Mon, Dec 19 PM 13:00 - 17:15 |
(1) |
13:00-13:30 |
Development of a clock level simulator by reusable code design |
Kazuya Fukuhara, Toshimitsu Inomata, Masakazu Soga (Iwate Prefectural Univ.) |
(2) |
13:30-14:00 |
Extension of Automatic Visualization Tool "Avis" for Structure of Classes |
Yoshihiro Kita, Takanori Kawasoe, Tetsuro Katayama (Univ. of Miyazaki) |
(3) |
14:00-14:30 |
Extraction of Conversion Rules from UML Diagrams to Java Source Codes and a Prototype of Conversion Tool |
Kiyohito Shimomura, Tetsuro Katayama (Univ. of Miyazaki) |
(4) |
14:30-15:00 |
Secrecy Verification by Transforming Cryptographic Protocol Descriptions to Coloured Petri Nets |
Daisuke Okuya, Toshiki Sakabe, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.) |
|
15:00-15:15 |
Break ( 15 min. ) |
(5) |
15:15-15:45 |
Obfuscating Cipher Programs against Primary Attacking Tasks |
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto (NAIST) |
(6) |
15:45-16:15 |
Applying an Intercultural Collaboration Support Tool to Software Requirements Elicitation Meetings |
Akinori Tsuji, Yusuke Koyama, Masao Ohira, Ken-ichi Matsumoto (NAIST) |
(7) |
16:15-16:45 |
A Study of Relationship between Class Cohesion and Source Code Changing Rate |
Junichi Yamashita, Hirohisa Aman (Graduate School of Ehime Univ.) |
(8) |
16:45-17:15 |
A Method to Find Differences between Two Programs for Syntax based Versioning Systems |
Naoki Fukuyasu, Atsushi Yoshida (Wakayama Univ.) |
Tue, Dec 20 AM 09:00 - 17:15 |
(9) |
09:00-09:30 |
identifying of an object from different viewpoints using its attributes in the computing environments |
Fumiko Kouda (univ.ofTokyo), Takashi Chikayama (univ.of Tokyo) |
(10) |
09:30-10:00 |
Pseudo Adaptive Methods |
Noriki Amano (JAIST) |
|
10:00-10:15 |
Break ( 15 min. ) |
(11) |
10:15-10:45 |
Enhancing Dependency Pair Method by Strong Computability in Simply-Typed Term Rewriting Systems |
Keiichirou Kusakari, Masahiko Sakai (Nagoya Univ.) |
(12) |
10:45-11:15 |
FTA - Product Line Engineering Collaboration |
Atsushi Noda, Tsuneo Nakanishi, Akira Fukuda (Kyushu Univ.) |
(13) |
11:15-11:45 |
Type Judgement System for Communication Error in Distributed JoinJAVA Programs |
Masaki Saeki, Toshiki Sakabe, Masahiko Sakai, Keiichirou Kusakari, Naoki Nishida (Nagoya Univ.) |
|
11:45-13:00 |
Lunch Break ( 75 min. ) |
(14) |
13:00-13:30 |
Metrics for effort estimation on contracting maintenance service |
Kenichi Kobayashi, Toshiaki Yoshino (Fujitsu Labs.), Katsuro Inoue, Yasuhiro Hayase (Osaka Univ.), , (Fujitsu Labs.) |
(15) |
13:30-14:00 |
Exploration of scale-freeness of use-relations of software components |
Makoto Ichii, Makoto Matsushita, Katsuro Inoue (Osaka Univ.) |
(16) |
14:00-14:30 |
A Layered Architecture of Formal Specification |
Xiaojing Zhang, Yoichi Omori, Keijiro Araki (Kyushu Univ.) |
(17) |
14:30-15:00 |
Supporting Method for Insertion of Behaviors based on Security Requirements to Scenarios |
Hiroya Itoga, Atsushi Ohnishi (Ritsumeikan Univ.) |
(18) |
15:00-15:30 |
A Software Process Tailoring System based on Quantitative Management Plans |
Kazumasa Hikichi, Hajimu Iida, Ken-ichi Matsumoto (NAIST) |
|
15:30-15:45 |
Break ( 15 min. ) |
(19) |
15:45-16:15 |
* |
Yasuhiro Hayase, Makoto Matsushita, Shinji Kusumoto, Katsuro Inoue (Osaka Univ.), Kenichi Kobayashi, Toshiaki Yoshino (Fujitsu Lab.) |
(20) |
16:15-16:45 |
Characterizing software projects unpredictable by effort estimation models |
Koji Toda, Masateru Tsunoda, Akito Monden, Ken-ichi Matsumoto (NAIST) |
(21) |
16:45-17:15 |
A Framework to Generate SPIN based Verification Codes for Struts WEB Applications |
Takayuki Fujiwara, Kozo Okano, Shinji Kusumoto (Osaka Univ.) |