Mon, Mar 8 Room A 09:00 - 17:30 |
(1) |
09:00-09:30 |
A System to Guide Interview-driven Requirements Elicitation Work |
Hajime Noguchi, Shimon Yato (Shibaura Inst. of Techn.), Takatosi Yamanaka (Shibaura Inst. of Techn./Fujitsu Ltd,), Seiichi Komiya (Shibaura Inst. of Techn.) |
(2) |
09:30-10:00 |
A support for Software Development Processes Improvement using the Requirement-Trace-Network and a Project Scheduling Method |
Akinori Saito, Koichiro Ochimizu (JAIST) |
(3) |
10:00-10:30 |
Support Environment for Reality-based Software Development Practice based on Process Monitoring and Comparison among Groups |
Takeshi Kakimoto (Osaka Univ.), Hiroshi Igaki (Kobe Univ), Shinji Kawaguchi (NAIST), Naoki Fukuyasu (Wakayama Univ.), Sachio Saiki (Kochi Univ. of Tech.), Yasuhiro Hayase (Osaka Univ.), Naohiro Sakiyama (NTT Data) |
|
10:30-10:40 |
Break ( 10 min. ) |
(4) |
10:40-11:10 |
A Proposal of Service Registry for Discovering Service Resources in Ubiquitous Network |
Hideharu Seto, Kouichi Egami, Shuhei Matsuo, Hiroshi Igaki, Masahide Nakamura (Kobe Univ) |
(5) |
11:10-11:40 |
Developing Home Network Services with Feature Interaction Detection and Resolution System |
Takuya Inada, Yuhei Yoshimura, Kousuke Ikegami, Hiroshi Igaki, Masahide Nakamura (Kobe Univ), Kenji Nakakita, Kiyotaka Takehara (Panasonic Electric Works Co., Ltd.) |
(6) |
11:40-12:10 |
A Supporting Tool for Framework-Based Software Development with Behavioral Models |
Teruyoshi Zenmyo, Shinpei Hayashi, Motoshi Saeki (Tokyo Inst. of Tech.) |
|
12:10-13:10 |
Lunch Break ( 60 min. ) |
(7) |
13:10-13:40 |
Automatic UML Diagram Recommendation Using Editing Context |
Makoto Matsushita, Yasuhiro Hayase, Makoto Matsushita, Katsuro Inoue (Osaka Univ.) |
(8) |
13:40-14:10 |
Comparison of Fixing Frequency between Duplicate Code and Non-Duplicate Code |
Yukiko Sano, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |
(9) |
14:10-14:40 |
Identifying frequent functionalities from large-scale source code |
Kensuke Tanaka, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
(10) |
14:50-15:20 |
On the Analysis of Method Call Changes Related to Bug Fixes |
Ryosuke Morii, Hideaki Hata (Osaka Univ.), Osamu Mizuno (Kyoto Inst. of Tech.), Tohru Kikuno (Osaka Univ.) |
(11) |
15:20-15:50 |
Structuring Source Code Deltas by Classifying Editing Operations |
Shinpei Hayashi, Motoshi Saeki (Tokyo Inst. of Tech.) |
(12) |
15:50-16:20 |
An Analysis of Relation Between Inconsistent Changes of Code Clone and Bug Occurrence |
Koji Nishida, Kyohei Fushida, Shinji Kawaguchi, Hajimu Iida (NAIST) |
|
16:20-16:30 |
Break ( 10 min. ) |
(13) |
16:30-17:00 |
Similarity Analysis of programming codes by Code Clone technique |
Akira Sakamoto, Yasunari Kishimoto, Hiroyuki Sato, Toru Kobayashi (NTT) |
(14) |
17:00-17:30 |
Empirical Analysis of Software Similarity Using Text Mining Technology |
Yasunari Kishimoto, Akira Sakamoto, Hiroyuki Sato, Toru Kobayashi (NTT) |
Mon, Mar 8 Room B 09:00 - 17:30 |
(15) |
09:00-09:30 |
Reachability Analysis for Probabilistic Timed System based on Timed Abstraction Refinement Technique |
Akihiko Ito, Takeshi Nagaoka, Kozo Okano, Shinji Kusumoto (Osaka Univ.) |
(16) |
09:30-10:00 |
Probabilistic Model Checking for AIS with Symmetry Reduction |
Takashi Toyoshima, Kazuko Takahashi (Kwansei Gakuin Univ.), Toshifusa Sekizawa (Osaka Gakuin Univ./AIST CVS) |
(17) |
10:00-10:30 |
A framework for the verification of behavior in E-AoSAS++ |
Han-Myung Chang, Atsushi Sawada, Masami Noro (Nanzan Univ.) |
|
10:30-10:40 |
Break ( 10 min. ) |
(18) |
10:40-11:10 |
verification of non-interference between files by typing |
Koichi Zarei, Toshiyuki Yamada (Mie Univ.) |
(19) |
11:10-11:40 |
Research of Immune Algorithm for Multi-Objective Optimization Problems |
Ryota Morishige, Satoshi Ono, Shigeru Nakayama (Kagoshima Univ) |
(20) |
11:40-12:10 |
On a Combination Method of Decision Procedures for Theories Sharing Common Symbols |
Koji Iwanuma (Univ. of Yamanashi) |
|
12:10-13:10 |
lunch Break ( 60 min. ) |
(21) |
13:10-13:40 |
Introducing N-Version Programming in the Product Line of the Safety Critical System |
Tsuneo Nakanishi, Kenji Hisazumi, Akira Fukuda (Kyushu Univ.) |
(22) |
13:40-14:10 |
Communication Centered Dependable GUI Programming based on Choreography |
Sho Shimomura, Shoji Yuen (Nagoya Univ.) |
(23) |
14:10-14:40 |
A Type-Based Analysis for Checking Race and Deadlock based on Access Capabilities |
Yoshitaka Banno, Shoji Yuen (Nagoya Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
(24) |
14:50-15:20 |
A Study on conditions of Applying of AIC to Software Reliability Growth Models |
Yasutaka Kamei, Tsuneo Furuyama (Tokai Univ.) |
(25) |
15:20-15:50 |
Empirical Evaluation of Bug Density Prediction Model to Low Granularity Modules |
Yasutaka Kamei, Shinsuke Matsumoto, Akito Monden, Ken-ichi Matsumoto (NAIST) |
(26) |
15:50-16:20 |
A Testing Method for Object-Oriented Software Using Execution Logs |
Junro Mori, Yoshikazu Ueda (Ibaraki Univ.) |
|
16:20-16:30 |
Break ( 10 min. ) |
(27) |
16:30-17:00 |
Light-weight XQuery Processor using Lazy Parsing |
Yoshinari Hachisu, Masami Noro, Atsushi Sawada, Han-Myung Chang (Nanzan Univ.) |
(28) |
17:00-17:30 |
Scalable Web Application Framework based on Delimited Continuation |
Asami Tanaka, Yukiyoshi Kameyama (Tsukuba Univ) |