IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 115, Number 20

Software Science

Workshop Date : 2015-05-11 - 2015-05-12 / Issue Date : 2015-05-04

[PREV] [NEXT]

[TOP] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SS2015-1
Towards Applications of FRP in Small-Scale Embedded Systems
Kensuke Sawada, Kouhei Suzuki, Takuo Watanabe (Tokyo Tech.)
pp. 1 - 5

SS2015-2
Towards the Supervisor Synthesis Using Hybrid Process Calculi
Yuto Kawakita, Shoji Yuen (Nagoya Univ.)
pp. 7 - 10

SS2015-3
An Implementation of Computing Optimal Mean-payoff Values for Non-terminating Scheduling by Double Priced Timed Automata
Sho Hiraoka, Shoji Yuen (Nagoya Univ.)
pp. 11 - 16

SS2015-4
[Invited Lecture] Quantitative Information Flow and Differential Privacy
Hiroyuki Seki (Nagoya Univ.)
pp. 17 - 22

SS2015-5
Classification of Code Clones in Hardware Description Language
Kyohei Uemura, Kenji Fujiwara, Hajimu Iida (NAIST)
pp. 23 - 28

SS2015-6
An Approach for Software Repository Mining Using a Natural Langage Processing Method, Word2Vec
Takeru Uchiyama, Toshihiro Kamiya (FUN)
pp. 29 - 31

SS2015-7
Modeling and Performance Verification of Embedded Software in Multiprocessor Environment Using Extended Time Petri Nets
Takafumi Nakamura, Akio Nakata (Hiroshima City Univ.)
pp. 33 - 37

SS2015-8
[Invited Lecture] Holism and Reductionism in Describing Software
Tsuneo Ajisaka (Wakayama Univ.)
p. 39

SS2015-9
Coding Pattern Detection for C Programs Using Pattern Mining Technique
Yuta Nakamura, Eunjong Choi (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Shusuke Haruna, Katsuro Inoue (Osaka Univ.)
pp. 41 - 46

SS2015-10
Investigation for Reducing Reuse Candidates on Reuse-based Automated Program Repair
Haruki Yokoyama, Takafumi Ohta, Keisuke Hotta, Yoshiki Higo (Osaka Univ.), Kozo Okano (Shinshu Univ.), Shinji Kusumoto (Osaka Univ.)
pp. 47 - 52

SS2015-11
Influence of the number of words in a bug report on accuracy in duplicate bug report detection
Akihiro Tsuruda, Yuki Manabe, Masayoshi Aritsugi (Kumamoto Univ.)
pp. 53 - 58

SS2015-12
Towards to Recover Propagation Process of the Patch for Linux Distribution
Yong Jin, Kenji Fujiwara, Hajimu Iida (NAIST)
pp. 59 - 62

SS2015-13
[Invited Lecture] Software Engineering Embracing Uncertainty
Naoyasu Ubayashi (Kyushu Univ.)
p. 63

SS2015-14
Query-Based l-Diversity
Chittaphone Phonharath (NAIST), Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.)
pp. 65 - 70

SS2015-15
A Verification Method for k-Secrecy of XML Databases by Model Counting
Takatoshi Asai, Masanori Uesugi, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.)
pp. 71 - 76

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan