BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
health (2)
test (2)
all (2)
care (2)
when (2)

Stem danger$ (all stems)

15 papers:

WICSAWICSA-2015-MartiniB #architecture #technical debt
The Danger of Architectural Technical Debt: Contagious Debt and Vicious Circles (AM, JB), pp. 1–10.
HCIDHM-2014-IshidaSK
Safe Walker-Shoes That Alert the Wearer to a Danger (MI, HS, TK), pp. 612–619.
HCIDUXU-ELAS-2014-MontAlvao #bibliography #health #using
Health Care Professionals vs Other Professionals: Do They Have Different Perceptions about Health Care Waste and Dangerous Products Pictograms? Some Findings Using a Digital Device in Field Survey (CRM), pp. 83–90.
FASEFASE-2012-StaatsGWH #generative #on the #testing
On the Danger of Coverage Directed Test Case Generation (MS, GG, MWW, MPEH), pp. 409–424.
ECOOPECOOP-2012-NegaraVCJD #evolution #question #source code #version control
Is It Dangerous to Use Version Control Histories to Study Source Code Evolution? (SN, MV, NC, REJ, DD), pp. 79–103.
HTHT-2011-Gayo-Avello
All liaisons are dangerous when all your friends are known to us (DGA), pp. 171–180.
SIGMODSIGMOD-2011-BorisovBMU
Warding off the dangers of data corruption with amulet (NB, SB, NM, SU), pp. 277–288.
CHICHI-2011-ONeillMCG
When a little knowledge isn’t a dangerous thing (JO, DBM, TC, AG), pp. 1667–1676.
ITiCSEITiCSE-2008-MurphyT #education #research #self
Dangers of a fixed mindset: implications of self-theories research for computer science education (LM, LT), pp. 271–275.
MSRMSR-2008-Bernstein #data mining #how #mining
How to learn enough data mining to be dangerous in 60 minutes (AB), pp. 77–78.
ICSTSAT-2007-HertelHU #encoding #formal method #satisfiability
Formalizing Dangerous SAT Encodings (AH, PH, AU), pp. 159–172.
SACSAC-2003-Abdellatif-KaddourTW #testing
Property-Oriented Testing: A Strategy for Exploring Dangerous Scenarios (OAK, PTF, HW), pp. 1128–1134.
AdaEuropeAdaEurope-1997-English #inheritance
Tha Dangers of Inheritance (JE), pp. 185–195.
SIGMODSIGMOD-1996-GrayHOS #replication
The Dangers of Replication and a Solution (JG, PH, PEO, DS), pp. 173–182.
HCIHCI-ACS-1993-Smith #automation
Automation of Work in Dangerous Environments (TJS), pp. 273–277.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.