Search Results - "Aman, Hirohisa"
-
1
An extended study on applicability and performance of homogeneous cross-project defect prediction approaches under homogeneous cross-company effort estimation situation
Published in Empirical software engineering : an international journal (01-03-2022)“…Software effort estimation (SEE) models have been studied for decades. One of serious but typical situations for data-oriented models is the availability of…”
Get full text
Journal Article -
2
Empirical study of abnormality in local variables and its application to fault‐prone Java method analysis
Published in Journal of software : evolution and process (01-04-2020)“…Programmers are familiar with local variables, and in many cases, they can freely define the local variables they use. Thus, the properties of these variables…”
Get full text
Journal Article -
3
On the Effects of File-level Information on Method-level Bug Localization
Published in 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA) (01-08-2020)“…CONTEXT: Automated bug localization is expected to help developers reducing effort and has been studied for years. One of the major approaches for this topic…”
Get full text
Conference Proceeding -
4
An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application to Fault-Prone Program Analysis
Published in The International journal of networked and distributed computing (Online) (2018)“…To support successful quality managements of open source software (OSS) projects, this paper proposes to measure the balance of developers’ contributions to a…”
Get full text
Journal Article -
5
An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File
Published in The International journal of networked and distributed computing (Online) (2017)“…This paper focuses on an evaluation of coding violation warned by a static code analysis tool while considering the change history of violation and the…”
Get full text
Journal Article -
6
Multi proxy anchor family loss for several types of gradients
Published in Computer vision and image understanding (01-03-2023)“…The deep metric learning (DML) objective is to learn a neural network that maps into an embedding space where similar data are near and dissimilar data are…”
Get full text
Journal Article -
7
Game-theoretic approach to epidemic modeling of countermeasures against future malware evolution
Published in Computer communications (01-06-2023)“…Recently, vulnerability mining techniques that discover unknown vulnerabilities based on machine learning have been attracted much attention for protecting…”
Get full text
Journal Article -
8
An automated detection of confusing variable pairs with highly similar compound names in Java and Python programs
Published in Empirical software engineering : an international journal (01-09-2023)“…Variable names represent a significant source of information regarding the source code, and a successful naming of variables is key to producing readable code…”
Get full text
Journal Article -
9
Consistency Verification of UML Sequence Diagrams Modeling Wireless Sensor Networks
Published in 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI) (01-07-2019)“…Automatic consistency checking for UML state machine diagrams and sequence diagrams has been expected since developers spend considerable effort to keep the…”
Get full text
Conference Proceeding -
10
Stochastic modeling of self-evolving botnets with vulnerability discovery
Published in Computer communications (01-06-2018)“…Machine learning techniques have been actively studied and achieved significant performance improvements in various kinds of tasks. While we benefit from such…”
Get full text
Journal Article -
11
0-1 Programming Model-Based Method for Planning Code Review Using Bug Fix History
Published in 2013 20th Asia-Pacific Software Engineering Conference (APSEC) (01-12-2013)“…Code review is a powerful activity for software quality improvement, and is ideal to review all source files being developed. However, such an exhaustive…”
Get full text
Conference Proceeding -
12
A Comparative Study of Vectorization-Based Static Test Case Prioritization Methods
Published in 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA) (01-08-2020)“…To enhance the efficiency of software testing, researchers have studied various test case prioritization (TCP) methods. A topic model-based TCP is one of the…”
Get full text
Conference Proceeding -
13
A Comparative Study of Vectorization Methods on BugLocator
Published in 2019 45th Euromicro Conference on Software Engineering and Advanced Applications (SEAA) (01-08-2019)“…CONTEXT: Debugging is a labor-intensive and time-consuming activity. Automatic bug localization techniques have been proposed for reducing this effort. Among…”
Get full text
Conference Proceeding -
14
A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization
Published in 2020 27th Asia-Pacific Software Engineering Conference (APSEC) (01-12-2020)“…Once a software bug is reported, it is crucial to locate the source file causing the bug and fix it as soon as possible. To this end, there have been various…”
Get full text
Conference Proceeding -
15
A Doc2Vec-Based Assessment of Comments and Its Application to Change-Prone Method Analysis
Published in 2018 25th Asia-Pacific Software Engineering Conference (APSEC) (01-12-2018)“…Comments in a source program can be helpful artifacts for program comprehension. While many comments are useful documents embedded in source programs, there…”
Get full text
Conference Proceeding -
16
Fault-Prone Java Method Analysis Focusing on Pair of Local Variables with Confusing Names
Published in 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA) (01-08-2018)“…Giving a name to a local variable is usually a programmer's discretion. Since it depends on the programmer's preference and experience, there is a lot of…”
Get full text
Conference Proceeding -
17
An Empirical Analysis of the Impact of Comment Statements on Fault-Proneness of Small-Size Module
Published in 2012 19th Asia-Pacific Software Engineering Conference (01-12-2012)“…Code size metrics are commonly useful in predicting fault-prone modules, and the larger module tends to be more faulty. In other words, small-size modules are…”
Get full text
Conference Proceeding -
18
Examination of Coding Violations Focusing on Their Change Patterns over Releases
Published in 2016 23rd Asia-Pacific Software Engineering Conference (APSEC) (2016)“…Code review is an essential activity to ensure the quality of code being developed, and there have been static code checkers for aiding an effective code…”
Get full text
Conference Proceeding -
19
Empirical Analysis of Fault-Proneness in Methods by Focusing on their Comment Lines
Published in 2014 21st Asia-Pacific Software Engineering Conference (01-12-2014)“…This paper focuses on comments described in Java programs, and conducts an empirical analysis about relationships between comments and fault-proneness in the…”
Get full text
Conference Proceeding Journal Article -
20