IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 22  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SS, MSS 2024-01-18
10:25
Ishikawa
(Primary: On-site, Secondary: Online)
Parametric Execution Time Analysis of Programs Considering Nested Loops Using Partial Execution Time Measurement and its Evaluation
Yugen Nakanishi, Akio Nakata (Hiroshima City Univ.) MSS2023-62 SS2023-41
In this paper, we propose a parametric execution time analysis method for real-time software reuse. When reusing softwar... [more] MSS2023-62 SS2023-41
pp.58-63
NS 2022-10-06
09:15
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
[Invited Lecture] A Communication Timing Schedule Method for FA Network with PLC Program Analysis
Daisuke Osagawa, Tomotaka Ogawa, Daisuke Takita (Mitsubishi Electric Corp.) NS2022-89
The Factory Automation network has a multiple communication cycles function that reduces the frequency of control commun... [more] NS2022-89
pp.39-59
SS 2020-03-05
10:50
Okinawa
(Cancelled but technical report was issued)
A Type System for Information Flow Analysis of Rust Programs
Kenta Hasegawa (Ritsumeikan Univ.), Hiroaki Kuwabara (Nanzan Univ.), Yoshitoshi Kunieda (Ritsumeikan Univ.) SS2019-53
In this paper, we propose a type system for Information Flow Analysis of Rust programs.
Programming language Rust has o... [more]
SS2019-53
pp.73-78
SS, MSS 2020-01-14
16:30
Hiroshima   A Prototype Algorithm and Implementation of Code-Clone Detection with MapReduce-Style Prallel Processing
Toshihiro Kamiya (Shimane Univ.), Eunjong Choi (KIT) MSS2019-48 SS2019-32
This report presents a scalable type-3 code-clone (duplicated code) detection method running in a
MapReduce style paral... [more]
MSS2019-48 SS2019-32
pp.43-48
SS 2019-03-05
14:25
Okinawa   An Approach of Sharing Software Modification to Adopt Library Evolution
Noritoshi Atsumi (Kyoto Univ.), Hiroaki Kuwabara (Nanzan Univ.) SS2018-78
In software development, the software maintenance task to update library version tends to be negligible because it is no... [more] SS2018-78
pp.157-162
TL 2018-10-28
13:00
Hokkaido National Institute of Technology, Hakodate College An investigation of identifier naming strongly linked to specific pattern of program structure
Yoshiki Mashima (O.E.C.U.), Sachio Hirokawa (Kyushu Univ.), Kazuhiro Takeuchi (O.E.C.U.) TL2018-40
Identifiers in programming language such as variable names, class names, and method names are generally given in natural... [more] TL2018-40
pp.7-12
MSS, CAS, IPSJ-AL [detail] 2016-11-24
13:50
Hyogo Kobe Institute of Computing Representation and analysis of C Source Code by using The Program Graph
Tateo Okubo (Iwate Pref Univ.), Kazuya Fukuhara (i-MOS), Toshimitsu Inomata, Eiji Sugino, Yoshikazu Arai, Shintaro Imai (Iwate Pref Univ.) CAS2016-64 MSS2016-44
In this paper we present the formal definition and the ability of the Program Graph.Nodes of the Program Graph correspon... [more] CAS2016-64 MSS2016-44
pp.37-42
SS 2015-03-09
11:25
Okinawa OKINAWAKEN SEINENKAIKAN Implementation and Evaluation of Fault Localization Technique based on Occurrence of Dynamic Data Dependencies
Mizuki Nakano, Shunsuke Ohnuma, Takashi Kobayashi (Tokyo Tech.), Takashi Ishio (Osaka Univ.) SS2014-58
In the debugging process, we must find fault locations by investigating infection chains backwards; from failure points ... [more] SS2014-58
pp.19-24
ET 2014-06-14
10:05
Shizuoka Shizuoka Univ. (Hamamatsu Campus) Implementation of a source code search and extraction system for making programing exercises
Wataru Morita, Yuichiro Tateiwa, Daisuke Yamamoto, Naohisa Takahashi (Nagoya Inst. of Tech.) ET2014-8
In C programming exercises for beginners, instructors make an exercise, a triplet of problem statements, an example prog... [more] ET2014-8
pp.1-6
SS, IPSJ-SE 2013-10-24
10:50
Ishikawa   Development of the Behavior Extractor for Assembly Program of Embedded CISC Microcomputer and Adapting to Model Checking -- Generating the Model Automatically by Simulation --
Ryosuke Konoshita, Satoshi Yamane, Kohei Sakurai (Kanazawa Univ.) SS2013-37
We aim at Model Checking for Embedded Systems. We describe the outline of Behavior Extractor that automatically construc... [more] SS2013-37
pp.7-12
MSS, SS 2013-03-06
17:40
Fukuoka Shikanoshima Propagation Probability of Data Dependency for Fault Localization
Sanae Muramatsu (Nagoya Univ.), Takashi Kobayashi (Tokyo Inst. of Tech./Nagoya Univ.), Noritoshi Atsumi (Nagoya Univ.), Kiyoshi Agusa (Kyoto Univ.) MSS2012-71 SS2012-71
One of the most tedious and time-consuming tasks of debugging is fault localization (FL), which is locating root cause o... [more] MSS2012-71 SS2012-71
pp.69-74
SS 2012-03-13
10:50
Okinawa Tenbusu-Naha Code Clone Detection Method Designed for Information of Repetition in Source Code
Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto (Osaka Univ.) SS2011-61
A code clone is a code fragment that is identical or similar to another in a source code. One of the factors that makes ... [more] SS2011-61
pp.25-30
SS 2011-10-27
15:35
Ishikawa JAIST Development and Implementation of an Efficient Algorithm for Delta Mining
Keishi Yamane, Naoya Nitta (Konan Univ.) SS2011-31
In an execution of an object-oriented program, a pre-executed feature often affects a post-executed feature.Therefore, i... [more] SS2011-31
pp.25-30
KBSE 2011-09-22
09:45
Overseas Ocean Grand Hotel Jeju Generating Precondition of each Test Case by Using trajectory of program execution -- To improve the coverage of white box testing --
Hiroyuki Ebihara, Seiichi Komiya (Shibaura Institute of Technology), Kouhei Sakurai (University of Tokyo) KBSE2011-33
White box testing is one of the strategies of software testing. White box testing creates test cases based on the struct... [more] KBSE2011-33
pp.55-60
SS 2010-03-08
14:10
Kagoshima Kagoshima Univ. Identifying frequent functionalities from large-scale source code
Kensuke Tanaka, Yoshiki Higo, Shinji Kusumoto (Osaka Univ.) SS2009-56
In recent years software development scale is steadily increasing.
To reduce development costs, it is desirable to effe... [more]
SS2009-56
pp.49-54
ET 2009-12-11
10:30
Okinawa Univ. of the Ryukyus A Code Review Navigator with Chunking and Slicing for Assembly Programming Exercise
Hirokazu Yoshida, Yuichiro Tateiwa, Daisuke Yamamoto, Naohisa Takahashi (Nagoya Inst. of Tech.) ET2009-81
We are developing a Computer-Aided Programming Exercise System(CAPES) and applying it to several classes in our universi... [more] ET2009-81
pp.169-174
SS 2009-08-06
11:00
Hokkaido Kitami Institute of Technology A Prototype Implementation of Reverse-Engineering Toolkit: Remics
Toshihiro Kamiya (AIST) SS2009-13
This paper briefly introduces the current status of a toolkit named Remics. This toolkit aims that software developers m... [more] SS2009-13
pp.7-11
KBSE 2008-11-28
13:15
Fukuoka FIT A Framework of Testing Application Order of Advices in Aspect-Oriented Programming
Fumitaka Akahori (Shibaura Institute of Technology), Kouhei Sakurai (The University of Tokyo), Seiichi Komiya (Shibaura Institute of Technology) KBSE2008-32
In an Aspect-Oriented Programming Language like AspectJ, advice is applied as a processing unit for crosscutting concern... [more] KBSE2008-32
pp.55-60
ET 2008-10-17
13:05
Okayama   Development of a C language source management API specialized for education and its applicatoin
Kazunori Okubo, Hisao Tamaki (Meiji Univ.) ET2008-42
In an e-learning system for programming education, it is necesary to analyze the source code written in some programming... [more] ET2008-42
pp.17-22
SS 2006-12-15
09:20
Fukuoka Kyushu University Security-Aware Refactoring using Information Flow
Kensuke Tokoda, Katsuhisa Maruyama (Ritsumeikan Univ.)
Vulnerable software is a serious issue since it becomes a key element in the real world. We have proposed a security-awa... [more] SS2006-65
pp.1-6
 Results 1 - 20 of 22  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan