Sciweavers

1195 search results - page 56 / 239
» What, Where
Sort
View
ICSE
2010
IEEE-ACM
13 years 7 months ago
Code clone detection in practice
Due to the negative impact of code cloning on software maintenance efforts as well as on program correctness [4–6], the duplication of code is generally viewed as problematic. ...
Florian Deissenboeck, Benjamin Hummel, Elmar J&uum...
SLOGICA
2010
97views more  SLOGICA 2010»
13 years 7 months ago
An Internal Version of Epistemic Logic
Abstract. Representing an epistemic situation involving several agents obviously depends on the modeling point of view one takes. We start by identifying the types of modeling poin...
Guillaume Aucher
BIRTHDAY
2005
Springer
13 years 10 months ago
History and Future of Implicit and Inductionless Induction: Beware the Old Jade and the Zombie!
Abstract. In this survey on implicit induction I recollect some memories on the history of implicit induction as it is relevant for future research on computer-assisted theorem pro...
Claus-Peter Wirth
SIGSAND
2008
13 years 10 months ago
Boundary Objects for Value-based Requirements Engineering
: Value-based requirements engineering focuses on the alignment of requirements engineering decisions and business value decisions. There is much evidence on the importance of this...
Barbara Paech, Aybüke Aurum
ECSCW
2001
13 years 10 months ago
Reducing interference in single display groupware through transparency
Single Display Groupware (SDG) supports face-to-face collaborators working over a single shared display, where all people have their own input device Although SDG is simple in conc...
Ana Zanella, Saul Greenberg