IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Software Science (SS)  (Searched in: 2014)

Search Results: Keywords 'from:2015-01-26 to:2015-01-26'

[Go to Official SS Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
MSS, SS 2015-01-26
13:30
Tottori   Evaluation of clone extraction method with code shape
Kouki Kakiya, Kazuki Nakatani, MasayukiHirayama (Nihon Univ.), Nahomi Kikuchi (OKI) MSS2014-69 SS2014-33
This paper reports a research Code Image Clone Detection method CICD. In this research, we developed a CICD tool and con... [more] MSS2014-69 SS2014-33
pp.1-6
MSS, SS 2015-01-26
13:55
Tottori   Applying Code Clone Analysis Techniques to Derivation Software
Yoshiki Higo, Keisuke Hotta, Hiroaki Murakami, Shinji Kusumoto (Osaka Univ.), Nobuhiro Nakamura (SEI), Takanori Katou, Yukinari Muta, Kenji Nishikawa (SIS) MSS2014-70 SS2014-34
Code clone detection and analysis attract much attention these days. However, most of the clone related papers have repo... [more] MSS2014-70 SS2014-34
pp.7-12
MSS, SS 2015-01-26
14:20
Tottori   An empirical study on code clone detection using supercomputer techniques
Ataru Osaka, Yasutaka Kamei (Kyushu Univ), Keisuke Hotta (Osaka Univ), Naoyasu Ubayashi (Kyushu Univ) MSS2014-71 SS2014-35
 [more] MSS2014-71 SS2014-35
pp.13-18
MSS, SS 2015-01-26
14:45
Tottori   Just-In-Time Defect Prediction Tool anko
Shutaro Tanaka, Takafumi Fukushima, Kazuhiro Yamashita, Yasutaka Kamei, Naoyasu Ubayashi (Kyushu Univ.) MSS2014-72 SS2014-36
Some previous studies show that defect prediction at the change-level (i.e., defect prediction for a commit to version c... [more] MSS2014-72 SS2014-36
pp.19-24
MSS, SS 2015-01-26
15:25
Tottori   Approximate Simulation Based Verification of Automation Surprises in Human-machine Systems
Daiki Ishii, Toshimitsu Ushio (Osaka Univ.) MSS2014-73 SS2014-37
We consider a human-machine system where a user operates a machine by using a user interface. The user interface provide... [more] MSS2014-73 SS2014-37
pp.25-29
MSS, SS 2015-01-26
15:50
Tottori   Optimal Sampling for Kalman Filtering by Sensor Network Based on Energy Consumption and Information Entropy
Ken Imai, Toshimitsu Ushio (Osaka Univ.) MSS2014-74 SS2014-38
 [more] MSS2014-74 SS2014-38
pp.31-36
MSS, SS 2015-01-26
16:15
Tottori   A Two Phase Scheme for De Novo Genome Assembly based on de Bruijn Graphs for Multiple Short Read Sets
Takuto Shigenobu, Morikazu Nakamura (Univ. of the Ryukyus) MSS2014-75 SS2014-39
We propose a two phase scheme for de novo genome assembly based on de Bruijn graphs.
Given multiple short read sets obt... [more]
MSS2014-75 SS2014-39
pp.37-41
MSS, SS 2015-01-26
16:55
Tottori   On Efficacy of Narrowing in Proving Termination of Constrained Term Rewriting Systems
Tomoya Ueyama, Naoki Nishida, Masahiko Sakai, Toshiki Sakabe (Nagoya Univ.) MSS2014-76 SS2014-40
 [more] MSS2014-76 SS2014-40
pp.43-48
MSS, SS 2015-01-26
17:20
Tottori   A Consideration on How to Model Check Distributed Snapshot Reachability Property
Wenjie Zhang, Kazuhiro Ogata (JAIST), Min Zhang (ECNU) MSS2014-77 SS2014-41
The Chandy-Lamport Distributed Snapshot Algorithm (CLDSA) can determine a consistent global state (called a snapshot) of... [more] MSS2014-77 SS2014-41
pp.49-54
MSS, SS 2015-01-26
17:45
Tottori   Implementing a Conditional Dependency Pair Method for Proving Termination of Functional Programs with Exception Handling
Koichi Ota, Takeshi Hamaguchi, Masahiko Sakai (Nagoya Univ.), Akihisa Yamada (AIST), Naoki Nishida, Toshiki Sakabe (Nagoya Univ.) MSS2014-78 SS2014-42
In this paper, we discuss implementation of the conditional dependency pair method for proving termination of functional... [more] MSS2014-78 SS2014-42
pp.55-60
MSS, SS 2015-01-26
18:10
Tottori   An approach to Application of Inductive Logic Programming to Characterization of Reachable States
Dung Tuan Ho (JAIST), Min Zhang (ECNU), Kazuhiro Ogata (JAIST) MSS2014-79 SS2014-43
Lemma conjecture is one of the most intellectual activities in interactive theorem proving. Interactively theorem provin... [more] MSS2014-79 SS2014-43
pp.61-66
MSS, SS 2015-01-27
08:30
Tottori   Statistical Model Checking of Hybrid Systems using Interval Analysis
Daisuke Ishii, Naoki Yonezaki (Titech) MSS2014-80 SS2014-44
 [more] MSS2014-80 SS2014-44
pp.67-71
MSS, SS 2015-01-27
08:55
Tottori   Direct Update of XML Documents Compressed by Tree Grammars
Takeshi Goto (Nagoya Univ.), Takahiro Onoue (NAIST), Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2014-81 SS2014-45
XML is a de facto standard for data storage and exchange, and various compression methods for XML documents have been pr... [more] MSS2014-81 SS2014-45
pp.73-78
MSS, SS 2015-01-27
09:20
Tottori   A supervisor synthesis by MaxSAT solvers under partial observation
Tatsuki Hirota, Shoji Yuen (Nagoya Univ), Tetsuya Tohdo (DENSO) MSS2014-82 SS2014-46
Synthesis of the supervisor for discrete event systems under partial observation has been shown exponen-
tial in princi... [more]
MSS2014-82 SS2014-46
pp.79-84
MSS, SS 2015-01-27
10:00
Tottori   Extract Superclass Problem of Workow Nets and Refining the Solution
Sohma Nishi, Shingo Yamaguchi (Yamaguchi Univ.) MSS2014-83 SS2014-47
We can model a common behavior of two or more workflows as a superclass of them under behavioral inheritance. We have pr... [more] MSS2014-83 SS2014-47
pp.85-90
MSS, SS 2015-01-27
10:25
Tottori   An approach based on implicit places to refactoring problem of workflow nets
Jia Zhang, Ichiro Toyoshima, Shingo Yamaguchi (Yamaguchi Univ.) MSS2014-84 SS2014-48
Refactoring is to convert a given workflow net, so as to preserve branching bisimilarity, to another workflow net of it... [more] MSS2014-84 SS2014-48
pp.91-96
MSS, SS 2015-01-27
10:50
Tottori   Considerations on a Statistical Reduct Method for the Decision Table
Yuichi Kato (Shimane Univ.), Tetsuro Saeki (Yamaguchi Univ.), Shoutaro Mizuno (Shimane Univ.) MSS2014-85 SS2014-49
 [more] MSS2014-85 SS2014-49
pp.97-102
MSS, SS 2015-01-27
12:30
Tottori   Discussion of a Tool for Supporting Pull Request Driven Software Development
Yusuke Saito, Kenji Fujiwara (NAIST), Hiroshi Igaki (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Hajimu Iida (NAIST) MSS2014-86 SS2014-50
 [more] MSS2014-86 SS2014-50
pp.103-108
MSS, SS 2015-01-27
12:55
Tottori   Towards Security Analysis based on Traceability
Hirokazu Yatsu (Kyushu Univ.), Masaru Matsunami (SDNA), Toshimi Sawada (Thinker's craft house), Takahiro Ando, Kenji Hisazumi (Kyushu Univ.), Kong Weiqiang (DLUT), Akira Fukuda (Kyushu Univ.)
Usually, security analysis is mainly done at the implementation phase of system development. In this paper, we propose a... [more]
MSS, SS 2015-01-27
13:35
Tottori   Towards the Development of a Formal Language for Frequency of Events
Osamu Takaki (Gunma Univ.) MSS2014-87 SS2014-51
 [more] MSS2014-87 SS2014-51
pp.109-114
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan