default search action
Minoru Kawahara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Quantitative Investigation of Trends in Confusing Variable Pairs Through Commits: Do Confusing Variable Pairs Survive? EASE 2024: 90-99 - [c45]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Multi-attribute and Multi-label Deep Metric Learning via Pair-based and Proxy-based Losses. ICICT 2024: 57-63 - [c44]Yahiro Mori, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Application of Program Slicing and CodeBERT to Distill Variables With Inappropriate Names. SERA 2024: 356-361 - 2023
- [j14]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Multi proxy anchor family loss for several types of gradients. Comput. Vis. Image Underst. 229: 103654 (2023) - [j13]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An automated detection of confusing variable pairs with highly similar compound names in Java and Python programs. Empir. Softw. Eng. 28(5): 108 (2023) - [j12]Kosuke Ohara, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Comparative Study of Data Collection Periods for Just-In-Time Defect Prediction Using the Automatic Machine Learning Method. IEICE Trans. Inf. Syst. 106(2): 166-169 (2023) - [c43]Yuki Fushihara, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Trend Analysis of Test Smells in Python Test Code Over Commit History. SEAA 2023: 310-314 - [c42]Shinnosuke Irie, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Comparative Study of Hybrid Fault-Prone Module Prediction Models Using Association Rule and Random Forest. WSSE 2023: 33-38 - 2022
- [c41]Tenma Kitai, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-Grained Repository-Based Co-Evolution Analysis. SEAA 2022: 120-124 - 2021
- [c40]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Investigation of Compound Variable Names Toward Automated Detection of Confusing Variable Pairs. ASE Workshops 2021: 133-137 - [c39]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Large-Scale Investigation of Local Variable Names in Java Programs: Is Longer Name Better for Broader Scope Variable? QUATIC 2021: 489-500 - [c38]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Significance of Emphasized Features for Good Representation on Deep Metric Learning. SERA 2021: 27-32 - [i1]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Multi Proxy Anchor Loss and Effectiveness of Deep Metric Learning Performance Metrics. CoRR abs/2110.03997 (2021) - 2020
- [j11]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Empirical study of abnormality in local variables and its application to fault-prone Java method analysis. J. Softw. Evol. Process. 32(4) (2020) - [c37]Masanao Asato, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization. APSEC 2020: 475-479 - [c36]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Comparative Study of Vectorization-Based Static Test Case Prioritization Methods. SEAA 2020: 80-88
2010 – 2019
- 2019
- [c35]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Empirical Study of Fault Introduction Focusing on the Similarity among Local Variable Names. QuASoQ@APSEC 2019: 3-11 - [c34]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Survival Analysis-Based Prioritization of Code Checker Warning: A Case Study Using PMD. BCD (selected papers) 2019: 69-83 - [c33]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Scalable Laplacian Regularized Least Squares Classification on Anchor Graph. BCD 2019: 71-76 - 2018
- [j10]Akito Sunouchi, Hirohisa Aman, Minoru Kawahara:
A Quantitative Analysis on Relationship between an Early-Closed Bug and Its Amount of Clues: A Case Study of Apache Ant. IEICE Trans. Inf. Syst. 101-D(10): 2523-2525 (2018) - [j9]Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application toF ault-ProneP rogram Analysis. Int. J. Networked Distributed Comput. 6(3): 118-132 (2018) - [c32]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Doc2Vec-Based Assessment of Comments and Its Application to Change-Prone Method Analysis. APSEC 2018: 643-647 - [c31]Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Fault-Prone Source File Analysis Focusing on the Contribution Entropy in Open Source Development. BCD 2018: 7-14 - [c30]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
Empirical Analysis of Coding Standard Violation Focusing on Its Coverage and Importance. COMPSAC (1) 2018: 837-838 - [c29]Keiichiro Tashima, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Fault-Prone Java Method Analysis Focusing on Pair of Local Variables with Confusing Names. SEAA 2018: 154-158 - [c28]Hirohisa Aman, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara:
A Topic Model and Test History-Based Test Case Recommendation Method for Regression Testing. ICST Workshops 2018: 392-397 - 2017
- [j8]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
Change-Prone Java Method Prediction by Focusing on Individual Differences in Comment Density. IEICE Trans. Inf. Syst. 100-D(5): 1128-1131 (2017) - [j7]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File. Int. J. Networked Distributed Comput. 5(4): 211-220 (2017) - [c27]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
Investigation of Coding Violations Focusing on Authorships of Source Files. ACIT/CSII/BCD 2017: 248-253 - [c26]Sho Suzuki, Hirohisa Aman, Minoru Kawahara:
Empirical Study of Fault-Prone Method's Name and Implementation: Analysis on Three Prefixes-Get, Set and Be. ACIT/CSII/BCD 2017: 260-265 - [c25]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Empirical Analysis of Words in Comments Written for Java Methods. SEAA 2017: 375-379 - [c24]Sho Suzuki, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Application of the PageRank Algorithm to Commit Evaluation on Git Repository. SEAA 2017: 380-383 - [c23]Hirohisa Aman, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara:
A Test Case Recommendation Method Based on Morphological Analysis, Clustering and the Mahalanobis-Taguchi Method. ICST Workshops 2017: 29-35 - [c22]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Empirical Study of Abnormalities in Local Variables of Change-Prone Java Methods. ISSRE Workshops 2017: 214-221 - [c21]Hirohisa Aman, Aji Ery Burhandenny, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Health Index of Open Source Projects Focusing on Pareto Distribution of Developer's Contribution. IWESEP 2017: 29-34 - [c20]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Survival Analysis of Source Files Modified by New Developers. PROFES 2017: 80-88 - 2016
- [c19]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Local Variables with Compound Names and Comments as Signs of Fault-Prone Java Methods. QuASoQ/TDA@APSEC 2016: 4-11 - [c18]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
Examination of Coding Violations Focusing on Their Change Patterns over Releases. APSEC 2016: 121-128 - [c17]Hirohisa Aman, Yuta Tanaka, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara:
Application of Mahalanobis-Taguchi Method and 0-1 Programming Method to Cost-Effective Regression Testing. SEAA 2016: 240-244 - 2015
- [j6]Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki, Minoru Kawahara:
Lines of Comments as a Noteworthy Metric for Analyzing Fault-Proneness in Methods. IEICE Trans. Inf. Syst. 98-D(12): 2218-2228 (2015) - [c16]Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki, Minoru Kawahara:
Empirical Analysis of Change-Proneness in Methods Having Local Variables with Long Names and Comments. ESEM 2015: 50-53 - 2014
- [c15]Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki, Minoru Kawahara:
Empirical Analysis of Fault-Proneness in Methods by Focusing on their Comment Lines. APSEC (2) 2014: 51-56 - [c14]Hirohisa Aman, Takashi Sasaki, Sousuke Amasaki, Minoru Kawahara:
Empirical analysis of comments and fault-proneness in methods: can comments point to faulty methods? ESEM 2014: 63:1 - [c13]Hirohisa Aman, Akiko Yamashita, Takashi Sasaki, Minoru Kawahara:
Multistage Growth Model for Code Change Events in Open Source Software Development: An Example Using Development of Nagios. EUROMICRO-SEAA 2014: 207-212 - 2013
- [j5]Kouji Hirata, Minoru Kawahara:
Group replica caching scheme for optical grid networks. Opt. Switch. Netw. 10(3): 223-232 (2013) - 2012
- [j4]Kouji Hirata, Minoru Kawahara:
Contention resolution considering multicast traffic in optically burst-switched WDM networks. Photonic Netw. Commun. 23(2): 157-165 (2012) - 2011
- [j3]Kouji Hirata, Minoru Kawahara:
Parallel and multi-wavelength downloading in optical grid networks. Photonic Netw. Commun. 22(3): 245-253 (2011) - [c12]Kouji Hirata, Minoru Kawahara:
Replica caching scheme according to status of neighboring nodes in optical grid networks. NOF 2011: 112-116
2000 – 2009
- 2008
- [j2]Keiichi Endo, Minoru Kawahara, Yutaka Takahashi:
Encoding for secure computations in distributed interactive real-time applications. Comput. Commun. 31(9): 1679-1686 (2008) - 2007
- [j1]Makoto Nakatsuji, Minoru Kawahara, Hiroyuki Kawano:
The architecture and performance of topic-driven P2P resource discovery system. Syst. Comput. Jpn. 38(5): 69-79 (2007) - 2006
- [c11]Keiichi Endo, Minoru Kawahara, Yutaka Takahashi:
A proposal of encoded computations for distributed massively multiplayer online services. Advances in Computer Entertainment Technology 2006: 72 - 2005
- [c10]Keiichi Endo, Minoru Kawahara, Yutaka Takahashi:
A Distributed Architecture for Massively Multiplayer Online Services with Peer-to-Peer Support. Net-Con 2005: 147-158 - 2003
- [c9]Kikuko Kawase, Minoru Kawahara, Takeshi Iwashita, Hiroyuki Kawano, Masanori Kawazawa:
Parallel Vector Computing Technique for Discovering Communities on the Very Large Scale Web Graph. DaWaK 2003: 151-160 - 2002
- [c8]Hiroyuki Kawano, Minoru Kawahara:
Extended Association Algorithm Based on ROC Analysis for Visual Information Navigator. Progress in Discovery Science 2002: 640-649 - 2001
- [c7]Minoru Kawahara, Hiroyuki Kawano:
Mining Association Algorithm with Threshold based on ROC Analysis. HICSS 2001 - 2000
- [c6]Hiroyuki Kawano, Minoru Kawahara:
Mondou: Information Navigator with Visual Interface. DaWaK 2000: 425-430 - [c5]Minoru Kawahara, Hiroyuki Kawano:
An Application of Text Mining: Bibliographic Navigator Powered by Extended Association Rules. HICSS 2000
1990 – 1999
- 1999
- [c4]Minoru Kawahara, Hiroyuki Kawano:
Performance Evaluation and Visualization of Association Rules using Receiver Operating Characteristic Graph. DANTE 1999: 74-83 - [c3]Minoru Kawahara, Hiroyuki Kawano:
Mining Association Algorithm Based on ROC Convex Hull Method in Bibliographic Navigation System. Discovery Science 1999: 333-334 - [c2]Minoru Kawahara, Hiroyuki Kawano:
ROC Performance Evaluation of Web-Based Bibliographic Navigator using Extended Association Rules. ICSC 1999: 216-225 - 1996
- [c1]Minoru Kawahara, Hiroyuki Kawano, Toshiharu Hasegawa:
Attribute Oriented Mining Algorithm with Entropy-based Cost Functions. CODAS 1996: 265-268
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint