Zobrazeno 1 - 10
of 301
pro vyhledávání: '"Hironori Washizaki"'
Publikováno v:
IEEE Access, Vol 12, Pp 78193-78218 (2024)
As production system estates become larger and more complex, ensuring stability through traditional monitoring approaches becomes more challenging. Rule-based monitoring is common in industrial settings, but it has limitations. These include the diff
Externí odkaz:
https://doaj.org/article/0641c06c4ec8426eaeed9cd31789369a
Autor:
Yuki Noyori, Hironori Washizaki, Yoshiaki Fukazawa, Keishi Ooshima, Hideyuki Kanuka, Shuhei Nojiri
Publikováno v:
Frontiers in Computer Science, Vol 5 (2023)
Bug reports typically contain detailed descriptions of failures, hints at the location of the corresponding defects, and discussions. Developers usually resolve bugs using comments in descriptions and discussions. The time to fix a bug varies greatly
Externí odkaz:
https://doaj.org/article/5bb665ae2fae4637b448c3f5db3b815d
Publikováno v:
Cybersecurity, Vol 5, Iss 1, Pp 1-17 (2022)
Abstract During the initial stages of software development, the primary goal is to define precise and detailed requirements without concern for software realizations. Security constraints should be introduced then and must be based on the semantic as
Externí odkaz:
https://doaj.org/article/e042b543471e45ab989694ab236a7e1a
Autor:
Haruna Isotani, Hironori Washizaki, Yoshiaki Fukazawa, Tsutomu Nomoto, Saori Ouji, Shinobu Saito
Publikováno v:
Frontiers in Computer Science, Vol 4 (2023)
Industrial software maintenance is critical but burdensome. Activities such as detecting duplicate bug reports are often performed manually. Herein an automated duplicate bug report detection system improves maintenance efficiency using vectorization
Externí odkaz:
https://doaj.org/article/790c5b3c32b547428ccbba2d69628838
Publikováno v:
Education Sciences, Vol 13, Iss 5, p 433 (2023)
The Computer Science industry suffers from a vivid gender gap. To understand this gap, Computational Thinking skills in Computer Science education are analyzed by binary gender roles using block-based programming languages such as Scratch since they
Externí odkaz:
https://doaj.org/article/dd1a149230404f3cac60dc149a7350f8
Publikováno v:
PeerJ Computer Science, Vol 8, p e720 (2022)
Combinatorial interaction testing, which is a technique to verify a system with numerous input parameters, employs a mathematical object called a covering array as a test input. This technique generates a limited number of test cases while guaranteei
Externí odkaz:
https://doaj.org/article/2436c26cf60049a4a3f71a20a2f17f8d
Autor:
Yohei Aoki, Chimaki Shimura, Hironori Washizaki, Takanobu Kobori, Yoshiaki Fukazawa, Katsutoshi Shintani, Takuto Nonomura
Publikováno v:
IEEE Access, Vol 7, Pp 89766-89776 (2019)
GQM+Strategies aligns business goals and strategies to help organizations achieve business objectives. Using the initial set of goals and strategies, GQM+Strategies creates a grid, through which the goals and strategies are linked throughout an organ
Externí odkaz:
https://doaj.org/article/1f686866800e41a2a0b2b3a5aa4c61e8
Publikováno v:
Applied System Innovation, Vol 5, Iss 3, p 53 (2022)
Programming education for beginners often employs online judges. Although this helps improve coding skills, students may not obtain sufficient educational effects if the assignment is too difficult. Instead of presenting a model answer to an assignme
Externí odkaz:
https://doaj.org/article/fe175cdd3fe74695a14e9f38210b6277
Autor:
Ryo Ishizuka, Hironori Washizaki, Naohiko Tsuda, Yoshiaki Fukazawa, Saori Ouji, Shinobu Saito, Yukako Iimura
Publikováno v:
Applied Sciences, Vol 12, Iss 7, p 3222 (2022)
Background: In most software projects, new members must comprehend the features already implemented since they are usually assigned during the project period. They often read software documents (e.g., flowcharts and data models), but such documents t
Externí odkaz:
https://doaj.org/article/f047bea9795f45259d7d01cc34757158
Autor:
Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka
Publikováno v:
Applied Sciences, Vol 12, Iss 7, p 3400 (2022)
Vulnerability and attack information must be collected to assess the severity of vulnerabilities and prioritize countermeasures against cyberattacks quickly and accurately. Common Vulnerabilities and Exposures is a dictionary that lists vulnerabiliti
Externí odkaz:
https://doaj.org/article/abd3a442060f474996bc547964d28fba