Sciweavers

26354 search results - page 130 / 5271
» How we refactor, and how we know it
Sort
View
DSML
2008
107views Formal Methods» more  DSML 2008»
13 years 11 months ago
How Web 2.0 can Leverage Model Engineering in Practice
: Today's online model repositories offer to download and view the textual specifications of e.g. metamodels and models in the browser. For users, in order to efficiently sear...
Manuel Wimmer, Andrea Schauerhuber, Michael Stromm...
PPOPP
2009
ACM
14 years 11 months ago
How much parallelism is there in irregular applications?
Irregular programs are programs organized around pointer-based data structures such as trees and graphs. Recent investigations by the Galois project have shown that many irregular...
Milind Kulkarni, Martin Burtscher, Rajeshkar Inkul...
JUCS
2010
141views more  JUCS 2010»
13 years 8 months ago
How is e-Government Progressing? A Data Driven Approach to E-government Monitoring
: As ICT provide a lot of possibilities, high expectancies exist towards the electronic public service provision. All governments are increasingly establishing their e-strategies. ...
Jeroen Stragier, Pieter Verdegem, Gino Verleye
AINA
2010
IEEE
13 years 7 months ago
TCP Testing: How Well Does ns2 Match Reality?
New transport protocols continue to appear as alternatives to the Transmission Control Protocol (TCP). Many of these are are designed to address TCP's inefficiency in operatin...
Martin Bateman, Saleem N. Bhatti
CHI
2010
ACM
13 years 10 months ago
How routine learners can support family coordination
Researchers have detailed the importance of routines in how people live and work, while also cautioning system designers about the importance of people's idiosyncratic behavi...
Scott Davidoff, John Zimmerman, Anind K. Dey