Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE, SS, IPSJ-SE [detail] |
2024-07-27 09:45 |
Hokkaido |
(Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Rio Kishimoto (Osaka Univ.), Tetsuya Kanda (Notre Dame Seishin Univ.), Yuki Manabe (The Univ. of Fukuchiyama), Katsuro Inoue (Nanzan Univ.), Shi Qiu (Toshiba), Yoshiki Higo (Osaka Univ.) SS2024-11 KBSE2024-17 |
(To be available after the conference date) [more] |
SS2024-11 KBSE2024-17 pp.61-66 |
SS |
2024-03-08 13:55 |
Okinawa |
(Okinawa, Online) (Primary: On-site, Secondary: Online) |
Analysis of Stack Overflow Questions on the Use of SBOM Wataru Otoda, Tetsuya Kanda (Osaka Univ.), Yuki Manabe (The Univ. of Fukuchiyama), Katsuro Inoue (Nanzan Univ.), Yoshiki Higo (Osaka Univ.) SS2023-70 |
(To be available after the conference date) [more] |
SS2023-70 pp.127-132 |
SS, KBSE, IPSJ-SE [detail] |
2023-07-21 11:00 |
Hokkaido |
(Hokkaido, Online) (Primary: On-site, Secondary: Online) |
A tool for vulnerability assessment and checksum verification using SPDX documents Rio Kishimoto, Tetsuya Kanda (Osaka Univ.), Yuki Manabe (The Univ. of Fukuchiyama), Katsuro Inoue (Nanzan Univ.), Yoshiki Higo (Osaka Univ.) SS2023-8 KBSE2023-19 |
Libraries are widely used in recent software development, but their management is insufficient, and there are problems s... [more] |
SS2023-8 KBSE2023-19 pp.43-48 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-29 16:00 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Investigation of open source Android application buildability Yo Koike (Osaka Univ.), Yuki Manabe (The Univ of Fukuchiyama), Makoto Matsushita (Osaka Univ.), Katsuro Inoue (Nanzan Univ) SS2022-15 KBSE2022-25 |
Building of Open source software often fail and require modifications. Prior studies have shown that more than half of J... [more] |
SS2022-15 KBSE2022-25 pp.85-90 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-30 11:20 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
SPDX file generation tool for Debian packages including dependency relations Taketo Tanabe (Osaka Univ.), Yuki Manabe (Fukuchiyama Univ.), Tetsuya Kanda (Osaka Univ.), Katsuro Inoue (Nanzan Univ.) SS2022-20 KBSE2022-30 |
In recent years, the Software Bill of Materials (SBoM) has been increasingly adopted to manage risks in the supply chain... [more] |
SS2022-20 KBSE2022-30 pp.115-120 |
KBSE, IPSJ-SE, SS [detail] |
2021-07-09 14:40 |
Online |
Online (Zoom) (Online) |
Investigation of OSS copyright notices using fine-grained analysis Taketo Tanabe, Katsuro Inoue (Osaka Univ.) SS2021-11 KBSE2021-23 |
A copyright notice is a comment at the top of a file indicating the copyright owner of the source code. In the case of O... [more] |
SS2021-11 KBSE2021-23 pp.57-62 |
SS, IPSJ-SE |
2020-07-02 10:55 |
Online |
Online (Online) |
A Proposal for a SaaS-based Code Clone Analysis Environmentwith an Extensible Architecture Kazuki Matsushima, Katsuro Inoue (Osaka Univ.) SS2020-1 |
Many studies on tools for efficient code clone analysis have been conducted in the past. However, thesetools have some i... [more] |
SS2020-1 pp.1-6 |
DC, SS |
2019-10-25 10:00 |
Kumamoto |
Kumamoto Univ. (Kumamoto) |
Finding groups of similar answers in programming contests with source code metrics. Kosuke Haraguchi, Tetsuya Kanda, Katsuro Inoue (Osaka Univ.) SS2019-21 DC2019-49 |
Many users participate in programming contests to learn algorithm and improve programming skills.
In the existing stud... [more] |
SS2019-21 DC2019-49 pp.47-52 |
KBSE, SS, IPSJ-SE [detail] |
2019-07-13 14:45 |
Hokkaido |
(Hokkaido) |
Source Code Evaluation Method by Machine Learning using Source Code Feature Metrics Keisuke Makihara, Makoto Matsushita, Katsuro Inoue (Osaka Univ.) SS2019-5 KBSE2019-15 |
We propose a method to evaluate source codes quantitively and automatically using machine learning. In this method, we c... [more] |
SS2019-5 KBSE2019-15 pp.105-110 |
KBSE, SS, IPSJ-SE [detail] |
2019-07-14 10:50 |
Hokkaido |
(Hokkaido) |
A Method for Comparison and Visualization of Code Clone Detection Results Kazuki Matsushima, Katsuro Inoue (Osaka Univ.) SS2019-12 KBSE2019-22 |
Many techniques for automatic code clone detection have been proposed and implemented as clone detection in the past. Ho... [more] |
SS2019-12 KBSE2019-22 pp.147-152 |
SS |
2019-03-05 09:50 |
Okinawa |
(Okinawa) |
A system for visualizing clone evolution to support clone maintenance Hirotaka Honda, Shogo Tokui, Kazuki Yokoi (Osaka Univ.), Eunjong Choi (NAIST), Norihiro Yoshida (Nagoya Univ.), Katsuro Inoue (Osaka Univ.) SS2018-71 |
Clone Notifier, a code clone change management system, notifies developers about the evolution of code clones such as ad... [more] |
SS2018-71 pp.115-120 |
SS |
2019-03-05 10:25 |
Okinawa |
(Okinawa) |
A Study on Similarity of Modifications to Technical Debt Focusing on Source Code Comments Saki Okajima, Tetsuya Kanda, Katsuro Inoue (Osaka Univ.) SS2018-72 |
[more] |
SS2018-72 pp.121-126 |
KBSE, SS, IPSJ-SE [detail] |
2018-07-18 09:40 |
Hokkaido |
(Hokkaido) |
Proposal of a usage investigation tool of similar coding pattern Koki Ogasawara, Tetsuya Kanda, Katsuro Inoue (Osaka Univ) SS2018-1 KBSE2018-11 |
Coding pattern is a code snippet that appears repeatedly in source code. Reusing coding pattern helps software developer... [more] |
SS2018-1 KBSE2018-11 pp.1-6 |
SS |
2018-03-07 12:00 |
Okinawa |
(Okinawa) |
A Determination Method of Locality Sensitive Hashing Parameters for Code Clone Detection Shogo Tokui (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Eunjong Choi (NAIST), Katsuro Inoue (Osaka Univ.) SS2017-74 |
LSH (Locality-Sensitive Hashing) is a near neighbor search algorithm that performs probabilistic hashing of high-dimensi... [more] |
SS2017-74 pp.57-62 |
MSS, SS |
2017-01-26 10:30 |
Kyoto |
Kyoto Institute of Technology (Kyoto) |
Towards Move Method Refactoring Recommendation using Change Task Context Naoya Ujihara, Ali Ouni, Takashi Ishio, Katsuro Inoue (Osaka Univ.) MSS2016-58 SS2016-37 |
Move Method Refactoring is an effective technique to improve software quality. In this research, we have developed a ref... [more] |
MSS2016-58 SS2016-37 pp.7-12 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-14 09:40 |
Hokkaido |
(Hokkaido) |
Investigating the effectiveness of function clone detection tool for simultaneous fixing of defects Seiya Numata (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Eunjong Choi (NAIST), Katsuro Inoue (Osaka Univ.) SS2016-7 KBSE2016-13 |
Code clone (i.e., code fragment that has identical or similar fragment in source code) is one of the factors that makes... [more] |
SS2016-7 KBSE2016-13 pp.77-82 |
SS |
2016-03-11 09:00 |
Okinawa |
(Okinawa) |
An Empirical Study of the Severity of Code Smell Using a Refactoring Dataset Tsubasa Saika, Eunjong Choi (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Shusuke Haruna, Katsuro Inoue (Osaka Univ.) SS2015-91 |
Code smells are structures in the code that suggest the possibility of refactoring. To prioritize code smells in large-s... [more] |
SS2015-91 pp.91-96 |
SS |
2015-05-12 08:45 |
Kumamoto |
Kumamoto University (Kumamoto) |
Coding Pattern Detection for C Programs Using Pattern Mining Technique Yuta Nakamura, Eunjong Choi (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Shusuke Haruna, Katsuro Inoue (Osaka Univ.) SS2015-9 |
Coding pattern is an idiomatic code fragment that distributes in modules. It can be used for finding bugs because it imp... [more] |
SS2015-9 pp.41-46 |
SS |
2015-03-09 15:20 |
Okinawa |
OKINAWAKEN SEINENKAIKAN (Okinawa) |
Suggestion of the source code reuse analysis technique in multiple projects based on the clone genealogy Takuya Moriwaki, Keisuke Hotta, Hiroshi Igaki, Katsuro Inoue, Shinji Kusumoto (Osaka Univ.) SS2014-65 |
In the software industry and OSS projects, it is said that source code reuse could improve productivity and reliability ... [more] |
SS2014-65 pp.61-66 |
SS |
2015-03-10 11:00 |
Okinawa |
OKINAWAKEN SEINENKAIKAN (Okinawa) |
Cause Analysis of transition in the Accessibility Excessiveness of using a Development History of Java Programs Riku Ohnisi (Osaka Univ.), Kazuo Kobori (NTT DATA), Makoto Matsushita, Katsuro Inoue (Osaka Univ.) SS2014-72 |
In Java, access modiers are used to ensure encapsulation for maintainability or reusability of programs.However, there ... [more] |
SS2014-72 pp.103-108 |