Computer Software
Print ISSN : 0289-6540
Volume 36, Issue 1
Displaying 1-16 of 16 articles from this issue
  • [in Japanese]
    2019 Volume 36 Issue 1 Pages 1
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS
  • Michiko OBA, Kei ITOU, Norihiro YOSHIDA, Hiroshi IGAKI, Takao OKUBO, F ...
    2019 Volume 36 Issue 1 Pages 2
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS
  • Hisashi ICHIKAWA, Yusuke GOTO, Koichi MATSUDA, Jun HAKURA
    2019 Volume 36 Issue 1 Pages 3-13
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS

    In this paper, we describe the results of our PBL practice for undergraduate students. Our PBL course is characterized by three grades of students proceeding with the project together and students taking it repeatedly for three years. As a result of the evaluation, by repeatedly taking courses, the gradual growth of the students was confirmed. It became clear that students gradually played a core role from peripheral participation. Furthermore, a favorable acceptance by students about the mixed grade was revealed, and many advantages such as being able to touch various values, and promoting exchange among grade were revealed. Meanwhile, the problem unique to mixed grade, such as the complexity of the role of the second grade, became clear.

    Download PDF (762K)
  • Hiroyuki CHISHIRO, Yoshihide CHUBACHI
    2019 Volume 36 Issue 1 Pages 14-23
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS

    Project Based Learning (PBL) is a teaching and learning method in which students actively solve real-world problems and gain knowledge and skills. The teaching experiences, materials, and methods for PBL have diversity and are not shared with universities. The Faculty Development – Working Group (FD-WG) performs to share them with universities but the sharing method does not mainly use active learning. We present the Faculty Development (FD) camp for PBL, in order to share them with active learning for reducing education costs. The FD camp provides the place of discussing the PBL to the participants, in order to solve problems of PBL. We hold four FD camps with Open Space Technology (OST), which was a simple way to run productive meetings. Evaluations in questionnaires showed that almost all participants had good impressions in the FD camp with OST. We learned five lessons from four FD camps.

    Download PDF (12662K)
  • Nobuyuki TACHI, Mizue KAYAMA
    2019 Volume 36 Issue 1 Pages 24-29
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS

    “Practice power”. It is a word that we often see at the educational site of information technology. In the software development field, what kind of power is this “practical power” specifically? What do the new employee do, can we say that he is active? In this research, we aim to investigate the practical ability in the field of software development technology, to guide hypotheses from the results obtained, to propose a method to learn practical skills efficiently by experimenting trial materials in practice. We are conducting an interview with people who are active in society and demonstrating their practical skills and the practical skills that are currently required in the field of development are not generic said generic skills, We are gaining overwhelming opinion that it is a technical force to solve the problem. In this paper, we report the results of the survey and future prospects.

    Download PDF (846K)
  • Kengo IOKIBE, Yoshinori UETAKE, Toshiaki TESHIMA, Akihiro SANADA, Yasu ...
    2019 Volume 36 Issue 1 Pages 30-36
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS

    The authors developed a practicum in the cryptographic technology, an indispensable technology to guarantee information security in the upcoming IoT era. The practicum is composed of a lecture in a part of algebra and discrete mathematics that founds modern cryptography, hardware implementation of cryptographic algorithms, and the side-channel attack on cryptographic hardware. It aimed not only that students learned textbook knowledge of cryptographic algorithms but also they developed their knowledge of implementing cryptographic algorithms considering the threat of the side-channel attack through their experience implementing the algorithms on a commercial hardware and attacking them. The practicum was offered to the third- and fourth-year students, and most of them achieved the required goal of the practicum. They also realized improving their practical skills in the cryptographic technology according to their responses to the questionnaire.

    Download PDF (4690K)
  • Fuyuki ISHIKAWA, Tomoharu UGAWA, Seiji UMATANI, Tsuneyasu KOMIYA, Shin ...
    2019 Volume 36 Issue 1 Pages 37
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS
  • Kyohei UEMURA, Keitaro NAKASAI, Katuya OGAMI, Hideaki HATA, Tomohiro I ...
    2019 Volume 36 Issue 1 Pages 38-47
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS

    Software analytics aims at helping practitioners make decision making based on evidence from various software development data by analyzing and visualizing various software development data, and it has been attracting practitioners and software engineering researchers. However, since newly developed research tools and methodologies are presented separately, it is difficult to use those techniques together. To tackle this problem, we are developing a Web service, Codosseum to provide preprocessed data and various visualization services. Currently, we provide method-level history visualization and repositories, software development community population pyramid visualization, and city-like code visualization. By implementing these techniques as SaaS (software as a service), they can be used by practitioners and researchers freely and easily.

    Download PDF (4477K)
  • Shinya YOSHIDA, Hiroaki KUWABARA, Yoshitoshi KUNIEDA
    2019 Volume 36 Issue 1 Pages 48-65
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS

    In this paper, we introduce a parametric polymorphism of secrecy for information flow analysis to an object-oriented programming language. Information flow analysis is useful to detect invalid information leaks. However, it is difficult to define classes having any secrecy of data such as Collection Framework, since type-based information flow analysis requires specifying a secrecy of each data as a type in the program. We propose a way to declare classes parameterized over secrecy and a structure of secrecy as a type. We also propose typing rules to ensure that typable programs do not leak confidential information even if any secrecy is substituted for the secrecy parameter. We prove proposed type system is sound for noninterfering.

    Download PDF (596K)
  • Nobukazu YOSHIOKA, Naoyasu UBAYASHI, Fuyuki ISHIKAWA, Kenji TEI, Hiron ...
    2019 Volume 36 Issue 1 Pages 66-73
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS
  • Tatsuhiro CHIBA
    2019 Volume 36 Issue 1 Pages 74-78
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS
  • Shohei KATAKURA
    2019 Volume 36 Issue 1 Pages 79-82
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS
  • [in Japanese]
    2019 Volume 36 Issue 1 Pages 85-87
    Published: January 25, 2019
    Released on J-STAGE: March 26, 2019
    JOURNAL FREE ACCESS
  • Yasuyuki NOGAMI, Takuya KUSAKA, Kazuya KOBAYASHI, Yuta HASHIMOTO
    2019 Volume 36 Issue 1 Pages 95-100
    Published: January 25, 2019
    Released on J-STAGE: February 26, 2019
    JOURNAL FREE ACCESS

    In the IoT era when a device is connected via the Internet, we can enjoy a great deal of convenience with the use of such devices, but a large number of users are not concerned about the attack from a third party. It is also meaningful for the user to have such a consciousness, but the person providing devices needs more specialized knowledge and awareness of the security. For such demands, a special education program called enPiT is held to provide an opportunity for undergraduate students to learn about cutting-edge information technologies and aims to cultivate human resources who have acquired the ability to solve specific problems in society. In this paper, we introduce the contents of “enPiT-Security advanced PBL exercise G” held in Okayama University and describe the helpfulness of the exercise and room for improvement based on the students' comments.

    Download PDF (690K)
  • Satoshi MUNAKATA, Ryuichi UMEKAWA, Tadahiro UEHARA
    2019 Volume 36 Issue 1 Pages 101-118
    Published: January 25, 2019
    Released on J-STAGE: February 26, 2019
    JOURNAL FREE ACCESS

    When a runtime exception occurs during the operation or performance test of a Java Web application, it can not be confirmed detailed behavior and values until the occurrence of an exception from the limited log, therefore it takes time to isolate the problem. With the Selective Capture/Replay method, it is possible to reproduce and investigate the behavior and values of the modules at an arbitrary point in time, based on the execution history collected from the previously selected modules. However, due to the large load of externally outputting all the inputs of the modules, it need to select a small number of modules to be reproduced before the application runs, therefore it is not suitable for investigating unexpected runtime exceptions. In this paper, we propose “Replayable Stack Trace" as a low load capture method of execution history which can reproduce and investigate behavior and values up to exception occurrence for more modules. In the proposed method, the recent execution result of partial codes in a selected module is stored in a memory during executing the module,and when an exception occures, a stack trace with the stored values is externally outputted as execution history. By reproducing and showing the recent execution results of all the codes in each module based on the execution history, it is possible to confirm detailed behavior and values up to the occurrence of exception straddling the call hierarchy.

    Download PDF (1645K)
  • Yukihiko SHIGESADA
    2019 Volume 36 Issue 1 Pages 119-151
    Published: January 25, 2019
    Released on J-STAGE: February 26, 2019
    JOURNAL FREE ACCESS

    IPSJ (Information Processing Society of Japan) conducts international artificial intelligence programming contests every year since 2012. I participated this contest in 2015 and 2016, and won the second prize in the 2015 contest and won the first prize in the 2016 contest. The subject of the 2015th and 2016th contests was a game with incomplete information. Basic rules of two contests were common, but features of the game were different. This paper introduces and evaluates four software methods of the 2016 champion software in comparison with those of the 2015 contest and related works. Four software methods are as follows: a method to construct a game tree for game with incomplete information by introducing concepts of meta node and meta action, a method for speedup bitmap computing by using SIMD (Single Instruction Multiple Data) and BMI (Bit Manipulation Instruction sets), a method to analyze incomplete information precisely, and a method to calculate evaluation value of the game by introducing concepts such as meta evaluation value. This paper also presents several findings gained by participating two contests.

    Download PDF (825K)
feedback
Top