2008 |
34 | EE | Yasutaka Kamei,
Akito Monden,
Shuuji Morisaki,
Ken-ichi Matsumoto:
A hybrid faulty module prediction using association rule mining and logistic regression analysis.
ESEM 2008: 279-281 |
33 | EE | Yasutaka Kamei,
Jacky Keung,
Akito Monden,
Ken-ichi Matsumoto:
An over-sampling method for analogy-based software effort estimation.
ESEM 2008: 312-314 |
32 | EE | Hidetake Uwano,
Akito Monden,
Ken-ichi Matsumoto:
Are good code reviewers also good at design review?
ESEM 2008: 351-353 |
31 | EE | Koji Toda,
Akito Monden,
Ken-ichi Matsumoto:
Fit data selection for software effort estimation models.
ESEM 2008: 360-361 |
30 | EE | Hidetake Uwano,
Akito Monden,
Ken-ichi Matsumoto:
DRESREM 2: An Analysis System for Multi-document Software Review Using Reviewers' Eye Movements.
ICSEA 2008: 177-183 |
2007 |
29 | EE | Yasutaka Kamei,
Akito Monden,
Shinsuke Matsumoto,
Takeshi Kakimoto,
Ken-ichi Matsumoto:
The Effects of Over and Under Sampling on Fault-prone Module Detection.
ESEM 2007: 196-204 |
28 | EE | Naoki Ohsugi,
Akito Monden,
Nahomi Kikuchi,
Michael D. Barker,
Masateru Tsunoda,
Takeshi Kakimoto,
Ken-ichi Matsumoto:
Is This Cost Estimate Reliable? -- The Relationship between Homogeneity of Analogues and Estimation Reliability.
ESEM 2007: 384-392 |
27 | EE | Shinsuke Matsumoto,
Yasutaka Kamei,
Akito Monden,
Ken-ichi Matsumoto:
Comparison of Outlier Detection Methods in Fault-proneness Models.
ESEM 2007: 461-463 |
26 | EE | Shuuji Morisaki,
Akito Monden,
Tomoko Matsumura,
Haruaki Tamada,
Ken-ichi Matsumoto:
Defect Data Analysis Based on Extended Association Rule Mining.
MSR 2007: 3 |
25 | EE | Hidetake Uwano,
Masahide Nakamura,
Akito Monden,
Ken-ichi Matsumoto:
Exploiting Eye Movements for Evaluating Reviewer's Performance in Software Review.
IEICE Transactions 90-A(10): 2290-2300 (2007) |
2006 |
24 | | Hiroki Yamauchi,
Yuichiro Kanzaki,
Akito Monden:
Software obfuscation from crackers' viewpoint.
ACST 2006: 286-291 |
23 | EE | Hidetake Uwano,
Masahide Nakamura,
Akito Monden,
Ken-ichi Matsumoto:
Analyzing individual performance of source code review using reviewers' eye movement.
ETRA 2006: 133-140 |
22 | EE | Masateru Tsunoda,
Akito Monden,
Hiroshi Yadohisa,
Nahomi Kikuchi,
Ken-ichi Matsumoto:
Productivity analysis of Japanese enterprise software development projects.
MSR 2006: 14-17 |
21 | EE | Takeshi Kakimoto,
Akito Monden,
Yasutaka Kamei,
Haruaki Tamada,
Masateru Tsunoda,
Ken-ichi Matsumoto:
Using software birthmarks to identify similar classes and major functionalities.
MSR 2006: 171-172 |
20 | EE | Masateru Tsunoda,
Akito Monden,
Takeshi Kakimoto,
Yasutaka Kamei,
Ken-ichi Matsumoto:
Analyzing OSS developers' working time using mailing lists archives.
MSR 2006: 181-182 |
2005 |
19 | EE | Yuichiro Kanzaki,
Hiroshi Igaki,
Masahide Nakamura,
Akito Monden:
Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process.
ACSW Frontiers 2005: 145-151 |
18 | EE | Tomohiro Akinaga,
Naoki Ohsugi,
Masateru Tsunoda,
Takeshi Kakimoto,
Akito Monden,
Ken-ichi Matsumoto:
Recommendation of Software Technologies Based on Collaborative Filtering.
APSEC 2005: 209-216 |
17 | | Masateru Tsunoda,
Takeshi Kakimoto,
Naoki Ohsugi,
Akito Monden,
Ken-ichi Matsumoto:
Javawock: A Java Class Recommender System Based on Collaborative Filtering.
SEKE 2005: 491-497 |
16 | EE | Akito Monden,
Antoine Monsifrot,
Clark D. Thomborson:
Tamper-Resistant Software System Based on a Finite State Machine.
IEICE Transactions 88-A(1): 112-122 (2005) |
15 | EE | Haruaki Tamada,
Masahide Nakamura,
Akito Monden,
Ken-ichi Matsumoto:
Java Birthmarks - Detecting the Software Theft - .
IEICE Transactions 88-D(9): 2148-2158 (2005) |
14 | EE | Akito Monden,
Ken-ichi Matsumoto,
Masatake Yamato:
Evaluation of gaze-added target selection methods suitable for general GUIs.
IJCAT 24(1): 17-24 (2005) |
2004 |
13 | EE | Akito Monden,
Antoine Monsifrot,
Clark D. Thomborson:
A Framework for Obfuscated Interpretation.
ACSW Frontiers 2004: 7-16 |
12 | | Haruaki Tamada,
Masahide Nakamura,
Akito Monden:
Design and evaluation of birthmarks for detecting theft of java programs.
IASTED Conf. on Software Engineering 2004: 569-574 |
11 | EE | Naoki Ohsugi,
Masateru Tsunoda,
Akito Monden,
Ken-ichi Matsumoto:
Effort Estimation Based on Collaborative Filtering.
PROFES 2004: 274-286 |
10 | EE | Shuuji Morisaki,
Yumi Shiraishi,
Masatake Yamato,
Akito Monden,
Ken-ichi Matsumoto,
Koji Torii:
A support system for software function discovery using histories of function executions.
Systems and Computers in Japan 35(12): 93-106 (2004) |
2003 |
9 | EE | Yuichiro Kanzaki,
Akito Monden,
Masahide Nakamura,
Ken-ichi Matsumoto:
Exploiting Self-Modification Mechanism for Program Protection.
COMPSAC 2003: 170- |
8 | EE | Masahide Nakamura,
Akito Monden,
Tomoaki Itoh,
Ken-ichi Matsumoto,
Yuichiro Kanzaki,
Hirotsugu Satoh:
Queue-Based Cost Evaluation of Mental Simulation Process in Program Comprehension.
IEEE METRICS 2003: 351- |
2002 |
7 | EE | Naoki Ohsugi,
Akito Monden,
Ken-ichi Matsumoto:
A Recommendation System for Software Function Discovery.
APSEC 2002: 248- |
6 | EE | Akito Monden,
Daikai Nakae,
Toshihiro Kamiya,
Shin-ichi Sato,
Ken-ichi Matsumoto:
Software Quality Analysis by Code Clones in Industrial Legacy Software.
IEEE METRICS 2002: 87- |
5 | EE | Shinji Uchida,
Akito Monden,
Hajimu Iida,
Ken-ichi Matsumoto,
Hideo Kudo:
A Multiple-View Analysis Model of Debugging Processes.
ISESE 2002: 139-147 |
4 | EE | Tomoko Matsumura,
Akito Monden,
Ken-ichi Matsumoto:
The Detection of Faulty Code Violating Implicit Coding Rules.
ISESE 2002: 173-182 |
2000 |
3 | | Masatake Yamamoto,
Akito Monden,
Ken-ichi Matsumoto,
Katsuro Inoue,
Koji Torii:
Button Selection for General GUIs Using Eye and Hand Together.
Advanced Visual Interfaces 2000: 270-273 |
2 | EE | Akito Monden,
Hajimu Iida,
Ken-ichi Matsumoto,
Koji Torii,
Katsuro Inoue:
A Practical Method for Watermarking Java Programs.
COMPSAC 2000: 191-197 |
1 | | Akito Monden,
Shin-ichi Sato,
Ken-ichi Matsumoto,
Katsuro Inoue:
Modeling and Analysis of Software Aging Process.
PROFES 2000: 140-153 |