Mon, Mar 3 10:10 - 17:20 |
(1) |
10:10-10:35 |
A Parametric Execution Time Analysis Method for Reuse of Real-time Software |
Toshihiro Kawai, Akio Nakata (Hiroshima City Univ.) |
(2) |
10:35-11:00 |
A Method for Feature-Oriented Unit Test for Software Product Lines |
Masataka Fukuda, Tsuneo Nakanishi (Kyushu Univ.), Teruaki Kitasuka (Kumamoto Univ.), Shigeaki Tagashira, Akira Fukuda (Kyushu Univ.) |
(3) |
11:00-11:25 |
Error Detection with Soft Typing for Dynamically Typed Languages |
Akihisa Yamada, Keiichirou Kusakari, Masahiko Sakai, Toshiki Sakabe, Naoki Nishida (Nagoya Univ.) |
(4) |
11:25-11:50 |
Formal verification of multiple UML diagrams using bounded model checking |
Hisashi Miyazaki, Tomoyuki Yokogawa, Sadahito Sato, Yoichiro Sato, Michiyoshi Hayase (Okayama Prefectural Univ.) |
|
11:50-13:05 |
Lunch Break ( 75 min. ) |
(5) |
13:05-13:30 |
Static Dependency Pair Method for Simply-Typed Term Rewriting and Related Techniques |
Keiichirou Kusakari, Masahiko Sakai (Nagoya Univ.) |
(6) |
13:30-13:55 |
A Sufficient Condition for Termination of Transformations from Equations to Rewrite Rules |
Kiyotaka Mizuno, Naoki Nishida, Toshiki Sakabe, Masahiko Sakai, Keiichirou Kusakari (Nagoya Univ.) |
(7) |
13:55-14:20 |
On Information Flow Analysis for Recursive Programs Based on Self-Composition |
Nobuhiro Itoh, Hiroyuki Seki (NAIST) |
|
14:20-14:35 |
Break ( 15 min. ) |
(8) |
14:35-15:00 |
Token Comparison Approach to Detect Code Clone-related Bugs |
Yii Yong Lee, Yasuhiro Hayase, Makoto Matsushita, Katsuro Inoue (Osaka Univ.) |
(9) |
15:00-15:25 |
Quality prediction model for object oriented software using UML metrics |
Camargo Cruz Ana Erika, Koichiro Ochimizu (JAIST) |
(10) |
15:25-15:50 |
Specification Description and High-level Design Methodology of SoC Considering Design Reuse |
Yeonbok Lee, Yuji Ishikawa, Yoshihisa Kojima, Hiroaki Yoshida (Tokyo Univ.), Hisashi Yomiya (TOSHIBA Corp.), Satoshi Komatsu, Masahiro Fujita (Tokyo Univ.) |
|
15:50-16:05 |
Break ( 15 min. ) |
(11) |
16:05-16:30 |
A Web Application Bi-Execution Model for a Framework Preventing Amazon-Bug |
Ryota Mizuno, Keigo Imai, Ryo Suetsugu, Nobuyuki Kaneko (Nagoya Univ.), Shinichiro Yamamoto (Aichi Prefectural Univ.), Kiyoshi Agusa (Nagoya Univ.) |
(12) |
16:30-16:55 |
A Method for GUI Model Transformation in MDA |
Hiroshi Mukaeda, Hajime Iwata (Wasedan Univ.), Junko Shirogane (TWCU), Yoshiaki Fukazawa (Wasedan Univ.) |
(13) |
16:55-17:20 |
Implementation and Evaluation for Requirements Elicitation Tool based on comparison among existing similar systems |
Naoyuki Kitazawa, Akira Osada, Kazuyuki Kamijyo, Haruhiko Kaiya, Kenji Kaijiri (SU) |
Tue, Mar 4 09:30 - 12:15 |
(14) |
09:30-09:55 |
A task granularity control for reduction of response time at task assignment |
Hidehiro Kanemitsu, Hidenori Nakazato, Takashige Hoshiai, Yoshiyori Urano (Waseda Univ.) |
(15) |
09:55-10:20 |
A Proposal of The Secure Software Engineering |
Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) |
(16) |
10:20-10:45 |
Software Characteristic Analysis Based on History of Software Metrics |
Kenji Murao, Yoshiki Higo, Katsuro Inoue (Osaka Univ.) |
|
10:45-11:00 |
Break ( 15 min. ) |
(17) |
11:00-11:25 |
Requirements Quality Management based on the Requirements Structure |
Noboru Hattori, Shuichiro Yamamoto (NTT DATA Corporation) |
(18) |
11:25-11:50 |
Abstraction of Timed Automata Based on Counterexample-Guided Abstraction Refinement Loop |
Takeshi Nagaoka, Kozo Okano, Shinji Kusumoto (Osaka Univ.) |
(19) |
11:50-12:15 |
An Approach to analyze use-relation between software components with duplicated names |
Makoto Ichii (Osaka Univ.), Reishi Yokomori (Nanzan Univ.), Katsuro Inoue (Osaka Univ.) |