From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Nakasai, Keitaro
add a person with the name Nakasai, Keitaro
 

Другие публикации лиц с тем же именем

Using Bandit Algorithms for Project Selection in Cross-Project Defect Prediction., , , , , , , и . ICSME, стр. 649-653. IEEE, (2021)Toward Sustainable Communities with a Community Currency - A Study in Car Sharing., , , , и . SNPD, стр. 478-483. IEEE, (2019)Identifying Spoofing Accounts on Twitter Based on Relationships of Accounts., , , и . BCD, стр. 85-90. IEEE Computer Society, (2018)Clone Detection Method Selection Based on Bandit Algorithm: a Preliminary Analysis., , , , , , , и . IWSC, стр. 53-54. IEEE, (2022)Software Defect Prediction by Online Learning Considering Defect Overlooking., , , , , , , и . ISSREW, стр. 43-44. IEEE, (2023)Preliminary Analysis of Review Method Selection Based on Bandit Algorithms., , , , , , , и . APSEC, стр. 492-496. IEEE, (2022)Analysis of Donations in the Eclipse Project., , , и . IWESEP, стр. 18-22. IEEE Computer Society, (2017)The Effect of Defect (Re) Prediction on Software Testing., , , , , , , и . CoRR, (2024)Using Bandit Algorithms for Selecting Feature Reduction Techniques in Software Defect Prediction., , , , , , , и . MSR, стр. 670-681. ACM, (2022)Are Donation Badges Appealing?: A Case Study of Developer Responses to Eclipse Bug Reports., , и . IEEE Software, 36 (3): 22-27 (2019)