default search action
Keiichi Katamine
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c17]Shigeru Kusakabe, Shunsuke Araki, Keiichi Katamine, Masanobu Umeda:
Analyzing Motivation in Personal Software Process Education Course with a Qualitative Approach. IIAI-AAI 2020: 298-303
2010 – 2019
- 2014
- [j6]Takako Nakatani, Shouzo Hori, Keiichi Katamine, Michio Tsuda, Toshihiko Tsumaki:
Estimation of the Maturation Type of Requirements from Their Accessibility and Stability. IEICE Trans. Inf. Syst. 97-D(5): 1039-1048 (2014) - [j5]Masanobu Umeda, Keiichi Katamine, Keiichi Ishibashi, Masaaki Hashimoto, Takaichi Yoshida:
Motivation Process Formalization and Its Application to Education Improvement for the Personal Software Process Course. IEICE Trans. Inf. Syst. 97-D(5): 1127-1138 (2014) - 2012
- [j4]Takako Nakatani, Narihito Kondo, Junko Shirogane, Haruhiko Kaiya, Shouzo Hori, Keiichi Katamine:
Toward the Decision Tree for Inferring Requirements Maturation Types. IEICE Trans. Inf. Syst. 95-D(4): 1021-1030 (2012) - [c16]Keiichi Ishibashi, Masaaki Hashimoto, Masanobu Umeda, Keiichi Katamine, Takaichi Yoshida, Yoshihiro Akiyama:
A Preliminary Study on Formalization of Motivation Process in Personal Software Process Course. JCKBSE 2012: 128-137 - 2011
- [c15]Takako Nakatani, Toshihiko Tsumaki, Michio Tsuda, Mari Inoki, Shouzo Hori, Keiichi Katamine:
Requirements Maturation Analysis by Accessibility and Stability. APSEC 2011: 357-364 - [c14]Masanobu Umeda, Ryoto Naruse, Hiroaki Sone, Keiichi Katamine:
Translating Nondeterministic Functional Language Based on Attribute Grammars into Java. INAP/WLP 2011: 41-57 - [i1]Masanobu Umeda, Ryoto Naruse, Hiroaki Sone, Keiichi Katamine:
Translating Nondeterministic Functional Language based on Attribute Grammars into Java. CoRR abs/1109.0638 (2011) - 2010
- [j3]Shouzo Hori, Takako Nakatani, Keiichi Katamine, Naoyasu Ubayashi, Masaaki Hashimoto:
Project Management Patterns to Prevent Schedule Delay Caused by Requirement Elicitation. IEICE Trans. Inf. Syst. 93-D(4): 745-753 (2010) - [j2]Takako Nakatani, Shouzo Hori, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto:
A Case Study of Requirements Elicitation Process with Changes. IEICE Trans. Inf. Syst. 93-D(8): 2182-2189 (2010)
2000 – 2009
- 2009
- [c13]Shouzo Hori, Takako Nakatani, Keiichi Katamine, Naoyasu Ubayashi, Masaaki Hashimoto:
Project Management Patterns to Prevent Schedule Delay Caused by Requirements Changes - Empirical Study on a Successful Project. ICSOFT (1) 2009: 115-120 - [c12]Takako Nakatani, Shouzo Hori, Michio Tsuda, Mari Inoki, Keiichi Katamine, Masaaki Hashimoto:
Towards a Strategic Requirements Elicitation - A Proposal of the PRINCE Model. ICSOFT (1) 2009: 145-150 - 2008
- [c11]Keiichi Katamine, Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Naoyasu Ubayashi, Takako Nakatani:
A Conceptual Model for Analysis Method of Extracting Unexpected Obstacles of Embedded Systems. JCKBSE 2008: 22-31 - [c10]Keiichi Ishibashi, Masaaki Hashimoto, Keiichi Katamine, Ryoma Shiratsuchi, Keita Asaine, Takako Nakatani, Naoyasu Ubayashi, Yoshihiro Akiyama:
A Discussion on Domain Modeling in an Example of Motivation-Based Human Resource Management. JCKBSE 2008: 32-41 - [c9]Takako Nakatani, Shouzo Hori, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto:
A Case Study: Requirements Elicitation Processes throughout a Project. RE 2008: 241-246 - 2007
- [c8]Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Keiichi Katamine, Naoyasu Ubayashi, Takako Nakatani:
Enhancing the ESIM (Embedded Systems Improving Method) by Combining Information Flow Diagram with Analysis Matrix for Efficient Analysis of Unexpected Obstacles in Embedded Software. APSEC 2007: 326-333 - [c7]Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Keiichi Katamine, Naoyasu Ubayashi, Takako Nakatani:
A Suggestion for Analysis of Unexpected Obstacles in Embedded System. HCI (8) 2007: 755-768 - 2006
- [c6]Toshiro Mise, Yasufumi Shinyashiki, Takako Nakatani, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto:
A Method for Extracting Unexpected Scenarios of Embedded Systems. JCKBSE 2006: 41-50 - [c5]Hidehiro Kametani, Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Naoyasu Ubayashi, Keiichi Katamine, Takako Nakatani:
Information Flow Diagram and Analysis Method for Unexpected Obstacle Specification of Embedded Software. JCKBSE 2006: 115-124 - 2005
- [c4]Toshiro Mise, Masaaki Hashimoto, Keiichi Katamine, Yasufumi Shinyashiki, Naoyasu Ubayashi, Takako Nakatani:
An Analysis Method with Failure Scenario Matrix for Specifying Unexpected Obstacles in Embedded Systems. APSEC 2005: 447-456 - [c3]Masanobu Umeda, Keiichi Katamine, Isao Nagasawa, Masaaki Hashimoto, Osamu Takata:
Multi-threading Inside Prolog for Knowledge-Based Enterprise Applications. INAP 2005: 200-214 - 2004
- [j1]Keiichi Katamine, Masanobu Umeda, Isao Nagasawa, Masaaki Hashimoto:
Integrated Development Environment for Knowledge-Based Systems and Its Practical Application. IEICE Trans. Inf. Syst. 87-D(4): 877-885 (2004)
1990 – 1999
- 1996
- [c2]Masaaki Hashimoto, Toyohiko Hirota, Isao Nagasawa, Keiichi Katamine, Yoshiaki Tegoshi:
A Domain-Specific Conceptual Model in Building Design. IEA/AIE 1996: 71-76 - [c1]Neng-Fa Zhou, Isao Nagasawa, Masanobu Umeda, Keiichi Katamine, Toyohiko Hirota:
B-Prolog: A High Performance Prolog Compiler. IEA/AIE 1996: 790
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint