Search Results - "Kaijiri, K."
-
1
Identifying stakeholders and their preferences about NFR by comparing use case diagrams of several existing systems
Published in Proceedings. 12th IEEE International Requirements Engineering Conference, 2004 (2004)“…We present a method to identify stakeholders and their preferences about non-functional requirements (NFR) by using use case diagrams of existing systems. We…”
Get full text
Conference Proceeding -
2
Trade-off analysis between security policies for Java mobile codes and requirements for Java application
Published in Proceedings. 11th IEEE International Requirements Engineering Conference, 2003 (2003)“…We propose a method for analyzing trade-off between security policies for Java mobile codes and requirements for Java application. We assume that mobile codes…”
Get full text
Conference Proceeding -
3
Modeling software characteristics and their correlations in a specific domain by comparing existing similar systems
Published in Fifth International Conference on Quality Software (QSIC'05) (2005)“…Software in a specific domain has several characteristics and each characteristic should be fixed when the software requirements are specified. In addition,…”
Get full text
Conference Proceeding -
4
Enhancing Domain Knowledge for Requirements Elicitation with Web Mining
Published in 2010 Asia Pacific Software Engineering Conference (01-11-2010)“…To elicit software requirements, we have to have knowledge about a problem domain, e.g., healthcare, shopping or banking where the software is applied. A…”
Get full text
Conference Proceeding -
5
VDM over PSP: a pilot course for VDM beginners to confirm its suitability for their development
Published in Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003 (2003)“…Although formal methods seem to be useful, there is no clear way for beginners to know whether the methods are suitable for them and for their problem domain,…”
Get full text
Conference Proceeding -
6
Specifying runtime environments and functionalities of downloadable components under the sandbox model
Published in Proceedings International Symposium on Principles of Software Evolution (2000)“…We propose a specification of both runtime environments and software components which can be loaded not only from your local system but also from the other…”
Get full text
Conference Proceeding -
7
Model Transformation Patterns for Introducing Suitable Information Systems
Published in 2012 19th Asia-Pacific Software Engineering Conference (01-12-2012)“…When information systems are introduced in a social setting such as a business, the systems will give bad and good impacts on stakeholders in the setting…”
Get full text
Conference Proceeding -
8
Spectrum Analysis for Software Quality Requirements Using Analyses Records
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…Defining quality requirements enough is more difficult than defining functional requirements because stakeholders do not state most of quality requirements…”
Get full text
Conference Proceeding -
9
Reliable Authentication Method by Using Cellular Phones in WBT
Published in International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06) (2006)“…Institutions of higher education that give the credits by distance learning using WBT have increased recently. In these situations, the authentication model by…”
Get full text
Conference Proceeding -
10
Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques
Published in 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (01-07-2011)“…Most industrial products are developed based on their former products including software. Revising existing software according to new requirements is thus an…”
Get full text
Conference Proceeding -
11
So/M: A Requirements Definition Tool Using Characteristics of Existing Similar Systems
Published in 2008 32nd Annual IEEE International Computer Software and Applications Conference (01-07-2008)“…During a software system development, existing similar systems are useful because such systems and their documents help developers to understand and reuse…”
Get full text
Conference Proceeding -
12
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Published in 2006 Sixth International Conference on Quality Software (QSIC'06) (01-10-2006)“…Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system…”
Get full text
Conference Proceeding -
13
FC method: a practical approach to improve quality and efficiency of software processes for embedded system revision
Published in Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004 (2004)“…We introduce a design method for revising embedded software system. Engineers can accept requirements changes of hardware components and functions reasonably…”
Get full text
Conference Proceeding -
14
Conducting requirements evolution by replacing components in the current system
Published in Proceedings Sixth Asia Pacific Software Engineering Conference (ASPEC'99) (Cat. No.PR00509) (1999)“…As new software components become available for an existing system, we can evolve not only the system itself but also its requirements based on the new…”
Get full text
Conference Proceeding -
15
Implementation of HyperFM data broadcasting system
Published in 1998 International Zurich Seminar on Broadband Communications. Accessing, Transmission, Networking. Proceedings (Cat. No.98TH8277) (1998)“…In this paper, a HyperFM data broadcasting system is proposed, in which hypertext data are transmitted toward personal computers via an FM (frequency…”
Get full text
Conference Proceeding