論文誌
[1] Tomoko Matsumura, Akito Monden, Shuji Morisaki, and Ken-ichi Matsumoto, "Analyzing Factors of Defect Correction Effort in a Multi-Vendor Information System Development," Journal of Computer Information Systems, volume XLIX, number 1, pages 73-80 November 2008.
[2] Noboru Nakamichi, Makoto Sakai, Kazuyuki Shima, Jian Hu, and Ken-ichi Matsumoto, "Webtracer: a New Web Usability Evaluation Environment Using Gazing Point Information," Electronic Commerce Research and Applications, volume 6, number 1, pages 63-73 January 2007.
[3] Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto, "Quantitative Analysis of Information Leakage in Security-Sensitive Software Processes," IPSJ Journal, Special Issue on Research on Computer Security Characterized in the Context of Social Responsibilities, volume 46, number 8, pages 2129-2141 August 2005.
国際会議
[1] Masateru Tsunoda, Akito Monden, Kenichi Matsumoto, Sawako Ohiwa, and Tomoki Oshino, "Analysis of Information System Operation Cost Based on Working Time and Unit Cost," In In Proc. of 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016), pages 837-842 June 2016.
[2] Soichiro Tani, Akinori Ihara, Masao Ohira, Hidetake Uwano, and Ken-ichi Matsumoto, "A System for Information Integration between Development Support Systems," In The International Workshop on Empirical Software Engineering in Practice (IWESEP2011), pages 33-34 November 2011.
[3] Masateru Tsunoda, Akito Monden, Ken-ichi Matsumoto, Akihiko Takahashi, and Tomoki Oshino, "An Empirical Analysis of Information Technology Operations Cost," In Proc. of International Workshop on Software Measurement (IWSM/Metrikon/Mensura 2010), pages 571-585 November 2010.
[4] Masateru Tsunoda, Kohei Mitsui, Kyohei Fushida, Yasutaka Kamei, Masahide Nakamura, Keita Goto, and Ken-ichi Matsumoto, "An Authentication Method Combining Spatiotemporal Information and Actions," In Proc. of the 4th International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2008), pages 41-49 June 2008.
[5] Nozomi Satoh, Noboru Nakamichi, Makoto Sakai, and Hidetake Uwano, "An Analysis of Information Seeking Behavior on the Web in Novice Older Adults," In International Conference of the International Society for Gerontechnology, pages 83-85 June 2008.
[6] Naohiro Yuasa, Kohei Mitsui, Hiroki Sakakibara, Hiroshi Igaki, Masahide Nakamura, and Ken-ichi Matsumoto, "Operating Networked Appliances Using Gaze Information and Voice Recognition," In In Proc. of the IASTED International Conference on Human Computer Interaction (IASTED-HCI 2008), pages 107-112 March 2008.
[7] Kohei Mitsui, Hiroshi Igaki, Kentaro Takemura, Masahide Nakamura, and Ken-ichi Matsumoto, "Exploiting Eye Gaze Information for Operating Services in Home Network System," In 2006 International Symposium on Ubiquitous Computing Systems (UCS2006), volume LNCS4239, pages 13-27 October 2006.
[8] Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden, and Ken-ichi Matsumoto, "Characterizing Dynamics of Information Leakage in Software Process," In Proc. 3rd Australasian Information Security Workshop (AISW2005), volume 44, pages 145--151 January 2005.
国内会議(査読付き)
[1] 幾谷吉晴, 石尾隆, 吉上康平, 畑秀明, 松本健一, "ブロックチェーンを用いたソフトウェア情報の組織間共有," 第25回ソフトウェア工学の基礎ワークショップ(FOSE2018), pages 69-74 2018年11月.
表彰・受賞
[1] Akito Monden, Shinichi Sato, and Ken-ichi Matsumoto, "Best Paper of Information Systems Management Session, 5th World Multiconference on Systemics, Cybernetics and Informatics, "Capturing Industrial Experiences of Software Maintenance Using Product Metrics"," , August 2001.
学位論文
[1] Yuichiro Kanzaki, "Protecting Secret Information in Software Processes and Products," Ph.D. thesis, Nara Institute of Science and Technology, 2006.