Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2022-03-07 11:45 |
Online |
Online |
Bug Prediction using Partial Results of Software Testing Ryoichi Hirose, Akito Monden (Okayama Univ.), Masateru Tunoda (Kinki Univ.), Mariko sasakura, Kinari Nishiura (Okayama Univ.) SS2021-45 |
[more] |
SS2021-45 pp.19-24 |
SS |
2022-03-07 16:05 |
Online |
Online |
Experimental Evaluation of Software Project Data Recovery from Data Fragments Masaki Nishiwaki, Akito Monden, Mariko Sasakura, Kinari Nishiura (Okayama Univ.) SS2021-52 |
Recently, with the development of information technology, a large amount of data has been generated and its analysis res... [more] |
SS2021-52 pp.60-65 |
MSS, SS |
2017-01-27 11:40 |
Kyoto |
Kyoto Institute of Technology |
Analyzing required software engineering skills in software job ads Hironobu Iwamoto, Akito Monden (Okayama U.) MSS2016-72 SS2016-51 |
(To be available after the conference date) [more] |
MSS2016-72 SS2016-51 pp.89-94 |
MSS, SS |
2017-01-27 13:10 |
Kyoto |
Kyoto Institute of Technology |
Analyzing unreasonable demands in Request For Proposals of software development Tomoaki Sumiyoshi, Akito Monden (Okayama U.) MSS2016-73 SS2016-52 |
(To be available after the conference date) [more] |
MSS2016-73 SS2016-52 pp.95-100 |
MSS, SS |
2017-01-27 13:40 |
Kyoto |
Kyoto Institute of Technology |
Experimental evaluation of cross-project bug prediction Akira Matsui, Akito Monden (Okayama U.) MSS2016-74 SS2016-53 |
(To be available after the conference date) [more] |
MSS2016-74 SS2016-53 pp.101-106 |
DC, SS |
2016-10-28 10:20 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
Software Reuse Detection Focusing on Text in Binary Code Satoshi Watanabe, Akito Monden (Okayama U.), Haruaki Tamada (Kyoto Sangyo U.), Yuichiro Kanzaki (NIT, Kumamoto College) SS2016-31 DC2016-33 |
[more] |
SS2016-31 DC2016-33 pp.79-84 |
DC, SS |
2016-10-28 10:45 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
Software Reuse Detection Using Binary Program Compression Kosuke Kamimura (NAIST), Akito Monden (Okayama Univ.), Hideaki Hata, Kenichi Matsumoto (NAIST) SS2016-32 DC2016-34 |
Open source software (OSS) is obtainable and reusable by anyone, while software plagiarism (i.e. code reuse without lice... [more] |
SS2016-32 DC2016-34 pp.85-90 |
DC, SS |
2016-10-28 11:20 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
Software Bug Analysis Based on Archetypal Analysis Keisuke Takimoto, Akito Monden (Okayama U.), Saya Onoue, Hideaki Hata (NAIST), Yasutaka Kamei (Kyushu U.) SS2016-33 DC2016-35 |
[more] |
SS2016-33 DC2016-35 pp.91-96 |
KBSE |
2013-01-29 16:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Module Classification and Selection for Software Fault Prediction Makoto Mori, Akito Monden (NAIST), Yasutaka Kamei (Kyushu Univ.), Ken-ichi Matsumoto (NAIST) KBSE2012-68 |
To prioritize testing effort, it is important to predict fault-prone modules that are likely to contain a fault.
To bui... [more] |
KBSE2012-68 pp.59-64 |
SS |
2010-03-08 15:20 |
Kagoshima |
Kagoshima Univ. |
Empirical Evaluation of Bug Density Prediction Model to Low Granularity Modules Yasutaka Kamei, Shinsuke Matsumoto, Akito Monden, Ken-ichi Matsumoto (NAIST) SS2009-72 |
To clarify the effects of bug module prediction on integration test,this paper experimentally evaluates the performance ... [more] |
SS2009-72 pp.145-150 |
SS |
2009-12-18 11:30 |
Kagawa |
Kagawa Univ. |
Low Quality Module Prediction from Design Documents Metrics using Software Tag Shinichi Katayama, Kimiharu Ohkura, Kyohei Fushida, Shinji Kawaguchi (NAIST), Masataka Nagura (NAIST/Hitachi), Akito Monden, Hajimu Iida (NAIST) SS2009-46 |
It is important to detect low quality modules which are likely to have many defects at an early development phase for cr... [more] |
SS2009-46 pp.67-72 |
KBSE |
2009-11-27 13:00 |
Shimane |
Shimane Univ. |
An analysis of relationship between software bug and variable name Hiroyuki Yamamoto, Yasutaka Kamei, Shinsuke Matsumoto, Akito Monden, Ken-ichi Matsumoto (NAIST) KBSE2009-42 |
Variable names used in each software module could be used as indicators of software bugs in the module because (1) names... [more] |
KBSE2009-42 pp.67-71 |
KBSE |
2009-11-27 13:35 |
Shimane |
Shimane Univ. |
Detection of Source Code Reuse based on Code Clone Metrics Satoshi Okahara (NAIST), Yuki Manabe (Osaka Univ.), Hiroki Yamauchi, Akito Monden, Ken-ichi Matsumoto (NAIST) KBSE2009-43 |
[more] |
KBSE2009-43 pp.73-78 |
KBSE |
2009-11-27 14:55 |
Shimane |
Shimane Univ. |
An Analysis of How Programmers Use Breakpoint in Debugging Takuro Yoshimura, Yasutaka Kamei (NAIST), Hidetake Uwano (NNCT), Akito Monden, Ken-ichi Matsumoto (NAIST) KBSE2009-45 |
Debugging performance greatly depends on the programmers'debugging skill.
If factors concerning the debugging performan... [more] |
KBSE2009-45 pp.85-90 |
SS |
2009-08-06 14:00 |
Hokkaido |
Kitami Institute of Technology |
Software Classification According to their Functionality based on Used Classes Tomoyoshi Ushimado, Akito Monden (NAIST), Haruaki Tamada (Kyoto Sangyo Univ), Ken-ichi Matsumoto (NAIST) SS2009-17 |
In software development, to implement given functional specifications, developers generally use class files from well-kn... [more] |
SS2009-17 pp.31-36 |
SS |
2008-12-18 14:30 |
Kochi |
Kochi Univiersity of Technology |
Experimentally Deriving Probability of Program Piracy based on Length of Code Clone Satoshi Okahara (Nara Inst. of Sence and Tech.), Yuki Manabe (Osaka Univ.), Hiroki Yamauchi, Akito Monden, Ken-ichi Matsumoto (Nara Inst. of Sence and Tech.), Katsuro Inoue (Osaka Univ.) SS2008-40 |
[more] |
SS2008-40 pp.7-11 |
SS |
2008-10-17 09:20 |
Yamanashi |
University of Yamanashi, Kofu Campus |
An analysis of relationship between code clone length and software reliability Hiroki Sato, Yasutaka Kamei, Hidetake Uwano, Akito Monden, Shinji Kawaguchi, Masataka Nagura, Ken-ichi Matsumoto, Hajimu Iida (NAIST) SS2008-34 |
A code clone that is duplicated code section in source files makes software maintenance more difficult. However, to our ... [more] |
SS2008-34 pp.43-48 |
SS, KBSE |
2006-10-27 09:20 |
Ehime |
Ehime University |
Variable Selection for Effort Estimation based on Similarity of Projects Shinya Taki, Takeshi Kakimoto, Masateru Tsunoda, Naoki Ohsugi, Akito Monden, Ken-ichi Matsumoto (NAIST) |
[more] |
SS2006-49 KBSE2006-25 pp.1-6 |
SS |
2006-04-21 11:40 |
Niigata |
Niigata Univ., Igarashi Campus |
Software Productivity Analysis with respect to Outsourcing Ratio Masateru Tsunoda, Akito Monden (NAIST), Hiroshi Yadohisa (Doshisha Univ.), Nahomi Kikuchi (SEC, IPA), Ken-ichi Matsumoto (NAIST) |
To clarify the relation between controllable attributes of a software development and its productivity, this paper exper... [more] |
SS2006-11 pp.19-24 |
SS |
2006-04-21 12:10 |
Niigata |
Niigata Univ., Igarashi Campus |
A method for recommending software components useful to an ongoing project Yasutaka Kamei, Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, Akito Monden, Ken-ichi Matsumoto (NAIST) |
Many software components have been provided by development platform vendors, for achieving efficient development of high... [more] |
SS2006-12 pp.25-30 |