|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE, SS, IPSJ-SE [detail] |
2015-07-22 17:10 |
Hokkaido |
|
A Representation and Visualization Method for Source Code Change Impact Analysis Tateo Okubo (Iwate Pref Univ), Kazuya Fukuhara (i-MOS), Youta Haresawa, Toshimitsu Inomata, Yoshikazu Arai, Shintaro Imai (Iwate Pref Univ) SS2015-19 KBSE2015-12 |
In software development, even if a portion of a source code is changed,a programmer has to test the whole software again... [more] |
SS2015-19 KBSE2015-12 pp.51-56 |
KBSE |
2011-09-22 11:15 |
Overseas |
Ocean Grand Hotel Jeju |
A Survival Analysis of Code Change focusing on Code Dependency and Code Clone Ryohei Asano, Myrizki Sandhi Yudha, Hirohisa Aman (Ehime Univ) KBSE2011-35 |
Generally, software evolutions including quality improvements and feature developments
are undergone through the source... [more] |
KBSE2011-35 pp.67-72 |
KBSE |
2011-05-26 16:45 |
Kagawa |
Kagawa University |
On Chain of Code Changes and Its Rate of Occurrence in Open Source Development Ryohei Asano, Hirohisa Aman (Ehime Univ.) KBSE2011-6 |
In consecutive upgrades of a source code,some upgrade spots (code fragments) are overlapped: that is, ``chain of code ch... [more] |
KBSE2011-6 pp.31-36 |
SS |
2011-03-08 13:55 |
Okinawa |
Okinawa-ken Seinen Kaikan |
Interaction Histories Mining for Software Change Guide Nozomu Kato, Takashi Kobayashi, Kiyoshi Agusa (Nagoya Univ.) SS2010-77 |
Software system consists of software artifacts, which are source code, documents, configuration files etc. Since artifac... [more] |
SS2010-77 pp.145-150 |
SS |
2008-03-03 14:35 |
Nagasaki |
Nagasaki Univ. |
Token Comparison Approach to Detect Code Clone-related Bugs Yii Yong Lee, Yasuhiro Hayase, Makoto Matsushita, Katsuro Inoue (Osaka Univ.) SS2007-64 |
Large software tends to have a significant amount of similar code, commonly known as code clones. Often the code clones ... [more] |
SS2007-64 pp.43-48 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|