Mon, Jan 26 AM 10:30 - 13:30 |
|
10:30-10:35 |
( 5 min. ) |
(1) |
10:35-11:20 |
An Empirical Study on Requirements Elicitation from Feedback comments using LDA |
Hitoshi Takahashi, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya (Osaka Univ.) |
(2) |
11:20-12:05 |
A report of practical system assurance exercise |
Toshinori Takai (NAIST), Yutaka Matsuno (UEC) |
|
12:05-13:30 |
Lunch ( 85 min. ) |
Mon, Jan 26 PM 13:30 - 14:40 |
(3) |
13:30-14:30 |
[Invited Talk]
* |
Kouichi Akiyama (Fuji Xerox) |
|
14:30-14:40 |
Break ( 10 min. ) |
Mon, Jan 26 PM 14:40 - 16:20 |
(4) |
14:40-15:25 |
An Investigation of a Reverse Engineering Method for Verifying Source Code with a Use Case Model
-- A Case of an ASP.NET Application -- |
Shinpei Ogata (Shinshu Univ.), Yoshitaka Aoki (SIT), Satoshi Yazawa (VR), Saeko Matsuura (SIT) |
(5) |
15:25-16:10 |
The Method to Create Test Suits based on Operational Profiles for Combination Test of Status |
Hisashi Fukutake, Liang Da Xu, Tomohiko Takagi, Rihito Yaegashi (Kagawa Univ) |
|
16:10-16:20 |
Break ( 10 min. ) |
Mon, Jan 26 PM 16:20 - 17:50 |
(6) |
16:20-17:05 |
A proposal of D-Case based development process in a software development company |
Nobuhide Kobayashi, Hiroyuki Utsunomiya, Yoshikazu Yamamoto (DENSO CREATE), Shuichiro Yamamoto (Nagoya Univ.) |
(7) |
17:05-17:50 |
A Comparison of Systemigram and Domain Class Diagram |
Shuichiro Yamamoto (Nagoya Univ.) |
Tue, Jan 27 AM 10:30 - 13:00 |
(8) |
10:30-11:15 |
Access Control with Filtering Information and Operating Sensor Devices based on a Context-Aware Security Model |
Satoshi Kido, Taisei Watanabe, Tadashi Iijima (Keio Univ.) |
(9) |
11:15-12:00 |
Case base of secure web application development using software security knowledge base |
Atsuo Hazeyama, Masahito Saito (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Azusa Kumagaya (Tokyo Gakugei Univ.), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) |
|
12:00-13:00 |
Lunch ( 60 min. ) |
Tue, Jan 27 PM 13:00 - 14:40 |
(10) |
13:00-13:45 |
Development of an Android application for venous analysis based on the EM algorithm |
Masashi Iwase, Minoru Fukumi, Koji Kashihara (The Univ. of Tokushima) |
(11) |
13:45-14:30 |
A Set of Domain Specific Languages for Describing Models of Wide-Area Disaster Evacuation Simulation |
Junki Yamazaki, Tadashi Iijima (Keio Univ.) |
|
14:30-14:40 |
Break ( 10 min. ) |
Tue, Jan 27 PM 14:40 - 16:20 |
(12) |
14:40-15:25 |
Verification of Temporal Constraints for Business Processes and Rules |
Ryohei Hata, Tatsuya Ogata, Tadashi Iijima (Keio Univ.) |
(13) |
15:25-16:10 |
Domain-Oriented Visual Modeling and Vocabulary for Computer-Readable Contract Agreements and Laws |
Tadashi Iijima (Keio Univ.) |
|
16:10-16:20 |
( 10 min. ) |