default search action
Masateru Tsunoda
- > Home > Persons > Masateru Tsunoda
Publications
- 2024
- [i8]Nikolay Fedorov, Yuta Yamasaki, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
Building Defect Prediction Models by Online Learning Considering Defect Overlooking. CoRR abs/2404.11033 (2024) - [i7]Yukasa Murakami, Yuta Yamasaki, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
The Effect of Defect (Re) Prediction on Software Testing. CoRR abs/2404.11040 (2024) - 2023
- [c51]Yuta Yamasaki, Nikolay Fedorov, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
Software Defect Prediction by Online Learning Considering Defect Overlooking. ISSREW 2023: 43-44 - [i6]Yuta Yamasaki, Nikolay Fedorov, Masateru Tsunoda, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
Software Defect Prediction by Online Learning Considering Defect Overlooking. CoRR abs/2308.13582 (2023) - [i5]Ryoto Shima, Masateru Tsunoda, Yukasa Murakami, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai:
Selecting Source Code Generation Tools Based on Bandit Algorithms. CoRR abs/2312.12813 (2023) - 2022
- [c50]Hiroshi Demanou, Akito Monden, Masateru Tsunoda:
A Dynamic Model Selection Approach to Mitigate the Change of Balance Problem in Cross-Version Bug Prediction. QuASoQ/SEED@APSEC 2022: 4-9 - [c48]Takuto Kudo, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto:
Preliminary Analysis of Review Method Selection Based on Bandit Algorithms. APSEC 2022: 492-496 - [c44]Takeru Tabo, Takuto Kudo, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Akito Monden:
Clone Detection Method Selection Based on Bandit Algorithm: a Preliminary Analysis. IWSC 2022: 53-54 - [c43]Masateru Tsunoda, Akito Monden, Koji Toda, Amjed Tahir, Kwabena Ebo Bennin, Keitaro Nakasai, Masataka Nagura, Kenichi Matsumoto:
Using Bandit Algorithms for Selecting Feature Reduction Techniques in Software Defect Prediction. MSR 2022: 670-681 - 2021
- [j10]Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Analysis of Work Efficiency and Quality of Software Maintenance Using Cross-Company Dataset. IEICE Trans. Inf. Syst. 104-D(1): 76-90 (2021) - [j9]Kenichi Ono, Masateru Tsunoda, Akito Monden, Kenichi Matsumoto:
Influence of Outliers on Estimation Accuracy of Software Development Effort. IEICE Trans. Inf. Syst. 104-D(1): 91-105 (2021) - [j7]Teruki Hayakawa, Masateru Tsunoda, Koji Toda, Keitaro Nakasai, Amjed Tahir, Kwabena Ebo Bennin, Akito Monden, Kenichi Matsumoto:
A Novel Approach to Address External Validity Issues in Fault Prediction Using Bandit Algorithms. IEICE Trans. Inf. Syst. 104-D(2): 327-331 (2021) - [c42]Takuya Asano, Masateru Tsunoda, Koji Toda, Amjed Tahir, Kwabena Ebo Bennin, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto:
Using Bandit Algorithms for Project Selection in Cross-Project Defect Prediction. ICSME 2021: 649-653 - 2018
- [c37]Naoki Kinoshita, Akito Monden, Masateru Tsunoda, Zeynep Yücel:
Predictability Classification for Software Effort Estimation. BCD 2018: 43-48 - 2017
- [j4]Akito Monden, Masateru Tsunoda, Mike Barker, Kenichi Matsumoto:
Examining Software Engineering Beliefs about System Testing Defects. IT Prof. 19(2): 58-64 (2017) - [j3]Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Benchmarking IT operations cost based on working time and unit cost. Sci. Comput. Program. 135: 75-87 (2017) - 2016
- [c26]Kenichi Ono, Masateru Tsunoda, Akito Monden, Kenichi Matsumoto:
Influence of outliers on analogy based software development effort estimation. ICIS 2016: 1-6 - [c25]Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Analysis of information system operation cost based on working time and unit cost. ICIS 2016: 1-6 - 2015
- [c20]Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Benchmarking Software Maintenance Based on Working Time. ACIT-CSI 2015: 20-27 - 2012
- [c15]Masateru Tsunoda, Akito Monden, Jacky Wai Keung, Ken-ichi Matsumoto:
Incorporating Expert Judgment into Regression Models of Software Effort Estimation. APSEC 2012: 374-379 - [c14]Masateru Tsunoda, Sousuke Amasaki, Akito Monden:
Handling categorical variables in effort estimation. ESEM 2012: 99-102 - [c13]Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, Tomoki Oshino:
Analysis of Attributes Relating to Custom Software Price. IWESEP 2012: 16-22 - 2011
- [c12]Masateru Tsunoda, Akito Monden, Jun-ichiro Shibata, Ken-ichi Matsumoto:
Empirical Evaluation of Cost Overrun Prediction with Imbalance Data. ACIS-ICIS 2011: 415-420 - [c11]Masateru Tsunoda, Akito Monden, Tomoko Matsumura, Ken-ichi Matsumoto:
A Model of Project Supervision for Process Correction and Improvement. IWSM/Mensura 2011: 151-159 - [c10]Masateru Tsunoda, Takeshi Kakimoto, Akito Monden, Ken-ichi Matsumoto:
An empirical evaluation of outlier deletion methods for analogy-based cost estimation. PROMISE 2011: 17 - 2009
- [j1]Masateru Tsunoda, Akito Monden, Hiroshi Yadohisa, Nahomi Kikuchi, Ken-ichi Matsumoto:
Software development productivity of Japanese enterprise applications. Inf. Technol. Manag. 10(4): 193-205 (2009) - 2007
- [c7]Naoki Ohsugi, Akito Monden, Nahomi Kikuchi, Michael D. Barker, Masateru Tsunoda, Takeshi Kakimoto, Ken-ichi Matsumoto:
Is This Cost Estimate Reliable? - The Relationship between Homogeneity of Analogues and Estimation Reliability. ESEM 2007: 384-392 - 2006
- [c6]Masateru Tsunoda, Akito Monden, Hiroshi Yadohisa, Nahomi Kikuchi, Ken-ichi Matsumoto:
Productivity analysis of Japanese enterprise software development projects. MSR 2006: 14-17 - [c5]Takeshi Kakimoto, Akito Monden, Yasutaka Kamei, Haruaki Tamada, Masateru Tsunoda, Ken-ichi Matsumoto:
Using software birthmarks to identify similar classes and major functionalities. MSR 2006: 171-172 - [c4]Masateru Tsunoda, Akito Monden, Takeshi Kakimoto, Yasutaka Kamei, Ken-ichi Matsumoto:
Analyzing OSS developers' working time using mailing lists archives. MSR 2006: 181-182 - 2005
- [c3]Tomohiro Akinaga, Naoki Ohsugi, Masateru Tsunoda, Takeshi Kakimoto, Akito Monden, Ken-ichi Matsumoto:
Recommendation of Software Technologies Based on Collaborative Filtering. APSEC 2005: 209-216 - [c2]Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, Akito Monden, Ken-ichi Matsumoto:
Javawock: A Java Class Recommender System Based on Collaborative Filtering. SEKE 2005: 491-497 - 2004
- [c1]Naoki Ohsugi, Masateru Tsunoda, Akito Monden, Ken-ichi Matsumoto:
Effort Estimation Based on Collaborative Filtering. PROFES 2004: 274-286
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-23 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint