BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
how
Google how

Tag #how

1173 papers:

POPLPOPL-2020-PedrotT
The fire triangle: how to mix substitution, dependent elimination, and effects (PMP, NT), p. 28.
ASPLOSASPLOS-2020-0002PJ #performance #why
Why GPUs are Slow at Executing NFAs and How to Make them Faster (HL0, SP, AJ), pp. 251–265.
ICSAICSA-2019-TianLB #architecture #case study #developer #smell #stack overflow
How Developers Discuss Architecture Smells? An Exploratory Study on Stack Overflow (FT, PL0, MAB), pp. 91–100.
EDMEDM-2019-AguerrebereBCGK #education #feedback #online #question #student
How Should Online Teachers of English as a Foreign Language (EFL) Write Feedback to Students? (CA, MB, CC, SG, GK, JW).
EDMEDM-2019-XuGLB #social #what
What You Say is Relevant to How You Make Friends: Measuring the Effect of Content on Social Connection (YX, NG, CFL, TB).
ICPCICPC-2019-SantosS #configuration management #dependence #question
How does feature dependency affect configurable system comprehensibility? (DS, CS), pp. 19–29.
ICSMEICSME-2019-CatolinoPZF #development #experience
How the Experience of Development Teams Relates to Assertion Density of Test Classes (GC, FP, AZ, FF), pp. 223–234.
ICSMEICSME-2019-TufanoWBPWP #learning #source code
Learning How to Mutate Source Code from Bug-Fixes (MT, CW, GB, MDP, MW, DP), pp. 301–312.
ICSMEICSME-2019-ViggiatoOFJK #platform
How Do Code Changes Evolve in Different Platforms? A Mining-Based Investigation (MV, JO, EF, PJ, CK), pp. 218–222.
MSRMSR-2019-ManesB #developer #git #question #stack overflow #what
How often and what StackOverflow posts do developers reference in their GitHub projects? (SSM, OB), pp. 235–239.
SANERSANER-2019-BusingeKOBS #eclipse #framework #interface #question
How Stable Are Eclipse Application Framework Internal Interfaces? (JB, SK, MO, EB, AS), pp. 117–127.
FMFM-2019-Ehlers #model checking #question
How Hard Is Finding Shortest Counter-Example Lassos in Model Checking? (RE), pp. 245–261.
AIIDEAIIDE-2019-Schiffer #game studies #performance
How Actors Can Animate Game Characters: Integrating Performance Theory in the Emotion Model of a Game Character (SS), pp. 227–229.
CoGCoG-2019-JooK #game studies #learning #question #using #visualisation
Visualization of Deep Reinforcement Learning using Grad-CAM: How AI Plays Atari Games? (HTJ, KJK), pp. 1–2.
DiGRADiGRA-2019-AytemizJA #game studies
Exploring How Changes in Game Systems Generate Meaning (BA, NJ, NA).
DiGRADiGRA-2019-GualeniFL #game studies
How to Reference a Digital Game (SG, RF, JL).
FDGFDG-2019-KaoS #game studies #performance
Exploring how preference and perceived performance vary in different game genres across time of day (DK, JJDS), p. 5.
FDGFDG-2019-ZareAWP
Show me how to win: a robot that uses dialog management to learn from demonstrations (MZ, AA, ARW, RJP), p. 7.
FDGFDG-2019-ZhuAFNCSVO #concept #education #game studies #parallel #programming
Programming in game space: how to represent parallel programming concepts in an educational game (JZ, KA, AF, JN, BC, BKS, JV, SO), p. 10.
CIKMCIKM-2019-AkenWLG #analysis
How Does BERT Answer Questions?: A Layer-Wise Analysis of Transformer Representations (BvA, BW, AL, FAG), pp. 1823–1832.
CIKMCIKM-2019-LiLXLC #source code
How to Find It Better?: Cross-Learning for WeChat Mini Programs (HL, ZL, SX, ZL, XC), pp. 2753–2761.
ECIRECIR-p1-2019-AlbahemSSC #metric #question #topic
Meta-evaluation of Dynamic Search: How Do Metrics Capture Topical Relevance, Diversity and User Effort? (AA, DS, FS, LC), pp. 607–620.
ICMLICML-2019-BodaA #correlation #fault #online
Correlated bandits or: How to minimize mean-squared error online (VPB, PLA), pp. 686–694.
ICMLICML-2019-Yu0YNTS #question
How does Disagreement Help Generalization against Label Corruption? (XY, BH0, JY, GN, IWT, MS), pp. 7164–7173.
KDDKDD-2019-JiaLZKK #learning #question #robust #towards
Towards Robust and Discriminative Sequential Data Learning: When and How to Perform Adversarial Training? (XJ, SL0, HZ, SK, VK), pp. 1665–1673.
KDDKDD-2019-Rudin #modelling #question
Do Simpler Models Exist and How Can We Find Them? (CR), pp. 1–2.
KDDKDD-2019-SchonD0 #fault #predict #using
The Error is the Feature: How to Forecast Lightning using a Model Prediction Error (CS, JD, RM0), pp. 2979–2988.
KDDKDD-2019-ZhangHDV #lessons learnt
How to Invest my Time: Lessons from Human-in-the-Loop Entity Extraction (SZ, LH, ECD, SV), pp. 2305–2313.
ECOOPECOOP-2019-EichholzCFSM #programming #type safety
How to Avoid Making a Billion-Dollar Mistake: Type-Safe Data Plane Programming with SafeP4 (ME, EC, NF, GS, MM), p. 28.
OOPSLAOOPSLA-2019-MarcozziTDC #compilation #fuzzing #matter #question
Compiler fuzzing: how much does it matter? (MM, QT0, AFD, CC), p. 29.
ASEASE-2019-JiangLJ #machine learning #recommendation
Machine Learning Based Recommendation of Method Names: How Far are We (LJ, HL, HJ), pp. 602–614.
ASEASE-2019-StepanovAB #compilation #debugging #named
ReduKtor: How We Stopped Worrying About Bugs in Kotlin Compiler (DS, MA, MAB), pp. 317–326.
ASEASE-2019-TaoTLXQ #api #data analysis #performance #question #runtime
How Do API Selections Affect the Runtime Performance of Data Analytics Tasks? (YT, ST, YL, ZX, SQ), pp. 665–668.
ESEC-FSEESEC-FSE-2019-CotroneoSLNB #analysis #debugging #empirical #framework #in the cloud #platform
How bad can a bug get? an empirical analysis of software failures in the OpenStack cloud computing platform (DC, LDS, PL, RN, NB), pp. 200–211.
ICSE-2019-0001WK0
How practitioners perceive coding proficiency (XX0, ZW, PSK, DL0), pp. 924–935.
ICSE-2019-Chattopadhyay0G #case study #developer #process
Latent patterns in activities: a field study of how developers manage context (SC, NN0, YRG, AAL, RP, AS), pp. 373–383.
ICSE-2019-ChenFMWG #crowdsourcing #implementation #question #reliability #security
How reliable is the crowdsourced knowledge of security implementation? (MC, FF, NM, XW, JG), pp. 536–547.
ICSE-2019-Eyolfson0 #c++ #developer #empirical
How C++ developers use immutability declarations: an empirical study (JE, PL0), pp. 362–372.
CASECASE-2019-Biller #delivery #information retrieval
The operational butterfly effect: How IoT data + AI help deliver on the promise of 4IR (SB), p. 1.
JCDLJCDL-2018-AlonsoKT #evolution #social #using
How it Happened: Discovering and Archiving the Evolution of a Story Using Social Signals (OA, VK, SET), pp. 193–202.
EDMEDM-2018-XuLB #evolution #social
How many friends can you make in a week?: evolving social relationships in MOOCs over time (YX, CL, TB).
ICPCICPC-2018-DoseaSS #design #metric #question
How do design decisions affect the distribution of software metrics? (MD, CS, BCdS), pp. 74–85.
ICPCICPC-2018-YoshidaIEEI
How slim will my system be?: estimating refactored code size by merging clones (NY, TI, BE, KI), pp. 352–360.
ICSMEICSME-2018-MalavoltaVFBL #android #maintenance
How Maintainability Issues of Android Apps Evolve (IM, RV, BF, MB, PL), pp. 334–344.
ICSMEICSME-2018-ZhangCGZXJX #case study #git #multi
How do Multiple Pull Requests Change the Same Code: A Study of Competing Pull Requests in GitHub (XZ, YC, YG, WZ, XX, XJ, JX), pp. 228–239.
MSRMSR-2018-ArimaHK08 #case study #commit #java #question #what
A study on inappropriately partitioned commits: how much and what kinds of IP commits in Java projects? (RA, YH, SK), pp. 336–340.
MSRMSR-2018-Cassee0CS #developer #fault
How swift developers handle errors (NC, GP0, FC, AS), pp. 292–302.
MSRMSR-2018-PascarellaPPB08 #development #game studies #open source #question #video
How is video game development different from software development in open source? (LP, FP, MDP, AB), pp. 392–402.
MSRMSR-2018-RahmanBPKLQPSR08 #developer #retrieval
Evaluating how developers use general-purpose web-search for code retrieval (MMR, JB, SP, JK, FAL, SFQ, CP, KTS, BR), pp. 465–475.
SANERSANER-2018-0001WD #replication
How do scientists develop scientific software? An external replication (GP0, IW, LFD), pp. 582–591.
SANERSANER-2018-AlkadhiNGB #developer #question
How do developers discuss rationale? (RA, MN, EG, BB), pp. 357–369.
SANERSANER-2018-BentHVG #empirical #quality
How good is your puppet? An empirically defined and validated quality model for puppet (EvdB, JH, JV, GG), pp. 164–174.
SANERSANER-2018-BritoXHV #api #developer #java #why
Why and how Java developers break APIs (AB, LX, ACH, MTV), pp. 255–265.
SANERSANER-2018-DigkasLACA #developer #ecosystem #question #technical debt
How do developers fix issues and pay back technical debt in the Apache ecosystem? (GD, ML, PA, AC, AA), pp. 153–163.
SANERSANER-2018-VasquezVTP #android #developer
How developers micro-optimize Android apps (journal-first abstract) (MLV, CV, MT, DP), p. 470.
HaskellHaskell-2018-BlondalLS #anti
Deriving via: or, how to turn hand-written instances into an anti-pattern (BB, AL, RS), pp. 55–67.
ICFP-2018-AlmeidaCM0P #assessment #automation #case study #education #experience #functional #game studies #using
Teaching how to program using automated assessment and functional glossy games (experience report) (JBA, AC, NM, HP0, JP), p. 17.
CHI-PLAYCHI-PLAY-2018-EmmerichRM #design #game studies
I'm Glad You Are on My Side: How to Design Compelling Game Companions (KE, PR, MM), pp. 141–152.
DiGRADiGRA-2018-ToftedahlBE #game studies #locality #question #why
Localization from an Indie Game Production Perspective - Why, When and How? (MT, PB, HE).
CoGVS-Games-2018-Pietrass #question
How Real Can Virtual Become? (MP), pp. 1–4.
CIKMCIKM-2018-MedlarG #consistency #feedback #question
How Consistent is Relevance Feedback in Exploratory Search? (AM, DG), pp. 1615–1618.
CIKMCIKM-2018-RoyGBBM #information retrieval #normalisation #performance #using #word
Using Word Embeddings for Information Retrieval: How Collection and Term Normalization Choices Affect Performance (DR, DG, SB, SB, MM), pp. 1835–1838.
CIKMCIKM-2018-WanG
When Optimizer Chooses Table Scans: How to Make Them More Responsive (LW, TG), pp. 1333–1342.
ICMLICML-2018-XiaoBSSP #network
Dynamical Isometry and a Mean Field Theory of CNNs: How to Train 10, 000-Layer Vanilla Convolutional Neural Networks (LX, YB, JSD, SSS, JP), pp. 5389–5398.
ICMLICML-2018-ZhouMBGYLF #bound #distributed #optimisation #question
Distributed Asynchronous Optimization with Unbounded Delays: How Slow Can You Go? (ZZ, PM, NB, PWG, YY, LJL, LFF0), pp. 5965–5974.
ICPRICPR-2018-JollyIKU #design #network #question
How do Convolutional Neural Networks Learn Design? (SJ, BKI, RK, SU), pp. 1085–1090.
KDDKDD-2018-ChenLZK #graph
How LinkedIn Economic Graph Bonds Information and Product: Applications in LinkedIn Salary (XC, YL, LZ, KK), pp. 120–129.
KDDKDD-2018-WangFZWZA #analysis #behaviour #learning #representation
You Are How You Drive: Peer and Temporal-Aware Representation Learning for Driving Behavior Analysis (PW, YF, JZ, PW, YZ, CCA), pp. 2457–2466.
ASEASE-2018-HabibP18a #case study #debugging #detection
How many of all bugs do we find? a study of static bug detectors (AH, MP), pp. 317–328.
ASEASE-2018-HuWLCH #android #debugging
A tale of two cities: how WebView induces bugs to Android applications (JH, LW, YL, SCC, HH), pp. 702–713.
ASEASE-2018-LiuXHLXW #commit #generative #question
Neural-machine-translation-based commit message generation: how far are we? (ZL, XX0, AEH, DL0, ZX, XW0), pp. 373–384.
ESEC-FSEESEC-FSE-2018-BarikFMP #compilation #developer #problem #question
How should compilers explain problems to developers? (TB, DF, ERMH, CP), pp. 633–643.
ESEC-FSEESEC-FSE-2018-Brindescu #developer #process #tool support
How do developers resolve merge conflicts? an investigation into the processes, tools, and improvements (CB), pp. 952–955.
ESEC-FSEESEC-FSE-2018-Erofeeva
How Dance(Sport) can help to produce better software (IE), pp. 971–973.
ESEC-FSEESEC-FSE-2018-WangS #question #regular expression
How well are regular expressions tested in the wild? (PW, KTS), pp. 668–678.
ESEC-FSEESEC-FSE-2018-XuDZG00 #case study #spreadsheet
How are spreadsheet templates used in practice: a case study on Enron (LX, WD, JZ, CG, JW0, TH0), pp. 734–738.
ICSE-2018-0008ZBPLO #analysis #question #re-engineering #sentiment
Sentiment analysis for software engineering: how far can we go? (BL0, FZ, GB, MDP, ML, RO), pp. 94–104.
ICSE-2018-AnicheTSW0SG #community #development
How modern news aggregators help development communities shape and share knowledge (MFA, CT, IS, IW, GP0, MADS, MAG), pp. 499–510.
ICSE-2018-SpadiniASBB #code review #developer #overview #testing #why
When testing meets code review: why and how developers review tests (DS, MFA, MADS, MB, AB), pp. 677–687.
ICSE-2018-YangSLYC #case study #debugging #performance #web
How not to structure your database-backed web applications: a study of performance bugs in the wild (JY, PS, SL, CY, AC), pp. 800–810.
CASECASE-2018-SeichterESG #detection #learning
How to Improve Deep Learning based Pavement Distress Detection while Minimizing Human Effort (DS, ME0, RS, HMG), pp. 63–70.
CASECASE-2018-StutzM #automation #design #development #object-oriented #process #source code
How object-oriented design principles enhance the development of complex automation programs - A Best Practice Paper on how to develop service-interlaces for process modules as defined in VDI/VDE/NAMUR 2658 (AS, MM), pp. 156–159.
ESOPESOP-2018-BatzKKM #network #program analysis
How long, O Bayesian network, will I sample thee? - A program analysis perspective on expected sampling times (KB, BLK, JPK, CM), pp. 186–213.
ICSTICST-2018-ShamshiriRGWF #automation #maintenance #question #testing
How Do Automatically Generated Unit Tests Influence Software Maintenance? (SS, JMR, JPG, NW, GF), pp. 250–261.
CSEETCSEET-2017-SaiedianLW #question #re-engineering #source code
CSEE&T 2017 Panel Proposal How to Enhance Diversity in Software Engineering Programs? (HS, GAL, ABW), pp. 122–123.
EDMEDM-2017-LangDKP
Making the Grade: How Learner Engagement Changes After Passing a Course (DL, BD, AK, AP).
EDMEDM-2017-PatikornHZ #evaluation
An Offline Evaluation Method for Individual Treatment Rules and How to Find Heterogeneous Treatment Effect (TP, NTH, JZ).
ICPCICPC-2017-CeccatoTBCSFT
How professional hackers understand protected code while performing attack tasks (MC, PT, CB, BC, BDS, PF, MT), pp. 154–164.
ICPCICPC-2017-DaoZM #debugging #execution #locality #question
How does execution information help with information-retrieval based bug localization? (TD, LZ, NM), pp. 241–250.
ICPCICPC-2017-ZampettiPBMPL #developer #documentation
How developers document pull requests with external references (FZ, LP, GB, AM, MDP, ML), pp. 23–33.
ICSMEICSME-2017-Sae-LimHS #case study #developer #smell
How Do Developers Select and Prioritize Code Smells? A Preliminary Study (NSL, SH, MS), pp. 484–488.
ICSMEICSME-2017-SilvaWGSG #question #what
How Long and How Much: What to Expect from Summer of Code Participants? (JDOS, ISW, DMG, IFS, MAG), pp. 69–79.
ICSMEICSME-2017-VasquezBMP #android #developer #question
How do Developers Test Android Applications? (MLV, CBC, KM, DP), pp. 613–622.
MSRMSR-2017-CalciatiG #case study
How do apps evolve in their permission requests?: a preliminary study (PC, AG), pp. 37–41.
MSRMSR-2017-ReboucasSPC #open source #question
How does contributors' involvement influence the build status of an open-source software project? (MR, ROS, GP0, FC), pp. 475–478.
MSRMSR-2017-ZampettiSOCP #analysis #integration #open source #pipes and filters #tool support
How open source projects use static code analysis tools in continuous integration pipelines (FZ, SS, RO, GC, MDP), pp. 334–344.
SANERSANER-2017-MoonSLK #analysis #behaviour #generative #what
Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding (RJM, KMS, HYL, HJK), pp. 575–576.
SANERSANER-2017-SassoMLM #re-engineering
How to gamify software engineering (TDS, AM, ML, EM), pp. 261–271.
SCAMSCAM-2017-SwidanSH #question
How do Scratch Programmers Name Variables and Procedures? (AS, AS, FH), pp. 51–60.
CIAACIAA-2017-Cortier #logic
Electronic Voting: How Logic Can Help (VC), p. xi-xii.
IFM-2017-KordyW #question
How Well Can I Secure My System? (BK, WW), pp. 332–347.
ICFP-2017-Hamana #algebra #calculus #decidability #higher-order
How to prove your calculus is decidable: practical applications of second-order algebraic theories and computation (MH), p. 28.
CHI-PLAYCHI-PLAY-2017-Bogost #game studies
How to Play (IB), p. 1.
CHI-PLAYCHI-PLAY-2017-DeppingM #game studies #multi #social
Cooperation and Interdependence: How Multiplayer Games Increase Social Closeness (AED, RLM), pp. 449–461.
CHI-PLAYCHI-PLAY-2017-NazareHSR #word
Bilingual SpeechBlocks: Investigating How Bilingual Children Tinker with Words in English and Spanish (JN, AH, IS, DR), pp. 183–193.
CHI-PLAYCHI-PLAY-2017-SeeleMBHS #artificial reality #behaviour #exclamation #game studies #question #social
Here's Looking At You Anyway!: How Important is Realistic Gaze Behavior in Co-located Social Virtual Reality Games? (SS, SM, HB, RH, JS), pp. 531–540.
CIKMCIKM-2017-Stanojevic #question
How Safe is Your (Taxi) Driver? (RS), pp. 2319–2322.
ECIRECIR-2017-MishraB #order #proximity #question #readability #summary
How Do Order and Proximity Impact the Readability of Event Summaries? (AM, KB), pp. 212–225.
ICMLICML-2017-Jin0NKJ
How to Escape Saddle Points Efficiently (CJ, RG0, PN, SMK, MIJ), pp. 1724–1732.
ICMLICML-2017-Loukas #matrix #question
How Close Are the Eigenvectors of the Sample and Actual Covariance Matrices? (AL), pp. 2228–2237.
ICMLICML-2017-McGillP #network
Deciding How to Decide: Dynamic Routing in Artificial Neural Networks (MM, PP), pp. 2363–2372.
MoDELSMoDELS-2017-SelimCD #atl
How is ATL Really Used? Language Feature Use in the ATL Zoo (GMKS, JRC, JD), pp. 34–44.
OnwardOnward-2017-Biddle #modelling #research
How can our publication models best serve our research? (panel) (RB), pp. 260–261.
OnwardOnward-2017-VeroyG #case study #java #named
Garbology: a study of how Java objects die (RLV, SZG), pp. 168–179.
OOPSLAOOPSLA-2017-WuC #fault #question #student #what
How type errors were fixed and what students did? (BW, SC0), p. 27.
AdaEuropeAdaEurope-2017-Chapman
Sanitizing Sensitive Data: How to Get It Right (or at Least Less Wrong...) (RC), pp. 37–52.
ASEASE-2017-ScalabrinoBVVPO #automation #question
Automatically assessing code understandability: how far are we? (SS, GB, CV, MLV, DP, RO), pp. 417–427.
ASEASE-2017-TomasdottirAD #developer #javascript #why
Why and how JavaScript developers use linters (KFT, MFA, AvD), pp. 578–589.
ESEC-FSEESEC-FSE-2017-BohmeS0UZ #debugging #empirical
Where is the bug and how is it fixed? an experiment with practitioners (MB, EOS, SC0, EU, AZ), pp. 117–128.
ESEC-FSEESEC-FSE-2017-Easterbrook #modelling #verification
Verifying the forecast: how climate models are developed and tested (invited talk) (SE), p. 2.
ICSE-2017-KafaliJPWS #case study #policy #security
How good is a security policy against real breaches?: a HIPAA case study (ÖK, JJ, MP, LW, MPS), pp. 530–540.
ICSE-2017-MaCZZX #case study #correlation #debugging #developer #ecosystem #git #python
How do developers fix cross-project correlated bugs?: a case study on the GitHub scientific python ecosystem (WM, LC0, XZ0, YZ, BX), pp. 381–392.
GPCEGPCE-2017-FenskeSS #case study #maintenance #preprocessor
How preprocessor annotations (do not) affect maintainability: a case study on change-proneness (WF, SS, GS), pp. 77–90.
SLESLE-2017-Pereira0RRCFS #energy #memory management #performance #programming language #question
Energy efficiency across programming languages: how do energy, time, and memory relate? (RP, MC, FR, RR, JC, JPF, JS), pp. 256–267.
CASECASE-2017-ChangCC #modelling #performance #variability
How simplified models of different variability affects performance of ordinal transformation (CMC, SCC, CHC), pp. 1065–1066.
ICSTICST-2017-ChenBHZZX #question #reduction #testing
How Do Assertions Impact Coverage-Based Test-Suite Reduction? (JC0, YB, DH, LZ, LZ0, BX), pp. 418–423.
ICSTICST-2017-RamlerH #automation #locality #testing
How to Test in Sixteen Languages? Automation Support for Localization Testing (RR, RH), pp. 542–543.
WICSAWICSA-2016-GalsterW #architecture #empirical #question #research
Empirical Research in Software Architecture: How Far have We Come? (MG, DW), pp. 11–20.
EDMEDM-2016-BoroujeniKD #question
How employment constrains participation in MOOCs? (MSB, LK, PD), pp. 638–639.
EDMEDM-2016-DoroudiHAB16a #matter #process #sequence
Sequence Matters, But How Exactly? A Method for Evaluating Activity Sequences from Data (SD, KH, VA, EB), pp. 70–77.
EDMEDM-2016-JoL #learning #online
How to Judge Learning on Online Learning: Minimum Learning Judgment System (JJ, HL), pp. 597–598.
EDMEDM-2016-KhajahLM #question
How Deep is Knowledge Tracing? (MK, RVL, MM).
EDMEDM-2016-KhajahLM_ #question
How Deep is Knowledge Tracing? (MK, RVL, MM).
EDMEDM-2016-LiCG #crowdsourcing #summary
How Good Is Popularity? Summary Grading in Crowdsourcing (HL, ZC, ACG), pp. 430–435.
EDMEDM-2016-MatsudaCS #detection #question
How quickly can wheel spinning be detected? (NM, SC, JCS), pp. 607–608.
EDMEDM-2016-RauMN16a #learning #similarity #visual notation
How to Model Implicit Knowledge? Similarity Learning Methods to Assess Perceptions of Visual Representations (MAR, BM, RDN), pp. 199–206.
EDMEDM-2016-RauMN16a_ #learning #similarity #visual notation
How to Model Implicit Knowledge? Similarity Learning Methods to Assess Perceptions of Visual Representations (MAR, BM, RDN), pp. 199–206.
EDMEDM-2016-SnowKPFB #learning #online #performance #student
Quantifying How Students Use an Online Learning System: A Focus on Transitions and Performance (ELS, AEK, TEP, MF, AJB), pp. 640–641.
ICSMEICSME-2016-DiasSPCG #collaboration #git #question
How Does the Shift to GitHub Impact Project Collaboration? (LFD, IS, GP0, DAdC, MAG), pp. 473–477.
ICSMEICSME-2016-GovinAEDM #architecture #case study #industrial
How Can We Help Software Rearchitecting Efforts? Study of an Industrial Case (BG, NA, AE, SD, AM), pp. 509–518.
MSRMSR-2016-AsaduzzamanARS #developer #exception #java #question
How developers use exception handling in Java? (MA, MA, CKR, KAS), pp. 516–519.
MSRMSR-2016-BaoLXWT #android #commit #developer #empirical #mining #power management
How android app developers manage power consumption?: an empirical study by mining power management commits (LB, DL0, XX0, XW0, CT), pp. 37–48.
MSRMSR-2016-ThompsonMPG #developer #repository
How software developers use work breakdown relationships in issue repositories (CAT, GCM, MP, MG), pp. 281–285.
MSRMSR-2016-ZagalskyTGSP #case study #community #comparative #stack overflow
How the R community creates and curates knowledge: a comparative study of stack overflow and mailing lists (AZ, CGT, DMG, MADS, GPC), pp. 441–451.
HaskellHaskell-2016-ChauhanKY #pointer
How to twist pointers without breaking them (SC, PPK, BAY), pp. 51–61.
DiGRADiGRA-FDG-2016-FasterholdtPH #game studies
You Say Jump, I Say How High? Operationalising the Game Feel of Jumping (MF, MP, CH).
ICMLICML-2016-KapralovPW #matrix #multi
How to Fake Multiply by a Gaussian Matrix (MK, VKP, DPW), pp. 2101–2110.
ICMLICML-2016-Shalev-ShwartzW #why
Minimizing the Maximal Loss: How and Why (SSS, YW), pp. 793–801.
KDDKDD-2016-Downs #machine learning
How Machine Learning has Finally Solved Wanamaker's Dilemma (OD), p. 405.
KDDKDD-2016-KimMJO #modelling #online #word
How to Compete Online for News Audience: Modeling Words that Attract Clicks (JHK, AM, AJ, AHO), pp. 1645–1654.
KDDKDD-2016-LiAHS #personalisation #ranking
How to Get Them a Dream Job?: Entity-Aware Features for Personalized Job Search Ranking (JL, DA, VHT, SS), pp. 501–510.
BXBX-2016-McKinnaS #deployment #equilibrium
How to Regain Equilibrium without Losing your Balance? Scenarios for Bx Deployment (Discussion Paper) (JM, PS), pp. 32–34.
OnwardOnward-2016-Emerich #source code
How are programs found? speculating about language ergonomics with Curry-Howard (JE), pp. 212–223.
ASEASE-2016-LegunsenHXRM #api #case study #effectiveness #java #specification
How good are the specs? a study of the bug-finding effectiveness of existing Java API specifications (OL, WUH, XX, GR, DM), pp. 602–613.
FSEFSE-2016-Barik #developer #question #static analysis #tool support
How should static analysis tools explain anomalies to developers? (TB), pp. 1118–1120.
FSEFSE-2016-BogartKHT #api #community #ecosystem
How to break an API: cost negotiation and community values in three software ecosystems (CB, CK, JDH, FT), pp. 109–120.
FSEFSE-2016-Herbsleb #coordination #research #why
Building a socio-technical theory of coordination: why and how (outstanding research award) (JDH), pp. 2–10.
ICSE-2016-KononenkoBG #code review #developer #overview #quality
Code review quality: how developers see it (OK, OB, MWG), pp. 1028–1038.
ICSE-2016-LuLCZHZ0 #evolution #question #testing
How does regression test prioritization perform in real-world software evolution? (YL, YL, SC0, LZ, DH, YZ, LZ0), pp. 535–546.
ICSE-2016-MeloBW #debugging #question #variability
How does the degree of variability affect bug finding? (JM, CB, AW), pp. 679–690.
ASPLOSASPLOS-2016-BrownNE #order #static analysis #using
How to Build Static Checking Systems Using Orders of Magnitude Less Code (FB, AN, DRE), pp. 143–157.
ICSTICST-2016-ArtsH #question #requirements
How Well are Your Requirements Tested? (TA, JH), pp. 244–254.
DocEngDocEng-2015-CutterM #documentation #mobile #towards
Towards Mobile OCR: How to Take a Good Picture of a Document Without Sight (MPC, RM), pp. 75–84.
JCDLJCDL-2015-AlkwaiNW #question
How Well Are Arabic Websites Archived? (LMA, MLN, MCW), pp. 223–232.
PODSPODS-2015-PraveenS #graph #question
Defining Relations on Graphs: How Hard is it in the Presence of Node Partitions? (MP, BS), pp. 159–172.
SIGMODSIGMOD-2015-ZhengZLYSZ #approach #graph #nondeterminism #rdf #similarity
How to Build Templates for RDF Question/Answering: An Uncertain Graph Similarity Join Approach (WZ, LZ, XL, JXY, SS, DZ), pp. 1809–1824.
EDMEDM-2015-BumbacherSWB #behaviour #comprehension #concept #development #learning #physics
Learning Environments and Inquiry Behaviors in Science Inquiry Learning: How Their Interplay Affects the Development of Conceptual Understanding in Physics (EB, SS, MW, PB), pp. 61–68.
EDMEDM-2015-DoroudiHAB #comprehension #induction #learning #refinement #robust #towards
Towards Understanding How to Leverage Sense-making, Induction/Refinement and Fluency to Improve Robust Learning (SD, KH, VA, EB), pp. 376–379.
EDMEDM-2015-JacovinaSARWDM #visualisation
How to Visualize Success: Presenting Complex Data in a Writing Strategy Tutor (MEJ, ELS, LKA, RDR, JLW, JD, DSM), pp. 594–595.
EDMEDM-2015-JanningSS15a #multimodal #recognition
How to Aggregate Multimodal Features for Perceived Task Difficulty Recognition in Intelligent Tutoring Systems (RJ, CS, LST), pp. 566–567.
EDMEDM-2015-Rau #equation #learning #why
Why Do the Rich Get Richer? A Structural Equation Model to Test How Spatial Skills Affect Learning with Representations (MAR), pp. 350–357.
EDMEDM-2015-WangYWKR #behaviour #learning #student
Investigating How Student's Cognitive Behavior in MOOC Discussion Forum Affect Learning Gains (XW0, DY, MW, KRK, CPR), pp. 226–233.
EDMEDM-2015-WarnerDMG #interactive #online #student
How High School, College, and Online Students Differentially Engage with an Interactive Digital Textbook (JW, JD, BM, PJG), pp. 528–531.
ITiCSEITiCSE-2015-BellettiniLMMMT #analysis #performance #student
How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students (CB, VL, DM, MM, AM, MT), pp. 27–32.
SIGITESIGITE-2015-MacKellarHSS #question #source code
Information Technology and Computer Science Programs: How Do We Relate? (BM, GWH, MS, AS), pp. 125–126.
ICPCICPC-2015-JbaraF #empirical #eye tracking #using
How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
ICPCICPC-2015-MacLeodSB #developer #documentation #using
Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
ICPCICPC-2015-MinelliML #developer #what
I know what you did last summer: an investigation of how developers spend their time (RM, AM, ML), pp. 25–35.
ICSMEICSME-2015-CodobanRDB #case study #developer #lens #why
Software history under the lens: A study on why and how developers examine it (MC, SSR, DD, BB), pp. 1–10.
ICSMEICSME-2015-HoraRAEDV #api #developer #ecosystem #evolution #smalltalk
How do developers react to API evolution? The Pharo ecosystem case (AH, RR, NA, AE, SD, MTV), pp. 251–260.
ICSMEICSME-2015-PanichellaSGVCG #evolution #maintenance
How can i improve my app? Classifying user reviews for software maintenance and evolution (SP, ADS, EG, CAV, GC, HCG), pp. 281–290.
ICSMEICSME-2015-PiorkowskiFSBKH #bias #debugging #developer #information management
To fix or to learn? How production bias affects developers’ information foraging during debugging (DP, SDF, CS, MMB, IK, AZH, JM, CH, AH), pp. 11–20.
ICSMEICSME-2015-VasquezVLP #android #detection #developer #performance
How developers detect and fix performance bottlenecks in Android apps (MLV, CV, QL, DP), pp. 352–361.
SANERSANER-2015-Mirakhorli #architecture #question #re-engineering #what #why
Software architecture reconstruction: Why? What? How? (MM), p. 595.
SCAMSCAM-2015-SteidlD #java #question
How do Java methods grow? (DS, FD), pp. 151–160.
ICALPICALP-v2-2015-Klein0 #game studies #infinity #lookahead #question
How Much Lookahead is Needed to Win Infinite Games? (FK, MZ), pp. 452–463.
CHI-PLAYCHI-PLAY-2015-BirkMMG #game studies #interactive #self
How Self-Esteem Shapes our Interactions with Play Technologies (MVB, RLM, MKM0, KMG), pp. 35–45.
CHI-PLAYCHI-PLAY-2015-KetchesonYG #design #game studies #physics #process
Designing for Exertion: How Heart-Rate Power-ups Increase Physical Activity in Exergames (MK, ZY, TCNG), pp. 79–89.
CHI-PLAYCHI-PLAY-2015-KistlerA #gesture #visualisation
How Can I Interact?: Comparing Full Body Gesture Visualizations (FK, EA), pp. 583–588.
CoGCIG-2015-QuadfliegRP #multi #optimisation #parametricity
How costly is a good compromise: Multi-objective TORCS controller parameter optimization (JQ, GR, MP), pp. 454–460.
DiGRADiGRA-2015-Cole #design #elicitation
The Tragedy of Betrayal: How the Design of Ico and Shadow of the Colossus Elicits Emotion (TC).
DiGRADiGRA-2015-ElmezenyW #game studies
How gaming achieves popularity: The case of The Smash Brothers (AE, JW).
DiGRADiGRA-2015-Winn
The Well-Played MOBA: How DotA 2 and League of Legends use Dramatic Dynamics (CW).
FDGFDG-2015-HeeterA #experience #game studies
Playing with Presence: How meditation can increase the experience of embodied presence in a virtual world (CH, MA).
CoGVS-Games-2015-PatinoR #game studies #object-oriented #programming
Program with Ixquic: How to Learn Object-Oriented Programming with a Game (TP, CR), pp. 1–2.
CHICHI-2015-AmmariKLS #online #what
Managing Children’s Online Identities: How Parents Decide what to Disclose about their Children Online (TA, PK, CL, SYS), pp. 1895–1904.
CHICHI-2015-AndersonKJEHV #polymorphism
How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study (BBA, CBK, JLJ, DE, SH, AV), pp. 2883–2892.
CHICHI-2015-BranhamK #collaboration
Collaborative Accessibility: How Blind and Sighted Companions Co-Create Accessible Home Spaces (SMB, SKK), pp. 2373–2382.
CHICHI-2015-DeberJFW #latency #performance
How Much Faster is Fast Enough?: User Perception of Latency & Latency Improvements in Direct and Indirect Touch (JD, RJ, CF, DW), pp. 1827–1836.
CHICHI-2015-FrenchSBH #ambiguity #lens
Is This How We (All) Do It?: Butler Lies and Ambiguity Through a Broader Lens (MF, MES, JPB, JTH), pp. 4079–4082.
CHICHI-2015-GaoYHF #automation #collaboration #game studies #multi
Improving Multilingual Collaboration by Displaying How Non-native Speakers Use Automated Transcripts and Bilingual Dictionaries (GG, NY, AMJH, SRF), pp. 3463–3472.
CHICHI-2015-GulottaSKF #comprehension
Curatorial Agents: How Systems Shape Our Understanding of Personal and Familial Digital Information (RG, AS, AK, JF), pp. 3453–3462.
CHICHI-2015-HinikerSSSLK #mobile
Texting while Parenting: How Adults Use Mobile Phones while Caring for Children at the Playground (AH, KS, HS, YCS, CPL, JAK), pp. 727–736.
CHICHI-2015-HuangSHH #analysis
How Activists Are Both Born and Made: An Analysis of Users on Change.org (SWH, M(S, BMH, GH), pp. 211–220.
CHICHI-2015-JohnsonRMT #collaboration
Can You See Me Now?: How Field of View Affects Collaboration in Robotic Telepresence (SJ, IR, BM, LT), pp. 2397–2406.
CHICHI-2015-KayPK #classification #evaluation #overview
How Good is 85%?: A Survey Tool to Connect Classifier Evaluation to Acceptability of Accuracy (MK, SNP, JAK), pp. 347–356.
CHICHI-2015-OttleyYC #predict #visualisation
Personality as a Predictor of User Strategy: How Locus of Control Affects Search Strategies on Tree Visualizations (AO, HY, RC), pp. 3251–3254.
CHICHI-2015-PandeyRSNB #analysis #empirical #visualisation
How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
CHICHI-2015-PritchardBVO #mobile #performance
How to Drive a London Bus: Measuring Performance in a Mobile and Remote Workplace (GWP, PB, JV, PO), pp. 1885–1894.
CHICHI-2015-RaganGT #memory management #process #visual notation
Evaluating How Level of Detail of Visual History Affects Process Memory (EDR, JRG, AT), pp. 2711–2720.
CHICHI-2015-ZhangAK #question #what #why
Mailing Lists: Why Are They Still Here, What’s Wrong With Them, and How Can We Fix Them? (AXZ, MSA, DRK), pp. 4009–4018.
CSCWCSCW-2015-Erete #behaviour #communication #online
Engaging Around Neighborhood Issues: How Online Communication Affects Offline Behavior (SLE), pp. 1590–1601.
CSCWCSCW-2015-LiuIP #comprehension #maintenance #quote
“I’m Not Like My Friends”: Understanding How Children with a Chronic Illness Use Technology to Maintain Normalcy (LSL, KMI, WP), pp. 1527–1539.
CSCWCSCW-2015-SolomonMW #coordination #exclamation
Don’t Wait!: How Timing Affects Coordination of Crowdfunding Donations (JS, WM, RW), pp. 547–556.
CSCWCSCW-2015-WisniewskiJXRC #behaviour #privacy #quote #social #social media
“Preventative” vs. “Reactive”: How Parental Mediation Influences Teens’ Social Media Privacy Behaviors (PJW, HJ, HX, MBR, JMC), pp. 302–316.
HCIDHM-HM-2015-IkenoboWSG #difference
Differences in How Long an Ikebana Work Lasts Depending on the Skill Used in Cutting Floral Materials (YI, ZW, YS, AG), pp. 74–82.
HCIDHM-HM-2015-ShodaYSS #analysis #behaviour #people
Exploring How People Collaborate with a Stranger: — Analyses of Verbal and Nonverbal Behaviors in Abstract Art Reproduction (HS, TY, NS, MS), pp. 379–388.
HCIDUXU-DD-2015-MedeirosTF #design #gesture #question #user interface
How to Design an User Interface Based on Gestures? (ACSM, TAT, IEdF), pp. 63–74.
HCIDUXU-DD-2015-MichailidouHL
How to Evaluate Use Scenarios and Stories (IM, CH, UL), pp. 609–620.
HCIDUXU-IXD-2015-Moldenhauer #design #student
How Do I Get to Room 3106? — Student Wayfinding Designs for Old Main at Wayne State University (JAM), pp. 390–399.
HCIDUXU-IXD-2015-PennaQ
How We Perceive Search Engines (LP, MQ), pp. 74–81.
HCIDUXU-UI-2015-Passera #contract #design
Beyond the Wall of Text: How Information Design Can Make Contracts User-Friendly (SP), pp. 341–352.
HCIHCI-DE-2015-BoscarioliBSB #challenge #concept #education #human-computer #industrial
How to Join Theoretical Concepts, Industry Needs and Innovative Technologies in HCI Courses? The Big Challenge of Teaching HCI (CB, SAB, MSS, SDJB), pp. 27–36.
HCIHCI-IT-2015-JeongS #case study #smarttech #user interface #what
It’s not What It Speaks, but It’s How It Speaks: A Study into Smartphone Voice-User Interfaces (VUI) (JJ, DHS), pp. 284–291.
HCIHCI-UC-2015-SorumF #quality
How to Evaluate Investments in Website Quality Within eGovernment? Exploring the Webmaster’s Perception of Benefits (HS, AF), pp. 102–111.
HCIHIMI-IKD-2015-ZhangNZC #library #mobile
Search in One’s Hand: How Users Search a Mobile Library Catalog (TZ, XN, LZ, HlC), pp. 247–257.
HCISCSM-2015-MillsF #effectiveness #framework #platform #why
A Computational Study of How and Why reddit.com was an Effective Platform in the Campaign Against SOPA (RM, AF), pp. 229–241.
ICEISICEIS-v1-2015-Mocker #complexity
Complexity in the Digital Age — How can IT Help, not Hurt (MM), p. IX.
ICEISICEIS-v2-2015-FissaaGHN #composition #question #semantics
How Can Semantics and Context Awareness Enhance the Composition of Context-aware Services? (TF, HG, HH, MN), pp. 640–647.
CIKMCIKM-2015-KiselevaKNM #behaviour #question #what
Behavioral Dynamics from the SERP's Perspective: What are Failed SERPs and How to Fix Them? (JK, JK, VN, NM), pp. 1561–1570.
CIKMCIKM-2015-SiersdorferKAZ #network #scalability #social #using
Who With Whom And How?: Extracting Large Social Networks Using Search Engines (SS, PK, HA, SZ), pp. 1491–1500.
ECIRECIR-2015-UrbanoM #correlation #definite clause grammar #question #user satisfaction
How Do Gain and Discount Functions Affect the Correlation between DCG and User Satisfaction? (JU, MM), pp. 197–202.
ICMLICML-2015-AnBB #linear #network #question
How Can Deep Rectifier Networks Achieve Linear Separability and Preserve Distances? (SA, FB, MB), pp. 514–523.
ICMLICML-2015-GlobersonRSY #predict #question
How Hard is Inference for Structured Prediction? (AG, TR, DS, CY), pp. 2181–2190.
KDDKDD-2015-John #big data #case study
How Artificial Intelligence and Big Data Created Rocket Fuel: A Case Study (GJ), p. 1629.
SEKESEKE-2015-AndoSUWFIOHKSNY #developer #development #experience #fault #process #question
How Does Defect Removal Activity of Developer Vary with Development Experience? (RA, SS, CU, HW, YF, SI, HO, YH, MK, KS, KN, MY), pp. 540–545.
SEKESEKE-2015-BurnayJF #elicitation #requirements
How Stakeholders’ Commitment May Affect the Success of Requirements Elicitation (CB, IJ, SF), pp. 336–341.
SEKESEKE-2015-GoncalvesW #education #overview #perspective #project management #tool support
How to Teach the Usage of Project Management Tools in Computer Courses: A Systematic Literature Review (RQG, CGvW), pp. 36–41.
SEKESEKE-2015-ValentimCEP #usability
How do software engineers apply an early usability inspection technique? A qualitative study (NMCV, TC, BJdSE, RP), pp. 686–691.
SEKESEKE-2015-WuCZX #c++ #developer #empirical #library
How do developers use C++ libraries? An empirical study (DW, LC, YZ, BX), pp. 260–265.
SIGIRSIGIR-2015-DaiKC #distributed #random
How Random Decisions Affect Selective Distributed Search (ZD, YK, JC), pp. 771–774.
SIGIRSIGIR-2015-KellyA #behaviour #case study #experience #user interface
How many results per page?: A Study of SERP Size, Search Behavior and User Experience (DK, LA), pp. 183–192.
SPLCSPLC-2015-WozniakC #product line
How automotive engineering is taking product line engineering to the extreme (LW, PC), pp. 327–336.
OOPSLAOOPSLA-2015-LopesO #java #source code
How scale affects structure in Java programs (CVL, JO), pp. 675–694.
REFSQREFSQ-2015-Liskin #communication #requirements
How Artifacts Support and Impede Requirements Communication (OL), pp. 132–147.
ASEASE-2015-GroceAJM #verification
How Verified is My Code? Falsification-Driven Verification (T) (AG, IA, CJ, PEM), pp. 737–748.
ASEASE-2015-VasquezLVP #database #developer #documentation #source code
How do Developers Document Database Usages in Source Code? (N) (MLV, BL, CV, DP), pp. 36–41.
ESEC-FSEESEC-FSE-2015-BellerGPZ #developer #ide #why
When, how, and why developers (do not) test in their IDEs (MB, GG, AP, AZ), pp. 179–190.
ESEC-FSEESEC-FSE-2015-LoNZ #re-engineering #research
How practitioners perceive the relevance of software engineering research (DL, NN, TZ), pp. 415–425.
ESEC-FSEESEC-FSE-2015-SadowskiSE #case study #developer
How developers search for code: a case study (CS, KTS, SGE), pp. 191–201.
ESEC-FSEESEC-FSE-2015-SaraivaBZ #developer #n-gram
Products, developers, and milestones: how should I build my N-Gram language model (JS, CB, TZ), pp. 998–1001.
GTTSEGTTSE-2015-Gonzalez-Perez #ontology #re-engineering
How Ontologies Can Help in Software Engineering (CGP), pp. 26–44.
ICSEICSE-v1-2015-MorenoBPOM #question
How Can I Use This Method? (LM, GB, MDP, RO, AM), pp. 880–890.
ICSEICSE-v1-2015-WatermanNA #agile #architecture
How Much Up-Front? A Grounded theory of Agile Architecture (MW, JN, GA), pp. 347–357.
ICSEICSE-v2-2015-BellerGZ #developer #question
How (Much) Do Developers Test? (MB, GG, AZ), pp. 559–562.
ICSEICSE-v2-2015-CzerwonkaGT #code review #debugging #overview
Code Reviews Do Not Find Bugs. How the Current Code Review Best Practice Slows Us Down (JC, MG, JT), pp. 27–28.
ICSEICSE-v2-2015-ShepherdDP #re-engineering #research
How and When to Transfer Software Engineering Research via Extensions (DCS, KD, LLP), pp. 239–240.
CASECASE-2015-DijkmanRB #automation
How to assess sustainability in automated manufacturing (TJD, JMR, NB), pp. 1351–1356.
CASECASE-2015-PanZQ #clustering #process #tool support
How to start-up dual-arm cluster tools involving a wafer revisiting process (CP, MZ, YQ), pp. 1194–1199.
SOSPSOSP-2015-TsaiZRJZP #file system
How to get more value from your file system directory cache (CcT, YZ, JR, YJ, TZ, DEP), pp. 441–456.
STOCSTOC-2015-HalldorssonT #graph #question
How Well Can Graphs Represent Wireless Interference? (MMH, TT), pp. 635–644.
ISSTAISSTA-2015-WangZT #case study #execution #experience #symbolic computation #testing
Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE (XW, LZ, PT), pp. 199–210.
LICSLICS-2015-CarayolS #game studies #question
How Good Is a Strategy in a Game with Nature? (AC, OS), pp. 609–620.
ECSAECSA-2014-CaraccioloLN #architecture #quality #question #requirements #validation
How Do Software Architects Specify and Validate Quality Requirements? (AC, MFL, ON), pp. 374–389.
DocEngDocEng-2014-HailpernVD #named #what
Pagination: it’s what you say, not how long it takes to say it (JMH, NDV, MD), pp. 147–156.
DRRDRR-2014-LundRW #fault #multi #question
How well does multiple OCR error correction generalize? (WBL, EKR, DDW), p. ?–13.
HTHT-2014-CunhaMGCA #social
How you post is who you are: characterizing google+ status updates across social groups (EC, GM, MAG, CC, VA), pp. 212–217.
PODSPODS-2014-Libkin #semistructured data #what
Incomplete data: what went wrong, and how to fix it (LL), pp. 1–13.
SIGMODSIGMOD-2014-AilamakiLTPP #multi
How to stop under-utilization and love multicores (AA, EL, PT, DP, IP), pp. 189–192.
SIGMODSIGMOD-2014-Sedlar #compilation
How i learned to stop worrying and love compilers (ES), pp. 1–2.
EDMEDM-2014-PeroH #detection #programming #question #source code #student
How patterns in source codes of students can help in detection of their programming skills? (SP, TH), pp. 371–372.
SANERCSMR-WCRE-2014-GeSDM #query #recommendation
How the Sando search tool recommends queries (XG, DCS, KD, ERMH), pp. 425–428.
ICPCICPC-2014-PanichellaCPO #empirical #evolution
How the evolution of emerging collaborations relates to code changes: an empirical study (SP, GC, MDP, RO), pp. 177–188.
ICPCICPC-2014-VasquezBPOP #android #api #case study #stack overflow
How do API changes trigger stack overflow discussions? a study on the Android SDK (MLV, GB, MDP, RO, DP), pp. 83–94.
ICSMEICSME-2014-CachoBAPGCSCFG #behaviour #c# #case study #exception #java
How Does Exception Handling Behavior Evolve? An Exploratory Study in Java and C# Applications (NC, EAB, JA, FP, AFG, TC, ES, AC, TF, IG), pp. 31–40.
ICSMEICSME-2014-PanichellaBPCA #developer
How Developers’ Collaborations Identified from Different Sources Tell Us about Code Changes (SP, GB, MDP, GC, GA), pp. 251–260.
ICSMEICSME-2014-SahinTMPC #energy #obfuscation #question
How Does Code Obfuscation Impact Energy Usage? (CS, PT, RM, ZP, JC), pp. 131–140.
MSRMSR-2014-TiarksM #development #mobile #question #tutorial
How does a typical tutorial for mobile development look like? (RT, WM), pp. 272–281.
DLTDLT-2014-EngelfrietMS #top-down #transducer
How to Remove the Look-Ahead of Top-Down Tree Transducers (JE, SM, HS), pp. 103–115.
ICALPICALP-v1-2014-HohnMW #cost analysis #scheduling
How Unsplittable-Flow-Covering Helps Scheduling with Job-Dependent Cost Functions (WH, JM, AW), pp. 625–636.
IFMIFM-2014-DrossopoulouN #policy #semantics
How to Break the Bank: Semantics of Capability Policies (SD, JN), pp. 18–35.
FLOPSFLOPS-2014-Parys #question
How Many Numbers Can a λ-Term Contain? (PP), pp. 302–318.
ICFPICFP-2014-McBride #order
How to keep your neighbours in order (CTM), pp. 297–309.
ICFPICFP-2014-Winograd-CortH #first-order
Settable and non-interfering signal functions for FRP: how a first-order switch is more than enough (DWC, PH), pp. 213–225.
CHI-PLAYCHI-PLAY-2014-CheungZN #experience #game studies
The first hour experience: how the initial play can engage (or lose) new players (GKC, TZ0, NN), pp. 57–66.
CHI-PLAYCHI-PLAY-2014-VandenBerghe #game studies #motivation
Engines of play: how player motivation changes over time (JV), p. 476.
FDGFDG-2014-CharbonneauBBML #game studies
Dance Enhanced: Investigating how earning content through exertion impacts dance game enjoyment (EC, SB, JNB, F'M, JJLJ).
CoGVS-Games-2014-ChristouM #difference #game studies #question
Aliens versus Humans: Do Avatars Make a Difference in How We Play the Game? (CC, DM), pp. 1–7.
CHICHI-2014-AthukoralaLKJOTJ #behaviour #mobile
How carat affects user behavior: implications for mobile battery awareness applications (KA, EL, MvK, AJ, AJO, ST, GJ), pp. 1029–1038.
CHICHI-2014-BensonK #web #what #why
End-users publishing structured information on the web: an observational study of what, why, and how (EB, DRK), pp. 1265–1274.
CHICHI-2014-BrumbyCCF #behaviour #question #visual notation #what
How does knowing what you are looking for change visual search behavior? (DPB, ALC, JC, BF), pp. 3895–3898.
CHICHI-2014-DiSalvoLLJK #design #human-computer #matter
Making public things: how HCI design can express matters of concern (CFD, JL, TL, TJ, TK), pp. 2397–2406.
CHICHI-2014-JotaLWJ #scalability
Let’s kick it: how to stop wasting the bottom third of your large screen display (RJ, PL, DW, JAJ), pp. 1411–1414.
CHICHI-2014-OduorNJHPH #communication #product line
How technology supports family communication in rural, suburban, and urban kenya (EO, CN, TKJ, KH, CP, SH), pp. 2705–2714.
CHICHI-2014-PatilSKL #feedback
Reflection or action?: how feedback and control affect location sharing decisions (SP, RS, AK, AJL), pp. 101–110.
CHICHI-2014-PritchardVBTO
Digitally driven: how location based services impact the work practices of London bus drivers (GWP, JV, PB, LT, PO), pp. 3617–3626.
CHICHI-2014-Schoenebeck #social #social media #twitter #why
Giving up Twitter for Lent: how and why we take breaks from social media (SYS), pp. 773–782.
CHICHI-2014-VanieaRW #case study #experience #security
Betrayed by updates: how negative experiences affect future security (KV, EJR, RW), pp. 2671–2674.
CHICHI-2014-WeigelMS #comprehension #mobile #people
More than touch: understanding how people use skin as an input surface for mobile computing (MW, VM, JS), pp. 179–188.
CSCWCSCW-2014-BossenJ #overview
How physicians “achieve overview”: a case-based study in a hospital ward (CB, LGJ), pp. 257–268.
CSCWCSCW-2014-BrownELQM #interactive
Tracking serendipitous interactions: how individual cultures shape the office (CB, CE, IL, DQ, CM), pp. 1072–1081.
CSCWCSCW-2014-GaoXCF #multi
How beliefs about the presence of machine translation impact multilingual collaborations (GG, BX, DC, SRF), pp. 1549–1560.
CSCWCSCW-2014-HemphillR #twitter
Tweet acts: how constituents lobby congress via Twitter (LH, AJR), pp. 1200–1210.
CSCWCSCW-2014-LivingstonGMB
How players value their characters in world of warcraft (IJL, CG, RLM, MB), pp. 1333–1343.
CSCWCSCW-2014-MaruyamaRDSF #hybrid #twitter
Hybrid media consumption: how tweeting during a televised political debate influences the vote decision (MM, SPR, SKD, BS, HAF), pp. 1422–1432.
CSCWCSCW-2014-MatthiesenBP #development #quote
“Figure out how to code with the hands of others”: recognizing cultural blind spots in global software development (SM, PB, LMP), pp. 1107–1119.
CSCWCSCW-2014-Ribes #framework #research #scalability
Ethnography of scaling, or, how to a fit a national research infrastructure in the room (DR), pp. 158–170.
CSCWCSCW-2014-SauppeM #communication #coordination #social
How social cues shape task coordination and communication (AS, BM), pp. 97–108.
CSCWCSCW-2014-ShiltonKF #social
How to see values in social computing: methods for studying values dimensions (KS, JAK, KRF), pp. 426–435.
CSCWCSCW-2014-VasilescuSDF #community #open source #social
How social Q&A sites are changing knowledge sharing in open source software communities (BV, AS, PTD, VF), pp. 342–354.
CSCWCSCW-2014-VitakK #facebook #people #process #quote
“You can’t block people offline”: examining how facebook’s affordances shape the disclosure process (JV, JK), pp. 461–474.
HCIDUXU-DI-2014-SchusterHBRJ #experience #using
Diving in? How Users Experience Virtual Environments Using the Virtual Theatre (KS, MH, UB, AR, SJ), pp. 636–646.
HCIDUXU-ELAS-2014-SchmeilS #health #quote
“How am I Doing?” — Personifying Health through Animated Characters (AS, LSS), pp. 91–102.
HCIDUXU-ELAS-2014-Spinillo #usability
How Do Patient Information Leaflets Aid Medicine Usage? A Proposal for Assessing Usability of Medicine Inserts (CGS), pp. 115–124.
HCIDUXU-TMT-2014-Bastos #design #realtime
Designing Real-Time: On How Events Affect Audiovisual Narrative (MB), pp. 509–518.
HCIDUXU-TMT-2014-SchmuntzschF #design #smarttech
How Two become One — Creating Synergy Effects by Applying the Joint Interview Method to Design Wearable Technology (US, LHF), pp. 173–184.
HCIHCI-AS-2014-LouLP #distance #game studies
Distance Effect: Where You Stand Determines How Promptly You Interact with Game (XL, AXL, RP), pp. 614–621.
HCIHIMI-DE-2014-OkaTM
Selecting a Function by How Characteristic Shapes Afford Users (MO, MT, HM), pp. 621–628.
HCISCSM-2014-FraidakiPD #information management #process #social #social media
Living in the Era of Social Media: How the Different Types of Social Media May Affect Information Acquisition Process (KF, KP, GID), pp. 178–185.
HCISCSM-2014-MendesFFC #analysis #classification #social #using
How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
HCISCSM-2014-WaltherT #communication #relational #self
Inventing Partners in Computer-Mediated Communication: How CMC Sustains Self-fulfilling Prophecies and Relational Attributions (JBW, STT), pp. 517–527.
VISSOFTVISSOFT-2014-BarikLCM #approach #compilation #developer #visualisation
How Developers Visualize Compiler Messages: A Foundational Approach to Notification Construction (TB, KL, SC, ERMH), pp. 87–96.
CAiSECAiSE-2014-BastarricaMRSV #process #quality #question
How does Quality of Formalized Software Processes Affect Adoption? (MCB, GM, RR, LS, RV), pp. 226–240.
EDOCEDOC-2014-Weber #comprehension #modelling #process #towards
Investigating the Process of Process Modeling: Towards an in-Depth Understanding of How Process Models Are Created (BW), p. 180.
CIKMCIKM-2014-GrbovicHKM #category theory #email
How Many Folders Do You Really Need?: Classifying Email into a Handful of Categories (MG, GH, ZSK, YM), pp. 869–878.
CIKMCIKM-2014-RenTOS #people #scalability #web
How People Use the Web in Large Indoor Spaces (YR, MT, KO, MS), pp. 1879–1882.
KEODKEOD-2014-AzaiezA #analysis #question #towards
How to Guarantee Analysis Results Coherence after Data Warehouse Schema Changes Propagation towards Data Marts? (NA, JA), pp. 428–435.
KEODKEOD-2014-GonenFEBWZP #maintenance #modelling #ontology #question
Maintaining SOA Systems of the Future — How Can Ontological Modeling Help? (BG, XF, EES, SB, NW, AZ, IP), pp. 376–381.
KRKR-2014-BelleL
How to Progress Beliefs in Continuous Domains (VB, HJL).
KRKR-2014-Dyrkolbotn #set #using
How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
SEKESEKE-2014-HegdeW #developer #overview #perspective
How to Enhance the Creativity of Software Developers: A Systematic Literature Review (RH, GSW), pp. 229–234.
SEKESEKE-2014-HuangCWC #interactive #question #testing
How to Do Tie-breaking in Prioritization of Interaction Test Suites? (RH, JC, RW, DC), pp. 121–125.
SIGIRSIGIR-2014-UstaAVOU #analysis #education #learning #student
How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
SIGIRSIGIR-2014-Williams #big data
The data revolution: how companies are transforming with big data (HEW), pp. 525–526.
PLATEAUPLATEAU-2014-SadowskiY #concurrent #detection #developer #tool support
How Developers Use Data Race Detection Tools (CS, JY), pp. 43–51.
RERE-2014-Daneva #approach #game studies #multi #online #requirements
How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games (MD), pp. 3–12.
RERE-2014-GuzmanM #analysis #fine-grained #sentiment
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews (EG, WM), pp. 153–162.
FSEFSE-2014-HigoK #case study #functional #java #source code
How should we measure functional sameness from program source code? an exploratory study on Java methods (YH, SK), pp. 294–305.
FSEFSE-2014-SeoK #testing
How we get there: a context-guided search strategy in concolic testing (HS, SK), pp. 413–424.
ICSEICSE-2014-BrindescuCSD #distributed #question #version control
How do centralized and distributed version control systems impact software changes? (CB, MC, SS, DD), pp. 322–333.
ICSEICSE-2014-EndrikatHRS #api #documentation #question #static typing #type system #usability
How do API documentation and static typing affect API usability? (SE, SH, RR, AS), pp. 632–642.
ICSEICSE-2014-KhadkaBSJH #legacy #question
How do professionals perceive legacy systems and software modernization? (RK, BVB, AS, SJ, JH), pp. 36–47.
ICSEICSE-2014-MinkuY #estimation #question #using
How to make best use of cross-company data in software effort estimation? (LLM, XY), pp. 446–456.
ICSEICSE-2014-Murphy-HillZN #development #game studies #quality #question #video
Cowboys, ankle sprains, and keepers of quality: how is video game development different from software development? (ERMH, TZ, NN), pp. 1–11.
ICSEICSE-2014-SingerFS #developer #re-engineering #twitter #using
Software engineering at the speed of light: how developers stay current using twitter (LS, FMFF, MADS), pp. 211–221.
SACSAC-2014-KolbZWR #design #distance #empirical #modelling #process #social
How social distance of process designers affects the process of process modeling: insights from a controlled experiment (JK, MZ, BW, MR), pp. 1364–1370.
SACSAC-2014-SaraivaS #behaviour
Choosing my partners based on how they will evaluate my behavior (ECdRCS, VTdS), pp. 781–783.
SLESLE-2014-SloaneRH
Respect Your Parents: How Attribution and Rewriting Can Get Along (AMS, MR, LGCH), pp. 191–210.
DATEDATE-2014-Bautista-GomezCCDFGPRR #named #reliability
GPGPUs: How to combine high computational power with high reliability (LABG, FC, LC, ND, BF, SG, KP, PR, MSR), pp. 1–9.
DATEDATE-2014-JaksicC #energy #protocol
DRAM-based coherent caches and how to take advantage of the coherence protocol to reduce the refresh energy (ZJ, RC), pp. 1–4.
DATEDATE-2014-RuhrmairSB
Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks (UR, US, WB), pp. 1–4.
LCTESLCTES-2014-HenryAMM #encoding #execution #modulo theories #optimisation #semantics #worst-case
How to compute worst-case execution time by optimization modulo theory and a clever encoding of program semantics (JH, MA, DM, CM), pp. 43–52.
STOCSTOC-2014-KalaiRR #power of #proving
How to delegate computations: the power of no-signaling proofs (YTK, RR, RDR), pp. 485–494.
STOCSTOC-2014-SahaiW #encryption #obfuscation
How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
IJCARIJCAR-2014-Cortier #logic
Electronic Voting: How Logic Can Help (VC), pp. 16–25.
TAPTAP-2014-PetiotKGJ #deduction #generative #specification #testing #verification
How Test Generation Helps Software Specification and Deductive Verification in Frama-C (GP, NK, AG, JJ), pp. 204–211.
DRRDRR-2013-SchusterHME #documentation #rule-based
Rule-based versus training-based extraction of index terms from business documents: how to combine the results (DS, MH, KM, DE).
HTHT-2013-ChengC
How annotation styles influence content and preferences (JC, DC), pp. 214–218.
HTHT-2013-LiangCCK #modelling #social #social media
How big is the crowd?: event and location based population modeling in social media (YL, JC, ZC, KYK), pp. 99–108.
JCDLJCDL-2013-JiangNHJ #question
Mendeley group as a new source of interdisciplinarity study: how do disciplines interact on mendeley? (JJ, CN, DH, WJ), pp. 135–138.
VLDBVLDB-2013-Franceschini #approach #big data #open source
How to maximize the value of big data with the open source SpagoBI suite through a comprehensive approach (MF), pp. 1170–1171.
SIGITESIGITE-2013-Esfahani
Digit shift: leverage or get leveled: how the business and academia can collaborate (SE), pp. 1–2.
SIGITESIGITE-2013-SabinLMPPR #women
Girls in IT: how to develop talent and leverage support (MS, DL, HM, KPP, SP, SR), pp. 61–62.
CSMRCSMR-2013-PanichellaMMPOPL #traceability #using
When and How Using Structural Information to Improve IR-Based Traceability Recovery (AP, CM, EM, DP, RO, DP, ADL), pp. 199–208.
ICSMEICSM-2013-AbdeenSS #design #interface
How We Design Interfaces, and How to Assess It (HA, HAS, OS), pp. 80–89.
ICSMEICSM-2013-Harder #developer #evolution #multi
How Multiple Developers Affect the Evolution of Code Clones (JH), pp. 30–39.
ICSMEICSM-2013-Yamashita #case study #comparative #maintenance #smell
How Good Are Code Smells for Evaluating Software Maintainability? Results from a Comparative Case Study (AY), pp. 566–571.
ICSMEICSM-2013-ZhangMZKH #maintenance #metric #question
How Does Context Affect the Distribution of Software Maintainability Metrics? (FZ, AM, YZ, FK, AEH), pp. 350–359.
MSRMSR-2013-JiangAG #case study #kernel #linux #performance
Will my patch make it? and how fast?: case study on the Linux kernel (YJ, BA, DMG), pp. 101–110.
MSRMSR-2013-NadiDTHL #linux #question #variability #what
Linux variability anomalies: what causes them and how do they get fixed? (SN, CD, RT, RCH, DL), pp. 111–120.
WCREWCRE-2013-LiXPZ #developer #question #what
What help do developers seek, when and how? (HL, ZX, XP, WZ), pp. 142–151.
WCREWCRE-2013-SohKGA #comprehension #developer #maintenance #process #towards
Towards understanding how developers spend their effort during maintenance activities (ZS, FK, YGG, GA), pp. 152–161.
CIAACIAA-J-2012-IbarraT13 #automaton #multi
How to synchronize the Heads of a Multitape Automaton (OHI, NQT), pp. 799–814.
ICALPICALP-v1-2013-BravermanOV #question #streaming
How Hard Is Counting Triangles in the Streaming Model? (VB, RO, DV), pp. 244–254.
LATALATA-2013-ChatterjeeCR
How to Travel between Languages (KC, SC, SR), pp. 214–225.
DiGRADiGRA-2013-Tanenbaum #game studies
How I Learned to Stop Worrying and Love the Gamer: Reframing Subversive Play in Story-Based Games (JGT0).
CoGVS-Games-2013-FerrerPRFQ #artificial reality #education #game studies #motivation #question #usability
How Does Usability Impact Motivation in Augmented Reality Serious Games for Education? (VF, AP, HRA, CF, JQ), pp. 1–8.
CHICHI-2013-AceitunoCR
How low can you go?: human limits in small unidirectional mouse movements (JA, GC, NR), pp. 1383–1386.
CHICHI-2013-BeyerKSHB #behaviour
Squaring the circle: how framing influences user behavior around a seamless cylindrical display (GB, FK, MS, IH, AB), pp. 1729–1738.
CHICHI-2013-ChongG
How groups of users associate wireless devices (MKC, HWG), pp. 1559–1568.
CHICHI-2013-GibsonH #question #women
Digital motherhood: how does technology help new mothers? (LG, VLH), pp. 313–322.
CHICHI-2013-HuangZNHP
Mastering the art of war: how patterns of gameplay influence skill in Halo (JH, TZ, NN, CH, BCP), pp. 695–704.
CHICHI-2013-IsaacsKWLHW
Echoes from the past: how technology mediated reflection improves well-being (EI, AK, AW, TL, VH, SW), pp. 1071–1080.
CHICHI-2013-JotaNDW #case study #latency #performance
How fast is fast enough?: a study of the effects of latency in direct-touch pointing tasks (RJ, AN, PD, DW), pp. 2291–2300.
CHICHI-2013-KramerKKWB #behaviour #developer #ide #navigation #tool support
How tools in IDEs shape developers’ navigation behavior (JPK, TK, JK, MW, JOB), pp. 3073–3082.
CHICHI-2013-LeahuCM #category theory #matter
How categories come to matter (LL, MC, WM), pp. 3331–3334.
CHICHI-2013-LinH #image #modelling #people
Modeling how people extract color themes from images (SL, PH), pp. 3101–3110.
CHICHI-2013-Mirza-BabaeiNGCF #game studies #research #testing
How does it play better?: exploring user testing and biometric storyboards in games user research (PMB, LEN, JG, NC, GF), pp. 1499–1508.
CHICHI-2013-NeustaedterBM #energy #process #product line
Everyday activities and energy consumption: how families understand the relationship (CN, LB, AM), pp. 1183–1192.
CHICHI-2013-RonenRJT #question
Taking data exposure into account: how does it affect the choice of sign-in accounts? (SR, OR, MJ, DT), pp. 3423–3426.
CHICHI-2013-VinesCWMO #configuration management #design #people
Configuring participation: on how we involve people in design (JV, RC, PCW, JCM, PO), pp. 429–438.
CHICHI-2013-WycheC #design #quote
“I want to imagine how that place looks”: designing technologies to support connectivity between africans living abroad and home (SW, MC), pp. 2755–2764.
CSCWCSCW-2013-BuhlerNH #chat #video #why
How and why teenagers use video chat (TB, CN, SH), pp. 759–768.
CSCWCSCW-2013-DoucetteGMNS #collaboration
Sometimes when we touch: how arm embodiments change reaching and collaboration on digital tables (AD, CG, RLM, MAN, SS), pp. 193–202.
CSCWCSCW-2013-Franklin-Hodge #internet
Digital democracy: how the internet re-elected a president (JFH), pp. 3–4.
CSCWCSCW-2013-GaoHZ #network #social
Closure vs. structural holes: how social network information and culture affect choice of collaborators (GG, PJH, CZ), pp. 5–18.
CSCWCSCW-2013-SchneiderSPD #ad hoc #experience #online
Arguments about deletion: how experience improves the acceptability of arguments in ad-hoc online task groups (JS, KS, AP, SD), pp. 1069–1080.
CSCWCSCW-2013-TeevanH #communication #comprehension
Understanding how the projection of availability state impacts the reception incoming communication (JT, AH), pp. 753–758.
CSCWCSCW-2013-YamashitaEIH #collaboration #multi
Lost in transmittance: how transmission lag enhances and deteriorates multilingual collaboration (NY, AE, TI, AMJH), pp. 923–934.
HCIDHM-SET-2013-Lueder
How Could This Have Happened? Unintentional Injuries of Young Children at Home (RL), pp. 348–354.
HCIDHM-SET-2013-SaparovaBLKMY #health #information management #problem #question #usability #what
Usability Problems in Patient- and Clinician-Oriented Health Information Systems: What Are They and How Do They Differ? (DS, JB, YL, FK, YM, BY), pp. 276–285.
HCIDUXU-CXC-2013-MouraVCBSTLK #exclamation #game studies #learning #mobile
Luz, Câmera, Libras!: How a Mobile Game Can Improve the Learning of Sign Languages (GdSM, LAV, AC, FB, DdS, JMXNT, CWML, JK), pp. 266–275.
HCIDUXU-CXC-2013-Stevens #behaviour #gamification #social
How Gamification and Behavior Science Can Drive Social Change One Employee at a Time (SHS), pp. 597–601.
HCIDUXU-PMT-2013-Flanagan #feedback #interface
Haptic Interface Aesthetics — “Feedback Loops, Live Coding and How to Harness the Potential of Embodied Estrangement in Artistic Practices and Aesthetic Theories within Interface Culture” (PJF), pp. 58–67.
HCIDUXU-PMT-2013-KangS #case study #design #process
How to Observe, Share and Apply in Design Process? — Focusing on International Design Workshops as a Case Study (NK, HS), pp. 498–505.
HCIDUXU-PMT-2013-MichailidouSL #experience #user interface
How to Create a User Experience Story (IM, CvS, UL), pp. 554–563.
HCIDUXU-WM-2013-SauckenML #approach #case study #design #experience #metaprogramming #user interface
How to Design Experiences: Macro UX versus Micro UX Approach (CvS, IM, UL), pp. 130–139.
HCIHCI-AS-2013-LekkasGTMS #behaviour #component #experience #learning #process
Personality and Emotion as Determinants of the Learning Experience: How Affective Behavior Interacts with Various Components of the Learning Process (ZL, PG, NT, CM, GS), pp. 418–427.
ICEISICEIS-v1-2013-SecaM #question
IT applied to Public Lighting Management — How IT Can Improve Public Lighting Management? (NS, FM), pp. 513–518.
ICEISICEIS-v3-2013-VielMPT #interactive #learning #multi #student
How are they Watching Me — Learning from Student Interactions with Multimedia Objects Captured from Classroom Presentations (CCV, ELM, MdGCP, CACT), pp. 5–16.
CIKMCIKM-2013-ChengAH #question
How fresh do you want your search results? (SC, AA, VH), pp. 1271–1280.
CIKMCIKM-2013-DasLM #wiki
Manipulation among the arbiters of collective intelligence: how wikipedia administrators mold public opinion (SD, AL, MMI), pp. 1097–1106.
CIKMCIKM-2013-ValkanasG #web
How the live web feels about events (GV, DG), pp. 639–648.
ECIRECIR-2013-NieblerSBKSH #social
How Tagging Pragmatics Influence Tag Sense Discovery in Social Annotation Systems (TN, PS, DB, CK, MS, AH), pp. 86–97.
KDDKDD-2013-Marty #security #visual notation
Cyber security: how visual analytics unlock insight (RM), p. 1139.
KDDKDD-2013-ZhangWNLWY #named #network #predict #social #visualisation
LAFT-Explorer: inferring, visualizing and predicting how your social network expands (JZ, CW, YN, YL, JW, PSY), pp. 1510–1513.
KDIRKDIR-KMIS-2013-BerrahouBDR #documentation #question
How to Extract Unit of Measure in Scientific Documents? (SLB, PB, JDB, MR), pp. 249–256.
RecSysRecSys-2013-DzyaburaT #recommendation
Not by search alone: how recommendations complement search results (DD, AT), pp. 371–374.
SEKESEKE-2013-BassoWPO #question #reuse #tool support
How do You Execute Reuse Tasks Among Tools? (FPB, CMLW, RMP, TCO), pp. 721–726.
SEKESEKE-2013-Perez-CastilloFPC #modelling #process #question #refactoring
How Does Refactoring Affect Understandability of Business Process Models? (RPC, MFR, MP, DC), pp. 644–649.
SEKESEKE-2013-WangWMX #analysis #performance
How Does Acquirer’s Participation Influence Performance of Software Projects: A Quantitative Analysis (YW, JW, JM, BX), pp. 537–541.
SIGIRSIGIR-2013-AzzopardiKB #behaviour #query
How query cost affects search behavior (LA, DK, KB), pp. 23–32.
SIGIRSIGIR-2013-JiangJH #fault #query
How do users respond to voice input errors?: lexical and phonetic query reformulation in voice search (JJ, WJ, DH), pp. 143–152.
SIGIRSIGIR-2013-Wu #behaviour #online #predict #using
How far will you go?: characterizing and predicting online search stopping behavior using information scent and need for cognition (WCW), p. 1149.
SKYSKY-2013-Gomes #ontology #recommendation #representation #using
Representing Knowledge using Ontologies: How Search, Browse and Recommendation Can Be Performed (PG), pp. 1–3.
PLEASEPLEASE-2013-UrliMBC #multi #product line #question
How to exploit domain knowledge in Multiple Software Product Lines? (SU, SM, MBF, PC), pp. 13–16.
PLDIPLDI-2013-ApinisSV #equation
How to combine widening and narrowing for non-monotonic systems of equations (KA, HS, VV), pp. 377–386.
POPLPOPL-2013-Myers #distributed
How languages can save distributed computing (ACM), pp. 315–316.
RERE-2013-TodoranSG #case study #elicitation #requirements
How cloud providers elicit consumer requirements: An exploratory study of nineteen companies (IT, NS, MG), pp. 105–114.
ICSEICSE-2013-HerzigJZ #classification #debugging #predict
It’s not a bug, it’s a feature: how misclassification impacts bug prediction (KH, SJ, AZ), pp. 392–401.
ICSEICSE-2013-PanichellaDOPPL #algorithm #approach #effectiveness #modelling #re-engineering #search-based #topic
How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms (AP, BD, RO, MDP, DP, ADL), pp. 522–531.
ICSEICSE-2013-RahmanD #metric #process #why
How, and why, process metrics are better (FR, PTD), pp. 432–441.
DATEDATE-2013-AitkenFKRR #analysis #question #reliability
Reliability analysis reloaded: how will we survive? (RA, GF, ZTK, FR, MSR), pp. 358–367.
HPCAHPCA-2013-RobatmiliLEGSPBK #architecture #effectiveness #manycore #predict
How to implement effective prediction and forwarding for fusable dynamic multicore architectures (BR, DL, HE, MSSG, AS, AP, DB, SWK), pp. 460–471.
STOCSTOC-2013-HardtW #adaptation #linear #question #robust #sketching
How robust are linear sketches to adaptive inputs? (MH, DPW), pp. 121–130.
CAVCAV-2013-ChevalCP #privacy
Lengths May Break Privacy — Or How to Check for Equivalences with Length (VC, VC, AP), pp. 708–723.
DocEngDocEng-2012-MoulderM #layout #learning
Learning how to trade off aesthetic criteria in layout (PM, KM), pp. 33–36.
HTHT-2012-Staab
How to do things with triples (SS), pp. 1–2.
JCDLJCDL-2012-GozaliKS #people #question
How do people organize their photos in each event and how does it affect storytelling, searching and interpretation tasks? (JPG, MYK, HS), pp. 315–324.
SIGMODSIGMOD-2012-VenkataramaniABCCDDFGHKLMPP #facebook #graph #named #social
TAO: how facebook serves the social graph (VV, ZA, NB, GCI, PC, PD, HD, JF, AG, JH, SK, NL, MM, DP, LP), pp. 791–792.
TPDLTPDL-2012-SalahEldeenN #question #social #social media
Losing My Revolution: How Many Resources Shared on Social Media Have Been Lost? (HS, MLN), pp. 125–137.
VLDBVLDB-2012-BenderFJKKMMSSZ
Don’t Thrash: How to Cache Your Hash on Flash (MAB, MFC, RJ, RK, BCK, DM, PM, PS, RPS, EZ), pp. 1627–1637.
VLDBVLDB-2012-UpadhyayaBS #in the cloud #optimisation
How to Price Shared Optimizations in the Cloud (PU, MB, DS), pp. 562–573.
ITiCSEITiCSE-2012-HershkovichH #education #tool support
How innovative technology tools can be used to create new methodology for teaching knowledge (EH, BH), p. 387.
ITiCSEITiCSE-2012-Luxton-ReillyDPS #learning #process #student
Activities, affordances and attitude: how student-generated questions assist learning (ALR, PD, BP, RS), pp. 4–9.
TFPIETFPIE-2012-PageG
How Computers Work: Computational Thinking for Everyone (RP, RG), pp. 1–19.
CSMRCSMR-2012-OlszakJ #composition #concept #legacy #question
Modularization of Legacy Features by Relocation and Reconceptualization: How Much is Enough? (AO, BNJ), pp. 171–180.
ICSMEICSM-2012-BiegelBHD #developer #order
The Order of Things: How developers sort fields and methods (BB, FB, WH, SD), pp. 88–97.
ICSMEICSM-2012-HigoK #consistency #detection #nondeterminism
How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments (YH, SK), pp. 222–231.
MSRMSR-2012-Rodriguez-BustosA #distributed #open source #version control
How Distributed Version Control Systems impact open source software projects (CRB, JA), pp. 36–39.
WCREWCRE-2012-GarzonL #automation #tool support
Exploring How to Develop Transformations and Tools for Automated Umplification (MG, TCL), pp. 491–494.
CIAACIAA-2012-IbarraT #automaton #multi
How to Synchronize the Heads of a Multitape Automaton (OHI, NQT), pp. 192–204.
CoGCIG-2012-BauckhageKSTDC #empirical #game studies
How players lose interest in playing a game: An empirical study based on distributions of total playing times (CB, KK, RS, CT, AD, AC), pp. 139–146.
FDGFDG-2012-GualeniJC #design #game studies #process
How psychophysiology can aid the design process of casual games: a tale of stress, facial muscles, and paper beasts (SG, DPJ, LC), pp. 149–155.
ICGTICGT-2012-RuscioIP #co-evolution #ecosystem #evolution #metamodelling
Evolutionary Togetherness: How to Manage Coupled Evolution in Metamodeling Ecosystems (DDR, LI, AP), pp. 20–37.
CHICHI-2012-BatemanTW #behaviour #comparison
The search dashboard: how reflection and comparison impact search behavior (SB, JT, RWW), pp. 1785–1794.
CHICHI-2012-BergmanWSNR #navigation
How do we find personal files?: the effect of OS, presentation & depth on file navigation (OB, SW, MS, RN, AR), pp. 2977–2980.
CHICHI-2012-BrynjarsdottirHPBDS #persuasion
Sustainably unpersuaded: how persuasion narrows our vision of sustainability (HB, MH, JP, EB, CFD, PS), pp. 947–956.
CHICHI-2012-HenneckeMB #interactive #pointer
How screen transitions influence touch and pointer interaction across angled display arrangements (FH, WM, AB), pp. 209–212.
CHICHI-2012-HourcadeB #visual notation
How small can you go?: analyzing the effect of visual angle in pointing tasks (JPH, NEBR), pp. 213–216.
CHICHI-2012-JianuL #evaluation #user interface
An evaluation of how small user interface changes can improve scientists’ analytic strategies (RJ, DHL), pp. 2953–2962.
CHICHI-2012-KuhnMSCLQD #multi #student
How students find, evaluate and utilize peer-collected annotated multimedia data in science inquiry with zydeco (AK, BM, SS, CC, WTL, CQ, ID), pp. 3061–3070.
CHICHI-2012-MatthewsJW #design #experience #question #user interface
How do designers and user experience professionals actually perceive and use personas? (TM, TKJ, SW), pp. 1219–1228.
CHICHI-2012-ParkBN #question
How do couples use CheekTouch over phone calls? (YP, SHB, TJN), pp. 763–766.
CHICHI-2012-XuBRTM #communication #learning #towards
Learning how to feel again: towards affective workplace presence and communication technologies (AX, JTB, EGR, TT, WvM), pp. 839–848.
CHICHI-2012-ZhaoSC #facebook
It’s complicated: how romantic partners use facebook (XZ, VSS, DC), pp. 771–780.
CSCWCSCW-2012-BenjaminBBGF #interactive
Impression management work: how seniors with chronic pain address disruptions in their interactions (AB, JPB, RB, DG, AF), pp. 799–808.
CSCWCSCW-2012-NguyenF #analysis
How did you feel during our conversation?: retrospective analysis of intercultural and same-culture instant messaging conversations (DTN, SRF), pp. 117–126.
CSCWCSCW-2012-SohnLZDT #coordination
An examination of how households share and coordinate the completion of errands (TS, LL, SZ, DD, KNT), pp. 729–738.
CSCWCSCW-2012-SosikZC
See friendship, sort of: how conversation and digital traces might support reflection on friendships (VSS, XZ, DC), pp. 1145–1154.
CSCWCSCW-2012-StarbirdP #information management
(How) will the revolution be retweeted?: information diffusion and the 2011 Egyptian uprising (KS, LP), pp. 7–16.
CSCWCSCW-2012-WycheG #case study #communication #product line #quote
“This is how we do it in my country”: a study of computer-mediated family communication among Kenyan migrants in the United States (SW, REG), pp. 87–96.
CSCWCSCW-2012-ZhaoHG #community #online #people #self
How and to whom people share: the role of culture in self-disclosure in online communities (CZ, PJH, GG), pp. 67–76.
CIKMCIKM-2012-CosciaR #using #web
Knowing where and how criminal organizations operate using web content (MC, VR), pp. 1412–1421.
CIKMCIKM-2012-EldardiryN #analysis #classification #graph #predict
An analysis of how ensembles of collective classifiers improve predictions in graphs (HE, JN), pp. 225–234.
CIKMCIKM-2012-MurakamiM #people #question #web
How do humans distinguish different people with identical names on the web? (HM, YM), pp. 2475–2478.
CIKMCIKM-2012-ShirazipourazadBVSH #contest
Influence propagation in adversarial setting: how to defeat competition with least amount of investment (SS, BB, HV, AS, PH), pp. 585–594.
ECIRECIR-2012-LucchesePSVV #random
How Random Walks Can Help Tourism (CL, RP, FS, HV, RV), pp. 195–206.
ICMLICML-2012-BachrachGMG #adaptation #crowdsourcing #testing #visual notation
How To Grade a Test Without Knowing the Answers — A Bayesian Graphical Model for Adaptive Crowdsourcing and Aptitude Testing (YB, TG, TM, JG), p. 108.
KDDKDD-2012-PatroDSWFK #approach #data-driven #learning #modelling #network
The missing models: a data-driven approach for learning how networks grow (RP, GD, ES, HW, DF, CK), pp. 42–50.
KEODKEOD-2012-Koponen #modelling #student
Modelling How Students Organize Knowledge (IK), pp. 143–148.
KMISKMIS-2012-Vaiyavuth #approach #challenge #concept #energy #framework #modelling
How Open Innovation Models Might Help the Thai Energy Sector to Address the Climate Change Challenge? — A Conceptual Framework on an Approach to Measure the Impact of Adoption of Open Innovation (RV), pp. 229–234.
KRKR-2012-BaralD #automation #learning #programming #set
Solving Puzzles Described in English by Automated Translation to Answer Set Programming and Learning How to Do that Translation (CB, JD).
MLDMMLDM-2012-OshiroPB #question #random
How Many Trees in a Random Forest? (TMO, PSP, JAB), pp. 154–168.
RecSysRecSys-2012-KluverNESR #question #rating
How many bits per rating? (DK, TTN, MDE, SS, JR), pp. 99–106.
SEKESEKE-2012-DoranCG #api #network #privacy #social
How Social Network APIs Have Ended the Age of Privacy (DD, SC, SSG), pp. 400–405.
SIGIRSIGIR-2012-ChuklinS #query
How query extensions reflect search result abandonments (AC, PS), pp. 1087–1088.
ICMTICMT-2012-TerwilligerCC #bidirectional #framework #incremental #towards
How Clean Is Your Sandbox? — Towards a Unified Theoretical Framework for Incremental Bidirectional Transformations (JFT, AC, CC), pp. 1–23.
PLATEAUPLATEAU-2012-MeyerovichR12a #case study #developer #experience #overview #repository
How not to survey developers and repositories: experiences analyzing language adoption (LAM, ASR), pp. 7–16.
RERE-2012-AmellerACF #architecture #case study #non-functional #requirements
How do software architects consider non-functional requirements: An exploratory study (DA, CPA, JC, XF), pp. 41–50.
REFSQREFSQ-2012-MahauxMH #people #requirements #why
Choose Your Creativity: Why and How Creativity in Requirements Engineering Means Different Things to Different People (MM, AM, PH), pp. 101–116.
REFSQREFSQ-2012-PoortMWV #architecture #non-functional #requirements
How Architects See Non-Functional Requirements: Beware of Modifiability (ERP, NM, IvdW, HvV), pp. 37–51.
FSEFSE-2012-OkurD #developer #library #parallel #question
How do developers use parallel libraries? (SO, DD), p. 54.
FSEFSE-2012-RobbesLR #api #developer #ecosystem #smalltalk
How do developers react to API deprecation?: the case of a smalltalk ecosystem (RR, ML, DR), p. 56.
FSEFSE-2012-TaoDXZK #case study #industrial
How do software engineers understand code changes?: an exploratory study in industry (YT, YD, TX, DZ, SK), p. 51.
ICSEICSE-2012-Braithwaite #programming #what
Software as an engineering material: How the affordances of programming have changed and what to do about it (KB), p. 998.
ICSEICSE-2012-EderJJHVP #maintenance #matter #question
How much does unused code matter for maintenance? (SE, MJ, EJ, BH, RV, KHP), pp. 1102–1111.
ICSEICSE-2012-RoehmTKM #developer #question
How do professional developers comprehend software? (TR, RT, RK, WM), pp. 255–265.
ICSEICSE-2012-SchwarzLR #on the #repository
On how often code is cloned across repositories (NS, ML, RR), pp. 1289–1292.
ICSEICSE-2012-Sprenger #case study #experience #re-engineering
How software engineering can benefit from traditional industries — A practical experience report (TS), p. 1000.
ICSEICSE-2012-StaatsGH #automation #fault #mutation testing #testing
Automated oracle creation support, or: How I learned to stop worrying about fault propagation and love mutation testing (MS, GG, MPEH), pp. 870–880.
LDTALDTA-2012-VieraSM #attribute grammar
UUAG meets AspectAG: how to make attribute grammars first-class (MV, SDS, AM), p. 6.
CAVCAV-2012-SchellhornWD #algorithm
How to Prove Algorithms Linearisable (GS, HW, JD), pp. 243–259.
ICLPICLP-2012-BaralVL #knowledge base #why
Answering Why and How questions with respect to a frame-based knowledge base: a preliminary report (CB, NHV, SL), pp. 26–36.
IJCARIJCAR-2012-BorgwardtDP #fuzzy #logic #question
How Fuzzy Is My Fuzzy Description Logic? (SB, FD, RP), pp. 82–96.
LICSLICS-2012-ChatterjeeD #game studies #probability
Partial-Observation Stochastic Games: How to Win When Belief Fails (KC, LD), pp. 175–184.
ECSAECSA-2011-Axelsson #architecture #embedded #nondeterminism #on the
On How to Deal with Uncertainty When Architecting Embedded Software and Systems (JA), pp. 199–202.
QoSAQoSA-ISARCS-2011-Zave #architecture #internet
How software architecture can make an application-friendly internet (PZ), pp. 1–2.
DocEngDocEng-2011-Davis
Google’s international bloopers... and how we fixed one (MD), pp. 101–102.
DRRDRR-2011-LamiroyLKH #analysis #documentation #research #resource management
How carefully designed open resource sharing can help and expand document analysis research (BL, DPL, HFK, JH), pp. 1–10.
JCDLJCDL-2011-AinsworthASWN #question #web
How much of the web is archived? (SA, AA, HS, MCW, MLN), pp. 133–136.
SIGMODSIGMOD-2011-TeubnerM
How soccer players would do stream joins (JT, RM), pp. 625–636.
TPDLTPDL-2011-McKayB
One of These Things Is Not Like the Others: How Users Search Different Information Resources (DM, GB), pp. 260–271.
TPDLTPDL-2011-TsatsaronisVTRNSZ #graph #mining #modelling
How to Become a Group Leader? or Modeling Author Types Based on Graph Mining (GT, IV, ST, MR, KN, MS, MZ), pp. 15–26.
VLDBVLDB-2011-WangLYF
Entity Matching: How Similar Is Similar (JW, GL, JXY, JF), pp. 622–633.
CSEETCSEET-2011-BromanS #question #re-engineering #student
How can we make software engineering text books well-founded, up-to-date, and accessible to students? (DB, KS), pp. 386–390.
CSEETCSEET-2011-Sweedyk #education #problem
How middle school teachers solved our SE project problems (ES), pp. 449–453.
ITiCSEITiCSE-2011-AkbarFCDSFC #education #online
How educators find educational resources online (MA, WF, LNC, LMLD, CAS, EAF, YC), p. 367.
ITiCSEITiCSE-2011-BoyceCPCB #education #evaluation #game studies #learning #motivation
Experimental evaluation of BeadLoom game: how adding game elements to an educational tool improves motivation and learning (AKB, AC, SP, DC, TB), pp. 243–247.
ITiCSEITiCSE-2011-HoverHRM #collaboration #learning #student
Evaluating how students would use a collaborative linked learning space (KMH, MH, GR, MM), pp. 88–92.
SIGITESIGITE-2011-GuthrieYS #question #what #women
How did mathemathematics and accounting get so many women majors?: what can IT disciplines learn? (RAG, EKY, LLS), pp. 15–20.
ICSMEICSM-2011-Kemmerer #what
How to steal a botnet and what can happen when you do (RAK), p. 1.
MSRMSR-2011-CallauRTR #developer #programming language #smalltalk
How developers use the dynamic features of programming languages: the case of smalltalk (OC, RR, ÉT, DR), pp. 23–32.
MSRMSR-2011-PaganoM #case study #developer
How do developers blog?: an exploratory study (DP, WM), pp. 123–132.
MSRMSR-2011-ParninBM #java
Java generics adoption: how new features are introduced, championed, or ignored (CP, CB, ERMH), pp. 3–12.
WCREWCRE-2011-CanforaCCP #debugging #empirical
How Long Does a Bug Survive? An Empirical Study (GC, MC, LC, MDP), pp. 191–200.
ICALPICALP-v1-2011-AnandGM #question
Meeting Deadlines: How Much Speed Suffices? (SA, NG, NM), pp. 232–243.
ICALPICALP-v1-2011-FaustPV
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (SF, KP, DV), pp. 391–402.
ICFPICFP-2011-GonthierZND #ad hoc #automation #proving
How to make ad hoc proof automation less ad hoc (GG, BZ, AN, DD), pp. 163–175.
DiGRADiGRA-2011-HerrewijnP #case study #effectiveness #experience #game studies
Putting Brands into Play: How Player Experiences Influence the Effectiveness of In-Game Advertising (LH, KP).
DiGRADiGRA-2011-IacovidesASW #learning #question
Making sense of game-play: How can we examine learning and involvement? (II, JA, ES, WW).
DiGRADiGRA-2011-Rao #formal method #game studies #video
How to Say Things with Actions I: a Theory of Discourse for Video Games for Change (VR).
DiGRADiGRA-2011-Zabban #design #game studies #online #what
What Keeps Designers and Players Apart? Thinking How an Online Game World is Shared (VZ).
FDGFDG-2011-TreanorSBM #game studies #logic #visual notation
Proceduralist readings: how to find meaning in games with graphical logics (MT, BS, IB, MM), pp. 115–122.
CHICHI-2011-BlythePC
F for fake: four studies on how we fall for phish (MB, HP, JAC), pp. 3469–3478.
CHICHI-2011-BrumbyDJG #performance
Fast or safe?: how performance objectives determine modality output choices while interacting on the move (DPB, SCED, CPJ, JJG), pp. 473–482.
CHICHI-2011-ChongG
How users associate wireless devices (MKC, HG), pp. 1909–1918.
CHICHI-2011-FritzM #developer
Determining relevancy: how software developers determine relevant information in feeds (TF, GCM), pp. 1827–1830.
CHICHI-2011-Gaver #design
Making spaces: how design workbooks work (WWG), pp. 1551–1560.
CHICHI-2011-HsiehHK
Donate for credibility: how contribution incentives can improve credibility (GH, SEH, REK), pp. 3435–3438.
CHICHI-2011-KandoganKMP #interface #problem
How a freeform spatial interface supports simple problem solving tasks (EK, JK, TPM, PP), pp. 925–934.
CHICHI-2011-KannabiranBB #human-computer #research
How HCI talks about sexuality: discursive strategies, blind spots, and opportunities for future research (GK, JB, SB), pp. 695–704.
CHICHI-2011-KlasnjaCP #behaviour #health #human-computer #research
How to evaluate technologies for health behavior change in HCI research (PVK, SC, WP), pp. 3063–3072.
CHICHI-2011-LelisH #online #people #rating
Informing decisions: how people use online rating information to make choices (SL, AH), pp. 2285–2294.
CHICHI-2011-MarshallMRKD #approach #interface #multi
Rethinking “multi-user”: an in-the-wild study of how groups approach a walk-up-and-use tabletop interface (PM, RM, YR, SK, MD), pp. 3033–3042.
CHICHI-2011-Monroy-HernandezHGb #automation #community #online
Computers can’t give credit: how automatic attribution falls short in an online remixing community (AMH, BMH, JGR, DB), pp. 3421–3430.
HCIDHM-2011-WelkePRJ #analysis #modelling #validation #what
What Is Human? How the Analysis of Brain Dynamics Can Help to Improve and Validate Driver Models (SW, JP, MR, TJ), pp. 513–522.
HCIDUXU-v1-2011-BuettnerS #mobile #web
Mobile Web and Native Apps: How One Team Found a Happy Medium (KB, AMS), pp. 549–554.
HCIDUXU-v1-2011-OzturkR #experience #mobile #network #social #user interface
How to Improve User Experience in Mobile Social Networking: A User-Centered Study with Turkish Mobile Social Network Site Users (ÖÖ, KR), pp. 521–530.
HCIDUXU-v1-2011-Renner #design #image #process #question #visual notation
Image, Imagination, Innovation: How Can We Overcome the Common Ground in the Processes of Visual Design? (MR), pp. 285–294.
HCIDUXU-v2-2011-GajendarJ #design
The Inmates Are Still Running the Asylum: How to Share a Design Vision with Engineers (UG, CJ), pp. 276–282.
HCIDUXU-v2-2011-Iizuka #empirical
An Experiment about How to Feel Temperature Change of Mouse (SI), pp. 575–581.
HCIDUXU-v2-2011-OlsenPB #effectiveness #game studies #testing #usability
Serious Games Usability Testing: How to Ensure Proper Usability, Playability, and Effectiveness (TO, KP, CAB), pp. 625–634.
HCIHCI-DDA-2011-ZimmermanKPBLJ #performance #quote
“How Do I Line Up?”: Reducing Mental Transformations to Improve Performance (GWZ, DSK, GMP, JB, LML, SDJ), pp. 432–440.
HCIHCI-ITE-2011-KwonCSAG #interactive #internet
Older User-Computer Interaction on the Internet: How Conversational Agents Can Help (WSK, VC, SIS, HA, JEG), pp. 533–536.
HCIHCI-MIIE-2011-HyrkkanenN #functional #identification #mobile #physics #question
The Virtual Workplace of a Mobile Employee — How Does Vischer’s Model Function in Identifying Physical, Functional and Psychosocial Fit? (UH, SN), pp. 69–75.
HCIHCI-UA-2011-GuhaDF #design
How Children Can Design the Future (MLG, AD, JAF), pp. 559–569.
HCIHIMI-v1-2011-TakeuchiN #question
How Do Real or Virtual Agent’s Body and Instructions Contribute to Task Achievement? (YT, HN), pp. 142–151.
HCIHIMI-v2-2011-NguyenBRHVSB #multi
How Data Comm Methods and Multi-dimensional Traffic Displays Influence Pilot Workload under Trajectory Based Operations (JHN, LPB, RCR, MH, KPLV, TZS, VB), pp. 507–515.
HCIOCSC-2011-KochFB #crowdsourcing #design #online #platform
Online Crowdsourcing in the Public Sector: How to Design Open Government Platforms (GK, JF, SB), pp. 203–212.
ICEISICEIS-J-2011-VianaT11a
Electronic Government in Brazil: Evaluating Brazilian Initiative and How to Improve It (GBV, MBFdT), pp. 388–402.
ICEISICEIS-v2-2011-YangLT #communication #development #memory management #question
How Communication Impacts on the Development of Transactive Memory System in Task-teams? (YY, YL, FT), pp. 451–454.
ICEISICEIS-v4-2011-LiangY #enterprise
How to Control the Distribution Cost of the Cold Chain Logistics Enterprise (SXL, GY), pp. 716–719.
ICEISICEIS-v4-2011-WangZQ #enterprise
How Logistics Enterprises Cope with Financial Crisis (JW, ZZ, KQ), pp. 685–689.
CIKMCIKM-2011-TorresW #web #what
What and how children search on the web (SDT, IW), pp. 393–402.
CIKMCIKM-2011-YangZKL #learning #question #why
Can irrelevant data help semi-supervised learning, why and how? (HY, SZ, IK, MRL), pp. 937–946.
CIKMCIKM-2011-YeungJ #mining #scalability #towards
Studying how the past is remembered: towards computational history through large scale text mining (CmAY, AJ), pp. 1231–1240.
ECIRECIR-2011-ShiLH11a #question #recommendation #trust
How Far Are We in Trust-Aware Recommendation? (YS, ML, AH), pp. 704–707.
RecSysRecSys-2011-KnijnenburgRW #interactive #recommendation
Each to his own: how different users call for different interaction methods in recommender systems (BPK, NJMR, MCW), pp. 141–148.
RecSysRecSys-2011-SparlingS #named #question #rating
Rating: how difficult is it? (EIS, SS), pp. 149–156.
SEKESEKE-2011-RochaV #empirical #java
How Annotations are Used in Java: An Empirical Study (HR, MTV), pp. 426–431.
SEKESEKE-2011-RodriguesS
How IT Professionals Face Negotiations (SAR, JMdS), pp. 264–267.
SIGIRSIGIR-2011-SantosMO11b #question #web
How diverse are web search results? (RLTS, CM, IO), pp. 1187–1188.
SIGIRSIGIR-2011-ZhangMLM #approach #information retrieval #ranking
How to count thumb-ups and thumb-downs?: an information retrieval approach to user-rating based ranking of items (DZ, RM, HL, JM), pp. 1223–1224.
PLATEAUPLATEAU-2011-GilGM #metric #question
How much information do software metrics contain? (JYG, MG, DM), pp. 57–64.
PLATEAUPLATEAU-2011-KleinschmagerH #case study #programming #self
How to rate programming skills in programming experiments?: a preliminary, exploratory, study based on university marks, pretests, and self-estimation (SK, SH), pp. 15–24.
LOPSTRLOPSTR-2011-DandoisV #detection #logic programming #source code
Clones in Logic Programs and How to Detect Them (CD, WV), pp. 90–105.
AdaSIGAda-2011-BrosterC #embedded #reliability
How to measure and optimize reliable embedded software (IB, AC), pp. 1–2.
SIGAdaSIGAda-2011-RosenMT #ada
How to make Ada go “viral” (JPR, BM, STT), pp. 35–36.
RERE-2011-MarczakD #collaboration #communication #interactive
How interaction between roles shapes the communication structure in requirements-driven collaboration (SM, DD), pp. 47–56.
RERE-2011-PuhlF #requirements #towards
How to assign cost to “avoidable requirements creep”: A step towards the waterfall’s agilization (SP, RF), pp. 307–312.
ASEASE-2011-RamirezJCK #adaptation #automation #behaviour #nondeterminism
Automatically exploring how uncertainty impacts behavior of dynamically adaptive systems (AJR, ACJ, BHCC, DBK), pp. 568–571.
ASEASE-2011-Witten #documentation #representation #semantics #wiki
Wikipedia and how to use it for semantic document representation (IHW), p. 1.
ESEC-FSEESEC-FSE-2011-YinYZPB #debugging #question
How do fixes become bugs? (ZY, DY, YZ, SP, LNB), pp. 26–36.
ICSEICSE-2011-StreitP #quality #why
Why software quality improvement fails: (and how to succeed nevertheless) (JS, MP), pp. 726–735.
ICSEICSE-2011-TreudeBS #question #web
How do programmers ask and answer questions on the web? (CT, OB, MADS), pp. 804–807.
SACSAC-2011-HorkoffY #modelling
Analyzing goal models: different approaches and how to choose among them (JH, ESKY), pp. 675–682.
CGOCGO-2011-Leroy #compilation #question #verification #why
Formally verifying a compiler: Why? How? How far? (XL).
DACDAC-2011-Hu #why
New sub-20nm transistors: why and how (CH), pp. 460–463.
DACDAC-2011-Mador-HaimAM #consistency #memory management #modelling #question #testing
Litmus tests for comparing memory consistency models: how long do they need to be? (SMH, RA, MMKM), pp. 504–509.
HPCAHPCA-2011-McKinley #parallel #question
How’s the parallel computing revolution going? (KSM), p. 217.
PPoPPPPoPP-2011-McKinley #parallel #question
How’s the parallel computing revolution going? (KSM), pp. 123–124.
STOCSTOC-2011-LewkoLW
How to leak on key updates (ABL, ML, BW), pp. 725–734.
ICSTICST-2011-FraserA #matter
It is Not the Length That Matters, It is How You Control It (GF, AA), pp. 150–159.
ICSTSAT-2011-MundhenkZ #equivalence #normalisation
How to Apply SAT-Solving for the Equivalence Test of Monotone Normal Forms (MM, RZ), pp. 105–119.
JCDLJCDL-2010-AudenaertF #what
What humanists want: how scholars use source materials (NA, RF), pp. 283–292.
SIGMODSIGMOD-2010-TranC
How to ConQueR why-not questions (QTT, CYC), pp. 15–26.
CSEETCSEET-2010-TaranC #challenge #development #distance
Improving Distance Mentoring: Challenges and How to Deal with them in Global Development Project Courses (GT, LRC), pp. 97–104.
ITiCSEITiCSE-2010-BasawapatnaR #feedback #physics #student #using
Cyberspace meets brick and mortar: an investigation into how students engage in peer to peer feedback using both cyberlearning and physical infrastructures (ARB, AR), pp. 184–188.
ITiCSEITiCSE-2010-Ezel #assessment #education #student
Assessment methods and how teachers and students view them in a computer science course at Uppsala University (MCE), p. 309.
SCAMSCAM-2010-KesterMB #concurrent #debugging #question #static analysis
How Good is Static Analysis at Finding Concurrency Bugs? (DK, MM, JSB), pp. 115–124.
ICALPICALP-v2-2010-AlistarhGGZ #cost analysis #performance
How Efficient Can Gossip Be? (On the Cost of Resilient Information Exchange) (DA, SG, RG, MZ), pp. 115–126.
FDGFDG-2010-TaylorW #education #game studies #what
This is how we play it: what a mega-LAN can teach us about games (TLT, EW), pp. 195–202.
ICGTICGT-2010-BrandtH #enterprise #graph transformation #modelling #question
How Far Can Enterprise Modeling for Banking Be Supported by Graph Transformation? (CB, FH), pp. 3–26.
CHICHI-2010-AulaKG #behaviour #question
How does search behavior change as search becomes more difficult? (AA, RMK, ZG), pp. 35–44.
CHICHI-2010-DavidoffZD #coordination #product line
How routine learners can support family coordination (SD, JZ, AKD), pp. 2461–2470.
CHICHI-2010-HolzB
The generalized perceived input point model and how to double touch accuracy by extracting fingerprints (CH, PB), pp. 581–590.
CHICHI-2010-HsiehKH #why
Why pay?: exploring how financial incentives are used for question & answer (GH, REK, SEH), pp. 305–314.
CHICHI-2010-KalnikaiteSWK #comprehension #memory management
Now let me see where i was: understanding how lifelogs mediate memory (VK, AS, SW, DSK), pp. 2045–2054.
CHICHI-2010-KoC #debugging
How power users help and hinder open bug reporting (AJK, PKC), pp. 1665–1674.
CHICHI-2010-LeeKJCKJKL
How users manipulate deformable displays as input devices (SSL, SK, BJ, EC, BK, XJ, DK, KPL), pp. 1647–1656.
CHICHI-2010-LiuLRLWL #mobile
How socio-economic structure influences rural users’ acceptance of mobile entertainment (JL, YL, PLPR, HL, XW, DL), pp. 2203–2212.
CHICHI-2010-MunsonR
Presenting diverse political opinions: how and how much (SAM, PR), pp. 1457–1466.
CHICHI-2010-OzencKZOM #design
How to support designers in getting hold of the immaterial material of software (FKO, MK, JZ, SO, BAM), pp. 2513–2522.
CHICHI-2010-TeevanDL #interactive #people #web
A longitudinal study of how highlighting web content change affects people’s web interactions (JT, STD, DJL), pp. 1353–1356.
CHICHI-2010-Weilenmann #interactive #learning #mobile
Learning to text: an interaction analytic study of how an interaction analytic study of how seniors learn to enter text on mobile phones (AW), pp. 1135–1144.
CSCWCSCW-2010-LeeKF #people #question
Receptionist or information kiosk: how do people talk with a robot? (MKL, SBK, JF), pp. 31–40.
CIKMCIKM-2010-QianCXQ
How about utilizing ordinal information from the distribution of unlabeled data (MQ, BC, HX, HQ), pp. 289–298.
ECIRECIR-2010-KapteinHK #modelling #question
How Different Are Language Models andWord Clouds? (RK, DH, JK), pp. 556–568.
ICPRICPR-2010-MakiharaHY #question
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values? (YM, MAH, YY), pp. 1208–1211.
ICPRICPR-2010-SutcuSM #question
How to Measure Biometric Information? (YS, HTS, NDM), pp. 1469–1472.
ICPRICPR-2010-XuHL10a #image #recognition #robust
Raw vs. Processed: How to Use the Raw and Processed Images for Robust Face Recognition under Varying Illumination (LX, LH, CL), pp. 2692–2695.
KDDKDD-2010-SozioG #problem
The community-search problem and how to plan a successful cocktail party (MS, AG), pp. 939–948.
SIGIRSIGIR-2010-SvoreKK #proximity #retrieval #web
How good is a span of terms?: exploiting proximity to improve web retrieval (KMS, PHK, NK), pp. 154–161.
REFSQREFSQ-2010-AmellerF #architecture #non-functional #overview #requirements
How Do Software Architects Consider Non-Functional Requirements: A Survey (DA, XF), pp. 276–277.
ASEASE-2010-HolzerTVS #testing
How did you specify your test suite (AH, CS, MT, HV), pp. 407–416.
SACSAC-2010-JiKYC #3d #interactive #using
How to manage interactive dialogues of avatar agents by using 3D spatial information of virtual world (SHJ, JWK, TY, HGC), pp. 1181–1187.
DACDAC-2010-KeshavaHP #challenge #validation
Post-silicon validation challenges: how EDA and academia can help (JK, NH, CP), pp. 3–7.
DACDAC-2010-Mathewson #evolution
The evolution of SOC interconnect and how NOC fits within it (BM), pp. 312–313.
HPCAHPCA-2010-LiuJS #clustering #comprehension #memory management #multi #performance
Understanding how off-chip memory bandwidth partitioning in Chip Multiprocessors affects system performance (FL, XJ, YS), pp. 1–12.
STOCSTOC-2010-BarakBCR #communication #interactive
How to compress interactive communication (BB, MB, XC, AR), pp. 67–76.
ICSTICST-2010-Arcuri #branch #distance #matter #testing
It Does Matter How You Normalise the Branch Distance in Search Based Software Testing (AA), pp. 205–214.
TAPTAP-2010-Ernst #feedback #proving #testing
How Tests and Proofs Impede One Another: The Need for Always-On Static and Dynamic Feedback (MDE), pp. 1–2.
TPDLECDL-2009-ChenRB #mining #online #people #visualisation #web
How People Read Books Online: Mining and Visualizing Web Logs for Use Information (RC, AR, BBB), pp. 364–369.
TPDLECDL-2009-FerroS #data type #framework
The NESTOR Framework: How to Handle Hierarchical Data Structures (NF, GS), pp. 215–226.
HTHT-2009-MirandaG #evolution #question #web
How are web characteristics evolving? (JM, DG), pp. 369–370.
ICDARICDAR-2009-AbedM #recognition
How to Improve a Handwriting Recognition System (HEA, VM), pp. 1181–1185.
JCDLJCDL-2009-BischoffFNP
How do you feel about “dancing queen”?: deriving mood & theme annotations from user tags (KB, CSF, WN, RP), pp. 285–294.
SIGMODSIGMOD-2009-DasguptaZDC #database #privacy #question #why
Privacy preservation of aggregates in hidden databases: why and how? (AD, NZ, GD, SC), pp. 153–164.
CSEETCSEET-2009-ThompsonE09a #question #student
How Can We Scale-Up Student Admissions and Graduate Completions? (JBT, HME), pp. 298–299.
EDMEDM-2009-Hardof-JaffeHABN #question #student
How do Students Organize Personal Information Spaces? (SHJ, AH, HAK, OB, RN), pp. 250–258.
EDMEDM-2009-MostowB #lessons learnt #what #why
Why, What, and How to Log? Lessons from LISTEN (JM, JB), pp. 269–278.
ITiCSEITiCSE-2009-Saeli #education #programming
How to teach programming in secondary education: first results of a PhD project (MS), p. 356.
ITiCSEITiCSE-2009-WiesnerB #concept #learning #question
How do robots foster the learning of basic concepts in informatics? (BW, TB), p. 403.
MSRMSR-2009-MaalejH #developer #question #word
From work to word: How do software developers describe their work? (WM, HJH), pp. 121–130.
WCREWCRE-1999-PentaG99a #question #source code
Who are Source Code Contributors and How do they Change? (MDP, DMG), pp. 11–20.
ICALPICALP-v2-2009-AnagnostopoulosKMU
Sort Me If You Can: How to Sort Dynamic Data (AA, RK, MM, EU), pp. 339–350.
LATALATA-2009-Blanchet-SadriABM #question #word
How Many Holes Can an Unbordered Partial Word Contain? (FBS, EA, CB, RM), pp. 176–187.
ICFPICFP-2009-VieraSS #aspect-oriented #attribute grammar #haskell #programming
Attribute grammars fly first-class: how to do aspect oriented programming in Haskell (MV, SDS, WS), pp. 245–256.
CoGCIG-2009-Pace #algorithm #game studies #search-based
How a genetic algorithm learns to play Traveler's Dilemma by choosing dominated strategies to achieve greater payoffs (MP), pp. 194–200.
DiGRADiGRA-2009-MacCallum-Stewart #game studies #online #what
'What sort of Fish was it?' How Players Understand their Narrative in Online Games (EMS).
DiGRADiGRA-2009-Molesworth #game studies #quote
“How many headshots you've done”: Achievement as discursive practice in videogame play (MM).
DiGRADiGRA-2009-Mukherjee #game studies #memory management
'Remembering How You Died': Memory, Death and Temporality in Videogames [Extended Abstract] (SM).
DiGRADiGRA-2009-Poels #case study #experience #game studies
World of Warcraft, the Aftermath How game elements transfer into real life perceptions and experiences [Abstract] (KP).
DiGRADiGRA-2009-Schott #idea #quote
“I Like the Idea of Killing But Not the Idea of Cruelty”: How New Zealand youth negotiate the pleasures of simulated violence (GS).
CHICHI-2009-BrumbySH #adaptation #constraints
Focus on driving: how cognitive constraints shape the adaptation of strategy when dialing while driving (DPB, DDS, AH), pp. 1629–1638.
CHICHI-2009-BudiuPH #memory management
Remembrance of things tagged: how tagging effort affects tag production and human memory (RB, PP, LH), pp. 615–624.
CHICHI-2009-Frandsen-ThorlaciusHHC #overview #usability
Non-universal usability?: a survey of how usability is understood by Chinese and Danish users (OFT, KH, MH, TC), pp. 41–50.
CHICHI-2009-GaverBKBJ #design #what
Anatomy of a failure: how we knew when our design went wrong, and what we learned from it (WWG, JB, TK, AB, NJ), pp. 2213–2222.
CHICHI-2009-HerringCKB #comprehension #design #exclamation #why
Getting inspired!: understanding how and why examples are used in creative design practice (SRH, CCC, JK, BPB), pp. 87–96.
CHICHI-2009-MaC #communication #question #visual notation
How well do visual verbs work in daily communication for young and old adults? (XM, PRC), pp. 361–364.
CHICHI-2009-TorreyCM #internet #learning
Learning how: the search for craft knowledge on the internet (CT, EFC, DWM), pp. 1371–1380.
CHICHI-2009-YataniCJT #comprehension #development #diagrams #open source #why
Understanding how and why open source contributors use diagrams in the development of Ubuntu (KY, EC, CJ, KNT), pp. 995–1004.
HCIHCD-2009-PylaHPASH #case study #evaluation #experience
“How Do I Evaluate THAT?” Experiences from a Systems-Level Evaluation Effort (PSP, HRH, MAPQ, JDA, TLSJ, DH), pp. 292–301.
HCIHCD-2009-Vartiainen #collaboration #multi #question
Working in Multi-locational Office — How Do Collaborative Working Environments Support? (MV), pp. 1090–1098.
HCIHCI-NT-2009-AgarwalP #interface #usability
Building on the Usability Study: Two Explorations on How to Better Understand an Interface (AA, MP), pp. 385–394.
HCIHCI-NT-2009-RaoCJB #concurrent #exclamation #people
“You’ve Got IMs!” How People Manage Concurrent Instant Messages (SR, JC, RJ, RB), pp. 500–509.
HCIHIMI-DIE-2009-BruinLB #case study #feedback
How to Learn from Intelligent Products; The Structuring of Incoherent Field Feedback Data in Two Case Studies (RdB, YL, AB), pp. 227–232.
HCIHIMI-DIE-2009-Goode #difference #online
How Product Differentiation Affects Online Shopping (AWG), pp. 253–262.
HCIHIMI-II-2009-AndoM #interactive #mobile #motivation #question #student
How Mobile Interaction Motivates Students in a Class? (AA, KM), pp. 621–631.
HCIIDGD-2009-ChavanAKK #mobile #women
How Mobile Money Can Drive Financial Inclusion for Women at the Bottom of the Pyramid (BOP) in Indian Urban Centers (ALC, SA, AK, PK), pp. 475–484.
CAiSECAiSE-2009-Wiederhold #named #question #tutorial
Tutorial: How to Value Software in a Business, and Where Might the Value Go? (GW), pp. 9–10.
ICEISICEIS-HCI-2009-TaggB #information management #quantum #question
How Can a Quantum Improvement in Personal and Group Information Management be Realized? (RT, TB), pp. 136–141.
ICEISICEIS-ISAS-2009-GoebelTGTN
RFID in the Supply Chain: How to Obtain a Positive ROI — The Case of Gerry Weber (CG, CT, OG, RT, RN), pp. 95–102.
CIKMCIKM-2009-HeCPQMG #detection #evolution #question #topic
Detecting topic evolution in scientific literature: how can citations help? (QH, BC, JP, BQ, PM, CLG), pp. 957–966.
KEODKEOD-2009-SassiJG #approach #maintenance #ontology
How to Evolve Ontology and Maintain Its Coherence — A Corrective Operations-based Approach (NS, WJ, FG), pp. 384–387.
MLDMMLDM-2009-Hoppner #question
How Much True Structure Has Been Discovered? (FH), pp. 385–397.
RecSysRecSys-2009-NanopoulosRI #collaboration #question
How does high dimensionality affect collaborative filtering? (AN, MR, MI), pp. 293–296.
OOPSLAOOPSLA-2009-InoueN #hardware #java #monitoring #performance #virtual machine
How a Java VM can get more from a hardware performance monitor (HI, TN), pp. 137–154.
AdaSIGAda-2009-MurtaghH #ada #object-oriented
How Ada object orientation works (JLM, DH), pp. 5–6.
RERE-2009-GotelM #requirements
How to Select a Requirements Management Tool: Initial Steps (OG, PM), pp. 365–367.
RERE-2009-WieringaHR #evaluation
How to Write and Read a Scientific Evaluation Paper (RW, HH, BR), pp. 361–364.
ICSEICSE-2009-MenziesWBH #probability #process #using
How to avoid drastic software process change (using stochastic stability) (TM, SW, BWB, JH), pp. 540–550.
ICSEICSE-2009-Murphy-HillPB
How we refactor, and how we know it (ERMH, CP, APB), pp. 287–297.
ICSEICSE-2009-TreudeS #aspect-oriented #development #social
How tagging helps bridge the gap between social and technical aspects in software development (CT, MADS), pp. 12–22.
SACSAC-2009-EckartzDWH #enterprise #question
Cross-organizational ERP management: how to create a successful business case? (SE, MD, RW, JvH), pp. 1599–1604.
CCCC-2009-BieniusaT #continuation #monad
How to CPS Transform a Monad (AB, PT), pp. 266–280.
DACDAC-2009-George
How to make computers that work like the brain (DG), pp. 420–423.
DACDAC-2009-YingKKGGOTW #question
Guess, solder, measure, repeat: how do I get my mixed-signal chip right? (GY, AK, KSK, GGEG, EG, MO, ST, WW), pp. 520–521.
DATEDATE-2009-Dubrova
How to speed-up your NLFSR-based stream cipher (ED), pp. 878–881.
DATEDATE-2009-SchlichtmannSKPGDEH #design #statistics
Digital design at a crossroads How to make statistical design methodologies industrially relevant (US, MS, HK, MP, VG, MD, UE, JH), pp. 1542–1547.
PPoPPPPoPP-2009-Dennis #manycore #programmable
How to build programmable multi-core chips (JBD), pp. 283–284.
PPoPPPPoPP-2009-KulkarniBIPC #parallel #question
How much parallelism is there in irregular applications? (MK, MB, RI, KP, CC), pp. 3–14.
PPoPPPPoPP-2009-KulkarniUCAV #transaction
Turbocharging boosted transactions or: how i learnt to stop worrying and love longer transactions (CEK, OSÜ, AC, EA, MV), pp. 307–308.
STOCSTOC-2009-MontenegroT #question
How long does it take to catch a wild kangaroo? (RM, PT), pp. 553–560.
ECSAECSA-2008-MendezA #architecture #comparison
How Do Agents Affect Modifiability? A Comparison between Two Architectures for Intelligent Virtual Environments for Training (GM, AdA), pp. 82–97.
JCDLJCDL-2008-CunninghamN #people
How people find videos (SJC, DMN), pp. 201–210.
SIGMODSIGMOD-2008-AbadiMH #question
Column-stores vs. row-stores: how different are they really? (DJA, SM, NH), pp. 967–980.
VLDBVLDB-2008-DittrichBS #question
Dwarfs in the rearview mirror: how big are they really? (JD, LB, MAVS), pp. 1586–1597.
CSEETCSEET-2008-DeKoenigsberg #open source #student #why
How Successful Open Source Projects Work, and How and Why to Introduce Students to the Open Source World (GD), pp. 274–276.
CSEETCSEET-2008-Epstein #agile #process #student
Getting Students to Think About How Agile Processes can be Made More Secure (RGE), pp. 51–58.
CSEETCSEET-2008-Mead #education #re-engineering
Software Engineering Education: How Far We’ve Come and How Far We Have to Go (NRM), pp. 18–22.
CSEETCSEET-2008-RootRT08a
Proposal Based Studio Projects: How to Avoid Producing “Cookie Cutter” Software Engineers (DR, MRL, GT), pp. 145–151.
ITiCSEITiCSE-2008-Diaz-AgudoJR #approach #education #semantics #web
How to teach semantic web?: a project-based approach (BDA, GJD, JARG), pp. 98–102.
ITiCSEITiCSE-2008-KiesmullerB #algorithm #analysis #problem
How do 7th graders solve algorithmic problems?: a tool-based analysis (UK, TB), p. 353.
ITiCSEITiCSE-2008-NorrisBFRR #developer #named
ClockIt: collecting quantitative data on how beginning software developers really work (CN, EFB, JBFJ, KR, JR), pp. 37–41.
CSMRCSMR-2008-DozsaGM #lisp
How Lisp Systems Look Different (AD, TG, RM), pp. 223–232.
ICPCICPC-2008-FonsecaCHP #behaviour #web
How to Interconnect Operational and Behavioral Views of Web Applications (RFCdF, DCdC, PRH, MJVP), pp. 263–267.
MSRMSR-2008-Bernstein #data mining #mining
How to learn enough data mining to be dangerous in 60 minutes (AB), pp. 77–78.
AFLAFL-2008-Leupold #matter
How to Pop a Deep PDA Matters (PL), pp. 281–291.
ICALPICALP-A-2008-AvinKL #evolution #graph #random
How to Explore a Fast-Changing World (Cover Time of a Simple Random Walk on Evolving Graphs) (CA, MK, ZL), pp. 121–132.
ICALPICALP-C-2008-CanettiEGL
How to Protect Yourself without Perfect Shredding (RC, DE, SG, DYL), pp. 511–523.
ICALPICALP-C-2008-GilbertRS #problem
How to Encrypt with the LPN Problem (HG, MJBR, YS), pp. 679–690.
LATALATA-2008-MoczuradM #question #set
How Many Figure Sets Are Codes? (MM, WM), pp. 385–396.
CHICHI-2008-JonssonHN #information management
How accurate must an in-car information system be?: consequences of accurate and inaccurate information in cars (IMJ, HH, CN), pp. 1665–1674.
CSCWCSCW-2008-PriedhorskyT #what #why
The computational geowiki: what, why, and how (RP, LGT), pp. 267–276.
CAiSECAiSE-2008-MuehlenR #modelling #process #using
How Much Language Is Enough? Theoretical and Practical Use of the Business Process Modeling Notation (MzM, JR), pp. 465–479.
ICEISICEIS-J-2008-BrissonC08a #data mining #mining #process #question #semantics
How to Semantically Enhance a Data Mining Process? (LB, MC), pp. 103–116.
CIKMCIKM-2008-Croft #approach #problem
Unsolved problems in search: (and how we approach them) (WBC), p. 1001.
CIKMCIKM-2008-KinneyHZ
How evaluator domain expertise affects search result relevance judgments (KAK, SBH, JZ), pp. 591–598.
CIKMCIKM-2008-RadlinskiKJ #quality #question #retrieval
How does clickthrough data reflect retrieval quality? (FR, MK, TJ), pp. 43–52.
ICPRICPR-2008-GhoshB #evolution #pattern matching #pattern recognition #problem #recognition
How current BNs fail to represent evolvable pattern recognition problems and a proposed solution (NG, BB), pp. 1–4.
KRKR-2008-Chetcuti-SperandioL #logic #strict
How to Choose Weightings to Avoid Collisions in a Restricted Penalty Logic (NCS, SL), pp. 340–347.
KRKR-2008-HinrichsG #finite #injection #logic #what
Injecting the How into the What: Investigating a Finite Classical Logic (TLH, MRG), pp. 92–192.
KRKR-2008-SchroderP #logic #strict
How Many Toes Do I Have? Parthood and Number Restrictions in Description Logics (LS, DP), pp. 307–317.
RecSysRecSys-2008-ParkT #recommendation
The long tail of recommender systems and how to leverage it (YJP, AT), pp. 11–18.
SEKESEKE-2008-Claudio
How to make an information elephant dance (CC), p. 1.
SIGIRSIGIR-2008-LinS #automation #evaluation #simulation #towards
How do users find things with PubMed?: towards automatic utility evaluation with user simulations (JJL, MDS), pp. 19–26.
SIGIRSIGIR-2008-WhiteDT #interactive #web
How medical expertise influences web search interaction (RWW, STD, JT), pp. 791–792.
ECOOPECOOP-2008-TemperoNM #empirical #inheritance #java #source code
How Do Java Programs Use Inheritance? An Empirical Study of Inheritance in Java Software (EDT, JN, HM), pp. 667–691.
RERE-2008-Alexander #design #question #requirements #statistics
Evaluating Design Options against Requirements: How Far Can Statistics Help? (IA), pp. 259–264.
RERE-2008-KaindlCPSZ #design #interactive #question #requirements
How to Combine Requirements Engineering and Interaction Design? (HK, LLC, OP, AGS, DZ), pp. 299–301.
ASEASE-2008-RobbesL #code completion #repository
How Program History Can Improve Code Completion (RR, ML), pp. 317–326.
ICSEICSE-2008-StoreyRBMS #debugging #developer #game studies
TODO or to bug: exploring how task annotations play a role in the work practices of software developers (MADS, JR, RIB, DM, JS), pp. 251–260.
SACSAC-2008-MandlWNF #information retrieval #multi #question #robust
How robust are multilingual information retrieval systems? (TM, CWH, GMDN, NF), pp. 1132–1136.
ASPLOSASPLOS-2008-McCunePPRS #execution #recommendation
How low can you go?: recommendations for hardware-supported minimal TCB code execution (JMM, BP, AP, MKR, AS), pp. 14–25.
CCCC-2008-Schwartzbach #compilation #design
Design Choices in a Compiler Course or How to Make Undergraduates Love Formal Notation (MIS), pp. 1–15.
CCCC-2008-ZhaoRARW #debugging #performance #using
How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation (QZ, RMR, SPA, LR, WFW), pp. 147–162.
DACDAC-2008-LiBNPC #approach #implementation #power management #set
How to let instruction set processor beat ASIC for low power wireless baseband implementation: a system level approach (ML, BB, DN, LVdP, FC), pp. 345–346.
DATEDATE-2008-BougardMBKC #3d #integration #topic
HOT TOPIC — 3D Integration or How to Scale in the 21st Century (BB, PM, LB, DKS, NC), p. 1516.
STOCSTOC-2008-Haussler
Computing how we became human (DH), pp. 639–640.
ICSTICST-2008-PichlerR #question #user interface #visual notation
How to Test the Intangible Properties of Graphical User Interfaces? (JP, RR), pp. 494–497.
ICSTSAT-2008-SchederZ #question #satisfiability
How Many Conflicts Does It Need to Be Unsatisfiable? (DS, PZ), pp. 246–256.
ICDARICDAR-2007-Shapiro #image #question
How to Reduce the Size of Bank Check Image Archive? (VS), pp. 148–152.
JCDLJCDL-2007-ReckerGWHMP #case study #learning #online
A study of how online learning resource are used (MR, SG, AEW, SH, XM, BP), pp. 179–180.
JCDLJCDL-2007-StrodlBNR
How to choose a digital preservation strategy: evaluating a preservation planning procedure (SS, CB, RN, AR), pp. 29–38.
SIGMODSIGMOD-2007-HollowayRSD #database
How to barter bits for chronons: compression and bandwidth trade offs for database scans (ALH, VR, GS, DJD), pp. 389–400.
VLDBVLDB-2007-IvesDR #adaptation #query #question #what #why
Adaptive query processing: Why, How, When, and What Next? (ZGI, AD, VR), pp. 1426–1427.
CSEETCSEET-2007-GrothH #case study #student
How Students Perceive Risk: A Study of Senior Capstone Project Teams (DPG, MPH), pp. 45–54.
ITiCSEITiCSE-2007-LeidlR #learning #question
How will future learning work in the third dimension? (ML, GR), p. 329.
ITiCSEITiCSE-2007-PauHW #experience #question #self #women
Women in computing: how does experience influence self-perception of computing careers? (RP, WH, SW), p. 349.
ITiCSEITiCSE-2007-SloanNS #design #education #question
How should inclusivity influence teaching of ict design? (DS, BN, MS), pp. 307–308.
SIGITESIGITE-2007-RutherfoordR #design #learning
Universal instructional design for learning how to apply in a virtual world (RHR, JKR), pp. 141–146.
CSMRCSMR-2007-AversanoCP #empirical
How Clones are Maintained: An Empirical Study (LA, LC, MDP), pp. 81–90.
CSMRCSMR-2007-GreevyGD #developer
How Developers Develop Features (OG, TG, SD), pp. 265–274.
CSMRCSMR-2007-SavgaRSLW #api #question
API Changes — How Far Would You Go? (IS, MR, , JL, HW), pp. 329–330.
ICSMEICSM-2007-StoreyCSMMR #navigation
How Programmers Can Turn Comments into Waypoints for Code Navigation (MADS, LTC, JS, MJM, DM, JR), pp. 265–274.
ICSMEICSM-2007-SuttonM #c #preprocessor
How We Manage Portability and Configuration with the C Preprocessor (AS, JIM), pp. 275–284.
MSRMSR-2007-WeissgerberPB #data mining #detection #developer #mining #visual notation
Visual Data Mining in Software Archives to Detect How Developers Work Together (PW, MP, MB), p. 9.
MSRMSR-2007-WeissPZZ #debugging #question
How Long Will It Take to Fix This Bug? (CW, RP, TZ, AZ), p. 1.
SEFMSEFM-2007-SampathRSR #case study #generative #using
How to Test Program Generators? A Case Study using flex (PS, ACR, KCS, SR), pp. 80–92.
ICFPICFP-2007-Herman #functional
Functional pearl: the great escape or, how to jump the border without getting caught (DH), pp. 157–164.
DiGRADiGRA-2007-Dymek #game studies #industrial #video
Exporting Wars: Literature Theory and How It Explains the Video Game Industry (MD).
DiGRADiGRA-2007-MacCallum-Stewart07a
From Catch the Flag to Shock and Awe: how World of Warcraft Negotiates Battle (EMS).
CHICHI-2007-BoehnerVSD #human-computer
How HCI interprets the probes (KB, JV, PS, PD), pp. 1077–1086.
CHICHI-2007-CherubiniVDK #developer #why
Let’s go to the whiteboard: how and why software developers use drawings (MC, GV, RD, AJK), pp. 557–566.
CHICHI-2007-TseSGF #multimodal
How pairs interact over a multimodal digital table (ET, CS, SG, CF), pp. 215–218.
CHICHI-2007-TullioDCF #case study
How it works: a field study of non-technical users interacting with an intelligent system (JT, AKD, JC, JF), pp. 31–40.
CHICHI-2007-ZiefleSSM
How younger and older adults master the usage of hyperlinks in small screen devices (MZ, US, JS, TM), pp. 307–316.
HCIHCI-AS-2007-Moallem #enterprise
Excellence in Ease of Use with Rich Functionality How Enterprise Software Applications with Rich Functionality Can Be Built to Excel in Ease of Use (AM), pp. 672–681.
HCIHCI-AS-2007-MutoI #user interface
How New Technologies Can Help Create Better UI’s for Medical Devices (WHM, EWI), pp. 499–507.
HCIHCI-IDU-2007-FerreM #approach #development
How a Human-Centered Approach Impacts Software Development (XF, NM), pp. 68–77.
HCIHCI-IDU-2007-Jounila #design #user interface
How to Make Tailored User Interface Guideline for Software Designers (IJ), pp. 527–535.
HCIHCI-IDU-2007-NingT #functional #order #usability
How to Use Emotional Usability to Make the Product Serves a Need Beyond the Traditional Functional Objective to Satisfy the Emotion Needs of the User in Order to Improve the Product Differentiator — Focus on Home Appliance Product (LN, ST), pp. 587–593.
HCIHCI-MIE-2007-BaranDC #approach #eye tracking #problem
How Do Adults Solve Digital Tangram Problems? Analyzing Cognitive Strategies Through Eye Tracking Approach (BB, BD, ), pp. 555–563.
HCIHCI-MIE-2007-Goncalves #multi
How Panoramic Photography Changed Multimedia Presentations in Tourism (NG), pp. 862–871.
HCIHCI-MIE-2007-RoibasS #comprehension #interactive #mobile
Beyond Mobile TV: Understanding How Mobile Interactive Systems Enable Users to Become Digital Producers (ACR, RS), pp. 801–810.
HCIHIMI-IIE-2007-AkessonE #question #ubiquitous
The Vision of Ubiquitous Media Services: How Close Are We? (, CIE), pp. 222–232.
HCIHIMI-IIE-2007-Quraishy #case study #design #health #implementation #information management
How Participation at Different Hierarchical Levels Can Have an Impact on the Design and Implementation of Health Information Systems at the Grass Root Level — A Case Study from India (ZBQ), pp. 128–136.
HCIHIMI-IIE-2007-VuCGCSNPP #policy #privacy
How Users Read and Comprehend Privacy Policies (KPLV, VC, FPG, BC, JS, DN, RP, RWP), pp. 802–811.
HCIHIMI-MTT-2007-OehlSZ #interface #performance
Considerations on Efficient Touch Interfaces — How Display Size Influences the Performance in an Applied Pointing Task (MO, CS, MZ), pp. 136–143.
HCIOCSC-2007-ChoY #programming
How to See the Beauty That Is Not There : The Aesthetic Element of Programming in the Computer- Based Media Art (HC, JY), pp. 292–300.
ECIRECIR-2007-CrivellariNF #information retrieval
How to Compare Bilingual to Monolingual Cross-Language Information Retrieval (FC, GMDN, NF), pp. 533–540.
SIGIRSIGIR-2007-Al-Maskari #effectiveness #information retrieval #interactive #metric #question
Beyond classical measures: how to evaluate the effectiveness of interactive information retrieval system? (AAM), p. 915.
SIGIRSIGIR-2007-HuffmanH #predict #question
How well does result relevance predict session satisfaction? (SBH, MH), pp. 567–574.
SIGIRSIGIR-2007-NajorkZT #question #web
Hits on the web: how does it compare? (MN, HZ, MJT), pp. 471–478.
RERE-2007-ArandaEW #requirements
Requirements in the wild: How small companies do it (JA, SME, GW), pp. 39–48.
RERE-2007-JantunenSG #case study #process #requirements
How Internationalization of a Product Changes Requirements Engineering Activities: An Exploratory Study (SJ, KS, DCG), pp. 163–172.
RERE-2007-KamataT #quality #question #requirements
How Does Requirements Quality Relate to Project Success or Failure? (MIK, TT), pp. 69–78.
REFSQREFSQ-2007-RinkeW #modelling #requirements
Defining Reference Models for Modelling Qualities: How Requirements Engineering Techniques Can Help (TR, TW), pp. 335–340.
GTTSEGTTSE-2007-ChellappaFP #performance
How to Write Fast Numerical Code: A Small Introduction (SC, FF, MP), pp. 196–259.
SACSAC-2007-Al-Fedaghi #question
How sensitive is your personal information? (SSAF), pp. 165–169.
SACSAC-2007-KoschmiderO #detection #process #question #semantics
How to detect semantic business process model variants? (AK, AO), pp. 1263–1264.
DACDAC-2007-ZhouTLW #logic
How Much Can Logic Perturbation Help from Netlist to Final Routing for FPGAs (CLZ, WCT, WHL, YLW), pp. 922–927.
STOCSTOC-2007-Kenyon-MathieuS #fault #rank
How to rank with few errors (CKM, WS), pp. 95–103.
SIGMODSIGMOD-2006-DeshpandeHR #adaptation #query #what #why
Adaptive query processing: why, how, when, what next (AD, JMH, VR), pp. 806–807.
VLDBVLDB-2006-RamanS #query
How to Wring a Table Dry: Entropy Compression of Relations and Querying of Compressed Relations (VR, GS), pp. 858–869.
ITiCSEITiCSE-2006-Gal-EzerT #algebra #question #regular expression
Algebraic characterization of regular languages: how to cope with all these equivalences? (JGE, MBT), p. 325.
CSMRCSMR-2006-SeebergerKGD #developer #named #visualisation
Chronia: Visualizing How Developers Change Software Systems (MS, AK, TG, SD), pp. 345–348.
ICPCICPC-2006-BalintMG #developer
How Developers Copy (MB, RM, TG), pp. 56–68.
ICPCICPC-2006-ZaidmanBD #comprehension #metric #mining
How Webmining and Coupling Metrics Improve Early Program Comprehension (AZ, BDB, SD), pp. 74–78.
ICSMEICSM-2006-XingS #case study #eclipse #refactoring
Refactoring Practice: How it is and How it Should be Supported — An Eclipse Case Study (ZX, ES), pp. 458–468.
MSRMSR-2006-KimW #debugging #question
How long did it take to fix bugs? (SK, EJWJ), pp. 173–174.
WCREWCRE-2006-CapiluppiMB #outsourcing #quality
How Outsourcing Affects the Quality of Mission Critical Software (AC, JM, CB), pp. 285–287.
WCREWCRE-2006-RatiuD #source code
How Programs Represent Reality (and how they don’t) (DR, FD), pp. 83–92.
ICALPICALP-v1-2006-Fujito #algorithm #approximate
How to Trim an MST: A 2-Approximation Algorithm for Minimum Cost Tree Cover (TF), pp. 431–442.
CHICHI-2006-Dawe #product line
Desperately seeking simplicity: how young adults with cognitive disabilities and their families adopt assistive technologies (MD), pp. 1143–1152.
CHICHI-2006-PearsonHBPN #adaptation #behaviour #human-computer #word
Adaptive language behavior in HCI: how expectations and beliefs about a system affect users’ word choice (JP, JH, HPB, MJP, CN), pp. 1177–1180.
CHICHI-2006-RoblesSRN
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed (ER, AS, KR, CN), pp. 831–839.
CHICHI-2006-SiekCR #learning #people
Pride and prejudice: learning how chronically ill people think about food (KAS, KHC, YR), pp. 947–950.
SOFTVISSOFTVIS-2006-VoineaT06a #question
How do changes in buggy Mozilla files propagate? (LV, ACT), pp. 147–148.
ICEISICEIS-DISI-2006-Jain #question #recognition
Biometric Recognition: How Do I Know Who You Are? (AKJ), pp. 17–18.
CIKMCIKM-2006-Flake #internet
How I learned to stop worrying and love the imminent internet singularity (GWF), p. 2.
CIKMCIKM-2006-ZhouJZG #evolution #interactive #research #social #topic
Topic evolution and social interactions: how authors effect research (DZ, XJ, HZ, CLG), pp. 248–257.
ICMLICML-2006-ReyzinS #classification #complexity
How boosting the margin can also boost classifier complexity (LR, RES), pp. 753–760.
ICPRICPR-v1-2006-TrujilloO #detection #evolution #using
Using Evolution to Learn How to Perform Interest Point Detection (LT, GO), pp. 211–214.
KRKR-2006-BoothMW
A Bad Day Surfing Is Better than a Good Day Working: How to Revise a Total Preorder (RB, TAM, KSW), pp. 230–238.
SEKESEKE-2006-ChiYL #question #web
Web Object Cacheability How Much Do We Know? (CHC, JLY, LL), pp. 252–255.
AdaEuropeAdaEurope-2006-SharifiS #transaction
Replication-Aware Transactions: How to Roll a Transaction over Failures (MS, HS), pp. 203–214.
LOPSTRLOPSTR-2006-Marchiori #semantics #web
How to Talk to a Human: The Semantic Web and the Clash of the Titans (MM), pp. 1–14.
RERE-2006-Cleland-Huang #delivery #question #requirements #traceability
Requirements Traceability — When and How does it Deliver more than it Costs? (JCH), p. 323.
FSEFSE-2006-HackettA #alias #question
How is aliasing used in systems software? (BH, AA), pp. 69–80.
ICSEICSE-2006-JuristoF #development #process #usability
How to integrate usability into the software development process (NJJ, XF), pp. 1079–1080.
ICSEICSE-2006-MikulovicH #communication #development #distributed #quote #requirements #what
“How do I know what I have to do?”: the role of the inquiry culture in requirements communication for distributed software development projects (VM, MH), pp. 921–925.
SACSAC-2006-Nakajima #interactive #question #reuse #ubiquitous
How to reuse exisiting interactive applications in ubiquitous computing environments? (TN), pp. 1127–1133.
DACDAC-2006-HartungKHPJY #question
How will the fabless model survive? (TH, JK, AH, BP, FJ, NY), pp. 1–2.
DATEDATE-DF-2006-RichterE #challenge #integration #network
How OEMs and suppliers can face the network integration challenges (KR, RE), pp. 183–188.
HPDCHPDC-2006-ChouhanDCV #question
How should you structure your hierarchical scheduler? (PKC, HD, EC, FV), pp. 339–340.
HPDCHPDC-2006-ZhengYS #algorithm #grid #novel #probability #scheduling
How to avoid herd: a novel stochastic algorithm in grid scheduling (QZ, HY, YS), pp. 267–278.
WICSAWICSA-2005-Klein #architecture #question
How Does the Architect’s Role Change as the Software Ages? (JK), p. 141.
CSEETCSEET-2005-NavarroH05a #design #prototype #scalability #student
Scaling up: How Thirty-two Students Collaborated and Succeeded in Developing a Prototype Software Design Environment (EON, AvdH), pp. 155–162.
ITiCSEITiCSE-2005-SternMH #student
You can lead a horse to water: how students really use pedagogical software (LS, SM, RH), pp. 246–250.
ITiCSEITiCSE-2005-WeirVMN #education #java
Difficulties teaching Java in CS1 and how we aim to solve them (GRSW, TV, AJM, MN), pp. 344–345.
MSRMSR-2005-HayesDS #feedback #mining #re-engineering
Text mining for software engineering: how analyst feedback impacts final results (JHH, AD, SKS), pp. 56–60.
ICALPICALP-2005-BorodinCM #algorithm #question
How Well Can Primal-Dual and Local-Ratio Algorithms Perform? (AB, DC, AM), pp. 943–955.
RTARTA-2005-Comon-LundhD #algebra #finite
The Finite Variant Property: How to Get Rid of Some Algebraic Properties (HCL, SD), pp. 294–307.
CoGCIG-2005-DevigneMR
Team of cognitive agents with a leader: how to let them acquire autonomy (DD, PM, JCR).
CoGCIG-2005-YoshimotoSI #game studies #online #peer-to-peer
How to Protect Peer-to-Peer Online Games from Cheats (HY, RS, HI).
DiGRADiGRA-2005-Becker #education #game studies #learning
How Are Games Educational? Learning Theories Embodied in Games (KB).
DiGRADiGRA-2005-BekebredeMHCV #game studies #lessons learnt
How Serious are serious games? Some lessons from Infra-games (GB, IM, SPAvH, RTHC, AV).
DiGRADiGRA-2005-Consalvo #game studies
Gaining Advantage: How Videogame Players Define and Negotiate Cheating (MC).
DiGRADiGRA-2005-KonzackL #game studies #multi
From Mass Audience to Massive Multiplayer: How Multiplayer Games Create New Media Politics (LK, TL).
DiGRADiGRA-2005-Schut #game studies #people
Mechanized Humanity: how Digital Games Tend to Present People (KS).
CHICHI-2005-CosleyFKTR #community
How oversight improves member-maintained communities (DC, DF, SBK, LGT, JR), pp. 11–20.
CHICHI-2005-GarfinkelMSNM #email
How to make secure email easier to use (SLG, DM, JIS, EN, RCM), pp. 701–710.
SIGIRSIGIR-2005-EfthimiadisH #student
Search engines and how students think they work (ENE, DGH), pp. 595–596.
ICSEICSE-2005-Ayton
Extending the discipline: how software can help or hinder human decision making (and vice-versa) (PA), p. 36.
ICSEICSE-2005-Tamai #education #modelling
How to teach software modeling (TT), pp. 609–610.
SACSAC-2005-BicakciCT #certification #metric #trust
How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
DACDAC-2005-AminMKDCHI #analysis #question #statistics
Statistical static timing analysis: how simple can we get? (CSA, NM, KK, FD, UC, NH, YII), pp. 652–657.
DACDAC-2005-ChowdharyRVCTPH #question
How accurately can we model timing in a placement engine? (AC, KR, SV, TC, VT, YP, BH), pp. 801–806.
DACDAC-2005-MokhoffZRNPK
How to determine the necessity for emerging solutions (NM, YZ, KNR, HN, FP, KSK), pp. 274–275.
STOCSTOC-2005-Scheideler #exclamation
How to spread adversarial nodes?: rotate! (CS), pp. 704–713.
HTHT-2004-HarperYGS #evaluation #hypermedia
How much is too much in a hypertext link?: investigating context and preview — a formative evaluation (SH, YY, CAG, RS), pp. 116–125.
JCDLJCDL-2004-BorgmanLGMCFS #design #library
How geography professors select materials for classroom lectures: implications for the design of digital libraries (CLB, GHL, AJGS, KAM, LC, JRF, LJS), pp. 179–185.
JCDLJCDL-2004-CunninghamBM #analysis #image #people #query #visual notation
How people describe their image information needs: a grounded theory analysis of visual arts queries (SJC, DB, MM), pp. 47–48.
SIGMODSIGMOD-2004-GuoLRG #consistency #sql
Relaxed Currency and Consistency: How to Say “Good Enough” in SQL (HG, PÅL, RR, JG), pp. 815–826.
ITiCSEITiCSE-2004-Armoni #education #question
Reductive thinking: how to teach it? (MA), p. 280.
ITiCSEITiCSE-WGR-2004-Bruce #education
Controversy on how to teach CS 1: a discussion on the SIGCSE-members mailing list (KBB), pp. 29–34.
SIGITESIGITE-2004-FulbrightR #outsourcing
How information technology professionals keep from being outsourced or offshored (RF, RLR), pp. 188–193.
SIGITESIGITE-2004-McMahon #c# #case study #dot-net #education #framework #learning #what
How can you teach what you don’t know?: a case study of learning and teaching microsoft .NET framework and C# (REM), p. 269.
SEFMSEFM-2004-EvansTLF #information management #verification
How to Verify Dynamic Properties of Information Systems (NE, HT, RL, MF), pp. 416–425.
CSCWCSCW-2004-TseHSG #clustering #dependence #people
Avoiding interference: how people use spatial separation and partitioning in SDG workspaces (ET, JH, SDS, SG), pp. 252–261.
CAiSECAiSE-2004-Matulevicius #case study #quality #requirements #specification #tool support
How Requirements Specification Quality Depends on Tools: A Case Study (RM), pp. 353–367.
ICEISICEIS-v3-2004-CavareroE #behaviour #information management #metric
Metrics for Dynamics: How to Improve the Behaviour of an Object Information System (JLC, MJEC), pp. 344–349.
ICEISICEIS-v3-2004-RukanovaSS #communication #metamodelling #towards
Towards a Meta Model for Describing Communication: How to Address Interoperability on a Pragmatic Level (BR, KvS, RAS), pp. 375–382.
ICEISICEIS-v4-2004-KanzowDA #deployment #multi #workflow
Flow-Oriented Deployment of a Multi-Agent Population for Dynamic Workflow Enactment: A Different View on How to Use Agents for Workflow Management (SK, KD, YA), pp. 510–514.
ICEISICEIS-v4-2004-QuadrosHBS
Strategies for the Digital Entrepreunership: How to Survive in the Actual Dotcom Reallity (FZQ, HCH, AB, FPdS), pp. 527–530.
ICEISICEIS-v4-2004-StockheimNSS #approach #enterprise #multi
How to Build a Multi-Multi-Agent System: The Agent.Enterprise Approach (TS, JN, TS, MS), pp. 364–371.
ICPRICPR-v3-2004-KimJLK #novel #visual notation
How Human Visual Systems Recognize Objects — A Novel Computational Model (SK, GjJ, WHL, ISK), pp. 61–64.
KRKR-2004-Eschenbach #concept
How to Interweave Knowledge about Object Structure and Concepts (CE), pp. 300–310.
LSOLSO-2004-FalboRBT #learning #risk management #using
Learning How to Manage Risks Using Organizational Knowledge (RdAF, FBR, GB, DFT), pp. 7–18.
LSOLSO-2004-RodriguezVMPF #maintenance #process
How to Manage Knowledge in the Software Maintenance Process (OMR, AV, AIMG, MP, JF), pp. 78–87.
SPLCSPLC-2004-Geppert #development #product line #question #testing
How Can Testing Keep Pace with Accelerated Development in Software Product Line Engineering? (CWK, BG), pp. 308–309.
TOOLSTOOLS-USA-2003-ArnoutB04 #eiffel
How to get a Singleton in Eiffel (KA, EB), pp. 75–95.
RERE-2004-Cross #design
How Creative Design Happens (NC), p. 2.
SACSAC-J-2003-Weyuker04 #testing
How to judge testing progress (EJW), pp. 323–328.
FSEFSE-2004-SouzaRCMP #api #collaboration #development #multi
How a good software practice thwarts collaboration: the multiple roles of APIs in software development (CRBdS, DFR, LTC, DRM, JFP), pp. 221–230.
DATEDATE-v1-2004-CatthoorCMGLMSW #design #problem #question #scalability
How Can System-Level Design Solve the Interconnect Technology Scaling Problem? (FC, AC, GM, PG, RL, KM, PvdS, RW), pp. 332–339.
TACASTACAS-2004-GurfinkelC #question
How Vacuous Is Vacuous? (AG, MC), pp. 451–466.
JCDLJCDL-2003-ChuWLB
How to Turn the Page (YCC, IHW, RL, DB), p. 186–?.
JCDLJCDL-2003-WildemuthMYGWHG #performance #video
How Fast Is Too Fast? Evaluating Fast Forward Surrogates for Digital Video (BMW, GM, MY, GG, TW, AH, RG), pp. 221–230.
PODSPODS-2003-KiferGBW
How to quickly find a witness (DK, JG, CB, WMW), pp. 272–283.
VLDBVLDB-2003-KerstenWFKBC #database
A Database Striptease or How to Manage Your Personal Databases (MLK, GW, MJF, DAK, APB, SC), pp. 1043–1044.
CSEETCSEET-2003-X03b #education
Teaching how to engineer software, pp. 30–31.
ITiCSEITiCSE-2003-Trakhtenbrot #analysis #concept
Analysis of typical misconceptions in a theoretical CS course, and how to address them in e-learning (MBT), p. 241.
CSMRCSMR-2003-Briand #documentation #question
Software Documentation: How Much Is Enough? (LCB), p. 13–?.
IWPCIWPC-2003-Klint #compilation #comprehension #perspective
How Understanding and Restructuring Differ from Compiling — A Rewriting Perspective (PK), pp. 2–12.
ICALPICALP-2003-GarganoH #graph
There Are Spanning Spiders in Dense Graphs (and We Know How to Find Them) (LG, MH), pp. 802–816.
DiGRADiGRA-2003-Weise #game studies
How Videogames Express Ideas (MW).
CHICHI-2003-CosleyLAKR #interface #recommendation
Is seeing believing?: how recommender system interfaces affect users’ opinions (DC, SKL, IA, JAK, JR), pp. 585–592.
CHICHI-2003-RoddenW #people #question
How do people manage their digital photographs? (KR, KRW), pp. 409–416.
CHICHI-2003-ShechtmanH #difference #people
Media inequality in conversation: how people behave differently when interacting with computers and people (NS, LMH), pp. 281–288.
EDOCEDOC-2003-FuentesPV #component #design
How MDA Can Help Designing Component- and Aspect-based Applications (LF, MP, AV), pp. 124–135.
ICEISICEIS-v3-2003-TyrvainenP #analysis #communication #metric
How Digital Is Communication in Your Organization? a Metrics and an Analysis Method (PT, TP), pp. 156–166.
OOPSLAOOPSLA-2003-EeckhoutGB #architecture #java #source code #virtual machine
How java programs interact with virtual machines at the microarchitectural level (LE, AG, KDB), pp. 169–186.
PADLPADL-2003-Krishnamurthi
The CONTINUE Server (or, How I Administered PADL 2002 and 2003) (SK), pp. 2–16.
REFSQREFSQ-J-2002-KamstiesKR03 #empirical #requirements #specification
A controlled experiment to evaluate how styles affect the understandability of requirements specifications (EK, AvK, RHR), pp. 955–965.
RERE-2003-HickeyD #elicitation #question
Elicitation Technique Selection: How Do Experts Do It? (AMH, AMD), p. 169–?.
ICSEICSE-2003-Szyperski #component #question #what
Component Technology — What, Where, and How? (CAS), pp. 684–693.
DACDAC-2003-CraninckxD #design #question
4G terminals: how are we going to design them? (JC, SD), pp. 79–84.
DACDAC-2003-Matsuzawa #collaboration #communication #optimisation #performance
How to make efficient communication, collaboration, and optimization from system to chip (AM), pp. 417–418.
CADECADE-2003-AvenhausKSW #exclamation #induction #theorem
How to Prove Inductive Theorems? QUODLIBET! (JA, UK, TSS, CPW), pp. 328–333.
CAVCAV-2003-ClarkeGTW #abstraction #performance
Making Predicate Abstraction Efficient: How to Eliminate Redundant Predicates (EMC, OG, MT, DW), pp. 126–140.
ICSTSAT-2003-GoldbergN #question
How Good Can a Resolution Based SAT-solver Be? (EG, YN), pp. 37–52.
HTHT-2002-Laine #interactive #question
How do interactive texts reflect interactive functions? (PL), pp. 67–68.
JCDLJCDL-2002-Garcia-MolinaHLLW #metadata #question
How important is metadata? (HGM, DH, CL, EDL, SW), p. 369.
JCDLJCDL-2002-Witten #library #open source #using
How to build a digital library using open-source software (IHW), p. 416.
PODSPODS-2002-SchmidtS #multi #query
How to Evaluate Multiple Range-Sum Queries Progressively (RRS, CS), pp. 133–141.
SIGMODSIGMOD-2002-DasuJMS #database #mining #quality
Mining database structure; or, how to build a data quality browser (TD, TJ, SM, VS), pp. 240–251.
VLDBVLDB-2002-CormodeDIM #data type #using
Comparing Data Streams Using Hamming Norms (How to Zero In) (GC, MD, PI, SM), pp. 335–345.
VLDBVLDB-2002-GilbertKMS #maintenance
How to Summarize the Universe: Dynamic Maintenance of Quantiles (ACG, YK, SM, MS), pp. 454–465.
VLDBVLDB-2002-LakshmananPH #semantics
Quotient Cube: How to Summarize the Semantics of a Data Cube (LVSL, JP, JH), pp. 778–789.
PASTEPASTE-2002-ChelfEH #static analysis
How to write system-specific, static checkers in metal (BC, DRE, SH), pp. 51–60.
CHICHI-2002-SellenMS #information management #web
How knowledge workers use the web (AS, RM, KLS), pp. 227–234.
CSCWCSCW-2002-GrinterASTWH #comprehension
Revisiting the visit: : understanding how technology can shape the museum visit (REG, PMA, MHS, JDT, AW, AH), pp. 146–155.
ICEISICEIS-2002-Kadri-DahmaniO #consistency #database #maintenance #question
Updating Data in GIS: How to Maintain Database Consistency? (HKD, AO), pp. 587–593.
CIKMCIKM-2002-TrainaTFF #data access #metric
How to improve the pruning ability of dynamic metric access methods (CTJ, AJMT, RFSF, CF), pp. 219–226.
ICMLICML-2002-Seewald #performance
How to Make Stacking Better and Faster While Also Taking Care of an Unknown Weakness (AKS), pp. 554–561.
ICPRICPR-v2-2002-Schiele #classification #question
How Many Classifiers Do I Need? (BS), pp. 176–179.
ICPRICPR-v3-2002-Sakano #learning #query #search-based
Genetic Translator: How to Apply Query Learning to Practical OCR (HS), pp. 184–187.
KRKR-2002-Saint-CyrL #predict
Belief Extrapolation (or how to Reason About Observations and Unpredicted Change) (FDdSC, JL), pp. 497–508.
SEKESEKE-2002-JorgensenM #development #predict #question #why
Combination of software development effort prediction intervals: why, when and how? (MJ, KM), pp. 425–428.
SEKESEKE-2002-Lozano-TelloG #component #named #process #using
BAREMO: how to choose the appropriate software component using the analytic hierarchy process (ALT, AGP), pp. 781–788.
SIGIRSIGIR-2002-FranzM #question
How Many Bits are Needed to Store Term Frequencies? (MF, JSM), pp. 377–378.
AdaEuropeAdaEurope-2002-GonzalezSMMG #ada
How to Use GNAT to Efficiently Preprocess New Ada Sentences (FJMG, FGS, EM, JM, AG), pp. 179–192.
PADLPADL-2002-Dahl
How to Talk to Your Computer so that It Will Listen (VD), pp. 3–8.
RERE-2002-KauppinenKAL #requirements
Introducing Requirements Engineering: How to Make a Cultural Change Happen in Practice (MK, SK, TA, LL), pp. 43–51.
RERE-2002-VickersMM #question #requirements
Requirements Engineering: How Do You Know How Good You Are? (AV, AM, HM), pp. 194–198.
LDTALDTA-2002-Consel #domain-specific language #what #why
Domain-Specific Languages: What, Why, How (CC), p. 1.
DACDAC-2002-AloulSS #named #question
Satometer: how much have we searched? (FAA, BDS, KAS), pp. 737–742.
DATEDATE-2002-Bricaud #question
IP Day: How to Choose Semiconductor IP? (PB), p. 17.
DATEDATE-2002-Martin #embedded
How to Choose Semiconductor IP: Embedded Software (GM), p. 16.
DATEDATE-2002-Phillips #embedded
How to Choose Semiconductor IP? — Embedded Processor (IP), p. 14.
ICDARICDAR-2001-MaragoudakisKFK #independence #segmentation
How Conditional Independence Assumption Affects Handwritten Character Segmentation (MM, EK, NF, GKK), pp. 246–250.
FMFME-2001-LeuschelMC #csp #ltl #model checking #refinement
How to Make FDR Spin LTL Model Checking of CSP by Refinement (ML, TM, AC), pp. 99–118.
ICFPICFP-2001-Russell #haskell
Events in Haskell, and How to Implement Them (GR), pp. 157–168.
CIKMCIKM-2001-HergulaH #integration #query
How Foreign Function Integration Conquers Heterogeneous Query Processing (KH, TH), pp. 215–222.
LSOLSO-2001-Lehner
Keynote Address: How do Companies Learn? Selected Applications from the IT Sector (FL), p. 17.
MLDMMLDM-2001-LinderP #learning
How to Automate Neural Net Based Learning (RL, SJP), pp. 206–216.
TOOLSTOOLS-USA-2001-McClure #delivery #privacy #security
Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.
ICSEICSE-2001-ShepardK
How to Do Inspections When There is No Time (TS, DK), pp. 718–719.
ADLADL-2000-HoppenbrouwersP
Invading the Fortress: How to Besiege Reinforced Information Bunkers (JH, HP), pp. 27–35.
SIGMODSIGMOD-2000-SalemBCL #incremental #maintenance
How To Roll a Join: Asynchronous Incremental View Maintenance (KS, KSB, RC, BGL), pp. 129–140.
WCREWCRE-J-1997-StoreyWM00 #comprehension #question #source code #tool support
How do program understanding tools affect how programmers understand programs? (MADS, KW, HAM), pp. 183–207.
IWPCIWPC-2000-Petre #empirical #in the large #question
Empirical Studies of Programming-in-the-Large: How? (MP), p. 254.
IFMIFM-2000-Chen
How to Write a Healthiness Condition (YC), pp. 299–317.
CHICHI-2000-BreretonM #communication #design
An observational study of how objects support engineering design thinking and communication: implications for the design of tangible media (MB, BM), pp. 217–224.
CHICHI-2000-MakelaGTS #communication #image #network #social
Joking, storytelling, artsharing, expressing affection: a field trial of how children and their social network communicate with digital images in leisure time (AM, VG, MT, RS), pp. 548–555.
CSCWCSCW-2000-Bernstein #process #tool support
How can cooperative work tools support dynamic group process? bridging the specificity frontier (AB), pp. 279–288.
CSCWCSCW-2000-TeasleyCKO #question
How does radical collocation help a team succeed? (SDT, LC, MSK, JSO), pp. 339–346.
CSCWCSCW-2000-Thorngate
Got a minute? How technology affects the economy of attention (WT), p. 361.
CSCWCSCW-2000-YamauchiYSI #agile #collaboration #open source
Collaboration with Lean Media: how open-source software succeeds (YY, MY, TS, TI), pp. 329–338.
CAiSECAiSE-2000-KrumbholzM #enterprise #implementation #resource management
How Culture Might Impact on the Implementation of Enterprise Resource Planning Packages (MK, NAMM), pp. 279–293.
ICEISICEIS-2000-RodriguesRH #process
How to Make KDD Process More Accessible to Users (MdFR, CR, PRH), pp. 209–216.
ICEISICEIS-2000-Vaast #question #why
Exploring Intranets: Why and How to Study Intranets in French Firms? (EV), pp. 499–505.
ICPRICPR-v1-2000-Rodriguez-SanchezGFF
How to Define the Notion of Microcalcifications in Digitized Mammograms (RRS, JAG, JFV, XRFV), pp. 1494–1499.
UMLUML-2000-AtkinsonK #strict #why
Strict Profiles: Why and How (CA, TK), pp. 309–322.
UMLUML-2000-Padawitz #constraints #diagrams #proving #state machine #theorem proving #uml
Swinging UML: How to Make Class Diagrams and State Machines Amenable to Constraint Solving and Proving (PP), pp. 162–177.
TOOLSTOOLS-EUROPE-2000-Reenskaug #collaboration #uml #what #why
The What, Why and How of the UML Collaboration (TR), p. 476.
PADLPADL-2000-Moreno-NavarroM #compilation #prolog
How to Incorporate Negation in a Prolog Compiler (JJMN, SMH), pp. 124–140.
ICSEICSE-2000-Murphy #industrial #performance
Grow fast, grow global: how the Irish software industry evolved to this business model (BM), pp. 606–607.
SACSAC-2000-BarbeauM
How to Visit Data with OTHY (FB, JM), pp. 909–914.
DACDAC-2000-JainMMWL #analysis #canonical #complexity #composition #graph
Analysis of composition complexity and how to obtain smaller canonical graphs (JJ, KM, DM, IW, YL), pp. 681–686.
DACDAC-2000-ZorianM #design #question
System chip test: how will it impact your design? (YZ, EJM), pp. 136–141.
DATEDATE-2000-CatthoorDK #architecture #compilation #data transfer #memory management #question
How to Solve the Current Memory Access and Data Transfer Bottlenecks: At the Processor Architecture or at the Compiler Level? (FC, NDD, CEK), pp. 426–433.
OSDIOSDI-2000-MaheshwariVS #database
How to Build a Trusted Database System on Untrusted Storage (UM, RV, WS), pp. 135–150.
STOCSTOC-2000-Reed #question
How tall is a tree? (BAR), pp. 479–483.
CAVCAV-2000-BehrmannHV #matter #model checking #order
Distributing Timed Model Checking — How the Search Order Matters (GB, TH, FWV), pp. 216–231.
LICSLICS-2000-Voronkov #calculus #logic #proving
How to Optimize Proof-Search in Modal Logics: A New Way of Proving Redundancy Criteria for Sequent Calculi (AV), pp. 401–412.
ICDARICDAR-1999-BansalS #on the #recognition
On How to Describe Shapes of Devanagari Characters and Use Them for Recognition (VB, RMKS), pp. 410–413.
ICDARICDAR-1999-Phillips #image #set
How to Extend and Bootstrap an Existing Data Set with Real-life Degraded Images (ITP), pp. 689–692.
ITiCSEITiCSE-1999-KopecCA #algorithm #data type
How should data structures and algorithms be taught (DK, RC, JA), pp. 175–176.
CHICHI-1999-HornofK #modelling #people
Cognitive Modeling Demonstrates How People Use Anticipated Location Knowledge of Menu Items (AJH, DEK), pp. 410–417.
CHICHI-1999-KristoffersenL #empirical #interactive #modelling #people
An Empirical Study of How People Establish Interaction: Implications for CSCW Session Management Models (SK, FL), pp. 1–8.
HCIHCI-CCAD-1999-BoschianLDMJ #artificial reality #people #question
How can people with disabilities navigate in virtual reality with an input device they can use? (KB, AL, RCD, UM, GJ), pp. 1111–1115.
HCIHCI-CCAD-1999-NisslerMH #3d #classification #design
How to get the right outfit for my agent? Classification — and design methodology for a virtual shopping assistant in a 3D world (JN, JM, AH), pp. 162–166.
HCIHCI-EI-1999-Forbrig #modelling
How Software Engineers Deal with Task Models (PF), pp. 1322–1326.
HCIHCI-EI-1999-Kohlisch #interactive
How to determine optimal system response times in interactive computer tasks (OK), pp. 201–204.
HCIHCI-EI-1999-Solberg
IT-quality and employees ability to cope, and how age affects subjective IT-quality (LAS), pp. 173–177.
HCIHCI-EI-1999-SunCH #3d #case study
A Study on How Depth Perception Is Affected by Different Presentations of 3D Objects (HS, KWC, PAH), pp. 481–485.
ICEISICEIS-1999-Carneiro #effectiveness #question
How Decision Support Systems Influence Management Decision Effectiveness? (AC), pp. 51–58.
ECIRACIR-1999-Rodden #people #question
How Do People Organise Their Photographs? (KR).
UMLUML-1999-MillerW #classification #question
How Can Anything be Both a Classifier and a Package? (JM, RWB), pp. 584–597.
TOOLSTOOLS-PACIFIC-1999-SchmolitzkyEKM #question #type safety
How Can Covariance in Pragmatical Class Methods be Made Statically Type-Safe? (AS, ME, JLK, GM), pp. 200–209.
AdaEuropeAdaEurope-1999-MirandaGMG #ada #empirical
How to Modify the GNAT Frontend tp Experiment with Ada Extensions (FJMG, FGS, JM, AG), pp. 226–237.
RERE-1999-Easterbrook #multi #question
How Multi-Disciplinary Is RE (really)? (SME, BN), p. 33–?.
DACDAC-1999-FranzonBFMPSW #question
Parasitic Extraction Accuracy — How Much is Enough? (PDF, MB, AF, SM, RP, RCS, MW), p. 429.
DATEDATE-1999-Holzheuer #analysis #process
How to use Knowledge in an Analysis Process (HH), pp. 498–502.
TPDLECDL-1998-Houstis #question #repository #scalability #towards #what
Federated Scientific Data Repositories for the Environment Towards Global Scalable Management of Environmental Information: How Useful Will They Be? What Is Their Potential Impact? Shall We Save the Environment? (CEH), pp. 741–742.
SIGMODSIGMOD-1998-ChaudhuriMN #question #random
Random Sampling for Histogram Construction: How much is enough? (SC, RM, VRN), pp. 436–447.
VLDBVLDB-1998-BlottKS #communication #question #what
Information, Communication, and Money: For What Can We Charge and How Can We Meter It? (SB, HFK, AS), p. 697.
FMFM-1998-GoerigkH #compilation #correctness #implementation
Rigorous Compiler Implementation Correctness: How to Prove the Real Thing Correct (WG, UH), pp. 122–136.
CHICHI-1998-AaltonenHR #question
101 Spots, or How Do Users Read Menus? (AA, AH, KJR), pp. 132–139.
ICPRICPR-1998-SchechnerK #question
Depth from defocus vs. stereo: how different really are they? (YYS, NK), pp. 1784–1786.
KRKR-1998-Morik #requirements
How to Tailor Representations to Different Requirements (KM), p. 650.
KRKR-1998-Thielscher
How (Not) To Minimize Events (MT), pp. 60–73.
KRKR-1998-Weydert #canonical #knowledge base #ranking
SYSTEM JZ — How to Build a Canonical Ranking Model of a Default Knowledge Base (EW), pp. 190–201.
SIGIRSIGIR-1998-Zobel #information retrieval #question #reliability #scalability
How Reliable Are the Results of Large-Scale Information Retrieval Experiments? (JZ), pp. 307–314.
OOPSLAOOPSLA-1998-AgerboC #design pattern
How to Preserve the Benefits of Design Patterns (EA, AC), pp. 134–143.
TOOLSTOOLS-USA-1998-Mellor98a #behaviour #modelling #question
Modeling Complex Behavior Simply or How Much is Too Much? (SJM), p. 444.
AdaEuropeAdaEurope-1998-EmeryMN #ada #automation #process #question
Automating the Ada Binding Process for Java- How Far Can We Go? (DEE, RFM, KAN), pp. 29–40.
AdaEuropeAdaEurope-1998-SchumacherN #ada #inheritance
How to Avoid the Inheritance Anomaly in Ada (GS, WN), pp. 53–64.
REICRE-1998-HammerH #automation #case study #experience #requirements #tool support
Automated Requirements Management — Beware HOW You Use Tools: An Experience Report (TH, LH), pp. 34–40.
ICSEICSE-1998-KoikeC #3d #empirical #re-engineering #visualisation
How Does 3D Visualization Work in Software Engineering? : Empirical Study of a 3D Version/Module Visualization System (HK, HCC), pp. 516–519.
ICSEICSE-1998-SimH #case study #problem
The Ramp-Up Problem in Software Projects: A Case Study of How Software Immigrants Naturalize (SES, RCH), pp. 361–370.
ISMMISMM-1998-AzaguryKPY #set
Combining Card Marking with Remembered Sets: How to Save Scanning Time (AA, EKK, EP, ZY), pp. 10–19.
LICSLICS-1998-Alfaro #behaviour #probability #verification
How to Specify and Verify the Long-Run Average Behavior of Probabilistic Systems (LdA), pp. 454–465.
WCREWCRE-1997-StoreyWM #comprehension #question #source code #tool support
How Do Program Understanding Tools Affect How Programmers Understand Programs? (MADS, KW, HAM), p. 12–?.
DLTDLT-1997-FernauS
How Powerful is Unconditional Transfer? — When UT meets AC (HF, FS), pp. 249–260.
CHICHI-1997-BarrettMK #personalisation #web
How to Personalize the Web (RB, PPM, DCK), pp. 75–82.
CHICHI-1997-VolbrachtDSF #3d #effectiveness #question
How Effective are 3D Display Modes? (SV, GD, KS, GF), pp. 540–541.
HCIHCI-CC-1997-Blanchard #human-computer #interactive #question #standard #what
International Standards on Human-Computer Interaction: What is Out There and How Will it be Implemented? (HEB), pp. 599–602.
