Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2019-03-04 13:55 |
Okinawa |
|
Proposal of a test description support environment for request acquisition in web application development Yoshitake Nakaji, Choi Eunjong (NAIST), Norihiro Yoshida (Nagoya Univ.), Hajimu Iida (NAIST) SS2018-60 |
In the development of web application, requirements changes are frequently delivered from planners (i.e., people who sug... [more] |
SS2018-60 pp.49-54 |
SS |
2019-03-05 09:50 |
Okinawa |
|
A system for visualizing clone evolution to support clone maintenance Hirotaka Honda, Shogo Tokui, Kazuki Yokoi (Osaka Univ.), Eunjong Choi (NAIST), Norihiro Yoshida (Nagoya Univ.), Katsuro Inoue (Osaka Univ.) SS2018-71 |
Clone Notifier, a code clone change management system, notifies developers about the evolution of code clones such as ad... [more] |
SS2018-71 pp.115-120 |
DC, SS |
2018-10-05 10:00 |
Aichi |
Inuyama City Kokusai-Kanko Center Freud |
Supporting the Generation of State Transition Models in a Requirements Specification Document for an Embedded System Naru Nakamura, Ryota Yamamoto, Norihiro Yoshida, Hiroaki Takada (Nagoya Univ.) SS2018-22 DC2018-23 |
Generally, it is difficult for developers to find all insufficient or inconsistent descriptions in a requirement specifi... [more] |
SS2018-22 DC2018-23 pp.25-30 |
SS |
2018-03-06 15:00 |
Okinawa |
|
An Investigation into the Characteristics of Source Code for Supporting Inline Method Yuki Yamada, Kyohei Uemura, Eunjong Choi (NAIST), Norihiro Yoshida (Nagoya Univ.), Hajimu Iida (NAIST) SS2017-68 |
Inline Method is refactoring which puts a method body into its caller and
remove the method. Although this refactoring ... [more] |
SS2017-68 pp.23-27 |
SS |
2018-03-07 12:00 |
Okinawa |
|
A Determination Method of Locality Sensitive Hashing Parameters for Code Clone Detection Shogo Tokui (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Eunjong Choi (NAIST), Katsuro Inoue (Osaka Univ.) SS2017-74 |
LSH (Locality-Sensitive Hashing) is a near neighbor search algorithm that performs probabilistic hashing of high-dimensi... [more] |
SS2017-74 pp.57-62 |
SS, DC |
2017-10-19 17:35 |
Kochi |
Kochi City Culture-plaza CUL-PORT |
An Empirical Study of Correction Candidates in a Requirements Specification Document for an Embbeded System Ryota Yamamoto, Norihiro Yoshida, Hiroaki Takada (Nagoya Univ.) SS2017-29 DC2017-28 |
Software developers tend to write incorrect/ambiguous expressions in a document. Incorrect/ambiguous expressions often c... [more] |
SS2017-29 DC2017-28 pp.49-54 |
SS, KBSE, IPSJ-SE [detail] |
2017-07-20 15:25 |
Hokkaido |
|
On the Extraction of State Transition Tables from an Embedded Software System and Analysis Support Ryota Yamamoto, Norihiro Yoshida (Nagoya Univ.), Nao Aoki (JASA), Hiroaki Takada (Nagoya Univ.) SS2017-16 KBSE2017-16 |
It is hard to understand legacy code for an embedded software system. It leads much cost for maintaining and reusing the... [more] |
SS2017-16 KBSE2017-16 pp.133-138 |
SS |
2017-03-09 16:55 |
Okinawa |
|
An Investigation of Extract Method to Construct Prediction Model Based on Process Metrics Daiki Tanaka, Eunjong Choi (NAIST), Norihiro Yoshida (Nagoya Univ.), Kenji Fujiwara (NITTC), Hajimu Iida (NAIST) SS2016-73 |
[more] |
SS2016-73 pp.79-84 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-13 10:50 |
Hokkaido |
|
Extracting State Transition Tables from an Embedded Software System Ryota Yamamoto, Norihiro Yoshida (Nagoya Univ.), Akihiko Takeda (JASA), Nobuyuki Tachi, Hiroaki Takada (Nagoya Univ.) SS2016-3 KBSE2016-9 |
It is hard to understand legacy code for an embedded software system. It leads much cost for maintaining and reusing the... [more] |
SS2016-3 KBSE2016-9 pp.13-18 |
KBSE, SS, IPSJ-SE [detail] |
2016-07-14 09:40 |
Hokkaido |
|
Investigating the effectiveness of function clone detection tool for simultaneous fixing of defects Seiya Numata (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Eunjong Choi (NAIST), Katsuro Inoue (Osaka Univ.) SS2016-7 KBSE2016-13 |
Code clone (i.e., code fragment that has identical or similar fragment in source code) is one of the factors that makes... [more] |
SS2016-7 KBSE2016-13 pp.77-82 |
ET |
2016-06-11 13:50 |
Aichi |
Nagoya Institute of Technology |
Developing Educational Embbededd Programming Material Through Academia-Industry Collaboration Ryota Morisaki (Okayama Prefectural Univ.), Norihiro Yoshida (Nagoya Univ.), Sousuke Amasaki (Okayama Prefectural Univ.), Yoshifumi Karube (Afrel), Hiroaki Takada (Nagoya Univ.) ET2016-14 |
[more] |
ET2016-14 pp.37-40 |
SS |
2016-03-11 09:00 |
Okinawa |
|
An Empirical Study of the Severity of Code Smell Using a Refactoring Dataset Tsubasa Saika, Eunjong Choi (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Shusuke Haruna, Katsuro Inoue (Osaka Univ.) SS2015-91 |
Code smells are structures in the code that suggest the possibility of refactoring. To prioritize code smells in large-s... [more] |
SS2015-91 pp.91-96 |
VLD |
2016-02-29 13:30 |
Okinawa |
Okinawa Seinen Kaikan |
Tool Support for Verifying Large Scale Hardware Design with Verilog-HDL Yuta Morimitsu, Tomoyuki Yokogawa (Okayama Prefectural Univ.), Masafumi Kondo, Hisashi Miyazaki (Kawasaki Univ. of Medical Welfare), Yoichiro Sato, Kazutami Arimoto (Okayama Prefectural Univ.), Norihiro Yoshida (Nagoya Univ.) VLD2015-111 |
In this paper, we developed a tool supporting formal verification of large scale hardware design described by Verilog-HD... [more] |
VLD2015-111 pp.1-6 |
DC, SS |
2015-10-14 09:30 |
Nara |
Todaiji Culture Center (Nara) |
An investigation into the behavior of the novice programmers based on build histories in Software Development Practice Naoki Kawashima, Kenji Fujiwara (NAIST), Hiroshi Igaki (OIT), Norihiro Yoshida (NU), Hajimu Iida (NAIST) SS2015-40 DC2015-30 |
Building is one of the most important parts of software development process.
However, since it is rarely taught about b... [more] |
SS2015-40 DC2015-30 pp.29-34 |
SS |
2015-05-12 08:45 |
Kumamoto |
Kumamoto University |
Coding Pattern Detection for C Programs Using Pattern Mining Technique Yuta Nakamura, Eunjong Choi (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Shusuke Haruna, Katsuro Inoue (Osaka Univ.) SS2015-9 |
Coding pattern is an idiomatic code fragment that distributes in modules. It can be used for finding bugs because it imp... [more] |
SS2015-9 pp.41-46 |
MSS, SS |
2015-01-27 12:30 |
Tottori |
|
Discussion of a Tool for Supporting Pull Request Driven Software Development Yusuke Saito, Kenji Fujiwara (NAIST), Hiroshi Igaki (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Hajimu Iida (NAIST) MSS2014-86 SS2014-50 |
[more] |
MSS2014-86 SS2014-50 pp.103-108 |
ET |
2014-10-18 14:40 |
Ishikawa |
Kanazawa Univ. (Kakuma Campus) |
A Comparison of the Programming Behavior by Novices Between the Japanese and Thai Universities Erina Makihara, Kenji Fujiwara (NAIST), Putchong Uthayopas, Chantana Chantrapornchai, Jittat Fakcharoenphol (Kasetsart Univ.), Hiroshi Igaki (Osaka Univ.), Norihiro Yoshida (Nagoya Univ.), Hajimu Iida (NAIST) ET2014-46 |
In the educational technology field, several studies have been done on the analysis of programming behaviors of novices.... [more] |
ET2014-46 pp.47-52 |
SS |
2014-05-08 14:20 |
Mie |
ISE SHIMIN - KATSUDOU Center |
An investigation of refactoring performed in combination Tsubasa Saika, Eunjong Choi, Akira Goto (Osaka univ.), Norihiro Yoshida (Nagoya Univ.), Katsuro Inoue (Osaka univ.) SS2014-1 |
Numerous tools that support refactoring have been proposed. However, existing refactoring support tools do not support c... [more] |
SS2014-1 pp.1-6 |
SS |
2014-03-11 16:30 |
Okinawa |
Tenbusu Naha |
Supporting Task Level Commit Pattern with using Fine-Grained Version History Koichi Umekawa, Hiroshi Igaki (Osaka Univ.), Norihiro Yoshida (NAIST), Katsuro Inoue (Osaka Univ.) SS2013-82 |
[more] |
SS2013-82 pp.61-66 |
KBSE |
2013-11-01 14:45 |
Ehime |
Ehime University |
A Discussion on the Analysis of Design Pattern Instances Using File Modification Records Daichi Urata, Norihiro Yoshida, Kenji Fujiwara, Hajimu Iida (NAIST) KBSE2013-55 |
Design patterns are general solutions to common problems in software design. However, it has been reported that they are... [more] |
KBSE2013-55 pp.13-18 |