Mon, Mar 9 AM 09:30 - 10:45 |
(1) |
09:30-09:55 |
Sufficient completeness of constructor-based order-sorted parameterized specifications |
Masaki Nakamura (Toyama Pref. Univ.), Daniel Mircea Gaina, Kazuhiro Ogata, Kokichi Futatsugi (JAIST) |
(2) |
09:55-10:20 |
Reactive System Synthesis with Tolerance for Unexpected Environmental Behavior |
Atsushi Ueno, Takashi Tomita, Masaya Shimakawa, Shigeki Hagihara, Naoki Yonezaki (Tokyo Tech) |
(3) |
10:20-10:45 |
SNIPER: An LLVM-based Automatic Fault Localization Tool for Imperative Programs |
Si-Mohamed Lamraoui, Shin Nakajima (NII) |
|
10:45-11:00 |
Break ( 15 min. ) |
Mon, Mar 9 AM 11:00 - 11:50 |
(4) |
11:00-11:25 |
Abstraction-Aware Data Flow Traceability |
Zhongxiao Guo, Naoyasu Ubayashi, Di Ai, Peiyuan Li, Yuning Li, Takuya Fukamachi, Shintaro Hosoai, Yasutaka Kamei (kyushu univ.) |
(5) |
11:25-11:50 |
Implementation and Evaluation of Fault Localization Technique based on Occurrence of Dynamic Data Dependencies |
Mizuki Nakano, Shunsuke Ohnuma, Takashi Kobayashi (Tokyo Tech.), Takashi Ishio (Osaka Univ.) |
|
11:50-13:00 |
Break ( 70 min. ) |
Mon, Mar 9 PM 13:00 - 14:40 |
(6) |
13:00-13:25 |
Certifying Low Level Code for The Task-Control in Toppers/SSP Kernel |
Mitsuru Arakawa, Shoji Yuen (Nagoya Univ..) |
(7) |
13:25-13:50 |
Statistical Model Checking with Adaptive Importance Sampling |
Yu Nishiki, Shoji Yuen (Nagoya Univ) |
(8) |
13:50-14:15 |
Removing Possibility of Ambiguous Message Ordering in Sequence Diagram |
Noa Kusunoki, Kozo Okano, Shinji Kusumoto (Osaka Univ.) |
(9) |
14:15-14:40 |
A Verification Method of the Correctness of Non-functional Requirements using extended Requirements Frame Model |
Yuuma Matsumoto, Atsushi Ohnishi (Ritsumeikan Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
Mon, Mar 9 PM 14:55 - 17:00 |
(10) |
14:55-15:20 |
Coli: A Social Network Mining Tool for Analyzing the Society of OSS Projects |
Sekio Kawashima, Yasutaka Kamei, Naoyasu Ubayashi (Kyushu Univ.) |
(11) |
15:20-15:45 |
Suggestion of the source code reuse analysis technique in multiple projects based on the clone genealogy |
Takuya Moriwaki, Keisuke Hotta, Hiroshi Igaki, Katsuro Inoue, Shinji Kusumoto (Osaka Univ.) |
(12) |
15:45-16:10 |
Recommending Source Code Modifications by Using Association Rule Mining |
Hiroyuki Kirinuki, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) |
(13) |
16:10-16:35 |
Effects of the recency and large commits on change guide method based on version history analysis |
Tatsuya Mori, Anders Mikael Hagward, Takashi Kobayashi (Tokyo Tech.) |
(14) |
16:35-17:00 |
An Approach for Abbreviated Identifier Expansion with Machine Learning |
Hideki Okajima, Osamu Mizuno (Kyoto Inst. Tech.) |
Tue, Mar 10 AM 09:30 - 10:20 |
(15) |
09:30-09:55 |
A Heuristic to Solve Inverse Unfolding Problem for Functions Dealing with Tree Structure Data |
Tomofumi Kato, Masanori Nagashima, Masahiko Sakai, Naoki Nishida, Toshiki Sakabe (Nagoya Univ.) |
(16) |
09:55-10:20 |
Heuristics for Automatically Proving Commutativity of Function Composition for Constrained Term Rewriting Systems |
Ryutaro Kuriki, Naoki Nishida, Masahiko Sakai, Toshiki Sakabe (Nagoya Univ.) |
|
10:20-10:35 |
Break ( 15 min. ) |
Tue, Mar 10 AM 10:35 - 11:50 |
(17) |
10:35-11:00 |
Integrating Online Presentation and Courseware Production to Support Higher Education on the WebELS Platform |
Mohamed Osamnia (SOKENDAI), Arjulie John Berena, Hitoshi Okada, Haruki Ueno (NII) |
(18) |
11:00-11:25 |
Cause Analysis of transition in the Accessibility Excessiveness of using a Development History of Java Programs |
Riku Ohnisi (Osaka Univ.), Kazuo Kobori (NTT DATA), Makoto Matsushita, Katsuro Inoue (Osaka Univ.) |
(19) |
11:25-11:50 |
A Code Review Method with Def-use Graph of Single Variable |
Daisuke Kato, Yoshinari Hachisu, Atsushi Yoshida, Kiyoshi Agusa (Nanzan Univ.) |