Updated on 2025/08/23

写真a

 
MONDEN Akito
 
Organization
Faculty of Environmental, Life, Natural Science and Technology Professor
Position
Professor
External link

Research Interests

  • Empirical Software Engineering

  • Software Protection

  • 実証的ソフトウェア工学

  • ソフトウェアプロテクション

Research Areas

  • Informatics / Software

Education

  • Nara Institute of Science and Technology   情報科学研究科  

    - 1998

      More details

    Country: Japan

    researchmap

  • Nagoya University   工学部   電気工学科

    - 1994

      More details

    Country: Japan

    researchmap

Research History

  • Faculty of Environmental, Life, Natural Science and Technology, Okayama University   Professor

    2023.4

      More details

  • Graduate School of Natural Science and Technology,Okayama University   Professor

    2015 - 2023.3

      More details

  • Nara Institute of Science and Technology

    2015 - 2017

      More details

  • Visiting Professor,Nara Institute of Science and Technology

    2015 - 2017

      More details

  • Nara Institute of Science and Technology

    2007 - 2015

      More details

  • Associate Professor,Nara Institute of Science and Technology

    2007 - 2015

      More details

  • Nara Institute of Science and Technology

    2004 - 2007

      More details

  • Associate Professor,Nara Institute of Science and Technology

    2004 - 2007

      More details

  • ニュージーランド オークランド大学 Honorary Research Fellow

    2003 - 2004

      More details

  • Honorary Research Fellow,The University of Auckland

    2003 - 2004

      More details

  • Nara Institute of Science and Technology

    1998 - 2004

      More details

  • Research Associate,Nara Institute of Science and Technology

    1998 - 2004

      More details

▼display all

Professional Memberships

▼display all

 

Papers

  • Task estimation for software company employees based on computer interaction logs Reviewed

    Florian Pellegrin, Zeynep Yücel, Akito Monden, Pattara Leelaprute

    Empir. Softw. Eng.   26 ( 5 )   98 - 98   2021.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10664-021-10006-4

    researchmap

  • On the relative value of data resampling approaches for software defect prediction Reviewed

    Kwabena Ebo Bennin, Jacky W. Keung, Akito Monden

    Empirical Software Engineering   24 ( 2 )   602 - 636   2019.4

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer New York LLC  

    DOI: 10.1007/s10664-018-9633-6

    Scopus

    researchmap

  • MAHAKIL: Diversity Based Oversampling Approach to Alleviate the Class Imbalance Issue in Software Defect Prediction Reviewed

    Bennin, K.E., Keung, J., Phannachitta, P., Monden, A., Mensah, S.

    IEEE Transactions on Software Engineering   44 ( 6 )   534 - 550   2018.6

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers (IEEE)  

    DOI: 10.1109/TSE.2017.2731766

    Scopus

    researchmap

  • On the Application of Bandit Algorithm for Selecting Clone Detection Methods Reviewed

    Masateru TSUNODA, Takuto KUDO, Akito MONDEN, Amjed TAHIR, Kwabena Ebo BENNIN, Koji TODA, Keitaro NAKASAI, Kenichi MATSUMOTO

    IEICE Transactions on Information and Systems   E108.D ( 7 )   718 - 722   2025.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2024iil0002

    researchmap

  • Selecting Source Code Generation Tools Based on Bandit Algorithms Reviewed

    Masateru TSUNODA, Ryoto SHIMA, Amjed TAHIR, Kwabena Ebo BENNIN, Akito MONDEN, Koji TODA, Keitaro NAKASAI

    IEICE Transactions on Information and Systems   E108.D ( 7 )   723 - 726   2025.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2024iil0001

    researchmap

  • Evaluating Taint Specification Generators for Identifying Taint Sources in Relation to Data Safety Section Reviewed

    Hiroki Inayoshi, Shoichi Saito, Akito Monden

    2025 IEEE/ACM 12th International Conference on Mobile Software Engineering and Systems (MOBILESoft)   44 - 54   2025.4

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/mobilesoft66462.2025.00012

    researchmap

  • Evaluating ChatGPT's Ability to Detect Naming Bugs in Java Methods Reviewed

    Kinari Nishiura, Atsuya Matsutomo, Akito Monden

    Proceedings of the 20th International Conference on Evaluation of Novel Approaches to Software Engineering   128 - 136   2025.4

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:SCITEPRESS - Science and Technology Publications  

    DOI: 10.5220/0013354400003928

    researchmap

  • The Impact of Defect (Re) Prediction on Software Testing Reviewed

    Yukasa MURAKAMI, Yuta YAMASAKI, Masateru TSUNODA, Akito MONDEN, Amjed TAHIR, Kwabena Ebo BENNIN, Koji TODA, Keitaro NAKASAI

    IEICE Transactions on Information and Systems   E108.D ( 3 )   175 - 179   2025.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2024mpl0002

    researchmap

  • Building Defect Prediction Models by Online Learning Considering Defect Overlooking Reviewed

    Nikolay FEDOROV, Yuta YAMASAKI, Masateru TSUNODA, Akito MONDEN, Amjed TAHIR, Kwabena Ebo BENNIN, Koji TODA, Keitaro NAKASAI

    IEICE Transactions on Information and Systems   E108.D ( 3 )   170 - 174   2025.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2024mpl0001

    researchmap

  • Extended Association Rule Mining and Its Application to Software Engineering Data Sets Reviewed

    Hidekazu Saito, Kinari Nishiura, Akito Monden, Shuji Morisaki

    International Journal of Software Engineering and Knowledge Engineering   34 ( 11 )   1735 - 1756   2024.11

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:World Scientific Pub Co Pte Ltd  

    Association rule mining is a highly effective approach to data analysis for datasets of varying sizes, accommodating diverse feature values. Nevertheless, deriving practical rules from datasets with numerical variables presents a challenge, as these variables must be discretized beforehand. Quantitative association rule mining addresses this issue, allowing the extraction of valuable rules. This paper introduces an extension to quantitative association rules, incorporating a two-variable function in their consequent part. The use of correlation functions, statistical test functions, and error functions is also introduced. We illustrate the utility of this extension through three case studies employing software engineering datasets. In case study 1, we successfully pinpointed the conditions that result in either a high or low correlation between effort and software size, offering valuable insights for software project managers. In case study 2, we effectively identified the conditions that lead to a high or low correlation between the number of bugs and source lines of code, aiding in the formulation of software test planning strategies. In case study 3, we applied our approach to the two-step software effort estimation process, uncovering the conditions most likely to yield low effort estimation errors.

    DOI: 10.1142/s0218194024500347

    researchmap

  • On Applying Bandit Algorithm to Fault Localization Techniques Reviewed

    Masato Nakao, Kensei Hamamoto, Masateru Tsunoda, Amjed Tahir, Koji Toda, Akito Monden, Keitaro Nakasai, Kenichi Matsumoto

    2024 IEEE 35th International Symposium on Software Reliability Engineering Workshops (ISSREW)   111 - 112   2024.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/issrew63542.2024.00060

    researchmap

  • Demystifying Ambiguous Words in Request for Proposals of Information Systems in Japan Reviewed

    Toru Nakamichi, Hiroki Inayoshi, Kinari Nishiura, Mariko Sasakura, Akito Monden

    International Journal of Software Innovation   12 ( 1 )   1 - 18   2024.10

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:IGI Global  

    <p>Disagreements in interpreting words in software requirements specifications (SRSs) can lead to project failure. Various approaches to identifying and preventing ambiguous words in SRSs have been proposed. Yet, it is unclear which ambiguous words are used in the actual SRSs and to what extent they need to be modified. This paper quantitatively analyzes existing SRSs to clarify (1) how many ambiguous words are included in SRSs and (2) how many of these words require correction. This paper targets the Request for Proposals (RFPs), which describe the initial requirements of 40 systems of local governments, libraries, universities, and hospitals in Japan. Ten ambiguous Japanese words were analyzed. The result shows that “juubun” (sufficient) appeared most frequently, and 42% required correction when this word was used. The result also indicates that the number of ambiguous words varied greatly among the RFPs and that larger RFPs did not necessarily contain more ambiguous words.</p>

    DOI: 10.4018/ijsi.358012

    researchmap

  • An Empirical Study of the Impact of Test Strategies on Online Optimization for Ensemble-Learning Defect Prediction Reviewed

    Kensei Hamamoto, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Akito Monden, Koji Toda, Keitaro Nakasai, Kenichi Matsumoto

    2024 IEEE International Conference on Software Maintenance and Evolution (ICSME)   642 - 647   2024.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icsme58944.2024.00066

    researchmap

  • 過去と現在進行中のテスト結果を組み合わせたソフトウェアバグ予測 Reviewed

    廣瀬椋一, 西浦生成, 角田雅照, 門田暁人

    コンピュータソフトウェア   41 ( 1 )   2024.10

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Analyzing Class Usage in JavaScript Programs Reviewed

    Kinari Nishiura, Shuto Misawa, Akito Monden

    Proc. 6th World Symposium on Software Engineering (WSSE2024)   2024.9

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Comparison of Similarity Functions for n-gram Software Birthmarks Reviewed

    Nikolay Fedorov, Haruaki Tamada, Hiroki Inayoshi, Akito Monden

    Proc. 6th World Symposium on Software Engineering (WSSE2024)   2024.9

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • An Empirical Study on Ambiguous Words in Software Requirements Specifications of Local Government and Library Systems Reviewed

    Toru Nakamichi, Kinari Nishiura, Mariko Sasakura, Akito Monden

    2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA)   206 - 211   2024.5

     More details

    Authorship:Last author, Corresponding author   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/sera61261.2024.10685614

    researchmap

  • Porting a Python Application to the Web Using Django: A Case Study of an Archaeological Image Processing System Reviewed

    Hikaru Tomita, Mariko Sasakura, Kinari Nishiura, Hiroki Inayoshi, Akito Monden

    2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA)   199 - 205   2024.5

     More details

    Authorship:Last author, Corresponding author   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/sera61261.2024.10685556

    researchmap

  • Identifying Security Bugs in Issue Reports: Comparison of BERT, N-gram IDF and ChatGPT Reviewed

    Daiki Yokoyama, Kinari Nishiura, Akito Monden

    2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA)   328 - 333   2024.5

     More details

    Authorship:Last author, Corresponding author   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/sera61261.2024.10685583

    researchmap

  • スマホゲームにおける課金誘導方法の分析 Reviewed

    麻生 直希, 西浦 生成, 笹倉 万里子, 門田 暁人

    コンピュータ ソフトウェア   31 ( 1 )   1_75 - 1_81   2024.1

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper (scientific journal)  

    DOI: 10.11309/jssst.41.1_75

    researchmap

  • Using a Personality-Aware Recommendation System for Comparing Inventory Performances Reviewed

    Natsu Nishimura, Zeynep Yücel, Akito Monden

    2023 15th International Congress on Advanced Applied Informatics Winter (IIAI-AAI-Winter)   228 - 235   2023.12

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai-winter61682.2023.00050

    researchmap

  • Dependence of Perception of Vocabulary Difficulty on Contexture Reviewed

    Parisa Supitayakul, Rika Kuramitsu, Zeynep Yucel, Akito Monden, Koichi Takeuchi

    2023 15th International Congress on Advanced Applied Informatics Winter (IIAI-AAI-Winter)   129 - 134   2023.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai-winter61682.2023.00032

    researchmap

  • Experiment Design and Verification for Assessing the Acquisition of Strategic Planning Ability Reviewed

    Natchanon Manatphaiboon, Shogo Hamachi, Zeynep Yücel, Pattara Leelaprute, Akito Monden

    2023 15th International Congress on Advanced Applied Informatics Winter (IIAI-AAI-Winter)   121 - 128   2023.12

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai-winter61682.2023.00031

    researchmap

  • Fault-proneモジュール予測における第三者データに基づいた外れ値除去 Reviewed

    西浦生成, 門田暁人

    コンピュータソフトウェア   40 ( 4 )   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Software Defect Prediction by Online Learning Considering Defect Overlooking Reviewed

    Yuta Yamasaki, Nikolay Fedorov, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai

    2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW)   2023.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/issrew60843.2023.00044

    researchmap

  • Exploring Behavioral Trustworthiness of GitHub Developers Reviewed

    Kinari Nishiura, Kaito Ikeda, Mariko Sasakura, Akito Monden

    Proc. 5th World Symposium on Software Engineering (WSSE2023)   2023.9

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Subject Experiments with a Learning Support System for Grover's Algorithm Reviewed

    Hayato Yasunaga, Mariko Sasakura, Akito Monden

    Proc. 27th International Conference Information Visualisation (IV2023)   125 - 130   2023.7

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iv60283.2023.00030

    researchmap

  • A Cost-Effectiveness Metric for Association Rule Mining in Software Defect Prediction Reviewed

    Kinari Nishiura, Takeki Kasagi, Akito Monden

    Proc. 21st International Conference on Software Engineering Research and Practice (SERP'23)   2023.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Research Square Platform LLC  

    Abstract

    This paper proposes a cost-effectiveness metric for association rule mining suitable for software defect prediction where conditions of defective modules are characterized as association rules.Given a certain amount of test effort (or the number of test cases), the proposed metric is the expected number of defects to be discovered in modules that meet an association rule.Since the amount test effort is limited in general and full testing of all modules is ineffective, the proposed metric is useful to focus on the most cost effective set of modules to be tested with limited test effort. The proposed metric is defined based on the exponential Software Reliability Growth Model (SRGM) extended with the module size parameter, assuming that a larger module require more effort to discover defects. To evaluate the effectiveness of the proposed metric, association rules were extracted and prioritized based on the proposed metric using data sets of four open source software projects. The LOC-based cumulative-lift chart, which is often used to evaluate the cost effectiveness of defect prediction, shows that the proposed metric can focus on the rules that can discover more defects than the conventional association rule metrics, confidence and odds ratio.

    DOI: 10.21203/rs.3.rs-1988568/v1

    researchmap

    Other Link: https://www.researchsquare.com/article/rs-1988568/v1.html

  • Artificial Neural Network Based Audio Reinforcement for Computer Assisted Rote Learning Reviewed

    Parisa Supitayakul, Zeynep Yücel, Akito Monden

    IEEE Access   11   39466 - 39483   2023

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers (IEEE)  

    DOI: 10.1109/access.2023.3266731

    researchmap

  • Analysis of Programming Performance Based on 2-grams of Keystrokes and Mouse Operations. Reviewed

    Kazuki Matsumoto, Kinari Nishiura, Mariko Sasakura, Akito Monden

    Proc. 21st IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA2023)   301 - 306   2023

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SERA57763.2023.10197645

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/sera/sera2023.html#MatsumotoNSM23

  • A Dynamic Model Selection Approach to Mitigate the Change of Balance Problem in Cross-Version Bug Prediction Reviewed

    Hiroshi Demanou, Akito Monden, Masateru Tsunoda

    Proc. 10th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2022   2022.12

     More details

    Authorship:Last author, Corresponding author   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Developing a web application for RBSC-based solution of the subset selection problem Reviewed

    Chigusa Ikeda, Parisa Supitayakul, Zeynep Yücel, Akito Monden

    2022 13th International Congress on Advanced Applied Informatics Winter (IIAI-AAI-Winter)   2022.12

     More details

    Authorship:Last author   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai-winter58034.2022.00021

    researchmap

  • Investigation of the relation between task engagement and eye gaze Reviewed

    Shogo Hamachi, Parisa Supitayakul, Zeynep Yücel, Akito Monden

    2022 13th International Congress on Advanced Applied Informatics Winter (IIAI-AAI-Winter)   2022.12

     More details

    Authorship:Last author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai-winter58034.2022.00041

    researchmap

  • Examination of the relation between affective content of images and gaze behavior Reviewed

    Terumi Kasahara, Parisa Supitayakul, Zeynep Yücel, Akito Monden

    2022 13th International Congress on Advanced Applied Informatics Winter (IIAI-AAI-Winter)   2022.12

     More details

    Authorship:Last author   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai-winter58034.2022.00030

    researchmap

  • Preliminary Analysis of Review Method Selection Based on Bandit Algorithms Reviewed

    Takuto Kudo, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto

    2022 29th Asia-Pacific Software Engineering Conference (APSEC)   2022.12

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/apsec57359.2022.00069

    researchmap

  • Clone Detection Method Selection Based on Bandit Algorithm: a Preliminary Analysis Reviewed

    Takeru Tabo, Takuto Kudo, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Akito Monden

    2022 IEEE 16th International Workshop on Software Clones (IWSC)   2022.10

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iwsc55060.2022.00017

    researchmap

  • 相関ルールとランダムフォレストを組合わせたfault-proneモジュール予測の追実験 Reviewed

    瀬戸俊輝, 西浦生成, 門田暁人

    情報処理学会論文誌   63 ( 8 )   1352 - 1360   2022.8

     More details

    Authorship:Last author, Corresponding author  

    researchmap

  • Improvement and Evaluation of Data Consistency Metric CIL for Software Engineering Data Sets Reviewed

    Maohua Gan, Zeynep Yucel, Akito Monden

    IEEE Access   10   70053 - 70067   2022

     More details

    Authorship:Last author, Corresponding author   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electrical and Electronics Engineers (IEEE)  

    DOI: 10.1109/access.2022.3188246

    researchmap

  • Using Bandit Algorithms for Selecting Feature Reduction Techniques in Software Defect Prediction. Reviewed

    Masateru Tsunoda, Akito Monden, Koji Toda, Amjed Tahir, Kwabena Ebo Bennin, Keitaro Nakasai, Masataka Nagura, Kenichi Matsumoto

    MSR   670 - 681   2022

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/3524842.3529093

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/msr/msr2022.html#TsunodaMTTBNNM22

  • Investigating the effect of various types of audio reinforcement on memory retention Reviewed

    Parisa Supitayakul, Yücel, Misato Nose, Akito Monden

    Proc. 12th International Congress on Advanced Applied Informatics (IIAI-AAI2022)   250 - 255   2022

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IIAIAAI55812.2022.00057

    Scopus

    researchmap

  • A computationally efficient approach for solving RBSC-based formulation of the subset selection problem Reviewed

    Kohei Furuya, Zeynep Yücel, Parisa Supitayakul, Akito Monden

    Proc. 12th International Congress on Advanced Applied Informatics (IIAI-AAI2022)   341 - 347   2022

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IIAIAAI55812.2022.00076

    Scopus

    researchmap

  • Neg/pos-Normalized Accuracy Measures for Software Defect Prediction Reviewed

    Maohua Gan, Zeynep Yücel, Akito Monden

    IEEE Access   10   134580 - 134591   2022

     More details

    Authorship:Last author, Corresponding author   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/ACCESS.2022.3232144

    Scopus

    researchmap

  • Gaze Analysis in Spot the Difference. Reviewed

    Mariko Sasakura, Syouta Toda, Akito Monden

    26th International Conference Information Visualisation(IV)   161 - 166   2022

     More details

    Authorship:Last author   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/IV56949.2022.00034

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/iv/iv2022.html#SasakuraTM22

  • Exploring the limits of an RBSC-based approach in solving the subset selection problem Reviewed

    Furuya Kohei, Zeynep Yücel, Parisa Supitayakul, Akito Monden, Pattara Leelaprute

    International Conference on Data Science and Institutional Research (DSIR 2021)   2021.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • On the interplay between vocal production effect and learning content types in e-learning settings Reviewed

    Kazuma Ohta, Zeynep Yücel, Parisa Supitayakul, Akito Monden, Pattara Leelaprute

    International Conference on Learning Technologies and Learning Environments (LTLE 2021)   2021.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • ソフトウェア開発工数予測におけるauto-sklearnの適用 Reviewed

    田中 和也, 門田 暁人, Zeynep Yücel

    コンピュータソフトウェア   38 ( 4 )   4_46 - 4_52   2021.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • Human Resource Analysis Based on Used Libraries in Eclipse Projects on GitHub Reviewed

    Wilson Chukwu Emmanuel, Akito Monden

    Proc. 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   ( WP1-07 )   1 - 4   2021.11

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Effectiveness of Explaining a Program to Others in Finding Its Bugs Reviewed

    Toshihiro Nakamura, Akito Monden, Mariko Sasakura, Hidetake Uwano

    Proc. 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   ( WP1-06 )   1 - 6   2021.11

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/SNPD51163.2021.9704932

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/snpd/snpd2021.html#NakamuraMSU21

  • Association Metrics Between Two Continuous Variables for Software Project Data Reviewed

    Takumi Kanehira, Akito Monden, Zeynep Yucel

    Proc. 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   ( WP1-05 )   1 - 6   2021.11

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SNPD51163.2021.9704983

    Scopus

    researchmap

  • A Simulation Model of Software Quality Assurance in the Software Lifecycle Reviewed

    Hiroto Nakahara, Akito Monden, Zeynep Yucel

    Proc. 22nd IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   ( WP1-04 )   1 - 6   2021.11

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/SNPD51163.2021.9704927

    Scopus

    researchmap

  • Using Bandit Algorithms for Project Selection in Cross-Project Defect Prediction Reviewed

    Takuya Asano, Masateru Tsunoda, Koji Toda, Amjed Tahir, Kwabena Ebo Bennin, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto

    2021 IEEE International Conference on Software Maintenance and Evolution (ICSME)   649 - 653   2021.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icsme52107.2021.00074

    researchmap

  • ソフトウェア開発工数予測におけるデータスムージングの定量的評価 Reviewed

    伊永 健人, 門田 暁人, Zeynep Yücel

    コンピュータソフトウェア   38 ( 3 )   3_83 - 3_89   2021.8

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • A Novel Approach to Address External Validity Issues in Fault Prediction Using Bandit Algorithms Reviewed

    Teruki HAYAKAWA, Masateru TSUNODA, Koji TODA, Keitaro NAKASAI, Amjed TAHIR, Kwabena Ebo BENNIN, Akito MONDEN, Kenichi MATSUMOTO

    IEICE Transactions on Information and Systems   E104.D ( 2 )   327 - 331   2021.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2020edl8098

    researchmap

  • Analysis of Work Efficiency and Quality of Software Maintenance Using Cross-Company Dataset Reviewed

    Masateru TSUNODA, Akito MONDEN, Kenichi MATSUMOTO, Sawako OHIWA, Tomoki OSHINO

    IEICE Transactions on Information and Systems   E104.D ( 1 )   76 - 90   2021.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2020mpp0004

    researchmap

  • Influence of Outliers on Estimation Accuracy of Software Development Effort Reviewed

    Kenichi Ono, Masateru Tsunoda, Akito Monden, Kenichi Matsumoto

    IEICE Transactions on Information and Systems   E104.D ( 1 )   91 - 105   2021.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Applying auto-sklearn to Software Development Effort Estimation.

