Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2015-05-11 13:00 |
Kumamoto |
Kumamoto University |
Towards Applications of FRP in Small-Scale Embedded Systems Kensuke Sawada, Kouhei Suzuki, Takuo Watanabe (Tokyo Tech.) SS2015-1 |
In this paper, we show using examples that functional reactive programming (FRP) is beneficial for small-scale embedded ... [more] |
SS2015-1 pp.1-5 |
SS |
2015-05-11 13:30 |
Kumamoto |
Kumamoto University |
Towards the Supervisor Synthesis Using Hybrid Process Calculi Yuto Kawakita, Shoji Yuen (Nagoya Univ.) SS2015-2 |
We deal with a supervisor synthesis for HCCS, an extension of CCS for hybrid communicating systems, by the syntactic man... [more] |
SS2015-2 pp.7-10 |
SS |
2015-05-11 13:50 |
Kumamoto |
Kumamoto University |
An Implementation of Computing Optimal Mean-payoff Values for Non-terminating Scheduling by Double Priced Timed Automata Sho Hiraoka, Shoji Yuen (Nagoya Univ.) SS2015-3 |
Derivation of the optimal behavior for scheduling such as Operating System using double priced timed automata, DPTA for ... [more] |
SS2015-3 pp.11-16 |
SS |
2015-05-11 14:25 |
Kumamoto |
Kumamoto University |
[Invited Lecture]
Quantitative Information Flow and Differential Privacy Hiroyuki Seki (Nagoya Univ.) SS2015-4 |
Recently, quantitative modellings for security and privacy have been paid much attention. Among them are quantitative in... [more] |
SS2015-4 pp.17-22 |
SS |
2015-05-11 15:40 |
Kumamoto |
Kumamoto University |
Classification of Code Clones in Hardware Description Language Kyohei Uemura, Kenji Fujiwara, Hajimu Iida (NAIST) SS2015-5 |
With the growth of the electric circuit size and complexity, Hardware Description Language (HDL) is widely used in hardw... [more] |
SS2015-5 pp.23-28 |
SS |
2015-05-11 16:10 |
Kumamoto |
Kumamoto University |
An Approach for Software Repository Mining Using a Natural Langage Processing Method, Word2Vec Takeru Uchiyama, Toshihiro Kamiya (FUN) SS2015-6 |
In this study, we apply a natural language processing technique, namely Word2Vec, to source code of software products, t... [more] |
SS2015-6 pp.29-31 |
SS |
2015-05-11 16:30 |
Kumamoto |
Kumamoto University |
Modeling and Performance Verification of Embedded Software in Multiprocessor Environment Using Extended Time Petri Nets Takafumi Nakamura, Akio Nakata (Hiroshima City Univ.) SS2015-7 |
In the development of embedded software which requires high reliability satisfaction of hard requirements for both compu... [more] |
SS2015-7 pp.33-37 |
SS |
2015-05-11 17:00 |
Kumamoto |
Kumamoto University |
[Invited Lecture]
Holism and Reductionism in Describing Software Tsuneo Ajisaka (Wakayama Univ.) SS2015-8 |
[more] |
SS2015-8 p.39 |
SS |
2015-05-12 08:45 |
Kumamoto |
Kumamoto University |
Coding Pattern Detection for C Programs Using Pattern Mining Technique Yuta Nakamura, Eunjong Choi (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Shusuke Haruna, Katsuro Inoue (Osaka Univ.) SS2015-9 |
Coding pattern is an idiomatic code fragment that distributes in modules. It can be used for finding bugs because it imp... [more] |
SS2015-9 pp.41-46 |
SS |
2015-05-12 09:15 |
Kumamoto |
Kumamoto University |
Investigation for Reducing Reuse Candidates on Reuse-based Automated Program Repair Haruki Yokoyama, Takafumi Ohta, Keisuke Hotta, Yoshiki Higo (Osaka Univ.), Kozo Okano (Shinshu Univ.), Shinji Kusumoto (Osaka Univ.) SS2015-10 |
(To be available after the conference date) [more] |
SS2015-10 pp.47-52 |
SS |
2015-05-12 09:45 |
Kumamoto |
Kumamoto University |
Influence of the number of words in a bug report on accuracy in duplicate bug report detection Akihiro Tsuruda, Yuki Manabe, Masayoshi Aritsugi (Kumamoto Univ.) SS2015-11 |
[more] |
SS2015-11 pp.53-58 |
SS |
2015-05-12 10:15 |
Kumamoto |
Kumamoto University |
Towards to Recover Propagation Process of the Patch for Linux Distribution Yong Jin, Kenji Fujiwara, Hajimu Iida (NAIST) SS2015-12 |
In Linux Operating System, there are various kinds of distributions, these are constructed by the combination of softwar... [more] |
SS2015-12 pp.59-62 |
SS |
2015-05-12 10:55 |
Kumamoto |
Kumamoto University |
[Invited Lecture]
Software Engineering Embracing Uncertainty Naoyasu Ubayashi (Kyushu Univ.) SS2015-13 |
Uncertainty is one of the crucial research topics in software engineering. In most software development
projects, we ha... [more] |
SS2015-13 p.63 |
SS |
2015-05-12 13:00 |
Kumamoto |
Kumamoto University |
Query-Based l-Diversity Chittaphone Phonharath (NAIST), Ryunosuke Takayama, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2015-14 |
[more] |
SS2015-14 pp.65-70 |
SS |
2015-05-12 13:30 |
Kumamoto |
Kumamoto University |
A Verification Method for k-Secrecy of XML Databases by Model Counting Takatoshi Asai, Masanori Uesugi, Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) SS2015-15 |
An inference attack is a malicious way to obtain the result of an unauthorized query
by combining the database schema,... [more] |
SS2015-15 pp.71-76 |