HCIHCI-CC-1997-FunadaYIN #analysis #effectiveness #evaluation #human-computer #performance
How Efficient are Combined Tasks for Effective HCI?: An Objective Evaluation Through AR Analysis of EEG (MFF, YY, KI, SPN), pp. 579–582.
HCIHCI-CC-1997-Kurosu
Wind from East: When Will it Blow and How (MK), pp. 141–144.
HCIHCI-CC-1997-PaneroLN #people
The Computer Use Scale: Four Dimensions of How People Use Computer (JCP, DML, HAN), pp. 821–824.
HCIHCI-CC-1997-PeperHS #assessment
How to Use Applied Psychophysiology/Biofeedback in the Prevention and Assessment of Upper Extremity Musculoskeletal Disorders (EP, RH, DMS), pp. 551–554.
HCIHCI-SEC-1997-Hakiel #question #re-engineering #usability
Usability Engineering and Software Engineering: How Do They Relate? (SH), pp. 521–524.
CAiSECAiSE-1997-CathalaP #behaviour #why
Preserving Behaviour: Why and How (FC, PP), pp. 333–346.
EDOCEDOC-1997-Tyndale-BiscoeW
Machine responsibility — how to deal with it (STB, BW), pp. 48–56.
ECIRACIR-1997-MateevMS #dependence
Where the Linked Dependence Assumption Fails and How to Move Beyond It (BM, EM, PS).
SIGIRSIGIR-1997-Cooper #approximate
How to Read Less and Know More — Approximate OCR for Thai (DC), pp. 216–225.
PPDPPLILP-1997-Serrano #question
Inline Expansion: When and How? (MS), pp. 143–157.
RERE-1997-Miller #question #requirements #research
How Can Requirements Engineering Research Become Requirements Engineering Practice? (SM), p. 260.
ICSEICSE-1997-BasiliM #experience
The Experience Factory: How to Build and Run One (VRB, FEM), pp. 643–644.
CADECADE-1997-Egly
Some Pitfalls of LK-to-LJ Translations and How to Avoid Them (UE), pp. 116–130.
LICSLICS-1997-DziembowskiJW #game studies #infinity #memory management #question
How Much Memory is Needed to Win Infinite Games? (SD, MJ, IW), pp. 99–110.
VLDBVLDB-1996-Rengarajan #performance #sql
How System 11 SQL Server Became Fast (TKR), p. 590.
ITiCSEITiCSE-1996-Naps #algorithm #visualisation #web #why
Algorithm visualization served off the World Wide Web: why and how (TLN), pp. 66–71.
ITiCSEITiCSE-1996-ProulxRF #education #question #what
Foundations of computer science: what are they and how do we teach them? (VKP, RR, HJF), pp. 42–48.
ITiCSEITiCSE-1996-Tjaden #learning #student #visual notation
How visual software influences learning in college students (BJT), p. 229.
ICSMEICSM-1996-KellerCPZ #maintenance #question
How Much Has Software Maintenance Changed Since 1983? (TK, NC, TMP, NZ), p. 34–?.
WCREWCRE-1996-WoodsQ #algorithm #comprehension #recognition #towards
Some Experiments Toward Understanding How Program Plan Recognition Algorithms Scale (SW, AQ), pp. 21–30.
CIAAWIA-1996-Schubert #automaton #sorting
How to Use Sorting Procedures to Minimize DFA (BS), pp. 159–166.
FMFME-1996-Hoare #proving #question #reliability
How Did Software Get So Reliable Without Proof? (CARH), pp. 1–17.
CSCWCSCW-1996-Elliott #case study
Conflict and Cooperation in the Courts: Case Study of how CSCW Alters Work (doctoral colloquium) (MSE), p. 445.
CSCWCSCW-1996-Lin
How Organizational Structure and Culture shape CSCW (doctoral colloquium) (AL), p. 446.
CSCWCSCW-1996-Yankelovich #collaboration #education #internet
An Introduction to the Internet and How it can be Used for Collaboration for K-12 Teachers (NY), p. 3.
LOPSTRLOPSTR-1996-LeuschelS #logic programming
Logic Program Specialisation: How to Be More Specific (ML, DDS), p. 58.
PPDPPLILP-1996-LeuschelS #logic programming
Logic Program Specialisation: How To Be More Specific (ML, DDS), pp. 137–151.
REICRE-1996-Cheng #formal method #question #requirements
Where and How do Formal Methods Fit in Requirements Engineering? (BHCC), pp. 154–156.
ICSEICSE-1996-Hoare #proving #question #reliability
The Role of Formal Techniques: Past, Current and Future or How Did Software Get so Reliable without Proof? (CARH), pp. 233–234.
ICSEICSE-1996-Kaindl #domain model #identification #modelling
How to Identify Binary Relations for Domain Models (HK), pp. 28–36.
ICSEICSE-1996-Schneider #prototype #why
Prototypes as Assets, not Toys: Why and How to Extract Knowledge from Prototypes (KS), pp. 522–531.
SACSAC-1996-LeeHHC #case study #implementation #performance #problem #process #set
Efficient implementations of two variant subset sum problems: a case study of how to process appraisal books resulting from fire-destroyed money (PL, FYH, CYH, HTC), pp. 230–237.
CCCC-1996-Assmann #graph grammar #program analysis #program transformation #term rewriting
How to Uniformly Specify Program Analysis and Transformation with Graph Rewrite Systems (UA), pp. 121–135.
DACDAC-1996-HutchinsH #perl #tool support
How to Write Awk and Perl Scripts to Enable Your EDA Tools to Work Together (RCH, SH), pp. 409–414.
STOCSTOC-1996-AwerbuchAFL #nondeterminism
Making Commitments in the Face of Uncertainty: How to Pick a Winner Almost Every Time (BA, YA, AF, FTL), pp. 519–530.
STOCSTOC-1996-Karloff #algorithm #question
How Good is the Goemans-Williamson MAX CUT Algorithm? (HJK), pp. 427–434.
VLDBVLDB-1995-Vaskevitch #database #question #scalability
Very Large Databases: How Large, How Different? (DV), pp. 677–685.
ICALPICALP-1995-ParraS #graph
How to Use the Minimal Separators of a Graph for its Chordal Triangulation (AP, PS), pp. 123–134.
FPCAFPCA-1995-SchauserG #question #source code #strict
How Much Non-Strictness do Lenient Programs Require? (KES, SCG), pp. 216–225.
KDDKDD-1995-BuntineP
Intelligent Instruments: Discovering How to Turn Spectral Data into Information (WLB, TP), pp. 33–38.
KDDKDD-1995-MurthyS #effectiveness #heuristic #induction #question
Decision Tree Induction: How Effective is the Greedy Heuristic? (SKM, SS), pp. 222–227.
OOPSLAOOPSLA-1995-Riehle #encapsulation #why
How and Why to Encapsulate Class Trees (DR), pp. 251–264.
RERE-1995-MaidenMS #approach #people #requirements #reuse
How People Categorise Requirements for Reuse: a Natural Approach (NAMM, PM, AGS), pp. 148–157.
ICSEICSE-1995-CugolaNGM #process
How to Deal With Deviations During Process Model Enactment (GC, EDN, CG, MM), pp. 265–273.
HPCAHPCA-1995-FarkasJC #execution #multi #question
How Useful Are Non-Blocking Loads, Stream Buffers and Speculative Execution in Multiple Issue Processors? (KIF, NPJ, PC), pp. 78–89.
STOCSTOC-1995-HellersteinPRW #query #question
How many queries are needed to learn? (LH, KP, VR, DW), pp. 190–199.
TACASTACAS-1995-RoscoeGGHJS #concurrent #csp #model checking
Hierarchical Compression for Model-Checking CSP or How to Check 1020 Dining Philosophers for Deadlock (AWR, PHBG, MG, JRH, DMJ, JBS), pp. 133–152.
ICLPILPS-1995-Wadler #imperative
How to Declare an Imperative (PW), pp. 18–32.
VLDBVLDB-1994-Lesk #image #library
Experiments on Access to Digital Libraries: How can Images and Text be Used Together (ML), pp. 655–667.
CSEETCSEE-1994-McCartyP #maturity #process #question
How Mature is Your Software Process? (WBM, GTP), pp. 555–564.
CHICHI-1994-WhittakerFD94a #communication #question #what
Informal workplace communication: what is it like and how might we support it? (SW, DF, ODJ), pp. 131–137.
KRKR-1994-Gotts #using
How Far Can We “C”? Defining a “Doughnut” Using Connection Alone (NMG), pp. 246–257.
KRKR-1994-LinR #database #logic #why
How to Progress a Database (and Why) I. Logical Foundations (FL, RR), pp. 425–436.
KRKR-1994-Val #compilation #database
Tractable Databases: How to Make Propositional Unit Resolution Complete Through Compilation (AdV), pp. 551–561.
AdaEuropeAdaEurope-1994-Gray #ada #question
How Should Military Ada Software be Documented? (LG), pp. 162–169.
AdaEuropeAdaEurope-1994-Kettani #ada #realtime
How to Avoid and Control Proliferation of New Ada Real Time Extensions (NK), pp. 349–354.
PPDPALP-1994-WernerBK
How to Realize LSE Narrowing (AW, AB, SK), pp. 59–76.
PLDIPLDI-1994-Pugh #why
Counting Solutions to Presburger Formulas: How and Why (WP), pp. 121–134.
STOCSTOC-1994-SantisDFY
How to share a function securely (ADS, YD, YF, MY), pp. 522–533.
CADECADE-1994-Bundgen #on the
On Pot, Pans and Pudding or How to Discover Generalised Critical Pairs (RB), pp. 693–707.
LICSLICS-1994-HellaKL #finite #linear #modelling #order
How to Define a Linear Order on Finite Models (LH, PGK, KL), pp. 40–49.
SIGMODSIGMOD-1993-Vieille #database #deduction #object-oriented #question #why
A Deductive and Object-Oriented Database System: Why and How? (LV), p. 438.
ICSMECSM-1993-KamkarFS #interprocedural #slicing #testing
Interprocedural Dynamic Slicing Applied to Interprocedural Data How Testing (MK, PF, NS), pp. 386–395.
HCIHCI-ACS-1993-BollenS #automation #case study #process
How to Survive Process Control Automation: A Case Study of Integral User Participation (LAAB, TWvdS), pp. 121–126.
HCIHCI-ACS-1993-Soderberg #design
How the Design of the Premises Supports a New Organizational Structure as Viewed by Full-Time Operators in Large-Scaled Tele-Services (IS), pp. 839–844.
CHIINTERCHI-1993-AllenBBMMNS #design #process #question #why
User involvement in the design process: why, when & how? (CDA, DB, VB, HHMJ, MM, JN, JMS), pp. 251–254.
CHIINTERCHI-1993-NeerincxG
How to aid non-experts (MAN, PdG), pp. 165–171.
CHIINTERCHI-1993-ODayJ
Orienteering in an information landscape: how information seekers get from here to there (VLO, RJ), pp. 438–445.
CHIINTERCHI-1993-RussoB #design #interface
How fluent is your interface?: designing for international users (PR, SB), pp. 342–347.
ICMLICML-1993-RendersBS #adaptation #black box
Adaptive NeuroControl: How Black Box and Simple can it be (JMR, HB, MS), pp. 260–267.
SEKESEKE-1993-StaryF #design #semantics #specification
How Semantical Design Languages Help to Preserve Specification/Design-Consistency (CS, RF), pp. 462–471.
TOOLSTOOLS-PACIFIC-1993-MenziesS #black box #constraints #framework
How to Edit “It”; or: A “Black-box” Constraint-Based Framework for User-Interaction with Arbitrary Structures (TM, RS), pp. 213–224.
ESECESEC-1993-Denert #question #re-engineering
Software Engineering in Business and Academia: How Wide is the Gap? (ED), pp. 37–47.
PDPPDP-1993-CorradiLZ #architecture #locality #migration #parallel
How to apply locality to achieve load balancing: migration in massively parallel architecture (AC, LL, FZ), pp. 43–50.
STOCSTOC-1993-BorodinRSU #hardware #question
How much can hardware help routing? (AB, PR, BS, EU), pp. 573–582.
STOCSTOC-1993-Cesa-BianchiFHHSW
How to use expert advice (NCB, YF, DPH, DH, RES, MKW), pp. 382–391.
ICALPICALP-1992-KirschenhoferPS #analysis #probability #problem
How to Count Quickly and Accurately: A Unified Analysis of Probabilistic Counting and Other Related Problems (PK, HP, WS), pp. 211–222.
ICALPICALP-1992-Rote #metric
A New Metric Between Polygons and How to Compute it (GR), pp. 404–415.
CHICHI-1992-Brouwer-JanseBENSG #interface #question
Interfaces for consumer products: how to camouflage the computer? (MDBJ, RWB, TE, FLvN, HJS, DRG), pp. 287–290.
CSCWCSCW-1992-OlsonOSC #design
How a Group-Editor Changes the Character of a Design Meeting as well as Its Outcome (JSO, GMO, MS, MRC), pp. 91–98.
CAiSECAiSE-1992-MacGinnes #analysis #object-oriented #question
How Objective is Object-Oriented Analysis? (SM), pp. 1–16.
TOOLSTOOLS-USA-1992-Weber #correctness
Getting Class Correctness and System Correctness Equivalent (How to get covariance right) (FW), pp. 199–213.
PLDIPLDI-1992-DhamdhereRZ #scalability #source code
How to Analyze Large Programs Efficiently and Informatively (DMD, BKR, FKZ), pp. 212–223.
AdaTRI-Ada-C-1992-Gerhardt #ada
How “Outsiders” see Ada and its Future (MG), pp. 361–363.
HTHT-1991-ThuringHH #what
What’s Eliza Doing in the Chinese Room? Incoherent Hyperdocuments — and How to Avoid Them (MT, JMH, JH), pp. 161–177.
RTARTA-1991-BaaderN #algebra #commutative #equation #morphism #unification
Adding Homomorphisms to Commutative/Monoidal Theories or How Algebra Can Help in Equational Unification (FB, WN), pp. 124–135.
ICMLML-1991-WhitehallL #case study #knowledge-based #learning
A Study of How Domain Knowledge Improves Knowledge-Based Learning Systems (BLW, SCYL), pp. 559–563.
OOPSLAOOPSLA-1991-Snyder
How to Get Your Paper Accepted at OOPSLA (AS), pp. 359–363.
TOOLSTOOLS-USA-1991-Meyer #question
Do we know how to find the classes? (BM), pp. 349–350.
POPLPOPL-1991-Odersky
How to Make Destructive Updates Less Destructive (MO), pp. 25–36.
CSLCSL-1991-Dahlhaus #first-order #memory management #modelling
How to Implement First Order Formulas in Local Memory Machine Models (ED), pp. 68–78.
ISSTATAV-1991-OffuttL #question
How Strong is Weak Mutation? (AJO, SDL), pp. 200–213.
VLDBVLDB-1990-NaughtonR
How to Forget the Past Without Repeating It (JFN, RR), pp. 278–289.
CHICHI-1990-GillanHARM #question
How does Fitts’ law fit pointing and dragging? (DJG, KLH, SA, MR, LM), pp. 227–234.
CSCWCSCW-1990-MaloneC #coordination #design #question #what
What is Coordination Theory and How Can It Help Design Cooperative Work Systems? (TWM, KC), pp. 357–370.
CAiSECAiSE-1990-SmolanderTL #case study #tool support
How to Combine Tools and Methods in Practice — a Field Study (KS, VPT, KL), pp. 195–214.
PLDIPLDI-1990-Clinger #float
How to Read Floating-Point Numbers Accurately (WDC), pp. 92–101.
PLDIPLDI-1990-SteeleW #float
How to Print Floating-Point Numbers Accurately (GLSJ, JLW), pp. 112–126.
PLDIBest-of-PLDI-1990-Clinger90a #float
How to read floating point numbers accurately (with retrospective) (WDC), pp. 360–371.
PLDIBest-of-PLDI-1990-SteeleW90a #float
How to print floating-point numbers accurately (with retrospective) (GLSJ, JLW), pp. 372–389.
DACDAC-1990-Fishburn #heuristic #logic
A Depth-Decreasing Heuristic for Combinational Logic: Or How To Convert a Ripple-Carry Adder Into A Carry-Lookahead Adder Or Anything in-between (JPF), pp. 361–364.
STOCSTOC-1990-DietzfelbingerH #network #taxonomy
How to Distribute a Dictionary in a Complete Network (MD, FMadH), pp. 117–127.
ICLPCLP-1990-Harel90 #question #source code
How Hard Is It to Reason about Propositional Programs? (DH), pp. 772–773.
HTHT-1989-MarshallI #hypermedia #online
Guided Tours and On-Line Presentations: How Authors Make Existing Hypertext Intelligible for Readers (CCM, PMI), pp. 15–26.
ICALPICALP-1989-LiV #concurrent
How to Share Concurrent Asynchronous Wait-Free Variables (ML, PMBV), pp. 488–505.
RTARTA-1989-Lai #commutative #on the
On How To Move Mountains “Associatively and Commutatively” (ML), pp. 187–202.
CHICHI-1989-Hill
How some advice fails (WCH), pp. 85–90.
CHICHI-1989-MackayMCRRC #lens #question
How do experienced information lens users use rules? (WEM, TWM, KC, RR, DR, SKC), pp. 211–216.
CAiSECAiSE-1989-KinnulaM #automation #tool support
How to Test and Compare CASE tools (TK, JM).
CAiSECAiSE-1989-LagerkvistN #automation #tool support
How to Succeed with Modern Tools such as the CASE tool “Deft” on the Macintosh (CL, ÅN).
CAiSECAiSE-1989-Lustig #automation #tool support
How CASE Tools and Methods Relate to Each Other (GL).
SIGIRSIGIR-1989-Kwasnik #classification #documentation
How a Personal Document’s Intended Use or Purpose Affects its Classification in an Office (BHK), pp. 207–210.
POPLPOPL-1989-WadlerB #ad hoc #morphism #polymorphism
How to Make ad-hoc Polymorphism Less ad-hoc (PW, SB), pp. 60–76.
LICSLICS-1989-Robinson #question
How Complete is PER? (ER), pp. 106–111.
ICLPNACLP-1989-SinghalP #parallel #question #unification
Unification Parallelism: How Much Can We Exploit? (AS, YNP), pp. 1135–1147.
CSEETSEI-1988-Werth #tool support #what #why
Software Tools at the University: Why, What and How (LHW), pp. 169–186.
ICALPICALP-1988-MehlhornY #theorem
Constructive Hopf’s Theorem: Or How to Untangle Closed Planar Curves (KM, CKY), pp. 410–423.
SIGIRSIGIR-1988-Case #comprehension #retrieval #scalability #using
How Do the Experts Do It? The Use of Ethnographic Methods as an Aid to Understanding the Cognitive Processing and Retrieval of Large Bodies of Text (DOC), pp. 127–133.
SIGIRSIGIR-1988-Pevzner #database #why
Precedental Data Bases: How and Why They are Worked Out and Used (BP), pp. 117–125.
OOPSLAOOPSLA-1988-Shibayama #approach #concurrent #distributed #implementation
How To Invent Distributed Implementation Schemes of an Object-Based Concurrent Language: A Transformational Approach (ES), pp. 297–305.
DACDAC-1988-CongW
How to Obtain More Compactable Channel Routing Solutions (JC, DFW), pp. 663–666.
STOCSTOC-1988-BellareM
How to Sign Given Any Trapdoor Function (MB, SM), pp. 32–42.
STOCSTOC-1988-Ben-OrGKW #interactive #multi #proving
Multi-Prover Interactive Proofs: How to Remove Intractability Assumptions (MBO, SG, JK, AW), pp. 113–131.
STOCSTOC-1988-Broder #approximate #random
Errata to “How hard is to marry at random? (On the approximation of the permanent)” (AZB), p. 551.
RTARTA-1987-Martin
How to Choose Weights in the Knuth Bendix Ordering (UM), pp. 42–53.
HCIHCI-SES-1987-MoodyJR #question
Vigilance and Its Role in AI Technology: How Smart is Too Smart? (TM, MJ, RR), pp. 263–270.
ASPLOSASPLOS-1987-ChowCHKW #question
How Many Addressing Modes are Enough? (FCC, SC, MIH, EK, LW), pp. 117–121.
STOCSTOC-1987-GoldreichMW #game studies #protocol #theorem
How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority (OG, SM, AW), pp. 218–229.
STOCSTOC-1986-Broder #approximate #random
How hard is to marry at random? (On the approximation of the permanent) (AZB), pp. 50–58.
CADECADE-1986-MannaW #logic
How to Clear a Block: Plan Formation in Situational Logic (ZM, RJW), pp. 622–640.
CADECADE-1986-Toyama #equivalence #induction #term rewriting
How to Prove Equivalence of Term Rewriting Systems without Induction (YT), pp. 118–127.
ICLPICLP-1986-Kursawe86 #prolog
How to Invent a Prolog Machine (PK), pp. 134–148.
LICSLICS-1986-Schlipf #question
How Uncomputable is General Circumscription? (JSS), pp. 92–95.
FPCAFPCA-1985-Wadler85 #backtracking #exception #functional #lazy evaluation #pattern matching
How to Replace Failure by a List of Successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages (PW), pp. 113–128.
SIGIRSIGIR-1985-CanasSC #concept #documentation #people
A Conceptual Model aod Experiments on How People Classify and Retrieve Documents (AJC, FRS, DWC), pp. 282–287.
TAPSOFTAS-1985-ParnasC #design #process #why
A Rational Design Process: How and Why to Fake It (DLP, PCC), pp. 80–100.
DACDAC-1984-Zingale
The semi-custom revolution: How to thrive or survive (AZ), pp. 649–650.
STOCSTOC-1984-Gerth #composition #logic
Transition Logic: How to Reason About Temporal Properties in a Compositional Way (RG), pp. 39–50.
VLDBVLDB-1983-VassiliouCJ #question
How Does an Expert System Get its Data? (YV, JC, MJ), pp. 70–72.
ICALPICALP-1983-HartS #concurrent #probability
Concurrent Probabilistic Program, or: How to Schedule if You Must (SH, MS), pp. 304–318.
POPLPOPL-1983-MannaP #proving
How to Cook a Temporal Proof System for Your Pet Language (ZM, AP), pp. 141–154.
STOCSTOC-1983-Bach #integer #random
How to Generate Random Integers with Known Factorization (EB), pp. 184–188.
STOCSTOC-1983-Blum
How to Exchange (Secret) Keys (MB), pp. 440–447.
STOCSTOC-1983-LongW #question
How Discreet is the Discrete Log? (DLL, AW), pp. 413–420.
LISPLFP-1982-Moss #prolog #using
How to Define a Language Using PROLOG (CDSM), pp. 67–73.
STOCSTOC-1982-BhattL
How to Assemble Tree Machines (SNB, CEL), pp. 77–84.
STOCSTOC-1982-GoldwasserM #encryption #game studies #probability
Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information (SG, SM), pp. 365–377.
STOCSTOC-1982-RivestS #memory management #reuse
How to Reuse a “Write-Once” Memory (RLR, AS), pp. 105–113.
ICALPICALP-1980-Ainhirn #pseudo
How to Get Rid of Pseudoterminals (WA), pp. 1–11.
CADECADE-1980-Guguen #algebra #induction
How to Prove Algebraic Inductive Hypotheses Without Induction (JAG), pp. 356–373.
CADECADE-1980-Noll
A Note on Resolution: How to Get Rid of Factoring without Loosing Completeness (HN), pp. 250–263.
ICSEICSE-1978-Littlewood #reliability
How to Measure Software Reliability, and How Not To (BL), pp. 37–45.
ICSEICSE-1978-Stucki #question
How Software is Really Engineered? (LGS), p. 84.
DACDAC-1978-LekkosP #logic #pseudo #refinement #using
How to develop module logic using pseudo-code and stepwise refinement (AAL, CMP), pp. 366–370.
ICALPICALP-1977-AhoS #code generation #compilation #question
How Hard is Compiler Code Generation? (AVA, RS), pp. 1–15.
ICSEICSE-1976-Fabry #design #on the fly
How to Design a System in Which Modules Can Be Changed on the Fly (RSF), pp. 470–476.
ICSEICSE-1976-Wexelblat #design #programming
Maxims for Malfeasant Designers, or How to Design Languages to Make Programming as Difficult as Possible (RLW), pp. 331–336.
SOSPSOSP-1975-Kain #algorithm
How to Evaluate Page Replacement Algorithms (RYK), pp. 1–5.
SIGIRSIGIR-1971-DostertT #ambiguity
How Features Resolve Syntactic Ambiguity (BHD, FBT), pp. 19–32.
SOSPSOSP-1971-Rodriguez-Rosell #behaviour #parametricity
Experimental Data on How Program Behavior Affects the Choice of Scheduler Parameters (JRR), pp. 156–163.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.