default search action
Hirohisa Aman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c60]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Quantitative Investigation of Trends in Confusing Variable Pairs Through Commits: Do Confusing Variable Pairs Survive? EASE 2024: 90-99 - [c59]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Multi-attribute and Multi-label Deep Metric Learning via Pair-based and Proxy-based Losses. ICICT 2024: 57-63 - [c58]Kaoru Yokogawa, Masashi Hiroishi, Sousuke Arnasaki, Hirohisa Aman, Tomoyuki Yokogawa:
A Comparative Study on COSMIC FP Approximation with Deep Learning and Conventional Machine Learning. SERA 2024: 346-351 - [c57]Pattara Leelaprute, Yuki Kase, Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:
A Multi - Aspect Evaluation of DL-based SQLi Attack Detection Models. SERA 2024: 352-355 - [c56]Yahiro Mori, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Application of Program Slicing and CodeBERT to Distill Variables With Inappropriate Names. SERA 2024: 356-361 - 2023
- [j17]Hideyoshi Miura, Tomotaka Kimura, Hirohisa Aman, Kouji Hirata:
Game-theoretic approach to epidemic modeling of countermeasures against future malware evolution. Comput. Commun. 206: 160-171 (2023) - [j16]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Multi proxy anchor family loss for several types of gradients. Comput. Vis. Image Underst. 229: 103654 (2023) - [j15]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An automated detection of confusing variable pairs with highly similar compound names in Java and Python programs. Empir. Softw. Eng. 28(5): 108 (2023) - [j14]Kosuke Ohara, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Comparative Study of Data Collection Periods for Just-In-Time Defect Prediction Using the Automatic Machine Learning Method. IEICE Trans. Inf. Syst. 106(2): 166-169 (2023) - [j13]Sousuke Amasaki, Tomoyuki Yokogawa, Hirohisa Aman:
An Evaluation of Word Embeddings on Vulnerability Prediction with Software Metrics. WiPiEC Journal 9(2) (2023) - [c55]Yuki Fushihara, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Trend Analysis of Test Smells in Python Test Code Over Commit History. SEAA 2023: 310-314 - [c54]Ryugo Tanaka, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman, Kazutami Arimoto:
Applying Symbolic Model Checking to Node-graph Style Game Scripts with Time Constraints. GCCE 2023: 881-884 - [c53]Shinnosuke Irie, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Comparative Study of Hybrid Fault-Prone Module Prediction Models Using Association Rule and Random Forest. WSSE 2023: 33-38 - 2022
- [c52]Tenma Kitai, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Have Java Production Methods Co-Evolved With Test Methods Properly?: A Fine-Grained Repository-Based Co-Evolution Analysis. SEAA 2022: 120-124 - [c51]Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:
An Evaluation of Effort-Aware Fine-Grained Just-in-Time Defect Prediction Methods. SEAA 2022: 209-216 - [c50]Kazuma Toyota, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman, Kazutami Arimoto:
A Visual Modeling Environment for the nuXmv Model Checker Intended for Novice Users. IIAI-AAI 2022: 684-685 - [c49]Kazuki Wayama, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman, Kazutami Arimoto:
Verifying Game Logic in Unreal Engine 5 Blueprint Visual Scripting System Using Model Checking. ASE 2022: 213:1-213:8 - [c48]Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:
An Evaluation of Cross-Project Defect Prediction Approaches on Cross-Personalized Defect Prediction. PROFES 2022: 433-448 - 2021
- [c47]Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:
A Preliminary Evaluation of CPDP Approaches on Just-in-Time Software Defect Prediction. SEAA 2021: 279-286 - [c46]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Investigation of Compound Variable Names Toward Automated Detection of Confusing Variable Pairs. ASE Workshops 2021: 133-137 - [c45]Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:
Searching for Bellwether Developers for Cross-Personalized Defect Prediction. PROFES 2021: 183-198 - [c44]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Large-Scale Investigation of Local Variable Names in Java Programs: Is Longer Name Better for Broader Scope Variable? QUATIC 2021: 489-500 - [c43]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Significance of Emphasized Features for Good Representation on Deep Metric Learning. SERA 2021: 27-32 - [i1]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Multi Proxy Anchor Loss and Effectiveness of Deep Metric Learning Performance Metrics. CoRR abs/2110.03997 (2021) - 2020
- [j12]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Empirical study of abnormality in local variables and its application to fault-prone Java method analysis. J. Softw. Evol. Process. 32(4) (2020) - [c42]Masanao Asato, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization. APSEC 2020: 475-479 - [c41]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Comparative Study of Vectorization-Based Static Test Case Prioritization Methods. SEAA 2020: 80-88 - [c40]Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:
On the Effects of File-level Information on Method-level Bug Localization. SEAA 2020: 314-321 - [c39]Hayato Naito, Tomoyuki Yokogawa, Nao Igawa, Sousuke Amasaki, Hirohisa Aman, Kazutami Arimoto:
A Node-Style Visual Programming Environment for the nuXmv Model Checker. GCCE 2020: 71-75 - [c38]Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:
An exploratory study on applicability of cross project defect prediction approaches to cross-company effort estimation. PROMISE 2020: 71-80
2010 – 2019
- 2019
- [c37]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Empirical Study of Fault Introduction Focusing on the Similarity among Local Variable Names. QuASoQ@APSEC 2019: 3-11 - [c36]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Survival Analysis-Based Prioritization of Code Checker Warning: A Case Study Using PMD. BCD (selected papers) 2019: 69-83 - [c35]Shozo Saeki, Minoru Kawahara, Hirohisa Aman:
Scalable Laplacian Regularized Least Squares Classification on Anchor Graph. BCD 2019: 71-76 - [c34]Sousuke Amasaki, Tomoyuki Yokogawa, Hirohisa Aman:
Towards Better Effort Estimation with Cross-Project Defect Prediction Approaches. EASE 2019: 357-360 - [c33]Sousuke Amasaki, Hirohisa Aman, Tomoyuki Yokogawa:
A Comparative Study of Vectorization Methods on BugLocator. SEAA 2019: 236-243 - [c32]Akira Matsumoto, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman, Kazutami Arimoto:
Consistency Verification of UML Sequence Diagrams Modeling Wireless Sensor Networks. IIAI-AAI 2019: 458-461 - [c31]Sousuke Amasaki, Tomoyuki Yokogawa, Hirohisa Aman:
Applying Cross Project Defect Prediction Approaches to Cross-Company Effort Estimation. PROMISE 2019: 76-79 - 2018
- [j11]Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman, Kouji Hirata:
Stochastic modeling of self-evolving botnets with vulnerability discovery. Comput. Commun. 124: 101-110 (2018) - [j10]Akito Sunouchi, Hirohisa Aman, Minoru Kawahara:
A Quantitative Analysis on Relationship between an Early-Closed Bug and Its Amount of Clues: A Case Study of Apache Ant. IEICE Trans. Inf. Syst. 101-D(10): 2523-2525 (2018) - [j9]Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application toF ault-ProneP rogram Analysis. Int. J. Networked Distributed Comput. 6(3): 118-132 (2018) - [c30]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Doc2Vec-Based Assessment of Comments and Its Application to Change-Prone Method Analysis. APSEC 2018: 643-647 - [c29]Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Fault-Prone Source File Analysis Focusing on the Contribution Entropy in Open Source Development. BCD 2018: 7-14 - [c28]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
Empirical Analysis of Coding Standard Violation Focusing on Its Coverage and Importance. COMPSAC (1) 2018: 837-838 - [c27]Keiichiro Tashima, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Fault-Prone Java Method Analysis Focusing on Pair of Local Variables with Confusing Names. SEAA 2018: 154-158 - [c26]Hirohisa Aman, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara:
A Topic Model and Test History-Based Test Case Recommendation Method for Regression Testing. ICST Workshops 2018: 392-397 - 2017
- [j8]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
Change-Prone Java Method Prediction by Focusing on Individual Differences in Comment Density. IEICE Trans. Inf. Syst. 100-D(5): 1128-1131 (2017) - [j7]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
An Evaluation of Coding Violation Focusing on Change History and Authorship of Source File. Int. J. Networked Distributed Comput. 5(4): 211-220 (2017) - [c25]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
Investigation of Coding Violations Focusing on Authorships of Source Files. ACIT/CSII/BCD 2017: 248-253 - [c24]Yuto Miyake, Sousuke Amasaki, Tomoyuki Yokogawa, Hirohisa Aman:
An Empirical Study on Relationships between Comments and Design Properties. ACIT/CSII/BCD 2017: 254-259 - [c23]Sho Suzuki, Hirohisa Aman, Minoru Kawahara:
Empirical Study of Fault-Prone Method's Name and Implementation: Analysis on Three Prefixes-Get, Set and Be. ACIT/CSII/BCD 2017: 260-265 - [c22]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Empirical Analysis of Words in Comments Written for Java Methods. SEAA 2017: 375-379 - [c21]Sho Suzuki, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Application of the PageRank Algorithm to Commit Evaluation on Git Repository. SEAA 2017: 380-383 - [c20]Hirohisa Aman, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara:
A Test Case Recommendation Method Based on Morphological Analysis, Clustering and the Mahalanobis-Taguchi Method. ICST Workshops 2017: 29-35 - [c19]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Empirical Study of Abnormalities in Local Variables of Change-Prone Java Methods. ISSRE Workshops 2017: 214-221 - [c18]Hirohisa Aman, Aji Ery Burhandenny, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Health Index of Open Source Projects Focusing on Pareto Distribution of Developer's Contribution. IWESEP 2017: 29-34 - [c17]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Survival Analysis of Source Files Modified by New Developers. PROFES 2017: 80-88 - 2016
- [c16]Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
Local Variables with Compound Names and Comments as Signs of Fault-Prone Java Methods. QuASoQ/TDA@APSEC 2016: 4-11 - [c15]Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara:
Examination of Coding Violations Focusing on Their Change Patterns over Releases. APSEC 2016: 121-128 - [c14]Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman, Kouji Hirata:
Behavior analysis of self-evolving botnets. CITS 2016: 1-5 - [c13]Hirohisa Aman, Yuta Tanaka, Takashi Nakano, Hideto Ogasawara, Minoru Kawahara:
Application of Mahalanobis-Taguchi Method and 0-1 Programming Method to Cost-Effective Regression Testing. SEAA 2016: 240-244 - 2015
- [j6]Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki, Minoru Kawahara:
Lines of Comments as a Noteworthy Metric for Analyzing Fault-Proneness in Methods. IEICE Trans. Inf. Syst. 98-D(12): 2218-2228 (2015) - [c12]Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki, Minoru Kawahara:
Empirical Analysis of Change-Proneness in Methods Having Local Variables with Long Names and Comments. ESEM 2015: 50-53 - 2014
- [c11]Hirohisa Aman, Sousuke Amasaki, Takashi Sasaki, Minoru Kawahara:
Empirical Analysis of Fault-Proneness in Methods by Focusing on their Comment Lines. APSEC (2) 2014: 51-56 - [c10]Hirohisa Aman, Takashi Sasaki, Sousuke Amasaki, Minoru Kawahara:
Empirical analysis of comments and fault-proneness in methods: can comments point to faulty methods? ESEM 2014: 63:1 - [c9]Hirohisa Aman, Akiko Yamashita, Takashi Sasaki, Minoru Kawahara:
Multistage Growth Model for Code Change Events in Open Source Software Development: An Example Using Development of Nagios. EUROMICRO-SEAA 2014: 207-212 - 2013
- [c8]Hirohisa Aman:
0-1 Programming Model-Based Method for Planning Code Review Using Bug Fix History. APSEC (2) 2013: 37-42 - [c7]Hirohisa Aman, Manami Sasaki, Kei Kureishi, Hideto Ogasawara:
Application of the 0-1 Programming Model for Cost-Effective Regression Test. COMPSAC 2013: 720-721 - 2012
- [j5]Myrizki Sandhi Yudha, Ryohei Asano, Hirohisa Aman:
A Feature Analysis of Co-changed Code Clone by Using Clone Metrics. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(9): 1498-1500 (2012) - [c6]Hirohisa Aman:
An Empirical Analysis of the Impact of Comment Statements on Fault-Proneness of Small-Size Module. APSEC 2012: 362-367 - [c5]Hirohisa Aman:
An Empirical Analysis on Fault-Proneness of Well-Commented Modules. IWESEP 2012: 3-9 - 2011
- [c4]Hirohisa Aman:
A Proposal of NHPP-Based Method for Predicting Code Change in Open Source Development. IWSM/Mensura 2011: 38-47
2000 – 2009
- 2008
- [c3]Hirohisa Aman, Hirokazu Okazaki:
Impact of Comment Statement on Code Stability in Open Source Development. JCKBSE 2008: 415-419 - 2006
- [j4]Hirohisa Aman, Naomi Mochiduki, Hiroyuki Yamada:
A Model for Detecting Cost-Prone Classes Based on Mahalanobis-Taguchi Method. IEICE Trans. Inf. Syst. 89-D(4): 1347-1358 (2006) - [c2]Hirohisa Aman, Hirokazu Okazaki, Hiroyuki Yamada:
An Effect of Comment Statements on Source Code Corrective Maintenance. JCKBSE 2006: 135-138 - 2005
- [j3]Hirohisa Aman, Naomi Mochiduki, Hiroyuki Yamada, Matu-Tarow Noda:
A Simple Predictive Method for Discriminating Costly Classes Using Class Size Metric. IEICE Trans. Inf. Syst. 88-D(6): 1284-1288 (2005) - [j2]Eddy Cizeron, Hirohisa Aman, Hiroshi Kai, Matu-Tarow Noda:
Security Flaw in SAS-2 Protocol. IEICE Trans. Commun. 88-B(10): 4081-4082 (2005) - 2004
- [j1]Hirohisa Aman, Kenji Yamasaki, Hiroyuki Yamada, Matu-Tarow Noda:
A Class Cohesion Metric Focusing on Cohesive-Part Size. IEICE Trans. Inf. Syst. 87-D(4): 838-848 (2004)
1990 – 1999
- 1999
- [c1]Kazunori Miyamoto, Hirohisa Aman, Torao Yanaru, Masahiro Nagamatsu:
Symbolized particles store type neuron model and its application. IJCNN 1999: 483-487
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint