Search Results - "Aman, Hirohisa"

Refine Results
  1. 1

    An extended study on applicability and performance of homogeneous cross-project defect prediction approaches under homogeneous cross-company effort estimation situation by Amasaki, Sousuke, Aman, Hirohisa, Yokogawa, Tomoyuki

    “…Software effort estimation (SEE) models have been studied for decades. One of serious but typical situations for data-oriented models is the availability of…”
    Get full text
    Journal Article
  2. 2

    Empirical study of abnormality in local variables and its application to fault‐prone Java method analysis by Aman, Hirohisa, Amasaki, Sousuke, Yokogawa, Tomoyuki, Kawahara, Minoru

    “…Programmers are familiar with local variables, and in many cases, they can freely define the local variables they use. Thus, the properties of these variables…”
    Get full text
    Journal Article
  3. 3

    On the Effects of File-level Information on Method-level Bug Localization by Amasaki, Sousuke, Aman, Hirohisa, Yokogawa, Tomoyuki

    “…CONTEXT: Automated bug localization is expected to help developers reducing effort and has been studied for years. One of the major approaches for this topic…”
    Get full text
    Conference Proceeding
  4. 4

    An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application to Fault-Prone Program Analysis by Yamauchi, Kazuki, Aman, Hirohisa, Amasaki, Sousuke, Yokogawa, Tomoyuki, Kawahara, Minoru

    “…To support successful quality managements of open source software (OSS) projects, this paper proposes to measure the balance of developers’ contributions to a…”
    Get full text
    Journal Article
  5. 5

    An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File by Burhandenny, Aji Ery, Aman, Hirohisa, Kawahara, Minoru

    “…This paper focuses on an evaluation of coding violation warned by a static code analysis tool while considering the change history of violation and the…”
    Get full text
    Journal Article
  6. 6

    Multi proxy anchor family loss for several types of gradients by Saeki, Shozo, Kawahara, Minoru, Aman, Hirohisa

    Published in Computer vision and image understanding (01-03-2023)
    “…The deep metric learning (DML) objective is to learn a neural network that maps into an embedding space where similar data are near and dissimilar data are…”
    Get full text
    Journal Article
  7. 7

    Game-theoretic approach to epidemic modeling of countermeasures against future malware evolution by Miura, Hideyoshi, Kimura, Tomotaka, Aman, Hirohisa, Hirata, Kouji

    Published in Computer communications (01-06-2023)
    “…Recently, vulnerability mining techniques that discover unknown vulnerabilities based on machine learning have been attracted much attention for protecting…”
    Get full text
    Journal Article
  8. 8

    An automated detection of confusing variable pairs with highly similar compound names in Java and Python programs by Aman, Hirohisa, Amasaki, Sousuke, Yokogawa, Tomoyuki, Kawahara, Minoru

    “…Variable names represent a significant source of information regarding the source code, and a successful naming of variables is key to producing readable code…”
    Get full text
    Journal Article
  9. 9

    Consistency Verification of UML Sequence Diagrams Modeling Wireless Sensor Networks by Matsumoto, Akira, Yokogawa, Tomoyuki, Amasaki, Sousuke, Aman, Hirohisa, Arimoto, Kazutami

    “…Automatic consistency checking for UML state machine diagrams and sequence diagrams has been expected since developers spend considerable effort to keep the…”
    Get full text
    Conference Proceeding
  10. 10

    Stochastic modeling of self-evolving botnets with vulnerability discovery by Kudo, Takanori, Kimura, Tomotaka, Inoue, Yoshiaki, Aman, Hirohisa, Hirata, Kouji

    Published in Computer communications (01-06-2018)
    “…Machine learning techniques have been actively studied and achieved significant performance improvements in various kinds of tasks. While we benefit from such…”
    Get full text
    Journal Article
  11. 11

    0-1 Programming Model-Based Method for Planning Code Review Using Bug Fix History by Aman, Hirohisa

    “…Code review is a powerful activity for software quality improvement, and is ideal to review all source files being developed. However, such an exhaustive…”
    Get full text
    Conference Proceeding
  12. 12

    A Comparative Study of Vectorization-Based Static Test Case Prioritization Methods by Aman, Hirohisa, Amasaki, Sousuke, Yokogawa, Tomoyuki, Kawahara, Minoru

    “…To enhance the efficiency of software testing, researchers have studied various test case prioritization (TCP) methods. A topic model-based TCP is one of the…”
    Get full text
    Conference Proceeding
  13. 13

    A Comparative Study of Vectorization Methods on BugLocator by Amasaki, Sousuke, Aman, Hirohisa, Yokogawa, Tomoyuki

    “…CONTEXT: Debugging is a labor-intensive and time-consuming activity. Automatic bug localization techniques have been proposed for reducing this effort. Among…”
    Get full text
    Conference Proceeding
  14. 14

    A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization by Asato, Masanao, Aman, Hirohisa, Amasaki, Sousuke, Yokogawa, Tomoyuki, Kawahara, Minoru

    “…Once a software bug is reported, it is crucial to locate the source file causing the bug and fix it as soon as possible. To this end, there have been various…”
    Get full text
    Conference Proceeding
  15. 15

    A Doc2Vec-Based Assessment of Comments and Its Application to Change-Prone Method Analysis by Aman, Hirohisa, Amasaki, Sousuke, Yokogawa, Tomoyuki, Kawahara, Minoru

    “…Comments in a source program can be helpful artifacts for program comprehension. While many comments are useful documents embedded in source programs, there…”
    Get full text
    Conference Proceeding
  16. 16

    Fault-Prone Java Method Analysis Focusing on Pair of Local Variables with Confusing Names by Tashima, Keiichiro, Aman, Hirohisa, Amasaki, Sousuke, Yokogawa, Tomoyuki, Kawahara, Minoru

    “…Giving a name to a local variable is usually a programmer's discretion. Since it depends on the programmer's preference and experience, there is a lot of…”
    Get full text
    Conference Proceeding
  17. 17

    An Empirical Analysis of the Impact of Comment Statements on Fault-Proneness of Small-Size Module by Aman, H.

    “…Code size metrics are commonly useful in predicting fault-prone modules, and the larger module tends to be more faulty. In other words, small-size modules are…”
    Get full text
    Conference Proceeding
  18. 18

    Examination of Coding Violations Focusing on Their Change Patterns over Releases by Burhandenny, Aji Ery, Aman, Hirohisa, Kawahara, Minoru

    “…Code review is an essential activity to ensure the quality of code being developed, and there have been static code checkers for aiding an effective code…”
    Get full text
    Conference Proceeding
  19. 19

    Empirical Analysis of Fault-Proneness in Methods by Focusing on their Comment Lines by Aman, Hirohisa, Amasaki, Sousuke, Sasaki, Takashi, Kawahara, Minoru

    “…This paper focuses on comments described in Java programs, and conducts an empirical analysis about relationships between comments and fault-proneness in the…”
    Get full text
    Conference Proceeding Journal Article
  20. 20