Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS, MSS |
2024-01-18 10:25 |
Ishikawa |
(Primary: On-site, Secondary: Online) |
Parametric Execution Time Analysis of Programs Considering Nested Loops Using Partial Execution Time Measurement and its Evaluation Yugen Nakanishi, Akio Nakata (Hiroshima City Univ.) MSS2023-62 SS2023-41 |
In this paper, we propose a parametric execution time analysis method for real-time software reuse. When reusing softwar... [more] |
MSS2023-62 SS2023-41 pp.58-63 |
NS |
2022-10-06 09:15 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
A Communication Timing Schedule Method for FA Network with PLC Program Analysis Daisuke Osagawa, Tomotaka Ogawa, Daisuke Takita (Mitsubishi Electric Corp.) NS2022-89 |
The Factory Automation network has a multiple communication cycles function that reduces the frequency of control commun... [more] |
NS2022-89 pp.39-59 |
SS |
2020-03-05 10:50 |
Okinawa |
(Cancelled but technical report was issued) |
A Type System for Information Flow Analysis of Rust Programs Kenta Hasegawa (Ritsumeikan Univ.), Hiroaki Kuwabara (Nanzan Univ.), Yoshitoshi Kunieda (Ritsumeikan Univ.) SS2019-53 |
In this paper, we propose a type system for Information Flow Analysis of Rust programs.
Programming language Rust has o... [more] |
SS2019-53 pp.73-78 |
SS, MSS |
2020-01-14 16:30 |
Hiroshima |
|
A Prototype Algorithm and Implementation of Code-Clone Detection with MapReduce-Style Prallel Processing Toshihiro Kamiya (Shimane Univ.), Eunjong Choi (KIT) MSS2019-48 SS2019-32 |
This report presents a scalable type-3 code-clone (duplicated code) detection method running in a
MapReduce style paral... [more] |
MSS2019-48 SS2019-32 pp.43-48 |
SS |
2019-03-05 14:25 |
Okinawa |
|
An Approach of Sharing Software Modification to Adopt Library Evolution Noritoshi Atsumi (Kyoto Univ.), Hiroaki Kuwabara (Nanzan Univ.) SS2018-78 |
In software development, the software maintenance task to update library version tends to be negligible because it is no... [more] |
SS2018-78 pp.157-162 |
TL |
2018-10-28 13:00 |
Hokkaido |
National Institute of Technology, Hakodate College |
An investigation of identifier naming strongly linked to specific pattern of program structure Yoshiki Mashima (O.E.C.U.), Sachio Hirokawa (Kyushu Univ.), Kazuhiro Takeuchi (O.E.C.U.) TL2018-40 |
Identifiers in programming language such as variable names, class names, and method names are generally given in natural... [more] |
TL2018-40 pp.7-12 |
MSS, CAS, IPSJ-AL [detail] |
2016-11-24 13:50 |
Hyogo |
Kobe Institute of Computing |
Representation and analysis of C Source Code by using The Program Graph Tateo Okubo (Iwate Pref Univ.), Kazuya Fukuhara (i-MOS), Toshimitsu Inomata, Eiji Sugino, Yoshikazu Arai, Shintaro Imai (Iwate Pref Univ.) CAS2016-64 MSS2016-44 |
In this paper we present the formal definition and the ability of the Program Graph.Nodes of the Program Graph correspon... [more] |
CAS2016-64 MSS2016-44 pp.37-42 |
SS |
2015-03-09 11:25 |
Okinawa |
OKINAWAKEN SEINENKAIKAN |
Implementation and Evaluation of Fault Localization Technique based on Occurrence of Dynamic Data Dependencies Mizuki Nakano, Shunsuke Ohnuma, Takashi Kobayashi (Tokyo Tech.), Takashi Ishio (Osaka Univ.) SS2014-58 |
In the debugging process, we must find fault locations by investigating infection chains backwards; from failure points ... [more] |
SS2014-58 pp.19-24 |
ET |
2014-06-14 10:05 |
Shizuoka |
Shizuoka Univ. (Hamamatsu Campus) |
Implementation of a source code search and extraction system for making programing exercises Wataru Morita, Yuichiro Tateiwa, Daisuke Yamamoto, Naohisa Takahashi (Nagoya Inst. of Tech.) ET2014-8 |
In C programming exercises for beginners, instructors make an exercise, a triplet of problem statements, an example prog... [more] |
ET2014-8 pp.1-6 |
SS, IPSJ-SE |
2013-10-24 10:50 |
Ishikawa |
|
Development of the Behavior Extractor for Assembly Program of Embedded CISC Microcomputer and Adapting to Model Checking
