DSpace/Manakin Repository

情報科学研究科 / Graduate School of Information Science

情報科学研究科 / Graduate School of Information Science

 

最新登録資料

  • Duong, Quang-Thang; Okada, Minoru (The Institute of Electronics, Information and Communication Engineers, 2018-10-01)
    This paper investigates receive power control for multiuser inductive power transfer (IPT) systems with a single-frequency coil array. The primary task is to optimize the transmit coil currents to minimize the total input ...
  • Nakamura, Masahide; Monden, Akito; Itoh, Tomoaki; Matsumoto, Ken-ichi; Kanzaki, Yuichiro; Satoh, Hirotsugu (IEEE, 2003)
    We present a method to estimate the cost of mental (hand) simulation of programs. In mental simulation, human short term memory is extensively used to recall and memorize values of variables. When the simulation reaches a ...
  • Kanzaki, Yuichiro; Monden, Akito; Nakamura, Masahide; Matsumoto, Ken-ichi (IEEE, 2003)
    In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to ...
  • Igaki, Hiroshi; Nakamura, Masahide; Matsumoto, Ken-ichi (IEEE, 2005)
    In the next-generation home network systems (HNS), interoperability among multi-vendor appliances is a challenging issue to implement value-added integrated services. This paper presents a service-oriented framework to ...
  • Monden, Akito; Iida, Hajimu; Matsumoto, Kenichi; Inoue, Katsuro; Torii, Koji (IEEE, 2000)
    Java programs distributed through the Internet are now suffering from program theft. This is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. ...
  • Todorov, Boris; Kula, Raula Gaikovina; Ishio, Takashi; Inoue, Katsuro (IEEE, 2017)
    In software development, software reuse has become a pivotal factor in creating and providing high-quality software at a reduced cost. The reuse of a code creates dependencies, which as they increase over time become ...
  • Morisaki, Shuji; Monden, Akito; Matsumura, Tomoko; Tamada, Haruaki; Matsumoto, Ken-ichi (IEEE, 2007)
    This paper describes an empirical study to reveal rules associated with defect correction effort. We defined defect correction effort as a quantitative (ratio scale) variable, and extended conventional (nominal scale based) ...
  • Kamei, Yasutaka; Monden, Akito; Matsumoto, Shinsuke; Kakimoto, Takeshi; Matsumoto, Ken-ichi (IEEE, 2007)
    The goal of this paper is to improve the prediction performance of fault-prone module prediction models (fault-proneness models) by employing over/under sampling methods, which are preprocessing procedures for a fit dataset. ...
  • Shihab, Emad; Ihara, Akinori; Kamei, Yasutaka; Ibrahim, Walid M.; Ohira, Masao; Adams, Bram; Hassan, Ahmed E.; Matsumoto, Ken-ichi (IEEE, 2010)
    Bug fixing accounts for a large amount of the software maintenance resources. Generally, bugs are reported, fixed, verified and closed. However, in some cases bugs have to be re-opened. Re-opened bugs increase maintenance ...
  • Matsumoto, Shinsuke; Kamei, Yasutaka; Monden, Akito; Matsumoto, Ken-ichi (IEEE, 2007)
    In this paper, we experimentally evaluated the effect of outlier detection methods to improve the prediction performance of fault-proneness models. Detected outliers were removed from a fit dataset before building a model. ...
  • Tsunoda, Masateru; Matsumura, Tomoko; Matsumoto, Ken-ichi (IEEE, 2010)
    Recently, software size becomes larger, and consequently, not only a software developer but also a software purchaser suffers considerable losses by software project failure. So avoiding project failure is also important ...
  • Uwano, Hidetake; Monden, Akito; Matsumoto, Ken-ichi (IEEE, 2008)
    To build high-reliability software in software development, software review is essential. Typically, software review requires documents from multiple phases such as requirements specification, design document and source ...
  • Nakamura, Masahide; Tanaka, Akihiro; Igaki, Hiroshi; Tamada, Haruaki; Matsumoto, Ken-ichi (IEEE, 2006)
    This paper presents a framework that adapts the conventional home electric appliances with the infrared remote controls (legacy appliances) to the emerging home network system (HNS). The proposed method extensively uses ...
  • Igaki, Hiroshi; Nakamura, Masahide; Matsumoto, Ken-ichi; Aoyama, Mikio (IEEE, 2006)
    The technology of a home network system (HNS) allows integration of several kinds of home appliances to provide a user with value-added integrated services. Development of the integrated HNS services requires implementation ...
  • Akinaga, Tomohiro; Ohsugi, Naoki; Tsunoda, Masateru; Kakimoto, Takeshi; Monden, Akito; Matsumoto, Ken-ichi (IEEE, 2005)
    Software engineers have to select some appropriate development technologies to use in the work; however, engineers sometimes cannot find the appropriate technologies because there are vast amount of options today. To solve ...
  • Leelaprute, Pattara; Nakamura, Masahide; Tsuchiya, Tatsuhiro; Matsumoto, Ken-ichi; Kikuno, Tohru (IEEE, 2005)
    This paper presents a framework to specify and verify integrated services of a home network system (HNS). We first develop a modeling language to describe the HNS and the integrated services. Complementing our previous ...
  • Ohira, Masao; Ohoka, Tetsuya; Kakimoto, Takeshi; Ohsugi, Naoki; Matsumoto, Ken-ichi (IEEE, 2005)
    The scale-free network shown in the small world phenomenon indicates that our human society consists of a small number of people who play the role of hubs linked with many nodes (persons) and a large number of people as ...
  • Saito, Yasuhiro; Monden, Akito; Matsumoto, Kenichi (IEEE, 2012)
    In the beginning of a contracted based software development project, the RFP is provided by a software user company and used as an initial system requirements specification to ask software developer companies to propose ...
  • Hata, Hideaki; Mizuno, Osamu; Kikuno, Tohru (IEEE, 2012)
    There have been many bug prediction models built with historical metrics, which are mined from version histories of software modules. Many studies have reported the effectiveness of these historical metrics. For prediction ...
  • Monden, Akito; Keung, Jacky; Morisaki, Shuji; Kamei, Yasutaka; Matsumoto, Ken-Ichi (IEEE, 2012)
    Background: Association rules are more comprehensive and understandable than fault-prone module predictors (such as logistic regression model, random forest and support vector machine). One of the challenges is that there ...

View more