Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [Japanese] / [English]
SS2015-1
Towards Applications of FRP in Small-Scale Embedded Systems
Kensuke Sawada, Kouhei Suzuki, Takuo Watanabe (Tokyo Tech.)
pp. 1 - 5
SS2015-2
Towards the Supervisor Synthesis Using Hybrid Process Calculi
Yuto Kawakita, Shoji Yuen (Nagoya Univ.)
pp. 7 - 10
SS2015-3
An Implementation of Computing Optimal Mean-payoff Values for Non-terminating Scheduling by Double Priced Timed Automata
Sho Hiraoka, Shoji Yuen (Nagoya Univ.)
pp. 11 - 16
SS2015-4
[Invited Lecture]
Quantitative Information Flow and Differential Privacy
Hiroyuki Seki (Nagoya Univ.)
pp. 17 - 22
SS2015-5
Classification of Code Clones in Hardware Description Language
Kyohei Uemura, Kenji Fujiwara, Hajimu Iida (NAIST)
pp. 23 - 28
SS2015-6
An Approach for Software Repository Mining Using a Natural Langage Processing Method, Word2Vec
Takeru Uchiyama, Toshihiro Kamiya (FUN)
pp. 29 - 31
SS2015-7
Modeling and Performance Verification of Embedded Software in Multiprocessor Environment Using Extended Time Petri Nets
Takafumi Nakamura, Akio Nakata (Hiroshima City Univ.)
pp. 33 - 37
SS2015-8
[Invited Lecture]
Holism and Reductionism in Describing Software
Tsuneo Ajisaka (Wakayama Univ.)
p. 39
SS2015-9
Coding Pattern Detection for C Programs Using Pattern Mining Technique
Yuta Nakamura, Eunjong Choi (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Shusuke Haruna, Katsuro Inoue (Osaka Univ.)
pp. 41 - 46
SS2015-10
Investigation for Reducing Reuse Candidates on Reuse-based Automated Program Repair
Haruki Yokoyama, Takafumi Ohta, Keisuke Hotta, Yoshiki Higo (Osaka Univ.), Kozo Okano (Shinshu Univ.), Shinji Kusumoto (Osaka Univ.)
pp. 47 - 52
SS2015-11
Influence of the number of words in a bug report on accuracy in duplicate bug report detection
Akihiro Tsuruda, Yuki Manabe, Masayoshi Aritsugi (Kumamoto Univ.)
pp. 53 - 58
SS2015-12
Towards to Recover Propagation Process of the Patch for Linux Distribution
Yong Jin, Kenji Fujiwara, Hajimu Iida (NAIST)
pp. 59 - 62
SS2015-13
[Invited Lecture]
Software Engineering Embracing Uncertainty
Naoyasu Ubayashi (Kyushu Univ.)
p. 63
SS2015-14
Query-Based l-Diversity
Chittaphone Phonharath (NAIST), Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.)
pp. 65 - 70
SS2015-15
A Verification Method for k-Secrecy of XML Databases by Model Counting
Takatoshi Asai, Masanori Uesugi, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.)
pp. 71 - 76
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.