-- Generating the Model Automatically by Simulation -- Ryosuke Konoshita, Satoshi Yamane, Kohei Sakurai (Kanazawa Univ.) SS2013-37 |
We aim at Model Checking for Embedded Systems. We describe the outline of Behavior Extractor that automatically construc... [more] |
SS2013-37 pp.7-12 |
MSS, SS |
2013-03-06 17:40 |
Fukuoka |
Shikanoshima |
Propagation Probability of Data Dependency for Fault Localization Sanae Muramatsu (Nagoya Univ.), Takashi Kobayashi (Tokyo Inst. of Tech./Nagoya Univ.), Noritoshi Atsumi (Nagoya Univ.), Kiyoshi Agusa (Kyoto Univ.) MSS2012-71 SS2012-71 |
One of the most tedious and time-consuming tasks of debugging is fault localization (FL), which is locating root cause o... [more] |
MSS2012-71 SS2012-71 pp.69-74 |
SS |
2012-03-13 10:50 |
Okinawa |
Tenbusu-Naha |
Code Clone Detection Method Designed for Information of Repetition in Source Code Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto (Osaka Univ.) SS2011-61 |
A code clone is a code fragment that is identical or similar to another in a source code. One of the factors that makes ... [more] |
SS2011-61 pp.25-30 |
SS |
2011-10-27 15:35 |
Ishikawa |
JAIST |
Development and Implementation of an Efficient Algorithm for Delta Mining Keishi Yamane, Naoya Nitta (Konan Univ.) SS2011-31 |
In an execution of an object-oriented program, a pre-executed feature often affects a post-executed feature.Therefore, i... [more] |
SS2011-31 pp.25-30 |
KBSE |
2011-09-22 09:45 |
Overseas |
Ocean Grand Hotel Jeju |
Generating Precondition of each Test Case by Using trajectory of program execution
-- To improve the coverage of white box testing -- Hiroyuki Ebihara, Seiichi Komiya (Shibaura Institute of Technology), Kouhei Sakurai (University of Tokyo) KBSE2011-33 |
White box testing is one of the strategies of software testing. White box testing creates test cases based on the struct... [more] |
KBSE2011-33 pp.55-60 |
SS |
2010-03-08 14:10 |
Kagoshima |
Kagoshima Univ. |
Identifying frequent functionalities from large-scale source code Kensuke Tanaka, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) SS2009-56 |
In recent years software development scale is steadily increasing.
To reduce development costs, it is desirable to effe... [more] |
SS2009-56 pp.49-54 |
ET |
2009-12-11 10:30 |
Okinawa |
Univ. of the Ryukyus |
A Code Review Navigator with Chunking and Slicing for Assembly Programming Exercise Hirokazu Yoshida, Yuichiro Tateiwa, Daisuke Yamamoto, Naohisa Takahashi (Nagoya Inst. of Tech.) ET2009-81 |
We are developing a Computer-Aided Programming Exercise System(CAPES) and applying it to several classes in our universi... [more] |
ET2009-81 pp.169-174 |
SS |
2009-08-06 11:00 |
Hokkaido |
Kitami Institute of Technology |
A Prototype Implementation of Reverse-Engineering Toolkit: Remics Toshihiro Kamiya (AIST) SS2009-13 |
This paper briefly introduces the current status of a toolkit named Remics. This toolkit aims that software developers m... [more] |
SS2009-13 pp.7-11 |
KBSE |
2008-11-28 13:15 |
Fukuoka |
FIT |
A Framework of Testing Application Order of Advices in Aspect-Oriented Programming Fumitaka Akahori (Shibaura Institute of Technology), Kouhei Sakurai (The University of Tokyo), Seiichi Komiya (Shibaura Institute of Technology) KBSE2008-32 |
In an Aspect-Oriented Programming Language like AspectJ, advice is applied as a processing unit for crosscutting concern... [more] |
KBSE2008-32 pp.55-60 |
ET |
2008-10-17 13:05 |
Okayama |
|
Development of a C language source management API specialized for education and its applicatoin Kazunori Okubo, Hisao Tamaki (Meiji Univ.) ET2008-42 |
In an e-learning system for programming education, it is necesary to analyze the source code written in some programming... [more] |
ET2008-42 pp.17-22 |
SS |
2006-12-15 09:20 |
Fukuoka |
Kyushu University |
Security-Aware Refactoring using Information Flow Kensuke Tokoda, Katsuhisa Maruyama (Ritsumeikan Univ.) |
Vulnerable software is a serious issue since it becomes a key element in the real world. We have proposed a security-awa... [more] |
SS2006-65 pp.1-6 |