Updated on 2024/02/01

写真a

 
MONDEN Akito
 
Organization
Faculty of Environmental, Life, Natural Science and Technology Professor
Position
Professor
External link

Degree

  • 博士(工学) ( 奈良先端科学技術大学院大学 )

Research Interests

  • Empirical Software Engineering

  • Software Protection

  • 実証的ソフトウェア工学

  • ソフトウェアプロテクション

Research Areas

  • Informatics / Software

Education

  • Nara Institute of Science and Technology   情報科学研究科  

    - 1998

      More details

    Country: Japan

    researchmap

  • Nagoya University   工学部   電気工学科

    - 1994

      More details

    Country: Japan

    researchmap

Research History

  • Nara Institute of Science and Technology

    2015 - 2017

      More details

  • Visiting Professor,Nara Institute of Science and Technology

    2015 - 2017

      More details

  • - Professor,Graduate School of Natural Science and Technology,Okayama University

    2015

      More details

  • - 岡山大学自然科学研究科 教授

    2015

      More details

  • Nara Institute of Science and Technology

    2007 - 2015

      More details

  • Associate Professor,Nara Institute of Science and Technology

    2007 - 2015

      More details

  • Nara Institute of Science and Technology

    2004 - 2007

      More details

  • Associate Professor,Nara Institute of Science and Technology

    2004 - 2007

      More details

  • ニュージーランド オークランド大学 Honorary Research Fellow

    2003 - 2004

      More details

  • Honorary Research Fellow,The University of Auckland

    2003 - 2004

      More details

  • Nara Institute of Science and Technology

    1998 - 2004

      More details

  • Research Associate,Nara Institute of Science and Technology

    1998 - 2004

      More details

▼display all

Professional Memberships

▼display all

 

Papers

  • Task estimation for software company employees based on computer interaction logs Reviewed

    Florian Pellegrin, Zeynep Yücel, Akito Monden, Pattara Leelaprute

    Empir. Softw. Eng.   26 ( 5 )   98 - 98   2021.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10664-021-10006-4

    researchmap

  • On the relative value of data resampling approaches for software defect prediction Reviewed

    Kwabena Ebo Bennin, Jacky W. Keung, Akito Monden

    Empirical Software Engineering   24 ( 2 )   602 - 636   2019.4

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer New York LLC  

    Software defect data sets are typically characterized by an unbalanced class distribution where the defective modules are fewer than the non-defective modules. Prediction performances of defect prediction models are detrimentally affected by the skewed distribution of the faulty minority modules in the data set since most algorithms assume both classes in the data set to be equally balanced. Resampling approaches address this concern by modifying the class distribution to balance the minority and majority class distribution. However, very little is known about the best distribution for attaining high performance especially in a more practical scenario. There are still inconclusive results pertaining to the suitable ratio of defect and clean instances (Pfp), the statistical and practical impacts of resampling approaches on prediction performance and the more stable resampling approach across several performance measures. To assess the impact of resampling approaches, we investigated the bias and effect of commonly used resampling approaches on prediction accuracy in software defect prediction. Analyzes of six resampling approaches on 40 releases of 20 open-source projects across five performance measures and five imbalance rates were performed. The experimental results obtained indicate that there were statistical differences between the prediction results with and without resampling methods when evaluated with the geometric-mean, recall(pd), probability of false alarms(pf ) and balance performance measures. However, resampling methods could not improve the AUC values across all prediction models implying that resampling methods can help in defect classification but not defect prioritization. A stable Pfp rate was dependent on the performance measure used. Lower Pfp rates are required for lower pf values while higher Pfp values are required for higher pd values. Random Under-Sampling and Borderline-SMOTE proved to be the more stable resampling method across several performance measures among the studied resampling methods. Performance of resampling methods are dependent on the imbalance ratio, evaluation measure and to some extent the prediction model. Newer oversampling methods should aim at generating relevant and informative data samples and not just increasing the minority samples.

    DOI: 10.1007/s10664-018-9633-6

    Scopus

    researchmap

  • MAHAKIL: Diversity Based Oversampling Approach to Alleviate the Class Imbalance Issue in Software Defect Prediction Reviewed

    Kwabena Ebo Bennin, Jacky Keung, Passakorn Phannachitta, Akito Monden, Solomon Mensah

    IEEE Transactions on Software Engineering   44 ( 6 )   534 - 550   2018.6

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers (IEEE)  

    DOI: 10.1109/tse.2017.2731766

    researchmap

  • Fault-proneモジュール予測における第三者データに基づいた外れ値除去 Reviewed

    西浦生成, 門田暁人

    コンピュータソフトウェア   40 ( 4 )   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Exploring Behavioral Trustworthiness of GitHub Developers

    Kinari Nishiura, Kaito Ikeda, Mariko Sasakura, Akito Monden

    Proc. 5th World Symposium on Software Engineering (WSSE2023)   2023.9

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Subject Experiments with a Learning Support System for Grover's Algorithm Reviewed

    Hayato Yasunaga, Mariko Sasakura, Akito Monden

    Proc. 27th International Conference Information Visualisation (IV2023)   125 - 130   2023.7

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iv60283.2023.00030

    researchmap

  • A Cost-Effectiveness Metric for Association Rule Mining in Software Defect Prediction Reviewed

    Kinari Nishiura, Takeki Kasagi, Akito Monden

    Proc. 21st International Conference on Software Engineering Research and Practice (SERP'23)   2023.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Research Square Platform LLC  

    Abstract

    This paper proposes a cost-effectiveness metric for association rule mining suitable for software defect prediction where conditions of defective modules are characterized as association rules.Given a certain amount of test effort (or the number of test cases), the proposed metric is the expected number of defects to be discovered in modules that meet an association rule.Since the amount test effort is limited in general and full testing of all modules is ineffective, the proposed metric is useful to focus on the most cost effective set of modules to be tested with limited test effort. The proposed metric is defined based on the exponential Software Reliability Growth Model (SRGM) extended with the module size parameter, assuming that a larger module require more effort to discover defects. To evaluate the effectiveness of the proposed metric, association rules were extracted and prioritized based on the proposed metric using data sets of four open source software projects. The LOC-based cumulative-lift chart, which is often used to evaluate the cost effectiveness of defect prediction, shows that the proposed metric can focus on the rules that can discover more defects than the conventional association rule metrics, confidence and odds ratio.

    DOI: 10.21203/rs.3.rs-1988568/v1

    researchmap

    Other Link: https://www.researchsquare.com/article/rs-1988568/v1.html

  • Artificial Neural Network Based Audio Reinforcement for Computer Assisted Rote Learning Reviewed

    Parisa Supitayakul, Zeynep Yücel, Akito Monden

    IEEE Access   11   39466 - 39483   2023

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers (IEEE)  

    DOI: 10.1109/access.2023.3266731

    researchmap

  • Analysis of Programming Performance Based on 2-grams of Keystrokes and Mouse Operations. Reviewed

    Kazuki Matsumoto, Kinari Nishiura, Mariko Sasakura, Akito Monden

    Proc. 21st IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA2023)   301 - 306   2023

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SERA57763.2023.10197645

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/sera/sera2023.html#MatsumotoNSM23

  • A Dynamic Model Selection Approach to Mitigate the Change of Balance Problem in Cross-Version Bug Prediction Reviewed

    Hiroshi Demanou, Akito Monden, Masateru Tsunoda

    Proc. 10th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2022   2022.12

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Developing a web application for RBSC-based solution of the subset selection problem

    Chigusa Ikeda, Parisa Supitayakul, Zeynep Yücel, Akito Monden

    2022 13th International Congress on Advanced Applied Informatics Winter (IIAI-AAI-Winter)   2022.12

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai-winter58034.2022.00021

    researchmap

  • Investigation of the relation between task engagement and eye gaze Reviewed

    Shogo Hamachi, Parisa Supitayakul, Zeynep Yücel, Akito Monden

    2022 13th International Congress on Advanced Applied Informatics Winter (IIAI-AAI-Winter)   2022.12

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai-winter58034.2022.00041

    researchmap

  • Examination of the relation between affective content of images and gaze behavior

    Terumi Kasahara, Parisa Supitayakul, Zeynep Yücel, Akito Monden

    2022 13th International Congress on Advanced Applied Informatics Winter (IIAI-AAI-Winter)   2022.12

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai-winter58034.2022.00030

    researchmap

  • 相関ルールとランダムフォレストを組合わせたfault-proneモジュール予測の追実験 Reviewed

    瀬戸俊輝, 西浦生成, 門田暁人

    情報処理学会論文誌   63 ( 8 )   1352 - 1360   2022.8

     More details

    Authorship:Last author, Corresponding author  

    researchmap

  • Improvement and Evaluation of Data Consistency Metric CIL for Software Engineering Data Sets

    Maohua Gan, Zeynep Yucel, Akito Monden

    IEEE Access   10   70053 - 70067   2022

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers (IEEE)  

    DOI: 10.1109/access.2022.3188246

    researchmap

  • Using Bandit Algorithms for Selecting Feature Reduction Techniques in Software Defect Prediction.

    Masateru Tsunoda, Akito Monden, Koji Toda, Amjed Tahir, Kwabena Ebo Bennin, Keitaro Nakasai, Masataka Nagura, Kenichi Matsumoto

    MSR   670 - 681   2022

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/3524842.3529093

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/msr/msr2022.html#TsunodaMTTBNNM22

  • Investigating the effect of various types of audio reinforcement on memory retention Reviewed

    Parisa Supitayakul, Yücel, Misato Nose, Akito Monden

    Proc. 12th International Congress on Advanced Applied Informatics (IIAI-AAI2022)   250 - 255   2022

     More details

    Publishing type:Research paper (international conference proceedings)  

    Most e-learning systems deliver solely visual information, even though they boast a huge potential for supporting the learners using various other capabilities (e.g. camera, speakers) of the hosting platform (i.e. computer, smart phone etc.). In this study, we focus deploying one such potential, namely audio stimuli (informative and non-informative), for supporting rote learning of different types of learning material (i.e. easy verbal, hard verbal and numerical). Our results indicate that audio stimuli do not provide a significant benefit for studying easy verbal content, but there is a big room for improvement concerning other content types (hard verbal and numerical). Interestingly, despite the general implications of dual-coding theory, human-readout of hard verbal contents is observed not to provide any significant improvement over visual-only stimuli. However, to our surprise, non-informative audio stimuli (i.e. bell sound) are observed to provide an improvement, whereas numerical content is observed to benefit in a similar way from informative and non-informative audio. Based on these results, in the future we aim developing an automatic learning support system, which triggers the appropriate audio stimuli, taking in consideration the type of content.

    DOI: 10.1109/IIAIAAI55812.2022.00057

    Scopus

    researchmap

  • A computationally efficient approach for solving RBSC-based formulation of the subset selection problem Reviewed

    Kohei Furuya, Zeynep Yücel, Parisa Supitayakul, Akito Monden

    Proc. 12th International Congress on Advanced Applied Informatics (IIAI-AAI2022)   341 - 347   2022

     More details

    Publishing type:Research paper (international conference proceedings)  

    This study focuses on a specific type of subset selection problem, which is constrained in terms of the rank bi-serial correlation (RBSC) coefficient of the outputs. For solving such problems, we propose an approach with several advantages such as (i) providing a clear insight into the feasibility of the problem with respect to the hyper-parameters, (ii) being non-iterative, (iii) having a foreseeable running time, and (iv) with the potential to yield non-deterministic (diverse) outputs. In particular, the proposed approach is based on starting from a composition of subsets with an extreme value of the RBSC coefficient (e.g. ρ=1) and swapping certain elements of the subsets in order to adjust ρ into the desired range. The proposed method is superior to the previously proposed RBSC-SubGen, which attempts to solve the problem before confirming its feasibility, taking random steps, and has unforeseeable running times and saturation issues.

    DOI: 10.1109/IIAIAAI55812.2022.00076

    Scopus

    researchmap

  • Neg/pos-Normalized Accuracy Measures for Software Defect Prediction

    Maohua Gan, Zeynep Yücel, Akito Monden

    IEEE Access   10   134580 - 134591   2022

     More details

    Publishing type:Research paper (scientific journal)  

    In evaluating the performance of software defect prediction models, accuracy measures such as precision and recall are commonly used. However, most of these measures are affected by neg/pos ratio of the data set being predicted, where neg is the number of negative cases (defect-free modules) and pos is the number of positive cases (defective modules). Thus, it is not fair to compare such values across different data sets with different neg/pos ratios and it may even lead to misleading or contradicting conclusions. The objective of this study is to address the class imbalance issue in assessing performance of defect prediction models. The proposed method relies on computation of expected values of accuracy measures based solely on the value of the neg and pos values of the data set. Based on the expected values, we derive the neg/pos-normalized accuracy measures, which are defined as their divergence from the expected value divided by the standard deviation of all possible prediction outcomes. The proposed measures enable us to provide a ranking of predictions across different data sets, which can distinguish between successful predictions and unsuccessful predictions. Our results derived from a case study of defect prediction based on 19 defect data sets indicate that ranking of predictions is significantly different than the ranking of conventional accuracy measures such as precision and recall as well as composite measures F1-value, AUC of ROC, MCC, G-mean and Balance. In addition, we conclude that MCC attains a better defect prediction accuracy than F1-value, AUC of ROC, G-mean and Balance.

    DOI: 10.1109/ACCESS.2022.3232144

    Scopus

    researchmap

  • Gaze Analysis in Spot the Difference.

    Mariko Sasakura, Syouta Toda, Akito Monden

    26th International Conference Information Visualisation(IV)   161 - 166   2022

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/IV56949.2022.00034

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/iv/iv2022.html#SasakuraTM22

  • Exploring the limits of an RBSC-based approach in solving the subset selection problem Reviewed

    Furuya Kohei, Zeynep Yücel, Parisa Supitayakul, Akito Monden, Pattara Leelaprute

    International Conference on Data Science and Institutional Research (DSIR 2021)   2021.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • On the interplay between vocal production effect and learning content types in e-learning settings Reviewed

    Kazuma Ohta, Zeynep Yücel, Parisa Supitayakul, Akito Monden, Pattara Leelaprute

    International Conference on Learning Technologies and Learning Environments (LTLE 2021)   2021.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • ソフトウェア開発工数予測におけるauto-sklearnの適用 Reviewed

    田中 和也, 門田 暁人, Zeynep Yücel

    コンピュータソフトウェア   38 ( 4 )   4_46 - 4_52   2021.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • Human Resource Analysis Based on Used Libraries in Eclipse Projects on GitHub Reviewed

    Wilson Chukwu Emmanuel, Akito Monden

    Proc. 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   ( WP1-07 )   1 - 4   2021.11

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Effectiveness of Explaining a Program to Others in Finding Its Bugs Reviewed

    Toshihiro Nakamura, Akito Monden, Mariko Sasakura, Hidetake Uwano

    Proc. 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   ( WP1-06 )   1 - 6   2021.11

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/SNPD51163.2021.9704932

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/snpd/snpd2021.html#NakamuraMSU21

  • Association Metrics Between Two Continuous Variables for Software Project Data Reviewed

    Takumi Kanehira, Akito Monden, Zeynep Yucel

    Proc. 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   ( WP1-05 )   1 - 6   2021.11

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    The correlation coefficient is commonly used in analyses of software project data sets for the purpose of quantifying the relationship between two variables. However, while there are various types of relationships between two variables, the correlation coefficient cannot distinguish between these types. This study proposes new metrics between two continuous variables that have the potential to characterize the relationship types.

    DOI: 10.1109/SNPD51163.2021.9704983

    Scopus

    researchmap

  • A Simulation Model of Software Quality Assurance in the Software Lifecycle Reviewed

    Hiroto Nakahara, Akito Monden, Zeynep Yucel

    Proc. 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   ( WP1-04 )   1 - 6   2021.11

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    Software quality assurance (SQA) is a series of activities within the software development lifecycle that repetitively verify or test the software deliverables to ensure their quality. In this paper, we propose a simulation model of SQA to quantitatively demonstrate the positive effect of adding quality assurance (QA) effort especially in early phases of software development. The proposed model can represent the relationship among the number of bugs in each phase, the amount of QA effort, the expected number of detectable bugs and the amount of bug fixing effort. The model can simulate the different QA strategies in a given software development context; thus, it is useful to identify the best or better strategies to improve software quality with smaller QA and bug fixing effort.

    DOI: 10.1109/SNPD51163.2021.9704927

    Scopus

    researchmap

  • Using Bandit Algorithms for Project Selection in Cross-Project Defect Prediction Reviewed

    Takuya Asano, Masateru Tsunoda, Koji Toda, Amjed Tahir, Kwabena Ebo Bennin, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto

    2021 IEEE International Conference on Software Maintenance and Evolution (ICSME)   649 - 653   2021.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icsme52107.2021.00074

    researchmap

  • ソフトウェア開発工数予測におけるデータスムージングの定量的評価 Reviewed

    伊永 健人, 門田 暁人, Zeynep Yücel

    コンピュータソフトウェア   38 ( 3 )   3_83 - 3_89   2021.8

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • A Novel Approach to Address External Validity Issues in Fault Prediction Using Bandit Algorithms Reviewed

    Teruki HAYAKAWA, Masateru TSUNODA, Koji TODA, Keitaro NAKASAI, Amjed TAHIR, Kwabena Ebo BENNIN, Akito MONDEN, Kenichi MATSUMOTO

    IEICE Transactions on Information and Systems   E104.D ( 2 )   327 - 331   2021.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2020edl8098

    researchmap

  • Analysis of Work Efficiency and Quality of Software Maintenance Using Cross-Company Dataset Reviewed

    Masateru TSUNODA, Akito MONDEN, Kenichi MATSUMOTO, Sawako OHIWA, Tomoki OSHINO

    IEICE Transactions on Information and Systems   E104.D ( 1 )   76 - 90   2021.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2020mpp0004

    researchmap

  • Influence of Outliers on Estimation Accuracy of Software Development Effort Reviewed

    Kenichi Ono, Masateru Tsunoda, Akito Monden, Kenichi Matsumoto

    IEICE Transactions on Information and Systems   E104.D ( 1 )   91 - 105   2021.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Quantitative evaluation of data smoothing for software effort estimation

    Kento Korenaga, Akito Monden, Zeynep Yücel

    Computer Software   38 ( 3 )   83 - 89   2021

     More details

    Publishing type:Research paper (scientific journal)  

    In this study, we quantitatively compare the effects of outlier handling methods in training datasets for model building on eight software effort estimation models (e.g., linear multiple regression, regression trees, random forests, support vector regression, etc.), and we evaluate the effectiveness of the data smoothing method proposed by the authors. In our experiments, we compare three outlier removal methods (outlier removal using Cook's distance, TEAK, and Filter-INC) in addition to the data smoothing method. Experimental results showed that the data smoothing method combined with the outlier detection method in Cook's distance or Filter-INC were found to build a model with good estimation performance.

    DOI: 10.11309/jssst.38.3_83

    Scopus

    researchmap

  • Applying auto-sklearn to Software Development Effort Estimation.

    Kazuya Tanaka, Akito Monden, Zeynep Yücel

    Computer Software   38 ( 4 )   46 - 52   2021

     More details

    Publishing type:Research paper (scientific journal)  

    Recently, automated machine learning (AutoML), which automates pre-processing, model selection, and hyperparameter adjustment, is becoming more and more popular, and it is expected to provide both ease of model construction and high prediction accuracy. In this study, we apply AutoML to software development effort estimation and experimentally evaluate its effectiveness. In our experiments, we employed auto-sklearn, which is an AutoML library, as well as linear multiple regression, elastic net, and random forest for comparison. A comparison of the estimation accuracy of each model by the win-tie-loss method confirmed that auto-sklearn showed the same or better estimation performance than other models. We also summarize the results of analyzing the effect of search time of auto-sklearn on the estimation accuracy.

    DOI: 10.11309/jssst.38.4_46

    Scopus

    researchmap

  • 原型分析によるOSS開発者の貢献タイプの分析 Reviewed

    池本 和靖, 門田 暁人

    コンピュータソフトウェア   47 ( 4 )   17 - 23   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • ソフトウェア開発データを対象とする2変数間の尺度の検討

    金平 拓生, 門田 暁人

    情報処理学会第206回ソフトウェア工学研究会   2020-SE-206 ( 2 )   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ランダムフォレストと相関ルールの組み合わせによるソフトウェアバグ予測の試行

    瀬戸 俊輝, 門田 暁人

    情報処理学会第206回ソフトウェア工学研究会   2020-SE-206 ( 3 )   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアレビューのシミュレーションモデルとそのケーススタディ Reviewed

    中原 寛人, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   67 - 75   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発工数予測におけるAutoML の実験的評価 Reviewed

    田中 和也, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   141 - 142   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • データ断片からのソフトウェア開発データの復元の試み Reviewed

    西脇 将樹, 門田 暁人

    ソフトウェア工学の基礎XXVII;回ソフトウェア工学の基礎ワークショップFOS   139 - 140   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • バグを含む機械学習システムの挙動の分析の試行 Reviewed

    木内 祐太, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   147 - 148   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアバグ予測における学習データ切り替えの効果 Reviewed

    廣瀬 椋一, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   153 - 154   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発工数予測におけるデータスムージングの実験的評価 Reviewed

    伊永 健人, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   133 - 134   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Empirical Evaluation of Mimic Software Project Data Sets for Software Effort Estimation Reviewed

    Maohua GAN, Zeynep YÜCEL, Akito MONDEN, Kentaro SASAKI

    IEICE Transactions on Information and Systems   E103.D ( 10 )   2094 - 2103   2020.10

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2019edp7150

    researchmap

  • Investigating effect of stimulus modality on recollection rate in e-learning systems Reviewed

    Parisa Supitayakul, Zeynep Yücel, Akito Monden, Pattara Leelaprute

    International Conference on Learning Technologies and Learning Environments   2020.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai50415.2020.00036

    researchmap

  • ソフトウェア開発工数予測へのAutoMLの適用

    田中和也, 門田暁人

    日本ソフトウェア科学会第37回大会   ( 25-P )   2020.9

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発実績データセットへのデータスムージングの適用

    伊永健人, 門田暁人

    日本ソフトウェア科学会第37回大会   ( 27-P )   2020.9

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • An Algorithm for Automatic Collation of Vocabulary Decks Based on Word Frequency Reviewed

    Zeynep YÜCEL, Parisa SUPITAYAKUL, Akito MONDEN, Pattara LEELAPRUTE

    IEICE Transactions on Information and Systems   E103.D ( 8 )   1865 - 1874   2020.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    This study focuses on computer based foreign language vocabulary learning systems. Our objective is to automatically build vocabulary decks with desired levels of relative difficulty relations. To realize this goal, we exploit the fact that word frequency is a good indicator of vocabulary difficulty. Subsequently, for composing the decks, we pose two requirements as uniformity and diversity. Namely, the difficulty level of the cards in the same deck needs to be uniform enough so that they can be grouped together and difficulty levels of the cards in different decks need to be diverse enough so that they can be grouped in different decks. To assess uniformity and diversity, we use rank-biserial correlation and propose an iterative algorithm, which helps in attaining desired levels of uniformity and diversity based on word frequency in daily use of language. In experiments, we employed a spaced repetition flashcard software and presented users various decks built with the proposed algorithm, which contain cards from different content types. From users' activity logs, we derived several behavioral variables and examined the polyserial correlation between these variables and difficulty levels across different word classes. This analysis confirmed that the decks compiled with the proposed algorithm induce an effect on behavioral variables in line with the expectations. In addition, a series of experiments with decks involving varying content types confirmed that this relation is independent of word class.

    DOI: 10.1587/transinf.2019edp7279

    Scopus

    researchmap

  • Identification of behavioral variables for efficient representation of difficulty in vocabulary learning systems Reviewed

    Parisa Supitayakul, Zeynep Yücel, Akito Monden, Pattara Leelaprute

    International Journal of Learning Technologies and Learning Environments   3 ( 1 )   51 - 60   2020.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:International Institute of Applied Informatics  

    DOI: 10.52731/ijltle.v3.i1.521

    researchmap

  • Estimating Level of Engagement from Ocular Landmarks Reviewed

    Zeynep Yucel, Serina Koyama, Akito Monden, Mariko Sasakura

    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION   2020.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:TAYLOR & FRANCIS INC  

    E-learning offers many advantages like being economical, flexible and customizable, but also has challenging aspects such as lack of - social-interaction, which results in contemplation and sense of remoteness. To overcome these and sustain learners' motivation, various stimuli can be incorporated. Nevertheless, such adjustments initially require an assessment of engagement level. In this respect, we propose estimating engagement level from facial landmarks exploiting the facts that (i) perceptual decoupling is promoted by blinking during mentally demanding tasks; (ii) eye strain increases blinking rate, which also scales with task disengagement; (iii) eye aspect ratio is in close connection with attentional state and (iv) users' head position is correlated with their level of involvement. Building empirical models of these actions, we devise a probabilistic estimation framework. Our results indicate that high and low levels of engagement are identified with considerable accuracy, whereas medium levels are inherently more challenging, which is also confirmed by inter-rater agreement of expert coders.

    DOI: 10.1080/10447318.2020.1768666

    Web of Science

    researchmap

  • 行レベルバグ予測のためのWebアプリケーション Reviewed

    金平拓生, 門田暁人

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアバグ予測におけるauto-sklearnの有効性評価 Reviewed

    田中 和也, 門田 暁人, Zeynep Yücel

    コンピュータソフトウェア   36 ( 4 )   46 - 52   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • 原型分析によるソフトウェア開発者の貢献タイプの分析 Reviewed

    池本和靖, 門田暁人

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアバグ予測の費用対効果に基づくアソシエーションルールの優先順付け Reviewed

    笠木健希, 門田暁人, Zeynep Yücel

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアレビューのシミュレーション Reviewed

    中原寛人, 門田暁人

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発におけるcontext switchの影響 Reviewed

    井下瑚都, Zeynep Yücel, 門田暁人

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Algorithmic Expressions for Assessing Algorithmic Thinking Ability of Elementary School Children Reviewed

    Yasumasa Oomori, Hidekuni Tsukamoto, Hideo Nagumo, Yasuhiro Takemura, Kouki Iida, Akito Monden, Ken-ichi Matsumoto

    2019 IEEE Frontiers in Education Conference (FIE)   2019.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/fie43999.2019.9028486

    researchmap

  • Effect of Grasping Uniformity on Estimation of Grasping Region from Gaze Data Reviewed

    Pimwalun Witchawanitchanun, Zeynep Yucel, Akito Monden, Pattara Leelaprute

    Proceedings of the 7th International Conference on Human-Agent Interaction   265 - 267   2019.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    This study explores estimation of grasping region of objects from gaze data. Our study distinguishes from previous works by accounting for "grasping uniformity" of the objects. In particular, we consider three types of graspable objects: (i) with a well-defined graspable part (e.g. handle), (ii) without a grip but with an intuitive grasping region, (iii) without any grip or intuitive grasping region. We assume that these types define how "uniform" grasping region is across different graspers. In experiments, we use "Learning to grasp" data set and apply the method of [5] for estimating grasping region from gaze data. We compute similarity of estimations and ground truth annotations for the three types of objects regarding subjects (a) who perform free viewing and (b) who view the images with the intention of grasping. In line with many previous studies, similarity is found to be higher for non-graspers. An interesting finding is that the difference in similarity (between free viewing and motivated to grasp) is higher for type-iii objects; and comparable for type-i and ii objects. Based on this, we believe that estimation of grasping region from gaze data offers a larger potential to "learn" particularly grasping of type-iii objects.

    DOI: 10.1145/3349537.3352787

    Scopus

    researchmap

  • Quantitative Evaluation of the Relation Between Blink Features and Apparent Task Engagement

    Serina Koyama, Zeynep Yucel, Akito Monden

    PERCEPTION   48   731 - 731   2019.9

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • ソフトウェア開発者の貢献タイプの分析

    池本和靖, 門田暁人

    第18回情報科学技術フォーラム(FIT2019)   ( B-007 )   1 - 2   2019.9

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ランダムフォレストを用いた難読化されたコードのステルス評価の検討

    北岡哲哉, 神崎雄一郎, 森川みどり, 門田暁人

    第18回情報科学技術フォーラム(FIT2019) 講演論文集 第1分冊   29 - 32   2019.9

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • A signal processing perspective on human gait: Decoupling walking oscillations and gestures Reviewed

    Adrien Gregorj, Zeynep Yücel, Sunao Hara, Akito Monden, Masahiro Shiomi

    Proceedings of the 4th International Conference on Interactive Collaborative Robotics 2019 (ICR 2019)   75 - 85   2019.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-26118-4_8

    researchmap

  • 相関関数を扱うアソシエーションルールの提案とソフトウェア開発データへの適用 Reviewed

    齊藤 英和, 門田 暁人, Zeynep Yücel, 森崎 修司

    コンピュータソフトウェア   36 ( 3 )   47 - 53   2019.8

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • Assessing the Effect of Varying Word Classes on Behavioral Variables in Technology Mediated Vocabulary Learning Reviewed

    Parisa Supitayakul, Zeynep Yucel, Akito Monden, Pattara Leelaprute

    2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI)   226 - 229   2019.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    This study focuses on foreign language vocabulary learning in computerized medium and seeks for any possibility of adaptation with respect to background information on word classes. To that end, we employ a spaced repetition flashcard software and display English vocabulary belonging to three word classes as (i) abstract noun, (ii) concrete noun, and (iii) verb. Regarding each word class, we deploy three sets of words with difficulty levels of (i) easy, (ii) medium, and (iii) hard. Through log file analysis, we derive several behavioral variables and examine the polyserial correlation between these variables and difficulty levels across different word classes. It is found that abstract and concrete nouns do not have any significant difference in terms of the correlation for the five kinds of behavioral variables in focus. However, it is noted that front sides of the cards involving verbs are observed relatively longer, while back sides are observed for somewhat shorter duration.

    DOI: 10.1109/iiai-aai.2019.00052

    Scopus

    researchmap

  • On Preventing Symbolic Execution Attacks by Low Cost Obfuscation Reviewed

    Toshiki Seto, Akito Monden, Zeynep Yücel, Yuichiro Kanzaki

    Proc. 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2019)   495 - 500   2019.7

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/SNPD.2019.8935642

    researchmap

  • Data Smoothing for Software Effort Estimation Reviewed

    Kent Korenaga, Akito Monden, Zeynep Yucel

    2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD)   501 - 506   2019.7

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The goal of this paper is to improve the estimation performance of software development effort by mitigating the problem caused by outliers in a historical software project data set, which is used to construct an effort estimation model. To date, outlier removal methods have been proposed to solve this problem; however, they are not always effective because removing outliers reduces the number of data points (= software projects in our case) in a data set, and a model built from a small data set often suffers from lack of generality. In such a case, estimation performance can become even worse. In this paper we propose a method called data smoothing to mitigate the problem of outliers without reducing the number of data points. We consider that data points are outliers if they do not meet the assumption of Analogy-Based Estimation (ABE) such that "projects with similar features require similar development efforts." The proposed method changes the effort values (person-months or person-hours) in a data set so as to satisfy this assumption; and by this way, all outliers become non-outliers without decreasing the data points. As a result of experimental evaluation using 8 software development data sets, we found that the proposed data smoothing showed the same or higher effort estimation accuracy than the non-smoothing case, while conventional outlier removal method showed worse accuracy in some data set.

    Web of Science

    researchmap

  • Prediction of Software Defects Using Automated Machine Learning Reviewed

    Kazuya Tanaka, Akito Monden, Zeynep Yucel

    2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD)   490 - 494   2019

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The effectiveness of defect prediction depends on modeling techniques as well as their parameter optimization, data preprocessing and ensemble development. This paper focuses on auto-sklearn, which is a recently-developed software library for automated machine learning, that can automatically select appropriate prediction models, hyperparameters and data preprocessing techniques for a given data set and develop their ensemble with optimized weights. In this paper we empirically evaluate the effectiveness of auto-sklearn in predicting the number of defects in software modules. In the experiment, we used software metrics of 20 OSS projects for cross-release defect prediction and compared auto-sklearn with random forest, decision tree and linear discriminant analysis by using Norm(Popt) as a performance measure. As a result, auto-sklearn showed similar prediction performance as random forest, which is one of the best prediction models for defect prediction in past studies. This indicates that auto-sklearn can obtain good prediction performance for defect prediction without any knowledge of machine learning techniques and models.

    Web of Science

    researchmap

  • Proposal of Association Rule with Correlation Functions and Its Application to Software Development Data.

    Hidekazu Saito, Akito Monden, Zeynep Yücel, Shuji Morisaki

    Computer Software   36 ( 3 )   47 - 53   2019

     More details

    Publishing type:Research paper (scientific journal)  

    In this paper, we propose an association rule A ) Correl(X, Y ) that handles a correlation function, where A is the prerequisite and Correl(X, Y ) is the correlation between variables X and Y . With this extension, we can find conditions whose correlation of arbitrary two variables is high (or low) from a given data set. Furthermore, in order to distinguish statistically significant correlation, we define the rule A ) TestCorrel(X, Y ) which holds the result of the correlation significance test in the conclusion section, where TestCorrel(X, Y ) is a p-value of no-correlation test between X and Y . In order to confirm the feasibility of the proposed method, a case study using software development data was conducted. We found that it is possible to distinguish projects that are suitable for predicting development effort and those that are not.

    DOI: 10.11309/jssst.36.3_47

    Scopus

    researchmap

  • Effectiveness of auto-sklearn in Software Bug Prediction

    Kazuya Tanaka, Akito Monden, Yucel Zeynep

    Computer Software   36 ( 4 )   46 - 52   2019

     More details

    Publishing type:Research paper (scientific journal)  

    Auto-sklearn is a recent attention-gathering software library for automated machine learning that can au-tomatically select appropriate prediction models and hyper parameters for a given data set. In this paper we empirically evaluate the effectiveness of auto-sklearn in software bug prediction. In the experiment, we used software metrics of 20 OSS projects for inter-version bug prediction and compared auto-sklearn with random forrest, decision tree and linear descriminat analysis by using AUC of ROC curve as a performance measure. As a result, auto-sklearn showed similar prediction performance as random forrest. We conclude that, although auto-sklearn is useful for bug prediction, we cannot expect better prediction performance than conventional modeling techniques.

    DOI: 10.11309/jssst.36.4_46

    Scopus

    researchmap

  • シンボリック実行攻撃を妨げるソフトウェア難読化方法の検討

    瀬戸俊輝, 門田暁人, 神崎雄一郎

    ソフトウェア工学の基礎XXV,ソフトウェア工学の基礎ワークショップFOSE2018   145 - 146   2018.11

     More details

  • 難読化されたJavaバイトコードに対するシンボリック実行攻撃の困難さ評価の検討

    西陽太, 神崎雄一郎, 門田暁人, 玉田春昭

    ソフトウェア工学の基礎XXV,ソフトウェア工学の基礎ワークショップFOSE2018   151 - 152   2018.11

     More details

  • Cross-Validation-Based Association Rule Prioritization Metric for Software Defect Characterization Reviewed

    Takashi WATANABE, Akito MONDEN, Zeynep YÜCEL, Yasutaka KAMEI, Shuji MORISAKI

    IEICE Transactions on Information and Systems   E101.D ( 9 )   2269 - 2278   2018.9

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2018edp7020

    researchmap

  • 難読化されたプログラムの自動解析への耐性に関する考察

    西陽太, 神崎雄一郎, 門田暁人

    情報処理学会第80回全国大会講演論文集 (講演番号2J-04)   2018.3

     More details

  • 分岐命令のカムフラージュに基づくプログラムの制御フローの隠ぺい

    村上隼之助, 神崎雄一郎, 門田暁人

    情報処理学会九州支部 火の国情報シンポジウム2018   C3-3   2018.3

     More details

  • A feasibility study of two-step software effort estimation Reviewed

    Naoki Kinoshita, Akito Monden

    Computer Software   35 ( 1 )   194 - 200   2018.2

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Japan Society for Software Science and Technology  

    In this paper, focusing on the problem that estimation accuracy of software development effort greatly varies among software projects, we propose a two-step effort estimation method, and conduct a feasibility study of the method. In the proposed method, given a project to be estimated, we evaluate the dependability of effort estimation for the project, that is, we evaluate whether the effort can be accurately estimated or not for the project. In case that the dependability is high, we conduct the estimation. Otherwise, estimation is avoided. As a result of an experiment to assess the feasibility of the proposed method, the residual square mean turned out to be a suitable measure of dependability
    and, by avoiding the estimation when a project belongs to the high residual square mean group, the estimation error was reduced, which indicates the effectiveness of the two-step estimation. Also, by relaxing the conditions to avoid the estimation, we found that it is possible to increase the number of project to be estimated, while decreasing the estimation error.

    DOI: 10.11309/jssst.35.1_194

    Scopus

    researchmap

  • An Attempt to Line-wise Bug Prediction Using Moving Window.

    FUKUTANI Keigo, MONDEN Akito, ZEYNEP Yucel, HATA Hideaki

    Computer Software   35 ( 4 )   122 - 128   2018.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:日本ソフトウェア科学会  

    <p>This paper presents a feasibility study to predict software bugs in statement level. The proposed method uses a window to inspect a given source file containing a bug. By moving the window from the top to the end of a source file, a set of buggy windows and non-buggy windows are derived. Then, we construct a spam filter-based bug prediction model, whose input is a set of tokens in a window and output is the probability of containing a bug in the window. Finally, we integrate bug prediction results on these windows to compute the probability of containing a bug in each statement. We conducted a feasibility study using 593 source files each containing one bug, and found that, by using the size=3 window, we could identify 67.1% of bugs in top 10 buggy statements of each source file prioritized by our bug prediction, which suggests that the bug pinpointing is feasible.</p>

    Scopus

    CiNii Article

    researchmap

  • Kurtosis and Skewness Adjustment for Software Effort Estimation. Reviewed

    Seiji Fukui, Akito Monden, Zeynep Yücel

    25th Asia-Pacific Software Engineering Conference, APSEC 2018, Nara, Japan, December 4-7, 2018   504 - 511   2018

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/APSEC.2018.00065

    researchmap

  • Generation of Mimic Software Project Data Sets for Software Engineering Research. Reviewed

    Maohua Gan, Kentaro Sasaki, Akito Monden, Zeynep Yücel

    Proceedings of the 6th International Workshop on Quantitative Approaches to Software Quality co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, December 4, 2018.   2273   38 - 43   2018

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:CEUR-WS.org  

    —To conduct empirical research on industry software development, it is necessary to obtain data of real software projects from industry. However, only few such industry data sets are publicly available; and unfortunately, most of them are very old. In addition, most of today’s software companies cannot make their data open, because software development involves many stakeholders, and thus, its data confidentiality must be strongly preserved. This paper proposes a method to artificially generate a “mimic” software project data set whose characteristics (such as average, standard deviation and correlation coefficients) are very similar to a given confidential data set. The proposed method uses the Box–Muller method for generating normally distributed random numbers, then, exponential transformation and number reordering are used for data mimicry. Instead of using the original (confidential) data set, researchers are expected to use the mimic data set to produce similar results as the original data set. To evaluate the usefulness of the proposed method, effort estimation models were built from an industry data set and its mimic data set. We confirmed that two models are very similar to each other, which suggests the usefulness of our proposal.

    Scopus

    researchmap

  • Scaling up software birthmarks using fuzzy hashing

    Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, Akito Monden

    International Journal of Software Innovation   5 ( 3 )   89 - 102   2017.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Taru Publications  

    To detect the software theft, software birthmarks have been proposed. Software birthmark systems extract software birthmarks, which are native characteristics of software, from binary programs, and compare them by computing the similarity between birthmarks. This paper proposes a new procedure for scaling up the birthmark systems. While conventional birthmark systems are composed of the birthmark extraction phase and the birthmark comparison phase, the proposed method adds two new phases between extraction and comparison, namely, compression phase, which employs fuzzy hashing, and pre-comparison phase, which aims to increase distinction property of birthmarks. The proposed method enables us to reduce the required time in the comparison phase, so that it can be applied to detect software theft among many larger scale software products. From an experimental evaluation, the authors found that the proposed method significantly reduces the comparison time, and keeps the distinction performance, which is one of the important properties of the birthmark. Also, the preservation performance is acceptable when the threshold value is properly set.

    DOI: 10.4018/IJSI.2017070107

    Scopus

    researchmap

  • Examining Software Engineering Beliefs about System Testing Defects

    Akito Monden, Masateru Tsunoda, Mike Barker, Kenichi Matsumoto

    IT PROFESSIONAL   19 ( 2 )   58 - 64   2017.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE COMPUTER SOC  

    Software engineering beliefs-short, attention-getting, practically useful statements-can help to justify process improvements. The authors empirically validate four selected beliefs in relation to the increase or decrease of defects in system testing.

    DOI: 10.1109/MITP.2017.31

    Web of Science

    researchmap

  • Industry Application of Software Development Task Measurement System: TaskPit

    Pawin Suthipornopas, Pattara Leelaprute, Akito Monden, Hidetake Uwano, Yasutaka Kamei, Naoyasu Ubayashi, Kenji Araki, Kingo Yamada, Ken-ichi Matsumoto

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E100D ( 3 )   462 - 472   2017.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    To identify problems in a software development process, we have been developing an automated measurement tool called TaskPit, which monitors software development tasks such as programming, testing and documentation based on the execution history of software applications. This paper introduces the system requirements, design and implementation of TaskPit; then, presents two real-world case studies applying TaskPit to actual software development. In the first case study, we applied TaskPit to 12 software developers in a certain software development division. As a result, several concerns (to be improved) have been revealed such as (a) a project leader spent too much time on development tasks while he was supposed to be a manager rather than a developer, (b) several developers rarely used e-mails despite the company's instruction to use e-mail as much as possible to leave communication records during development, and (c) several developers wrote too long e-mails to their customers. In the second case study, we have recorded the planned, actual, and self reported time of development tasks. As a result, we found that (d) there were unplanned tasks in more than half of days, and (e) the declared time became closer day by day to the actual time measured by TaskPit. These findings suggest that TaskPit is useful not only for a project manager who is responsible for process monitoring and improvement but also for a developer who wants to improve by him/herself.

    DOI: 10.1587/transinf.2016EDP7222

    Web of Science

    researchmap

  • Benchmarking IT operations cost based on working time and unit cost

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino

    SCIENCE OF COMPUTER PROGRAMMING   135   75 - 87   2017.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ELSEVIER SCIENCE BV  

    Recently, size of information system gets large, and the information system operation (IT operations) is often outsourced. When IT operations of the large system is outsourced, high cost is needed, and troubles in IT operations may affect the activity of the company. Therefore, the information system operation is important for the companies. Cost is one of the important factors when the system operation is outsourced. However, it is not easy for the customers (system users) to judge whether the operation cost is valid or not. To support the judgment, we focus on information which the customers can know (e.g., size of software), to estimate the working time. In the analysis, we clarified the factors which affect the working time. Then, data was stratified based on the factors, to show the benchmark of working time. Using the benchmark, customers estimate the working time roughly. Also, we clarified the factors which affect the unit cost, and showed the benchmark. Operation cost can be estimated, by estimated working time multiplied by the estimated unit cost. The analysis results showed that the process standardization relates to the working time of operators. Also, the network range and the contract type have a relationship to the unit cost of operators. Work efficiency and unit cost do not affect operation quality. (C) 2016 Elsevier B.V. All rights reserved.

    DOI: 10.1016/j.scico.2016.10.006

    Web of Science

    researchmap

  • A stability assessment of solution adaptation techniques for analogy-based software effort estimation

    Passakorn Phannachitta, Jacky Keung, Akito Monden, Kenichi Matsumoto

    EMPIRICAL SOFTWARE ENGINEERING   22 ( 1 )   474 - 504   2017.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER  

    Among numerous possible choices of effort estimation methods, analogy-based software effort estimation based on Case-based reasoning is one of the most adopted methods in both the industry and research communities. Solution adaptation is the final step of analogy-based estimation, employed to aggregate and adapt to solutions derived during the case-based reasoning process. Variants of solution adaptation techniques have been proposed in previous studies; however, the ranking of these techniques is not conclusive and shows conflicting results, since different studies rank these techniques in different ways. This paper aims to find a stable ranking of solution adaptation techniques for analogy-based estimation. Compared with the existing studies, we evaluate 8 commonly adopted solution techniques with more datasets (12), more feature selection techniques included (4), and more stable error measures (5) to a robust statistical test method based on the Brunner test. This comprehensive experimental procedure allows us to discover a stable ranking of the techniques applied, and to observe similar behaviors from techniques with similar adaptation mechanisms. In general, the linear adaptation techniques based on the functions of size and productivity (e.g., regression towards the mean technique) outperform the other techniques in a more robust experimental setting adopted in this study. Our empirical results show that project features with strong correlation to effort, such as software size or productivity, should be utilized in the solution adaptation step to achieve desirable performance. Designing a solution adaptation strategy in analogy-based software effort estimation requires careful consideration of those influential features to ensure its prediction is of relevant and accurate.

    DOI: 10.1007/s10664-016-9434-8

    Web of Science

    researchmap

  • 提案依頼書に含まれる無理難題の分類

    門田暁人, 住吉倫明, 神谷芳樹

    SEC journal   13 ( 3 )   18 - 25   2017

     More details

  • Textual vs. visual programming languages in programming education for primary schoolchildren Reviewed

    Hidekuni Tsukamoto, Yasuhiro Takemura, Yasumasa Oomori, Isamu Ikeda, Hideo Nagumo, Akito Monden, Ken Ichi Matsumoto

    Proceedings - Frontiers in Education Conference, FIE   2016-November   2016.11

     More details

    Publishing type:Research paper (international conference proceedings)  

    © 2016 IEEE. The purpose of this research is to compare textual programming languages and visual programming languages from the aspect of motivation. As a textual programming language, Processing programming language was used, and as visual programming languages, Scratch, a derivation of Scratch, Teaching materials offered by code.org, and LEGO Mindstorms EV3 were used. Teaching materials using the textual programming language, and those using the visual programming languages were developed separately. A trial experiment of programming education with the textual programming language was conducted to a cohort of seven primary schoolchildren. Trial experiments with the visual programming languages were conducted twice. In each of them, a cohort of eight primary schoolchildren participated. The motivation of the children was assessed using the questionnaire based on the ARCS (Attention, Relevance, Confidence, and Satisfaction) motivation model. The results with the visual programming languages suggested that the motivation scores of the children increased as the class progressed when visual programming languages were used. On the other hand, the results with Processing suggested that the variance of Satisfaction factor increased as the class progressed when textual programming languages were used, which further suggested that the Satisfaction scores of the children spread as the class progressed when textual programming languages were used.

    DOI: 10.1109/FIE.2016.7757571

    Scopus

    researchmap

  • Investigating and projecting population structures in open source software projects: A case study of projects in GitHub Reviewed

    Saya Onoue, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    IEICE Transactions on Information and Systems   E99D ( 5 )   1304 - 1315   2016.5

     More details

    Publishing type:Research paper (scientific journal)  

    © Copyright 2016 The Institute of Electronics, Information and Communication Engineers. GitHub is a developers' social networking service that hosts a great number of open source software (OSS) projects. Although some of the hosted projects are growing and have many developers, most projects are organized by a few developers and face difficulties in terms of sustainability. OSS projects depend mainly on volunteer developers, and attracting and retaining these volunteers are major concerns of the project stakeholders. To investigate the population structures of OSS development communities in detail and conduct software analytics to obtain actionable information, we apply a demographic approach. Demography is the scientific study of population and seeks to identify the levels and trends in the size and components of a population. This paper presents a case study, investigating the characteristics of the population structures of OSS projects on GitHub, and shows population projections generated with the well-known cohort component method. We found that there are four types of population structures in OSS development communities in terms of experiences and contributions. In addition, we projected the future population accurately using a cohort component population projection method. This method predicts a population of the next period using a survival rate calculated from past population. To the best of our knowledge, this is the first study that applied demography to the field of OSS research. Our approach addressing OSS-related problems based on demography will bring new insights, since studying population is novel in OSS research. Understanding current and future structures of OSS projects can help practitioners to monitor a project, gain awareness of what is happening, manage risks, and evaluate past decisions.

    DOI: 10.1587/transinf.2015EDP7363

    Scopus

    researchmap

  • Open Source Software Engineering

    IHARA Akinori, OHIRA Masao, MONDEN Akito

    Computer Software   33 ( 1 )   1_27 - 1_27   2016

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    DOI: 10.11309/jssst.33.1_27

    CiNii Article

    CiNii Books

    researchmap

    Other Link: https://jlc.jst.go.jp/DN/JLC/20021882317?from=CiNii

  • コード断片の不自然さの比較による保護機構の発見困難さの評価

    松田篤和, 神崎雄一郎, 門田暁人

    情報処理学会第77回全国大会講演論文集 (講演番号1L-02)   2015.3

     More details

  • 保護コードの自然さに着目した命令カムフラージュ

    永井晃人, 神崎雄一郎, 門田暁人

    情報処理学会第77回全国大会講演論文集 (講演番号1L-03)   2015.3

     More details

  • Prediction of the change of learners' motivation in programming education for non-computing majors Reviewed

    Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Akito Monden, Ken-Ichi Matsumoto

    Proceedings - Frontiers in Education Conference, FIE   2015- ( February )   2015.2

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    In the past, the authors had been analyzing motivation of the learners in programming education using the ARCS assessment metric. This metric had been used in the application experiment in 13 programming courses, and about 1,700 sets of data was collected. From these data, the learners' model, characteristics of the change of motivation, and ways of improving teaching materials had been clarified. However, these study results were obtained after the terms, when the programming courses were over, and thus did not contribute much to the ongoing programming education. For this reason, in this research, the methods for predicting the change of learners' motivation were studied so that the learners who may need support could be identified. The idea came from the experiment the authors conducted, in which the motivation of learners was analyzed by plotting the motivation scores of each factor in the ARCS model as a 3D graph. As a result, a decreasing tendency of motivation was observed when the distribution of the plot widened. After studying the tendency in detail, it was thought to be due to the influence of the variance of sub-level category scores. In the proposed method, the motivation of each learner is assessed in each lesson using the ARCS assessment metric. If variance of the motivation scores of a learner in a lesson is above a certain threshold value AND if mean of the scores has not decreased from the previous lesson, then the learner is identified as a candidate of learner who needs support at that lesson. In the application experiment, a programming course with 9 lessons was offered and 9 learners attended all the 9 lessons. In the experiment, 7 cases had been identified as the candidates of learners who need support, and out of those 7 cases, a decrease of motivation to less than average was observed in 5 cases.

    DOI: 10.1109/FIE.2014.7044221

    Scopus

    researchmap

  • プログラム理解の困難さの脳血流による計測の試み Reviewed

    中川尊雄, 亀井靖高, 上野秀剛, 門田 暁人, 松本 健一

    コンピュータソフトウェア   31 ( 3 )   3_270 - 3_276   2014.9

     More details

    Language:Japanese  

    researchmap

  • Takao Nakagawa, Akito Monden, Ken Ichi Matsumoto, Yasutaka Kamei, Hidetake Uwano Reviewed

    Takao Nakagawa, Akito Monden, Ken Ichi Matsumoto, Yasutaka Kamei, Hidetake Uwano

    Computer Software   31 ( 3 )   270 - 276   2014.8

     More details

    Language:English  

    researchmap

  • N-gramモデルを用いたソフトウェア保護機構の不自然さ評価

    神崎雄一郎, 尾上栄浩, 門田暁人

    2014年暗号と情報セキュリティシンポジウム(SCIS2014)予稿集 (講演番号2D2-1)   2014.1

     More details

  • 自動計測データに基づくソフトウェア開発の作業目的の予測 Reviewed

    大橋 亮太, 上野 秀剛, 門田 暁人, 荒木 健史, 山田 欣吾, 松本 健一

    第21回ソフトウェア工学の基礎ワークショップ (FOSE 2014)   2014

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • 「ソフトウェア工学の実証的アプローチ」シリーズ第5回 ソフトウェアリポジトリマイニング Reviewed

    門田 暁人, 伊原 彰紀, 松本 健一

    コンピュウータソフトウェア   30 ( 2 )   52 - 65   2013.5

     More details

    Language:Japanese  

    researchmap

  • The effects of teaching material remediation with ARCS-strategies for programming education Reviewed

    Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Akito Monden, Ken-Ichi Matsumoto

    Proceedings - Frontiers in Education Conference, FIE   717 - 723   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    In this paper, a method for improving the teaching materials of programming education is introduced, and the evaluation of the effects of using the strategy is presented. By using this method, the teachers of programming education will be able to assess and improve their teaching materials irrespective of their knowledge and experience of their teaching materials already used. In this method, the teaching materials were improved based on the statistical analysis of the motivation of students. Specifically, the motivation of students was measured for each lower category of ARCS motivation model with the authors' original questionnaire. The lower category in a particular lesson that showed a statistically significant decrease from the previous lesson was identified, and the improvement strategies for the lower category were selected from the list of motivation strategies in the ARCS model. The teaching materials of programming education were then improved based on the strategy. In this research, five lower categories of particular lessons in a programming course were identified, and the teaching materials were improved. The improved teaching materials were used in the following programming course, and the effects of the improvements were seen in three lower categories out of the identified five lower categories. © 2013 IEEE.

    DOI: 10.1109/FIE.2013.6684920

    Scopus

    researchmap

  • 脳血流計測に基づくプログラム理解行動の定量化 Reviewed

    中川 尊雄, 亀井 靖高, 上野 秀剛, 門田 暁人, 松本 健一

    第20回ソフトウェア工学の基礎ワークショップ (FOSE 2013)   191 - 196   2013

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • ソフトウェア開発企業における開発タスクの自動計測 Reviewed

    門田 暁人, 上野 秀剛, 荒木 健史, 山田 欣吾, 松本 健一

    第20回ソフトウェア工学の基礎ワークショップ (FOSE 2013)   257 - 262   2013

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • Analyzing risk factors affecting project cost overrun Reviewed

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Ryosuke Hatano, Toshihiko Nakano, Yutaka Fukuchi

    Studies in Computational Intelligence   443   171 - 184   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    To prevent cost overrun of software projects, it is effective to predict the project which has high risk of cost overrun in the early phase of the project. In this paper, we clarify the risk factors which affect cost overrun. The risk factors are denoted by the questions such as Are the customer's project goals clear? The risk factors can be used as independent variables of the cost overrun prediction model. In the analysis, we used 290 projects' data collected in a software development company. The dataset was stratified by the project start time and the project size to eliminate their influence, and relationships between risk factors and cost overrun were analyzed with the correlation ratio. In addition, we focused risk factors which have strong and stable relationships to cost overrun, and analyzed them using the Sharpe ratio based index. As a result, we identified some risk factors which have relatively strong and stable relationships to cost overrun. After the analysis, we experimentally predicted cost overrun projects by collaborative filtering, using the risk factors as independent variables. The result suggested that cost overrun projects can be predicted by the risk factors. © 2013 Springer-Verlag Berlin Heidelberg.

    DOI: 10.1007/978-3-642-32172-6_14

    Scopus

    researchmap

  • 命令の乱雑さに基づくプログラム理解性の評価 Reviewed

    二村 阿美, 門田 暁人, 玉田 春昭, 神崎 雄一郎, 中村 匡秀, 松本健一

    ソフトウェア工学の基礎XIX,ソフトウェア工学の基礎ワークショップFOSE2012   151 - 16-   2012.12

     More details

  • 実行時間に依存したプログラムの暗号化

    坂口 英司, 神崎 雄一郎, 門田 暁人

    第11回情報科学技術フォーラム(FIT2012)講演論文集 第1分冊   257 - 260   2012.9

     More details

  • コードの「めずらしさ」に基づく保護機構のステルシネス考察

    尾上 栄浩, 神崎 雄一郎, 門田 暁人

    第11回情報科学技術フォーラム(FIT2012)講演論文集 第1分冊   261 - 266   2012.9

     More details

  • Handling categorical variables in effort estimation Reviewed

    Masateru Tsunoda, Sousuke Amasaki, Akito Monden

    International Symposium on Empirical Software Engineering and Measurement   99 - 102   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Background: Accurate effort estimation is the basis of the software development project management. The linear regression model is one of the widely-used methods for the purpose. A dataset used to build a model often includes categorical variables denoting such as programming languages. Categorical variables are usually handled with two methods: the stratification and dummy variables. Those methods have a positive effect on accuracy but have shortcomings. The other handing method, the interaction and the hierarchical linear model (HLM), might be able to compensate for them. However, the two methods have not been examined in the research area. Aim: giving useful suggestions for handling categorical variables with the stratification, transforming dummy variables, the interaction, or HLM, when building an estimation model. Method: We built estimation models with the four handling methods on ISBSG, NASA, and Desharnais datasets, and compared accuracy of the methods with each other. Results: The most effective method was different for datasets, and the difference was statistically significant on both mean balanced relative error (MBRE) and mean magnitude of relative error (MMRE). The interaction and HLM were effective in a certain case. Conclusions: The stratification and transforming dummy variables should be tried at least, for obtaining an accurate model. In addition, we suggest that the application of the interaction and HLM should be considered when building the estimation model. Copyright 2012 ACM.

    DOI: 10.1145/2372251.2372267

    Scopus

    researchmap

  • 実装者に依存しないプログラム規模尺度の構築の試み Reviewed

    門田 暁人, 内田 眞司, 松本 健一

    コンピュータソフトウェア   28 ( 4 )   377 - 382   2011.11

     More details

    Language:Japanese  

    researchmap

  • Java言語を対象とした実行時多様化の試み

    玉田 春昭, 神崎 雄一郎, 門田 暁人

    2012年暗号と情報セキュリティシンポジウム(SCIS2012)予稿集 (講演番号4E2-3)   2011.10

     More details

  • AN EMPIRICAL STUDY OF DEVELOPMENT VISUALIZATION FOR PROCUREMENT BY IN-PROCESS MEASUREMENT DURING INTEGRATION AND TESTING Reviewed

    Yoshiki Mitani, Hiroyuki Yoshikawa, Seishiro Tsuruho, Akito Monden, Mike Barker, Ken-Ichi Matsumoto

    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING   21 ( 3 )   367 - 388   2011.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:WORLD SCIENTIFIC PUBL CO PTE LTD  

    This study describes a new method of development visualization along with empirical evidence of its usefulness.
    Typically, development activities such as program design, programming, and unit testing are not disclosed to the procurement organization (project owner). However, during integration and testing, various issues require collaboration between the procurement organization and developers. When this occurs, it is important to make the development process visible. Recent reports indicate the usefulness for project management of various in-process project measurements which allow visualization of the formerly invisible software project progress [1-6].
    Based on this background, the authors investigated a case study where in-process measurement during the integration and test phase helped to make development issues visible. In this study, data obtained from the integration and testing phase were compared to a development process model.
    This model was based on the author's experience, and provided a vivid picture of the development activity. By applying in-process measurements in collaboration during the integration test phase, the development activity was clearly visualized, and the procurement organization understood problems.

    DOI: 10.1142/S0218194011005323

    Web of Science

    researchmap

  • Guilty or Not Guilty: Using Clone Metrics to Determine Open Source Licensing Violations Reviewed

    Akito Monden, Satoshi Okahara, Yuki Manabe, Kenichi Matsumoto

    IEEE SOFTWARE   28 ( 2 )   42 - 47   2011.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IEEE COMPUTER SOC  

    DOI: 10.1109/MS.2010.159

    Web of Science

    researchmap

    Other Link: http://dblp.uni-trier.de/db/journals/software/software28.html#journals/software/MondenOMM11

  • ソースコードレベルにおけるプログラムのカムフラー ジュ Reviewed

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    コンピュータソフトウェア   28 ( 1 )   1_300 - 1_305   2011.1

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.11309/jssst.28.1_300

    researchmap

  • A model of project supervision for process correction and improvement Reviewed

    Masateru Tsunoda, Akito Monden, Tomoko Matsumura, Ken-Ichi Matsumoto

    Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011   151 - 159   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Recently, software functional size becomes larger, and consequently, not only a software developer but also a software purchaser suffers considerable losses by software project failure. So avoiding project failure is also important for purchasers. Project supervision (monitoring and control) is expected for the purchaser to suppress risk of project failure. It is performed by sharing software metrics during the project for the purchaser to grasp the status of the project, and corrective actions are done based on analysis results of the metrics. Although there are some software measurement models, the models are not enough to describe how to confirm effects of project supervision. To acquire the effects certainly, the purchaser and the developer should quantitatively confirm whether the effects are acquired or not by project supervision. In addition, the models cannot represent corrective actions when symptoms of project failure are found. We propose the model for project supervision. The model explains planning, collecting data, transforming data, analyzing data, reaction toward found issues, and confirming effect of project supervision. With our model, project supervision can be described more rigorously. © 2011 IEEE.

    DOI: 10.1109/IWSM-MENSURA.2011.31

    Scopus

    researchmap

  • Empirical evaluation of cost overrun prediction with imbalance data Reviewed

    Masateru Tsunoda, Akito Monden, Jun-Ichiro Shibata, Ken-Ichi Matsumoto

    Proceedings - 2011 10th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2011   415 - 420   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    To prevent cost overrun of software projects, it is necessary for project managers to identify projects which have high risk of cost overrun in the early phase. So far, discriminant methods such as linear discriminant analysis and logistic regression have been used to predict cost overrun projects. However, accuracy of discriminant methods often becomes low when a dataset used for predict is imbalanced, i.e. there exists a large difference between the number of cost overrun projects and non cost overrun projects. In this paper, we compared accuracy of linear discriminant analysis, logistic regression, classification tree, Mahalanobis-Taguchi method, and collaborative filtering, by changing the percentage of cost overrun projects in the dataset. The result showed that collaborative filtering was highest accuracy among five methods. When the number of cost overrun projects and non cost overrun was balanced in the dataset, linear discriminant analysis was second highest accuracy, and when it was not balanced, Mahalanobis-Taguchi method was second highest among five methods. © 2011 IEEE.

    DOI: 10.1109/ICIS.2011.71

    Scopus

    researchmap

  • An Empirical Study of Fault Prediction with Code Clone Metrics Reviewed

    Yasutaka Kamei, Hiroki Sato, Akito Monden, Shinji Kawaguchi, Hidetake Uwano, Masataka Nagura, Kenichi Matsumoto, Naoyasu Ubayashi

    Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011   55 - 61   2011

  • An Analysis of Cost-Overrun Projects Using Financial Data and Software Metrics Reviewed

    Hidetake Uwano, Yasutaka Kamei, Akito Monden, Ken-ichi Matsumoto

    Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011   227 - 232   2011

  • ソフトウェア保護機構を構成するコードの特徴評価の試み

    神崎 雄一郎, 門田 暁人

    コンピュータセキュリティシンポジウム2011(CSS2011)予稿集   827 - 832   2011

  • A Software Protection Method based on Time-sensitive Code and Self-modification Mechanism Reviewed

    Yuichiro Kanzaki, Akito Monden

    Proc. of the the IASTED International Conference on Software Engineering and Applications (IASTED SEA 2010)   325 - 331   2010.11

     More details

  • 協調フィルタリングを用いたソフトウェア技術者向け開発技術推薦の試み Reviewed

    角田 雅照, 秋永 知宏, 引地 一将, 大杉 直樹, 柿元 健, 門田 暁人, 松本 健一

    教育システム情報学会誌   27 ( 4 )   316 - 326   2010.11

     More details

    Language:Japanese  

    researchmap

  • An Analysis of Developer Metrics for Fault Prediction Reviewed

    Shinsuke Matsumoto, Yasutaka Kamei, Akito Monden, Ken-ichi Matsumoto, Masahide Nakamura

    Proc. 6th International Conference on Predictive Models in Software Engineering (PROMISE2010)   USB - USB   2010.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • ソフトウェア開発における適正工期に関する分析 Reviewed

    戸田 航史, 門田 暁人, 松本 健一

    経済調査研究レビュー   7 ( 7 )   38 - 46   2010.9

     More details

    Language:Japanese  

    researchmap

  • 開発者メトリクスに基づくソフトウェア信頼性の分析 Reviewed

    ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    電子情報通信学会論文誌   J93-D ( 8 )   1576 - 1589   2010.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 欠損値処理法を用いた工数予測におけるデータ件数と予測精度の関係

    田村 晃一, 門田 暁人, 松本 健一

    コンピュータソフトウェア   27 ( 2 )   100 - 105   2010.5

     More details

    Language:Japanese  

    researchmap

  • 粗粒度モジュールに対するバグ密度予測の精度評価

    亀井 靖高, 本 真佑, 門田 暁人, 松本 健一

    電子情報通信学会技術研究報告   109 ( 456 )   145 - 150   2010.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Using search-based metric selection and oversampling to predict fault prone modules Reviewed

    R. Vivanco, Y. Kamei, A. Monden, K. Matsumoto, D. Jin

    Canadian Conference on Electrical and Computer Engineering   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Predictive models can be used in the detection of fault prone modules using source code metrics as inputs for the classifier. However, there exist numerous structural measures that capture different aspects of size, coupling and complexity. Identifying a metric subset that enhances the performance for the predictive objective would not only improve the model but also provide insights into the structural properties that lead to problematic modules. Another difficulty in building predictive models comes from unbalanced datasets, which are common in empirical software engineering as a majority of the modules are not likely to be faulty. Oversampling attempts to overcome this deficiency by generating new training instances from the faulty modules. We present the results of applying searchbased metric selection and oversampling to three NASA datasets. For these datasets, oversampling results in the largest improvement. Metric subset selection was able to reduce up to 52% of the metrics without decreasing the predictive performance gained with oversampling. © 2010 IEEE.

    DOI: 10.1109/CCECE.2010.5575249

    Scopus

    researchmap

  • 原価率とプロジェクトメトリクスに着目したソフトウェア開発プロジェクトの特徴分析 Reviewed

    上野 秀剛, 亀井 靖高, 門田 暁人, 松本 健一

    プロジェクトマネジメント学会誌   12 ( 5 )   25 - 30   2010

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • クローンメトリクスを用いたFault-Prone モジュール判別の追実験 Reviewed

    亀井 靖高, 左藤 裕紀, 門田 暁人, 川口 真司, 上野 秀剛, 名倉 正剛, 松本 健一

    電子情報通信学会論文誌   93-D ( 4 )   544 - 547   2010

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Revisiting Common Bug Prediction Findings Using Effort Aware Models Reviewed

    Yasutaka Kamei, Shinsuke Matsumoto, Akito Monden, Ken-ichi Matsumoto, Bram Adams, Ahmed E. Hassan

    In Proceedings of The 26th IEEE International Conference on Software Maintenance (ICSM2010)   1 - 10   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICSM.2010.5609530

    CiNii Article

    researchmap

  • Low Quality Module Prediction from Design Documents Metrics using Software Tag

    Shin-ichi Katayama, Kimiharu Ohkura, Kyohei Fushida, Shinji Kawaguchi, Masataka Nagura, Akito Monden, Hajimu Iida

    IEICE technical report   109 ( 343 )   67 - 72   2009.12

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)   Publisher:電子情報通信学会  

    It is important to detect low quality modules which are likely to have many defects at an early development phase for creating high quality software. Hence, various prediction models are proposed such as linear discriminant analysis, logistic regression analysis, and neural networks. These methods, however, use metrics measured mainly from a source code, thus they can only be applied after implementation is completed. We attempt to predict low quality modules using design documents metrics included in software tags. Using design documents metrics, we can predict when design is completed, thus our method contribute to reliability enhancement activities at an implementation phase. We applied multiple regression analysis and genetic programming, and detected low quality modules with high accuracy compared to a random selection method.

    CiNii Article

    CiNii Books

    researchmap

  • Software development productivity of Japanese enterprise applications Reviewed

    Tsunoda Masateru, Monden Akito, Yadohisa Hiroshi, Kikuchi Nahomi, Matsumoto Kenichi

    INFORMATION TECHNOLOGY & MANAGEMENT   10 ( 4 )   193 - 205   2009.12

     More details

  • ソフトウェア開発工数予測のためのフィットデータ選定方法 Reviewed

    戸田 航史, 門田 暁人, 松本 健一

    情報処理学会論文誌   50 ( 11 )   2699 - 2709   2009.11

     More details

    Language:Japanese  

    researchmap

  • ソフトウェアバグと変数名の関係の分析

    山本 博之, 亀井 靖高, 本 真佑, 門田 暁人, 松本 健一

    電子情報通信学会技術研究報告   109 ( 307 )   67 - 71   2009.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • 開発者メトリクスを用いたソフトウェア信頼性の分析 Reviewed

    ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    ソフトウェア工学の基礎ワークショップ FOSE2009   35   207 - 214   2009.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • メトリクス値の標準化によるFault-Proneモジュール判別モデルの精度向上

    藏本 達也, ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    情報処理学会研究報告   2009-SE-166 ( 10 )   2009.10

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発プロファイルデータの相関ルール分析 Reviewed

    森崎 修司, 木村 早苗, 門田 暁人, 松本 健一

    経済調査研究レビュー   5 ( 5 )   88 - 94   2009.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Empirical Evaluation of Similarity-Based Missing Data Imputation for Effort Estimation Reviewed

    TAMURA Koichi, KAKIMOTO Takeshi, TODA Koji, TSUNODA Masateru, MONDEN Akito, MATSUMOTO Ken-ichi, OHSUGI Naoki

    コンピュータソフトウェア   26 ( 3 )   44 - 55   2009.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:日本ソフトウェア科学会  

    DOI: 10.11309/jssst.26.3_44

    CiNii Article

    researchmap

  • Modeling of Test Effort Allocation and Software Reliability in Fault-prone Module Detection Reviewed

    Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Shinsuke Matsumoto, Ken-ichi Matsumoto, Shinji Kusumoto

    IPSJ Journal   50 ( 7 )   1716 - 1724   2009.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人情報処理学会  

    Various fault-prone detection models have been proposed to improve software reliability. However, while improvement of prediction accuracy was discussed, there was few discussion about how the models shuld be used in the field, i.e. how test effort should be allocated. Thus, improvement of software reliability by fault-prone module detection was not clear. In this paper, we proposed TEAR (Test Effort Allocation and software Reliability) model that represents the relationship among fault-prone detection, test effort allocation and software reliability. The result of simulations based on TEAR...

    CiNii Article

    researchmap

  • ソフトウェア開発費に影響する要因の分析 Reviewed

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 4 )   64 - 76   2009.3

     More details

    Language:Japanese  

    researchmap

  • The Effect of Collaborative Filtering on Software Component Recommendation Reviewed

    Yasutaka Kamei, Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, Akito Monden, Ken-ichi Matsumoto

    IPSJ Journal   50 ( 3 )   1139 - 1143   2009.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人情報処理学会  

    To clarify the effect of collaborative filtering (CF) on recommending highgenerality / low-generality software components, we experimentally verified two hypotheses; (1) the recommendation accuracy of CF for high-generality components is better than that of conventional methods (random algorithm and user average algorithm) and (2) the recommendation accuracy of CF for lowgenerality components is better than that of the conventional methods. We evaluated recommendation accuracy of CF with a dataset containing 29 open source software development projects (including 2,558 used components). As ...

    CiNii Article

    researchmap

  • Software development effort estimation models stratified by productivity factors Reviewed

    SEC journal   5 ( 1 )   58 - 67   2009.3

     More details

    Language:Japanese   Publisher:INFORMATION-TECHNOLOGY PROMOTION AGENCY,JAPAN  

    DOI: 10.11186/secjournal.5.58

    CiNii Article

    CiNii Books

    researchmap

    Other Link: https://jlc.jst.go.jp/DN/JALC/00329157843?from=CiNii

  • ソースコードと設計書を対象としたレビューにおける開発者の能力の比較 Reviewed

    上野 秀剛, 門田 暁人, 松本 健一

    ソフトウェア信頼性研究会 第5回ワークショップ   91 - 93   2009

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • 不具合履歴に基づくソフトウェアIV&V活動の定量的見える化手法 Reviewed

    まつ本 真佑, 上野 秀剛, 門田 暁人, 松本 健一, 片平 真史, 神武 直彦, 宮本 祐子, 氏原 頌悟, 吉川 茂雄

    電子情報通信学会論文誌   J92-D ( 12 )   2195 - 2206   2009

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • ブレークポイント使用履歴に基づくデバッグ行動の分析 Reviewed

    吉村 巧朗, 亀井 靖高, 上野 秀剛, 門田 暁人, 松本 健一

    電子情報通信学会技術研究報告. 知能ソフトウェア工学   109 ( 307 )   85 - 89   2009

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • A Proposal of Derivation Methods of Fp Transformation Formulas Reviewed

    Masateru Tsunoda, Shinsuke Matsumoto, Akito Monden, Ken-ichi Matsumoto

    In Proc. of Workshop on Accountability and Traceability in Global Software Engineering (ATGSE2008)   25 - 26   2008.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Cost Effective IV&V Planning Activity Derived from Experiences on Jaxa's Spacecraft Projects Reviewed

    Tsutomu Matsumoto, Shinsuke Matsumoto, Hidetake Uwano, Akito Monden, Yuko Miyamoto, Shogo Ujihara, Naohiko Kohtake, Masafumi Katahira

    ESA Workshop on Avionics Data, Control and Software Systems (ADCSS2008)   2008.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Goal-Oriented Approach to Software Obfuscation Reviewed

    Hiroki Yamauchi, Akito Monden, Masahide Nakamura, Haruaki Tamada, Yuichiro Kanzaki, Ken-ichi Matsumoto

    International Journal of Computer Science and Network Security   8 ( 9 )   59 - 71   2008.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    CiNii Article

    researchmap

  • ソフトウェア保守業務の現状分析 Reviewed

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 3 )   46 - 59   2008.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Deriving quantitative relationship among project size, delivery, team size and effort Reviewed

    Takeshi Kakimoto, Akito Monden, Masateru Tsunoda, Ken-ichi Matsumoto, Nahomi Kikuchi

    SEC journal   4 ( 2 )   6 - 11   2008.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:情報処理推進機構ソフトウェア・エンジニアリング・センター  

    CiNii Article

    CiNii Books

    researchmap

  • A Variable Selection Method for Analogy-based Effort Estimation

    瀧 進也, 戸田 航史, 門田暁人, 柿元健, 角田 雅照, 大杉 直樹, 松本 健一

    情報処理学会論文誌   49 ( 7 )   2338 - 2348   2008.7

     More details

    Language:Japanese   Publisher:情報処理学会  

    ソフトウェア開発における多変数の実績データを用いた工数見積りでは,その精度を高めるうえで,見積りに不要な変数を除去することが必須となる.しかし,近年注目されているプロジェクト間の類似性に基づく工数見積り方法(analogy-based法)においては,その特性を活かした変数選択法が提案されていない.本論文では,「説明変数(プロジェクト特性)の値が似ているプロジェクトどうしは工数も似た値をとる」というanalogy-based法の考え方を踏襲し,目的変数である工数との相関係数が低い説明変数を除去することで,説明変数の値が似ていれば目的変数の値も似ているという状態を保つように変数選択する方法Correlation Threshold based Selection(CTS)を提案する.ソフトウェア開発企業で収集された3種類の開発実績データセットを用いた評価実験の結果,CTSは,従来手法であるステップワイズ変数選択法と比べて計算量が小さく,特に,カテゴリ変数の数が少ない場合に,安定して精度を改善することができた.Analogy-based estimation methods have been studied for deriving an accurate effort estimate required to complete a project; however, few studies have focused on their variable selection methods. Here, variables to be selected are predictor variables (e.g. development size and development duration, etc.) related to an objective variable (effort). In this paper, we propose Correlation Threshold based Selection (CTS) method that exploits the basic concept of analogy-based estimation where efforts are similar if predictor variables are similar. The proposed method requires few amount of calculation while it can accurately exclude variables that do not correlate with the effort. This paper experimentally evaluated the effectiveness of the proposed method by using three data sets collected from software development companies. The result showed that the proposed method provided high estimation accuracy for projects having larger number of predictor variables.

    CiNii Article

    CiNii Books

    researchmap

  • A Variable Selection Method for Analogy-based Effort Estimation Reviewed

    Shinya Taki, Koji Toda, Akito Monden, Takeshi Kakimoto, Masateru Tsunoda, Naoki Ohsugi, Ken-ichi Matsumoto

    IPSJ Journal   49 ( 7 )   2338 - 2348   2008.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人情報処理学会  

    Analogy-based estimation methods have been studied for deriving an accurate effort estimate required to complete a project; however, few studies have focused on their variable selection methods. Here, variables to be selected are predictor variables (e.g. development size and development duration, etc.) related to an objective variable (effort). In this paper, we propose Correlation Threshold based Selection (CTS) method that exploits the basic concept of analogy-based estimation where efforts are similar if predictor variables are similar. The proposed method requires few amount of calcula...

    CiNii Article

    researchmap

  • 情報システム運用業務の現状分析 Reviewed

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 2 )   100 - 110   2008.3

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Fault-proneモジュール判別における外れ値除去法の比較 Reviewed

    ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    情報処理学会論文誌   49 ( 3 )   1341 - 1351   2008.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Introducing Dynamic Name Resolution Mechanism for Obfuscating System-Defined Names in Programs Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proc. of the IASTED International Conference on Software Engineering (IASTED SE 2008)   125 - 130   2008.2

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • プロセス改善のためのソフトウェア開発タスク計測システム Reviewed

    門田 暁人, 亀井 靖高, 上野 秀剛, 松本 健一

    第15回ソフトウェア工学の基礎ワークショップ (FOSE 2008)   123 - 128   2008

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • コードクローンの長さとソフトウェア信頼性の関係の分析 Reviewed

    左藤 裕紀, 亀井 靖高, 上野 秀剛, 川口 真司, 名倉 正剛, 門田 暁人, 松本 健一, 飯田 元

    電子情報通信学会技術研究報告. ソフトウェアサイエンス   108 ( 242 )   43 - 48   2008

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • Fit data selection for software effort estimation models. Reviewed

    Koji Toda, Akito Monden, Ken-ichi Matsumoto

    Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, ESEM 2008, October 9-10, 2008, Kaiserslautern, Germany   360 - 361   2008

  • A Hybrid Faulty Module Prediction Using Association Rule Mining and Logistic Regression Analysis Reviewed

    Yasutaka Kamei, Akito Monden, Shuji Morisaki, Ken-ichi Matsumoto

    ESEM'08: PROCEEDINGS OF THE 2008 ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT   279 - 281   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ASSOC COMPUTING MACHINERY  

    This paper proposes a fault-prone module prediction method that combines association rule mining with logistic regression analysis. In the proposed method, we focus on three key measures of interestingness of an association rule (support, confidence and lift) to select useful rules for the prediction. If a module satisfies the premise (i.e. the condition in the antecedent part) of one of the selected rules, the module is classified by the rule as either fault-prone or not. Otherwise, the module is classified by the logistic model. We experimentally evaluated the prediction performance of the proposed method with different thresholds of each rule interestingness measure (support, confidence and lift) using a module set in the Eclipse project, and compared it with three well-known fault-proneness models (logistic regression model, linear discriminant model and classification tree). The result showed that the improvement of the F1-value of the proposed method was 0.163 at maximum compared to conventional models.

    Web of Science

    researchmap

  • An Over-sampling Method for Analogy-based Software Effort Estimation Reviewed

    Yasutaka Kamei, Jacky Keung, Akito Monden, Ken-ichi Matsumoto

    ESEM'08: PROCEEDINGS OF THE 2008 ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT   312 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ASSOC COMPUTING MACHINERY  

    This paper proposes a novel method to generate synthetic project cases and add them to a fit dataset for the purpose of improving the performance of analogy-based software effort estimation. The proposed method extends conventional over-sampling method, which is a preprocessing procedure for n-group classification problems, which makes it suitable for any imbalanced dataset to be used in analogy-based system. We experimentally evaluated the effect of the over-sampling method to improve the performance of the analogy-based software effort estimation by using the Desharnais dataset. Results show significant improvement to the estimation accuracy by using our approach.

    Web of Science

    researchmap

  • Are Good Code Reviewers Also Good at Design Review? Reviewed

    Hidetake Uwano, Akito Monden, Ken-ichi Matsumoto

    ESEM'08: PROCEEDINGS OF THE 2008 ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT   351 - 353   2008

  • Dresrem 2: An Analysis System for Multi-Document Software Review Using Reviewers' Eye Movements Reviewed

    Hidetake Uwano, Akito Monden, Ken-ichi Matsumoto

    Proceedings - The 3rd International Conference on Software Engineering Advances, ICSEA 2008, Includes ENTISY 2008: International Workshop on Enterprise Information Systems   177 - 183   2008

  • Analyzing factors of defect correction effort in a multi-vendor information system development Reviewed

    Tomoko Matsumura, Shuji Morisaki, Akito Monden, Ken-Ichi Matsumoto

    Journal of Computer Information Systems   49 ( 1 )   73 - 80   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:International Association for Computer Information Systems  

    This paper describes an empirical study to reveal factors influencing defect correction effort in software development. In the study we collected various attributes (metrics) of defects found in a typical medium-scale, multi-vendor information system development project in Japan over a six-month period. We then statistically analyzed the relationship between the defects' attributes and the correction effort. The analysis confirmed the well-known principle "defects are the more expensive the later they are detected" by revealing that defects detected in the "system test" were 4.88 times more expensive than those detected in the "coding/unit test". Another principle "defects are more expensive the longer they survive in software" was also confirmed by revealing that defects, which survived two or more development phases, were 4.44 times more expensive than those detected immediately. We also identified other factors, such as defect reproducibility, severity, and the cause of detection delay, that had a significant influence on the correction effort.

    DOI: 10.1080/08874417.2008.11645308

    Scopus

    researchmap

  • 異なるプロジェクト間におけるFault-Proneモジュール判別の精度評価 Reviewed

    木浦 幹雄, ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    ソフトウェア工学の基礎XIV 日本ソフトウェア科学会 FOSE2007   131 - 136   2007.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Exploiting Eye Movements for Evaluating Reviewer's Performance in Software Review Reviewed

    Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    IEICE Transactions on Fundamentals   E90-A ( 10 )   317 - 328   2007.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper proposes to use eye movements to characterize the performance of individuals in reviewing software documents. We design and implement a system called DRESREM, which measures and records eye movements of document reviewers. Based on the eye movements captured by eye tracking device, the system computes the line number of the document that the reviewer is currently looking at. The system can also record and play back how the eyes moved during the review process. To evaluate the effectiveness of the system we conducted an experiment to analyze 30 processes of source code review (6 programs, 5 subjects) using the system. As a result, we have identified a particular pattern, called scan, in the subject's eye movements. Quantitative analysis showed that reviewers who did not spend enough time on the scan took more time to find defects on average.

    DOI: 10.1093/ietfec/e90-a.10.2290

    CiNii Article

    CiNii Books

    researchmap

  • APIライブラリ名隠ぺいのための動的名前解決を用いた名前難読化 Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    電子情報通信学会論文誌D   J90-D ( 10 )   2723 - 2735   2007.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Comparison of Outlier Detection Methods in Fault-Proneness Models Reviewed

    Shinsuke Matsumoto, Yasutaka Kamei, Akito Monden, Ken-ichi Matsumoto

    Proceedings of the 1st International Symposium on Empirical Software Engineering and Measurement (ESEM2007)   461 - 463   2007.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ESEM.2007.34

    CiNii Article

    researchmap

  • ソフトウェア開発工数積算のための生産性分析 Reviewed

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 1 )   114 - 119   2007.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Applying Sampling Methods to Fault-prone Module Detection(Evaluation and Management,<Special Issue>Software Engineering Theory and Practice) Reviewed

    KAMEI YASUTAKA, MATSUMOTO SHINSUKE, KAKIMOTO TAKESHI, MONDEN AKITO, MATSUMOTO KEN-ICHI

    IPSJ Journal   48 ( 8 )   2651 - 2662   2007.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人情報処理学会  

    To improve the prediction performance of fault-proneness models, this paper experimentally evaluates the effect of over and under sampling methods, which are preprocessing procedures for a fit dataset. The sampling methods are expected to improve the prediction performance when the fit dataset is imbalanced, i.e. there exists a large bias between the number of faultprone modules and the number of non-fault-prone modules. There is, however, no research that reports the effects of applying sampling methods to fault-proneness models. In the experiment, we evaluated the effects of four sampling...

    CiNii Article

    researchmap

  • 他プロジェクトの実績データに基づくFault-Proneモジュール判別の試み

    木浦 幹雄, ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    ソフトウェア信頼性研究会 第4回ワークショップ   45 - 53   2007.7

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    CiNii Article

    researchmap

  • Fault-Proneモジュール判別モデルに対する外れ値除去法の適用効果

    ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    情報処理学会研究報告   2007-SE-155 ( 33 )   49 - 56   2007.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)   Publisher:Information Processing Society of Japan (IPSJ)  

    In this paper, we experimentally evaluate outlier detection methods, which detect data points that are far away from others in a data set, in terms of improving the prediction performance of fault-prone module detection models. In the experiment, we compared two outlier detection methods (MOA, LOFM) each applied to three well-known fault-prone module detection models (LDA, LRA, CT). The result showed that MOA improved Fl-values of all fault-proneness models (0.04 at minimum, 0.17 at maximum and 0.10 at mean) while improvements by LOFM were relatively small (-0.01 at minimum, 0.04 at maximum and 0.01 at mean).

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00021154/

  • Defect data analysis based on extended association rule mining Reviewed

    Shuji Morisaki, Akito Monden, Tomoko Matsumura, Haruaki Tamada, Ken-Ichi Matsumoto

    Proceedings - ICSE 2007 Workshops: Fourth International Workshop on Mining Software Repositories, MSR 2007   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    This paper describes an empirical study to reveal rules associated with defect correction effort. We defined defect correction effort as a quantitative (ratio scale) variable, and extended conventional (nominal scale based) association rule mining to directly handle such quantitative variables. An extended rule describes the statistical characteristic of a ratio or interval scale variable in the consequent part of the rule by its mean value and standard deviation so that conditions producing distinctive statistics can be discovered. As an analysis target, we collected various attributes of about 1,200 defects found in a typical medium-scale, multi-vendor (distance development) information system development project in Japan. Our findings based on extracted rules include: (1)Defects detected in coding/unit testing were easily corrected (less than 7% of mean effort) when they are related to data output or validation of input data. (2)Nevertheless, they sometimes required much more effort (lift of standard deviation was 5.845) in case of low reproducibility, (3)Defects introduced in coding/unit testing often required large correction effort (mean was 12.596 staff-hours and standard deviation was 25.716) when they were related to data handing. From these findings, we confirmed that we need to pay attention to types of defects having large mean effort as well as those having large standard deviation of effort since such defects sometimes cause excess effort. © 2007 IEEE.

    DOI: 10.1109/MSR.2007.5

    Scopus

    researchmap

  • ソースコードの圧縮性とコードクローンの関係の分析 Reviewed

    左藤 裕紀, 亀井 靖高, 上野 秀剛, 川口 真司, 門田 暁人, 松本 健一

    日本ソフトウェア科学会 第24回大会   2007

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • Mining Quantitative Rules in a Software Project Data Set

    Morisaki Shuji, Monden Akito, Tamada Haruaki, Matsumura Tomoko, Matsumoto Ken-ichi

    ipsjdc   3   518 - 527   2007

     More details

    Language:English   Publisher:Information Processing Society of Japan  

    This paper proposes a method to mine rules from a software project data set that contains a number of quantitative attributes such as staff months and SLOC. The proposed method extends conventional association analysis methods to treat quantitative variables in two ways: (1) the distribution of a given quantitative variable is described in the consequent part of a rule by its mean value and standard deviation so that conditions producing the distinctive distributions can be discovered. To discover optimized conditions, (2) quantitative values appearing in the antecedent part of a rule are divided into contiguous fine-grained partitions in preprocessing, then rules are merged after mining so that adjacent partitions are combined. The paper also describes a case study using the proposed method on a software project data set collected by Nihon Unisys Ltd. In this case, the method mined rules that can be used for better planning and estimation of the integration and system testing phases, along with criteria or standards that help with planning of outsourcing resources.

    DOI: 10.2197/ipsjdc.3.518

    CiNii Article

    researchmap

  • Mining Quantitative Rules in a Software Project Data Set

    Morisaki Shuji, Monden Akito, Tamada Haruaki, Matsumura Tomoko, Matsumoto Ken-ichi

    Information and Media Technologies   2 ( 4 )   999 - 1008   2007

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    This paper proposes a method to mine rules from a software project data set that contains a number of quantitative attributes such as staff months and SLOC. The proposed method extends conventional association analysis methods to treat quantitative variables in two ways: (1) the distribution of a given quantitative variable is described in the consequent part of a rule by its mean value and standard deviation so that conditions producing the distinctive distributions can be discovered. To discover optimized conditions, (2) quantitative values appearing in the antecedent part of a rule are divided into contiguous fine-grained partitions in preprocessing, then rules are merged after mining so that adjacent partitions are combined. The paper also describes a case study using the proposed method on a software project data set collected by Nihon Unisys Ltd. In this case, the method mined rules that can be used for better planning and estimation of the integration and system testing phases, along with criteria or standards that help with planning of outsourcing resources.

    DOI: 10.11185/imt.2.999

    CiNii Article

    researchmap

  • Evaluating the Robustness of Collaborative Filtering Based Effort Estimation Method against Data Missing Reviewed

    KAKIMOTO Takeshi, TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken-ichi

    The IEICE transactions on information and systems (Japanese edetion)   89 ( 12 )   2602 - 2611   2006.12

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • プログラマの視線を用いたコードレビュー性能の要因分析 Reviewed

    Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    ソフトウェア工学の基礎XIII 日本ソフトウェア科学会FOSE 2006   103 - 112   2006.11

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Java クラスファイル難読化ツール DonQuixote Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    ソフトウェア工学の基礎XIII, 日本ソフトウェア科学会 FOSE2006   113 - 118   2006.11

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • 進行中のプロジェクト計測とフィードバック実験に基づく計測データベース活用方式の提案 Reviewed

    神谷芳樹, 菊池奈穂美, 松村知子, 大杉直樹, 門田暁人, 肥後芳樹, 井上克郎, 松本健一

    情報処理学会ソフトウェアエンジニアリングシンポジウム200   2006.10

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • API呼び出しを用いた動的バースマーク Reviewed

    Keiji Okamoto, Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    電子情報通信学会論文誌D   J89-D ( 8 )   1751 - 1763   2006.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • 情報漏えいのリスクと生産性を考慮したソフトウェアプロセスの開発者割当て探索 Reviewed

    Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    ソフトウェアシンポジウム2006   24 - 32   2006.7

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Analyzing Individual Performance of Source Code Review Using Reviewers’ Eye Movement Reviewed

    Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proceedings of Int'l Eye Tracking Research & Applications Symposium (ETRA 2006)   133 - 140   2006.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • A Software Protection Method Based on Instruction Camouflage Reviewed

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    Electronics and Communications in Japan, Part 3   89 ( 1 )   47 - 59   2006.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/ecjc.20141

    researchmap

  • Software Obfuscation from Crackers’ Viewpoint Reviewed

    Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    Proc. IASTED International Conference on Advances in Computer Science and Technology (IASTED ACST 2006)   286 - 291   2006.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Productivity analysis of Japanese enterprise software development projects Reviewed

    Masateru Tsunoda, Akito Monden, Hiroshi Yadohisa, Nahomi Kikuchi, Ken-Ichi Matsumoto

    Proceedings - International Conference on Software Engineering   14 - 17   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    To clarify the relation between controllable attributes of a software development and its productivity, this paper experimentally analyzed a software project repository (SEC repository), consisting of 253 enterprise software development projects in Japanese companies, established by Software Engineering Center (SEC), Information-technology Promotion Agency, Japan. In the experiment, as controllable attributes, we focused on the outsourcing ratio of a software project, defined as an effort outsourced to subcontract companies divided by a whole development effort, and on the effort allocation balance among development phases. Our major findings include both larger outsourcing ratio and smaller upstream process effort leads to worse productivity. Copyright 2006 ACM.

    DOI: 10.1145/1137983.1137988

    Scopus

    researchmap

  • Quantitative Analysis of Information Leakage in Security-Sensitive Software Processes

    Kanzaki Yuichiro, Igaki Hiroshi, Nakamura Masahide, Monden Akito, Matsumoto Ken-ichi

    Information and Media Technologies   1 ( 1 )   121 - 133   2006

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    This paper presents a method to evaluate the risk of information leakage in software processes for security-sensitive applications. A software process is modeled as a series of sub-processes, each of which produces new work products from input products. Since a process is conducted usually by multiple developers, knowledge of work products is shared among the developers. Through the collaboration, a developer may share with others the knowledge of products that are not related to the process. We capture the transfer of such irrelevant product knowledge as information leakage in a software process. In this paper, we first formulate the problem of information leakage by introducing a formal software process model. Then, we propose a method to derive the probability that each developer d knows each work product p at a given process of software development. The probability reflects the possibility that someone leaked the knowledge of p to d. We also conduct three case studies to show the applicability of leakage to practical settings. In the case studies, we evaluate how the risk of information leakage is influenced by the collaboration among developers, the optimal developer assignment and the structure of the software process. As a result, we show that the proposed method provides a simple yet powerful means to perform quantitative analysis on information leakage in a security-sensitive software process.

    DOI: 10.11185/imt.1.121

    CiNii Article

    researchmap

  • Java Birthmarks -- Detecting the Software Theft Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    IEICE Transactions on Information and Systems   E88-D ( 9 )   2148 - 2158   2005.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which are unique and native characteristics of every class file. For a pair of class files p and q, if q has the same birthmark as p's, q is suspected as a copy of p. Ideally, the birthmarks should satisfy the following properties : (a) preservation - the birthmarks should be preserved even if the original class file is tampered with, and (b) distinction - independent class files must be distinguished by completely different birthmarks. Taking (a) and (b) into account, we propose four types of birthmarks for Java class files. To show the effectiveness of the proposed birthmarks, we conduct three experiments. In the first experiment, we demonstrate that the proposed birthmarks are sufficiently robust against automatic program transformation (93.3876% of the birthmarks were preserved). The second experiment shows that the proposed birthmarks successfully distinguish non-copied files in a practical Java application (97.8005% of given class files were distinguished). In the third experiment, we exploit different Java compilers to confirm that the proposed Java birthmarks are core characteristics independent of compiler-specific issues.

    DOI: 10.1093/ietisy/e88-d.9.2148

    CiNii Article

    CiNii Books

    researchmap

  • Quantitative analysis of information leakage in security-sensitive software processes Reviewed

    Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    IPSJ Journal, Special Issue on Research on Computer Security Characterized in the Context of Social Responsibilities   46 ( 8 )   2129 - 2141   2005.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Software analysis by code clones in open source software Reviewed

    Shinji Uchida, Akito Monden, Naoki Ohsugi, Toshihiro Kamiya, Ken Ichi Matsumoto, Hideo Kudo

    Journal of Computer Information Systems   45 ( 3 )   1 - 11   2005.3

     More details

    Publishing type:Research paper (scientific journal)  

    The code clone (a duplicated code section in the source files of software) is one of the factors that complicate software maintenance. However, few empirical studies have analyzed the status quo of code clones. In this paper we conduct an extensive analysis of code clones using 125 packages of open source software written in C language, and suggest guidelines for the allowable production of code clones. Our results showed 11.3% as the average CRate (clone inclusion rate). For software packages that did not include automatically generated code, the CRate was 9.7%, the in-module CRate 8.2%, and the inter-module CRate 1.3%. These rates can be used as criteria for the allowable amount of code clone production. This paper also presents our findings on factors of code clone production, the influence of code clone production on maintainability, and removal methods.

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/jcis/jcis45.html#UchidaMOKMK05

  • Characterizing Dynamics of Information Leakage in Software Process Reviewed

    Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proc. 3rd Australasian Information Security Workshop (AISW2005)   44   145 - 151   2005.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Tamper-resistant software system based on a finite state machine Reviewed

    Akito Monden, Antoine Monsifrot, Clark Thomborson

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   112 - 122   2005

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    Many computer systems are designed to make it easy for end-users to install and update software. An undesirable side effect, from the perspective of many software producers, is that hostile end-users may analyze or tamper with the software being installed or updated. This paper proposes a way to avoid the side effect without affecting the ease of installation and updating. We construct a computer system M with the following properties: 1) the end-user may install a program P in any conveniently accessible area of M
    2) the program P contains encoded instructions whose semantics are obscure and difficult to understand
    and 3) an internal interpreter W, embedded in a non-accessible area of M, interprets the obfuscated instructions without revealing their semantics. Our W is a finite state machine (FSM) which gives context-dependent semantics and operand syntax to the encoded instructions in P
    thus, attempts to statically analyze the relation between instructions and their semantics will not succeed. We present a systematic method for constructing a P whose instruction stream is always interpreted correctly regardless of its input, even though changes in input will (in general) affect the execution sequence of instructions in P. Our framework is easily applied to conventional computer systems by adding a FSM unit to a virtual machine or a reconfigurable processor. Copyright © 2005 The Institute of Electronics, Information and Communication Engineers.

    DOI: 10.1093/ietfec/E88-A.1.112

    Scopus

    researchmap

  • マルチバージョン生成によるプログラムの解析防止 Reviewed

    Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    ソフトウェア工学の基礎XI, 日本ソフトウェア科学会FOSE2004   157 - 160   2004.11

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの提案 Reviewed

    Keiji Okamoto, Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    ソフトウェア工学の基礎XI, 日本ソフトウェア科学会FOSE2004   85 - 88   2004.11

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    CiNii Article

    researchmap

  • Dynamic Software Birthmarks to Detect the Theft of Windows Applications Reviewed

    Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proc. International Symposium on Future Software Technology 2004 (ISFST 2004)   CDROM   2004.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • 命令のカムフラージュによるソフトウェア保護方法 Reviewed

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    電子情報通信学会論文誌A   J87-A ( 6 )   755 - 767   2004.6

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Design and evaluation of birthmarks for detecting theft of Java programs Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proc. IASTED International Conference on Software Engineering (IASTED SE 2004)   569 - 575   2004.2

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • Effort estimation based on Collaborative Filtering Reviewed

    N Ohsugi, M Tsunoda, A Monden, K Matsumoto

    PRODUCT FOCUSED SOFTWARE PROCESS IMPROVEMENT   3009   274 - 286   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:SPRINGER-VERLAG BERLIN  

    Effort estimation methods are one of the important tools for project managers in controlling human resources of ongoing or future software projects. The estimations require historical project data including process and product metrics that characterize past projects. Practically, in using the estimation methods, it is a problem that the historical project data frequently contain substantial missing values. In this paper, we propose an effort estimation method based on Collaborative Filtering for solving the problem. Collaborative Filtering has been developed in information retrieval researchers, as one of the estimation techniques using defective data, i.e. data having substantial missing values. The proposed method first evaluates similarity between a target (ongoing) project and each past project, using vector based similarity computation equation. Then it predicts the effort of the target project with the weighted sum of the efforts of past similar projects. We conducted an experimental case study to evaluate the estimation performance of the proposed method. The proposed method showed better performance than the conventional regression method when the data had substantial missing values.

    Web of Science

    researchmap

  • Exploiting self-modification mechanism for program protection Reviewed

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    Proc. 27th Computer Software and Applications Conference (compsac2003)   170 - 179   2003.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • Queue-based cost evaluation of mental simulation process in program comprehension Reviewed

    Masahide Nakamura, Akito Monden, Tomoaki Itoh, Ken-ichi Matsumoto, Yuichiro Kanzaki, Hirotsugu Satoh

    Proc. 9th IEEE International Software Metrics Symposium (METRICS2003)   351 - 360   2003.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/METRIC.2003.1232480

    CiNii Article

    researchmap

  • A recommendation system for software function discovery Reviewed

    N Ohsugi, A Monden, K Matsumoto

    APSEC 2002: NINTH ASIA PACIFIC SOFTWARE ENGINEERING CONFERENCE   248 - 257   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE COMPUTER SOC  

    Since many of today's application software provide users with too many functions, the users sometimes cannot find the useful functions. This paper proposes a recommendation system based on a collaborative filtering approach to let users discover useful functions at low cost for the purpose of improving the user's productivity in using application software. The proposed system automatically collects histories of software function execution (usage histories) from many users through the Internet. Based on the collaborative filtering approach, collected histories are used to recommend the user a set of candidate functions that may be useful to the individual user. This paper illustrates conventional filtering algorithms and proposes a new algorithm suitable for recommendation of software functions. The result of an experiment with a prototype recommendation system showed that the average napin of our algorithm was smaller,than that of the conventional algorithms; and, it also showed that the standard deviation of ndpm of our algorithm was smaller than that of the conventional algorithms. Furthermore, while every conventional algorithm had a case whose recommendation was worse than the random algorithm, our algorithm did not.

    Web of Science

    researchmap

  • The detection of faulty code violating implicit coding rules Reviewed

    T Matsumura, A Monden, K Matsumoto

    2002 INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING, PROCEEDINGS   173 - 182   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE COMPUTER SOC  

    In the field of legacy software maintenance, there unexpectedly arises a large number of implicit coding rules, which we regard as a cancer in software evolution. Since such rules are usually undocumented and each of them is recognized only by, a few members in a maintenance team, a person who is not aware of a rule often violates it while doing various maintenance activities such as adding a new functionality, or repairing faults. The problem here is not only, such a violation introduces a new fault but also the same kind of fault will be generated again and again in the future by different maintainers.
    This paper proposes a method for detecting code fragments that violate implicit coding rules. In the method, an expert maintainer, firstly, investigates the cause of each failure, described in the past failure reports, and identifies all the implicit coding rules that lie behind the faults. Then, the code patterns violating the rules (which we call "faulty code patterns") are described in a pattern description language. Finally, the potential faulty code fragments are automatically detected by a pattern matching technique.
    The result of a case study with large legacy software showed that 32.7% of the failures, which have been reported during a maintenance process, were due to the violation of implicit coding rules. Moreover, 152 faults existed in 772 code fragments detected by, the prototype matching system, while 111 of them were not reported.

    Web of Science

    researchmap

  • A Multiple-View Analysis Model of Debugging Processes. Reviewed

    Shinji Uchida, Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Hideo Kudo

    2002 International Symposium on Empirical Software Engineering (ISESE 2002), 3-4 October 2002, Nara, Japan   139 - 147   2002

     More details

    Publisher:IEEE Computer Society  

    DOI: 10.1109/ISESE.2002.1166933

    researchmap

  • Software quality analysis by code clones in industrial legacy software Reviewed

    A Monden, D Nakae, T Kamiya, S Sato, K Matsumoto

    EIGHTH IEEE SYMPOSIUM ON SOFTWARE METRICS, PROCEEDINGS   87 - 94   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE COMPUTER SOC  

    Existing researches suggest that the code clone (duplicated code) is one of the factors that degrades the design and the structure of software and lowers the software quality such as readability and changeability. However, the influence of code clones on software quality has not been quantitatively clarified yet.
    In this paper, we have tried to quantitatively clarify the relation between code clones and the software reliability and maintainability of twenty years old software. As a result, we found that modules having code clones (clone-included modules) are more reliable than modules having no code clone (non-clone modules) on average. Nevertheless, the modules having very large code clones (more than 200 SLOC) are less reliable than non-clone modules. We also found that clone-included modules are less maintainable (having greater revision number on average) than non-clone modules; and, modules having larger code clone are less maintainable than modules having smaller code clone.

    Web of Science

    researchmap

  • A Support System for Software Function Discovery Using Histories of Function Executions Reviewed

    MORISAKI Shuuji, SHIRAISHI Yumi, YAMATO Masatake, MONDEN Akito, MATSUMOTO Ken-ichi, TORII Koji

    The Transactions of the Institute of Electronics,Information and Communication Engineers.   J84-D-I ( 6 )   755 - 767   2001.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • A Practical Method for Watermarking Java Programs. Reviewed

    Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koji Torii, Katsuro Inoue

    24th International Computer Software and Applications Conference (COMPSAC 2000), 25-28 October 2000, Taipei, Taiwan   191 - 197   2000

     More details

    Publisher:IEEE Computer Society  

    DOI: 10.1109/CMPSAC.2000.884716

    CiNii Article

    researchmap

▼display all

Books

  • ソフトウェア開発データリポジトリの分析

    一般財団法人経済調査会  2015 

     More details

  • Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2012 (Studies in Computational Intelligence, Vol. 443)

    Springer  2012 

     More details

MISC

  • ChatGPTをSE役とした対話による要求獲得の試み Reviewed

    西窪 修広, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   147 - 152   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 小規模JavaScriptプロジェクトにおけるclass構文の使用実態の調査 Reviewed

    三澤 秀斗, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   105 - 110   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 情報システムの要求仕様書におけるあいまい語句の定量的分析

    中道 徹, 西浦 生成, 門田 暁人

    ソフトウェア工学の基礎ワークショップFOSE2023, ポスター発表   ( P15 )   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • BERTによるセキュリティバグの判別の試み Reviewed

    横山 大貴, 西浦 生成, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   197 - 198   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • テストケース作成におけるChatGPT利用の効果 Reviewed

    起塚 亮, 西浦 生成, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   195 - 196   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 高齢者の認知機能維持のためのコンピュータゲームの選定に向けて Reviewed

    河瀬 友佑, 西浦 生成, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   193 - 194   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 提案依頼書におけるセキュリティ要件の分析 Reviewed

    村越 竜介, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェアエンジニアリングシンポジウム2023 (SES2023)   2023.8

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • グローバーのアルゴリズムを題材とした学習支援システムの開発

    安永 翔斗, 門田 暁人, 笹倉 万里子

    情報処理学会第85回全国大会   ( 4ZF-03 )   2023.3

     More details

    Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • プログラミング教育における高校教員の支援方法の評価

    長尾 輝人, 笹倉 万里子, 門田 暁人

    情報処理学会研究報告, コンピュータと教育   2023-CE-169 ( 15 )   1 - 8   2023.3

     More details

    Authorship:Last author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • バーチャルリアリティ授業視聴システムの改良

    谷口 謙太, 笹倉 万里子, 門田 暁人

    情報処理学会研究報告, コンピュータと教育   2023-CE-169 ( 6 )   1 - 8   2023.3

     More details

    Authorship:Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 考古学データベースに保存する画像データの加工を行うシステムの開発

    富田 洸, 笹倉 万里子, 門田 暁人

    情報処理学会第85回全国大会   ( 6ZK-01 )   2023.3

     More details

    Authorship:Last author   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Fault-proneモジュール予測における第三者データに基づいた外れ値除去 Reviewed

    西浦生成, 門田暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   153 - 158   2022.11

     More details

  • スマホゲームにおける課金誘導方法の調査研究 Reviewed

    麻生直希, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   241 - 242   2022.11

     More details

  • キーストロークとマウス操作に基づくプログラミング能力の分析 Reviewed

    松本和樹, 西浦生成, 笹倉万里子, 門田暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   165 - 170   2022.11

     More details

  • 提案依頼書におけるセキュリティ要件の実態調査 Reviewed

    村越 竜介, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   229 - 230   2022.11

     More details

  • 育成の観点を取り入れたプロジェクト管理ゲーム Reviewed

    山形 宥太, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   205 - 206   2022.11

     More details

  • ソフトウェア開発者の信頼度の評価に向けて Reviewed

    池田 海斗, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   215 - 216   2022.10

     More details

  • データ断片からのソフトウェア開発データ復元の実験評価

    西脇将樹, 門田暁人, 笹倉万里子, 西浦生成

    信学技報   121 ( 416 )   60 - 65   2022.3

     More details

  • ソフトウェアテストの途中結果を用いたバグ予測

    廣瀬椋一, 門田暁人, 角田雅照, 笹倉万里子, 西浦生成

    信学技報   121 ( 416 )   19 - 24   2022.3

     More details

  • From Academia to Software Development: Publication Citations in Source Code Comments

    Akira Inokuchi, Yusuf Sulistyo Nugroho, Fumiaki Konishi, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    2019.10

     More details

    Publishing type:Internal/External technical report, pre-print, etc.  

    Academic publications have been evaluated with the impact on research<br />
    communities based on the number of citations. On the other hand, the impact of<br />
    academic publications on industry has been rarely studied. This paper<br />
    investigates how academic publications contribute to software development by<br />
    analyzing publication citations in source code comments in open source software<br />
    repositories. We propose an automated approach of detecting academic<br />
    publications based on Named Entity Recognition, and achieve 0.90 in $F_1$ as<br />
    detection accuracy. We conduct a large-scale study of publication citations<br />
    with 319,438,977 comments collected from active 25,925 repositories written in<br />
    seven programming languages. Our findings indicate that academic publications<br />
    can be knowledge sources of software development, and there can be potential<br />
    issues of obsoleting knowledge.

    arXiv

    researchmap

  • Estimation of affect scores accounting for user responsiveness

    NGUYEN Hoang, KOYAMA Serina, YUCEL Zeynep, MONDEN Akito, SASAKURA Mariko

    日本ロボット学会学術講演会予稿集(CD-ROM)   36th   ROMBUNNO.1I2‐01   2018.9

     More details

    Language:English  

    J-GLOBAL

    researchmap

  • Impact of the Distribution Parameter of Data Sampling Approaches on Software Defect Prediction Models

    Kwabena Ebo Bennin, Jacky Keung, Akito Monden

    Proceedings - Asia-Pacific Software Engineering Conference, APSEC   2017-   630 - 635   2018.3

     More details

    Language:English   Publisher:IEEE Computer Society  

    Sampling methods are known to impact defect prediction performance. These sampling methods have configurable parameters that can significantly affect the prediction performance. It is however, impractical to assess the effect of all the possible different settings in the parameter space for all the several existing sampling methods. A constant and easy to tweak parameter present in all sampling methods is the distribution of the defective and non-defective modules in the dataset known as Pfp (% of fault-prone modules). In this paper, we investigate and assess the performance of defect prediction models where the Pfp parameter of sampling methods are tweaked. An empirical experiment and assessment of seven sampling methods on five prediction models over 20 releases of 10 static metric projects indicate that (1) Area Under the Receiver Operating Characteristics Curve (AUC) performance is not improved after tweaking the Pfp parameter, (2) pf (false alarms) performance degrades as the Pfp is increased. (3) a stable predictor is difficult to achieve across different Pfp rates. Hence, we conclude that the Pfp parameter setting can have a large impact on the performance (except AUC) of defect prediction models. We thus recommend researchers experiment with the Pfp parameter of the sampling method since the distribution of training datasets vary.

    DOI: 10.1109/APSEC.2017.76

    Scopus

    researchmap

  • MAHAKIL: Diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction

    Kwabena Ebo Bennin, Jacky Keung, Passakorn Phannachitta, Akito Monden, Solomon Mensah

    Proc. 40th International Conference on Software Engineering, Journal First Paper   699 - 699   2018

     More details

  • Predictability Classification for Software Effort Estimation

    Naoki Kinoshita, Akito Monden, Masateru Tsunoda, Zeynep Yucel

    2018 IEEE/ACIS 3RD INTERNATIONAL CONFERENCE ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (BCD 2018)   43 - 48   2018

     More details

    Language:English   Publisher:IEEE  

    In this paper, focusing on the problem that estimation accuracy of software development effort greatly varies among software projects, we propose a predictability classification method for software projects before conducting effort estimation. In the proposed method, given a project to be estimated, we first evaluate whether the effort can be accurately estimated or not by identifying the project as "predictable" or "unpredictable". In case of predictable projects, we conduct the effort estimation. Otherwise, estimation is avoided. As a result of an experiment to assess the effectiveness of the proposed method using six industry datasets, (i) the mean square residual and residual variance are shown to be suitable measures for recognition of predictability; and (ii) the average absolute error is significantly reduced in five datasets, by avoiding the estimation when a project belongs to the unpredictable class, which proves the effectiveness of the proposed method. By using the proposed method, practitioners become aware of cases when they can rely on the estimation and when they cannot.

    DOI: 10.1109/BCD2018.2018.00015

    Web of Science

    researchmap

  • Extended Association Rule Mining with Correlation Functions

    Hidekazu Saito, Akito Monden, Zeynep Yucel

    2018 IEEE/ACIS 3RD INTERNATIONAL CONFERENCE ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (BCD 2018)   79 - 84   2018

     More details

    Language:English   Publisher:IEEE  

    This paper proposes extended association rule mining that can deal with correlation functions. The extended association rule is expressed in the form of: A double right arrow Correl(X; Y) where Correl(X; Y) is a correlation function with two variables X and Y. By this extension, data analysts can discover the condition A that lead to low (or high) correlation between two given variables from a large dataset. In order to show the efficacy of the proposed method, a case study is performed on an industry dataset of software developments, assuming the scenario of discovering a condition, where software development effort is predictable (or unpredictable) from the size of the project, i.e. there exists a significantly high (or low) correlation between size and effort. Since such a condition cannot be obtained by conventional association rule mining, we confirm the efficiency of the proposed extended association rule mining.

    DOI: 10.1109/BCD2018.2018.00020

    Web of Science

    researchmap

  • Should duration and team size be used for effort estimation?

    Takeshi Kakimoto, Masateru Tsunoda, Akito Monden

    Studies in Computational Intelligence   721   91 - 105   2018

     More details

    Language:English   Publisher:Springer Verlag  

    Project management activities such as scheduling and project progress management are important to avoid project failure. As a basis of project management, effort estimation plays a fundamental role. To estimate software development effort by mathematical models, variables which are fixed before the estimation are used as independent variables. Some studies used team size and project duration as independent variables. Although they are sometimes fixed because of the limitation of human resources or business schedule, they may change by the end of the project. For instance, when delivery is delayed, actual duration and estimated duration is different. So, although using team size and project duration may enhance estimation accuracy, the error may also lower the accuracy. To help practitioners to select independent variables, we analyzed whether team size and duration should be used or not, when we consider the error included in the team size and the duration. In the experiment, we assumed that duration and team size include errors when effort is estimated. To analyze influence of the errors, we add n% errors to duration and team size. As a result, using duration as an independent variable was not very effective in many cases. In contrast, using maximum team size as an independent variable was effective when the error rate is equal or less than 50%.

    DOI: 10.1007/978-3-319-62048-0_7

    Scopus

    researchmap

  • Evaluating algorithmic thinking ability of primary schoolchildren who learn computer programming

    Hidekuni Tsukamoto, Yasumasa Oomori, Hideo Nagumo, Yasuhiro Takemura, Akito Monden, Ken ichi Matsumoto

    Proceedings - Frontiers in Education Conference, FIE   2017-October   1 - 8   2017.12

     More details

    © 2017 IEEE. In this research, a tool for evaluating algorithmic thinking ability of the primary schoolchildren was developed. This tool is based on the three categories of operations used to construct algorithms, namely, sequential operations, conditional branching operations, and iterative operations. Each question in the tool checks to see if the examinee understands the concept of one of the three categories. The tool was developed to evaluate the educational effect of programming education for middle to upper grade (third to sixth grade) primary schoolchildren. Since both Visual Programming Language (VPL) and Textual Programming Language (TPL) could be used, it was required that the tool could be used by both the group of children who use VPLs and the group of children who use TPLs. To make it possible, no programming language appeared in the questions in the tool. The teaching materials for the programming education were also developed in such a way that the three basic concepts of algorithm, namely, sequential processing, conditional branching, and repetitive processing, were clearly taught. The target VPL in this research was Scratch. The evaluation tool was conducted in a weekend class of programming education for primary schoolchildren, and the algorithmic thinking ability of the schoolchildren was analyzed.

    DOI: 10.1109/FIE.2017.8190609

    Scopus

    researchmap

  • The Significant Effects of Data Sampling Approaches on Software Defect Prioritization and Classification

    Kwabena Ebo Bennin, Jacky Keung, Akito Monden, Passakorn Phannachitta, Solomon Mensah

    International Symposium on Empirical Software Engineering and Measurement   2017-   364 - 373   2017.12

     More details

    Language:English   Publisher:IEEE Computer Society  

    Context: Recent studies have shown that performance of defect prediction models can be affected when data sampling approaches are applied to imbalanced training data for building defect prediction models. However, the magnitude (degree and power) of the effect of these sampling methods on the classification and prioritization performances of defect prediction models is still unknown. Goal: To investigate the statistical and practical significance of using resampled data for constructing defect prediction models. Method: We examine the practical effects of six data sampling methods on performances of five defect prediction models. The prediction performances of the models trained on default datasets (no sampling method) are compared with that of the models trained on resampled datasets (application of sampling methods). To decide whether the performance changes are significant or not, robust statistical tests are performed and effect sizes computed. Twenty releases of ten open source projects extracted from the PROMISE repository are considered and evaluated using the AUC, pd, pf and G-mean performance measures. Results: There are statistical significant differences and practical effects on the classification performance (pd, pf and G-mean) between models trained on resampled datasets and those trained on the default datasets. However, sampling methods have no statistical and practical effects on defect prioritization performance (AUC) with small or no effect values obtained from the models trained on the resampled datasets. Conclusions: Existing sampling methods can properly set the threshold between buggy and clean samples, while they cannot improve the prediction of defect-proneness itself. Sampling methods are highly recommended for defect classification purposes when all faulty modules are to be considered for testing.

    DOI: 10.1109/ESEM.2017.50

    Scopus

    researchmap

  • Calibration of distributed multimodal sensor networks using cross‐correlation of arrival processes

    SUPITAYAKUL Parisa, YUCEL Zeynep, ZANLUNGO Francesco, MONDEN Akito, LEELAPRUTE Pattara

    日本ロボット学会学術講演会予稿集(CD-ROM)   35th   ROMBUNNO.1C3‐05   2017.9

     More details

    Language:English  

    J-GLOBAL

    researchmap

  • Analyzing Unreasonable Demands in Request For Proposals of Software Development

    116 ( 426 )   95 - 100   2017.1

     More details

  • Experimental Evaluation of Cross-Project Bug Prediction

    116 ( 426 )   101 - 106   2017.1

     More details

  • Analyzing Required Software Engineering Skills in Software Job Ads

    116 ( 426 )   89 - 94   2017.1

     More details

  • COCOMO IIをベースとした工数見積りモデルの研究

    大岩 佐和子, 押野 智樹, 門田 暁人, 松本 健一

    プロジェクトマネジメント学会誌   19 ( 4 )   53 - 58   2017

     More details

    Language:Japanese   Publisher:プロジェクトマネジメント学会  

    CiNii Article

    CiNii Books

    researchmap

  • An Attempt to Statement-level Software Bug Prediction

    Fukutani, K, Monden, A, Yucel, Z, Hata, H

    Proceedings of Fundamentals of Software Engineering, FOSE 2017   2017

     More details

  • Software Reuse Detection Focusing on Strings in Binary Code

    116 ( 277 )   79 - 84   2016.10

     More details

  • Software Bug Analysis Based on Archetypal Analysis

    瀧本恵介, 門田暁人, 尾上紗野, 畑秀明, 亀井靖高

    電子情報通信学会技術研究報告   116 ( 277(SS2016 18-35) )   91‐96   2016.10

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Software Reuse Detection Using Binary Program Compression

    上村康輔, 門田暁人, 畑秀明, 松本健一

    電子情報通信学会技術研究報告   116 ( 277(SS2016 18-35) )   85‐90   2016.10

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Unsupervised Bug Report Categorization Using Clustering and Labeling Algorithm

    Nachai Limsettho, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING   26 ( 7 )   1027 - 1053   2016.9

     More details

    Language:English   Publisher:WORLD SCIENTIFIC PUBL CO PTE LTD  

    Bug reports are one of the most crucial information sources for software engineering offering answers to many questions. Yet, getting these answers is not always easy; the information in bug reports is often implicit and some processes are required to extract the meaning of these reports. Most research in this area employ a supervised learning approach to classify bug reports so that required types of reports could be identified. However, this approach often requires an immense amount of time and effort, the resources that already too scarce in many projects.We aim to develop an automated framework that can categorize bug reports, according to their grammatical structure without the need for labeled data.Our framework categorizes bug reports according to their text similarity using topic modeling and a clustering algorithm. Each group of bug reports are labeled with our new clustering labeling algorithm specifically made for clusters in the topic space. Our framework is highly customizable with a modular approach and options to incorporate available background knowledge to improve its performance, while our cluster labeling approach make use of natural language process (NLP) chunking to create the representative labels.Our experiment results demonstrate that the performance of our unsupervised framework is comparable to a supervised learning one. We also show that our labeling process is capable of labeling each cluster with phrases that are representative for that cluster's characteristics.Our framework can be used to automatically categorize the incoming bug reports without any prior knowledge, as an automated labeling suggestion system or as a tool for obtaining knowledge about the structure of the bug report repository.

    DOI: 10.1142/S0218194016500352

    Web of Science

    researchmap

  • Investigating and Projecting Population Structures in Open Source Software Projects: A Case Study of Projects in GitHub

    Saya Onoue, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E99D ( 5 )   1304 - 1315   2016.5

     More details

    Language:English   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    GitHub is a developers' social networking service that hosts a great number of open source software (OSS) projects. Although some of the hosted projects are growing and have many developers, most projects are organized by a few developers and face difficulties in terms of sustainability. OSS projects depend mainly on volunteer developers, and attracting and retaining these volunteers are major concerns of the project stakeholders. To investigate the population structures of OSS development communities in detail and conduct software analytics to obtain actionable information, we apply a demographic approach. Demography is the scientific study of population and seeks to identify the levels and trends in the size and components of a population. This paper presents a case study, investigating the characteristics of the population structures of OSS projects on GitHub, and shows population projections generated with the well-known cohort component method. We found that there are four types of population structures in OSS development communities in terms of experiences and contributions. In addition, we projected the future population accurately using a cohort component population projection method. This method predicts a population of the next period using a survival rate calculated from past population. To the best of our knowledge, this is the first study that applied demography to the field of OSS research. Our approach addressing OSS-related problems based on demography will bring new insights, since studying population is novel in OSS research. Understanding current and future structures of OSS projects can help practitioners to monitor a project, gain awareness of what is happening, manage risks, and evaluate past decisions.

    DOI: 10.1587/transinf.2015EDP7363

    Web of Science

    researchmap

  • LSA-X: Exploiting Productivity Factors in Linear Size Adaptation for Analogy-Based Software Effort Estimation

    Passakorn Phannachitta, Akito Monden, Jacky Keung, Kenichi Matsumoto

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E99D ( 1 )   151 - 162   2016.1

     More details

    Language:English   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Analogy-based software effort estimation has gained a considerable amount of attention in current research and practice. Its excellent estimation accuracy relies on its solution adaptation stage, where an effort estimate is produced from similar past projects. This study proposes a solution adaptation technique named LSA-X that introduces an approach to exploit the potential of productivity factors, i.e., project variables with a high correlation with software productivity, in the solution adaptation stage. The LSA-X technique tailors the exploitation of the productivity factors with a procedure based on the Linear Size Adaptation (LSA) technique. The results, based on 19 datasets show that in circumstances where a dataset exhibits a high correlation coefficient between productivity and a related factor (r = 0.30), the proposed LSA-X technique statistically outperformed (95% confidence) the other 8 commonly used techniques compared in this study. In other circumstances, our results suggest using any linear adaptation technique based on software size to compensate for the limitations of the LSA-X technique.

    DOI: 10.1587/transinf.2015EDP7237

    Web of Science

    researchmap

  • Filter-INC: Handling Effort-Inconsistency in Software Effort Estimation Datasets

    Passakorn Phannachitta, Jacky Keung, Kwabena Ebo Bennin, Akito Monden, Kenichi Matsumoto

    2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016)   185 - 192   2016

     More details

    Language:English   Publisher:IEEE  

    Effort-inconsistency is a situation where historical software project data used for software effort estimation (SEE) are contaminated by many project cases with similar characteristics but are completed with significantly different amount of effort. Using these data for SEE generally produces inaccurate results; however, an effective technique for its handling is yet made to be available. This study approaches the problem differently from common solutions, where available techniques typically attempt to remove every project case they have detected as outliers. Instead, we hypothesize that data inconsistency is caused by only a few deviant project cases and any attempt to remove those other cases will result in reduced accuracy, largely due to loss of useful information and data diversity. Filter-INC (short for Filtering technique for handling effort-INConsistency in SEE datasets) implements the hypothesis to decide whether a project case being detected by any existing technique should be subject to removal. The evaluation is carried out by comparing the performance of 2 filtering techniques between before and after having Filter-INC applied. The results produced from 8 real-world datasets together with 3 machine-learning models, and evaluated by 4 performance measures show a significant accuracy improvement at the confident interval of 95%. Based on the results, we recommend our proposed hypothesis as an important instrument to design a data preprocessing technique for handling effort-inconsistency in SEE datasets, definitely an important step forward in preprocessing data for a more accurate SEE model.

    DOI: 10.1109/APSEC.2016.48

    Web of Science

    researchmap

  • Task purpose estimation in software development based on automatic measurement data and machine learning

    Ryota Ohashi, Hidetake Uwano, Akito Monden, Kenji Araki, Kingo Yamada, Kenichi Matsumoto

    Computer Software   33 ( 2 )   139 - 150   2016

  • 自動計測データと機械学習に基づくソフトウェア開発の作業目的の推定

    大橋亮太, 上野秀剛, 門田暁人, 荒木健史, 山田欣吾, 松本健一

    コンピュータソフトウェア   33 ( 2 )   139 - 150   2016

  • Measuring difficulty of program comprehension based on brain activation

    Takao Nakagawa, Ysutaka Kamei, Hidetake Uwano, Akito Monden, Naoyasu Ubayashi, Kenichi Matsumoto

    Computer Software   33 ( 2 )   78 - 89   2016

     More details

    This paper extends our previous study (letter paper), which quantifies the difficulty of program comprehension based on brain activation measured by NIRS (Near Infra-Red Spectroscopy) during source code reading. We performed controlled experiments with 20 subjects. 3 of 20 subjects could not complete the measurement. We found that: (1) 16 of 17 shows strong brain activation during reading of obfuscated program (binomial test, p < 0:01) and (2) subjective evaluation of difficulty is correlated with brain activation (Spearman's correlation coefficient=0.46, p < 0:01).

    DOI: 10.11309/jssst.33.2_78

    Scopus

    researchmap

  • 脳活動に基づくプログラム理解の困難さ測定

    中川尊雄, 亀井靖高, 上野秀剛, 門田暁人, 鵜林尚靖, 松本健一

    コンピュータソフトウェア   33 ( 2 )   78 - 89   2016

  • Investigating the Effects of Balanced Training and Testing Datasets on Effort-Aware Fault Prediction Models

    Kwabena Ebo Bennin, Jacky Keung, Akito Monden, Yasutaka Kamei, Naoyasu Ubayashi

    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1   154 - 163   2016

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    To prioritize software quality assurance efforts, fault prediction models have been proposed to distinguish faulty modules from clean modules. The performances of such models are often biased due to the skewness or class imbalance of the datasets considered. To improve the prediction performance of these models, sampling techniques have been employed to rebalance the distribution of fault-prone and non-fault-prone modules. The effect of these techniques have been evaluated in terms of accuracy/geometric mean/F1-measure in previous studies; however, these measures do not consider the effort needed to fix faults. To empirically investigate the effect of sampling techniques on the performance of software fault prediction models in a more realistic setting, this study employs Norm(Popt), an effort-aware measure that considers the testing effort. We performed two sets of experiments aimed at (1) assessing the effects of sampling techniques on effort-aware models and finding the appropriate class distribution for training datasets (2) investigating the role of balanced training and testing datasets on performance of predictive models. Of the four sampling techniques applied, the over-sampling techniques outperformed the under-sampling techniques with Random Over-sampling performing best with respect to the Norm(Popt) evaluation measure. Also, performance of all the prediction models improved when sampling techniques were applied between the rates of (20-30)% on the training datasets implying that a strictly balanced dataset (50% faulty modules and 50% clean modules) does not result in the best performance for effort-aware models. Our results also indicate that performances of effort-aware models are significantly dependent on the proportions of the two types of the classes in the testing dataset. Models trained on moderately balanced datasets are more likely to withstand fluctuations in performance as the class distribution in the testing data varies.

    DOI: 10.1109/COMPSAC.2016.144

    Web of Science

    researchmap

  • Identifying Recurring Association Rules in Software Defect Prediction

    Takashi Watanabe, Akito Monden, Yasutaka Kamei, Shuji Morisaki

    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS)   861 - 866   2016

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    Association rule mining discovers patterns of co-occurrences of attributes as association rules in a data set. The derived association rules are expected to be recurrent, that is, the patterns recur in future in other data sets. This paper defines the recurrence of a rule, and aims to find a criteria to distinguish between high recurrent rules and low recurrent ones using a data set for software defect prediction. An experiment with the Eclipse Mylyn defect data set showed that rules of lower than 30 transactions showed low recurrence. We also found that the lower bound of transactions to select high recurrence rules is dependent on the required precision of defect prediction.

    DOI: 10.1109/ICIS.2016.7550867

    Web of Science

    researchmap

  • A Fuzzy Hashing Technique for Large Scale Software Birthmarks

    Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, Akito Monden

    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS)   867 - 872   2016

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    Software birthmarks have been proposed as a method for enabling the detection of programs that may have been stolen by measuring the similarity between the two programs. A birthmark is created from each program by extracting its native characteristics. The birthmarks of the programs can then be compared. However, because the extracted birthmarks contain a large amount of information, a large amount of time is needed when using them to compare large programs. This paper describes our work to reduce this comparison time. Achieving faster comparisons will enable the evaluation of large programs and simplify the use of birthmarks. Specifically, our method creates hashes from conventional birthmark information using fuzzy hashing, and then measures the similarity of the programs using the obtained hash values. Using the proposed method, we achieved a major speed increase over the conventional birthmark method with distinction rates of over 90%. On the other hand, because preservation performance decreased substantially, the similarity threshold value needed to be lowered when using the proposed method.

    DOI: 10.1109/ICIS.2016.7550868

    Web of Science

    researchmap

  • Analysis of Information System Operation Cost Based on Working Time and Unit Cost

    Masateru Tsunoda, Kenichi Matsumoto, Akito Monden, Sawako Ohiwa, Tomoki Oshino

    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS)   837 - 842   2016

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    Recently, information system operation becomes more important because of increasing size of information system and outsourcing the system operation. However, it is not easy for customers to judge the validity of the system operation cost. To provide information which helps the judgment, we analyzed factors which affect system operation cost. Working time of system operation service provider has the strong relationship to the cost. So, if customers know the working time, they estimate the cost properly. However, it is difficult for customers to know the working time generally. So, we assumed that customers estimate unit cost and working time, to speculate total operation cost roughly. To help the estimation, we analyzed factors affected working time and unit cost. The analysis results show that working time is settled based on the software size and the number of users, and the unit cost of the engineers increases when network range of the system is wide.

    DOI: 10.1109/ICIS.2016.7550863

    Web of Science

    researchmap

  • Influence of Outliers on Analogy Based Software Development Effort Estimation

    Kenichi Ono, Akito Monden, Masateru Tsunoda, Kenichi Matsumoto

    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS)   849 - 854   2016

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    In a software development project, project management is indispensable, and effort estimation is one of the important factors on the management. To improve estimation accuracy, outliers are often removed from dataset used for estimation. However, the influence of the outliers to the estimation accuracy is not clear. In this study, we added outliers to dataset experimentally, to analyze the influence. In the analysis, we changed the percentage of outliers, the extent of outliers, variable including outliers, and location of outliers on the dataset. After that, effort was estimated using the dataset. In the experiment, the influence of outliers was not very large, when they were included in the software size metric, the percentage of outliers was 10%, and the extent of outliers was 100%.

    DOI: 10.1109/ICIS.2016.7550865

    Web of Science

    researchmap

  • ソフトウェアテストにおける静的解析ツールの段階的適用による不具合修正工数の更なる低減 ―民生用音響・映像機器向け組み込みソフトウェア開発へのQACの段階的適用とその実証評価―

    鶴田雅明, 大平雅雄, 門田暁人, 松本健一

    情報社会学会誌   11 ( 1 )   5 - 16   2016

     More details

  • Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction Models

    Kwabena Ebo Bennin, Koji Toda, Yasutaka Kamei, Jacky Keung, Akito Monden, Naoyasu Ubayashi

    2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2016)   214 - 221   2016

     More details

    Language:English   Publisher:IEEE  

    To prioritize quality assurance efforts, various fault prediction models have been proposed. However, the best performing fault prediction model is unknown due to three major drawbacks: (1) comparison of few fault prediction models considering small number of data sets, (2) use of evaluation measures that ignore testing efforts and (3) use of n-fold cross validation instead of the more practical cross-release validation. To address these concerns, we conducted cross-release evaluation of 11 fault density prediction models using data sets collected from 2 releases of 25 open source software projects with an effort-aware performance measure known as Norm(P-opt). Our result shows that, whilst M5 and K* had the best performances; they were greatly influenced by the percentage of faulty modules present and size of data set. Using Norm(P-opt) produced an overall average performance of more than 50% across all the selected models clearly indicating the importance of considering testing efforts in building fault-prone prediction models.

    DOI: 10.1109/QRS.2016.33

    Web of Science

    researchmap

  • Textual vs. Visual Programming Languages in Programming Education for Primary Schoolchildren

    Hidekuni Tsukamoto, Yasuhiro Takemura, Yasumasa Oomori, Isamu Ikeda, Hideo Nagumo, Akito Monden, Ken-ichi Matsumoto

    2016 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE)   1 - 7   2016

     More details

    Language:English   Publisher:IEEE  

    The purpose of this research is to compare textual programming languages and visual programming languages from the aspect of motivation. As a textual programming language, Processing programming language was used, and as visual programming languages, Scratch, a derivation of Scratch, Teaching materials offered by code.org, and LEGO Mindstorms EV3 were used. Teaching materials using the textual programming language, and those using the visual programming languages were developed separately. A trial experiment of programming education with the textual programming language was conducted to a cohort of seven primary schoolchildren. Trial experiments with the visual programming languages were conducted twice. In each of them, a cohort of eight primary schoolchildren participated. The motivation of the children was assessed using the questionnaire based on the ARCS (Attention, Relevance, Confidence, and Satisfaction) motivation model. The results with the visual programming languages suggested that the motivation scores of the children increased as the class progressed when visual programming languages were used. On the other hand, the results with Processing suggested that the variance of Satisfaction factor increased as the class progressed when textual programming languages were used, which further suggested that the Satisfaction scores of the children spread as the class progressed when textual programming languages were used.

    DOI: 10.1109/FIE.2016.7757571

    Web of Science

    researchmap

  • Erratum: Investigating and Projecting Population Structures in Open Source Software Projects: A Case Study of Projects in GitHub [IEICE Transactions on Information and Systems Vol.E99.D (2016) , No.5 pp.1304-1315]

    ONOUE Saya, HATA Hideaki, MONDEN Akito, MATSUMOTO Kenichi

    IEICE Transactions on Information and Systems   99 ( 7 )   1961 - 1961   2016

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    DOI: 10.1587/transinf.2016EDe0002

    CiNii Article

    researchmap

  • Pinpointing and hiding surprising fragments in an obfuscated program

    Yuichiro Kanzaki, Clark Thomborson, Akito Monden, Christian Collberg

    ACM International Conference Proceeding Series   08-   8:1-8:9   2015.12

     More details

    Language:English   Publisher:Association for Computing Machinery  

    In this paper, we propose a pinpoint-hide defense method, which aims to improve the stealth of obfuscated code. In the pinpointing process, we scan the obfuscated code in a few small code fragment level and identify all surprising fragments, that is, very unusual fragments which may draw the attention of an attacker to the obfuscated code. In the hiding process, we transform the pinpointed surprising fragments into unsurprising ones while preserving semantics. The obfuscated code transformed by our method consists only by unsurprising code fragments, therefore is more difficult for attackers to be distinguished from unobfuscated code than the original. In the case study, we apply our pinpoint-hide method to some programs transformed by well-known obfuscation techniques. The result shows our method can pinpoint surprising fragments such as dummy code that does not fit in the context of the program, and instructions used in a complicated arithmetic expression. We also confirm that instruction camouflage can make the pinpointed surprising fragments unsurprising ones, and that it runs correctly.

    DOI: 10.1145/2843859.2843862

    Scopus

    researchmap

  • Extracting Typical Projects in a Software Project Data Set

    川下正宏, 門田暁人, 畑秀明

    情報処理学会研究報告(Web)   2015 ( SE-190 )   VOL.2015‐SE‐190,NO.8 (WEB ONLY)   2015.12

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • プログラミング初学者のためのソースコード再利用支援

    藤原新, 畑秀明, 門田暁人, 松本健一

    情報処理学会研究報告(Web)   2015 ( SE-190 )   VOL.2015‐SE‐190,NO.16 (WEB ONLY)   2015.12

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Reducing the cost of debugging through progressive use of static code analysis tools

    Masaaki Tsuruta, Akito Monden, Kenichi Matsumoto

    Proc. International Conference on Project Management (ProMAC2015)   2015

     More details

  • Predicting faults after unit testing using design phase metrics in embedded software development

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto

    11 ( 2 )   16 - 23   2015

     More details

  • Bug Report Recommendation for Code Inspection

    Shin Fujiwara, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    2015 IEEE 1ST INTERNATIONAL WORKSHOP ON SOFTWARE ANALYTICS (SWAN)   9 - 12   2015

     More details

    Language:English   Publisher:IEEE  

    Large software projects such as Mozilla Firefox and Eclipse own more than ten thousand bug reports that have been reported but left unresolved. To utilize such a great amount of unresolved bug reports and accelerate bug detection and removal, we propose to a way recommend programmers a bug report that is likely to contain failure descriptions related to a source file being inspected. We employ the vector space model (VSM) to make a relevancy ranking of bug reports to a given source file. The result of an experiment using data of three open source software projects showed that the accuracies of recommendations ranged from 21.74% to 60.05% in terms of the percentage of recommendations that contained relevant bug reports in a top 10 recommended list.

    DOI: 10.1109/SWAN.2015.7070481

    Web of Science

    researchmap

  • Programming Education for Primary Schoolchildren Using a Textual Programming Language

    Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Isamu Ikeda, Akito Monden, Ken-ichi Matsumoto

    FRONTIERS IN EDUCATION CONFERENCE (FIE), 2015   1008 - 1014   2015

     More details

    Language:English   Publisher:IEEE  

    In this research, a Textual Programming Language (TPL) is used in programming education for primary schoolchildren because of the following reasons: (1) it is more practical to use the programming languages similar to the ones used for developing real applications, (2) typing statements could be easier for primary schoolchildren than generally thought, (3) there exist programming environments such as Processing that are easy to use and produce very attractive graphical outcomes. Teaching material for programming education with Processing was developed. In this teaching material, cartoons were used to explain difficult concepts. The learners who use this teaching material were supposed to draw some computational figures with chosen colors. Trial experiments of programming education using this teaching material was conducted to a cohort of seven primary schoolchildren (six 4th grade and one 5th grade children) in two consecutive weekend classes (one hour each). Since the authors' aim of this programming education was to create a sense of fun and excitement in the children and inculcate a desire to engage with computing, the motivation of the children was assessed using the questionnaire based on the ARCS (Attention, Relevance, Confidence, and Satisfaction) motivation model. The results were encouraging and suggested that TPLs could be used in programming education for primary schoolchildren.

    DOI: 10.1109/FIE.2015.7344187

    Web of Science

    researchmap

  • 著作権守る電子透かし

    門田暁人

    読売新聞奈良版 寄稿連載「ドキ★ワク先端科学」   2015

     More details

  • Case consistency: A necessary data quality property for software engineering data sets

    Passakorn Phannachitta, Akito Monden, Jacky Keung, Kenichi Matsumoto

    Proc. 19th International Conference on Evaluation and Assessment in Software Engineering (EASE2015)   19:1-19:10   2015

  • Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model

    Yuichiro Kanzaki, Akito Monden, Christian Collberg

    2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE PROTECTION (SPRO)   31 - 37   2015

     More details

    Language:English   Publisher:IEEE  

    This paper proposes a method for evaluating the artificiality of protected code by means of an N-gram model. The proposed artificiality metric helps us measure the stealth of the protected code, that is, the degree to which protected code can be distinguished from unprotected code. In a case study, we use the proposed method to evaluate the artificiality of programs that are transformed by well-known obfuscation techniques. The results show that static obfuscating transformations (e.g., control flow flattening) have little effect on artificiality. However, dynamic obfuscating transformations (e.g., code encryption), or a technique that inserts junk code fragments into the program, tend to increase the artificiality, which may have a significant impact on the stealth of the code.

    DOI: 10.1109/SPRO.2015.14

    Web of Science

    researchmap

  • Benchmarking Software Maintenance Based on Working Time

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino

    3RD INTERNATIONAL CONFERENCE ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY (ACIT 2015) 2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND INTELLIGENCE (CSI 2015)   20 - 27   2015

     More details

    Language:English   Publisher:IEEE  

    Software maintenance is an important activity on the software lifecycle. Software maintenance does not mean only removing faults found after software release. Software needs extensions or modifications of its functions due to changes in a business environment, and software maintenance also indicates them. In this research, we try to establish a benchmark of work efficiency for software maintenance. To establish the benchmark, factors affecting work efficiency should be clarified, using a dataset collected from various organizations (cross-company dataset). We used dataset includes 134 data points collected by Economic Research Association in 2012, and analyzed factors affected work efficiency of software maintenance. We defined the work efficiency as number of modified modules divided by working time. The main contribution of our research is illustrating factors affecting work efficiency, based on the analysis using cross-company dataset and working time. Also, we showed work efficiency, classified the factor. It can be used to benchmark an organization. We empirically illustrated that using Java and restriction of development tool affect to work efficiency.

    DOI: 10.1109/ACIT-CSI.2015.13

    Web of Science

    researchmap

  • Predicting Faults After Unit Testing Using Design Phase Metrics in Embedded Software Development

    SEC journal   11 ( 2 )   16 - 23   2015

     More details

  • Quantifying the Evolution of Open Source Software Focusing on Code Clone and Used Libraries

    若林洸太, 門田暁人, 伊原彰紀, 玉田春昭

    情報処理学会研究報告(Web)   2015 ( SE-190 )   2015

  • Scaling up analogy-based software effort estimation: A Comparison of multiple hadoop implementation schemes

    Passakorn Phannachitta, Jacky Keung, Akito Monden, Kenichi Matsumoto

    International Workshop on Innovative Software Development Methodologies and Practices, InnoSWDev 2014 - Proceedings   65 - 72   2014.11

     More details

    Language:English   Publisher:Association for Computing Machinery, Inc  

    Analogy-based estimation (ABE) is one of the most time consuming and compute intensive method in software de- velopment effort estimation. Optimizing ABE has been a dilemma because simplifying the procedure can reduce the estimation performance, while increasing the procedure com- plexity with more sophisticated theory may sacrifice an ad- vantage of the unlimited scalability for a large data input. Motivated by an emergence of cloud computing technology in software applications, in this study we present 3 different implementation schemes based on Hadoop MapReduce to optimize the ABE process across multiple computing in- stances in the cloud-computing environment. We experimentally compared the 3 MapReduce implementation schemes in contrast with our previously proposed GPGPU approach (named ABE-CUDA) over 8 high-performance Amazon EC2 instances. Results present that the Hadoop solution can pro- vide more computational resources that can extend the scalability of the ABE process. We recommend adoption of 2 different Hadoop implementations (Hadoop streaming and RHadoop) for accelerating the computation specifically for compute-intensive software engineering related tasks.

    DOI: 10.1145/2666581.2666582

    Scopus

    researchmap

  • 作業時間と単価に基づくシステム運用費用の分析

    角田雅照, 門田暁人, 松本健一, 大岩佐和子, 押野智樹

    研究報告ソフトウェア工学(SE)   2014 ( 12 )   1 - 7   2014.11

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    近年,情報システムの規模の増大や,システム運用の外部委託の進展に伴い,システム運用に関する注目が高まっている.システム運用費用が妥当であるかどうかは,システム運用の委託側企業にとって判断が難しい.本稿では,委託側企業がシステム運用費用の妥当性判断の参考となるような情報の提供を目指し,システム運用費用に影響を与える要因の分析を行った.受託側の作業時間と運用費用は非常に関連が強いため,受託側作業時間を把握することができれば,標準的な運用費用を推定することができる.ただし,受託側作業時間を委託側企業が把握することは一般に容易ではない.そこで本稿では,作業時間と技術者の単価から簡易的に価格を推定することを前提とし,作業時間と単価に影響する要因を個別に分析した.その結果,作業時間はプログラム本数と最大利用者数から決まることや,ネットワーク範囲が狭い場合,単価が低くなる傾向があることがわかった.

    CiNii Article

    CiNii Books

    researchmap

  • 自主研究 システム運用費用に影響を与える要因の分析

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 15 )   55 - 64   2014.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • 故障モジュール中の欠陥メソッド特定

    畑 秀明, 門田 暁人, 松本 健一

    ソフトウェアエンジニアリングシンポジウム2014論文集   2014 ( 2014 )   131 - 136   2014.8

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • 作業時間に基づくソフトウェア保守ベンチマーキングの試み (ソフトウェアサイエンス)

    角田 雅照, 門田 暁人, 松本 健一, 大岩 佐和子, 押野 智樹

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   114 ( 127 )   17 - 23   2014.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    近年,受託開発ソフトウェアは新規の開発が頭打ちの状況に対して,開発済みのソフトウェア資産が増えることに伴い保守の比率が高まり,保守の重要性が高まっている.このため,保守単独で契約を結ぶ場合もある.保守とは,単にソフトウェア出荷後に発見された欠陥を除去することだけを指すのではない.ソフトウェアは利用されているうちに,ビジネス環境の変化により,機能の拡張,修正が必要となる.保守とはそれらの修正も含んだ概念である.本研究では,ソフトウェア保守における作業効率のベンチマークを確立することを試みる.ベンチマークを確立するためには,複数の組織から収集されたプロジェクトのデータ,すなわち企業横断的データを用いて,作業効率に影響する特性を明らかにする必要がある.本研究では,企業横断的データとして,一般財団法人経済調査会によって平成24年度に収集された134件の事例を用い,作業効率に影響する要因を分析した.作業効率は修正実施プログラム本数÷作業時間数と定義した.分析では,ベンチマーキングのために,箱ひげ図により各特性の作業効率の分布を示すとともに,開発言語がJavaであるかどうか,ツールの制約が強いかどうかが作業効率に影響することを示した.

    CiNii Article

    CiNii Books

    researchmap

  • 作業時間に基づくソフトウェア保守ベンチマーキングの試み

    角田雅照, 門田暁人, 松本健一, 大岩佐和子, 押野智樹

    研究報告ソフトウェア工学(SE)   2014 ( 3 )   1 - 7   2014.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    近年,受託開発ソフトウェアは新規の開発が頭打ちの状況に対して,開発済みのソフトウェア資産が増えることに伴い保守の比率が高まり,保守の重要性が高まっている.このため,保守単独で契約を結ぶ場合もある.保守とは,単にソフトウェア出荷後に発見された欠陥を除去することだけを指すのではない.ソフトウェアは利用されているうちに,ビジネス環境の変化により,機能の拡張,修正が必要となる.保守とはそれらの修正も含んだ概念である.本研究では,ソフトウェア保守における作業効率のベンチマークを確立することを試みる.ベンチマークを確立するためには,複数の組織から収集されたプロジェクトのデータ,すなわち企業横断的データを用いて,作業効率に影響する特性を明らかにする必要がある.本研究では,企業横断的データとして,一般財団法人経済調査会によって平成 24 年度に収集された 134 件の事例を用い,作業効率に影響する要因を分析した.作業効率は修正実施プログラム本数 ÷ 作業時間数と定義した.分析では,ベンチマーキングのために,箱ひげ図により各特性の作業効率の分布を示すとともに,開発言語が Java であるかどうか,ツールの制約が強いかどうかが作業効率に影響することを示した.

    CiNii Article

    CiNii Books

    researchmap

  • 作業履歴中の主要な作業に着目した作業目的予測

    大橋亮太, 上野秀剛, 門田暁人

    研究報告ソフトウェア工学(SE)   2014 ( 22 )   1 - 8   2014.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    本稿はソフトウェア開発者の能力向上・プロセス改善手法である PSP における作業履歴の記録と作業目的に基づいた履歴の分析を支援するために,作業者の作業履歴から作業目的を予測する手法を提案する.提案手法は作業目的が頻繁に変化しないという仮説の元,予測対象となる作業 (Task) の前後に行われた作業の特性から作業目的 (Aim) を推定する.連続する Task のうち,打鍵数やクリック数が多い Task をその Aim における主要 Task とし,特性として使用する.RandomForest による予測モデルを構築し実験した結果,提案手法は時系列情報を用いない場合に比べ,高い精度で作業を予測できた.特に,前後の作業を多く見るほど予測精度の向上が見られた.

    CiNii Article

    CiNii Books

    researchmap

  • Characterizing Defects Found in Code Review

    2014   95 - 96   2014.1

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Prediction of the Change of Learners' Motivation in Programming Education for Non-Computing Majors

    Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Akito Monden, Ken-ichi Matsumoto

    2014 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE)   1 - 7   2014

     More details

    Language:English   Publisher:IEEE  

    In the past, the authors had been analyzing motivation of the learners in programming education using the ARCS assessment metric. This metric had been used in the application experiment in 13 programming courses, and about 1,700 sets of data was collected. From these data, the learners' model, characteristics of the change of motivation, and ways of improving teaching materials had been clarified. However, these study results were obtained after the terms, when the programming courses were over, and thus did not contribute much to the ongoing programming education. For this reason, in this research, the methods for predicting the change of learners' motivation were studied so that the learners who may need support could be identified. The idea came from the experiment the authors conducted, in which the motivation of learners was analyzed by plotting the motivation scores of each factor in the ARCS model as a 3D graph. As a result, a decreasing tendency of motivation was observed when the distribution of the plot widened. After studying the tendency in detail, it was thought to be due to the influence of the variance of sub-level category scores. In the proposed method, the motivation of each learner is assessed in each lesson using the ARCS assessment metric. If variance of the motivation scores of a learner in a lesson is above a certain threshold value AND if mean of the scores has not decreased from the previous lesson, then the learner is identified as a candidate of learner who needs support at that lesson. In the application experiment, a programming course with 9 lessons was offered and 9 learners attended all the 9 lessons. In the experiment, 7 cases had been identified as the candidates of learners who need support, and out of those 7 cases, a decrease of motivation to less than average was observed in 5 cases.

    DOI: 10.1109/FIE.2014.7044221

    Web of Science

    researchmap

  • Evaluation of request for proposal (RFP) focusing on non-functional requirements

    Yasuhiro Saito, Akito Monden, Kenichi Matsumoto

    SEC journal   10 ( 3 )   30 - 37   2014

     More details

  • コードの「不自然さ」に基づくソフトウェア保護機構のステルシネス評価

    神﨑 雄一郎, 尾上 栄浩, 門田 暁人

    情報処理学会論文誌   55 ( 2 )   1005 - 1015   2014

     More details

  • Software Effort Estimation Models Incorporating Expert Judgment

    55 ( 2 )   994 - 1004   2014

     More details

  • Simulation of effort allocation strategies in software testing using bug module prediction

    Daisuke Nakano, Akito Monden, Yasutaka Kamei, Kenichi Matsumoto

    Computer Software   31 ( 2 )   118 - 128   2014

     More details

    To date, various techniques for predicting fault-prone modules have been proposed; however, test strategies, which assign a certain amount of test effort to each module, have been rarely studied. This paper proposes a simulation model of software testing that can evaluate various test strategies. The simulation model estimates the number of discoverable faults with respect to the given test resources, the test strategy, complexity metrics of a set of modules to be tested, and the fault prediction results. Based on a case study of simulation applying fault prediction to two open source software (Eclipse and Mylyn), we show the relationship between the available test effort and the effective test strategy.

    DOI: 10.11309/jssst.31.2_118

    Scopus

    researchmap

  • Industry Questions About Open Source Software in Business: Research Directions and Potential Answers

    Akinori Ihara, Akito Monden, Ken-ichi Matsumoto

    2014 6TH INTERNATIONAL WORKSHOP ON EMPIRICAL SOFTWARE ENGINEERING IN PRACTICE (IWESEP 2014)   55 - 59   2014

     More details

    Language:English   Publisher:IEEE  

    As open source software (OSS) has become an integral part of today's software businesses, many software companies rely on OSS to develop their customer solutions and products. On the other hand, they face various concerns in using OSS, such as technical support, quality, security and licensing issues. This paper focuses on OSS-related FAQ in industry, and tries to answer them or to provide research directions based on lessons learned from recent mining OSS repository researches.

    DOI: 10.1109/IWESEP.2014.12

    Web of Science

    researchmap

  • Automatic Unsupervised Bug Report Categorization

    Nachai Limsettho, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    2014 6TH INTERNATIONAL WORKSHOP ON EMPIRICAL SOFTWARE ENGINEERING IN PRACTICE (IWESEP 2014)   7 - 12   2014

     More details

    Language:English   Publisher:IEEE  

    Background: Information in bug reports is implicit and therefore difficult to comprehend. To extract its meaning, some processes are required. Categorizing bug reports is a technique that can help in this regard. It can be used to help in the bug reports management or to understand the underlying structure of the desired project. However, most researches in this area are focusing on a supervised learning approach that still requires a lot of human afford to prepare a training data. Aims: Our aim is to develop an automated framework than can categorize bug reports, according to their hidden characteristics and structures, without the needed for training data. Method: We solve this problem using clustering, unsupervised learning approach. It can automatically group bug reports together based on their textual similarity. We also propose a novel method to label each group with meaningful and representative names. Results: Experiment results show that our framework can achieve performance comparable to the supervised learning approaches. We also show that our labeling process can label each cluster with representative names according to its characteristic. Conclusion: Our framework could be used as an automated categorization system that can be applied without prior knowledge or as an automated labeling suggestion system.

    DOI: 10.1109/IWESEP.2014.8

    Web of Science

    researchmap

  • バグモジュール予測を用いたテスト工数割り当て戦略のシミュレーション

    中野 大輔, 門田 暁人, 亀井 靖高, 松本 健一

    コンピュータ ソフトウェア   31 ( 2 )   118 - 128   2014

  • Quantifying Programmers' Mental Workload during Program Comprehension Based on Cerebral Blood Flow Measurement: A Controlled Experiment

    Takao Nakagawa, Yasutaka Kamei, Hidetake Uwano, Akito Monden, Kenichi Matsumoto, Daniel M. German

    36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014)   448 - 451   2014

     More details

    Language:English   Publisher:ASSOC COMPUTING MACHINERY  

    Program comprehension is a fundamental activity in software development that cannot be easily measured, as it is performed inside the human brain. Using a wearable Near Infra-red Spectroscopy (NIRS) device to measure cerebral blood flow, this paper tries to answer the question: Can the measurement of brain blood-flow quantify programmers' mental workload during program comprehension activities? We performed a controlled experiment with 10 subjects; 8 of them showed high cerebral blood flow while understanding strongly obfuscated programs (requiring high mental workload). This suggests the possibility of using NIRS to measure the mental workload of a person during software development activities.

    DOI: 10.1145/2591062.2591098

    Web of Science

    researchmap

  • On measuring the difficulty of program comprehension based on cerebral blood flow

    Takao Nakagawa, Yasutaka Kamei, Hidetake Uwano, Akito Monden, Kenichi Matsumoto

    Computer Software   31 ( 3 )   270 - 276   2014

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    In this research, we aim to quantify the difficulty of program comprehension during source code reading. We use Near Infra-Red Spectroscopy(NIRS) to measure the activation of brain. As a result of an experiment with 10 subjects, 8 of them showed a strong activation in the brain during reading of strongly obfuscated programs that are extremely difficult to comprehend. We also normalized the data for each participant and aggregated them for statistical testing. As a result of t-test, significant difference (p < 0.001) was seen in the mean of the brain blood flow between obfuscated and non-obfuscated programs.

    DOI: 10.11309/jssst.31.3_270

    CiNii Article

    researchmap

  • On Measuring the Difficulty of Program Comprehension based on Cerebral Blood Flow

    NAKAGAWA Takao, KAMEI Yasutaka, UWANO Hidetake, MONDEN Akito, MATSUMOTO Ken-ichi

    Computer Software   31 ( 3 )   270 - 276   2014

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    In this research, we aim to quantify the difficulty of program comprehension during source code reading. We use Near Infra-Red Spectroscopy(NIRS) to measure the activation of brain. As a result of an experiment with 10 subjects, 8 of them showed a strong activation in the brain during reading of strongly obfuscated programs that are extremely difficult to comprehend. We also normalized the data for each participant and aggregated them for statistical testing. As a result of t-test, significant difference (p < 0.001) was seen in the mean of the brain blood flow between obfuscated and non-obfuscated programs.

    DOI: 10.11309/jssst.31.3_270

    CiNii Article

    researchmap

  • Evaluation of Request For Proposal (RFP) Focusing on Non-Functional Requirements

    SEC journal   10 ( 3 )   30 - 37   2014

     More details

  • Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing

    Akito Monden, Takuma Hayashi, Shoji Shinoda, Kumiko Shirai, Junichi Yoshida, Mike Barker, Kenichi Matsumoto

    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING   39 ( 10 )   1345 - 1357   2013.10

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    Until now, various techniques for predicting fault-prone modules have been proposed and evaluated in terms of their prediction performance; however, their actual contribution to business objectives such as quality improvement and cost reduction has rarely been assessed. This paper proposes using a simulation model of software testing to assess the cost effectiveness of test effort allocation strategies based on fault prediction results. The simulation model estimates the number of discoverable faults with respect to the given test resources, the resource allocation strategy, a set of modules to be tested, and the fault prediction results. In a case study applying fault prediction of a small system to acceptance testing in the telecommunication industry, results from our simulation model showed that the best strategy was to let the test effort be proportional to "the number of expected faults in a module x log(module size)." By using this strategy with our best fault prediction model, the test effort could be reduced by 25 percent while still detecting as many faults as were normally discovered in testing, although the company required about 6 percent of the test effort for metrics collection, data cleansing, and modeling. The simulation results also indicate that the lower bound of acceptable prediction accuracy is around 0.78 in terms of an effort-aware measure, Norm(P-opt). The results indicate that reduction of the test effort can be achieved by fault prediction only if the appropriate test strategy is employed with high enough fault prediction accuracy. Based on these preliminary results, we expect further research to assess their general validity with larger systems.

    DOI: 10.1109/TSE.2013.21

    Web of Science

    researchmap

  • 学習データの時間的変化に伴う欠陥モジュール予測モデルの評価

    内垣聖史, 伊原彰紀, 門田暁人, 松本健一

    ソフトウェアエンジニアリングシンポジウム2013論文集   2013   1 - 2   2013.9

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • 自主研究 ソフトウェア保守改善に向けたデータ分析

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 13 )   100 - 110   2013.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • 開発要員数とその誤差を考慮した工数見積もり方法

    角田雅照, 門田暁人, 松本健一

    研究報告ソフトウェア工学(SE)   2013 ( 7 )   1 - 6   2013.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    数学的モデルに基づく工数見積もりでは,開発するソフトウェアの規模と生産性要因を説明変数として工数を見積もる.いくつかの先行研究では,開発要員数が工数見積もりモデルの説明変数として用いられている.要員数はプロジェクトの生産性との関連が強いことが指摘されており,要員数を説明変数として用いることにより,モデルの見積もり精度向上が期待できる.ただし,工数見積もり時における要員数は見積もり値であり,実績の要員数との誤差が生じることにより見積もり精度が低下する可能性がある.そこで本稿では要員数を用いた新たな見積もり方法を提案する.提案方法では,要員数が過去プロジェクト平均と比較して非常に小さいと見積もられた場合,要員数が小さいことを前提とするモデルを用いる.逆に,要員数が非常に大きいと見積もられた場合,要員数が大きいことを前提とするモデルを用いる.これらに当てはまらない場合,要員数を説明変数に含まないモデルを用いて工数を見積もる.評価実験において,要員数の誤差を実験的に変化させ,提案方法の見積もり精度を評価した.その結果,提案方法は要員数の誤差に対してロバストであり,特に要員数の誤差が不明な場合や誤差が大きい場合に有効に働くことがわかった.

    CiNii Article

    CiNii Books

    researchmap

  • OSS開発におけるコミッターによる協調作業の一考察

    林宏徳, 伊原彰紀, 門田暁人, 松本健一

    研究報告セキュリティ心理学とトラスト(SPT)   2013 ( 6 )   1 - 4   2013.5

     More details

    Language:Japanese  

    昨今,ソフトウェア開発のコスト削減を目的として,商用ソフトウェアの一部にオープンソースソフトウェア (OSS) を利用する企業が増加している.OSS 導入時には,対象プロジェクトのリリース後における保守体制を理解することが重要であり,OSS 開発の不具合修正プロセスを分析する研究が進んでいる.不具合修正プロセス中のコミッターによるレビュー作業は,ソフトウェアをリリースする直前の作業であり,ソフトウェアの品質に最も影響を与える.したがって,コミッターの不十分なレビュー作業は開発の手戻り (再修正) を引き起こし作業効率の低下に繋がる.そこで本稿はコミッターのレビュー作業による OSS 品質への影響について考察する.

    CiNii Article

    CiNii Books

    researchmap

  • Evaluation of RFPs Based on Machine Learning

    2013 ( 5 )   1 - 7   2013.3

     More details

  • Module Classification and Selection for Software Fault Prediction

    MORI Makoto, MONDEN Akito, KAMEI Yasutaka, MATSUMOTO Ken-ichi

    Technical report of IEICE. KBSE   112 ( 419 )   59 - 64   2013.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    To prioritize testing effort, it is important to predict fault-prone modules that are likely to contain a fault To build a better fault-prone module prediction model, This paper proposes two methods (module classifica-tion and module selection) to produce a fit dataset (for model building) that has smulai aspects to the prediction target dataset so that resultant model may have a good prediction performance when it is applied to the target dataset By using Eclipse dataset, we experimentally evaluate the proposed methods.

    CiNii Article

    CiNii Books

    researchmap

  • Industry Application of Research Findings from Mining Software Repositories

    2013   21 - 22   2013.1

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Mining Software Repositories

    MONDEN Akito, IHARA Akinori, MATSUMOTO Kenichi

    Computer Software   30 ( 2 )   52 - 65   2013

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    The Mining Software Repositories (MSR) is an attractive research field that has tons of research topics. It is great fun for a researcher to mine new research goals from software repositories. The MSR field has been grown up with OSS communities, as researchers have mined repositories of various open source software (OSS) projects until now. In this paper we introduce fun of the MSR field as well as its typical research topics, example of mining and future directions.

    DOI: 10.11309/jssst.30.2_52

    CiNii Article

    CiNii Books

    researchmap

    Other Link: https://jlc.jst.go.jp/DN/JALC/10022631052?from=CiNii

  • An instruction folding method to prevent reverse engineering in java platform

    Tetsuya Ohdo, Haruaki Tamada, Yuichiro Kanzaki, Akito Monden

    SNPD 2013 - 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   517 - 522   2013

     More details

    Language:English  

    To improve tamper resistance of programs against illegal modification, this paper proposes instruction folding applicable to Java platform. In the proposed method, at first, similar methods are selected in a Java program. Next, these methods are merged into one method and diffs among these methods are stored in the program. Then, at runtime, when one of the merged methods is executed, diffs are restored by self-modification, which is realized by the Java instrumentation mechanism. The proposed method is resilient against tampering of folded method. Even if an adversary modifies the folded method, the program goes crash because the method is repeatedly modified at runtime. © 2013 IEEE.

    DOI: 10.1109/SNPD.2013.31

    Scopus

    researchmap

  • 11種類のfault密度予測モデルの実証的評価

    小林 寛武, 戸田 航史, 亀井 靖高, 門田 暁人, 峯 恒憲, 鵜林 尚靖

    電子情報通信学会論文誌D   J96-D ( 8 )   1892 - 1902   2013

     More details

  • Evaluation of Software Obfuscation Based on the Randomness of Instructions.

    Ami Futamura, Akito Monden, Haruaki Tamada, Yuichiro Kanzaki, Masahide Nakamura, Kenichi Matsumoto

    Computer Software   30 ( 3 )   18 - 24   2013

     More details

    Language:English  

    This paper quantifies the difficulty of program analysis based on the information theory. The basic idea is to consider that a program is ultimately obfuscated if instructions appear at random
    that is, (1) all instructions has an equal frequency of appearance, and (2) there is no pattern observed in the instruction sequence. We quantified (1) based on the entropy and (2) based on the Kolmogorov complexity. We evaluated the feasibility of our proposal through a case study. © 2013, Japan Society for Software Science and Technology. All rights reserved.

    DOI: 10.11309/jssst.30.3_18

    Scopus

    researchmap

  • Hybrid Effort Estimation based on Multivariate Liner Regression and Analogy based Estimation

    TODA Koji, TSUNODA Masateru, MONDEN Akito, MATSUMOTO Kenichi

    Computer Software   30 ( 2 )   227 - 233   2013

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    We propose a hybrid effort estimation method based on the multivariate liner regression analysis and the analogy based estimation method (ABE). First, our method calculates the unreliability index of ABE on an estimation target project. Next, our method selects log-log regression estimation when the value of the index is low. Otherwise our method selects ABE estimation or combined estimation (the average of ABE and log-log regression estimation). In the experiment, we compared estimation accuracies of our method with conventional methods, and the results showed that the median of Balanced Relative Error (estimation accuracy index) was improved from 47.2% to 39.7%, when the variance of similar projects' effort was used as the reliability index.

    DOI: 10.11309/jssst.30.2_227

    CiNii Article

    researchmap

  • Why is collaboration needed in OSS projects? A case study of eclipse project

    Hironori Hayashi, Akinori Ihara, Akito Monden, Ken-Ichi Matsumoto

    2013 5th International Workshop on Social Software Engineering, SSE 2013 - Proceedings   17 - 20   2013

     More details

    Language:English  

    In open source software development, the collaboration among developers is the key to improve software quality. In particular, to fix a bug related to various parts of a system, developers need collaboration because each developer usually has very limited knowledge about a large software system. This paper aims to clarify how narrow (or how wide) is each developer's knowledge area in the Eclipse project, and how often do developers need to collaborate with each other. As a result of analysis, we found that 50 % of committers take care of just one or two modules, which indicates the necessity of collaboration when a bug-fix affects multiple modules. In addition, we also found the significant relationship between committers' collaborations and the re-opened bugs. We conclude that a committer should be aware the risk of re-opened bugs caused by the collaboration. Copyright 2013 ACM.

    DOI: 10.1145/2501535.2501539

    Scopus

    researchmap

  • The Effects of Teaching Material Remediation with ARCS-Strategies for Programming Education

    Hidekuni Tsukamoto, Yasubiro Takemura, Hideo Nagumo, Akito Monden, Ken-ichi Matsumoto

    2013 IEEE FRONTIERS IN EDUCATION CONFERENCE   717 - 723   2013

     More details

    Language:English   Publisher:IEEE  

    In this paper, a method for improving the teaching materials of programming education is introduced, and the evaluation of the effects of using the strategy is presented. By using this method, the teachers of programming education will be able to assess and improve their teaching materials irrespective of their knowledge and experience of their teaching materials already used. In this method, the teaching materials were improved based on the statistical analysis of the motivation of students. Specifically, the motivation of students was measured for each lower category of ARCS motivation model with the authors' original questionnaire. The lower category in a particular lesson that showed a statistically significant decrease from the previous lesson was identified, and the improvement strategies for the lower category were selected from the list of motivation strategies in the ARCS model. The teaching materials of programming education were then improved based on the strategy. In this research, five lower categories of particular lessons in a programming course were identified, and the teaching materials were improved. The improved teaching materials were used in the following programming course, and the effects of the improvements were seen in three lower categories out of the identified five lower categories.

    DOI: 10.1109/FIE.2013.6684920

    Web of Science

    researchmap

  • ARCS動機づけ方略と統計的検定に基づくプログラミング教材の改善とその評価

    塚本英邦, 南雲秀雄, 門田暁人, 松本健一

    日本産業技術教育学会誌   55 ( 4 )   307 - 315   2013

     More details

  • Patch Reviewer Recommendation in OSS Projects

    John Boaz Lee, Akinori Ihara, Akito Monden, Ken-ichi Matsumoto

    2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 2   2   1 - 6   2013

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    In an Open Source Software (OSS) project, many developers contribute by submitting source code patches. To maintain the quality of the code, certain experienced developers review each patch before it can be applied or committed. Ideally, within a short amount of time after its submission, a patch is assigned to a reviewer and reviewed. In the real world, however, many large and active OSS projects evolve at a rapid pace and the core developers can get swamped with a large number of patches to review. Furthermore, since these core members may not always be available or may choose to leave the project, it can be challenging, at times, to find a good reviewer for a patch. In this paper, we propose a graph-based method to automatically recommend the most suitable reviewers for a patch. To evaluate our method, we conducted experiments to predict the developers who will apply new changes to the source code in the Eclipse project. Our method achieved an average recall of 0.84 for top-5 predictions and a recall of 0.94 for top-10 predictions.

    DOI: 10.1109/APSEC.2013.103

    Web of Science

    researchmap

  • Improving Analogy-based Software Cost Estimation through Probabilistic-based Similarity Measures

    Passakorn Phannachitta, Jacky Keung, Akito Monden, Ken-Ichi Matsumoto

    2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1   541 - 546   2013

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    The performance of software cost estimation based on analogy reasoning depends upon the measures that specifying the similarity between software projects. This paper empirically investigates the use of probabilistic-based distance functions to improve the similarity measurement. The probabilistic-based distance functions are considerably more robust, because they collect the implicit correlation between the occurrences of project feature attributes. This information gain enables the constructed estimation model to be more concise and comprehensible. The study compares 6 probabilistic-based distance functions against the commonly-used Euclidian distance. We empirically evaluate the implemented cost estimation model using 5 real-world datasets collected from the PROMISE repository. The result shows a significant improvement in terms of error reduction, that implies an estimation based on probabilistic-based distance functions achieve higher accuracy on average, and the peak performance significantly outperforms the Euclidian distance based on Wilcoxon signed-rank test.

    DOI: 10.1109/APSEC.2013.78

    Web of Science

    researchmap

  • OSS開発におけるコミッターによる協調作業の一考察

    林宏徳, 伊原彰紀, 門田暁人, 松本健一

    電子情報通信学会技術研究報告   113 ( 43(LOIS2013 1-5) )   2013

  • OSS開発における一般開発者の協調作業と不具合の再修正に関する一考察

    林宏徳, 伊原彰紀, 門田暁人, 松本健一

    情報処理学会シンポジウムシリーズ(CD-ROM)   2013 ( 2 )   2013

  • Discussion of A Method for Redundancy to Invoke Tasks and A Method To Keep A Priority Order for Dispatching A Task in the Embedded RTOS

    平井勝彦, 伊原彰紀, 門田暁人, 松本健一

    情報処理学会研究報告(CD-ROM)   2012 ( 6 )   2013

  • Customizing GQM Models for Software Project Monitoring

    Akito Monden, Tomoko Matsumura, Mike Barker, Koji Torii, Victor R. Basili

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E95D ( 9 )   2169 - 2182   2012.9

     More details

    Language:English   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    This paper customizes Goal/Question/Metric (GQM) project monitoring models for various projects and organizations to take advantage of the data from the software tool EPM and to allow the tailoring of the interpretation models based upon the context and success criteria for each project and organization. The basic idea is to build less concrete models that do not include explicit baseline values to interpret metrics values. Instead, we add hypothesis and interpretation layers to the models to help people of different projects make decisions in their own context. We applied the models to two industrial projects, and found that our less concrete models could successfully identify typical problems in software projects.

    DOI: 10.1587/transinf.E95.D.2169

    Web of Science

    researchmap

  • An Attempt of Software Effort Prediction using Multivariate Log-log Regression by Random Sampling of Explanatory Variables

    小西 文章, 内田 眞司, 戸田 航史, 門田 暁人

    研究報告ソフトウェア工学(SE)   2012 ( 2 )   1 - 8   2012.3

     More details

    Language:Japanese  

    ソフトウェア開発における工数予測は,プロジェクト完遂に必要な人的資源やスケジュール管理を行う上で重要である.工数予測手法には,過去のソフトウェア開発プロジェクトの実績データに基づいて,工数予測モデルを構築する手法がある.我々は,工数予測モデルの中で広く用いられている対数重回帰分析によるモデル (対数重回帰モデル) に着目した.対数重回帰モデルは,オーバーフィッティングが発生する可能性があるという問題がある.そこで本稿では,オーバーフィッティングに考慮した説明変数のランダムサンプリングを用いた対数重回帰モデルによるソフトウェア開発工数予測手法を提案する.Effort estimation is important for project managers in controlling human resources in a software project. There is the method which builds an effort estimation model based on software measurement data. We focused the model by multivariate log-log regression analysis, multivariate log-log regression model that is widely used to predict effort. Multivariate log-log regression model have the annoying problem of over-fitting. In this paper, We propose the technique of performing effort prediction using multivariate log-log regression model which takes the problem of over-fitting into consideration.

    CiNii Article

    CiNii Books

    researchmap

  • Elicitation and Analysis of Maintenance and Operation Metrics for Request For Proposal(RFP)

    2012 ( 1 )   1 - 10   2012.3

     More details

  • 受託開発ソフトウェアの保守における作業効率の要因

    角田 雅照, 門田 暁人, 松本 健一, 押野 智樹

    コンピュータ ソフトウェア   29 ( 3 )   157 - 163   2012

  • Evaluation of Non Functional Requirements in a Request For Proposal (RFP)

    Yasuhiro Saito, Akito Monden, Kenichi Matsumoto

    PROCEEDINGS OF THE 2012 JOINT CONFERENCE OF THE 22ND INTERNATIONAL WORKSHOP ON SOFTWARE MEASUREMENT AND THE 2012 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE PROCESS AND PRODUCT MEASUREMENT (IWSM-MENSURA 2012)   106 - 111   2012

     More details

    Language:English   Publisher:IEEE  

    In the beginning of a contracted based software development project, the RFP is provided by a software user company and used as an initial system requirements specification to ask software developer companies to propose their technical plans to fulfill the requirements. In this process, it is very important to evaluate the quality of the RFP to make sure that basic user requirements are written enough. Especially, nonfunctional requirements (NFRs) are important since the system architecture greatly depends on the NFRs such as response time and security issues. This paper proposes a simple evaluation model of NFRs included in the RFP, mainly focusing on the user maintenance and operation issues. This model consists of NFR categories, NFR metrics, description level grading and weight to each NFR. As a case study, RFPs of 29 projects were evaluated by the proposed model. As a result, we confirmed that the model could identify poorly-written NFR aspects in the RFP, which need refinement before asking the developer company for a proposal.

    DOI: 10.1109/IWSM-MENSURA.2012.23

    Web of Science

    researchmap

  • Program Encryption Based on the Execution Time

    Hideshi Sakaguchi, Yuichiro Kanzaki, Akito Monden

    Proc. International Symposium on Technology for Sustainability (ISTS2012)   188 - 191   2012

     More details

  • A Heuristic Rule Reduction Approach to Software Fault-proneness Prediction

    Akito Monden, Jacky Keung, Shuji Morisaki, Yasutaka Kamei, Ken-ichi Matsumoto

    2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1   838 - 847   2012

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    Background: Association rules are more comprehensive and understandable than fault-prone module predictors (such as logistic regression model, random forest and support vector machine). One of the challenges is that there are usually too many similar rules to be extracted by the rule mining.
    Aim: This paper proposes a rule reduction technique that can eliminate complex (long) and/or similar rules without sacrificing the prediction performance as much as possible.
    Method: The notion of the method is to removing long and similar rules unless their confidence level as a heuristic is high enough than shorter rules. For example, it starts with selecting rules with shortest length (length=1), and then it continues through the 2nd shortest rules selection (length=2) based on the current confidence level, this process is repeated on the selection for longer rules until no rules are worth included.
    Result: An empirical experiment has been conducted with the Mylyn and Eclipse PDE datasets. The result of the Mylyn dataset showed the proposed method was able to reduce the number of rules from 1347 down to 13, while the delta of the prediction performance was only .015 (from .757 down to .742) in terms of the F1 prediction criteria. In the experiment with Eclipsed PDE dataset, the proposed method reduced the number of rules from 398 to 12, while the prediction performance even improved (from .426 to .441.)
    Conclusion: The novel technique introduced resolves the rule explosion problem in association rule mining for software proneness prediction, which is significant and provides better understanding of the causes of faulty modules.

    DOI: 10.1109/APSEC.2012.103

    Web of Science

    researchmap

  • Incorporating Expert Judgment into Regression Models of Software Effort Estimation

    Masateru Tsunoda, Akito Monden, Jacky Keung, Kenichi Matsumoto

    2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1   374 - 379   2012

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    One of the common problems in building an effort estimation model is that not all the effort factors are suitable as predictor variables. As a supplement of missing information in estimation models, this paper explores the project manager's knowledge about the target project. We assume that the experts can judge the target project's productivity level based on his/her own expert knowledge about the project. We also assume that this judgment can be further improved, because using the expert's judgment solely could incur subjective perception. This paper proposes a regression model building/selection method to address this challenge. In the proposed method, a fit dataset for model building is divided into two or three subsets by project productivity, and an estimation model is built on each data subset. The expert judges the productivity level of the target project and selects one of the models to be used. In the experiment, we used three datasets to evaluate the produced effort estimation models. In the experiment, we adjusted the error rate of the judgment and analyzed the relationship between the error rate and the estimation accuracy. As a result, the judgment-incorporating models produced significantly higher estimation accuracy than the conventional linear regression model, where the expert's error rate is less than 37%.

    DOI: 10.1109/APSEC.2012.58

    Web of Science

    researchmap

  • An Investigation on Software Bug-Fix Prediction for Open Source Software Projects-A Case Study on the Eclipse Project

    Akinori Ihara, Yasutaka Kamei, Akito Monden, Masao Ohira, Jacky Wai Keung, Naoyasu Ubayashi, Ken-ichi Matsumoto

    2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE WORKSHOPS (APSECW), VOL. 2   2   112 - 119   2012

     More details

    Language:English   Publisher:IEEE COMPUTER SOC  

    Open source software projects (OSS) receive a large number of bug reports from various contributors and developers alike, where many planned to be fixed by OSS developers. Given the next release cycle information, OSS users can be more effective and flexible in planning and to fix the bugs that are not to be fixed in the next release. It is therefore vital for OSS users to learn which bugs the OSS developers will fix, unfortunately such information may not be readily available, nor there is a prediction framework exists to serve such an important purpose. In this study, we would like to answer the question "Will this bug be fixed by the next release?", this is addressed by building a bug fixing prediction model based on the characteristics of a bug-related metric and by incorporating the progress of bug fixing measures such as status, period and developer metrics to provide aggregated information for the OSS users. The proposed model calculates the deviance of each variable to analyze the most important metrics, and it has been experimented using a case study with Eclipse platform. Result shows a bug fixing prediction model using both base metrics and state metrics provide significantly better performance in precision (139%) and recall (114%) than the standard model using only base metrics.

    DOI: 10.1109/APSEC.2012.86

    Web of Science

    researchmap

  • 生産性に基づくソフトウェア開発工数予測モデル

    門田 暁人, 松本 健一, 大岩 佐和子, 押野 智樹

    経済調査研究レビュー   11 ( 11 )   32 - 37   2012

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Handling Categorical Variables in Effort Estimation

    Masateru Tsunoda, Sousuke Amasaki, Akito Monden

    PROCEEDINGS OF THE ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM'12)   99 - 102   2012

     More details

    Language:English   Publisher:IEEE  

    Background: Accurate effort estimation is the basis of the software development project management. The linear regression model is one of the widely-used methods for the purpose. A dataset used to build a model often includes categorical variables denoting such as programming languages. Categorical variables are usually handled with two methods: the stratification and dummy variables. Those methods have a positive effect on accuracy but have shortcomings. The other handing method, the interaction and the hierarchical linear model (HLM), might be able to compensate for them. However, the two methods have not been examined in the research area. Aim: giving useful suggestions for handling categorical variables with the stratification, transforming dummy variables, the interaction, or HLM, when building an estimation model. Method: We built estimation models with the four handling methods on ISBSG, NASA, and Desharnais datasets, and compared accuracy of the methods with each other. Results: The most effective method was different for datasets, and the difference was statistically significant on both mean balanced relative error (MBRE) and mean magnitude of relative error (MMRE). The interaction and HLM were effective in a certain case. Conclusions: The stratification and transforming dummy variables should be tried at least, for obtaining an accurate model. In addition, we suggest that the application of the interaction and HLM should be considered when building the estimation model.

    DOI: 10.1145/2372251.2372267

    Web of Science

    researchmap

  • Analysis of attributes relating to custom software price

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino

    Proceedings - 2012 4th International Workshop on Empirical Software Engineering in Practice, IWESEP 2012   16 - 22   2012

     More details

    Language:English  

    Price of custom software is very important for a user (end user company). However, there is very little information which helps the user judge the validity of the custom software price. So, one of our research goals is building price estimation model and showing its accuracy for the user to judge the validity of the custom software price. The other goal is how to get value for money custom software. In the analysis, we used 31 projects collected from Japanese organizations. First, we analyzed relationships of unit price of effort, unit price of FP (function point), and productivity. The analysis result showed productivity is more important variable than unit price of effort for the custom software price estimation. Next, relationships of other variables were analyzed to identify important variables for the price estimation. The result suggested some variables such as system architecture are important for that. At the end, the price was estimated based on FP and effort. In the analysis, when the price was estimated based on FP, the median balanced relative error (BRE) was 86.6%, and when it was estimated based on effort, median BRE was 20.2%. © 2012 IEEE.

    DOI: 10.1109/IWESEP.2012.19

    Scopus

    researchmap

  • An ensemble approach of simple regression models to cross-project fault prediction

    Satoshi Uchigaki, Shinji Uchida, Koji Toda, Akito Monden

    Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012   476 - 481   2012

     More details

    Language:English  

    In software development, prediction of fault-prone modules is an important challenge for effective software testing. However, high prediction accuracy may not be achieved in cross-project prediction, since there is a large difference in distribution of predictor variables between the base project and the target project.@In this paper we propose an prediction technique called gan ensemble of simple regression modelsh to improve the prediction accuracy of cross-project prediction. The proposed method uses weighted sum of outputs of simple logistic regression models to improve the generalization ability of logistic models. To evaluate the performance of the proposed method, we conducted cross-project prediction using datasets of projects from NASA IV&amp
    V Facility Metrics Data Program. As a result, the proposed method outperformed conventional logistic regression models in terms of AUC of the Alberg diagram. © 2012 IEEE.

    DOI: 10.1109/SNPD.2012.34

    Scopus

    researchmap

  • ソフトウェア開発プロジェクトをまたがるfault-proneモジュール判別の試み - 18プロジェクトの実験から得た教訓

    藏本 達也, 亀井 靖高, 門田 暁人, 松本 健一

    電子情報通信学会論文誌D   J95-D ( 3 )   425 - 436   2012

     More details

  • 類似性に基づくソフトウェア開発工数見積もりにおける外れ値除去法の比較

    角田 雅照, 門田 暁人, 渡邊 瑞穂, 柿元 健, 松本 健一

    電子情報通信学会論文誌 D   J95-D ( 4 )   895 - 908   2012

     More details

  • An empirical evaluation of outlier deletion methods for analogy-based cost estimation Reviewed

    Masateru Tsunoda, Akito Monden, Takeshi Kakimoto, Ken-ichi Matsumoto

    Proceedings of the 7th International Conference on Predictive Models in Software Engineering   17   1 - 10   2011.9

     More details

    Language:English  

    CiNii Article

    researchmap

  • Reduction of Association Rules for Fault-prone Module Detection

    2011 ( 20 )   1 - 6   2011.3

  • D-3-4 An Approach of Software Development Effort Estimation by Random Forests

    Konishi Fumiaki, Uchida Shinji, Toda Koji, Monden Akito

    Proceedings of the IEICE General Conference   2011 ( 1 )   2011.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    researchmap

  • B-18-2 A Study on Test Case Allocation by Fault-prone Module Detection

    Hayashi Takuma, Shinoda Shoji, Shirai Kumiko, Yoshida Junichi, Monden Akito, Matsumoto Kenichi

    Proceedings of the Society Conference of IEICE   2   406 - 406   2011

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Applying Outlier Deletion to Analosgy Based Cost Estimation Reviewed

    Masateru Tsunoda, Akito Monden, Mizuho Watanabe, Takeshi Kakimoto, Ken-ichi Matsumoto

    In Proceedings of International Workshop on Empirical Software Engineering in Practice   13 - 18   2010.12

     More details

    Language:English  

    researchmap

  • Working Time Measurement for Improving Awareness in Deskwork

    SHIMOMURA YOSUKE, KURAMOTO TATSUYA, MONDEN AKITO, MATSUMOTO KEN-ICHI

    2010 ( 1 )   1 - 8   2010.3

  • An Analysis of Relationship between Coding Style Metrics and Source Code Plagiarism

    TAKEDA TAKAYUKI, USHIMADO TOMOYOSHI, YAMAUCHI HIROKI, MONDEN AKITO, MATSUMOTO KEN-ICHI

    2010 ( 8 )   1 - 8   2010.3

  • Influence of Imbalance Data toward Cost Overrun Project Prediction

    SHIBATA JUN-ICHIRO, TSUNODA MASATERU, MONDEN AKITO, MATSUMOTO KEN-ICHI

    2010 ( 36 )   1 - 6   2010.3

  • 線形重回帰モデルを用いたソフトウェア開発工数予測における対数変換の効果

    門田暁人

    コンピュータソフトウェア   27 ( 4 )   234 - 239   2010

  • Detection of Source Code Reuse based on Code Clone Metrics

    OKAHARA Satoshi, MANABE Yuki, YAMAUCHI Hiroki, MONDEN Akito, MATSUMOTO Ken-ichi

    IEICE technical report   109 ( 307 )   73 - 78   2009.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In recent software development, programmers often reuse source code of Open Source Software (OSS) as a part of commercial product. While reusing OSS increase productivity, it raises a new risks of violating OSS license to both software venders and purchasers. This paper proposes a method to detect reuse of source code based on code clone metrics. For two code clone metrics, maximum length of code clone and partial similarity of software, we experimentally derived criteria to identify the reuse, by using 50 OSS packages. By using derived criteria, we could correctly identify 84% of products containing reused code without having false-positive.

    CiNii Article

    CiNii Books

    researchmap

  • Performance Improvement of Fault-prone Module Prediction by Normalization of Software Metrics

    KURAMOTO Tatsuya, MATSUMOTO Shinsuke, KAMEI Yasutaka, MONDEN Akito, MATSUMOTO Ken-ichi

    2009 ( 11 )   1 - 6   2009.10

  • B-009 A Method for Hiding Program Code Focused on the Execution Time Difference

    Kanzaki Yuichiro, Monden Akito

    8 ( 1 )   361 - 364   2009.8

     More details

    Language:Japanese   Publisher:Forum on Information Technology  

    CiNii Article

    CiNii Books

    researchmap

  • Software Classification According to their Functionality based on Used Classes

    USHIMADO Tomoyoshi, MONDEN Akito, TAMADA Haruaki, MATSUMOTO Kenichi

    IEICE technical report   109 ( 170 )   31 - 36   2009.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In software development, to implement given functional specifications, developers generally use class files from well-known class libraries. Therefore, a set of library classes used by software seems to have a strong relationship with the functionality of the software. In this paper we propose a method to classify software from their functional viewpoints based on used classes. In the proposed method, the distance between two software is calculated based on the number of uses of each library class, and, software is classified by hierarchical clustering. As a result of an experimental evaluation, the most appropriate classification was obtained when the tf-idf method and Euclidean distance was employed to calculate the distance.

    CiNii Article

    CiNii Books

    researchmap

  • Modeling of Test Effort Allocation and Software Reliability in Fault-prone Module Detection

    50 ( 7 )   1716 - 1724   2009.7

  • The Effect of Collaborative Filtering on Software Component Recommendation

    2009.3

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • 自主研究 ソフトウェア開発費に影響する要因の分析

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 4 )   80 - 92   2009.3

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Experimentally Deriving Probability of Program Piracy based on Length of Code Clone

    OKAHARA Satoshi, MANABE Yuki, YAMAUCHI Hiroki, MONDEN Akito, MATSUMOTO Kenichi, INOUE Katsuro

    IEICE technical report   108 ( 362 )   7 - 11   2008.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Generally, if a piece of code clone was found between two different programs, a plagiarism or a code reuse (program piracy) might be made. On the other hand, code clone also occurs accidentally or by code idioms. This paper experimentally derives the probability of program piracy based on length of code clone. In the experiment, we identified code clones among many different programs which we confirmed that program piracy has not been made, and formulated by power approximation the relation between the length of code clone and its derivation probability. By using this formula, we can compute the probability of program piracy from the maximum length of code clone derived from given two programs.

    CiNii Article

    CiNii Books

    researchmap

  • Empirical Evaluation of Missing Data Techniques for Effort Estimation Reviewed

    Koichi Tamura, Takeshi Kakimoto, Koji Toda, Masateru Tsunoda, Akito Monden, Ken-ichi Matsumoto

    In Proceedings of 2nd International Workshop on Software Productivity Analysis And Cost Estimation   4 - 9   2008.12

     More details

    Language:English  

    researchmap

  • バグ予測で信頼性はどれだけ向上するのか?-テスト工数割り当ての観点からの従来研究の評価 Reviewed

    柿元健, 亀井靖高, 柗本真祐, 門田暁人, 松本健一, 楠本真二

    ソフトウェア工学の基礎XV,日本ソフトウェア科学会FOSE2008   63 - 68   2008.11

     More details

  • The Heisei 19 IPSJ Nagao Special Researcher Award : IPSJ Nagao Special Resercher Award : Data Driven Software Project Management

    49 ( 7 )   844 - 844   2008.7

     More details

  • Effective Use of Software Development Data from Software Users' View Points

    松村知子, 森崎修司, 門田暁人, 楠本真二, 飯田元, 松本健一, 久保浩三, 井上克郎

    情報処理学会研究報告   2008 ( 29(SE-159) )   219 - 226   2008.3

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Nowadays, high quality software system is required because our society increasingly depends on software systems. We propose "Software Tag", a technology to share the software development data, for software users to choose secure and reliable software. Software tags include data of software development process and quality of software artifacts, and should be shown to software users to judge if it would be usable or not. In this report, we explain the idea of software tags and usage models, and report the progress of detailed technical researches for practical application to the society.

    CiNii Article

    CiNii Books

    J-GLOBAL

    researchmap

  • Measurement of Program Reuse-ratio in Enhancement Projects using Software Birthmarks

    TAMADA Haruaki, MORISAKI Shuji, MONDEN Akito, MATSUMOTO Ken-ichi

    70   399 - 400   2008.3

     More details

  • Software Effort Estimation Model Using Team Size per System Size

    TSUNODA Masateru, MONDEN Akito, MATSUMOTO Ken-ichi

    70   401 - 402   2008.3

     More details

  • An Analysis of System Issue Tracking Data by Association Rule Mining

    TOKUGAWA Hiroyuki, MORISAKI Shuji, MATSUMURA Tomoko, MONDEN Akito, MATSUMOTO Kenichi

    70   397 - 398   2008.3

     More details

  • バグモジュール率を従属変数としたFault-Proneモジュール判別モデルの提案

    水野 勇貴, 内田 眞司, 門田 暁人

    全国大会講演論文集   70   323 - 324   2008.3

     More details

  • 相関ルール分析とロジスティック回帰分析を組み合わせたFault- Proneモジュール判別手法

    亀井靖高, 森崎修司, 門田暁人, 松本健一

    情報処理学会論文誌   49 ( 12 )   3954 - 3966   2008

     More details

  • Analyzing factors of defect correction effort in a multi-vendor information system developmen

    Tomoko Matsumura, Akito Monden, Shuji Morisaki, Kenichi Matsumoto

    Journal of Computer Information Systems   XLIX ( 1 )   73 - 80   2008

     More details

  • 工数予測における類似性に基づく欠損値補完の効果 Reviewed

    田村晃一, 柿元健, 戸田航史, 角田雅照, 門田暁人, 松本健一

    ソフトウェア工学の基礎XIV, 日本ソフトウェア科学会FOSE2007   85 - 93   2007.11

     More details

    Language:Japanese  

    researchmap

  • Fault-Prone モジュール判別におけるF1値とソフトウェア信頼性の関係 Reviewed

    柿元健, 門田暁人, 亀井靖高, 柗本真佑, 松本健一

    ソフトウェア工学の基礎XIV, 日本ソフトウェア科学会FOSE2007   75 - 83   2007.11

     More details

  • The Effect of Removing Noisy Projects in Software Development Effort Estimation

    24   1 - 7   2007.9

     More details

  • The effects of over and under sampling on fault-prone module detection Reviewed

    Yasutaka Kamei, Akito Monden, Shinsuke Matsumoto, Takeshi Kakimoto, Ken-ichi Matsumoto

    ESEM '07 : Proc. First Intl. Symposium on Empirical Softw. Eng. and Measurement   196 - 204   2007.9

     More details

  • Is This Cost Estimate Reliable? - the Relationship between Homogeneity of Analogues and Estimation Reliability Reviewed

    Naoki Ohsugi, Akito Monden, Nahomi Kikuchi, Michael Barker, Masateru Tsunoda, Takeshi Kakimoto, Ken-ichi Matsumoto

    In Proceedings of the 1st International Symposium on Empirical Software Engineering and Measurement   384 - 392   2007.9

     More details

    Language:English  

    DOI: 10.1109/ESEM.2007.61

    researchmap

  • Applying Sampling Methods to Fault-prone Module Detection

    2007.8

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • プロジェクト間の類似性に基づくソフトウェアメトリクスの欠損値の補完

    田村晃一, 柿元健, 戸田航史, 角田雅照, 門田暁人, 松本健一

    ソフトウェア信頼性研究会第4 回ワークショップ   17 - 23   2007.6

     More details

    Language:Japanese  

    researchmap

  • 類似した命令列の畳込みによるプログラムの耐タンパ性の向上

    Takashi Nishioka, Hiroki Yamauchi, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    情報処理学会研究報告, ソフトウェア工学研究会   2007-SE-155 ( 33 )   167 - 174   2007.3

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    This technical report proposes a software tamper proofing method called instruction folding. In this method, a set of similar (but sligtly different) instruction sequences is detected in a program, and then, they are integrated (folded) into a single instruction sequence. A self-modifying mechanism is applied to the folded sequence to bridge the gap between those slightly different sequences at run-time. The folded sequence is tamper resistant since tampering affects every functionality where original (similar) instruction sequences were present.

    CiNii Article

    CiNii Books

    researchmap

  • 高級言語レベルでの偽装内容の指定が可能なプログラムのカムフラージュ

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    2007年暗号と情報セキュリティシンポジウム(SCIS2007)予稿集CD-ROM(講演番号4D1-3)   2007.1

     More details

  • C言語におけるライブラリ呼び出し隠蔽のための名前難読化手法

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    暗号と情報セキュリティシンポジウム (SCIS2007)   2007.1

     More details

  • ソフトウェア開発工数予測における特異プロジェクト除去の効果

    渡邊瑞穂, 柿元健, 戸田航史, 門田暁人, 松本健一

    日本ソフトウエア科学会大会講演論文集(CD-ROM)   24th   7B-2   2007

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A proposal for analysis and prediction for software projects using in-process measurements and collaborative filtering of a benchmarks database

    Yoshiki Mitani, Nahomi Kikuchi, Tomoko Matsumura, Naoki Ohsugi, Akito Monden, Yoshiki Higo, Katsuro Inoue, Michael Barker, Ken-ichi Matsumoto

    Journal of Software Measurement   1 ( 1 )   1 - 11   2007

     More details

  • Mining quantitative rules in a software project data set

    Shuji Morisaki, Akito Monden, Haruaki Tamada, Tomoko Matsumura, Ken-ichi Matsumoto

    IPSJ Journal   48 ( 8 )   2725 - 2734   2007

     More details

  • マルチベンダ情報システム開発における障害修正工数の要因分析

    松村知子, 門田暁人, 森崎修司, 松本健一

    情報処理学会論文誌   48 ( 5 )   1926 - 1935   2007

     More details

  • Variable Selection for Effort Estimation based on Similarity of Projects

    TAKI Shinya, KAKIMOTO Takeshi, TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken-ichi

    Technical report of IEICE. SS   106 ( 325 )   1 - 6   2006.10

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Analogy-based estimation methods have been researched for deriving accurate effort estimate required to complete a project; however, there were few activities to develop efficient variable selection methods. In this paper, we propose Correlation Based Selection (CBS) excluding variables that do not correlate with the total effort. The proposed method needs few calculation amounts because it calculates only the correlation coefficients between the total effort and each variable in the data. We experimentally evaluated accuracy of the proposed method by using the data collected from a softwar...

    CiNii Article

    CiNii Books

    researchmap

  • Analyzing Oss Developers’ Working Time Using Mailing Lists Archives Reviewed

    Masateru Tsunoda, Akito Monden, Takeshi Kakimoto, Yasutaka Kamei, Ken-ichi Matsumoto

    In Proceedings of the 3rd International Workshop on Mining Software Repositories Mining Challenge 2006   181 - 182   2006.5

  • Using Software Birthmarks to Identify Similar Classes and Major Functionalities Reviewed

    Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Haruaki Tamada, Masateru Tsunoda, Ken-ichi Matsumoto

    Proceedings of the 3rd International Workshop on Mining Software Repositories (MSR2006) Mining Challenge 2006, May, Shanghai, China   171 - 172   2006.5

     More details

  • Software Productivity Analysis with respect to Outsourcing Ratio

    TSUNODA Masateru, MONDEN Akito, YADOHISA Hiroshi, KIKUCHI Nahomi, MATSUMOTO Ken-ichi

    IEICE technical report   106 ( 16 )   19 - 24   2006.4

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    To clarify the relation between controllable attributes of a software development and its productivity, this paper experimentally analyzed 253 enterprise software development projects of software development companies, established by Software Engineering Center (SEC), Information-technology Promotion Agency. In the experiment, as controllable attributes, we focused on the outsourcing ratio of a software project, defined as an effort outsourced to subcontract companies divided by a whole development effort. Our major findings include larger outsourcing ratio yields worse productivity.

    CiNii Article

    CiNii Books

    researchmap

  • A Recommendation Method of Useful Software Components for Ongoing Project

    KAMEI Yasutaka, TSUNODA Masateru, KAKIMOTO Takeshi, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken-ichi

    Technical report of IEICE. SS   106 ( 16 )   25 - 30   2006.4

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Many software components have been provided by development platform vendors, for achieving efficient development of high quality software; however, some practitioners cannot find useful components because number of the provided components is too large. For solving this problem, we propose a method based on collaborative filtering for recommending useful components to each ongoing project. In the proposed method, at first, some past projects similar to given ongoing project are retrieved by calculating similarity with number of common components used in the ongoing project and each past proj...

    CiNii Article

    researchmap

  • 企業横断的収集データに基づくソフトウェア開発プロジェクトの工数見積もり

    大杉 直樹, 角田 雅照, 門田 暁人, 松村 知子, 松本 健一, 菊地 奈穂美

    SEC journal   2 ( 5 )   16 - 25   2006

     More details

    Language:Japanese   Publisher:情報処理推進機構ソフトウェア・エンジニアリング・センター  

    CiNii Article

    CiNii Books

    researchmap

  • Characterizing Software Projects Unpredictable by Effort Estimation Models

    TODA Koji, TSUNODA Masateru, MONDEN Akito, MATSUMOTO Ken-ichi

    IEICE technical report   105 ( 491 )   67 - 72   2005.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Effort prediction is necessary for project manegers to make software development plan. To predict development effort, various estimation moedels such as multivariate regression models or neural network model have been proposed. However, there is much difference in effort prediction accuracy among predicted projects. In this study, we experimentally analyzed the project charactaristics whose prediction accuracy tend to become worse. As a result, we identified some characteristics.

    CiNii Article

    researchmap

  • 攻撃タスクを考慮した難読化による暗号プログラムの保護

    Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    電子情報通信学会技術報告, ソフトウェアサイエンス研究会   105 ( SS2005-59 )   25 - 30   2005.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we propose a cracker-centric approach to give a realistic guideline for applying software obfuscation methods to disrupt crackers' actions. As a case study, we define a security goal and a threat model for a Java implementation of a cryptomeria cipher (C2) program, and then, based on the model, we describe a guideline to protect secret keys included in the program.

    CiNii Article

    CiNii Books

    researchmap

  • Recommendation of Software Technologies based on Collaborative Filtering Reviewed

    Tomohiro Akinaga, Naoki Ohsugi, Masateru Tsunoda, Takeshi Kakimoto, Akito Monden, Ken-ichi Matsumoto

    In Proceedings of the 12th Asia-Pacific Software Engineering Conference   209 - 214   2005.12

     More details

    Language:English  

    DOI: 10.1109/APSEC.2005.94

    researchmap

  • 協調フィルタリングによる工数見積もり手法におけるデータ数と見積もり精度の関係の分析 Reviewed

    柿元健, 角田雅照, 大杉直樹, 門田暁人, 松本健一

    ソフトウェア工学の基礎XII, 日本ソフトウェア科学会FOSE2005   77 - 86   2005.11

     More details

  • A Comparison of Effort Prediction Methods Using Similar Projects

    TSUNODA Masateru, KAKIMOTO Takeshi, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Kenichi

    Technical report of IEICE. SS   105 ( 331 )   45 - 50   2005.10

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Due to heterogeneity of recent software development organizations and software processes, a single effort prediction model, such as COCOMO and regression models, often does not perform well to predict an individual project. On the other hand, effort prediction methods based on project similarity (Case-Based Reasoning (CBR) and Collaborative Filtering (CF)) have become an attractive alternatives in recent years because they consider individuality of each project in prediction. However, there are no empirical evaluation conducted to compare CBR and CF. Therefore, we focus on these methods and...

    CiNii Article

    CiNii Books

    researchmap

  • Javawock: A Java Class Recommender System based on Collaborative Filtering Reviewed

    Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, Akito Monden, Ken-ichi Matsumoto

    In Proceedings of 17th International Conference on Software Engineering and Knowledge Engineering   491 - 497   2005.7

     More details

    Language:English  

    researchmap

  • Prediction of Project Cost Overrun Based on Collaborative Filtering

    MOTOMURA Takuya, KAKIMOTO Takeshi, TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Kenichi

    Technical report of IEICE. SS   105 ( 229 )   35 - 40   2005.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    In this paper, we evaluate estimation methods of software development cost overrun in an early development phase. To discriminate cost overrun projects, we used collaborative filtering technique whose predictor variables are the evaluation values of risk factors which influence the excess of cost. Data of 45 projects were used in an evaluation experiment. The result showed that precision and recall of user-based collaborative filtering was higher than liner discriminant analysis.

    CiNii Article

    CiNii Books

    researchmap

  • Software Technology Recommendation Based on Collaborative Filtering

    AKINAGA Tomohiro, OHSUGI Naoki, KAKIMOTO Takeshi, TSUNODA Masateru, MONDEN Akito, MATSUMOTO Kenichi

    Technical report of IEICE. SS   105 ( 128 )   7 - 13   2005.6

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    In recent years, much software development technology is proposed. It is difficult for the software engineer to be master of all these technologies. So it is necessary to select the technology that should acquire it beforehand. Then, we propose a system recommending the software exploitation technology that seems to be useful for engineer by using Collaborative Filtering. In the proposal method, first of all, the interest to each development technology is first investigated to each engineer. And, the engineer to whom the tendency to the interest is similar is discovered based on cooperated ...

    CiNii Article

    CiNii Books

    researchmap

  • プログラマの視線を用いたレビュープロセスの分析

    Hidetake Uwano, Noboru Nakamichi, Hiroshi Igaki, Monden Akito, Masahide Nakamura, Ken-ichi Matsumoto

    信学技報SS2005 12-17   105 ( 128 )   21 - 26   2005.6

     More details

  • Recent Software Protection Techniques - Hardware-assisted Tamper Prevention -

    MONDEN Akito, Clark Thomborson

    IPSJ Magazine   46 ( 5 )   558 - 563   2005.5

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00065344/

  • Recent Software Protection Techniques - Software-only Tamper Prevention -

    MONDEN Akito, Clark Thomborson

    IPSJ Magazine   46 ( 4 )   431 - 437   2005.4

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00065318/

  • Analysis of program comprehension that has effects on the code review achievement

    栗山進, 大平雅雄, 門田暁人, 松本健一

    電子情報通信学会技術研究報告   104 ( 571(SS2004 50-55) )   17 - 22   2005.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The goal of this study is to analyze the relationship between the level of program comprehension and the bug detection rate in a code review process. We examined the reviewer's comprehension level of a program after the review process was held by the reviewer. As a results of examinations, we have found that the bug detection rate correlated with the comprehension level of data structure and its manipulation while it did not correlated with the comprehension level of logic and interface. We also found the program comprehension was a necessary condition for detecting bugs.

    CiNii Article

    CiNii Books

    J-GLOBAL

    researchmap

  • ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの実験的評価

    Keiji Okamoto, Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    第46回プログラミング・シンポジウム報告集   41 - 50   2005.1

     More details

  • Javaプログラムの動的解析のためのトレーサ埋め込みツール

    Haruaki Tamada, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    第46回プログラミング・シンポジウム報告集   51 - 62   2005.1

     More details

  • Software analysis by code clones in open source software

    Shinji Uchida, Akito Monden, Naoki Ohsugi, Toshihiro Kamiya, Ken-ichi Matsumoto, Hideo Kudo

    Journal of Computer Information Systems   XLV ( 3 )   1 - 11   2005

     More details

  • Evaluation of gaze-added target selection methods suitable for general GUIs

    Akito Monden, Masatake Yamato, Ken-ichi Matsumoto

    International Journal of Computer Applications in Technology   24 ( 1 )   17 - 24   2005

  • 視線追跡装置とフットペダルを利用した実験支援インタフェース

    門田暁人, 松矢明宏, 大和正武, 松本健一

    教育システム情報学会誌   22 ( 2 )   127 - 133   2005

     More details

  • 協調フィルタリングを用いたソフトウェア開発工数予測方法

    角田雅照, 大杉直樹, 門田暁人, 松本健一

    情報処理学会論文誌   46 ( 5 )   1155 - 1164   2005

     More details

  • 変数更新の回数と分散に基づくプログラムのメンタルシミュレーションコスト評価

    Takahisa Ishiguro, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    電子情報通信学会技術報告, ソフトウェアサイエンス研究会   SS2004-32   37 - 42   2004.11

     More details

  • 協調フィルタリングに基づく工数見積もりのロバスト性評価 Reviewed

    柿元健, 角田雅照, 大杉直樹, 門田暁人, 松本健一

    ソフトウェア工学の基礎XI, 日本ソフトウェア科学会 FOSE2004   73 - 84   2004.11

     More details

  • ソフトウェア開発プロセスにおける情報漏えいのリスク評価

    Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    コンピュータセキュリティシンポジウム2004論文集 (CSS2004)   2   775 - 780   2004.10

     More details

  • A Java Class File Recommender System Based on Collaborative Filtering

    KAKIMOTO Takeshi, TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken'ichi

    IEICE technical report. Dependable computing   104 ( 346 )   29 - 34   2004.10

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Today, most software development platforms provide various software components. However, some software developers are not aware of useful components because extremely large amount of components are provided. This paper propose a system recommending the developers some Java class files by using Collaborative Filtering. Once a developer venters a Java class file which has been developed in ongoing project, the proposed system investigates used Java classes in the entered class file. Next, the system finds some similar class files from already completed class files which made in the past proje...

    CiNii Article

    CiNii Books

    researchmap

  • 協調フィルタリングに基づくソフトウェア機能推薦システム

    大杉直樹, 門田暁人, 森崎修司, 松本健一

    情報処理学会論文誌   45 ( 1 )   267 - 278   2004

     More details

  • A support system for software function discovery using histories of function executions

    Shuuji Morisaki, Yumi Shiraishi, Masatake Yamato, Akito Monden, Ken-ichi Matsumoto, Koji Torii

    Systems and Computers in Japan   35 ( 12 )   93 - 106   2004

     More details

  • An Application of Collaborative Filtering for Software Reliability Prediction

    TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken'ichi

    Technical report of IEICE. SS   103 ( 482 )   19 - 24   2003.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Data sets recorded in software development projects often contain a large amount of missing values. It is difficult for multivariate regression models to accurately predict software reliability using such data. To solve this problem, we propose a method to apply Collaborative Filtering for software reliability prediction. In our method, we use Collaborative Filtering to select past software projects similar to a target project and to predict its reliability with selected past projects. We applied our method to actual software projects data to estimate accuracy of prediction. The result of the case study showed that Collaborative Filtering showed better prediction performance than conventional regression models.

    CiNii Article

    CiNii Books

    researchmap

  • Java クラスファイルからプログラム指紋を抽出する方法の提案

    Haruaki Tamada, Yuichiro Kanzaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    電子情報通信学会技術報告, 情報セキュリティ研究会   ( ISEC2003-29 )   127 - 133   2003.7

     More details

  • Program Obfuscation by Coding Data and Its Operation

    SATO Hirotsugu, MONDEN Akito, MATSUMOTO Ken-ichi

    Technical Report of IEICE   102 ( 743 )   13 - 18   2003.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Protecting a program against illegal hacking and manipulations is a crucial problem for the software industry. For this purpose, this paper proposes a systematic method to obfuscate a program by applying a specific transformation to data and operators in the program. The proposed method consists of the following three steps : (1) encode each data (operand) appearing in a given expression, (2) replace operators in the expression, so that the evaluated value of the expression becomes an encoded value, (3) decode the encoded value when required. We present a set of operator transformation rules applied to data encoding based on linear transformation. In the program obtained by the proposed method. the operators are applieddirectly to the encoded data, and thus, the data is observed in the program stack as an "encode" value. Therefore, the proposed method is especially effective for the program hacking based on stack monitoring at run-time. As a rsult, it can be applied effectively to protecting software systems with security-related components, such as decrypt keys, decoding algorithms, authentication.

    CiNii Article

    CiNii Books

    researchmap

  • The Development of a Software Search Engine for the World Wide Web

    KAMEI Toshiyuki, MONDEN Akito, MATUMOTO Ken'ichi

    Technical report of IEICE. SS   102 ( 617 )   59 - 64   2003.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Although many software systems had been developed in the world, the knowledge of developments has not been effectively accumulated and reused. 0n the other hand, there are many information sources on the WWW that are useful for software development, such as source codes and their related documents. Some of useful information can be retrieved by the common web search engines, however. these engines do not necessarily contain software itself in the database. Moreover. they do not have a functionality suitable for retrieving software resources. This paper describes the design of a software search engine, which have an ability to crawl the WWW space, to collect and analyze software resources, and to provide them to users. The user of our engine can search software resources using a query including symbols and values in software, such as product metrics. This paper also describes an implementation of a prototype system and an example of retrieval.

    CiNii Article

    CiNii Books

    researchmap

  • コードクローンに基づくレガシーソフトウェアの品質の分析

    門田暁人, 佐藤慎一, 神谷年洋, 松本健一

    情報処理学会論文誌   44 ( 8 )   2178 - 2188   2003

     More details

  • 潜在コーディング規則違反を原因とするフォールトの検出支援方法の提案

    松村知子, 門田暁人, 松本健一

    情報処理学会論文誌   44 ( 4 )   1070 - 1082   2003

     More details

  • 視線・マウス併用型インタフェースのドラッグ&ドロップ操作への適用

    大和正武, 神代和範, 門田暁人, 松本健一

    情報処理学会論文誌   44 ( 1 )   166 - 175   2003

     More details

  • 生物学実験支援のための視線インタフェース

    門田暁人, 松矢明宏, 大和正武, 松本健一

    情報処理学会論文誌   44 ( 8 )   2266 - 2269   2003

     More details

  • 命令コードの実行時置き換えによるプログラムの解析防止

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    信学技報, 情報セキュリティ研究会   ISEC2002-98 ( 511 )   13 - 19   2002.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original binary program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously retrieves the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.

    CiNii Article

    CiNii Books

    researchmap

  • A Method for Program Code Inspection Using Bug Report

    MATSUMURA Tomoko, MONDEN Akito, MATSUMOTO Ken-ichi

    Technical report of IEICE. SS   101 ( 628 )   1 - 8   2002.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Thorough an ongoing process of maintaining large legacy software, a number of "implicit coding rules", which are never described in specification documents or design documents, are unexpectedly generated as software becomes more complicated than it used be. Violating such rules cause fault injection. This paper proposes a method for automatically detecting and informing code fragments that violate implicit coding rules. In this method, patterns of typical code violating rules are derived from past bug reports. The patterns are described by a pattern description language, and, a potential faulty code fragments are extracted by a pattern matching technique. The result of a case study showed that 30% of faults in a large legacy system were due to the violation of implicit coding rules, 82% of these faults were descriptable by the pattern language, and, all these faults were extracted by the proposed method.

    CiNii Article

    CiNii Books

    researchmap

  • Quantitative Analysis of Cloned Code on Legacy Software

    NAKAE Daikai, KAMIYA Toshihiro, MONDEN Akito, KATO Hiroshi, SATO Shin-ichi, INOUE Katsuro

    Technical report of IEICE. SS   100 ( 570 )   57 - 64   2001.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper shows the results of both quantitative analysis and qualitative analysis about the nature of cloned code on large legacy software. We defined some cloned code metrics, and then quantitatively analyzed the relation among the metrics and module's age, the number of bugs, etc. We also looked over the source code in order to qualitatively analyze the nature of cloned code. As the results, we found that new modules have more cloned code than old modules, more than half of cloned code were found between modules whose age are within 30 days difference, and the modules that have cloned code have fewer bugs (per line) than the modules that do not have cloned code, etc.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://hdl.handle.net/11094/26715

  • Electronic Intellectual Properties and Social Infrastructure. A Digital Watermarking Method for Java Class Files.

    門田暁人, 松本健一, 飯田元, 井上克郎, 鳥居宏次

    情報処理学会論文誌   41 ( 11 )   3001 - 3009   2000.11

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Digital Watermarking Method for Java Class Files

    門田 暁人, 松本 健一, 飯田 元, 井上 克郎, 鳥居 宏次

    2000.11

     More details

    Language:Japanese   Publisher:情報処理学会  

    本論文では,盗用の疑いのあるJavaプログラムの発見を容易にすることを目的として,プログラム著作者の署名等を電子透かしとしてJavaクラスファイルに挿入する方法,および,取り出す方法を提案する.提案方法は,透かしを挿入してもプログラムの実行効率が変わらず,ツールによる透かしの取り出しの自動化が可能であり,ツールを公開した場合にも透かしの上書き攻撃を回避できるという特徴を持つ.透かしの耐性を実験により評価した結果,obfuscatorと呼ばれるプログラムの難読化ツールによる攻撃後も電子透かしは消えないこと,および,逆コンパイル,再コンパイルによる攻撃に対しても半数以上の透かしは消えないことが確認された.; The aim of this paper is to easily identifyan illegal Java program containing a stolen class file.This paper proposes a method for encoding and decoding a digital watermark,such as a program developer&#039;s copyright notation, into/from Java class files.Characteristics of the proposed method are:Execution efficiency of the target program is not reduced by watermarkencoding,watermark decoding can be automated,and, an overwriting attack is prevented even if a watermark encoding toolis distributed in the public.The result of the experiment to evaluate our method showed thatall the watermarks embedded in class files survived an obfuscator attack,and also showed thatmore than half of watermarks survived a decompile-recompile attack.

    CiNii Article

    researchmap

  • Visualizing Users' Function - execution History of Software to Support Function Discovery

    Shiraishi Yumi, Morisaki Shuuji, Monden Akito, Matsumoto Ken-ichi, Inoue Katsuro

    IPSJ SIG Notes   2000 ( 97 )   13 - 18   2000.10

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    We are conducting a research on sharing usage knowledge of software functions according as the functions that are needed by users who use the same software for similar purpose are similar. In this paper, we propose a visualization method of histories of function executions collected in long period. The proposed method enables users to identify functions that are unaware of by them. We evaluated the proposed method adapting the method to MS Word and PowerPoint. Experimental result shows that all subjects can discover functions unaware and that the 34.5 functions out of discovered functions of PowerPoint are useful for the subjects.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00042327/

  • Sharing Usage Knowledge for Application Software Using Function Execution History

    MORISAKI Shuuji, MONDEN Akito, MATSUMOTO Ken-ichi, INOUE Katsuro, TORII Koji

    Transactions of Information Processing Society of Japan   41 ( 10 )   2770 - 2781   2000.10

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Most of software, especially application software provides us with various functions. Since the acquisition cost of the use knowledge of a function is large, the number of functions actually used is limited. This paper proposes system that shares a functional execution history among users for the purpose of making small acquisition cost of the use knowledge of the function which software offers. The proposed system can collect functional execution histories from users automatically through computer network. It also provides a mechanism for exchanging the use knowledge of a function among users by sharing functional execution histories. Four subjects were able to acquire use knowledge among five persons as a result of the evaluation experiment for Microsoft Word 2000. Efficiency of novice work improved by knowledge acquisition. The use knowledge could be acquired also about the function in which an expert does not know.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00012162/

  • Visualizing Users' Function-execution History of Software to Support Function Discovery

    SHIRAISHI Yumi, MORISAKI Shuuji, MONDEN Akito, MATSUMOTO Ken-ichi, INOUE Katsuro

    Technical report of IEICE. Multimedia and virtual environment   100 ( 357 )   13 - 18   2000.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We are conducting a research on sharing usage knowledge of software functions according as the functions that are needed by users who use the same software for similar purpose are similar. In this paper, we propose a visualization method of histories of function executions collected in long period. The proposed method enables users to identify functions that are unaware of by them. We evaluated the proposed method adapting the method to MS Word and PowerPoint. Experimental result shows that all subjects can discover functions unaware and that the 34. 5 functions out of discovered functions of PowerPoint are useful for the subjects.

    CiNii Article

    CiNii Books

    researchmap

  • 利用情報を用いたソフトウェアコンポーネントの検索

    古賀健太郎, 門田暁人, 飯田元, 松本健一, 井上克郎

    情報処理学会全国大会講演論文集   61st ( 1 )   1.309-1.310   2000.10

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Experimental Evaluation of the Drag&Drop Operation Method That Uses Eye Tracking Device and Mouse Together

    KUMASHIRO Tomonori, YAMATO Masatake, MONDEN Akito, MATSUMOTO Ken-ichi, INOUE Katsuro

    Technical report of IEICE. HIP   99 ( 722 )   37 - 44   2000.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The aim of our study is to make current GUIs more effective for computer users. This paper proposes an eye gaze interface in which computer users use both their eye and hand in doing GUI operations. We have chosen "drag-and-drop" operation, which is one of a daily-use operation, for this study. In our method, drag-and-drop operation is separated into three basic operations:(1) rough cursor movement toward the icon, (2) cursor adjustment onto the icon, and (3) pushing the icon. We use eye movement for (1), and, a mouse for (2) and (3). We also propose three adjustment method for (2):Auto, Manual, and SemiAuto. The result of an experiment to evaluate our method showed that the proposed interface augmented by SemiAuto adjustment is more effective than the conventional mouse interface.

    CiNii Article

    CiNii Books

    researchmap

  • Modeling and analysis of software aging process

    A Monden, S Sato, K Matsumoto, K Inoue

    PRODUCT FOCUSED SOFTWARE PROCESS IMPROVEMENT   1840   140 - 153   2000

     More details

    Language:English   Publisher:SPRINGER-VERLAG BERLIN  

    This paper proposes a model of successful maintenance that can represent how maintainability of each software module changes as it ages. We found that some of the metrics, measured from 20 years old system, fit our model; i.e., values of those metrics seem to be proportional to the degree of maintainability. We described each metric&apos;s critical line - a value that can be used for deciding whether a module should be re-engineered or not. We also described the interpretations on how each software metric relates to maintainability.

    Web of Science

    researchmap

  • A music retrieval system which uses known music as a reference key

    59   19 - 20   1999.9

     More details

  • Extracting and analyzing a feature of playing the guitar

    59   9 - 10   1999.9

     More details

  • A method for decreasing the time of drag-and-drop operation using eye tracking device and mouse together.

    59   33 - 34   1999.9

     More details

  • A digital watermarking method for Java programs.

    門田暁人, 飯田元, 松本健一, 鳥居宏次

    日本ソフトウエア科学会大会論文集   16th   253 - 256   1999.9

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Automatic Cursor Movement by Look

    YAMATO Masatake, KUMASHIRO Tomonori, MONDEN Akito, MATSUMOTO Ken-ichi, INOUE Katsuro

    84   73 - 78   1999.8

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    The purpose of this research is realizing a more efficient input interface by using a look and a mouse together. As the first step, the button selection operation on GUI was divided into "operation (move operation) of moving cursor onto a button", and "operation (push operation) of pushing a button", and the method that performs move operation by the look and performs push operation with a mouse was examined. It became clear that cursor movement by the look is high speed, and it is more efficient than the selection operation only by the mouse as a result of the experiment. However, when the area of the button used as an operation object was about 1 square centimeter, it became clear that it is difficult to move cursor onto a button only by the look, and the mechanism, which assists move operation, is required.

    CiNii Article

    CiNii Books

    researchmap

  • An Analysis of Task - and Information - Sharing in Collaborative Debugging by Two Person

    Morisaki Shuuji, Ito Atsuo, Monden Akito, Matsumoto Ken-ichi

    IPSJ SIG Notes   1999 ( 40 )   35 - 40   1999.5

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Software debugging is often performed by more than one programmer working together. The goal of this research is to identify a model of how two person collaboratively perform a degugging task on a single program. Based on empirical studies we have conducted, we have identified patterns in task- and infromation-sharing, and applied them to analyze the ovserved collaborative debugging processes. The following two collabration patterns were found to be effective in degugging (1) one concentrated on a debugging task while the other collected potentially useful information about the program, and (2) the two shared one program source file in their editors instead of using duplicates and wrote comments iinto the file.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00042404/

  • An Experimental Evaluation of 2-Person Debugging

    ITO Atsuo, MORISAKI Shuuji, MONDEN Akito, MATSUMOTO Ken-ichi, TORII Koji

    Technical report of IEICE. KBSE   98 ( 636 )   45 - 52   1999.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we evaluate methods for sharing debug activity and exchanging knowledge about bug, aiming at reducing debugging time, when two persons modify the same bug cooperating. Four experiments that two person detect and modify single bug are conducted to reveal effective methods. An experiment indicates that taking either task of: (1)exploring the bug location in the source code, and (2)understanding the program is effective to reduce debugging time, and that exchanging knowledge using shared file asynchronously is effective as well.

    CiNii Article

    CiNii Books

    researchmap

  • Scrolling the Text Windows by Looking

    YAMATO Masatake, MONDEN Akito, TAKADA Yoshihiro, MATSUMOTO Ken-ichi, TORII Koji

    Transactions of Information Processing Society of Japan   40 ( 2 )   613 - 622   1999.2

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    This paper proposes a method and implementation for a system to automatically scroll a text window by tracking where a user is looking at. A user of the system can access a portion of the displayed document without using keyboard or mouse. Existing eye-tracking methods, which use eye-gaze as a substitute for pointing devices, require a user to "look at" menus and icons to manipulate a window display. In contrast, our proposed method uses eye movement within a window to control its display. A position of a user's gaze within a text window determines how to scroll the window, what portion of the text to display, and where to stop. Our user study demonstrates that the effectives of scrolling using this method is as good as one with convetional keyboard control as respects string search by scrolling. In particular, we have found that a controlling mechanism to determine the speed of scrolling in terms of the distance of the gaze point from the center of the window was both qualitatively and quantitatively superior to other control mechanisms in the string search by scrolling.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00012841/

  • Analysis of debugger's fault localization process in software maintenance

    Kudo Hideo, Uchida Shinji, Monden Akito, Matsumoto Ken-ichi

    Research reports of Nara Technical College   ( 35 )   75 - 80   1999

     More details

    Language:Japanese   Publisher:Nara National College of Technology  

    CiNii Article

    CiNii Books

    researchmap

  • An analysis of the debugging process based on changes in impressions of functions

    UCHIDA Shinji, KUDO Hideo, MONDEN Akito

    Technical report of IEICE. KBSE   98 ( 388 )   9 - 15   1998.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The purpose of our study is to clarify experts' debugging strategies through controlled experiment. In the experiment, we have used a periodic interview method to analyze the module that subjects think there is a bug in it during debugging. We have also analyzed the differences among subjects in time spent for reading each module. The result of experiment showed the differences between novices and experts in both the module that subjects think there is a bug in it, and the time spent for reading each module.

    CiNii Article

    CiNii Books

    researchmap

  • An analysis of the debugging process based on changes in impressions of functions

    UCHIDA Shinji, KUDO Hideo, MONDEN Akito

    IPSJ SIG Notes   1998 ( 100 )   107 - 114   1998.11

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    The purpose of our study is to clarify experts'debugging strategies through controlled experiment. In the experiment, we have used a periodic interview method to analyze the module that subjects think there is a bug in it during debugging. We have also analyzed the differences among subjects in time spent for reading each module. The result of experiment showed the differences between novices and experts in both the module that subjects think is a bug in it, and the time spent for reading each module.

    CiNii Article

    CiNii Books

    researchmap

  • A Study on the debugging thought process based on changes in impressions of functions

    56   203 - 204   1998.3

     More details

  • A Video Recordings Retrieval System Supporting Analysis of Software Development Processes

    NAKASHIMADA Yoshitaka, MORISAKI Shuuji, MONDEN Akito, MATSUMOTO Ken-ichi, TORII Koji

    Technical report of IEICE. SS   96 ( 601 )   1 - 8   1997.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In analyzing software development process, it is not easy to find or extract the subject's specific behavior. This paper proposes a retrieving system using behavior data (key stroke, gaze point on CRT, etc.) for video recordings of software development activities. This system shows graphs of process data, so that identifying characteristic behaviors and specify the time they occured are easy. In order to evaluate this system, we conducted an experiment to retrive subject's specific behavior such as "lost himself" from the behavior data. There were 8 scenes identified by having an interview with the subject. It resulted in 6 out of 8 scenes being automatically retrieved.

    CiNii Article

    CiNii Books

    researchmap

  • ループを含むプログラムを難読化する方法の提案

    門田暁人

    電子情報通信学会論文誌D-I   80 ( 7 )   644 - 652   1997

  • コピー防止を目的とするプログラムの虫食い実装方式

    門田暁人

    情報処理学会, 夏のプログラミングシンポジウム報告集, July 1997   47 - 54   1997

  • Analysis of Debugging Process by Using an Eye Tracking System

    Monden Akito, Takada Yoshihiro, Torii Koji

    Proceedings of the Society Conference of IEICE   1996   517 - 518   1996.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • An Experiment to Observe Debugging Process by Using an Eye Tracking Device

    MONDEN Akito, TAKADA Yoshihiro, TORII Koji

    Technical report of IEICE. SS   96 ( 172 )   1 - 8   1996.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    To clarify factors that affect efficiency of debugging, we need to investigate programers' intentions which continuously vary during. For the purpose, we have developed a system for observing programmers behavior by using an eye tracking device and audio and visual devices. By using the system, we have performed an experiment of observing bug identification processes. This paper presents results of the experiment,including the fact that collecting and analyzing multimodal data, such as motion of gazing point and record of verbal protocol, is effective in investigating programmers' intentions. It also includes several differences among observed processes which are likely to relate to the efficiency of bug identification.

    CiNii Article

    CiNii Books

    researchmap

  • An Experiment to Evaluate Methods for Program Scrambling

    MONDEN Akito, TAKADA Yoshihiro, TORII Koji

    IPSJ SIG Notes   1996 ( 32 )   33 - 40   1996.3

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    It is important to write programs that are easy to analyze or understand so that the load on software maintenance and reuse can be lessened. 0n the other hand, when finished programs are released to many users there are cases where programs should not be analyzed easily, in order to protect the intellectual properties or to insure system security. In such cases, we believe that it is effective to write programs that are easy to analyze at first, and transform it so that it becomes difficult to analyze. Such an equivalent transformation is called "program scrambling." We present two methods for automatically scrambling programs that contain loops, and report on an experiment for validation of the methods. The result of the experiment shows that the methods are effective even for very small Programs.

    CiNii Article

    CiNii Books

    researchmap

  • Development of Software Synthesizer "FPD"

    MONDEN Akito, KURODA Hisayasu, FUJII Hideki

    IPSJ SIG Notes   1995 ( 19 )   27 - 32   1995.2

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Recently, most of personal computers have a PCM sound set in it, but there are no tools which support overall functions of synthesizer. We have developed software synthesizer "FPD", which provides most of synthesizer functions, as a multi timbre module, as a sampling machine, as a sequencer, as effects, etc. This paper shows the design and estimation of "FPD".

    CiNii Article

    CiNii Books

    researchmap

  • プログラムの難読化法の提案

    門田暁人

    情処全大   4   4.263 - 4.264   1995

  • A Tool Detecting Patterns of Programmers' Behavior When They Likely Inject Bugs

    Yanagi Masazumi, Monden Akito, Takada Yoshihiro, Torii Koji

    Technical report of IEICE. SS   94   9 - 16   1994

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We are studying on a system that automatically monitors and analyzes key strokes of programmers and then warns them of injecting bugs.So far,there have been almost no research reports on features of programmers' behavior when they inject bugs.To collect data of key strokes and analyze programmers' behaviour,we have designed and partially implemented an analysis system.Through experiments of applying the system,we have found that the system effectively works and that it is possible to realize the warning system.

    CiNii Article

    CiNii Books

    researchmap

▼display all

Presentations

  • Extended association rule mining with correlation functions

    3rd IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD2018)  2018 

     More details

  • 計算機上のソフトウェア開発作業の自動推定の検討

    ウィンターワークショップ2018・イン・宮島  2018 

     More details

  • N-gram IDFによるバグレポートの分類の試行

    ウィンターワークショップ2018・イン・宮島  2018 

     More details

  • 尖度と歪度を考慮した予測モデルの検討

    ウィンターワークショップ2018・イン・宮島  2018 

     More details

  • 分岐命令のカムフラージュに基づくプログラムの制御フローの隠ぺい

    情報処理学会九州支部 火の国情報シンポジウム2018  2018 

     More details

  • 難読化されたプログラムの自動解析への耐性に関する考察

    情報処理学会第80回全国大会  2018 

     More details

  • MAHAKIL: Diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction

    40th International Conference on Software Engineering  2018 

     More details

  • GitHub上のプログラマ名鑑ボットの作成

    ソフトウェアシンポジウム2018, WG11: ソーシャルコーディングとソフトウェア進化  2018 

     More details

  • Predictability classification for software effort estimation

    3rd IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD2018)  2018 

     More details

  • ソフトウェアバグの行レベル予測の試み

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • ソフトウェア開発の提案依頼書における無理難題の分析

    ソフトウェアサイエンス研究会  2017 

     More details

  • ソフトウェアエンジニアに求められる技術の求人票に基づく分析

    ソフトウェアサイエンス研究会  2017 

     More details

  • Should duration and team size be used for effort estimation?

    IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2017)  2017 

     More details

  • プロジェクト間バグ予測方法の実験的評価

    ソフトウェアサイエンス研究会  2017 

     More details

  • 機密を保持したままソフトウェア開発データの分析を行う方法についての一考察

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • Impact of the distribution parameter of data sampling approaches on software defect prediction models

    24th Asia-Pacific Software Engineering Conference (APSEC2017)  2017 

     More details

  • Calibration of distributed multimodal sensor networks using cross-correlation of arrival processes

    35th Annual Conference of the Robotics Society of Japan (RSJ 2017), International Session  2017 

     More details

  • ソフトウェア開発に関するスモールデータの分析技術

    日本ファンクションポイントユーザ会2017年度第3回会合  2017 

     More details

  • Evaluating Algorithmic Thinking Ability of Primary Schoolchildren Who Learn Computer Programming

    47th IEEE Frontiers in Education Conference (FIE2017)  2017 

     More details

  • The significant effects of data sampling approaches on software defect prioritization and classification

    ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM2017)  2017 

     More details

  • GitHub上のプログラマ名鑑の作成に向けて

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • ランキング上位者のプログラミング作法の評価

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • ソフトウェア開発工数の二段階予測方法の実験的評価

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • Filter-INC: Handling Effort-Inconsistency in Software Effort Estimation Datasets

    23rd Asia-Pacific Software Engineering Conference (APSEC2016)  2016 

     More details

  • Influence of outliers on analogy based software development effort estimation

    15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016)  2016 

     More details

  • Analysis of information system operation cost based on working time and unit cost

    15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016)  2016 

     More details

  • Identifying Recurring Association Rules in Software Defect Prediction

    15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016)  2016 

     More details

  • Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction Models

    IEEE International Conference on Software Quality, Reliability & Security (QRS2016)  2016 

     More details

  • Investigating the effects of balanced training and testing datasets on effort-aware fault prediction models

    IEEE Computer Software and Applications Conference (COMPSAC 2016)  2016 

     More details

  • A Fuzzy Hashing Technique for Large Scale Software Birthmarks

    15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016)  2016 

     More details

  • ソフトウェアリポジトリマイニングのすすめ

    日本ソフトウェア科学会第33回大会  2016 

     More details

  • Textual vs. Visual Programming Languages in Programming Education for Primary Schoolchildren

    46th IEEE Fronties in Education Conference (FIE2016)  2016 

     More details

  • バイナリプログラム圧縮によるソフトウェア流用検出

    ソフトウェアサイエンス研究会  2016 

     More details

  • バイナリコード中の文字列に着目したソフトウェアの流用検出

    ソフトウェアサイエンス研究会  2016 

     More details

  • 原型分析を用いたソフトウェアバグ分析

    ソフトウェアサイエンス研究会  2016 

     More details

  • 非公開データからの類似データ生成

    ソフトウェア工学研究会  2015 

     More details

  • 保護コードの自然さに着目した命令カムフラージュ

    情報処理学会第77回全国大会  2015 

     More details

  • コード断片の不自然さの比較による保護機構の発見困難さの評価

    情報処理学会第77回全国大会  2015 

     More details

  • ソフトウェア開発工数見積もりにおける外れ値の実験的評価

    ソフトウェアシンポジウム2015  2015 

     More details

  • 公開不可データの変換技術

    ソフトウェアエンジニアリングシンポジウム2015ワークショップ  2015 

     More details

  • Toward Plagiarism Detection in Binary Programs Using Program Compression

    MSR Asia Summit 2015  2015 

     More details

  • 大量のプログラムを対象としたファジーハッシュを用いたバースマーク手法

    2015年暗号と情報セキュリティシンポジウム(SCIS2015)  2015 

     More details

  • テスト戦略の最適化に向けて

    ウィンターワークショップ2015・イン・宜野湾  2015 

     More details

  • COCOMO IIをベースとした工数見積りモデルの研究 - Javaを開発言語とするプロジェクトへの適用 -

    プロジェクトマネジメント学会春季大会  2015 

     More details

  • 再現性のあるアソシエーションルールの選定 ~ソフトウェアバグ予測を題材として~

    ソフトウェア工学研究会  2015 

     More details

  • ソフトウェア開発プロジェクトデータセットからの典型的なプロジェクトの抽出

    ソフトウェア工学研究会  2015 

     More details

  • コードクローンと使用ライブラリに着目したオープンソースソフトウェアの進化の定量化

    ソフトウェア工学研究会  2015 

     More details

  • 人口ピラミッドによるOSSプロジェクト貢献者の流動性分析

    第21回ソフトウェア工学の基礎ワークショップ  2014 

     More details

  • N-gram モデルを用いたソフトウェア保護機構の不自然さ評価

    2014年暗号と情報セキュリティシンポジウム  2014 

     More details

  • 作業時間に基づくソフトウェア保守ベンチマーキングの試み

    ソフトウェア工学研究会  2014 

     More details

  • 故障モジュール中の欠陥メソッド特定

    ソフトウェアエンジニアリングシンポジウム2014  2014 

     More details

  • ソフトウェアメトリクス活用テクニック ~「予測」のためのデータクリーニング,モデル化,ルール発見手法~

    ソフトウェア品質シンポジウム・チュートリアル講演  2014 

     More details

  • ソフトウェアリポジトリマイニングの技術動向と開発現場への活用

    プロジェクトマネジメント学会関西支部平成26年度春季シンポジウム  2014 

     More details

  • ソフトウェア開発データの無矛盾性の評価

    第21回ソフトウェア工学の基礎ワークショップ  2014 

     More details

  • 自動計測データに基づくソフトウェア開発の作業目的の予測

    第21回ソフトウェア工学の基礎ワークショップ  2014 

     More details

  • Java バイトコード命令のオペコード、オペランドを用いた難読化手法のステルシネス評価

    2014年暗号と情報セキュリティシンポジウム  2014 

     More details

  • ソフトウェア開発データあれこれ

    ウィンターワークショップ2014・イン・大洗  2014 

     More details

  • コードレビューにおいて発見されるバグの特徴分析

    ウィンターワークショップ2014・イン・大洗  2014 

     More details

  • 作業履歴中の主要な作業に着目した作業目的予測

    ソフトウェア工学研究会  2014 

     More details

  • モジュール理解のためのバグレポート推薦

    第21回ソフトウェア工学の基礎ワークショップ  2014 

     More details

  • ソフトウェア開発行動記録システムTaskPitの開発現場への適用

    ソフトウェアエンジニアリングシンポジウム2013 併設ワークショップ 「開発マネジメントにおける産学の問題共有と連携強化」  2013 

     More details

  • リポジトリマイニングの研究成果の産業化への応用

    ウィンターワークショップ2013・イン・那須  2013 

     More details

  • ソフトウェアリポジトリマイニングの技術動向とその応用, ITフォーラムセッション

    ソフトウェアジャパン2013  2013 

     More details

  • 組込みRTOSにおけるタスク起動機構冗長化とタスク起動順位保持

    システムソフトウェアとオペレーティング・システム研究会  2013 

     More details

  • OSS開発におけるコミッターの協調作業についての一考察

    第88回GN・第5回SPT合同研究発表会  2013 

     More details

  • 学習データの時間的変化に伴う欠陥モジュール予測モデルの評価

    ソフトウェアエンジニアリングシンポジウム2013 ポスターセッション  2013 

     More details

  • OSS開発における協調作業と不具合再修正の分析

    ソフトウェアエンジニアリングシンポジウム2013 ポスターセッション  2013 

     More details

  • ソフトウェア開発企業における開発タスクの自動計測

    第20回ソフトウェア工学の基礎ワークショップ  2013 

     More details

  • 脳血流計測に基づくプログラム理解行動の定量化

    第20回ソフトウェア工学の基礎ワークショップ  2013 

     More details

  • オープンソースソフトウェアにおける学術論文の引用状況の分析

    第20回ソフトウェア工学の基礎ワークショップ  2013 

     More details

  • 学習データ計測時点による欠陥モジュール予測精度の比較

    第20回ソフトウェア工学の基礎ワークショップ  2013 

     More details

  • OSS開発における一般開発者の協調作業と不具合の再修正に関する一考察

    ルチメディア,分散,協調とモバイル (DICOMO2013) シンポジウム  2013 

     More details

  • 開発要員数とその誤差を考慮した工数見積もり方法

    ソフトウェア工学研究会  2013 

     More details

  • コードの「めずらしさ」に基づく保護機構のステルシネス考察

    第11回情報科学技術フォーラム(FIT2012)  2012 

     More details

  • あとどのくらいレビューすればよいのか?

    ウインターワークショップ2012・イン・琵琶湖  2012 

     More details

  • Java言語を対象とした実行時多様化の試み

    2012年暗号と情報セキュリティシンポジウム  2012 

     More details

  • 即効!開発リーダーとメンバーに役に立つソフトウェアメトリクス ~今あるデータを有効に活用するリポジトリマイニングのノウハウ~, テクニカルセッション

    Embedded Technology West 2012  2012 

     More details

  • 多変量予測モデルにおける目的変数の選択について

    ソフトウェアエンジニアリングシンポジウム2011 併設ワークショップ 「ソフトウェア開発マネジメントの実践と課題」  2012 

     More details

  • 実行時間に依存したプログラムの暗号化

    第11回情報科学技術フォーラム(FIT2012)  2012 

     More details

  • プログラミング学習におけるモチベーション因子と教材の関連

    日本産業技術教育学会近畿支部第29回研究発表会  2012 

     More details

  • 脳血流量に基づくプログラム理解行動の計測

    ソフトウェアプロジェクト研究会  2012 

     More details

  • 命令の乱雑さに基づくプログラム理解性の評価

    第19回ソフトウェア工学の基礎ワークショップ  2012 

     More details

  • バグモジュール予測を用いたテスト工数割り当て戦略

    第19回ソフトウェア工学の基礎ワークショップ  2012 

     More details

  • Javaソフトウエア開発における使用ライブラリの分析

    ソフトウェア信頼性研究会第8回ワークショップ  2012 

     More details

  • A Heuristic Rule Reduction Approach to Software Fault-proneness Prediction

    19th Asia-Pacific Software Engineering Conference (APSEC2012)  2012 

     More details

▼display all

Awards

  • 2019年度 基礎研究賞

    2020.9   日本ソフトウェア科学会  

     More details

  • 岡山大学工学部研究功績賞

    2020.3  

     More details

  • 2019年度 情報処理学会ソフトウェア工学研究会 卓越研究賞

    2019.8  

     More details

  • 平成30年度 情報処理学会ソフトウェア工学研究会 卓越研究賞

    2018.9  

     More details

    Country:Japan

    researchmap

  • 岡山大学工学部研究功績賞

    2018  

     More details

    Country:Japan

    researchmap

  • 2017年SEC journal SEC所長賞

    2017  

     More details

    Country:Japan

    researchmap

  • Best Paper Award

    2017  

     More details

    Country:Japan

    researchmap

  • 2015年SEC journal SEC所長賞

    2015  

     More details

    Country:Japan

    researchmap

  • 優秀論文賞

    2013  

     More details

    Country:Japan

    researchmap

  • Best Paper Award

    2012  

     More details

    Country:Japan

    researchmap

  • Best Short Paper Award

    2012  

     More details

▼display all

Research Projects

  • Fundamental and Innovative Technologies for Next-Generation Software Ecosystems

    Grant number:20H05706  2020.08 - 2025.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (S)

    松本 健一, 石尾 隆, 畑 秀明, KULA RAULA・GAIKOVINA, 門田 暁人, 中村 匡秀

      More details

    Grant amount:\189020000 ( Direct expense: \145400000 、 Indirect expense:\43620000 )

    (1)プロダクトのアップサイクリング:マイクロサービス化によるプログラムコードの資産化
    アップサイクリングの候補を増やす手法として、GitHubにおける後継・関連プロジェクトの探索技術を開発した。また、人工知能やプログラム難読化など、自動生成技術によって作り出されたプログラム(ソースコード)の価値を評価するために、ソースコードの独自性、信頼性、実行速度などの品質特性を計測する技術を開発した。
    (2)人とAIの適材適所配置:人とAIの適格性評価,ベンチマーキング
    チームによるソフトウェア開発運用を想定し、信頼できる開発運用者に求められる行動特性(コンピテンシー)を同定すると共に、GitHub上の活動から計測可能なメトリクスとして定義した。また、ソフトウェアライブラリ間の依存関係と開発運用者の貢献度の関係、および、プロジェクトへの新規参入者による初期貢献の定量的評価を通じて、開発運用者の適格性を「貢献」という観点で定量化すると共に、プロジェクトの健全性や持続可能性との関係を明らかにした。
    (3)外部技術情報ともリンクする品質管理:ブロックチェーン技術を用いた情報集約
    GitHub Discussions、GitHub Sponsors profile、GitHub Advisory Databaseなどを対象として、詳細な技術情報の分析や情報取得の自動化の技術を開発した。また、外部技術情報ともリンクした品質管理の主要な機能の一つとして、ソフトウェア更新支援技術の検討,開発を進めた.

    researchmap

  • ソフトウェアバグ予測を題材とする機械学習システムの評価技術の開発

    Grant number:20K11749  2020.04 - 2024.03

    日本学術振興会  科学研究費助成事業  基盤研究(C)

    門田 暁人

      More details

    Grant amount:\4290000 ( Direct expense: \3300000 、 Indirect expense:\990000 )

    学習データに含まれる矛盾の尺度Similar Case Inconsistency Level (SCIL)の定義を与えた.SCILは,データセット中に1つの目的変数が予め指定されることが前提となっており,「与えられた目的変数についての分析や予測を行う」という目的に対し,データセットの品質を評価するための尺度である.SCILの定義にあたって,まず,2つの個体の説明変数の類似度の尺度であるnormalized rank of relative similarity (NRRS)を定義した.NRRSの定義に基づいて,矛盾する個体のペアの定義を与え,全ての個体のペアの数に対する矛盾するペアの割合としてSCILを定義した.
    6つのソフトウェア開発プロジェクトから得られた54件のデータセットを用いて,2種類の目的変数に対するSCILの評価実験を行った.評価実験では,目的変数を予測するモデルとして,線形回帰,決定木,ランダムフォレストを採用し,モデル構築の前処理として対数変換を行った.
    実験の結果,SCILを算出する際に用いる距離尺度としてユークリッド距離を採用した場合に,SCILの値と予測モデルの精度が強い相関を示した.このことから,データセットを用いて予測モデルを構築する前に,SCILによりデータセットの品質を評価することの有効性が示されたと考えている..
    また,機械学習システムの評価に用いる試験用データセットを人工的に生成する方法についても検討を進めた.変数間の相関,回帰式の再現に加えて,データの歪度を再現することで,より実際のデータに近い人工データを生成できることを確認した.

    researchmap

  • Development of Basic Technologies for Accelerating Spontaneous Software Evolution

    Grant number:17H00731  2017.04 - 2020.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

    Matsumoto Kenichi

      More details

    Grant amount:\44850000 ( Direct expense: \34500000 、 Indirect expense:\10350000 )

    We developed the basic technology to realize a platform that accelerates a unique software development paradigm, so-called "Spontaneous Software Evolution," widely, stably, and sustainably way. Specifically, we designed and prototyped a control mechanism (governance framework) that takes smart cities as the model, a set of support bots to improve the efficiency of evolution proposals under the mechanism, and a community currency to motivate individual developers and activate the development community.

    researchmap

  • Generation of mimic data sets from confidential software project data sets

    Grant number:17K00102  2017.04 - 2020.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Monden Akito

      More details

    Grant amount:\4420000 ( Direct expense: \3400000 、 Indirect expense:\1020000 )

    This study proposes a method for artificially generating a mimic software project data set, whose characteristics (related to data distribution and data dependencies) are very similar to a given confidential data set. In this method, companies need to provide only several statistical values of their confidential data. Our experimental evaluation confirmed that the generated mimic data sets can be applied to various data prediction/analysis methods, and, in case that the original data contain enough data points, we could expect obtaining similar prediction/analysis results as the original data set.

    researchmap

  • Development of test simulation framework based on bug prediction

    Grant number:26330086  2014.04 - 2017.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Monden Akito, KAMEI YASUTAKA

      More details

    Grant amount:\4680000 ( Direct expense: \3600000 、 Indirect expense:\1080000 )

    To enable evaluation of effectiveness of test strategies based on software bug prediction, we formalized the problem of test strategies as a nonlinear optimization problem; and then, we showed that the problem can be solved as a separable convex problem. Next, as the bug prediction inherently contain errors, we proposed and evaluated a method that combines test strategies not using bug prediction. Then, to clarify the context where bug prediction become effective, we proposed a method to estimate the maximum amount of reducible test effort by bug prediction. From these achievements, practitioners are able to estimate the expected reducible test effort, which will promote employing bug prediction in industry.

    researchmap

  • A massively distributed technical framework that support crowd-sourcing and collective intelligence formation in software development

    Grant number:23300009  2011.04 - 2014.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    MATSUMOTO Kenichi, NAKAMURA Masahide, MIZUNO Osamu, MORISAKI Shuji, OHIRA Masao, MONDEN Akito

      More details

    Grant amount:\19370000 ( Direct expense: \14900000 、 Indirect expense:\4470000 )

    In this research, we proposed a massively distributed technical framework that support crowd-sourcing and collective intelligence formation in software development. In the crowd-sourcing, software development tasks are outsourced to many unspecified individuals by the Internet technology. The proposed platform consists of two platforms for supporting a multilingual communication and intelligence formation, and for supporting lightweight & massive PDCA cycle execution. Experimental results showed that these sub-platforms have validity and usefulness in terms of supporting the crowd-sourcing and collective intelligence formation in software development. The proposed framework will realize a new massively distributed software development carried by many individuals connected through the Internet technology, and bring risk reduction and quality improvement in software development, by deconstructing the existing multi-layered subcontract system in software development.

    researchmap

  • Development and Evaluation of a Development Task Measurement System

    Grant number:22500028  2010 - 2012

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    MONDEN Akito

      More details

    Grant amount:\3900000 ( Direct expense: \3000000 、 Indirect expense:\900000 )

    This research designs and develops a software development task measurement and analysis system that can measure
    (a) time spent for each task
    (b) amount of operations for each task
    and (c) amount of work products. The system automatically measures both individual and team developers and visualizes the measurement result.
    As a result of experimental evaluation at a software company, a developer became aware of work quantitatively as he continues using the proposed system.

    researchmap

  • A Framework for Software Obfuscation

    Grant number:19500056  2007 - 2009

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    MONDEN Akito, NAKAMURA Masahide, TAMADA Haruaki

      More details

    Grant amount:\4160000 ( Direct expense: \3200000 、 Indirect expense:\960000 )

    To hide secrets in a computer program, this research proposes a framework to apply existing obfuscation methods to a given program. The result of an experimental evaluation showed that secret information and its clues were all hidden by the proposed framework while conventional obfuscation tools could not thoroughly hide the secrets.

    researchmap

  • A Software Component Recommendation System Based on Development Context

    Grant number:17300007  2005 - 2007

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    MATSUMOTO Kenichi, MONDEN Akito, NAKAMURA Masahide, OHIRA Masao

      More details

    Grant amount:\15750000 ( Direct expense: \14700000 、 Indirect expense:\1050000 )

    In modern software development, many of software products are built by combining existing software components and coding only minimal required features. However, selecting necessary components from a number of components is not easy. For instance, Java 2 SDK Standard Edition (J2SE) Version 1.41_02 is widely used by software developers and provides them with 5568 software components (basis classes). From our pilot experiments, we have found that only 4% of the software components of Java 2 SDK were used in typical software development. This result indicates additional coding is still much required, while a variety of software components are currently available to reuse.
    The goal of our study is to realize an efficient environment for components-based software development. Toward achieving the goal, in this research project, we constructed a system that recommends required software components to developers according to the context of software development. Especially we focused on developing the following elemental technologies:
    (A). Birthmark: a technology to analyze the development context which means the progress and/or completeness of development, features and/or structures of software itself, and so forth, by extracting the amount of characteristics from target software under development,
    (B). Collaborative Filtering: a technology to identity and recommend software components which have context similar to target software, and
    (C). Association Visualization: a visualization technology to provide developers with reasons why the system recommends software components to developers.
    We integrated the three technologies into a system and evaluated it.

    researchmap

  • 動的命令を用いたソフトウェアプロテクション

    Grant number:16700033  2004 - 2006

    日本学術振興会  科学研究費助成事業  若手研究(B)

    門田 暁人

      More details

    Grant amount:\3700000 ( Direct expense: \3700000 )

    前年度に行ったシステム設計の見直しに基づいて,動的命令を含むプログラムPを作成するシステムを試作・評価を行い,さらなる安全性の向上について検討した.
    試作システムを用いてPを作成し,Pに含まれるオペコードの値の分布に基づいてPの安全性を評価した結果,システム設計の見直しによって標準偏差が38.83から13.47に改善し,ガウス分布を仮定した場合の(理想的な)標準偏差である12.7に非常に近い値を取ることが確認できた.このことから,攻撃の手がかりが大きく減じたといえる.
    ただし,次の2点が依然として課題として残っている.(1)Pの各行に存在する動的命令(オペコード)は,実行時にそれぞれ一意に解釈されるため,Pを暗号文とみなして暗号解読を行うことが可能であり,元のプログラムPOが推測される可能性がある.(2)Pは,一般に,ライブラリ関数と呼ばれる外部のプログラムを呼び出す場合があり,この呼び出しの存在が攻撃者に手がかりを与える.
    そこで,(1)(2)をそれぞれ解決するための要素技術について検討した.まず,(1)を解決するために,命令列の畳込みという新しい概念を導入し,類似する命令列を一つの命令列にまとめ,それら命令列間の差分を,自己書き換えにより必要な命令(オペコード,及び,オペランド)に置き換える方法を提案した.これにより,Pの各命令は必ずしも一意な解釈を持たなくなり,単純な暗号解読に対する耐性を高めることができた.
    また,(2)を解決するために,Pに含まれるライブラリ関数の名前を暗号化し,それらをPの実行時に復号し,リフレクションや動的リンクの機構を用いて関数を呼び出す方法を提案した.これにより,Pに含まれるライブラリ関数の名前を隠すことが可能となった.

    researchmap

  • Javaプログラムの逆コンパイル防止方法

    Grant number:15700032  2003

    日本学術振興会  科学研究費助成事業  若手研究(B)

    門田 暁人

      More details

    Grant amount:\1200000 ( Direct expense: \1200000 )

    researchmap

  • Javaプログラムを対象とした難読化法

    Grant number:13780237  2001 - 2002

    日本学術振興会  科学研究費助成事業  若手研究(B)

    門田 暁人

      More details

    Grant amount:\2500000 ( Direct expense: \2500000 )

    Java, C言語等で記述されたプログラム中のデータ,及び,演算式の隠蔽を目的とした難読化法を提案した.機密保護,認証等のセキュリティに関わるプログラムにおいては,不正な解析によってプログラム中の秘匿データ(パスワードや暗号鍵,復号鍵等)が漏洩することが大きな問題となっており,データおよび演算の隠蔽の意義や需要は極めて大きい.
    提案する難読化法は,秘匿データを符号化し,さらに,データを符号化したままで演算する枠組みを提供する.提案方法は,次の三つのプロセスより構成される.(1)プログラム中のデータを符号化する,(2)符号化されたデータに対する四則演算の変換を行う,(3)必要に応じて演算結果の復号を行う.本方法により,「実行時にメモリスタック上に現れるデータを監視する」という従来防ぐことが困難であったプログラム解析に対しても秘匿データを隠蔽できる.これまで,このような攻撃からデータを隠蔽する手法は提案されておらず,本研究が初めてである.
    提案方法をいくつかの小規模なプログラムに適用して評価した結果,難読化されたプログラムは,秘匿データを知ることが人間にとって著しく困難となっていることが確認された.また,多くのソフトウェアメトリクス(トークン数,演算数,参照数,代入数)が増加していることが定量的に確認された.また,難読化後のプログラムの実行効率,及び,規模の増大は,プログラムの読みにくさの増大とトレードオフの関係にあることが確認された.

    researchmap

  • 拡張視線インタフェースの研究

    Grant number:12878064  2000 - 2001

    日本学術振興会  科学研究費助成事業  萌芽的研究

    松本 健一, 門田 暁人, 島 和之

      More details

    Grant amount:\2100000 ( Direct expense: \2100000 )

    拡張視線インタフェースの適用対象(Windows98上のアプリケーションソフト)のユーザインタフェース上で行われる操作を整理し,各操作をより基本的な操作(プリミティブ操作)に分解した.更に,プリミティブ操作のうち視線で操作するものとそれ以外のものを区別した.具体的には,アプリケーションソフトのボタンを選択する操作において,「マウスカーソルの移動(移動操作)は視線で,操作対象であることの確認(確定操作)はマウスのクリックで,それぞれを行う」とした.
    拡張視線インタフェースの具体例の一つとして,「生物・化学実験向け資料閲覧インタフェース」の設計と実装を行った.生物・化学実験では,実験手順書に従って煩雑な作業を正確に実施する必要がある.文章だけでは説明の難しい作業については,作業の様子を撮影したビデオ(解説ビデオ)が作成される場合もある.しかし,実験中,実験者の両手は塞がっている.
    設計,実装したインタフェースでは,手順書とビデオ映像は閲覧用ディスプレイに表示される.手順書のページめくり等は,対応するアイコンに視線を向け,フットペダルを踏むことで行う.また,ビデオ映像は視線を向けると再生され,視線をそらすと一時停止する.
    「アジの解剖実験」を対象として,実装したインタフェースの評価実験を行った.1時間ほどの解剖実験において,実装したインタフェースを使用しなかった5名の被験者(実験者)では,操作ミスが平均6.6回,操作順序ミスが平均1.8回発生した.一方,実装したインタフェースを使用した使った5名の被験者(実験者)では,操作ミスも操作順序ミスも発生しなかった.また,実験後に行った被験者に対するアンケートの結果からは,ディスプレイ表示される手順書にビデオ映像による説明が加わると,解剖実験で行う操作やその順序が非常に理解しやすくなることも確認できた.

    researchmap

  • ソフトウェア電子透かし法の提案と評価

    Grant number:11780308  1999 - 2000

    日本学術振興会  科学研究費助成事業  奨励研究(A)

    門田 暁人

      More details

    Grant amount:\2200000 ( Direct expense: \2200000 )

    本研究では,盗用の疑いのあるソフトウェア(コンピュータプログラム)の発見を容易にすることを目的として,プログラム開発者の署名等を電子透かしとしてJavaクラスファイルに挿入する方法,および,取り出す方法を提案,実装し,提案方式の評価実験を行った.提案方法は,透かしを挿入してもプログラムの実行効率が変わらず,ツールによる透かしの取り出しの自動化が容易であり,ツールを公開した場合にも透かしの上書き攻撃を回避できるという特徴を持つ.透かしの耐性を実験により評価した結果,obfuscatorと呼ばれるプログラムの難読化ツールによる攻撃後も電子透かしは消えないこと,および,逆コンパイル,再コンパイルによる攻撃に対しても半数以上の透かしは消えないことが確認された.
    従来研究では,プログラムに対する電子透かしの原理については論じられているが,それを実際に応用することの必要性や実用性については,必ずしも具体的に整理されてない.これに対し,本論文では,「盗用されたJavaクラスファイルの発見」という実用的な目的を設定し,それに対する解として妥当な性質を持った電子透かし法の提案,実装を行った.提案手法を用いることで,例えば,インターネット上のJavaアプレット等に対して透かしの有無を検知・検査するサーチロボットを稼動させて,プログラムの盗用を監視することが現実的に可能となる.
    さらに従来研究では,提案された方式の実装,評価は必ずしも行われていないのに対し,本研究では,本提案手法に基づいて実装した電子透かしツールをWebページ上で公開し,実際に利用・評価を行えるように無償提供している.本研究では,限定的ではあるが,提案方法による電子透かしの耐性についても実装したツールを用いて評価を行っている.

    researchmap

▼display all

 

Class subject in charge

  • Object-Oriented Programming Languages (2023academic year) Summer concentration  - その他

  • Object-Oriented Programming Languages (2023academic year) Summer concentration  - その他

  • Automata and Languages (2023academic year) Second semester  - 火3~4,金1~2

  • Automata and Languages (2023academic year) Second semester  - 火3~4,金1~2

  • Software Analytics (2023academic year) Prophase  - その他

  • Software Analytics (2023academic year) Prophase  - その他

  • Software Engineering (2023academic year) Fourth semester  - 月3~4

  • Software Engineering (2023academic year) Fourth semester  - 月1~2

  • Software Design (2023academic year) Third semester  - 月5~6,水3~4

  • Software Design (2023academic year) Third semester  - 月5~6,水3~4

  • Database Systems (2023academic year) Second semester  - 月7~8,木1~2

  • Database Systems (2023academic year) Second semester  - 月7~8,木1~2

  • Programming Language Theory (2023academic year) Fourth semester  - 月1~2

  • Quantitative Management of Software Projects (2023academic year) Prophase  - 火1~2,金5~6

  • Quantitative Management of Software Projects (2023academic year) Prophase  - 火1~2,金5~6

  • Practical Programming (2023academic year) Second semester  - 火7~8,その他

  • Practical Programming (2023academic year) Second semester  - 火7~8,その他

  • Introduction to Information Technology (2023academic year) 1st semester  - その他

  • Engineering English (2023academic year) Late  - その他

  • Engineering English (2023academic year) Late  - その他

  • Advanced Study (2023academic year) Other  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2023academic year) Year-round  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2023academic year) Other  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2023academic year) Year-round  - その他

  • Technical Writing 1 (2023academic year) Prophase  - その他

  • Technical Writing 2 (2023academic year) Late  - その他

  • Technical Writing (2023academic year) Prophase  - その他

  • Technical Presentation (2023academic year) Late  - その他

  • Computer Mathematics I (2023academic year) Second semester  - 火3~4,金1~2

  • Specific Research of Electronics and Information Systems Engineering (2023academic year) Year-round  - その他

  • Automata and Languages (2022academic year) Second semester  - 火3~4,金1~2

  • Fundamental Computer Science 2 (2022academic year) Second semester  - その他

  • Software Analytics (2022academic year) Prophase  - その他

  • Software Engineering (2022academic year) Fourth semester  - 月3~4

  • Software Design (2022academic year) Third semester  - 月1~2,金5~6

  • Database Systems (2022academic year) Second semester  - 月1~2,木1~2

  • Programming Language Theory (2022academic year) Fourth semester  - 月3~4

  • Quantitative Management of Software Projects (2022academic year) Prophase  - 火1~2,金5~6

  • Introduction to Information Technology (2022academic year) 1st semester  - その他

  • Engineering English (2022academic year) Late  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2022academic year) Year-round  - その他

  • Technical Writing (2022academic year) Prophase  - その他

  • Technical Presentation (2022academic year) Late  - その他

  • Computer Mathematics I (2022academic year) Second semester  - 火3~4,金1~2

  • Specific Research of Electronics and Information Systems Engineering (2022academic year) Year-round  - その他

  • Automata and Languages (2021academic year) Second semester  - 火3,火4,金1,金2

  • Fundamental Computer Science 2 (2021academic year) Second semester  - その他

  • Software Analytics (2021academic year) Prophase  - その他

  • Software Engineering (2021academic year) Fourth semester  - 月3,月4

  • Software Design (2021academic year) Third semester  - 月1,月2,金5,金6

  • Database Systems (2021academic year) Second semester  - 月1,月2,木1,木2

  • Database Theory (2021academic year) Second semester  - 月1,月2,木1,木2

  • Quantitative Management of Software Projects (2021academic year) Prophase  - 火1~2,金5~6

  • Introduction to Information Technology (2021academic year) special  - その他

  • Introduction to Information Technology (2021academic year) special  - その他

  • Engineering English (2021academic year) Late  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2021academic year) Year-round  - その他

  • Technical Writing (2021academic year) Prophase  - その他

  • Technical Presentation (2021academic year) Late  - その他

  • Computer Mathematics I (2021academic year) Second semester  - 火3,火4,金1,金2

  • Specific Research of Electronics and Information Systems Engineering (2021academic year) Year-round  - その他

  • Automata and Languages (2020academic year) Second semester  - 火3,火4,金1,金2

  • Fundamental Computer Science 1 (2020academic year) 1st semester  - 金3,金4

  • Fundamental Computer Science 2 (2020academic year) Second semester  - 金3,金4

  • Software Analytics (2020academic year) Prophase  - その他

  • Software Engineering (2020academic year) Fourth semester  - 月3,月4

  • Software Design (2020academic year) Third semester  - 月1,月2,金5,金6

  • Database Systems (2020academic year) Second semester  - 月1,月2,木1,木2

  • Database Theory (2020academic year) Second semester  - 月1,月2,木1,木2

  • Programming Language Theory (2020academic year) Fourth semester  - 月3,月4

  • Quantitative Management of Software Projects (2020academic year) Prophase  - その他

  • Introduction to Information Technology (2020academic year) Summer concentration  - その他

  • Introduction to Information Technology (2020academic year) Summer concentration  - その他

  • Engineering English (2020academic year) Late  - その他

  • Basic Physics (Classical Mechanics) 1 (2020academic year) Third semester  - 火5,火6

  • Basic Physics (Classical Mechanics) 2 (2020academic year) Fourth semester  - 火5,火6

  • Basic Physics 1(Classical Mechanics) (2020academic year) 3rd and 4th semester  - 火5,火6

  • Seminar in Theory of Programming and Artificial Intelligence (2020academic year) Year-round  - その他

  • Technical Writing (2020academic year) Prophase  - その他

  • Technical Presentation (2020academic year) Late  - その他

  • Computer Mathematics I (2020academic year) Second semester  - 火3,火4,金1,金2

  • Logic Language (2020academic year) Third semester  - 月1,月2,金5,金6

  • Specific Research of Electronics and Information Systems Engineering (2020academic year) Year-round  - その他

▼display all