default search action
Katsuhisa Maruyama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Kanon Harada, Katsuhisa Maruyama:
Towards Efficient Program Repair with APR Tools Based on Genetic Algorithms. SANER 2024: 896-901 - 2022
- [c31]Kanon Harada, Katsuhisa Maruyama:
A Preliminary Finding on Programs Fixed by an APR Tool based on a Genetic Algorithm. APSEC 2022: 554-555 - 2021
- [j9]Takayuki Omori, Katsuhisa Maruyama, Atsushi Ohnishi:
Lightweight Operation History Graph for Traceability on Program Elements. IEICE Trans. Inf. Syst. 104-D(3): 404-418 (2021) - 2020
- [j8]Katsuhisa Maruyama, Shinpei Hayashi, Takayuki Omori:
ChangeMacroRecorder: Accurate Recording of Fine-Grained Textual Changes of Source Code. IEICE Trans. Inf. Syst. 103-D(11): 2262-2277 (2020)
2010 – 2019
- 2018
- [j7]Takayuki Omori, Katsuhisa Maruyama:
Comparative Study between Two Approaches Using Edit Operations and Code Differences to Detect Past Refactorings. IEICE Trans. Inf. Syst. 101-D(3): 644-658 (2018) - [c30]Katsuhisa Maruyama, Shinpei Hayashi, Takayuki Omori:
ChangeMacroRecorder: Recording fine-grained textual changes of source code. SANER 2018: 537-541 - 2017
- [c29]Katsuhisa Maruyama, Shinpei Hayashi:
A tool supporting postponable refactoring. ICSE (Companion Volume) 2017: 133-135 - [c28]Katsuhisa Maruyama, Shinpei Hayashi, Norihiro Yoshida, Eunjong Choi:
Frame-based behavior preservation in refactoring. SANER 2017: 573-574 - 2016
- [j6]Katsuhisa Maruyama, Takayuki Omori, Shinpei Hayashi:
Slicing Fine-Grained Code Change History. IEICE Trans. Inf. Syst. 99-D(3): 671-687 (2016) - [c27]Noriyuki Suzuki, Tetsuo Kamina, Katsuhisa Maruyama:
Detecting Invalid Layer Combinations Using Control-Flow Analysis for Android. COP@ECOOP 2016: 27-32 - [c26]Tran Thi Xuan Trang, Katsuhisa Maruyama:
Secure Data Storage Architecture on Cloud Environments. ICSOFT-EA 2016: 39-47 - [c25]Yuichi Nishimura, Katsuhisa Maruyama:
Supporting Merge Conflict Resolution by Using Fine-Grained Code Change History. SANER 2016: 661-664 - 2015
- [j5]Takayuki Omori, Hiroaki Kuwabara, Katsuhisa Maruyama:
Improving code completion based on repetitive code completion operations. Inf. Media Technol. 10(2): 210-225 (2015) - [c24]Shinpei Hayashi, Daiki Hoshino, Jumpei Matsuda, Motoshi Saeki, Takayuki Omori, Katsuhisa Maruyama:
Historef: A tool for edit history refactoring. SANER 2015: 469-473 - 2014
- [j4]Rizky Januar Akbar, Takayuki Omori, Katsuhisa Maruyama:
Mining API Usage Patterns by Applying Method Categorization to Improve Code Completion. IEICE Trans. Inf. Syst. 97-D(5): 1069-1083 (2014) - [c23]Katsuhisa Maruyama, Takayuki Omori, Shinpei Hayashi:
A visualization tool recording historical data of program comprehension tasks. ICPC 2014: 207-211 - 2013
- [c22]Eijiro Kitsu, Takayuki Omori, Katsuhisa Maruyama:
Detecting Program Changes from Edit History of Source Code. APSEC (1) 2013: 299-306 - 2012
- [c21]Takayuki Omori, Hiroaki Kuwabara, Katsuhisa Maruyama:
A study on repetitiveness of code completion operations. ICSM 2012: 584-587 - [c20]Shinpei Hayashi, Takayuki Omori, Teruyoshi Zenmyo, Katsuhisa Maruyama, Motoshi Saeki:
Refactoring edit history of source code. ICSM 2012: 617-620 - [c19]Rizky Januar Akbar, Takayuki Omori, Katsuhisa Maruyama:
Detecting API Usage Patterns from Software Repositories Using Method Categorization. JCKBSE 2012: 237-246 - [c18]Katsuhisa Maruyama, Eijiro Kitsu, Takayuki Omori, Shinpei Hayashi:
Slicing and replaying code change history. ASE 2012: 246-249 - 2011
- [c17]Katsuhisa Maruyama, Takayuki Omori:
A security-aware refactoring tool for Java programs. WRT@ICSE 2011: 22-28 - [c16]Takayuki Omori, Katsuhisa Maruyama:
An editing-operation replayer with highlights supporting investigation of program modifications. EVOL/IWPSE 2011: 101-105
2000 – 2009
- 2009
- [c15]Takayuki Omori, Katsuhisa Maruyama:
Identifying Stagnation Periods in Software Evolution by Replaying Editing Operations. APSEC 2009: 389-396 - [c14]Hironori Washizaki, Eduardo B. Fernández, Katsuhisa Maruyama, Atsuto Kubo, Nobukazu Yoshioka:
Improving the Classification of Security Patterns. DEXA Workshops 2009: 165-170 - 2008
- [c13]Katsuhisa Maruyama, Kensuke Tokoda:
Security-Aware Refactoring Alerting its Impact on Code Vulnerabilities. APSEC 2008: 445-452 - [c12]Takayuki Omori, Katsuhisa Maruyama:
A change-aware development environment by recording editing operations of source code. MSR 2008: 31-34 - 2007
- [c11]Katsuhisa Maruyama:
Secure Refactoring - Improving the Security Level of Existing Code. ICSOFT (SE) 2007: 222-229 - 2006
- [j3]Katsuhisa Maruyama, Shinichiro Yamamoto:
A Tool Platform Using an XML Representation of Source Code Information. IEICE Trans. Inf. Syst. 89-D(7): 2214-2222 (2006) - [c10]Katsuhisa Maruyama:
An Accurate and Convenient Undo Mechanism for Refactorings. APSEC 2006: 309-316 - [c9]Katsuhisa Maruyama, Makoto Matsushita, Shinichiro Yamamoto:
Japanese Workshop on Leveraging Web2.0 Technologies in Software Development Environments (WebSDE). ASE 2006: 377 - 2005
- [c8]Takayuki Omori, Katsuhisa Maruyama:
An Easy-to-Use Extension Mechanism Using XML for an Integrated Development Environment. APSEC 2005: 333-340 - [c7]Katsuhisa Maruyama, Shinichiro Yamamoto:
Design and Implementation of an Extensible and Modifiable Refactoring Tool. IWPC 2005: 195-204 - 2004
- [c6]Katsuhisa Maruyama, Shinichiro Yamamoto:
A CASE Tool Platform Using an XML Representation of Java Source Code. SCAM 2004: 158-167 - 2001
- [c5]Katsuhisa Maruyama:
Automated method-extraction refactoring by using block-based slicing. SSR 2001: 31-40 - 2000
- [j2]Katsuhisa Maruyama, Kenichi Shima:
An Automatic Class Generation Mechanism by Using Method Integration. IEEE Trans. Software Eng. 26(5): 425-440 (2000)
1990 – 1999
- 1999
- [c4]Katsuhisa Maruyama, Kenichi Shima:
Automatic Method Refactoring Using Weighted Dependence Graphs. ICSE 1999: 236-245 - 1998
- [c3]Katsuhisa Maruyama, Kenichi Shima:
A new class generation mechanism by method integration. ICSR 1998: 196-205 - 1997
- [c2]Katsuhisa Maruyama, Kenichi Shima:
A Mechanism for Automatically and Dynamically Changing Software Components. SSR 1997: 169-180 - 1996
- [j1]Kouichi Ono, Katsuhisa Maruyama, Yoshiaki Fukuzawa:
Application of verification method and a decomposition method to program modification. Syst. Comput. Jpn. 27(1): 12-26 (1996) - [c1]Katsuhisa Maruyama, Kenichi Shima:
New Software Components with an Autonomous Changing Mechanism. APSEC 1996: 154-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-27 23:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint