- BiG Project
Hui Song, Yingfei Xiong, Franck Chauvel, Gang Huang, Zhenjiang Hu, Hong Mei, Generating Synchronization Engines between Running Systems and their Model-Based Views, Proceedings of the 4th Workshop on Models@run.time, held at the ACM/IEEE 12th International Conference on Model Driven Engineering Languages and Systems (MoDELS’09), Denver, USA, October 5th, 2009. pp.11-20.
Yingfei Xiong, Zhenjiang Hu, Haiyan Zhao, Hui Song, Masato Takeichi, Hong Mei, Supporting Automatic Model Inconsistency Fixing, The 7th joint meeting of the European Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE) (ESEC/FSE 2009), Amsterdam, The Netherlands, August 24-28 2009.
- PerQAS Project
Adrian Klein, Fuyuki Ishikawa, Shinichi Honiden, Efficient QoS-aware Service Composition with a Probabilistic Service Selection Policy, The 8th International Conference on Service-Oriented Computing (ICSOC 2010), December 2010 (to appear)
Fuyuki Ishikawa, Consistent Integration of Selection and Replacement Methods under Different Expectations in Service Composition and Partner Management Life-Cycle, The 8th International Conference on Service-Oriented Computing (ICSOC 2010) (short paper), December 2010 (to appear)
- SSE Project
T. Okubo, K. Taguchi, N. Yoshioka, “Misuse cases + Assets + Security Goals”, appeared in Proceedings of International Workshop on Software Security Process (SSP) ’09, Vancouver (2009)
Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki: “Misuse Patterns”, The Forth International Workshop “Dependability Aspects on Data Warehousing and Mining applications” (DAWAM), Fukuoka, Japan, March, 2009.
- MVSQR Project
Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato, Akira Osada, and Kenji Kaijiri. Improving Reliability of Spectrum Analysis for Software Quality Requirements using TCM. IEICE Transactions on Information and Systems, Vol. E93-D, No. 4, Apr. 2010.
Shunichi Suzuki, Tomonori Sato, Masaaki Tanigawa, Akira Osada,Haruhiko Kaiya, Kenji Kaijiri. A Systematic Method for Generating Quality Requirements Spectrum. ACM SAC 2009, Poster, Mar. 2009, Honolulu,Hawaii, USA.
- XAC Project
Remi Sharrock, Amin Cherbal, Levent Gurgen, Thierry Monteil, Shinichi Honiden: “Autonomic thinking for sensing devices”, The Sixth International Conference on Autonomic and Autonomous Systems (ICAS’10), Cancun, Mexico. March 7-13, 2010.
Shunichiro Suenaga, Nobukazu Yoshioka, Shinichi Honiden: “Group Migration by Mobile Agents in Wireless Sensor Networks” Oxford Computer Journal
- LIMT-RE Project
Modeling, Analyzing and Weaving Legal Interpretations in Goal-Oriented Requirements Engineering Fuyuki Ishikawa, Rihoko Inoue, Shinichi Honiden The 2nd International Workshop on Requirements Engineering and Law (RELAW’09) at RE 2009 2009年9月
Fuyuki Ishikawa, Rihoko Kawai (Inoue), Shinichi Honiden, Modeling and Analyzing Legal Interpretations for/by Requirements Engineering Approaches, The 6th International Workshop on Juris-informatics (JURISIN 2012), pp.143-156, November 2012
- FMET Project
J. Davies, J. Gibbons, M. Hinchey, K. Taguchi, “Preface:Special Issue on Formal Methods Education and Training”, appeared in ACM SIGCSE Bulletin inroads, July (2009)
H. Nishihara, K. Shinozaki, K. Hayamizu, T. Aoki, K. Taguchi, F. Kumeno, “Model Checking Education for Software Engineers in Japan”, appeared in ACM SIGCSE Bulletin inroads, July (2009)
Kenji Taguchi, Jin Song Dong: Formally specifying and verifying mobile agents – model checking mobility: The MobiOZ approach in International Journal of Agent-Oriented Software Engineering, Vol. 2:4 pp.449-474 (2008).
Nakagawa, K. Taguchi, S. Honiden: Constructing Formal Specifications from Requirements Specifications based on Model Transformation in Journal of IPSJ Vol.49 No.7 pp.2304-2318 (2008).
- Top SE Project
C. Artho, K. Taguchi, Y. Tahara, S. Honiden, Y. Tanabe, “Teaching Software Model Checking” to appear in Formal Methods in Computer Science Education (FORMED) ’08, Budapest,2008.
K. Taguchi, Y. Tahara, “Curriculum Design and Methodologies for Security Requirements Analysis”, Progress in Informatics, No. 5, pp. 19-34,(2008)