Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2015-03-09 09:30 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Sufficient completeness of constructor-based order-sorted parameterized specifications Masaki Nakamura (Toyama Pref. Univ.), Daniel Mircea Gaina, Kazuhiro Ogata, Kokichi Futatsugi (JAIST) SS2014-55 |
CafeOBJ algebraic specification language supports description of specifications whose models are constructor-based order... [more] |
SS2014-55 pp.1-6 |
SS |
2015-03-09 09:55 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Reactive System Synthesis with Tolerance for Unexpected Environmental Behavior Atsushi Ueno, Takashi Tomita, Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki (Tokyo Tech) SS2014-56 |
On the synthesis of reactive system (RS), if we assume some behavior property on an environment, specifications must inc... [more] |
SS2014-56 pp.7-12 |
SS |
2015-03-09 10:20 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
SNIPER: An LLVM-based Automatic Fault Localization Tool for Imperative Programs Si-Mohamed Lamraoui, Shin Nakajima (NII) SS2014-57 |
[more] |
SS2014-57 pp.13-18 |
SS |
2015-03-09 11:00 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Abstraction-Aware Data Flow Traceability Zhongxiao Guo, Naoyasu Ubayashi, Di Ai, Peiyuan Li, Yuning Li, Takuya Fukamachi, Shintaro Hosoai, Yasutaka Kamei (kyushu univ.) SS2014-59 |
[more] |
SS2014-59 pp.25-30 |
SS |
2015-03-09 11:25 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Implementation and Evaluation of Fault Localization Technique based on Occurrence of Dynamic Data Dependencies Mizuki Nakano, Shunsuke Ohnuma, Takashi Kobayashi (Tokyo Tech.), Takashi Ishio (Osaka Univ.) SS2014-58 |
In the debugging process, we must find fault locations by investigating infection chains backwards; from failure points ... [more] |
SS2014-58 pp.19-24 |
SS |
2015-03-09 13:00 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Certifying Low Level Code for The Task-Control in Toppers/SSP Kernel Mitsuru Arakawa, Shoji Yuen (Nagoya Univ..) SS2014-60 |
We present a proof to certify the low-level code in Toppers/SSP kernel, which is an open source RTOS (Real Time Operatin... [more] |
SS2014-60 pp.31-36 |
SS |
2015-03-09 13:25 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Statistical Model Checking with Adaptive Importance Sampling Yu Nishiki, Shoji Yuen (Nagoya Univ) SS2014-61 |
We propose a method for statitical model checking of error as rare events with adaptive importance sampling, where the f... [more] |
SS2014-61 pp.37-42 |
SS |
2015-03-09 13:50 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Removing Possibility of Ambiguous Message Ordering in Sequence Diagram Noa Kusunoki, Kozo Okano, Shinji Kusumoto (Osaka Univ.) SS2014-62 |
This report proposes a method to detect and repair software faults in sequence diagrams which are used for software desi... [more] |
SS2014-62 pp.43-48 |
SS |
2015-03-09 14:15 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
A Verification Method of the Correctness of Non-functional Requirements using extended Requirements Frame Model Yuuma Matsumoto, Atsushi Ohnishi (Ritsumeikan Univ.) SS2014-63 |
In order to verify the correctness of functional requirements, we have been developing a verification method of the corr... [more] |
SS2014-63 pp.49-54 |
SS |
2015-03-09 14:55 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Coli: A Social Network Mining Tool for Analyzing the Society of OSS Projects Sekio Kawashima, Yasutaka Kamei, Naoyasu Ubayashi (Kyushu Univ.) SS2014-64 |
In open source software(OSS) development, participants discuss new functions and bug fixing via a mailing list.
We deve... [more] |
SS2014-64 pp.55-60 |
SS |
2015-03-09 15:20 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Suggestion of the source code reuse analysis technique in multiple projects based on the clone genealogy Takuya Moriwaki, Keisuke Hotta, Hiroshi Igaki, Katsuro Inoue, Shinji Kusumoto (Osaka Univ.) SS2014-65 |
In the software industry and OSS projects, it is said that source code reuse could improve productivity and reliability ... [more] |
SS2014-65 pp.61-66 |
SS |
2015-03-09 15:45 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Recommending Source Code Modifications by Using Association Rule Mining Hiroyuki Kirinuki, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) SS2014-66 |
[more] |
SS2014-66 pp.67-72 |
SS |
2015-03-09 16:10 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Effects of the recency and large commits on change guide method based on version history analysis Tatsuya Mori, Anders Mikael Hagward, Takashi Kobayashi (Tokyo Tech.) SS2014-67 |
Many studies on change guide, that support to find necessary code changes with using co-change rules extracted from the ... [more] |
SS2014-67 pp.73-78 |
SS |
2015-03-09 16:35 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
An Approach for Abbreviated Identifier Expansion with Machine Learning Hideki Okajima, Osamu Mizuno (Kyoto Inst. Tech.) SS2014-68 |
The readability of source code is a crucial factor on software development and maintenance. Identifier is a essential cl... [more] |
SS2014-68 pp.79-84 |
SS |
2015-03-10 09:30 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
A Heuristic to Solve Inverse Unfolding Problem for Functions Dealing with Tree Structure Data Tomofumi Kato, Masanori Nagashima, Masahiko Sakai, Naoki Nishida, Toshiki Sakabe (Nagoya Univ.) SS2014-69 |
Unfold/Fold transformations have been widely used for program transformation, theorem proving, and so on.
Unfold and Fo... [more] |
SS2014-69 pp.85-90 |
SS |
2015-03-10 09:55 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Heuristics for Automatically Proving Commutativity of Function Composition for Constrained Term Rewriting Systems Ryutaro Kuriki, Naoki Nishida, Masahiko Sakai, Toshiki Sakabe (Nagoya Univ.) SS2014-70 |
In proving equations to be inductive theorems of constrained term rewriting systems, we often need appropriate lemmas of... [more] |
SS2014-70 pp.91-96 |
SS |
2015-03-10 10:35 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Integrating Online Presentation and Courseware Production to Support Higher Education on the WebELS Platform Mohamed Osamnia (SOKENDAI), Arjulie John Berena, Hitoshi Okada, Haruki Ueno (NII) SS2014-71 |
In higher education, the teaching methodologies are changing from the classroom-based methodology to the so-called Virtu... [more] |
SS2014-71 pp.97-102 |
SS |
2015-03-10 11:00 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Cause Analysis of transition in the Accessibility Excessiveness of using a Development History of Java Programs Riku Ohnisi (Osaka Univ.), Kazuo Kobori (NTT DATA), Makoto Matsushita, Katsuro Inoue (Osaka Univ.) SS2014-72 |
In Java, access modiers are used to ensure encapsulation for maintainability or reusability of programs.However, there ... [more] |
SS2014-72 pp.103-108 |
SS |
2015-03-10 11:25 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
A Code Review Method with Def-use Graph of Single Variable Daisuke Kato, Yoshinari Hachisu, Atsushi Yoshida, Kiyoshi Agusa (Nanzan Univ.) SS2014-73 |
On code review, reviewers point out codes that should be modified from software qualities.
In some cases, they review a... [more] |
SS2014-73 pp.109-114 |