Sciweavers

524 search results - page 14 / 105
» Why phishing works
Sort
View
CHI
2009
ACM
14 years 9 months ago
Understanding how and why open source contributors use diagrams in the development of Ubuntu
Some of the most interesting differences between Open Source Software (OSS) development and commercial colocated software development lie in the communication and collaboration pr...
Koji Yatani, Eunyoung Chung, Carlos Jensen, Khai N...
CHI
2007
ACM
14 years 8 months ago
Let's go to the whiteboard: how and why software developers use drawings
Software developers are rooted in the written form of their code, yet they often draw diagrams representing their code. Unfortunately, we still know little about how and why they ...
Mauro Cherubini, Gina Venolia, Robert DeLine, Andr...
CHI
2009
ACM
14 years 3 months ago
Understanding why we preserve some things and discard others in the context of interaction design
This paper takes up the problem of understanding why we preserve some things passionately and discard others without thought. We briefly report on the theoretical literature relat...
William Odom, James Pierce, Erik Stolterman, Eli B...
COMPSAC
2007
IEEE
14 years 2 months ago
Architecture-Based Software Reliability: Why Only a Few Parameters Matter?
Uncertainty analysis through sensitivity studies and quantification of the variance of the reliability estimate has become more common in architecture-based software reliability ...
Katerina Goseva-Popstojanova, Margaret Hamill
SIGSOFT
2008
ACM
14 years 9 months ago
Why do developers neglect exception handling?
In this paper, we explore the problems associated with exception handling from a new dimension: the human. We designed a study that evaluates (1) different perspectives of softwar...
Carsten Görg, Hina Shah, Mary Jean Harrold