Sciweavers

26354 search results - page 105 / 5271
» How we refactor, and how we know it
Sort
View
CHI
2010
ACM
14 years 5 months ago
How to support designers in getting hold of the immaterial material of software
When designing novel GUI controls, interaction designers are challenged by the “immaterial” materiality of the digital domain; they lack tools that effectively support a refle...
Fatih Kursat Ozenc, Miso Kim, John Zimmerman, Step...
GLOBECOM
2009
IEEE
14 years 5 months ago
The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can
—802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show ...
Kevin S. Bauer, Damon McCoy, Eric W. Anderson, Mar...
CPAIOR
2009
Springer
14 years 4 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
AGILEDC
2008
IEEE
14 years 4 months ago
Agile Methods and User-Centered Design: How These Two Methodologies are Being Successfully Integrated in Industry
A core principle of Agile development is to satisfy the customer by providing valuable software on an early and continuous basis. For a software application to be valuable it shou...
David Fox, Jonathan Sillito, Frank Maurer
CSMR
2008
IEEE
14 years 4 months ago
How Lisp Systems Look Different
Many reverse engineering approaches have been developed to analyze software systems written in different languages like C/C++ or Java. These approaches typically rely on a meta-mo...
Adrian Dozsa, Tudor Gîrba, Radu Marinescu