Sciweavers

20017 search results - page 3819 / 4004
» Using personas effectively
Sort
View
144
Voted
CC
2010
Springer
190views System Software» more  CC 2010»
15 years 10 months ago
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
On Chip Multiprocessors (CMP), it is common that multiple cores share certain levels of cache. The sharing increases the contention in cache and memory-to-chip bandwidth, further h...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Xipeng She...
152
Voted
EDBT
2010
ACM
246views Database» more  EDBT 2010»
15 years 10 months ago
Fast computation of SimRank for static and dynamic information networks
Information networks are ubiquitous in many applications and analysis on such networks has attracted significant attention in the academic communities. One of the most important ...
Cuiping Li, Jiawei Han, Guoming He, Xin Jin, Yizho...
119
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
144
Voted
AGILEDC
2009
IEEE
15 years 10 months ago
Fully Distributed Scrum: Linear Scalability of Production between San Francisco and India
—The Scrum software development framework was designed for the hyperproductive state where productivity increases by 5-10 times over waterfall teams and many colocated teams have...
Jeff Sutherland, Guido Schoonheim, N. Kumar, V. Pa...
161
Voted
ASWEC
2009
IEEE
15 years 10 months ago
Semantic Impact and Faults in Source Code Changes: An Empirical Study
Changes to source code have become a critical factor in fault predictions. Text or syntactic approaches have been widely used. Textual analysis focuses on changed text fragments w...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
« Prev « First page 3819 / 4004 Last » Next »