default search action
Norihiro Yoshida
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i5]Wenqing Zhu, Norihiro Yoshida, Toshihiro Kamiya, Eunjong Choi, Hiroaki Takada:
Development and Benchmarking of Multilingual Code Clone Detector. CoRR abs/2409.06176 (2024) - 2023
- [c58]Kazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Joji Okada, Yoshiki Higo:
Cost-Benefit Analysis for Modernizing a Large-Scale Industrial System. APSEC 2023: 441-449 - [c57]Eunjong Choi, Norihiro Fuke, Yuji Fujiwara, Norihiro Yoshida, Katsuro Inoue:
Investigating the Generalizability of Deep Learning-based Clone Detectors. ICPC 2023: 181-185 - [i4]Junyu Chen, Norihiro Yoshida, Hiroaki Takada:
An investigation of licensing of datasets for machine learning based on the GQM model. CoRR abs/2303.13735 (2023) - 2022
- [j13]Norihiro Yoshida:
Editor's Message to Special Issue of Software Engineering. J. Inf. Process. 30: 293 (2022) - [c56]Wenqing Zhu, Norihiro Yoshida, Toshihiro Kamiya, Eunjong Choi, Hiroaki Takada:
MSCCD: grammar pluggable clone detection based on ANTLR parser generation. ICPC 2022: 460-470 - [i3]Wenqing Zhu, Norihiro Yoshida, Toshihiro Kamiya, Eunjong Choi, Hiroaki Takada:
MSCCD: Grammar Pluggable Clone Detection Based on ANTLR Parser Generation. CoRR abs/2204.01028 (2022) - 2021
- [c55]Norihiro Yoshida, Takahiro Shimizu, Ryota Yamamoto, Hiroaki Takada:
Extracting a Micro State Transition Table Using the KLEE Symbolic Execution Engine. APSEC 2021: 570-571 - [p1]Norihiro Yoshida, Eunjong Choi:
Clone Evolution and Management. Code Clone Analysis 2021: 197-208 - [i2]Kentaro Ohno, Norihiro Yoshida, Wenqing Zhu, Hiroaki Takada:
On the Effectiveness of Clone Detection for Detecting IoT-related Vulnerable Clones. CoRR abs/2110.10493 (2021) - 2020
- [c54]Erina Makihara, Hiroshi Igaki, Norihiro Yoshida, Kenji Fujiwara, Hajimu Iida:
Understanding Build Errors in Agile Software Development Project-Based Learning. APSEC 2020: 306-315 - [c53]Natsuki Tsuzuki, Norihiro Yoshida, Koji Toda, Kenji Fujiwara, Ryota Yamamoto, Hiroaki Takada:
A Quantitative Comparison of Coverage-Based Greybox Fuzzers. AST@ICSE 2020: 89-92 - [c52]Ryu Miyaki, Norihiro Yoshida, Natsuki Tsuzuki, Ryota Yamamoto, Hiroaki Takada:
Fuzz4B: a front-end to AFL not only for fuzzing experts. A-TEST@ESEC/SIGSOFT FSE 2020: 17-20 - [c51]Shogo Tokui, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
Clone Notifier: Developing and Improving the System to Notify Changes of Code Clones. SANER 2020: 642-646
2010 – 2019
- 2019
- [c50]Norihiro Yoshida, Seiya Numata, Eunjong Choi, Katsuro Inoue:
Proactive clone recommendation system for extract method refactoring. IWOR@ICSE 2019: 67-70 - [c49]Hirotaka Honda, Shogo Tokui, Kazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
CCEvovis: a clone evolution visualization system for software maintenance. ICPC 2019: 122-125 - [c48]Yuji Fujiwara, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
Code-to-Code Search Based on Deep Neural Network and Code Mutation. IWSC 2019: 1-7 - 2018
- [j12]Reishi Yokomori, Norihiro Yoshida, Masami Noro, Katsuro Inoue:
Changes of Evaluation Values on Component Rank Model by Taking Code Clones into Consideration. IEICE Trans. Inf. Syst. 101-D(1): 130-141 (2018) - [c47]Reishi Yokomori, Norihiro Yoshida, Masami Noro, Katsuro Inoue:
Use-Relationship Based Classification for Software Components. QuASoQ@APSEC 2018: 59-66 - [c46]Eunjong Choi, Daiki Tanaka, Norihiro Yoshida, Kenji Fujiwara, Daniel Port, Hajimu Iida:
An Investigation of the Relationship between Extract Method and Change Metrics: A Case Study of JEdit. APSEC 2018: 653-657 - [c45]Yuichi Semura, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
Multilingual Detection of Code Clones Using ANTLR Grammar Definitions. APSEC 2018: 673-677 - [c44]Kazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
Investigating Vector-Based Detection of Code Clones Using BigCloneBench. APSEC 2018: 699-700 - [c43]Erina Makihara, Hiroshi Igaki, Norihiro Yoshida, Kenji Fujiwara, Naoki Kawashima, Hajimu Iida:
A multi-year analysis of students' build errors in agile software development educational projects. ICSE (Companion Volume) 2018: 161-162 - [c42]Norihiro Yoshida, Takuya Ishizu, Bufurod Edwards, Katsuro Inoue:
How slim will my system be?: estimating refactored code size by merging clones. ICPC 2018: 352-360 - [c41]Ryota Yamamoto, Norihiro Yoshida, Hiroaki Takada:
Towards static recovery of micro state transitions from legacy embedded code. WASPI@ESEC/SIGSOFT FSE 2018: 1-4 - [i1]Eunjong Choi, Kenji Fujiwara, Norihiro Yoshida, Shinpei Hayashi:
A Survey of Refactoring Detection Techniques Based on Change History Analysis. CoRR abs/1808.02320 (2018) - 2017
- [c40]Yuichi Semura, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
CCFinderSW: Clone Detection Tool with Flexible Multilingual Tokenization. APSEC 2017: 654-659 - [c39]Katsuhisa Maruyama, Shinpei Hayashi, Norihiro Yoshida, Eunjong Choi:
Frame-based behavior preservation in refactoring. SANER 2017: 573-574 - 2016
- [j11]Xin Yang, Norihiro Yoshida, Raula Gaikovina Kula, Hajimu Iida:
Peer Review Social Network (PeRSoN) in Open Source Projects. IEICE Trans. Inf. Syst. 99-D(3): 661-670 (2016) - [c38]Norihiro Yoshida:
When, Why and for Whom do Practitioners Detect Technical Debt? An Experience Report. QuASoQ/TDA@APSEC 2016: 64-67 - [c37]Erina Makihara, Hiroshi Igaki, Norihiro Yoshida, Kenji Fujiwara, Hajimu Iida:
Detecting exploratory programming behaviors for introductory programming exercises. ICPC 2016: 1-4 - [c36]Norihiro Yoshida, Tsubasa Saika, Eunjong Choi, Ali Ouni, Katsuro Inoue:
Revisiting the relationship between code smells and refactoring. ICPC 2016: 1-4 - [c35]Shogo Tsutsumi, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
Graph-based approach for detecting impure refactoring from version commits. IWoR@ASE 2016: 13-16 - [c34]Xin Yang, Raula Gaikovina Kula, Norihiro Yoshida, Hajimu Iida:
Mining the modern code review repositories: a dataset of people, process and product. MSR 2016: 460-463 - [c33]Seiya Numata, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
On the Effectiveness of Vector-Based Approach for Supporting Simultaneous Editing of Software Clones. PROFES 2016: 560-567 - [c32]Tsubasa Saika, Eunjong Choi, Norihiro Yoshida, Shusuke Haruna, Katsuro Inoue:
Do Developers Focus on Severe Code Smells? PPAP@SANER 2016: 1-3 - [c31]Yusuke Saito, Kenji Fujiwara, Hiroshi Igaki, Norihiro Yoshida, Hajimu Iida:
How do GitHub Users Feel with Pull-Based Development? IWESEP@SANER 2016: 7-11 - [c30]Yuta Nakamura, Eunjong Choi, Norihiro Yoshida, Shusuke Haruna, Katsuro Inoue:
Towards Detection and Analysis of Interlanguage Clones for Multilingual Web Applications. IWSC 2016: 17-18 - [c29]Reishi Yokomori, Norihiro Yoshida, Masami Noro, Katsuro Inoue:
Extensions of Component Rank Model by Taking into Account for Clone Relations. IWSC 2016: 30-36 - 2015
- [j10]Eunjong Choi, Norihiro Yoshida, Yoshiki Higo, Katsuro Inoue:
Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files. IEICE Trans. Inf. Syst. 98-D(2): 325-333 (2015) - [c28]Eunjong Choi, Norihiro Yoshida, Raula Gaikovina Kula, Katsuro Inoue:
