Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MSS, SS |
2015-01-26 13:30 |
Tottori |
|
Evaluation of clone extraction method with code shape Kouki Kakiya, Kazuki Nakatani, MasayukiHirayama (Nihon Univ.), Nahomi Kikuchi (OKI) MSS2014-69 SS2014-33 |
This paper reports a research Code Image Clone Detection method CICD. In this research, we developed a CICD tool and con... [more] |
MSS2014-69 SS2014-33 pp.1-6 |
MSS, SS |
2015-01-26 13:55 |
Tottori |
|
Applying Code Clone Analysis Techniques to Derivation Software Yoshiki Higo, Keisuke Hotta, Hiroaki Murakami, Shinji Kusumoto (Osaka Univ.), Nobuhiro Nakamura (SEI), Takanori Katou, Yukinari Muta, Kenji Nishikawa (SIS) MSS2014-70 SS2014-34 |
Code clone detection and analysis attract much attention these days. However, most of the clone related papers have repo... [more] |
MSS2014-70 SS2014-34 pp.7-12 |
MSS, SS |
2015-01-26 14:20 |
Tottori |
|
An empirical study on code clone detection using supercomputer techniques Ataru Osaka, Yasutaka Kamei (Kyushu Univ), Keisuke Hotta (Osaka Univ), Naoyasu Ubayashi (Kyushu Univ) MSS2014-71 SS2014-35 |
[more] |
MSS2014-71 SS2014-35 pp.13-18 |
MSS, SS |
2015-01-26 14:45 |
Tottori |
|
Just-In-Time Defect Prediction Tool anko Shutaro Tanaka, Takafumi Fukushima, Kazuhiro Yamashita, Yasutaka Kamei, Naoyasu Ubayashi (Kyushu Univ.) MSS2014-72 SS2014-36 |
Some previous studies show that defect prediction at the change-level (i.e., defect prediction for a commit to version c... [more] |
MSS2014-72 SS2014-36 pp.19-24 |
MSS, SS |
2015-01-26 15:25 |
Tottori |
|
Approximate Simulation Based Verification of Automation Surprises in Human-machine Systems Daiki Ishii, Toshimitsu Ushio (Osaka Univ.) MSS2014-73 SS2014-37 |
We consider a human-machine system where a user operates a machine by using a user interface. The user interface provide... [more] |
MSS2014-73 SS2014-37 pp.25-29 |
MSS, SS |
2015-01-26 15:50 |
Tottori |
|
Optimal Sampling for Kalman Filtering by Sensor Network Based on Energy Consumption and Information Entropy Ken Imai, Toshimitsu Ushio (Osaka Univ.) MSS2014-74 SS2014-38 |
[more] |
MSS2014-74 SS2014-38 pp.31-36 |
MSS, SS |
2015-01-26 16:15 |
Tottori |
|
A Two Phase Scheme for De Novo Genome Assembly based on de Bruijn Graphs for Multiple Short Read Sets Takuto Shigenobu, Morikazu Nakamura (Univ. of the Ryukyus) MSS2014-75 SS2014-39 |
We propose a two phase scheme for de novo genome assembly based on de Bruijn graphs.
