|
Search the dblp DataBase
Kenji Kaijiri:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Haruhiko Kaiya, Kenji Kaijiri
Conducting Requirements Evolution by Replacing Components in the Current System. [Citation Graph (0, 0)][DBLP] APSEC, 1999, pp:224-0 [Conf]
- Kazuma Aizawa, Haruhiko Kaiya, Kenji Kaijiri
FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision. [Citation Graph (0, 0)][DBLP] COMPSAC, 2004, pp:286-292 [Conf]
- Hisayuki Suzumori, Haruhiko Kaiya, Kenji Kaijiri
VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their Development. [Citation Graph (0, 0)][DBLP] COMPSAC, 2003, pp:327-0 [Conf]
- Haruhiko Kaiya, Kouta Sasaki, Chikanobu Ogawa, Kenji Kaijiri
A Supporting Tool to Identify both Satisfied Requirements and Tolerant Threats for a Java Mobile Code Application. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2006, pp:444-448 [Conf]
- Hideyuki Takamizawa, Kenji Kaijiri
Reliable Authentication Method by Using Cellular Phones in WBT. [Citation Graph (0, 0)][DBLP] ICN/ICONS/MCL, 2006, pp:200- [Conf]
- Haruhiko Kaiya, Hitoshi Furukawa, Kenji Kaijiri
Security Policy Checker and Generator for Java Mobile Codes. [Citation Graph (0, 0)][DBLP] Engineering Information Systems in the Internet Context, 2002, pp:255-264 [Conf]
- Akira Osada, Daigo Ozawa, Haruhiko Kaiya, Kenji Kaijiri
Modeling Software Characteristics and Their Correlations in A Specific Domain by Comparing Existing Similar Systems. [Citation Graph (0, 0)][DBLP] QSIC, 2005, pp:215-222 [Conf]
- Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application. [Citation Graph (0, 0)][DBLP] QSIC, 2006, pp:125-132 [Conf]
- Haruhiko Kaiya, Akira Osada, Kenji Kaijiri
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems. [Citation Graph (0, 0)][DBLP] RE, 2004, pp:112-121 [Conf]
- Haruhiko Kaiya, Kouta Sasaki, Yasunori Maebashi, Kenji Kaijiri
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application. [Citation Graph (0, 0)][DBLP] RE, 2003, pp:357-358 [Conf]
Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map. [Citation Graph (, )][DBLP]
So/M: A Requirements Definition Tool Using Characteristics of Existing Similar Systems. [Citation Graph (, )][DBLP]
Toward quality requirements analysis based on domain specific quality spectrum. [Citation Graph (, )][DBLP]
Proposing metrics of difficulty of domain knowledge using usecase diagrams. [Citation Graph (, )][DBLP]
A systematic method for generating quality requirements spectrum. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|