Sciweavers

689 search results - page 61 / 138
» Program transformations for information personalization
Sort
View
EUROSPI
2004
Springer
15 years 8 months ago
Discovering the Relation Between Project Factors and Project Success in Post-mortem Evaluations
Post-mortem project reviews often yield useful lessons learned. These project reviews are mostly recorded in plain text. This makes it difficult to derive useful overall findings ...
Joost J. P. Schalken, Sjaak Brinkkemper, Hans van ...
ICSE
2008
IEEE-ACM
16 years 3 months ago
SpyWare: a change-aware development toolset
Our research is driven by the motivation that change must be put in the center, if one wants to understand the complex processes of software evolution. We built a toolset named Sp...
Romain Robbes, Michele Lanza
APLAS
2009
ACM
15 years 9 months ago
Witnessing Purity, Constancy and Mutability
Restricting destructive update to values of a distinguished reference type prevents functions from being polymorphic in the mutability of their arguments. This restriction makes it...
Ben Lippmeier
127
Voted
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 8 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
129
Voted
CASES
2003
ACM
15 years 7 months ago
Clustered calculation of worst-case execution times
Knowing the Worst-Case Execution Time (WCET) of a program is necessary when designing and verifying real-time systems. A correct WCET analysis method must take into account the po...
Andreas Ermedahl, Friedhelm Stappert, Jakob Engblo...