IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 110, Number 336

Software Science

Workshop Date : 2010-12-14 - 2010-12-15 / Issue Date : 2010-12-07

[PREV] [NEXT]

[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SS2010-39
A Project Scheduling Method based on Conceptual Framework using Load-Capacity for Project Design
Akinori Saito (JAIST), Takumi Kusanagi (TOSHIBA/JAIST), Koichiro Ochimizu (JAIST)
pp. 1 - 6

SS2010-40
Development and Evaluation of Effort Estimation Tool to Compare Results from Multiple Estimation Methods
Katsuma Ubukata (Osaka Univ.), Takeshi Kakimoto (Kagawa NCT), Shinji Kusumoto (Osaka Univ.)
pp. 7 - 12

SS2010-41
An Empirical Study on Relationship between Change History of Method Comments and Method Bugs
Hideaki Hata (Osaka Univ.), Osamu Mizuno (Kyoto Institute of Tech.), Tohru Kikuno (Osaka Univ.)
pp. 13 - 18

SS2010-42
An Abstract Data Type Database Management System -- as the Kernel of an Operating System --
Kazutoshi Shima, Kunihiko Nishi, Jun Okui (Kinki Univ.), Hiroyuki Seki (NAIST)
pp. 19 - 24

SS2010-43
An Abstract Data Type Description Language
Kunihiko Nishi, Kazutoshi Shima, Jun Okui (Kinki Univ.), Hiroyuki Seki (NAIST)
pp. 25 - 30

SS2010-44
On non-termination proof of right-linear and right-shallow term rewriting systems based on forward narrowing
Tatsuya Hattori, Masahiko Sakai, Naoki Nishida, Keiichirou Kusakari, Toshiki Sakabe (Nagoya Univ.)
pp. 31 - 36

SS2010-45
An Injection Vulnerability Analysis of Web Applications using String-Taint Analysis
Tatsunori Houan, Kazuya Onai, Seikoh Nishita (Takushoku Univ.)
pp. 37 - 42

SS2010-46
Secure User-Role Assignment in Cross-Organizational Role-Based Access Control
Yuki Tomotani, Yuichi Kaji, Hiroyuki Seki (NAIST)
pp. 43 - 48

SS2010-47
The Validity Problem of Positive XPath Queries in the Presence of DTDs
Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.)
pp. 49 - 54

SS2010-48
Seamless reuse support using source code corpus
Tetsuo Yamamoto (Ritsumeikan Univ.), Norihiro Yoshida (NAIST), Yoshiki Higo (Osaka Univ.)
pp. 55 - 60

SS2010-49
Identifying and Visualization Refactoring Candidates for Extract Method using Program Dependence Graph
Tomoko Kanemitsu, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.)
pp. 61 - 66

SS2010-50
Towards Detecting Code Clones that are Scattered on Multiple Methods
Yoshiki Higo, Shinji Kusumoto (Osaka Univ.)
pp. 67 - 72

SS2010-51
Toward measuring modifications of class diagram based on version change information
Shinya Yamada, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.)
pp. 73 - 78

SS2010-52
Finding Code Portions According to Functionality using Cohesion
Masataka Kinoshita, Norihiro Yoshida, Hajimu Iida (NAIST)
pp. 79 - 84

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan