Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Shuji Morisaki
@article{DBLP:journals/access/MorisakiWK24, author = {Shuji Morisaki and Michiyo Wakimoto and Norimitsu Kasai}, title = {Assessing Critical Adaptations in Automated Adaptive Software Systems by Stage Decomposition}, journal = {{IEEE} Access}, volume = {12}, pages = {17859--17875}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3360275}, doi = {10.1109/ACCESS.2024.3360275}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MorisakiWK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ImanishiKM23, author = {Yoji Imanishi and Kazuhiro Kumon and Shuji Morisaki}, title = {Identifying Defect Injection Risks from Analysis and Design Diagrams: An Industrial Case Study at Sony}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering: Software Engineering in Practice, SEIP@ICSE 2023, Melbourne, Australia, May 14-20, 2023}, pages = {420--431}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE-SEIP58684.2023.00044}, doi = {10.1109/ICSE-SEIP58684.2023.00044}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/ImanishiKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WakimotoM22, author = {Michiyo Wakimoto and Shuji Morisaki}, title = {Goal-Oriented Software Design Reviews}, journal = {{IEEE} Access}, volume = {10}, pages = {32584--32594}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3161545}, doi = {10.1109/ACCESS.2022.3161545}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WakimotoM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/ZhiM21, author = {Qiang Zhi and Shuji Morisaki}, title = {An Evaluation of Value-Oriented Review for Software Requirements Specification}, journal = {Comput. Syst. Sci. Eng.}, volume = {37}, number = {3}, pages = {443--461}, year = {2021}, url = {https://doi.org/10.32604/csse.2021.015157}, doi = {10.32604/CSSE.2021.015157}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/ZhiM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsssp/ZhouZLM21, author = {Zhengshu Zhou and Qiang Zhi and Zilong Liang and Shuji Morisaki}, title = {A Goal-Oriented Approach to Requirements Development and Quantitative Security Assurance}, journal = {Int. J. Syst. Softw. Secur. Prot.}, volume = {12}, number = {1}, pages = {46--62}, year = {2021}, url = {https://doi.org/10.4018/ijsssp.2021010103}, doi = {10.4018/IJSSSP.2021010103}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsssp/ZhouZLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsssp/ZhiZM21, author = {Qiang Zhi and Zhengshu Zhou and Shuji Morisaki}, title = {A Composite Safety Assurance Method for Developing System Architecture Using Model Checking}, journal = {Int. J. Syst. Softw. Secur. Prot.}, volume = {12}, number = {1}, pages = {78--93}, year = {2021}, url = {https://doi.org/10.4018/ijsssp.2021010105}, doi = {10.4018/IJSSSP.2021010105}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsssp/ZhiZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouZMY20, author = {Zhengshu Zhou and Qiang Zhi and Shuji Morisaki and Shuichiro Yamamoto}, title = {An Evaluation of Quantitative Non-Functional Requirements Assurance Using ArchiMate}, journal = {{IEEE} Access}, volume = {8}, pages = {72395--72410}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2987964}, doi = {10.1109/ACCESS.2020.2987964}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouZMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouZMY20a, author = {Zhengshu Zhou and Qiang Zhi and Shuji Morisaki and Shuichiro Yamamoto}, title = {A Systematic Literature Review on Enterprise Architecture Visualization Methodologies}, journal = {{IEEE} Access}, volume = {8}, pages = {96404--96427}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2995850}, doi = {10.1109/ACCESS.2020.2995850}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouZMY20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijeis/ZhouZMY20, author = {Zhengshu Zhou and Qiang Zhi and Shuji Morisaki and Shuichiro Yamamoto}, title = {{IMAF:} {A} Visual Innovation Methodology Based on ArchiMate Framework}, journal = {Int. J. Enterp. Inf. Syst.}, volume = {16}, number = {1}, pages = {31--52}, year = {2020}, url = {https://doi.org/10.4018/IJEIS.2020010102}, doi = {10.4018/IJEIS.2020010102}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijeis/ZhouZMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/WakabayashiMKAY20, author = {Takehiro Wakabayashi and Shuji Morisaki and Norimitsu Kasai and Noritoshi Atsumi and Shuichiro Yamamoto}, title = {Tool Supported Detection of Omissions by Comparing Words between Requirements and Design Document}, journal = {J. Inf. Process.}, volume = {28}, pages = {136--149}, year = {2020}, url = {https://doi.org/10.2197/ipsjjip.28.136}, doi = {10.2197/IPSJJIP.28.136}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/WakabayashiMKAY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/HayashiFDKMY19, author = {Kaori Hayashi and Kenji Fujimoto and Midori Daida and Nobuhide Kobayashi and Shuji Morisaki and Shuichiro Yamamoto}, title = {A Method of Knowledge Sharing for Controlling Hardware in Automotive Software Development}, booktitle = {8th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2019, Toyama, Japan, July 7-11, 2019}, pages = {843--846}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IIAI-AAI.2019.00171}, doi = {10.1109/IIAI-AAI.2019.00171}, timestamp = {Tue, 25 Feb 2020 17:16:42 +0100}, biburl = {https://dblp.org/rec/conf/iiaiaai/HayashiFDKMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/ZhiZMY19, author = {Qiang Zhi and Zhengshu Zhou and Shuji Morisaki and Shuichiro Yamamoto}, title = {An Approach for Requirements Elicitation using Goal, Question, and Answer}, booktitle = {8th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2019, Toyama, Japan, July 7-11, 2019}, pages = {847--852}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IIAI-AAI.2019.00172}, doi = {10.1109/IIAI-AAI.2019.00172}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiaiaai/ZhiZMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/ZhouZYM19, author = {Zhengshu Zhou and Qiang Zhi and Shuichiro Yamamoto and Shuji Morisaki}, title = {A Proposal for Developing {EA} Models toward Innovation}, booktitle = {8th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2019, Toyama, Japan, July 7-11, 2019}, pages = {853--858}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IIAI-AAI.2019.00173}, doi = {10.1109/IIAI-AAI.2019.00173}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiaiaai/ZhouZYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiaiaai/WakimotoMY19, author = {Michiyo Wakimoto and Shuji Morisaki and Shuichiro Yamamoto}, title = {A Case Study of Requirements Ambiguities and Goal-oriented Focused Requirements Specification}, booktitle = {8th International Congress on Advanced Applied Informatics, {IIAI-AAI} 2019, Toyama, Japan, July 7-11, 2019}, pages = {908--913}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IIAI-AAI.2019.00183}, doi = {10.1109/IIAI-AAI.2019.00183}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iiaiaai/WakimotoMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/MorisakiKKY19, author = {Shuji Morisaki and Norimitsu Kasai and Koyo Kanamori and Shuichiro Yamamoto}, editor = {Masahide Nakamura and Hiroaki Hirata and Takayuki Ito and Takanobu Otsuka and Shun Okuhara}, title = {Detecting Source Code Hotspot in Games Software Using Call Flow Analysis}, booktitle = {20th {IEEE/ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2019, Toyama, Japan, July 8-11, 2019}, pages = {484--489}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SNPD.2019.8935822}, doi = {10.1109/SNPD.2019.8935822}, timestamp = {Tue, 07 Sep 2021 18:19:39 +0200}, biburl = {https://dblp.org/rec/conf/snpd/MorisakiKKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WatanabeMYKM18, author = {Takashi Watanabe and Akito Monden and Zeynep Y{\"{u}}cel and Yasutaka Kamei and Shuji Morisaki}, title = {Cross-Validation-Based Association Rule Prioritization Metric for Software Defect Characterization}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {9}, pages = {2269--2278}, year = {2018}, url = {https://doi.org/10.1587/transinf.2018EDP7020}, doi = {10.1587/TRANSINF.2018EDP7020}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WatanabeMYKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ZhiYM18, author = {Qiang Zhi and Shuichiro Yamamoto and Shuji Morisaki}, title = {{IMSA} - Intra Model Security Assurance}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {2}, pages = {18--32}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.05.31.018}, doi = {10.22667/JISIS.2018.05.31.018}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ZhiYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/MiyabayashiAMY18, author = {Ryota Miyabayashi and Noritoshi Atsumi and Shuji Morisaki and Shuichiro Yamamoto}, editor = {Nobukazu Yoshioka and Hironori Washizaki and Eduardo B. Fern{\'{a}}ndez and Tomoko Kaneko and Shuichiro Yamamoto and Fuyuki Ishikawa and Foutse Khomh and Giuliano Antoniol}, title = {An Assurance Case Approach for Software Code Security}, booktitle = {Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference {(APSEC} 2018), Nara, Japan, December 4, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2809}, pages = {5--9}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2809/WESPr-18\_01.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:12 +0100}, biburl = {https://dblp.org/rec/conf/apsec/MiyabayashiAMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jckbse/YamamotoM18, author = {Shuichiro Yamamoto and Shuji Morisaki}, editor = {Maria Virvou and Fumihiro Kumeno and Konstantinos Oikonomou}, title = {Quantitative Evaluation of {IT} Management Activity Knowledge}, booktitle = {Knowledge-Based Software Engineering: 2018, Proceedings of the 12th Joint Conference on Knowledge-Based Software Engineering {(JCKBSE} 2018) Corfu, Greece}, pages = {97--107}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97679-2\_10}, doi = {10.1007/978-3-319-97679-2\_10}, timestamp = {Mon, 18 Feb 2019 10:44:49 +0100}, biburl = {https://dblp.org/rec/conf/jckbse/YamamotoM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/YamamotoZM18, author = {Shuichiro Yamamoto and Qiang Zhi and Shuji Morisaki}, editor = {Robert J. Howlett and Lakhmi C. Jain and Zoran Popovic and Dejan B. Popovic and Slobodan N. Vukosavic and Carlos Toro and Yulia Hicks}, title = {A Composite Dependability for Enterprise Architecture}, booktitle = {Knowledge-Based and Intelligent Information {\&} Engineering Systems: Proceedings of the 22nd International Conference KES-2018, Belgrade, Serbia, 3-5 September 2018}, series = {Procedia Computer Science}, volume = {126}, pages = {1130--1137}, publisher = {Elsevier}, year = {2018}, url = {https://doi.org/10.1016/j.procs.2018.08.050}, doi = {10.1016/J.PROCS.2018.08.050}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/kes/YamamotoZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/MorisakiK18, author = {Shuji Morisaki and Norimitsu Kasai}, title = {An Approach for Detecting Critical Adaptations in Automated Adaptive Software Systems}, booktitle = {2018 {IEEE} International Conference on Software Quality, Reliability and Security Companion, {QRS} Companion 2018, Lisbon, Portugal, July 16-20, 2018}, pages = {526--530}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/QRS-C.2018.00094}, doi = {10.1109/QRS-C.2018.00094}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/qrs/MorisakiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwesep/WakabayashiMAY17, author = {Takehiro Wakabayashi and Shuji Morisaki and Noritoshi Atsumi and Shuichiro Yamamoto}, title = {An Empirical Evaluation of Detecting Omissions by Comparing Words between Requirement and Architectural Documents}, booktitle = {8th International Workshop on Empirical Software Engineering in Practice, {IWESEP} 2017, Tokyo, Japan, March 13, 2017}, pages = {12--17}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/IWESEP.2017.20}, doi = {10.1109/IWESEP.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwesep/WakabayashiMAY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KobayashiMAY16, author = {Nobuhide Kobayashi and Shuji Morisaki and Noritoshi Atsumi and Shuichiro Yamamoto}, title = {Quantitative Non Functional Requirements evaluation using softgoal weight}, journal = {J. Internet Serv. Inf. Secur.}, volume = {6}, number = {1}, pages = {37--46}, year = {2016}, url = {https://doi.org/10.22667/JISIS.2016.02.31.037}, doi = {10.22667/JISIS.2016.02.31.037}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KobayashiMAY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/WatanabeMKM16, author = {Takashi Watanabe and Akito Monden and Yasutaka Kamei and Shuji Morisaki}, title = {Identifying recurring association rules in software defect prediction}, booktitle = {15th {IEEE/ACIS} International Conference on Computer and Information Science, {ICIS} 2016, Okayama, Japan, June 26-29, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICIS.2016.7550867}, doi = {10.1109/ICIS.2016.7550867}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/WatanabeMKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse2/YamamotoM16, author = {Shuichiro Yamamoto and Shuji Morisaki}, title = {A system theoretic assurance case review}, booktitle = {11th International Conference on Computer Science {\&} Education, {ICCSE} 2016, Nagoya, Japan, August 23-25, 2016}, pages = {992--996}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICCSE.2016.7581719}, doi = {10.1109/ICCSE.2016.7581719}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iccse2/YamamotoM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/YamamotoM16, author = {Shuichiro Yamamoto and Shuji Morisaki}, title = {{IT} Demand Governance using Business Goal Structuring Notation}, booktitle = {6th International Conference on {IT} Convergence and Security, {ICITCS} 2016, Prague, Czech Republic, September 26, 2016}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICITCS.2016.7740346}, doi = {10.1109/ICITCS.2016.7740346}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/YamamotoM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/KobayashiYUMY16, author = {Nobuhide Kobayashi and Hikari Yamada and Hiroyuki Utsunomiya and Shuji Morisaki and Shuichiro Yamamoto}, editor = {Robert J. Howlett and Lakhmi C. Jain and Bogdan Gabrys and Carlos Toro and Chee Peng Lim}, title = {The Evaluation Knowledge of Standard Software Asset using The Seven Samurai Framework}, booktitle = {Knowledge-Based and Intelligent Information {\&} Engineering Systems: Proceedings of the 20th International Conference KES-2016, York, UK, 5-7 September 2016}, series = {Procedia Computer Science}, volume = {96}, pages = {782--790}, publisher = {Elsevier}, year = {2016}, url = {https://doi.org/10.1016/j.procs.2016.08.238}, doi = {10.1016/J.PROCS.2016.08.238}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/kes/KobayashiYUMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/KobayashiMY16, author = {Nobuhide Kobayashi and Shuji Morisaki and Shuichiro Yamamoto}, editor = {Ilsun You and Fang{-}Yie Leu and Hsing{-}Chung Chen and Igor V. Kotenko}, title = {Mobile Security Assurance for Automotive Software Through ArchiMate}, booktitle = {Mobile Internet Security - First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {797}, pages = {10--20}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-7850-7\_2}, doi = {10.1007/978-981-10-7850-7\_2}, timestamp = {Wed, 17 Jan 2018 14:38:18 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/KobayashiMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/KasubuchiMYO15, author = {Kiyotaka Kasubuchi and Shuji Morisaki and Akiko Yoshida and Chikako Ogawa}, editor = {Rainer Koschke and Jens Krinke and Martin P. Robillard}, title = {An empirical evaluation of the effectiveness of inspection scenarios developed from a defect repository}, booktitle = {2015 {IEEE} International Conference on Software Maintenance and Evolution, {ICSME} 2015, Bremen, Germany, September 29 - October 1, 2015}, pages = {439--448}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSM.2015.7332495}, doi = {10.1109/ICSM.2015.7332495}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/KasubuchiMYO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/YamamotoM14, author = {Shuichiro Yamamoto and Shuji Morisaki}, title = {An Evaluation of Assuring Test Case Sufficiency Using a D-Case Pattern}, booktitle = {25th {IEEE} International Symposium on Software Reliability Engineering Workshops, {ISSRE} Workshops, Naples, Italy, November 3-6, 2014}, pages = {455--460}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISSREW.2014.10}, doi = {10.1109/ISSREW.2014.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/YamamotoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/KasaiMM13, author = {Norimitsu Kasai and Shuji Morisaki and Ken{-}ichi Matsumoto}, editor = {Pornsiri Muenchaisri and Gregg Rothermel}, title = {Fault-Prone Module Prediction Using a Prediction Model and Manual Inspection}, booktitle = {20th Asia-Pacific Software Engineering Conference, {APSEC} 2013, Ratchathewi, Bangkok, Thailand, December 2-5, 2013 - Volume 1}, pages = {106--115}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/APSEC.2013.25}, doi = {10.1109/APSEC.2013.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsec/KasaiMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/MondenKMKM12, author = {Akito Monden and Jacky Wai Keung and Shuji Morisaki and Yasutaka Kamei and Ken{-}ichi Matsumoto}, editor = {Karl R. P. H. Leung and Pornsiri Muenchaisri}, title = {A Heuristic Rule Reduction Approach to Software Fault-proneness Prediction}, booktitle = {19th Asia-Pacific Software Engineering Conference, {APSEC} 2012, Hong Kong, China, December 4-7, 2012}, pages = {838--847}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/APSEC.2012.103}, doi = {10.1109/APSEC.2012.103}, timestamp = {Sun, 08 Aug 2021 01:40:48 +0200}, biburl = {https://dblp.org/rec/conf/apsec/MondenKMKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/NishizonoMVM11, author = {Kazuki Nishizono and Shuji Morisaki and Rodrigo A. Vivanco and Ken{-}ichi Matsumoto}, title = {Source code comprehension strategies and metrics to predict comprehension effort in software maintenance and evolution tasks - an empirical study with industry practitioners}, booktitle = {{IEEE} 27th International Conference on Software Maintenance, {ICSM} 2011, Williamsburg, VA, USA, September 25-30, 2011}, pages = {473--481}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICSM.2011.6080814}, doi = {10.1109/ICSM.2011.6080814}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/NishizonoMVM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsm/SasakiMM11, author = {Tatsuya Sasaki and Shuji Morisaki and Ken{-}ichi Matsumoto}, editor = {Koichi Matsuda and Ken{-}ichi Matsumoto and Akito Monden}, title = {An Exploratory Study on the Impact of Usage of Screenshot in Software Inspection Recording Activity}, booktitle = {2011 Joint Conf of 21st Int'l Workshop on Software Measurement and the 6th Int'l Conference on Software Process and Product Measurement, IWSM/Mensura 2011, Nara, Japan, November 3-4, 2011}, pages = {251--256}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IWSM-MENSURA.2011.53}, doi = {10.1109/IWSM-MENSURA.2011.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsm/SasakiMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/MatsumuraMMM08, author = {Tomoko Matsumura and Shuji Morisaki and Akito Monden and Ken{-}ichi Matsumoto}, title = {Analyzing Factors of Defect Correction Effort in a Multi-Vendor Information System Development}, journal = {J. Comput. Inf. Syst.}, volume = {49}, number = {1}, pages = {73--80}, year = {2008}, url = {https://doi.org/10.1080/08874417.2008.11645308}, doi = {10.1080/08874417.2008.11645308}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcis/MatsumuraMMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esem/KameiMMM08, author = {Yasutaka Kamei and Akito Monden and Shuji Morisaki and Ken{-}ichi Matsumoto}, editor = {H. Dieter Rombach and Sebastian G. Elbaum and J{\"{u}}rgen M{\"{u}}nch}, title = {A hybrid faulty module prediction using association rule mining and logistic regression analysis}, booktitle = {Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, {ESEM} 2008, October 9-10, 2008, Kaiserslautern, Germany}, pages = {279--281}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1414004.1414051}, doi = {10.1145/1414004.1414051}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esem/KameiMMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msr/MorisakiMMTM07, author = {Shuji Morisaki and Akito Monden and Tomoko Matsumura and Haruaki Tamada and Ken{-}ichi Matsumoto}, title = {Defect Data Analysis Based on Extended Association Rule Mining}, booktitle = {Fourth International Workshop on Mining Software Repositories, {MSR} 2007 {(ICSE} Workshop), Minneapolis, MN, USA, May 19-20, 2007, Proceedings}, pages = {3}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MSR.2007.5}, doi = {10.1109/MSR.2007.5}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msr/MorisakiMMTM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/MorisakiSYMMT04, author = {Shuji Morisaki and Yumi Shiraishi and Masatake Yamato and Akito Monden and Ken{-}ichi Matsumoto and Koji Torii}, title = {A support system for software function discovery using histories of function executions}, journal = {Syst. Comput. Jpn.}, volume = {35}, number = {12}, pages = {93--106}, year = {2004}, url = {https://doi.org/10.1002/scj.10024}, doi = {10.1002/SCJ.10024}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/MorisakiSYMMT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/HanakawaMM98, author = {Noriko Hanakawa and Shuji Morisaki and Ken{-}ichi Matsumoto}, editor = {Koji Torii and Kokichi Futatsugi and Richard A. Kemmerer}, title = {A Learning Curve Based Simulation Model for Software Development}, booktitle = {Forging New Links, Proceedings of the 1998 International Conference on Software Engineering, {ICSE} 98, Kyoto, Japan, April 19-25, 1998}, pages = {350--359}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ICSE.1998.671388}, doi = {10.1109/ICSE.1998.671388}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/HanakawaMM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.