Sciweavers

26354 search results - page 112 / 5271
» How we refactor, and how we know it
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 5 months ago
The Commit Size Distribution of Open Source Software
With the growing economic importance of open source, we need to improve our understanding of how open source software development processes work. The analysis of code contribution...
Oliver Arafat, Dirk Riehle
GECCO
2003
Springer
14 years 3 months ago
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It
This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties...
John A. Clark, Jeremy L. Jacob, Susan Stepney
WWW
2007
ACM
14 years 11 months ago
How NAGA uncoils: searching with entities and relations
Current keyword-oriented search engines for the World Wide Web do not allow specifying the semantics of queries. We address this limitation with NAGA1 , a new semantic search engi...
Gjergji Kasneci, Fabian M. Suchanek, Maya Ramanath...
WWW
2006
ACM
14 years 11 months ago
How semantics make better wikis
Wikis are popular collaborative hypertext authoring environments, but they neither support structured access nor information reuse. Adding semantic annotations helps to address th...
Eyal Oren, John G. Breslin, Stefan Decker
ICFP
2007
ACM
14 years 10 months ago
Functional pearl: the great escape or, how to jump the border without getting caught
Filinski showed that callcc and a single mutable reference cell are sufficient to express the delimited control operators shift and reset. However, this implementation interacts p...
David Herman