Tue, Oct 13 PM 13:20 - 14:20 |
(1) |
13:20-13:50 |
Design and Development of the Method Generating Business Process Diagrams |
Tadashi Tanaka, Hideaki Ito, Yuichiro Nakagawa, Ryota Mibe (Hitachi) |
(2) |
13:50-14:20 |
A Description of Recursive Hybrid Automata by HCCS |
Yuto Kawakita, Yuen Shoji (Nagoya Univ.) |
|
14:20-14:30 |
Break ( 10 min. ) |
Tue, Oct 13 PM 14:30 - 17:10 |
(3) |
14:30-15:00 |
Improving the greedy approach to constructing combinatorial test suites |
Teru Ohashi, Tatsuhiro Tsuchiya (Osaka Univ.) |
(4) |
15:00-15:30 |
The Dual System Consisting of Two Modules Which Depend on Each Other in State Recovery Phase |
Aromhack Saysanasongkham, Satoshi Fukumoto (Tokyo Metropolitan Univ.) |
(5) |
15:30-16:00 |
Detection of Wormhole Attack on Wireless Sensor Network in Low Power Operation |
Takashi Minohara, Kyosuke Nishiyama (Takushoku Univ.) |
|
- |
|
|
- |
|
Wed, Oct 14 AM 09:30 - 10:30 |
(6) |
09:30-10:00 |
An investigation into the behavior of the novice programmers based on build histories in Software Development Practice |
Naoki Kawashima, Kenji Fujiwara (NAIST), Hiroshi Igaki (OIT), Norihiro Yoshida (NU), Hajimu Iida (NAIST) |
(7) |
10:00-10:30 |
Proposal of the Method Generating Business Data Derivation Logic |
Keishi Oshima, Yui Watanabe, Shuhei Nojiri, Motoyasu Takabatake, Ryota Mibe, Hiroyasu Nishiyama (Hitachi) |
|
10:30-10:40 |
Break ( 10 min. ) |
Wed, Oct 14 AM 10:40 - 11:40 |
(8) |
10:40-11:10 |
Towards Comprehension of Refactoring Tasks with Arbitrary-Granularity-Model Code Clone Detection |
Toshihiro Kamiya (Fun) |
(9) |
11:10-11:40 |
Memoization Refactoring based on Purity Analysis |
Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |