2007 |
6 | EE | Shuuji Morisaki,
Akito Monden,
Tomoko Matsumura,
Haruaki Tamada,
Ken-ichi Matsumoto:
Defect Data Analysis Based on Extended Association Rule Mining.
MSR 2007: 3 |
2006 |
5 | EE | Masahide Nakamura,
Akihiro Tanaka,
Hiroshi Igaki,
Haruaki Tamada,
Ken-ichi Matsumoto:
Adapting Legacy Home Appliances to Home Network Systems UsingWeb Services.
ICWS 2006: 849-858 |
4 | EE | Takeshi Kakimoto,
Akito Monden,
Yasutaka Kamei,
Haruaki Tamada,
Masateru Tsunoda,
Ken-ichi Matsumoto:
Using software birthmarks to identify similar classes and major functionalities.
MSR 2006: 171-172 |
2005 |
3 | EE | Haruaki Tamada,
Masahide Nakamura,
Akito Monden,
Ken-ichi Matsumoto:
Java Birthmarks - Detecting the Software Theft - .
IEICE Transactions 88-D(9): 2148-2158 (2005) |
2004 |
2 | | Haruaki Tamada,
Masahide Nakamura,
Akito Monden:
Design and evaluation of birthmarks for detecting theft of java programs.
IASTED Conf. on Software Engineering 2004: 569-574 |
1 | EE | Masahide Nakamura,
Hiroshi Igaki,
Haruaki Tamada,
Ken-ichi Matsumoto:
Implementing integrated services of networked home appliances using service oriented architecture.
ICSOC 2004: 269-278 |