Thu, Oct 16 PM 13:20 - 18:20 |
(1) |
13:20-13:50 |
Problems concerning requirements allocation based on events of interests |
Noboru Hattori (NTT DATA/Wakayama Univ.), Shuichiro Yamamoto (NTT DATA), Tsuneo Ajisaka (Wakayama Univ.) |
(2) |
13:50-14:20 |
RAS Based Representation of core Assets for Software Product Line |
Yusuke Hattori (Fukuoka IST), Go Hirakawa, Shuichi Ashihara (NAL), Tsuneo Nakanishi (Kyushu Univ.), Teruaki Kitasuka (Kumamoto Univ.), Shigeaki Tagashira, Akira Fukuda (Kyushu Univ.) |
(3) |
14:20-14:50 |
Supporting Choice Among Architectural Design Alternatives Using Graph Transformation |
Hiroshi Kazato, Motoshi Saeki (Tokyo Tech) |
|
14:50-15:00 |
Break ( 10 min. ) |
(4) |
15:00-15:30 |
Thread Synchronization Using AspectJ |
Tomoyuki Uchikoshi, Yasuhiro Sugiyama (Nihon Univ) |
(5) |
15:30-16:00 |
Recommendation Method Using Client Side Log and Fuzzy Clustering in the Web Search
-- A Case of Web Search for Universities of Interest -- |
Yoshifusa Nakano, Takuo Matsunobe, Tsuneo Ajisaka (Wakayama Univ.) |
|
16:00-16:10 |
Break ( 10 min. ) |
(6) |
16:10-16:40 |
Improvement of iterative methods on GPU by partially using pseudo double precision calculation |
Fumiaki Fujiki, Hidetoshi Ando, Koji Toriyama (Univ. of Yamanashi) |
(7) |
16:40-17:10 |
Distributed visualization of 2D flow field by using particle advection on GPU cluster environment |
Tomoya Sakashita, Hidetoshi Ando, Koji Toriyama (Univ. of Yamanashi) |
|
17:10-17:20 |
Break ( 10 min. ) |
(8) |
17:20-18:20 |
[Invited Talk]
A Scenario Representation based on the Definition of Usability
Kentaro Go (Univ. of Yamanashi) |
Fri, Oct 17 AM 09:20 - 12:00 |
(9) |
09:20-09:50 |
An analysis of relationship between code clone length and software reliability |
Hiroki Sato, Yasutaka Kamei, Hidetake Uwano, Akito Monden, Shinji Kawaguchi, Masataka Nagura, Ken-ichi Matsumoto, Hajimu Iida (NAIST) |
(10) |
09:50-10:20 |
A Method to Track Name Changes of Identifiers |
Toshihiro Kamiya (AIST) |
(11) |
10:20-10:50 |
Proposal of a Method of Displaying Paths with 3D Graphics in Automatic Visualization Tool ``Avis'' |
Tomoki Tokunaga, Yoshihiro Kita, Tetsuro Katayama (Univ. of Miyazaki) |
|
10:50-11:00 |
Break ( 10 min. ) |
(12) |
11:00-11:30 |
Behavior Analysis of Scalable CAN Protocol on a Bit-Error Channel |
Kenji Ukai, Toshiki Sakabe, Hiroaki Takada, Ryo Kurachi, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.) |
(13) |
11:30-12:00 |
Intrusion Detection using Personal Characteristics in Network Access |
Shunsuke Watanabe (Yamanashi Univ.) |