IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 108, Number 242

Software Science

Workshop Date : 2008-10-16 - 2008-10-17 / Issue Date : 2008-10-09

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SS2008-27
Problems concerning requirements allocation based on events of interests
Noboru Hattori (NTT DATA/Wakayama Univ.), Shuichiro Yamamoto (NTT DATA), Tsuneo Ajisaka (Wakayama Univ.)
pp. 1 - 6

SS2008-28
RAS Based Representation of core Assets for Software Product Line
Yusuke Hattori (Fukuoka IST), Go Hirakawa, Shuichi Ashihara (NAL), Tsuneo Nakanishi (Kyushu Univ.), Teruaki Kitasuka (Kumamoto Univ.), Shigeaki Tagashira, Akira Fukuda (Kyushu Univ.)
pp. 7 - 12

SS2008-29
Supporting Choice Among Architectural Design Alternatives Using Graph Transformation
Hiroshi Kazato, Motoshi Saeki (Tokyo Tech)
pp. 13 - 18

SS2008-30
Thread Synchronization Using AspectJ
Tomoyuki Uchikoshi, Yasuhiro Sugiyama (Nihon Univ)
pp. 19 - 24

SS2008-31
Recommendation Method Using Client Side Log and Fuzzy Clustering in the Web Search -- A Case of Web Search for Universities of Interest --
Yoshifusa Nakano, Takuo Matsunobe, Tsuneo Ajisaka (Wakayama Univ.)
pp. 25 - 30

SS2008-32
Improvement of iterative methods on GPU by partially using pseudo double precision calculation
Fumiaki Fujiki, Hidetoshi Ando, Koji Toriyama (Univ. of Yamanashi)
pp. 31 - 36

SS2008-33
Distributed visualization of 2D flow field by using particle advection on GPU cluster environment
Tomoya Sakashita, Hidetoshi Ando, Koji Toriyama (Univ. of Yamanashi)
pp. 37 - 42

SS2008-34
An analysis of relationship between code clone length and software reliability
Hiroki Sato, Yasutaka Kamei, Hidetake Uwano, Akito Monden, Shinji Kawaguchi, Masataka Nagura, Ken-ichi Matsumoto, Hajimu Iida (NAIST)
pp. 43 - 48

SS2008-35
A Method to Track Name Changes of Identifiers
Toshihiro Kamiya (AIST)
pp. 49 - 54

SS2008-36
Proposal of a Method of Displaying Paths with 3D Graphics in Automatic Visualization Tool ``Avis''
Tomoki Tokunaga, Yoshihiro Kita, Tetsuro Katayama (Univ. of Miyazaki)
pp. 55 - 60

SS2008-37
Behavior Analysis of Scalable CAN Protocol on a Bit-Error Channel
Kenji Ukai, Toshiki Sakabe, Hiroaki Takada, Ryo Kurachi, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.)
pp. 61 - 66

SS2008-38
Intrusion Detection using Personal Characteristics in Network Access
Shunsuke Watanabe (Yamanashi Univ.)
pp. 67 - 72

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan