{"id":155,"date":"2021-03-02T20:28:50","date_gmt":"2021-03-02T11:28:50","guid":{"rendered":"http:\/\/se.cite.ehime-u.ac.jp\/jp\/?page_id=155"},"modified":"2026-03-17T14:31:25","modified_gmt":"2026-03-17T05:31:25","slug":"paper","status":"publish","type":"page","link":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/research\/paper\/","title":{"rendered":"\u767a\u8868\u8ad6\u6587"},"content":{"rendered":"<div class=\"breadcrumbs align  wp-block-bcn-breadcrumb-trail has-text-color has-background\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">\n\t<span><\/span>\n\t<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u5ba4.\" href=\"https:\/\/se.cite.ehime-u.ac.jp\/jp\" class=\"home\" aria-current=\"page\"><span property=\"name\">\u30db\u30fc\u30e0<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div>\n\n\n<div style=\"text-align:right\"><a href=\"https:\/\/se.cite.ehime-u.ac.jp\/\" title=\"English\"><img decoding=\"async\" src=\"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-content\/plugins\/multisite-language-switcher\/assets\/flags\/us.png\" alt=\"en_US\"\/> English<\/a><\/div>\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2026 \u5e74<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u4f0f\u539f \u88d5\u751f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a href=\"https:\/\/doi.org\/10.11309\/jssst.43.1_68\" target=\"_blank\" rel=\"noreferrer noopener\">Python \u30c6\u30b9\u30c8\u30b9\u30e1\u30eb\u304c\u88ab\u30c6\u30b9\u30c8\u30b3\u30fc\u30c9\u306e\u30d0\u30b0\u6f5c\u5728\u6027\u306b\u53ca\u307c\u3059\u5f71\u97ff\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u5206\u6790<\/a>\uff0c&#8221;<br>\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cVol.43, No.1, pp.68&#8211;83, Feb. 2026.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a\u30fb\u5927\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u8305\u91ce \u7acb\uff0c\u6a2a\u5ddd \u667a\u6559\uff0c\u9808\u7530 \u5143\u592a\u90ce\uff0c\u5929\u5d5c \u8061\u4ecb\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u6709\u672c \u548c\u6c11\uff0c<br>&#8220;<a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/records\/2007718\" target=\"_blank\" rel=\"noreferrer noopener\">UE5 Blueprint\u306e\u30b2\u30fc\u30e0\u30b9\u30af\u30ea\u30d7\u30c8\u3092\u5bfe\u8c61\u3068\u3057\u305f\u30e2\u30c7\u30eb\u691c\u67fb\u306b\u3088\u308b\u81ea\u52d5\u691c\u8a3c\u74b0\u5883\u306e\u958b\u767a<\/a>,&#8221;<br>\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u7814\u7a76\u5831\u544a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\uff08SE\uff09\uff0cVol. 2026-SE-222, No. 18, pp. 1&#8211;8, Mar. 2026.<\/li>\n\n\n\n<li>\u6ff1 \u5bff\u5c06\uff0c\u6a2a\u5ddd \u667a\u6559\uff0c\u5929\u5d5c \u8061\u4ecb\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u6709\u672c \u548c\u6c11\uff0c<br>&#8220;<a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/records\/2007722\" target=\"_blank\" rel=\"noreferrer noopener\">\u30d3\u30b8\u30e5\u30a2\u30eb\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u306b\u57fa\u3065\u304fnuXmv\u306e\u30e2\u30c7\u30eb\u4f5c\u6210\u652f\u63f4\u30c4\u30fc\u30eb\u306e\u958b\u767a<\/a>,&#8221;<br>\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u7814\u7a76\u5831\u544a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\uff08SE\uff09\uff0cVol. 2026-SE-222, No. 22, pp. 1&#8211;8, Mar. 2026.<\/li>\n\n\n\n<li>\u7389\u4e95\u611b\u83dc\uff0c\u4f50\u4f2f\u660c\u9020\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u5ddd\u539f\u3000\u7a14\uff0c<br>\u201c<a href=\"https:\/\/ken.ieice.org\/ken\/paper\/20260302vcSC\/\">\u5909\u6570\u540d\u306b\u4f7f\u308f\u308c\u308b\u7565\u8a9e\u306e\u50be\u5411\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u7684\u8abf\u67fb \uff5e \u540d\u524d\u5909\u66f4\u30ea\u30d5\u30a1\u30af\u30bf\u30ea\u30f3\u30b0\u306e\u652f\u63f4\u306b\u5411\u3051\u305f\u8abf\u67fb \uff5e<\/a>,\u201d <br>\u4fe1\u5b66\u6280\u5831, vol. 125, no. 376, SS2025-42, pp. 73-78, Mar. 2026.<\/li>\n\n\n\n<li>\u5ca1\u5143\u7d00\u885b\uff0c\u4f50\u4f2f\u660c\u9020\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u5ddd\u539f\u3000\u7a14\uff0c<br>\u201c<a href=\"https:\/\/ken.ieice.org\/ken\/paper\/202603033cSG\/\">Kotlin\u30b3\u30fc\u30c9\u5411\u3051\u9759\u7684\u89e3\u6790\u30c4\u30fc\u30eb\u306b\u304a\u3051\u308b\u8b66\u544a\u306e\u6709\u7528\u6027\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u5206\u6790<\/a>,\u201d <br>\u4fe1\u5b66\u6280\u5831, vol. 125, no. 376, SS2025-45, pp. 91-96, Mar. 2026.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2025 \u5e74<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u4e09\u597d \u6dbc\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a href=\"https:\/\/doi.org\/10.11309\/jssst.42.4_16\" target=\"_blank\" rel=\"noreferrer noopener\">\u89e3\u7b54\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u30d9\u30af\u30c8\u30eb\u8868\u73fe\u306b\u57fa\u3065\u3044\u305f\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u554f\u984c\u9593\u306e\u985e\u4f3c\u6027\u8a55\u4fa1\u3068\u63a8\u85a6\u3078\u306e\u5fdc\u7528<\/a>\uff0c&#8221;<br>\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cVol.42, No.4, pp.16&#8211;22, Nov. 2025.<\/li>\n\n\n\n<li>Shozo Saeki, Minoru Kawahara and Hirohisa Aman,<br>&#8220;<a href=\"https:\/\/doi.org\/10.1016\/j.media.2025.103721\" target=\"_blank\" rel=\"noreferrer noopener\">ViFT: Visual field transformer for visual field testing via deep reinforcement learning<\/a>,&#8221;<br>Medical Image Analysis, Vol. 105, pp. 103721:1&#8211;15, Oct. 2025.<\/li>\n\n\n\n<li>\u5927\u5d8b \u7409\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a href=\"https:\/\/doi.org\/10.11309\/jssst.42.1_69\" target=\"_blank\" rel=\"noreferrer noopener\">\u8a18\u53f7\u5b9f\u884c\u6280\u8853\u3068\u30df\u30e5\u30fc\u30c6\u30fc\u30b7\u30e7\u30f3\u6280\u8853\u3092\u7d44\u307f\u5408\u308f\u305b\u305f\u30c6\u30b9\u30c8\u30c7\u30fc\u30bf\u81ea\u52d5\u751f\u6210<\/a>,&#8221;<br>\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cVol.42, No.1, pp.69&#8211;82, Feb. 2025.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-strong-blue-color\"><span style=\"color:#0003ff\" class=\"tadv-color\">\u56fd\u969b\u4f1a\u8b70<\/span><\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Tomoya Yamashita, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, and Minoru Kawahara,<br>&#8220;<a href=\"https:\/\/doi.org\/10.1007\/978-3-032-12089-2_33\" target=\"_blank\" rel=\"noreferrer noopener\">An Application of Program Mutations for Generating Negative Test Scripts Mimicking Human Errors on Web Applications<\/a>,&#8221;<br>Scanniello, G., Lenarduzzi, V., Romano, S., Vegas, S., Francese, R. (eds) Product-Focused Software Process Improvement, Lecture Notes in Computer Science, vol. 16361, Springer, Cham, pp. 479&#8211;488, Nov. 2025.<\/li>\n\n\n\n<li>Takeshi Niiyama, Hirohisa Aman, and Takashi Ninomiya,<br>&#8220;An Application of ChatGPT4o to Generate Requirement Definition Documents and Its Evaluation: An Industrial Case Study,&#8221;<br>Proc. 2025 the 7th World Symposium on Software Engineering (WSSE2025) (to appear).<\/li>\n\n\n\n<li>Shozo Saeki, Minoru Kawahara and Hirohisa Aman,<br>\u201c<a href=\"https:\/\/doi.org\/10.1109\/ICINT65528.2025.11030880\" target=\"_blank\" rel=\"noreferrer noopener\">Secure Low-Complexity k-MCMC for Large-Scale Datasets with Fully Homomorphic Encryption<\/a>, \u201d<br>Proc. 10th International Conference on Information and Network Technologies (ICINT2025), pp.47\u201353, Mar. 2025.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #00a000;\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\/\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><\/mark><\/strong>\n<ol class=\"wp-block-list\">\n<li>\u65b0\u5c71 \u525b\u53f8\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u4e8c\u5bae \u5d07\uff0c<br>&#8220;<a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/records\/2004384\" target=\"_blank\" rel=\"noreferrer noopener\">ChatGPT4o\u3092\u7528\u3044\u305f\u8981\u4ef6\u5b9a\u7fa9\u652f\u63f4\u53ca\u3073\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u751f\u6210\u652f\u63f4\u306e\u5b9f\u7528\u6027\u306b\u95a2\u3059\u308b\u8003\u5bdf &#8212;\u4eba\u624b\u306b\u3088\u308b\u5546\u7528\u88fd\u54c1\u958b\u767a\u3068\u306e\u6bd4\u8f03&#8212;<\/a>,&#8221; <br>\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02025\u8ad6\u6587\u96c6, Vol. 2025, pp.63&#8211;72, Sept. 2025.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\"><\/mark><\/strong><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a\u30fb\u5927\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u5c71\u4e0b\u667a\u4e5f\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u5ddd\u539f\u7a14\uff0c<br>&#8220;<a href=\"https:\/\/jssst.or.jp\/files\/user\/taikai\/2025\/papers\/4b-1-R.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u30c6\u30b9\u30c8\u30b9\u30af\u30ea\u30d7\u30c8\u306b\u5bfe\u3059\u308b\u30df\u30e5\u30fc\u30c6\u30fc\u30b7\u30e7\u30f3\u3068\u753b\u9762\u9077\u79fb\u306e\u6bd4\u8f03\u306b\u57fa\u3065\u3044\u305fWeb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u7570\u5e38\u7cfb\u30c6\u30b9\u30c8\u652f\u63f4\u624b\u6cd5\u306e\u63d0\u6848<\/a>,&#8221;<br>\u65e5\u672c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u79d1\u5b66\u4f1a\u7b2c42\u56de\u5927\u4f1a\u8ad6\u6587\u96c6\uff08\u30aa\u30f3\u30e9\u30a4\u30f3\uff09, Sept. 2025.<\/li>\n\n\n\n<li>\u5927\u897f\u771f\u8f1d\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u5ddd\u539f\u7a14\uff0c<br>&#8220;<a href=\"https:\/\/jssst.or.jp\/files\/user\/taikai\/2025\/papers\/4b-2-R.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u88fd\u54c1\u30b3\u30fc\u30c9\u306e\u30d0\u30b0\u6df7\u5165\u4e88\u6e2c\u306b\u5411\u3051\u305f\u30c6\u30b9\u30c8\u30b3\u30fc\u30c9\u306e\u5f71\u97ff\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u5206\u6790<\/a>,&#8221;<br>\u65e5\u672c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u79d1\u5b66\u4f1a\u7b2c42\u56de\u5927\u4f1a\u8ad6\u6587\u96c6\uff08\u30aa\u30f3\u30e9\u30a4\u30f3\uff09, Sept. 2025.<\/li>\n\n\n\n<li>\u4f50\u91ce\u4e00\u6a39\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u5ddd\u539f\u7a14\uff0c<br>&#8220;<a href=\"https:\/\/jssst.or.jp\/files\/user\/taikai\/2025\/papers\/4b-3-R.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u30d9\u30a4\u30ba\u66f4\u65b0\u3092\u6d3b\u7528\u3057\u305f\u30d0\u30b0\u9650\u5c40\u306e\u6709\u52b9\u6027\u306b\u95a2\u3059\u308b\u8003\u5bdf<\/a>,&#8221;<br>\u65e5\u672c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u79d1\u5b66\u4f1a\u7b2c42\u56de\u5927\u4f1a\u8ad6\u6587\u96c6\uff08\u30aa\u30f3\u30e9\u30a4\u30f3\uff09, Sept. 2025.<\/li>\n\n\n\n<li>\u5c71\u4e0b\u667a\u4e5f\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u5ddd\u539f\u7a14\uff0c<br>&#8220;<a href=\"https:\/\/ken.ieice.org\/ken\/paper\/20250310qc8i\/\" target=\"_blank\" rel=\"noreferrer noopener\">Web\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30c6\u30b9\u30c8\u30b9\u30af\u30ea\u30d7\u30c8\u306b\u5bfe\u3059\u308b\u30df\u30e5\u30fc\u30c6\u30fc\u30b7\u30e7\u30f3\u306e\u6d3b\u7528\u306b\u95a2\u3059\u308b\u8003\u5bdf \uff5e \u7570\u5e38\u7cfb\u30c6\u30b9\u30c8\u306e\u81ea\u52d5\u652f\u63f4\u306b\u5411\u3051\u305f\u8a66\u307f \uff5e<\/a>\uff0c&#8221;<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a, vol. 124, no. 429, SS2024-56, pp. 73&#8211;78, Mar. 2025.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\">\u30102024\u5e74\u5ea6\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b5\u30a4\u30a8\u30f3\u30b9\u7814\u7a76\u4f1a\u7814\u7a76\u5968\u52b1\u8cde\u53d7\u8cde\u3011<\/mark><\/strong><\/li>\n\n\n\n<li>\u5927\u897f\u771f\u8f1d\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u5ddd\u539f\u7a14\uff0c<br>&#8220;<a href=\"https:\/\/ken.ieice.org\/ken\/paper\/20250310Ccia\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u88fd\u54c1\u30b3\u30fc\u30c9\u3068\u30c6\u30b9\u30c8\u30b3\u30fc\u30c9\u306e\u540c\u6642\u66f4\u65b0\u306b\u7740\u76ee\u3057\u305f\u30d0\u30b0\u6df7\u5165\u30b3\u30df\u30c3\u30c8\u306e\u5206\u6790<\/a>\uff0c&#8221;<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a, vol. 124, no. 429, SS2024-49, pp. 31&#8211;36, Mar. 2025.<\/li>\n\n\n\n<li>\u5927\u5800\u5eb7\u592a\u90ce\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u5ddd\u539f\u7a14\uff0c<br>&#8220;<a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/records\/2000557\" target=\"_blank\" rel=\"noreferrer noopener\">Python\u30d7\u30ed\u30b0\u30e9\u30e0\u306b\u304a\u3044\u3066\u540d\u524d\u5909\u66f4\u304c\u8d77\u3053\u308a\u3084\u3059\u3044\u95a2\u6570\u540d\u306e\u7279\u5fb4\u306b\u95a2\u3059\u308b\u8003\u5bdf<\/a>,&#8221;<br>\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u7814\u7a76\u5831\u544a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\uff08SE\uff09, vol. 2025-SE-219, no. 1, pp. 1&#8211;8, Mar. 2025.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u62db\u5f85\u8b1b\u6f14<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u963f\u842c\u88d5\u4e45\uff0c\u5929\u5d5c\u8061\u4ecb\uff0c\u6a2a\u5ddd\u667a\u6559\uff0c\u5ddd\u539f\u7a14\uff0c<br>&#8220;A Quantitative Investigation of Trends in Confusing Variable Pairs Through Commits: Do Confusing Variable Pairs Survive?\uff0c&#8221;\uff08\u56fd\u969b\u4f1a\u8b70 EASE2024 \u767a\u8868\u8ad6\u6587\uff09<br><a href=\"https:\/\/ses.sigse.jp\/2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02025<\/a>\uff0cSept. 2025.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c<br>&#8220;\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u306e\u8aad\u307f\u3084\u3059\u3055\u306b\u5bfe\u3059\u308b\u5b9a\u91cf\u7684\u30a2\u30d7\u30ed\u30fc\u30c1 \u3000\uff5e\u81ea\u52d5\u8a55\u4fa1\u306b\u5411\u3051\u305f\u53d6\u308a\u7d44\u307f\uff5e\uff0c&#8221;<br><a href=\"https:\/\/ken.ieice.org\/ken\/program\/index.php?tgs_regid=afbc90002f0936bdece38fc022c74799b776b6b8b0068652b346850b7d2d938d&amp;tgid=IEICE-KBSE\" target=\"_blank\" rel=\"noreferrer noopener\">\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u77e5\u80fd\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u4f1a<\/a>\uff0cMar. 2025.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2024 \u5e74<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-strong-blue-color\"><span style=\"color:#0003ff\" class=\"tadv-color\">\u56fd\u969b\u4f1a\u8b70<\/span><\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Yuki Fushihara, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, and Minoru Kawahara,<br>&#8220;<a href=\"https:\/\/doi.org\/10.1109\/SEAA64295.2024.00063\" target=\"_blank\" rel=\"noreferrer noopener\">Fault-Proneness of Python Programs Tested By Smelled Test Code<\/a>,&#8221;<br>Proc. 50th Euromicro Conference on Software Engineering and Advanced Applications (SEAA2024), pp.373&#8211;378, Aug.2024.<br>[<a href=\"\/~aman\/pdf\/Fushihara_SEAA2024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">accepted version<\/a>] [<a href=\"\/data\/Fushihara_SEAA2024\/\" target=\"_blank\" rel=\"noreferrer noopener\">data<\/a>]<\/li>\n\n\n\n<li>Sousuke Amasaki, Pattara Leelaprute, Hirohisa Aman, and Tomoyuki Yokogawa, <br>&#8220;<a href=\"https:\/\/doi.org\/10.1109\/SEAA64295.2024.00040\" target=\"_blank\" rel=\"noreferrer noopener\">Exploring Benefits of Bellwether Projects in Cross-Project IR-based Fault Localization<\/a>,&#8221;<br>Proc. 50th Euromicro Conference on Software Engineering and Advanced Applications (SEAA2024), pp.214&#8211;221, Aug.2024.<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, and Minoru Kawahara,<br>&#8220;<a href=\"https:\/\/doi.org\/10.1145\/3661167.3661228\" target=\"_blank\" rel=\"noreferrer noopener\">A Quantitative Investigation of Trends in Confusing Variable Pairs Through Commits: Do Confusing Variable Pairs Survive?<\/a>,&#8221;<br>Proc. 28th International Conference on Evaluation and Assessment in Software Engineering (EASE2024), pp. 90&#8211;99, June 2024.<\/li>\n\n\n\n<li>Kaoru Yokogawa, Masashi Hiroishi, Sousuke Amasaki, Hirohisa Aman, and Tomoyuki Yokogawa,<br>&#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/10685591\" target=\"_blank\" rel=\"noreferrer noopener\">A Comparative Study on COSMIC FP approximation with Deep Learning and Conventional Machine Learning<\/a>,&#8221;<br>Proc. 22nd IEEE\/ACIS International Conference on&nbsp;Software Engineering, Management and Applications (SERA 2024), pp.346&#8211;351, May 2024.<\/li>\n\n\n\n<li>Pattara Leelaprute, Yuki Kase, Sousuke Amasaki, Hirohisa Aman, and Tomoyuki Yokogawa,<br>&#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/10685584\" target=\"_blank\" rel=\"noreferrer noopener\">A Multi-Aspect Evaluation of DL-based SQLi Attack Detection Models<\/a>,&#8221;<br>Proc. 22nd IEEE\/ACIS International Conference on&nbsp;Software Engineering, Management and Applications (SERA 2024), pp.352&#8211;355, May 2024.<\/li>\n\n\n\n<li>Yahiro Mori, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, and Minoru Kawahara,<br>&#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/10685588\" target=\"_blank\" rel=\"noreferrer noopener\">An Application of Program Slicing and CodeBERT to Distill Variables With Inappropriate Names<\/a>,&#8221;<br>Proc. 22nd IEEE\/ACIS International Conference on&nbsp;Software Engineering, Management and Applications (SERA 2024), pp.356&#8211;361, May 2024.<\/li>\n\n\n\n<li>Shozo Saeki, Minoru Kawahara and Hirohisa Aman,<br>\u201c<a href=\"https:\/\/doi.org\/10.1109\/ICICT62343.2024.00016\" target=\"_blank\" rel=\"noreferrer noopener\">Multi-attribute and Multi-label Deep Metric Learning via Pair-based and Proxy-based Losses<\/a>,\u201d<br>Proc. 7th International Conference on Information and Computer Technologies (ICICT2024), pp.57\u201363, Mar. 2024.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color: #00a000;\" class=\"tadv-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><\/mark><\/strong>\n<ol class=\"wp-block-list\">\n<li>\u68ee \u54c9\u5c0b\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;CodeT5 \u3068\u6b63\u898f\u8868\u73fe\u3092\u6d3b\u7528\u3057\u305f\u4e0d\u9069\u5207\u306a\u5909\u6570\u540d\u306e\u81ea\u52d5\u691c\u51fa\u6cd5\u3068\u305d\u306e\u8a55\u4fa1,&#8221; <br>\u6238\u7530 \u822a\u53f2\uff0c\u85e4\u539f \u8ce2\u4e8c \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 31\uff0cpp.35&#8211;44, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2024.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\">\u3010IEEE Computer Society Japan Chapter FOSE Young Researcher Award \u53d7\u8cde\u3011<\/mark><\/strong><br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\"><\/mark><\/strong><\/li>\n\n\n\n<li>\u4f0f\u539f \u88d5\u751f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;Python \u30c6\u30b9\u30c8\u30b9\u30e1\u30eb\u306e\u30d0\u30b0\u4e88\u6e2c\u5b50\u3068\u3057\u3066\u306e\u6709\u7528\u6027\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u7684\u5206\u6790,&#8221; <br>\u6238\u7530 \u822a\u53f2\uff0c\u85e4\u539f \u8ce2\u4e8c \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 31\uff0cpp.65&#8211;74, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2024.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\">\u3010IEEE Computer Society Japan Chapter FOSE Young Researcher Award \u53d7\u8cde\u3011<\/mark><\/strong><\/li>\n\n\n\n<li>\u4e09\u597d \u6dbc\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u89e3\u7b54\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u30d9\u30af\u30c8\u30eb\u8868\u73fe\u306b\u57fa\u3065\u3044\u305f\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u554f\u984c\u9593\u306e\u985e\u4f3c\u6027\u8a55\u4fa1\u306b\u95a2\u3059\u308b\u8003\u5bdf\uff0c&#8221;<br>\u6238\u7530 \u822a\u53f2\uff0c\u85e4\u539f \u8ce2\u4e8c \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 31\uff0cpp.103&#8211;108, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2024.<\/li>\n\n\n\n<li>\u5c71\u4e0b \u667a\u4e5f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;Web\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u5411\u3051\u7570\u5e38\u7cfb\u30c6\u30b9\u30c8\u306e\u81ea\u52d5\u751f\u6210\u306b\u95a2\u3059\u308b\u63d0\u6848\uff1aSelenium \u3068\u30df\u30e5\u30fc\u30c6\u30fc\u30b7\u30e7\u30f3\u306e\u6d3b\u7528,&#8221; <br>\u6238\u7530 \u822a\u53f2\uff0c\u85e4\u539f \u8ce2\u4e8c \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 31\uff0cpp.189&#8211;190, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2024.<br>\uff08\u203b\u30e9\u30a4\u30d6\u8ad6\u6587\u306e\u305f\u3081\u30dd\u30b9\u30bf\u30fc\u767a\u8868\uff09<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\">\u3010FOSE2024\u30e9\u30a4\u30d6\u8ad6\u6587\u8cde \u53d7\u8cde\u3011<\/mark><\/strong><\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u65b0\u5c71\u525b\u53f8\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u4e8c\u5bae\u5d07\uff0c<br>&#8220;<a href=\"http:\/\/id.nii.ac.jp\/1001\/00239130\/\" target=\"_blank\" rel=\"noreferrer noopener\">ChatGPT4o\u3092\u7528\u3044\u305f\u8981\u4ef6\u5b9a\u7fa9\u306e\u5de5\u7a0b\u652f\u63f4\u3068\u305d\u306e\u52b9\u679c\u306b\u95a2\u3059\u308b\u8003\u5bdf<\/a>\uff0c&#8221;<br>\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02024\u8ad6\u6587\u96c6\uff0cvol.2024, pp. 117&#8211;122, Sept. 2024.<\/li>\n\n\n\n<li>\u7530\u4e2d\u7409\u543e\uff0c\u6a2a\u5ddd\u667a\u6559\uff0c\u5929\u5d5c\u8061\u4ecb\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u6709\u672c\u548c\u6c11\uff0c<br>&#8220;\u6642\u9593\u5236\u7d04\u3092\u3082\u3064\u30b2\u30fc\u30e0\u30b9\u30af\u30ea\u30d7\u30c8\u3092\u5bfe\u8c61\u3068\u3057\u305f\u30e2\u30c7\u30eb\u691c\u67fb\u624b\u6cd5\u306e\u63d0\u6848\uff0c&#8221;<br>\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u7814\u7a76\u5831\u544a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\uff08SE\uff09, 2024-SE-217(21), pp.1&#8211;8, July 2024\uff0e<\/li>\n\n\n\n<li>\u6c34\u672c\u62d3\u6d77\uff0c\u6a2a\u5ddd\u667a\u6559\uff0c\u5929\u5d5c\u8061\u4ecb\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u6709\u672c\u548c\u6c11\uff0c<br>&#8220;\u30d3\u30b8\u30e5\u30a2\u30eb\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u306b\u57fa\u3065\u304f\u30e2\u30c7\u30eb\u691c\u67fb\u652f\u63f4\u74b0\u5883\u306e\u958b\u767a\u3068\u8a55\u4fa1,&#8221;<br>\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u7814\u7a76\u5831\u544a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\uff08SE\uff09, 2024-SE-217(22), pp.1&#8211;8, July 2024\uff0e<\/li>\n\n\n\n<li>\u68ee \u54c9\u5c0b\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a href=\"https:\/\/ken.ieice.org\/ken\/paper\/20240308Zc1I\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5909\u6570\u306e\u578b\u540d\u3068\u4ee3\u5165\u5f0f\u306b\u7740\u76ee\u3057\u305f\u547d\u540d\u30d1\u30bf\u30fc\u30f3\u3068\u5927\u898f\u6a21\u8a00\u8a9e\u30e2\u30c7\u30eb\u3092\u6d3b\u7528\u3057\u305f\u5909\u6570\u540d\u8a55\u4fa1\u306b\u95a2\u3059\u308b\u8003\u5bdf<\/a>\uff0c&#8221;<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol. 123, no. 414, SS2023-71, pp. 133&#8211;138, Mar. 2024.<\/li>\n\n\n\n<li>\u4f0f\u539f \u88d5\u751f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a href=\"https:\/\/ken.ieice.org\/ken\/paper\/20240307qcCb\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u30c6\u30b9\u30c8\u30b3\u30fc\u30c9\u306b\u304a\u3051\u308b\u30c6\u30b9\u30c8\u30b9\u30e1\u30eb\u306e\u5b58\u5728\u3068\u30d0\u30b0\u6f5c\u5728\u6027\u306e\u95a2\u4fc2\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u7684\u8abf\u67fb<\/a>\uff0c&#8221;<br>\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol. 123, no. 414, SS2023-60, pp. 67&#8211;72, Mar. 2024.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u62db\u5f85\u8b1b\u6f14<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u963f\u842c\u88d5\u4e45\uff0c\u5929\u5d5c\u8061\u4ecb\uff0c\u6a2a\u5ddd\u667a\u6559\uff0c\u5ddd\u539f\u7a14\uff0c<br><a href=\"https:\/\/www.ipsj.or.jp\/event\/fit\/fit2024\/abstract\/data\/html\/event\/event_TCS2-3.html\" target=\"_blank\" rel=\"noreferrer noopener\">FIT2024\u30c8\u30c3\u30d7\u30b3\u30f3\u30d5\u30a1\u30ec\u30f3\u30b9\uff08\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff09\u30bb\u30c3\u30b7\u30e7\u30f3<\/a>\uff0cSept.2024.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c\u5929\u5d5c\u8061\u4ecb\uff0c\u6a2a\u5ddd\u667a\u6559\uff0c\u5ddd\u539f\u7a14\uff0c<br><a href=\"https:\/\/jssst2024.wordpress.com\/program\/#3a\" target=\"_blank\" rel=\"noreferrer noopener\">JSSST \u7b2c41\u56de\u5927\u4f1a\u30c8\u30c3\u30d7\u30ab\u30f3\u30d5\u30a1\u30ec\u30f3\u30b9\u30fb\u30c8\u30c3\u30d7\u8ad6\u6587\u8a8c\u7279\u5225\u8b1b\u6f14<\/a>\uff0cSept.2024.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c\u5929\u5d5c\u8061\u4ecb\uff0c\u6a2a\u5ddd\u667a\u6559\uff0c\u5ddd\u539f\u7a14\uff0c<br><a href=\"https:\/\/ses.sigse.jp\/2024\/program.html\" target=\"_blank\" rel=\"noreferrer noopener\">SES2024 \u62db\u5f85\u8ad6\u6587<\/a>\uff0cSept.2024.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<!--nextpage-->\n\n\n<div class=\"breadcrumbs align  wp-block-bcn-breadcrumb-trail has-text-color has-background\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">\n\t<span><\/span>\n\t<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u5ba4.\" href=\"https:\/\/se.cite.ehime-u.ac.jp\/jp\" class=\"home\" aria-current=\"page\"><span property=\"name\">\u30db\u30fc\u30e0<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2023 \u5e74<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, and Minoru Kawahara,<br>&#8220;<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10664-023-10339-2\" target=\"_blank\" rel=\"noreferrer noopener\">An Automated Detection of Confusing Variable Pairs with Highly Similar Compound Names in Java and Python Programs<\/a>,&#8221;<br>Empirical Software Engineering, vol.28, no.5, pp.108:1&#8211;108:32, Aug. 2023.<\/li>\n\n\n\n<li>Hideyoshi Miura, Tomotaka Kimura, Hirohisa Aman, Kouji Hirata,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1016\/j.comcom.2023.05.001\" target=\"_blank\">Game-theoretic approach to epidemic modeling of countermeasures against future malware evolution<\/a>,&#8221;<br>Computer Communications, Vol.206, pp.160&#8211;171, June 2023.<\/li>\n\n\n\n<li>Shozo Saeki, Minoru Kawahara, Hirohisa Aman,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1016\/j.cviu.2023.103654\" target=\"_blank\">Multi proxy anchor family loss for several types of gradients<\/a>,&#8221;<br>Computer Vision and Image Understanding, Vol.229, 103654:1&#8211;103654:9, Mar. 2023.<\/li>\n\n\n\n<li>Kosuke Ohara, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, and Minoru Kawahara,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1587\/transinf.2022MPL0002\" target=\"_blank\">A Comparative Study of Data Collection Periods for Just-In-Time Defect Prediction Using the Automatic Machine Learning Method<\/a>,&#8221;<br>IEICE Transactions on Information and Systems, Vol.E106.D, No. 2, pp.166&#8211;169, Feb. 2023.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-strong-blue-color\"><span style=\"color:#0003ff\" class=\"tadv-color\">\u56fd\u969b\u4f1a\u8b70<\/span><\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Yuki Fushihara, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, and Minoru Kawahara,<br>&#8220;<a href=\"https:\/\/www.computer.org\/csdl\/proceedings-article\/seaa\/2023\/423500a310\/1TlXGKXoXRe\" target=\"_blank\" rel=\"noreferrer noopener\">A Trend Analysis of Test Smells in Python Test Code Over Commit History<\/a>,&#8221;<br>Proc. 49th Euromicro Conference on Software Engineering and Advanced Applications, pp.310&#8211;314, Sept.2023.<br>[<strong><a href=\"\/~aman\/pdf\/Fushihara_SEAA2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">accepted version<\/a><\/strong>] [<a href=\"\/data\/Fushihara_SEAA2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5b9f\u9a13\u30c7\u30fc\u30bf<\/a>]<\/li>\n\n\n\n<li>Shinnosuke Irie, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara,<br>\u201c<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3631991.3631996\" target=\"_blank\" rel=\"noreferrer noopener\">A Comparative Study of Hybrid Fault-Prone Module Prediction Models Using Association Rule and Random Forest<\/a>,\u201d<br>Proc. 2023 5th World Symposium on Software Engineering (WSSE2023), pp.33\u201338, Dec. 2023.<\/li>\n\n\n\n<li>Ryugo Tanaka, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman, and Kazutami Arimoto,<br>&#8220;<a href=\"https:\/\/doi.org\/10.1109\/GCCE59613.2023.10315312\" target=\"_blank\" rel=\"noreferrer noopener\">Applying Symbolic Model Checking to Node-graph Style Game Scripts with Time Constraints<\/a>,&#8221;<br>Proc. IEEE 12th Global Conference on Consumer Electronics (GCCE 2023), pp. 892&#8211;895, Oct. 2023.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color: #00a000;\" class=\"tadv-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><\/mark><\/strong>\n<ol class=\"wp-block-list\">\n<li>\u5927\u5d8b \u7409\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u8a18\u53f7\u5b9f\u884c\u3068\u30df\u30e5\u30fc\u30c6\u30fc\u30b7\u30e7\u30f3\u3092\u6d3b\u7528\u3057\u305f\u30d7\u30ed\u30b0\u30e9\u30e0\u6b63\u8aa4\u5224\u5b9a\u306e\u52b9\u7387\u5316,&#8221; <br>\u5409\u7530 \u5247\u88d5\uff0c\u69c7\u539f \u7d75\u91cc\u5948 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 30\uff0cpp.53\u250062, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2023.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\">\u3010IEEE Computer Society Japan Chapter FOSE Young Researcher Award \u53d7\u8cde\u3011<\/mark><\/strong><br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\">\u3010FOSE2023\u8ca2\u732e\u8cde\u3092\u53d7\u8cde\u3011<\/mark><\/strong><\/li>\n\n\n\n<li>\u9ad9\u6a4b \u4f51\u4ecb\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u30b9\u30da\u30af\u30c8\u30eb\u60c5\u5831\u3068\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u884c\u306e\u65b0\u3057\u3055\u3092\u7d44\u307f\u5408\u305b\u305f\u30d0\u30b0\u9650\u5c40\u624b\u6cd5,&#8221; <br>\u5409\u7530 \u5247\u88d5\uff0c\u69c7\u539f \u7d75\u91cc\u5948 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 30\uff0cpp.111\u2500116, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2023.<\/li>\n\n\n\n<li>\u6c34\u672c \u62d3\u6d77\uff0c\u6a2a\u5ddd \u667a\u6559\uff0c\u5929\u5d5c \u8061\u4ecb\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u6709\u672c \u548c\u6c11\uff0c<br>&#8220;\u30d3\u30b8\u30e5\u30a2\u30eb\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u3092\u7528\u3044\u305f muXmv \u306e\u30e2\u30c7\u30eb\u751f\u6210\u652f\u63f4\u74b0\u5883\u306e\u8a55\u4fa1\uff0c&#8221;<br>\u5409\u7530 \u5247\u88d5\uff0c\u69c7\u539f \u7d75\u91cc\u5948 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 30\uff0cpp.123\u2500128, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2023.<\/li>\n\n\n\n<li>\u4f0f\u539f \u88d5\u751f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;Python \u30c6\u30b9\u30c8\u30b3\u30fc\u30c9\u306e\u9023\u7d9a\u5909\u66f4\u30b3\u30df\u30c3\u30c8\u306b\u304a\u3051\u308b\u30c6\u30b9\u30c8\u30b9\u30e1\u30eb\u306e\u5909\u5316\u52d5\u5411,&#8221; <br>\u5409\u7530 \u5247\u88d5\uff0c\u69c7\u539f \u7d75\u91cc\u5948 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 30\uff0cpp.169\u2500170, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2023. \uff08\u203b\u30e9\u30a4\u30d6\u8ad6\u6587\u306e\u305f\u3081\u30dd\u30b9\u30bf\u30fc\u767a\u8868\uff09<\/li>\n\n\n\n<li>\u68ee \u54c9\u5c0b\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u5909\u6570\u540d\u306e\u81ea\u52d5\u8a55\u4fa1\u306b\u5411\u3051\u305f\u540d\u524d\u306e\u3086\u3089\u304e\u306b\u95a2\u3059\u308b\u8abf\u67fb,&#8221; <br>\u5409\u7530 \u5247\u88d5\uff0c\u69c7\u539f \u7d75\u91cc\u5948 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 30\uff0cpp.171\u2500172, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2023.\uff08\u203b\u30e9\u30a4\u30d6\u8ad6\u6587\u306e\u305f\u3081\u30dd\u30b9\u30bf\u30fc\u767a\u8868\uff09<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u5927\u5d8b \u7409\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/id.nii.ac.jp\/1001\/00223340\/\" target=\"_blank\">\u30d7\u30ed\u30b0\u30e9\u30e0\u6b63\u8aa4\u5224\u5b9a\u306b\u304a\u3051\u308b\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u30d9\u30af\u30c8\u30eb\u5316\u3068\u985e\u4f3c\u5ea6\u8a55\u4fa1\u306e\u95a2\u4fc2\u306b\u3064\u3044\u3066<\/a>\uff0c&#8221;<br>\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u30a6\u30a3\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72023\u8ad6\u6587\u96c6\uff0cvol.2023, pp.11&#8211;12, Jan. 2023.<\/li>\n\n\n\n<li>\u9ad8\u6a4b \u4f51\u4ecb\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/id.nii.ac.jp\/1001\/00223341\/\" target=\"_blank\">SBFL\u624b\u6cd5\u306b\u304a\u3051\u308b\u7591\u60d1\u5024\u306e\u5206\u5e03\u3068\u30d0\u30b0\u9650\u5c40\u7cbe\u5ea6\u306e\u95a2\u4fc2\u306b\u3064\u3044\u3066<\/a>\uff0c&#8221;<br>\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u30a6\u30a3\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72023\u8ad6\u6587\u96c6\uff0cvol.2023, pp.13&#8211;14, Jan. 2023.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u62db\u5f85\u8b1b\u6f14<\/strong>\n<ol class=\"wp-block-list\">\n<li class=\"has-small-font-size\">\u963f\u842c \u88d5\u4e45\uff0c<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bookpark.ne.jp\/cm\/ieej\/detail\/IEEJ-20230119C00701-004-PDF\/\" target=\"_blank\">\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u30b5\u30a4\u30a8\u30f3\u30b9<\/a>\uff0c&#8221;<br>\u96fb\u6c17\u5b66\u4f1a 2023\u5e741\u670819\u65e5-2023\u5e741\u670820\u65e5\u901a\u4fe1\u7814\u7a76\u4f1a\uff0e<br><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2022 \u5e74<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u5cef\u4e45 \u670b\u4e5f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a href=\"https:\/\/doi.org\/10.11309\/jssst.39.4_17\" target=\"_blank\" rel=\"noreferrer noopener\">Transformer \u306b\u3088\u308b\u30e1\u30bd\u30c3\u30c9\u540d\u63a8\u5b9a\u3092\u6d3b\u7528\u3057\u305f\u30cd\u30fc\u30df\u30f3\u30b0\u30d0\u30b0\u306e\u691c\u51fa<\/a>,&#8221;<br>\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cVol.39, No. 4, pp.17&#8211;23, Nov. 2022.<\/li>\n\n\n\n<li>Sousuke Amasaki, Hirohisa Aman and Tomoyuki Yokogawa,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1007\/s10664-021-10103-4\" target=\"_blank\">An extended study on applicability and performance of homogeneous cross-project defect prediction approaches under homogeneous cross-company effort estimation situation<\/a>,&#8221; <br>Empirical Software Engineering,  vol.27, no.2, pp.46:1&#8211;46:29, Mar. 2022.<strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\"><\/mark><\/strong><\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-strong-blue-color\"><span style=\"color:#0003ff\" class=\"tadv-color\">\u56fd\u969b\u4f1a\u8b70<\/span><\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Sousuke Amasaki, Hirohisa Aman and Tomoyuki Yokogawa,<br>&#8220;<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-21388-5_30\" target=\"_blank\" rel=\"noreferrer noopener\">An Evaluation of Cross-Project Defect Prediction Approaches on Cross-Personalized Defect Prediction<\/a>,&#8221;<br>Taibi, D., Kuhrmann, M., Mikkonen, T., Kl\u00fcnder, J., Abrahamsson, P. (eds) Product-Focused Software Process Improvement, Lecture Notes in Computer Science, vol. 13709, pp.433\u2013-448, Springer, Cham, Switzerland, Nov. 2022.<\/li>\n\n\n\n<li>Kazuki Wayama, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman, Kazutami Arimoto,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1145\/3551349.3560505\" target=\"_blank\">Verifying Game Logic in Unreal Engine 5 Blueprint Visual Scripting System Using Model Checking<\/a>,&#8221;<br>Proc. 37th IEEE\/ACM International Conference on Automated Software Engineering Workshops, pp.213:1&#8211;213:8, Oct. 2022.<\/li>\n\n\n\n<li>Tenma Kita, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, and Minoru Kawahara,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/dx.doi.org\/10.1109\/SEAA56994.2022.00027\" target=\"_blank\">Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-Grained Repository-Based Co-Evolution Analysis<\/a>,&#8221;<br>Proc. 48th Euromicro Conference on Software Engineering and Advanced Applications, pp.120&#8211;124, Aug.2022.<br>[<strong><a rel=\"noreferrer noopener\" href=\"\/~aman\/pdf\/Kita_SEAA2022.pdf\" target=\"_blank\">accepted version<\/a><\/strong>] [<a rel=\"noreferrer noopener\" href=\"\/data\/SEAA2022\/\" target=\"_blank\">\u5b9f\u9a13\u30c7\u30fc\u30bf<\/a>]<\/li>\n\n\n\n<li>Sousuke Amasaki, Hirohisa Aman, and Tomoyuki Yokogawa,<br>&#8220;<a href=\"http:\/\/dx.doi.org\/10.1109\/SEAA56994.2022.00040\">An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Methods<\/a>,&#8221;<br>Proc. 48th Euromicro Conference on Software Engineering and Advanced Applications, pp.209&#8211;216, Aug.2022.<\/li>\n\n\n\n<li>Kazuma Toyota, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman and Kazutami Arimoto,<br>&#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9894532\" target=\"_blank\" rel=\"noreferrer noopener\">A Visual Modeling Environment for the nuXmv Model Checker Intended for Novice Users<\/a>,&#8221;<br>Proc. 7th International Conference on Enterprise Architecture and Information Systems (EAIS 2022), pp. 684-685, Jul. 2022.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color: #00a000;\" class=\"tadv-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><\/mark><\/strong>\n<ol class=\"wp-block-list\">\n<li>\u5927\u5d8b \u7409\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a href=\"https:\/\/doi.org\/10.11309\/fose.29.0_85\" target=\"_blank\" rel=\"noreferrer noopener\">\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u30d9\u30af\u30c8\u30eb\u5316\u3068\u8a18\u53f7\u5b9f\u884c\u3092\u6d3b\u7528\u3057\u305f\u6b63\u8aa4\u5224\u5b9a\u306e\u52b9\u7387\u5316<\/a>,&#8221; <br> \u89d2\u7530 \u96c5\u7167\uff0c\u67d7\u672c \u771f\u4f51 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 29\uff0cpp.85\u250090, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2022.<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\"><\/mark><\/strong>\u5cef\u4e45 \u670b\u4e5f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a href=\"https:\/\/doi.org\/10.11309\/fose.29.0_195\" target=\"_blank\" rel=\"noreferrer noopener\">\u30e1\u30bd\u30c3\u30c9\u540d\u306e\u6574\u5408\u6027\u8a55\u4fa1\u306e\u305f\u3081\u306e\u30c7\u30fc\u30bf\u30bb\u30c3\u30c8<\/a>,&#8221; <br> \u89d2\u7530 \u96c5\u7167\uff0c\u67d7\u672c \u771f\u4f51 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 29\uff0cpp.195\u2500196, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0cNov. 2022. \uff08\u203b\u30e9\u30a4\u30d6\u8ad6\u6587\u306e\u305f\u3081\uff0c\u30dd\u30b9\u30bf\u30fc\u767a\u8868\uff09<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u9ad8\u6a4b \u4f51\u4ecb\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u81ea\u52d5\u30d0\u30b0\u9650\u5c40\u306e\u52b9\u7387\u5316\u306b\u5411\u3051\u305f\u4e00\u63d0\u6848:\u30b3\u30fc\u30c9\u884c\u306e\u65b0\u3057\u3055\u306b\u3088\u308b\u91cd\u307f\u4ed8\u3051\uff0c&#8221;<br>\u7b2c29\u56de\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7 \uff08FOSE2022\uff09\u30dd\u30b9\u30bf\u30fc\u767a\u8868\uff0e<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\">\u3010\u30dd\u30b9\u30bf\u30fc\u30fb\u30c7\u30e2\u8cde\u3092\u53d7\u8cde\u3011<\/mark><\/strong><\/li>\n\n\n\n<li>\u9ad8\u6a4b \u4eae\u81f3\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/id.nii.ac.jp\/1001\/00222671\/\" target=\"_blank\">Pycodestyle\u306b\u3088\u308b\u8b66\u544a\u3068\u30d0\u30b0\u4fee\u6b63\u306e\u95a2\u4fc2\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u5206\u6790<\/a>\uff0c&#8221;<br>\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u7814\u7a76\u5831\u544a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\uff0cvol.2022-SE-212, no.12, pp.1&#8211;8, Dec. 2022.<\/li>\n\n\n\n<li>\u5cef\u4e45 \u670b\u4e5f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u6a5f\u68b0\u5b66\u7fd2\u306b\u3088\u308b\u30e1\u30bd\u30c3\u30c9\u540d\u63a8\u5b9a\u3092\u6d3b\u7528\u3057\u305f\u30cd\u30fc\u30df\u30f3\u30b0\u30d0\u30b0\u306e\u691c\u51fa\uff0c&#8221;<br>\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u4fe1\u983c\u6027\u7814\u7a76\u4f1a \u7b2c16\u56de\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff08FORCE2022\uff09.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2021 \u5e74<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u5c71\u4e2d \u5553\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.11309\/jssst.38.4_9\" target=\"_blank\">\u30d7\u30ed\u30b0\u30e9\u30e0\u30b9\u30e9\u30a4\u30b9\u3068 Doc2Vec \u3092\u7528\u3044\u305f\u5909\u6570\u540d\u8a55\u4fa1\u6cd5\u306e\u63d0\u6848<\/a>\uff0c&#8221;<br>\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cVol.38, No. 4, pp.9&#8211;15, Nov. 2021. <strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\"><\/mark><\/strong><\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-strong-blue-color\">\u56fd\u969b\u4f1a\u8b70<\/mark><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Sousuke Amasaki, Hirohisa Aman and Tomoyuki Yokogawa,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-91452-3_12\" target=\"_blank\">Searching for Bellwether Developers for Cross-Personalized Defect Prediction<\/a>,&#8221;<br>Ardito L., Jedlitschka A., Morisio M., Torchiano M. (eds) Product-Focused Software Process Improvement, Lecture Notes in Computer Science, vol. 13126. Springer, Cham, pp.183&#8211;198, Nov. 2021.<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara,<br>&#8220;<a href=\"https:\/\/doi.org\/10.1109\/ASEW52652.2021.00036\" target=\"_blank\" rel=\"noreferrer noopener\">An Investigation of Compound Variable Names Toward Automated Detection of Confusing Variable Pairs<\/a>,&#8221;<br>Proc. 36th IEEE\/ACM International Conference on Automated Software Engineering Workshops, pp.133&#8211;137, Nov. 2021.<br>[<strong><a rel=\"noreferrer noopener\" href=\"\/~aman\/pdf\/Aman_AeSIR2021.pdf\" target=\"_blank\">accepted version<\/a><\/strong>] [<a rel=\"noreferrer noopener\" href=\"\/data\/AeSIR2021\/\" target=\"_blank\">\u5b9f\u9a13\u30c7\u30fc\u30bf<\/a>]<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1007\/978-3-030-85347-1_35\" target=\"_blank\">A Large-Scale Investigation of Local Variable Names in Java Programs: Is Longer Name Better for Broader Scope Variable?<\/a>,&#8221;<br>Paiva A.C.R., Cavalli A.R., Ventura Martins P., P\u00e9rez-Castillo R. (eds) Quality of Information and Communications Technology, Communications in Computer and Information Science, vol. 1439, Springer, pp.489&#8211;500, Sept. 2021.<br>[<a rel=\"noreferrer noopener\" href=\"\/data\/QUATIC2021\/\" target=\"_blank\">\u5b9f\u9a13\u30c7\u30fc\u30bf<\/a>]<\/li>\n\n\n\n<li>Sousuke Amasaki, Hirohisa Aman and Tomoyuki Yokogawa,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/SEAA53835.2021.00042\" target=\"_blank\">A Preliminary Evaluation of CPDP Approaches on Just-in-Time Software Defect Prediction<\/a>,&#8221;<br>Proc. 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA2021), pp.279&#8211;286, Sept. 2021.<\/li>\n\n\n\n<li>Tomoya Minehisa, Hirohisa Aman, Tomoyuki Yokogawa and Minoru Kawahara,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/dx.doi.org\/10.1007\/978-3-030-79474-3_9\" target=\"_blank\">A Comparative Study of Vectorization Approaches for Detecting Inconsistent Method Names<\/a>,&#8221;<br>R. Lee (ed.), Computer and Information Science 2021&#8211;Summer, Studies in Computational Intelligence, vol.985, Springer, pp.125&#8211;144, June 2021.<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\">\u3010<strong>Best Student Paper Award \u53d7\u8cde<\/strong>\u3011<\/mark><\/li>\n\n\n\n<li>Shozo Saeki, Minoru Kawahara and Hirohisa Aman,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/SERA51205.2021.9509042\" target=\"_blank\">Significance of Emphasized Features for Good Representation on Deep Metric Learning<\/a>,&#8221;<br>Proc. 18th IEEE\/ACIS International Virtual Conference on Software Engineering, Management and Applications (SERA 2021), pp.27&#8211;32, June 2021.<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><span style=\"color: #00a000;\" class=\"tadv-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"><\/mark><\/strong>\n<ol class=\"wp-block-list\">\n<li>\u5cef\u4e45 \u670b\u4e5f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a href=\"https:\/\/doi.org\/10.11309\/fose.28.0_81\" target=\"_blank\" rel=\"noreferrer noopener\">\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u306e\u96e3\u8aad\u5316\u89e3\u9664\u624b\u6cd5\u3092\u6d3b\u7528\u3057\u305f\u30e1\u30bd\u30c3\u30c9\u540d\u306e\u6574\u5408\u6027\u8a55\u4fa1<\/a>,&#8221; <br>\u540d\u5009\u6b63\u525b\uff0c\u95a2\u6fa4\u4fca\u5f26 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e 28\uff0cpp.81\u250090, \u8fd1\u4ee3\u79d1\u5b66\u793eDigital\uff0c2021\uff0e<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-red-color\">\u3010IEEE Computer Society Japan Chapter FOSE Young Researcher Award \u53d7\u8cde\u3011<\/mark><\/strong><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<!--nextpage-->\n\n\n<div class=\"breadcrumbs align  wp-block-bcn-breadcrumb-trail has-text-color has-background\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">\n\t<span><\/span>\n\t<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u5ba4.\" href=\"https:\/\/se.cite.ehime-u.ac.jp\/jp\" class=\"home\" aria-current=\"page\"><span property=\"name\">\u30db\u30fc\u30e0<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2020 \u5e74<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Akira Matsumoto, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman, and Kazutami Arimoto,<br>&#8220;<a href=\"http:\/\/dx.doi.org\/10.52731\/iee.v6.i2.529\" target=\"_blank\" rel=\"noreferrer noopener\">Synthesis and Consistency Verification of UML Sequence Diagrams with Hierarchical Structure<\/a>,&#8221;<br>Information Engineering Express, vol.6, no.2, pp.1&#8211;19, Dec. 2020.<\/li>\n\n\n\n<li>\u5bae\u672c \u6566\u54c9\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.11309\/jssst.37.4_38\" target=\"_blank\">\u30d0\u30b0\u6df7\u5165\u4e88\u6e2c\u306e\u7cbe\u5ea6\u5411\u4e0a\u306b\u5411\u3051\u305f\u500b\u4eba\u5316\u4e88\u6e2c\u30e2\u30c7\u30eb\u306e\u7d44\u5408\u305b\u624b\u6cd5\u3068\u305d\u306e\u8a55\u4fa1<\/a>,&#8221; <br>\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cVol.37, No. 4, pp.38&#8211;49, Nov. 2020.<strong><span style=\"color:#ff0000\" class=\"has-inline-color\"><\/span><\/strong><\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/dx.doi.org\/10.1002\/smr.2220\" target=\"_blank\">Empirical Study of Abnormality in Local Variables and Its Application to Fault\u2010Prone Java Method Analysis<\/a>,&#8221; <br>Journal of Software: Evolution and Process, Vol.32, No.4, pp.e2220, Apr. 2020.<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Masanao Asato, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara,<br> &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/APSEC51365.2020.00059\" target=\"_blank\">A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization<\/a>,&#8221; <br>Proc. 27th Asia-Pacific Software Engineering Conference (APSEC 2020), pp.475&#8211;479, Dec. 2020. [<strong><a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/Asato_APSEC2020.pdf\" target=\"_blank\">accepted version<\/a><\/strong>]<\/li>\n\n\n\n<li>Sousuke Amasaki, Hirohisa Aman and Tomoyuki Yokogawa,<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1145\/3416508.3417118\" target=\"_blank\">An Exploratory Study on Applicability of Cross Project Defect Prediction Approaches to Cross-Company Effort Estimation<\/a>,&#8221;<br>Proc. 16th ACM International Conference on Predictive Models and Data Analytics in Software Engineering (PROMISE2020),pp.71&#8211;80, Nov. 2020.<span class=\"has-inline-color has-vivid-red-color\">\u3010<strong>Best Paper Award \u53d7\u8cde<\/strong>\u3011<\/span><\/li>\n\n\n\n<li>Hayato Naito, Tomouki Yokogawa, Nao Igawa, Sousuke Amasaki, Hirohisa Aman and Kazutami Arimoto, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/GCCE50665.2020.9291945\" target=\"_blank\">A Node-Style Visual Programming Environment for the nuXmv Model Checker<\/a>,&#8221; <br>Proc. 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE2020), pp.58&#8211;62, Oct. 2020.<\/li>\n\n\n\n<li>Sousuke Amasaki, Hirohisa Aman and Tomoyuki Yokogawa, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/SEAA51224.2020.00059\" target=\"_blank\">On the Effects of File-Level Information on Method-Level Bug Localization<\/a>,&#8221; <br>Proc. 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA2020), pp.314&#8211;321, Aug. 2020.<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/SEAA51224.2020.00023\" target=\"_blank\">A Comparative Study of Vectorization-Based Static Test Case Prioritization Methods<\/a>,&#8221; <br>Proc. 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA2020), pp.80&#8211;88, Aug. 2020. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/SEAA2020.pdf\" target=\"_blank\"><strong>accepted version<\/strong><\/a>]<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><span class=\"tadv-color\" style=\"color: #00a000;\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup><strong><span class=\"has-inline-color has-vivid-red-color\"><\/span><\/strong>\n<ol class=\"wp-block-list\">\n<li>\u5c71\u4e2d \u5553\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;Doc2Vec \u3092\u6d3b\u7528\u3057\u305f\u5909\u6570\u540d\u306e\u81ea\u52d5\u8a55\u4fa1\u6cd5\u306e\u63d0\u6848,&#8221; <br>\u77f3\u5c3e\u9686\uff0c\u5929\u5d5c\u8061\u4ecb \u7de8 <a rel=\"noreferrer noopener\" href=\"https:\/\/www.kindaikagaku.co.jp\/information\/kd0626.htm\" target=\"_blank\">\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXVII<\/a>\uff0cpp.51&#8211;56, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2020\uff0e<span style=\"color: #ff0000;\"><\/span><strong><span class=\"has-inline-color has-vivid-red-color\">\u3010FOSE2020 \u8ca2\u732e\u8cde\u53d7\u8cde\u3011<\/span><span style=\"color:#0000aa\" class=\"has-inline-color\"><\/span><\/strong><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2019 \u5e74<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u5ddd\u4e0a \u5353\u4e5f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.11309\/jssst.36.4_32\" target=\"_blank\">\u30c7\u30fc\u30bf\u4f9d\u5b58\u95a2\u4fc2\u306b\u7740\u76ee\u3057\u305f\u30d5\u30a9\u30fc\u30eb\u30c8\u6df7\u5165\u30ea\u30b9\u30af\u8a55\u4fa1\u30e1\u30c8\u30ea\u30af\u30b9\u306e\u63d0\u6848<\/a>,&#8221; \u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cVol.36, No. 4, pp.32&#8211;38, Nov. 2019.<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ceur-ws.org\/Vol-2511\/QuASoQ-01.pdf\" target=\"_blank\">Empirical Study of Fault Introduction Focusing on the Similarity among Local Variable Names<\/a>,&#8221; Proc. 7th International Workshop on Quantitative Approaches to Software Quality, pp. 3&#8211;11, Dec. 2019. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/data\/QuASoQ2019\/\" target=\"_blank\">data<\/a>]<\/li>\n\n\n\n<li>Sousuke Amasaki, Tomoyuki Yokogawa and Hirohisa Aman,<br> &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1145\/3345629.3345638\" target=\"_blank\">Applying Cross Project Defect Prediction Approaches to Cross-Company Effort Estimation<\/a>,&#8221; Proc. 15th International Conference on Predictive Models and Data Analytics in Software Engineering, pp. 76&#8211;79, Sept. 2019.<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007%2F978-3-030-24405-7_5\" target=\"_blank\">A Survival Analysis-Based Prioritization of Code Checker Warning: A Case Study Using PMD<\/a>,&#8221; Roger Lee (ed.), Big Data, Cloud Computing, and Data Science Engineering. Studies in Computational Intelligence, vol. 844, pp. 69&#8211;83, Springer, Cham, Jan. 2020. [DOI 10.1007\/978-3-030-24405-7_5] [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/data\/SCI2019\/\" target=\"_blank\">\u5b9f\u9a13\u30c7\u30fc\u30bf<\/a>]<\/li>\n\n\n\n<li>Sousuke Amasaki, Hirohisa Aman and Tomoyuki Yokogawa, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/SEAA.2019.00045\" target=\"_blank\">A Comparative Study of Vectorization Methods on BugLocator<\/a>,&#8221; Proc. 2019 45th Euromicro Conference on Software Engineering and Advanced Applications (SEAA2019), pp.236&#8211;243, Aug. 2019.<\/li>\n\n\n\n<li>Akira Matsumoto, Tomoyuki Yokogawa, Sousuke Amasaki, Kazutami Arimoto and Hirohisa Aman, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/IIAI-AAI.2019.00100\" target=\"_blank\">Consistency Verification of UML Sequence Diagrams Modeling Wireless Sensor Networks<\/a>,&#8221; Proc. 8th International Congress on Advanced Applied Informatics, pp.458&#8211;461, July 2019.<\/li>\n\n\n\n<li>Shozo Saeki, Minoru Kawahara and Hirohisa Aman, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/BCD.2019.8885337\" target=\"_blank\">Scalable Laplacian Regularized Least Squares Classification on Anchor Graph<\/a>,&#8221; Proc. 2019 IEEE\/ACIS 4th International Conference on Big Data, Cloud Computing, Data Science &amp; Engineering, pp.71&#8211;76, May 2019.<\/li>\n\n\n\n<li>Sousuke Amasaki, Tomoyuki Yokogawa and Hirohisa Aman, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/dl.acm.org\/citation.cfm?id=3319712\" target=\"_blank\">Towards Better Effort Estimation with Cross-Project Defect Prediction Approaches<\/a>,&#8221; Proc. Evaluation and Assessment on Software Engineering Conference (EASE 2019), pp.357&#8211;360, Apr. 2019.<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><span class=\"tadv-color\" style=\"color: #00a000;\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup><strong><span class=\"has-inline-color has-vivid-red-color\"><\/span><\/strong>\n<ol class=\"wp-block-list\">\n<li>\u5bae\u672c \u6566\u54c9\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u4ed6\u306e\u958b\u767a\u8005\u5411\u3051\u306b\u69cb\u7bc9\u3055\u308c\u305f\u500b\u4eba\u5316\u30d0\u30b0\u4e88\u6e2c\u30e2\u30c7\u30eb\u306e\u6d3b\u7528\u306b\u95a2\u3059\u308b\u63d0\u6848,&#8221; \u68ee\u5d0e\u4fee\u53f8\uff0c\u5927\u5e73\u96c5\u96c4 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXVI\uff0cpp.3&#8211;12, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2019\uff0e<strong><span class=\"has-inline-color has-vivid-red-color\">\u3010IEEE Computer Society Japan Chapter FOSE Young Researcher Award \u53d7\u8cde\u3011<\/span><\/strong><\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u5ddd\u4e0a \u5353\u4e5f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u5909\u6570\u306b\u7740\u76ee\u3057\u305f\u5909\u66f4\u30e1\u30c8\u30ea\u30af\u30b9\u306e\u6709\u52b9\u6027\u306b\u3064\u3044\u3066 \uff5e \u30d5\u30a9\u30fc\u30eb\u30c8\u6df7\u5165\u4e88\u6e2c\u7cbe\u5ea6\u306e\u6bd4\u8f03\u5b9f\u9a13 \uff5e\uff0c&#8221;\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.119, no.246, SS2019-22, pp.53&#8211;58, Oct. 2019.<\/li>\n\n\n\n<li>\u5b89\u91cc \u660c\u771f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u30d0\u30b0\u7968\u306e\u985e\u4f3c\u5ea6\u306b\u57fa\u3065\u3044\u305f\u30d0\u30b0\u4f4d\u7f6e\u63a8\u5b9a\u624b\u6cd5\u306e\u6539\u5584\u306b\u5411\u3051\u305f\u63d0\u6848 \uff5e TraceScore\u5024\u306e\u5206\u914d\u306b\u95a2\u3059\u308b\u6bd4\u8f03\u5b9f\u9a13 \uff5e\uff0c&#8221;\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.119, no.112, SS2019-4, pp.99&#8211;104, July 2019.<\/li>\n\n\n\n<li>\u677e\u672c\u660e\uff0c\u6a2a\u5ddd\u667a\u6559\uff0c\u5929\u5d5c\u8061\u4ecb\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u6709\u672c\u548c\u6c11\uff0c<br>&#8220;\u968e\u5c64\u7684\u306a\u5236\u5fa1\u69cb\u9020\u3092\u3082\u3064\u30b7\u30fc\u30b1\u30f3\u30b9\u56f3\u9593\u306e\u6574\u5408\u6027\u691c\u8a3c\u624b\u6cd5\u306e\u958b\u767a\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.119, no.112, SS2019-2, pp.47&#8211;52, July 2019.<\/li>\n\n\n\n<li>\u5185\u85e4\u99ff\u4eba\uff0c\u6a2a\u5ddd\u667a\u6559\uff0c\u5929\u5d5c\u8061\u4ecb\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u6709\u672c\u548c\u6c11\uff0c<br>&#8220;\u30d3\u30b8\u30e5\u30a2\u30eb\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u3092\u7528\u3044\u305fNuSMV\u306e\u30e2\u30c7\u30eb\u751f\u6210\u652f\u63f4\u74b0\u5883\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.119, no.112, SS2019-1, pp.41&#8211;46, July 2019.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2018 \u5e74<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u9234\u6728 \u7fd4\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.jstage.jst.go.jp\/article\/jssst\/35\/4\/35_115\/_article\/-char\/ja\" target=\"_blank\">\u6c7a\u5b9a\u6728\u3092\u5229\u7528\u3057\u305fJava\u30e1\u30bd\u30c3\u30c9\u306e\u540d\u524d\u3068\u5b9f\u88c5\u306e\u9593\u306e\u9069\u5408\u6027\u5224\u5b9a\u30e2\u30c7\u30eb\u3068\u305d\u306e\u8a55\u4fa1<\/a>,&#8221; \u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cVol.35, No. 4, pp.115&#8211;121, Nov. 2018.<\/li>\n\n\n\n<li>Akito Sunouchi, Hirohisa Aman and Minoru Kawahara,<br> &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/e101-d_10_2523.pdf\" target=\"_blank\">A Quantitative Analysis on Relationship between an Early-Closed Bug and Its Amount of Clues: A Case Study of Apache Ant<\/a>,&#8221; IEICE Trans. Inf. &amp; Syst., vol.E101-D, no.10, pp.2523&#8211;2525, Oct. 2018.<\/li>\n\n\n\n<li>Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara,<br> &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.atlantis-press.com\/journals\/ijndc\/25905544\" target=\"_blank\">An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application to Fault-Prone Program Analysis<\/a>,&#8221; International Journal of Networked and Distributed Computing, Vol.6, No.3, pp.118&#8211;132, July 2018.<\/li>\n\n\n\n<li>Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman and Kouji Hirata,<br> &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366417311994\" target=\"_blank\">Stochastic modeling of self-evolving botnets with vulnerability discovery<\/a>,&#8221; Computer Communications, Vol.124, pp.101&#8211;110, June 2018.<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara,<br> &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/8719434\" target=\"_blank\">A Doc2Vec-Based Assessment of Comments and Its Application to Change-Prone Method Analysis<\/a>,&#8221; Proc. 25th Asia-Pacific Software Engineering Conference (APSEC 2018), pp.643&#8211;647, Dec. 2018. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/APSEC2018.pdf\" target=\"_blank\">accepted version<\/a>] [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/data\/APSEC2018\/\" target=\"_blank\">\u5b9f\u9a13\u30c7\u30fc\u30bf<\/a>]<\/li>\n\n\n\n<li>Keiichiro Tashima, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara,<br> &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8498200\">Fault-Prone Java Method Analysis Focusing on Pair of Local Variables with Confusing Names<\/a>,&#8221; Proc. 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA2018), pp.154&#8211;158, Aug. 2018. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/SEAA2018.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Aji Ery Burhandenny, Hirohisa Aman and Minoru Kawahara,<br> &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/8377770\" target=\"_blank\">Empirical Analysis of Coding Standard Violation Focusing on Its Coverage and Importance<\/a>,&#8221; Proc. 2018 IEEE 42nd Annual Computer Software and Applications Conference, pp. 837&#8211;838, July 2018. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/COMPSAC2018-Aji.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/8530685\" target=\"_blank\">Fault-Prone Source File Analysis Focusing on the Contribution Entropy in Open Source Development<\/a>,&#8221; Proc. 2018 IEEE\/ACIS 3rd International Conference on Big Data, Cloud Computing, Data Science &amp; Engineering, pp.7&#8211;14, July 2018. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/BCD2018-Yamauchi.pdf\" target=\"_blank\">accepted version<\/a>] <strong><span class=\"has-inline-color has-vivid-red-color\">\u3010Best Student Paper Award \u53d7\u8cde\u3011<\/span><\/strong><\/li>\n\n\n\n<li>Hirohisa Aman, Takashi Nakano, Hideto Ogasawara and Minoru Kawahara, <br>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/ieeexplore.ieee.org\/document\/8411782\/\" target=\"_blank\">A Topic Model and Test History-Based Test Case Recommendation Method for Regression Testing<\/a>,&#8221; Proc. 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops, pp.392&#8211;397, Apr. 2018. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/Aman_TAIC-PART2018.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\"><strong>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/strong><\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u5ddd\u4e0a \u5353\u4e5f\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c<br>&#8220;\u30d5\u30a9\u30fc\u30eb\u30c8\u6df7\u5165\u306e\u30ea\u30b9\u30af\u8a55\u4fa1\u306b\u5411\u3051\u305f\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u5909\u66f4\u30e1\u30c8\u30ea\u30af\u30b9\u306e\u63d0\u6848,&#8221; \u4f0a\u85e4\u6075\uff0c\u795e\u8c37\u5e74\u6d0b \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXV\uff0cpp.47&#8211;52, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2018\uff0e<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<!--nextpage-->\n\n\n<div class=\"breadcrumbs align  wp-block-bcn-breadcrumb-trail has-text-color has-background\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">\n\t<span><\/span>\n\t<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u5ba4.\" href=\"https:\/\/se.cite.ehime-u.ac.jp\/jp\" class=\"home\" aria-current=\"page\"><span property=\"name\">\u30db\u30fc\u30e0<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2017 \u5e74\u5ea6\uff08\u5e73\u621029\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Aji Ery Burhandenny, Hirohisa Aman and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/www.atlantis-press.com\/journals\/ijndc\/25885019\" target=\"_blank\">An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File<\/a>,&#8221; International Journal of Networked and Distributed Computing, vol.5, no.4, pp.211&#8211;220, Oct. 2017.<\/li>\n\n\n\n<li>Aji Ery Burhandenny, Hirohisa Aman and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/e100-d_5_1128.pdf\" target=\"_blank\">Change-Prone Java Method Prediction by Focusing on Individual Differences in Comment Density<\/a>,&#8221; IEICE Trans. Inf. &amp; Syst., vol.E100-D, no.5, pp.1128&#8211;1131, May 2017.<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-69926-4_7\" target=\"_blank\">A Survival Analysis of Source Files Modified by New Developers<\/a>,&#8221; M. Felderer, D. M. Fern\u00e1ndez, B. Turhan, M. Kalinowski, F. Sarro, D. Winkler (Eds.) Product-Focused Software Process Improvement, Lecture Notes in Computer Science, vol. 10611, pp.80&#8211;88, Springer, Cham, Switzerland, Nov. 2017. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/Profes2017-aman.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/ISSREW.2017.37\" target=\"_blank\">Empirical Study of Abnormalities in Local Variables of Change-Prone Java Methods<\/a>,&#8221; Proc. 2017 IEEE 28th International Symposium on Software Reliability Engineering Workshops, pp.214&#8211;221, Oct. 2017. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/IWPD2017.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/SEAA.2017.23\" target=\"_blank\">Empirical Analysis of Words in Comments Written for Java Methods<\/a>,&#8221; Proc. 2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA2017), pp.375&#8211;379, Aug. 2017. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/SEAA2017-1.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Sho Suzuki, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/doi.org\/10.1109\/SEAA.2017.24\" target=\"_blank\">An Application of the PageRank Algorithm to Commit Evaluation on Git Repository<\/a>,&#8221; Proc. 2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA2017), pp.380&#8211;383, Aug. 2017. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/SEAA2017-2.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Sho Suzuki, Hirohisa Aman and Minoru Kawahara, &#8220;Empirical Study of Fault-Prone Method&#8217;s Name and Implementation: Analysis on Three Prefixes&#8212;Get, Set and Be,&#8221; Proc. 2nd International Conference on Big Data, Cloud Computing, Data Science &amp; Engineering (BCD2017), pp.266&#8211;271, July 2017. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/BCD2017-Suzuki.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Yuto Miyake, Sousuke Amasaki, Tomoyuki Yokogawa and Hirohisa Aman, &#8220;An Empirical Study on Relationships between Comments and Design Properties,&#8221; Proc. 2nd International Conference on Big Data, Cloud Computing, Data Science &amp; Engineering (BCD2017), pp.260&#8211;265, July 2017.<\/li>\n\n\n\n<li>Aji Ery Burhandenny, Hirohisa Aman and Minoru Kawahara, &#8220;Investigation of Coding Violations Focusing on Authorships of Source Files,&#8221; Proc. 2nd International Conference on Big Data, Cloud Computing, Data Science &amp; Engineering (BCD2017), pp.254&#8211;259, July 2017. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/BCD2017-Aji.pdf\" target=\"_blank\">accepted version<\/a>] <strong><span class=\"has-inline-color has-vivid-red-color\">\u3010Best Student Presenter Award \u53d7\u8cde\u3011<\/span><\/strong><\/li>\n\n\n\n<li>Yuto Miyake, Sousuke Amasaki, Hirohisa Aman and Tomoyuki Yokogawa, &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-51472-7_2\" target=\"_blank\">A Replicated Study on Relationship Between Code Quality and Method Comments<\/a>,&#8221; Roger Lee (ed.), Applied Computing and Information Technology, Studies in Computational Intelligence 695, pp.17&#8211;30, Springer, 2017. [DOI 10.1007\/978-3-319-51472-7_2]<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u9234\u6728 \u7fd4\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u6c7a\u5b9a\u6728\u3092\u7528\u3044\u305f Java \u30e1\u30bd\u30c3\u30c9\u306e\u540d\u524d\u3068\u5b9f\u88c5\u306e\u9069\u5408\u6027\u8a55\u4fa1\u6cd5\u306e\u63d0\u6848,&#8221; \u5409\u7530\u6566\uff0c\u798f\u5b89\u76f4\u6a39 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXIV\uff0cpp.63&#8211;72, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2017\uff0e<strong><span class=\"has-inline-color has-vivid-red-color\">\u3010IEEE Computer Society Japan Chapter FOSE Young Researcher Award \u53d7\u8cde\u3011<\/span><\/strong><\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u77e2\u91ce \u535a\u6689\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/id.nii.ac.jp\/1001\/00186532\/\" target=\"_blank\">\u30c8\u30d4\u30c3\u30af\u306e\u5909\u5316\u91cf\u306b\u7740\u76ee\u3057\u305f\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u306e\u5909\u66f4\u91cf\u5206\u6790\u306b\u95a2\u3059\u308b\u8003\u5bdf<\/a>\uff0c&#8221;\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u5831\u544a\uff0cvol.2018-SE-198, no.30, pp.1&#8211;8, Mar. 2018.<\/li>\n\n\n\n<li>\u5c71\u5185 \u4e00\u8f1d\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;Java\u30bd\u30fc\u30b9\u30d5\u30a1\u30a4\u30eb\u306e\u958b\u767a\u8005\u6570\u3068\u30d0\u30b0\u4fee\u6b63\u306e\u8d77\u3053\u308a\u3084\u3059\u3055\u306b\u95a2\u3059\u308b\u8abf\u67fb \uff5e\u30bd\u30fc\u30b9\u30d5\u30a1\u30a4\u30eb\u9593\u306e\u4f9d\u5b58\u95a2\u4fc2\u306b\u7740\u76ee\u3057\u305f\u89e3\u6790\uff5e\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.117, no.136, pp.67&#8211;72, July 2017.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2016 \u5e74\u5ea6\uff08\u5e73\u621028\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u5fd7\u7530\u6d0b\uff0c\u5927\u4e32\u88d5\u90c1\uff0c\u6a0b\u4e0a\u559c\u4fe1\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u9ad8\u6a4b\u5bdb\uff0c&#8220;\u8a2d\u5099\u6545\u969c\u304c\u65c5\u5ba2\u306b\u4e0e\u3048\u308b\u7d4c\u6e08\u7684\u640d\u5931\u3092\u8a55\u4fa1\u5c3a\u5ea6\u3068\u3057\u305f\u9244\u9053\u4fe1\u53f7\u8a2d\u5099\u306e\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u30b3\u30b9\u30c8\u306e\u4f4e\u6e1b\u306b\u95a2\u3059\u308b\u8003\u5bdf\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u8ad6\u6587\u8a8c D\uff0cvol.J99-D, no.5, pp.539&#8211;548, May 2016.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Hirohisa Aman,Aji Ery Burhandenny, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/document\/7925421\/\" target=\"_blank\">A Health Index of Open Source Projects Focusing on Pareto Distribution of Developer&#8217;s Contribution<\/a>,&#8221; Proc. IEEE 8th International Workshop on Empirical Software Engineering in Practice (IWESEP2017), pp.29&#8211;34, Mar. 2017. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/IWESEP2017.pdf\" target=\"_blank\">accepted version<\/a>] <span class=\"has-inline-color has-vivid-red-color\">\u3010<strong>Best Presentation Award \u53d7\u8cde<\/strong>\u3011<\/span><\/li>\n\n\n\n<li>Hirohisa Aman, Takashi Nakano, Hideto Ogasawara and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/document\/7899026\/\" target=\"_blank\">A Test Case Recommendation Method Based on Morphological Analysis, Clustering and the Mahalanobis-Taguchi Method<\/a>,&#8221; Proc. 10th IEEE International Conference on Software Testing, Verification and Validation Workshops, pp.29&#8211;35, Mar. 2017. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/TAIC_PART2017.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Aji Ery Burhandenny, Hirohisa Aman and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/document\/7890579\/\" target=\"_blank\">Examination of Coding Violations Focusing on Their Change Patterns over Releases<\/a>,&#8221; Proc. 23rd Asia-Pacific Software Engineering Conference (APSEC 2016), pp.121&#8211;128, Dec. 2016. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/APSEC2016.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa and Minoru Kawahara, &#8220;Local Variables with Compound Names and Comments as Signs of Fault-Prone Java Methods,&#8221; Joint Proc. the 4th International Workshop on Quantitative Approaches to Software Quality (QuASoQ2016) and 1st International Workshop on Technical Debt Analytics (TDA 2016), pp.4&#8211;11, Dec. 2016. ( <a href=\"http:\/\/ceur-ws.org\/Vol-1771\/\">http:\/\/ceur-ws.org\/Vol-1771\/<\/a> ) [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/QuASoQ2016.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Hirohisa Aman, Yuta Tanaka, Takashi Nakano, Hideto Ogasawara and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/document\/7592803\/\" target=\"_blank\">Application of Mahalanobis-Taguchi Method and 0-1 Programming Method to Cost-Effective Regression Testing<\/a>,&#8221; Proc. 2016 42nd Euromicro Conference on Software Engineering and Advanced Applications (SEAA2016), pp.240&#8211;244, Aug. 2016. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/SEAA2016-aman.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Aji Ery Burhandenny, Takashi Nakano, Hirohisa Aman and Minoru Kawahara, &#8220;Empirical Study of Change-Prone and Fault-Prone Method Prediction Focusing on Comment Ownership,&#8221; Proc. 2016 International Conference on Business and Information (BAI2016), vol.8, pp.219&#8211;230, July 2016. [ISSN 1729-9322] [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/BAI2016-Aji.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman and Kouji Hirata, &#8220;Behavior Analysis of Self-Evolving Botnets,&#8221; Proc. 2016 International Conference on Computer, Information and Telecommunication Systems (CITS2016), pp.1&#8211;5, June 2016. [DOI 10.1109\/CITS.2016.7546428]<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>\u9234\u6728 \u7fd4\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u30e1\u30bd\u30c3\u30c9\u540d\u306e\u5148\u982d\u5358\u8a9e\u3068\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u306e\u5b89\u5b9a\u6027\u306e\u95a2\u4fc2\u306b\u95a2\u3059\u308b\u8003\u5bdf\uff0c&#8221; \u963f\u842c \u88d5\u4e45\uff0c\u6a2a\u5ddd \u667a\u6559 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXIII\uff0cpp.247&#8211;248, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2016\uff0e<\/li>\n\n\n\n<li>\u5c71\u5185 \u4e00\u8f1d\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u4e00\u4eba\u3067\u958b\u767a\u30fb\u4fdd\u5b88\u304c\u884c\u308f\u308c\u3066\u3044\u308b\u30bd\u30fc\u30b9\u30d5\u30a1\u30a4\u30eb\u306e\u54c1\u8cea\u306b\u3064\u3044\u3066\uff0c&#8221; \u963f\u842c \u88d5\u4e45\uff0c\u6a2a\u5ddd \u667a\u6559 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXIII\uff0cpp.251&#8211;252, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2016\uff0e<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>Sho Suzuki, Hirohisa Aman and Minoru Kawahara, &#8220;A Study of Fault-Prone Method Prediction with Distortions between Method\u2019s Name and its Implementation,&#8221; at <a rel=\"noreferrer noopener\" href=\"https:\/\/iwesep2017.github.io\/accepted-papers\/\" target=\"_blank\">IWESEP 2017<\/a> \uff08\u30dd\u30b9\u30bf\u30fc\u767a\u8868\uff09<\/li>\n\n\n\n<li>\u9234\u6728 \u7fd4\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c &#8220;\u30d0\u30b0\u4e88\u6e2c\u306b\u5411\u3051\u305fJava\u30e1\u30bd\u30c3\u30c9\u306e\u540d\u524d\u3068\u5b9f\u88c5\u306e\u7279\u5fb4\u306e\u95a2\u4fc2\u306b\u95a2\u3059\u308b\u8003\u5bdf\uff0c&#8221;\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.116, no.512, pp.25&#8211;30, Mar.2017.<\/li>\n\n\n\n<li>\u9234\u6728 \u7fd4\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u306e\u5909\u66f4\u4e88\u6e2c\u306b\u5411\u3051\u305f\u30e1\u30bd\u30c3\u30c9\u540d\u306e\u5148\u982d\u5358\u8a9e\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u7684\u8abf\u67fb\uff0c&#8221; \u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u5831\u544a\uff0cvol.2016-SE-194, no.6, pp.1&#8211;8, Nov.2016.<\/li>\n\n\n\n<li>\u5c71\u5185 \u4e00\u8f1d\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u30b3\u30fc\u30c9\u884c\u6570\u306b\u57fa\u3065\u3044\u305f\u958b\u767a\u8005\u306e\u8ca2\u732e\u5ea6\u3068\u305d\u306e\u30a8\u30f3\u30c8\u30ed\u30d4\u30fc\u3092\u7528\u3044\u305f OSS \u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306e\u5206\u6790\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544avol.116, no.127, pp.131&#8211;136, July 2016. <span class=\"has-inline-color has-vivid-red-color\">\u3010<strong>\u7814\u7a76\u5968\u52b1\u8cde \u53d7\u8cde<\/strong>\u3011<\/span><\/li>\n\n\n\n<li>\u9234\u6728 \u7fd4\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c &#8220;\u30e1\u30bd\u30c3\u30c9\u540d\u306e\u9577\u3055\u3068\u69cb\u6210\u306b\u7740\u76ee\u3057\u305f\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u54c1\u8cea\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u7684\u8abf\u67fb\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544avol.116, no.127, pp.137&#8211;142, July 2016.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2015 \u5e74\u5ea6\uff08\u5e73\u621027\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/e98-d_12_2218.pdf\" target=\"_blank\">Lines of Comments as a Noteworthy Metric for Analyzing Fault-Proneness in Methods<\/a>\uff0c&#8221; IEICE Trans. Inf. &amp; Syst.\uff0c vol.E98-D, no.12, pp.2218&#8211;2228, Dec. 2015.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c\u4f50\u3005\u6728\u611b\u7f8e\uff0c\u4e2d\u91ce\u9686\u53f8\uff0c\u5c0f\u7b20\u539f\u79c0\u4eba\uff0c\u4f50\u3005\u6728\u9686\u5fd7\uff0c\u5ddd\u539f\u7a14\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.jstage.jst.go.jp\/article\/jssst\/32\/3\/32_3_111\/_pdf\" target=\"_blank\">\u30c6\u30b9\u30c8\u30b1\u30fc\u30b9\u306e\u30af\u30e9\u30b9\u30bf\u30ea\u30f3\u30b0\u3068 0-1 \u8a08\u753b\u30e2\u30c7\u30eb\u3092\u7d44\u307f\u5408\u308f\u305b\u305f\u56de\u5e30\u30c6\u30b9\u30c8\u306e\u52b9\u7387\u5316<\/a>\uff0c&#8221; \u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cVol.32, No.3, pp.111&#8211;125, Aug. 2015. <span class=\"has-inline-color has-vivid-red-color\">\u3010<strong>\u7b2c 9 \u56de\u5584\u543e\u8cde\u53d7\u8cde<\/strong>\u3011<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=7321197&amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7321197\" target=\"_blank\">Empirical Analysis of Change-Proneness in Methods Having Local Variables with Long Names and Comments<\/a>,&#8221; Proc. the 9th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM2015), pp.50&#8211;53, Oct. 2015. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/ESEM2015-aman.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki and Minoru Kawahara, &#8220;Predicting Fault-Prone Methods Focusing on the Combination of Inner Comments and Documentation Comments,&#8221; Erwin Groppietsch and Konrad Klockner (eds.), Proc. Work in Prograss Session held in connection with SEAA2015 and DSS 2015, pp.3&#8211;4, Aug. 2015. (ISBN 978-3-902457-44-8)<\/li>\n\n\n\n<li>Hiroshi Shida, Hirofumi Oogushi, Yoshinobu Higami, Hirohisa Aman and Hiroshi Takahashi, &#8220;A Proposal of Maintenance Cost Model of Track Circuits,&#8221; Proc. the 9th International Conference on Mathematical Methods in Reliability: Theory, Methods and Applications (MMR 2015), pp.408&#8211;415, June, 2015.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff0c\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>\u963f\u842c \u88d5\u4e45\uff0c\u4e2d\u91ce \u9686\u53f8\uff0c\u5c0f\u7b20\u539f \u79c0\u4eba\uff0c&#8220;\u30c6\u30b9\u30c8\u5b9f\u884c\u8005\u60c5\u5831\u3092\u8003\u616e\u3057\u305f 0-1 \u8a08\u753b\u30e2\u30c7\u30eb\u306b\u3088\u308b\u52b9\u7387\u7684\u306a\u30c6\u30b9\u30c8\u30b1\u30fc\u30b9\u9078\u629e\u624b\u6cd5\u306e\u63d0\u6848\uff0c&#8221; \u9752\u6728 \u5229\u6643\uff0c\u8c4a\u5cf6 \u771f\u6f84 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXII\uff0cpp.221&#8211;221, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2015\uff0e<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c\u5929\u5d5c\u8061\u4ecb\uff0c\u4f50\u3005\u6728\u9686\u5fd7\uff0c\u5ddd\u539f\u7a14\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=pages_view_main&amp;active_action=repository_view_main_item_detail&amp;item_id=144898&amp;item_no=1&amp;page_id=13&amp;block_id=8\" target=\"_blank\">\u5909\u6570\u540d\u3068\u30b9\u30b3\u30fc\u30d7\u306e\u9577\u3055\u53ca\u3073\u30b3\u30e1\u30f3\u30c8\u306b\u7740\u76ee\u3057\u305f\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u6027\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u7684\u8abf\u67fb<\/a>\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 2015 \u8ad6\u6587\u96c6\uff0cpp.69&#8211;76, Aug. 2015.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u5c71\u5185 \u4e00\u8f1d\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u958b\u767a\u8005\u306e\u8ca2\u732e\u5ea6\u3068\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u54c1\u8cea\u306e\u95a2\u4fc2\u306b\u3064\u3044\u3066\uff0c&#8221;\u3000\u30a6\u30a3\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72016\u30fb\u30a4\u30f3\u30fb\u9017\u5b50 \u8ad6\u6587\u96c6\uff0cpp.41&#8211;42, Feb. 2016.<\/li>\n\n\n\n<li>\u52a0\u85e4 \u5065\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c &#8220;\u30d7\u30ed\u30b0\u30e9\u30e0\u4f9d\u5b58\u30b0\u30e9\u30d5\u4e0a\u3067\u306e\u547d\u4ee4\u9593\u306e\u8ddd\u96e2\u306b\u7740\u76ee\u3057\u305f\u51dd\u96c6\u5ea6\u30e1\u30c8\u30ea\u30af\u30b9\u306e\u63d0\u6848\u3068\u30d0\u30b0\u4e88\u6e2c\u3078\u306e\u5fdc\u7528\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a, vol.115, no.421, pp.1&#8211;6, Jan. 2016.<\/li>\n\n\n\n<li>\u5de5\u85e4 \u9686\u5247\uff0c\u6728\u6751 \u5171\u5b5d\uff0c\u4e95\u4e0a \u6587\u5f70\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5e73\u7530 \u5b5d\u5fd7\uff0c&#8220;\u81ea\u5f8b\u9032\u5316\u3059\u308b\u30dc\u30c3\u30c8\u30cd\u30c3\u30c8\u306e\u611f\u67d3\u62e1\u6563\u306b\u3064\u3044\u3066\u306e\u89e3\u6790\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a, vol.115, no.368, pp.13&#8211;18, Dec. 2015. <\/li>\n\n\n\n<li>\u5c3e\u7530 \u7950\u4e4b\u4ecb\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u5171\u5909\u66f4\u306e\u65b0\u3057\u3055\u3068\u958b\u767a\u8005\u306e\u8ca2\u732e\u5ea6\u5408\u3044\u306b\u7740\u76ee\u3057\u305f\u30ed\u30b8\u30ab\u30eb\u30ab\u30c3\u30d7\u30ea\u30f3\u30b0\u306e\u8a55\u4fa1 &#8212;\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u4fee\u6b63\u6f0f\u308c\u306e\u81ea\u52d5\u691c\u51fa\u306b\u5411\u3051\u3066&#8212;\uff0c&#8221; \u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u7814\u7a76\u5831\u544a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66, vol.2015-SE-190, no.17, pp.1&#8211;8, Dec. 2015.<\/li>\n\n\n\n<li>\u4e2d\u91ce \u8cb4\u53f2\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u958b\u767a\u8005\u306e\u9055\u3044\u3092\u8003\u616e\u3057\u305f\u30b3\u30e1\u30f3\u30c8\u8a18\u8ff0\u91cf\u306e\u8a55\u4fa1\u3068\u30d0\u30b0\u4e88\u6e2c\u3078\u306e\u5fdc\u7528\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u4fe1\u983c\u6027\u7814\u7a76\u4f1a \u7b2c 11 \u56de\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u8ad6\u6587\u96c6, \u30aa\u30f3\u30e9\u30a4\u30f3\uff0c Nov. 2015.<\/li>\n\n\n\n<li>\u4e2d\u91ce \u8cb4\u53f2\uff0c\u4f50\u3005\u6728 \u9686\u5fd7\uff0c\u5ddd\u539f \u7a14\uff0c\u963f\u842c \u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u958b\u767a\u8005\u3054\u3068\u3067\u306e\u30b3\u30e1\u30f3\u30c8\u8a18\u8ff0\u306e\u50be\u5411\u306b\u95a2\u3059\u308b\u8abf\u67fb\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.115, no.153, pp.125&#8211;130, July 2015.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<!--nextpage-->\n\n\n<div class=\"breadcrumbs align  wp-block-bcn-breadcrumb-trail has-text-color has-background\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">\n\t<span><\/span>\n\t<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u5ba4.\" href=\"https:\/\/se.cite.ehime-u.ac.jp\/jp\" class=\"home\" aria-current=\"page\"><span property=\"name\">\u30db\u30fc\u30e0<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2014 \u5e74\u5ea6\uff08\u5e73\u621026\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u67cf\u7950\u592a\u90ce\uff0c\u5927\u5e73\u96c5\u96c4\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u4e80\u4e95\u9756\u9ad8\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/IPSJ-JNL5602027.pdf\" target=\"_blank\">\u5927\u898f\u6a21OSS\u958b\u767a\u306b\u304a\u3051\u308b\u4e0d\u5177\u5408\u4fee\u6b63\u6642\u9593\u306e\u77ed\u7e2e\u5316\u3092\u76ee\u7684\u3068\u3057\u305f\u30d0\u30b0\u30c8\u30ea\u30a2\u30fc\u30b8\u624b\u6cd5<\/a>\uff0c&#8221; \u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u8ad6\u6587\u8a8c\uff0cVol.56, No.2, pp.669&#8211;681, Feb. 2015.<span class=\"has-inline-color has-vivid-red-color\">\u3010<strong>\u8ad6\u6587\u8cde\u53d7\u8cde<\/strong>\u3011<\/span><\/li>\n\n\n\n<li>\u5fd7\u7530\u6d0b\uff0c\u6a0b\u4e0a\u559c\u4fe1\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u9ad8\u6a4b\u5bdb\uff0c\u30b1\u30fc\u30ef\u30eb\u30b5\u30eb\u30fc\u30b8\u30e3\uff0c &#8220;0-1 \u6574\u6570\u8a08\u753b\u554f\u984c\u3092\u5229\u7528\u3057\u305f\u6b20\u9665\u691c\u51fa\u5411\u3051\u30c6\u30b9\u30c8\u30d1\u30bf\u30fc\u30f3\u9078\u629e\u6cd5\uff0c&#8221; \u65e5\u672c\u4fe1\u983c\u6027\u5b66\u4f1a\u8a8c\uff0cVol.36, No.8, pp.501&#8211;510, Nov. 2014.<\/li>\n\n\n\n<li>\u672c\u7530\u6681\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u4f50\u3005\u6728\u9686\u5fd7\uff0c\u5ddd\u539f\u7a14\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/j97-d_7_1213.pdf\" target=\"_blank\">\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u30b3\u30fc\u30c9\u30af\u30ed\u30fc\u30f3\u542b\u6709\u7387\u306e\u53ce\u675f\u50be\u5411\u306b\u95a2\u3059\u308b\u8abf\u67fb<\/a>\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u548c\u6587\u8ad6\u6587\u8a8c D\uff0cVol.J97-D, No.7. pp.1213&#8211;1215, July 2014.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=7091216&amp;filter%3DAND%28p_IS_Number%3A7091193%29\" target=\"_blank\">Empirical Analysis of Fault-proneness in Methods by Focusing on their Comment Lines<\/a>,&#8221; Proc. the 21st Asia-Pacific Software Engineering Conference (APSEC 2014), Vol.2, pp.51&#8211;56, Dec. 2014 (presented at the 2nd International Workshop on Quantitative Approaches to Software Quality (QuASoQ2014) co-located with APSEC2014) [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/QuASoQ2014.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki and Minoru Kawahara, &#8220;Empirical analysis of comments and fault-proneness in methods: can comments point to faulty methods?,&#8221; Proc. the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM2014), p.63, Sept. 2014.<\/li>\n\n\n\n<li>Sousuke Amasaki, Tomoyuki Yokogawa, Risa Fujii and Hirohisa Aman, &#8220;How Developers Comment on Code Smell? An Empirical Analysis on Feature Envy,&#8221; Erwin Groppietsch and Konrad Klockner (eds.), Proc. Work in Progress Session held in connection with SEAA 2014 and DSD 2014, pp.1&#8211;2, Aug. 2014. (ISBN 978-3-902457-40-0)<\/li>\n\n\n\n<li>Hirohisa Aman, Akiko Yamashita, Takashi Sasaki and Minoru Kawahara, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=6928813&amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6928813\" target=\"_blank\">Multistage Growth Model for Code Change Events in Open Source Software Development: An Example using Development of Nagios<\/a>,&#8221; Proc. 2014 40th Euromicro Conference on Software Engineering and Advanced Applications (SEAA2014), pp.207&#8211;212, Aug. 2014. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/SEAA2014.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Hideto Ogasawara, Manami Sasaki, Takashi Nakano, and Hirohisa Aman, &#8220;Application of the test select method using mathematical programming model,&#8221; Proc. 21st European System, Software and Service Process Improvement and Innovation, June 2014.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff0c\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>\u85e4\u4e95 \u91cc\u6c99\uff0c\u5929\u5d5c \u8061\u4ecb\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u6a2a\u5ddd \u667a\u6559\uff0c&#8220;Feature Envy \u3068\u30b3\u30e1\u30f3\u30c8\u6587\u306e\u95a2\u9023\u6027\u306b\u95a2\u3059\u308b\u8003\u5bdf,\uff0c&#8221;\u82b1\u5ddd\u5178\u5b50\uff0c\u5c3e\u82b1\u5c06\u8f1d \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXI\uff0cpp.69&#8211;74, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2014\uff0e<\/li>\n\n\n\n<li>\u963f\u842c \u88d5\u4e45\uff0c\u4f50\u3005\u6728 \u611b\u7f8e\uff0c\u4e2d\u91ce \u9686\u53f8\uff0c\u5c0f\u7b20\u539f \u79c0\u4eba\uff0c&#8220;\u30c6\u30b9\u30c8\u30b1\u30fc\u30b9\u306e\u5b9f\u884c\u5c65\u6b74\u306b\u57fa\u3065\u3044\u305f\u30af\u30e9\u30b9\u30bf\u30ea\u30f3\u30b0\u3068 0-1 \u8a08\u753b\u30e2\u30c7\u30eb\u3092\u7d44\u307f\u5408\u308f\u305b\u305f\u56de\u5e30\u30c6\u30b9\u30c8\u8a08\u753b\u624b\u6cd5\u306e\u63d0\u6848\uff0c&#8221; \u82b1\u5ddd\u5178\u5b50\uff0c\u5c3e\u82b1\u5c06\u8f1d \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXI\uff0cpp.231&#8211;240, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2014\uff0e<\/li>\n\n\n\n<li>\u4e2d\u91ce \u9686\u53f8\uff0c\u4f50\u3005\u6728 \u611b\u7f8e\uff0c\u5c0f\u7b20\u539f \u79c0\u4eba\uff0c\u963f\u842c \u88d5\u4e45\uff0c&#8220;\u30c6\u30b9\u30c8\u5408\u683c\u4e88\u6e2c\u624b\u6cd5\u306b\u304a\u3051\u308b\u30c6\u30b9\u30c8\u9805\u76ee\u9593\u306e\u95a2\u9023\u4ed8\u306e\u81ea\u52d5\u5316\u306e\u691c\u8a0e\uff0c&#8221; \u82b1\u5ddd\u5178\u5b50\uff0c\u5c3e\u82b1\u5c06\u8f1d \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXI\uff0cpp.267&#8211;268, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2014\uff0e<\/li>\n\n\n\n<li>\u52a0\u85e4 \u5065\u592a\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u4f50\u3005\u6728 \u9686\u5fd7\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u30d7\u30ed\u30b0\u30e9\u30e0\u4f9d\u5b58\u30b0\u30e9\u30d5\u306b\u304a\u3051\u308b\u5230\u9054\u53ef\u80fd\u6027\u306b\u7740\u76ee\u3057\u305f\u51dd\u96c6\u5ea6\u30e1\u30c8\u30ea\u30af\u30b9\u306e\u63d0\u6848\uff0c&#8221; \u82b1\u5ddd\u5178\u5b50\uff0c\u5c3e\u82b1\u5c06\u8f1d \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XXI\uff0cpp.287&#8211;288, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2014\uff0e<\/li>\n\n\n\n<li>\u67cf\u7950\u592a\u90ce\uff0c\u5927\u5e73\u96c5\u96c4\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u4e80\u4e95\u9756\u9ad8\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=pages_view_main&amp;active_action=repository_view_main_item_detail&amp;item_id=102855&amp;item_no=1&amp;page_id=13&amp;block_id=8\" target=\"_blank\">\u5927\u898f\u6a21OSS\u958b\u767a\u306b\u304a\u3051\u308b\u4e0d\u5177\u5408\u4fee\u6b63\u6642\u9593\u306e\u77ed\u7e2e\u5316\u3092\u76ee\u7684\u3068\u3057\u305f\u30d0\u30b0\u30c8\u30ea\u30a2\u30fc\u30b8\u624b\u6cd5<\/a>\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 2014 \u8ad6\u6587\u96c6\uff0cpp.65&#8211;75, Aug. 2014. <span class=\"has-inline-color has-vivid-red-color\">\u3010<strong>\u6700\u512a\u79c0\u8ad6\u6587\u8cde \u53d7\u8cde\u3011<\/strong><\/span><\/li>\n\n\n\n<li>\u5c0f\u7b20\u539f\u79c0\u4eba\uff0c\u4f50\u3005\u6728\u611b\u7f8e\uff0c\u4e2d\u91ce\u9686\u53f8\uff0c\u963f\u842c \u88d5\u4e45\uff0c&#8220;\u30c6\u30b9\u30c8\u306e\u5b9f\u65bd\u5c65\u6b74\u3068\u30c6\u30b9\u30c8\u9805\u76ee\u9593\u306e\u95a2\u9023\u60c5\u5831\u3092\u5229\u7528\u3057\u305f\u52b9\u679c\u7684\u306a\u30c6\u30b9\u30c8\u524a\u6e1b\u65b9\u6cd5\u306e\u63d0\u6848\u3068\u8a55\u4fa1\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 2014 \u8ad6\u6587\u96c6\uff0c \u30aa\u30f3\u30e9\u30a4\u30f3\uff0cpp.147-151, June 2014.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u7e54\u7530 \u6cf0\u8f14\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u4f50\u3005\u6728 \u9686\u5fd7\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u898f\u7d04\u9055\u53cd\u306e\u767a\u751f\u3068\u89e3\u6d88\u306e\u52d5\u5411\u306b\u95a2\u3059\u308b\u8abf\u67fb\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u4fe1\u983c\u6027\u7814\u7a76\u4f1a \u7b2c 10 \u56de\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u8ad6\u6587\u96c6\uff0c\u30aa\u30f3\u30e9\u30a4\u30f3\uff0c Dec. 2014.<\/li>\n\n\n\n<li>\u7e54\u7530 \u6cf0\u8f14\uff0c\u963f\u842c \u88d5\u4e45\uff0c\u4f50\u3005\u6728 \u9686\u5fd7\uff0c\u5ddd\u539f \u7a14\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u3067\u306e\u30b3\u30fc\u30c9\u4fee\u6b63\u306b\u304a\u3051\u308b\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u898f\u7d04\u9055\u53cd\u306e\u5909\u5316\u306b\u95a2\u3059\u308b\u8abf\u67fb\uff0c&#8221; \u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u7814\u7a76\u5831\u544a\uff0cVol.2014-SE-186, No.3, pp.1&#8211;8, Nov. 2014.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2013 \u5e74\u5ea6\uff08\u5e73\u621025\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>Hirohisa Aman, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6754348&amp;sortType%3Dasc_p_Sequence%26filter%3DAND%28p_IS_Number%3A6754325%29\" target=\"_blank\">0-1 Programming Model-Based Method for Planning Code Review using Bug Fix History<\/a>,&#8221; Proc. 5th International Workshop on Empirical Software Engineering in Practice (IWESEP2013), pp.37&#8211;42, Dec. 2013. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/IWESEP2013.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n\n\n\n<li>Hirohisa AMAN, Manami SASAKI, Kei KUREISHI and Hideto OGASAWARA, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?tp=&amp;arnumber=6649905&amp;searchWithin%3Dp_Authors%3A.QT.Aman%2C+H..QT.\" target=\"_blank\">Application of the 0-1 Programming Model for Cost-Effective Regression Test<\/a>,&#8221; Proc. 37th Annual International Computer Software &amp;Applications Conference (COMPSAC2013), pp.721&#8211;722, July 2013. [<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/compsac2013.pdf\" target=\"_blank\">accepted version<\/a>]<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff0c\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>\u5c71\u4e0b\u5f70\u5b50\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;<a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=pages_view_main&amp;active_action=repository_view_main_item_detail&amp;item_id=97925&amp;item_no=1&amp;page_id=13&amp;block_id=8\">\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u5909\u66f4\u4e88\u6e2c\u306b\u5411\u3051\u305f\u6210\u9577\u66f2\u7dda\u30e2\u30c7\u30eb\u306e\u591a\u6bb5\u7684\u5229\u7528\u306b\u3064\u3044\u3066<\/a>\uff0c&#8221; \u30a6\u30a4\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72014\u30fb\u30a4\u30f3\u30fb\u5927\u6d17\u8ad6\u6587\u96c6\uff0cpp.93&#8211;94, Jan.2014.<\/li>\n\n\n\n<li>\u4e95\u4e0a\u614e\u4e5f\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;0-1 \u8a08\u753b\u30e2\u30c7\u30eb\u3092\u7528\u3044\u305f\u30b3\u30fc\u30c9\u30ec\u30d3\u30e5\u30fc\u8a08\u753b\u6cd5\u306b\u304a\u3051\u308b\u30d5\u30a3\u30eb\u30bf\u30ea \u30f3\u30b0\u3068\u305d\u306e\u52b9\u679c\uff0c&#8221; \u5ca1\u91ce\u6d69\u4e09\uff0c\u95a2\u6fa4\u4fca\u5f26 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XX\uff0cpp.251&#8211;256, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2013\uff0e<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30e1\u30bd\u30c3\u30c9\u306e\u4e2d\u306b\u66f8\u304b\u308c\u308b\u30b3\u30e1\u30f3\u30c8\u3068\u524d\u306b\u66f8\u304b\u308c\u308b\u30b3\u30e1\u30f3\u30c8\u306e\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u4e88\u6e2c\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u7684\u8003\u5bdf\uff0c&#8221; \u5ca1\u91ce\u6d69\u4e09\uff0c\u95a2\u6fa4\u4fca\u5f26 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XX\uff0cpp.301&#8211;302, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c 2013\uff0e<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;<a href=\"https:\/\/docs.google.com\/viewer?a=v&amp;pid=sites&amp;srcid=ZGVmYXVsdGRvbWFpbnxzZXNqcDIwMTN8Z3g6M2VlYTBjZjE0YTg5ZjI2OA\">\u30b3\u30e1\u30f3\u30c8\u306e\u8a18\u8ff0\u4f4d\u7f6e\u306e\u9055\u3044\u306b\u7740\u76ee\u3057\u305f\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u6027\u306e\u5206\u6790 &#8212;\u30e1\u30bd\u30c3\u30c9\u306e\u524d\u306b\u66f8\u304b\u308c\u308b\u30b3\u30e1\u30f3\u30c8\u3068\u30e1\u30bd\u30c3\u30c9\u306e\u4e2d\u306b\u66f8\u304b\u308c\u308b\u30b3\u30e1\u30f3\u30c8&#8212;<\/a>\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 2013 \u4f75\u8a2d\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7 \u300c\u958b\u767a\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u306b\u304a\u3051\u308b\u7523\u5b66\u306e\u554f\u984c\u5171\u6709\u3068\u9023\u643a\u5f37\u5316\u300d\u4e88\u7a3f\u96c6\uff0c \u30aa\u30f3\u30e9\u30a4\u30f3\uff0c Sept. 2013.<\/li>\n\n\n\n<li>\u5c0f\u7b20\u539f \u79c0\u4eba\uff0c\u4f50\u3005\u6728 \u611b\u7f8e\uff0c\u963f\u842c \u88d5\u4e45\uff0c&#8220;\u6570\u7406\u8a08\u753b\u30e2\u30c7\u30eb\u306b\u57fa\u3065\u3044\u305f\u52b9\u679c\u7684\u306a\u30c6\u30b9\u30c8\u9078\u629e\u624b\u6cd5\u306e\u63d0\u6848\u3068\u5b9f\u8df5\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 2013 \u8ad6\u6587\u96c6\uff0c \u30aa\u30f3\u30e9\u30a4\u30f3\uff0cJuly 2013.<\/li>\n\n\n\n<li>\u4e95\u4e0a \u614e\u4e5f\uff0c\u963f\u842c \u88d5\u4e45\uff0c&#8220;0-1 \u8a08\u753b\u30e2\u30c7\u30eb\u3092\u7528\u3044\u305f\u30b3\u30fc\u30c9\u30ec\u30d3\u30e5\u30fc\u8a08\u753b\u6cd5\u306e\u6709\u52b9\u6027\u306b\u95a2\u3059\u308b\u5b9f\u8a3c\u7684\u8003\u5bdf\uff0c&#8221;\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 2013 \u8ad6\u6587\u96c6\uff0c \u30aa\u30f3\u30e9\u30a4\u30f3\uff0cJuly 2013.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u4e95\u4e0a\u614e\u4e5f\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u6570\u7406\u8a08\u753b\u30e2\u30c7\u30eb\u3092\u7528\u3044\u305f\u30b3\u30fc\u30c9\u30ec\u30d3\u30e5\u30fc\u8a08\u753b\u306b\u5bfe\u3059\u308b\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u306e\u52b9\u679c\u306b\u3064\u3044\u3066\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.113, no.159, SS2013-31, pp.109&#8211;114, July 2013.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u5c0f\u898f\u6a21\u30d7\u30ed\u30b0\u30e9\u30e0\u306b\u304a\u3051\u308b\u30b3\u30e1\u30f3\u30c8\u884c\u6570\u3068\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u6027\u306e\u95a2\u4fc2\u306b\u95a2\u3059\u308b\u8abf\u67fb \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.113, no.24, SS2013-12, pp.67&#8211;72, May 2013.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u62db\u5f85\u8b1b\u6f14<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30e1\u30c8\u30ea\u30af\u30b9\u3068\u305d\u306e\u95a2\u9023\u5206\u91ce\u306e\u7814\u7a76\u52d5\u5411\u306b\u3064\u3044\u3066\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.113, no.227, KBSE2013-56, p.19, Nov. 2013.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2012 \u5e74\u5ea6\uff08\u5e73\u62102<\/strong>4<strong>\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>Myrizki Sandhi Yudha, Ryohei Asano and Hirohisa Aman, &#8220;A Feature Analysis of Co-changed Code Clone by Using Clone Metrics,&#8221; IEICE Trans. Fundamentals, vol.E95-A, no.9, pp.1498&#8211;1500, Sept. 2012.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.jstage.jst.go.jp\/article\/jssst\/29\/3\/29_3_115\/_pdf\" target=\"_blank\">\u8ad6\u7406\u7684\u5236\u7d04\u6761\u4ef6\u4ed8\u304d 0-1 \u8a08\u753b\u30e2\u30c7\u30eb\u3092\u7528\u3044\u305f\u91cd\u70b9\u30ec\u30d3\u30e5\u30fc\u8a08\u753b\u6cd5<\/a>\uff0c&#8221; \u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cvol.29, no.3, pp.115-120, Aug. 2012.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>Hirohisa Aman, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6462681\" target=\"_blank\">An Empirical Analysis of the Impact of Comment Statements on Fault-Proneness of Small-Size Module<\/a>,&#8221; Proc. 19th Asia-Pacific Software Engineering Conference (APSEC 2012), pp.362&#8211;367, Dec. 2012. [<a href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/apsec2012.pdf\">accepted version<\/a>]<\/li>\n\n\n\n<li>Hirohisa Aman, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/www.computer.org\/csdl\/proceedings\/iwesep\/2012\/4866\/00\/4866a003-abs.html\" target=\"_blank\">An Empirical Analysis on Fault-proneness of Well-Commented Modules<\/a>,&#8221; Proc. 4th International Workshop on Empirical Software Engineering in Practice (IWESEP 2012), pp.3-9, Oct. 2012. [<a href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/iwesep2012.pdf\">accepted version<\/a>] <span class=\"has-inline-color has-vivid-red-color\">\u3010<strong>Best Presentation Award \u53d7\u8cde<\/strong>\u3011<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff0c\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>\u4e95\u4e0a\u614e\u4e5f\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;<a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=pages_view_main&amp;active_action=repository_view_main_item_detail&amp;item_id=89263&amp;item_no=1&amp;page_id=13&amp;block_id=8\">0-1\u8a08\u753b\u30e2\u30c7\u30eb\u3092\u5229\u7528\u3057\u305f\u30e1\u30bd\u30c3\u30c9\u5358\u4f4d\u3067\u306e\u30b3\u30fc\u30c9\u30ec\u30d3\u30e5\u30fc\u8a08\u753b\u306b\u3064\u3044\u3066<\/a>\uff0c&#8221; \u30a6\u30a4\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72013\u30fb\u30a4\u30f3\u30fb\u90a3\u9808\u8ad6\u6587\u96c6\uff0cpp.27&#8211;28, Jan.2013.<\/li>\n\n\n\n<li>\u67cf \u7950\u592a\u90ce\uff0c\u5927\u5e73\u96c5\u96c4\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;<a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=pages_view_main&amp;active_action=repository_view_main_item_detail&amp;item_id=89259&amp;item_no=1&amp;page_id=13&amp;block_id=8\">0-1\u6574\u6570\u8a08\u753b\u6cd5\u3092\u7528\u3044\u305f\u4e0d\u5177\u5408\u4fee\u6b63\u30bf\u30b9\u30af\u306e\u5272\u5f53\u652f\u63f4<\/a>\uff0c&#8221; \u30a6\u30a4\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72013\u30fb\u30a4\u30f3\u30fb\u90a3\u9808\u8ad6\u6587\u96c6\uff0cpp.19&#8211;20, Jan.2013.<\/li>\n\n\n\n<li>\u6d45\u91ce\u907c\u5e73\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u6539\u5909\u306b\u304a\u3051\u308b\u30b3\u30e1\u30f3\u30c8\u6587\u306e\u76f8\u5bfe\u7684\u306a\u5909\u5316\u91cf\u306b\u7740\u76ee\u3057\u305f\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u6027\u306e\u5206\u6790\uff0c&#8221; \u9d5c\u6797 \u5c1a\u9756\uff0c\u4e80\u4e95 \u9756\u9ad8 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XIX\uff0cpp.45&#8211;50, \u8fd1\u4ee3\u79d1\u5b66\u793e\uff0c2012\uff0e<\/li>\n\n\n\n<li>\u8863\u7c31 \u5b8f\u548c\uff0c\u91ce\u4e2d \u8aa0\uff0c\u963f\u842c \u88d5\u4e45\uff0c&#8220;<a href=\"https:\/\/ipsj.ixsq.nii.ac.jp\/ej\/?action=repository_opensearch&amp;index_id=6852\">\u5de5\u7a0b\u5225\u306e\u6b20\u9665\u57cb\u3081\u8fbc\u307f\u4ef6\u6570\u306e\u4e88\u6e2c<\/a>\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02012\u8ad6\u6587\u96c6, \u30aa\u30f3\u30e9\u30a4\u30f3\uff0c Aug. 2012.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30b3\u30e1\u30f3\u30c8\u306e\u591a\u3044\u30d7\u30ed\u30b0\u30e9\u30e0\u3068\u30d5\u30a9\u30fc\u30eb\u30c8\u3068\u306e\u95a2\u4fc2\u306b\u3064\u3044\u3066 &#8212;\u30b3\u30fc\u30c9\u884c\u6570\u3068\u306e\u76f8\u95a2\u3092\u5229\u7528\u3057\u305f\u30b3\u30e1\u30f3\u30c8\u91cf\u8a55\u4fa1\u3068\u5b9f\u8a3c\u7684\u5206\u6790&#8212;\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02012\u4f75\u8a2d\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7 (WS-3) \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u306e\u5b9f\u8df5\u3068\u8ab2\u984c\uff0c\u30aa\u30f3\u30e9\u30a4\u30f3, Aug.2013.<\/li>\n\n\n\n<li>\u6d45\u91ce\u907c\u5e73\uff0c\u963f\u842c \u88d5\u4e45\uff0c&#8220;\u30bd\u30fc\u30b9\u30d5\u30a1\u30a4\u30eb\u306b\u304a\u3051\u308b\u30b3\u30e1\u30f3\u30c8\u306e\u5897\u52a0\u50be\u5411\u306b\u7740\u76ee\u3057\u305f\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u4e88\u6e2c\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 2012 \u8ad6\u6587\u96c6\uff0c \u30aa\u30f3\u30e9\u30a4\u30f3\uff0cJune 2012.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u6d45\u91ce\u907c\u5e73\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30b3\u30e1\u30f3\u30c8\u8a18\u8ff0\u91cf\u306e\u5897\u52a0\u50be\u5411\u3068\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u3068\u306e\u95a2\u4fc2\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u5206\u6790\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.112, no.164, SS2012-28, pp.109&#8211;114, July 2012. <span class=\"has-inline-color has-vivid-red-color\">\u3010<strong>\u7814\u7a76\u5968\u52b1\u8cde \u53d7\u8cde<\/strong>\u3011<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<!--nextpage-->\n\n\n<div class=\"breadcrumbs align  wp-block-bcn-breadcrumb-trail has-text-color has-background\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">\n\t<span><\/span>\n\t<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u5ba4.\" href=\"https:\/\/se.cite.ehime-u.ac.jp\/jp\" class=\"home\" aria-current=\"page\"><span property=\"name\">\u30db\u30fc\u30e0<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2011 \u5e74\u5ea6\uff08\u5e73\u6210<\/strong>23<strong>\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/se.cite.ehime-u.ac.jp\/~aman\/pdf\/IPSJ-JNL5302017.pdf\" target=\"_blank\">\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306b\u304a\u3051\u308b\u30b3\u30e1\u30f3\u30c8\u8a18\u8ff0\u304a\u3088\u3073\u30b3\u30e1\u30f3\u30c8\u30a2\u30a6\u30c8\u3068\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u3068\u306e\u95a2\u4fc2\u306b\u95a2\u3059\u308b\u5b9a\u91cf\u5206\u6790<\/a>\uff0c&#8221; \u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u8ad6\u6587\u8a8c\uff0cvol.53, no.2, pp.612&#8211;621, Feb. 2012.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c\u91ce\u4e2d\u8aa0\uff0c\u6c34\u91ce\u4fee\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.jstage.jst.go.jp\/article\/jssst\/28\/3\/28_3_3_12\/_pdf\" target=\"_blank\">\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30e1\u30c8\u30ea\u30af\u30b9\u3068\u30c7\u30fc\u30bf\u5206\u6790\u306e\u57fa\u790e<\/a>\uff0c&#8221; \u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cvol.28, no.3, pp.12&#8211;28, Aug. 2011.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>Myrizki Sandhi YUDHA, Ryohei ASANO and Hirohisa AMAN, &#8220;An Analysis of Co-changeable Code Clone by using Clone Metrics,&#8221; Supplemental Proc. IEEE 22nd International Symposium on Software Reliability Engineering (ISSRE 2011), CD-ROM, Dec. 2011.<\/li>\n\n\n\n<li>Hirohisa Aman, &#8220;<a rel=\"noreferrer noopener\" href=\"http:\/\/www.computer.org\/csdl\/proceedings\/iwsm-mensura\/2011\/4565\/00\/4565a038-abs.html\" target=\"_blank\">A Proposal of NHPP-Based Method for Predicting Code Change in Open Source Development<\/a>,&#8221; Proc. The Joint Conference of the 21st International Workshop on Software Measurement and the 6th International Conference on Software Process and Product Measurement (IWSM-MENSURA 2011), pp.38&#8211;47, Nov. 2011.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff0c\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>\u963f\u842c\u88d5\u4e45\uff0c&#8220;Fault-prone \u30e2\u30b8\u30e5\u30fc\u30eb\u4e88\u6e2c\u306b\u5bfe\u3059\u308b\u30b3\u30e1\u30f3\u30c8\u8a18\u8ff0\u91cf\u306e\u52b9\u679c\u306b\u95a2\u3059\u308b\u8003\u5bdf\uff0c&#8221; \u30a6\u30a4\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72012\u30fb\u30a4\u30f3\u30fb\u7435\u7436\u6e56\u8ad6\u6587\u96c6\uff0cpp.45&#8211;46, Jan.2012.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u8ad6\u7406\u7684\u5236\u7d04\u6761\u4ef6\u4ed8 0-1 \u8a08\u753b\u554f\u984c\u3068\u3057\u3066\u5b9a\u5f0f\u5316\u3057\u305f\u91cd\u70b9\u30ec\u30d3\u30e5\u30fc\u5bfe\u8c61\u30e2\u30b8\u30e5\u30fc\u30eb\u306e\u9078\u629e\uff0c&#8221; \u9580\u7530\u6681\u4eba\uff0c\u4e0a\u91ce\u79c0\u525b \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XVIII, pp.197&#8211;206, \u8fd1\u4ee3\u79d1\u5b66\u793e, 2011. <strong><span class=\"has-inline-color has-vivid-red-color\">\u3010\u8ca2\u732e\u8cde\u53d7\u8cde\u3011<\/span><\/strong><\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;Fault-Prone\u30e2\u30b8\u30e5\u30fc\u30eb\u4e88\u6e2c\u3092\u5229\u7528\u3057\u305f\u52b9\u7387\u7684\u306a \u30ec\u30d3\u30e5\u30fc\u8a08\u753b\u53ca\u3073\u30c6\u30b9\u30c8\u8a08\u753b\u306b\u3064\u3044\u3066\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02011\u4f75\u8a2d\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7 \uff0c\u30aa\u30f3\u30e9\u30a4\u30f3, Sept.2011.<\/li>\n\n\n\n<li>Myrizki Sandhi Yudha\uff0c\u963f\u842c \u88d5\u4e45\uff0c&#8220;\u30b3\u30fc\u30c9\u30af\u30ed\u30fc\u30f3\u306e\u9577\u3055\u3068\u540c\u6642\u5909\u66f4\u306e\u8d77\u3053\u308a\u3084\u3059\u3055\u3068\u306e\u95a2\u4fc2\u306b\u95a2\u3059\u308b\u89e3\u6790\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30fb\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 2011 \u8ad6\u6587\u96c6\uff0c \u30aa\u30f3\u30e9\u30a4\u30f3\uff0cJune 2011.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u6d45\u91ce\u907c\u5e73\uff0cMyrizki Sandhi Yudha\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30b3\u30fc\u30c9\u9593\u306e\u4f9d\u5b58\u95a2\u4fc2\u53ca\u3073\u30af\u30ed\u30fc\u30f3\u95a2\u4fc2\u306b\u7740\u76ee\u3057\u305f\u30b3\u30fc\u30c9\u5909\u66f4\u306e\u751f\u5b58\u6642\u9593\u89e3\u6790\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.111, no.211, pp.67&#8211;72, Sept. 2011.<\/li>\n\n\n\n<li>\u6d45\u91ce\u907c\u5e73\uff0cMyrizki Sandhi Yudha\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306b\u304a\u3051\u308b\u30b3\u30fc\u30c9\u5909\u66f4\u4e8b\u8c61\u306e\u30e2\u30c7\u30eb\u5316\u306b\u95a2\u3059\u308b\u8003\u5bdf\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.111, no.169, pp.19&#8211;24, July 2011.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2010 \u5e74\u5ea6\uff08\u5e73\u6210<\/strong>22<strong>\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#ff0000\" class=\"has-inline-color\">\u8ad6\u6587\u8a8c<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li>\u963f\u842c\u88d5\u4e45\uff0c\u5c71\u4e0b\u88d5\u4e5f\uff0c&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.jstage.jst.go.jp\/article\/jssst\/27\/4\/27_4_4_240\/_pdf\" target=\"_blank\">\u6574\u6570\u8a08\u753b\u6cd5\u3092\u7528\u3044\u305f\u91cd\u70b9\u30ec\u30d3\u30e5\u30fc\u5bfe\u8c61\u30e2\u30b8\u30e5\u30fc\u30eb\u306e\u9078\u629e<\/a>\uff0c&#8221; \u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\uff0cvol.27, no.4, pp.240&#8211;245, Nov. 2010.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>Hirohisa AMAN and Takahiro OHKOCHI, &#8220;An Application of Growth Curve Model for Predicting Code Churn in Open Source Development,&#8221; Proc. Ninth Joint Conference on Knowledge-Based Software Engineering (JCKBSE&#8217;10), pp.46&#8211;54, Aug.2010.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff0c\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u5909\u66f4\u4e8b\u8c61\u306e\u6570\u7406\u30e2\u30c7\u30eb\u5316\u3068\u4e88\u6e2c\u306b\u3064\u3044\u3066\uff0c&#8221; \u30a6\u30a4\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72011\u30fb\u30a4\u30f3\u30fb\u4fee\u5584\u5bfa\u8ad6\u6587\u96c6\uff0cpp.109&#8211;110, Jan.2011.<\/li>\n\n\n\n<li>\u66fd\u6211\u90e8\u5e78\u53f8\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u7d44\u5408\u305b\u30c6\u30b9\u30c8\u306e\u8a55\u4fa1\u3068\u76f4\u4ea4\u8868\u3092\u7528\u3044\u305f\u7db2\u7f85\u7387\u6539\u5584\u6cd5\uff0c&#8221; \u9ad8\u7530\u771e\u543e\uff0c\u798f\u7530\u6d69\u7ae0 \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XVII, pp.143&#8211;148, \u8fd1\u4ee3\u79d1\u5b66\u793e, 2010.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306b\u304a\u3051\u308b\u30b3\u30e1\u30f3\u30c8\u6587\u8a18\u8ff0\u3068\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u7387\u3068\u306e\u95a2\u4fc2\u306b\u95a2\u3059\u308b\u5b9f\u8a3c\u7684\u8003\u5bdf\uff0c&#8221; \u677e\u4e0b\u8aa0\uff0c\u7d2b\u5408\u6cbb \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u6700\u524d\u7dda2010, pp.97&#8211;100, \u8fd1\u4ee3\u79d1\u5b66\u793e, 2010.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30d5\u30a9\u30fc\u30eb\u30c8\u6f5c\u5728\u4e88\u6e2c\u306b\u5411\u3051\u305f\u30b3\u30e1\u30f3\u30c8\u6587\u8a18\u8ff0\u53ca\u3073\u30b3\u30e1\u30f3\u30c8\u30a2\u30a6\u30c8\u306e\u5b9a\u91cf\u5206\u6790\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.110, no.305, pp.13&#8211;18, Nov. 2010.<\/li>\n\n\n\n<li>\u5927\u6cb3\u5185\u5d69\u535a\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u30b3\u30fc\u30c9\u5909\u66f4\u91cf\u306e\u6570\u7406\u30e2\u30c7\u30eb\u5316\u3068\u4e88\u6e2c\u306b\u3064\u3044\u3066\u3000\uff5e \u6210\u9577\u66f2\u7dda\u30e2\u30c7\u30eb\u3092\u7528\u3044\u305f\u5b9f\u9a13 \uff5e\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.110, no.158, pp.25&#8211;30, July 2010.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2009 \u5e74\u5ea6\uff08\u5e73\u6210<\/strong>21<strong>\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>Hirohisa AMAN, &#8220;Test Case Generation Focusing on Method-Invocation Pairs Based on Orthogonal Array,&#8221; Proc. 1st International Symposium on Tangible Software Engineering Education, pp.103-108, Oct. 2009.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff0c\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>\u5c71\u4e0b\u88d5\u4e5f\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u52b9\u679c\u7684\u306a\u30ec\u30d3\u30e5\u30fc\u306e\u305f\u3081\u306e\u30e2\u30b8\u30e5\u30fc\u30eb\u9078\u629e\u306b\u3064\u3044\u3066 &#8212;\u30ca\u30c3\u30d7\u30b5\u30c3\u30af\u554f\u984c\u3068\u3057\u3066\u306e\u5b9a\u5f0f\u5316&#8212;\uff0c&#8221; \u30a6\u30a4\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72010\u30fb\u30a4\u30f3\u30fb\u5009\u6577\u8ad6\u6587\u96c6\uff0cpp.103&#8211;104, Jan.2010.<\/li>\n\n\n\n<li>\u66fd\u6211\u90e8\u5e78\u53f8\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u76f4\u4ea4\u8868\u3092\u7528\u3044\u305f\u5358\u4f53\u30c6\u30b9\u30c8\u5411\u3051\u30c6\u30b9\u30c8\u30b1\u30fc\u30b9\u306e\u52b9\u7387\u7684\u751f\u6210\u6cd5\uff0c&#8221; \u4e2d\u5cf6\u9707\uff0c\u9df2\u5d0e\u5f18\u5b9c \u7de8 \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XVI, pp.167&#8211;174, \u8fd1\u4ee3\u79d1\u5b66\u793e, 2009.<\/li>\n\n\n\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u7ba1\u7406\u306b\u5bfe\u3059\u308b\u6210\u9577\u66f2\u7dda\u30e2\u30c7\u30eb\u306e\u9069\u7528\u306b\u3064\u3044\u3066\uff0c&#8221; \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0 2009 \u4f75\u8a2d\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7, \u30aa\u30f3\u30e9\u30a4\u30f3\uff0cSept. 2009.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u30b3\u30fc\u30c9\u5909\u66f4\u91cf\u306e\u63a8\u79fb\u4e88\u6e2c\u306b\u95a2\u3059\u308b\u8003\u5bdf\u3000\uff5e \u6210\u9577\u66f2\u7dda\u30e2\u30c7\u30eb\u306e\u9069\u7528 \uff5e\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.109, no.343, pp.73&#8211;78, Dec. 2009.<\/li>\n\n\n\n<li>\u8c37\u85e4\u5553\u592a\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u30b3\u30fc\u30c9\u306e\u8ffd\u52a0\u53ca\u3073\u4fee\u6b63\u306e\u5206\u5e03\u306b\u95a2\u3059\u308b\u8003\u5bdf\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.109, no.150, pp.19&#8211;24, July 2009.<\/li>\n\n\n\n<li>\u5927\u6cb3\u5185\u5d69\u535a\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u30d0\u30b0\u6570\u898b\u7a4d\u308a\u306b\u5411\u3051\u305f\u7ba1\u7406\u56f3\u3068\u6210\u9577\u66f2\u7dda\u30e2\u30c7\u30eb\u306e\u5229\u7528\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.109, no.41, pp.61&#8211;66, May 2009.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<!--nextpage-->\n\n\n<div class=\"breadcrumbs align  wp-block-bcn-breadcrumb-trail has-text-color has-background\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">\n\t<span><\/span>\n\t<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u5ba4.\" href=\"https:\/\/se.cite.ehime-u.ac.jp\/jp\" class=\"home\" aria-current=\"page\"><span property=\"name\">\u30db\u30fc\u30e0<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div>\n\n\n\n<h4 class=\"wp-block-heading has-luminous-vivid-amber-background-color has-background\"><strong>2008 \u5e74\u5ea6\uff08\u5e73\u6210<\/strong>20<strong>\u5e74\u5ea6\uff09<\/strong><\/h4>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span class=\"tadv-color\" style=\"color: #0000ff;\">\u56fd\u969b\u4f1a\u8b70<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>Hirohisa AMAN and Hirokazu OKAZAKI, &#8220;Impact of Comment Statements on Code Stability in Open Source Development,&#8221; Knowledge-Based Software Engineering, M.Virvou and T.Nakamura (Eds.), pp.415&#8211;419, IOS Press, 2008.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong><span style=\"color:#00a000\" class=\"has-inline-color\">\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff0c\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0<\/span><\/strong><sup>\uff08\u67fb\u8aad\u3042\u308a\uff09<\/sup>\n<ol class=\"wp-block-list\">\n<li><span class=\"has-inline-color has-vivid-red-color\"><\/span>\u6a0b\u4e0a\u559c\u4fe1\uff0c\u85e4\u5c3e\u6607\u5e73\uff0c\u963f\u842c\u88d5\u4e45\uff0c\u9ad8\u6a4b\u5bdb\uff0c\u9ad8\u677e\u96c4\u4e09\uff0c &#8220;\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u30c6\u30b9\u30c8\u751f\u6210\u30c4\u30fc\u30eb\u3092\u7528\u3044\u305f\u7d44\u8fbc\u307f\u30b7\u30b9\u30c6\u30e0\u306b\u5bfe\u3059\u308b\u30c6\u30b9\u30c8\u751f\u6210\u6cd5\uff0c&#8221; \u7d44\u8fbc\u307f\u30b7\u30b9\u30c6\u30e0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02008\u8ad6\u6587\u96c6\uff0cpp.151&#8211;158, 2008.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul reversed class=\"wp-block-list\">\n<li><strong>\u7814\u7a76\u4f1a<\/strong>\n<ol class=\"wp-block-list\">\n<li>\u9ed2\u5ddd\u8015\u5e73\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u958b\u767a\u306b\u304a\u3051\u308b\u30d0\u30b0\u5831\u544a\u7d2f\u7a4d\u6570\u306e\u6210\u9577\u66f2\u7dda\u30e2\u30c7\u30eb\u3092\u7528\u3044\u305f\u5206\u6790\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.108, no.326, pp.61&#8211;66, Nov. 2008.<\/li>\n\n\n\n<li>\u4e45\u4fdd\u7530\u5bdb\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306b\u304a\u3051\u308b\u30b3\u30fc\u30c9\u306e\u5b89\u5b9a\u6027\u4e88\u6e2c\u306b\u5411\u3051\u305f\u30b4\u30f3\u30da\u30eb\u30c4\u66f2\u7dda\u306e\u9069\u7528\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.108, no.157, pp.1&#8211;6, July 2008.<\/li>\n\n\n\n<li>\u8c37\u85e4\u572d\u592a\uff0c\u963f\u842c\u88d5\u4e45\uff0c&#8220;\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u306e\u5909\u66f4\u91cf\u306b\u304a\u3051\u308bPareto\u539f\u7406\u3068\u305d\u308c\u3092\u7528\u3044\u305f\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306e\u5b9a\u5e38\u72b6\u614b\u89e3\u6790\uff0c&#8221; \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u6280\u8853\u7814\u7a76\u5831\u544a\uff0cvol.108, no.65, pp.53&#8211;58, May 2008.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>2026 \u5e74 2025 \u5e74 2024 \u5e74<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":9,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-155","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-json\/wp\/v2\/pages\/155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-json\/wp\/v2\/comments?post=155"}],"version-history":[{"count":155,"href":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-json\/wp\/v2\/pages\/155\/revisions"}],"predecessor-version":[{"id":12043,"href":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-json\/wp\/v2\/pages\/155\/revisions\/12043"}],"up":[{"embeddable":true,"href":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-json\/wp\/v2\/pages\/9"}],"wp:attachment":[{"href":"https:\/\/se.cite.ehime-u.ac.jp\/jp\/wp-json\/wp\/v2\/media?parent=155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}