What do practitioners ask about code clone? a preliminary investigation of stack overflow. IWSC 2015: 49-50 - [c27]Patanamon Thongtanunam, Chakkrit Tantithamthavorn, Raula Gaikovina Kula, Norihiro Yoshida, Hajimu Iida, Ken-ichi Matsumoto:
Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review. SANER 2015: 141-150 - 2014
- [j9]Takuya Moriwaki, Hiroshi Igaki, Yuki Yamanaka, Norihiro Yoshida, Shinji Kusumoto, Katsuro Inoue:
Towards an Analysis of Who Creates Clone and Who Reuses it. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 63 (2014) - [j8]Norihiro Yoshida, Eunjong Choi, Yuki Yamanaka, Katsuro Inoue:
How We Know the Practical Impact of Clone Analysis. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 63 (2014) - [j7]Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
An Investigation into the Characteristics of Merged Code Clones during Software Evolution. IEICE Trans. Inf. Syst. 97-D(5): 1244-1253 (2014) - [j6]Pei Xia, Makoto Matsushita, Norihiro Yoshida, Katsuro Inoue:
Studying Reuse of Out-dated Third-party Code in Open Source Projects. Inf. Media Technol. 9(2): 155-161 (2014) - [c26]Patanamon Thongtanunam, Raula Gaikovina Kula, Ana Erika Camargo Cruz, Norihiro Yoshida, Hajimu Iida:
Improving code review effectiveness through reviewer recommendations. CHASE 2014: 119-122 - [c25]Patanamon Thongtanunam, Xin Yang, Norihiro Yoshida, Raula Gaikovina Kula, Ana Erika Camargo Cruz, Kenji Fujiwara, Hajimu Iida:
ReDA: A Web-Based Visualization Tool for Analyzing Modern Code Review Dataset. ICSME 2014: 605-608 - [c24]Tsubasa Saika, Eunjong Choi, Norihiro Yoshida, Akira Goto, Shusuke Haruna, Katsuro Inoue:
What Kinds of Refactorings are Co-Occurred? An Analysis of Eclipse Usage Datasets. IWESEP 2014: 31-36 - [c23]Manamu Sano, Eunjong Choi, Norihiro Yoshida, Yuki Yamanaka, Katsuro Inoue:
Supporting clone analysis with tag cloud visualization. InnoSWDev@SIGSOFT FSE 2014: 94-99 - 2013
- [j5]Patanamon Thongtanunam, Raula Gaikovina Kula, Ana Erika Camargo Cruz, Norihiro Yoshida, Kohei Ichikawa, Hajimu Iida:
Mining History of Gamification Towards Finding Expertise in Question and Answering Communities: Experience and Practice with Stack Exchange. Rev. Socionetwork Strateg. 7(2): 115-130 (2013) - [j4]Raula Gaikovina Kula, Kyohei Fushida, Norihiro Yoshida, Hajimu Iida:
Micro process analysis of maintenance effort: an open source software case study using metrics based on program slicing. J. Softw. Evol. Process. 25(9): 935-955 (2013) - [c22]Akira Goto, Norihiro Yoshida, Masakazu Ioka, Eunjong Choi, Katsuro Inoue:
Method differentiator using slice-based cohesion metrics. AOSD (Companion) 2013: 11-14 - [c21]Tetsuo Yamamoto, Norihiro Yoshida, Yoshiki Higo:
Seamless Code Reuse with Source Code Corpus. APSEC (2) 2013: 31-36 - [c20]Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano:
Applying clone change notification system into an industrial development process. ICPC 2013: 199-206 - [c19]Akira Goto, Norihiro Yoshida, Masakazu Ioka, Eunjong Choi, Katsuro Inoue:
How to extract differences from similar programs? A cohesion metric approach. IWSC 2013: 23-29 - [c18]Kazuki Hamasaki, Raula Gaikovina Kula, Norihiro Yoshida, Ana Erika Camargo Cruz, Kenji Fujiwara, Hajimu Iida:
Who does what during a code review? datasets of OSS peer review repositories. MSR 2013: 49-52 - [c17]Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
Active support for clone refactoring: a perspective. WRT@SPLASH 2013: 13-16 - [c16]Kenji Fujiwara, Kyohei Fushida, Norihiro Yoshida, Hajimu Iida:
Assessing Refactoring Instances and the Maintainability Benefits of Them from Version Archives. PROFES 2013: 313-323 - 2012
- [j3]Pei Xia, Yuki Manabe, Norihiro Yoshida, Katsuro Inoue:
Development of a Code Clone Search Tool for Open Source Repositories. Inf. Media Technol. 7(4): 1370-1376 (2012) - [j2]Dotri Quoc, Kazuo Kobori, Norihiro Yoshida, Yoshiki Higo, Katsuro Inoue:
ModiChecker: Accessibility Excessiveness Analysis Tool for Java Program. Inf. Media Technol. 7(4): 1401-1407 (2012) - [c15]Raula Gaikovina Kula, Kyohei Fushida, Norihiro Yoshida, Hajimu Iida:
Experimental Study of Quantitative Analysis of Maintenance Effort Using Program Slicing-Based Metrics. APSEC Workshops 2012: 50-57 - [c14]Norihiro Yoshida, Yoshiki Higo, Shinji Kusumoto, Katsuro Inoue:
An Experience Report on Analyzing Industrial Software Systems Using Code Clone Detection Techniques. APSEC 2012: 310-313 - [c13]Xin Yang, Raula Gaikovina Kula, Ana Erika Camargo Cruz, Norihiro Yoshida, Kazuki Hamasaki, Kenji Fujiwara, Hajimu Iida:
Understanding OSS Peer Review Roles in Peer Review Social Network (PeRSoN). APSEC 2012: 709-712 - [c12]Norihiro Yoshida, Masataka Kinoshita, Hajimu Iida:
A Cohesion Metric Approach to Dividing Source Code into Functional Segments to Improve Maintainability. CSMR 2012: 365-370 - [c11]Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
What kind of and how clones are refactored?: a case study of three OSS projects. WRT@ICSE 2012: 1-7 - [c10]Raula Gaikovina Kula, Carmago Cruz Ana E., Norihiro Yoshida, Kazuki Hamasaki, Kenji Fujiwara, Xin Yang, Hajimu Iida:
Using Profiling Metrics to Categorise Peer Review Types in the Android Project. ISSRE Workshops 2012: 146-151 - [c9]Kenji Fujiwara, Kyohei Fushida, Haruaki Tamada, Hiroshi Igaki, Norihiro Yoshida:
Why Novice Programmers Fall into a Pitfall?: Coding Pattern Analysis in Programming Exercise. IWESEP 2012: 46-51 - [c8]Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano:
Industrial application of clone change management system. IWSC 2012: 67-71 - [c7]Katsuro Inoue, Yoshiki Higo, Norihiro Yoshida, Eunjong Choi, Shinji Kusumoto, Kyonghwan Kim, Wonjin Park, Eunha Lee:
Experience of finding inconsistently-changed bugs in code clones of mobile software. IWSC 2012: 94-95 - 2011
- [c6]Reishi Yokomori, Harvey P. Siy, Norihiro Yoshida, Masami Noro, Katsuro Inoue:
Measuring the effects of aspect-oriented refactoring on component relationships: two case studies. AOSD 2011: 215-226 - [c5]Eunjong Choi, Norihiro Yoshida, Takashi Ishio, Katsuro Inoue, Tateki Sano:
Extracting code clones for refactoring using combinations of clone metrics. IWSC 2011: 7-13 - [c4]Yu Kashima, Yasuhiro Hayase, Norihiro Yoshida, Yuki Manabe, Katsuro Inoue:
An Investigation into the Impact of Software Licenses on Copy-and-paste Reuse among OSS Projects. WCRE 2011: 28-32 - 2010
- [j1]Yosuke Tatekura, Norihiro Yoshida:
Reference signal extraction under a noisy environment for a semi-adaptive sound reproduction system. IEICE Electron. Express 7(9): 583-588 (2010) - [c3]Norihiro Yoshida, Takeshi Hattori, Katsuro Inoue:
Finding similar defects using synonymous identifier retrieval. IWSC 2010: 49-56
2000 – 2009
- 2008
- [c2]Norihiro Yoshida, Takashi Ishio, Makoto Matsushita, Katsuro Inoue:
Retrieving similar code fragments based on identifier similarity for defect detection. DEFECTS 2008: 41-42 - 2005
- [c1]Norihiro Yoshida, Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue:
On Refactoring Support Based on Code Clone Dependency Relation. IEEE METRICS 2005: 16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-14 23:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint