default search action
Takako Nakatani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Takako Nakatani, Kazuaki Sato, Osamu Shigo:
Traverser: A method and a tool to extract user's traverses within web systems from ontology. Intell. Decis. Technol. 17(1): 229-242 (2023) - 2022
- [j8]Jun-ichi Ichimura, Takako Nakatani:
Pattern to improve reusability of numerical simulation: Object-Action pattern. Intell. Decis. Technol. 16(4): 717-723 (2022) - [c44]Junichi Ichimurar, Takako Nakatani:
Pattern to Improve Reusability of Numerical Simulation. JCKBSE 2022: 27-37 - [c43]Kazuhiko Ogawa, Takako Nakatani:
Supporting Code Review by a Neural Network Using Program Images. JCKBSE 2022: 69-81 - 2021
- [c42]Tetsuro Kakeshita, Kazuo Ishii, Yoshiharu Ishikawa, Hitoshi Matsubara, Yutaka Matsuo, Tsuyoshi Murata, Miyuki Nakano, Takako Nakatani, Haruhiko Okumura, Naoko Takahashi, Norimitsu Takahashi, Gyo Uchida, Eriko Uematsu, Satoshi Saeki, Hiroshi Kato:
Development of IPSJ Data Science Curriculum Standard. OCCE 2021: 156-167 - [c41]Shin Nakajima, Takako Nakatani:
AI Extension of SQuaRE Data Quality Model. QRS Companion 2021: 306-313
2010 – 2019
- 2019
- [c40]Takako Nakatani, Hideo Goto, Taichi Nakamura, Osamu Shigo:
A method to generate traverse paths for eliciting missing requirements. ACSW 2019: 54:1-54:10 - [c39]Yuichi Tsujiwaki, Takako Nakatani:
An Idea Support Method and a Tool for New Product Development. HCI (33) 2019: 95-102 - [c38]Kazuhiko Ogawa, Takako Nakatani:
Predicting Fault Proneness of Programs with CNN. ICAART (1) 2019: 321-328 - 2018
- [c37]Keiichiro Abe, Takako Nakatani:
Moral Education for Adults for Information Ethics to Effect the Unknown Problem. JCKBSE 2018: 43-52 - [c36]Takako Nakatani, Hideo Goto, Osamu Shigo, Taichi Nakamura:
Generating Scenarios with Access Permission from a Conceptual Model. JCKBSE 2018: 127-136 - 2017
- [j7]Atsushi Kitani, Taketo Kimura, Takako Nakatani:
Toward the reduction of incorrect drawn ink retrieval. Hum. centric Comput. Inf. Sci. 7: 18 (2017) - 2016
- [c35]Atsushi Kitani, Takako Nakatani:
A Suitable Design for Natural Menu Opening Manipulations When Note-Taking on Tablet Devices. HCI (26) 2016: 358-363 - [e1]Seok-Won Lee, Takako Nakatani:
Requirements Engineering Toward Sustainable World - Third Asia-Pacific Symposium, APRES 2016, Nagoya, Japan, November 10-12, 2016, Proceedings. Communications in Computer and Information Science 671, 2016, ISBN 978-981-10-3255-4 [contents] - 2015
- [c34]Kenta Goto, Shinpei Ogata, Junko Shirogane, Takako Nakatani, Yoshiaki Fukazawa:
Support of Scenario Creation by Generating Event Lists from Conceptual Models. MODELSWARD 2015: 376-383 - 2014
- [j6]Takako Nakatani, Shouzo Hori, Keiichi Katamine, Michio Tsuda, Toshihiko Tsumaki:
Estimation of the Maturation Type of Requirements from Their Accessibility and Stability. IEICE Trans. Inf. Syst. 97-D(5): 1039-1048 (2014) - [c33]Takako Nakatani, Toshihiko Tsumaki:
Predicting Requirements Changes by Focusing on the Social Relations. APCCM 2014: 65-70 - [c32]Takako Nakatani, Yuko Koiso:
A Method for Analyzing the Context of Stakeholders and their Requirements. ICSOFT EA 2014: 357-362 - [c31]Michitaro Okano, Takako Nakatani:
A Study on the OR Decomposition of Goal-Oriented Analysis Using GSN. JCKBSE 2014: 643-657 - 2013
- [c30]Mikio Aoyama, Takako Nakatani, Shinobu Saito, Yukako Iimura:
Requirements Engineering Based on REBOK (Requirements Engineering Body Of Knowledge) and Its Practice. APSEC (2) 2013: 79-80 - [c29]Takako Nakatani, Keita Sato:
A Scenario Analysis Method with User Emotion and Its Context. ICSOFT (Selected Papers) 2013: 57-71 - [c28]Takako Nakatani, Keita Sato:
MuLSA: Multi-Layered Scenario Analysis for an Advanced Driver Assistance System. ICSOFT 2013: 83-91 - 2012
- [j5]Takako Nakatani:
Foreword. IEICE Trans. Inf. Syst. 95-D(4): 909-910 (2012) - [j4]Takako Nakatani, Narihito Kondo, Junko Shirogane, Haruhiko Kaiya, Shouzo Hori, Keiichi Katamine:
Toward the Decision Tree for Inferring Requirements Maturation Types. IEICE Trans. Inf. Syst. 95-D(4): 1021-1030 (2012) - [c27]Hideki Nakakita, Kazuhiko Tsuda, Takako Nakatani:
An evaluation of a quality model for a high quality procurement specification. JCKBSE 2012: 98-107 - [c26]Atsushi Motoyama, Takako Nakatani:
A metamodel for design review derived from design specification templates. JCKBSE 2012: 108-117 - 2011
- [c25]Takako Nakatani, Toshihiko Tsumaki, Michio Tsuda, Mari Inoki, Shouzo Hori, Keiichi Katamine:
Requirements Maturation Analysis by Accessibility and Stability. APSEC 2011: 357-364 - [c24]Takako Nakatani, Toshihiko Tsumaki:
Requirements maturation analysis based on the distance between the source and developers. CHASE 2011: 88-91 - 2010
- [j3]Shouzo Hori, Takako Nakatani, Keiichi Katamine, Naoyasu Ubayashi, Masaaki Hashimoto:
Project Management Patterns to Prevent Schedule Delay Caused by Requirement Elicitation. IEICE Trans. Inf. Syst. 93-D(4): 745-753 (2010) - [j2]Takako Nakatani, Shouzo Hori, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto:
A Case Study of Requirements Elicitation Process with Changes. IEICE Trans. Inf. Syst. 93-D(8): 2182-2189 (2010) - [c23]Mikio Aoyama, Takako Nakatani, Shinobu Saito, Mikio Suzuki, Kazuaki Fujita, Hiroaki Nakazaki, Ritsuo Suzuki:
A Model and Architecture of REBOK (Requirements Engineering Body of Knowledge) and Its Evaluation. APSEC 2010: 50-59 - [c22]Takako Nakatani, Toshihiko Tsumaki, Tetsuo Tamai:
Requirements engineering education for senior engineers: Course design and its evaluation. REET 2010: 26-35 - [c21]Mikio Aoyama, Takako Nakatani, Shinobu Saito:
REBOK Manifest: Towards a Requirements Engineering Body of Knowledge. RE 2010: 383-384
2000 – 2009
- 2009
- [c20]Shouzo Hori, Takako Nakatani, Keiichi Katamine, Naoyasu Ubayashi, Masaaki Hashimoto:
Project Management Patterns to Prevent Schedule Delay Caused by Requirements Changes - Empirical Study on a Successful Project. ICSOFT (1) 2009: 115-120 - [c19]Takako Nakatani, Shouzo Hori, Michio Tsuda, Mari Inoki, Keiichi Katamine, Masaaki Hashimoto:
Towards a Strategic Requirements Elicitation - A Proposal of the PRINCE Model. ICSOFT (1) 2009: 145-150 - 2008
- [c18]Keiichi Katamine, Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Naoyasu Ubayashi, Takako Nakatani:
A Conceptual Model for Analysis Method of Extracting Unexpected Obstacles of Embedded Systems. JCKBSE 2008: 22-31 - [c17]Keiichi Ishibashi, Masaaki Hashimoto, Keiichi Katamine, Ryoma Shiratsuchi, Keita Asaine, Takako Nakatani, Naoyasu Ubayashi, Yoshihiro Akiyama:
A Discussion on Domain Modeling in an Example of Motivation-Based Human Resource Management. JCKBSE 2008: 32-41 - [c16]Takako Nakatani:
Requirements Engineering Education for Professional Engineers. JCKBSE 2008: 495-504 - [c15]Takako Nakatani, Shouzo Hori, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto:
A Case Study: Requirements Elicitation Processes throughout a Project. RE 2008: 241-246 - [c14]Zhongqi Sheng, Hiroshi Tsuji, Akito Sakurai, Kenichi Yoshida, Takako Nakatani:
Preliminary Analysis for Risk Finding in Offshore Software Outsourcing from Vendor's Viewpoint. SEAFOOD 2008: 134-148 - 2007
- [c13]Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Keiichi Katamine, Naoyasu Ubayashi, Takako Nakatani:
Enhancing the ESIM (Embedded Systems Improving Method) by Combining Information Flow Diagram with Analysis Matrix for Efficient Analysis of Unexpected Obstacles in Embedded Software. APSEC 2007: 326-333 - [c12]Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Keiichi Katamine, Naoyasu Ubayashi, Takako Nakatani:
A Suggestion for Analysis of Unexpected Obstacles in Embedded System. HCI (8) 2007: 755-768 - 2006
- [c11]Toshiro Mise, Yasufumi Shinyashiki, Takako Nakatani, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto:
A Method for Extracting Unexpected Scenarios of Embedded Systems. JCKBSE 2006: 41-50 - [c10]Hidehiro Kametani, Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Naoyasu Ubayashi, Keiichi Katamine, Takako Nakatani:
Information Flow Diagram and Analysis Method for Unexpected Obstacle Specification of Embedded Software. JCKBSE 2006: 115-124 - [c9]Takako Nakatani, Haruhiko Kaiya:
Japanese Workshop on Requirements Engineering Tools (JWRET). ASE 2006: 378 - 2005
- [c8]Takako Nakatani, Terunobu Fujino:
Role and Owner based Business Domain Analysis. APSEC 2005: 130-137 - [c7]Toshiro Mise, Masaaki Hashimoto, Keiichi Katamine, Yasufumi Shinyashiki, Naoyasu Ubayashi, Takako Nakatani:
An Analysis Method with Failure Scenario Matrix for Specifying Unexpected Obstacles in Embedded Systems. APSEC 2005: 447-456 - 2004
- [c6]Susumu Kanemune, Takako Nakatani, Rie Mitarai, Shingo Fukui, Yasushi Kuno:
Dolittle - Experiences in Teaching Programming at K12 Schools. C5 2004: 177-184 - 2002
- [c5]Tetsuo Tamai, Takako Nakatani:
Analysis of software evolution processes using statistical distribution Models. IWPSE 2002: 120-123 - 2001
- [c4]Takako Nakatani, Tetsuya Urai, Sou Ohmura, Tetsuo Tamai:
A Requirements Description Metamodel for Use Cases. APSEC 2001: 251-258 - [c3]Takako Nakatani:
Quantitative Observations on Object Evolution. IWPSE 2001: 154-157 - 2000
- [j1]Takako Nakatani, Tetsuo Tamai:
Organizing process of objects viewed in multiple perspectives. Syst. Comput. Jpn. 31(3): 1-10 (2000)
1990 – 1999
- 1999
- [c2]Takako Nakatani, Tetsuo Tamai:
Empirical Observations on Object Evolution. APSEC 1999: 2-9 - 1997
- [c1]Takako Nakatani, Tetsuo Tamai, Atsushi Tomoeda, Harumi Matsuda:
Towards Constructing a Class Evolution Model. APSEC 1997: 131-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint