing system. Obso... [more] ISEC2015-43 SITE2015-30 LOIS2015-37
pp.47-52
KBSE 2015-03-05
13:45
Tokyo The University of Electro-Communications Abstraction and Difference Detection of UML Sequence Diagrams in Program Before and After the Updating
Shoichi Miyagi, Shohei Maruyama, Yoshikazu Ueda (Ibaraki Univ.) KBSE2014-55
Since sequence diagram produced by reverse engineering is details, it is difficult to compare the diagram with the abstr... [more] KBSE2014-55
pp.19-24
KBSE 2015-01-26
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. An Investigation of a Reverse Engineering Method for Verifying Source Code with a Use Case Model -- A Case of an ASP.NET Application --
Shinpei Ogata (Shinshu Univ.), Yoshitaka Aoki (SIT), Satoshi Yazawa (VR), Saeko Matsuura (SIT) KBSE2014-42
Traceability between a requirements specification and source code should be kept but it’s difficult. Verifying that the ... [more] KBSE2014-42
pp.19-24
NLC 2014-06-14
13:55
Fukuoka Kyushu Institute of Technology Reverse Engineering Twitter Hashtag Algorithm
Marat Zhanikeev (Kyushu Inst. of Tech.) NLC2014-3
Twitter today markets itself through neat infographics where it explains how its main features -- specifically, the hash... [more] NLC2014-3
pp.13-16
IA, IPSJ-IOT, SITE [detail] 2014-02-28
15:35
Ishikawa Hotel Rurikoh Fingerprinting in Executable Files for Tracking Illegal Uploaders
Masayuki Tsubouchi, Yasuo Okabe (Kyoto Univ.) SITE2013-74 IA2013-99
Nowadays illegal uploading of digital contents is a serious problem. Some software venders have solved this issue by aut... [more] SITE2013-74 IA2013-99
pp.189-193
SS, IPSJ-SE 2013-10-25
14:10
Ishikawa   And/Or/Call Graph and Its Application to Source-Code Search
Toshihiro Kamiya (Future Univ. Hakodate) SS2013-47
To realize a code search of which a searched concept consists of multiple modules (or source files), this paper presents... [more] SS2013-47
pp.173-178
SS, KBSE 2013-07-26
16:50
Hokkaido   Improving Applicability to Large-Scale Products of a Code-Clone Detetion Method Based on an Arbitrary-Granularity Function Model
Toshihiro Kamiya (Future Univ. Hakodate) SS2013-35 KBSE2013-35
A clone-detection method, which authors have proposed, is to generate all possible execution paths of a target program i... [more] SS2013-35 KBSE2013-35
pp.133-137
SS 2013-05-10
09:30
Kagawa Kagawa University (Saiwaimachi) A Code-Clone Detection Method from Bytecode Based on Arbitrary-Granularity Function Model
Toshihiro Kamiya (Future Univ. Hakodate) SS2013-8
One of the primal purposes of code-clone detection methods is to detect the code fragments of a software product that ne... [more] SS2013-8
pp.43-48
KBSE 2013-03-14
11:25
Tokyo Shibaura Institute of Technology Abstraction Method of UML Sequence Diagram Based on Execution Trace
Shouichi Miyagi, Kouji Kamijo, Yoshikazu Ueda (Ibaraki Univ.) KBSE2012-71
In order to take the correspondence between each elements of program and design document, there is a way to create a seq... [more] KBSE2012-71
pp.13-18
KBSE 2010-11-25
10:10
Shizuoka Faculty of Infomatics, Shizuoka Univ. Extracting Use Case from Screen Transition Pattern for a Migration of Enterprise Information Systems
Shunsuke Kurihara, Hisaharu Ishii, Rie Sakai, Shinichi Nakagawa (NTT), Hiroyuki Sato (NTT Resonant Inc,) KBSE2010-33
The paper proposes a method construct UML use-case diagrams from screen transition diagrams by using mining sequence pat... [more] KBSE2010-33
pp.61-66
SS 2009-08-06
11:00
Hokkaido Kitami Institute of Technology A Prototype Implementation of Reverse-Engineering Toolkit: Remics
Toshihiro Kamiya (AIST) SS2009-13
This paper briefly introduces the current status of a toolkit named Remics. This toolkit aims that software developers m... [more] SS2009-13
pp.7-11
SS 2009-03-03
10:45
Saga Saga University A Software Design Support Tool Perseus with Reverse Engineering Function
Naoya Saisho, Tetsuro Kakeshita (Saga Univ.) SS2008-56
In software development, a design and implementation must be separated and software should be developed systematically. ... [more] SS2008-56
pp.49-54
SITE, IPSJ-EIP 2008-05-30
13:00
Tochigi Utsunomiya University Re-consideration of Copyright and Fare-use
Naonori Kato (Niigata Univ)
There are the acts to control the rights of copyrights in Japanese Copyright act(From section 30 to 50).But recently, Su... [more] SITE2008-1
pp.1-6
 Results 1 - 20 of 22  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan