Naoya Nitta

According to our database1, Naoya Nitta authored at least 27 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Formal Web Services Architecture Model for Changing PUSH/PULL Data Transfer.
Proceedings of the Formal Aspects of Component Software - 19th International Conference, 2023

2022
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022

Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

2021
A Method to Comprehend Feature Dependencies Based on Semi-Static Structures.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2021

Towards a Dynamic Visualization of Complex Reverse-Engineered Object Collaboration.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2019
Cutting Java Expressions into Lines for Detecting their Evaluation at Runtime.
Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis, 2019

2018
Revealing Implicit Correspondence between Bytecode Instructions and Expressions Determined by Java Compilers.
Proceedings of the 25th Australasian Software Engineering Conference, 2018

2017
Experiences of debugger-based architecture comprehension.
Proceedings of the 18th IEEE/ACIS International Conference on Software Engineering, 2017

Constraints Based Approach to Interactive Feature Location.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

Analyzing Execution Traces of Failed Programs for Materializing Chain of Infection.
Proceedings of the 5th International Conference on Applied Computing and Information Technology, 2017

2016
Composite Refactoring for Decoupling Multiple Classes.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

A formal approach for guiding architecture design with data constraints.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
A Case Study of Dynamic Analysis to Locate Unexpected Side Effects Inside of Frameworks.
Int. J. Softw. Innov., 2015

Delta extraction: An abstraction technique to comprehend why two objects could be related.
Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution, 2015

2014
Toward a dynamic analysis technique to locate framework misuses that cause unexpected side effects.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

A dynamic analysis technique to extract symptoms that suggest side effects in framework applications.
Proceedings of the Symposium on Applied Computing, 2014

Identifying Mandatory Code for Framework Use via a Single Application Trace.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

2013
A Feature Model of Framework Applications.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

A Method for Early Detection of Mismatches between Framework Architecture and Execution Scenarios.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Change of Students' Motivation in an Introductory Programming Course for Non-computing Majors.
Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, 2012

Work in progress: Analysis of the relationship between teaching contents and motivation in programming education.
Proceedings of the IEEE Frontiers in Education Conference, 2012

2006
A Method for Creating Teaching Materials of Practical Object-Oriented Methods Education.
Proceedings of the Learning by Effective Utilization of Technologies: Facilitating Intercultural Understanding, 2006

2005
An Efficient Method for Optimal Probe Deployment of Distributed IDS.
IEICE Trans. Inf. Syst., 2005

Policy Controlled System and Its Model Checking.
IEICE Trans. Inf. Syst., 2005

2003
An Extension of Pushdown System and Its Model Checking Method.
Proceedings of the CONCUR 2003, 2003

2001
Security verification of programs with stack inspection.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

An efficient security verification method for programs with stack inspection.
Proceedings of the CCS 2001, 2001


  Loading...