Thu, Aug 3 PM 13:00 - 18:00 |
(1) |
13:00-13:30 |
Software Design Method using Extended Finite-state Automata with Constraints |
Shin Nakajima (NII) |
(2) |
13:30-14:00 |
Semantics of identifying objects in computers by using attributes, and its syntax translation |
Fumiko Kouda, Takashi Chikayama (Univ. of Tokyo) |
(3) |
14:00-14:30 |
Static call-graph generator for C++ using debugging information
-- Detecting virtual function calls by light-weight binary-level type analysis -- |
Yui Terashima, Katsuhiko Gondow (Titech) |
|
14:30-14:45 |
Break ( 15 min. ) |
(4) |
14:45-15:15 |
Design and Implementation of a Web Board Game Using Double-Phase XSLT Structure |
Takayo Nagase, Naruki Mitsuda, Naoki Fukuyasu, Takuo Matsunobe, Atsushi Yoshida, Tsuneo Ajisaka (Wakayama Univ.) |
(5) |
15:15-15:45 |
A Resource Discovery Method Based on Multi-Agents in P2P Systems |
Yoshikuni Harada, Yasushi Kambayashi (N.I.T.) |
(6) |
15:45-16:15 |
Automatic Updating System of Java Software Component Repository using Desktop Search System |
Makoto Ichii, Kazumasa Kimura, Makoto Matsushita, Katsuro Inoue (Osaka Univ.) |
|
16:15-16:30 |
Break ( 15 min. ) |
(7) |
16:30-17:00 |
Report on Effectiveness of Refactoring for Code Clone |
Yoshiki Higo, Shinji Kusumoto, Katsuro Inoue (Osaka Univ.) |
(8) |
17:00-17:30 |
Effects of Thesarus in Requirements Elicitation |
Junzo Kato (consultant), Motoshi Saeki (Titech), Atsushi Ohnishi (Rits U), Haruhiko Kaiya (Shinshu u), Shuichiro Yamamoto (NTT Data) |
(9) |
17:30-18:00 |
On the Definition of Software Accountability |
Koichiro Ochimizu (JAIST) |
Fri, Aug 4 AM 08:45 - 12:00 |
(10) |
08:45-09:15 |
Multi-Completion with new encoding for Partial Order Constraints |
Haruhiko Sato, Masahito Kurihara (Hokkaido Univ.) |
(11) |
09:15-09:45 |
The Research about Creating Auto Edition Template with the Formal Languages Method |
Kenichi Zai (Rococo) |
(12) |
09:45-10:15 |
Hierarchical Model Checking to Ensure Timeliness QoS Described in UML/OCL |
Eigo Nagai, Kozo Okano, Shinji Kusumoto (Osaka Univ.) |
|
10:15-10:30 |
Break ( 15 min. ) |
(13) |
10:30-11:00 |
Extension of Interaction Model by Mapping Method |
Takuto Yanagida, Hidetoshi Nonaka, Masahito Kurihara (Hokkaido Univ.) |
(14) |
11:00-11:30 |
An Efficient Model Checking Method for Programs with History-based Access Control |
Jing Wang, Yoshiaki Takata, Hiroyuki Seki (NAIST) |
(15) |
11:30-12:00 |
Hierarchical Model-checking for Web Application with SPIN |
Yuu Hamaguchi, Akira Yoshimura, Kozo Okano, Shinji Kusumoto (Osaka Univ.) |