Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SWIM, KBSE |
2023-05-19 15:55 |
Shizuoka |
(Shizuoka, Online) (Primary: On-site, Secondary: Online) |
Method for Modeling of Anti Patterns for Machine Learning Projects Hironori Takeuchi (Musashi Univ.), Shinpei Ogata (Shinshu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Hiroyuki Nakagawa (Osaka Univ.), Shuichiro Yamamoto (ITPUTN) KBSE2023-4 SWIM2023-4 |
[more] |
KBSE2023-4 SWIM2023-4 pp.21-26 |
KBSE, SC |
2022-11-04 13:35 |
Nagano |
(Nagano, Online) (Primary: On-site, Secondary: Online) |
Investigation of Bad Smells for Machine Learning Projects Hironori Takeuchi (Musashi Univ.), Shinpei Ogata (Shinshu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Hiroyuki Nakagawa (Osaka Univ.) KBSE2022-31 SC2022-26 |
[more] |
KBSE2022-31 SC2022-26 pp.1-6 |
KBSE, SC |
2022-11-04 14:05 |
Nagano |
(Nagano, Online) (Primary: On-site, Secondary: Online) |
Soshi Nitta, Hiroyuki Nakagawa (Osaka Univ.), Shinpei Ogata (Shinshu Univ.), Hironori Takeuchi (Musashi Univ.), Haruhiko Kaiya (Kanagawa Univ.), Tatsuhiro Tsuchiya (Osaka Univ.) KBSE2022-39 SC2022-34 |
[more] |
KBSE2022-39 SC2022-34 pp.48-53 |
SC |
2022-05-27 13:00 |
Online |
Online (Online) |
Constructing Knowledge for Machine Learning Projects Using Decision Process Model Hironori Takeuchi (Musashi Univ.), Shinpei Ogata (Shinshu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Hiroyuki Nakagawa (Osaka Univ.) SC2022-6 |
[more] |
SC2022-6 pp.31-36 |
KBSE, SWIM |
2021-05-22 11:00 |
Online |
Online (Online) |
Enterprise Architecture-based Agile Development Model for Machine Learning Service Systems Hironori Takeuchi (Musashi Univ.), Shinpei Ogata (Shinsyu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Hiroyuki Nakagawa (Osaka Univ.) KBSE2021-8 SWIM2021-8 |
[more] |
KBSE2021-8 SWIM2021-8 pp.44-49 |
KBSE |
2018-03-01 15:50 |
Okinawa |
(Okinawa) |
Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50 |
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] |
KBSE2017-50 pp.67-72 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-13 14:40 |
Hokkaido |
(Hokkaido) |
Analyzing Goal Dependencies among Actors using their Domain Model Haruhiko Kaiya (Kanagawa Univ.) SS2016-4 KBSE2016-10 |
Information systems are introduced into social activities performed by human and organizations.
Such activities and sy... [more] |
SS2016-4 KBSE2016-10 pp.43-48 |
KBSE |
2015-09-25 11:15 |
Osaka |
Bldg.A No.110, IST, Suita campus, Osaka University (Osaka) |
Towards Separation of Concerns in Screen Transition Modeling
-- Case of Business and Usability Features -- Shinpei Ogata, Shohei Kamimori (Shinshu Univ.), Haruhiko Kaiya (Kanagawa Univ.), Kozo Okano (Shinshu Univ.) KBSE2015-33 |
For requirements analysis in business Web application development employing model driven development approaches, an appr... [more] |
KBSE2015-33 pp.33-38 |
KBSE, SS, IPSJ-SE [detail] |
2015-07-23 10:40 |
Hokkaido |
(Hokkaido) |
Proposal of EMSsec-Common Problem for Security and Privacy Takao Okubo (IISEC), Haruhiko Kaiya (Kanagawa Univ.), Hironori Washizaki (Waseda Univ.), Shinpei Ogata (Shinshu Univ.), Yoshio Kakizaki (Dendai Univ.), Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) SS2015-22 KBSE2015-15 |
[more] |
SS2015-22 KBSE2015-15 pp.69-74 |
KBSE |
2015-03-05 15:25 |
Tokyo |
The University of Electro-Communications (Tokyo) |
A Case-based Management System for Secure Software Development Using Software Security Knowledge Masahito Saito, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-57 |