Given multiple short read sets obt... [more] |
MSS2014-75 SS2014-39 pp.37-41 |
MSS, SS |
2015-01-26 16:55 |
Tottori |
|
On Efficacy of Narrowing in Proving Termination of Constrained Term Rewriting Systems Tomoya Ueyama, Naoki Nishida, Masahiko Sakai, Toshiki Sakabe (Nagoya Univ.) MSS2014-76 SS2014-40 |
[more] |
MSS2014-76 SS2014-40 pp.43-48 |
MSS, SS |
2015-01-26 17:20 |
Tottori |
|
A Consideration on How to Model Check Distributed Snapshot Reachability Property Wenjie Zhang, Kazuhiro Ogata (JAIST), Min Zhang (ECNU) MSS2014-77 SS2014-41 |
The Chandy-Lamport Distributed Snapshot Algorithm (CLDSA) can determine a consistent global state (called a snapshot) of... [more] |
MSS2014-77 SS2014-41 pp.49-54 |
MSS, SS |
2015-01-26 17:45 |
Tottori |
|
Implementing a Conditional Dependency Pair Method for Proving Termination of Functional Programs with Exception Handling Koichi Ota, Takeshi Hamaguchi, Masahiko Sakai (Nagoya Univ.), Akihisa Yamada (AIST), Naoki Nishida, Toshiki Sakabe (Nagoya Univ.) MSS2014-78 SS2014-42 |
In this paper, we discuss implementation of the conditional dependency pair method for proving termination of functional... [more] |
MSS2014-78 SS2014-42 pp.55-60 |
MSS, SS |
2015-01-26 18:10 |
Tottori |
|
An approach to Application of Inductive Logic Programming to Characterization of Reachable States Dung Tuan Ho (JAIST), Min Zhang (ECNU), Kazuhiro Ogata (JAIST) MSS2014-79 SS2014-43 |
Lemma conjecture is one of the most intellectual activities in interactive theorem proving. Interactively theorem provin... [more] |
MSS2014-79 SS2014-43 pp.61-66 |
MSS, SS |
2015-01-27 08:30 |
Tottori |
|
Statistical Model Checking of Hybrid Systems using Interval Analysis Daisuke Ishii, Naoki Yonezaki (Titech) MSS2014-80 SS2014-44 |
[more] |
MSS2014-80 SS2014-44 pp.67-71 |
MSS, SS |
2015-01-27 08:55 |
Tottori |
|
Direct Update of XML Documents Compressed by Tree Grammars Takeshi Goto (Nagoya Univ.), Takahiro Onoue (NAIST), Kenji Hashimoto, Hiroyuki Seki (Nagoya Univ.) MSS2014-81 SS2014-45 |
XML is a de facto standard for data storage and exchange, and various compression methods for XML documents have been pr... [more] |
MSS2014-81 SS2014-45 pp.73-78 |
MSS, SS |
2015-01-27 09:20 |
Tottori |
|
A supervisor synthesis by MaxSAT solvers under partial observation Tatsuki Hirota, Shoji Yuen (Nagoya Univ), Tetsuya Tohdo (DENSO) MSS2014-82 SS2014-46 |
Synthesis of the supervisor for discrete event systems under partial observation has been shown exponen-
tial in princi... [more] |
MSS2014-82 SS2014-46 pp.79-84 |
MSS, SS |
2015-01-27 10:00 |
Tottori |
|
Extract Superclass Problem of Workow Nets and Refining the Solution Sohma Nishi, Shingo Yamaguchi (Yamaguchi Univ.) MSS2014-83 SS2014-47 |
We can model a common behavior of two or more workflows as a superclass of them under behavioral inheritance. We have pr... [more] |
MSS2014-83 SS2014-47 pp.85-90 |
MSS, SS |
2015-01-27 10:25 |
Tottori |
|
An approach based on implicit places to refactoring problem of workflow nets Jia Zhang, Ichiro Toyoshima, Shingo Yamaguchi (Yamaguchi Univ.) MSS2014-84 SS2014-48 |
Refactoring is to convert a given workflow net, so as to preserve branching bisimilarity, to another workflow net of it... [more] |
MSS2014-84 SS2014-48 pp.91-96 |
MSS, SS |
2015-01-27 10:50 |
Tottori |
|
Considerations on a Statistical Reduct Method for the Decision Table Yuichi Kato (Shimane Univ.), Tetsuro Saeki (Yamaguchi Univ.), Shoutaro Mizuno (Shimane Univ.) MSS2014-85 SS2014-49 |
[more] |
MSS2014-85 SS2014-49 pp.97-102 |
MSS, SS |
2015-01-27 12:30 |
Tottori |
|
Discussion of a Tool for Supporting Pull Request Driven Software Development Yusuke Saito, Kenji Fujiwara (NAIST), Hiroshi Igaki (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Hajimu Iida (NAIST) MSS2014-86 SS2014-50 |
[more] |
MSS2014-86 SS2014-50 pp.103-108 |
MSS, SS |
2015-01-27 12:55 |
Tottori |
|
Towards Security Analysis based on Traceability Hirokazu Yatsu (Kyushu Univ.), Masaru Matsunami (SDNA), Toshimi Sawada (Thinker's craft house), Takahiro Ando, Kenji Hisazumi (Kyushu Univ.), Kong Weiqiang (DLUT), Akira Fukuda (Kyushu Univ.) |
Usually, security analysis is mainly done at the implementation phase of system development. In this paper, we propose a... [more] |
|
MSS, SS |
2015-01-27 13:35 |
Tottori |
|
Towards the Development of a Formal Language for Frequency of Events Osamu Takaki (Gunma Univ.) MSS2014-87 SS2014-51 |
[more] |
MSS2014-87 SS2014-51 pp.109-114 |