Tetsuji Fukaya
Toshiba
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Tetsuji Fukaya.
international conference on software maintenance | 2002
Yoshio Kataoka; Takeo Imai; Hiroki Andou; Tetsuji Fukaya
Program refactoring is a technique to enhance the maintainability of a program. Although the concept itself is considered to be effective, there are few quantitative evaluation of its impact to the software maintainability. It is sometimes difficult to judge whether the refactoring in question should be applied or not without knowing the effect accurately. We propose a quantitative evaluation method to measure the maintainability enhancement effect of program refactoring. We focused on the coupling metrics to evaluate the refactoring effect. By comparing the coupling before and after the refactoring, we could evaluate the degree of maintainability enhancement. We applied our method to a certain program and showed that our method was really effective to quantify the refactoring effect and helped us to choose appropriate refactorings.
computer software and applications conference | 2002
Tetsuro Imai; Yoshio Kataoka; Tetsuji Fukaya
Source code copying for reuse (code cloning) is often observed in software implementations. Such code cloning causes difficulty when software functionalities are modified: i.e, cloned codes increase the maintenance cost of software. We aim to estimate the maintenance cost caused by clones. We propose a novel approach, which evaluates influence of cloned codes over the maintenance cost. The basic idea is to measure functional redundancy (FR): a degree of propagation of clone-potential functions. FR is measured as follows: first, we cluster functions in the software according to similarities between them. Second, we make an n-ary weighted tree(FR tree) based on the cluster. Finally, we measure FR by weight of each node in FR-tree. In this paper, we describe the details of our proposal. We also apply the approach to 17K-ELOC C code to demonstrate its effectiveness.
ieee international symposium on fault tolerant computing | 1994
Tetsuji Fukaya; Masayuki Hirayama; Yukihiro Mihara
We propose a verification method for software specification. In order to avoid software faults, our method derives safety assertions using FTA, computes the behavioral graph of specification and analyzes statically whether this graph satisfies safety assertions. Moreover, when there exists an assertion which can not hold, our method localizes software design faults.<<ETX>>
computer software and applications conference | 1991
Tetsuji Fukaya; Morio Nagata
Focusing on logic programming, a practical method is proposed for verifying and debugging large programs invoking many subprograms. If a programmer gives a few simple constraints on arguments of the top-level program, then the approach automatically verifies that these constraints hold with a method for propagating constraints to its subprograms. Using both propagated constraints and recursive structure of programs, the method verifies the correctness of there constraints with an inductive method. Moreover, when these exists a constraint which can not hold, the approach shows debugging information on the program. The authors have implemented a verifying and debugging system for Prolog programs based on their method. Some experimental results are described.<<ETX>>
asia-pacific software engineering conference | 1995
Yoshio Kataoka; Masayuki Hirayama; Jiro Okayasu; Tetsuji Fukaya
The paper describes a quality assurance approach for source code to assure source code quality with less effort than conventional method. The paper introduces the data relation tracking method (DRTM) as a practical instance of data oriented program analysis, a key factor of our new quality assurance approach. DRTM helps comprehension of the source code by extracting the internal logic of the source code in declarative notation. An example and evaluation of DRTM for the C language is also described. The example shows that DRTM can deal in data structures and inter-data relations of any control structure. The evaluation shows that DRTM can extract the internal logic of the source code uniquely and that the extracted internal logic is useful for quality assurance of the source code.
Archive | 2000
Nobuhiro Ono; Tetsuji Fukaya; Yoshio Kataoka
Archive | 1999
Tetsuji Fukaya
Archive | 1994
Tetsuji Fukaya; Masayuki Hirayama; Jiro Okayasu; 二郎 岡安; 雅之 平山; 哲司 深谷
Archive | 2004
Nobuhiro Nonogaki; Takashi Akiba; Tetsuji Fukaya
Archive | 2004
Nobuhiro Nonogaki; Takashi Akiba; Tetsuji Fukaya