default search action
Haruhiko Kaiya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Haruhiko Kaiya, Shinpei Ogata, Shinpei Hayashi:
Evaluating Introduction of Systems by Goal Dependency Modeling. IEICE Trans. Inf. Syst. 107(10): 1297-1311 (2024) - 2023
- [c96]Haruhiko Kaiya, Hironori Takeuchi, Hiroyuki Nakagawa, Shinpei Ogata, Shinobu Saito:
Finding Contributable Activities Using Non-Verb Attributes In Events. KES 2023: 507-516 - [c95]Hironori Takeuchi, Haruhiko Kaiya, Hiroyuki Nakagawa, Shinpei Ogata:
Practice-based Collection of Bad Smells in Machine Learning Projects. KES 2023: 517-526 - 2022
- [c94]Shinpei Ogata, Hiroyuki Nakagawa, Haruhiko Kaiya, Hironori Takeuchi:
A Study on Analyzing Learner Behaviors in State Machine Modeling Using Process Mining and Statistical Test. JCKBSE 2022: 141-153 - [c93]Takao Okubo, Haruhiko Kaiya:
Efficient secure DevOps using process mining and Attack Defense Trees. KES 2022: 446-455 - [c92]Haruhiko Kaiya, Tomoya Misawa, Shinpei Ogata, Shinobu Saito, Hiroyuki Nakagawa, Hironori Takeuchi:
A Proposal to Find Mutually Contributable Business or Life Activities Using Conformance Checking. KES 2022: 542-551 - 2021
- [j19]Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Takehisa Kato, Hideyuki Kanuka, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development. Int. J. Syst. Softw. Secur. Prot. 12(2): 68-85 (2021) - [j18]Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G. Priyalakshmi:
Systematic Literature Review of Security Pattern Research. Inf. 12(1): 36 (2021) - [c91]Hironori Takeuchi, Haruhiko Kaiya, Hiroyuki Nakagawa, Shinpei Ogata:
Reference Model for Agile Development of Machine Learning-based Service Systems. APSEC Workshops 2021: 17-20 - [c90]Haruhiko Kaiya, Kouta Hayashi, Yu Sato:
Tools for logging and analyzing goal dependency modeling. KES 2021: 1639-1648 - 2020
- [c89]Haruhiko Kaiya:
Quantitative Analysis of Goal Oriented Requirements Models. JCKBSE 2020: 1-6 - [c88]Haruhiko Kaiya, Wataru Fujita, Ryotaro Yamada, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling. JCKBSE 2020: 70-83 - [c87]Haruhiko Kaiya:
Evaluating Mutual Requirements Evolution of Several Information Systems. KES 2020: 1251-1260 - [c86]Haruhiko Kaiya, Shogo Tatsui, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
A Tool to Manage Traceability on Several Models and Its Use Case. KES 2020: 1449-1458
2010 – 2019
- 2019
- [c85]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT patterns. SERP4IoT@ICSE 2019: 57-60 - [c84]Haruhiko Kaiya, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki:
Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques. KES 2019: 1075-1084 - [c83]Haruhiko Kaiya, Ryoya Muto, Kaito Nagano, Mizuki Yoshida:
Mutual requirements evolution by combining different information systems. PCI 2019: 159-162 - [c82]Atsuo Hazeyama, Hikaru Miyahara, Takafumi Tanaka, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo, Nobukazu Yoshioka:
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base. RE Workshops 2019: 134-140 - [i1]Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernández:
Landscape of IoT Patterns. CoRR abs/1902.09718 (2019) - 2018
- [c81]Hua Cai, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes. WESPr-iMLSE@APSEC 2018: 18-25 - [c80]Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka:
Security Requirement Modeling Support System Using Software Security Knowledge Base. COMPSAC (2) 2018: 234-239 - [c79]Haruhiko Kaiya, Kazuhiko Adachi, Yoshihide Chubachi:
Requirements Exploration by Comparing and Combining Models of Different Information Systems. JCKBSE 2018: 64-74 - [c78]Yukiya Yazawa, Shinpei Ogata, Kozo Okano, Haruhiko Kaiya, Hironori Washizaki:
Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model. JCKBSE 2018: 158-167 - [c77]Haruhiko Kaiya:
Meta-Requirements for Information System Requirements: Lesson Learned from Software Ecosystem Researches. KES 2018: 1243-1252 - [c76]Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernández, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama:
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services. MODELSWARD 2018: 379-386 - 2017
- [j17]Yijun Yu, Haruhiko Kaiya, Nobukazu Yoshioka, Zhenjiang Hu, Hironori Washizaki, Yingfei Xiong, Amin Hosseinian Far:
Goal Modelling for Security Problem Matching and Pattern Enforcement. Int. J. Secur. Softw. Eng. 8(3): 42-57 (2017) - [c75]Haruhiko Kaiya, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata, Takafumi Tanaka:
Eliciting Requirements for Improving Users' Behavior Using Transparency. APRES 2017: 41-56 - [c74]Yoshihide Chubachi, Haruhiko Kaiya:
Identifying Fundamental Goals from Objects in a Scenario to Facilitate System Introduction. COMPSAC (2) 2017: 276-277 - [c73]Yukiya Yazawa, Shinpei Ogata, Kozo Okano, Haruhiko Kaiya, Hironori Washizaki:
Traceability Link Mining - Focusing on Usability. COMPSAC (2) 2017: 286-287 - [c72]Yoshihide Chubachi, Haruhiko Kaiya:
Generalizing and composing goals and objects in a scenario together for requirements analysis. IISA 2017: 1-6 - [c71]Haruhiko Kaiya, Ryohei Sato, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Takafumi Tanaka, Nobukazu Yoshioka, Hironori Washizaki:
Preliminary Systematic Literature Review of Software and Systems Traceability. KES 2017: 1141-1150 - [c70]Haruhiko Kaiya, Kazuto Haga:
A CASE tool for Goal Dependency Model with Attributes based on An Existing UML Editor. KES 2017: 1196-1205 - 2016
- [j16]Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Implementation Support of Security Design Patterns Using Test Templates . Inf. 7(2): 34 (2016) - [c69]Haruhiko Kaiya:
Modelling Goal Dependencies and Domain Model Together. KES 2016: 791-800 - [c68]Atsuo Hazeyama, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo:
Literature Survey on Technologies for Developing Privacy-Aware Software. RE Workshops 2016: 86-91 - [c67]Hironori Washizaki, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Takehisa Kato, Shinpei Ogata, Haruhiko Kaiya, Eduardo B. Fernández, Hideyuki Kanuka, Yuki Kondo, Nobukazu Yoshioka, Takao Okubo, Atsuo Hazeyama:
A Metamodel for Security and Privacy Knowledge in Cloud Services. SERVICES 2016: 142-143 - [c66]Haruhiko Kaiya, Shinpei Ogata, Shinpei Hayashi, Motoshi Saeki:
Early Requirements Analysis for a Socio-Technical System Based on Goal Dependencies. SoMeT 2016: 125-138 - [c65]Haruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Atsuo Hazeyama:
Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models. SoMeT 2016: 155-166 - 2015
- [c64]Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo:
Case Base for Secure Software Development Using Software Security Knowledge Base. COMPSAC Workshops 2015: 97-103 - [c63]Wataru Inoue, Shinpei Hayashi, Haruhiko Kaiya, Motoshi Saeki:
Multi-dimensional Goal Refinement in Goal-Oriented Requirements Engineering. ICSOFT-EA 2015: 185-195 - [c62]Shinpei Hayashi, Wataru Inoue, Haruhiko Kaiya, Motoshi Saeki:
Annotating Goals with Concerns in Goal-Oriented Requirements Engineering. ICSOFT (Selected Papers) 2015: 269-286 - [c61]Takanori Kobashi, Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya:
TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing. ICST 2015: 1-8 - [c60]Masahito Saito, Atsuo Hazeyama, Nobukazu Yoshioka, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo:
A Case-based Management System for Secure Software Development Using Software Security Knowledge. KES 2015: 1092-1100 - 2014
- [j15]Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takao Okubo, Yoshiaki Fukazawa:
Validating Security Design Pattern Applications by Testing Design Models. Int. J. Secur. Softw. Eng. 5(4): 1-30 (2014) - [j14]Takao Okubo, Kenji Taguchi, Haruhiko Kaiya, Nobukazu Yoshioka:
MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals. J. Inf. Process. 22(3): 536-546 (2014) - [c59]Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Verifying Implementation of Security Design Patterns Using a Test Template. ARES 2014: 178-183 - [c58]Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya:
Requirements Refinement and Exploration of Architecture for Security and Other NFRs. CAiSE Workshops 2014: 286-298 - [c57]Haruhiko Kaiya, Sho Kono, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Kenji Kaijiri:
Security Requirements Analysis Using Knowledge in CAPEC. CAiSE Workshops 2014: 343-348 - [c56]Takao Okubo, Nobukazu Yoshioka, Haruhiko Kaiya:
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View. HASE 2014: 201-205 - [c55]Takao Okubo, Yoshio Kakizaki, Takanori Kobashi, Hironori Washizaki, Shinpei Ogata, Haruhiko Kaiya, Nobukazu Yoshioka:
Security and Privacy Behavior Definition for Behavior Driven Development. PROFES 2014: 306-309 - 2013
- [j13]Motoshi Saeki, Shinpei Hayashi, Haruhiko Kaiya:
Enhancing Goal-Oriented Security Requirements Analysis using Common Criteria-Based Knowledge. Int. J. Softw. Eng. Knowl. Eng. 23(5): 695-720 (2013) - [j12]Haruhiko Kaiya, Junya Sakai, Shinpei Ogata, Kenji Kaijiri:
Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment. Int. J. Secur. Softw. Eng. 4(3): 42-63 (2013) - [c54]Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa:
Validating Security Design Patterns Application Using Model Testing. ARES 2013: 62-71 - [c53]Haruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata, Kenji Kaijiri, Nobukazu Yoshioka:
Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities. CAiSE Workshops 2013: 478-489 - 2012
- [j11]Shinpei Hayashi, Daisuke Tanabe, Haruhiko Kaiya, Motoshi Saeki:
Impact Analysis on an Attributed Goal Graph. IEICE Trans. Inf. Syst. 95-D(4): 1012-1020 (2012) - [j10]Takako Nakatani, Narihito Kondo, Junko Shirogane, Haruhiko Kaiya, Shouzo Hori, Keiichi Katamine:
Toward the Decision Tree for Inferring Requirements Maturation Types. IEICE Trans. Inf. Syst. 95-D(4): 1021-1030 (2012) - [j9]Haruhiko Kaiya, Atsushi Ohnishi:
Finding Incorrect and Missing Quality Requirements Definitions Using Requirements Frame. IEICE Trans. Inf. Syst. 95-D(4): 1031-1043 (2012) - [j8]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns. Int. J. Secur. Softw. Eng. 3(1): 37-61 (2012) - [c52]Haruhiko Kaiya, Shunsuke Morita, Shinpei Ogata, Kenji Kaijiri, Shinpei Hayashi, Motoshi Saeki:
Model Transformation Patterns for Introducing Suitable Information Systems. APSEC 2012: 434-439 - [c51]Haruhiko Kaiya, Shunsuke Morita, Kenji Kaijiri, Shinpei Hayashi, Motoshi Saeki:
Facilitating Business Improvement by Information Systems using Model Transformation and Metrics. CAiSE Forum 2012: 106-113 - [c50]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model. COMPSAC Workshops 2012: 367-372 - [c49]Haruhiko Kaiya, Atsushi Ohnishi:
Improving Software Quality Requirements Specifications Using Spectrum Analysis. COMPSAC Workshops 2012: 379-384 - [c48]Masahiro Umemura, Haruhiko Kaiya, Shinpei Ogata, Kenji Kaijiri:
Validating Quality Requirements Considerations in a Design Document using Spectrum Analysis. JCKBSE 2012: 88-97 - 2011
- [c47]Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka:
Effective Security Impact Analysis with Patterns for Software Enhancement. ARES 2011: 527-534 - [c46]Haruhiko Kaiya, Kenichiro Hara, Kyotaro Kobayashi, Akira Osada, Kenji Kaijiri:
Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques. COMPSAC Workshops 2011: 327-334 - [c45]Haruhiko Kaiya, Shunichi Suzuki, Toru Ogawa, Masaaki Tanigawa, Masahiro Umemura, Kenji Kaijiri:
Spectrum Analysis for Software Quality Requirements Using Analyses Records. COMPSAC Workshops 2011: 500-503 - [c44]Haruhiko Kaiya, Atsushi Ohnishi:
Quality Requirements Analysis Using Requirements Frames. QSIC 2011: 198-207 - 2010
- [j7]Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato, Akira Osada, Kenji Kaijiri:
Improving Reliability of Spectrum Analysis for Software Quality Requirements Using TCM. IEICE Trans. Inf. Syst. 93-D(4): 702-712 (2010) - [c43]Haruhiko Kaiya, Yuutarou Shimizu, Hirotaka Yasui, Kenji Kaijiri, Motoshi Saeki:
Enhancing Domain Knowledge for Requirements Elicitation with Web Mining. APSEC 2010: 3-12 - [c42]Haruhiko Kaiya, Kasuhisa Amemiya, Yuutarou Shimizu, Kenji Kaijiri:
Towards an Integrated Support for Traceability of Quality Requirements using Software Spectrum Analysis. ICSOFT (2) 2010: 187-194 - [c41]Motoshi Saeki, Shinpei Hayashi, Haruhiko Kaiya:
An Integrated Support for Attributed Goal-Oriented Requirements Analysis Method and its Implementation. QSIC 2010: 357-360
2000 – 2009
- 2009
- [c40]Ryo Hasegawa, Motohiro Kitamura, Haruhiko Kaiya, Motoshi Saeki:
Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling. APCCM 2009: 87-96 - [c39]Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato, Kenji Kaijiri:
Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map. CAiSE 2009: 546-560 - [c38]Motoshi Saeki, Haruhiko Kaiya, Satoshi Hattori:
Applying a Model Checker to Check Regulatory Compliance of Use Case Models. CAiSE Forum 2009 - [c37]Motoshi Saeki, Haruhiko Kaiya, Satoshi Hattori:
Checking Regulatory Compliance of Business Processes and Information Systems. ICSOFT (Selected Papers) 2009: 71-84 - [c36]Motoshi Saeki, Haruhiko Kaiya, Satoshi Hattori:
Detecting Regulatory Vulnerability in Functional Requirements Specifications. ICSOFT (1) 2009: 105-114 - [c35]Motoshi Saeki, Shinpei Hayashi, Haruhiko Kaiya:
A Tool for Attributed Goal-Oriented Requirements Analysis. ASE 2009: 674-676 - [c34]Shunichi Suzuki, Akira Osada, Tomonori Sato, Haruhiko Kaiya, Masaaki Tanigawa, Kenji Kaijiri:
A systematic method for generating quality requirements spectrum. SAC 2009: 399-400 - 2008
- [j6]Haruhiko Kaiya, Akira Osada, Kenji Kaijiri:
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems. IEICE Trans. Inf. Syst. 91-D(4): 897-906 (2008) - [c33]Motoshi Saeki, Haruhiko Kaiya:
Supporting the Elicitation of Requirements Compliant with Regulations. CAiSE 2008: 228-242 - [c32]Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong, Zhenjiang Hu, Nobukazu Yoshioka:
Enforcing a security pattern in stakeholder goal models. QoP 2008: 9-14 - [c31]Naoyuki Kitazawa, Akira Osada, Kazuyuki Kamijo, Haruhiko Kaiya, Kenji Kaijiri:
So/M: A Requirements Definition Tool Using Characteristics of Existing Similar Systems. COMPSAC 2008: 255-262 - [c30]Motoshi Saeki, Haruhiko Kaiya:
Measuring Characteristics of Models and Model Transformations Using Ontology and Graph Rewriting Techniques. ENASE (Selected Papers) 2008: 3-16 - [c29]Motoshi Saeki, Haruhiko Kaiya:
Metrics for a Model Driven Development Context. ENASE 2008: 13-22 - [c28]Motoshi Saeki, Haruhiko Kaiya:
Security Requirements Elicitation Using Method Weaving and Common Criteria. MoDELS (Workshops) 2008: 185-196 - [c27]Motoshi Saeki, Haruhiko Kaiya:
Using Common Criteria as Reusable Knowledge in Security Requirements Elicitation. MODSEC@MoDELS 2008 - [c26]Shinya Watanabe, Haruhiko Kaiya, Kenji Kaijiri:
Adapting a fault prediction model to allow inter languagereuse. PROMISE@ICSE 2008: 19-24 - [c25]Daisuke Tanabe, Kohei Uno, Kinji Akemine, Takashi Yoshikawa, Haruhiko Kaiya, Motoshi Saeki:
Supporting Requirements Change Management in Goal Oriented Analysis. RE 2008: 3-12 - [c24]Haruhiko Kaiya, Tomonori Sato, Akira Osada, Naoyuki Kitazawa, Kenji Kaijiri:
Toward quality requirements analysis based on domain specific quality spectrum. SAC 2008: 596-601 - [c23]Akira Osada, Daigo Ozawa, Naoyuki Kitazawa, Haruhiko Kaiya, Kenji Kaijiri:
Proposing metrics of difficulty of domain knowledge using usecase diagrams. SAC 2008: 624-629 - 2007
- [c22]Motoshi Saeki, Haruhiko Kaiya:
Measuring Model Transformation in Model Driven Development. CAiSE Forum 2007 - [c21]Masayuki Shibaoka, Haruhiko Kaiya, Motoshi Saeki:
GOORE : Goal-Oriented and Ontology Driven Requirements Elicitation Method. ER Workshops 2007: 225-234 - [c20]Motohiro Kitamura, Ryo Hasegawa, Haruhiko Kaiya, Motoshi Saeki:
An Integrated Tool for Supporting Ontology Driven Requirements Elicitation. ICSOFT (SE) 2007: 73-80 - [c19]Motohiro Kitamura, Ryo Hasegawa, Haruhiko Kaiya, Motoshi Saeki:
A Supporting Tool for Requirements Elicitation Using a Domain Ontology. ICSOFT/ENASE (Selected Papers) 2007: 128-140 - [c18]Junzo Kato, Motoshi Saeki, Atsushi Ohnishi, Haruhiko Kaiya, Shuichiro Yamamoto:
Effects of Thesaurus in Requirements Elicitation. RCIS 2007: 385-394 - 2006
- [j5]Shuichiro Yamamoto, Haruhiko Kaiya, Karl Cox, Steven J. Bleistein:
Goal Oriented Requirements Engineering: Trends and Issues. IEICE Trans. Inf. Syst. 89-D(11): 2701-2711 (2006) - [c17]Haruhiko Kaiya, Kouta Sasaki, Chikanobu Ogawa, Kenji Kaijiri:
A Supporting Tool to Identify both Satisfied Requirements and Tolerant Threats for a Java Mobile Code Application. ICEIS (3) 2006: 444-448 - [c16]Takako Nakatani, Haruhiko Kaiya:
Japanese Workshop on Requirements Engineering Tools (JWRET). ASE 2006: 378 - [c15]Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri:
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application. QSIC 2006: 125-132 - [c14]Haruhiko Kaiya, Motoshi Saeki:
Using Domain Ontology as Domain Knowledge for Requirements Elicitation. RE 2006: 186-195 - 2005
- [j4]Kazuma Aizawa, Haruhiko Kaiya, Kenji Kaijiri:
Practical and Incremental Maintenance of Software Resources in Consumer Electronics Products. IEICE Trans. Inf. Syst. 88-D(6): 1117-1125 (2005) - [j3]Haruhiko Kaiya, Daisuke Shinbara, Jinichi Kawano, Motoshi Saeki:
Improving the detection of requirements discordances among stakeholders. Requir. Eng. 10(4): 289-303 (2005) - [c13]Akira Osada, Daigo Ozawa, Haruhiko Kaiya, Kenji Kaijiri:
Modeling Software Characteristics and Their Correlations in A Specific Domain by Comparing Existing Similar Systems. QSIC 2005: 215-222 - [c12]Haruhiko Kaiya, Motoshi Saeki:
Ontology Based Requirements Analysis: Lightweight Semantic Processing Approach. QSIC 2005: 223-230 - 2004
- [j2]Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri:
A Method to Develop Feasible Requirements for Java Mobile Code Application. IEICE Trans. Inf. Syst. 87-D(4): 811-821 (2004) - [c11]Haruhiko Kaiya, Motoshi Saeki:
Weaving Multiple Viewpoint Specifications in Goal Oriented Requirements Analysis. APSEC 2004: 418-427 - [c10]Kazuma Aizawa, Haruhiko Kaiya, Kenji Kaijiri:
FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision. COMPSAC 2004: 286-292 - [c9]Haruhiko Kaiya, Akira Osada, Kenji Kaijiri:
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems. RE 2004: 112-121 - 2003
- [c8]Junzo Kato, Morio Nagata, Shuichiro Yamamoto, Motoshi Saeki, Haruhiko Kaiya, Hisayuki Horai, Atsushi Ohnishi, Seiichi Komiya, Kenji Watahiki:
PAORE: Package Oriented Requirements Elicitation. APSEC 2003: 17- - [c7]Hisayuki Suzumori, Haruhiko Kaiya, Kenji Kaijiri:
VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their Development. COMPSAC 2003: 327- - [c6]Haruhiko Kaiya, Kouta Sasaki, Yasunori Maebashi, Kenji Kaijiri:
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application. RE 2003: 357-358 - 2002
- [c5]Haruhiko Kaiya, Hitoshi Furukawa, Kenji Kaijiri:
Security Policy Checker and Generator for Java Mobile Codes. Engineering Information Systems in the Internet Context 2002: 255-264 - [c4]Haruhiko Kaiya, Hisayuki Horai, Motoshi Saeki:
AGORA: Attributed Goal-Oriented Requirements Analysis Method. RE 2002: 13-22
1990 – 1999
- 1999
- [c3]Haruhiko Kaiya, Kenji Kaijiri:
Conducting Requirements Evolution by Replacing Components in the Current System. APSEC 1999: 224- - 1997
- [j1]Haruhiko Kaiya, Nobuyuki Miura, Go Anai, Tsuyoshi Ebata, Hiroki Nagaoka, Motoshi Saeki:
Preliminary experiments of a computer system for face-to-face meetings. Syst. Comput. Jpn. 28(2): 21-32 (1997) - 1996
- [c2]Motoshi Saeki, Kinji Matsumura, Jun'ichi Shimoda, Haruhiko Kaiya:
Structuring utterance records of requirements elicitation meetings based on speech act theory. ICRE 1996: 21-30 - 1995
- [c1]Nobuyuki Miura, Haruhiko Kaiya, Motoshi Saeki:
Building the Structure of Specification Documents from Utterances of Requirements Elicitation Meetings. APSEC 1995: 64-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint