Search Results - "Kaijiri, K"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Identifying stakeholders and their preferences about NFR by comparing use case diagrams of several existing systems by Kaiya, H., Osada, A., Kaijiri, K.

    “…We present a method to identify stakeholders and their preferences about non-functional requirements (NFR) by using use case diagrams of existing systems. We…”
    Get full text
    Conference Proceeding
  2. 2

    Trade-off analysis between security policies for Java mobile codes and requirements for Java application by Kaiya, H., Sasaki, K., Maebashi, Y., Kaijiri, K.

    “…We propose a method for analyzing trade-off between security policies for Java mobile codes and requirements for Java application. We assume that mobile codes…”
    Get full text
    Conference Proceeding
  3. 3

    Modeling software characteristics and their correlations in a specific domain by comparing existing similar systems by Osada, A., Ozawa, D., Kaiya, H., Kaijiri, K.

    “…Software in a specific domain has several characteristics and each characteristic should be fixed when the software requirements are specified. In addition,…”
    Get full text
    Conference Proceeding
  4. 4

    Enhancing Domain Knowledge for Requirements Elicitation with Web Mining by Kaiya, H, Shimizu, Y, Yasui, H, Kaijiri, K, Saeki, M

    “…To elicit software requirements, we have to have knowledge about a problem domain, e.g., healthcare, shopping or banking where the software is applied. A…”
    Get full text
    Conference Proceeding
  5. 5

    VDM over PSP: a pilot course for VDM beginners to confirm its suitability for their development by Suzumori, H., Kaiya, H., Kaijiri, K.

    “…Although formal methods seem to be useful, there is no clear way for beginners to know whether the methods are suitable for them and for their problem domain,…”
    Get full text
    Conference Proceeding
  6. 6

    Specifying runtime environments and functionalities of downloadable components under the sandbox model by Kaiya, H., Kaijiri, K.

    “…We propose a specification of both runtime environments and software components which can be loaded not only from your local system but also from the other…”
    Get full text
    Conference Proceeding
  7. 7

    Model Transformation Patterns for Introducing Suitable Information Systems by Kaiya, H., Morita, S., Ogata, S., Kaijiri, K., Hayashi, S., Saeki, M.

    “…When information systems are introduced in a social setting such as a business, the systems will give bad and good impacts on stakeholders in the setting…”
    Get full text
    Conference Proceeding
  8. 8

    Spectrum Analysis for Software Quality Requirements Using Analyses Records by Kaiya, H., Suzuki, S., Ogawa, T., Tanigawa, M., Umemura, M., Kaijiri, K.

    “…Defining quality requirements enough is more difficult than defining functional requirements because stakeholders do not state most of quality requirements…”
    Get full text
    Conference Proceeding
  9. 9

    Reliable Authentication Method by Using Cellular Phones in WBT by Takamizawa, H., Kaijiri, K.

    “…Institutions of higher education that give the credits by distance learning using WBT have increased recently. In these situations, the authentication model by…”
    Get full text
    Conference Proceeding
  10. 10

    Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques by Kaiya, H., Hara, K., Kobayashi, K., Osada, A., Kaijiri, K.

    “…Most industrial products are developed based on their former products including software. Revising existing software according to new requirements is thus an…”
    Get full text
    Conference Proceeding
  11. 11

    So/M: A Requirements Definition Tool Using Characteristics of Existing Similar Systems by Kitazawa, N., Osada, A., Kamijo, K., Kaiya, H., Kaijiri, K.

    “…During a software system development, existing similar systems are useful because such systems and their documents help developers to understand and reuse…”
    Get full text
    Conference Proceeding
  12. 12

    PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application by Kaiya, H., Sasaki, K., Kaijiri, K.

    “…Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system…”
    Get full text
    Conference Proceeding
  13. 13

    FC method: a practical approach to improve quality and efficiency of software processes for embedded system revision by Aizawa, K., Kaiya, H., Kaijiri, K.

    “…We introduce a design method for revising embedded software system. Engineers can accept requirements changes of hardware components and functions reasonably…”
    Get full text
    Conference Proceeding
  14. 14

    Conducting requirements evolution by replacing components in the current system by Kaiya, H., Kaijiri, K.

    “…As new software components become available for an existing system, we can evolve not only the system itself but also its requirements based on the new…”
    Get full text
    Conference Proceeding
  15. 15

    Implementation of HyperFM data broadcasting system by Changzheng Wang, Lockhart, E., Kaijiri, K., Hirano, K.

    “…In this paper, a HyperFM data broadcasting system is proposed, in which hypertext data are transmitted toward personal computers via an FM (frequency…”
    Get full text
    Conference Proceeding