Sciweavers

478 search results - page 25 / 96
» Working Effectively with Legacy Code
Sort
View
PERVASIVE
2009
Springer
15 years 4 months ago
Enabling Pervasive Collaboration with Platform Composition
Abstract. Emerging pervasive computing technologies present many opportunities to aid ad-hoc collocated group collaboration. To better understand ad-hoc collaboration using pervasi...
Trevor Pering, Roy Want, Barbara Rosario, Shivani ...
CHI
2007
ACM
15 years 2 months ago
Fast-tracking product innovation
This paper describes the coming-of-age of an analytical application that was built using agile development processes, tightly interlinked with an iterative user experience methodo...
Daniela K. Busse
TC
2010
14 years 8 months ago
A Novel Weighted-Graph-Based Grouping Algorithm for Metadata Prefetching
— Although data prefetching algorithms have been extensively studied for years, there is no counterpart research done for metadata access performance. Existing data prefetching a...
Peng Gu, Jun Wang, Yifeng Zhu, Hong Jiang, Pengju ...
TWC
2010
14 years 4 months ago
On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks
Abstract--Frequency hopping (FH) has been the most popularly considered approach for alleviating the effects of jamming attacks. We re-examine, the efficacy of FH based on both exp...
Konstantinos Pelechrinis, Christos Koufogiannakis,...
WCRE
1999
IEEE
15 years 2 months ago
Experiments with Clustering as a Software Remodularization Method
As valuable software systems get old, reverse engineering becomes more and more important to the companies that have to maintain the code. Clustering is a key activity in reverse ...
Nicolas Anquetil, Timothy Lethbridge