    Kazuya Tanaka, Akito Monden, Zeynep Yücel

    Computer Software   38 ( 4 )   46 - 52   2021

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.11309/jssst.38.4_46

    Scopus

    researchmap

  • Quantitative evaluation of data smoothing for software effort estimation

    Kento Korenaga, Akito Monden, Zeynep Yücel

    Computer Software   38 ( 3 )   83 - 89   2021

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.11309/jssst.38.3_83

    Scopus

    researchmap

  • 原型分析によるOSS開発者の貢献タイプの分析 Reviewed

    池本 和靖, 門田 暁人

    コンピュータソフトウェア   47 ( 4 )   17 - 23   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • ソフトウェア開発データを対象とする2変数間の尺度の検討

    金平 拓生, 門田 暁人

    情報処理学会第206回ソフトウェア工学研究会   2020-SE-206 ( 2 )   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ランダムフォレストと相関ルールの組み合わせによるソフトウェアバグ予測の試行

    瀬戸 俊輝, 門田 暁人

    情報処理学会第206回ソフトウェア工学研究会   2020-SE-206 ( 3 )   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアレビューのシミュレーションモデルとそのケーススタディ Reviewed

    中原 寛人, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   67 - 75   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発工数予測におけるAutoML の実験的評価 Reviewed

    田中 和也, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   141 - 142   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • データ断片からのソフトウェア開発データの復元の試み Reviewed

    西脇 将樹, 門田 暁人

    ソフトウェア工学の基礎XXVII;回ソフトウェア工学の基礎ワークショップFOS   139 - 140   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • バグを含む機械学習システムの挙動の分析の試行 Reviewed

    木内 祐太, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   147 - 148   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアバグ予測における学習データ切り替えの効果 Reviewed

    廣瀬 椋一, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   153 - 154   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発工数予測におけるデータスムージングの実験的評価 Reviewed

    伊永 健人, 門田 暁人

    ソフトウェア工学の基礎XXVII, 第27回ソフトウェア工学の基礎ワークショップFOSE2020   133 - 134   2020.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Report on the 26th foundation of software engineering workshop (fose2019)

    Shuji Morisaki, Masao Ohira, Akito Monden

    Computer Software   37 ( 4 )   3 - 9   2020.10

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:Japan Society for Software Science and Technology  

    DOI: 10.11309/jssst.37.4_3

    Scopus

    researchmap

  • Empirical Evaluation of Mimic Software Project Data Sets for Software Effort Estimation Reviewed

    Maohua GAN, Zeynep YÜCEL, Akito MONDEN, Kentaro SASAKI

    IEICE Transactions on Information and Systems   E103.D ( 10 )   2094 - 2103   2020.10

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2019edp7150

    researchmap

  • ソフトウェア開発工数予測へのAutoMLの適用

    田中和也, 門田暁人

    日本ソフトウェア科学会第37回大会   ( 25-P )   2020.9

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発実績データセットへのデータスムージングの適用

    伊永健人, 門田暁人

    日本ソフトウェア科学会第37回大会   ( 27-P )   2020.9

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Investigating effect of stimulus modality on recollection rate in e-learning systems Reviewed

    Parisa Supitayakul, Zeynep Yücel, Akito Monden, Pattara Leelaprute

    International Conference on Learning Technologies and Learning Environments   2020.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai50415.2020.00036

    researchmap

  • An Algorithm for Automatic Collation of Vocabulary Decks Based on Word Frequency Reviewed

    Zeynep YÜCEL, Parisa SUPITAYAKUL, Akito MONDEN, Pattara LEELAPRUTE

    IEICE Transactions on Information and Systems   E103.D ( 8 )   1865 - 1874   2020.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2019edp7279

    Scopus

    researchmap

  • Identification of behavioral variables for efficient representation of difficulty in vocabulary learning systems Reviewed

    Parisa Supitayakul, Zeynep Yücel, Akito Monden, Pattara Leelaprute

    International Journal of Learning Technologies and Learning Environments   3 ( 1 )   51 - 60   2020.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:International Institute of Applied Informatics  

    DOI: 10.52731/ijltle.v3.i1.521

    researchmap

  • Estimating Level of Engagement from Ocular Landmarks Reviewed

    Zeynep Yucel, Serina Koyama, Akito Monden, Mariko Sasakura

    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION   2020.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1080/10447318.2020.1768666

    Web of Science

    researchmap

  • 行レベルバグ予測のためのWebアプリケーション Reviewed

    金平拓生, 門田暁人

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアバグ予測におけるauto-sklearnの有効性評価 Reviewed

    田中 和也, 門田 暁人, Zeynep Yücel

    コンピュータソフトウェア   36 ( 4 )   46 - 52   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • 原型分析によるソフトウェア開発者の貢献タイプの分析 Reviewed

    池本和靖, 門田暁人

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアバグ予測の費用対効果に基づくアソシエーションルールの優先順付け Reviewed

    笠木健希, 門田暁人, Zeynep Yücel

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェアレビューのシミュレーション Reviewed

    中原寛人, 門田暁人

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発におけるcontext switchの影響 Reviewed

    井下瑚都, Zeynep Yücel, 門田暁人

    ソフトウェア工学の基礎XXVI, ソフトウェア工学の基礎ワークショップFOSE2019   2019.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Algorithmic Expressions for Assessing Algorithmic Thinking Ability of Elementary School Children Reviewed

    Yasumasa Oomori, Hidekuni Tsukamoto, Hideo Nagumo, Yasuhiro Takemura, Kouki Iida, Akito Monden, Ken-ichi Matsumoto

    2019 IEEE Frontiers in Education Conference (FIE)   2019.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/fie43999.2019.9028486

    researchmap

  • Effect of Grasping Uniformity on Estimation of Grasping Region from Gaze Data Reviewed

    Pimwalun Witchawanitchanun, Zeynep Yucel, Akito Monden, Pattara Leelaprute

    Proceedings of the 7th International Conference on Human-Agent Interaction   265 - 267   2019.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/3349537.3352787

    Scopus

    researchmap

  • Quantitative Evaluation of the Relation Between Blink Features and Apparent Task Engagement

    Serina Koyama, Zeynep Yucel, Akito Monden

    PERCEPTION   48   731 - 731   2019.9

     More details

    Publishing type:Research paper (international conference proceedings)  

    researchmap

  • ソフトウェア開発者の貢献タイプの分析

    池本和靖, 門田暁人

    第18回情報科学技術フォーラム(FIT2019)   ( B-007 )   1 - 2   2019.9

     More details

    Authorship:Corresponding author   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ランダムフォレストを用いた難読化されたコードのステルス評価の検討

    北岡哲哉, 神崎雄一郎, 森川みどり, 門田暁人

    第18回情報科学技術フォーラム(FIT2019) 講演論文集 第1分冊   29 - 32   2019.9

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • 相関関数を扱うアソシエーションルールの提案とソフトウェア開発データへの適用 Reviewed

    齊藤 英和, 門田 暁人, Zeynep Yücel, 森崎 修司

    コンピュータソフトウェア   36 ( 3 )   47 - 53   2019.8

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)  

    researchmap

  • A signal processing perspective on human gait: Decoupling walking oscillations and gestures Reviewed

    Adrien Gregorj, Zeynep Yücel, Sunao Hara, Akito Monden, Masahiro Shiomi

    Proceedings of the 4th International Conference on Interactive Collaborative Robotics 2019 (ICR 2019)   75 - 85   2019.8

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-26118-4_8

    researchmap

  • Assessing the Effect of Varying Word Classes on Behavioral Variables in Technology Mediated Vocabulary Learning Reviewed

    Parisa Supitayakul, Zeynep Yucel, Akito Monden, Pattara Leelaprute

    2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI)   226 - 229   2019.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/iiai-aai.2019.00052

    Scopus

    researchmap

  • On Preventing Symbolic Execution Attacks by Low Cost Obfuscation Reviewed

    Toshiki Seto, Akito Monden, Zeynep Yücel, Yuichiro Kanzaki

    Proc. 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2019)   495 - 500   2019.7

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/SNPD.2019.8935642

    researchmap

  • Data Smoothing for Software Effort Estimation Reviewed

    Kent Korenaga, Akito Monden, Zeynep Yucel

    2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD)   501 - 506   2019.7

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Prediction of Software Defects Using Automated Machine Learning Reviewed

    Kazuya Tanaka, Akito Monden, Zeynep Yucel

    2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD)   490 - 494   2019

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Effectiveness of auto-sklearn in Software Bug Prediction

    Kazuya Tanaka, Akito Monden, Yucel Zeynep

    Computer Software   36 ( 4 )   46 - 52   2019

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.11309/jssst.36.4_46

    Scopus

    researchmap

  • Proposal of Association Rule with Correlation Functions and Its Application to Software Development Data.

    Hidekazu Saito, Akito Monden, Zeynep Yücel, Shuji Morisaki

    Computer Software   36 ( 3 )   47 - 53   2019

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.11309/jssst.36.3_47

    Scopus

    researchmap

  • Report on the 25th foundation of software engineering workshop (FOSE2018)

    Kei Ito, Toshihiro Kamiya, Akito Monden

    Computer Software   36 ( 4 )   60 - 67   2019

     More details

    Language:Japanese   Publishing type:Research paper (international conference proceedings)   Publisher:Japan Society for Software Science and Technology  

    DOI: 10.11309/jssst.36.4_60

    Scopus

    researchmap

  • Introduction to the special issue on foundations of software engineering

    Monden, A., Ito, K., Kamiya, T., Aman, H., Hanakawa, N., Sawada, A., Sugiyama, Y., Washizaki, H.

    Computer Software   36 ( 4 )   2 - 2   2019

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.11309/jssst.36.4_2

    Scopus

    researchmap

  • シンボリック実行攻撃を妨げるソフトウェア難読化方法の検討

    瀬戸俊輝, 門田暁人, 神崎雄一郎

    ソフトウェア工学の基礎XXV,ソフトウェア工学の基礎ワークショップFOSE2018   145 - 146   2018.11

     More details

  • 難読化されたJavaバイトコードに対するシンボリック実行攻撃の困難さ評価の検討

    西陽太, 神崎雄一郎, 門田暁人, 玉田春昭

    ソフトウェア工学の基礎XXV,ソフトウェア工学の基礎ワークショップFOSE2018   151 - 152   2018.11

     More details

  • Cross-validation-based association rule prioritization metric for software defect characterization Reviewed

    Watanabe, T., Monden, A., Y{\"u}cel, Z., Kamei, Y., Morisaki, S.

    IEICE Transactions on Information and Systems   E101D ( 9 )   2269 - 2278   2018.9

     More details

    Authorship:Corresponding author   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.2018EDP7020

    Scopus

    researchmap

  • 難読化されたプログラムの自動解析への耐性に関する考察

    西陽太, 神崎雄一郎, 門田暁人

    情報処理学会第80回全国大会講演論文集 (講演番号2J-04)   2018.3

     More details

  • 分岐命令のカムフラージュに基づくプログラムの制御フローの隠ぺい

    村上隼之助, 神崎雄一郎, 門田暁人

    情報処理学会九州支部 火の国情報シンポジウム2018   C3-3   2018.3

     More details

  • A feasibility study of two-step software effort estimation Reviewed

    Naoki Kinoshita, Akito Monden

    Computer Software   35 ( 1 )   194 - 200   2018.2

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:Japan Society for Software Science and Technology  

    DOI: 10.11309/jssst.35.1_194

    Scopus

    researchmap

  • An Attempt to Line-wise Bug Prediction Using Moving Window.

    FUKUTANI Keigo, MONDEN Akito, ZEYNEP Yucel, HATA Hideaki

    Computer Software   35 ( 4 )   122 - 128   2018.1

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:日本ソフトウェア科学会  

    Scopus

    CiNii Article

    researchmap

  • Kurtosis and Skewness Adjustment for Software Effort Estimation. Reviewed

    Seiji Fukui, Akito Monden, Zeynep Yücel

    25th Asia-Pacific Software Engineering Conference, APSEC 2018, Nara, Japan, December 4-7, 2018   504 - 511   2018

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/APSEC.2018.00065

    researchmap

  • Generation of Mimic Software Project Data Sets for Software Engineering Research. Reviewed

    Maohua Gan, Kentaro Sasaki, Akito Monden, Zeynep Yücel

    Proceedings of the 6th International Workshop on Quantitative Approaches to Software Quality co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, December 4, 2018.   2273   38 - 43   2018

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:CEUR-WS.org  

    Scopus

    researchmap

  • Scaling up software birthmarks using fuzzy hashing

    Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, Akito Monden

    International Journal of Software Innovation   5 ( 3 )   89 - 102   2017.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Taru Publications  

    DOI: 10.4018/IJSI.2017070107

    Scopus

    researchmap

  • Examining Software Engineering Beliefs about System Testing Defects

    Akito Monden, Masateru Tsunoda, Mike Barker, Kenichi Matsumoto

    IT PROFESSIONAL   19 ( 2 )   58 - 64   2017.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/MITP.2017.31

    Web of Science

    researchmap

  • Industry Application of Software Development Task Measurement System: TaskPit

    Pawin Suthipornopas, Pattara Leelaprute, Akito Monden, Hidetake Uwano, Yasutaka Kamei, Naoyasu Ubayashi, Kenji Araki, Kingo Yamada, Ken-ichi Matsumoto

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E100D ( 3 )   462 - 472   2017.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.2016EDP7222

    Web of Science

    researchmap

  • Benchmarking IT operations cost based on working time and unit cost

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino

    SCIENCE OF COMPUTER PROGRAMMING   135   75 - 87   2017.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.scico.2016.10.006

    Web of Science

    researchmap

  • A stability assessment of solution adaptation techniques for analogy-based software effort estimation

    Passakorn Phannachitta, Jacky Keung, Akito Monden, Kenichi Matsumoto

    EMPIRICAL SOFTWARE ENGINEERING   22 ( 1 )   474 - 504   2017.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10664-016-9434-8

    Web of Science

    researchmap

  • 提案依頼書に含まれる無理難題の分類

    門田暁人, 住吉倫明, 神谷芳樹

    SEC journal   13 ( 3 )   18 - 25   2017

     More details

  • Textual vs. visual programming languages in programming education for primary schoolchildren Reviewed

    Hidekuni Tsukamoto, Yasuhiro Takemura, Yasumasa Oomori, Isamu Ikeda, Hideo Nagumo, Akito Monden, Ken Ichi Matsumoto

    Proceedings - Frontiers in Education Conference, FIE   2016-November   2016.11

     More details

    Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/FIE.2016.7757571

    Scopus

    researchmap

  • Investigating and projecting population structures in open source software projects: A case study of projects in GitHub Reviewed

    Saya Onoue, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    IEICE Transactions on Information and Systems   E99D ( 5 )   1304 - 1315   2016.5

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transinf.2015EDP7363

    Scopus

    researchmap

  • Open Source Software Engineering

    IHARA Akinori, OHIRA Masao, MONDEN Akito

    Computer Software   33 ( 1 )   1_27 - 1_27   2016

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    DOI: 10.11309/jssst.33.1_27

    CiNii Article

    CiNii Books

    researchmap

    Other Link: https://jlc.jst.go.jp/DN/JLC/20021882317?from=CiNii

  • Programming education for primary school children using a textual programming language

    Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Isamu Ikeda, Akito Monden, Ken-Ichi Matsumoto

    Proceedings - Frontiers in Education Conference, FIE   2015   2015.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    DOI: 10.1109/FIE.2015.7344187

    Scopus

    researchmap

  • コード断片の不自然さの比較による保護機構の発見困難さの評価

    松田篤和, 神崎雄一郎, 門田暁人

    情報処理学会第77回全国大会講演論文集 (講演番号1L-02)   2015.3

     More details

  • 保護コードの自然さに着目した命令カムフラージュ

    永井晃人, 神崎雄一郎, 門田暁人

    情報処理学会第77回全国大会講演論文集 (講演番号1L-03)   2015.3

     More details

  • Prediction of the change of learners' motivation in programming education for non-computing majors Reviewed

    Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Akito Monden, Ken-Ichi Matsumoto

    Proceedings - Frontiers in Education Conference, FIE   2015- ( February )   2015.2

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    DOI: 10.1109/FIE.2014.7044221

    Scopus

    researchmap

  • Introduction to the Special Issue on Foundation of Software Engineering

    Sugiyama, Y., Sawada, A., Washizaki, H., Aman, H., Monden, A., Kobayashi, T., Hanakawa, N., Obana, M.

    Computer Software   32 ( 3 )   3 - 3   2015

     More details

    Publishing type:Research paper (scientific journal)  

    Scopus

    researchmap

  • プログラム理解の困難さの脳血流による計測の試み Reviewed

    中川尊雄, 亀井靖高, 上野秀剛, 門田 暁人, 松本 健一

    コンピュータソフトウェア   31 ( 3 )   3_270 - 3_276   2014.9

     More details

    Language:Japanese  

    researchmap

  • Takao Nakagawa, Akito Monden, Ken Ichi Matsumoto, Yasutaka Kamei, Hidetake Uwano Reviewed

    Takao Nakagawa, Akito Monden, Ken Ichi Matsumoto, Yasutaka Kamei, Hidetake Uwano

    Computer Software   31 ( 3 )   270 - 276   2014.8

     More details

    Language:English  

    researchmap

  • N-gramモデルを用いたソフトウェア保護機構の不自然さ評価

    神崎雄一郎, 尾上栄浩, 門田暁人

    2014年暗号と情報セキュリティシンポジウム(SCIS2014)予稿集 (講演番号2D2-1)   2014.1

     More details

  • 自動計測データに基づくソフトウェア開発の作業目的の予測 Reviewed

    大橋 亮太, 上野 秀剛, 門田 暁人, 荒木 健史, 山田 欣吾, 松本 健一

    第21回ソフトウェア工学の基礎ワークショップ (FOSE 2014)   2014

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • 「ソフトウェア工学の実証的アプローチ」シリーズ第5回 ソフトウェアリポジトリマイニング Reviewed

    門田 暁人, 伊原 彰紀, 松本 健一

    コンピュウータソフトウェア   30 ( 2 )   52 - 65   2013.5

     More details

    Language:Japanese  

    researchmap

  • The effects of teaching material remediation with ARCS-strategies for programming education Reviewed

    Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Akito Monden, Ken-Ichi Matsumoto

    Proceedings - Frontiers in Education Conference, FIE   717 - 723   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/FIE.2013.6684920

    Scopus

    researchmap

  • 脳血流計測に基づくプログラム理解行動の定量化 Reviewed

    中川 尊雄, 亀井 靖高, 上野 秀剛, 門田 暁人, 松本 健一

    第20回ソフトウェア工学の基礎ワークショップ (FOSE 2013)   191 - 196   2013

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • ソフトウェア開発企業における開発タスクの自動計測 Reviewed

    門田 暁人, 上野 秀剛, 荒木 健史, 山田 欣吾, 松本 健一

    第20回ソフトウェア工学の基礎ワークショップ (FOSE 2013)   257 - 262   2013

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • Analyzing risk factors affecting project cost overrun Reviewed

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Ryosuke Hatano, Toshihiko Nakano, Yutaka Fukuchi

    Studies in Computational Intelligence   443   171 - 184   2013

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-642-32172-6_14

    Scopus

    researchmap

  • 命令の乱雑さに基づくプログラム理解性の評価 Reviewed

    二村 阿美, 門田 暁人, 玉田 春昭, 神崎 雄一郎, 中村 匡秀, 松本健一

    ソフトウェア工学の基礎XIX,ソフトウェア工学の基礎ワークショップFOSE2012   151 - 16-   2012.12

     More details

  • 実行時間に依存したプログラムの暗号化

    坂口 英司, 神崎 雄一郎, 門田 暁人

    第11回情報科学技術フォーラム(FIT2012)講演論文集 第1分冊   257 - 260   2012.9

     More details

  • コードの「めずらしさ」に基づく保護機構のステルシネス考察

    尾上 栄浩, 神崎 雄一郎, 門田 暁人

    第11回情報科学技術フォーラム(FIT2012)講演論文集 第1分冊   261 - 266   2012.9

     More details

  • Handling categorical variables in effort estimation Reviewed

    Masateru Tsunoda, Sousuke Amasaki, Akito Monden

    International Symposium on Empirical Software Engineering and Measurement   99 - 102   2012

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/2372251.2372267

    Scopus

    researchmap

  • Factors Affecting Maintenance Efficiency of Custom Made Software

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Tomoki Oshino

    Computer Software   29 ( 3 )   157 - 163   2012

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    Scopus

    researchmap

  • 実装者に依存しないプログラム規模尺度の構築の試み Reviewed

    門田 暁人, 内田 眞司, 松本 健一

    コンピュータソフトウェア   28 ( 4 )   377 - 382   2011.11

     More details

    Language:Japanese  

    researchmap

  • Java言語を対象とした実行時多様化の試み

    玉田 春昭, 神崎 雄一郎, 門田 暁人

    2012年暗号と情報セキュリティシンポジウム(SCIS2012)予稿集 (講演番号4E2-3)   2011.10

     More details

  • AN EMPIRICAL STUDY OF DEVELOPMENT VISUALIZATION FOR PROCUREMENT BY IN-PROCESS MEASUREMENT DURING INTEGRATION AND TESTING Reviewed

    Yoshiki Mitani, Hiroyuki Yoshikawa, Seishiro Tsuruho, Akito Monden, Mike Barker, Ken-Ichi Matsumoto

    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING   21 ( 3 )   367 - 388   2011.5

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1142/S0218194011005323

    Web of Science

    researchmap

  • Guilty or Not Guilty: Using Clone Metrics to Determine Open Source Licensing Violations Reviewed

    Akito Monden, Satoshi Okahara, Yuki Manabe, Kenichi Matsumoto

    IEEE SOFTWARE   28 ( 2 )   42 - 47   2011.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/MS.2010.159

    Web of Science

    researchmap

    Other Link: http://dblp.uni-trier.de/db/journals/software/software28.html#journals/software/MondenOMM11

  • ソースコードレベルにおけるプログラムのカムフラー ジュ Reviewed

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    コンピュータソフトウェア   28 ( 1 )   1_300 - 1_305   2011.1

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.11309/jssst.28.1_300

    researchmap

  • A model of project supervision for process correction and improvement Reviewed

    Masateru Tsunoda, Akito Monden, Tomoko Matsumura, Ken-Ichi Matsumoto

    Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011   151 - 159   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/IWSM-MENSURA.2011.31

    Scopus

    researchmap

  • An Empirical Study of Fault Prediction with Code Clone Metrics Reviewed

    Yasutaka Kamei, Hiroki Sato, Akito Monden, Shinji Kawaguchi, Hidetake Uwano, Masataka Nagura, Kenichi Matsumoto, Naoyasu Ubayashi

    Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011   55 - 61   2011

  • An Analysis of Cost-Overrun Projects Using Financial Data and Software Metrics Reviewed

    Hidetake Uwano, Yasutaka Kamei, Akito Monden, Ken-ichi Matsumoto

    Proceedings - Joint Conference of the 21st International Workshop on Software Measurement, IWSM 2011 and the 6th International Conference on Software Process and Product Measurement, MENSURA 2011   227 - 232   2011

  • ソフトウェア保護機構を構成するコードの特徴評価の試み

    神崎 雄一郎, 門田 暁人

    コンピュータセキュリティシンポジウム2011(CSS2011)予稿集   827 - 832   2011

  • Empirical evaluation of cost overrun prediction with imbalance data Reviewed

    Masateru Tsunoda, Akito Monden, Jun-Ichiro Shibata, Ken-Ichi Matsumoto

    Proceedings - 2011 10th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2011   415 - 420   2011

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICIS.2011.71

    Scopus

    researchmap

  • On building programmer-independent program size measure

    Akito Monden, Ken-Ichi Matsumoto, Shinji Uchida

    Computer Software   28 ( 4 )   377 - 382   2011

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    Scopus

    researchmap

  • Program camouflage at the source code level

    Yuichiro Kanzaki, Akito Monden, Ken-Ichi Matsumoto, Masahide Nakamura

    Computer Software   28 ( 1 )   300 - 305   2011

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    Scopus

    researchmap

  • A Software Protection Method based on Time-sensitive Code and Self-modification Mechanism Reviewed

    Yuichiro Kanzaki, Akito Monden

    Proc. of the the IASTED International Conference on Software Engineering and Applications (IASTED SEA 2010)   325 - 331   2010.11

     More details

  • 協調フィルタリングを用いたソフトウェア技術者向け開発技術推薦の試み Reviewed

    角田 雅照, 秋永 知宏, 引地 一将, 大杉 直樹, 柿元 健, 門田 暁人, 松本 健一

    教育システム情報学会誌   27 ( 4 )   316 - 326   2010.11

     More details

    Language:Japanese  

    researchmap

  • An Analysis of Developer Metrics for Fault Prediction Reviewed

    Shinsuke Matsumoto, Yasutaka Kamei, Akito Monden, Ken-ichi Matsumoto, Masahide Nakamura

    Proc. 6th International Conference on Predictive Models in Software Engineering (PROMISE2010)   USB - USB   2010.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • ソフトウェア開発における適正工期に関する分析 Reviewed

    戸田 航史, 門田 暁人, 松本 健一

    経済調査研究レビュー   7 ( 7 )   38 - 46   2010.9

     More details

    Language:Japanese  

    researchmap

  • 開発者メトリクスに基づくソフトウェア信頼性の分析 Reviewed

    ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    電子情報通信学会論文誌   J93-D ( 8 )   1576 - 1589   2010.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • 欠損値処理法を用いた工数予測におけるデータ件数と予測精度の関係

    田村 晃一, 門田 暁人, 松本 健一

    コンピュータソフトウェア   27 ( 2 )   100 - 105   2010.5

     More details

    Language:Japanese  

    researchmap

  • An effect of data size on performance of effort estimation with missing data techniques

    Koichi Tamura, Akito Monden, Ken-Ichi Matsumoto

    Computer Software   27 ( 2 )   100 - 105   2010.5

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    Scopus

    researchmap

  • 粗粒度モジュールに対するバグ密度予測の精度評価

    亀井 靖高, 本 真佑, 門田 暁人, 松本 健一

    電子情報通信学会技術研究報告   109 ( 456 )   145 - 150   2010.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Using search-based metric selection and oversampling to predict fault prone modules Reviewed

    R. Vivanco, Y. Kamei, A. Monden, K. Matsumoto, D. Jin

    Canadian Conference on Electrical and Computer Engineering   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/CCECE.2010.5575249

    Scopus

    researchmap

  • 原価率とプロジェクトメトリクスに着目したソフトウェア開発プロジェクトの特徴分析 Reviewed

    上野 秀剛, 亀井 靖高, 門田 暁人, 松本 健一

    プロジェクトマネジメント学会誌   12 ( 5 )   25 - 30   2010

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • クローンメトリクスを用いたFault-Prone モジュール判別の追実験 Reviewed

    亀井 靖高, 左藤 裕紀, 門田 暁人, 川口 真司, 上野 秀剛, 名倉 正剛, 松本 健一

    電子情報通信学会論文誌   93-D ( 4 )   544 - 547   2010

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Revisiting Common Bug Prediction Findings Using Effort Aware Models Reviewed

    Yasutaka Kamei, Shinsuke Matsumoto, Akito Monden, Ken-ichi Matsumoto, Bram Adams, Ahmed E. Hassan

    In Proceedings of The 26th IEEE International Conference on Software Maintenance (ICSM2010)   1 - 10   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ICSM.2010.5609530

    CiNii Article

    researchmap

  • FIT data selection based on project features for software effort estimation models

    Koji Toda, Akito Monden, Ken-Ichi Matsumoto

    Proceedings of the 6th IASTED International Conference on Advances in Computer Science and Engineering, ACSE 2010   82 - 88   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Scopus

    researchmap

  • The effect of log transformation in multivariate liner regression models for software effort prediction

    Monden, A., Kobayashi, K.

    Computer Software   27 ( 4 )   2010

     More details

    Publishing type:Research paper (scientific journal)  

    Scopus

    researchmap

  • Low Quality Module Prediction from Design Documents Metrics using Software Tag

    Shin-ichi Katayama, Kimiharu Ohkura, Kyohei Fushida, Shinji Kawaguchi, Masataka Nagura, Akito Monden, Hajimu Iida

    IEICE technical report   109 ( 343 )   67 - 72   2009.12

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)   Publisher:電子情報通信学会  

    It is important to detect low quality modules which are likely to have many defects at an early development phase for creating high quality software. Hence, various prediction models are proposed such as linear discriminant analysis, logistic regression analysis, and neural networks. These methods, however, use metrics measured mainly from a source code, thus they can only be applied after implementation is completed. We attempt to predict low quality modules using design documents metrics included in software tags. Using design documents metrics, we can predict when design is completed, thus our method contribute to reliability enhancement activities at an implementation phase. We applied multiple regression analysis and genetic programming, and detected low quality modules with high accuracy compared to a random selection method.

    CiNii Article

    CiNii Books

    researchmap

  • Software development productivity of Japanese enterprise applications Reviewed

    Tsunoda, M., Monden, A., Yadohisa, H., Kikuchi, N., Matsumoto, K.

    Information Technology and Management   10 ( 4 )   193 - 205   2009.12

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10799-009-0050-9

    Web of Science

    Scopus

    researchmap

  • 開発者メトリクスを用いたソフトウェア信頼性の分析 Reviewed

    ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    ソフトウェア工学の基礎ワークショップ FOSE2009   35   207 - 214   2009.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発工数予測のためのフィットデータ選定方法 Reviewed

    戸田 航史, 門田 暁人, 松本 健一

    情報処理学会論文誌   50 ( 11 )   2699 - 2709   2009.11

     More details

    Language:Japanese  

    researchmap

  • ソフトウェアバグと変数名の関係の分析

    山本 博之, 亀井 靖高, 本 真佑, 門田 暁人, 松本 健一

    電子情報通信学会技術研究報告   109 ( 307 )   67 - 71   2009.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • メトリクス値の標準化によるFault-Proneモジュール判別モデルの精度向上

    藏本 達也, ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    情報処理学会研究報告   2009-SE-166 ( 10 )   2009.10

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア開発プロファイルデータの相関ルール分析 Reviewed

    森崎 修司, 木村 早苗, 門田 暁人, 松本 健一

    経済調査研究レビュー   5 ( 5 )   88 - 94   2009.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Empirical evaluation of similarity-based missing data imputation for effort estimation Reviewed

    Tamura, K., Toda, K., Tsunoda, M., Monden, A., Matsumoto, K.-I., Kakimoto, T., Ohsugi, N.

    Computer Software   26 ( 3 )   44 - 55   2009.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:日本ソフトウェア科学会  

    DOI: 10.11309/jssst.26.3_44

    Scopus

    CiNii Article

    researchmap

  • Modeling of Test Effort Allocation and Software Reliability in Fault-prone Module Detection Reviewed

    Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Shinsuke Matsumoto, Ken-ichi Matsumoto, Shinji Kusumoto

    IPSJ Journal   50 ( 7 )   1716 - 1724   2009.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人情報処理学会  

    Various fault-prone detection models have been proposed to improve software reliability. However, while improvement of prediction accuracy was discussed, there was few discussion about how the models shuld be used in the field, i.e. how test effort should be allocated. Thus, improvement of software reliability by fault-prone module detection was not clear. In this paper, we proposed TEAR (Test Effort Allocation and software Reliability) model that represents the relationship among fault-prone detection, test effort allocation and software reliability. The result of simulations based on TEAR...

    CiNii Article

    researchmap

  • ソフトウェア開発費に影響する要因の分析 Reviewed

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 4 )   64 - 76   2009.3

     More details

    Language:Japanese  

    researchmap

  • The Effect of Collaborative Filtering on Software Component Recommendation Reviewed

    Yasutaka Kamei, Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, Akito Monden, Ken-ichi Matsumoto

    IPSJ Journal   50 ( 3 )   1139 - 1143   2009.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人情報処理学会  

    To clarify the effect of collaborative filtering (CF) on recommending highgenerality / low-generality software components, we experimentally verified two hypotheses; (1) the recommendation accuracy of CF for high-generality components is better than that of conventional methods (random algorithm and user average algorithm) and (2) the recommendation accuracy of CF for lowgenerality components is better than that of the conventional methods. We evaluated recommendation accuracy of CF with a dataset containing 29 open source software development projects (including 2,558 used components). As ...

    CiNii Article

    researchmap

  • Software development effort estimation models stratified by productivity factors Reviewed

    SEC journal   5 ( 1 )   58 - 67   2009.3

     More details

    Language:Japanese   Publisher:INFORMATION-TECHNOLOGY PROMOTION AGENCY,JAPAN  

    DOI: 10.11186/secjournal.5.58

    CiNii Article

    CiNii Books

    researchmap

    Other Link: https://jlc.jst.go.jp/DN/JALC/00329157843?from=CiNii

  • ソースコードと設計書を対象としたレビューにおける開発者の能力の比較 Reviewed

    上野 秀剛, 門田 暁人, 松本 健一

    ソフトウェア信頼性研究会 第5回ワークショップ   91 - 93   2009

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • 不具合履歴に基づくソフトウェアIV&V活動の定量的見える化手法 Reviewed

    まつ本 真佑, 上野 秀剛, 門田 暁人, 松本 健一, 片平 真史, 神武 直彦, 宮本 祐子, 氏原 頌悟, 吉川 茂雄

    電子情報通信学会論文誌   J92-D ( 12 )   2195 - 2206   2009

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • ブレークポイント使用履歴に基づくデバッグ行動の分析 Reviewed

    吉村 巧朗, 亀井 靖高, 上野 秀剛, 門田 暁人, 松本 健一

    電子情報通信学会技術研究報告. 知能ソフトウェア工学   109 ( 307 )   85 - 89   2009

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • An empirical study of the feedback of the in-process Measurement in a Japanese Consortium-type Software Project

    Yoshiki Mitani, Tomoko Matsumura, Katsuro Inoue, Mike Barker, Akito Monden, Ken-Ichi Matsumoto

    Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009   631 - 636   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Scopus

    researchmap

  • A Proposal of Derivation Methods of Fp Transformation Formulas Reviewed

    Masateru Tsunoda, Shinsuke Matsumoto, Akito Monden, Ken-ichi Matsumoto

    In Proc. of Workshop on Accountability and Traceability in Global Software Engineering (ATGSE2008)   25 - 26   2008.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Cost Effective IV&V Planning Activity Derived from Experiences on Jaxa's Spacecraft Projects Reviewed

    Tsutomu Matsumoto, Shinsuke Matsumoto, Hidetake Uwano, Akito Monden, Yuko Miyamoto, Shogo Ujihara, Naohiko Kohtake, Masafumi Katahira

    ESA Workshop on Avionics Data, Control and Software Systems (ADCSS2008)   2008.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Goal-Oriented Approach to Software Obfuscation Reviewed

    Hiroki Yamauchi, Akito Monden, Masahide Nakamura, Haruaki Tamada, Yuichiro Kanzaki, Ken-ichi Matsumoto

    International Journal of Computer Science and Network Security   8 ( 9 )   59 - 71   2008.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    CiNii Article

    researchmap

  • ソフトウェア保守業務の現状分析 Reviewed

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 3 )   46 - 59   2008.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Deriving quantitative relationship among project size, delivery, team size and effort Reviewed

    Takeshi Kakimoto, Akito Monden, Masateru Tsunoda, Ken-ichi Matsumoto, Nahomi Kikuchi

    SEC journal   4 ( 2 )   6 - 11   2008.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:情報処理推進機構ソフトウェア・エンジニアリング・センター  

    CiNii Article

    CiNii Books

    researchmap

  • A Variable Selection Method for Analogy-based Effort Estimation

    瀧 進也, 戸田 航史, 門田暁人, 柿元健, 角田 雅照, 大杉 直樹, 松本 健一

    情報処理学会論文誌   49 ( 7 )   2338 - 2348   2008.7

     More details

    Language:Japanese   Publisher:情報処理学会  

    ソフトウェア開発における多変数の実績データを用いた工数見積りでは,その精度を高めるうえで,見積りに不要な変数を除去することが必須となる.しかし,近年注目されているプロジェクト間の類似性に基づく工数見積り方法(analogy-based法)においては,その特性を活かした変数選択法が提案されていない.本論文では,「説明変数(プロジェクト特性)の値が似ているプロジェクトどうしは工数も似た値をとる」というanalogy-based法の考え方を踏襲し,目的変数である工数との相関係数が低い説明変数を除去することで,説明変数の値が似ていれば目的変数の値も似ているという状態を保つように変数選択する方法Correlation Threshold based Selection(CTS)を提案する.ソフトウェア開発企業で収集された3種類の開発実績データセットを用いた評価実験の結果,CTSは,従来手法であるステップワイズ変数選択法と比べて計算量が小さく,特に,カテゴリ変数の数が少ない場合に,安定して精度を改善することができた.Analogy-based estimation methods have been studied for deriving an accurate effort estimate required to complete a project; however, few studies have focused on their variable selection methods. Here, variables to be selected are predictor variables (e.g. development size and development duration, etc.) related to an objective variable (effort). In this paper, we propose Correlation Threshold based Selection (CTS) method that exploits the basic concept of analogy-based estimation where efforts are similar if predictor variables are similar. The proposed method requires few amount of calculation while it can accurately exclude variables that do not correlate with the effort. This paper experimentally evaluated the effectiveness of the proposed method by using three data sets collected from software development companies. The result showed that the proposed method provided high estimation accuracy for projects having larger number of predictor variables.

    CiNii Article

    CiNii Books

    researchmap

  • A Variable Selection Method for Analogy-based Effort Estimation Reviewed

    Shinya Taki, Koji Toda, Akito Monden, Takeshi Kakimoto, Masateru Tsunoda, Naoki Ohsugi, Ken-ichi Matsumoto

    IPSJ Journal   49 ( 7 )   2338 - 2348   2008.7

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人情報処理学会  

    Analogy-based estimation methods have been studied for deriving an accurate effort estimate required to complete a project; however, few studies have focused on their variable selection methods. Here, variables to be selected are predictor variables (e.g. development size and development duration, etc.) related to an objective variable (effort). In this paper, we propose Correlation Threshold based Selection (CTS) method that exploits the basic concept of analogy-based estimation where efforts are similar if predictor variables are similar. The proposed method requires few amount of calcula...

    CiNii Article

    researchmap

  • 情報システム運用業務の現状分析 Reviewed

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 2 )   100 - 110   2008.3

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Fault-proneモジュール判別における外れ値除去法の比較 Reviewed

    ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    情報処理学会論文誌   49 ( 3 )   1341 - 1351   2008.3

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Introducing Dynamic Name Resolution Mechanism for Obfuscating System-Defined Names in Programs Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proc. of the IASTED International Conference on Software Engineering (IASTED SE 2008)   125 - 130   2008.2

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • プロセス改善のためのソフトウェア開発タスク計測システム Reviewed

    門田 暁人, 亀井 靖高, 上野 秀剛, 松本 健一

    第15回ソフトウェア工学の基礎ワークショップ (FOSE 2008)   123 - 128   2008

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • コードクローンの長さとソフトウェア信頼性の関係の分析 Reviewed

    左藤 裕紀, 亀井 靖高, 上野 秀剛, 川口 真司, 名倉 正剛, 門田 暁人, 松本 健一, 飯田 元

    電子情報通信学会技術研究報告. ソフトウェアサイエンス   108 ( 242 )   43 - 48   2008

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • Fit data selection for software effort estimation models. Reviewed

    Koji Toda, Akito Monden, Ken-ichi Matsumoto

    Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, ESEM 2008, October 9-10, 2008, Kaiserslautern, Germany   360 - 361   2008

  • A Hybrid Faulty Module Prediction Using Association Rule Mining and Logistic Regression Analysis Reviewed

    Yasutaka Kamei, Akito Monden, Shuji Morisaki, Ken-ichi Matsumoto

    ESEM&apos;08: PROCEEDINGS OF THE 2008 ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT   279 - 281   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • An Over-sampling Method for Analogy-based Software Effort Estimation Reviewed

    Yasutaka Kamei, Jacky Keung, Akito Monden, Ken-ichi Matsumoto

    ESEM'08: PROCEEDINGS OF THE 2008 ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT   312 - +   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Are Good Code Reviewers Also Good at Design Review? Reviewed

    Hidetake Uwano, Akito Monden, Ken-ichi Matsumoto

    ESEM'08: PROCEEDINGS OF THE 2008 ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT   351 - 353   2008

  • Dresrem 2: An Analysis System for Multi-Document Software Review Using Reviewers' Eye Movements Reviewed

    Hidetake Uwano, Akito Monden, Ken-ichi Matsumoto

    Proceedings - The 3rd International Conference on Software Engineering Advances, ICSEA 2008, Includes ENTISY 2008: International Workshop on Enterprise Information Systems   177 - 183   2008

  • Analyzing factors of defect correction effort in a multi-vendor information system development Reviewed

    Tomoko Matsumura, Shuji Morisaki, Akito Monden, Ken-Ichi Matsumoto

    Journal of Computer Information Systems   49 ( 1 )   73 - 80   2008

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:International Association for Computer Information Systems  

    DOI: 10.1080/08874417.2008.11645308

    Scopus

    researchmap

  • 異なるプロジェクト間におけるFault-Proneモジュール判別の精度評価 Reviewed

    木浦 幹雄, ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    ソフトウェア工学の基礎XIV 日本ソフトウェア科学会 FOSE2007   131 - 136   2007.11

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • APIライブラリ名隠ぺいのための動的名前解決を用いた名前難読化 Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    電子情報通信学会論文誌D   J90-D ( 10 )   2723 - 2735   2007.10

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Exploiting Eye Movements for Evaluating Reviewer's Performance in Software Review Reviewed

    Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    IEICE Transactions on Fundamentals   E90-A ( 10 )   317 - 328   2007.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper proposes to use eye movements to characterize the performance of individuals in reviewing software documents. We design and implement a system called DRESREM, which measures and records eye movements of document reviewers. Based on the eye movements captured by eye tracking device, the system computes the line number of the document that the reviewer is currently looking at. The system can also record and play back how the eyes moved during the review process. To evaluate the effectiveness of the system we conducted an experiment to analyze 30 processes of source code review (6 programs, 5 subjects) using the system. As a result, we have identified a particular pattern, called scan, in the subject's eye movements. Quantitative analysis showed that reviewers who did not spend enough time on the scan took more time to find defects on average.

    DOI: 10.1093/ietfec/e90-a.10.2290

    CiNii Article

    CiNii Books

    researchmap

  • ソフトウェア開発工数積算のための生産性分析 Reviewed

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 1 )   114 - 119   2007.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Comparison of Outlier Detection Methods in Fault-Proneness Models Reviewed

    Shinsuke Matsumoto, Yasutaka Kamei, Akito Monden, Ken-ichi Matsumoto

    Proceedings of the 1st International Symposium on Empirical Software Engineering and Measurement (ESEM2007)   461 - 463   2007.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/ESEM.2007.34

    CiNii Article

    researchmap

  • Applying Sampling Methods to Fault-prone Module Detection(Evaluation and Management,<Special Issue>Software Engineering Theory and Practice) Reviewed

    KAMEI YASUTAKA, MATSUMOTO SHINSUKE, KAKIMOTO TAKESHI, MONDEN AKITO, MATSUMOTO KEN-ICHI

    IPSJ Journal   48 ( 8 )   2651 - 2662   2007.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人情報処理学会  

    To improve the prediction performance of fault-proneness models, this paper experimentally evaluates the effect of over and under sampling methods, which are preprocessing procedures for a fit dataset. The sampling methods are expected to improve the prediction performance when the fit dataset is imbalanced, i.e. there exists a large bias between the number of faultprone modules and the number of non-fault-prone modules. There is, however, no research that reports the effects of applying sampling methods to fault-proneness models. In the experiment, we evaluated the effects of four sampling...

    CiNii Article

    researchmap

  • 他プロジェクトの実績データに基づくFault-Proneモジュール判別の試み

    木浦 幹雄, ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    ソフトウェア信頼性研究会 第4回ワークショップ   45 - 53   2007.7

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)  

    CiNii Article

    researchmap

  • Fault-Proneモジュール判別モデルに対する外れ値除去法の適用効果

    ?本 真佑, 亀井 靖高, 門田 暁人, 松本 健一

    情報処理学会研究報告   2007-SE-155 ( 33 )   49 - 56   2007.3

     More details

    Language:Japanese   Publishing type:Research paper (conference, symposium, etc.)   Publisher:Information Processing Society of Japan (IPSJ)  

    In this paper, we experimentally evaluate outlier detection methods, which detect data points that are far away from others in a data set, in terms of improving the prediction performance of fault-prone module detection models. In the experiment, we compared two outlier detection methods (MOA, LOFM) each applied to three well-known fault-prone module detection models (LDA, LRA, CT). The result showed that MOA improved Fl-values of all fault-proneness models (0.04 at minimum, 0.17 at maximum and 0.10 at mean) while improvements by LOFM were relatively small (-0.01 at minimum, 0.04 at maximum and 0.01 at mean).

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00021154/

  • Defect data analysis based on extended association rule mining Reviewed

    Shuji Morisaki, Akito Monden, Tomoko Matsumura, Haruaki Tamada, Ken-Ichi Matsumoto

    Proceedings - ICSE 2007 Workshops: Fourth International Workshop on Mining Software Repositories, MSR 2007   2007

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/MSR.2007.5

    Scopus

    researchmap

  • ソースコードの圧縮性とコードクローンの関係の分析 Reviewed

    左藤 裕紀, 亀井 靖高, 上野 秀剛, 川口 真司, 門田 暁人, 松本 健一

    日本ソフトウェア科学会 第24回大会   2007

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • Mining Quantitative Rules in a Software Project Data Set

    Morisaki Shuji, Monden Akito, Tamada Haruaki, Matsumura Tomoko, Matsumoto Ken-ichi

    Information and Media Technologies   2 ( 4 )   999 - 1008   2007

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    This paper proposes a method to mine rules from a software project data set that contains a number of quantitative attributes such as staff months and SLOC. The proposed method extends conventional association analysis methods to treat quantitative variables in two ways: (1) the distribution of a given quantitative variable is described in the consequent part of a rule by its mean value and standard deviation so that conditions producing the distinctive distributions can be discovered. To discover optimized conditions, (2) quantitative values appearing in the antecedent part of a rule are divided into contiguous fine-grained partitions in preprocessing, then rules are merged after mining so that adjacent partitions are combined. The paper also describes a case study using the proposed method on a software project data set collected by Nihon Unisys Ltd. In this case, the method mined rules that can be used for better planning and estimation of the integration and system testing phases, along with criteria or standards that help with planning of outsourcing resources.

    DOI: 10.11185/imt.2.999

    CiNii Article

    researchmap

  • Mining Quantitative Rules in a Software Project Data Set

    Morisaki Shuji, Monden Akito, Tamada Haruaki, Matsumura Tomoko, Matsumoto Ken-ichi

    ipsjdc   3   518 - 527   2007

     More details

    Language:English   Publisher:Information Processing Society of Japan  

    This paper proposes a method to mine rules from a software project data set that contains a number of quantitative attributes such as staff months and SLOC. The proposed method extends conventional association analysis methods to treat quantitative variables in two ways: (1) the distribution of a given quantitative variable is described in the consequent part of a rule by its mean value and standard deviation so that conditions producing the distinctive distributions can be discovered. To discover optimized conditions, (2) quantitative values appearing in the antecedent part of a rule are divided into contiguous fine-grained partitions in preprocessing, then rules are merged after mining so that adjacent partitions are combined. The paper also describes a case study using the proposed method on a software project data set collected by Nihon Unisys Ltd. In this case, the method mined rules that can be used for better planning and estimation of the integration and system testing phases, along with criteria or standards that help with planning of outsourcing resources.

    DOI: 10.2197/ipsjdc.3.518

    CiNii Article

    researchmap

  • Evaluating the Robustness of Collaborative Filtering Based Effort Estimation Method against Data Missing Reviewed

    KAKIMOTO Takeshi, TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken-ichi

    The IEICE transactions on information and systems (Japanese edetion)   89 ( 12 )   2602 - 2611   2006.12

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:一般社団法人電子情報通信学会  

    CiNii Article

    CiNii Books

    researchmap

  • プログラマの視線を用いたコードレビュー性能の要因分析 Reviewed

    Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    ソフトウェア工学の基礎XIII 日本ソフトウェア科学会FOSE 2006   103 - 112   2006.11

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Java クラスファイル難読化ツール DonQuixote Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    ソフトウェア工学の基礎XIII, 日本ソフトウェア科学会 FOSE2006   113 - 118   2006.11

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • 進行中のプロジェクト計測とフィードバック実験に基づく計測データベース活用方式の提案 Reviewed

    神谷芳樹, 菊池奈穂美, 松村知子, 大杉直樹, 門田暁人, 肥後芳樹, 井上克郎, 松本健一

    情報処理学会ソフトウェアエンジニアリングシンポジウム200   2006.10

     More details

    Language:Japanese   Publishing type:Research paper (other academic)  

    researchmap

  • API呼び出しを用いた動的バースマーク Reviewed

    Keiji Okamoto, Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    電子情報通信学会論文誌D   J89-D ( 8 )   1751 - 1763   2006.8

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • 情報漏えいのリスクと生産性を考慮したソフトウェアプロセスの開発者割当て探索 Reviewed

    Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    ソフトウェアシンポジウム2006   24 - 32   2006.7

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • Analyzing Individual Performance of Source Code Review Using Reviewers’ Eye Movement Reviewed

    Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proceedings of Int'l Eye Tracking Research & Applications Symposium (ETRA 2006)   133 - 140   2006.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • A software protection method based on instruction camouflage Reviewed

    Kanzaki, Y., Monden, A., Nakamura, M., Matsumoto, K.

    Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi)   89 ( 1 )   47 - 59   2006.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1002/ecjc.20141

    Scopus

    researchmap

  • Software Obfuscation from Crackers’ Viewpoint Reviewed

    Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    Proc. IASTED International Conference on Advances in Computer Science and Technology (IASTED ACST 2006)   286 - 291   2006.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Productivity analysis of Japanese enterprise software development projects Reviewed

    Masateru Tsunoda, Akito Monden, Hiroshi Yadohisa, Nahomi Kikuchi, Ken-Ichi Matsumoto

    Proceedings - International Conference on Software Engineering   14 - 17   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1145/1137983.1137988

    Scopus

    researchmap

  • Quantitative Analysis of Information Leakage in Security-Sensitive Software Processes

    Kanzaki Yuichiro, Igaki Hiroshi, Nakamura Masahide, Monden Akito, Matsumoto Ken-ichi

    Information and Media Technologies   1 ( 1 )   121 - 133   2006

     More details

    Language:English   Publisher:Information and Media Technologies Editorial Board  

    This paper presents a method to evaluate the risk of information leakage in software processes for security-sensitive applications. A software process is modeled as a series of sub-processes, each of which produces new work products from input products. Since a process is conducted usually by multiple developers, knowledge of work products is shared among the developers. Through the collaboration, a developer may share with others the knowledge of products that are not related to the process. We capture the transfer of such irrelevant product knowledge as information leakage in a software process. In this paper, we first formulate the problem of information leakage by introducing a formal software process model. Then, we propose a method to derive the probability that each developer d knows each work product p at a given process of software development. The probability reflects the possibility that someone leaked the knowledge of p to d. We also conduct three case studies to show the applicability of leakage to practical settings. In the case studies, we evaluate how the risk of information leakage is influenced by the collaboration among developers, the optimal developer assignment and the structure of the software process. As a result, we show that the proposed method provides a simple yet powerful means to perform quantitative analysis on information leakage in a security-sensitive software process.

    DOI: 10.11185/imt.1.121

    CiNii Article

    researchmap

  • Java Birthmarks -- Detecting the Software Theft Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    IEICE Transactions on Information and Systems   E88-D ( 9 )   2148 - 2158   2005.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which are unique and native characteristics of every class file. For a pair of class files p and q, if q has the same birthmark as p's, q is suspected as a copy of p. Ideally, the birthmarks should satisfy the following properties : (a) preservation - the birthmarks should be preserved even if the original class file is tampered with, and (b) distinction - independent class files must be distinguished by completely different birthmarks. Taking (a) and (b) into account, we propose four types of birthmarks for Java class files. To show the effectiveness of the proposed birthmarks, we conduct three experiments. In the first experiment, we demonstrate that the proposed birthmarks are sufficiently robust against automatic program transformation (93.3876% of the birthmarks were preserved). The second experiment shows that the proposed birthmarks successfully distinguish non-copied files in a practical Java application (97.8005% of given class files were distinguished). In the third experiment, we exploit different Java compilers to confirm that the proposed Java birthmarks are core characteristics independent of compiler-specific issues.

    DOI: 10.1093/ietisy/e88-d.9.2148

    CiNii Article

    CiNii Books

    researchmap

  • Quantitative analysis of information leakage in security-sensitive software processes Reviewed

    Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    IPSJ Journal, Special Issue on Research on Computer Security Characterized in the Context of Social Responsibilities   46 ( 8 )   2129 - 2141   2005.8

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Software analysis by code clones in open source software Reviewed

    Shinji Uchida, Akito Monden, Naoki Ohsugi, Toshihiro Kamiya, Ken Ichi Matsumoto, Hideo Kudo

    Journal of Computer Information Systems   45 ( 3 )   1 - 11   2005.3

     More details

    Publishing type:Research paper (scientific journal)  

    Scopus

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/jcis/jcis45.html#UchidaMOKMK05

  • Characterizing Dynamics of Information Leakage in Software Process Reviewed

    Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proc. 3rd Australasian Information Security Workshop (AISW2005)   44   145 - 151   2005.1

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Tamper-resistant software system based on a finite state machine Reviewed

    Akito Monden, Antoine Monsifrot, Clark Thomborson

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E88-A ( 1 )   112 - 122   2005

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electronics, Information and Communication, Engineers, IEICE  

    DOI: 10.1093/ietfec/E88-A.1.112

    Scopus

    researchmap

  • マルチバージョン生成によるプログラムの解析防止 Reviewed

    Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    ソフトウェア工学の基礎XI, 日本ソフトウェア科学会FOSE2004   157 - 160   2004.11

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    researchmap

  • ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの提案 Reviewed

    Keiji Okamoto, Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    ソフトウェア工学の基礎XI, 日本ソフトウェア科学会FOSE2004   85 - 88   2004.11

     More details

    Publishing type:Research paper (conference, symposium, etc.)  

    CiNii Article

    researchmap

  • Dynamic Software Birthmarks to Detect the Theft of Windows Applications Reviewed

    Haruaki Tamada, Keiji Okamoto, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proc. International Symposium on Future Software Technology 2004 (ISFST 2004)   CDROM   2004.10

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • 命令のカムフラージュによるソフトウェア保護方法 Reviewed

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    電子情報通信学会論文誌A   J87-A ( 6 )   755 - 767   2004.6

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Design and evaluation of birthmarks for detecting theft of Java programs Reviewed

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    Proc. IASTED International Conference on Software Engineering (IASTED SE 2004)   569 - 575   2004.2

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • Effort estimation based on Collaborative Filtering Reviewed

    N Ohsugi, M Tsunoda, A Monden, K Matsumoto

    PRODUCT FOCUSED SOFTWARE PROCESS IMPROVEMENT   3009   274 - 286   2004

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Exploiting self-modification mechanism for program protection Reviewed

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    Proc. 27th Computer Software and Applications Conference (compsac2003)   170 - 179   2003.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    CiNii Article

    researchmap

  • Queue-based cost evaluation of mental simulation process in program comprehension Reviewed

    Masahide Nakamura, Akito Monden, Tomoaki Itoh, Ken-ichi Matsumoto, Yuichiro Kanzaki, Hirotsugu Satoh

    Proc. 9th IEEE International Software Metrics Symposium (METRICS2003)   351 - 360   2003.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    DOI: 10.1109/METRIC.2003.1232480

    CiNii Article

    researchmap

  • A recommendation system for software function discovery Reviewed

    N Ohsugi, A Monden, K Matsumoto

    APSEC 2002: NINTH ASIA PACIFIC SOFTWARE ENGINEERING CONFERENCE   248 - 257   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • The detection of faulty code violating implicit coding rules Reviewed

    T Matsumura, A Monden, K Matsumoto

    2002 INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING, PROCEEDINGS   173 - 182   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • A Multiple-View Analysis Model of Debugging Processes. Reviewed

    Shinji Uchida, Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Hideo Kudo

    2002 International Symposium on Empirical Software Engineering (ISESE 2002), 3-4 October 2002, Nara, Japan   139 - 147   2002

     More details

    Publisher:IEEE Computer Society  

    DOI: 10.1109/ISESE.2002.1166933

    researchmap

  • Software quality analysis by code clones in industrial legacy software Reviewed

    A Monden, D Nakae, T Kamiya, S Sato, K Matsumoto

    EIGHTH IEEE SYMPOSIUM ON SOFTWARE METRICS, PROCEEDINGS   87 - 94   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Evaluating the Applicability of Reliability Prediction Models between Different Software

    Shin-Ichi Sato, Akito Monden, Ken-Ichi Matsumoto

    International Workshop on Principles of Software Evolution (IWPSE)   97 - 102   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Association for Computing Machinery (ACM)  

    DOI: 10.1145/512035.512057

    Scopus

    researchmap

  • A Method for Detecting Faulty Code Violating Implicit Coding Rules

    Tomoko Matsumura, Akito Monden, Ken-Ichi Matsumoto

    International Workshop on Principles of Software Evolution (IWPSE)   15   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Institute of Electrical and Electronics Engineers Inc.  

    DOI: 10.1145/512035.512040

    Scopus

    researchmap

  • A Support System for Software Function Discovery Using Histories of Function Executions Reviewed

    MORISAKI Shuuji, SHIRAISHI Yumi, YAMATO Masatake, MONDEN Akito, MATSUMOTO Ken-ichi, TORII Koji

    The Transactions of the Institute of Electronics,Information and Communication Engineers.   J84-D-I ( 6 )   755 - 767   2001.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • A Practical Method for Watermarking Java Programs. Reviewed

    Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koji Torii, Katsuro Inoue

    24th International Computer Software and Applications Conference (COMPSAC 2000), 25-28 October 2000, Taipei, Taiwan   191 - 197   2000

     More details

    Publisher:IEEE Computer Society  

    DOI: 10.1109/CMPSAC.2000.884716

    CiNii Article

    researchmap

  • Button selection for general GUIs using eye and hand together

    Masatake Yamato, Akito Monden, Ken ichi Matsumoto, Katsuro Inoue, Koji Torii

    Proceedings of the Workshop on Advanced Visual Interfaces   270 - 273   2000

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ACM  

    DOI: 10.1145/345513.345339

    Scopus

    researchmap

▼display all

Books

  • ソフトウェア開発データリポジトリの分析

    一般財団法人経済調査会  2015 

     More details

  • Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2012 (Studies in Computational Intelligence, Vol. 443)

    Springer  2012 

     More details

MISC

  • 第三者データを用いたソフトウェアバグ予測の確信度の推定に向けて

    北内 亮太, 稲吉 弘樹, 西浦 生成, 門田 暁人

    ソフトウェア工学の基礎31, ソフトウェア工学の基礎ワークショップFOSE2024   213 - 214   2024.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 戦略的計画タスクにおける経験が視線に与える影響の分析

    濱地 省吾, Zeynep Yücel, 門田 暁人

    情報処理学会研究報告,ユビキタスコンピューティングシステム(UBI)   2024-UBI-84 ( 17 )   1 - 8   2024.11

     More details

    Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Javaプログラムの解析による習熟度の測定に向けて

    奈良井 洸希, Ratthicha Parinthip, 稲吉 弘樹, Pattara Leelaprute

    ソフトウェア工学の基礎31, ソフトウェア工学の基礎ワークショップFOSE2024   215 - 216   2024.11

     More details

    Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Kotlinにおけるサイクロマティック数計測ツールの開発

    清水端 康佑, 稲吉 弘樹, 門田 暁人

    ソフトウェア工学の基礎31, ソフトウェア工学の基礎ワークショップFOSE2024   211 - 212   2024.11

     More details

    Authorship:Corresponding author   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Androidアプリが自動的に収集するデータの暗号化ラベルの実態調査

    桜庭 侑星, 稲吉 弘樹, 齋藤 彰一, 門田 暁人

    コンピュータセキュリティシンポジウム2024論文集   441 - 448   2024.10

     More details

    Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • データセーフティセクションに対応したテイントソースの自動識別に向けて

    稲吉 弘樹, 齋藤 彰一, 門田 暁人

    コンピュータセキュリティシンポジウム2024論文集   433 - 440   2024.10

     More details

    Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • ソフトウェアバグデータを対象とした例外ルール導出の試み

    青柳 宏, 稲吉 弘樹, 門田 暁人

    ソフトウェアエンジニアリングシンポジウム2024論文集   271 - 277   2024.9

     More details

    Authorship:Last author, Corresponding author   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 近代以前に西洋で日本をイメージして作られた音楽作品の分析

    河瀬 友佑, 稲吉 弘樹, 門田 暁人, 光平 有希

    情報処理学会研究報告,音楽情報科学研究会   2024-MUS-141 ( 13 )   1 - 6   2024.8

     More details

    Authorship:Corresponding author   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 小規模JavaScriptプロジェクトにおけるclass構文の使用実態の調査 Reviewed

    三澤 秀斗, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   105 - 110   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 情報システムの要求仕様書におけるあいまい語句の定量的分析

    中道 徹, 西浦 生成, 門田 暁人

    ソフトウェア工学の基礎ワークショップFOSE2023, ポスター発表   ( P15 )   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • BERTによるセキュリティバグの判別の試み Reviewed

    横山 大貴, 西浦 生成, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   197 - 198   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • テストケース作成におけるChatGPT利用の効果 Reviewed

    起塚 亮, 西浦 生成, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   195 - 196   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 高齢者の認知機能維持のためのコンピュータゲームの選定に向けて Reviewed

    河瀬 友佑, 西浦 生成, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   193 - 194   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • ChatGPTをSE役とした対話による要求獲得の試み Reviewed

    西窪 修広, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎30, ソフトウェア工学の基礎ワークショップFOSE2023   147 - 152   2023.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 提案依頼書におけるセキュリティ要件の分析 Reviewed

    村越 竜介, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェアエンジニアリングシンポジウム2023 (SES2023)   2023.8

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 考古学データベースに保存する画像データの加工を行うシステムの開発

    富田 洸, 笹倉 万里子, 門田 暁人

    情報処理学会第85回全国大会   ( 6ZK-01 )   2023.3

     More details

    Authorship:Last author   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • グローバーのアルゴリズムを題材とした学習支援システムの開発

    安永 翔斗, 門田 暁人, 笹倉 万里子

    情報処理学会第85回全国大会   ( 4ZF-03 )   2023.3

     More details

    Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • プログラミング教育における高校教員の支援方法の評価

    長尾 輝人, 笹倉 万里子, 門田 暁人

    情報処理学会研究報告, コンピュータと教育   2023-CE-169 ( 15 )   1 - 8   2023.3

     More details

    Authorship:Last author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • バーチャルリアリティ授業視聴システムの改良

    谷口 謙太, 笹倉 万里子, 門田 暁人

    情報処理学会研究報告, コンピュータと教育   2023-CE-169 ( 6 )   1 - 8   2023.3

     More details

    Authorship:Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Fault-proneモジュール予測における第三者データに基づいた外れ値除去 Reviewed

    西浦生成, 門田暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   153 - 158   2022.11

     More details

  • スマホゲームにおける課金誘導方法の調査研究 Reviewed

    麻生直希, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   241 - 242   2022.11

     More details

  • キーストロークとマウス操作に基づくプログラミング能力の分析 Reviewed

    松本和樹, 西浦生成, 笹倉万里子, 門田暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   165 - 170   2022.11

     More details

  • 提案依頼書におけるセキュリティ要件の実態調査 Reviewed

    村越 竜介, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   229 - 230   2022.11

     More details

  • 育成の観点を取り入れたプロジェクト管理ゲーム Reviewed

    山形 宥太, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   205 - 206   2022.11

     More details

  • ソフトウェア開発者の信頼度の評価に向けて Reviewed

    池田 海斗, 西浦 生成, 笹倉 万里子, 門田 暁人

    ソフトウェア工学の基礎29, ソフトウェア工学の基礎ワークショップFOSE2022   215 - 216   2022.10

     More details

  • データ断片からのソフトウェア開発データ復元の実験評価

    西脇将樹, 門田暁人, 笹倉万里子, 西浦生成

    信学技報   121 ( 416 )   60 - 65   2022.3

     More details

  • ソフトウェアテストの途中結果を用いたバグ予測

    廣瀬椋一, 門田暁人, 角田雅照, 笹倉万里子, 西浦生成

    信学技報   121 ( 416 )   19 - 24   2022.3

     More details

  • From Academia to Software Development: Publication Citations in Source Code Comments

    Akira Inokuchi, Yusuf Sulistyo Nugroho, Fumiaki Konishi, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    2019.10

     More details

    Publishing type:Internal/External technical report, pre-print, etc.  

    Academic publications have been evaluated with the impact on research<br />
    communities based on the number of citations. On the other hand, the impact of<br />
    academic publications on industry has been rarely studied. This paper<br />
    investigates how academic publications contribute to software development by<br />
    analyzing publication citations in source code comments in open source software<br />
    repositories. We propose an automated approach of detecting academic<br />
    publications based on Named Entity Recognition, and achieve 0.90 in $F_1$ as<br />
    detection accuracy. We conduct a large-scale study of publication citations<br />
    with 319,438,977 comments collected from active 25,925 repositories written in<br />
    seven programming languages. Our findings indicate that academic publications<br />
    can be knowledge sources of software development, and there can be potential<br />
    issues of obsoleting knowledge.

    arXiv

    researchmap

  • Estimation of affect scores accounting for user responsiveness

    NGUYEN Hoang, KOYAMA Serina, YUCEL Zeynep, MONDEN Akito, SASAKURA Mariko

    日本ロボット学会学術講演会予稿集(CD-ROM)   36th   ROMBUNNO.1I2‐01   2018.9

     More details

    Language:English  

    J-GLOBAL

    researchmap

  • Impact of the Distribution Parameter of Data Sampling Approaches on Software Defect Prediction Models

    Kwabena Ebo Bennin, Jacky Keung, Akito Monden

    Proceedings - Asia-Pacific Software Engineering Conference, APSEC   2017-   630 - 635   2018.3

     More details

    Language:English   Publisher:IEEE Computer Society  

    DOI: 10.1109/APSEC.2017.76

    Scopus

    researchmap

  • An Attempt to Bug Report Classification using N-Gram IDF

    2018   34 - 35   2018.1

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • MAHAKIL: Diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction

    Kwabena Ebo Bennin, Jacky Keung, Passakorn Phannachitta, Akito Monden, Solomon Mensah

    Proc. 40th International Conference on Software Engineering, Journal First Paper   699 - 699   2018

     More details

  • Predictability Classification for Software Effort Estimation

    Naoki Kinoshita, Akito Monden, Masateru Tsunoda, Zeynep Yucel

    2018 IEEE/ACIS 3RD INTERNATIONAL CONFERENCE ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (BCD 2018)   43 - 48   2018

     More details

  • Extended Association Rule Mining with Correlation Functions

    Hidekazu Saito, Akito Monden, Zeynep Yucel

    2018 IEEE/ACIS 3RD INTERNATIONAL CONFERENCE ON BIG DATA, CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (BCD 2018)   79 - 84   2018

     More details

  • Should duration and team size be used for effort estimation?

    Takeshi Kakimoto, Masateru Tsunoda, Akito Monden

    Studies in Computational Intelligence   721   91 - 105   2018

     More details

    Language:English   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-62048-0_7

    Scopus

    researchmap

  • Evaluating algorithmic thinking ability of primary schoolchildren who learn computer programming

    Hidekuni Tsukamoto, Yasumasa Oomori, Hideo Nagumo, Yasuhiro Takemura, Akito Monden, Ken ichi Matsumoto

    Proceedings - Frontiers in Education Conference, FIE   2017-October   1 - 8   2017.12

  • The Significant Effects of Data Sampling Approaches on Software Defect Prioritization and Classification

    Kwabena Ebo Bennin, Jacky Keung, Akito Monden, Passakorn Phannachitta, Solomon Mensah

    International Symposium on Empirical Software Engineering and Measurement   2017-   364 - 373   2017.12

     More details

    Language:English   Publisher:IEEE Computer Society  

    DOI: 10.1109/ESEM.2017.50

    Scopus

    researchmap

  • Calibration of distributed multimodal sensor networks using cross‐correlation of arrival processes

    SUPITAYAKUL Parisa, YUCEL Zeynep, ZANLUNGO Francesco, MONDEN Akito, LEELAPRUTE Pattara

    日本ロボット学会学術講演会予稿集(CD-ROM)   35th   ROMBUNNO.1C3‐05   2017.9

     More details

    Language:English  

    J-GLOBAL

    researchmap

  • Analyzing Unreasonable Demands in Request For Proposals of Software Development

    116 ( 426 )   95 - 100   2017.1

     More details

  • Experimental Evaluation of Cross-Project Bug Prediction

    116 ( 426 )   101 - 106   2017.1

     More details

  • Analyzing Required Software Engineering Skills in Software Job Ads

    116 ( 426 )   89 - 94   2017.1

     More details

  • COCOMO IIをベースとした工数見積りモデルの研究

    大岩 佐和子, 押野 智樹, 門田 暁人, 松本 健一

    プロジェクトマネジメント学会誌   19 ( 4 )   53 - 58   2017

     More details

    Language:Japanese   Publisher:プロジェクトマネジメント学会  

    CiNii Article

    CiNii Books

    researchmap

  • An Attempt to Statement-level Software Bug Prediction

    Fukutani, K, Monden, A, Yucel, Z, Hata, H

    Proceedings of Fundamentals of Software Engineering, FOSE 2017   2017

     More details

  • Software Reuse Detection Focusing on Strings in Binary Code

    116 ( 277 )   79 - 84   2016.10

     More details

  • Software Bug Analysis Based on Archetypal Analysis

    瀧本恵介, 門田暁人, 尾上紗野, 畑秀明, 亀井靖高

    電子情報通信学会技術研究報告   116 ( 277(SS2016 18-35) )   91‐96   2016.10

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Software Reuse Detection Using Binary Program Compression

    上村康輔, 門田暁人, 畑秀明, 松本健一

    電子情報通信学会技術研究報告   116 ( 277(SS2016 18-35) )   85‐90   2016.10

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Unsupervised Bug Report Categorization Using Clustering and Labeling Algorithm

    Nachai Limsettho, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING   26 ( 7 )   1027 - 1053   2016.9

     More details

  • Investigating and Projecting Population Structures in Open Source Software Projects: A Case Study of Projects in GitHub

    Saya Onoue, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E99D ( 5 )   1304 - 1315   2016.5

     More details

  • LSA-X: Exploiting Productivity Factors in Linear Size Adaptation for Analogy-Based Software Effort Estimation

    Passakorn Phannachitta, Akito Monden, Jacky Keung, Kenichi Matsumoto

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E99D ( 1 )   151 - 162   2016.1

     More details

  • Filter-INC: Handling Effort-Inconsistency in Software Effort Estimation Datasets

    Passakorn Phannachitta, Jacky Keung, Kwabena Ebo Bennin, Akito Monden, Kenichi Matsumoto

    2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016)   185 - 192   2016

     More details

  • Task purpose estimation in software development based on automatic measurement data and machine learning

    Ohashi, R., Matsumoto, K., Uwano, H., Monden, A., Araki, K., Yamada, K.

    Computer Software   33 ( 2 )   139 - 150   2016

  • 自動計測データと機械学習に基づくソフトウェア開発の作業目的の推定

    大橋亮太, 上野秀剛, 門田暁人, 荒木健史, 山田欣吾, 松本健一

    コンピュータソフトウェア   33 ( 2 )   139 - 150   2016

  • Measuring difficulty of program comprehension based on brain activation

    Takao Nakagawa, Ysutaka Kamei, Hidetake Uwano, Akito Monden, Naoyasu Ubayashi, Kenichi Matsumoto

    Computer Software   33 ( 2 )   78 - 89   2016

  • 脳活動に基づくプログラム理解の困難さ測定

    中川尊雄, 亀井靖高, 上野秀剛, 門田暁人, 鵜林尚靖, 松本健一

    コンピュータソフトウェア   33 ( 2 )   78 - 89   2016

  • Investigating the Effects of Balanced Training and Testing Datasets on Effort-Aware Fault Prediction Models

    Kwabena Ebo Bennin, Jacky Keung, Akito Monden, Yasutaka Kamei, Naoyasu Ubayashi

    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1   154 - 163   2016

     More details

  • Identifying Recurring Association Rules in Software Defect Prediction

    Takashi Watanabe, Akito Monden, Yasutaka Kamei, Shuji Morisaki

    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS)   861 - 866   2016

     More details

  • A Fuzzy Hashing Technique for Large Scale Software Birthmarks

    Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada, Akito Monden

    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS)   867 - 872   2016

     More details

  • Analysis of Information System Operation Cost Based on Working Time and Unit Cost

    Masateru Tsunoda, Kenichi Matsumoto, Akito Monden, Sawako Ohiwa, Tomoki Oshino

    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS)   837 - 842   2016

     More details

  • Influence of Outliers on Analogy Based Software Development Effort Estimation

    Kenichi Ono, Akito Monden, Masateru Tsunoda, Kenichi Matsumoto

    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS)   849 - 854   2016

     More details

  • ソフトウェアテストにおける静的解析ツールの段階的適用による不具合修正工数の更なる低減 ―民生用音響・映像機器向け組み込みソフトウェア開発へのQACの段階的適用とその実証評価―

    鶴田雅明, 大平雅雄, 門田暁人, 松本健一

    情報社会学会誌   11 ( 1 )   5 - 16   2016

     More details

  • Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction Models

    Kwabena Ebo Bennin, Koji Toda, Yasutaka Kamei, Jacky Keung, Akito Monden, Naoyasu Ubayashi

    2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2016)   214 - 221   2016

     More details

  • Textual vs. Visual Programming Languages in Programming Education for Primary Schoolchildren

    Hidekuni Tsukamoto, Yasuhiro Takemura, Yasumasa Oomori, Isamu Ikeda, Hideo Nagumo, Akito Monden, Ken-ichi Matsumoto

    2016 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE)   1 - 7   2016

     More details

  • Erratum: Investigating and Projecting Population Structures in Open Source Software Projects: A Case Study of Projects in GitHub [IEICE Transactions on Information and Systems Vol.E99.D (2016) , No.5 pp.1304-1315]

    ONOUE Saya, HATA Hideaki, MONDEN Akito, MATSUMOTO Kenichi

    IEICE Transactions on Information and Systems   99 ( 7 )   1961 - 1961   2016

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    DOI: 10.1587/transinf.2016EDe0002

    CiNii Article

    researchmap

  • Pinpointing and hiding surprising fragments in an obfuscated program

    Yuichiro Kanzaki, Clark Thomborson, Akito Monden, Christian Collberg

    ACM International Conference Proceeding Series   08-   8:1-8:9   2015.12

     More details

    Language:English   Publisher:Association for Computing Machinery  

    DOI: 10.1145/2843859.2843862

    Scopus

    researchmap

  • Extracting Typical Projects in a Software Project Data Set

    川下正宏, 門田暁人, 畑秀明

    情報処理学会研究報告(Web)   2015 ( SE-190 )   VOL.2015‐SE‐190,NO.8 (WEB ONLY)   2015.12

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • プログラミング初学者のためのソースコード再利用支援

    藤原新, 畑秀明, 門田暁人, 松本健一

    情報処理学会研究報告(Web)   2015 ( SE-190 )   VOL.2015‐SE‐190,NO.16 (WEB ONLY)   2015.12

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Reducing the cost of debugging through progressive use of static code analysis tools

    Masaaki Tsuruta, Akito Monden, Kenichi Matsumoto

    Proc. International Conference on Project Management (ProMAC2015)   2015

     More details

  • Predicting faults after unit testing using design phase metrics in embedded software development

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto

    11 ( 2 )   16 - 23   2015

     More details

  • Bug Report Recommendation for Code Inspection

    Shin Fujiwara, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    2015 IEEE 1ST INTERNATIONAL WORKSHOP ON SOFTWARE ANALYTICS (SWAN)   9 - 12   2015

     More details

  • Programming Education for Primary Schoolchildren Using a Textual Programming Language

    Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Isamu Ikeda, Akito Monden, Ken-ichi Matsumoto

    FRONTIERS IN EDUCATION CONFERENCE (FIE), 2015   1008 - 1014   2015

     More details

  • 著作権守る電子透かし

    門田暁人

    読売新聞奈良版 寄稿連載「ドキ★ワク先端科学」   2015

     More details

  • Case consistency: A necessary data quality property for software engineering data sets

    Passakorn Phannachitta, Akito Monden, Jacky Keung, Kenichi Matsumoto

    Proc. 19th International Conference on Evaluation and Assessment in Software Engineering (EASE2015)   19:1-19:10   2015

  • Code Artificiality: A Metric for the Code Stealth Based on an N-gram Model

    Yuichiro Kanzaki, Akito Monden, Christian Collberg

    2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE PROTECTION (SPRO)   31 - 37   2015

     More details

  • Benchmarking Software Maintenance Based on Working Time

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino

    3RD INTERNATIONAL CONFERENCE ON APPLIED COMPUTING AND INFORMATION TECHNOLOGY (ACIT 2015) 2ND INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND INTELLIGENCE (CSI 2015)   20 - 27   2015

     More details

  • Predicting Faults After Unit Testing Using Design Phase Metrics in Embedded Software Development

    SEC journal   11 ( 2 )   16 - 23   2015

     More details

  • Quantifying the Evolution of Open Source Software Focusing on Code Clone and Used Libraries

    若林洸太, 門田暁人, 伊原彰紀, 玉田春昭

    情報処理学会研究報告(Web)   2015 ( SE-190 )   2015

  • Scaling up analogy-based software effort estimation: A Comparison of multiple hadoop implementation schemes

    Passakorn Phannachitta, Jacky Keung, Akito Monden, Kenichi Matsumoto

    International Workshop on Innovative Software Development Methodologies and Practices, InnoSWDev 2014 - Proceedings   65 - 72   2014.11

     More details

    Language:English   Publisher:Association for Computing Machinery, Inc  

    DOI: 10.1145/2666581.2666582

    Scopus

    researchmap

  • 作業時間と単価に基づくシステム運用費用の分析

    角田雅照, 門田暁人, 松本健一, 大岩佐和子, 押野智樹

    研究報告ソフトウェア工学(SE)   2014 ( 12 )   1 - 7   2014.11

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    近年,情報システムの規模の増大や,システム運用の外部委託の進展に伴い,システム運用に関する注目が高まっている.システム運用費用が妥当であるかどうかは,システム運用の委託側企業にとって判断が難しい.本稿では,委託側企業がシステム運用費用の妥当性判断の参考となるような情報の提供を目指し,システム運用費用に影響を与える要因の分析を行った.受託側の作業時間と運用費用は非常に関連が強いため,受託側作業時間を把握することができれば,標準的な運用費用を推定することができる.ただし,受託側作業時間を委託側企業が把握することは一般に容易ではない.そこで本稿では,作業時間と技術者の単価から簡易的に価格を推定することを前提とし,作業時間と単価に影響する要因を個別に分析した.その結果,作業時間はプログラム本数と最大利用者数から決まることや,ネットワーク範囲が狭い場合,単価が低くなる傾向があることがわかった.

    CiNii Article

    CiNii Books

    researchmap

  • 自主研究 システム運用費用に影響を与える要因の分析

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 15 )   55 - 64   2014.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • 故障モジュール中の欠陥メソッド特定

    畑 秀明, 門田 暁人, 松本 健一

    ソフトウェアエンジニアリングシンポジウム2014論文集   2014 ( 2014 )   131 - 136   2014.8

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • 作業時間に基づくソフトウェア保守ベンチマーキングの試み (ソフトウェアサイエンス)

    角田 雅照, 門田 暁人, 松本 健一, 大岩 佐和子, 押野 智樹

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報   114 ( 127 )   17 - 23   2014.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    近年,受託開発ソフトウェアは新規の開発が頭打ちの状況に対して,開発済みのソフトウェア資産が増えることに伴い保守の比率が高まり,保守の重要性が高まっている.このため,保守単独で契約を結ぶ場合もある.保守とは,単にソフトウェア出荷後に発見された欠陥を除去することだけを指すのではない.ソフトウェアは利用されているうちに,ビジネス環境の変化により,機能の拡張,修正が必要となる.保守とはそれらの修正も含んだ概念である.本研究では,ソフトウェア保守における作業効率のベンチマークを確立することを試みる.ベンチマークを確立するためには,複数の組織から収集されたプロジェクトのデータ,すなわち企業横断的データを用いて,作業効率に影響する特性を明らかにする必要がある.本研究では,企業横断的データとして,一般財団法人経済調査会によって平成24年度に収集された134件の事例を用い,作業効率に影響する要因を分析した.作業効率は修正実施プログラム本数÷作業時間数と定義した.分析では,ベンチマーキングのために,箱ひげ図により各特性の作業効率の分布を示すとともに,開発言語がJavaであるかどうか,ツールの制約が強いかどうかが作業効率に影響することを示した.

    CiNii Article

    CiNii Books

    researchmap

  • 作業時間に基づくソフトウェア保守ベンチマーキングの試み

    角田雅照, 門田暁人, 松本健一, 大岩佐和子, 押野智樹

    研究報告ソフトウェア工学(SE)   2014 ( 3 )   1 - 7   2014.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    近年,受託開発ソフトウェアは新規の開発が頭打ちの状況に対して,開発済みのソフトウェア資産が増えることに伴い保守の比率が高まり,保守の重要性が高まっている.このため,保守単独で契約を結ぶ場合もある.保守とは,単にソフトウェア出荷後に発見された欠陥を除去することだけを指すのではない.ソフトウェアは利用されているうちに,ビジネス環境の変化により,機能の拡張,修正が必要となる.保守とはそれらの修正も含んだ概念である.本研究では,ソフトウェア保守における作業効率のベンチマークを確立することを試みる.ベンチマークを確立するためには,複数の組織から収集されたプロジェクトのデータ,すなわち企業横断的データを用いて,作業効率に影響する特性を明らかにする必要がある.本研究では,企業横断的データとして,一般財団法人経済調査会によって平成 24 年度に収集された 134 件の事例を用い,作業効率に影響する要因を分析した.作業効率は修正実施プログラム本数 ÷ 作業時間数と定義した.分析では,ベンチマーキングのために,箱ひげ図により各特性の作業効率の分布を示すとともに,開発言語が Java であるかどうか,ツールの制約が強いかどうかが作業効率に影響することを示した.

    CiNii Article

    CiNii Books

    researchmap

  • 作業履歴中の主要な作業に着目した作業目的予測

    大橋亮太, 上野秀剛, 門田暁人

    研究報告ソフトウェア工学(SE)   2014 ( 22 )   1 - 8   2014.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    本稿はソフトウェア開発者の能力向上・プロセス改善手法である PSP における作業履歴の記録と作業目的に基づいた履歴の分析を支援するために,作業者の作業履歴から作業目的を予測する手法を提案する.提案手法は作業目的が頻繁に変化しないという仮説の元,予測対象となる作業 (Task) の前後に行われた作業の特性から作業目的 (Aim) を推定する.連続する Task のうち,打鍵数やクリック数が多い Task をその Aim における主要 Task とし,特性として使用する.RandomForest による予測モデルを構築し実験した結果,提案手法は時系列情報を用いない場合に比べ,高い精度で作業を予測できた.特に,前後の作業を多く見るほど予測精度の向上が見られた.

    CiNii Article

    CiNii Books

    researchmap

  • Characterizing Defects Found in Code Review

    2014   95 - 96   2014.1

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Prediction of the Change of Learners' Motivation in Programming Education for Non-Computing Majors

    Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Akito Monden, Ken-ichi Matsumoto

    2014 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE)   1 - 7   2014

     More details

  • Evaluation of request for proposal (RFP) focusing on non-functional requirements

    Yasuhiro Saito, Akito Monden, Kenichi Matsumoto

    SEC journal   10 ( 3 )   30 - 37   2014

     More details

  • コードの「不自然さ」に基づくソフトウェア保護機構のステルシネス評価

    神﨑 雄一郎, 尾上 栄浩, 門田 暁人

    情報処理学会論文誌   55 ( 2 )   1005 - 1015   2014

     More details

  • Software Effort Estimation Models Incorporating Expert Judgment

    55 ( 2 )   994 - 1004   2014

     More details

  • Simulation of effort allocation strategies in software testing using bug module prediction

    Daisuke Nakano, Akito Monden, Yasutaka Kamei, Kenichi Matsumoto

    Computer Software   31 ( 2 )   118 - 128   2014

  • Industry Questions About Open Source Software in Business: Research Directions and Potential Answers

    Akinori Ihara, Akito Monden, Ken-ichi Matsumoto

    2014 6TH INTERNATIONAL WORKSHOP ON EMPIRICAL SOFTWARE ENGINEERING IN PRACTICE (IWESEP 2014)   55 - 59   2014

     More details

  • Automatic Unsupervised Bug Report Categorization

    Nachai Limsettho, Hideaki Hata, Akito Monden, Kenichi Matsumoto

    2014 6TH INTERNATIONAL WORKSHOP ON EMPIRICAL SOFTWARE ENGINEERING IN PRACTICE (IWESEP 2014)   7 - 12   2014

     More details

  • バグモジュール予測を用いたテスト工数割り当て戦略のシミュレーション

    中野 大輔, 門田 暁人, 亀井 靖高, 松本 健一

    コンピュータ ソフトウェア   31 ( 2 )   118 - 128   2014

  • Quantifying Programmers' Mental Workload during Program Comprehension Based on Cerebral Blood Flow Measurement: A Controlled Experiment

    Takao Nakagawa, Yasutaka Kamei, Hidetake Uwano, Akito Monden, Kenichi Matsumoto, Daniel M. German

    36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014)   448 - 451   2014

     More details

  • On measuring the difficulty of program comprehension based on cerebral blood flow

    Takao Nakagawa, Yasutaka Kamei, Hidetake Uwano, Akito Monden, Kenichi Matsumoto

    Computer Software   31 ( 3 )   270 - 276   2014

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    In this research, we aim to quantify the difficulty of program comprehension during source code reading. We use Near Infra-Red Spectroscopy(NIRS) to measure the activation of brain. As a result of an experiment with 10 subjects, 8 of them showed a strong activation in the brain during reading of strongly obfuscated programs that are extremely difficult to comprehend. We also normalized the data for each participant and aggregated them for statistical testing. As a result of t-test, significant difference (p < 0.001) was seen in the mean of the brain blood flow between obfuscated and non-obfuscated programs.

    DOI: 10.11309/jssst.31.3_270

    CiNii Article

    researchmap

  • On Measuring the Difficulty of Program Comprehension based on Cerebral Blood Flow

    NAKAGAWA Takao, KAMEI Yasutaka, UWANO Hidetake, MONDEN Akito, MATSUMOTO Ken-ichi

    Computer Software   31 ( 3 )   270 - 276   2014

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    In this research, we aim to quantify the difficulty of program comprehension during source code reading. We use Near Infra-Red Spectroscopy(NIRS) to measure the activation of brain. As a result of an experiment with 10 subjects, 8 of them showed a strong activation in the brain during reading of strongly obfuscated programs that are extremely difficult to comprehend. We also normalized the data for each participant and aggregated them for statistical testing. As a result of t-test, significant difference (p < 0.001) was seen in the mean of the brain blood flow between obfuscated and non-obfuscated programs.

    DOI: 10.11309/jssst.31.3_270

    CiNii Article

    researchmap

  • Evaluation of Request For Proposal (RFP) Focusing on Non-Functional Requirements

    SEC journal   10 ( 3 )   30 - 37   2014

     More details

  • Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing

    Akito Monden, Takuma Hayashi, Shoji Shinoda, Kumiko Shirai, Junichi Yoshida, Mike Barker, Kenichi Matsumoto

    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING   39 ( 10 )   1345 - 1357   2013.10

     More details

  • 学習データの時間的変化に伴う欠陥モジュール予測モデルの評価

    内垣聖史, 伊原彰紀, 門田暁人, 松本健一

    ソフトウェアエンジニアリングシンポジウム2013論文集   2013   1 - 2   2013.9

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • 自主研究 ソフトウェア保守改善に向けたデータ分析

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 13 )   100 - 110   2013.9

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • 開発要員数とその誤差を考慮した工数見積もり方法

    角田雅照, 門田暁人, 松本健一

    研究報告ソフトウェア工学(SE)   2013 ( 7 )   1 - 6   2013.7

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    数学的モデルに基づく工数見積もりでは,開発するソフトウェアの規模と生産性要因を説明変数として工数を見積もる.いくつかの先行研究では,開発要員数が工数見積もりモデルの説明変数として用いられている.要員数はプロジェクトの生産性との関連が強いことが指摘されており,要員数を説明変数として用いることにより,モデルの見積もり精度向上が期待できる.ただし,工数見積もり時における要員数は見積もり値であり,実績の要員数との誤差が生じることにより見積もり精度が低下する可能性がある.そこで本稿では要員数を用いた新たな見積もり方法を提案する.提案方法では,要員数が過去プロジェクト平均と比較して非常に小さいと見積もられた場合,要員数が小さいことを前提とするモデルを用いる.逆に,要員数が非常に大きいと見積もられた場合,要員数が大きいことを前提とするモデルを用いる.これらに当てはまらない場合,要員数を説明変数に含まないモデルを用いて工数を見積もる.評価実験において,要員数の誤差を実験的に変化させ,提案方法の見積もり精度を評価した.その結果,提案方法は要員数の誤差に対してロバストであり,特に要員数の誤差が不明な場合や誤差が大きい場合に有効に働くことがわかった.

    CiNii Article

    CiNii Books

    researchmap

  • OSS開発におけるコミッターによる協調作業の一考察

    林宏徳, 伊原彰紀, 門田暁人, 松本健一

    研究報告セキュリティ心理学とトラスト(SPT)   2013 ( 6 )   1 - 4   2013.5

     More details

    Language:Japanese  

    昨今,ソフトウェア開発のコスト削減を目的として,商用ソフトウェアの一部にオープンソースソフトウェア (OSS) を利用する企業が増加している.OSS 導入時には,対象プロジェクトのリリース後における保守体制を理解することが重要であり,OSS 開発の不具合修正プロセスを分析する研究が進んでいる.不具合修正プロセス中のコミッターによるレビュー作業は,ソフトウェアをリリースする直前の作業であり,ソフトウェアの品質に最も影響を与える.したがって,コミッターの不十分なレビュー作業は開発の手戻り (再修正) を引き起こし作業効率の低下に繋がる.そこで本稿はコミッターのレビュー作業による OSS 品質への影響について考察する.

    CiNii Article

    CiNii Books

    researchmap

  • Evaluation of RFPs Based on Machine Learning

    2013 ( 5 )   1 - 7   2013.3

     More details

  • Module Classification and Selection for Software Fault Prediction

    MORI Makoto, MONDEN Akito, KAMEI Yasutaka, MATSUMOTO Ken-ichi

    Technical report of IEICE. KBSE   112 ( 419 )   59 - 64   2013.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    To prioritize testing effort, it is important to predict fault-prone modules that are likely to contain a fault To build a better fault-prone module prediction model, This paper proposes two methods (module classifica-tion and module selection) to produce a fit dataset (for model building) that has smulai aspects to the prediction target dataset so that resultant model may have a good prediction performance when it is applied to the target dataset By using Eclipse dataset, we experimentally evaluate the proposed methods.

    CiNii Article

    CiNii Books

    researchmap

  • Industry Application of Research Findings from Mining Software Repositories

    2013   21 - 22   2013.1

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Mining Software Repositories

    MONDEN Akito, IHARA Akinori, MATSUMOTO Kenichi

    Computer Software   30 ( 2 )   52 - 65   2013

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    The Mining Software Repositories (MSR) is an attractive research field that has tons of research topics. It is great fun for a researcher to mine new research goals from software repositories. The MSR field has been grown up with OSS communities, as researchers have mined repositories of various open source software (OSS) projects until now. In this paper we introduce fun of the MSR field as well as its typical research topics, example of mining and future directions.

    DOI: 10.11309/jssst.30.2_52

    CiNii Article

    CiNii Books

    researchmap

    Other Link: https://jlc.jst.go.jp/DN/JALC/10022631052?from=CiNii

  • An instruction folding method to prevent reverse engineering in java platform

    Tetsuya Ohdo, Haruaki Tamada, Yuichiro Kanzaki, Akito Monden

    SNPD 2013 - 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing   517 - 522   2013

     More details

  • 11種類のfault密度予測モデルの実証的評価

    小林 寛武, 戸田 航史, 亀井 靖高, 門田 暁人, 峯 恒憲, 鵜林 尚靖

    電子情報通信学会論文誌D   J96-D ( 8 )   1892 - 1902   2013

     More details

  • Evaluation of Software Obfuscation Based on the Randomness of Instructions.

    Ami Futamura, Akito Monden, Haruaki Tamada, Yuichiro Kanzaki, Masahide Nakamura, Kenichi Matsumoto

    Computer Software   30 ( 3 )   18 - 24   2013

     More details

  • Hybrid Effort Estimation based on Multivariate Liner Regression and Analogy based Estimation

    TODA Koji, TSUNODA Masateru, MONDEN Akito, MATSUMOTO Kenichi

    Computer Software   30 ( 2 )   227 - 233   2013

     More details

    Language:Japanese   Publisher:Japan Society for Software Science and Technology  

    We propose a hybrid effort estimation method based on the multivariate liner regression analysis and the analogy based estimation method (ABE). First, our method calculates the unreliability index of ABE on an estimation target project. Next, our method selects log-log regression estimation when the value of the index is low. Otherwise our method selects ABE estimation or combined estimation (the average of ABE and log-log regression estimation). In the experiment, we compared estimation accuracies of our method with conventional methods, and the results showed that the median of Balanced Relative Error (estimation accuracy index) was improved from 47.2% to 39.7%, when the variance of similar projects' effort was used as the reliability index.

    DOI: 10.11309/jssst.30.2_227

    CiNii Article

    researchmap

  • Why is collaboration needed in OSS projects? A case study of eclipse project

    Hironori Hayashi, Akinori Ihara, Akito Monden, Ken-Ichi Matsumoto

    2013 5th International Workshop on Social Software Engineering, SSE 2013 - Proceedings   17 - 20   2013

     More details

  • The Effects of Teaching Material Remediation with ARCS-Strategies for Programming Education

    Hidekuni Tsukamoto, Yasubiro Takemura, Hideo Nagumo, Akito Monden, Ken-ichi Matsumoto

    2013 IEEE FRONTIERS IN EDUCATION CONFERENCE   717 - 723   2013

     More details

  • ARCS動機づけ方略と統計的検定に基づくプログラミング教材の改善とその評価

    塚本英邦, 南雲秀雄, 門田暁人, 松本健一

    日本産業技術教育学会誌   55 ( 4 )   307 - 315   2013

     More details

  • Patch Reviewer Recommendation in OSS Projects

    John Boaz Lee, Akinori Ihara, Akito Monden, Ken-ichi Matsumoto

    2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 2   2   1 - 6   2013

     More details

  • Improving Analogy-based Software Cost Estimation through Probabilistic-based Similarity Measures

    Passakorn Phannachitta, Jacky Keung, Akito Monden, Ken-Ichi Matsumoto

    2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1   541 - 546   2013

     More details

  • Discussion of A Method for Redundancy to Invoke Tasks and A Method To Keep A Priority Order for Dispatching A Task in the Embedded RTOS

    平井勝彦, 伊原彰紀, 門田暁人, 松本健一

    情報処理学会研究報告(CD-ROM)   2012 ( 6 )   2013

  • OSS開発における一般開発者の協調作業と不具合の再修正に関する一考察

    林宏徳, 伊原彰紀, 門田暁人, 松本健一

    情報処理学会シンポジウムシリーズ(CD-ROM)   2013 ( 2 )   2013

  • OSS開発におけるコミッターによる協調作業の一考察

    林宏徳, 伊原彰紀, 門田暁人, 松本健一

    電子情報通信学会技術研究報告   113 ( 43(LOIS2013 1-5) )   2013

  • Customizing GQM Models for Software Project Monitoring

    Akito Monden, Tomoko Matsumura, Mike Barker, Koji Torii, Victor R. Basili

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS   E95D ( 9 )   2169 - 2182   2012.9

     More details

  • An Attempt of Software Effort Prediction using Multivariate Log-log Regression by Random Sampling of Explanatory Variables

    小西 文章, 内田 眞司, 戸田 航史, 門田 暁人

    研究報告ソフトウェア工学(SE)   2012 ( 2 )   1 - 8   2012.3

     More details

    Language:Japanese  

    ソフトウェア開発における工数予測は,プロジェクト完遂に必要な人的資源やスケジュール管理を行う上で重要である.工数予測手法には,過去のソフトウェア開発プロジェクトの実績データに基づいて,工数予測モデルを構築する手法がある.我々は,工数予測モデルの中で広く用いられている対数重回帰分析によるモデル (対数重回帰モデル) に着目した.対数重回帰モデルは,オーバーフィッティングが発生する可能性があるという問題がある.そこで本稿では,オーバーフィッティングに考慮した説明変数のランダムサンプリングを用いた対数重回帰モデルによるソフトウェア開発工数予測手法を提案する.Effort estimation is important for project managers in controlling human resources in a software project. There is the method which builds an effort estimation model based on software measurement data. We focused the model by multivariate log-log regression analysis, multivariate log-log regression model that is widely used to predict effort. Multivariate log-log regression model have the annoying problem of over-fitting. In this paper, We propose the technique of performing effort prediction using multivariate log-log regression model which takes the problem of over-fitting into consideration.

    CiNii Article

    CiNii Books

    researchmap

  • Elicitation and Analysis of Maintenance and Operation Metrics for Request For Proposal(RFP)

    2012 ( 1 )   1 - 10   2012.3

     More details

  • 受託開発ソフトウェアの保守における作業効率の要因

    角田 雅照, 門田 暁人, 松本 健一, 押野 智樹

    コンピュータ ソフトウェア   29 ( 3 )   157 - 163   2012

  • Evaluation of Non Functional Requirements in a Request For Proposal (RFP)

    Yasuhiro Saito, Akito Monden, Kenichi Matsumoto

    PROCEEDINGS OF THE 2012 JOINT CONFERENCE OF THE 22ND INTERNATIONAL WORKSHOP ON SOFTWARE MEASUREMENT AND THE 2012 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE PROCESS AND PRODUCT MEASUREMENT (IWSM-MENSURA 2012)   106 - 111   2012

     More details

  • Program Encryption Based on the Execution Time

    Hideshi Sakaguchi, Yuichiro Kanzaki, Akito Monden

    Proc. International Symposium on Technology for Sustainability (ISTS2012)   188 - 191   2012

     More details

  • A Heuristic Rule Reduction Approach to Software Fault-proneness Prediction

    Akito Monden, Jacky Keung, Shuji Morisaki, Yasutaka Kamei, Ken-ichi Matsumoto

    2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1   838 - 847   2012

     More details

  • Incorporating Expert Judgment into Regression Models of Software Effort Estimation

    Masateru Tsunoda, Akito Monden, Jacky Keung, Kenichi Matsumoto

    2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), VOL 1   374 - 379   2012

     More details

  • An Investigation on Software Bug-Fix Prediction for Open Source Software Projects-A Case Study on the Eclipse Project

    Akinori Ihara, Yasutaka Kamei, Akito Monden, Masao Ohira, Jacky Wai Keung, Naoyasu Ubayashi, Ken-ichi Matsumoto

    2012 19TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE WORKSHOPS (APSECW), VOL. 2   2   112 - 119   2012

     More details

  • 生産性に基づくソフトウェア開発工数予測モデル

    門田 暁人, 松本 健一, 大岩 佐和子, 押野 智樹

    経済調査研究レビュー   11 ( 11 )   32 - 37   2012

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Handling Categorical Variables in Effort Estimation

    Masateru Tsunoda, Sousuke Amasaki, Akito Monden

    PROCEEDINGS OF THE ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM'12)   99 - 102   2012

     More details

  • Analysis of attributes relating to custom software price

    Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino

    Proceedings - 2012 4th International Workshop on Empirical Software Engineering in Practice, IWESEP 2012   16 - 22   2012

     More details

  • An ensemble approach of simple regression models to cross-project fault prediction

    Satoshi Uchigaki, Shinji Uchida, Koji Toda, Akito Monden

    Proceedings - 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012   476 - 481   2012

     More details

  • ソフトウェア開発プロジェクトをまたがるfault-proneモジュール判別の試み - 18プロジェクトの実験から得た教訓

    藏本 達也, 亀井 靖高, 門田 暁人, 松本 健一

    電子情報通信学会論文誌D   J95-D ( 3 )   425 - 436   2012

     More details

  • 類似性に基づくソフトウェア開発工数見積もりにおける外れ値除去法の比較

    角田 雅照, 門田 暁人, 渡邊 瑞穂, 柿元 健, 松本 健一

    電子情報通信学会論文誌 D   J95-D ( 4 )   895 - 908   2012

     More details

  • An empirical evaluation of outlier deletion methods for analogy-based cost estimation Reviewed

    Masateru Tsunoda, Akito Monden, Takeshi Kakimoto, Ken-ichi Matsumoto

    Proceedings of the 7th International Conference on Predictive Models in Software Engineering   17   1 - 10   2011.9

     More details

    Language:English  

    CiNii Article

    researchmap

  • Reduction of Association Rules for Fault-prone Module Detection

    2011 ( 20 )   1 - 6   2011.3

  • D-3-4 An Approach of Software Development Effort Estimation by Random Forests

    Konishi Fumiaki, Uchida Shinji, Toda Koji, Monden Akito

    Proceedings of the IEICE General Conference   2011 ( 1 )   2011.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    researchmap

  • B-18-2 A Study on Test Case Allocation by Fault-prone Module Detection

    Hayashi Takuma, Shinoda Shoji, Shirai Kumiko, Yoshida Junichi, Monden Akito, Matsumoto Kenichi

    Proceedings of the Society Conference of IEICE   2   406 - 406   2011

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Applying Outlier Deletion to Analosgy Based Cost Estimation Reviewed

    Masateru Tsunoda, Akito Monden, Mizuho Watanabe, Takeshi Kakimoto, Ken-ichi Matsumoto

    In Proceedings of International Workshop on Empirical Software Engineering in Practice   13 - 18   2010.12

     More details

    Language:English  

    researchmap

  • Working Time Measurement for Improving Awareness in Deskwork

    SHIMOMURA YOSUKE, KURAMOTO TATSUYA, MONDEN AKITO, MATSUMOTO KEN-ICHI

    2010 ( 1 )   1 - 8   2010.3

  • An Analysis of Relationship between Coding Style Metrics and Source Code Plagiarism

    TAKEDA TAKAYUKI, USHIMADO TOMOYOSHI, YAMAUCHI HIROKI, MONDEN AKITO, MATSUMOTO KEN-ICHI

    2010 ( 8 )   1 - 8   2010.3

  • Influence of Imbalance Data toward Cost Overrun Project Prediction

    SHIBATA JUN-ICHIRO, TSUNODA MASATERU, MONDEN AKITO, MATSUMOTO KEN-ICHI

    2010 ( 36 )   1 - 6   2010.3

  • 線形重回帰モデルを用いたソフトウェア開発工数予測における対数変換の効果

    門田暁人

    コンピュータソフトウェア   27 ( 4 )   234 - 239   2010

  • Detection of Source Code Reuse based on Code Clone Metrics

    OKAHARA Satoshi, MANABE Yuki, YAMAUCHI Hiroki, MONDEN Akito, MATSUMOTO Ken-ichi

    IEICE technical report   109 ( 307 )   73 - 78   2009.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In recent software development, programmers often reuse source code of Open Source Software (OSS) as a part of commercial product. While reusing OSS increase productivity, it raises a new risks of violating OSS license to both software venders and purchasers. This paper proposes a method to detect reuse of source code based on code clone metrics. For two code clone metrics, maximum length of code clone and partial similarity of software, we experimentally derived criteria to identify the reuse, by using 50 OSS packages. By using derived criteria, we could correctly identify 84% of products containing reused code without having false-positive.

    CiNii Article

    CiNii Books

    researchmap

  • Performance Improvement of Fault-prone Module Prediction by Normalization of Software Metrics

    KURAMOTO Tatsuya, MATSUMOTO Shinsuke, KAMEI Yasutaka, MONDEN Akito, MATSUMOTO Ken-ichi

    2009 ( 11 )   1 - 6   2009.10

  • B-009 A Method for Hiding Program Code Focused on the Execution Time Difference

    Kanzaki Yuichiro, Monden Akito

    8 ( 1 )   361 - 364   2009.8

     More details

    Language:Japanese   Publisher:Forum on Information Technology  

    CiNii Article

    CiNii Books

    researchmap

  • Software Classification According to their Functionality based on Used Classes

    USHIMADO Tomoyoshi, MONDEN Akito, TAMADA Haruaki, MATSUMOTO Kenichi

    IEICE technical report   109 ( 170 )   31 - 36   2009.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In software development, to implement given functional specifications, developers generally use class files from well-known class libraries. Therefore, a set of library classes used by software seems to have a strong relationship with the functionality of the software. In this paper we propose a method to classify software from their functional viewpoints based on used classes. In the proposed method, the distance between two software is calculated based on the number of uses of each library class, and, software is classified by hierarchical clustering. As a result of an experimental evaluation, the most appropriate classification was obtained when the tf-idf method and Euclidean distance was employed to calculate the distance.

    CiNii Article

    CiNii Books

    researchmap

  • Modeling of Test Effort Allocation and Software Reliability in Fault-prone Module Detection

    50 ( 7 )   1716 - 1724   2009.7

  • The Effect of Collaborative Filtering on Software Component Recommendation

    2009.3

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • 自主研究 ソフトウェア開発費に影響する要因の分析

    角田 雅照, 門田 暁人, 松本 健一

    経済調査研究レビュー   ( 4 )   80 - 92   2009.3

     More details

    Language:Japanese   Publisher:経済調査会  

    CiNii Article

    CiNii Books

    researchmap

  • Experimentally Deriving Probability of Program Piracy based on Length of Code Clone

    OKAHARA Satoshi, MANABE Yuki, YAMAUCHI Hiroki, MONDEN Akito, MATSUMOTO Kenichi, INOUE Katsuro

    IEICE technical report   108 ( 362 )   7 - 11   2008.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Generally, if a piece of code clone was found between two different programs, a plagiarism or a code reuse (program piracy) might be made. On the other hand, code clone also occurs accidentally or by code idioms. This paper experimentally derives the probability of program piracy based on length of code clone. In the experiment, we identified code clones among many different programs which we confirmed that program piracy has not been made, and formulated by power approximation the relation between the length of code clone and its derivation probability. By using this formula, we can compute the probability of program piracy from the maximum length of code clone derived from given two programs.

    CiNii Article

    CiNii Books

    researchmap

  • Empirical Evaluation of Missing Data Techniques for Effort Estimation Reviewed

    Koichi Tamura, Takeshi Kakimoto, Koji Toda, Masateru Tsunoda, Akito Monden, Ken-ichi Matsumoto

    In Proceedings of 2nd International Workshop on Software Productivity Analysis And Cost Estimation   4 - 9   2008.12

     More details

    Language:English  

    researchmap

  • バグ予測で信頼性はどれだけ向上するのか?-テスト工数割り当ての観点からの従来研究の評価 Reviewed

    柿元健, 亀井靖高, 柗本真祐, 門田暁人, 松本健一, 楠本真二

    ソフトウェア工学の基礎XV,日本ソフトウェア科学会FOSE2008   63 - 68   2008.11

     More details

  • The Heisei 19 IPSJ Nagao Special Researcher Award : IPSJ Nagao Special Resercher Award : Data Driven Software Project Management

    49 ( 7 )   844 - 844   2008.7

     More details

  • Effective Use of Software Development Data from Software Users' View Points

    松村知子, 森崎修司, 門田暁人, 楠本真二, 飯田元, 松本健一, 久保浩三, 井上克郎

    情報処理学会研究報告   2008 ( 29(SE-159) )   219 - 226   2008.3

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Nowadays, high quality software system is required because our society increasingly depends on software systems. We propose "Software Tag", a technology to share the software development data, for software users to choose secure and reliable software. Software tags include data of software development process and quality of software artifacts, and should be shown to software users to judge if it would be usable or not. In this report, we explain the idea of software tags and usage models, and report the progress of detailed technical researches for practical application to the society.

    CiNii Article

    CiNii Books

    J-GLOBAL

    researchmap

  • Measurement of Program Reuse-ratio in Enhancement Projects using Software Birthmarks

    TAMADA Haruaki, MORISAKI Shuji, MONDEN Akito, MATSUMOTO Ken-ichi

    70   399 - 400   2008.3

     More details

  • Software Effort Estimation Model Using Team Size per System Size

    TSUNODA Masateru, MONDEN Akito, MATSUMOTO Ken-ichi

    70   401 - 402   2008.3

     More details

  • An Analysis of System Issue Tracking Data by Association Rule Mining

    TOKUGAWA Hiroyuki, MORISAKI Shuji, MATSUMURA Tomoko, MONDEN Akito, MATSUMOTO Kenichi

    70   397 - 398   2008.3

     More details

  • バグモジュール率を従属変数としたFault-Proneモジュール判別モデルの提案

    水野 勇貴, 内田 眞司, 門田 暁人

    全国大会講演論文集   70   323 - 324   2008.3

     More details

  • Analyzing factors of defect correction effort in a multi-vendor information system developmen

    Tomoko Matsumura, Akito Monden, Shuji Morisaki, Kenichi Matsumoto

    Journal of Computer Information Systems   XLIX ( 1 )   73 - 80   2008

     More details

  • 相関ルール分析とロジスティック回帰分析を組み合わせたFault- Proneモジュール判別手法

    亀井靖高, 森崎修司, 門田暁人, 松本健一

    情報処理学会論文誌   49 ( 12 )   3954 - 3966   2008

     More details

  • Fault-Prone モジュール判別におけるF1値とソフトウェア信頼性の関係 Reviewed

    柿元健, 門田暁人, 亀井靖高, 柗本真佑, 松本健一

    ソフトウェア工学の基礎XIV, 日本ソフトウェア科学会FOSE2007   75 - 83   2007.11

     More details

  • 工数予測における類似性に基づく欠損値補完の効果 Reviewed

    田村晃一, 柿元健, 戸田航史, 角田雅照, 門田暁人, 松本健一

    ソフトウェア工学の基礎XIV, 日本ソフトウェア科学会FOSE2007   85 - 93   2007.11

     More details

    Language:Japanese  

    researchmap

  • The Effect of Removing Noisy Projects in Software Development Effort Estimation

    24   1 - 7   2007.9

     More details

  • The effects of over and under sampling on fault-prone module detection Reviewed

    Yasutaka Kamei, Akito Monden, Shinsuke Matsumoto, Takeshi Kakimoto, Ken-ichi Matsumoto

    ESEM '07 : Proc. First Intl. Symposium on Empirical Softw. Eng. and Measurement   196 - 204   2007.9

     More details

  • Is This Cost Estimate Reliable? - the Relationship between Homogeneity of Analogues and Estimation Reliability Reviewed

    Naoki Ohsugi, Akito Monden, Nahomi Kikuchi, Michael Barker, Masateru Tsunoda, Takeshi Kakimoto, Ken-ichi Matsumoto

    In Proceedings of the 1st International Symposium on Empirical Software Engineering and Measurement   384 - 392   2007.9

     More details

    Language:English  

    DOI: 10.1109/ESEM.2007.61

    researchmap

  • Applying Sampling Methods to Fault-prone Module Detection

    2007.8

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • プロジェクト間の類似性に基づくソフトウェアメトリクスの欠損値の補完

    田村晃一, 柿元健, 戸田航史, 角田雅照, 門田暁人, 松本健一

    ソフトウェア信頼性研究会第4 回ワークショップ   17 - 23   2007.6

     More details

    Language:Japanese  

    researchmap

  • 類似した命令列の畳込みによるプログラムの耐タンパ性の向上

    Takashi Nishioka, Hiroki Yamauchi, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    情報処理学会研究報告, ソフトウェア工学研究会   2007-SE-155 ( 33 )   167 - 174   2007.3

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    This technical report proposes a software tamper proofing method called instruction folding. In this method, a set of similar (but sligtly different) instruction sequences is detected in a program, and then, they are integrated (folded) into a single instruction sequence. A self-modifying mechanism is applied to the folded sequence to bridge the gap between those slightly different sequences at run-time. The folded sequence is tamper resistant since tampering affects every functionality where original (similar) instruction sequences were present.

    CiNii Article

    CiNii Books

    researchmap

  • 高級言語レベルでの偽装内容の指定が可能なプログラムのカムフラージュ

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    2007年暗号と情報セキュリティシンポジウム(SCIS2007)予稿集CD-ROM(講演番号4D1-3)   2007.1

     More details

  • C言語におけるライブラリ呼び出し隠蔽のための名前難読化手法

    Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    暗号と情報セキュリティシンポジウム (SCIS2007)   2007.1

     More details

  • A proposal for analysis and prediction for software projects using in-process measurements and collaborative filtering of a benchmarks database

    Yoshiki Mitani, Nahomi Kikuchi, Tomoko Matsumura, Naoki Ohsugi, Akito Monden, Yoshiki Higo, Katsuro Inoue, Michael Barker, Ken-ichi Matsumoto

    Journal of Software Measurement   1 ( 1 )   1 - 11   2007

     More details

  • Mining quantitative rules in a software project data set

    Shuji Morisaki, Akito Monden, Haruaki Tamada, Tomoko Matsumura, Ken-ichi Matsumoto

    IPSJ Journal   48 ( 8 )   2725 - 2734   2007

     More details

  • マルチベンダ情報システム開発における障害修正工数の要因分析

    松村知子, 門田暁人, 森崎修司, 松本健一

    情報処理学会論文誌   48 ( 5 )   1926 - 1935   2007

     More details

  • ソフトウェア開発工数予測における特異プロジェクト除去の効果

    渡邊瑞穂, 柿元健, 戸田航史, 門田暁人, 松本健一

    日本ソフトウエア科学会大会講演論文集(CD-ROM)   24th   7B-2   2007

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Variable Selection for Effort Estimation based on Similarity of Projects

    TAKI Shinya, KAKIMOTO Takeshi, TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken-ichi

    Technical report of IEICE. SS   106 ( 325 )   1 - 6   2006.10

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Analogy-based estimation methods have been researched for deriving accurate effort estimate required to complete a project; however, there were few activities to develop efficient variable selection methods. In this paper, we propose Correlation Based Selection (CBS) excluding variables that do not correlate with the total effort. The proposed method needs few calculation amounts because it calculates only the correlation coefficients between the total effort and each variable in the data. We experimentally evaluated accuracy of the proposed method by using the data collected from a softwar...

    CiNii Article

    CiNii Books

    researchmap

  • Analyzing Oss Developers’ Working Time Using Mailing Lists Archives Reviewed

    Masateru Tsunoda, Akito Monden, Takeshi Kakimoto, Yasutaka Kamei, Ken-ichi Matsumoto

    In Proceedings of the 3rd International Workshop on Mining Software Repositories Mining Challenge 2006   181 - 182   2006.5

  • Using Software Birthmarks to Identify Similar Classes and Major Functionalities Reviewed

    Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Haruaki Tamada, Masateru Tsunoda, Ken-ichi Matsumoto

    Proceedings of the 3rd International Workshop on Mining Software Repositories (MSR2006) Mining Challenge 2006, May, Shanghai, China   171 - 172   2006.5

     More details

  • Software Productivity Analysis with respect to Outsourcing Ratio

    TSUNODA Masateru, MONDEN Akito, YADOHISA Hiroshi, KIKUCHI Nahomi, MATSUMOTO Ken-ichi

    IEICE technical report   106 ( 16 )   19 - 24   2006.4

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    To clarify the relation between controllable attributes of a software development and its productivity, this paper experimentally analyzed 253 enterprise software development projects of software development companies, established by Software Engineering Center (SEC), Information-technology Promotion Agency. In the experiment, as controllable attributes, we focused on the outsourcing ratio of a software project, defined as an effort outsourced to subcontract companies divided by a whole development effort. Our major findings include larger outsourcing ratio yields worse productivity.

    CiNii Article

    CiNii Books

    researchmap

  • A Recommendation Method of Useful Software Components for Ongoing Project

    KAMEI Yasutaka, TSUNODA Masateru, KAKIMOTO Takeshi, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken-ichi

    Technical report of IEICE. SS   106 ( 16 )   25 - 30   2006.4

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Many software components have been provided by development platform vendors, for achieving efficient development of high quality software; however, some practitioners cannot find useful components because number of the provided components is too large. For solving this problem, we propose a method based on collaborative filtering for recommending useful components to each ongoing project. In the proposed method, at first, some past projects similar to given ongoing project are retrieved by calculating similarity with number of common components used in the ongoing project and each past proj...

    CiNii Article

    researchmap

  • 企業横断的収集データに基づくソフトウェア開発プロジェクトの工数見積もり

    大杉 直樹, 角田 雅照, 門田 暁人, 松村 知子, 松本 健一, 菊地 奈穂美

    SEC journal   2 ( 5 )   16 - 25   2006

     More details

    Language:Japanese   Publisher:情報処理推進機構ソフトウェア・エンジニアリング・センター  

    CiNii Article

    CiNii Books

    researchmap

  • Characterizing Software Projects Unpredictable by Effort Estimation Models

    TODA Koji, TSUNODA Masateru, MONDEN Akito, MATSUMOTO Ken-ichi

    IEICE technical report   105 ( 491 )   67 - 72   2005.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Effort prediction is necessary for project manegers to make software development plan. To predict development effort, various estimation moedels such as multivariate regression models or neural network model have been proposed. However, there is much difference in effort prediction accuracy among predicted projects. In this study, we experimentally analyzed the project charactaristics whose prediction accuracy tend to become worse. As a result, we identified some characteristics.

    CiNii Article

    researchmap

  • Recommendation of Software Technologies based on Collaborative Filtering Reviewed

    Tomohiro Akinaga, Naoki Ohsugi, Masateru Tsunoda, Takeshi Kakimoto, Akito Monden, Ken-ichi Matsumoto

    In Proceedings of the 12th Asia-Pacific Software Engineering Conference   209 - 214   2005.12

     More details

    Language:English  

    DOI: 10.1109/APSEC.2005.94

    researchmap

  • 攻撃タスクを考慮した難読化による暗号プログラムの保護

    Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    電子情報通信学会技術報告, ソフトウェアサイエンス研究会   105 ( SS2005-59 )   25 - 30   2005.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we propose a cracker-centric approach to give a realistic guideline for applying software obfuscation methods to disrupt crackers' actions. As a case study, we define a security goal and a threat model for a Java implementation of a cryptomeria cipher (C2) program, and then, based on the model, we describe a guideline to protect secret keys included in the program.

    CiNii Article

    CiNii Books

    researchmap

  • 協調フィルタリングによる工数見積もり手法におけるデータ数と見積もり精度の関係の分析 Reviewed

    柿元健, 角田雅照, 大杉直樹, 門田暁人, 松本健一

    ソフトウェア工学の基礎XII, 日本ソフトウェア科学会FOSE2005   77 - 86   2005.11

     More details

  • A Comparison of Effort Prediction Methods Using Similar Projects

    TSUNODA Masateru, KAKIMOTO Takeshi, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Kenichi

    Technical report of IEICE. SS   105 ( 331 )   45 - 50   2005.10

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Due to heterogeneity of recent software development organizations and software processes, a single effort prediction model, such as COCOMO and regression models, often does not perform well to predict an individual project. On the other hand, effort prediction methods based on project similarity (Case-Based Reasoning (CBR) and Collaborative Filtering (CF)) have become an attractive alternatives in recent years because they consider individuality of each project in prediction. However, there are no empirical evaluation conducted to compare CBR and CF. Therefore, we focus on these methods and...

    CiNii Article

    CiNii Books

    researchmap

  • Javawock: A Java Class Recommender System based on Collaborative Filtering Reviewed

    Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, Akito Monden, Ken-ichi Matsumoto

    In Proceedings of 17th International Conference on Software Engineering and Knowledge Engineering   491 - 497   2005.7

     More details

    Language:English  

    researchmap

  • Prediction of Project Cost Overrun Based on Collaborative Filtering

    MOTOMURA Takuya, KAKIMOTO Takeshi, TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Kenichi

    Technical report of IEICE. SS   105 ( 229 )   35 - 40   2005.7

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    In this paper, we evaluate estimation methods of software development cost overrun in an early development phase. To discriminate cost overrun projects, we used collaborative filtering technique whose predictor variables are the evaluation values of risk factors which influence the excess of cost. Data of 45 projects were used in an evaluation experiment. The result showed that precision and recall of user-based collaborative filtering was higher than liner discriminant analysis.

    CiNii Article

    CiNii Books

    researchmap

  • Software Technology Recommendation Based on Collaborative Filtering

    AKINAGA Tomohiro, OHSUGI Naoki, KAKIMOTO Takeshi, TSUNODA Masateru, MONDEN Akito, MATSUMOTO Kenichi

    Technical report of IEICE. SS   105 ( 128 )   7 - 13   2005.6

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    In recent years, much software development technology is proposed. It is difficult for the software engineer to be master of all these technologies. So it is necessary to select the technology that should acquire it beforehand. Then, we propose a system recommending the software exploitation technology that seems to be useful for engineer by using Collaborative Filtering. In the proposal method, first of all, the interest to each development technology is first investigated to each engineer. And, the engineer to whom the tendency to the interest is similar is discovered based on cooperated ...

    CiNii Article

    CiNii Books

    researchmap

  • プログラマの視線を用いたレビュープロセスの分析

    Hidetake Uwano, Noboru Nakamichi, Hiroshi Igaki, Monden Akito, Masahide Nakamura, Ken-ichi Matsumoto

    信学技報SS2005 12-17   105 ( 128 )   21 - 26   2005.6

     More details

  • Recent Software Protection Techniques - Hardware-assisted Tamper Prevention -

    MONDEN Akito, Clark Thomborson

    IPSJ Magazine   46 ( 5 )   558 - 563   2005.5

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00065344/

  • Recent Software Protection Techniques - Software-only Tamper Prevention -

    MONDEN Akito, Clark Thomborson

    IPSJ Magazine   46 ( 4 )   431 - 437   2005.4

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00065318/

  • Analysis of program comprehension that has effects on the code review achievement

    栗山進, 大平雅雄, 門田暁人, 松本健一

    電子情報通信学会技術研究報告   104 ( 571(SS2004 50-55) )   17 - 22   2005.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The goal of this study is to analyze the relationship between the level of program comprehension and the bug detection rate in a code review process. We examined the reviewer's comprehension level of a program after the review process was held by the reviewer. As a results of examinations, we have found that the bug detection rate correlated with the comprehension level of data structure and its manipulation while it did not correlated with the comprehension level of logic and interface. We also found the program comprehension was a necessary condition for detecting bugs.

    CiNii Article

    CiNii Books

    J-GLOBAL

    researchmap

  • ソフトウェア実行時のAPI呼び出し履歴に基づく動的バースマークの実験的評価

    Keiji Okamoto, Haruaki Tamada, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    第46回プログラミング・シンポジウム報告集   41 - 50   2005.1

     More details

  • Javaプログラムの動的解析のためのトレーサ埋め込みツール

    Haruaki Tamada, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    第46回プログラミング・シンポジウム報告集   51 - 62   2005.1

     More details

  • Evaluation of gaze-added target selection methods suitable for general GUIs

    Monden, A., Matsumoto, K., Yamato, M.

    International Journal of Computer Applications in Technology   24 ( 1 )   17 - 24   2005

  • 視線追跡装置とフットペダルを利用した実験支援インタフェース

    門田暁人, 松矢明宏, 大和正武, 松本健一

    教育システム情報学会誌   22 ( 2 )   127 - 133   2005

     More details

  • 協調フィルタリングを用いたソフトウェア開発工数予測方法

    角田雅照, 大杉直樹, 門田暁人, 松本健一

    情報処理学会論文誌   46 ( 5 )   1155 - 1164   2005

     More details

  • Software analysis by code clones in open source software

    Shinji Uchida, Akito Monden, Naoki Ohsugi, Toshihiro Kamiya, Ken-ichi Matsumoto, Hideo Kudo

    Journal of Computer Information Systems   XLV ( 3 )   1 - 11   2005

     More details

  • 変数更新の回数と分散に基づくプログラムのメンタルシミュレーションコスト評価

    Takahisa Ishiguro, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    電子情報通信学会技術報告, ソフトウェアサイエンス研究会   SS2004-32   37 - 42   2004.11

     More details

  • 協調フィルタリングに基づく工数見積もりのロバスト性評価 Reviewed

    柿元健, 角田雅照, 大杉直樹, 門田暁人, 松本健一

    ソフトウェア工学の基礎XI, 日本ソフトウェア科学会 FOSE2004   73 - 84   2004.11

     More details

  • ソフトウェア開発プロセスにおける情報漏えいのリスク評価

    Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    コンピュータセキュリティシンポジウム2004論文集 (CSS2004)   2   775 - 780   2004.10

     More details

  • A Java Class File Recommender System Based on Collaborative Filtering

    KAKIMOTO Takeshi, TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken'ichi

    IEICE technical report. Dependable computing   104 ( 346 )   29 - 34   2004.10

     More details

    Language:Japanese   Publisher:一般社団法人電子情報通信学会  

    Today, most software development platforms provide various software components. However, some software developers are not aware of useful components because extremely large amount of components are provided. This paper propose a system recommending the developers some Java class files by using Collaborative Filtering. Once a developer venters a Java class file which has been developed in ongoing project, the proposed system investigates used Java classes in the entered class file. Next, the system finds some similar class files from already completed class files which made in the past proje...

    CiNii Article

    CiNii Books

    researchmap

  • A support system for software function discovery using histories of function executions

    Morisaki, S., Shiraishi, Y., Yamato, M., Monden, A., Matsumoto, K.-I., Torii, K.

    Systems and Computers in Japan   35 ( 12 )   93 - 106   2004

  • 協調フィルタリングに基づくソフトウェア機能推薦システム

    大杉直樹, 門田暁人, 森崎修司, 松本健一

    情報処理学会論文誌   45 ( 1 )   267 - 278   2004

     More details

  • An Application of Collaborative Filtering for Software Reliability Prediction

    TSUNODA Masateru, OHSUGI Naoki, MONDEN Akito, MATSUMOTO Ken'ichi

    Technical report of IEICE. SS   103 ( 482 )   19 - 24   2003.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Data sets recorded in software development projects often contain a large amount of missing values. It is difficult for multivariate regression models to accurately predict software reliability using such data. To solve this problem, we propose a method to apply Collaborative Filtering for software reliability prediction. In our method, we use Collaborative Filtering to select past software projects similar to a target project and to predict its reliability with selected past projects. We applied our method to actual software projects data to estimate accuracy of prediction. The result of the case study showed that Collaborative Filtering showed better prediction performance than conventional regression models.

    CiNii Article

    CiNii Books

    researchmap

  • Java クラスファイルからプログラム指紋を抽出する方法の提案

    Haruaki Tamada, Yuichiro Kanzaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto

    電子情報通信学会技術報告, 情報セキュリティ研究会   ( ISEC2003-29 )   127 - 133   2003.7

     More details

  • Program Obfuscation by Coding Data and Its Operation

    SATO Hirotsugu, MONDEN Akito, MATSUMOTO Ken-ichi

    Technical Report of IEICE   102 ( 743 )   13 - 18   2003.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Protecting a program against illegal hacking and manipulations is a crucial problem for the software industry. For this purpose, this paper proposes a systematic method to obfuscate a program by applying a specific transformation to data and operators in the program. The proposed method consists of the following three steps : (1) encode each data (operand) appearing in a given expression, (2) replace operators in the expression, so that the evaluated value of the expression becomes an encoded value, (3) decode the encoded value when required. We present a set of operator transformation rules applied to data encoding based on linear transformation. In the program obtained by the proposed method. the operators are applieddirectly to the encoded data, and thus, the data is observed in the program stack as an "encode" value. Therefore, the proposed method is especially effective for the program hacking based on stack monitoring at run-time. As a rsult, it can be applied effectively to protecting software systems with security-related components, such as decrypt keys, decoding algorithms, authentication.

    CiNii Article

    CiNii Books

    researchmap

  • The Development of a Software Search Engine for the World Wide Web

    KAMEI Toshiyuki, MONDEN Akito, MATUMOTO Ken'ichi

    Technical report of IEICE. SS   102 ( 617 )   59 - 64   2003.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Although many software systems had been developed in the world, the knowledge of developments has not been effectively accumulated and reused. 0n the other hand, there are many information sources on the WWW that are useful for software development, such as source codes and their related documents. Some of useful information can be retrieved by the common web search engines, however. these engines do not necessarily contain software itself in the database. Moreover. they do not have a functionality suitable for retrieving software resources. This paper describes the design of a software search engine, which have an ability to crawl the WWW space, to collect and analyze software resources, and to provide them to users. The user of our engine can search software resources using a query including symbols and values in software, such as product metrics. This paper also describes an implementation of a prototype system and an example of retrieval.

    CiNii Article

    CiNii Books

    researchmap

  • 潜在コーディング規則違反を原因とするフォールトの検出支援方法の提案

    松村知子, 門田暁人, 松本健一

    情報処理学会論文誌   44 ( 4 )   1070 - 1082   2003

     More details

  • 視線・マウス併用型インタフェースのドラッグ&ドロップ操作への適用

    大和正武, 神代和範, 門田暁人, 松本健一

    情報処理学会論文誌   44 ( 1 )   166 - 175   2003

     More details

  • 生物学実験支援のための視線インタフェース

    門田暁人, 松矢明宏, 大和正武, 松本健一

    情報処理学会論文誌   44 ( 8 )   2266 - 2269   2003

     More details

  • コードクローンに基づくレガシーソフトウェアの品質の分析

    門田暁人, 佐藤慎一, 神谷年洋, 松本健一

    情報処理学会論文誌   44 ( 8 )   2178 - 2188   2003

     More details

  • 命令コードの実行時置き換えによるプログラムの解析防止

    Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto

    信学技報, 情報セキュリティ研究会   ISEC2002-98 ( 511 )   13 - 19   2002.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original binary program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary program autonomously retrieves the original code fragments within a certain period of execution, by replacing the dummy instructions with the original ones. Since the dummy instructions are completely different from the original ones, code hacking fails if the dummy instructions are read as they are. Moreover, the dummy instructions are scattered over the program, therefore, they are hard to be identified. As a result, the proposed method helps to construct highly invulnerable software without special hardware.

    CiNii Article

    CiNii Books

    researchmap

  • A Method for Program Code Inspection Using Bug Report

    MATSUMURA Tomoko, MONDEN Akito, MATSUMOTO Ken-ichi

    Technical report of IEICE. SS   101 ( 628 )   1 - 8   2002.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Thorough an ongoing process of maintaining large legacy software, a number of "implicit coding rules", which are never described in specification documents or design documents, are unexpectedly generated as software becomes more complicated than it used be. Violating such rules cause fault injection. This paper proposes a method for automatically detecting and informing code fragments that violate implicit coding rules. In this method, patterns of typical code violating rules are derived from past bug reports. The patterns are described by a pattern description language, and, a potential faulty code fragments are extracted by a pattern matching technique. The result of a case study showed that 30% of faults in a large legacy system were due to the violation of implicit coding rules, 82% of these faults were descriptable by the pattern language, and, all these faults were extracted by the proposed method.

    CiNii Article

    CiNii Books

    researchmap

  • Quantitative Analysis of Cloned Code on Legacy Software

    NAKAE Daikai, KAMIYA Toshihiro, MONDEN Akito, KATO Hiroshi, SATO Shin-ichi, INOUE Katsuro

    Technical report of IEICE. SS   100 ( 570 )   57 - 64   2001.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    This paper shows the results of both quantitative analysis and qualitative analysis about the nature of cloned code on large legacy software. We defined some cloned code metrics, and then quantitatively analyzed the relation among the metrics and module's age, the number of bugs, etc. We also looked over the source code in order to qualitatively analyze the nature of cloned code. As the results, we found that new modules have more cloned code than old modules, more than half of cloned code were found between modules whose age are within 30 days difference, and the modules that have cloned code have fewer bugs (per line) than the modules that do not have cloned code, etc.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://hdl.handle.net/11094/26715

  • Electronic Intellectual Properties and Social Infrastructure. A Digital Watermarking Method for Java Class Files.

    門田暁人, 松本健一, 飯田元, 井上克郎, 鳥居宏次

    情報処理学会論文誌   41 ( 11 )   3001 - 3009   2000.11

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • A Digital Watermarking Method for Java Class Files

    門田 暁人, 松本 健一, 飯田 元, 井上 克郎, 鳥居 宏次

    2000.11

     More details

    Language:Japanese   Publisher:情報処理学会  

    本論文では,盗用の疑いのあるJavaプログラムの発見を容易にすることを目的として,プログラム著作者の署名等を電子透かしとしてJavaクラスファイルに挿入する方法,および,取り出す方法を提案する.提案方法は,透かしを挿入してもプログラムの実行効率が変わらず,ツールによる透かしの取り出しの自動化が可能であり,ツールを公開した場合にも透かしの上書き攻撃を回避できるという特徴を持つ.透かしの耐性を実験により評価した結果,obfuscatorと呼ばれるプログラムの難読化ツールによる攻撃後も電子透かしは消えないこと,および,逆コンパイル,再コンパイルによる攻撃に対しても半数以上の透かしは消えないことが確認された.; The aim of this paper is to easily identifyan illegal Java program containing a stolen class file.This paper proposes a method for encoding and decoding a digital watermark,such as a program developer&#039;s copyright notation, into/from Java class files.Characteristics of the proposed method are:Execution efficiency of the target program is not reduced by watermarkencoding,watermark decoding can be automated,and, an overwriting attack is prevented even if a watermark encoding toolis distributed in the public.The result of the experiment to evaluate our method showed thatall the watermarks embedded in class files survived an obfuscator attack,and also showed thatmore than half of watermarks survived a decompile-recompile attack.

    CiNii Article

    researchmap

  • Visualizing Users' Function - execution History of Software to Support Function Discovery

    Shiraishi Yumi, Morisaki Shuuji, Monden Akito, Matsumoto Ken-ichi, Inoue Katsuro

    IPSJ SIG Notes   2000 ( 97 )   13 - 18   2000.10

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    We are conducting a research on sharing usage knowledge of software functions according as the functions that are needed by users who use the same software for similar purpose are similar. In this paper, we propose a visualization method of histories of function executions collected in long period. The proposed method enables users to identify functions that are unaware of by them. We evaluated the proposed method adapting the method to MS Word and PowerPoint. Experimental result shows that all subjects can discover functions unaware and that the 34.5 functions out of discovered functions of PowerPoint are useful for the subjects.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00042327/

  • Sharing Usage Knowledge for Application Software Using Function Execution History

    MORISAKI Shuuji, MONDEN Akito, MATSUMOTO Ken-ichi, INOUE Katsuro, TORII Koji

    Transactions of Information Processing Society of Japan   41 ( 10 )   2770 - 2781   2000.10

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Most of software, especially application software provides us with various functions. Since the acquisition cost of the use knowledge of a function is large, the number of functions actually used is limited. This paper proposes system that shares a functional execution history among users for the purpose of making small acquisition cost of the use knowledge of the function which software offers. The proposed system can collect functional execution histories from users automatically through computer network. It also provides a mechanism for exchanging the use knowledge of a function among users by sharing functional execution histories. Four subjects were able to acquire use knowledge among five persons as a result of the evaluation experiment for Microsoft Word 2000. Efficiency of novice work improved by knowledge acquisition. The use knowledge could be acquired also about the function in which an expert does not know.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00012162/

  • Visualizing Users' Function-execution History of Software to Support Function Discovery

    SHIRAISHI Yumi, MORISAKI Shuuji, MONDEN Akito, MATSUMOTO Ken-ichi, INOUE Katsuro

    Technical report of IEICE. Multimedia and virtual environment   100 ( 357 )   13 - 18   2000.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We are conducting a research on sharing usage knowledge of software functions according as the functions that are needed by users who use the same software for similar purpose are similar. In this paper, we propose a visualization method of histories of function executions collected in long period. The proposed method enables users to identify functions that are unaware of by them. We evaluated the proposed method adapting the method to MS Word and PowerPoint. Experimental result shows that all subjects can discover functions unaware and that the 34. 5 functions out of discovered functions of PowerPoint are useful for the subjects.

    CiNii Article

    CiNii Books

    researchmap

  • 利用情報を用いたソフトウェアコンポーネントの検索

    古賀健太郎, 門田暁人, 飯田元, 松本健一, 井上克郎

    情報処理学会全国大会講演論文集   61st ( 1 )   1.309-1.310   2000.10

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Experimental Evaluation of the Drag&Drop Operation Method That Uses Eye Tracking Device and Mouse Together

    KUMASHIRO Tomonori, YAMATO Masatake, MONDEN Akito, MATSUMOTO Ken-ichi, INOUE Katsuro

    Technical report of IEICE. HIP   99 ( 722 )   37 - 44   2000.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The aim of our study is to make current GUIs more effective for computer users. This paper proposes an eye gaze interface in which computer users use both their eye and hand in doing GUI operations. We have chosen "drag-and-drop" operation, which is one of a daily-use operation, for this study. In our method, drag-and-drop operation is separated into three basic operations:(1) rough cursor movement toward the icon, (2) cursor adjustment onto the icon, and (3) pushing the icon. We use eye movement for (1), and, a mouse for (2) and (3). We also propose three adjustment method for (2):Auto, Manual, and SemiAuto. The result of an experiment to evaluate our method showed that the proposed interface augmented by SemiAuto adjustment is more effective than the conventional mouse interface.

    CiNii Article

    CiNii Books

    researchmap

  • Modeling and analysis of software aging process

    A Monden, S Sato, K Matsumoto, K Inoue

    PRODUCT FOCUSED SOFTWARE PROCESS IMPROVEMENT   1840   140 - 153   2000

     More details

    Language:English  

    Web of Science

    researchmap

  • A music retrieval system which uses known music as a reference key

    59   19 - 20   1999.9

     More details

  • Extracting and analyzing a feature of playing the guitar

    59   9 - 10   1999.9

     More details

  • A method for decreasing the time of drag-and-drop operation using eye tracking device and mouse together.

    59   33 - 34   1999.9

     More details

  • A digital watermarking method for Java programs.

    門田暁人, 飯田元, 松本健一, 鳥居宏次

    日本ソフトウエア科学会大会論文集   16th   253 - 256   1999.9

     More details

    Language:Japanese  

    J-GLOBAL

    researchmap

  • Automatic Cursor Movement by Look

    YAMATO Masatake, KUMASHIRO Tomonori, MONDEN Akito, MATSUMOTO Ken-ichi, INOUE Katsuro

    84   73 - 78   1999.8

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    The purpose of this research is realizing a more efficient input interface by using a look and a mouse together. As the first step, the button selection operation on GUI was divided into "operation (move operation) of moving cursor onto a button", and "operation (push operation) of pushing a button", and the method that performs move operation by the look and performs push operation with a mouse was examined. It became clear that cursor movement by the look is high speed, and it is more efficient than the selection operation only by the mouse as a result of the experiment. However, when the area of the button used as an operation object was about 1 square centimeter, it became clear that it is difficult to move cursor onto a button only by the look, and the mechanism, which assists move operation, is required.

    CiNii Article

    CiNii Books

    researchmap

  • An Analysis of Task - and Information - Sharing in Collaborative Debugging by Two Person

    Morisaki Shuuji, Ito Atsuo, Monden Akito, Matsumoto Ken-ichi

    IPSJ SIG Notes   1999 ( 40 )   35 - 40   1999.5

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Software debugging is often performed by more than one programmer working together. The goal of this research is to identify a model of how two person collaboratively perform a degugging task on a single program. Based on empirical studies we have conducted, we have identified patterns in task- and infromation-sharing, and applied them to analyze the ovserved collaborative debugging processes. The following two collabration patterns were found to be effective in degugging (1) one concentrated on a debugging task while the other collected potentially useful information about the program, and (2) the two shared one program source file in their editors instead of using duplicates and wrote comments iinto the file.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00042404/

  • An Experimental Evaluation of 2-Person Debugging

    ITO Atsuo, MORISAKI Shuuji, MONDEN Akito, MATSUMOTO Ken-ichi, TORII Koji

    Technical report of IEICE. KBSE   98 ( 636 )   45 - 52   1999.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In this paper, we evaluate methods for sharing debug activity and exchanging knowledge about bug, aiming at reducing debugging time, when two persons modify the same bug cooperating. Four experiments that two person detect and modify single bug are conducted to reveal effective methods. An experiment indicates that taking either task of: (1)exploring the bug location in the source code, and (2)understanding the program is effective to reduce debugging time, and that exchanging knowledge using shared file asynchronously is effective as well.

    CiNii Article

    CiNii Books

    researchmap

  • Scrolling the Text Windows by Looking

    YAMATO Masatake, MONDEN Akito, TAKADA Yoshihiro, MATSUMOTO Ken-ichi, TORII Koji

    Transactions of Information Processing Society of Japan   40 ( 2 )   613 - 622   1999.2

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    This paper proposes a method and implementation for a system to automatically scroll a text window by tracking where a user is looking at. A user of the system can access a portion of the displayed document without using keyboard or mouse. Existing eye-tracking methods, which use eye-gaze as a substitute for pointing devices, require a user to "look at" menus and icons to manipulate a window display. In contrast, our proposed method uses eye movement within a window to control its display. A position of a user's gaze within a text window determines how to scroll the window, what portion of the text to display, and where to stop. Our user study demonstrates that the effectives of scrolling using this method is as good as one with convetional keyboard control as respects string search by scrolling. In particular, we have found that a controlling mechanism to determine the speed of scrolling in terms of the distance of the gaze point from the center of the window was both qualitatively and quantitatively superior to other control mechanisms in the string search by scrolling.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00012841/

  • Analysis of debugger's fault localization process in software maintenance

    Kudo Hideo, Uchida Shinji, Monden Akito, Matsumoto Ken-ichi

    Research reports of Nara Technical College   ( 35 )   75 - 80   1999

     More details

    Language:Japanese   Publisher:Nara National College of Technology  

    CiNii Article

    CiNii Books

    researchmap

  • An analysis of the debugging process based on changes in impressions of functions

    UCHIDA Shinji, KUDO Hideo, MONDEN Akito

    Technical report of IEICE. KBSE   98 ( 388 )   9 - 15   1998.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    The purpose of our study is to clarify experts' debugging strategies through controlled experiment. In the experiment, we have used a periodic interview method to analyze the module that subjects think there is a bug in it during debugging. We have also analyzed the differences among subjects in time spent for reading each module. The result of experiment showed the differences between novices and experts in both the module that subjects think there is a bug in it, and the time spent for reading each module.

    CiNii Article

    CiNii Books

    researchmap

  • An analysis of the debugging process based on changes in impressions of functions

    UCHIDA Shinji, KUDO Hideo, MONDEN Akito

    IPSJ SIG Notes   1998 ( 100 )   107 - 114   1998.11

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    The purpose of our study is to clarify experts'debugging strategies through controlled experiment. In the experiment, we have used a periodic interview method to analyze the module that subjects think there is a bug in it during debugging. We have also analyzed the differences among subjects in time spent for reading each module. The result of experiment showed the differences between novices and experts in both the module that subjects think is a bug in it, and the time spent for reading each module.

    CiNii Article

    CiNii Books

    researchmap

  • A Study on the debugging thought process based on changes in impressions of functions

    56   203 - 204   1998.3

     More details

  • A Video Recordings Retrieval System Supporting Analysis of Software Development Processes

    NAKASHIMADA Yoshitaka, MORISAKI Shuuji, MONDEN Akito, MATSUMOTO Ken-ichi, TORII Koji

    Technical report of IEICE. SS   96 ( 601 )   1 - 8   1997.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    In analyzing software development process, it is not easy to find or extract the subject's specific behavior. This paper proposes a retrieving system using behavior data (key stroke, gaze point on CRT, etc.) for video recordings of software development activities. This system shows graphs of process data, so that identifying characteristic behaviors and specify the time they occured are easy. In order to evaluate this system, we conducted an experiment to retrive subject's specific behavior such as "lost himself" from the behavior data. There were 8 scenes identified by having an interview with the subject. It resulted in 6 out of 8 scenes being automatically retrieved.

    CiNii Article

    CiNii Books

    researchmap

  • ループを含むプログラムを難読化する方法の提案

    門田暁人

    電子情報通信学会論文誌D-I   80 ( 7 )   644 - 652   1997

  • コピー防止を目的とするプログラムの虫食い実装方式

    門田暁人

    情報処理学会, 夏のプログラミングシンポジウム報告集, July 1997   47 - 54   1997

  • Analysis of Debugging Process by Using an Eye Tracking System

    Monden Akito, Takada Yoshihiro, Torii Koji

    Proceedings of the Society Conference of IEICE   1996   517 - 518   1996.9

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • An Experiment to Observe Debugging Process by Using an Eye Tracking Device

    MONDEN Akito, TAKADA Yoshihiro, TORII Koji

    Technical report of IEICE. SS   96 ( 172 )   1 - 8   1996.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    To clarify factors that affect efficiency of debugging, we need to investigate programers' intentions which continuously vary during. For the purpose, we have developed a system for observing programmers behavior by using an eye tracking device and audio and visual devices. By using the system, we have performed an experiment of observing bug identification processes. This paper presents results of the experiment,including the fact that collecting and analyzing multimodal data, such as motion of gazing point and record of verbal protocol, is effective in investigating programmers' intentions. It also includes several differences among observed processes which are likely to relate to the efficiency of bug identification.

    CiNii Article

    CiNii Books

    researchmap

  • An Experiment to Evaluate Methods for Program Scrambling

    MONDEN Akito, TAKADA Yoshihiro, TORII Koji

    IPSJ SIG Notes   1996 ( 32 )   33 - 40   1996.3

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    It is important to write programs that are easy to analyze or understand so that the load on software maintenance and reuse can be lessened. 0n the other hand, when finished programs are released to many users there are cases where programs should not be analyzed easily, in order to protect the intellectual properties or to insure system security. In such cases, we believe that it is effective to write programs that are easy to analyze at first, and transform it so that it becomes difficult to analyze. Such an equivalent transformation is called "program scrambling." We present two methods for automatically scrambling programs that contain loops, and report on an experiment for validation of the methods. The result of the experiment shows that the methods are effective even for very small Programs.

    CiNii Article

    CiNii Books

    researchmap

  • Development of Software Synthesizer "FPD"

    MONDEN Akito, KURODA Hisayasu, FUJII Hideki

    IPSJ SIG Notes   1995 ( 19 )   27 - 32   1995.2

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Recently, most of personal computers have a PCM sound set in it, but there are no tools which support overall functions of synthesizer. We have developed software synthesizer "FPD", which provides most of synthesizer functions, as a multi timbre module, as a sampling machine, as a sequencer, as effects, etc. This paper shows the design and estimation of "FPD".

    CiNii Article

    CiNii Books

    researchmap

  • プログラムの難読化法の提案

    門田暁人

    情処全大   4   4.263 - 4.264   1995

  • A Tool Detecting Patterns of Programmers' Behavior When They Likely Inject Bugs

    Yanagi Masazumi, Monden Akito, Takada Yoshihiro, Torii Koji

    Technical report of IEICE. SS   94   9 - 16   1994

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We are studying on a system that automatically monitors and analyzes key strokes of programmers and then warns them of injecting bugs.So far,there have been almost no research reports on features of programmers' behavior when they inject bugs.To collect data of key strokes and analyze programmers' behaviour,we have designed and partially implemented an analysis system.Through experiments of applying the system,we have found that the system effectively works and that it is possible to realize the warning system.

    CiNii Article

    CiNii Books

    researchmap

▼display all

Presentations

  • Extended association rule mining with correlation functions

    3rd IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD2018)  2018 

     More details

  • 計算機上のソフトウェア開発作業の自動推定の検討

    ウィンターワークショップ2018・イン・宮島  2018 

     More details

  • N-gram IDFによるバグレポートの分類の試行

    ウィンターワークショップ2018・イン・宮島  2018 

     More details

  • 尖度と歪度を考慮した予測モデルの検討

    ウィンターワークショップ2018・イン・宮島  2018 

     More details

  • 分岐命令のカムフラージュに基づくプログラムの制御フローの隠ぺい

    情報処理学会九州支部 火の国情報シンポジウム2018  2018 

     More details

  • 難読化されたプログラムの自動解析への耐性に関する考察

    情報処理学会第80回全国大会  2018 

     More details

  • MAHAKIL: Diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction

    40th International Conference on Software Engineering  2018 

     More details

  • GitHub上のプログラマ名鑑ボットの作成

    ソフトウェアシンポジウム2018, WG11: ソーシャルコーディングとソフトウェア進化  2018 

     More details

  • Predictability classification for software effort estimation

    3rd IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science Engineering (BCD2018)  2018 

     More details

  • ソフトウェアバグの行レベル予測の試み

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • ソフトウェア開発の提案依頼書における無理難題の分析

    ソフトウェアサイエンス研究会  2017 

     More details

  • ソフトウェアエンジニアに求められる技術の求人票に基づく分析

    ソフトウェアサイエンス研究会  2017 

     More details

  • Should duration and team size be used for effort estimation?

    IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2017)  2017 

     More details

  • プロジェクト間バグ予測方法の実験的評価

    ソフトウェアサイエンス研究会  2017 

     More details

  • 機密を保持したままソフトウェア開発データの分析を行う方法についての一考察

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • Impact of the distribution parameter of data sampling approaches on software defect prediction models

    24th Asia-Pacific Software Engineering Conference (APSEC2017)  2017 

     More details

  • Calibration of distributed multimodal sensor networks using cross-correlation of arrival processes

    35th Annual Conference of the Robotics Society of Japan (RSJ 2017), International Session  2017 

     More details

  • ソフトウェア開発に関するスモールデータの分析技術

    日本ファンクションポイントユーザ会2017年度第3回会合  2017 

     More details

  • Evaluating Algorithmic Thinking Ability of Primary Schoolchildren Who Learn Computer Programming

    47th IEEE Frontiers in Education Conference (FIE2017)  2017 

     More details

  • The significant effects of data sampling approaches on software defect prioritization and classification

    ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM2017)  2017 

     More details

  • GitHub上のプログラマ名鑑の作成に向けて

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • ランキング上位者のプログラミング作法の評価

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • ソフトウェア開発工数の二段階予測方法の実験的評価

    ソフトウェア工学の基礎ワークショップFOSE2017  2017 

     More details

  • Filter-INC: Handling Effort-Inconsistency in Software Effort Estimation Datasets

    23rd Asia-Pacific Software Engineering Conference (APSEC2016)  2016 

     More details

  • Influence of outliers on analogy based software development effort estimation

    15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016)  2016 

     More details

  • Analysis of information system operation cost based on working time and unit cost

    15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016)  2016 

     More details

  • Identifying Recurring Association Rules in Software Defect Prediction

    15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016)  2016 

     More details

  • Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction Models

    IEEE International Conference on Software Quality, Reliability & Security (QRS2016)  2016 

     More details

  • Investigating the effects of balanced training and testing datasets on effort-aware fault prediction models

    IEEE Computer Software and Applications Conference (COMPSAC 2016)  2016 

     More details

  • A Fuzzy Hashing Technique for Large Scale Software Birthmarks

    15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016)  2016 

     More details

  • ソフトウェアリポジトリマイニングのすすめ

    日本ソフトウェア科学会第33回大会  2016 

     More details

  • Textual vs. Visual Programming Languages in Programming Education for Primary Schoolchildren

    46th IEEE Fronties in Education Conference (FIE2016)  2016 

     More details

  • バイナリプログラム圧縮によるソフトウェア流用検出

    ソフトウェアサイエンス研究会  2016 

     More details

  • バイナリコード中の文字列に着目したソフトウェアの流用検出

    ソフトウェアサイエンス研究会  2016 

     More details

  • 原型分析を用いたソフトウェアバグ分析

    ソフトウェアサイエンス研究会  2016 

     More details

  • 非公開データからの類似データ生成

    ソフトウェア工学研究会  2015 

     More details

  • 保護コードの自然さに着目した命令カムフラージュ

    情報処理学会第77回全国大会  2015 

     More details

  • コード断片の不自然さの比較による保護機構の発見困難さの評価

    情報処理学会第77回全国大会  2015 

     More details

  • ソフトウェア開発工数見積もりにおける外れ値の実験的評価

    ソフトウェアシンポジウム2015  2015 

     More details

  • 公開不可データの変換技術

    ソフトウェアエンジニアリングシンポジウム2015ワークショップ  2015 

     More details

  • Toward Plagiarism Detection in Binary Programs Using Program Compression

    MSR Asia Summit 2015  2015 

     More details

  • 大量のプログラムを対象としたファジーハッシュを用いたバースマーク手法

    2015年暗号と情報セキュリティシンポジウム(SCIS2015)  2015 

     More details

  • テスト戦略の最適化に向けて

    ウィンターワークショップ2015・イン・宜野湾  2015 

     More details

  • COCOMO IIをベースとした工数見積りモデルの研究 - Javaを開発言語とするプロジェクトへの適用 -

    プロジェクトマネジメント学会春季大会  2015 

     More details

  • 再現性のあるアソシエーションルールの選定 ~ソフトウェアバグ予測を題材として~

    ソフトウェア工学研究会  2015 

     More details

  • ソフトウェア開発プロジェクトデータセットからの典型的なプロジェクトの抽出

    ソフトウェア工学研究会  2015 

     More details

  • コードクローンと使用ライブラリに着目したオープンソースソフトウェアの進化の定量化

    ソフトウェア工学研究会  2015 

     More details

  • 人口ピラミッドによるOSSプロジェクト貢献者の流動性分析

    第21回ソフトウェア工学の基礎ワークショップ  2014 

     More details

  • N-gram モデルを用いたソフトウェア保護機構の不自然さ評価

    2014年暗号と情報セキュリティシンポジウム  2014 

     More details

  • 作業時間に基づくソフトウェア保守ベンチマーキングの試み

    ソフトウェア工学研究会  2014 

     More details

  • 故障モジュール中の欠陥メソッド特定

    ソフトウェアエンジニアリングシンポジウム2014  2014 

     More details

  • ソフトウェアメトリクス活用テクニック ~「予測」のためのデータクリーニング,モデル化,ルール発見手法~

    ソフトウェア品質シンポジウム・チュートリアル講演  2014 

     More details

  • ソフトウェアリポジトリマイニングの技術動向と開発現場への活用

    プロジェクトマネジメント学会関西支部平成26年度春季シンポジウム  2014 

     More details

  • ソフトウェア開発データの無矛盾性の評価

    第21回ソフトウェア工学の基礎ワークショップ  2014 

     More details

  • 自動計測データに基づくソフトウェア開発の作業目的の予測

    第21回ソフトウェア工学の基礎ワークショップ  2014 

     More details

  • Java バイトコード命令のオペコード、オペランドを用いた難読化手法のステルシネス評価

    2014年暗号と情報セキュリティシンポジウム  2014 

     More details

  • ソフトウェア開発データあれこれ

    ウィンターワークショップ2014・イン・大洗  2014 

     More details

  • コードレビューにおいて発見されるバグの特徴分析

    ウィンターワークショップ2014・イン・大洗  2014 

     More details

  • 作業履歴中の主要な作業に着目した作業目的予測

    ソフトウェア工学研究会  2014 

     More details

  • モジュール理解のためのバグレポート推薦

    第21回ソフトウェア工学の基礎ワークショップ  2014 

     More details

  • ソフトウェア開発行動記録システムTaskPitの開発現場への適用

    ソフトウェアエンジニアリングシンポジウム2013 併設ワークショップ 「開発マネジメントにおける産学の問題共有と連携強化」  2013 

     More details

  • リポジトリマイニングの研究成果の産業化への応用

    ウィンターワークショップ2013・イン・那須  2013 

     More details

  • ソフトウェアリポジトリマイニングの技術動向とその応用, ITフォーラムセッション

    ソフトウェアジャパン2013  2013 

     More details

  • 組込みRTOSにおけるタスク起動機構冗長化とタスク起動順位保持

    システムソフトウェアとオペレーティング・システム研究会  2013 

     More details

  • OSS開発におけるコミッターの協調作業についての一考察

    第88回GN・第5回SPT合同研究発表会  2013 

     More details

  • 学習データの時間的変化に伴う欠陥モジュール予測モデルの評価

    ソフトウェアエンジニアリングシンポジウム2013 ポスターセッション  2013 

     More details

  • OSS開発における協調作業と不具合再修正の分析

    ソフトウェアエンジニアリングシンポジウム2013 ポスターセッション  2013 

     More details

  • ソフトウェア開発企業における開発タスクの自動計測

    第20回ソフトウェア工学の基礎ワークショップ  2013 

     More details

  • 脳血流計測に基づくプログラム理解行動の定量化

    第20回ソフトウェア工学の基礎ワークショップ  2013 

     More details

  • オープンソースソフトウェアにおける学術論文の引用状況の分析

    第20回ソフトウェア工学の基礎ワークショップ  2013 

     More details

  • 学習データ計測時点による欠陥モジュール予測精度の比較

    第20回ソフトウェア工学の基礎ワークショップ  2013 

     More details

  • OSS開発における一般開発者の協調作業と不具合の再修正に関する一考察

    ルチメディア,分散,協調とモバイル (DICOMO2013) シンポジウム  2013 

     More details

  • 開発要員数とその誤差を考慮した工数見積もり方法

    ソフトウェア工学研究会  2013 

     More details

  • コードの「めずらしさ」に基づく保護機構のステルシネス考察

    第11回情報科学技術フォーラム(FIT2012)  2012 

     More details

  • あとどのくらいレビューすればよいのか?

    ウインターワークショップ2012・イン・琵琶湖  2012 

     More details

  • Java言語を対象とした実行時多様化の試み

    2012年暗号と情報セキュリティシンポジウム  2012 

     More details

  • 即効!開発リーダーとメンバーに役に立つソフトウェアメトリクス ~今あるデータを有効に活用するリポジトリマイニングのノウハウ~, テクニカルセッション

    Embedded Technology West 2012  2012 

     More details

  • 多変量予測モデルにおける目的変数の選択について

    ソフトウェアエンジニアリングシンポジウム2011 併設ワークショップ 「ソフトウェア開発マネジメントの実践と課題」  2012 

     More details

  • 実行時間に依存したプログラムの暗号化

    第11回情報科学技術フォーラム(FIT2012)  2012 

     More details

  • プログラミング学習におけるモチベーション因子と教材の関連

    日本産業技術教育学会近畿支部第29回研究発表会  2012 

     More details

  • 脳血流量に基づくプログラム理解行動の計測

    ソフトウェアプロジェクト研究会  2012 

     More details

  • 命令の乱雑さに基づくプログラム理解性の評価

    第19回ソフトウェア工学の基礎ワークショップ  2012 

     More details

  • バグモジュール予測を用いたテスト工数割り当て戦略

    第19回ソフトウェア工学の基礎ワークショップ  2012 

     More details

  • Javaソフトウエア開発における使用ライブラリの分析

    ソフトウェア信頼性研究会第8回ワークショップ  2012 

     More details

  • A Heuristic Rule Reduction Approach to Software Fault-proneness Prediction

    19th Asia-Pacific Software Engineering Conference (APSEC2012)  2012 

     More details

▼display all

Awards

  • 日本ソフトウェア科学会 フェロー

    2024.9  

     More details

  • 岡山大学工学部教育貢献賞

    2024.3  

     More details

  • 2019年度 基礎研究賞

    2020.9   日本ソフトウェア科学会  

     More details

  • 岡山大学工学部研究功績賞

    2020.3  

     More details

  • 2019年度 情報処理学会ソフトウェア工学研究会 卓越研究賞

    2019.8  

     More details

  • 平成30年度 情報処理学会ソフトウェア工学研究会 卓越研究賞

    2018.9  

     More details

    Country:Japan

    researchmap

  • 岡山大学工学部研究功績賞

    2018  

     More details

    Country:Japan

    researchmap

  • 2017年SEC journal SEC所長賞

    2017  

     More details

    Country:Japan

    researchmap

  • Best Paper Award

    2017  

     More details

    Country:Japan

    researchmap

  • 2015年SEC journal SEC所長賞

    2015  

     More details

    Country:Japan

    researchmap

  • 優秀論文賞

    2013  

     More details

    Country:Japan

    researchmap

  • Best Short Paper Award

    2012  

     More details

  • Best Paper Award

    2012  

     More details

    Country:Japan

    researchmap

▼display all

Research Projects

  • 例外ルールを用いたソフトウェア開発データの解析

    Grant number:24K14896  2024.04 - 2028.03

    日本学術振興会  科学研究費助成事業  基盤研究(C)

    門田 暁人

      More details

    Grant amount:\4680000 ( Direct expense: \3600000 、 Indirect expense:\1080000 )

    researchmap

  • Fundamental and Innovative Technologies for Next-Generation Software Ecosystems

    Grant number:20H05706  2020.08 - 2025.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (S)

    松本 健一, 石尾 隆, 畑 秀明, KULA RAULA・GAIKOVINA, 門田 暁人, 中村 匡秀

      More details

    Grant amount:\189020000 ( Direct expense: \145400000 、 Indirect expense:\43620000 )

    (1)プロダクトのアップサイクリング:マイクロサービス化によるプログラムコードの資産化
    アップサイクリングの候補を増やす手法として、GitHubにおける後継・関連プロジェクトの探索技術を開発した。また、人工知能やプログラム難読化など、自動生成技術によって作り出されたプログラム(ソースコード)の価値を評価するために、ソースコードの独自性、信頼性、実行速度などの品質特性を計測する技術を開発した。
    (2)人とAIの適材適所配置:人とAIの適格性評価,ベンチマーキング
    チームによるソフトウェア開発運用を想定し、信頼できる開発運用者に求められる行動特性(コンピテンシー)を同定すると共に、GitHub上の活動から計測可能なメトリクスとして定義した。また、ソフトウェアライブラリ間の依存関係と開発運用者の貢献度の関係、および、プロジェクトへの新規参入者による初期貢献の定量的評価を通じて、開発運用者の適格性を「貢献」という観点で定量化すると共に、プロジェクトの健全性や持続可能性との関係を明らかにした。
    (3)外部技術情報ともリンクする品質管理:ブロックチェーン技術を用いた情報集約
    GitHub Discussions、GitHub Sponsors profile、GitHub Advisory Databaseなどを対象として、詳細な技術情報の分析や情報取得の自動化の技術を開発した。また、外部技術情報ともリンクした品質管理の主要な機能の一つとして、ソフトウェア更新支援技術の検討,開発を進めた.

    researchmap

  • ソフトウェアバグ予測を題材とする機械学習システムの評価技術の開発

    Grant number:20K11749  2020.04 - 2024.03

    日本学術振興会  科学研究費助成事業  基盤研究(C)

    門田 暁人

      More details

    Grant amount:\4290000 ( Direct expense: \3300000 、 Indirect expense:\990000 )

    学習データに含まれる矛盾の尺度Similar Case Inconsistency Level (SCIL)の定義を与えた.SCILは,データセット中に1つの目的変数が予め指定されることが前提となっており,「与えられた目的変数についての分析や予測を行う」という目的に対し,データセットの品質を評価するための尺度である.SCILの定義にあたって,まず,2つの個体の説明変数の類似度の尺度であるnormalized rank of relative similarity (NRRS)を定義した.NRRSの定義に基づいて,矛盾する個体のペアの定義を与え,全ての個体のペアの数に対する矛盾するペアの割合としてSCILを定義した.
    6つのソフトウェア開発プロジェクトから得られた54件のデータセットを用いて,2種類の目的変数に対するSCILの評価実験を行った.評価実験では,目的変数を予測するモデルとして,線形回帰,決定木,ランダムフォレストを採用し,モデル構築の前処理として対数変換を行った.
    実験の結果,SCILを算出する際に用いる距離尺度としてユークリッド距離を採用した場合に,SCILの値と予測モデルの精度が強い相関を示した.このことから,データセットを用いて予測モデルを構築する前に,SCILによりデータセットの品質を評価することの有効性が示されたと考えている..
    また,機械学習システムの評価に用いる試験用データセットを人工的に生成する方法についても検討を進めた.変数間の相関,回帰式の再現に加えて,データの歪度を再現することで,より実際のデータに近い人工データを生成できることを確認した.

    researchmap

  • Development of Basic Technologies for Accelerating Spontaneous Software Evolution

    Grant number:17H00731  2017.04 - 2020.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (A)

    Matsumoto Kenichi

      More details

    Grant amount:\44850000 ( Direct expense: \34500000 、 Indirect expense:\10350000 )

    We developed the basic technology to realize a platform that accelerates a unique software development paradigm, so-called "Spontaneous Software Evolution," widely, stably, and sustainably way. Specifically, we designed and prototyped a control mechanism (governance framework) that takes smart cities as the model, a set of support bots to improve the efficiency of evolution proposals under the mechanism, and a community currency to motivate individual developers and activate the development community.

    researchmap

  • Generation of mimic data sets from confidential software project data sets

    Grant number:17K00102  2017.04 - 2020.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Monden Akito

      More details

    Grant amount:\4420000 ( Direct expense: \3400000 、 Indirect expense:\1020000 )

    This study proposes a method for artificially generating a mimic software project data set, whose characteristics (related to data distribution and data dependencies) are very similar to a given confidential data set. In this method, companies need to provide only several statistical values of their confidential data. Our experimental evaluation confirmed that the generated mimic data sets can be applied to various data prediction/analysis methods, and, in case that the original data contain enough data points, we could expect obtaining similar prediction/analysis results as the original data set.

    researchmap

  • Development of test simulation framework based on bug prediction

    Grant number:26330086  2014.04 - 2017.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Monden Akito, KAMEI YASUTAKA

      More details

    Grant amount:\4680000 ( Direct expense: \3600000 、 Indirect expense:\1080000 )

    To enable evaluation of effectiveness of test strategies based on software bug prediction, we formalized the problem of test strategies as a nonlinear optimization problem; and then, we showed that the problem can be solved as a separable convex problem. Next, as the bug prediction inherently contain errors, we proposed and evaluated a method that combines test strategies not using bug prediction. Then, to clarify the context where bug prediction become effective, we proposed a method to estimate the maximum amount of reducible test effort by bug prediction. From these achievements, practitioners are able to estimate the expected reducible test effort, which will promote employing bug prediction in industry.

    researchmap

  • A massively distributed technical framework that support crowd-sourcing and collective intelligence formation in software development

    Grant number:23300009  2011.04 - 2014.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    MATSUMOTO Kenichi, NAKAMURA Masahide, MIZUNO Osamu, MORISAKI Shuji, OHIRA Masao, MONDEN Akito

      More details

    Grant amount:\19370000 ( Direct expense: \14900000 、 Indirect expense:\4470000 )

    In this research, we proposed a massively distributed technical framework that support crowd-sourcing and collective intelligence formation in software development. In the crowd-sourcing, software development tasks are outsourced to many unspecified individuals by the Internet technology. The proposed platform consists of two platforms for supporting a multilingual communication and intelligence formation, and for supporting lightweight & massive PDCA cycle execution. Experimental results showed that these sub-platforms have validity and usefulness in terms of supporting the crowd-sourcing and collective intelligence formation in software development. The proposed framework will realize a new massively distributed software development carried by many individuals connected through the Internet technology, and bring risk reduction and quality improvement in software development, by deconstructing the existing multi-layered subcontract system in software development.

    researchmap

  • Development and Evaluation of a Development Task Measurement System

    Grant number:22500028  2010 - 2012

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    MONDEN Akito

      More details

    Grant amount:\3900000 ( Direct expense: \3000000 、 Indirect expense:\900000 )

    This research designs and develops a software development task measurement and analysis system that can measure
    (a) time spent for each task
    (b) amount of operations for each task
    and (c) amount of work products. The system automatically measures both individual and team developers and visualizes the measurement result.
    As a result of experimental evaluation at a software company, a developer became aware of work quantitatively as he continues using the proposed system.

    researchmap

  • A Framework for Software Obfuscation

    Grant number:19500056  2007 - 2009

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    MONDEN Akito, NAKAMURA Masahide, TAMADA Haruaki

      More details

    Grant amount:\4160000 ( Direct expense: \3200000 、 Indirect expense:\960000 )

    To hide secrets in a computer program, this research proposes a framework to apply existing obfuscation methods to a given program. The result of an experimental evaluation showed that secret information and its clues were all hidden by the proposed framework while conventional obfuscation tools could not thoroughly hide the secrets.

    researchmap

  • A Software Component Recommendation System Based on Development Context

    Grant number:17300007  2005 - 2007

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    MATSUMOTO Kenichi, MONDEN Akito, NAKAMURA Masahide, OHIRA Masao

      More details

    Grant amount:\15750000 ( Direct expense: \14700000 、 Indirect expense:\1050000 )

    In modern software development, many of software products are built by combining existing software components and coding only minimal required features. However, selecting necessary components from a number of components is not easy. For instance, Java 2 SDK Standard Edition (J2SE) Version 1.41_02 is widely used by software developers and provides them with 5568 software components (basis classes). From our pilot experiments, we have found that only 4% of the software components of Java 2 SDK were used in typical software development. This result indicates additional coding is still much required, while a variety of software components are currently available to reuse.
    The goal of our study is to realize an efficient environment for components-based software development. Toward achieving the goal, in this research project, we constructed a system that recommends required software components to developers according to the context of software development. Especially we focused on developing the following elemental technologies:
    (A). Birthmark: a technology to analyze the development context which means the progress and/or completeness of development, features and/or structures of software itself, and so forth, by extracting the amount of characteristics from target software under development,
    (B). Collaborative Filtering: a technology to identity and recommend software components which have context similar to target software, and
    (C). Association Visualization: a visualization technology to provide developers with reasons why the system recommends software components to developers.
    We integrated the three technologies into a system and evaluated it.

    researchmap

  • 動的命令を用いたソフトウェアプロテクション

    Grant number:16700033  2004 - 2006

    日本学術振興会  科学研究費助成事業  若手研究(B)

    門田 暁人

      More details

    Grant amount:\3700000 ( Direct expense: \3700000 )

    前年度に行ったシステム設計の見直しに基づいて,動的命令を含むプログラムPを作成するシステムを試作・評価を行い,さらなる安全性の向上について検討した.
    試作システムを用いてPを作成し,Pに含まれるオペコードの値の分布に基づいてPの安全性を評価した結果,システム設計の見直しによって標準偏差が38.83から13.47に改善し,ガウス分布を仮定した場合の(理想的な)標準偏差である12.7に非常に近い値を取ることが確認できた.このことから,攻撃の手がかりが大きく減じたといえる.
    ただし,次の2点が依然として課題として残っている.(1)Pの各行に存在する動的命令(オペコード)は,実行時にそれぞれ一意に解釈されるため,Pを暗号文とみなして暗号解読を行うことが可能であり,元のプログラムPOが推測される可能性がある.(2)Pは,一般に,ライブラリ関数と呼ばれる外部のプログラムを呼び出す場合があり,この呼び出しの存在が攻撃者に手がかりを与える.
    そこで,(1)(2)をそれぞれ解決するための要素技術について検討した.まず,(1)を解決するために,命令列の畳込みという新しい概念を導入し,類似する命令列を一つの命令列にまとめ,それら命令列間の差分を,自己書き換えにより必要な命令(オペコード,及び,オペランド)に置き換える方法を提案した.これにより,Pの各命令は必ずしも一意な解釈を持たなくなり,単純な暗号解読に対する耐性を高めることができた.
    また,(2)を解決するために,Pに含まれるライブラリ関数の名前を暗号化し,それらをPの実行時に復号し,リフレクションや動的リンクの機構を用いて関数を呼び出す方法を提案した.これにより,Pに含まれるライブラリ関数の名前を隠すことが可能となった.

    researchmap

  • Javaプログラムの逆コンパイル防止方法

    Grant number:15700032  2003

    日本学術振興会  科学研究費助成事業  若手研究(B)

    門田 暁人

      More details

    Grant amount:\1200000 ( Direct expense: \1200000 )

    researchmap

  • Javaプログラムを対象とした難読化法

    Grant number:13780237  2001 - 2002

    日本学術振興会  科学研究費助成事業  若手研究(B)

    門田 暁人

      More details

    Grant amount:\2500000 ( Direct expense: \2500000 )

    Java, C言語等で記述されたプログラム中のデータ,及び,演算式の隠蔽を目的とした難読化法を提案した.機密保護,認証等のセキュリティに関わるプログラムにおいては,不正な解析によってプログラム中の秘匿データ(パスワードや暗号鍵,復号鍵等)が漏洩することが大きな問題となっており,データおよび演算の隠蔽の意義や需要は極めて大きい.
    提案する難読化法は,秘匿データを符号化し,さらに,データを符号化したままで演算する枠組みを提供する.提案方法は,次の三つのプロセスより構成される.(1)プログラム中のデータを符号化する,(2)符号化されたデータに対する四則演算の変換を行う,(3)必要に応じて演算結果の復号を行う.本方法により,「実行時にメモリスタック上に現れるデータを監視する」という従来防ぐことが困難であったプログラム解析に対しても秘匿データを隠蔽できる.これまで,このような攻撃からデータを隠蔽する手法は提案されておらず,本研究が初めてである.
    提案方法をいくつかの小規模なプログラムに適用して評価した結果,難読化されたプログラムは,秘匿データを知ることが人間にとって著しく困難となっていることが確認された.また,多くのソフトウェアメトリクス(トークン数,演算数,参照数,代入数)が増加していることが定量的に確認された.また,難読化後のプログラムの実行効率,及び,規模の増大は,プログラムの読みにくさの増大とトレードオフの関係にあることが確認された.

    researchmap

  • 拡張視線インタフェースの研究

    Grant number:12878064  2000 - 2001

    日本学術振興会  科学研究費助成事業  萌芽的研究

    松本 健一, 門田 暁人, 島 和之

      More details

    Grant amount:\2100000 ( Direct expense: \2100000 )

    拡張視線インタフェースの適用対象(Windows98上のアプリケーションソフト)のユーザインタフェース上で行われる操作を整理し,各操作をより基本的な操作(プリミティブ操作)に分解した.更に,プリミティブ操作のうち視線で操作するものとそれ以外のものを区別した.具体的には,アプリケーションソフトのボタンを選択する操作において,「マウスカーソルの移動(移動操作)は視線で,操作対象であることの確認(確定操作)はマウスのクリックで,それぞれを行う」とした.
    拡張視線インタフェースの具体例の一つとして,「生物・化学実験向け資料閲覧インタフェース」の設計と実装を行った.生物・化学実験では,実験手順書に従って煩雑な作業を正確に実施する必要がある.文章だけでは説明の難しい作業については,作業の様子を撮影したビデオ(解説ビデオ)が作成される場合もある.しかし,実験中,実験者の両手は塞がっている.
    設計,実装したインタフェースでは,手順書とビデオ映像は閲覧用ディスプレイに表示される.手順書のページめくり等は,対応するアイコンに視線を向け,フットペダルを踏むことで行う.また,ビデオ映像は視線を向けると再生され,視線をそらすと一時停止する.
    「アジの解剖実験」を対象として,実装したインタフェースの評価実験を行った.1時間ほどの解剖実験において,実装したインタフェースを使用しなかった5名の被験者(実験者)では,操作ミスが平均6.6回,操作順序ミスが平均1.8回発生した.一方,実装したインタフェースを使用した使った5名の被験者(実験者)では,操作ミスも操作順序ミスも発生しなかった.また,実験後に行った被験者に対するアンケートの結果からは,ディスプレイ表示される手順書にビデオ映像による説明が加わると,解剖実験で行う操作やその順序が非常に理解しやすくなることも確認できた.

    researchmap

  • ソフトウェア電子透かし法の提案と評価

    Grant number:11780308  1999 - 2000

    日本学術振興会  科学研究費助成事業  奨励研究(A)

    門田 暁人

      More details

    Grant amount:\2200000 ( Direct expense: \2200000 )

    本研究では,盗用の疑いのあるソフトウェア(コンピュータプログラム)の発見を容易にすることを目的として,プログラム開発者の署名等を電子透かしとしてJavaクラスファイルに挿入する方法,および,取り出す方法を提案,実装し,提案方式の評価実験を行った.提案方法は,透かしを挿入してもプログラムの実行効率が変わらず,ツールによる透かしの取り出しの自動化が容易であり,ツールを公開した場合にも透かしの上書き攻撃を回避できるという特徴を持つ.透かしの耐性を実験により評価した結果,obfuscatorと呼ばれるプログラムの難読化ツールによる攻撃後も電子透かしは消えないこと,および,逆コンパイル,再コンパイルによる攻撃に対しても半数以上の透かしは消えないことが確認された.
    従来研究では,プログラムに対する電子透かしの原理については論じられているが,それを実際に応用することの必要性や実用性については,必ずしも具体的に整理されてない.これに対し,本論文では,「盗用されたJavaクラスファイルの発見」という実用的な目的を設定し,それに対する解として妥当な性質を持った電子透かし法の提案,実装を行った.提案手法を用いることで,例えば,インターネット上のJavaアプレット等に対して透かしの有無を検知・検査するサーチロボットを稼動させて,プログラムの盗用を監視することが現実的に可能となる.
    さらに従来研究では,提案された方式の実装,評価は必ずしも行われていないのに対し,本研究では,本提案手法に基づいて実装した電子透かしツールをWebページ上で公開し,実際に利用・評価を行えるように無償提供している.本研究では,限定的ではあるが,提案方法による電子透かしの耐性についても実装したツールを用いて評価を行っている.

    researchmap

▼display all

 

Class subject in charge

  • Algorithms and Computational Complexity (2024academic year) Second semester  - 木5~6

  • Algorithms and Computational Complexity (2024academic year) Second semester  - 木5~6

  • Automata and Languages (2024academic year) Second semester  - 火3~4,金1~2

  • Automata and Languages (2024academic year) Second semester  - 火3~4,金1~2

  • Software Analytics (2024academic year) Prophase  - その他

  • Software Engineering (2024academic year) Fourth semester  - 月1~2

  • Software Engineering (2024academic year) Fourth semester  - 月1~2

  • Software Design (2024academic year) Third semester  - 月5~6,水3~4

  • Software Design (2024academic year) Third semester  - 月5~6,水3~4

  • Database Systems (2024academic year) Second semester  - 月7~8,木1~2

  • Database Systems (2024academic year) Second semester  - 月7~8,木1~2

  • Programming Language Theory (2024academic year) Fourth semester  - 月1~2

  • Quantitative Management of Software Projects (2024academic year) Prophase  - 火1~2,金5~6

  • Quantitative Management of Software Projects (2024academic year) Prophase  - 火1~2,金5~6

  • Practical Programming (2024academic year) Second semester  - 木7~8,その他

  • Practical Programming (2024academic year) Second semester  - 木7~8,その他

  • Introduction to Information Technology (2024academic year) 1st semester  - その他

  • Engineering English (2024academic year) Late  - その他

  • Engineering English (2024academic year) Late  - その他

  • Mathematical Logic (2024academic year) Third semester  - 日3~4

  • Mathematical Logic (2024academic year) Third semester  - 水3~4

  • Mathematical Logic (2024academic year) Third semester  - 水3~4

  • Advanced Study (2024academic year) Other  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2024academic year) Year-round  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2024academic year) Other  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2024academic year) Year-round  - その他

  • Technical Writing 1 (2024academic year) Prophase  - その他

  • Technical Writing 2 (2024academic year) Late  - その他

  • Technical Writing (2024academic year) Prophase  - その他

  • Technical Presentation (2024academic year) Late  - その他

  • Computer Mathematics I (2024academic year) Second semester  - 火3~4,金1~2

  • Specific Research of Electronics and Information Systems Engineering (2024academic year) Year-round  - その他

  • Undergraduate Research Experience 3 (2024academic year) special  - その他

  • Object-Oriented Programming Languages (2023academic year) Summer concentration  - その他

  • Object-Oriented Programming Languages (2023academic year) Summer concentration  - その他

  • Automata and Languages (2023academic year) Second semester  - 火3~4,金1~2

  • Automata and Languages (2023academic year) Second semester  - 火3~4,金1~2

  • Software Analytics (2023academic year) Prophase  - その他

  • Software Analytics (2023academic year) Prophase  - その他

  • Software Engineering (2023academic year) Fourth semester  - 月3~4

  • Software Engineering (2023academic year) Fourth semester  - 月1~2

  • Software Design (2023academic year) Third semester  - 月5~6,水3~4

  • Software Design (2023academic year) Third semester  - 月5~6,水3~4

  • Database Systems (2023academic year) Second semester  - 月7~8,木1~2

  • Database Systems (2023academic year) Second semester  - 月7~8,木1~2

  • Programming Language Theory (2023academic year) Fourth semester  - 月1~2

  • Quantitative Management of Software Projects (2023academic year) Prophase  - 火1~2,金5~6

  • Quantitative Management of Software Projects (2023academic year) Prophase  - 火1~2,金5~6

  • Practical Programming (2023academic year) Second semester  - 火7~8,その他

  • Practical Programming (2023academic year) Second semester  - 火7~8,その他

  • Introduction to Information Technology (2023academic year) 1st semester  - その他

  • Engineering English (2023academic year) Late  - その他

  • Engineering English (2023academic year) Late  - その他

  • Advanced Study (2023academic year) Other  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2023academic year) Year-round  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2023academic year) Other  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2023academic year) Year-round  - その他

  • Technical Writing 1 (2023academic year) Prophase  - その他

  • Technical Writing 2 (2023academic year) Late  - その他

  • Technical Writing (2023academic year) Prophase  - その他

  • Technical Presentation (2023academic year) Late  - その他

  • Computer Mathematics I (2023academic year) Second semester  - 火3~4,金1~2

  • Specific Research of Electronics and Information Systems Engineering (2023academic year) Year-round  - その他

  • Automata and Languages (2022academic year) Second semester  - 火3~4,金1~2

  • Fundamental Computer Science 2 (2022academic year) Second semester  - その他

  • Software Analytics (2022academic year) Prophase  - その他

  • Software Engineering (2022academic year) Fourth semester  - 月3~4

  • Software Design (2022academic year) Third semester  - 月1~2,金5~6

  • Database Systems (2022academic year) Second semester  - 月1~2,木1~2

  • Programming Language Theory (2022academic year) Fourth semester  - 月3~4

  • Quantitative Management of Software Projects (2022academic year) Prophase  - 火1~2,金5~6

  • Introduction to Information Technology (2022academic year) 1st semester  - その他

  • Engineering English (2022academic year) Late  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2022academic year) Year-round  - その他

  • Technical Writing (2022academic year) Prophase  - その他

  • Technical Presentation (2022academic year) Late  - その他

  • Computer Mathematics I (2022academic year) Second semester  - 火3~4,金1~2

  • Specific Research of Electronics and Information Systems Engineering (2022academic year) Year-round  - その他

  • Automata and Languages (2021academic year) Second semester  - 火3,火4,金1,金2

  • Fundamental Computer Science 2 (2021academic year) Second semester  - その他

  • Software Analytics (2021academic year) Prophase  - その他

  • Software Engineering (2021academic year) Fourth semester  - 月3,月4

  • Software Design (2021academic year) Third semester  - 月1,月2,金5,金6

  • Database Systems (2021academic year) Second semester  - 月1,月2,木1,木2

  • Database Theory (2021academic year) Second semester  - 月1,月2,木1,木2

  • Quantitative Management of Software Projects (2021academic year) Prophase  - 火1~2,金5~6

  • Introduction to Information Technology (2021academic year) special  - その他

  • Introduction to Information Technology (2021academic year) special  - その他

  • Engineering English (2021academic year) Late  - その他

  • Seminar in Theory of Programming and Artificial Intelligence (2021academic year) Year-round  - その他

  • Technical Writing (2021academic year) Prophase  - その他

  • Technical Presentation (2021academic year) Late  - その他

  • Computer Mathematics I (2021academic year) Second semester  - 火3,火4,金1,金2

  • Specific Research of Electronics and Information Systems Engineering (2021academic year) Year-round  - その他

  • Automata and Languages (2020academic year) Second semester  - 火3,火4,金1,金2

  • Fundamental Computer Science 1 (2020academic year) 1st semester  - 金3,金4

  • Fundamental Computer Science 2 (2020academic year) Second semester  - 金3,金4

  • Software Analytics (2020academic year) Prophase  - その他

  • Software Engineering (2020academic year) Fourth semester  - 月3,月4

  • Software Design (2020academic year) Third semester  - 月1,月2,金5,金6

  • Database Systems (2020academic year) Second semester  - 月1,月2,木1,木2

  • Database Theory (2020academic year) Second semester  - 月1,月2,木1,木2

  • Programming Language Theory (2020academic year) Fourth semester  - 月3,月4

  • Quantitative Management of Software Projects (2020academic year) Prophase  - その他

  • Introduction to Information Technology (2020academic year) Summer concentration  - その他

  • Introduction to Information Technology (2020academic year) Summer concentration  - その他

  • Engineering English (2020academic year) Late  - その他

  • Basic Physics (Classical Mechanics) 1 (2020academic year) Third semester  - 火5,火6

  • Basic Physics (Classical Mechanics) 2 (2020academic year) Fourth semester  - 火5,火6

  • Basic Physics 1(Classical Mechanics) (2020academic year) 3rd and 4th semester  - 火5,火6

  • Seminar in Theory of Programming and Artificial Intelligence (2020academic year) Year-round  - その他

  • Technical Writing (2020academic year) Prophase  - その他

  • Technical Presentation (2020academic year) Late  - その他

  • Computer Mathematics I (2020academic year) Second semester  - 火3,火4,金1,金2

  • Logic Language (2020academic year) Third semester  - 月1,月2,金5,金6

  • Specific Research of Electronics and Information Systems Engineering (2020academic year) Year-round  - その他

▼display all