default search action
Kenji Kaijiri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c27]Shohei Kamimori, Shinpei Ogata, Kenji Kaijiri:
Automatic Method of Generating a Web Prototype Employing Live Interactive Widget to Validate Functional Usability Requirements. ACIT-CSI 2015: 8-13 - 2014
- [c26]Haruhiko Kaiya, Sho Kono, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, Kenji Kaijiri:
Security Requirements Analysis Using Knowledge in CAPEC. CAiSE Workshops 2014: 343-348 - [c25]Hideaki Uchimiya, Shinpei Ogata, Kenji Kaijiri:
Method mining in experimental software engineering. ICSAI 2014: 1012-1016 - 2013
- [j7]Haruhiko Kaiya, Junya Sakai, Shinpei Ogata, Kenji Kaijiri:
Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment. Int. J. Secur. Softw. Eng. 4(3): 42-63 (2013) - [c24]Haruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata, Kenji Kaijiri, Nobukazu Yoshioka:
Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities. CAiSE Workshops 2013: 478-489 - 2012
- [c23]Haruhiko Kaiya, Shunsuke Morita, Shinpei Ogata, Kenji Kaijiri, Shinpei Hayashi, Motoshi Saeki:
Model Transformation Patterns for Introducing Suitable Information Systems. APSEC 2012: 434-439 - [c22]Haruhiko Kaiya, Shunsuke Morita, Kenji Kaijiri, Shinpei Hayashi, Motoshi Saeki:
Facilitating Business Improvement by Information Systems using Model Transformation and Metrics. CAiSE Forum 2012: 106-113 - [c21]Masahiro Umemura, Haruhiko Kaiya, Shinpei Ogata, Kenji Kaijiri:
Validating Quality Requirements Considerations in a Design Document using Spectrum Analysis. JCKBSE 2012: 88-97 - 2011
- [c20]Haruhiko Kaiya, Kenichiro Hara, Kyotaro Kobayashi, Akira Osada, Kenji Kaijiri:
Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques. COMPSAC Workshops 2011: 327-334 - [c19]Haruhiko Kaiya, Shunichi Suzuki, Toru Ogawa, Masaaki Tanigawa, Masahiro Umemura, Kenji Kaijiri:
Spectrum Analysis for Software Quality Requirements Using Analyses Records. COMPSAC Workshops 2011: 500-503 - 2010
- [j6]Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato, Akira Osada, Kenji Kaijiri:
Improving Reliability of Spectrum Analysis for Software Quality Requirements Using TCM. IEICE Trans. Inf. Syst. 93-D(4): 702-712 (2010) - [c18]Haruhiko Kaiya, Yuutarou Shimizu, Hirotaka Yasui, Kenji Kaijiri, Motoshi Saeki:
Enhancing Domain Knowledge for Requirements Elicitation with Web Mining. APSEC 2010: 3-12 - [c17]Haruhiko Kaiya, Kasuhisa Amemiya, Yuutarou Shimizu, Kenji Kaijiri:
Towards an Integrated Support for Traceability of Quality Requirements using Software Spectrum Analysis. ICSOFT (2) 2010: 187-194
2000 – 2009
- 2009
- [c16]Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato, Kenji Kaijiri:
Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map. CAiSE 2009: 546-560 - [c15]Shunichi Suzuki, Akira Osada, Tomonori Sato, Haruhiko Kaiya, Masaaki Tanigawa, Kenji Kaijiri:
A systematic method for generating quality requirements spectrum. SAC 2009: 399-400 - 2008
- [j5]Haruhiko Kaiya, Akira Osada, Kenji Kaijiri:
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems. IEICE Trans. Inf. Syst. 91-D(4): 897-906 (2008) - [c14]Naoyuki Kitazawa, Akira Osada, Kazuyuki Kamijo, Haruhiko Kaiya, Kenji Kaijiri:
So/M: A Requirements Definition Tool Using Characteristics of Existing Similar Systems. COMPSAC 2008: 255-262 - [c13]Shinya Watanabe, Haruhiko Kaiya, Kenji Kaijiri:
Adapting a fault prediction model to allow inter languagereuse. PROMISE@ICSE 2008: 19-24 - [c12]Haruhiko Kaiya, Tomonori Sato, Akira Osada, Naoyuki Kitazawa, Kenji Kaijiri:
Toward quality requirements analysis based on domain specific quality spectrum. SAC 2008: 596-601 - [c11]Akira Osada, Daigo Ozawa, Naoyuki Kitazawa, Haruhiko Kaiya, Kenji Kaijiri:
Proposing metrics of difficulty of domain knowledge using usecase diagrams. SAC 2008: 624-629 - 2006
- [c10]Haruhiko Kaiya, Kouta Sasaki, Chikanobu Ogawa, Kenji Kaijiri:
A Supporting Tool to Identify both Satisfied Requirements and Tolerant Threats for a Java Mobile Code Application. ICEIS (3) 2006: 444-448 - [c9]Hideyuki Takamizawa, Kenji Kaijiri:
Reliable Authentication Method by Using Cellular Phones in WBT. ICN/ICONS/MCL 2006: 200 - [c8]Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri:
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application. QSIC 2006: 125-132 - 2005
- [j4]Kazuma Aizawa, Haruhiko Kaiya, Kenji Kaijiri:
Practical and Incremental Maintenance of Software Resources in Consumer Electronics Products. IEICE Trans. Inf. Syst. 88-D(6): 1117-1125 (2005) - [c7]Akira Osada, Daigo Ozawa, Haruhiko Kaiya, Kenji Kaijiri:
Modeling Software Characteristics and Their Correlations in A Specific Domain by Comparing Existing Similar Systems. QSIC 2005: 215-222 - 2004
- [j3]Kenji Kaijiri:
Foreword. IEICE Trans. Inf. Syst. 87-D(4): 799-800 (2004) - [j2]Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri:
A Method to Develop Feasible Requirements for Java Mobile Code Application. IEICE Trans. Inf. Syst. 87-D(4): 811-821 (2004) - [c6]Kazuma Aizawa, Haruhiko Kaiya, Kenji Kaijiri:
FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision. COMPSAC 2004: 286-292 - [c5]Haruhiko Kaiya, Akira Osada, Kenji Kaijiri:
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems. RE 2004: 112-121 - 2003
- [c4]Hisayuki Suzumori, Haruhiko Kaiya, Kenji Kaijiri:
VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their Development. COMPSAC 2003: 327- - [c3]Haruhiko Kaiya, Kouta Sasaki, Yasunori Maebashi, Kenji Kaijiri:
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application. RE 2003: 357-358 - 2002
- [c2]Haruhiko Kaiya, Hitoshi Furukawa, Kenji Kaijiri:
Security Policy Checker and Generator for Java Mobile Codes. Engineering Information Systems in the Internet Context 2002: 255-264
1990 – 1999
- 1999
- [c1]Haruhiko Kaiya, Kenji Kaijiri:
Conducting Requirements Evolution by Replacing Components in the Current System. APSEC 1999: 224- - 1996
- [j1]Kenji Kaijiri:
Novice program recognition/diagnosis system based on goal/plan concepts. Syst. Comput. Jpn. 27(2): 26-40 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint