Sciweavers

336 search results - page 37 / 68
» Memories of bug fixes
Sort
View
SIGCSE
2008
ACM
138views Education» more  SIGCSE 2008»
13 years 7 months ago
Debugging: the good, the bad, and the quirky -- a qualitative analysis of novices' strategies
A qualitative analysis of debugging strategies of novice Java programmers is presented. The study involved 21 CS2 students from seven universities in the U.S. and U.K. Subjects &q...
Laurie Murphy, Gary Lewandowski, Renée McCa...
UIST
2010
ACM
13 years 5 months ago
Gestalt: integrated support for implementation and analysis in machine learning
We present Gestalt, a development environment designed to support the process of applying machine learning. While traditional programming environments focus on source code, we exp...
Kayur Patel, Naomi Bancroft, Steven M. Drucker, Ja...
SIGMOD
2004
ACM
128views Database» more  SIGMOD 2004»
14 years 7 months ago
A context-aware methodology for very small data base design
The design of a Data Base to be resident on portable devices and embedded processors for professional systems requires considering both the device memory peculiarities and the mobi...
Cristiana Bolchini, Fabio A. Schreiber, Letizia Ta...
JCP
2008
155views more  JCP 2008»
13 years 7 months ago
Algorithm to Optimize Code Size and Energy Consumption in Real Time Embedded System
Processor is an important computing element in portable battery operated real time embedded system and it consumes most of the battery energy. Energy consumption, processor memory ...
Santosh D. Chede, Kishore D. Kulat
SAC
2008
ACM
13 years 7 months ago
Filtering drowsy instruction cache to achieve better efficiency
Leakage power in cache memories represents a sizable fraction of total power consumption, and many techniques have been proposed to reduce it. As a matter of fact, during a fixed ...
Roberto Giorgi, Paolo Bennati