


default search action
Akito Monden
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c119]Kensei Hamamoto, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Akito Monden, Koji Toda, Keitaro Nakasai, Kenichi Matsumoto:
An Empirical Study of the Impact of Test Strategies on Online Optimization for Ensemble-Learning Defect Prediction. ICSME 2024: 642-647 - [c118]Masato Nakao, Kensei Hamamoto, Masateru Tsunoda, Amjed Tahir, Koji Toda, Akito Monden, Keitaro Nakasai, Kenichi Matsumoto:
On Applying Bandit Algorithm to Fault Localization Techniques. ISSRE (Workshops) 2024: 111-112 - [c117]Hikaru Tomita, Mariko Sasakura, Kinari Nishiura, Hiroki Inayoshi, Akito Monden:
Porting a Python Application to the Web Using Django: A Case Study of an Archaeological Image Processing System. SERA 2024: 199-205 - [c116]Toru Nakamichi, Kinari Nishiura, Mariko Sasakura, Akito Monden:
An Empirical Study on Ambiguous Words in Software Requirements Specifications of Local Government and Library Systems. SERA 2024: 206-211 - [c115]Daiki Yokoyama, Kinari Nishiura, Akito Monden:
Identifying Security Bugs in Issue Reports: Comparison of BERT, N-gram IDF and ChatGPT. SERA 2024: 328-333 - [c114]Kinari Nishiura
, Shuto Misawa
, Akito Monden
:
Analyzing Class Usage in JavaScript Programs. WSSE 2024: 139-143 - [c113]Nikolay Fedorov
, Haruaki Tamada
, Hiroki Inayoshi
, Akito Monden
:
Comparison of Similarity Functions for n-gram Software Birthmarks. WSSE 2024: 169-176 - [i8]Nikolay Fedorov, Yuta Yamasaki, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
Building Defect Prediction Models by Online Learning Considering Defect Overlooking. CoRR abs/2404.11033 (2024) - [i7]Yukasa Murakami, Yuta Yamasaki, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
The Effect of Defect (Re) Prediction on Software Testing. CoRR abs/2404.11040 (2024) - [i6]Kensei Hamamoto, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Akito Monden, Koji Toda, Keitaro Nakasai, Kenichi Matsumoto:
An Empirical Study of the Impact of Test Strategies on Online Optimization for Ensemble-Learning Defect Prediction. CoRR abs/2409.06264 (2024) - [i5]Masato Nakao, Kensei Hamamoto, Masateru Tsunoda, Amjed Tahir, Koji Toda, Akito Monden, Keitaro Nakasai, Kenichi Matsumoto:
On Applying Bandit Algorithm to Fault Localization Techniques. CoRR abs/2409.06268 (2024) - [i4]Buntaro Hiraki, Kensei Hamamoto, Ami Kimura, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Akito Monden, Keitaro Nakasai:
Personalization of Code Readability Evaluation Based on LLM Using Collaborative Filtering. CoRR abs/2411.10583 (2024) - 2023
- [j35]Parisa Supitayakul
, Zeynep Yücel
, Akito Monden
:
Artificial Neural Network Based Audio Reinforcement for Computer Assisted Rote Learning. IEEE Access 11: 39466-39483 (2023) - [c112]Natchanon Manatphaiboon
, Shogo Hamachi, Zeynep Yücel, Pattara Leelaprute, Akito Monden:
Experiment Design and Verification for Assessing the Acquisition of Strategic Planning Ability. IIAI-AAI-Winter 2023: 121-128 - [c111]Parisa Supitayakul, Rika Kuramitsu, Zeynep Yücel, Akito Monden, Koichi Takeuchi:
Dependence of Perception of Vocabulary Difficulty on Contexture. IIAI-AAI-Winter 2023: 129-134 - [c110]Natsu Nishimura, Zeynep Yücel, Akito Monden:
Using a Personality-Aware Recommendation System for Comparing Inventory Performances. IIAI-AAI-Winter 2023: 228-235 - [c109]Yuta Yamasaki, Nikolay Fedorov, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
Software Defect Prediction by Online Learning Considering Defect Overlooking. ISSREW 2023: 43-44 - [c108]Hayato Yasunaga, Mariko Sasakura
, Akito Monden:
Subject Experiments with a Learning Support System for Grover's Algorithm. IV 2023: 125-130 - [c107]Kazuki Matsumoto, Kinari Nishiura, Mariko Sasakura, Akito Monden:
Analysis of Programming Performance Based on 2-grams of Keystrokes and Mouse Operations. SERA 2023: 301-306 - [c106]Kinari Nishiura
, Kaito Ikeda
, Mariko Sasakura
, Akito Monden
:
Exploring Behavioral Trustworthiness of Github Developers. WSSE 2023: 92-95 - [i3]Yuta Yamasaki, Nikolay Fedorov, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
Software Defect Prediction by Online Learning Considering Defect Overlooking. CoRR abs/2308.13582 (2023) - [i2]Ryoto Shima, Masateru Tsunoda, Yukasa Murakami, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
Selecting Source Code Generation Tools Based on Bandit Algorithms. CoRR abs/2312.12813 (2023) - 2022
- [j34]Maohua Gan
, Zeynep Yücel, Akito Monden
:
Improvement and Evaluation of Data Consistency Metric CIL for Software Engineering Data Sets. IEEE Access 10: 70053-70067 (2022) - [j33]Maohua Gan
, Zeynep Yücel, Akito Monden
:
Neg/pos-Normalized Accuracy Measures for Software Defect Prediction. IEEE Access 10: 134580-134591 (2022) - [c105]Hiroshi Demanou, Akito Monden, Masateru Tsunoda:
A Dynamic Model Selection Approach to Mitigate the Change of Balance Problem in Cross-Version Bug Prediction. QuASoQ/SEED@APSEC 2022: 4-9 - [c104]Takuto Kudo, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto:
Preliminary Analysis of Review Method Selection Based on Bandit Algorithms. APSEC 2022: 492-496 - [c103]Chigusa Ikeda, Parisa Supitayakul, Zeynep Yücel, Akito Monden:
Developing a web application for RBSC-based solution of the subset selection problem. IIAI-AAI-Winter 2022: 57-61 - [c102]Terumi Kasahara, Parisa Supitayakul, Zeynep Yücel, Akito Monden:
Examination of the relation between affective content of images and gaze behavior. IIAI-AAI-Winter 2022: 101-107 - [c101]Shogo Hamachi, Parisa Supitayakul, Zeynep Yücel, Akito Monden:
Investigation of the relation between task engagement and eye gaze. IIAI-AAI-Winter 2022: 163-167 - [c100]Parisa Supitayakul, Zeynep Yücel, Misato Nose, Akito Monden:
Investigating the effect of various types of audio reinforcement on memory retention. IIAI-AAI 2022: 250-255 - [c99]Kohei Furuya, Zeynep Yücel, Parisa Supitayakul, Akito Monden:
A computationally efficient approach for solving RBSC-based formulation of the subset selection problem. IIAI-AAI 2022: 341-347 - [c98]Mariko Sasakura
, Syouta Toda, Akito Monden:
Gaze Analysis in Spot the Difference. IV 2022: 161-166 - [c97]Takeru Tabo, Takuto Kudo, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Akito Monden:
Clone Detection Method Selection Based on Bandit Algorithm: a Preliminary Analysis. IWSC 2022: 53-54 - [c96]Masateru Tsunoda, Akito Monden, Koji Toda, Amjed Tahir, Kwabena Ebo Bennin, Keitaro Nakasai, Masataka Nagura, Kenichi Matsumoto:
Using Bandit Algorithms for Selecting Feature Reduction Techniques in Software Defect Prediction. MSR 2022: 670-681 - 2021
- [j32]Florian Pellegrin, Zeynep Yücel
, Akito Monden, Pattara Leelaprute:
Task estimation for software company employees based on computer interaction logs. Empir. Softw. Eng. 26(5): 98 (2021) - [j31]Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Analysis of Work Efficiency and Quality of Software Maintenance Using Cross-Company Dataset. IEICE Trans. Inf. Syst. 104-D(1): 76-90 (2021) - [j30]Kenichi Ono, Masateru Tsunoda, Akito Monden, Kenichi Matsumoto:
Influence of Outliers on Estimation Accuracy of Software Development Effort. IEICE Trans. Inf. Syst. 104-D(1): 91-105 (2021) - [j29]Teruki Hayakawa, Masateru Tsunoda, Koji Toda, Keitaro Nakasai, Amjed Tahir, Kwabena Ebo Bennin, Akito Monden, Kenichi Matsumoto:
A Novel Approach to Address External Validity Issues in Fault Prediction Using Bandit Algorithms. IEICE Trans. Inf. Syst. 104-D(2): 327-331 (2021) - [c95]Takuya Asano, Masateru Tsunoda, Koji Toda, Amjed Tahir, Kwabena Ebo Bennin, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto:
Using Bandit Algorithms for Project Selection in Cross-Project Defect Prediction. ICSME 2021: 649-653 - [c94]Kohei Furuya, Zeynep Yücel, Parisa Supitayakul, Akito Monden, Pattara Leelaprute:
Exploring the limits of an RBSC-based approach in solving the subset selection problem. IIAI-AAI-Winter 2021: 1-11 - [c93]Kazuma Ohta, Zeynep Yücel, Parisa Supitayakul, Akito Monden, Pattara Leelaprute:
On the interplay between vocal production effect and learning content types in e-learning settings. IIAI-AAI-Winter 2021: 303-312 - [c92]Hiroto Nakahara, Akito Monden, Zeynep Yücel:
A Simulation Model of Software Quality Assurance in the Software Lifecycle. SNPD 2021: 236-241 - [c91]Takumi Kanehira, Akito Monden, Zeynep Yücel:
Association Metrics Between Two Continuous Variables for Software Project Data. SNPD 2021: 242-247 - [c90]Toshihiro Nakamura, Akito Monden, Mariko Sasakura
, Hidetake Uwano:
Effectiveness of Explaining a Program to Others in Finding Its Bugs. SNPD 2021: 248-253 - [c89]Wilson Chukwu Emmanuel, Akito Monden:
Human Resource Analysis Based on Used Libraries in Eclipse Projects on GitHub. SNPD 2021: 254-257 - 2020
- [j28]Zeynep Yücel
, Parisa Supitayakul, Akito Monden
, Pattara Leelaprute:
An Algorithm for Automatic Collation of Vocabulary Decks Based on Word Frequency. IEICE Trans. Inf. Syst. 103-D(8): 1865-1874 (2020) - [j27]Maohua Gan, Zeynep Yücel
, Akito Monden, Kentaro Sasaki:
Empirical Evaluation of Mimic Software Project Data Sets for Software Effort Estimation. IEICE Trans. Inf. Syst. 103-D(10): 2094-2103 (2020) - [j26]Zeynep Yücel
, Serina Koyama, Akito Monden
, Mariko Sasakura
:
Estimating Level of Engagement from Ocular Landmarks. Int. J. Hum. Comput. Interact. 36(16): 1527-1539 (2020) - [c88]Parisa Supitayakul, Zeynep Yücel
, Akito Monden, Pattara Leelaprute:
Investigating effect of stimulus modality on recollection rate in e-learning systems. IIAI-AAI 2020: 138-141
2010 – 2019
- 2019
- [j25]Kwabena Ebo Bennin
, Jacky W. Keung
, Akito Monden
:
On the relative value of data resampling approaches for software defect prediction. Empir. Softw. Eng. 24(2): 602-636 (2019) - [c87]Yasumasa Oomori, Hidekuni Tsukamoto, Hideo Nagumo, Yasuhiro Takemura, Kouki Iida, Akito Monden
, Ken-ichi Matsumoto:
Algorithmic Expressions for Assessing Algorithmic Thinking Ability of Elementary School Children. FIE 2019: 1-8 - [c86]Pimwalun Witchawanitchanun, Zeynep Yücel
, Akito Monden
, Pattara Leelaprute:
Effect of Grasping Uniformity on Estimation of Grasping Region from Gaze Data. HAI 2019: 265-267 - [c85]Adrien Gregorj, Zeynep Yücel
, Sunao Hara, Akito Monden
, Masahiro Shiomi:
A Signal Processing Perspective on Human Gait: Decoupling Walking Oscillations and Gestures. ICR 2019: 75-85 - [c84]Parisa Supitayakul, Zeynep Yücel
, Akito Monden
, Pattara Leelaprute:
Assessing the Effect of Varying Word Classes on Behavioral Variables in Technology Mediated Vocabulary Learning. IIAI-AAI 2019: 226-229 - [c83]Kazuya Tanaka, Akito Monden
, Zeynep Yücel
:
Prediction of Software Defects Using Automated Machine Learning. SNPD 2019: 490-494 - [c82]Toshiki Seto, Akito Monden
, Zeynep Yücel
, Yuichiro Kanzaki:
On Preventing Symbolic Execution Attacks by Low Cost Obfuscation. SNPD 2019: 495-500 - [c81]Kento Korenaga, Akito Monden
, Zeynep Yücel
:
Data Smoothing for Software Effort Estimation. SNPD 2019: 501-506 - [i1]Akira Inokuchi, Yusuf Sulistyo Nugroho
, Fumiaki Konishi, Hideaki Hata, Akito Monden, Kenichi Matsumoto:
From Academia to Software Development: Publication Citations in Source Code Comments. CoRR abs/1910.06932 (2019) - 2018
- [j24]Takashi Watanabe, Akito Monden
, Zeynep Yücel
, Yasutaka Kamei, Shuji Morisaki:
Cross-Validation-Based Association Rule Prioritization Metric for Software Defect Characterization. IEICE Trans. Inf. Syst. 101-D(9): 2269-2278 (2018) - [j23]Kwabena Ebo Bennin
, Jacky Keung
, Passakorn Phannachitta, Akito Monden
, Solomon Mensah
:
MAHAKIL: Diversity Based Oversampling Approach to Alleviate the Class Imbalance Issue in Software Defect Prediction. IEEE Trans. Software Eng. 44(6): 534-550 (2018) - [c80]Maohua Gan, Kentaro Sasaki, Akito Monden, Zeynep Yücel:
Generation of Mimic Software Project Data Sets for Software Engineering Research. QuASoQ@APSEC 2018: 38-43 - [c79]Seiji Fukui, Akito Monden
, Zeynep Yücel
:
Kurtosis and Skewness Adjustment for Software Effort Estimation. APSEC 2018: 504-511 - [c78]Naoki Kinoshita, Akito Monden
, Masateru Tsunoda, Zeynep Yücel
:
Predictability Classification for Software Effort Estimation. BCD 2018: 43-48 - [c77]Hidekazu Saito, Akito Monden
, Zeynep Yücel
:
Extended Association Rule Mining with Correlation Functions. BCD 2018: 79-84 - [c76]Kwabena Ebo Bennin
, Jacky Keung
, Passakorn Phannachitta, Akito Monden
, Solomon Mensah:
MAHAKIL: diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction. ICSE 2018: 699 - 2017
- [j22]Passakorn Phannachitta, Jacky Keung
, Akito Monden
, Kenichi Matsumoto:
A stability assessment of solution adaptation techniques for analogy-based software effort estimation. Empir. Softw. Eng. 22(1): 474-504 (2017) - [j21]Pawin Suthipornopas, Pattara Leelaprute, Akito Monden
, Hidetake Uwano, Yasutaka Kamei, Naoyasu Ubayashi
, Kenji Araki, Kingo Yamada, Ken-ichi Matsumoto:
Industry Application of Software Development Task Measurement System: TaskPit. IEICE Trans. Inf. Syst. 100-D(3): 462-472 (2017) - [j20]Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada
, Akito Monden
:
Scaling Up Software Birthmarks Using Fuzzy Hashing. Int. J. Softw. Innov. 5(3): 89-102 (2017) - [j19]Akito Monden
, Masateru Tsunoda, Mike Barker, Kenichi Matsumoto:
Examining Software Engineering Beliefs about System Testing Defects. IT Prof. 19(2): 58-64 (2017) - [j18]Masateru Tsunoda, Akito Monden
, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Benchmarking IT operations cost based on working time and unit cost. Sci. Comput. Program. 135: 75-87 (2017) - [c75]Kwabena Ebo Bennin
, Jacky Keung
, Akito Monden
:
Impact of the Distribution Parameter of Data Sampling Approaches on Software Defect Prediction Models. APSEC 2017: 630-635 - [c74]Kwabena Ebo Bennin
, Jacky Keung
, Akito Monden
, Passakorn Phannachitta, Solomon Mensah:
The Significant Effects of Data Sampling Approaches on Software Defect Prioritization and Classification. ESEM 2017: 364-373 - [c73]Hidekuni Tsukamoto, Yasumasa Oomori, Hideo Nagumo, Yasuhiro Takemura, Akito Monden
, Ken-ichi Matsumoto:
Evaluating algorithmic thinking ability of primary schoolchildren who learn computer programming. FIE 2017: 1-8 - 2016
- [j17]Passakorn Phannachitta, Akito Monden
, Jacky W. Keung
, Ken-ichi Matsumoto:
LSA-X: Exploiting Productivity Factors in Linear Size Adaptation for Analogy-Based Software Effort Estimation. IEICE Trans. Inf. Syst. 99-D(1): 151-162 (2016) - [j16]Saya Onoue, Hideaki Hata
, Akito Monden
, Ken-ichi Matsumoto:
Investigating and Projecting Population Structures in Open Source Software Projects: A Case Study of Projects in GitHub. IEICE Trans. Inf. Syst. 99-D(5): 1304-1315 (2016) - [j15]Nachai Limsettho, Hideaki Hata
, Akito Monden
, Kenichi Matsumoto:
Unsupervised Bug Report Categorization Using Clustering and Labeling Algorithm. Int. J. Softw. Eng. Knowl. Eng. 26(7): 1027-1054 (2016) - [c72]Kenichi Ono, Masateru Tsunoda, Akito Monden
, Kenichi Matsumoto:
Influence of outliers on analogy based software development effort estimation. ICIS 2016: 1-6 - [c71]Masateru Tsunoda, Akito Monden
, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Analysis of information system operation cost based on working time and unit cost. ICIS 2016: 1-6 - [c70]Takehiro Tsuzaki, Teruaki Yamamoto, Haruaki Tamada
, Akito Monden
:
A fuzzy hashing technique for large scale software birthmarks. ICIS 2016: 1-6 - [c69]Takashi Watanabe, Akito Monden
, Yasutaka Kamei, Shuji Morisaki:
Identifying recurring association rules in software defect prediction. ICIS 2016: 1-6 - [c68]Passakorn Phannachitta, Jacky W. Keung
, Kwabena Ebo Bennin
, Akito Monden
, Kenichi Matsumoto:
Filter-INC: Handling Effort-Inconsistency in Software Effort Estimation Datasets. APSEC 2016: 185-192 - [c67]Kwabena Ebo Bennin
, Jacky W. Keung
, Akito Monden
, Yasutaka Kamei, Naoyasu Ubayashi
:
Investigating the Effects of Balanced Training and Testing Datasets on Effort-Aware Fault Prediction Models. COMPSAC 2016: 154-163 - [c66]Hidekuni Tsukamoto, Yasuhiro Takemura, Yasumasa Oomori, Isamu Ikeda, Hideo Nagumo, Akito Monden
, Ken-ichi Matsumoto:
Textual vs. visual programming languages in programming education for primary schoolchildren. FIE 2016: 1-7 - [c65]Kwabena Ebo Bennin
, Koji Toda, Yasutaka Kamei, Jacky Keung
, Akito Monden
, Naoyasu Ubayashi:
Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction Models. QRS 2016: 214-221 - 2015
- [c64]Masateru Tsunoda, Akito Monden
, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Benchmarking Software Maintenance Based on Working Time. ACIT-CSI 2015: 20-27 - [c63]Yuichiro Kanzaki, Clark D. Thomborson, Akito Monden
, Christian S. Collberg:
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program. PPREW@ACSAC 2015: 8:1-8:9 - [c62]Passakorn Phannachitta, Akito Monden, Jacky W. Keung, Ken-ichi Matsumoto:
Case consistency: a necessary data quality property for software engineering data sets. EASE 2015: 19:1-19:10 - [c61]Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Isamu Ikeda, Akito Monden
, Ken-ichi Matsumoto:
Programming education for primary school children using a textual programming language. FIE 2015: 1-7 - [c60]Yuichiro Kanzaki, Akito Monden
, Christian S. Collberg:
Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model. SPRO@ICSE 2015: 31-37 - [c59]Shin Fujiwara, Hideaki Hata
, Akito Monden
, Ken-ichi Matsumoto:
Bug report recommendation for code inspection. SWAN@SANER 2015: 9-12 - 2014
- [c58]Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Akito Monden
, Ken-ichi Matsumoto:
Prediction of the change of learners' motivation in programming education for non-computing majors. FIE 2014: 1-7 - [c57]Takao Nakagawa, Yasutaka Kamei, Hidetake Uwano, Akito Monden
, Ken-ichi Matsumoto, Daniel M. Germán:
Quantifying programmers' mental workload during program comprehension based on cerebral blood flow measurement: a controlled experiment. ICSE Companion 2014: 448-451 - [c56]Nachai Limsettho, Hideaki Hata
, Akito Monden
, Ken-ichi Matsumoto:
Automatic Unsupervised Bug Report Categorization. IWESEP 2014: 7-12 - [c55]Akinori Ihara, Akito Monden
, Ken-ichi Matsumoto:
Industry Questions about Open Source Software in Business: Research Directions and Potential Answers. IWESEP 2014: 55-59 - [c54]Passakorn Phannachitta, Jacky Keung
, Akito Monden
, Ken-ichi Matsumoto:
Scaling up analogy-based software effort estimation: a comparison of multiple hadoop implementation schemes. InnoSWDev@SIGSOFT FSE 2014: 65-72 - 2013
- [j14]Akito Monden
, Takuma Hayashi, Shoji Shinoda, Kumiko Shirai, Junichi Yoshida, Mike Barker, Ken-ichi Matsumoto:
Assessing the Cost Effectiveness of Fault Prediction in Acceptance Testing. IEEE Trans. Software Eng. 39(10): 1345-1357 (2013) - [c53]John Boaz Lee, Akinori Ihara, Akito Monden
, Ken-ichi Matsumoto:
Patch Reviewer Recommendation in OSS Projects. APSEC (2) 2013: 1-6 - [c52]Passakorn Phannachitta, Jacky Keung
, Akito Monden
, Ken-ichi Matsumoto:
Improving Analogy-Based Software Cost Estimation through Probabilistic-Based Similarity Measures. APSEC (1) 2013: 541-546 - [c51]Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Akito Monden
, Ken-ichi Matsumoto:
The effects of teaching material remediation with ARCS-strategies for programming education. FIE 2013: 717-723 - [c50]Hironori Hayashi, Akinori Ihara, Akito Monden
, Ken-ichi Matsumoto:
Why is collaboration needed in OSS projects? a case study of eclipse project. SSE@ESEC/FSE 2013: 17-20 - [c49]Tetsuya Ohdo, Haruaki Tamada
, Yuichiro Kanzaki, Akito Monden
:
An Instruction Folding Method to Prevent Reverse Engineering in Java Platform. SNPD 2013: 517-522 - 2012
- [j13]Akito Monden
, Tomoko Matsumura, Mike Barker, Koji Torii, Victor R. Basili:
Customizing GQM Models for Software Project Monitoring. IEICE Trans. Inf. Syst. 95-D(9): 2169-2182 (2012) - [c48]Akinori Ihara, Yasutaka Kamei, Akito Monden
, Masao Ohira, Jacky Wai Keung
, Naoyasu Ubayashi
, Ken-ichi Matsumoto:
An Investigation on Software Bug-Fix Prediction for Open Source Software Projects - A Case Study on the Eclipse Project. APSEC Workshops 2012: 112-119 - [c47]Masateru Tsunoda, Akito Monden
, Jacky Wai Keung
, Ken-ichi Matsumoto:
Incorporating Expert Judgment into Regression Models of Software Effort Estimation. APSEC 2012: 374-379 - [c46]Akito Monden
, Jacky Wai Keung
, Shuji Morisaki, Yasutaka Kamei, Ken-ichi Matsumoto:
A Heuristic Rule Reduction Approach to Software Fault-proneness Prediction. APSEC 2012: 838-847 - [c45]Masateru Tsunoda, Sousuke Amasaki, Akito Monden
:
Handling categorical variables in effort estimation. ESEM 2012: 99-102 - [c44]Masateru Tsunoda, Akito Monden
, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Analysis of Attributes Relating to Custom Software Price. IWESEP 2012: 16-22 - [c43]Yasuhiro Saito, Akito Monden
, Ken-ichi Matsumoto:
Evaluation of Non Functional Requirements in a Request for Proposal (RFP). IWSM/Mensura 2012: 106-111 - [c42]Satoshi Uchigaki, Shinji Uchida, Koji Toda, Akito Monden
:
An Ensemble Approach of Simple Regression Models to Cross-Project Fault Prediction. SNPD 2012: 476-481 - 2011
- [j12]Yoshiki Mitani, Hiroyuki Yoshikawa, Seishiro Tsuruho, Akito Monden
, Mike Barker, Ken-ichi Matsumoto:
An Empirical Study of Development Visualization for Procurement by in-Process Measurement during Integration and Testing. Int. J. Softw. Eng. Knowl. Eng. 21(3): 367-388 (2011) - [j11]Akito Monden
, Satoshi Okahara, Yuki Manabe, Ken-ichi Matsumoto:
Guilty or Not Guilty: Using Clone Metrics to Determine Open Source Licensing Violations. IEEE Softw. 28(2): 42-47 (2011) - [c41]Masateru Tsunoda, Akito Monden
, Jun-ichiro Shibata, Ken-ichi Matsumoto:
Empirical Evaluation of Cost Overrun Prediction with Imbalance Data. ACIS-ICIS 2011: 415-420 - [c40]Yasutaka Kamei, Hiroki Sato, Akito Monden
, Shinji Kawaguchi, Hidetake Uwano, Masataka Nagura, Ken-ichi Matsumoto, Naoyasu Ubayashi:
An Empirical Study of Fault Prediction with Code Clone Metrics. IWSM/Mensura 2011: 55-61 - [c39]Masateru Tsunoda, Akito Monden
, Tomoko Matsumura, Ken-ichi Matsumoto:
A Model of Project Supervision for Process Correction and Improvement. IWSM/Mensura 2011: 151-159 - [c38]Hidetake Uwano, Yasutaka Kamei, Akito Monden
, Ken-ichi Matsumoto:
An Analysis of Cost-Overrun Projects Using Financial Data and Software Metrics. IWSM/Mensura 2011: 227-232 - [c37]Masateru Tsunoda, Takeshi Kakimoto, Akito Monden
, Ken-ichi Matsumoto:
An empirical evaluation of outlier deletion methods for analogy-based cost estimation. PROMISE 2011: 17 - [e1]Koichi Matsuda, Ken-ichi Matsumoto, Akito Monden:
2011 Joint Conf of 21st Int'l Workshop on Software Measurement and the 6th Int'l Conference on Software Process and Product Measurement, IWSM/Mensura 2011, Nara, Japan, November 3-4, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1930-1 [contents] - 2010
- [c36]Rodrigo A. Vivanco, Yasutaka Kamei, Akito Monden
, Ken-ichi Matsumoto, Dean Jin:
Using search-based metric selection and oversampling to predict fault prone modules. CCECE 2010: 1-6 - [c35]Yasutaka Kamei, Shinsuke Matsumoto, Akito Monden
, Ken-ichi Matsumoto, Bram Adams
, Ahmed E. Hassan:
Revisiting common bug prediction findings using effort-aware models. ICSM 2010: 1-10 - [c34]Shinsuke Matsumoto, Yasutaka Kamei, Akito Monden
, Ken-ichi Matsumoto, Masahide Nakamura:
An analysis of developer metrics for fault prediction. PROMISE 2010: 18
2000 – 2009
- 2009
- [j10]Masateru Tsunoda, Akito Monden
, Hiroshi Yadohisa, Nahomi Kikuchi, Ken-ichi Matsumoto:
Software development productivity of Japanese enterprise applications. Inf. Technol. Manag. 10(4): 193-205 (2009) - [c33]Yoshiki Mitani, Tomoko Matsumura, Katsuro Inoue, Mike Barker, Akito Monden, Ken-ichi Matsumoto:
An Empirical Study of the Feedback of the In-process Measurement in a Japanese Consortium-type Software Project. SEKE 2009: 631-636 - 2008
- [j9]Tomoko Matsumura, Shuji Morisaki, Akito Monden
, Ken-ichi Matsumoto:
Analyzing Factors of Defect Correction Effort in a Multi-Vendor Information System Development. J. Comput. Inf. Syst. 49(1): 73-80 (2008) - [c32]Yasutaka Kamei, Akito Monden
, Shuji Morisaki, Ken-ichi Matsumoto:
A hybrid faulty module prediction using association rule mining and logistic regression analysis. ESEM 2008: 279-281 - [c31]Yasutaka Kamei, Jacky Wai Keung
, Akito Monden
, Ken-ichi Matsumoto:
An over-sampling method for analogy-based software effort estimation. ESEM 2008: 312-314 - [c30]Hidetake Uwano, Akito Monden
, Ken-ichi Matsumoto:
Are good code reviewers also good at design review? ESEM 2008: 351-353 - [c29]Koji Toda, Akito Monden
, Ken-ichi Matsumoto:
Fit data selection for software effort estimation models. ESEM 2008: 360-361 - [c28]Hidetake Uwano, Akito Monden
, Ken-ichi Matsumoto:
DRESREM 2: An Analysis System for Multi-document Software Review Using Reviewers' Eye Movements. ICSEA 2008: 177-183 - 2007
- [j8]Hidetake Uwano, Masahide Nakamura
, Akito Monden
, Ken-ichi Matsumoto:
Exploiting Eye Movements for Evaluating Reviewer's Performance in Software Review. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(10): 2290-2300 (2007) - [j7]Shuji Morisaki, Akito Monden, Haruaki Tamada, Tomoko Matsumura, Ken-ichi Matsumoto:
Mining Quantitative Rules in a Software Project Data Set. Inf. Media Technol. 2(4): 999-1008 (2007) - [c27]Yasutaka Kamei, Akito Monden, Shinsuke Matsumoto, Takeshi Kakimoto, Ken-ichi Matsumoto:
The Effects of Over and Under Sampling on Fault-prone Module Detection. ESEM 2007: 196-204 - [c26]Naoki Ohsugi, Akito Monden, Nahomi Kikuchi, Michael D. Barker, Masateru Tsunoda, Takeshi Kakimoto, Ken-ichi Matsumoto:
Is This Cost Estimate Reliable? - The Relationship between Homogeneity of Analogues and Estimation Reliability. ESEM 2007: 384-392 - [c25]Shinsuke Matsumoto, Yasutaka Kamei, Akito Monden, Ken-ichi Matsumoto:
Comparison of Outlier Detection Methods in Fault-proneness Models. ESEM 2007: 461-463 - [c24]Shuji Morisaki, Akito Monden
, Tomoko Matsumura, Haruaki Tamada
, Ken-ichi Matsumoto:
Defect Data Analysis Based on Extended Association Rule Mining. MSR 2007: 3 - 2006
- [j6]Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto:
Quantitative Analysis of Information Leakage in Security-Sensitive Software Processes. Inf. Media Technol. 1(1): 121-133 (2006) - [c23]Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden:
Software obfuscation from crackers' viewpoint. ACST 2006: 286-291 - [c22]Hidetake Uwano, Masahide Nakamura, Akito Monden, Ken-ichi Matsumoto:
Analyzing individual performance of source code review using reviewers' eye movement. ETRA 2006: 133-140 - [c21]Masateru Tsunoda, Akito Monden
, Hiroshi Yadohisa
, Nahomi Kikuchi, Ken-ichi Matsumoto:
Productivity analysis of Japanese enterprise software development projects. MSR 2006: 14-17 - [c20]Takeshi Kakimoto, Akito Monden
, Yasutaka Kamei, Haruaki Tamada
, Masateru Tsunoda, Ken-ichi Matsumoto:
Using software birthmarks to identify similar classes and major functionalities. MSR 2006: 171-172 - [c19]Masateru Tsunoda, Akito Monden
, Takeshi Kakimoto, Yasutaka Kamei, Ken-ichi Matsumoto:
Analyzing OSS developers' working time using mailing lists archives. MSR 2006: 181-182 - 2005
- [j5]Akito Monden, Antoine Monsifrot, Clark D. Thomborson:
Tamper-Resistant Software System Based on a Finite State Machine. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 112-122 (2005) - [j4]Haruaki Tamada
, Masahide Nakamura
, Akito Monden
, Ken-ichi Matsumoto:
Java Birthmarks - Detecting the Software Theft - . IEICE Trans. Inf. Syst. 88-D(9): 2148-2158 (2005) - [j3]Akito Monden
, Ken-ichi Matsumoto, Masatake Yamato:
Evaluation of gaze-added target selection methods suitable for general GUIs. Int. J. Comput. Appl. Technol. 24(1): 17-24 (2005) - [j2]Shinji Uchida, Akito Monden, Naoki Ohsugi, Toshihiro Kamiya, Ken-ichi Matsumoto, Hideo Kudo:
Software Analysis by Code Clones in Open Source Software. J. Comput. Inf. Syst. 45(3): 1-11 (2005) - [c18]Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden:
Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process. ACSW 2005: 145-151 - [c17]Tomohiro Akinaga, Naoki Ohsugi, Masateru Tsunoda, Takeshi Kakimoto, Akito Monden
, Ken-ichi Matsumoto:
Recommendation of Software Technologies Based on Collaborative Filtering. APSEC 2005: 209-216 - [c16]Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, Akito Monden, Ken-ichi Matsumoto:
Javawock: A Java Class Recommender System Based on Collaborative Filtering. SEKE 2005: 491-497 - 2004
- [j1]Shuji Morisaki, Yumi Shiraishi, Masatake Yamato, Akito Monden
, Ken-ichi Matsumoto, Koji Torii:
A support system for software function discovery using histories of function executions. Syst. Comput. Jpn. 35(12): 93-106 (2004) - [c15]Akito Monden, Antoine Monsifrot, Clark D. Thomborson:
A Framework for Obfuscated Interpretation. ACSW 2004: 7-16 - [c14]Haruaki Tamada, Masahide Nakamura, Akito Monden:
Design and evaluation of birthmarks for detecting theft of java programs. IASTED Conf. on Software Engineering 2004: 569-574 - [c13]Naoki Ohsugi, Masateru Tsunoda, Akito Monden
, Ken-ichi Matsumoto:
Effort Estimation Based on Collaborative Filtering. PROFES 2004: 274-286 - 2003
- [c12]Yuichiro Kanzaki, Akito Monden, Masahide Nakamura, Ken-ichi Matsumoto:
Exploiting Self-Modification Mechanism for Program Protection. COMPSAC 2003: 170- - [c11]Masahide Nakamura, Akito Monden
, Tomoaki Itoh, Ken-ichi Matsumoto, Yuichiro Kanzaki, Hirotsugu Satoh:
Queue-Based Cost Evaluation of Mental Simulation Process in Program Comprehension. IEEE METRICS 2003: 351- - 2002
- [c10]Naoki Ohsugi, Akito Monden
, Ken-ichi Matsumoto:
A Recommendation System for Software Function Discovery. APSEC 2002: 248- - [c9]Shinji Uchida, Akito Monden
, Hajimu Iida, Ken-ichi Matsumoto, Hideo Kudo:
A Multiple-View Analysis Model of Debugging Processes. ISESE 2002: 139-147 - [c8]Tomoko Matsumura, Akito Monden
, Ken-ichi Matsumoto:
The Detection of Faulty Code Violating Implicit Coding Rules. ISESE 2002: 173-182 - [c7]Tomoko Matsumura, Akito Monden
, Ken-ichi Matsumoto:
A method for detecting faulty code violating implicit coding rules. IWPSE 2002: 15-21 - [c6]Shin-ichi Sato, Akito Monden
, Ken-ichi Matsumoto:
Evaluating the applicability of reliability prediction models between different software. IWPSE 2002: 97-102 - [c5]Akito Monden
, Daikai Nakae, Toshihiro Kamiya, Shin-ichi Sato, Ken-ichi Matsumoto:
Software Quality Analysis by Code Clones in Industrial Legacy Software. IEEE METRICS 2002: 87- - 2000
- [c4]Masatake Yamamoto, Akito Monden
, Ken-ichi Matsumoto, Katsuro Inoue, Koji Torii:
Button Selection for General GUIs Using Eye and Hand Together. Advanced Visual Interfaces 2000: 270-273 - [c3]Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koji Torii, Katsuro Inoue:
A Practical Method for Watermarking Java Programs. COMPSAC 2000: 191-197 - [c2]Akito Monden
, Shin-ichi Sato, Ken-ichi Matsumoto, Katsuro Inoue:
Modeling and Analysis of Software Aging Process. PROFES 2000: 140-153
1990 – 1999
- 1995
- [c1]Masahiro Tonomura, Tetsuo Kosaka, Shoichi Matsunaga, Akito Monden:
Speaker adaptation fitting training data size and contents. EUROSPEECH 1995: 1147-1150
Coauthor Index
aka: Kenichi Matsumoto

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint