Tag #how
1173 papers:
- POPL-2020-PedrotT
- The fire triangle: how to mix substitution, dependent elimination, and effects (PMP, NT), p. 28.
- ASPLOS-2020-0002PJ #performance #why
- Why GPUs are Slow at Executing NFAs and How to Make them Faster (HL0, SP, AJ), pp. 251–265.
- ICSA-2019-TianLB #architecture #case study #developer #smell #stack overflow
- How Developers Discuss Architecture Smells? An Exploratory Study on Stack Overflow (FT, PL0, MAB), pp. 91–100.
- EDM-2019-AguerrebereBCGK #education #feedback #online #question #student
- How Should Online Teachers of English as a Foreign Language (EFL) Write Feedback to Students? (CA, MB, CC, SG, GK, JW).
- EDM-2019-XuGLB #social #what
- What You Say is Relevant to How You Make Friends: Measuring the Effect of Content on Social Connection (YX, NG, CFL, TB).
- ICPC-2019-SantosS #configuration management #dependence #question
- How does feature dependency affect configurable system comprehensibility? (DS, CS), pp. 19–29.
- ICSME-2019-CatolinoPZF #development #experience
- How the Experience of Development Teams Relates to Assertion Density of Test Classes (GC, FP, AZ, FF), pp. 223–234.
- ICSME-2019-TufanoWBPWP #learning #source code
- Learning How to Mutate Source Code from Bug-Fixes (MT, CW, GB, MDP, MW, DP), pp. 301–312.
- ICSME-2019-ViggiatoOFJK #platform
- How Do Code Changes Evolve in Different Platforms? A Mining-Based Investigation (MV, JO, EF, PJ, CK), pp. 218–222.
- MSR-2019-ManesB #developer #git #question #stack overflow #what
- How often and what StackOverflow posts do developers reference in their GitHub projects? (SSM, OB), pp. 235–239.
- SANER-2019-BusingeKOBS #eclipse #framework #interface #question
- How Stable Are Eclipse Application Framework Internal Interfaces? (JB, SK, MO, EB, AS), pp. 117–127.
- FM-2019-Ehlers #model checking #question
- How Hard Is Finding Shortest Counter-Example Lassos in Model Checking? (RE), pp. 245–261.
- AIIDE-2019-Schiffer #game studies #performance
- How Actors Can Animate Game Characters: Integrating Performance Theory in the Emotion Model of a Game Character (SS), pp. 227–229.
- CoG-2019-JooK #game studies #learning #question #using #visualisation
- Visualization of Deep Reinforcement Learning using Grad-CAM: How AI Plays Atari Games? (HTJ, KJK), pp. 1–2.
- DiGRA-2019-AytemizJA #game studies
- Exploring How Changes in Game Systems Generate Meaning (BA, NJ, NA).
- DiGRA-2019-GualeniFL #game studies
- How to Reference a Digital Game (SG, RF, JL).
- FDG-2019-KaoS #game studies #performance
- Exploring how preference and perceived performance vary in different game genres across time of day (DK, JJDS), p. 5.
- FDG-2019-ZareAWP
- Show me how to win: a robot that uses dialog management to learn from demonstrations (MZ, AA, ARW, RJP), p. 7.
- FDG-2019-ZhuAFNCSVO #concept #education #game studies #parallel #programming
- Programming in game space: how to represent parallel programming concepts in an educational game (JZ, KA, AF, JN, BC, BKS, JV, SO), p. 10.
- CIKM-2019-AkenWLG #analysis
- How Does BERT Answer Questions?: A Layer-Wise Analysis of Transformer Representations (BvA, BW, AL, FAG), pp. 1823–1832.
- CIKM-2019-LiLXLC #source code
- How to Find It Better?: Cross-Learning for WeChat Mini Programs (HL, ZL, SX, ZL, XC), pp. 2753–2761.
- ECIR-p1-2019-AlbahemSSC #metric #question #topic
- Meta-evaluation of Dynamic Search: How Do Metrics Capture Topical Relevance, Diversity and User Effort? (AA, DS, FS, LC), pp. 607–620.
- ICML-2019-BodaA #correlation #fault #online
- Correlated bandits or: How to minimize mean-squared error online (VPB, PLA), pp. 686–694.
- ICML-2019-Yu0YNTS #question
- How does Disagreement Help Generalization against Label Corruption? (XY, BH0, JY, GN, IWT, MS), pp. 7164–7173.
- KDD-2019-JiaLZKK #learning #question #robust #towards
- Towards Robust and Discriminative Sequential Data Learning: When and How to Perform Adversarial Training? (XJ, SL0, HZ, SK, VK), pp. 1665–1673.
- KDD-2019-Rudin #modelling #question
- Do Simpler Models Exist and How Can We Find Them? (CR), pp. 1–2.
- KDD-2019-SchonD0 #fault #predict #using
- The Error is the Feature: How to Forecast Lightning using a Model Prediction Error (CS, JD, RM0), pp. 2979–2988.
- KDD-2019-ZhangHDV #lessons learnt
- How to Invest my Time: Lessons from Human-in-the-Loop Entity Extraction (SZ, LH, ECD, SV), pp. 2305–2313.
- ECOOP-2019-EichholzCFSM #programming #type safety
- How to Avoid Making a Billion-Dollar Mistake: Type-Safe Data Plane Programming with SafeP4 (ME, EC, NF, GS, MM), p. 28.
- OOPSLA-2019-MarcozziTDC #compilation #fuzzing #matter #question
- Compiler fuzzing: how much does it matter? (MM, QT0, AFD, CC), p. 29.
- ASE-2019-JiangLJ #machine learning #recommendation
- Machine Learning Based Recommendation of Method Names: How Far are We (LJ, HL, HJ), pp. 602–614.
- ASE-2019-StepanovAB #compilation #debugging #named
- ReduKtor: How We Stopped Worrying About Bugs in Kotlin Compiler (DS, MA, MAB), pp. 317–326.
- ASE-2019-TaoTLXQ #api #data analysis #performance #question #runtime
- How Do API Selections Affect the Runtime Performance of Data Analytics Tasks? (YT, ST, YL, ZX, SQ), pp. 665–668.
- ESEC-FSE-2019-CotroneoSLNB #analysis #debugging #empirical #framework #in the cloud #platform
- How bad can a bug get? an empirical analysis of software failures in the OpenStack cloud computing platform (DC, LDS, PL, RN, NB), pp. 200–211.
- ICSE-2019-0001WK0
- How practitioners perceive coding proficiency (XX0, ZW, PSK, DL0), pp. 924–935.
- ICSE-2019-Chattopadhyay0G #case study #developer #process
- Latent patterns in activities: a field study of how developers manage context (SC, NN0, YRG, AAL, RP, AS), pp. 373–383.
- ICSE-2019-ChenFMWG #crowdsourcing #implementation #question #reliability #security
- How reliable is the crowdsourced knowledge of security implementation? (MC, FF, NM, XW, JG), pp. 536–547.
- ICSE-2019-Eyolfson0 #c++ #developer #empirical
- How C++ developers use immutability declarations: an empirical study (JE, PL0), pp. 362–372.
- CASE-2019-Biller #delivery #information retrieval
- The operational butterfly effect: How IoT data + AI help deliver on the promise of 4IR (SB), p. 1.
- JCDL-2018-AlonsoKT #evolution #social #using
- How it Happened: Discovering and Archiving the Evolution of a Story Using Social Signals (OA, VK, SET), pp. 193–202.
- EDM-2018-XuLB #evolution #social
- How many friends can you make in a week?: evolving social relationships in MOOCs over time (YX, CL, TB).
- ICPC-2018-DoseaSS #design #metric #question
- How do design decisions affect the distribution of software metrics? (MD, CS, BCdS), pp. 74–85.
- ICPC-2018-YoshidaIEEI
- How slim will my system be?: estimating refactored code size by merging clones (NY, TI, BE, KI), pp. 352–360.
- ICSME-2018-MalavoltaVFBL #android #maintenance
- How Maintainability Issues of Android Apps Evolve (IM, RV, BF, MB, PL), pp. 334–344.
- ICSME-2018-ZhangCGZXJX #case study #git #multi
- How do Multiple Pull Requests Change the Same Code: A Study of Competing Pull Requests in GitHub (XZ, YC, YG, WZ, XX, XJ, JX), pp. 228–239.
- MSR-2018-ArimaHK08 #case study #commit #java #question #what
- A study on inappropriately partitioned commits: how much and what kinds of IP commits in Java projects? (RA, YH, SK), pp. 336–340.
- MSR-2018-Cassee0CS #developer #fault
- How swift developers handle errors (NC, GP0, FC, AS), pp. 292–302.
- MSR-2018-PascarellaPPB08 #development #game studies #open source #question #video
- How is video game development different from software development in open source? (LP, FP, MDP, AB), pp. 392–402.
- MSR-2018-RahmanBPKLQPSR08 #developer #retrieval
- Evaluating how developers use general-purpose web-search for code retrieval (MMR, JB, SP, JK, FAL, SFQ, CP, KTS, BR), pp. 465–475.
- SANER-2018-0001WD #replication
- How do scientists develop scientific software? An external replication (GP0, IW, LFD), pp. 582–591.
- SANER-2018-AlkadhiNGB #developer #question
- How do developers discuss rationale? (RA, MN, EG, BB), pp. 357–369.
- SANER-2018-BentHVG #empirical #quality
- How good is your puppet? An empirically defined and validated quality model for puppet (EvdB, JH, JV, GG), pp. 164–174.
- SANER-2018-BritoXHV #api #developer #java #why
- Why and how Java developers break APIs (AB, LX, ACH, MTV), pp. 255–265.
- SANER-2018-DigkasLACA #developer #ecosystem #question #technical debt
- How do developers fix issues and pay back technical debt in the Apache ecosystem? (GD, ML, PA, AC, AA), pp. 153–163.
- SANER-2018-VasquezVTP #android #developer
- How developers micro-optimize Android apps (journal-first abstract) (MLV, CV, MT, DP), p. 470.
- Haskell-2018-BlondalLS #anti
- Deriving via: or, how to turn hand-written instances into an anti-pattern (BB, AL, RS), pp. 55–67.
- ICFP-2018-AlmeidaCM0P #assessment #automation #case study #education #experience #functional #game studies #using
- Teaching how to program using automated assessment and functional glossy games (experience report) (JBA, AC, NM, HP0, JP), p. 17.
- CHI-PLAY-2018-EmmerichRM #design #game studies
- I'm Glad You Are on My Side: How to Design Compelling Game Companions (KE, PR, MM), pp. 141–152.
- DiGRA-2018-ToftedahlBE #game studies #locality #question #why
- Localization from an Indie Game Production Perspective - Why, When and How? (MT, PB, HE).
- VS-Games-2018-Pietrass #question
- How Real Can Virtual Become? (MP), pp. 1–4.
- CIKM-2018-MedlarG #consistency #feedback #question
- How Consistent is Relevance Feedback in Exploratory Search? (AM, DG), pp. 1615–1618.
- CIKM-2018-RoyGBBM #information retrieval #normalisation #performance #using #word
- Using Word Embeddings for Information Retrieval: How Collection and Term Normalization Choices Affect Performance (DR, DG, SB, SB, MM), pp. 1835–1838.
- CIKM-2018-WanG
- When Optimizer Chooses Table Scans: How to Make Them More Responsive (LW, TG), pp. 1333–1342.
- ICML-2018-XiaoBSSP #network
- Dynamical Isometry and a Mean Field Theory of CNNs: How to Train 10, 000-Layer Vanilla Convolutional Neural Networks (LX, YB, JSD, SSS, JP), pp. 5389–5398.
- ICML-2018-ZhouMBGYLF #bound #distributed #optimisation #question
- Distributed Asynchronous Optimization with Unbounded Delays: How Slow Can You Go? (ZZ, PM, NB, PWG, YY, LJL, LFF0), pp. 5965–5974.
- ICPR-2018-JollyIKU #design #network #question
- How do Convolutional Neural Networks Learn Design? (SJ, BKI, RK, SU), pp. 1085–1090.
- KDD-2018-ChenLZK #graph
- How LinkedIn Economic Graph Bonds Information and Product: Applications in LinkedIn Salary (XC, YL, LZ, KK), pp. 120–129.
- KDD-2018-WangFZWZA #analysis #behaviour #learning #representation
- You Are How You Drive: Peer and Temporal-Aware Representation Learning for Driving Behavior Analysis (PW, YF, JZ, PW, YZ, CCA), pp. 2457–2466.
- ASE-2018-HabibP18a #case study #debugging #detection
- How many of all bugs do we find? a study of static bug detectors (AH, MP), pp. 317–328.
- ASE-2018-HuWLCH #android #debugging
- A tale of two cities: how WebView induces bugs to Android applications (JH, LW, YL, SCC, HH), pp. 702–713.
- ASE-2018-LiuXHLXW #commit #generative #question
- Neural-machine-translation-based commit message generation: how far are we? (ZL, XX0, AEH, DL0, ZX, XW0), pp. 373–384.
- ESEC-FSE-2018-BarikFMP #compilation #developer #problem #question
- How should compilers explain problems to developers? (TB, DF, ERMH, CP), pp. 633–643.
- ESEC-FSE-2018-Brindescu #developer #process #tool support
- How do developers resolve merge conflicts? an investigation into the processes, tools, and improvements (CB), pp. 952–955.
- ESEC-FSE-2018-Erofeeva
- How Dance(Sport) can help to produce better software (IE), pp. 971–973.
- ESEC-FSE-2018-WangS #question #regular expression
- How well are regular expressions tested in the wild? (PW, KTS), pp. 668–678.
- ESEC-FSE-2018-XuDZG00 #case study #spreadsheet
- How are spreadsheet templates used in practice: a case study on Enron (LX, WD, JZ, CG, JW0, TH0), pp. 734–738.
- ICSE-2018-0008ZBPLO #analysis #question #re-engineering #sentiment
- Sentiment analysis for software engineering: how far can we go? (BL0, FZ, GB, MDP, ML, RO), pp. 94–104.
- ICSE-2018-AnicheTSW0SG #community #development
- How modern news aggregators help development communities shape and share knowledge (MFA, CT, IS, IW, GP0, MADS, MAG), pp. 499–510.
- ICSE-2018-SpadiniASBB #code review #developer #overview #testing #why
- When testing meets code review: why and how developers review tests (DS, MFA, MADS, MB, AB), pp. 677–687.
- ICSE-2018-YangSLYC #case study #debugging #performance #web
- How not to structure your database-backed web applications: a study of performance bugs in the wild (JY, PS, SL, CY, AC), pp. 800–810.
- CASE-2018-SeichterESG #detection #learning
- How to Improve Deep Learning based Pavement Distress Detection while Minimizing Human Effort (DS, ME0, RS, HMG), pp. 63–70.
- CASE-2018-StutzM #automation #design #development #object-oriented #process #source code
- How object-oriented design principles enhance the development of complex automation programs - A Best Practice Paper on how to develop service-interlaces for process modules as defined in VDI/VDE/NAMUR 2658 (AS, MM), pp. 156–159.
- ESOP-2018-BatzKKM #network #program analysis
- How long, O Bayesian network, will I sample thee? - A program analysis perspective on expected sampling times (KB, BLK, JPK, CM), pp. 186–213.
- ICST-2018-ShamshiriRGWF #automation #maintenance #question #testing
- How Do Automatically Generated Unit Tests Influence Software Maintenance? (SS, JMR, JPG, NW, GF), pp. 250–261.
- CSEET-2017-SaiedianLW #question #re-engineering #source code
- CSEE&T 2017 Panel Proposal How to Enhance Diversity in Software Engineering Programs? (HS, GAL, ABW), pp. 122–123.
- EDM-2017-LangDKP
- Making the Grade: How Learner Engagement Changes After Passing a Course (DL, BD, AK, AP).
- EDM-2017-PatikornHZ #evaluation
- An Offline Evaluation Method for Individual Treatment Rules and How to Find Heterogeneous Treatment Effect (TP, NTH, JZ).
- ICPC-2017-CeccatoTBCSFT
- How professional hackers understand protected code while performing attack tasks (MC, PT, CB, BC, BDS, PF, MT), pp. 154–164.
- ICPC-2017-DaoZM #debugging #execution #locality #question
- How does execution information help with information-retrieval based bug localization? (TD, LZ, NM), pp. 241–250.
- ICPC-2017-ZampettiPBMPL #developer #documentation
- How developers document pull requests with external references (FZ, LP, GB, AM, MDP, ML), pp. 23–33.
- ICSME-2017-Sae-LimHS #case study #developer #smell
- How Do Developers Select and Prioritize Code Smells? A Preliminary Study (NSL, SH, MS), pp. 484–488.
- ICSME-2017-SilvaWGSG #question #what
- How Long and How Much: What to Expect from Summer of Code Participants? (JDOS, ISW, DMG, IFS, MAG), pp. 69–79.
- ICSME-2017-VasquezBMP #android #developer #question
- How do Developers Test Android Applications? (MLV, CBC, KM, DP), pp. 613–622.
- MSR-2017-CalciatiG #case study
- How do apps evolve in their permission requests?: a preliminary study (PC, AG), pp. 37–41.
- MSR-2017-ReboucasSPC #open source #question
- How does contributors' involvement influence the build status of an open-source software project? (MR, ROS, GP0, FC), pp. 475–478.
- MSR-2017-ZampettiSOCP #analysis #integration #open source #pipes and filters #tool support
- How open source projects use static code analysis tools in continuous integration pipelines (FZ, SS, RO, GC, MDP), pp. 334–344.
- SANER-2017-MoonSLK #analysis #behaviour #generative #what
- Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding (RJM, KMS, HYL, HJK), pp. 575–576.
- SANER-2017-SassoMLM #re-engineering
- How to gamify software engineering (TDS, AM, ML, EM), pp. 261–271.
- SCAM-2017-SwidanSH #question
- How do Scratch Programmers Name Variables and Procedures? (AS, AS, FH), pp. 51–60.
- CIAA-2017-Cortier #logic
- Electronic Voting: How Logic Can Help (VC), p. xi-xii.
- IFM-2017-KordyW #question
- How Well Can I Secure My System? (BK, WW), pp. 332–347.
- ICFP-2017-Hamana #algebra #calculus #decidability #higher-order
- How to prove your calculus is decidable: practical applications of second-order algebraic theories and computation (MH), p. 28.
- CHI-PLAY-2017-Bogost #game studies
- How to Play (IB), p. 1.
- CHI-PLAY-2017-DeppingM #game studies #multi #social
- Cooperation and Interdependence: How Multiplayer Games Increase Social Closeness (AED, RLM), pp. 449–461.
- CHI-PLAY-2017-NazareHSR #word
- Bilingual SpeechBlocks: Investigating How Bilingual Children Tinker with Words in English and Spanish (JN, AH, IS, DR), pp. 183–193.
- CHI-PLAY-2017-SeeleMBHS #artificial reality #behaviour #exclamation #game studies #question #social
- Here's Looking At You Anyway!: How Important is Realistic Gaze Behavior in Co-located Social Virtual Reality Games? (SS, SM, HB, RH, JS), pp. 531–540.
- CIKM-2017-Stanojevic #question
- How Safe is Your (Taxi) Driver? (RS), pp. 2319–2322.
- ECIR-2017-MishraB #order #proximity #question #readability #summary
- How Do Order and Proximity Impact the Readability of Event Summaries? (AM, KB), pp. 212–225.
- ICML-2017-Jin0NKJ
- How to Escape Saddle Points Efficiently (CJ, RG0, PN, SMK, MIJ), pp. 1724–1732.
- ICML-2017-Loukas #matrix #question
- How Close Are the Eigenvectors of the Sample and Actual Covariance Matrices? (AL), pp. 2228–2237.
- ICML-2017-McGillP #network
- Deciding How to Decide: Dynamic Routing in Artificial Neural Networks (MM, PP), pp. 2363–2372.
- MoDELS-2017-SelimCD #atl
- How is ATL Really Used? Language Feature Use in the ATL Zoo (GMKS, JRC, JD), pp. 34–44.
- Onward-2017-Biddle #modelling #research
- How can our publication models best serve our research? (panel) (RB), pp. 260–261.
- Onward-2017-VeroyG #case study #java #named
- Garbology: a study of how Java objects die (RLV, SZG), pp. 168–179.
- OOPSLA-2017-WuC #fault #question #student #what
- How type errors were fixed and what students did? (BW, SC0), p. 27.
- AdaEurope-2017-Chapman
- Sanitizing Sensitive Data: How to Get It Right (or at Least Less Wrong...) (RC), pp. 37–52.
- ASE-2017-ScalabrinoBVVPO #automation #question
- Automatically assessing code understandability: how far are we? (SS, GB, CV, MLV, DP, RO), pp. 417–427.
- ASE-2017-TomasdottirAD #developer #javascript #why
- Why and how JavaScript developers use linters (KFT, MFA, AvD), pp. 578–589.
- ESEC-FSE-2017-BohmeS0UZ #debugging #empirical
- Where is the bug and how is it fixed? an experiment with practitioners (MB, EOS, SC0, EU, AZ), pp. 117–128.
- ESEC-FSE-2017-Easterbrook #modelling #verification
- Verifying the forecast: how climate models are developed and tested (invited talk) (SE), p. 2.
- ICSE-2017-KafaliJPWS #case study #policy #security
- How good is a security policy against real breaches?: a HIPAA case study (ÖK, JJ, MP, LW, MPS), pp. 530–540.
- ICSE-2017-MaCZZX #case study #correlation #debugging #developer #ecosystem #git #python
- How do developers fix cross-project correlated bugs?: a case study on the GitHub scientific python ecosystem (WM, LC0, XZ0, YZ, BX), pp. 381–392.
- GPCE-2017-FenskeSS #case study #maintenance #preprocessor
- How preprocessor annotations (do not) affect maintainability: a case study on change-proneness (WF, SS, GS), pp. 77–90.
- SLE-2017-Pereira0RRCFS #energy #memory management #performance #programming language #question
- Energy efficiency across programming languages: how do energy, time, and memory relate? (RP, MC, FR, RR, JC, JPF, JS), pp. 256–267.
- CASE-2017-ChangCC #modelling #performance #variability
- How simplified models of different variability affects performance of ordinal transformation (CMC, SCC, CHC), pp. 1065–1066.
- ICST-2017-ChenBHZZX #question #reduction #testing
- How Do Assertions Impact Coverage-Based Test-Suite Reduction? (JC0, YB, DH, LZ, LZ0, BX), pp. 418–423.
- ICST-2017-RamlerH #automation #locality #testing
- How to Test in Sixteen Languages? Automation Support for Localization Testing (RR, RH), pp. 542–543.
- WICSA-2016-GalsterW #architecture #empirical #question #research
- Empirical Research in Software Architecture: How Far have We Come? (MG, DW), pp. 11–20.
- EDM-2016-BoroujeniKD #question
- How employment constrains participation in MOOCs? (MSB, LK, PD), pp. 638–639.
- EDM-2016-DoroudiHAB16a #matter #process #sequence
- Sequence Matters, But How Exactly? A Method for Evaluating Activity Sequences from Data (SD, KH, VA, EB), pp. 70–77.
- EDM-2016-JoL #learning #online
- How to Judge Learning on Online Learning: Minimum Learning Judgment System (JJ, HL), pp. 597–598.
- EDM-2016-KhajahLM #question
- How Deep is Knowledge Tracing? (MK, RVL, MM).
- EDM-2016-KhajahLM_ #question
- How Deep is Knowledge Tracing? (MK, RVL, MM).
- EDM-2016-LiCG #crowdsourcing #summary
- How Good Is Popularity? Summary Grading in Crowdsourcing (HL, ZC, ACG), pp. 430–435.
- EDM-2016-MatsudaCS #detection #question
- How quickly can wheel spinning be detected? (NM, SC, JCS), pp. 607–608.
- EDM-2016-RauMN16a #learning #similarity #visual notation
- How to Model Implicit Knowledge? Similarity Learning Methods to Assess Perceptions of Visual Representations (MAR, BM, RDN), pp. 199–206.
- EDM-2016-RauMN16a_ #learning #similarity #visual notation
- How to Model Implicit Knowledge? Similarity Learning Methods to Assess Perceptions of Visual Representations (MAR, BM, RDN), pp. 199–206.
- EDM-2016-SnowKPFB #learning #online #performance #student
- Quantifying How Students Use an Online Learning System: A Focus on Transitions and Performance (ELS, AEK, TEP, MF, AJB), pp. 640–641.
- ICSME-2016-DiasSPCG #collaboration #git #question
- How Does the Shift to GitHub Impact Project Collaboration? (LFD, IS, GP0, DAdC, MAG), pp. 473–477.
- ICSME-2016-GovinAEDM #architecture #case study #industrial
- How Can We Help Software Rearchitecting Efforts? Study of an Industrial Case (BG, NA, AE, SD, AM), pp. 509–518.
- MSR-2016-AsaduzzamanARS #developer #exception #java #question
- How developers use exception handling in Java? (MA, MA, CKR, KAS), pp. 516–519.
- MSR-2016-BaoLXWT #android #commit #developer #empirical #mining #power management
- How android app developers manage power consumption?: an empirical study by mining power management commits (LB, DL0, XX0, XW0, CT), pp. 37–48.
- MSR-2016-ThompsonMPG #developer #repository
- How software developers use work breakdown relationships in issue repositories (CAT, GCM, MP, MG), pp. 281–285.
- MSR-2016-ZagalskyTGSP #case study #community #comparative #stack overflow
- How the R community creates and curates knowledge: a comparative study of stack overflow and mailing lists (AZ, CGT, DMG, MADS, GPC), pp. 441–451.
- Haskell-2016-ChauhanKY #pointer
- How to twist pointers without breaking them (SC, PPK, BAY), pp. 51–61.
- DiGRA-FDG-2016-FasterholdtPH #game studies
- You Say Jump, I Say How High? Operationalising the Game Feel of Jumping (MF, MP, CH).
- ICML-2016-KapralovPW #matrix #multi
- How to Fake Multiply by a Gaussian Matrix (MK, VKP, DPW), pp. 2101–2110.
- ICML-2016-Shalev-ShwartzW #why
- Minimizing the Maximal Loss: How and Why (SSS, YW), pp. 793–801.
- KDD-2016-Downs #machine learning
- How Machine Learning has Finally Solved Wanamaker's Dilemma (OD), p. 405.
- KDD-2016-KimMJO #modelling #online #word
- How to Compete Online for News Audience: Modeling Words that Attract Clicks (JHK, AM, AJ, AHO), pp. 1645–1654.
- KDD-2016-LiAHS #personalisation #ranking
- How to Get Them a Dream Job?: Entity-Aware Features for Personalized Job Search Ranking (JL, DA, VHT, SS), pp. 501–510.
- BX-2016-McKinnaS #deployment #equilibrium
- How to Regain Equilibrium without Losing your Balance? Scenarios for Bx Deployment (Discussion Paper) (JM, PS), pp. 32–34.
- Onward-2016-Emerich #source code
- How are programs found? speculating about language ergonomics with Curry-Howard (JE), pp. 212–223.
- ASE-2016-LegunsenHXRM #api #case study #effectiveness #java #specification
- How good are the specs? a study of the bug-finding effectiveness of existing Java API specifications (OL, WUH, XX, GR, DM), pp. 602–613.
- FSE-2016-Barik #developer #question #static analysis #tool support
- How should static analysis tools explain anomalies to developers? (TB), pp. 1118–1120.
- FSE-2016-BogartKHT #api #community #ecosystem
- How to break an API: cost negotiation and community values in three software ecosystems (CB, CK, JDH, FT), pp. 109–120.
- FSE-2016-Herbsleb #coordination #research #why
- Building a socio-technical theory of coordination: why and how (outstanding research award) (JDH), pp. 2–10.
- ICSE-2016-KononenkoBG #code review #developer #overview #quality
- Code review quality: how developers see it (OK, OB, MWG), pp. 1028–1038.
- ICSE-2016-LuLCZHZ0 #evolution #question #testing
- How does regression test prioritization perform in real-world software evolution? (YL, YL, SC0, LZ, DH, YZ, LZ0), pp. 535–546.
- ICSE-2016-MeloBW #debugging #question #variability
- How does the degree of variability affect bug finding? (JM, CB, AW), pp. 679–690.
- ASPLOS-2016-BrownNE #order #static analysis #using
- How to Build Static Checking Systems Using Orders of Magnitude Less Code (FB, AN, DRE), pp. 143–157.
- ICST-2016-ArtsH #question #requirements
- How Well are Your Requirements Tested? (TA, JH), pp. 244–254.
- DocEng-2015-CutterM #documentation #mobile #towards
- Towards Mobile OCR: How to Take a Good Picture of a Document Without Sight (MPC, RM), pp. 75–84.
- JCDL-2015-AlkwaiNW #question
- How Well Are Arabic Websites Archived? (LMA, MLN, MCW), pp. 223–232.
- PODS-2015-PraveenS #graph #question
- Defining Relations on Graphs: How Hard is it in the Presence of Node Partitions? (MP, BS), pp. 159–172.
- SIGMOD-2015-ZhengZLYSZ #approach #graph #nondeterminism #rdf #similarity
- How to Build Templates for RDF Question/Answering: An Uncertain Graph Similarity Join Approach (WZ, LZ, XL, JXY, SS, DZ), pp. 1809–1824.
- EDM-2015-BumbacherSWB #behaviour #comprehension #concept #development #learning #physics
- Learning Environments and Inquiry Behaviors in Science Inquiry Learning: How Their Interplay Affects the Development of Conceptual Understanding in Physics (EB, SS, MW, PB), pp. 61–68.
- EDM-2015-DoroudiHAB #comprehension #induction #learning #refinement #robust #towards
- Towards Understanding How to Leverage Sense-making, Induction/Refinement and Fluency to Improve Robust Learning (SD, KH, VA, EB), pp. 376–379.
- EDM-2015-JacovinaSARWDM #visualisation
- How to Visualize Success: Presenting Complex Data in a Writing Strategy Tutor (MEJ, ELS, LKA, RDR, JLW, JD, DSM), pp. 594–595.
- EDM-2015-JanningSS15a #multimodal #recognition
- How to Aggregate Multimodal Features for Perceived Task Difficulty Recognition in Intelligent Tutoring Systems (RJ, CS, LST), pp. 566–567.
- EDM-2015-Rau #equation #learning #why
- Why Do the Rich Get Richer? A Structural Equation Model to Test How Spatial Skills Affect Learning with Representations (MAR), pp. 350–357.
- EDM-2015-WangYWKR #behaviour #learning #student
- Investigating How Student's Cognitive Behavior in MOOC Discussion Forum Affect Learning Gains (XW0, DY, MW, KRK, CPR), pp. 226–233.
- EDM-2015-WarnerDMG #interactive #online #student
- How High School, College, and Online Students Differentially Engage with an Interactive Digital Textbook (JW, JD, BM, PJG), pp. 528–531.
- ITiCSE-2015-BellettiniLMMMT #analysis #performance #student
- How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students (CB, VL, DM, MM, AM, MT), pp. 27–32.
- SIGITE-2015-MacKellarHSS #question #source code
- Information Technology and Computer Science Programs: How Do We Relate? (BM, GWH, MS, AS), pp. 125–126.
- ICPC-2015-JbaraF #empirical #eye tracking #using
- How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
- ICPC-2015-MacLeodSB #developer #documentation #using
- Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
- ICPC-2015-MinelliML #developer #what
- I know what you did last summer: an investigation of how developers spend their time (RM, AM, ML), pp. 25–35.
- ICSME-2015-CodobanRDB #case study #developer #lens #why
- Software history under the lens: A study on why and how developers examine it (MC, SSR, DD, BB), pp. 1–10.
- ICSME-2015-HoraRAEDV #api #developer #ecosystem #evolution #smalltalk
- How do developers react to API evolution? The Pharo ecosystem case (AH, RR, NA, AE, SD, MTV), pp. 251–260.
- ICSME-2015-PanichellaSGVCG #evolution #maintenance
- How can i improve my app? Classifying user reviews for software maintenance and evolution (SP, ADS, EG, CAV, GC, HCG), pp. 281–290.
- ICSME-2015-PiorkowskiFSBKH #bias #debugging #developer #information management
- To fix or to learn? How production bias affects developers’ information foraging during debugging (DP, SDF, CS, MMB, IK, AZH, JM, CH, AH), pp. 11–20.
- ICSME-2015-VasquezVLP #android #detection #developer #performance
- How developers detect and fix performance bottlenecks in Android apps (MLV, CV, QL, DP), pp. 352–361.
- SANER-2015-Mirakhorli #architecture #question #re-engineering #what #why
- Software architecture reconstruction: Why? What? How? (MM), p. 595.
- SCAM-2015-SteidlD #java #question
- How do Java methods grow? (DS, FD), pp. 151–160.
- ICALP-v2-2015-Klein0 #game studies #infinity #lookahead #question
- How Much Lookahead is Needed to Win Infinite Games? (FK, MZ), pp. 452–463.
- CHI-PLAY-2015-BirkMMG #game studies #interactive #self
- How Self-Esteem Shapes our Interactions with Play Technologies (MVB, RLM, MKM0, KMG), pp. 35–45.
- CHI-PLAY-2015-KetchesonYG #design #game studies #physics #process
- Designing for Exertion: How Heart-Rate Power-ups Increase Physical Activity in Exergames (MK, ZY, TCNG), pp. 79–89.
- CHI-PLAY-2015-KistlerA #gesture #visualisation
- How Can I Interact?: Comparing Full Body Gesture Visualizations (FK, EA), pp. 583–588.
- CIG-2015-QuadfliegRP #multi #optimisation #parametricity
- How costly is a good compromise: Multi-objective TORCS controller parameter optimization (JQ, GR, MP), pp. 454–460.
- DiGRA-2015-Cole #design #elicitation
- The Tragedy of Betrayal: How the Design of Ico and Shadow of the Colossus Elicits Emotion (TC).
- DiGRA-2015-ElmezenyW #game studies
- How gaming achieves popularity: The case of The Smash Brothers (AE, JW).
- DiGRA-2015-Winn
- The Well-Played MOBA: How DotA 2 and League of Legends use Dramatic Dynamics (CW).
- FDG-2015-HeeterA #experience #game studies
- Playing with Presence: How meditation can increase the experience of embodied presence in a virtual world (CH, MA).
- VS-Games-2015-PatinoR #game studies #object-oriented #programming
- Program with Ixquic: How to Learn Object-Oriented Programming with a Game (TP, CR), pp. 1–2.
- CHI-2015-AmmariKLS #online #what
- Managing Children’s Online Identities: How Parents Decide what to Disclose about their Children Online (TA, PK, CL, SYS), pp. 1895–1904.
- CHI-2015-AndersonKJEHV #polymorphism
- How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study (BBA, CBK, JLJ, DE, SH, AV), pp. 2883–2892.
- CHI-2015-BranhamK #collaboration
- Collaborative Accessibility: How Blind and Sighted Companions Co-Create Accessible Home Spaces (SMB, SKK), pp. 2373–2382.
- CHI-2015-DeberJFW #latency #performance
- How Much Faster is Fast Enough?: User Perception of Latency & Latency Improvements in Direct and Indirect Touch (JD, RJ, CF, DW), pp. 1827–1836.
- CHI-2015-FrenchSBH #ambiguity #lens
- Is This How We (All) Do It?: Butler Lies and Ambiguity Through a Broader Lens (MF, MES, JPB, JTH), pp. 4079–4082.
- CHI-2015-GaoYHF #automation #collaboration #game studies #multi
- Improving Multilingual Collaboration by Displaying How Non-native Speakers Use Automated Transcripts and Bilingual Dictionaries (GG, NY, AMJH, SRF), pp. 3463–3472.
- CHI-2015-GulottaSKF #comprehension
- Curatorial Agents: How Systems Shape Our Understanding of Personal and Familial Digital Information (RG, AS, AK, JF), pp. 3453–3462.
- CHI-2015-HinikerSSSLK #mobile
- Texting while Parenting: How Adults Use Mobile Phones while Caring for Children at the Playground (AH, KS, HS, YCS, CPL, JAK), pp. 727–736.
- CHI-2015-HuangSHH #analysis
- How Activists Are Both Born and Made: An Analysis of Users on Change.org (SWH, M(S, BMH, GH), pp. 211–220.
- CHI-2015-JohnsonRMT #collaboration
- Can You See Me Now?: How Field of View Affects Collaboration in Robotic Telepresence (SJ, IR, BM, LT), pp. 2397–2406.
- CHI-2015-KayPK #classification #evaluation #overview
- How Good is 85%?: A Survey Tool to Connect Classifier Evaluation to Acceptability of Accuracy (MK, SNP, JAK), pp. 347–356.
- CHI-2015-OttleyYC #predict #visualisation
- Personality as a Predictor of User Strategy: How Locus of Control Affects Search Strategies on Tree Visualizations (AO, HY, RC), pp. 3251–3254.
- CHI-2015-PandeyRSNB #analysis #empirical #visualisation
- How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
- CHI-2015-PritchardBVO #mobile #performance
- How to Drive a London Bus: Measuring Performance in a Mobile and Remote Workplace (GWP, PB, JV, PO), pp. 1885–1894.
- CHI-2015-RaganGT #memory management #process #visual notation
- Evaluating How Level of Detail of Visual History Affects Process Memory (EDR, JRG, AT), pp. 2711–2720.
- CHI-2015-ZhangAK #question #what #why
- Mailing Lists: Why Are They Still Here, What’s Wrong With Them, and How Can We Fix Them? (AXZ, MSA, DRK), pp. 4009–4018.
- CSCW-2015-Erete #behaviour #communication #online
- Engaging Around Neighborhood Issues: How Online Communication Affects Offline Behavior (SLE), pp. 1590–1601.
- CSCW-2015-LiuIP #comprehension #maintenance #quote
- “I’m Not Like My Friends”: Understanding How Children with a Chronic Illness Use Technology to Maintain Normalcy (LSL, KMI, WP), pp. 1527–1539.
- CSCW-2015-SolomonMW #coordination #exclamation
- Don’t Wait!: How Timing Affects Coordination of Crowdfunding Donations (JS, WM, RW), pp. 547–556.
- CSCW-2015-WisniewskiJXRC #behaviour #privacy #quote #social #social media
- “Preventative” vs. “Reactive”: How Parental Mediation Influences Teens’ Social Media Privacy Behaviors (PJW, HJ, HX, MBR, JMC), pp. 302–316.
- DHM-HM-2015-IkenoboWSG #difference
- Differences in How Long an Ikebana Work Lasts Depending on the Skill Used in Cutting Floral Materials (YI, ZW, YS, AG), pp. 74–82.
- DHM-HM-2015-ShodaYSS #analysis #behaviour #people
- Exploring How People Collaborate with a Stranger: — Analyses of Verbal and Nonverbal Behaviors in Abstract Art Reproduction (HS, TY, NS, MS), pp. 379–388.
- DUXU-DD-2015-MedeirosTF #design #gesture #question #user interface
- How to Design an User Interface Based on Gestures? (ACSM, TAT, IEdF), pp. 63–74.
- DUXU-DD-2015-MichailidouHL
- How to Evaluate Use Scenarios and Stories (IM, CH, UL), pp. 609–620.
- DUXU-IXD-2015-Moldenhauer #design #student
- How Do I Get to Room 3106? — Student Wayfinding Designs for Old Main at Wayne State University (JAM), pp. 390–399.
- DUXU-IXD-2015-PennaQ
- How We Perceive Search Engines (LP, MQ), pp. 74–81.
- DUXU-UI-2015-Passera #contract #design
- Beyond the Wall of Text: How Information Design Can Make Contracts User-Friendly (SP), pp. 341–352.
- HCI-DE-2015-BoscarioliBSB #challenge #concept #education #human-computer #industrial
- How to Join Theoretical Concepts, Industry Needs and Innovative Technologies in HCI Courses? The Big Challenge of Teaching HCI (CB, SAB, MSS, SDJB), pp. 27–36.
- HCI-IT-2015-JeongS #case study #smarttech #user interface #what
- It’s not What It Speaks, but It’s How It Speaks: A Study into Smartphone Voice-User Interfaces (VUI) (JJ, DHS), pp. 284–291.
- HCI-UC-2015-SorumF #quality
- How to Evaluate Investments in Website Quality Within eGovernment? Exploring the Webmaster’s Perception of Benefits (HS, AF), pp. 102–111.
- HIMI-IKD-2015-ZhangNZC #library #mobile
- Search in One’s Hand: How Users Search a Mobile Library Catalog (TZ, XN, LZ, HlC), pp. 247–257.
- SCSM-2015-MillsF #effectiveness #framework #platform #why
- A Computational Study of How and Why reddit.com was an Effective Platform in the Campaign Against SOPA (RM, AF), pp. 229–241.
- ICEIS-v1-2015-Mocker #complexity
- Complexity in the Digital Age — How can IT Help, not Hurt (MM), p. IX.
- ICEIS-v2-2015-FissaaGHN #composition #question #semantics
- How Can Semantics and Context Awareness Enhance the Composition of Context-aware Services? (TF, HG, HH, MN), pp. 640–647.
- CIKM-2015-KiselevaKNM #behaviour #question #what
- Behavioral Dynamics from the SERP's Perspective: What are Failed SERPs and How to Fix Them? (JK, JK, VN, NM), pp. 1561–1570.
- CIKM-2015-SiersdorferKAZ #network #scalability #social #using
- Who With Whom And How?: Extracting Large Social Networks Using Search Engines (SS, PK, HA, SZ), pp. 1491–1500.
- ECIR-2015-UrbanoM #correlation #definite clause grammar #question #user satisfaction
- How Do Gain and Discount Functions Affect the Correlation between DCG and User Satisfaction? (JU, MM), pp. 197–202.
- ICML-2015-AnBB #linear #network #question
- How Can Deep Rectifier Networks Achieve Linear Separability and Preserve Distances? (SA, FB, MB), pp. 514–523.
- ICML-2015-GlobersonRSY #predict #question
- How Hard is Inference for Structured Prediction? (AG, TR, DS, CY), pp. 2181–2190.
- KDD-2015-John #big data #case study
- How Artificial Intelligence and Big Data Created Rocket Fuel: A Case Study (GJ), p. 1629.
- SEKE-2015-AndoSUWFIOHKSNY #developer #development #experience #fault #process #question
- How Does Defect Removal Activity of Developer Vary with Development Experience? (RA, SS, CU, HW, YF, SI, HO, YH, MK, KS, KN, MY), pp. 540–545.
- SEKE-2015-BurnayJF #elicitation #requirements
- How Stakeholders’ Commitment May Affect the Success of Requirements Elicitation (CB, IJ, SF), pp. 336–341.
- SEKE-2015-GoncalvesW #education #overview #perspective #project management #tool support
- How to Teach the Usage of Project Management Tools in Computer Courses: A Systematic Literature Review (RQG, CGvW), pp. 36–41.
- SEKE-2015-ValentimCEP #usability
- How do software engineers apply an early usability inspection technique? A qualitative study (NMCV, TC, BJdSE, RP), pp. 686–691.
- SEKE-2015-WuCZX #c++ #developer #empirical #library
- How do developers use C++ libraries? An empirical study (DW, LC, YZ, BX), pp. 260–265.
- SIGIR-2015-DaiKC #distributed #random
- How Random Decisions Affect Selective Distributed Search (ZD, YK, JC), pp. 771–774.
- SIGIR-2015-KellyA #behaviour #case study #experience #user interface
- How many results per page?: A Study of SERP Size, Search Behavior and User Experience (DK, LA), pp. 183–192.
- SPLC-2015-WozniakC #product line
- How automotive engineering is taking product line engineering to the extreme (LW, PC), pp. 327–336.
- OOPSLA-2015-LopesO #java #source code
- How scale affects structure in Java programs (CVL, JO), pp. 675–694.
- REFSQ-2015-Liskin #communication #requirements
- How Artifacts Support and Impede Requirements Communication (OL), pp. 132–147.
- ASE-2015-GroceAJM #verification
- How Verified is My Code? Falsification-Driven Verification (T) (AG, IA, CJ, PEM), pp. 737–748.
- ASE-2015-VasquezLVP #database #developer #documentation #source code
- How do Developers Document Database Usages in Source Code? (N) (MLV, BL, CV, DP), pp. 36–41.
- ESEC-FSE-2015-BellerGPZ #developer #ide #why
- When, how, and why developers (do not) test in their IDEs (MB, GG, AP, AZ), pp. 179–190.
- ESEC-FSE-2015-LoNZ #re-engineering #research
- How practitioners perceive the relevance of software engineering research (DL, NN, TZ), pp. 415–425.
- ESEC-FSE-2015-SadowskiSE #case study #developer
- How developers search for code: a case study (CS, KTS, SGE), pp. 191–201.
- ESEC-FSE-2015-SaraivaBZ #developer #n-gram
- Products, developers, and milestones: how should I build my N-Gram language model (JS, CB, TZ), pp. 998–1001.
- GTTSE-2015-Gonzalez-Perez #ontology #re-engineering
- How Ontologies Can Help in Software Engineering (CGP), pp. 26–44.
- ICSE-v1-2015-MorenoBPOM #question
- How Can I Use This Method? (LM, GB, MDP, RO, AM), pp. 880–890.
- ICSE-v1-2015-WatermanNA #agile #architecture
- How Much Up-Front? A Grounded theory of Agile Architecture (MW, JN, GA), pp. 347–357.
- ICSE-v2-2015-BellerGZ #developer #question
- How (Much) Do Developers Test? (MB, GG, AZ), pp. 559–562.
- ICSE-v2-2015-CzerwonkaGT #code review #debugging #overview
- Code Reviews Do Not Find Bugs. How the Current Code Review Best Practice Slows Us Down (JC, MG, JT), pp. 27–28.
- ICSE-v2-2015-ShepherdDP #re-engineering #research
- How and When to Transfer Software Engineering Research via Extensions (DCS, KD, LLP), pp. 239–240.
- CASE-2015-DijkmanRB #automation
- How to assess sustainability in automated manufacturing (TJD, JMR, NB), pp. 1351–1356.
- CASE-2015-PanZQ #clustering #process #tool support
- How to start-up dual-arm cluster tools involving a wafer revisiting process (CP, MZ, YQ), pp. 1194–1199.
- SOSP-2015-TsaiZRJZP #file system
- How to get more value from your file system directory cache (CcT, YZ, JR, YJ, TZ, DEP), pp. 441–456.
- STOC-2015-HalldorssonT #graph #question
- How Well Can Graphs Represent Wireless Interference? (MMH, TT), pp. 635–644.
- ISSTA-2015-WangZT #case study #execution #experience #symbolic computation #testing
- Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE (XW, LZ, PT), pp. 199–210.
- LICS-2015-CarayolS #game studies #question
- How Good Is a Strategy in a Game with Nature? (AC, OS), pp. 609–620.
- ECSA-2014-CaraccioloLN #architecture #quality #question #requirements #validation
- How Do Software Architects Specify and Validate Quality Requirements? (AC, MFL, ON), pp. 374–389.
- DocEng-2014-HailpernVD #named #what
- Pagination: it’s what you say, not how long it takes to say it (JMH, NDV, MD), pp. 147–156.
- DRR-2014-LundRW #fault #multi #question
- How well does multiple OCR error correction generalize? (WBL, EKR, DDW), p. ?–13.
- HT-2014-CunhaMGCA #social
- How you post is who you are: characterizing google+ status updates across social groups (EC, GM, MAG, CC, VA), pp. 212–217.
- PODS-2014-Libkin #semistructured data #what
- Incomplete data: what went wrong, and how to fix it (LL), pp. 1–13.
- SIGMOD-2014-AilamakiLTPP #multi
- How to stop under-utilization and love multicores (AA, EL, PT, DP, IP), pp. 189–192.
- SIGMOD-2014-Sedlar #compilation
- How i learned to stop worrying and love compilers (ES), pp. 1–2.
- EDM-2014-PeroH #detection #programming #question #source code #student
- How patterns in source codes of students can help in detection of their programming skills? (SP, TH), pp. 371–372.
- CSMR-WCRE-2014-GeSDM #query #recommendation
- How the Sando search tool recommends queries (XG, DCS, KD, ERMH), pp. 425–428.
- ICPC-2014-PanichellaCPO #empirical #evolution
- How the evolution of emerging collaborations relates to code changes: an empirical study (SP, GC, MDP, RO), pp. 177–188.
- ICPC-2014-VasquezBPOP #android #api #case study #stack overflow
- How do API changes trigger stack overflow discussions? a study on the Android SDK (MLV, GB, MDP, RO, DP), pp. 83–94.
- ICSME-2014-CachoBAPGCSCFG #behaviour #c# #case study #exception #java
- How Does Exception Handling Behavior Evolve? An Exploratory Study in Java and C# Applications (NC, EAB, JA, FP, AFG, TC, ES, AC, TF, IG), pp. 31–40.
- ICSME-2014-PanichellaBPCA #developer
- How Developers’ Collaborations Identified from Different Sources Tell Us about Code Changes (SP, GB, MDP, GC, GA), pp. 251–260.
- ICSME-2014-SahinTMPC #energy #obfuscation #question
- How Does Code Obfuscation Impact Energy Usage? (CS, PT, RM, ZP, JC), pp. 131–140.
- MSR-2014-TiarksM #development #mobile #question #tutorial
- How does a typical tutorial for mobile development look like? (RT, WM), pp. 272–281.
- DLT-2014-EngelfrietMS #top-down #transducer
- How to Remove the Look-Ahead of Top-Down Tree Transducers (JE, SM, HS), pp. 103–115.
- ICALP-v1-2014-HohnMW #cost analysis #scheduling
- How Unsplittable-Flow-Covering Helps Scheduling with Job-Dependent Cost Functions (WH, JM, AW), pp. 625–636.
- IFM-2014-DrossopoulouN #policy #semantics
- How to Break the Bank: Semantics of Capability Policies (SD, JN), pp. 18–35.
- FLOPS-2014-Parys #question
- How Many Numbers Can a λ-Term Contain? (PP), pp. 302–318.
- ICFP-2014-McBride #order
- How to keep your neighbours in order (CTM), pp. 297–309.
- ICFP-2014-Winograd-CortH #first-order
- Settable and non-interfering signal functions for FRP: how a first-order switch is more than enough (DWC, PH), pp. 213–225.
- CHI-PLAY-2014-CheungZN #experience #game studies
- The first hour experience: how the initial play can engage (or lose) new players (GKC, TZ0, NN), pp. 57–66.
- CHI-PLAY-2014-VandenBerghe #game studies #motivation
- Engines of play: how player motivation changes over time (JV), p. 476.
- FDG-2014-CharbonneauBBML #game studies
- Dance Enhanced: Investigating how earning content through exertion impacts dance game enjoyment (EC, SB, JNB, F'M, JJLJ).
- VS-Games-2014-ChristouM #difference #game studies #question
- Aliens versus Humans: Do Avatars Make a Difference in How We Play the Game? (CC, DM), pp. 1–7.
- CHI-2014-AthukoralaLKJOTJ #behaviour #mobile
- How carat affects user behavior: implications for mobile battery awareness applications (KA, EL, MvK, AJ, AJO, ST, GJ), pp. 1029–1038.
- CHI-2014-BensonK #web #what #why
- End-users publishing structured information on the web: an observational study of what, why, and how (EB, DRK), pp. 1265–1274.
- CHI-2014-BrumbyCCF #behaviour #question #visual notation #what
- How does knowing what you are looking for change visual search behavior? (DPB, ALC, JC, BF), pp. 3895–3898.
- CHI-2014-DiSalvoLLJK #design #human-computer #matter
- Making public things: how HCI design can express matters of concern (CFD, JL, TL, TJ, TK), pp. 2397–2406.
- CHI-2014-JotaLWJ #scalability
- Let’s kick it: how to stop wasting the bottom third of your large screen display (RJ, PL, DW, JAJ), pp. 1411–1414.
- CHI-2014-OduorNJHPH #communication #product line
- How technology supports family communication in rural, suburban, and urban kenya (EO, CN, TKJ, KH, CP, SH), pp. 2705–2714.
- CHI-2014-PatilSKL #feedback
- Reflection or action?: how feedback and control affect location sharing decisions (SP, RS, AK, AJL), pp. 101–110.
- CHI-2014-PritchardVBTO
- Digitally driven: how location based services impact the work practices of London bus drivers (GWP, JV, PB, LT, PO), pp. 3617–3626.
- CHI-2014-Schoenebeck #social #social media #twitter #why
- Giving up Twitter for Lent: how and why we take breaks from social media (SYS), pp. 773–782.
- CHI-2014-VanieaRW #case study #experience #security
- Betrayed by updates: how negative experiences affect future security (KV, EJR, RW), pp. 2671–2674.
- CHI-2014-WeigelMS #comprehension #mobile #people
- More than touch: understanding how people use skin as an input surface for mobile computing (MW, VM, JS), pp. 179–188.
- CSCW-2014-BossenJ #overview
- How physicians “achieve overview”: a case-based study in a hospital ward (CB, LGJ), pp. 257–268.
- CSCW-2014-BrownELQM #interactive
- Tracking serendipitous interactions: how individual cultures shape the office (CB, CE, IL, DQ, CM), pp. 1072–1081.
- CSCW-2014-GaoXCF #multi
- How beliefs about the presence of machine translation impact multilingual collaborations (GG, BX, DC, SRF), pp. 1549–1560.
- CSCW-2014-HemphillR #twitter
- Tweet acts: how constituents lobby congress via Twitter (LH, AJR), pp. 1200–1210.
- CSCW-2014-LivingstonGMB
- How players value their characters in world of warcraft (IJL, CG, RLM, MB), pp. 1333–1343.
- CSCW-2014-MaruyamaRDSF #hybrid #twitter
- Hybrid media consumption: how tweeting during a televised political debate influences the vote decision (MM, SPR, SKD, BS, HAF), pp. 1422–1432.
- CSCW-2014-MatthiesenBP #development #quote
- “Figure out how to code with the hands of others”: recognizing cultural blind spots in global software development (SM, PB, LMP), pp. 1107–1119.
- CSCW-2014-Ribes #framework #research #scalability
- Ethnography of scaling, or, how to a fit a national research infrastructure in the room (DR), pp. 158–170.
- CSCW-2014-SauppeM #communication #coordination #social
- How social cues shape task coordination and communication (AS, BM), pp. 97–108.
- CSCW-2014-ShiltonKF #social
- How to see values in social computing: methods for studying values dimensions (KS, JAK, KRF), pp. 426–435.
- CSCW-2014-VasilescuSDF #community #open source #social
- How social Q&A sites are changing knowledge sharing in open source software communities (BV, AS, PTD, VF), pp. 342–354.
- CSCW-2014-VitakK #facebook #people #process #quote
- “You can’t block people offline”: examining how facebook’s affordances shape the disclosure process (JV, JK), pp. 461–474.
- DUXU-DI-2014-SchusterHBRJ #experience #using
- Diving in? How Users Experience Virtual Environments Using the Virtual Theatre (KS, MH, UB, AR, SJ), pp. 636–646.
- DUXU-ELAS-2014-SchmeilS #health #quote
- “How am I Doing?” — Personifying Health through Animated Characters (AS, LSS), pp. 91–102.
- DUXU-ELAS-2014-Spinillo #usability
- How Do Patient Information Leaflets Aid Medicine Usage? A Proposal for Assessing Usability of Medicine Inserts (CGS), pp. 115–124.
- DUXU-TMT-2014-Bastos #design #realtime
- Designing Real-Time: On How Events Affect Audiovisual Narrative (MB), pp. 509–518.
- DUXU-TMT-2014-SchmuntzschF #design #smarttech
- How Two become One — Creating Synergy Effects by Applying the Joint Interview Method to Design Wearable Technology (US, LHF), pp. 173–184.
- HCI-AS-2014-LouLP #distance #game studies
- Distance Effect: Where You Stand Determines How Promptly You Interact with Game (XL, AXL, RP), pp. 614–621.
- HIMI-DE-2014-OkaTM
- Selecting a Function by How Characteristic Shapes Afford Users (MO, MT, HM), pp. 621–628.
- SCSM-2014-FraidakiPD #information management #process #social #social media
- Living in the Era of Social Media: How the Different Types of Social Media May Affect Information Acquisition Process (KF, KP, GID), pp. 178–185.
- SCSM-2014-MendesFFC #analysis #classification #social #using
- How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
- SCSM-2014-WaltherT #communication #relational #self
- Inventing Partners in Computer-Mediated Communication: How CMC Sustains Self-fulfilling Prophecies and Relational Attributions (JBW, STT), pp. 517–527.
- VISSOFT-2014-BarikLCM #approach #compilation #developer #visualisation
- How Developers Visualize Compiler Messages: A Foundational Approach to Notification Construction (TB, KL, SC, ERMH), pp. 87–96.
- CAiSE-2014-BastarricaMRSV #process #quality #question
- How does Quality of Formalized Software Processes Affect Adoption? (MCB, GM, RR, LS, RV), pp. 226–240.
- EDOC-2014-Weber #comprehension #modelling #process #towards
- Investigating the Process of Process Modeling: Towards an in-Depth Understanding of How Process Models Are Created (BW), p. 180.
- CIKM-2014-GrbovicHKM #category theory #email
- How Many Folders Do You Really Need?: Classifying Email into a Handful of Categories (MG, GH, ZSK, YM), pp. 869–878.
- CIKM-2014-RenTOS #people #scalability #web
- How People Use the Web in Large Indoor Spaces (YR, MT, KO, MS), pp. 1879–1882.
- KEOD-2014-AzaiezA #analysis #question #towards
- How to Guarantee Analysis Results Coherence after Data Warehouse Schema Changes Propagation towards Data Marts? (NA, JA), pp. 428–435.
- KEOD-2014-GonenFEBWZP #maintenance #modelling #ontology #question
- Maintaining SOA Systems of the Future — How Can Ontological Modeling Help? (BG, XF, EES, SB, NW, AZ, IP), pp. 376–381.
- KR-2014-BelleL
- How to Progress Beliefs in Continuous Domains (VB, HJL).
- KR-2014-Dyrkolbotn #set #using
- How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
- SEKE-2014-HegdeW #developer #overview #perspective
- How to Enhance the Creativity of Software Developers: A Systematic Literature Review (RH, GSW), pp. 229–234.
- SEKE-2014-HuangCWC #interactive #question #testing
- How to Do Tie-breaking in Prioritization of Interaction Test Suites? (RH, JC, RW, DC), pp. 121–125.
- SIGIR-2014-UstaAVOU #analysis #education #learning #student
- How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
- SIGIR-2014-Williams #big data
- The data revolution: how companies are transforming with big data (HEW), pp. 525–526.
- PLATEAU-2014-SadowskiY #concurrent #detection #developer #tool support
- How Developers Use Data Race Detection Tools (CS, JY), pp. 43–51.
- RE-2014-Daneva #approach #game studies #multi #online #requirements
- How practitioners approach gameplay requirements? An exploration into the context of massive multiplayer online role-playing games (MD), pp. 3–12.
- RE-2014-GuzmanM #analysis #fine-grained #sentiment
- How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews (EG, WM), pp. 153–162.
- FSE-2014-HigoK #case study #functional #java #source code
- How should we measure functional sameness from program source code? an exploratory study on Java methods (YH, SK), pp. 294–305.
- FSE-2014-SeoK #testing
- How we get there: a context-guided search strategy in concolic testing (HS, SK), pp. 413–424.
- ICSE-2014-BrindescuCSD #distributed #question #version control
- How do centralized and distributed version control systems impact software changes? (CB, MC, SS, DD), pp. 322–333.
- ICSE-2014-EndrikatHRS #api #documentation #question #static typing #type system #usability
- How do API documentation and static typing affect API usability? (SE, SH, RR, AS), pp. 632–642.
- ICSE-2014-KhadkaBSJH #legacy #question
- How do professionals perceive legacy systems and software modernization? (RK, BVB, AS, SJ, JH), pp. 36–47.
- ICSE-2014-MinkuY #estimation #question #using
- How to make best use of cross-company data in software effort estimation? (LLM, XY), pp. 446–456.
- ICSE-2014-Murphy-HillZN #development #game studies #quality #question #video
- Cowboys, ankle sprains, and keepers of quality: how is video game development different from software development? (ERMH, TZ, NN), pp. 1–11.
- ICSE-2014-SingerFS #developer #re-engineering #twitter #using
- Software engineering at the speed of light: how developers stay current using twitter (LS, FMFF, MADS), pp. 211–221.
- SAC-2014-KolbZWR #design #distance #empirical #modelling #process #social
- How social distance of process designers affects the process of process modeling: insights from a controlled experiment (JK, MZ, BW, MR), pp. 1364–1370.
- SAC-2014-SaraivaS #behaviour
- Choosing my partners based on how they will evaluate my behavior (ECdRCS, VTdS), pp. 781–783.
- SLE-2014-SloaneRH
- Respect Your Parents: How Attribution and Rewriting Can Get Along (AMS, MR, LGCH), pp. 191–210.
- DATE-2014-Bautista-GomezCCDFGPRR #named #reliability
- GPGPUs: How to combine high computational power with high reliability (LABG, FC, LC, ND, BF, SG, KP, PR, MSR), pp. 1–9.
- DATE-2014-JaksicC #energy #protocol
- DRAM-based coherent caches and how to take advantage of the coherence protocol to reduce the refresh energy (ZJ, RC), pp. 1–4.
- DATE-2014-RuhrmairSB
- Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks (UR, US, WB), pp. 1–4.
- LCTES-2014-HenryAMM #encoding #execution #modulo theories #optimisation #semantics #worst-case
- How to compute worst-case execution time by optimization modulo theory and a clever encoding of program semantics (JH, MA, DM, CM), pp. 43–52.
- STOC-2014-KalaiRR #power of #proving
- How to delegate computations: the power of no-signaling proofs (YTK, RR, RDR), pp. 485–494.
- STOC-2014-SahaiW #encryption #obfuscation
- How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
- IJCAR-2014-Cortier #logic
- Electronic Voting: How Logic Can Help (VC), pp. 16–25.
- TAP-2014-PetiotKGJ #deduction #generative #specification #testing #verification
- How Test Generation Helps Software Specification and Deductive Verification in Frama-C (GP, NK, AG, JJ), pp. 204–211.
- DRR-2013-SchusterHME #documentation #rule-based
- Rule-based versus training-based extraction of index terms from business documents: how to combine the results (DS, MH, KM, DE).
- HT-2013-ChengC
- How annotation styles influence content and preferences (JC, DC), pp. 214–218.
- HT-2013-LiangCCK #modelling #social #social media
- How big is the crowd?: event and location based population modeling in social media (YL, JC, ZC, KYK), pp. 99–108.
- JCDL-2013-JiangNHJ #question
- Mendeley group as a new source of interdisciplinarity study: how do disciplines interact on mendeley? (JJ, CN, DH, WJ), pp. 135–138.
- VLDB-2013-Franceschini #approach #big data #open source
- How to maximize the value of big data with the open source SpagoBI suite through a comprehensive approach (MF), pp. 1170–1171.
- SIGITE-2013-Esfahani
- Digit shift: leverage or get leveled: how the business and academia can collaborate (SE), pp. 1–2.
- SIGITE-2013-SabinLMPPR #women
- Girls in IT: how to develop talent and leverage support (MS, DL, HM, KPP, SP, SR), pp. 61–62.
- CSMR-2013-PanichellaMMPOPL #traceability #using
- When and How Using Structural Information to Improve IR-Based Traceability Recovery (AP, CM, EM, DP, RO, DP, ADL), pp. 199–208.
- ICSM-2013-AbdeenSS #design #interface
- How We Design Interfaces, and How to Assess It (HA, HAS, OS), pp. 80–89.
- ICSM-2013-Harder #developer #evolution #multi
- How Multiple Developers Affect the Evolution of Code Clones (JH), pp. 30–39.
- ICSM-2013-Yamashita #case study #comparative #maintenance #smell
- How Good Are Code Smells for Evaluating Software Maintainability? Results from a Comparative Case Study (AY), pp. 566–571.
- ICSM-2013-ZhangMZKH #maintenance #metric #question
- How Does Context Affect the Distribution of Software Maintainability Metrics? (FZ, AM, YZ, FK, AEH), pp. 350–359.
- MSR-2013-JiangAG #case study #kernel #linux #performance
- Will my patch make it? and how fast?: case study on the Linux kernel (YJ, BA, DMG), pp. 101–110.
- MSR-2013-NadiDTHL #linux #question #variability #what
- Linux variability anomalies: what causes them and how do they get fixed? (SN, CD, RT, RCH, DL), pp. 111–120.
- WCRE-2013-LiXPZ #developer #question #what
- What help do developers seek, when and how? (HL, ZX, XP, WZ), pp. 142–151.
- WCRE-2013-SohKGA #comprehension #developer #maintenance #process #towards
- Towards understanding how developers spend their effort during maintenance activities (ZS, FK, YGG, GA), pp. 152–161.
- CIAA-J-2012-IbarraT13 #automaton #multi
- How to synchronize the Heads of a Multitape Automaton (OHI, NQT), pp. 799–814.
- ICALP-v1-2013-BravermanOV #question #streaming
- How Hard Is Counting Triangles in the Streaming Model? (VB, RO, DV), pp. 244–254.
- LATA-2013-ChatterjeeCR
- How to Travel between Languages (KC, SC, SR), pp. 214–225.
- DiGRA-2013-Tanenbaum #game studies
- How I Learned to Stop Worrying and Love the Gamer: Reframing Subversive Play in Story-Based Games (JGT0).
- VS-Games-2013-FerrerPRFQ #artificial reality #education #game studies #motivation #question #usability
- How Does Usability Impact Motivation in Augmented Reality Serious Games for Education? (VF, AP, HRA, CF, JQ), pp. 1–8.
- CHI-2013-AceitunoCR
- How low can you go?: human limits in small unidirectional mouse movements (JA, GC, NR), pp. 1383–1386.
- CHI-2013-BeyerKSHB #behaviour
- Squaring the circle: how framing influences user behavior around a seamless cylindrical display (GB, FK, MS, IH, AB), pp. 1729–1738.
- CHI-2013-ChongG
- How groups of users associate wireless devices (MKC, HWG), pp. 1559–1568.
- CHI-2013-GibsonH #question #women
- Digital motherhood: how does technology help new mothers? (LG, VLH), pp. 313–322.
- CHI-2013-HuangZNHP
- Mastering the art of war: how patterns of gameplay influence skill in Halo (JH, TZ, NN, CH, BCP), pp. 695–704.
- CHI-2013-IsaacsKWLHW
- Echoes from the past: how technology mediated reflection improves well-being (EI, AK, AW, TL, VH, SW), pp. 1071–1080.
- CHI-2013-JotaNDW #case study #latency #performance
- How fast is fast enough?: a study of the effects of latency in direct-touch pointing tasks (RJ, AN, PD, DW), pp. 2291–2300.
- CHI-2013-KramerKKWB #behaviour #developer #ide #navigation #tool support
- How tools in IDEs shape developers’ navigation behavior (JPK, TK, JK, MW, JOB), pp. 3073–3082.
- CHI-2013-LeahuCM #category theory #matter
- How categories come to matter (LL, MC, WM), pp. 3331–3334.
- CHI-2013-LinH #image #modelling #people
- Modeling how people extract color themes from images (SL, PH), pp. 3101–3110.
- CHI-2013-Mirza-BabaeiNGCF #game studies #research #testing
- How does it play better?: exploring user testing and biometric storyboards in games user research (PMB, LEN, JG, NC, GF), pp. 1499–1508.
- CHI-2013-NeustaedterBM #energy #process #product line
- Everyday activities and energy consumption: how families understand the relationship (CN, LB, AM), pp. 1183–1192.
- CHI-2013-RonenRJT #question
- Taking data exposure into account: how does it affect the choice of sign-in accounts? (SR, OR, MJ, DT), pp. 3423–3426.
- CHI-2013-VinesCWMO #configuration management #design #people
- Configuring participation: on how we involve people in design (JV, RC, PCW, JCM, PO), pp. 429–438.
- CHI-2013-WycheC #design #quote
- “I want to imagine how that place looks”: designing technologies to support connectivity between africans living abroad and home (SW, MC), pp. 2755–2764.
- CSCW-2013-BuhlerNH #chat #video #why
- How and why teenagers use video chat (TB, CN, SH), pp. 759–768.
- CSCW-2013-DoucetteGMNS #collaboration
- Sometimes when we touch: how arm embodiments change reaching and collaboration on digital tables (AD, CG, RLM, MAN, SS), pp. 193–202.
- CSCW-2013-Franklin-Hodge #internet
- Digital democracy: how the internet re-elected a president (JFH), pp. 3–4.
- CSCW-2013-GaoHZ #network #social
- Closure vs. structural holes: how social network information and culture affect choice of collaborators (GG, PJH, CZ), pp. 5–18.
- CSCW-2013-SchneiderSPD #ad hoc #experience #online
- Arguments about deletion: how experience improves the acceptability of arguments in ad-hoc online task groups (JS, KS, AP, SD), pp. 1069–1080.
- CSCW-2013-TeevanH #communication #comprehension
- Understanding how the projection of availability state impacts the reception incoming communication (JT, AH), pp. 753–758.
- CSCW-2013-YamashitaEIH #collaboration #multi
- Lost in transmittance: how transmission lag enhances and deteriorates multilingual collaboration (NY, AE, TI, AMJH), pp. 923–934.
- DHM-SET-2013-Lueder
- How Could This Have Happened? Unintentional Injuries of Young Children at Home (RL), pp. 348–354.
- DHM-SET-2013-SaparovaBLKMY #health #information management #problem #question #usability #what
- Usability Problems in Patient- and Clinician-Oriented Health Information Systems: What Are They and How Do They Differ? (DS, JB, YL, FK, YM, BY), pp. 276–285.
- DUXU-CXC-2013-MouraVCBSTLK #exclamation #game studies #learning #mobile
- Luz, Câmera, Libras!: How a Mobile Game Can Improve the Learning of Sign Languages (GdSM, LAV, AC, FB, DdS, JMXNT, CWML, JK), pp. 266–275.
- DUXU-CXC-2013-Stevens #behaviour #gamification #social
- How Gamification and Behavior Science Can Drive Social Change One Employee at a Time (SHS), pp. 597–601.
- DUXU-PMT-2013-Flanagan #feedback #interface
- Haptic Interface Aesthetics — “Feedback Loops, Live Coding and How to Harness the Potential of Embodied Estrangement in Artistic Practices and Aesthetic Theories within Interface Culture” (PJF), pp. 58–67.
- DUXU-PMT-2013-KangS #case study #design #process
- How to Observe, Share and Apply in Design Process? — Focusing on International Design Workshops as a Case Study (NK, HS), pp. 498–505.
- DUXU-PMT-2013-MichailidouSL #experience #user interface
- How to Create a User Experience Story (IM, CvS, UL), pp. 554–563.
- DUXU-WM-2013-SauckenML #approach #case study #design #experience #metaprogramming #user interface
- How to Design Experiences: Macro UX versus Micro UX Approach (CvS, IM, UL), pp. 130–139.
- HCI-AS-2013-LekkasGTMS #behaviour #component #experience #learning #process
- Personality and Emotion as Determinants of the Learning Experience: How Affective Behavior Interacts with Various Components of the Learning Process (ZL, PG, NT, CM, GS), pp. 418–427.
- ICEIS-v1-2013-SecaM #question
- IT applied to Public Lighting Management — How IT Can Improve Public Lighting Management? (NS, FM), pp. 513–518.
- ICEIS-v3-2013-VielMPT #interactive #learning #multi #student
- How are they Watching Me — Learning from Student Interactions with Multimedia Objects Captured from Classroom Presentations (CCV, ELM, MdGCP, CACT), pp. 5–16.
- CIKM-2013-ChengAH #question
- How fresh do you want your search results? (SC, AA, VH), pp. 1271–1280.
- CIKM-2013-DasLM #wiki
- Manipulation among the arbiters of collective intelligence: how wikipedia administrators mold public opinion (SD, AL, MMI), pp. 1097–1106.
- CIKM-2013-ValkanasG #web
- How the live web feels about events (GV, DG), pp. 639–648.
- ECIR-2013-NieblerSBKSH #social
- How Tagging Pragmatics Influence Tag Sense Discovery in Social Annotation Systems (TN, PS, DB, CK, MS, AH), pp. 86–97.
- KDD-2013-Marty #security #visual notation
- Cyber security: how visual analytics unlock insight (RM), p. 1139.
- KDD-2013-ZhangWNLWY #named #network #predict #social #visualisation
- LAFT-Explorer: inferring, visualizing and predicting how your social network expands (JZ, CW, YN, YL, JW, PSY), pp. 1510–1513.
- KDIR-KMIS-2013-BerrahouBDR #documentation #question
- How to Extract Unit of Measure in Scientific Documents? (SLB, PB, JDB, MR), pp. 249–256.
- RecSys-2013-DzyaburaT #recommendation
- Not by search alone: how recommendations complement search results (DD, AT), pp. 371–374.
- SEKE-2013-BassoWPO #question #reuse #tool support
- How do You Execute Reuse Tasks Among Tools? (FPB, CMLW, RMP, TCO), pp. 721–726.
- SEKE-2013-Perez-CastilloFPC #modelling #process #question #refactoring
- How Does Refactoring Affect Understandability of Business Process Models? (RPC, MFR, MP, DC), pp. 644–649.
- SEKE-2013-WangWMX #analysis #performance
- How Does Acquirer’s Participation Influence Performance of Software Projects: A Quantitative Analysis (YW, JW, JM, BX), pp. 537–541.
- SIGIR-2013-AzzopardiKB #behaviour #query
- How query cost affects search behavior (LA, DK, KB), pp. 23–32.
- SIGIR-2013-JiangJH #fault #query
- How do users respond to voice input errors?: lexical and phonetic query reformulation in voice search (JJ, WJ, DH), pp. 143–152.
- SIGIR-2013-Wu #behaviour #online #predict #using
- How far will you go?: characterizing and predicting online search stopping behavior using information scent and need for cognition (WCW), p. 1149.
- SKY-2013-Gomes #ontology #recommendation #representation #using
- Representing Knowledge using Ontologies: How Search, Browse and Recommendation Can Be Performed (PG), pp. 1–3.
- PLEASE-2013-UrliMBC #multi #product line #question
- How to exploit domain knowledge in Multiple Software Product Lines? (SU, SM, MBF, PC), pp. 13–16.
- PLDI-2013-ApinisSV #equation
- How to combine widening and narrowing for non-monotonic systems of equations (KA, HS, VV), pp. 377–386.
- POPL-2013-Myers #distributed
- How languages can save distributed computing (ACM), pp. 315–316.
- RE-2013-TodoranSG #case study #elicitation #requirements
- How cloud providers elicit consumer requirements: An exploratory study of nineteen companies (IT, NS, MG), pp. 105–114.
- ICSE-2013-HerzigJZ #classification #debugging #predict
- It’s not a bug, it’s a feature: how misclassification impacts bug prediction (KH, SJ, AZ), pp. 392–401.
- ICSE-2013-PanichellaDOPPL #algorithm #approach #effectiveness #modelling #re-engineering #search-based #topic
- How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms (AP, BD, RO, MDP, DP, ADL), pp. 522–531.
- ICSE-2013-RahmanD #metric #process #why
- How, and why, process metrics are better (FR, PTD), pp. 432–441.
- DATE-2013-AitkenFKRR #analysis #question #reliability
- Reliability analysis reloaded: how will we survive? (RA, GF, ZTK, FR, MSR), pp. 358–367.
- HPCA-2013-RobatmiliLEGSPBK #architecture #effectiveness #manycore #predict
- How to implement effective prediction and forwarding for fusable dynamic multicore architectures (BR, DL, HE, MSSG, AS, AP, DB, SWK), pp. 460–471.
- STOC-2013-HardtW #adaptation #linear #question #robust #sketching
- How robust are linear sketches to adaptive inputs? (MH, DPW), pp. 121–130.
- CAV-2013-ChevalCP #privacy
- Lengths May Break Privacy — Or How to Check for Equivalences with Length (VC, VC, AP), pp. 708–723.
- DocEng-2012-MoulderM #layout #learning
- Learning how to trade off aesthetic criteria in layout (PM, KM), pp. 33–36.
- HT-2012-Staab
- How to do things with triples (SS), pp. 1–2.
- JCDL-2012-GozaliKS #people #question
- How do people organize their photos in each event and how does it affect storytelling, searching and interpretation tasks? (JPG, MYK, HS), pp. 315–324.
- SIGMOD-2012-VenkataramaniABCCDDFGHKLMPP #facebook #graph #named #social
- TAO: how facebook serves the social graph (VV, ZA, NB, GCI, PC, PD, HD, JF, AG, JH, SK, NL, MM, DP, LP), pp. 791–792.
- TPDL-2012-SalahEldeenN #question #social #social media
- Losing My Revolution: How Many Resources Shared on Social Media Have Been Lost? (HS, MLN), pp. 125–137.
- VLDB-2012-BenderFJKKMMSSZ
- Don’t Thrash: How to Cache Your Hash on Flash (MAB, MFC, RJ, RK, BCK, DM, PM, PS, RPS, EZ), pp. 1627–1637.
- VLDB-2012-UpadhyayaBS #in the cloud #optimisation
- How to Price Shared Optimizations in the Cloud (PU, MB, DS), pp. 562–573.
- ITiCSE-2012-HershkovichH #education #tool support
- How innovative technology tools can be used to create new methodology for teaching knowledge (EH, BH), p. 387.
- ITiCSE-2012-Luxton-ReillyDPS #learning #process #student
- Activities, affordances and attitude: how student-generated questions assist learning (ALR, PD, BP, RS), pp. 4–9.
- TFPIE-2012-PageG
- How Computers Work: Computational Thinking for Everyone (RP, RG), pp. 1–19.
- CSMR-2012-OlszakJ #composition #concept #legacy #question
- Modularization of Legacy Features by Relocation and Reconceptualization: How Much is Enough? (AO, BNJ), pp. 171–180.
- ICSM-2012-BiegelBHD #developer #order
- The Order of Things: How developers sort fields and methods (BB, FB, WH, SD), pp. 88–97.
- ICSM-2012-HigoK #consistency #detection #nondeterminism
- How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments (YH, SK), pp. 222–231.
- MSR-2012-Rodriguez-BustosA #distributed #open source #version control
- How Distributed Version Control Systems impact open source software projects (CRB, JA), pp. 36–39.
- WCRE-2012-GarzonL #automation #tool support
- Exploring How to Develop Transformations and Tools for Automated Umplification (MG, TCL), pp. 491–494.
- CIAA-2012-IbarraT #automaton #multi
- How to Synchronize the Heads of a Multitape Automaton (OHI, NQT), pp. 192–204.
- CIG-2012-BauckhageKSTDC #empirical #game studies
- How players lose interest in playing a game: An empirical study based on distributions of total playing times (CB, KK, RS, CT, AD, AC), pp. 139–146.
- FDG-2012-GualeniJC #design #game studies #process
- How psychophysiology can aid the design process of casual games: a tale of stress, facial muscles, and paper beasts (SG, DPJ, LC), pp. 149–155.
- ICGT-2012-RuscioIP #co-evolution #ecosystem #evolution #metamodelling
- Evolutionary Togetherness: How to Manage Coupled Evolution in Metamodeling Ecosystems (DDR, LI, AP), pp. 20–37.
- CHI-2012-BatemanTW #behaviour #comparison
- The search dashboard: how reflection and comparison impact search behavior (SB, JT, RWW), pp. 1785–1794.
- CHI-2012-BergmanWSNR #navigation
- How do we find personal files?: the effect of OS, presentation & depth on file navigation (OB, SW, MS, RN, AR), pp. 2977–2980.
- CHI-2012-BrynjarsdottirHPBDS #persuasion
- Sustainably unpersuaded: how persuasion narrows our vision of sustainability (HB, MH, JP, EB, CFD, PS), pp. 947–956.
- CHI-2012-HenneckeMB #interactive #pointer
- How screen transitions influence touch and pointer interaction across angled display arrangements (FH, WM, AB), pp. 209–212.
- CHI-2012-HourcadeB #visual notation
- How small can you go?: analyzing the effect of visual angle in pointing tasks (JPH, NEBR), pp. 213–216.
- CHI-2012-JianuL #evaluation #user interface
- An evaluation of how small user interface changes can improve scientists’ analytic strategies (RJ, DHL), pp. 2953–2962.
- CHI-2012-KuhnMSCLQD #multi #student
- How students find, evaluate and utilize peer-collected annotated multimedia data in science inquiry with zydeco (AK, BM, SS, CC, WTL, CQ, ID), pp. 3061–3070.
- CHI-2012-MatthewsJW #design #experience #question #user interface
- How do designers and user experience professionals actually perceive and use personas? (TM, TKJ, SW), pp. 1219–1228.
- CHI-2012-ParkBN #question
- How do couples use CheekTouch over phone calls? (YP, SHB, TJN), pp. 763–766.
- CHI-2012-XuBRTM #communication #learning #towards
- Learning how to feel again: towards affective workplace presence and communication technologies (AX, JTB, EGR, TT, WvM), pp. 839–848.
- CHI-2012-ZhaoSC #facebook
- It’s complicated: how romantic partners use facebook (XZ, VSS, DC), pp. 771–780.
- CSCW-2012-BenjaminBBGF #interactive
- Impression management work: how seniors with chronic pain address disruptions in their interactions (AB, JPB, RB, DG, AF), pp. 799–808.
- CSCW-2012-NguyenF #analysis
- How did you feel during our conversation?: retrospective analysis of intercultural and same-culture instant messaging conversations (DTN, SRF), pp. 117–126.
- CSCW-2012-SohnLZDT #coordination
- An examination of how households share and coordinate the completion of errands (TS, LL, SZ, DD, KNT), pp. 729–738.
- CSCW-2012-SosikZC
- See friendship, sort of: how conversation and digital traces might support reflection on friendships (VSS, XZ, DC), pp. 1145–1154.
- CSCW-2012-StarbirdP #information management
- (How) will the revolution be retweeted?: information diffusion and the 2011 Egyptian uprising (KS, LP), pp. 7–16.
- CSCW-2012-WycheG #case study #communication #product line #quote
- “This is how we do it in my country”: a study of computer-mediated family communication among Kenyan migrants in the United States (SW, REG), pp. 87–96.
- CSCW-2012-ZhaoHG #community #online #people #self
- How and to whom people share: the role of culture in self-disclosure in online communities (CZ, PJH, GG), pp. 67–76.
- CIKM-2012-CosciaR #using #web
- Knowing where and how criminal organizations operate using web content (MC, VR), pp. 1412–1421.
- CIKM-2012-EldardiryN #analysis #classification #graph #predict
- An analysis of how ensembles of collective classifiers improve predictions in graphs (HE, JN), pp. 225–234.
- CIKM-2012-MurakamiM #people #question #web
- How do humans distinguish different people with identical names on the web? (HM, YM), pp. 2475–2478.
- CIKM-2012-ShirazipourazadBVSH #contest
- Influence propagation in adversarial setting: how to defeat competition with least amount of investment (SS, BB, HV, AS, PH), pp. 585–594.
- ECIR-2012-LucchesePSVV #random
- How Random Walks Can Help Tourism (CL, RP, FS, HV, RV), pp. 195–206.
- ICML-2012-BachrachGMG #adaptation #crowdsourcing #testing #visual notation
- How To Grade a Test Without Knowing the Answers — A Bayesian Graphical Model for Adaptive Crowdsourcing and Aptitude Testing (YB, TG, TM, JG), p. 108.
- KDD-2012-PatroDSWFK #approach #data-driven #learning #modelling #network
- The missing models: a data-driven approach for learning how networks grow (RP, GD, ES, HW, DF, CK), pp. 42–50.
- KEOD-2012-Koponen #modelling #student
- Modelling How Students Organize Knowledge (IK), pp. 143–148.
- KMIS-2012-Vaiyavuth #approach #challenge #concept #energy #framework #modelling
- How Open Innovation Models Might Help the Thai Energy Sector to Address the Climate Change Challenge? — A Conceptual Framework on an Approach to Measure the Impact of Adoption of Open Innovation (RV), pp. 229–234.
- KR-2012-BaralD #automation #learning #programming #set
- Solving Puzzles Described in English by Automated Translation to Answer Set Programming and Learning How to Do that Translation (CB, JD).
- MLDM-2012-OshiroPB #question #random
- How Many Trees in a Random Forest? (TMO, PSP, JAB), pp. 154–168.
- RecSys-2012-KluverNESR #question #rating
- How many bits per rating? (DK, TTN, MDE, SS, JR), pp. 99–106.
- SEKE-2012-DoranCG #api #network #privacy #social
- How Social Network APIs Have Ended the Age of Privacy (DD, SC, SSG), pp. 400–405.
- SIGIR-2012-ChuklinS #query
- How query extensions reflect search result abandonments (AC, PS), pp. 1087–1088.
- ICMT-2012-TerwilligerCC #bidirectional #framework #incremental #towards
- How Clean Is Your Sandbox? — Towards a Unified Theoretical Framework for Incremental Bidirectional Transformations (JFT, AC, CC), pp. 1–23.
- PLATEAU-2012-MeyerovichR12a #case study #developer #experience #overview #repository
- How not to survey developers and repositories: experiences analyzing language adoption (LAM, ASR), pp. 7–16.
- RE-2012-AmellerACF #architecture #case study #non-functional #requirements
- How do software architects consider non-functional requirements: An exploratory study (DA, CPA, JC, XF), pp. 41–50.
- REFSQ-2012-MahauxMH #people #requirements #why
- Choose Your Creativity: Why and How Creativity in Requirements Engineering Means Different Things to Different People (MM, AM, PH), pp. 101–116.
- REFSQ-2012-PoortMWV #architecture #non-functional #requirements
- How Architects See Non-Functional Requirements: Beware of Modifiability (ERP, NM, IvdW, HvV), pp. 37–51.
- FSE-2012-OkurD #developer #library #parallel #question
- How do developers use parallel libraries? (SO, DD), p. 54.
- FSE-2012-RobbesLR #api #developer #ecosystem #smalltalk
- How do developers react to API deprecation?: the case of a smalltalk ecosystem (RR, ML, DR), p. 56.
- FSE-2012-TaoDXZK #case study #industrial
- How do software engineers understand code changes?: an exploratory study in industry (YT, YD, TX, DZ, SK), p. 51.
- ICSE-2012-Braithwaite #programming #what
- Software as an engineering material: How the affordances of programming have changed and what to do about it (KB), p. 998.
- ICSE-2012-EderJJHVP #maintenance #matter #question
- How much does unused code matter for maintenance? (SE, MJ, EJ, BH, RV, KHP), pp. 1102–1111.
- ICSE-2012-RoehmTKM #developer #question
- How do professional developers comprehend software? (TR, RT, RK, WM), pp. 255–265.
- ICSE-2012-SchwarzLR #on the #repository
- On how often code is cloned across repositories (NS, ML, RR), pp. 1289–1292.
- ICSE-2012-Sprenger #case study #experience #re-engineering
- How software engineering can benefit from traditional industries — A practical experience report (TS), p. 1000.
- ICSE-2012-StaatsGH #automation #fault #mutation testing #testing
- Automated oracle creation support, or: How I learned to stop worrying about fault propagation and love mutation testing (MS, GG, MPEH), pp. 870–880.
- LDTA-2012-VieraSM #attribute grammar
- UUAG meets AspectAG: how to make attribute grammars first-class (MV, SDS, AM), p. 6.
- CAV-2012-SchellhornWD #algorithm
- How to Prove Algorithms Linearisable (GS, HW, JD), pp. 243–259.
- ICLP-2012-BaralVL #knowledge base #why
- Answering Why and How questions with respect to a frame-based knowledge base: a preliminary report (CB, NHV, SL), pp. 26–36.
- IJCAR-2012-BorgwardtDP #fuzzy #logic #question
- How Fuzzy Is My Fuzzy Description Logic? (SB, FD, RP), pp. 82–96.
- LICS-2012-ChatterjeeD #game studies #probability
- Partial-Observation Stochastic Games: How to Win When Belief Fails (KC, LD), pp. 175–184.
- ECSA-2011-Axelsson #architecture #embedded #nondeterminism #on the
- On How to Deal with Uncertainty When Architecting Embedded Software and Systems (JA), pp. 199–202.
- QoSA-ISARCS-2011-Zave #architecture #internet
- How software architecture can make an application-friendly internet (PZ), pp. 1–2.
- DocEng-2011-Davis
- Google’s international bloopers... and how we fixed one (MD), pp. 101–102.
- DRR-2011-LamiroyLKH #analysis #documentation #research #resource management
- How carefully designed open resource sharing can help and expand document analysis research (BL, DPL, HFK, JH), pp. 1–10.
- JCDL-2011-AinsworthASWN #question #web
- How much of the web is archived? (SA, AA, HS, MCW, MLN), pp. 133–136.
- SIGMOD-2011-TeubnerM
- How soccer players would do stream joins (JT, RM), pp. 625–636.
- TPDL-2011-McKayB
- One of These Things Is Not Like the Others: How Users Search Different Information Resources (DM, GB), pp. 260–271.
- TPDL-2011-TsatsaronisVTRNSZ #graph #mining #modelling
- How to Become a Group Leader? or Modeling Author Types Based on Graph Mining (GT, IV, ST, MR, KN, MS, MZ), pp. 15–26.
- VLDB-2011-WangLYF
- Entity Matching: How Similar Is Similar (JW, GL, JXY, JF), pp. 622–633.
- CSEET-2011-BromanS #question #re-engineering #student
- How can we make software engineering text books well-founded, up-to-date, and accessible to students? (DB, KS), pp. 386–390.
- CSEET-2011-Sweedyk #education #problem
- How middle school teachers solved our SE project problems (ES), pp. 449–453.
- ITiCSE-2011-AkbarFCDSFC #education #online
- How educators find educational resources online (MA, WF, LNC, LMLD, CAS, EAF, YC), p. 367.
- ITiCSE-2011-BoyceCPCB #education #evaluation #game studies #learning #motivation
- Experimental evaluation of BeadLoom game: how adding game elements to an educational tool improves motivation and learning (AKB, AC, SP, DC, TB), pp. 243–247.
- ITiCSE-2011-HoverHRM #collaboration #learning #student
- Evaluating how students would use a collaborative linked learning space (KMH, MH, GR, MM), pp. 88–92.
- SIGITE-2011-GuthrieYS #question #what #women
- How did mathemathematics and accounting get so many women majors?: what can IT disciplines learn? (RAG, EKY, LLS), pp. 15–20.
- ICSM-2011-Kemmerer #what
- How to steal a botnet and what can happen when you do (RAK), p. 1.
- MSR-2011-CallauRTR #developer #programming language #smalltalk
- How developers use the dynamic features of programming languages: the case of smalltalk (OC, RR, ÉT, DR), pp. 23–32.
- MSR-2011-PaganoM #case study #developer
- How do developers blog?: an exploratory study (DP, WM), pp. 123–132.
- MSR-2011-ParninBM #java
- Java generics adoption: how new features are introduced, championed, or ignored (CP, CB, ERMH), pp. 3–12.
- WCRE-2011-CanforaCCP #debugging #empirical
- How Long Does a Bug Survive? An Empirical Study (GC, MC, LC, MDP), pp. 191–200.
- ICALP-v1-2011-AnandGM #question
- Meeting Deadlines: How Much Speed Suffices? (SA, NG, NM), pp. 232–243.
- ICALP-v1-2011-FaustPV
- Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience (SF, KP, DV), pp. 391–402.
- ICFP-2011-GonthierZND #ad hoc #automation #proving
- How to make ad hoc proof automation less ad hoc (GG, BZ, AN, DD), pp. 163–175.
- DiGRA-2011-HerrewijnP #case study #effectiveness #experience #game studies
- Putting Brands into Play: How Player Experiences Influence the Effectiveness of In-Game Advertising (LH, KP).
- DiGRA-2011-IacovidesASW #learning #question
- Making sense of game-play: How can we examine learning and involvement? (II, JA, ES, WW).
- DiGRA-2011-Rao #formal method #game studies #video
- How to Say Things with Actions I: a Theory of Discourse for Video Games for Change (VR).
- DiGRA-2011-Zabban #design #game studies #online #what
- What Keeps Designers and Players Apart? Thinking How an Online Game World is Shared (VZ).
- FDG-2011-TreanorSBM #game studies #logic #visual notation
- Proceduralist readings: how to find meaning in games with graphical logics (MT, BS, IB, MM), pp. 115–122.
- CHI-2011-BlythePC
- F for fake: four studies on how we fall for phish (MB, HP, JAC), pp. 3469–3478.
- CHI-2011-BrumbyDJG #performance
- Fast or safe?: how performance objectives determine modality output choices while interacting on the move (DPB, SCED, CPJ, JJG), pp. 473–482.
- CHI-2011-ChongG
- How users associate wireless devices (MKC, HG), pp. 1909–1918.
- CHI-2011-FritzM #developer
- Determining relevancy: how software developers determine relevant information in feeds (TF, GCM), pp. 1827–1830.
- CHI-2011-Gaver #design
- Making spaces: how design workbooks work (WWG), pp. 1551–1560.
- CHI-2011-HsiehHK
- Donate for credibility: how contribution incentives can improve credibility (GH, SEH, REK), pp. 3435–3438.
- CHI-2011-KandoganKMP #interface #problem
- How a freeform spatial interface supports simple problem solving tasks (EK, JK, TPM, PP), pp. 925–934.
- CHI-2011-KannabiranBB #human-computer #research
- How HCI talks about sexuality: discursive strategies, blind spots, and opportunities for future research (GK, JB, SB), pp. 695–704.
- CHI-2011-KlasnjaCP #behaviour #health #human-computer #research
- How to evaluate technologies for health behavior change in HCI research (PVK, SC, WP), pp. 3063–3072.
- CHI-2011-LelisH #online #people #rating
- Informing decisions: how people use online rating information to make choices (SL, AH), pp. 2285–2294.
- CHI-2011-MarshallMRKD #approach #interface #multi
- Rethinking “multi-user”: an in-the-wild study of how groups approach a walk-up-and-use tabletop interface (PM, RM, YR, SK, MD), pp. 3033–3042.
- CHI-2011-Monroy-HernandezHGb #automation #community #online
- Computers can’t give credit: how automatic attribution falls short in an online remixing community (AMH, BMH, JGR, DB), pp. 3421–3430.
- DHM-2011-WelkePRJ #analysis #modelling #validation #what
- What Is Human? How the Analysis of Brain Dynamics Can Help to Improve and Validate Driver Models (SW, JP, MR, TJ), pp. 513–522.
- DUXU-v1-2011-BuettnerS #mobile #web
- Mobile Web and Native Apps: How One Team Found a Happy Medium (KB, AMS), pp. 549–554.
- DUXU-v1-2011-OzturkR #experience #mobile #network #social #user interface
- How to Improve User Experience in Mobile Social Networking: A User-Centered Study with Turkish Mobile Social Network Site Users (ÖÖ, KR), pp. 521–530.
- DUXU-v1-2011-Renner #design #image #process #question #visual notation
- Image, Imagination, Innovation: How Can We Overcome the Common Ground in the Processes of Visual Design? (MR), pp. 285–294.
- DUXU-v2-2011-GajendarJ #design
- The Inmates Are Still Running the Asylum: How to Share a Design Vision with Engineers (UG, CJ), pp. 276–282.
- DUXU-v2-2011-Iizuka #empirical
- An Experiment about How to Feel Temperature Change of Mouse (SI), pp. 575–581.
- DUXU-v2-2011-OlsenPB #effectiveness #game studies #testing #usability
- Serious Games Usability Testing: How to Ensure Proper Usability, Playability, and Effectiveness (TO, KP, CAB), pp. 625–634.
- HCI-DDA-2011-ZimmermanKPBLJ #performance #quote
- “How Do I Line Up?”: Reducing Mental Transformations to Improve Performance (GWZ, DSK, GMP, JB, LML, SDJ), pp. 432–440.
- HCI-ITE-2011-KwonCSAG #interactive #internet
- Older User-Computer Interaction on the Internet: How Conversational Agents Can Help (WSK, VC, SIS, HA, JEG), pp. 533–536.
- HCI-MIIE-2011-HyrkkanenN #functional #identification #mobile #physics #question
- The Virtual Workplace of a Mobile Employee — How Does Vischer’s Model Function in Identifying Physical, Functional and Psychosocial Fit? (UH, SN), pp. 69–75.
- HCI-UA-2011-GuhaDF #design
- How Children Can Design the Future (MLG, AD, JAF), pp. 559–569.
- HIMI-v1-2011-TakeuchiN #question
- How Do Real or Virtual Agent’s Body and Instructions Contribute to Task Achievement? (YT, HN), pp. 142–151.
- HIMI-v2-2011-NguyenBRHVSB #multi
- How Data Comm Methods and Multi-dimensional Traffic Displays Influence Pilot Workload under Trajectory Based Operations (JHN, LPB, RCR, MH, KPLV, TZS, VB), pp. 507–515.
- OCSC-2011-KochFB #crowdsourcing #design #online #platform
- Online Crowdsourcing in the Public Sector: How to Design Open Government Platforms (GK, JF, SB), pp. 203–212.
- ICEIS-J-2011-VianaT11a
- Electronic Government in Brazil: Evaluating Brazilian Initiative and How to Improve It (GBV, MBFdT), pp. 388–402.
- ICEIS-v2-2011-YangLT #communication #development #memory management #question
- How Communication Impacts on the Development of Transactive Memory System in Task-teams? (YY, YL, FT), pp. 451–454.
- ICEIS-v4-2011-LiangY #enterprise
- How to Control the Distribution Cost of the Cold Chain Logistics Enterprise (SXL, GY), pp. 716–719.
- ICEIS-v4-2011-WangZQ #enterprise
- How Logistics Enterprises Cope with Financial Crisis (JW, ZZ, KQ), pp. 685–689.
- CIKM-2011-TorresW #web #what
- What and how children search on the web (SDT, IW), pp. 393–402.
- CIKM-2011-YangZKL #learning #question #why
- Can irrelevant data help semi-supervised learning, why and how? (HY, SZ, IK, MRL), pp. 937–946.
- CIKM-2011-YeungJ #mining #scalability #towards
- Studying how the past is remembered: towards computational history through large scale text mining (CmAY, AJ), pp. 1231–1240.
- ECIR-2011-ShiLH11a #question #recommendation #trust
- How Far Are We in Trust-Aware Recommendation? (YS, ML, AH), pp. 704–707.
- RecSys-2011-KnijnenburgRW #interactive #recommendation
- Each to his own: how different users call for different interaction methods in recommender systems (BPK, NJMR, MCW), pp. 141–148.
- RecSys-2011-SparlingS #named #question #rating
- Rating: how difficult is it? (EIS, SS), pp. 149–156.
- SEKE-2011-RochaV #empirical #java
- How Annotations are Used in Java: An Empirical Study (HR, MTV), pp. 426–431.
- SEKE-2011-RodriguesS
- How IT Professionals Face Negotiations (SAR, JMdS), pp. 264–267.
- SIGIR-2011-SantosMO11b #question #web
- How diverse are web search results? (RLTS, CM, IO), pp. 1187–1188.
- SIGIR-2011-ZhangMLM #approach #information retrieval #ranking
- How to count thumb-ups and thumb-downs?: an information retrieval approach to user-rating based ranking of items (DZ, RM, HL, JM), pp. 1223–1224.
- PLATEAU-2011-GilGM #metric #question
- How much information do software metrics contain? (JYG, MG, DM), pp. 57–64.
- PLATEAU-2011-KleinschmagerH #case study #programming #self
- How to rate programming skills in programming experiments?: a preliminary, exploratory, study based on university marks, pretests, and self-estimation (SK, SH), pp. 15–24.
- LOPSTR-2011-DandoisV #detection #logic programming #source code
- Clones in Logic Programs and How to Detect Them (CD, WV), pp. 90–105.
- SIGAda-2011-BrosterC #embedded #reliability
- How to measure and optimize reliable embedded software (IB, AC), pp. 1–2.
- SIGAda-2011-RosenMT #ada
- How to make Ada go “viral” (JPR, BM, STT), pp. 35–36.
- RE-2011-MarczakD #collaboration #communication #interactive
- How interaction between roles shapes the communication structure in requirements-driven collaboration (SM, DD), pp. 47–56.
- RE-2011-PuhlF #requirements #towards
- How to assign cost to “avoidable requirements creep”: A step towards the waterfall’s agilization (SP, RF), pp. 307–312.
- ASE-2011-RamirezJCK #adaptation #automation #behaviour #nondeterminism
- Automatically exploring how uncertainty impacts behavior of dynamically adaptive systems (AJR, ACJ, BHCC, DBK), pp. 568–571.
- ASE-2011-Witten #documentation #representation #semantics #wiki
- Wikipedia and how to use it for semantic document representation (IHW), p. 1.
- ESEC-FSE-2011-YinYZPB #debugging #question
- How do fixes become bugs? (ZY, DY, YZ, SP, LNB), pp. 26–36.
- ICSE-2011-StreitP #quality #why
- Why software quality improvement fails: (and how to succeed nevertheless) (JS, MP), pp. 726–735.
- ICSE-2011-TreudeBS #question #web
- How do programmers ask and answer questions on the web? (CT, OB, MADS), pp. 804–807.
- SAC-2011-HorkoffY #modelling
- Analyzing goal models: different approaches and how to choose among them (JH, ESKY), pp. 675–682.
- CGO-2011-Leroy #compilation #question #verification #why
- Formally verifying a compiler: Why? How? How far? (XL).
- DAC-2011-Hu #why
- New sub-20nm transistors: why and how (CH), pp. 460–463.
- DAC-2011-Mador-HaimAM #consistency #memory management #modelling #question #testing
- Litmus tests for comparing memory consistency models: how long do they need to be? (SMH, RA, MMKM), pp. 504–509.
- HPCA-2011-McKinley #parallel #question
- How’s the parallel computing revolution going? (KSM), p. 217.
- PPoPP-2011-McKinley #parallel #question
- How’s the parallel computing revolution going? (KSM), pp. 123–124.
- STOC-2011-LewkoLW
- How to leak on key updates (ABL, ML, BW), pp. 725–734.
- ICST-2011-FraserA #matter
- It is Not the Length That Matters, It is How You Control It (GF, AA), pp. 150–159.
- SAT-2011-MundhenkZ #equivalence #normalisation
- How to Apply SAT-Solving for the Equivalence Test of Monotone Normal Forms (MM, RZ), pp. 105–119.
- JCDL-2010-AudenaertF #what
- What humanists want: how scholars use source materials (NA, RF), pp. 283–292.
- SIGMOD-2010-TranC
- How to ConQueR why-not questions (QTT, CYC), pp. 15–26.
- CSEET-2010-TaranC #challenge #development #distance
- Improving Distance Mentoring: Challenges and How to Deal with them in Global Development Project Courses (GT, LRC), pp. 97–104.
- ITiCSE-2010-BasawapatnaR #feedback #physics #student #using
- Cyberspace meets brick and mortar: an investigation into how students engage in peer to peer feedback using both cyberlearning and physical infrastructures (ARB, AR), pp. 184–188.
- ITiCSE-2010-Ezel #assessment #education #student
- Assessment methods and how teachers and students view them in a computer science course at Uppsala University (MCE), p. 309.
- SCAM-2010-KesterMB #concurrent #debugging #question #static analysis
- How Good is Static Analysis at Finding Concurrency Bugs? (DK, MM, JSB), pp. 115–124.
- ICALP-v2-2010-AlistarhGGZ #cost analysis #performance
- How Efficient Can Gossip Be? (On the Cost of Resilient Information Exchange) (DA, SG, RG, MZ), pp. 115–126.
- FDG-2010-TaylorW #education #game studies #what
- This is how we play it: what a mega-LAN can teach us about games (TLT, EW), pp. 195–202.
- ICGT-2010-BrandtH #enterprise #graph transformation #modelling #question
- How Far Can Enterprise Modeling for Banking Be Supported by Graph Transformation? (CB, FH), pp. 3–26.
- CHI-2010-AulaKG #behaviour #question
- How does search behavior change as search becomes more difficult? (AA, RMK, ZG), pp. 35–44.
- CHI-2010-DavidoffZD #coordination #product line
- How routine learners can support family coordination (SD, JZ, AKD), pp. 2461–2470.
- CHI-2010-HolzB
- The generalized perceived input point model and how to double touch accuracy by extracting fingerprints (CH, PB), pp. 581–590.
- CHI-2010-HsiehKH #why
- Why pay?: exploring how financial incentives are used for question & answer (GH, REK, SEH), pp. 305–314.
- CHI-2010-KalnikaiteSWK #comprehension #memory management
- Now let me see where i was: understanding how lifelogs mediate memory (VK, AS, SW, DSK), pp. 2045–2054.
- CHI-2010-KoC #debugging
- How power users help and hinder open bug reporting (AJK, PKC), pp. 1665–1674.
- CHI-2010-LeeKJCKJKL
- How users manipulate deformable displays as input devices (SSL, SK, BJ, EC, BK, XJ, DK, KPL), pp. 1647–1656.
- CHI-2010-LiuLRLWL #mobile
- How socio-economic structure influences rural users’ acceptance of mobile entertainment (JL, YL, PLPR, HL, XW, DL), pp. 2203–2212.
- CHI-2010-MunsonR
- Presenting diverse political opinions: how and how much (SAM, PR), pp. 1457–1466.
- CHI-2010-OzencKZOM #design
- How to support designers in getting hold of the immaterial material of software (FKO, MK, JZ, SO, BAM), pp. 2513–2522.
- CHI-2010-TeevanDL #interactive #people #web
- A longitudinal study of how highlighting web content change affects people’s web interactions (JT, STD, DJL), pp. 1353–1356.
- CHI-2010-Weilenmann #interactive #learning #mobile
- Learning to text: an interaction analytic study of how an interaction analytic study of how seniors learn to enter text on mobile phones (AW), pp. 1135–1144.
- CSCW-2010-LeeKF #people #question
- Receptionist or information kiosk: how do people talk with a robot? (MKL, SBK, JF), pp. 31–40.
- CIKM-2010-QianCXQ
- How about utilizing ordinal information from the distribution of unlabeled data (MQ, BC, HX, HQ), pp. 289–298.
- ECIR-2010-KapteinHK #modelling #question
- How Different Are Language Models andWord Clouds? (RK, DH, JK), pp. 556–568.
- ICPR-2010-MakiharaHY #question
- How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values? (YM, MAH, YY), pp. 1208–1211.
- ICPR-2010-SutcuSM #question
- How to Measure Biometric Information? (YS, HTS, NDM), pp. 1469–1472.
- ICPR-2010-XuHL10a #image #recognition #robust
- Raw vs. Processed: How to Use the Raw and Processed Images for Robust Face Recognition under Varying Illumination (LX, LH, CL), pp. 2692–2695.
- KDD-2010-SozioG #problem
- The community-search problem and how to plan a successful cocktail party (MS, AG), pp. 939–948.
- SIGIR-2010-SvoreKK #proximity #retrieval #web
- How good is a span of terms?: exploiting proximity to improve web retrieval (KMS, PHK, NK), pp. 154–161.
- REFSQ-2010-AmellerF #architecture #non-functional #overview #requirements
- How Do Software Architects Consider Non-Functional Requirements: A Survey (DA, XF), pp. 276–277.
- ASE-2010-HolzerTVS #testing
- How did you specify your test suite (AH, CS, MT, HV), pp. 407–416.
- SAC-2010-JiKYC #3d #interactive #using
- How to manage interactive dialogues of avatar agents by using 3D spatial information of virtual world (SHJ, JWK, TY, HGC), pp. 1181–1187.
- DAC-2010-KeshavaHP #challenge #validation
- Post-silicon validation challenges: how EDA and academia can help (JK, NH, CP), pp. 3–7.
- DAC-2010-Mathewson #evolution
- The evolution of SOC interconnect and how NOC fits within it (BM), pp. 312–313.
- HPCA-2010-LiuJS #clustering #comprehension #memory management #multi #performance
- Understanding how off-chip memory bandwidth partitioning in Chip Multiprocessors affects system performance (FL, XJ, YS), pp. 1–12.
- STOC-2010-BarakBCR #communication #interactive
- How to compress interactive communication (BB, MB, XC, AR), pp. 67–76.
- ICST-2010-Arcuri #branch #distance #matter #testing
- It Does Matter How You Normalise the Branch Distance in Search Based Software Testing (AA), pp. 205–214.
- TAP-2010-Ernst #feedback #proving #testing
- How Tests and Proofs Impede One Another: The Need for Always-On Static and Dynamic Feedback (MDE), pp. 1–2.
- ECDL-2009-ChenRB #mining #online #people #visualisation #web
- How People Read Books Online: Mining and Visualizing Web Logs for Use Information (RC, AR, BBB), pp. 364–369.
- ECDL-2009-FerroS #data type #framework
- The NESTOR Framework: How to Handle Hierarchical Data Structures (NF, GS), pp. 215–226.
- HT-2009-MirandaG #evolution #question #web
- How are web characteristics evolving? (JM, DG), pp. 369–370.
- ICDAR-2009-AbedM #recognition
- How to Improve a Handwriting Recognition System (HEA, VM), pp. 1181–1185.
- JCDL-2009-BischoffFNP
- How do you feel about “dancing queen”?: deriving mood & theme annotations from user tags (KB, CSF, WN, RP), pp. 285–294.
- SIGMOD-2009-DasguptaZDC #database #privacy #question #why
- Privacy preservation of aggregates in hidden databases: why and how? (AD, NZ, GD, SC), pp. 153–164.
- CSEET-2009-ThompsonE09a #question #student
- How Can We Scale-Up Student Admissions and Graduate Completions? (JBT, HME), pp. 298–299.
- EDM-2009-Hardof-JaffeHABN #question #student
- How do Students Organize Personal Information Spaces? (SHJ, AH, HAK, OB, RN), pp. 250–258.
- EDM-2009-MostowB #lessons learnt #what #why
- Why, What, and How to Log? Lessons from LISTEN (JM, JB), pp. 269–278.
- ITiCSE-2009-Saeli #education #programming
- How to teach programming in secondary education: first results of a PhD project (MS), p. 356.
- ITiCSE-2009-WiesnerB #concept #learning #question
- How do robots foster the learning of basic concepts in informatics? (BW, TB), p. 403.
- MSR-2009-MaalejH #developer #question #word
- From work to word: How do software developers describe their work? (WM, HJH), pp. 121–130.
- WCRE-1999-PentaG99a #question #source code
- Who are Source Code Contributors and How do they Change? (MDP, DMG), pp. 11–20.
- ICALP-v2-2009-AnagnostopoulosKMU
- Sort Me If You Can: How to Sort Dynamic Data (AA, RK, MM, EU), pp. 339–350.
- LATA-2009-Blanchet-SadriABM #question #word
- How Many Holes Can an Unbordered Partial Word Contain? (FBS, EA, CB, RM), pp. 176–187.
- ICFP-2009-VieraSS #aspect-oriented #attribute grammar #haskell #programming
- Attribute grammars fly first-class: how to do aspect oriented programming in Haskell (MV, SDS, WS), pp. 245–256.
- CIG-2009-Pace #algorithm #game studies #search-based
- How a genetic algorithm learns to play Traveler's Dilemma by choosing dominated strategies to achieve greater payoffs (MP), pp. 194–200.
- DiGRA-2009-MacCallum-Stewart #game studies #online #what
- 'What sort of Fish was it?' How Players Understand their Narrative in Online Games (EMS).
- DiGRA-2009-Molesworth #game studies #quote
- “How many headshots you've done”: Achievement as discursive practice in videogame play (MM).
- DiGRA-2009-Mukherjee #game studies #memory management
- 'Remembering How You Died': Memory, Death and Temporality in Videogames [Extended Abstract] (SM).
- DiGRA-2009-Poels #case study #experience #game studies
- World of Warcraft, the Aftermath How game elements transfer into real life perceptions and experiences [Abstract] (KP).
- DiGRA-2009-Schott #idea #quote
- “I Like the Idea of Killing But Not the Idea of Cruelty”: How New Zealand youth negotiate the pleasures of simulated violence (GS).
- CHI-2009-BrumbySH #adaptation #constraints
- Focus on driving: how cognitive constraints shape the adaptation of strategy when dialing while driving (DPB, DDS, AH), pp. 1629–1638.
- CHI-2009-BudiuPH #memory management
- Remembrance of things tagged: how tagging effort affects tag production and human memory (RB, PP, LH), pp. 615–624.
- CHI-2009-Frandsen-ThorlaciusHHC #overview #usability
- Non-universal usability?: a survey of how usability is understood by Chinese and Danish users (OFT, KH, MH, TC), pp. 41–50.
- CHI-2009-GaverBKBJ #design #what
- Anatomy of a failure: how we knew when our design went wrong, and what we learned from it (WWG, JB, TK, AB, NJ), pp. 2213–2222.
- CHI-2009-HerringCKB #comprehension #design #exclamation #why
- Getting inspired!: understanding how and why examples are used in creative design practice (SRH, CCC, JK, BPB), pp. 87–96.
- CHI-2009-MaC #communication #question #visual notation
- How well do visual verbs work in daily communication for young and old adults? (XM, PRC), pp. 361–364.
- CHI-2009-TorreyCM #internet #learning
- Learning how: the search for craft knowledge on the internet (CT, EFC, DWM), pp. 1371–1380.
- CHI-2009-YataniCJT #comprehension #development #diagrams #open source #why
- Understanding how and why open source contributors use diagrams in the development of Ubuntu (KY, EC, CJ, KNT), pp. 995–1004.
- HCD-2009-PylaHPASH #case study #evaluation #experience
- “How Do I Evaluate THAT?” Experiences from a Systems-Level Evaluation Effort (PSP, HRH, MAPQ, JDA, TLSJ, DH), pp. 292–301.
- HCD-2009-Vartiainen #collaboration #multi #question
- Working in Multi-locational Office — How Do Collaborative Working Environments Support? (MV), pp. 1090–1098.
- HCI-NT-2009-AgarwalP #interface #usability
- Building on the Usability Study: Two Explorations on How to Better Understand an Interface (AA, MP), pp. 385–394.
- HCI-NT-2009-RaoCJB #concurrent #exclamation #people
- “You’ve Got IMs!” How People Manage Concurrent Instant Messages (SR, JC, RJ, RB), pp. 500–509.
- HIMI-DIE-2009-BruinLB #case study #feedback
- How to Learn from Intelligent Products; The Structuring of Incoherent Field Feedback Data in Two Case Studies (RdB, YL, AB), pp. 227–232.
- HIMI-DIE-2009-Goode #difference #online
- How Product Differentiation Affects Online Shopping (AWG), pp. 253–262.
- HIMI-II-2009-AndoM #interactive #mobile #motivation #question #student
- How Mobile Interaction Motivates Students in a Class? (AA, KM), pp. 621–631.
- IDGD-2009-ChavanAKK #mobile #women
- How Mobile Money Can Drive Financial Inclusion for Women at the Bottom of the Pyramid (BOP) in Indian Urban Centers (ALC, SA, AK, PK), pp. 475–484.
- CAiSE-2009-Wiederhold #named #question #tutorial
- Tutorial: How to Value Software in a Business, and Where Might the Value Go? (GW), pp. 9–10.
- ICEIS-HCI-2009-TaggB #information management #quantum #question
- How Can a Quantum Improvement in Personal and Group Information Management be Realized? (RT, TB), pp. 136–141.
- ICEIS-ISAS-2009-GoebelTGTN
- RFID in the Supply Chain: How to Obtain a Positive ROI — The Case of Gerry Weber (CG, CT, OG, RT, RN), pp. 95–102.
- CIKM-2009-HeCPQMG #detection #evolution #question #topic
- Detecting topic evolution in scientific literature: how can citations help? (QH, BC, JP, BQ, PM, CLG), pp. 957–966.
- KEOD-2009-SassiJG #approach #maintenance #ontology
- How to Evolve Ontology and Maintain Its Coherence — A Corrective Operations-based Approach (NS, WJ, FG), pp. 384–387.
- MLDM-2009-Hoppner #question
- How Much True Structure Has Been Discovered? (FH), pp. 385–397.
- RecSys-2009-NanopoulosRI #collaboration #question
- How does high dimensionality affect collaborative filtering? (AN, MR, MI), pp. 293–296.
- OOPSLA-2009-InoueN #hardware #java #monitoring #performance #virtual machine
- How a Java VM can get more from a hardware performance monitor (HI, TN), pp. 137–154.
- SIGAda-2009-MurtaghH #ada #object-oriented
- How Ada object orientation works (JLM, DH), pp. 5–6.
- RE-2009-GotelM #requirements
- How to Select a Requirements Management Tool: Initial Steps (OG, PM), pp. 365–367.
- RE-2009-WieringaHR #evaluation
- How to Write and Read a Scientific Evaluation Paper (RW, HH, BR), pp. 361–364.
- ICSE-2009-MenziesWBH #probability #process #using
- How to avoid drastic software process change (using stochastic stability) (TM, SW, BWB, JH), pp. 540–550.
- ICSE-2009-Murphy-HillPB
- How we refactor, and how we know it (ERMH, CP, APB), pp. 287–297.
- ICSE-2009-TreudeS #aspect-oriented #development #social
- How tagging helps bridge the gap between social and technical aspects in software development (CT, MADS), pp. 12–22.
- SAC-2009-EckartzDWH #enterprise #question
- Cross-organizational ERP management: how to create a successful business case? (SE, MD, RW, JvH), pp. 1599–1604.
- CC-2009-BieniusaT #continuation #monad
- How to CPS Transform a Monad (AB, PT), pp. 266–280.
- DAC-2009-George
- How to make computers that work like the brain (DG), pp. 420–423.
- DAC-2009-YingKKGGOTW #question
- Guess, solder, measure, repeat: how do I get my mixed-signal chip right? (GY, AK, KSK, GGEG, EG, MO, ST, WW), pp. 520–521.
- DATE-2009-Dubrova
- How to speed-up your NLFSR-based stream cipher (ED), pp. 878–881.
- DATE-2009-SchlichtmannSKPGDEH #design #statistics
- Digital design at a crossroads How to make statistical design methodologies industrially relevant (US, MS, HK, MP, VG, MD, UE, JH), pp. 1542–1547.
- PPoPP-2009-Dennis #manycore #programmable
- How to build programmable multi-core chips (JBD), pp. 283–284.
- PPoPP-2009-KulkarniBIPC #parallel #question
- How much parallelism is there in irregular applications? (MK, MB, RI, KP, CC), pp. 3–14.
- PPoPP-2009-KulkarniUCAV #transaction
- Turbocharging boosted transactions or: how i learnt to stop worrying and love longer transactions (CEK, OSÜ, AC, EA, MV), pp. 307–308.
- STOC-2009-MontenegroT #question
- How long does it take to catch a wild kangaroo? (RM, PT), pp. 553–560.
- ECSA-2008-MendezA #architecture #comparison
- How Do Agents Affect Modifiability? A Comparison between Two Architectures for Intelligent Virtual Environments for Training (GM, AdA), pp. 82–97.
- JCDL-2008-CunninghamN #people
- How people find videos (SJC, DMN), pp. 201–210.
- SIGMOD-2008-AbadiMH #question
- Column-stores vs. row-stores: how different are they really? (DJA, SM, NH), pp. 967–980.
- VLDB-2008-DittrichBS #question
- Dwarfs in the rearview mirror: how big are they really? (JD, LB, MAVS), pp. 1586–1597.
- CSEET-2008-DeKoenigsberg #open source #student #why
- How Successful Open Source Projects Work, and How and Why to Introduce Students to the Open Source World (GD), pp. 274–276.
- CSEET-2008-Epstein #agile #process #student
- Getting Students to Think About How Agile Processes can be Made More Secure (RGE), pp. 51–58.
- CSEET-2008-Mead #education #re-engineering
- Software Engineering Education: How Far We’ve Come and How Far We Have to Go (NRM), pp. 18–22.
- CSEET-2008-RootRT08a
- Proposal Based Studio Projects: How to Avoid Producing “Cookie Cutter” Software Engineers (DR, MRL, GT), pp. 145–151.
- ITiCSE-2008-Diaz-AgudoJR #approach #education #semantics #web
- How to teach semantic web?: a project-based approach (BDA, GJD, JARG), pp. 98–102.
- ITiCSE-2008-KiesmullerB #algorithm #analysis #problem
- How do 7th graders solve algorithmic problems?: a tool-based analysis (UK, TB), p. 353.
- ITiCSE-2008-NorrisBFRR #developer #named
- ClockIt: collecting quantitative data on how beginning software developers really work (CN, EFB, JBFJ, KR, JR), pp. 37–41.
- CSMR-2008-DozsaGM #lisp
- How Lisp Systems Look Different (AD, TG, RM), pp. 223–232.
- ICPC-2008-FonsecaCHP #behaviour #web
- How to Interconnect Operational and Behavioral Views of Web Applications (RFCdF, DCdC, PRH, MJVP), pp. 263–267.
- MSR-2008-Bernstein #data mining #mining
- How to learn enough data mining to be dangerous in 60 minutes (AB), pp. 77–78.
- AFL-2008-Leupold #matter
- How to Pop a Deep PDA Matters (PL), pp. 281–291.
- ICALP-A-2008-AvinKL #evolution #graph #random
- How to Explore a Fast-Changing World (Cover Time of a Simple Random Walk on Evolving Graphs) (CA, MK, ZL), pp. 121–132.
- ICALP-C-2008-CanettiEGL
- How to Protect Yourself without Perfect Shredding (RC, DE, SG, DYL), pp. 511–523.
- ICALP-C-2008-GilbertRS #problem
- How to Encrypt with the LPN Problem (HG, MJBR, YS), pp. 679–690.
- LATA-2008-MoczuradM #question #set
- How Many Figure Sets Are Codes? (MM, WM), pp. 385–396.
- CHI-2008-JonssonHN #information management
- How accurate must an in-car information system be?: consequences of accurate and inaccurate information in cars (IMJ, HH, CN), pp. 1665–1674.
- CSCW-2008-PriedhorskyT #what #why
- The computational geowiki: what, why, and how (RP, LGT), pp. 267–276.
- CAiSE-2008-MuehlenR #modelling #process #using
- How Much Language Is Enough? Theoretical and Practical Use of the Business Process Modeling Notation (MzM, JR), pp. 465–479.
- ICEIS-J-2008-BrissonC08a #data mining #mining #process #question #semantics
- How to Semantically Enhance a Data Mining Process? (LB, MC), pp. 103–116.
- CIKM-2008-Croft #approach #problem
- Unsolved problems in search: (and how we approach them) (WBC), p. 1001.
- CIKM-2008-KinneyHZ
- How evaluator domain expertise affects search result relevance judgments (KAK, SBH, JZ), pp. 591–598.
- CIKM-2008-RadlinskiKJ #quality #question #retrieval
- How does clickthrough data reflect retrieval quality? (FR, MK, TJ), pp. 43–52.
- ICPR-2008-GhoshB #evolution #pattern matching #pattern recognition #problem #recognition
- How current BNs fail to represent evolvable pattern recognition problems and a proposed solution (NG, BB), pp. 1–4.
- KR-2008-Chetcuti-SperandioL #logic #strict
- How to Choose Weightings to Avoid Collisions in a Restricted Penalty Logic (NCS, SL), pp. 340–347.
- KR-2008-HinrichsG #finite #injection #logic #what
- Injecting the How into the What: Investigating a Finite Classical Logic (TLH, MRG), pp. 92–192.
- KR-2008-SchroderP #logic #strict
- How Many Toes Do I Have? Parthood and Number Restrictions in Description Logics (LS, DP), pp. 307–317.
- RecSys-2008-ParkT #recommendation
- The long tail of recommender systems and how to leverage it (YJP, AT), pp. 11–18.
- SEKE-2008-Claudio
- How to make an information elephant dance (CC), p. 1.
- SIGIR-2008-LinS #automation #evaluation #simulation #towards
- How do users find things with PubMed?: towards automatic utility evaluation with user simulations (JJL, MDS), pp. 19–26.
- SIGIR-2008-WhiteDT #interactive #web
- How medical expertise influences web search interaction (RWW, STD, JT), pp. 791–792.
- ECOOP-2008-TemperoNM #empirical #inheritance #java #source code
- How Do Java Programs Use Inheritance? An Empirical Study of Inheritance in Java Software (EDT, JN, HM), pp. 667–691.
- RE-2008-Alexander #design #question #requirements #statistics
- Evaluating Design Options against Requirements: How Far Can Statistics Help? (IA), pp. 259–264.
- RE-2008-KaindlCPSZ #design #interactive #question #requirements
- How to Combine Requirements Engineering and Interaction Design? (HK, LLC, OP, AGS, DZ), pp. 299–301.
- ASE-2008-RobbesL #code completion #repository
- How Program History Can Improve Code Completion (RR, ML), pp. 317–326.
- ICSE-2008-StoreyRBMS #debugging #developer #game studies
- TODO or to bug: exploring how task annotations play a role in the work practices of software developers (MADS, JR, RIB, DM, JS), pp. 251–260.
- SAC-2008-MandlWNF #information retrieval #multi #question #robust
- How robust are multilingual information retrieval systems? (TM, CWH, GMDN, NF), pp. 1132–1136.
- ASPLOS-2008-McCunePPRS #execution #recommendation
- How low can you go?: recommendations for hardware-supported minimal TCB code execution (JMM, BP, AP, MKR, AS), pp. 14–25.
- CC-2008-Schwartzbach #compilation #design
- Design Choices in a Compiler Course or How to Make Undergraduates Love Formal Notation (MIS), pp. 1–15.
- CC-2008-ZhaoRARW #debugging #performance #using
- How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation (QZ, RMR, SPA, LR, WFW), pp. 147–162.
- DAC-2008-LiBNPC #approach #implementation #power management #set
- How to let instruction set processor beat ASIC for low power wireless baseband implementation: a system level approach (ML, BB, DN, LVdP, FC), pp. 345–346.
- DATE-2008-BougardMBKC #3d #integration #topic
- HOT TOPIC — 3D Integration or How to Scale in the 21st Century (BB, PM, LB, DKS, NC), p. 1516.
- STOC-2008-Haussler
- Computing how we became human (DH), pp. 639–640.
- ICST-2008-PichlerR #question #user interface #visual notation
- How to Test the Intangible Properties of Graphical User Interfaces? (JP, RR), pp. 494–497.
- SAT-2008-SchederZ #question #satisfiability
- How Many Conflicts Does It Need to Be Unsatisfiable? (DS, PZ), pp. 246–256.
- ICDAR-2007-Shapiro #image #question
- How to Reduce the Size of Bank Check Image Archive? (VS), pp. 148–152.
- JCDL-2007-ReckerGWHMP #case study #learning #online
- A study of how online learning resource are used (MR, SG, AEW, SH, XM, BP), pp. 179–180.
- JCDL-2007-StrodlBNR
- How to choose a digital preservation strategy: evaluating a preservation planning procedure (SS, CB, RN, AR), pp. 29–38.
- SIGMOD-2007-HollowayRSD #database
- How to barter bits for chronons: compression and bandwidth trade offs for database scans (ALH, VR, GS, DJD), pp. 389–400.
- VLDB-2007-IvesDR #adaptation #query #question #what #why
- Adaptive query processing: Why, How, When, and What Next? (ZGI, AD, VR), pp. 1426–1427.
- CSEET-2007-GrothH #case study #student
- How Students Perceive Risk: A Study of Senior Capstone Project Teams (DPG, MPH), pp. 45–54.
- ITiCSE-2007-LeidlR #learning #question
- How will future learning work in the third dimension? (ML, GR), p. 329.
- ITiCSE-2007-PauHW #experience #question #self #women
- Women in computing: how does experience influence self-perception of computing careers? (RP, WH, SW), p. 349.
- ITiCSE-2007-SloanNS #design #education #question
- How should inclusivity influence teaching of ict design? (DS, BN, MS), pp. 307–308.
- SIGITE-2007-RutherfoordR #design #learning
- Universal instructional design for learning how to apply in a virtual world (RHR, JKR), pp. 141–146.
- CSMR-2007-AversanoCP #empirical
- How Clones are Maintained: An Empirical Study (LA, LC, MDP), pp. 81–90.
- CSMR-2007-GreevyGD #developer
- How Developers Develop Features (OG, TG, SD), pp. 265–274.
- CSMR-2007-SavgaRSLW #api #question
- API Changes — How Far Would You Go? (IS, MR, JŚ, JL, HW), pp. 329–330.
- ICSM-2007-StoreyCSMMR #navigation
- How Programmers Can Turn Comments into Waypoints for Code Navigation (MADS, LTC, JS, MJM, DM, JR), pp. 265–274.
- ICSM-2007-SuttonM #c #preprocessor
- How We Manage Portability and Configuration with the C Preprocessor (AS, JIM), pp. 275–284.
- MSR-2007-WeissgerberPB #data mining #detection #developer #mining #visual notation
- Visual Data Mining in Software Archives to Detect How Developers Work Together (PW, MP, MB), p. 9.
- MSR-2007-WeissPZZ #debugging #question
- How Long Will It Take to Fix This Bug? (CW, RP, TZ, AZ), p. 1.
- SEFM-2007-SampathRSR #case study #generative #using
- How to Test Program Generators? A Case Study using flex (PS, ACR, KCS, SR), pp. 80–92.
- ICFP-2007-Herman #functional
- Functional pearl: the great escape or, how to jump the border without getting caught (DH), pp. 157–164.
- DiGRA-2007-Dymek #game studies #industrial #video
- Exporting Wars: Literature Theory and How It Explains the Video Game Industry (MD).
- DiGRA-2007-MacCallum-Stewart07a
- From Catch the Flag to Shock and Awe: how World of Warcraft Negotiates Battle (EMS).
- CHI-2007-BoehnerVSD #human-computer
- How HCI interprets the probes (KB, JV, PS, PD), pp. 1077–1086.
- CHI-2007-CherubiniVDK #developer #why
- Let’s go to the whiteboard: how and why software developers use drawings (MC, GV, RD, AJK), pp. 557–566.
- CHI-2007-TseSGF #multimodal
- How pairs interact over a multimodal digital table (ET, CS, SG, CF), pp. 215–218.
- CHI-2007-TullioDCF #case study
- How it works: a field study of non-technical users interacting with an intelligent system (JT, AKD, JC, JF), pp. 31–40.
- CHI-2007-ZiefleSSM
- How younger and older adults master the usage of hyperlinks in small screen devices (MZ, US, JS, TM), pp. 307–316.
- HCI-AS-2007-Moallem #enterprise
- Excellence in Ease of Use with Rich Functionality How Enterprise Software Applications with Rich Functionality Can Be Built to Excel in Ease of Use (AM), pp. 672–681.
- HCI-AS-2007-MutoI #user interface
- How New Technologies Can Help Create Better UI’s for Medical Devices (WHM, EWI), pp. 499–507.
- HCI-IDU-2007-FerreM #approach #development
- How a Human-Centered Approach Impacts Software Development (XF, NM), pp. 68–77.
- HCI-IDU-2007-Jounila #design #user interface
- How to Make Tailored User Interface Guideline for Software Designers (IJ), pp. 527–535.
- HCI-IDU-2007-NingT #functional #order #usability
- How to Use Emotional Usability to Make the Product Serves a Need Beyond the Traditional Functional Objective to Satisfy the Emotion Needs of the User in Order to Improve the Product Differentiator — Focus on Home Appliance Product (LN, ST), pp. 587–593.
- HCI-MIE-2007-BaranDC #approach #eye tracking #problem
- How Do Adults Solve Digital Tangram Problems? Analyzing Cognitive Strategies Through Eye Tracking Approach (BB, BD, KÇ), pp. 555–563.
- HCI-MIE-2007-Goncalves #multi
- How Panoramic Photography Changed Multimedia Presentations in Tourism (NG), pp. 862–871.
- HCI-MIE-2007-RoibasS #comprehension #interactive #mobile
- Beyond Mobile TV: Understanding How Mobile Interactive Systems Enable Users to Become Digital Producers (ACR, RS), pp. 801–810.
- HIMI-IIE-2007-AkessonE #question #ubiquitous
- The Vision of Ubiquitous Media Services: How Close Are We? (MÅ, CIE), pp. 222–232.
- HIMI-IIE-2007-Quraishy #case study #design #health #implementation #information management
- How Participation at Different Hierarchical Levels Can Have an Impact on the Design and Implementation of Health Information Systems at the Grass Root Level — A Case Study from India (ZBQ), pp. 128–136.
- HIMI-IIE-2007-VuCGCSNPP #policy #privacy
- How Users Read and Comprehend Privacy Policies (KPLV, VC, FPG, BC, JS, DN, RP, RWP), pp. 802–811.
- HIMI-MTT-2007-OehlSZ #interface #performance
- Considerations on Efficient Touch Interfaces — How Display Size Influences the Performance in an Applied Pointing Task (MO, CS, MZ), pp. 136–143.
- OCSC-2007-ChoY #programming
- How to See the Beauty That Is Not There : The Aesthetic Element of Programming in the Computer- Based Media Art (HC, JY), pp. 292–300.
- ECIR-2007-CrivellariNF #information retrieval
- How to Compare Bilingual to Monolingual Cross-Language Information Retrieval (FC, GMDN, NF), pp. 533–540.
- SIGIR-2007-Al-Maskari #effectiveness #information retrieval #interactive #metric #question
- Beyond classical measures: how to evaluate the effectiveness of interactive information retrieval system? (AAM), p. 915.
- SIGIR-2007-HuffmanH #predict #question
- How well does result relevance predict session satisfaction? (SBH, MH), pp. 567–574.
- SIGIR-2007-NajorkZT #question #web
- Hits on the web: how does it compare? (MN, HZ, MJT), pp. 471–478.
- RE-2007-ArandaEW #requirements
- Requirements in the wild: How small companies do it (JA, SME, GW), pp. 39–48.
- RE-2007-JantunenSG #case study #process #requirements
- How Internationalization of a Product Changes Requirements Engineering Activities: An Exploratory Study (SJ, KS, DCG), pp. 163–172.
- RE-2007-KamataT #quality #question #requirements
- How Does Requirements Quality Relate to Project Success or Failure? (MIK, TT), pp. 69–78.
- REFSQ-2007-RinkeW #modelling #requirements
- Defining Reference Models for Modelling Qualities: How Requirements Engineering Techniques Can Help (TR, TW), pp. 335–340.
- GTTSE-2007-ChellappaFP #performance
- How to Write Fast Numerical Code: A Small Introduction (SC, FF, MP), pp. 196–259.
- SAC-2007-Al-Fedaghi #question
- How sensitive is your personal information? (SSAF), pp. 165–169.
- SAC-2007-KoschmiderO #detection #process #question #semantics
- How to detect semantic business process model variants? (AK, AO), pp. 1263–1264.
- DAC-2007-ZhouTLW #logic
- How Much Can Logic Perturbation Help from Netlist to Final Routing for FPGAs (CLZ, WCT, WHL, YLW), pp. 922–927.
- STOC-2007-Kenyon-MathieuS #fault #rank
- How to rank with few errors (CKM, WS), pp. 95–103.
- SIGMOD-2006-DeshpandeHR #adaptation #query #what #why
- Adaptive query processing: why, how, when, what next (AD, JMH, VR), pp. 806–807.
- VLDB-2006-RamanS #query
- How to Wring a Table Dry: Entropy Compression of Relations and Querying of Compressed Relations (VR, GS), pp. 858–869.
- ITiCSE-2006-Gal-EzerT #algebra #question #regular expression
- Algebraic characterization of regular languages: how to cope with all these equivalences? (JGE, MBT), p. 325.
- CSMR-2006-SeebergerKGD #developer #named #visualisation
- Chronia: Visualizing How Developers Change Software Systems (MS, AK, TG, SD), pp. 345–348.
- ICPC-2006-BalintMG #developer
- How Developers Copy (MB, RM, TG), pp. 56–68.
- ICPC-2006-ZaidmanBD #comprehension #metric #mining
- How Webmining and Coupling Metrics Improve Early Program Comprehension (AZ, BDB, SD), pp. 74–78.
- ICSM-2006-XingS #case study #eclipse #refactoring
- Refactoring Practice: How it is and How it Should be Supported — An Eclipse Case Study (ZX, ES), pp. 458–468.
- MSR-2006-KimW #debugging #question
- How long did it take to fix bugs? (SK, EJWJ), pp. 173–174.
- WCRE-2006-CapiluppiMB #outsourcing #quality
- How Outsourcing Affects the Quality of Mission Critical Software (AC, JM, CB), pp. 285–287.
- WCRE-2006-RatiuD #source code
- How Programs Represent Reality (and how they don’t) (DR, FD), pp. 83–92.
- ICALP-v1-2006-Fujito #algorithm #approximate
- How to Trim an MST: A 2-Approximation Algorithm for Minimum Cost Tree Cover (TF), pp. 431–442.
- CHI-2006-Dawe #product line
- Desperately seeking simplicity: how young adults with cognitive disabilities and their families adopt assistive technologies (MD), pp. 1143–1152.
- CHI-2006-PearsonHBPN #adaptation #behaviour #human-computer #word
- Adaptive language behavior in HCI: how expectations and beliefs about a system affect users’ word choice (JP, JH, HPB, MJP, CN), pp. 1177–1180.
- CHI-2006-RoblesSRN
- Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed (ER, AS, KR, CN), pp. 831–839.
- CHI-2006-SiekCR #learning #people
- Pride and prejudice: learning how chronically ill people think about food (KAS, KHC, YR), pp. 947–950.
- SOFTVIS-2006-VoineaT06a #question
- How do changes in buggy Mozilla files propagate? (LV, ACT), pp. 147–148.
- ICEIS-DISI-2006-Jain #question #recognition
- Biometric Recognition: How Do I Know Who You Are? (AKJ), pp. 17–18.
- CIKM-2006-Flake #internet
- How I learned to stop worrying and love the imminent internet singularity (GWF), p. 2.
- CIKM-2006-ZhouJZG #evolution #interactive #research #social #topic
- Topic evolution and social interactions: how authors effect research (DZ, XJ, HZ, CLG), pp. 248–257.
- ICML-2006-ReyzinS #classification #complexity
- How boosting the margin can also boost classifier complexity (LR, RES), pp. 753–760.
- ICPR-v1-2006-TrujilloO #detection #evolution #using
- Using Evolution to Learn How to Perform Interest Point Detection (LT, GO), pp. 211–214.
- KR-2006-BoothMW
- A Bad Day Surfing Is Better than a Good Day Working: How to Revise a Total Preorder (RB, TAM, KSW), pp. 230–238.
- SEKE-2006-ChiYL #question #web
- Web Object Cacheability How Much Do We Know? (CHC, JLY, LL), pp. 252–255.
- AdaEurope-2006-SharifiS #transaction
- Replication-Aware Transactions: How to Roll a Transaction over Failures (MS, HS), pp. 203–214.
- LOPSTR-2006-Marchiori #semantics #web
- How to Talk to a Human: The Semantic Web and the Clash of the Titans (MM), pp. 1–14.
- RE-2006-Cleland-Huang #delivery #question #requirements #traceability
- Requirements Traceability — When and How does it Deliver more than it Costs? (JCH), p. 323.
- FSE-2006-HackettA #alias #question
- How is aliasing used in systems software? (BH, AA), pp. 69–80.
- ICSE-2006-JuristoF #development #process #usability
- How to integrate usability into the software development process (NJJ, XF), pp. 1079–1080.
- ICSE-2006-MikulovicH #communication #development #distributed #quote #requirements #what
- “How do I know what I have to do?”: the role of the inquiry culture in requirements communication for distributed software development projects (VM, MH), pp. 921–925.
- SAC-2006-Nakajima #interactive #question #reuse #ubiquitous
- How to reuse exisiting interactive applications in ubiquitous computing environments? (TN), pp. 1127–1133.
- DAC-2006-HartungKHPJY #question
- How will the fabless model survive? (TH, JK, AH, BP, FJ, NY), pp. 1–2.
- DATE-DF-2006-RichterE #challenge #integration #network
- How OEMs and suppliers can face the network integration challenges (KR, RE), pp. 183–188.
- HPDC-2006-ChouhanDCV #question
- How should you structure your hierarchical scheduler? (PKC, HD, EC, FV), pp. 339–340.
- HPDC-2006-ZhengYS #algorithm #grid #novel #probability #scheduling
- How to avoid herd: a novel stochastic algorithm in grid scheduling (QZ, HY, YS), pp. 267–278.
- WICSA-2005-Klein #architecture #question
- How Does the Architect’s Role Change as the Software Ages? (JK), p. 141.
- CSEET-2005-NavarroH05a #design #prototype #scalability #student
- Scaling up: How Thirty-two Students Collaborated and Succeeded in Developing a Prototype Software Design Environment (EON, AvdH), pp. 155–162.
- ITiCSE-2005-SternMH #student
- You can lead a horse to water: how students really use pedagogical software (LS, SM, RH), pp. 246–250.
- ITiCSE-2005-WeirVMN #education #java
- Difficulties teaching Java in CS1 and how we aim to solve them (GRSW, TV, AJM, MN), pp. 344–345.
- MSR-2005-HayesDS #feedback #mining #re-engineering
- Text mining for software engineering: how analyst feedback impacts final results (JHH, AD, SKS), pp. 56–60.
- ICALP-2005-BorodinCM #algorithm #question
- How Well Can Primal-Dual and Local-Ratio Algorithms Perform? (AB, DC, AM), pp. 943–955.
- RTA-2005-Comon-LundhD #algebra #finite
- The Finite Variant Property: How to Get Rid of Some Algebraic Properties (HCL, SD), pp. 294–307.
- CIG-2005-DevigneMR
- Team of cognitive agents with a leader: how to let them acquire autonomy (DD, PM, JCR).
- CIG-2005-YoshimotoSI #game studies #online #peer-to-peer
- How to Protect Peer-to-Peer Online Games from Cheats (HY, RS, HI).
- DiGRA-2005-Becker #education #game studies #learning
- How Are Games Educational? Learning Theories Embodied in Games (KB).
- DiGRA-2005-BekebredeMHCV #game studies #lessons learnt
- How Serious are serious games? Some lessons from Infra-games (GB, IM, SPAvH, RTHC, AV).
- DiGRA-2005-Consalvo #game studies
- Gaining Advantage: How Videogame Players Define and Negotiate Cheating (MC).
- DiGRA-2005-KonzackL #game studies #multi
- From Mass Audience to Massive Multiplayer: How Multiplayer Games Create New Media Politics (LK, TL).
- DiGRA-2005-Schut #game studies #people
- Mechanized Humanity: how Digital Games Tend to Present People (KS).
- CHI-2005-CosleyFKTR #community
- How oversight improves member-maintained communities (DC, DF, SBK, LGT, JR), pp. 11–20.
- CHI-2005-GarfinkelMSNM #email
- How to make secure email easier to use (SLG, DM, JIS, EN, RCM), pp. 701–710.
- SIGIR-2005-EfthimiadisH #student
- Search engines and how students think they work (ENE, DGH), pp. 595–596.
- ICSE-2005-Ayton
- Extending the discipline: how software can help or hinder human decision making (and vice-versa) (PA), p. 36.
- ICSE-2005-Tamai #education #modelling
- How to teach software modeling (TT), pp. 609–610.
- SAC-2005-BicakciCT #certification #metric #trust
- How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
- DAC-2005-AminMKDCHI #analysis #question #statistics
- Statistical static timing analysis: how simple can we get? (CSA, NM, KK, FD, UC, NH, YII), pp. 652–657.
- DAC-2005-ChowdharyRVCTPH #question
- How accurately can we model timing in a placement engine? (AC, KR, SV, TC, VT, YP, BH), pp. 801–806.
- DAC-2005-MokhoffZRNPK
- How to determine the necessity for emerging solutions (NM, YZ, KNR, HN, FP, KSK), pp. 274–275.
- STOC-2005-Scheideler #exclamation
- How to spread adversarial nodes?: rotate! (CS), pp. 704–713.
- HT-2004-HarperYGS #evaluation #hypermedia
- How much is too much in a hypertext link?: investigating context and preview — a formative evaluation (SH, YY, CAG, RS), pp. 116–125.
- JCDL-2004-BorgmanLGMCFS #design #library
- How geography professors select materials for classroom lectures: implications for the design of digital libraries (CLB, GHL, AJGS, KAM, LC, JRF, LJS), pp. 179–185.
- JCDL-2004-CunninghamBM #analysis #image #people #query #visual notation
- How people describe their image information needs: a grounded theory analysis of visual arts queries (SJC, DB, MM), pp. 47–48.
- SIGMOD-2004-GuoLRG #consistency #sql
- Relaxed Currency and Consistency: How to Say “Good Enough” in SQL (HG, PÅL, RR, JG), pp. 815–826.
- ITiCSE-2004-Armoni #education #question
- Reductive thinking: how to teach it? (MA), p. 280.
- ITiCSE-WGR-2004-Bruce #education
- Controversy on how to teach CS 1: a discussion on the SIGCSE-members mailing list (KBB), pp. 29–34.
- SIGITE-2004-FulbrightR #outsourcing
- How information technology professionals keep from being outsourced or offshored (RF, RLR), pp. 188–193.
- SIGITE-2004-McMahon #c# #case study #dot-net #education #framework #learning #what
- How can you teach what you don’t know?: a case study of learning and teaching microsoft .NET framework and C# (REM), p. 269.
- SEFM-2004-EvansTLF #information management #verification
- How to Verify Dynamic Properties of Information Systems (NE, HT, RL, MF), pp. 416–425.
- CSCW-2004-TseHSG #clustering #dependence #people
- Avoiding interference: how people use spatial separation and partitioning in SDG workspaces (ET, JH, SDS, SG), pp. 252–261.
- CAiSE-2004-Matulevicius #case study #quality #requirements #specification #tool support
- How Requirements Specification Quality Depends on Tools: A Case Study (RM), pp. 353–367.
- ICEIS-v3-2004-CavareroE #behaviour #information management #metric
- Metrics for Dynamics: How to Improve the Behaviour of an Object Information System (JLC, MJEC), pp. 344–349.
- ICEIS-v3-2004-RukanovaSS #communication #metamodelling #towards
- Towards a Meta Model for Describing Communication: How to Address Interoperability on a Pragmatic Level (BR, KvS, RAS), pp. 375–382.
- ICEIS-v4-2004-KanzowDA #deployment #multi #workflow
- Flow-Oriented Deployment of a Multi-Agent Population for Dynamic Workflow Enactment: A Different View on How to Use Agents for Workflow Management (SK, KD, YA), pp. 510–514.
- ICEIS-v4-2004-QuadrosHBS
- Strategies for the Digital Entrepreunership: How to Survive in the Actual Dotcom Reallity (FZQ, HCH, AB, FPdS), pp. 527–530.
- ICEIS-v4-2004-StockheimNSS #approach #enterprise #multi
- How to Build a Multi-Multi-Agent System: The Agent.Enterprise Approach (TS, JN, TS, MS), pp. 364–371.
- ICPR-v3-2004-KimJLK #novel #visual notation
- How Human Visual Systems Recognize Objects — A Novel Computational Model (SK, GjJ, WHL, ISK), pp. 61–64.
- KR-2004-Eschenbach #concept
- How to Interweave Knowledge about Object Structure and Concepts (CE), pp. 300–310.
- LSO-2004-FalboRBT #learning #risk management #using
- Learning How to Manage Risks Using Organizational Knowledge (RdAF, FBR, GB, DFT), pp. 7–18.
- LSO-2004-RodriguezVMPF #maintenance #process
- How to Manage Knowledge in the Software Maintenance Process (OMR, AV, AIMG, MP, JF), pp. 78–87.
- SPLC-2004-Geppert #development #product line #question #testing
- How Can Testing Keep Pace with Accelerated Development in Software Product Line Engineering? (CWK, BG), pp. 308–309.
- TOOLS-USA-2003-ArnoutB04 #eiffel
- How to get a Singleton in Eiffel (KA, EB), pp. 75–95.
- RE-2004-Cross #design
- How Creative Design Happens (NC), p. 2.
- SAC-J-2003-Weyuker04 #testing
- How to judge testing progress (EJW), pp. 323–328.
- FSE-2004-SouzaRCMP #api #collaboration #development #multi
- How a good software practice thwarts collaboration: the multiple roles of APIs in software development (CRBdS, DFR, LTC, DRM, JFP), pp. 221–230.
- DATE-v1-2004-CatthoorCMGLMSW #design #problem #question #scalability
- How Can System-Level Design Solve the Interconnect Technology Scaling Problem? (FC, AC, GM, PG, RL, KM, PvdS, RW), pp. 332–339.
- TACAS-2004-GurfinkelC #question
- How Vacuous Is Vacuous? (AG, MC), pp. 451–466.
- JCDL-2003-ChuWLB
- How to Turn the Page (YCC, IHW, RL, DB), p. 186–?.
- JCDL-2003-WildemuthMYGWHG #performance #video
- How Fast Is Too Fast? Evaluating Fast Forward Surrogates for Digital Video (BMW, GM, MY, GG, TW, AH, RG), pp. 221–230.
- PODS-2003-KiferGBW
- How to quickly find a witness (DK, JG, CB, WMW), pp. 272–283.
- VLDB-2003-KerstenWFKBC #database
- A Database Striptease or How to Manage Your Personal Databases (MLK, GW, MJF, DAK, APB, SC), pp. 1043–1044.
- CSEET-2003-X03b #education
- Teaching how to engineer software, pp. 30–31.
- ITiCSE-2003-Trakhtenbrot #analysis #concept
- Analysis of typical misconceptions in a theoretical CS course, and how to address them in e-learning (MBT), p. 241.
- CSMR-2003-Briand #documentation #question
- Software Documentation: How Much Is Enough? (LCB), p. 13–?.
- IWPC-2003-Klint #compilation #comprehension #perspective
- How Understanding and Restructuring Differ from Compiling — A Rewriting Perspective (PK), pp. 2–12.
- ICALP-2003-GarganoH #graph
- There Are Spanning Spiders in Dense Graphs (and We Know How to Find Them) (LG, MH), pp. 802–816.
- DiGRA-2003-Weise #game studies
- How Videogames Express Ideas (MW).
- CHI-2003-CosleyLAKR #interface #recommendation
- Is seeing believing?: how recommender system interfaces affect users’ opinions (DC, SKL, IA, JAK, JR), pp. 585–592.
- CHI-2003-RoddenW #people #question
- How do people manage their digital photographs? (KR, KRW), pp. 409–416.
- CHI-2003-ShechtmanH #difference #people
- Media inequality in conversation: how people behave differently when interacting with computers and people (NS, LMH), pp. 281–288.
- EDOC-2003-FuentesPV #component #design
- How MDA Can Help Designing Component- and Aspect-based Applications (LF, MP, AV), pp. 124–135.
- ICEIS-v3-2003-TyrvainenP #analysis #communication #metric
- How Digital Is Communication in Your Organization? a Metrics and an Analysis Method (PT, TP), pp. 156–166.
- OOPSLA-2003-EeckhoutGB #architecture #java #source code #virtual machine
- How java programs interact with virtual machines at the microarchitectural level (LE, AG, KDB), pp. 169–186.
- PADL-2003-Krishnamurthi
- The CONTINUE Server (or, How I Administered PADL 2002 and 2003) (SK), pp. 2–16.
- REFSQ-J-2002-KamstiesKR03 #empirical #requirements #specification
- A controlled experiment to evaluate how styles affect the understandability of requirements specifications (EK, AvK, RHR), pp. 955–965.
- RE-2003-HickeyD #elicitation #question
- Elicitation Technique Selection: How Do Experts Do It? (AMH, AMD), p. 169–?.
- ICSE-2003-Szyperski #component #question #what
- Component Technology — What, Where, and How? (CAS), pp. 684–693.
- DAC-2003-CraninckxD #design #question
- 4G terminals: how are we going to design them? (JC, SD), pp. 79–84.
- DAC-2003-Matsuzawa #collaboration #communication #optimisation #performance
- How to make efficient communication, collaboration, and optimization from system to chip (AM), pp. 417–418.
- CADE-2003-AvenhausKSW #exclamation #induction #theorem
- How to Prove Inductive Theorems? QUODLIBET! (JA, UK, TSS, CPW), pp. 328–333.
- CAV-2003-ClarkeGTW #abstraction #performance
- Making Predicate Abstraction Efficient: How to Eliminate Redundant Predicates (EMC, OG, MT, DW), pp. 126–140.
- SAT-2003-GoldbergN #question
- How Good Can a Resolution Based SAT-solver Be? (EG, YN), pp. 37–52.
- HT-2002-Laine #interactive #question
- How do interactive texts reflect interactive functions? (PL), pp. 67–68.
- JCDL-2002-Garcia-MolinaHLLW #metadata #question
- How important is metadata? (HGM, DH, CL, EDL, SW), p. 369.
- JCDL-2002-Witten #library #open source #using
- How to build a digital library using open-source software (IHW), p. 416.
- PODS-2002-SchmidtS #multi #query
- How to Evaluate Multiple Range-Sum Queries Progressively (RRS, CS), pp. 133–141.
- SIGMOD-2002-DasuJMS #database #mining #quality
- Mining database structure; or, how to build a data quality browser (TD, TJ, SM, VS), pp. 240–251.
- VLDB-2002-CormodeDIM #data type #using
- Comparing Data Streams Using Hamming Norms (How to Zero In) (GC, MD, PI, SM), pp. 335–345.
- VLDB-2002-GilbertKMS #maintenance
- How to Summarize the Universe: Dynamic Maintenance of Quantiles (ACG, YK, SM, MS), pp. 454–465.
- VLDB-2002-LakshmananPH #semantics
- Quotient Cube: How to Summarize the Semantics of a Data Cube (LVSL, JP, JH), pp. 778–789.
- PASTE-2002-ChelfEH #static analysis
- How to write system-specific, static checkers in metal (BC, DRE, SH), pp. 51–60.
- CHI-2002-SellenMS #information management #web
- How knowledge workers use the web (AS, RM, KLS), pp. 227–234.
- CSCW-2002-GrinterASTWH #comprehension
- Revisiting the visit: : understanding how technology can shape the museum visit (REG, PMA, MHS, JDT, AW, AH), pp. 146–155.
- ICEIS-2002-Kadri-DahmaniO #consistency #database #maintenance #question
- Updating Data in GIS: How to Maintain Database Consistency? (HKD, AO), pp. 587–593.
- CIKM-2002-TrainaTFF #data access #metric
- How to improve the pruning ability of dynamic metric access methods (CTJ, AJMT, RFSF, CF), pp. 219–226.
- ICML-2002-Seewald #performance
- How to Make Stacking Better and Faster While Also Taking Care of an Unknown Weakness (AKS), pp. 554–561.
- ICPR-v2-2002-Schiele #classification #question
- How Many Classifiers Do I Need? (BS), pp. 176–179.
- ICPR-v3-2002-Sakano #learning #query #search-based
- Genetic Translator: How to Apply Query Learning to Practical OCR (HS), pp. 184–187.
- KR-2002-Saint-CyrL #predict
- Belief Extrapolation (or how to Reason About Observations and Unpredicted Change) (FDdSC, JL), pp. 497–508.
- SEKE-2002-JorgensenM #development #predict #question #why
- Combination of software development effort prediction intervals: why, when and how? (MJ, KM), pp. 425–428.
- SEKE-2002-Lozano-TelloG #component #named #process #using
- BAREMO: how to choose the appropriate software component using the analytic hierarchy process (ALT, AGP), pp. 781–788.
- SIGIR-2002-FranzM #question
- How Many Bits are Needed to Store Term Frequencies? (MF, JSM), pp. 377–378.
- AdaEurope-2002-GonzalezSMMG #ada
- How to Use GNAT to Efficiently Preprocess New Ada Sentences (FJMG, FGS, EM, JM, AG), pp. 179–192.
- PADL-2002-Dahl
- How to Talk to Your Computer so that It Will Listen (VD), pp. 3–8.
- RE-2002-KauppinenKAL #requirements
- Introducing Requirements Engineering: How to Make a Cultural Change Happen in Practice (MK, SK, TA, LL), pp. 43–51.
- RE-2002-VickersMM #question #requirements
- Requirements Engineering: How Do You Know How Good You Are? (AV, AM, HM), pp. 194–198.
- LDTA-2002-Consel #domain-specific language #what #why
- Domain-Specific Languages: What, Why, How (CC), p. 1.
- DAC-2002-AloulSS #named #question
- Satometer: how much have we searched? (FAA, BDS, KAS), pp. 737–742.
- DATE-2002-Bricaud #question
- IP Day: How to Choose Semiconductor IP? (PB), p. 17.
- DATE-2002-Martin #embedded
- How to Choose Semiconductor IP: Embedded Software (GM), p. 16.
- DATE-2002-Phillips #embedded
- How to Choose Semiconductor IP? — Embedded Processor (IP), p. 14.
- ICDAR-2001-MaragoudakisKFK #independence #segmentation
- How Conditional Independence Assumption Affects Handwritten Character Segmentation (MM, EK, NF, GKK), pp. 246–250.
- FME-2001-LeuschelMC #csp #ltl #model checking #refinement
- How to Make FDR Spin LTL Model Checking of CSP by Refinement (ML, TM, AC), pp. 99–118.
- ICFP-2001-Russell #haskell
- Events in Haskell, and How to Implement Them (GR), pp. 157–168.
- CIKM-2001-HergulaH #integration #query
- How Foreign Function Integration Conquers Heterogeneous Query Processing (KH, TH), pp. 215–222.
- LSO-2001-Lehner
- Keynote Address: How do Companies Learn? Selected Applications from the IT Sector (FL), p. 17.
- MLDM-2001-LinderP #learning
- How to Automate Neural Net Based Learning (RL, SJP), pp. 206–216.
- TOOLS-USA-2001-McClure #delivery #privacy #security
- Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.
- ICSE-2001-ShepardK
- How to Do Inspections When There is No Time (TS, DK), pp. 718–719.
- ADL-2000-HoppenbrouwersP
- Invading the Fortress: How to Besiege Reinforced Information Bunkers (JH, HP), pp. 27–35.
- SIGMOD-2000-SalemBCL #incremental #maintenance
- How To Roll a Join: Asynchronous Incremental View Maintenance (KS, KSB, RC, BGL), pp. 129–140.
- WCRE-J-1997-StoreyWM00 #comprehension #question #source code #tool support
- How do program understanding tools affect how programmers understand programs? (MADS, KW, HAM), pp. 183–207.
- IWPC-2000-Petre #empirical #in the large #question
- Empirical Studies of Programming-in-the-Large: How? (MP), p. 254.
- IFM-2000-Chen
- How to Write a Healthiness Condition (YC), pp. 299–317.
- CHI-2000-BreretonM #communication #design
- An observational study of how objects support engineering design thinking and communication: implications for the design of tangible media (MB, BM), pp. 217–224.
- CHI-2000-MakelaGTS #communication #image #network #social
- Joking, storytelling, artsharing, expressing affection: a field trial of how children and their social network communicate with digital images in leisure time (AM, VG, MT, RS), pp. 548–555.
- CSCW-2000-Bernstein #process #tool support
- How can cooperative work tools support dynamic group process? bridging the specificity frontier (AB), pp. 279–288.
- CSCW-2000-TeasleyCKO #question
- How does radical collocation help a team succeed? (SDT, LC, MSK, JSO), pp. 339–346.
- CSCW-2000-Thorngate
- Got a minute? How technology affects the economy of attention (WT), p. 361.
- CSCW-2000-YamauchiYSI #agile #collaboration #open source
- Collaboration with Lean Media: how open-source software succeeds (YY, MY, TS, TI), pp. 329–338.
- CAiSE-2000-KrumbholzM #enterprise #implementation #resource management
- How Culture Might Impact on the Implementation of Enterprise Resource Planning Packages (MK, NAMM), pp. 279–293.
- ICEIS-2000-RodriguesRH #process
- How to Make KDD Process More Accessible to Users (MdFR, CR, PRH), pp. 209–216.
- ICEIS-2000-Vaast #question #why
- Exploring Intranets: Why and How to Study Intranets in French Firms? (EV), pp. 499–505.
- ICPR-v1-2000-Rodriguez-SanchezGFF
- How to Define the Notion of Microcalcifications in Digitized Mammograms (RRS, JAG, JFV, XRFV), pp. 1494–1499.
- UML-2000-AtkinsonK #strict #why
- Strict Profiles: Why and How (CA, TK), pp. 309–322.
- UML-2000-Padawitz #constraints #diagrams #proving #state machine #theorem proving #uml
- Swinging UML: How to Make Class Diagrams and State Machines Amenable to Constraint Solving and Proving (PP), pp. 162–177.
- TOOLS-EUROPE-2000-Reenskaug #collaboration #uml #what #why
- The What, Why and How of the UML Collaboration (TR), p. 476.
- PADL-2000-Moreno-NavarroM #compilation #prolog
- How to Incorporate Negation in a Prolog Compiler (JJMN, SMH), pp. 124–140.
- ICSE-2000-Murphy #industrial #performance
- Grow fast, grow global: how the Irish software industry evolved to this business model (BM), pp. 606–607.
- SAC-2000-BarbeauM
- How to Visit Data with OTHY (FB, JM), pp. 909–914.
- DAC-2000-JainMMWL #analysis #canonical #complexity #composition #graph
- Analysis of composition complexity and how to obtain smaller canonical graphs (JJ, KM, DM, IW, YL), pp. 681–686.
- DAC-2000-ZorianM #design #question
- System chip test: how will it impact your design? (YZ, EJM), pp. 136–141.
- DATE-2000-CatthoorDK #architecture #compilation #data transfer #memory management #question
- How to Solve the Current Memory Access and Data Transfer Bottlenecks: At the Processor Architecture or at the Compiler Level? (FC, NDD, CEK), pp. 426–433.
- OSDI-2000-MaheshwariVS #database
- How to Build a Trusted Database System on Untrusted Storage (UM, RV, WS), pp. 135–150.
- STOC-2000-Reed #question
- How tall is a tree? (BAR), pp. 479–483.
- CAV-2000-BehrmannHV #matter #model checking #order
- Distributing Timed Model Checking — How the Search Order Matters (GB, TH, FWV), pp. 216–231.
- LICS-2000-Voronkov #calculus #logic #proving
- How to Optimize Proof-Search in Modal Logics: A New Way of Proving Redundancy Criteria for Sequent Calculi (AV), pp. 401–412.
- ICDAR-1999-BansalS #on the #recognition
- On How to Describe Shapes of Devanagari Characters and Use Them for Recognition (VB, RMKS), pp. 410–413.
- ICDAR-1999-Phillips #image #set
- How to Extend and Bootstrap an Existing Data Set with Real-life Degraded Images (ITP), pp. 689–692.
- ITiCSE-1999-KopecCA #algorithm #data type
- How should data structures and algorithms be taught (DK, RC, JA), pp. 175–176.
- CHI-1999-HornofK #modelling #people
- Cognitive Modeling Demonstrates How People Use Anticipated Location Knowledge of Menu Items (AJH, DEK), pp. 410–417.
- CHI-1999-KristoffersenL #empirical #interactive #modelling #people
- An Empirical Study of How People Establish Interaction: Implications for CSCW Session Management Models (SK, FL), pp. 1–8.
- HCI-CCAD-1999-BoschianLDMJ #artificial reality #people #question
- How can people with disabilities navigate in virtual reality with an input device they can use? (KB, AL, RCD, UM, GJ), pp. 1111–1115.
- HCI-CCAD-1999-NisslerMH #3d #classification #design
- How to get the right outfit for my agent? Classification — and design methodology for a virtual shopping assistant in a 3D world (JN, JM, AH), pp. 162–166.
- HCI-EI-1999-Forbrig #modelling
- How Software Engineers Deal with Task Models (PF), pp. 1322–1326.
- HCI-EI-1999-Kohlisch #interactive
- How to determine optimal system response times in interactive computer tasks (OK), pp. 201–204.
- HCI-EI-1999-Solberg
- IT-quality and employees ability to cope, and how age affects subjective IT-quality (LAS), pp. 173–177.
- HCI-EI-1999-SunCH #3d #case study
- A Study on How Depth Perception Is Affected by Different Presentations of 3D Objects (HS, KWC, PAH), pp. 481–485.
- ICEIS-1999-Carneiro #effectiveness #question
- How Decision Support Systems Influence Management Decision Effectiveness? (AC), pp. 51–58.
- ACIR-1999-Rodden #people #question
- How Do People Organise Their Photographs? (KR).
- UML-1999-MillerW #classification #question
- How Can Anything be Both a Classifier and a Package? (JM, RWB), pp. 584–597.
- TOOLS-PACIFIC-1999-SchmolitzkyEKM #question #type safety
- How Can Covariance in Pragmatical Class Methods be Made Statically Type-Safe? (AS, ME, JLK, GM), pp. 200–209.
- AdaEurope-1999-MirandaGMG #ada #empirical
- How to Modify the GNAT Frontend tp Experiment with Ada Extensions (FJMG, FGS, JM, AG), pp. 226–237.
- RE-1999-Easterbrook #multi #question
- How Multi-Disciplinary Is RE (really)? (SME, BN), p. 33–?.
- DAC-1999-FranzonBFMPSW #question
- Parasitic Extraction Accuracy — How Much is Enough? (PDF, MB, AF, SM, RP, RCS, MW), p. 429.
- DATE-1999-Holzheuer #analysis #process
- How to use Knowledge in an Analysis Process (HH), pp. 498–502.
- ECDL-1998-Houstis #question #repository #scalability #towards #what
- Federated Scientific Data Repositories for the Environment Towards Global Scalable Management of Environmental Information: How Useful Will They Be? What Is Their Potential Impact? Shall We Save the Environment? (CEH), pp. 741–742.
- SIGMOD-1998-ChaudhuriMN #question #random
- Random Sampling for Histogram Construction: How much is enough? (SC, RM, VRN), pp. 436–447.
- VLDB-1998-BlottKS #communication #question #what
- Information, Communication, and Money: For What Can We Charge and How Can We Meter It? (SB, HFK, AS), p. 697.
- FM-1998-GoerigkH #compilation #correctness #implementation
- Rigorous Compiler Implementation Correctness: How to Prove the Real Thing Correct (WG, UH), pp. 122–136.
- CHI-1998-AaltonenHR #question
- 101 Spots, or How Do Users Read Menus? (AA, AH, KJR), pp. 132–139.
- ICPR-1998-SchechnerK #question
- Depth from defocus vs. stereo: how different really are they? (YYS, NK), pp. 1784–1786.
- KR-1998-Morik #requirements
- How to Tailor Representations to Different Requirements (KM), p. 650.
- KR-1998-Thielscher
- How (Not) To Minimize Events (MT), pp. 60–73.
- KR-1998-Weydert #canonical #knowledge base #ranking
- SYSTEM JZ — How to Build a Canonical Ranking Model of a Default Knowledge Base (EW), pp. 190–201.
- SIGIR-1998-Zobel #information retrieval #question #reliability #scalability
- How Reliable Are the Results of Large-Scale Information Retrieval Experiments? (JZ), pp. 307–314.
- OOPSLA-1998-AgerboC #design pattern
- How to Preserve the Benefits of Design Patterns (EA, AC), pp. 134–143.
- TOOLS-USA-1998-Mellor98a #behaviour #modelling #question
- Modeling Complex Behavior Simply or How Much is Too Much? (SJM), p. 444.
- AdaEurope-1998-EmeryMN #ada #automation #process #question
- Automating the Ada Binding Process for Java- How Far Can We Go? (DEE, RFM, KAN), pp. 29–40.
- AdaEurope-1998-SchumacherN #ada #inheritance
- How to Avoid the Inheritance Anomaly in Ada (GS, WN), pp. 53–64.
- ICRE-1998-HammerH #automation #case study #experience #requirements #tool support
- Automated Requirements Management — Beware HOW You Use Tools: An Experience Report (TH, LH), pp. 34–40.
- ICSE-1998-KoikeC #3d #empirical #re-engineering #visualisation
- How Does 3D Visualization Work in Software Engineering? : Empirical Study of a 3D Version/Module Visualization System (HK, HCC), pp. 516–519.
- ICSE-1998-SimH #case study #problem
- The Ramp-Up Problem in Software Projects: A Case Study of How Software Immigrants Naturalize (SES, RCH), pp. 361–370.
- ISMM-1998-AzaguryKPY #set
- Combining Card Marking with Remembered Sets: How to Save Scanning Time (AA, EKK, EP, ZY), pp. 10–19.
- LICS-1998-Alfaro #behaviour #probability #verification
- How to Specify and Verify the Long-Run Average Behavior of Probabilistic Systems (LdA), pp. 454–465.
- WCRE-1997-StoreyWM #comprehension #question #source code #tool support
- How Do Program Understanding Tools Affect How Programmers Understand Programs? (MADS, KW, HAM), p. 12–?.
- DLT-1997-FernauS
- How Powerful is Unconditional Transfer? — When UT meets AC (HF, FS), pp. 249–260.
- CHI-1997-BarrettMK #personalisation #web
- How to Personalize the Web (RB, PPM, DCK), pp. 75–82.
- CHI-1997-VolbrachtDSF #3d #effectiveness #question
- How Effective are 3D Display Modes? (SV, GD, KS, GF), pp. 540–541.
- HCI-CC-1997-Blanchard #human-computer #interactive #question #standard #what
- International Standards on Human-Computer Interaction: What is Out There and How Will it be Implemented? (HEB), pp. 599–602.
- HCI-CC-1997-FunadaYIN #analysis #effectiveness #evaluation #human-computer #performance
- How Efficient are Combined Tasks for Effective HCI?: An Objective Evaluation Through AR Analysis of EEG (MFF, YY, KI, SPN), pp. 579–582.
- HCI-CC-1997-Kurosu
- Wind from East: When Will it Blow and How (MK), pp. 141–144.
- HCI-CC-1997-PaneroLN #people
- The Computer Use Scale: Four Dimensions of How People Use Computer (JCP, DML, HAN), pp. 821–824.
- HCI-CC-1997-PeperHS #assessment
- How to Use Applied Psychophysiology/Biofeedback in the Prevention and Assessment of Upper Extremity Musculoskeletal Disorders (EP, RH, DMS), pp. 551–554.
- HCI-SEC-1997-Hakiel #question #re-engineering #usability
- Usability Engineering and Software Engineering: How Do They Relate? (SH), pp. 521–524.
- CAiSE-1997-CathalaP #behaviour #why
- Preserving Behaviour: Why and How (FC, PP), pp. 333–346.
- EDOC-1997-Tyndale-BiscoeW
- Machine responsibility — how to deal with it (STB, BW), pp. 48–56.
- ACIR-1997-MateevMS #dependence
- Where the Linked Dependence Assumption Fails and How to Move Beyond It (BM, EM, PS).
- SIGIR-1997-Cooper #approximate
- How to Read Less and Know More — Approximate OCR for Thai (DC), pp. 216–225.
- PLILP-1997-Serrano #question
- Inline Expansion: When and How? (MS), pp. 143–157.
- RE-1997-Miller #question #requirements #research
- How Can Requirements Engineering Research Become Requirements Engineering Practice? (SM), p. 260.
- ICSE-1997-BasiliM #experience
- The Experience Factory: How to Build and Run One (VRB, FEM), pp. 643–644.
- CADE-1997-Egly
- Some Pitfalls of LK-to-LJ Translations and How to Avoid Them (UE), pp. 116–130.
- LICS-1997-DziembowskiJW #game studies #infinity #memory management #question
- How Much Memory is Needed to Win Infinite Games? (SD, MJ, IW), pp. 99–110.
- VLDB-1996-Rengarajan #performance #sql
- How System 11 SQL Server Became Fast (TKR), p. 590.
- ITiCSE-1996-Naps #algorithm #visualisation #web #why
- Algorithm visualization served off the World Wide Web: why and how (TLN), pp. 66–71.
- ITiCSE-1996-ProulxRF #education #question #what
- Foundations of computer science: what are they and how do we teach them? (VKP, RR, HJF), pp. 42–48.
- ITiCSE-1996-Tjaden #learning #student #visual notation
- How visual software influences learning in college students (BJT), p. 229.
- ICSM-1996-KellerCPZ #maintenance #question
- How Much Has Software Maintenance Changed Since 1983? (TK, NC, TMP, NZ), p. 34–?.
- WCRE-1996-WoodsQ #algorithm #comprehension #recognition #towards
- Some Experiments Toward Understanding How Program Plan Recognition Algorithms Scale (SW, AQ), pp. 21–30.
- WIA-1996-Schubert #automaton #sorting
- How to Use Sorting Procedures to Minimize DFA (BS), pp. 159–166.
- FME-1996-Hoare #proving #question #reliability
- How Did Software Get So Reliable Without Proof? (CARH), pp. 1–17.
- CSCW-1996-Elliott #case study
- Conflict and Cooperation in the Courts: Case Study of how CSCW Alters Work (doctoral colloquium) (MSE), p. 445.
- CSCW-1996-Lin
- How Organizational Structure and Culture shape CSCW (doctoral colloquium) (AL), p. 446.
- CSCW-1996-Yankelovich #collaboration #education #internet
- An Introduction to the Internet and How it can be Used for Collaboration for K-12 Teachers (NY), p. 3.
- LOPSTR-1996-LeuschelS #logic programming
- Logic Program Specialisation: How to Be More Specific (ML, DDS), p. 58.
- PLILP-1996-LeuschelS #logic programming
- Logic Program Specialisation: How To Be More Specific (ML, DDS), pp. 137–151.
- ICRE-1996-Cheng #formal method #question #requirements
- Where and How do Formal Methods Fit in Requirements Engineering? (BHCC), pp. 154–156.
- ICSE-1996-Hoare #proving #question #reliability
- The Role of Formal Techniques: Past, Current and Future or How Did Software Get so Reliable without Proof? (CARH), pp. 233–234.
- ICSE-1996-Kaindl #domain model #identification #modelling
- How to Identify Binary Relations for Domain Models (HK), pp. 28–36.
- ICSE-1996-Schneider #prototype #why
- Prototypes as Assets, not Toys: Why and How to Extract Knowledge from Prototypes (KS), pp. 522–531.
- SAC-1996-LeeHHC #case study #implementation #performance #problem #process #set
- Efficient implementations of two variant subset sum problems: a case study of how to process appraisal books resulting from fire-destroyed money (PL, FYH, CYH, HTC), pp. 230–237.
- CC-1996-Assmann #graph grammar #program analysis #program transformation #term rewriting
- How to Uniformly Specify Program Analysis and Transformation with Graph Rewrite Systems (UA), pp. 121–135.
- DAC-1996-HutchinsH #perl #tool support
- How to Write Awk and Perl Scripts to Enable Your EDA Tools to Work Together (RCH, SH), pp. 409–414.
- STOC-1996-AwerbuchAFL #nondeterminism
- Making Commitments in the Face of Uncertainty: How to Pick a Winner Almost Every Time (BA, YA, AF, FTL), pp. 519–530.
- STOC-1996-Karloff #algorithm #question
- How Good is the Goemans-Williamson MAX CUT Algorithm? (HJK), pp. 427–434.
- VLDB-1995-Vaskevitch #database #question #scalability
- Very Large Databases: How Large, How Different? (DV), pp. 677–685.
- ICALP-1995-ParraS #graph
- How to Use the Minimal Separators of a Graph for its Chordal Triangulation (AP, PS), pp. 123–134.
- FPCA-1995-SchauserG #question #source code #strict
- How Much Non-Strictness do Lenient Programs Require? (KES, SCG), pp. 216–225.
- KDD-1995-BuntineP
- Intelligent Instruments: Discovering How to Turn Spectral Data into Information (WLB, TP), pp. 33–38.
- KDD-1995-MurthyS #effectiveness #heuristic #induction #question
- Decision Tree Induction: How Effective is the Greedy Heuristic? (SKM, SS), pp. 222–227.
- OOPSLA-1995-Riehle #encapsulation #why
- How and Why to Encapsulate Class Trees (DR), pp. 251–264.
- RE-1995-MaidenMS #approach #people #requirements #reuse
- How People Categorise Requirements for Reuse: a Natural Approach (NAMM, PM, AGS), pp. 148–157.
- ICSE-1995-CugolaNGM #process
- How to Deal With Deviations During Process Model Enactment (GC, EDN, CG, MM), pp. 265–273.
- HPCA-1995-FarkasJC #execution #multi #question
- How Useful Are Non-Blocking Loads, Stream Buffers and Speculative Execution in Multiple Issue Processors? (KIF, NPJ, PC), pp. 78–89.
- STOC-1995-HellersteinPRW #query #question
- How many queries are needed to learn? (LH, KP, VR, DW), pp. 190–199.
- TACAS-1995-RoscoeGGHJS #concurrent #csp #model checking
- Hierarchical Compression for Model-Checking CSP or How to Check 1020 Dining Philosophers for Deadlock (AWR, PHBG, MG, JRH, DMJ, JBS), pp. 133–152.
- ILPS-1995-Wadler #imperative
- How to Declare an Imperative (PW), pp. 18–32.
- VLDB-1994-Lesk #image #library
- Experiments on Access to Digital Libraries: How can Images and Text be Used Together (ML), pp. 655–667.
- CSEE-1994-McCartyP #maturity #process #question
- How Mature is Your Software Process? (WBM, GTP), pp. 555–564.
- CHI-1994-WhittakerFD94a #communication #question #what
- Informal workplace communication: what is it like and how might we support it? (SW, DF, ODJ), pp. 131–137.
- KR-1994-Gotts #using
- How Far Can We “C”? Defining a “Doughnut” Using Connection Alone (NMG), pp. 246–257.
- KR-1994-LinR #database #logic #why
- How to Progress a Database (and Why) I. Logical Foundations (FL, RR), pp. 425–436.
- KR-1994-Val #compilation #database
- Tractable Databases: How to Make Propositional Unit Resolution Complete Through Compilation (AdV), pp. 551–561.
- AdaEurope-1994-Gray #ada #question
- How Should Military Ada Software be Documented? (LG), pp. 162–169.
- AdaEurope-1994-Kettani #ada #realtime
- How to Avoid and Control Proliferation of New Ada Real Time Extensions (NK), pp. 349–354.
- ALP-1994-WernerBK
- How to Realize LSE Narrowing (AW, AB, SK), pp. 59–76.
- PLDI-1994-Pugh #why
- Counting Solutions to Presburger Formulas: How and Why (WP), pp. 121–134.
- STOC-1994-SantisDFY
- How to share a function securely (ADS, YD, YF, MY), pp. 522–533.
- CADE-1994-Bundgen #on the
- On Pot, Pans and Pudding or How to Discover Generalised Critical Pairs (RB), pp. 693–707.
- LICS-1994-HellaKL #finite #linear #modelling #order
- How to Define a Linear Order on Finite Models (LH, PGK, KL), pp. 40–49.
- SIGMOD-1993-Vieille #database #deduction #object-oriented #question #why
- A Deductive and Object-Oriented Database System: Why and How? (LV), p. 438.
- CSM-1993-KamkarFS #interprocedural #slicing #testing
- Interprocedural Dynamic Slicing Applied to Interprocedural Data How Testing (MK, PF, NS), pp. 386–395.
- HCI-ACS-1993-BollenS #automation #case study #process
- How to Survive Process Control Automation: A Case Study of Integral User Participation (LAAB, TWvdS), pp. 121–126.
- HCI-ACS-1993-Soderberg #design
- How the Design of the Premises Supports a New Organizational Structure as Viewed by Full-Time Operators in Large-Scaled Tele-Services (IS), pp. 839–844.
- INTERCHI-1993-AllenBBMMNS #design #process #question #why
- User involvement in the design process: why, when & how? (CDA, DB, VB, HHMJ, MM, JN, JMS), pp. 251–254.
- INTERCHI-1993-NeerincxG
- How to aid non-experts (MAN, PdG), pp. 165–171.
- INTERCHI-1993-ODayJ
- Orienteering in an information landscape: how information seekers get from here to there (VLO, RJ), pp. 438–445.
- INTERCHI-1993-RussoB #design #interface
- How fluent is your interface?: designing for international users (PR, SB), pp. 342–347.
- ICML-1993-RendersBS #adaptation #black box
- Adaptive NeuroControl: How Black Box and Simple can it be (JMR, HB, MS), pp. 260–267.
- SEKE-1993-StaryF #design #semantics #specification
- How Semantical Design Languages Help to Preserve Specification/Design-Consistency (CS, RF), pp. 462–471.
- TOOLS-PACIFIC-1993-MenziesS #black box #constraints #framework
- How to Edit “It”; or: A “Black-box” Constraint-Based Framework for User-Interaction with Arbitrary Structures (TM, RS), pp. 213–224.
- ESEC-1993-Denert #question #re-engineering
- Software Engineering in Business and Academia: How Wide is the Gap? (ED), pp. 37–47.
- PDP-1993-CorradiLZ #architecture #locality #migration #parallel
- How to apply locality to achieve load balancing: migration in massively parallel architecture (AC, LL, FZ), pp. 43–50.
- STOC-1993-BorodinRSU #hardware #question
- How much can hardware help routing? (AB, PR, BS, EU), pp. 573–582.
- STOC-1993-Cesa-BianchiFHHSW
- How to use expert advice (NCB, YF, DPH, DH, RES, MKW), pp. 382–391.
- ICALP-1992-KirschenhoferPS #analysis #probability #problem
- How to Count Quickly and Accurately: A Unified Analysis of Probabilistic Counting and Other Related Problems (PK, HP, WS), pp. 211–222.
- ICALP-1992-Rote #metric
- A New Metric Between Polygons and How to Compute it (GR), pp. 404–415.
- CHI-1992-Brouwer-JanseBENSG #interface #question
- Interfaces for consumer products: how to camouflage the computer? (MDBJ, RWB, TE, FLvN, HJS, DRG), pp. 287–290.
- CSCW-1992-OlsonOSC #design
- How a Group-Editor Changes the Character of a Design Meeting as well as Its Outcome (JSO, GMO, MS, MRC), pp. 91–98.
- CAiSE-1992-MacGinnes #analysis #object-oriented #question
- How Objective is Object-Oriented Analysis? (SM), pp. 1–16.
- TOOLS-USA-1992-Weber #correctness
- Getting Class Correctness and System Correctness Equivalent (How to get covariance right) (FW), pp. 199–213.
- PLDI-1992-DhamdhereRZ #scalability #source code
- How to Analyze Large Programs Efficiently and Informatively (DMD, BKR, FKZ), pp. 212–223.
- TRI-Ada-C-1992-Gerhardt #ada
- How “Outsiders” see Ada and its Future (MG), pp. 361–363.
- HT-1991-ThuringHH #what
- What’s Eliza Doing in the Chinese Room? Incoherent Hyperdocuments — and How to Avoid Them (MT, JMH, JH), pp. 161–177.
- RTA-1991-BaaderN #algebra #commutative #equation #morphism #unification
- Adding Homomorphisms to Commutative/Monoidal Theories or How Algebra Can Help in Equational Unification (FB, WN), pp. 124–135.
- ML-1991-WhitehallL #case study #knowledge-based #learning
- A Study of How Domain Knowledge Improves Knowledge-Based Learning Systems (BLW, SCYL), pp. 559–563.
- OOPSLA-1991-Snyder
- How to Get Your Paper Accepted at OOPSLA (AS), pp. 359–363.
- TOOLS-USA-1991-Meyer #question
- Do we know how to find the classes? (BM), pp. 349–350.
- POPL-1991-Odersky
- How to Make Destructive Updates Less Destructive (MO), pp. 25–36.
- CSL-1991-Dahlhaus #first-order #memory management #modelling
- How to Implement First Order Formulas in Local Memory Machine Models (ED), pp. 68–78.
- TAV-1991-OffuttL #question
- How Strong is Weak Mutation? (AJO, SDL), pp. 200–213.
- VLDB-1990-NaughtonR
- How to Forget the Past Without Repeating It (JFN, RR), pp. 278–289.
- CHI-1990-GillanHARM #question
- How does Fitts’ law fit pointing and dragging? (DJG, KLH, SA, MR, LM), pp. 227–234.
- CSCW-1990-MaloneC #coordination #design #question #what
- What is Coordination Theory and How Can It Help Design Cooperative Work Systems? (TWM, KC), pp. 357–370.
- CAiSE-1990-SmolanderTL #case study #tool support
- How to Combine Tools and Methods in Practice — a Field Study (KS, VPT, KL), pp. 195–214.
- PLDI-1990-Clinger #float
- How to Read Floating-Point Numbers Accurately (WDC), pp. 92–101.
- PLDI-1990-SteeleW #float
- How to Print Floating-Point Numbers Accurately (GLSJ, JLW), pp. 112–126.
- Best-of-PLDI-1990-Clinger90a #float
- How to read floating point numbers accurately (with retrospective) (WDC), pp. 360–371.
- Best-of-PLDI-1990-SteeleW90a #float
- How to print floating-point numbers accurately (with retrospective) (GLSJ, JLW), pp. 372–389.
- DAC-1990-Fishburn #heuristic #logic
- A Depth-Decreasing Heuristic for Combinational Logic: Or How To Convert a Ripple-Carry Adder Into A Carry-Lookahead Adder Or Anything in-between (JPF), pp. 361–364.
- STOC-1990-DietzfelbingerH #network #taxonomy
- How to Distribute a Dictionary in a Complete Network (MD, FMadH), pp. 117–127.
- CLP-1990-Harel90 #question #source code
- How Hard Is It to Reason about Propositional Programs? (DH), pp. 772–773.
- HT-1989-MarshallI #hypermedia #online
- Guided Tours and On-Line Presentations: How Authors Make Existing Hypertext Intelligible for Readers (CCM, PMI), pp. 15–26.
- ICALP-1989-LiV #concurrent
- How to Share Concurrent Asynchronous Wait-Free Variables (ML, PMBV), pp. 488–505.
- RTA-1989-Lai #commutative #on the
- On How To Move Mountains “Associatively and Commutatively” (ML), pp. 187–202.
- CHI-1989-Hill
- How some advice fails (WCH), pp. 85–90.
- CHI-1989-MackayMCRRC #lens #question
- How do experienced information lens users use rules? (WEM, TWM, KC, RR, DR, SKC), pp. 211–216.
- CAiSE-1989-KinnulaM #automation #tool support
- How to Test and Compare CASE tools (TK, JM).
- CAiSE-1989-LagerkvistN #automation #tool support
- How to Succeed with Modern Tools such as the CASE tool “Deft” on the Macintosh (CL, ÅN).
- CAiSE-1989-Lustig #automation #tool support
- How CASE Tools and Methods Relate to Each Other (GL).
- SIGIR-1989-Kwasnik #classification #documentation
- How a Personal Document’s Intended Use or Purpose Affects its Classification in an Office (BHK), pp. 207–210.
- POPL-1989-WadlerB #ad hoc #morphism #polymorphism
- How to Make ad-hoc Polymorphism Less ad-hoc (PW, SB), pp. 60–76.
- LICS-1989-Robinson #question
- How Complete is PER? (ER), pp. 106–111.
- NACLP-1989-SinghalP #parallel #question #unification
- Unification Parallelism: How Much Can We Exploit? (AS, YNP), pp. 1135–1147.
- SEI-1988-Werth #tool support #what #why
- Software Tools at the University: Why, What and How (LHW), pp. 169–186.
- ICALP-1988-MehlhornY #theorem
- Constructive Hopf’s Theorem: Or How to Untangle Closed Planar Curves (KM, CKY), pp. 410–423.
- SIGIR-1988-Case #comprehension #retrieval #scalability #using
- How Do the Experts Do It? The Use of Ethnographic Methods as an Aid to Understanding the Cognitive Processing and Retrieval of Large Bodies of Text (DOC), pp. 127–133.
- SIGIR-1988-Pevzner #database #why
- Precedental Data Bases: How and Why They are Worked Out and Used (BP), pp. 117–125.
- OOPSLA-1988-Shibayama #approach #concurrent #distributed #implementation
- How To Invent Distributed Implementation Schemes of an Object-Based Concurrent Language: A Transformational Approach (ES), pp. 297–305.
- DAC-1988-CongW
- How to Obtain More Compactable Channel Routing Solutions (JC, DFW), pp. 663–666.
- STOC-1988-BellareM
- How to Sign Given Any Trapdoor Function (MB, SM), pp. 32–42.
- STOC-1988-Ben-OrGKW #interactive #multi #proving
- Multi-Prover Interactive Proofs: How to Remove Intractability Assumptions (MBO, SG, JK, AW), pp. 113–131.
- STOC-1988-Broder #approximate #random
- Errata to “How hard is to marry at random? (On the approximation of the permanent)” (AZB), p. 551.
- RTA-1987-Martin
- How to Choose Weights in the Knuth Bendix Ordering (UM), pp. 42–53.
- HCI-SES-1987-MoodyJR #question
- Vigilance and Its Role in AI Technology: How Smart is Too Smart? (TM, MJ, RR), pp. 263–270.
- ASPLOS-1987-ChowCHKW #question
- How Many Addressing Modes are Enough? (FCC, SC, MIH, EK, LW), pp. 117–121.
- STOC-1987-GoldreichMW #game studies #protocol #theorem
- How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority (OG, SM, AW), pp. 218–229.
- STOC-1986-Broder #approximate #random
- How hard is to marry at random? (On the approximation of the permanent) (AZB), pp. 50–58.
- CADE-1986-MannaW #logic
- How to Clear a Block: Plan Formation in Situational Logic (ZM, RJW), pp. 622–640.
- CADE-1986-Toyama #equivalence #induction #term rewriting
- How to Prove Equivalence of Term Rewriting Systems without Induction (YT), pp. 118–127.
- ICLP-1986-Kursawe86 #prolog
- How to Invent a Prolog Machine (PK), pp. 134–148.
- LICS-1986-Schlipf #question
- How Uncomputable is General Circumscription? (JSS), pp. 92–95.
- FPCA-1985-Wadler85 #backtracking #exception #functional #lazy evaluation #pattern matching
- How to Replace Failure by a List of Successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages (PW), pp. 113–128.
- SIGIR-1985-CanasSC #concept #documentation #people
- A Conceptual Model aod Experiments on How People Classify and Retrieve Documents (AJC, FRS, DWC), pp. 282–287.
- AS-1985-ParnasC #design #process #why
- A Rational Design Process: How and Why to Fake It (DLP, PCC), pp. 80–100.
- DAC-1984-Zingale
- The semi-custom revolution: How to thrive or survive (AZ), pp. 649–650.
- STOC-1984-Gerth #composition #logic
- Transition Logic: How to Reason About Temporal Properties in a Compositional Way (RG), pp. 39–50.
- VLDB-1983-VassiliouCJ #question
- How Does an Expert System Get its Data? (YV, JC, MJ), pp. 70–72.
- ICALP-1983-HartS #concurrent #probability
- Concurrent Probabilistic Program, or: How to Schedule if You Must (SH, MS), pp. 304–318.
- POPL-1983-MannaP #proving
- How to Cook a Temporal Proof System for Your Pet Language (ZM, AP), pp. 141–154.
- STOC-1983-Bach #integer #random
- How to Generate Random Integers with Known Factorization (EB), pp. 184–188.
- STOC-1983-Blum
- How to Exchange (Secret) Keys (MB), pp. 440–447.
- STOC-1983-LongW #question
- How Discreet is the Discrete Log? (DLL, AW), pp. 413–420.
- LFP-1982-Moss #prolog #using
- How to Define a Language Using PROLOG (CDSM), pp. 67–73.
- STOC-1982-BhattL
- How to Assemble Tree Machines (SNB, CEL), pp. 77–84.
- STOC-1982-GoldwasserM #encryption #game studies #probability
- Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information (SG, SM), pp. 365–377.
- STOC-1982-RivestS #memory management #reuse
- How to Reuse a “Write-Once” Memory (RLR, AS), pp. 105–113.
- ICALP-1980-Ainhirn #pseudo
- How to Get Rid of Pseudoterminals (WA), pp. 1–11.
- CADE-1980-Guguen #algebra #induction
- How to Prove Algebraic Inductive Hypotheses Without Induction (JAG), pp. 356–373.
- CADE-1980-Noll
- A Note on Resolution: How to Get Rid of Factoring without Loosing Completeness (HN), pp. 250–263.
- ICSE-1978-Littlewood #reliability
- How to Measure Software Reliability, and How Not To (BL), pp. 37–45.
- ICSE-1978-Stucki #question
- How Software is Really Engineered? (LGS), p. 84.
- DAC-1978-LekkosP #logic #pseudo #refinement #using
- How to develop module logic using pseudo-code and stepwise refinement (AAL, CMP), pp. 366–370.
- ICALP-1977-AhoS #code generation #compilation #question
- How Hard is Compiler Code Generation? (AVA, RS), pp. 1–15.
- ICSE-1976-Fabry #design #on the fly
- How to Design a System in Which Modules Can Be Changed on the Fly (RSF), pp. 470–476.
- ICSE-1976-Wexelblat #design #programming
- Maxims for Malfeasant Designers, or How to Design Languages to Make Programming as Difficult as Possible (RLW), pp. 331–336.
- SOSP-1975-Kain #algorithm
- How to Evaluate Page Replacement Algorithms (RYK), pp. 1–5.
- SIGIR-1971-DostertT #ambiguity
- How Features Resolve Syntactic Ambiguity (BHD, FBT), pp. 19–32.
- SOSP-1971-Rodriguez-Rosell #behaviour #parametricity
- Experimental Data on How Program Behavior Affects the Choice of Scheduler Parameters (JRR), pp. 156–163.