Sciweavers

762 search results - page 93 / 153
» A study of the uniqueness of source code
Sort
View
IWPC
2009
IEEE
14 years 3 months ago
Resumption strategies for interrupted programming tasks
Interruptions are a daily reality for professional programmers. Unfortunately, the strategies programmers use to recover lost knowledge and resume work have not yet been well stud...
Chris Parnin, Spencer Rugaber
USENIX
1994
13 years 10 months ago
Probing TCP Implementations
In this paper, we demonstrate a technique called active probing used to study TCP implementations. Active probing treats a TCP implementation as a black box, and uses a set of pro...
Douglas Comer, John C. Lin
ICSM
1999
IEEE
14 years 1 months ago
Building Documentation Generators
In order to maintain the consistency between sources and documentation, while at the same time providing documentation at the design level, it is necessary to generate documentati...
Arie van Deursen, Tobias Kuipers
ICSE
1999
IEEE-ACM
14 years 1 months ago
Avoiding Packaging Mismatch with Flexible Packaging
To integrate a software component into a system, it must interact properly with the system's other components. Unfortunately,the decisions about how a component is to interac...
Robert DeLine
CVPR
2012
IEEE
11 years 11 months ago
Spherical hashing
Many binary code encoding schemes based on hashing have been actively studied recently, since they can provide efficient similarity search, especially nearest neighbor search, an...
Jae-Pil Heo, Youngwoon Lee, Junfeng He, Shih-Fu Ch...