Follow
Takashi Ishio
Takashi Ishio
Future University Hakodate
Verified email at fun.ac.jp - Homepage
Title
Cited by
Cited by
Year
Do developers update their library dependencies? An empirical study on the impact of security advisories on library migration
RG Kula, DM German, A Ouni, T Ishio, K Inoue
Empirical Software Engineering 23, 384-417, 2018
3492018
Search-based software library recommendation using multi-objective optimization
A Ouni, RG Kula, M Kessentini, T Ishio, DM German, K Inoue
Information and Software Technology 83, 55-75, 2017
1172017
9.6 million links in source code comments: Purpose, evolution, and decay
H Hata, C Treude, RG Kula, T Ishio
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
772019
Towards smoother library migrations: A look at vulnerable dependency migrations at function level for npm javascript packages
RE Zapata, RG Kula, B Chinthanet, T Ishio, K Matsumoto, A Ihara
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
752018
Extracting sequence diagram from execution trace of Java program
K Taniguchi, T Ishio, T Kamiya, S Kusumoto, K Inoue
Eighth International Workshop on Principles of Software Evolution (IWPSE'05 …, 2005
752005
Extracting code clones for refactoring using combinations of clone metrics
E Choi, N Yoshida, T Ishio, K Inoue, T Sano
Proceedings of the 5th International Workshop on Software Clones, 7-13, 2011
732011
Visualizing the evolution of systems and their library dependencies
RG Kula, C De Roover, D German, T Ishio, K Inoue
2014 Second IEEE Working Conference on Software Visualization, 127-136, 2014
672014
Lags in the release, adoption, and propagation of npm vulnerability fixes
B Chinthanet, RG Kula, S McIntosh, T Ishio, A Ihara, K Matsumoto
Empirical Software Engineering 26, 1-28, 2021
602021
Trusting a library: A study of the latency to adopt the latest maven release
RG Kula, DM German, T Ishio, K Inoue
2015 IEEE 22nd International Conference on Software Analysis, Evolution, and …, 2015
582015
Feature-level phase detection for execution trace using object cache
Y Watanabe, T Ishio, K Inoue
Proceedings of the 2008 international workshop on dynamic analysis: held in …, 2008
552008
Identifying source code reuse across repositories using lcs-based source code similarity
N Kawamitsu, T Ishio, T Kanda, RG Kula, C De Roover, K Inoue
2014 IEEE 14th international working conference on source code analysis and …, 2014
512014
An effective method to control interrupt handler for data race detection
M Higashi, T Yamamoto, Y Hayase, T Ishio, K Inoue
Proceedings of the 5th Workshop on Automation of Software Test, 79-86, 2010
372010
AMIDA: A sequence diagram extraction toolkit supporting automatic phase detection
T Ishio, Y Watanabe, K Inoue
Companion of the 30th international conference on Software engineering, 969-970, 2008
372008
Program slicing tool for effective software evolution using aspect-oriented technique
T Ishio, S Kusumoto, K Inoue
Sixth International Workshop on Principles of Software Evolution, 2003 …, 2003
362003
Code-based vulnerability detection in node. js applications: How far are we?
B Chinthanet, SE Ponta, H Plate, A Sabetta, RG Kula, T Ishio, ...
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
352020
Recommending verbs for rename method using association rule mining
Y Kashiwabara, Y Onizuka, T Ishio, Y Hayase, T Yamamoto, K Inoue
2014 Software Evolution Week-IEEE Conference on Software Maintenance …, 2014
352014
Source file set search for clone-and-own reuse analysis
T Ishio, Y Sakaguchi, K Ito, K Inoue
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
312017
Mining coding patterns to detect crosscutting concerns in Java programs
T Ishio, H Date, T Miyake, K Inoue
2008 15th Working Conference on Reverse Engineering, 123-132, 2008
282008
A generalized model for visualizing library popularity, adoption, and diffusion within a software ecosystem
RG Kula, C De Roover, DM German, T Ishio, K Inoue
2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018
272018
Software ingredients: Detection of third-party component reuse in java software release
T Ishio, RG Kula, T Kanda, DM German, K Inoue
Proceedings of the 13th International Conference on Mining Software …, 2016
262016
The system can't perform the operation now. Try again later.
Articles 1–20