Abstract
No abstract available.
Cited By
- Foalem P, Khomh F and Li H (2024). Studying logging practice in machine learning-based applications, Information and Software Technology, 170:C, Online publication date: 1-Jun-2024.
- Kelly T (2024). Programmer Job Interviews: The Hidden Agenda, Queue, 21:6, (16-26), Online publication date: 31-Dec-2024.
- de Almeida V and Geremia-Nievinski F (2023). Computation of specular reflections on a sphere, Computers & Geosciences, 176:C, Online publication date: 1-Jul-2023.
- Kelly T and Pan Y (2023). Catch-23: The New C Standard Sets the World on Fire, Queue, 21:1, (12-30), Online publication date: 28-Feb-2023.
- Zhang H, Tang Y, Lamothe M, Li H and Shang W (2022). Studying logging practice in test code, Empirical Software Engineering, 27:4, Online publication date: 1-Jul-2022.
- Zhou C, Wang C, Sun Y, Yao W and Lin H (2022). Cluster output synchronization for memristive neural networks, Information Sciences: an International Journal, 589:C, (459-477), Online publication date: 1-Apr-2022.
- Aman H, Amasaki S, Yokogawa T and Kawahara M (2019). Empirical study of abnormality in local variables and its application to fault‐prone Java method analysis†, Journal of Software: Evolution and Process, 32:4, Online publication date: 1-Apr-2020.
- Yao K, de Pádua G, Shang W, Sporea C, Toma A and Sajedi S (2019). Log4Perf: suggesting and updating logging locations for web-based systems’ performance monitoring, Empirical Software Engineering, 25:1, (488-531), Online publication date: 1-Jan-2020.
- Medeiros F, Lima G, Amaral G, Apel S, Kästner C, Ribeiro M and Gheyi R (2019). An investigation of misunderstanding code patterns in C open-source software projects, Empirical Software Engineering, 24:4, (1693-1726), Online publication date: 1-Aug-2019.
- Gopstein D, Iannacone J, Yan Y, DeLong L, Zhuang Y, Yeh M and Cappos J Understanding misunderstandings in source code Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, (129-139)
- Beniamini G, Gingichashvili S, Orbach A and Feitelson D Meaningful identifier names Proceedings of the 25th International Conference on Program Comprehension, (45-54)
- Dahse J and Holz T Static detection of second-order vulnerabilities in web applications Proceedings of the 23rd USENIX conference on Security Symposium, (989-1003)
- Olukotun K, Hammond L and Willey M Improving the performance of speculatively parallel applications on the Hydra CMP ACM International Conference on Supercomputing 25th Anniversary Volume, (277-286)
- Yuan D, Park S and Zhou Y Characterizing logging practices in open-source software Proceedings of the 34th International Conference on Software Engineering, (102-112)
- Yuan D, Zheng J, Park S, Zhou Y and Savage S (2012). Improving Software Diagnosability via Log Enhancement, ACM Transactions on Computer Systems, 30:1, (1-28), Online publication date: 1-Feb-2012.
- Pappas V, Raykova M, Vo B, Bellovin S and Malkin T Private search in the real world Proceedings of the 27th Annual Computer Security Applications Conference, (83-92)
- Meyer C, Heeren C, Shaffer E and Tedesco J CoMoTo Proceedings of the 16th annual joint conference on Innovation and technology in computer science education, (143-147)
- Yuan D, Zheng J, Park S, Zhou Y and Savage S (2011). Improving software diagnosability via log enhancement, ACM SIGPLAN Notices, 46:3, (3-14), Online publication date: 17-Mar-2011.
- Yuan D, Zheng J, Park S, Zhou Y and Savage S (2011). Improving software diagnosability via log enhancement, ACM SIGARCH Computer Architecture News, 39:1, (3-14), Online publication date: 17-Mar-2011.
- Yuan D, Zheng J, Park S, Zhou Y and Savage S Improving software diagnosability via log enhancement Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems, (3-14)
- Tremblay G, Malenfant B, Salah A and Zentilli P (2007). Introducing students to professional software construction, ACM SIGCSE Bulletin, 39:3, (176-180), Online publication date: 25-Jun-2007.
- Tremblay G, Malenfant B, Salah A and Zentilli P Introducing students to professional software construction Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education, (176-180)
- Srivastava S, Hicks M and Foster J Modular information hiding and type-safe linking for C Proceedings of the 2007 ACM SIGPLAN international workshop on Types in languages design and implementation, (3-14)
- Shirley P Data structures for graphics ACM SIGGRAPH 2005 Courses, (3-es)
- Ying A, Wright J and Abrams S (2005). Source code that talks, ACM SIGSOFT Software Engineering Notes, 30:4, (1-5), Online publication date: 1-Jul-2005.
- Ying A, Wright J and Abrams S Source code that talks Proceedings of the 2005 international workshop on Mining software repositories, (1-5)
- Dolado J, Harman M, Otero M and Hu L (2003). An Empirical Investigation of the Influence of a Type of Side Effects on Program Comprehension, IEEE Transactions on Software Engineering, 29:7, (665-670), Online publication date: 1-Jul-2003.
- Reilly E Debugging Encyclopedia of Computer Science, (524-527)
- Sun F, Ravi S, Raghunathan A and Jha N Synthesis of custom processors based on extensible platforms Proceedings of the 2002 IEEE/ACM international conference on Computer-aided design, (641-648)
- Fekete A and Kummerfeld B (2002). Design of a major in software development, ACM SIGCSE Bulletin, 34:1, (73-77), Online publication date: 1-Mar-2002.
- Fekete A and Kummerfeld B Design of a major in software development Proceedings of the 33rd SIGCSE technical symposium on Computer science education, (73-77)
- Markus A (2001). Generic programming in Fortran 90, ACM SIGPLAN Fortran Forum, 20:3, (20-23), Online publication date: 1-Dec-2001.
- Smith M (2000). Overcoming the challenges to feedback-directed optimization (Keynote Talk), ACM SIGPLAN Notices, 35:7, (1-11), Online publication date: 1-Jul-2000.
- Levitin A Design and analysis of algorithms reconsidered Proceedings of the thirty-first SIGCSE technical symposium on Computer science education, (16-20)
- Levitin A (2000). Design and analysis of algorithms reconsidered, ACM SIGCSE Bulletin, 32:1, (16-20), Online publication date: 1-Mar-2000.
- Smith M Overcoming the challenges to feedback-directed optimization (Keynote Talk) Proceedings of the ACM SIGPLAN workshop on Dynamic and adaptive compilation and optimization, (1-11)
- Olukotun K, Hammond L and Willey M Improving the performance of speculatively parallel applications on the Hydra CMP Proceedings of the 13th international conference on Supercomputing, (21-30)
Index Terms
- The practice of programming
Please enable JavaScript to view thecomments powered by Disqus.
Recommendations
Mixed-integer quadratic programming
This paper considers mixed-integer quadratic programs in which the objective function is quadratic in the integer and in the continuous variables, and the constraints are linear in the variables of both types. The generalized Benders' decomposition is a ...
The Sequential Unconstrained Minimization Technique for Nonlinear Programing, a Primal-Dual Method
This article is based on an idea proposed by C. W. Carroll for transforming a mathematical programming problem into a sequence of unconstrained minimization problems. It describes the theoretical validation of Carroll's proposal for the convex ...