Kenji Kaijiri

According to our database1, Kenji Kaijiri authored at least 33 papers between 1996 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Automatic Method of Generating a Web Prototype Employing Live Interactive Widget to Validate Functional Usability Requirements.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015

2014
Method mining in experimental software engineering.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Security Requirements Analysis Using Knowledge in CAPEC.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

2013
Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment.
Int. J. Secur. Softw. Eng., 2013

Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
Validating Quality Requirements Considerations in a Design Document using Spectrum Analysis.
Proceedings of the Knowledge-Based Software Engineering, 2012

Facilitating Business Improvement by Information Systems using Model Transformation and Metrics.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

Model Transformation Patterns for Introducing Suitable Information Systems.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

2011
Spectrum Analysis for Software Quality Requirements Using Analyses Records.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Improving Reliability of Spectrum Analysis for Software Quality Requirements Using TCM.
IEICE Trans. Inf. Syst., 2010

Towards an Integrated Support for Traceability of Quality Requirements using Software Spectrum Analysis.
Proceedings of the ICSOFT 2010, 2010

Enhancing Domain Knowledge for Requirements Elicitation with Web Mining.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

2009
A systematic method for generating quality requirements spectrum.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009

2008
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems.
IEICE Trans. Inf. Syst., 2008

Proposing metrics of difficulty of domain knowledge using usecase diagrams.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Toward quality requirements analysis based on domain specific quality spectrum.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Adapting a fault prediction model to allow inter languagereuse.
Proceedings of the 4th International Workshop on Predictor Models in Software Engineering, 2008

So/M: A Requirements Definition Tool Using Characteristics of Existing Similar Systems.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2006
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

Reliable Authentication Method by Using Cellular Phones in WBT.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

A Supporting Tool to Identify both Satisfied Requirements and Tolerant Threats for a Java Mobile Code Application.
Proceedings of the ICEIS 2006, 2006

2005
Practical and Incremental Maintenance of Software Resources in Consumer Electronics Products.
IEICE Trans. Inf. Syst., 2005

Modeling Software Characteristics and Their Correlations in A Specific Domain by Comparing Existing Similar Systems.
Proceedings of the Fifth International Conference on Quality Software (QSIC 2005), 2005

2004
A Method to Develop Feasible Requirements for Java Mobile Code Application.
IEICE Trans. Inf. Syst., 2004

Foreword.
IEICE Trans. Inf. Syst., 2004

FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their Development.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
Security Policy Checker and Generator for Java Mobile Codes.
Proceedings of the Engineering Information Systems in the Internet Context, 2002

1999
Conducting Requirements Evolution by Replacing Components in the Current System.
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999

1996
Novice program recognition/diagnosis system based on goal/plan concepts.
Syst. Comput. Jpn., 1996


  Loading...