Haruaki Tamada

Orcid: 0000-0003-1838-9184

According to our database1, Haruaki Tamada authored at least 35 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Comparison of Similarity Functions for n-gram Software Birthmarks.
Proceedings of the 2024 The 6th World Symposium on Software Engineering (WSSE), 2024

2023
Analyzing the Growth Patterns of GitHub Projects to Construct Best Practices for Project Managements.
Proceedings of the 8th IEEE/ACIS International Conference on Big Data, 2023

2022
Argo: Projects' Time-Series Data Fetching and Visualizing Tool for GitHub.
Proceedings of the 23rd ACIS International Summer Virtual Conference on Software Engineering, 2022

Overcoming the obfuscation method of the dynamic name resolution.
Proceedings of the ICSIM 2022: The 5th International Conference on Software Engineering and Information Management, Yokohama, Japan, January 21, 2022

2020
Capturing Spotaneous Software Evolution in a Social Coding Platform With Project-as-a-City Concept.
Int. J. Softw. Innov., 2020

2019
Characterizing Project Evolution on a Social Coding Platform.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering, 2019

Identifying Users in the Bridging Service Between Two Different Chat Services Using User Icons.
Proceedings of the Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. Healthcare Applications, 2019

2018
Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction.
Int. J. Networked Distributed Comput., 2018

Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods.
Int. J. Networked Distributed Comput., 2018

A Beforehand Extraction Method for Dynamic Software Birthmarks using Unit Test Codes.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018

Are Identifier Renaming Methods Secure?
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018

2017
Scaling Up Software Birthmarks Using Fuzzy Hashing.
Int. J. Softw. Innov., 2017

Fast Comparison of Software Birthmarks for Detecting the Theft with the Search Engine.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

Toward Obliging Bots for Supporting Next Actions.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

2016
Analyzing the Decision Criteria of Software Developers Based on Prospect Theory.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

A fuzzy hashing technique for large scale software birthmarks.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

Identifying the applied obfuscation method towards de-obfuscation.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
To Prevent Reverse-Enginnering Tools by Shuffling the Stack Status with Hook Mechanism.
Int. J. Softw. Innov., 2015

Fu-Rin-Ka-Zan: Quantitative Analysis of Developers' Characteristics Based on Project Historical Data.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015

2014
An obfuscation method to build a fake call flow graph by hooking method calls.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

2013
An Instruction Folding Method to Prevent Reverse Engineering in Java Platform.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

A Dynamic Birthmark from Analyzing Operand Stack Runtime Behavior to Detect Copied Software.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

2012
Program Incomprehensibility Evaluation for Obfuscation Methods with Queue-based Mental Simulation Model.
Proceedings of the 13th ACIS International Conference on Software Engineering, 2012

Why Novice Programmers Fall into a Pitfall?: Coding Pattern Analysis in Programming Exercise.
Proceedings of the Fourth International Workshop on Empirical Software Engineering in Practice, 2012

2011
A Framework for Programming Process Measurement and Compiling Error Interpretation for Novice Programmers.
Proceedings of the 2011 Joint Conf of 21st Int'l Workshop on Software Measurement and the 6th Int'l Conference on Software Process and Product Measurement, 2011

Phynocation: A Prototyping of a Teaching Assistant Robot for C Language Class.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services, 2011

2009
Robot Helps Teachers for Education of the C Language Beginners.
Proceedings of the Human-Computer Interaction. Novel Interaction Methods and Techniques, 2009

2008
Constructing Home Network Systems and Integrated Services Using Legacy Home Appliances and Web Services.
Int. J. Web Serv. Res., 2008

2007
Mining Quantitative Rules in a Software Project Data Set.
Inf. Media Technol., 2007

Defect Data Analysis Based on Extended Association Rule Mining.
Proceedings of the Fourth International Workshop on Mining Software Repositories, 2007

2006
Using software birthmarks to identify similar classes and major functionalities.
Proceedings of the 2006 International Workshop on Mining Software Repositories, 2006

Adapting Legacy Home Appliances to Home Network Systems UsingWeb Services.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

2005
Java Birthmarks - Detecting the Software Theft - .
IEICE Trans. Inf. Syst., 2005

2004
Implementing integrated services of networked home appliances using service oriented architecture.
Proceedings of the Service-Oriented Computing, 2004

Design and evaluation of birthmarks for detecting theft of java programs.
Proceedings of the IASTED International Conference on Software Engineering, 2004


  Loading...