Results 11 - 20
of
4,753
Programming with Abstract Data Types
- SIGPLAN Notices
, 1974
"... The motivation behind the work in very-high-level languages is to ease the programming task by pro-viding the programmer with a language containing primitives or abstractions suitable to his problem area. The programmer is then able to spend his effort in the right place; he concentrates on solving ..."
Abstract
-
Cited by 175 (5 self)
- Add to MetaCart
The motivation behind the work in very-high-level languages is to ease the programming task by pro-viding the programmer with a language containing primitives or abstractions suitable to his problem area. The programmer is then able to spend his effort in the right place; he concentrates on solving
Toxic Cyanobacteria in Water: A guide to their public health consequences, monitoring and management
, 1999
"... Identification and quantification of cyanobacteria in water resources is the principal component of cyanotoxin monitoring programmes and can provide an effective early warning system for the development of potentially toxic blooms. Data on concentrations of total phosphate, nitrate and ammonia are v ..."
Abstract
-
Cited by 178 (2 self)
- Add to MetaCart
Identification and quantification of cyanobacteria in water resources is the principal component of cyanotoxin monitoring programmes and can provide an effective early warning system for the development of potentially toxic blooms. Data on concentrations of total phosphate, nitrate and ammonia
Hybrid transactional memory
- IN PROC. 12TH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOSXII
, 2006
"... Transactional memory (TM) promises to substantially reduce the difficulty of writing correct, efficient, and scalable concurrent programs. But “bounded ” and “best-effort” hardware TM proposals impose unreasonable constraints on programmers, while more flexible software TM implementations are consid ..."
Abstract
-
Cited by 173 (11 self)
- Add to MetaCart
Transactional memory (TM) promises to substantially reduce the difficulty of writing correct, efficient, and scalable concurrent programs. But “bounded ” and “best-effort” hardware TM proposals impose unreasonable constraints on programmers, while more flexible software TM implementations
Building Real Time Groupware with GroupKit, A Groupware Toolkit
, 1995
"... This paper presents an overview of GroupKit, a groupware toolkit that lets developers build applications for synchronous and distributed computer-based conferencing. GroupKit was constructed from our belief that programming groupware should be only slightly harder than building functionally similar ..."
Abstract
-
Cited by 168 (23 self)
- Add to MetaCart
applications. Session managers⎯interfaces that let people create and manage their meetings⎯are decoupled from groupware applications and are built by developers to accommodate the group’s working style. Example GroupKit applications in a variety of domains have been implemented with only modest effort.
Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs
"... Deadlock is an increasingly pressing concern as the multicore revolution forces parallel programming upon the average programmer. Existing approaches to deadlock impose onerous burdens on developers, entail high runtime performance overheads, or offer no help for unmodified legacy code. Gadara autom ..."
Abstract
-
Cited by 47 (8 self)
- Add to MetaCart
code with modest programmer effort. Gadara is efficient because it performs expensive deadlock-avoidance computations offline rather than online. We have implemented Gadara for C/Pthreads programs. In benchmark tests, Gadara successfully avoids injected deadlock faults, imposes negligible to modest
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
- In Proc. 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC/FSE’05
, 2005
"... Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unaware of or forget about them, defects can be easily introduced. Therefore, it is highly desirable to have tools to automatic ..."
Abstract
-
Cited by 160 (9 self)
- Add to MetaCart
technique called frequent itemset mining to efficiently extract implicit programming rules from large software code written in an industrial programming language such as C, requiring little effort from programmers and no prior knowledge of the software. Benefiting from frequent itemset mining, PR-Miner can
PARSEWeb: A programmer assistant for reusing open source code on the web
- Source Code on the Web”, ASE 2007
, 2007
"... Programmers commonly reuse existing frameworks or libraries to reduce software development efforts. One common problem in reusing the existing frameworks or libraries is that the programmers know what type of object that they need, but do not know how to get that object with a specific method sequen ..."
Abstract
-
Cited by 124 (18 self)
- Add to MetaCart
Programmers commonly reuse existing frameworks or libraries to reduce software development efforts. One common problem in reusing the existing frameworks or libraries is that the programmers know what type of object that they need, but do not know how to get that object with a specific method
Source-level Debugging for Multiple Languages with Modest Programming Effort
- International Conference on Compiler Construction
, 2005
"... Abstract. We present techniques that enable source-level debugging for multiple languages at the cost of only modest programming effort. The key idea is to avoid letting debugging requirements constrain the internal structure of the compiler. Constraints are minimized primarily by hiding the source- ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
Abstract. We present techniques that enable source-level debugging for multiple languages at the cost of only modest programming effort. The key idea is to avoid letting debugging requirements constrain the internal structure of the compiler. Constraints are minimized primarily by hiding the source
Rapid development and flexible deployment of adaptive wireless sensor network applications
- In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS’05
, 2005
"... Wireless sensor networks (WSNs) are difficult to program and usually run statically-installed software limiting its flexibility. To address this, we developed Agilla, a new middleware that increases network flexibility while simplifying application development. An Agilla network is deployed with no ..."
Abstract
-
Cited by 153 (20 self)
- Add to MetaCart
with no pre-installed application. Instead, users inject mobile agents that spread across nodes performing application-specific tasks. Each agent is autonomous, allowing multiple applications to share a network. Programming is simplified by allowing programmers to create agents using a high-level language
Recovering And Using Use-Case-Diagram-To-Source-Code Traceability Links
, 2007
"... Use case diagrams (UCDs) are widely used to describe requirements and desired functionality of software products. However, UCDs are loosely linked to source code, and maintaining traces between the source code and elements of UCDs is a manual, tedious, and laborious process. These traces help progra ..."
Abstract
-
Cited by 19 (2 self)
- Add to MetaCart
. We conducted a case study that shows that programmers could maintain and evolve software more efficiently with our plugin. These results demonstrate that modest programmer effort to create TLs together with automated program mining and analysis is a promising approach than can increase program
Results 11 - 20
of
4,753