In recent years, importance on software security technologies has been recognized and various types of the technologies ... [more] |
KBSE2014-57 pp.31-36 |
KBSE |
2015-01-27 11:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
Case base of secure web application development using software security knowledge base Atsuo Hazeyama, Masahito Saito (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Azusa Kumagaya (Tokyo Gakugei Univ.), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-47 |
Importance for software security technologies has been recognized according to increase of services on the Internet. Var... [more] |
KBSE2014-47 pp.49-54 |
KBSE |
2014-03-06 13:40 |
Okinawa |
Okinawaken-Seinenkaikan (Okinawa) |
Mining of IR method for Traceability Link Recovery Ryouhei Yuasa, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ) KBSE2013-83 |
[more] |
KBSE2013-83 pp.25-30 |
KBSE |
2014-03-07 12:35 |
Okinawa |
Okinawaken-Seinenkaikan (Okinawa) |
An Android Application Analysis Method for Highlighting Disclosure of Fine-Grained User Information Takuya Sakashita, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-93 |
We have proposed a static analysis method of android application to highlight the user information disclosed by the appl... [more] |
KBSE2013-93 pp.85-90 |
KBSE |
2014-01-28 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg (Tokyo) |
Recovering Traceability for using information retrieved methods Yuhto Tomii, Kenji Kaijiri, Haruhiko Kaiya, Shinpei Ogata (Shinshu Univ.) KBSE2013-75 |
[more] |
KBSE2013-75 pp.59-63 |
KBSE |
2014-01-28 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg (Tokyo) |
The proposal of the technique of selecting the optimal Error-prone module prediction Hideaki Uchimiya, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-77 |
Although various techniques are proposed by Error prone module prediction, there is no technique of becoming the optimal... [more] |
KBSE2013-77 pp.71-76 |
KBSE |
2013-05-30 16:15 |
Kanagawa |
Keio University (Kanagawa) |
Proposal of method mining for the Traceability link recovery Takeyuki Ueda, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-5 |
We propose a new method for finding appropriate methods from a variety of methods of the traceability link recovery, and... [more] |
KBSE2013-5 pp.25-30 |
KBSE |
2013-05-30 17:00 |
Kanagawa |
Keio University (Kanagawa) |
A Screen Transition Model for Evaluating Usability Focusing on Function for Saving Inputs Hiroki Hayakawa, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Univ.) KBSE2013-6 |
Usability is important to attract consumers of e-commerce site, etc. A user often re-inputs data by mistakes or by chang... [more] |
KBSE2013-6 pp.31-36 |
KBSE |
2013-03-14 14:10 |
Tokyo |
Shibaura Institute of Technology (Tokyo) |
Supporting tool for security requirements analysis using asset flows and deployment diagrams Yusuke Takizawa, Junya Sakai, Haruhiko Kaiya, Shinpei Ogata, Kenji Kaijiri (Sinshu Univ.) KBSE2012-74 |
[more] |
KBSE2012-74 pp.31-36 |
KBSE |
2012-11-22 16:05 |
Ishikawa |
Kanazawa University (Ishikawa) |
Security Requirements Analysis under Bring Your Own Device Yuuji Suzuki, Haruhiko Kaiya, Shinpei Ogata (SU), Takao Okubo, Nobuyuki Kanaya (Fujitsu Lab.), Nobukazu Yoshioka (NII) KBSE2012-47 |
[more] |
KBSE2012-47 pp.55-60 |
KBSE, SS |
2012-07-27 14:00 |
Hokkaido |
Future University Hakodate (Hokkaido) |
Evaluation of Error Prone Prediction method by using majority rule Toshihide Takahashi, Tatusya Ohnishi, Shinpei Ogata, Haruhiko Kaiya, Kenji Kaijiri (Shinshu Uni.) SS2012-14 KBSE2012-16 |
[more] |
SS2012-14 KBSE2012-16 pp.25-30 |