BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
consid (16)
code (3)
function (2)
redund (2)
access (2)

Stem harm$ (all stems)

28 papers:

DATEDATE-2015-ZhongLLZLZS #mobile #named
nCode: limiting harmful writes to emerging mobile NVRAM through code swapping (KZ, DL, LL, XZ, WL, QZ, EHMS), pp. 1305–1310.
IFLIFL-2014-KoopmanPJ #data type #encoding #functional #harmful #implementation
Church Encoding of Data Types Considered Harmful for Implementations: Functional Pearl (PWMK, RP, JMJ), p. 4.
HCILCT-NLE-2014-PurgathoferL #architecture #harmful #layout
Layout Considered Harmful: On the Influence of Information Architecture on Dialogue (PP, NL), pp. 216–225.
ICSEICSE-2014-DouCW #ambiguity #detection #smell #spreadsheet
Is spreadsheet ambiguity harmful? detecting and repairing spreadsheet smells due to ambiguous computation (WD, SCC, JW), pp. 848–858.
ITiCSEITiCSE-2013-Buck #approach #reliability
First, do no harm: a curricular approach to reliability (DB), p. 319.
ICSEICSE-2013-KocaguneliZBNM #development #distributed #harmful #question
Distributed development considered harmful? (EK, TZ, CB, NN, TM), pp. 882–890.
ASPLOSASPLOS-2013-ParkBCLN #harmful #manycore #memory management
Regularities considered harmful: forcing randomness to memory accesses to reduce row buffer conflicts for multi-core, multi-bank systems (HP, SB, JC, DL, SHN), pp. 181–192.
CIKMCIKM-2012-GyllstromEVM #css #javascript #web
The downside of markup: examining the harmful effects of CSS and javascript on indexing today’s web (KG, CE, APdV, MFM), pp. 1990–1994.
ICSMEICSM-2010-OlbrichCS #case study #evolution #open source #smell
Are all code smells harmful? A study of God Classes and Brain Classes in the evolution of three open source systems (SMO, DC, DIKS), pp. 1–10.
ICPRICPR-2010-BecharMTB #online #recognition #video
On-Line Video Recognition and Counting of Harmful Insects (IB, SM, MT, FB), pp. 4068–4071.
OSDIOSDI-2010-XiongPZZM #ad hoc #harmful
Ad Hoc Synchronization Considered Harmful (WX, SP, JZ, YZ, ZM), pp. 163–176.
ICFPICFP-2009-Steele #execution #functional #parallel
Organizing functional code for parallel execution or, foldl and foldr considered slightly harmful (GLSJ), pp. 1–2.
CHICHI-2009-CrabtreeRTB #harmful
Ethnography considered harmful (AC, TR, PT, GB), pp. 879–888.
ICSMEICSM-2008-BettenburgPZK #debugging #harmful #question
Duplicate bug reports considered harmful ... really? (NB, RP, TZ, SK), pp. 337–345.
CHICHI-2008-GreenbergB #evaluation #harmful #usability
Usability evaluation considered harmful (some of the time) (SG, WB), pp. 111–120.
MSRMSR-2007-LozanoWN #empirical
Evaluating the Harmfulness of Cloning: A Change Based Experiment (AL, MW, BN), p. 18.
PLDIPLDI-2007-NarayanasamyWTEC #analysis #automation
Automatically classifying benign and harmful data racesallusing replay analysis (SN, ZW, JT, AE, BC), pp. 22–31.
WCREWCRE-2006-KapserG #harmful
“Cloning Considered Harmful” Considered Harmful (CK, MWG), pp. 19–28.
HPDCHPDC-2006-Casanova #on the
On the Harmfulness of Redundant Batch Requests (HC), pp. 255–266.
ICSMEICSM-2005-HaoZZMS #case study #fault #locality #reduction #testing #using
Eliminating Harmful Redundancy for Testing-Based Fault Localization Using Test Suite Reduction: An Experimental Study (DH, LZ, HZ, HM, JS), pp. 683–686.
CIKMCIKM-2005-TerraW #documentation #feedback
Poison pills: harmful relevant documents in feedback (ELT, RW), pp. 319–320.
OSDIOSDI-2004-WalfishSKBMS #harmful
Middleboxes No Longer Considered Harmful (MW, JS, MNK, HB, RM, SS), pp. 215–230.
ICEISICEIS-1999-YooYP #data access #internet
A New Method to Block Access to Illegal and Harmful Content on the Internet (BJY, HGY, MSP), pp. 732–739.
TOOLSTOOLS-EUROPE-1999-Simons #case study #harmful
Use Cases Considered Harmful (AJHS), pp. 194–203.
IWPCIWPC-1998-BrandSV #harmful #legacy #parsing
Current Parsing Techniques in Software Renovation Considered Harmful (MvdB, MPAS, CV), pp. 108–117.
KDDKDD-1997-Zytkow #concept #equation
Knowledge = Concepts: A Harmful Equation (JMZ), pp. 104–109.
HTECHT-1990-Young #harmful
Linking Considered Harmful (LDY), pp. 238–249.
CSEETSEI-1989-Friedman #education #harmful #re-engineering
A Separate Undergraduate Software Engineering Curriculum Considered Harmful (FLF), pp. 267–270.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.