default search action
Naoya Nitta
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c24]Naoya Nitta, Shinji Kageyama, Kouta Fujii:
A Formal Web Services Architecture Model for Changing PUSH/PULL Data Transfer. FACS 2023: 65-83 - 2022
- [c23]Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Mizuho Yoshihira, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition. BWCCA 2022: 125-136 - [c22]Mizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing. HCI (32) 2022: 78-93 - 2021
- [c21]Aki Hongo, Naoya Nitta:
Towards a Dynamic Visualization of Complex Reverse-Engineered Object Collaboration. APSEC 2021: 568-569 - [c20]Narumasa Kande, Naoya Nitta:
A Method to Comprehend Feature Dependencies Based on Semi-Static Structures. ICSME 2021: 148-158
2010 – 2019
- 2019
- [c19]Izuru Kume, Etsuya Shibayama, Masahide Nakamura, Naoya Nitta:
Cutting Java Expressions into Lines for Detecting their Evaluation at Runtime. ICGDA 2019: 37-46 - 2018
- [c18]Izuru Kume, Masahide Nakamura, Naoya Nitta:
Revealing Implicit Correspondence between Bytecode Instructions and Expressions Determined by Java Compilers. ASWEC 2018: 126-130 - 2017
- [c17]Izuru Kume, Masahide Nakamura, Naoya Nitta, Etsuya Shibayama:
Analyzing Execution Traces of Failed Programs for Materializing Chain of Infection. ACIT/CSII/BCD 2017: 333-339 - [c16]Daiki Fujioka, Naoya Nitta:
Constraints Based Approach to Interactive Feature Location. ICSME 2017: 499-503 - [c15]Naoya Nitta:
Experiences of debugger-based architecture comprehension. SNPD 2017: 471-476 - 2016
- [c14]Naoya Nitta:
A formal approach for guiding architecture design with data constraints. ICIS 2016: 1-6 - [c13]Yusuke Takahashi, Naoya Nitta:
Composite Refactoring for Decoupling Multiple Classes. SANER 2016: 594-598 - 2015
- [j4]Izuru Kume, Masahide Nakamura, Naoya Nitta, Etsuya Shibayama:
A Case Study of Dynamic Analysis to Locate Unexpected Side Effects Inside of Frameworks. Int. J. Softw. Innov. 3(3): 26-40 (2015) - [c12]Naoya Nitta, Tomohiro Matsuoka:
Delta extraction: An abstraction technique to comprehend why two objects could be related. ICSME 2015: 61-70 - 2014
- [c11]Naoya Nitta, Izuru Kume, Yasuhiro Takemura:
Identifying Mandatory Code for Framework Use via a Single Application Trace. ECOOP 2014: 593-617 - [c10]Izuru Kume, Naoya Nitta, Masahide Nakamura, Etsuya Shibayama:
A dynamic analysis technique to extract symptoms that suggest side effects in framework applications. SAC 2014: 1176-1178 - [c9]Izuru Kume, Masahide Nakamura, Naoya Nitta, Etsuya Shibayama:
Toward a dynamic analysis technique to locate framework misuses that cause unexpected side effects. SNPD 2014: 1-6 - 2013
- [c8]Naoya Nitta, Izuru Kume, Yasuhiro Takemura:
A Method for Early Detection of Mismatches between Framework Architecture and Execution Scenarios. APSEC (1) 2013: 517-522 - [c7]Izuru Kume, Masahide Nakamura, Naoya Nitta, Etsuya Shibayama:
A Feature Model of Framework Applications. SNPD 2013: 511-516 - 2012
- [c6]Hidekuni Tsukamoto, Yasuhiro Takemura, Hideo Nagumo, Naoya Nitta:
Work in progress: Analysis of the relationship between teaching contents and motivation in programming education. FIE 2012: 1-2 - [c5]Hidekuni Tsukamoto, Hideo Nagumo, Yasuhiro Takemura, Naoya Nitta:
Change of Students' Motivation in an Introductory Programming Course for Non-computing Majors. ICALT 2012: 124-125
2000 – 2009
- 2006
- [j3]Naoya Nitta, Hiroyuki Seki:
LTL Model Checking for Extended Pushdown Systems with Regular Tree Valuations. Inf. Media Technol. 1(2): 712-729 (2006) - [c4]Izuru Kume, Naoya Nitta, Yasuhiro Takemura:
A Method for Creating Teaching Materials of Practical Object-Oriented Methods Education. ICCE 2006: 75-78 - 2005
- [j2]Shigeta Kuninobu, Yoshiaki Takata, Naoya Nitta, Hiroyuki Seki:
Policy Controlled System and Its Model Checking. IEICE Trans. Inf. Syst. 88-D(7): 1685-1696 (2005) - [j1]Jing Wang, Naoya Nitta, Hiroyuki Seki:
An Efficient Method for Optimal Probe Deployment of Distributed IDS. IEICE Trans. Inf. Syst. 88-D(8): 1948-1957 (2005) - 2003
- [c3]Naoya Nitta, Hiroyuki Seki:
An Extension of Pushdown System and Its Model Checking Method. CONCUR 2003: 278-292 - 2001
- [c2]Naoya Nitta, Yoshiaki Takata, Hiroyuki Seki:
An efficient security verification method for programs with stack inspection. CCS 2001: 68-77 - [c1]Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata:
Security verification of programs with stack inspection. SACMAT 2001: 31-40
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 22:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint