{"id":139,"date":"2013-01-17T21:30:39","date_gmt":"2013-01-17T12:30:39","guid":{"rendered":"http:\/\/www.sa.c.titech.ac.jp\/?page_id=139"},"modified":"2025-04-04T21:09:09","modified_gmt":"2025-04-04T12:09:09","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.sa.comp.isct.ac.jp\/en\/research\/publications","title":{"rendered":"Publications"},"content":{"rendered":"<p>See the <b><a href=\"\/~tkobaya\/publications.html\">publications<\/a><\/b> of Prof. Kobayashi.<br \/>\nAwards our laboratory members received are listed in the <b><a href=\"\/award\">awards page<\/a><\/b>.<\/p>\n<p><!--\n\u5c0f\u6797\u7814\u306e\u5916\u90e8\u767a\u8868\u8ad6\u6587\uff0c\u8b1b\u6f14\uff0c\u7279\u8a31\u306e\u4e00\u89a7\u3067\u3059\uff0e\u4f50\u4f2f\u7814\u30fb\u6a2a\u7530\u7814\u30fb\u963f\u8349\u7814\u6642\u4ee3\u306e\u3082\u306e\u3082\u542b\u307f\u307e\u3059\uff0e\n\u7814\u7a76\u5ba4\u30e1\u30f3\u30d0\u30fc\u306e\u53d7\u8cde\u306b\u95a2\u3057\u3066\u306f\uff0c<a href=\"\/award\">\u53d7\u8cde\u306e\u30da\u30fc\u30b8<\/a>\u3092\u3054\u89a7\u304f\u3060\u3055\u3044.\n\n<a name=\"year\"><\/a>\n<a href=\"#type\">[\u7a2e\u985e\u5225]<\/a> [\u767a\u8868\u5e74\u5225] <a href=\"javascript:history.back()\">[\u623b\u308b]<\/a>\n\n\n<h2>\u767a\u8868\u5e74\u5225<\/h2>\n\n\n\n\n<ul>\n\t\n\n<li>2013\n\n\n<ol>\n\n\n<li class=\"coauthor\">\nTatsuya Toda, <u>Takashi Kobayashi<\/u>, Noritoshi Atsumi, Kiyoshi Agusa:\nGrouping Objects for Execution Trace Analysis based on Design Patterns,\nThe 5th  International Workshop on Empirical Software Engineering in Practice (<a href=\"https:\/\/sites.google.com\/site\/iwesep2013\/\">IWESEP2013<\/a>) (co-located with APSEC2013), Dec 2 2013 Bangkok, Thailand\n<\/li>\n\n\n\n  \n\n<li><b>[\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb]<\/b>\n  <u>\u5c0f\u6797\u9686\u5fd7<\/u>:\n  \u5b9f\u884c\u30c8\u30ec\u30fc\u30b9\u306e\u89e3\u6790\u306b\u57fa\u3065\u304f\u4e0d\u5177\u5408\u7b87\u6240\u767a\u898b,\n  \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02013(SES2013) \u4f75\u8a2d\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7 <a href=\"https:\/\/sites.google.com\/site\/sesjp2013\/workshop#ws-1\">\u300c\u30d7\u30ed\u30b0\u30e9\u30e0\u30fb\u30c7\u30d0\u30c3\u30b0\u81ea\u52d5\u5316\u306e\u73fe\u72b6\u3068\u4eca\u5f8c\u300d<\/a> Sept. 2013. \u6771\u4eac\n  <\/li>\n\n\n\n  \n\n<li><b>[\u53e3\u982d\u767a\u8868]<\/b>\n  <u>\u5c0f\u6797\u9686\u5fd7<\/u>, \u6a29\u85e4\u514b\u5f66, \u4f50\u4f2f\u5143\u53f8, \u9996\u85e4\u4e00\u5e78, \u7530\u4e2d\u5eb7, \u897f\u5d0e\u771f\u4e5f, \u68ee\u672c\u5343\u4f73\u5b50, \u7c73\u5d0e\u76f4\u6a39, \u8107\u7530\u5efa\uff0c\u6e21\u90e8\u5353\u96c4:\n      Cloudbauhaus: \u6771\u4eac\u5de5\u696d\u5927\u5b66\u306b\u304a\u3051\u308b\u5b9f\u8df5\u7684IT\u4eba\u6750\u80b2\u6210\u306e\u8a66\u307f,\n      \u65e5\u672c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u79d1\u5b66\u4f1a <a href=\"http:\/\/jssst2013.wordpress.com\/\">\u7b2c30\u56de\u5927\u4f1a<\/a> Sept. 2013. \u6771\u4eac\n  <\/li>\n\n\n  \n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n  \u98a8\u6238\u5e83\u53f2, \u6797\u664b\u5e73, <u>\u5c0f\u6797\u9686\u5fd7<\/u>, \u5927\u5cf6\u525b\u5fd7, \u5bae\u7530\u4fca\u4ecb, \u590f\u5ddd\u52dd\u884c, \u661f\u91ce\u9686, \u4f50\u4f2f\u5143\u53f8:\n      \u53cd\u5fa9\u578b\u30a2\u30d7\u30ed\u30fc\u30c1\u306b\u3088\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u6a5f\u80fd\u306e\u635c\u7d22\u3068\u8b58\u5225\u306e\u6539\u5584,\n      \u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u4fe1\u5b66\u6280\u6cd5 <a href=\"http:\/\/www.ieice.org\/ken\/paper\/20130725QBFY\/\">IEICE-SS2013-22<\/a> (Vol. 113, No. 159, pp. 55-60), \u672d\u5e4c, 25-26 Jul 2013.\n <\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70]<\/b>\nHiroshi Kazato, Shinpei Hayashi, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Tsuyoshi Oshima,Satoshi Okada, Shunsuke Miyata, Takashi Hoshino and Motoshi Saeki:\nIncremental Feature Location and Identification in Source Code\uff0c\n17th European Conference on Software Maintenance and Reengineering (<a href=\"http:\/\/csmr2013.disi.unige.it\/\">CSMR2013<\/a>) ERA Track, March 5--8, 2013, Genova, Italy<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70(Post Proc)]<\/b>\nTetsutaro Watanabe, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Haruo Yokota:\nFRIDAL: A Desktop Search System Based on Latent Interfile Relationships,\nIn Software and Data Technologies (ICSOFT2010 Revised Selected Papers)<a href=\"http:\/\/www.springer.com\/series\/7899\">Springer CCIS<\/a> 170, pp.220-234, 2013.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u6e25\u7f8e\u7d00\u5bff, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>\uff0c\u963f\u8349\u6e05\u6ecb:\n\u30d7\u30ea\u30d7\u30ed\u30bb\u30b9\u547d\u4ee4\u306e\u5236\u5fa1\u69cb\u9020\u3092\u5229\u7528\u3057\u305f\u30d5\u30a3\u30fc\u30c1\u30e3\u9593\u306e\u4f9d\u5b58\u6027\u89e3\u6790\n\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b5\u30a4\u30a8\u30f3\u30b9\u7814\u7a76\u4f1a\uff0c\u77f3\u57a3\u5cf6\uff0cJan. 9-10, 2013<\/li>\n\n\n<\/ol>\n\n\n<\/li>\n\n\n\t\n\n<li>2012\u5e74\n\n\n<ol>\n\t\n\n<li class=\"coauthor\"><b>[\u30dd\u30b9\u30bf\u30fc\u767a\u8868]<\/b>\n\u9ad8\u4e95\u5eb7\u52e2, \u6e25\u7f8e\u7d00\u5bff, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>:\n\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u898f\u7d04\u9055\u53cd\u306e\u63a8\u79fb\u306b\u57fa\u3065\u304f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u54c1\u8cea\u8a55\u4fa1\u306b\u5411\u3051\u3066,\n\u65e5\u672c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u79d1\u5b66\u4f1a \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7(FOSE2012) 13-15, Dec. 2012.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u4e38\u5c71\u52dd\u4e45, \u5927\u68ee\u9686\u884c\uff0c\u4e95\u57a3\u5b8f\uff0c\u4e2d\u6751\u5321\u79c0\uff0c\u4f0f\u7530\u4eab\u5e73\uff0c\u89d2\u7530\u96c5\u7167\uff0c\u98a8\u6238\u5e83\u53f2\uff0c\u5ca1\u7530\u8b72\u4e8c\uff0c\u5ca1\u91ce\u6d69\u4e09\uff0c\u5742\u672c\u4e00\u61b2\uff0c\u672c\u6a4b\u6b63\u6210\uff0c\u5cb8\u77e5\u4e8c\uff0c\u91ce\u7530\u590f\u5b50\uff0c<span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>\uff0c\u6797\u664b\u5e73:\n\u30a6\u30a3\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72012\u30fb\u30a4\u30f3\u30fb\u7435\u7436\u6e56\u958b\u50ac\u5831\u544a,\n\u60c5\u5831\u51e6\u7406\u5b66\u4f1a \u7b2c178\u56de\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u767a\u8868\u4f1a SIG-SE178-11, 1-2, Nov 2012.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70]<\/b>\nKunihiro Noda, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Kiyoshi Agusa:\nExecution Trace Abstraction based on Meta Patterns Usage,\nProc. 19th Working Conference on Reverse Engineering ( <a href=\"http:\/\/www.distat.unimol.it\/wcre2012\/\">WCRE2012<\/a>), pp. 167-176 Oct 15-18, Kingston - Canada, 2012<\/li>\n\n\n\n\n<li class=\"coauthor\"><b>[\u7279\u8a31(\u53d6\u5f97)]<\/b>\n\u6a2a\u7530 \u6cbb\u592b, \u6e21\u90e8 \u5fb9\u592a\u90ce, \u5c0f\u6797\u9686\u5fd7:\n\u30d5\u30a1\u30a4\u30eb\u691c\u7d22\u30b7\u30b9\u30c6\u30e0\n\u7279\u958b2009-003553(H21\/1\/8) \u7279\u8a31\u7b2c5057512\u53f7. 2012\/08\/10 2012. (\u51fa\u9858\u4eba:\u6771\u4eac\u5de5\u696d\u5927\u5b66) \n<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70]<\/b>\nTakahiro Fujitani , <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Noritoshi Atsumi, Kiyoshi Agusa:\nFinding Cross-browser JavaScript Codes using Sequential Pattern Mining,\n10th Joint Conference on Knowledge-Based Software Engineering (<a href=\"http:\/\/jckbse12.unipi.gr\/\">JCKBSE2012<\/a>) pp. 303-312 August 23-26, Rhodes - Greece, 2012<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u5c0f\u6797\u5b5d\u58fd, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u4e45\u4fdd\u5b5d\u884c, \u963f\u8349\u6e05\u6ecb:\n\u30b5\u30d6\u30b7\u30b9\u30c6\u30e0\u5883\u754c\u60c5\u5831\u306b\u7740\u76ee\u3057\u305fSimulink\u30e2\u30c7\u30eb\u306e\u69cb\u9020\u8a55\u4fa1\u624b\u6cd5,\n\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b5\u30a4\u30a8\u30f3\u30b9\u7814\u7a76\u4f1a \u4fe1\u5b66\u6280\u6cd5 <a href=\"http:\/\/www.ieice.org\/ken\/paper\/20120728G0t1\/\">IEICE-SS2012-3<\/a>, Jul 27, 2012<\/li>\n\n\n\t\n\n<li><b>[\u56fd\u969bWS]<\/b>\n<span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Nozomu Kato, Kiyoshi Agusa:\nInteraction Histories Mining for Software Change Guide,\nProc. the 3rd International Workshop on Recommendation Systems for Software Engineering (<a href=\"http:\/\/rsse.org\/rsse-2012\/\">RSSE2012<\/a>). In conjunction with ICSE 2012 pp.73-77 Zurich, Switzerland. June 4, 2012<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u6e25\u7f8e \u7d00\u5bff, <span style=\"text-decoration: underline;\">\u5c0f\u6797 \u9686\u5fd7<\/span>, \u9ad8\u7530 \u5e83\u7ae0:\n\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u958b\u767a\u306b\u304a\u3051\u308b\u30c8\u30ec\u30fc\u30b5\u30d3\u30ea\u30c6\u30a3\u78ba\u4fdd\u306e\u305f\u3081\u306e\u958b\u767a\u74b0\u5883\u306e\u691c\u8a0e,\n\u60c5\u5831\u51e6\u7406\u5b66\u4f1a \u7814\u7a76\u5831\u544a \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66 Vol.2012-SE-176, No. 11, pp.1-7 (<a href=\"http:\/\/www.ipsj.or.jp\/kenkyukai\/event\/se176emb25.html\">\u7b2c176\u56de\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u4f1a, \u7b2c25\u56de\u7d44\u8fbc\u307f\u30b7\u30b9\u30c6\u30e0\u7814\u7a76\u4f1a\u5408\u540c\u767a\u8868\u4f1a<\/a>), 22 May 2012.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u8ad6\u6587]<\/b>\nKunihiro Noda, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Shinichiro Yamamoto,Motoshi Saeki, Kiyoshi Agusa:\nReticella: An Execution Trace Slicing and Visualization Tool based on a Behavior Model,\nIEICE Transactions on Information and Systems, Vol.E95-D, No.4, pp.959-969, Apr. 2012. <a href=\"http:\/\/search.ieice.org\/bin\/pdf_link.php?category=D&amp;lang=E&amp;year=2012&amp;fname=e95-d_4_959&amp;abst=\">[PDF]<\/a><\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u30b5\u30fc\u30d9\u30a4\u8ad6\u6587]<\/b>\n\u9df2\u5d0e\u5f18\u5b9c, \u5742\u672c\u4e00\u61b2, \u5927\u6749\u76f4\u6a39, \u6a29\u85e4\u514b\u5f66, \u670d\u90e8\u54f2,\u4e45\u4fdd\u6df3\u4eba, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u5927\u6708\u7f8e\u4f73, \u4e38\u5c71\u52dd\u4e45, \u698a\u539f\u5f70:\n\u30c7\u30b6\u30a4\u30f3\u30d1\u30bf\u30fc\u30f3\u3078\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7684\u53d6\u308a\u7d44\u307f,\n\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 Vol. 29, No. 1, pp.1_130-1_146, Feb 2012.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u5927\u5872\u5149\u660e, \u6e25\u7f8e\u7d00\u5bff, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u963f\u8349\u6e05\u6ecb:\n\u30e1\u30bd\u30c3\u30c9\u5883\u754c\u3092\u8d8a\u3048\u305f\u547c\u3073\u51fa\u3057\u30d1\u30bf\u30fc\u30f3\u62bd\u51fa\u306e\u305f\u3081\u306e\u30b3\u30fc\u30eb\u30b0\u30e9\u30d5\u63a2\u7d22\u6226\u7565,\n\u60c5\u5831\u51e6\u7406\u5b66\u4f1a \u60c5\u51e6\u7814\u5831 Vol. 2012-SE-175, No.18, pp.1-8, 3\/15-16 \u6771\u4eac 2012<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u6238\u7530\u9054\u4e5f, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u6e25\u7f8e\u7d00\u5bff, \u963f\u8349\u6e05\u6ecb:\n\u5b9f\u884c\u30c8\u30ec\u30fc\u30b9\u89e3\u6790\u306e\u305f\u3081\u306e\u30c7\u30b6\u30a4\u30f3\u30d1\u30bf\u30fc\u30f3\u306b\u57fa\u3065\u304f\u30aa\u30d6\u30b8\u30a7\u30af\u30c8\u30b0\u30eb\u30fc\u30d4\u30f3\u30b0,\n\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u4fe1\u5b66\u6280\u5831(\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b5\u30a4\u30a8\u30f3\u30b9), vol. 111, no. 481, SS2011-82, pp. 151-156, \u6c96\u7e04\uff0cMar 2012.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u5fb3\u91ce\u9054\u4e5f, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u963f\u8349\u6e05\u6ecb:\n\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u30b5\u30fc\u30c1\u30b7\u30b9\u30c6\u30e0\u306e\u305f\u3081\u306e Web \u5229\u7528\u5c65\u6b74\u306e\u6d3b\u7528\u624b\u6cd5,\n\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u7b2c4\u56de\u30c7\u30fc\u30bf\u5de5\u5b66\u3068\u60c5\u5831\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u306b\u95a2\u3059\u308b\u30d5\u30a9\u30fc\u30e9\u30e0(<a href=\"http:\/\/db-event.jpn.org\/deim2012\/index.php?pid=1\">DEIM2012<\/a>)\uff0cNo. #7-5(8page), 3\/3-5 \u795e\u6238 2012.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u8ad6\u6587]<\/b>\n\u5927\u9808\u8cc0\u4fca\u61b2, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u6e25\u7f8e\u7d00\u5bff, \u9593\u702c\u9806\u4e00, \u5c71\u672c\u664b\u4e00\u90ce, \u9234\u6751\u5ef6\u4fdd, \u963f\u8349\u6e05\u6ecb:\nCX-Chekcer: \u67d4\u8edf\u306b\u30ab\u30b9\u30bf\u30de\u30a4\u30ba\u53ef\u80fd\u306aC\u8a00\u8a9e\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\n\u30c1\u30a7\u30c3\u30ab, \u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u8ad6\u6587\u8a8c Vol.53, No.2, pp.590-600, Feb. 2012. <a href=\"http:\/\/www.bookpark.ne.jp\/cm\/ipsj\/particulars.asp?content_id=IPSJ-JNL5302015-PDF\">[PDF]<\/a><\/li>\n\n\n\t\n\n<li><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u5c0f\u6797\u9686\u5fd7: \u958b\u767a\u30b9\u30bf\u30a4\u30eb\u306b\u3042\u308f\u305b\u305f\u30d7\u30ed\u30b0\u30e9\u30e0\u89e3\u6790\u5fdc\u7528\u306e\u5fc5\u8981\u6027,\n<a href=\"http:\/\/www.fse.cs.ritsumei.ac.jp\/ww2012\/\">\u30a6\u30a3\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72012\u30fb\u30a4\u30f3\u30fb\u7435\u7436\u6e56<\/a>\uff0cJan. 2012.<\/li>\n\n\n<\/ol>\n\n\n<\/li>\n\n\n\t\n\n<li>2011\u5e74\n\n\n<ol>\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70]<\/b>\nNoritoshi Atsumi, Mitsuaki Oba, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Shinichiro Yamamoto\nand Kiyoashi Agusay:\nAn XML Representation of Preprocessed Code for Static Analysis,\nProc. IEEE 22nd annual International Symposium on Software Reliability Engineering (ISSRE 2011), #2-7 (2 pages), Hiroshima, Japan, Nov 2011.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u30dd\u30b9\u30bf\u30fc\u767a\u8868]<\/b>\n\u6797 \u664b\u5e73, <span style=\"text-decoration: underline;\">\u5c0f\u6797 \u9686\u5fd7<\/span>:\n\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u52c9\u5f37\u4f1a\u3078\u306e\u8a98\u3044.\n\u7b2c18\u56de\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff08FOSE 2011\uff09\u6d45\u866b\u6e29\u6cc9, \u9752\u68ee, Nov. 2011.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u5c71\u4e0b \u8a13\u662d, <span style=\"text-decoration: underline;\">\u5c0f\u6797 \u9686\u5fd7<\/span>, \u6a2a\u7530 \u6cbb\u592b, \u963f\u8349 \u6e05\u6ecb:\n\u30d5\u30a1\u30a4\u30eb\u30a2\u30af\u30bb\u30b9\u5c65\u6b74\u304b\u3089\u62bd\u51fa\u3057\u305f\u53c2\u7167\u95a2\u4fc2\u306b\u57fa\u3065\u304f\u30d5\u30a1\u30a4\u30eb\u691c\u7d22\u624b\u6cd5\n\u7b2c4\u56deWeb\u3068\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u306b\u95a2\u3059\u308b\u30d5\u30a9\u30fc\u30e9\u30e0\n(<a href=\"http:\/\/db-event.jpn.org\/webdbf2011\/\">WebDB Forum 2011<\/a>)\u8ad6\u6587\u96c6,\nNo. 1G-2-2, Nov. 2011 <em>(\u5b66\u751f\u5968\u52b1\u8cde\u53d7\u8cde) <\/em><\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70]<\/b>\nYasunari Takai, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Kiyoshi Agusa:\nSoftware Metrics based on Coding Standards Violations,\nIn Proc. the Joint Conference of the 21th International Workshop on Software Measurement and\nthe 6th International Conference on Software Process and Product Measurement (<a href=\"http:\/\/mensura.wordpress.com\/\">IWSM\/MENSURA2011<\/a>)\npp.273-278, Nara, Japan, 3-4 Nov. 2011<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70]<\/b>\nMotohiro Akiyama, Shinpei Hayashi, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Motoshi Saeki:\nSupporting Design Model Refactoring for Improving Class Responsibility Assignment,\nProc. ACM\/IEEE 14th International Conference on Model Driven Engineering Languages and Systems (<a href=\"http:\/\/www.modelsconference.org\/\">MODELS 2011<\/a>)\npp. 455-469, Wellington, New Zealand. 16-21 Oct 2011.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u85e4\u8c37\u9686\u5b8f, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u6e25\u7f8e\u7d00\u5bff, \u963f\u8349\u6e05\u6ecb:\n\u30b7\u30fc\u30b1\u30f3\u30b7\u30e3\u30eb\u30d1\u30bf\u30fc\u30f3\u30de\u30a4\u30cb\u30f3\u30b0\u306b\u3088\u308bJavaScript\u306e\u4ee3\u66ff\u30b3\u30fc\u30c9\u767a\u898b\n\u65e5\u672c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u79d1\u5b66\u4f1a \u7b2c28\u56de\u5927\u4f1a, \u6c96\u7e04 27-29, Sep. 2011<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u6e25\u7f8e\u7d00\u5bff, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u5c71\u672c\u664b\u4e00\u90ce, \u963f\u8349\u6e05\u6ecb:\n\u30d0\u30ea\u30a8\u30fc\u30b7\u30e7\u30f3\u4e26\u884c\u958b\u767a\u306e\u305f\u3081\u306e\u7248\u7ba1\u7406\u6a5f\u69cb\n\u65e5\u672c\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u79d1\u5b66\u4f1a \u7b2c28\u56de\u5927\u4f1a, \u6c96\u7e04 27-29, Sep. 2011<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u89e3\u8aac\u8a18\u4e8b]<\/b>\n\u963f\u8349 \u6e05\u6ecb, <span style=\"text-decoration: underline;\">\u5c0f\u6797 \u9686\u5fd7<\/span>:\nOJL :\u7523\u5b66\u9023\u643a\u306b\u3088\u308b\u65b0\u3057\u3044\u4eba\u6750\u80b2\u6210\u306e\u8a66\u307f\n(\u7279\u96c6 \u9ad8\u5ea6IT\u4eba\u6750\u80b2\u6210\u306e\u8ecc\u8de1)\n\u60c5\u5831\u51e6\u7406 Vol.52 No.10,pp.1254-1257 Sep. 2011<\/li>\n\n\n\t\n\n<li><b>[\u30d1\u30cd\u30eb\u8b1b\u6f14]<\/b>\n\u7523\u5b66\u9023\u643a\u30bb\u30c3\u30b7\u30e7\u30f3\u300c\u82e5\u624b\u7814\u7a76\u8005\u3068\u3068\u3082\u306b\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u54c1\u8cea\u306b\u95a2\u3059\u308b\n\u7523\u5b66\u9023\u643a\u7814\u7a76\u306e\u660e\u65e5\u3092\u8a9e\u308b\u300d\n\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u54c1\u8cea\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02011\uff08<a href=\"http:\/\/www.juse.or.jp\/software\/327\/#007\">SQiP2011<\/a>\uff09 8-9, Sep 2011.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70]<\/b>\nKento Ikeda, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Kenji Hatano, Daiji Fukagawa:\nCalculating Similarities between Tree Data\nbased on Structural Analysis,\nProc. 3rd International Conference\non Intelligent Decision Technologies (<a href=\"http:\/\/idt-11.kesinternational.org\/\">KES IDT2011<\/a>), pp.719-730, Piraeus, Greece 20-22 Jul 2011<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70]<\/b>\nNoritoshi Atsumi, Shinichiro Yamamoto, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Kiyoshi Agusa:\nAn XML C Source Code Interchange Format for CASE Tools,\nProc. <a href=\"http:\/\/compsac.cs.iastate.edu\/\">COMPSAC2011<\/a> pp. 498-503,\nMunich, Germany 18-21 Jul 2011<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969bWS]<\/b>\nYasunari Takai, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Kiyoshi Agusa:\nPreliminary Assessment of Software Metrics based on\nCoding Standards Violations,\n<a href=\"http:\/\/www.ieice.org\/ken\/program\/index.php?tgs_regid=eeefa462c1799e78498fc3e4d4d47039efeb89c863f19db9c84328d14c65de46\">Joint Workshop on Software Science and Engineering<\/a> (IEICE Technical Report <a href=\"http:\/\/www.ieice.org\/ken\/paper\/20110701e0Hr\/eng\/\">No.IEICE-SS2011-12<\/a> ) Seoul Korea, 1 Jul, 2011<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u91ce\u7530\u8a13\u5e83, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u963f\u8349\u6e05\u6ecb:\n\u30e1\u30bf\u30d1\u30bf\u30fc\u30f3\u9069\u7528\u60c5\u5831\u306b\u57fa\u3065\u304f\u30aa\u30d6\u30b8\u30a7\u30af\u30c8\u306e\u5354\u8abf\u52d5\u4f5c\u5c65\u6b74\u53ef\u8996\u5316\u30c4\u30fc\u30eb\n\u60c5\u5831\u51e6\u7406\u5b66\u4f1a \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u4f1a\uff0e\n\u60c5\u51e6\u7814\u5831 <a href=\"http:\/\/www.bookpark.ne.jp\/cm\/ipsj\/particulars.asp?content_id=IPSJ-SE11171001-PDF\">IPSJ-SE11171001<\/a> Mar 2011\uff0e<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u52a0\u85e4\u5e0c, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u963f\u8349\u6e05\u6ecb:\n\u5909\u66f4\u652f\u63f4\u306e\u305f\u3081\u306e\u6210\u679c\u7269\u30a2\u30af\u30bb\u30b9\u5c65\u6b74\u30de\u30a4\u30cb\u30f3\u30b0,\n\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b5\u30a4\u30a8\u30f3\u30b9\u7814\u7a76\u4f1a\uff0c\n\u4fe1\u5b66\u6280\u5831 <a href=\"http:\/\/www.ieice.org\/ken\/paper\/20110308m057\/\">SS2010-77<\/a>, Mar 2011<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u79cb\u5c71\u5e79\u535a, \u6797\u664b\u5e73, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u4f50\u4f2f\u5143\u53f8:\n\u8cac\u52d9\u8a18\u8ff0\u306b\u57fa\u3065\u304f\u30af\u30e9\u30b9\u306e\u8cac\u52d9\u5272\u308a\u5f53\u3066\u652f\u63f4,\n\u96fb\u5b50\u60c5\u5831\u901a\u4fe1\u5b66\u4f1a \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30b5\u30a4\u30a8\u30f3\u30b9\u7814\u7a76\u4f1a\uff0c\n\u4fe1\u5b66\u6280\u5831 <a href=\"http:\/\/www.ieice.org\/ken\/paper\/20110307h0fS\/\">SS2010-65<\/a>, Mar 2011<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u5185\u4f1a\u8b70]<\/b>\n\u6c60\u7530\u5065\u4eba, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u6ce2\u591a\u91ce\u8ce2\u6cbb, \u6df1\u5ddd\u5927\u8def:\n\u8907\u6570\u89b3\u70b9\u3092\u7528\u3044\u305f\u6728\u985e\u4f3c\u5ea6\u7b97\u51fa\u6cd5\u306b\u3088\u308b\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u306e\u985e\u4f3c\u69cb\u9020\u306e\u62bd\u51fa\n\u7b2c3\u56de\u30c7\u30fc\u30bf\u5de5\u5b66\u3068\u60c5\u5831\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u306b\u95a2\u3059\u308b\u30d5\u30a9\u30fc\u30e9\u30e0(DEIM2011)\u8ad6\u6587\u96c6 D3-3, Feb 2011<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u5185\u4f1a\u8b70]<\/b>\n\u9ad8\u4e95\u5eb7\u52e2, \u6e25\u7f8e\u7d00\u5bff, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>:\n\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u898f\u7d04\u9055\u53cd\u306b\u7740\u76ee\u3057\u305f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30e1\u30c8\u30ea\u30af\u30b9,\nIPSJ \u30a6\u30a3\u30f3\u30bf\u30fc\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d72011\u30a4\u30f3\u4fee\u5584\u5bfa \u8ad6\u6587\u96c6 pp. 11-12, Jan 2011.<\/li>\n\n\n<\/ol>\n\n\n<\/li>\n\n\n\t\n\n<li>2010\u5e74\n\n\n<ol>\n\t\n\n<li><b>[\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb]<\/b>\n<span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u6797\u664b\u5e73:\n\u30c7\u30fc\u30bf\u30de\u30a4\u30cb\u30f3\u30b0\u6280\u8853\u3092\u5fdc\u7528\u3057\u305f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u69cb\u7bc9\u30fb\u4fdd\u5b88\u652f\u63f4,\n\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XVII\n(\u7b2c17\u56de \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7 FOSE2010)\npp.1-2,\nNov. 2010. <a href=\"paper\/fose2010-dmse-tut.pdf\">[\u30b9\u30e9\u30a4\u30c9PDF(2up)]<\/a>,\n<a href=\"http:\/\/www.slideshare.net\/tkobaya\/fose2010\"> [slideshare]<\/a><\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u5185\u4f1a\u8b70]<\/b>\n\u4e0a\u539f\u4f38\u4ecb, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u6e25\u7f8e\u7d00\u5bff, \u5c71\u672c\u664b\u4e00\u90ce, \u963f\u8349\u6e05\u6ecb:\n\u30c8\u30ec\u30fc\u30b9\u306b\u57fa\u3065\u304f\u30c7\u30d0\u30c3\u30b0\u306b\u304a\u3051\u308b\u6b20\u9665\u7b87\u6240\u767a\u898b\u652f\u63f4\u624b\u6cd5,\n\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XVII\n(\u7b2c17\u56de \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7 FOSE2010)\npp.55-64,\nNov. 2010 <em>(FOSE2010 \u8ca2\u732e\u8cde\u53d7\u8cde)<\/em><\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u5185\u4f1a\u8b70]<\/b>\n\u6e25\u7f8e\u7d00\u5bff, \u8c37\u8061\u8cb4, \u5927\u585a\u76f4\u4e5f, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u5c71\u672c\u664b\u4e00\u90ce, \u963f\u8349\u6e05\u6ecb:\n\u7d44\u8fbc\u307f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u88fd\u54c1\u30d5\u30a1\u30df\u30ea\u306b\u304a\u3051\u308b\u30b3\u30f3\u30d1\u30a4\u30eb\u30b9\u30a4\u30c3\u30c1\u306b\u3088\u308b\u69cb\u6210\u7ba1\u7406\u624b\u6cd5,\n\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e XVII\n(\u7b2c17\u56de \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u306e\u57fa\u790e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7 FOSE2010)\npp.173-178,\nNov. 2010<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u8ad6\u6587]<\/b>\n\u98a8\u6238\u5e83\u53f2, \u6797\u664b\u5e73, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u4f50\u4f2f\u5143\u53f8:\n\u30d9\u30a4\u30b8\u30a2\u30f3\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3092\u7528\u3044\u305f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5b9f\u88c5\u6280\u8853\u306e\u9078\u629e\u652f\u63f4,\n\u60c5\u5831\u51e6\u7406\u5b66\u4f1a\u8ad6\u6587\u8a8c Vol.51, No.9, pp.1765-1776 Sept 2010.\n<a href=\"http:\/\/fw8.bookpark.ne.jp\/cm\/ipsj\/search.asp?flag=6&amp;keyword=IPSJ-JNL5109027&amp;mode=PDF\">[PDF]<\/a><\/li>\n\n\n\t\n\n<li><b>[\u89e3\u8aac\u8ad6\u6587]<\/b>\n<span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u6797 \u664b\u5e73:\n\u30c7\u30fc\u30bf\u30de\u30a4\u30cb\u30f3\u30b0\u6280\u8853\u3092\u5fdc\u7528\u3057\u305f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u69cb\u7bc9\u30fb\u4fdd\u5b88\u652f\u63f4\u306e\u7814\u7a76\u52d5\u5411,\n\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 Vol.27, No.3 (2010), pp.13-23 Aug 2010.\n<a href=\"https:\/\/www.jstage.jst.go.jp\/article\/jssst\/27\/3\/27_3_3_13\/_article\/-char\/ja\/\">\n[PDF]<\/a><\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u6e25\u7f8e\u7d00\u5bff, \u5c71\u672c\u664b\u4e00\u90ce, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u963f\u8349\u6e05\u6ecb:\nCASE\u30c4\u30fc\u30eb\u30fb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u305f\u3081\u306e C\u30bd\u30fc\u30b9\u30d7\u30ed\u30b0\u30e9\u30e0\u306eXML\u8868\u73fe\u3068\u305d\u306e\u5fdc\u7528\n\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u6700\u524d\u7dda2010,\n<a href=\"http:\/\/ses2010.ist.osaka-u.ac.jp\/\">\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30b7\u30f3\u30dd\u30b8\u30a6\u30e02010<\/a>(SES2010) pp.135-142 Aug 30-Sep 2 2010.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u56fd\u969b\u4f1a\u8b70]<\/b>\nTetsutaro Watanabe, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Haruo Yokota:\nSearching Keyword-lacking Files Based on Latent Interfile Relationships,\nProc. 5th International Conference on Software and Data Technologies\n(<a href=\"http:\/\/www.icsoft.org\/\">ICSOFT2010<\/a>), pp.236-244. Athens Greece 22-24 Jul 2010.<a href=\"paper\/icsoft2010.pdf\">[PDF]<\/a><\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u30ec\u30bf\u30fc\u8ad6\u6587]<\/b>\n\u86ed\u725f\u7530\u82f1\u6cbb, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u672b\u6b21\u4eae, \u5927\u9808\u8cc0\u4fca\u61b2, \u5c71\u672c\u664b\u4e00\u90ce, \u963f\u8349\u6e05\u6ecb:\nJavaScript\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u30ea\u30dd\u30b8\u30c8\u30ea\u3092\u7528\u3044\u305f\u4ee3\u66ff\u30b3\u30fc\u30c9\u767a\u898b <b>[\u63a8\u85a6\u8ad6\u6587\u30fb\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66]<\/b>,\n\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 Vol.27, No.2, pp.129-134 May 2010.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u30ec\u30bf\u30fc\u8ad6\u6587]<\/b>\n\u4e0a\u539f\u4f38\u4ecb, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u5927\u9808\u8cc0\u4fca\u61b2, \u5c71\u672c\u664b\u4e00\u90ce, \u963f\u8349\u6e05\u6ecb:\n\u591a\u7c92\u5ea6\u306a\u53ef\u8996\u5316\u306b\u3088\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u7406\u89e3\u652f\u63f4,\n\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 Vol.27, No.2, pp.116-121 May 2010.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u8ad6\u6587]<\/b>\nTeruyoshi Zenmyo, <span style=\"text-decoration: underline;\">Takashi Kobayashi<\/span>, Motoshi Saeki:\nDeriving Framework Usages based on Behavioral Models\nIEICE Transactions on Information and Systems\nVol.E93-D, No.4, pp.1-12, Apr 2010.<\/li>\n\n\n\t\n\n<li><b>[\u8ad6\u6587]<\/b>\n<span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>\uff0c\u6ca2\u7530\u7be4\u53f2\uff0c\u5c71\u672c\u664b\u4e00\u90ce\uff0c\u91ce\u5442\u660c\u6e80\uff0c\u963f\u8349\u6e05\u6ecb:\n\"On the Job Learning: \u7523\u5b66\u9023\u643a\u306b\u3088\u308b\u65b0\u3057\u3044\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u6559\u80b2\u624b\u6cd5\uff0c\"\n\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u5b66\u4f1a\u8a8c\uff0cVol.5, No.2, pp.32-45, Mar 2010\n<a href=\"paper\/A0329.pdf\">[PDF]<\/a><\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u6a2a\u5c71\u7950\u53f8, \u65e5\u9ad8\u9686\u535a, \u5c71\u672c\u664b\u4e00\u90ce, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u624b\u5d8b\u8302\u6674, \u963f\u8349\u6e05\u6ecb:\n\u30d0\u30ea\u30a8\u30fc\u30b7\u30e7\u30f3\u4e26\u884c\u958b\u767a\u306e\u305f\u3081\u306e\u7248\u7ba1\u7406\u30c4\u30fc\u30eb\u3068\u7d71\u5408\u958b\u767a\u74b0\u5883,\n\u60c5\u5831\u51e6\u7406\u5b66\u4f1a \u7b2c167\u56de \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u5de5\u5b66\u7814\u7a76\u4f1a @ \u56fd\u7acb\u60c5\u5831\u5b66\u7814\u7a76\u6240 Mar 18-19 2010.<\/li>\n\n\n\t\n\n<li class=\"coauthor\"><b>[\u53e3\u982d\u767a\u8868]<\/b>\n\u95a2\u6587\u8cb4, \u65e5\u9ad8\u9686\u535a, \u5c71\u672c\u664b\u4e00\u90ce, <span style=\"text-decoration: underline;\">\u5c0f\u6797\u9686\u5fd7<\/span>, \u624b\u5d8b\u8302\u6674, \u963f\u8349\u6e05\u6ecb:\n\u5236\u5fa1\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u56fa\u5b9a\u5c0f\u6570\u70b9\u6f14\u7b97\u5316\u30c4\u30fc\u30eb\u306e\u8a2d\u8a08\u3068\u5b9f\u88c5\n\u60c5\u5831\u51e6\u7406\u5b66\u4f1a \u7b2c167\u56de\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>See the publications of Prof. Kobayashi. Awards our laboratory members received are listed in the awards page.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":110,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-139","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.sa.comp.isct.ac.jp\/en\/wp-json\/wp\/v2\/pages\/139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sa.comp.isct.ac.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sa.comp.isct.ac.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sa.comp.isct.ac.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sa.comp.isct.ac.jp\/en\/wp-json\/wp\/v2\/comments?post=139"}],"version-history":[{"count":25,"href":"https:\/\/www.sa.comp.isct.ac.jp\/en\/wp-json\/wp\/v2\/pages\/139\/revisions"}],"predecessor-version":[{"id":2684,"href":"https:\/\/www.sa.comp.isct.ac.jp\/en\/wp-json\/wp\/v2\/pages\/139\/revisions\/2684"}],"up":[{"embeddable":true,"href":"https:\/\/www.sa.comp.isct.ac.jp\/en\/wp-json\/wp\/v2\/pages\/110"}],"wp:attachment":[{"href":"https:\/\/www.sa.comp.isct.ac.jp\/en\/wp-json\/wp\/v2\/media?parent=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}