Information and Systems-Software Science(Date:2015/05/11)

Presentation
An Approach for Software Repository Mining Using a Natural Langage Processing Method, Word2Vec

Takeru Uchiyama(FUN),  Toshihiro Kamiya(FUN),  

[Date]2015-05-11
[Paper #]SS2015-6
An Implementation of Computing Optimal Mean-payoff Values for Non-terminating Scheduling by Double Priced Timed Automata

Sho Hiraoka(Nagoya Univ.),  Shoji Yuen(Nagoya Univ.),  

[Date]2015-05-11
[Paper #]SS2015-3
Towards Applications of FRP in Small-Scale Embedded Systems

Kensuke Sawada(Tokyo Tech.),  Kouhei Suzuki(Tokyo Tech.),  Takuo Watanabe(Tokyo Tech.),  

[Date]2015-05-11
[Paper #]SS2015-1
Towards the Supervisor Synthesis Using Hybrid Process Calculi

Yuto Kawakita(Nagoya Univ.),  Shoji Yuen(Nagoya Univ.),  

[Date]2015-05-11
[Paper #]SS2015-2
Classification of Code Clones in Hardware Description Language

Kyohei Uemura(NAIST),  Kenji Fujiwara(NAIST),  Hajimu Iida(NAIST),  

[Date]2015-05-11
[Paper #]SS2015-5
Modeling and Performance Verification of Embedded Software in Multiprocessor Environment Using Extended Time Petri Nets

Takafumi Nakamura(Hiroshima City Univ.),  Akio Nakata(Hiroshima City Univ.),  

[Date]2015-05-11
[Paper #]SS2015-7
[Invited Lecture] Quantitative Information Flow and Differential Privacy

Hiroyuki Seki(Nagoya Univ.),  

[Date]2015-05-11
[Paper #]SS2015-4
[Invited Lecture] Holism and Reductionism in Describing Software

Tsuneo Ajisaka(Wakayama Univ.),  

[Date]2015-05-11
[Paper #]SS2015-8
Query-Based l-Diversity

Chittaphone Phonharath(NAIST),  Ryunosuke Takayama(Nagoya Univ.),  Kenji Hashimoto(Nagoya Univ.),  Hiroyuki Seki(Nagoya Univ.),  

[Date]2015-05-12
[Paper #]SS2015-14
Coding Pattern Detection for C Programs Using Pattern Mining Technique

Yuta Nakamura(Osaka Univ.),  Eunjong Choi(Osaka Univ.),  Norihiro Yoshida(Nagoya Univ.),  Shusuke Haruna(Osaka Univ.),  Katsuro Inoue(Osaka Univ.),  

[Date]2015-05-12
[Paper #]SS2015-9
Investigation for Reducing Reuse Candidates on Reuse-based Automated Program Repair

Haruki Yokoyama(Osaka Univ.),  Takafumi Ohta(Osaka Univ.),  Keisuke Hotta(Osaka Univ.),  Yoshiki Higo(Osaka Univ.),  Kozo Okano(Shinshu Univ.),  Shinji Kusumoto(Osaka Univ.),  

[Date]2015-05-12
[Paper #]SS2015-10
A Verification Method for k-Secrecy of XML Databases by Model Counting

Takatoshi Asai(Nagoya Univ.),  Masanori Uesugi(Nagoya Univ.),  Kenji Hashimoto(Nagoya Univ.),  Hiroyuki Seki(Nagoya Univ.),  

[Date]2015-05-12
[Paper #]SS2015-15
Influence of the number of words in a bug report on accuracy in duplicate bug report detection

Akihiro Tsuruda(Kumamoto Univ.),  Yuki Manabe(Kumamoto Univ.),  Masayoshi Aritsugi(Kumamoto Univ.),  

[Date]2015-05-12
[Paper #]SS2015-11
Towards to Recover Propagation Process of the Patch for Linux Distribution

Yong Jin(NAIST),  Kenji Fujiwara(NAIST),  Hajimu Iida(NAIST),  

[Date]2015-05-12
[Paper #]SS2015-12
[Invited Lecture] Software Engineering Embracing Uncertainty

Naoyasu Ubayashi(Kyushu Univ.),  

[Date]2015-05-12
[Paper #]SS2015-13