Sciweavers

26354 search results - page 22 / 5271
» How we refactor, and how we know it
Sort
View
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
13 years 9 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
SOFTWARE
2011
13 years 2 months ago
A Refactoring Approach to Parallelism
—In the multicore era, a major programming task will be to make programs more parallel. This is tedious because it requires changing many lines of code, and it is error-prone and...
Danny Dig
SIGIR
2002
ACM
13 years 7 months ago
Analysis of papers from twenty-five years of SIGIR conferences: what have we been doing for the last quarter of a century?
mes, abstracts and year of publication of all 853 papers published.1 We then applied Porter stemming and stopword removal to this text, represented terms from the elds with twice t...
Alan F. Smeaton, Gary Keogh, Cathal Gurrin, Kieran...
LREC
2008
180views Education» more  LREC 2008»
13 years 9 months ago
Do we Still Need Gold Standards for Evaluation?
The availability of a huge mass of textual data in electronic format has increased the need for fast and accurate techniques for textual data processing. Machine learning and stat...
Thierry Poibeau, Cédric Messiant
IWPSE
2005
IEEE
14 years 1 months ago
How Developers Drive Software Evolution
As systems evolve their structure change in ways not expected upfront. As time goes by, the knowledge of the developers becomes more and more critical for the process of understan...
Tudor Gîrba, Adrian Kuhn, Mauricio Seeberger...