Takashi Ishio
Takashi Ishio
Verified email at
Cited by
Cited by
Do developers update their library dependencies? An empirical study on the impact of security advisories on library migration
RG Kula, DM German, A Ouni, T Ishio, K Inoue
Empirical Software Engineering 23, 384-417, 2018
Search-based software library recommendation using multi-objective optimization
A Ouni, RG Kula, M Kessentini, T Ishio, DM German, K Inoue
Information and Software Technology 83, 55-75, 2017
Extracting sequence diagram from execution trace of Java program
K Taniguchi, T Ishio, T Kamiya, S Kusumoto, K Inoue
Eighth International Workshop on Principles of Software Evolution (IWPSE'05 …, 2005
Extracting code clones for refactoring using combinations of clone metrics
E Choi, N Yoshida, T Ishio, K Inoue, T Sano
Proceedings of the 5th International Workshop on Software Clones, 7-13, 2011
Visualizing the evolution of systems and their library dependencies
RG Kula, C De Roover, D German, T Ishio, K Inoue
2014 Second IEEE Working Conference on Software Visualization, 127-136, 2014
Towards smoother library migrations: A look at vulnerable dependency migrations at function level for npm javascript packages
RE Zapata, RG Kula, B Chinthanet, T Ishio, K Matsumoto, A Ihara
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
Trusting a library: A study of the latency to adopt the latest maven release
RG Kula, DM German, T Ishio, K Inoue
2015 IEEE 22nd International Conference on Software Analysis, Evolution, and …, 2015
Feature-level phase detection for execution trace using object cache
Y Watanabe, T Ishio, K Inoue
Proceedings of the 2008 international workshop on dynamic analysis: held in …, 2008
9.6 million links in source code comments: Purpose, evolution, and decay
H Hata, C Treude, RG Kula, T Ishio
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
Identifying source code reuse across repositories using lcs-based source code similarity
N Kawamitsu, T Ishio, T Kanda, RG Kula, C De Roover, K Inoue
2014 IEEE 14th international working conference on source code analysis and …, 2014
AMIDA: A sequence diagram extraction toolkit supporting automatic phase detection
T Ishio, Y Watanabe, K Inoue
Companion of the 30th international conference on Software engineering, 969-970, 2008
Program slicing tool for effective software evolution using aspect-oriented technique
T Ishio, S Kusumoto, K Inoue
Sixth International Workshop on Principles of Software Evolution, 2003 …, 2003
An effective method to control interrupt handler for data race detection
M Higashi, T Yamamoto, Y Hayase, T Ishio, K Inoue
Proceedings of the 5th Workshop on Automation of Software Test, 79-86, 2010
Recommending verbs for rename method using association rule mining
Y Kashiwabara, Y Onizuka, T Ishio, Y Hayase, T Yamamoto, K Inoue
2014 Software Evolution Week-IEEE Conference on Software Maintenance …, 2014
Source file set search for clone-and-own reuse analysis
T Ishio, Y Sakaguchi, K Ito, K Inoue
2017 IEEE/ACM 14th International Conference on Mining Software Repositories …, 2017
Mining coding patterns to detect crosscutting concerns in java programs
T Ishio, H Date, T Miyake, K Inoue
2008 15th Working Conference on Reverse Engineering, 123-132, 2008
Lags in the release, adoption, and propagation of npm vulnerability fixes
B Chinthanet, RG Kula, S McIntosh, T Ishio, A Ihara, K Matsumoto
Empirical Software Engineering 26, 1-28, 2021
Debugging support for aspect-oriented program based on program slicing and call graph
T Ishio, S Kusumoto, K Inoue
20th IEEE International Conference on Software Maintenance, 2004 …, 2004
Software ingredients: Detection of third-party component reuse in java software release
T Ishio, RG Kula, T Kanda, DM German, K Inoue
Proceedings of the 13th International Conference on Mining Software …, 2016
A lightweight visualization of interprocedural data-flow paths for source code reading
T Ishio, S Etsuda, K Inoue
2012 20th IEEE International Conference on Program Comprehension (ICPC), 37-46, 2012
The system can't perform the operation now. Try again later.
Articles 1–20