Sciweavers

1494 search results - page 193 / 299
» Less Extreme Programming
Sort
View
229
Voted
POPL
2002
ACM
16 years 2 months ago
Composing dataflow analyses and transformations
Dataflow analyses can have mutually beneficial interactions. Previous efforts to exploit these interactions have either (1) iteratively performed each individual analysis until no...
Sorin Lerner, David Grove, Craig Chambers
148
Voted
PERCOM
2007
ACM
16 years 2 months ago
Automatic Generation of Device User-Interfaces?
One of the visions of pervasive computing is using mobile computers to interact with networked devices. A question raised by this vision is: Should the userinterfaces of these dev...
Olufisayo Omojokun, Prasun Dewan
116
Voted
CGO
2009
IEEE
15 years 9 months ago
Transparent Debugging of Dynamically Optimized Code
Debugging programs at the source level is essential in the software development cycle. With the growing importance of dynamic optimization, there is a clear need for debugging sup...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
TACAS
2009
Springer
131views Algorithms» more  TACAS 2009»
15 years 9 months ago
Verifying Reference Counting Implementations
Reference counting is a widely-used resource management idiom which maintains a count of references to each resource by incrementing the count upon an acquisition, and decrementing...
Michael Emmi, Ranjit Jhala, Eddie Kohler, Rupak Ma...
114
Voted
IPPS
2009
IEEE
15 years 9 months ago
Application profiling on Cell-based clusters
In this paper, we present a methodology for profiling parallel applications executing on the IBM PowerXCell 8i (commonly referred to as the “Cell” processor). Specifically, we...
Hikmet Dursun, Kevin J. Barker, Darren J. Kerbyson...