• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 4,753
Next 10 →

Programming with Abstract Data Types

by Barbara Liskov, Stephen Zilles - SIGPLAN Notices , 1974
"... The motivation behind the work in very-high-level languages is to ease the programming task by pro-viding the programmer with a language containing primitives or abstractions suitable to his problem area. The programmer is then able to spend his effort in the right place; he concentrates on solving ..."
Abstract - Cited by 175 (5 self) - Add to MetaCart
The motivation behind the work in very-high-level languages is to ease the programming task by pro-viding the programmer with a language containing primitives or abstractions suitable to his problem area. The programmer is then able to spend his effort in the right place; he concentrates on solving

Toxic Cyanobacteria in Water: A guide to their public health consequences, monitoring and management

by Edited Ingrid Chorus, Jamie Bartram , 1999
"... Identification and quantification of cyanobacteria in water resources is the principal component of cyanotoxin monitoring programmes and can provide an effective early warning system for the development of potentially toxic blooms. Data on concentrations of total phosphate, nitrate and ammonia are v ..."
Abstract - Cited by 178 (2 self) - Add to MetaCart
Identification and quantification of cyanobacteria in water resources is the principal component of cyanotoxin monitoring programmes and can provide an effective early warning system for the development of potentially toxic blooms. Data on concentrations of total phosphate, nitrate and ammonia

Hybrid transactional memory

by Peter Damron, Alexandra Fedorova, Yossi Lev, Victor Luchangco, Mark Moir, Daniel Nussbaum - IN PROC. 12TH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOSXII , 2006
"... Transactional memory (TM) promises to substantially reduce the difficulty of writing correct, efficient, and scalable concurrent programs. But “bounded ” and “best-effort” hardware TM proposals impose unreasonable constraints on programmers, while more flexible software TM implementations are consid ..."
Abstract - Cited by 173 (11 self) - Add to MetaCart
Transactional memory (TM) promises to substantially reduce the difficulty of writing correct, efficient, and scalable concurrent programs. But “bounded ” and “best-effort” hardware TM proposals impose unreasonable constraints on programmers, while more flexible software TM implementations

Building Real Time Groupware with GroupKit, A Groupware Toolkit

by Mark Roseman, Saul Greenberg , 1995
"... This paper presents an overview of GroupKit, a groupware toolkit that lets developers build applications for synchronous and distributed computer-based conferencing. GroupKit was constructed from our belief that programming groupware should be only slightly harder than building functionally similar ..."
Abstract - Cited by 168 (23 self) - Add to MetaCart
applications. Session managers⎯interfaces that let people create and manage their meetings⎯are decoupled from groupware applications and are built by developers to accommodate the group’s working style. Example GroupKit applications in a variety of domains have been implemented with only modest effort.

Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs

by Yin Wang
"... Deadlock is an increasingly pressing concern as the multicore revolution forces parallel programming upon the average programmer. Existing approaches to deadlock impose onerous burdens on developers, entail high runtime performance overheads, or offer no help for unmodified legacy code. Gadara autom ..."
Abstract - Cited by 47 (8 self) - Add to MetaCart
code with modest programmer effort. Gadara is efficient because it performs expensive deadlock-avoidance computations offline rather than online. We have implemented Gadara for C/Pthreads programs. In benchmark tests, Gadara successfully avoids injected deadlock faults, imposes negligible to modest

PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code

by Zhenmin Li, Yuanyuan Zhou - In Proc. 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/FSE’05 , 2005
"... Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unaware of or forget about them, defects can be easily introduced. Therefore, it is highly desirable to have tools to automatic ..."
Abstract - Cited by 160 (9 self) - Add to MetaCart
technique called frequent itemset mining to efficiently extract implicit programming rules from large software code written in an industrial programming language such as C, requiring little effort from programmers and no prior knowledge of the software. Benefiting from frequent itemset mining, PR-Miner can

PARSEWeb: A programmer assistant for reusing open source code on the web

by Suresh Thummalapenta - Source Code on the Web”, ASE 2007 , 2007
"... Programmers commonly reuse existing frameworks or libraries to reduce software development efforts. One common problem in reusing the existing frameworks or libraries is that the programmers know what type of object that they need, but do not know how to get that object with a specific method sequen ..."
Abstract - Cited by 124 (18 self) - Add to MetaCart
Programmers commonly reuse existing frameworks or libraries to reduce software development efforts. One common problem in reusing the existing frameworks or libraries is that the programmers know what type of object that they need, but do not know how to get that object with a specific method

Source-level Debugging for Multiple Languages with Modest Programming Effort

by Sukyoung Ryu, Norman Ramsey - International Conference on Compiler Construction , 2005
"... Abstract. We present techniques that enable source-level debugging for multiple languages at the cost of only modest programming effort. The key idea is to avoid letting debugging requirements constrain the internal structure of the compiler. Constraints are minimized primarily by hiding the source- ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract. We present techniques that enable source-level debugging for multiple languages at the cost of only modest programming effort. The key idea is to avoid letting debugging requirements constrain the internal structure of the compiler. Constraints are minimized primarily by hiding the source

Rapid development and flexible deployment of adaptive wireless sensor network applications

by Chien-liang Fok, Gruia-catalin Roman, Chenyang Lu - In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS’05 , 2005
"... Wireless sensor networks (WSNs) are difficult to program and usually run statically-installed software limiting its flexibility. To address this, we developed Agilla, a new middleware that increases network flexibility while simplifying application development. An Agilla network is deployed with no ..."
Abstract - Cited by 153 (20 self) - Add to MetaCart
with no pre-installed application. Instead, users inject mobile agents that spread across nodes performing application-specific tasks. Each agent is autonomous, allowing multiple applications to share a network. Programming is simplified by allowing programmers to create agents using a high-level language

Recovering And Using Use-Case-Diagram-To-Source-Code Traceability Links

by Mark Grechanik, et al. , 2007
"... Use case diagrams (UCDs) are widely used to describe requirements and desired functionality of software products. However, UCDs are loosely linked to source code, and maintaining traces between the source code and elements of UCDs is a manual, tedious, and laborious process. These traces help progra ..."
Abstract - Cited by 19 (2 self) - Add to MetaCart
. We conducted a case study that shows that programmers could maintain and evolve software more efficiently with our plugin. These results demonstrate that modest programmer effort to create TLs together with automated program mining and analysis is a promising approach than can increase program
Next 10 →
Results 11 - 20 of 4,753
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University