Sciweavers

1494 search results - page 230 / 299
» Less Extreme Programming
Sort
View
SIGSOFT
2003
ACM
15 years 7 months ago
Evaluating and improving the automatic analysis of implicit invocation systems
Model checking and other finite-state analysis techniques have been very successful when used with hardware systems and less successful with software systems. It is especially di...
Jeremy S. Bradbury, Jürgen Dingel
CP
2003
Springer
15 years 7 months ago
Comparison of Symmetry Breaking Methods
Symmetry in a Constraint Satisfaction Problem can cause wasted search, which can be avoided by adding constraints to the CSP to exclude symmetric assignments or by modifying the s...
Karen E. Petrie
FPL
2003
Springer
259views Hardware» more  FPL 2003»
15 years 7 months ago
Branch Optimisation Techniques for Hardware Compilation
Abstract. This paper explores using information about program branch probabilities to optimise reconfigurable designs. The basic premise is to promote utilization by dedicating mo...
Henry Styles, Wayne Luk
MSR
2010
ACM
15 years 7 months ago
Clones: What is that smell?
—Clones are generally considered bad programming practice in software engineering folklore. They are identified as a bad smell and a major contributor to project maintenance dif...
Foyzur Rahman, Christian Bird, Premkumar T. Devanb...
UM
2010
Springer
15 years 7 months ago
A Study on User Perception of Personality-Based Recommender Systems
Our previous research indicates that using personality quizzes is a viable and promising way to build user profiles to recommend entertainment products. Based on these findings, ...
Rong Hu, Pearl Pu