Mon, May 11 AM 12:45 - 13:00 |
(1) |
12:45-13:00 |
|
Mon, May 11 PM 13:00 - 14:10 |
(2) |
13:00-13:30 |
Towards Applications of FRP in Small-Scale Embedded Systems |
Kensuke Sawada, Kouhei Suzuki, Takuo Watanabe (Tokyo Tech.) |
(3) |
13:30-13:50 |
Towards the Supervisor Synthesis Using Hybrid Process Calculi |
Yuto Kawakita, Shoji Yuen (Nagoya Univ.) |
(4) |
13:50-14:10 |
An Implementation of Computing Optimal Mean-payoff Values for Non-terminating Scheduling by Double Priced Timed Automata |
Sho Hiraoka, Shoji Yuen (Nagoya Univ.) |
|
14:10-14:25 |
Break ( 15 min. ) |
Mon, May 11 PM 14:25 - 15:25 |
(5) |
14:25-15:25 |
[Invited Lecture]
Quantitative Information Flow and Differential Privacy |
Hiroyuki Seki (Nagoya Univ.) |
|
15:25-15:40 |
Break ( 15 min. ) |
Mon, May 11 PM 15:40 - 16:50 |
(6) |
15:40-16:10 |
Classification of Code Clones in Hardware Description Language |
Kyohei Uemura, Kenji Fujiwara, Hajimu Iida (NAIST) |
(7) |
16:10-16:30 |
An Approach for Software Repository Mining Using a Natural Langage Processing Method, Word2Vec |
Takeru Uchiyama, Toshihiro Kamiya (FUN) |
(8) |
16:30-16:50 |
Modeling and Performance Verification of Embedded Software in Multiprocessor Environment Using Extended Time Petri Nets |
Takafumi Nakamura, Akio Nakata (Hiroshima City Univ.) |
|
16:50-17:00 |
Break ( 10 min. ) |
Mon, May 11 PM 17:00 - 18:00 |
(9) |
17:00-18:00 |
[Invited Lecture]
Holism and Reductionism in Describing Software |
Tsuneo Ajisaka (Wakayama Univ.) |
Tue, May 12 AM 08:45 - 10:45 |
(10) |
08:45-09:15 |
Coding Pattern Detection for C Programs Using Pattern Mining Technique |
Yuta Nakamura, Eunjong Choi (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Shusuke Haruna, Katsuro Inoue (Osaka Univ.) |
(11) |
09:15-09:45 |
Investigation for Reducing Reuse Candidates on Reuse-based Automated Program Repair |
Haruki Yokoyama, Takafumi Ohta, Keisuke Hotta, Yoshiki Higo (Osaka Univ.), Kozo Okano (Shinshu Univ.), Shinji Kusumoto (Osaka Univ.) |
(12) |
09:45-10:15 |
Influence of the number of words in a bug report on accuracy in duplicate bug report detection |
Akihiro Tsuruda, Yuki Manabe, Masayoshi Aritsugi (Kumamoto Univ.) |
(13) |
10:15-10:45 |
Towards to Recover Propagation Process of the Patch for Linux Distribution |
Yong Jin, Kenji Fujiwara, Hajimu Iida (NAIST) |
|
10:45-10:55 |
Break ( 10 min. ) |
Tue, May 12 AM 10:55 - 11:55 |
(14) |
10:55-11:55 |
[Invited Lecture]
Software Engineering Embracing Uncertainty |
Naoyasu Ubayashi (Kyushu Univ.) |
|
11:55-13:00 |
Break ( 65 min. ) |
Tue, May 12 PM 13:00 - 14:00 |
(15) |
13:00-13:30 |
Query-Based l-Diversity |
Chittaphone Phonharath (NAIST), Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) |
(16) |
13:30-14:00 |
A Verification Method for k-Secrecy of XML Databases by Model Counting |
Takatoshi Asai, Masanori Uesugi, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) |