default search action
Shuichiro Yamamoto
- > Home > Persons > Shuichiro Yamamoto
Publications
- 2022
- [c99]Hironori Takeuchi, Yu Ito, Shuichiro Yamamoto:
Method for Constructing Machine Learning Project Canvas Based on Enterprise Architecture Modeling. KES 2022: 425-434 - 2021
- [e2]Nobukazu Yoshioka, Hironori Washizaki, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto, Fuyuki Ishikawa, Foutse Khomh, Giuliano Antoniol:
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), Nara, Japan, December 4, 2018. CEUR Workshop Proceedings 2809, CEUR-WS.org 2021 [contents] - 2020
- [j19]Yutaka Matsuno, Toshinori Takai, Shuichiro Yamamoto:
Facilitating Use of Assurance Cases in Industries by Workshops with an Agent-Based Method. IEICE Trans. Inf. Syst. 103-D(6): 1297-1308 (2020) - [c94]Hironori Takeuchi, Shuichiro Yamamoto:
Business Analysis Method for Constructing Business-AI Alignment Model. KES 2020: 1312-1321 - [c92]Hironori Takeuchi, Shuichiro Yamamoto:
Method for Assessing the Applicability of AI Service Systems. KES-HCIS 2020: 323-334 - 2019
- [c89]Junkyo Fujieda, Akira Fukushima, Kiichi Kawano, Shuichiro Yamamoto:
Knowledgeware Design Towards O-DA. IIAI-AAI 2019: 839-842 - [c83]Hironori Takeuchi, Shuichiro Yamamoto:
AI Service System Development Using Enterprise Architecture Modeling. KES 2019: 923-932 - [c81]Hironori Takeuchi, Shuichiro Yamamoto:
Business AI Alignment Modeling Based on Enterprise Architecture. KES-IDT (2) 2019: 155-165 - 2018
- [j16]Isabelle Comyn-Wattiau, Il-Yeol Song, Katsumi Tanaka, Motoshi Saeki, Shuichiro Yamamoto:
Guest editorial - Special issue on conceptual modeling - 35th International Conference on Conceptual Modeling (ER2016). Data Knowl. Eng. 117: 336-338 (2018) - [c79]Hironori Washizaki, Nobukazu Yoshioka, Eduardo B. Fernández, Tomoko Kaneko, Shuichiro Yamamoto:
Report of WESPr-18: the International Workshop on Evidence-based Security and Privacy in the Wild. WESPr-iMLSE@APSEC 2018: 1-2 - [c72]Shuichiro Yamamoto, Nada Ibrahem Olayan, Junkyo Fujieda:
e-Healthcare Service Design Using Model Based Jobs Theory. IIMSS 2018: 198-207 - [c69]Hironori Takeuchi, Shiki Akihara, Shuichiro Yamamoto:
Deriving Successful Factors for Practical AI System Development Projects Using Assurance Case. JCKBSE 2018: 22-32 - 2016
- [e1]Isabelle Comyn-Wattiau, Katsumi Tanaka, Il-Yeol Song, Shuichiro Yamamoto, Motoshi Saeki:
Conceptual Modeling - 35th International Conference, ER 2016, Gifu, Japan, November 14-17, 2016, Proceedings. Lecture Notes in Computer Science 9974, 2016, ISBN 978-3-319-46396-4 [contents] - 2014
- [c44]Takuya Saruwatari, Shuichiro Yamamoto:
Creation of Assurance Case Using Collaboration Diagram. ICT-EurAsia 2014: 413-418 - [c41]Nada Olayan, Shuichiro Yamamoto:
A Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD). JCKBSE 2014: 603-616 - 2013
- [j11]Yutaka Matsuno, Shuichiro Yamamoto:
A New Method for Writing Assurance Cases. Int. J. Secur. Softw. Eng. 4(1): 31-49 (2013) - [j10]Yutaka Matsuno, Shuichiro Yamamoto:
A Framework for Dependability Consensus Building and In-Operation Assurance. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(1): 118-134 (2013) - [c37]Vaise Patu, Shuichiro Yamamoto:
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process. CD-ARES Workshops 2013: 457-464 - [c36]Vaise Patu, Shuichiro Yamamoto:
Identifying and Implementing Security Patterns for a Dependable Security Case - From Security Patterns to D-Case. CSE 2013: 138-142 - [c35]Nada Olayan, Vaise Patu, Yutaka Matsuno, Shuichiro Yamamoto:
A Dependability Assurance Method Based on Data Flow Diagram (DFD). EMS 2013: 113-118 - [c34]Shuichiro Yamamoto, Yutaka Matsuno:
An evaluation of argument patterns to reduce pitfalls of applying assurance case. ASSURE@ICSE 2013: 12-17 - [c33]Yutaka Matsuno, Shuichiro Yamamoto:
An implementation of GSN community standard. ASSURE@ICSE 2013: 24-28 - [c32]Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka:
A Proposal on Security Case Based on Common Criteria. ICT-EurAsia 2013: 331-336 - [c31]Vaise Patu, Shuichiro Yamamoto:
A new model to capture security threat patterns by complying with standards and lesson learned - Archiving dependability for security assurance cases. ISSRE (Supplemental Proceedings) 2013: 17-18 - [c30]Miki Masumoto, Tatsuya Tokuno, Shuichiro Yamamoto:
A method for assuring service grade with Assurance case: An experiment on a portal service. ISSRE (Supplemental Proceedings) 2013: 311-314 - [c29]Takuya Saruwatari, Shuichiro Yamamoto, Yutaka Matsuno:
A comparative study of d∗framework and GSN. ISSRE (Supplemental Proceedings) 2013: 315-320 - [c28]Masanori Matsumura, Vaise Patu, Yutaka Matsuno, Shota Takama, Tatsuya Tokuno, Shuichiro Yamamoto:
A Method to Share Word Knowledge of Dependability Case. KES 2013: 10-19 - [c27]Vaise Patu, Shuichiro Yamamoto:
How to Develop Security Case by Combining Real Life Security Experiences (Evidence) with D-case. KES 2013: 954-959 - [c25]Takuya Saruwatari, Takashi Hoshino, Shuichiro Yamamoto:
Method to Share Responsibility Knowledge of Dependability Cases. KES 2013: 1073-1082 - 2012
- [c24]Yutaka Matsuno, Shuichiro Yamamoto:
Consensus Building and In-operation Assurance for Service Dependability. CD-ARES 2012: 639-653 - [c23]Shota Takama, Vaise Patu, Yutaka Matsuno, Shuichiro Yamamoto:
A Proposal on a Method for Reviewing Operation Manuals of Supercomputer. ISSRE Workshops 2012: 305-306 - [c22]Vaise Patu, Yutaka Matsuno, Shuichiro Yamamoto:
Application of D-Case to the Data-Upload Flow Diagram Scenario of the Distributed E-Learning System Called KISSEL. ISSRE Workshops 2012: 307-312 - [c21]Shuichiro Yamamoto, Yutaka Matsuno:
A review method based on a matrix interpretation of GSN. JCKBSE 2012: 36-42 - [c20]Takuya Saruwatari, Takashi Hoshino, Shuichiro Yamamoto:
Evaluation of an Assurance Case development method (d*). JCKBSE 2012: 72-80 - [c19]Yutaka Matsuno, Shuichiro Yamamoto:
Toward Dynamic Assurance Cases. JCKBSE 2012: 154-160 - 2010
- [j9]Noboru Hattori, Shuichiro Yamamoto, Tsuneo Ajisaka, Tsuyoshi Kitani:
Proposal for Requirement Validation Criteria and Method Based on Actor Interaction. IEICE Trans. Inf. Syst. 93-D(4): 679-692 (2010) - 2009
- [c16]Shuichiro Yamamoto, Komon Ibe, June M. Verner, Karl Cox, Steven J. Bleistein:
Actor Relationship Analysis for the i* Framework. ICEIS 2009: 491-500 - 2008
- [c13]Komon Ibe, Shinobu Saito, Shuichiro Yamamoto:
ARM: Actor Relationship Matrix. JCKBSE 2008: 423-426 - 2007
- [c11]Junzo Kato, Motoshi Saeki, Atsushi Ohnishi, Haruhiko Kaiya, Shuichiro Yamamoto:
Effects of Thesaurus in Requirements Elicitation. RCIS 2007: 385-394 - 2006
- [j7]Shuichiro Yamamoto, Haruhiko Kaiya, Karl Cox, Steven J. Bleistein:
Goal Oriented Requirements Engineering: Trends and Issues. IEICE Trans. Inf. Syst. 89-D(11): 2701-2711 (2006) - [c10]Shinobu Saito, Shuichiro Yamamoto:
The Incremental Goal Evolution Process Methodology. BUSITAL 2006 - [c8]Shinobu Saito, Shuichiro Yamamoto:
Business Process Analysis using Reference Model. JCKBSE 2006: 151-154 - 2003
- [c7]Junzo Kato, Morio Nagata, Shuichiro Yamamoto, Motoshi Saeki, Haruhiko Kaiya, Hisayuki Horai, Atsushi Ohnishi, Seiichi Komiya, Kenji Watahiki:
PAORE: Package Oriented Requirements Elicitation. APSEC 2003: 17- - 2001
- [c6]Junzo Kato, Seiichi Komiya, Motoshi Saeki, Atsushi Ohnishi, Morio Nagata, Shuichiro Yamamoto, Hisayuki Horai:
A Model for Navigating Interview Processes in Requirements Elicitation. APSEC 2001: 141-148 - 1995
- [j5]Kenji Takahashi, Shuichiro Yamamoto:
An Analysis of Traceability in Requirements Documents. IEICE Trans. Inf. Syst. 78-D(4): 394-402 (1995) - [j3]Sadahiro Isoda, Shuichiro Yamamoto, Hiroaki Kuroki, Atsuko Oka:
Evaluation and introduction of the structured methodology and a CASE tool. J. Syst. Softw. 28(1): 49-58 (1995) - [j2]Kenji Takahashi, Atsuko Oka, Shuichiro Yamamoto, Sadahiro Isoda:
A comparative study of structured and text-oriented analysis and design methodologies. J. Syst. Softw. 28(1): 69-75 (1995) - 1993
- [c1]Atsuko Oka, Shuichiro Yamamoto, Sadahiro Isoda:
Consistency Management for Software Design Information Repository. ICCI 1993: 579-585
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint