Sciweavers

1412 search results - page 146 / 283
» The Value of Outsourced Software
Sort
View
CSCW
2010
ACM
16 years 1 months ago
Notifications and awareness: a field study of alert usage and preferences
Desktop notifications are designed to provide awareness of information while a user is attending to a primary task. Unfortunately the awareness can come with the price of disrupti...
Shamsi T. Iqbal, Eric Horvitz
FOSSACS
2010
Springer
15 years 11 months ago
Completeness for Algebraic Theories of Local State
Every algebraic theory gives rise to a monad, and monads allow a meta-language which is a basic programming language with sideeffects. Equations in the algebraic theory give rise ...
Sam Staton
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 11 months ago
Bridge Methods: Using a Balanced Project Practice Portfolio to Integrate Agile and Formal Process Methodologies
This paper examines the non-linear nature of progress on software projects. It asserts that this uneven accomplishment stems from the continuous need to drive value quickly in res...
Stephen J. Cohen, William H. Money
ICCS
2009
Springer
15 years 11 months ago
A Holistic Approach for Performance Measurement and Analysis for Petascale Applications
Abstract. Contemporary high-end Terascale and Petascale systems are composed of hundreds of thousands of commodity multi-core processors interconnected with high-speed custom netwo...
Heike Jagode, Jack Dongarra, Sadaf R. Alam, Jeffre...
SAS
2007
Springer
15 years 10 months ago
Program Analysis Using Symbolic Ranges
Interval analysis seeks static lower and upper bounds on the values of program variables. These bounds are useful, especially for inferring invariants to prove buffer overflow ch...
Sriram Sankaranarayanan, Franjo Ivancic, Aarti Gup...