15 papers:
WICSA-2015-MartiniB #architecture #technical debt- The Danger of Architectural Technical Debt: Contagious Debt and Vicious Circles (AM, JB), pp. 1–10.
DHM-2014-IshidaSK- Safe Walker-Shoes That Alert the Wearer to a Danger (MI, HS, TK), pp. 612–619.
DUXU-ELAS-2014-MontAlvao #bibliography #health #using- Health Care Professionals vs Other Professionals: Do They Have Different Perceptions about Health Care Waste and Dangerous Products Pictograms? Some Findings Using a Digital Device in Field Survey (CRM), pp. 83–90.
FASE-2012-StaatsGWH #generative #on the #testing- On the Danger of Coverage Directed Test Case Generation (MS, GG, MWW, MPEH), pp. 409–424.
ECOOP-2012-NegaraVCJD #evolution #question #source code #version control- Is It Dangerous to Use Version Control Histories to Study Source Code Evolution? (SN, MV, NC, REJ, DD), pp. 79–103.
HT-2011-Gayo-Avello- All liaisons are dangerous when all your friends are known to us (DGA), pp. 171–180.
SIGMOD-2011-BorisovBMU- Warding off the dangers of data corruption with amulet (NB, SB, NM, SU), pp. 277–288.
CHI-2011-ONeillMCG- When a little knowledge isn’t a dangerous thing (JO, DBM, TC, AG), pp. 1667–1676.
ITiCSE-2008-MurphyT #education #research #self- Dangers of a fixed mindset: implications of self-theories research for computer science education (LM, LT), pp. 271–275.
MSR-2008-Bernstein #data mining #how #mining- How to learn enough data mining to be dangerous in 60 minutes (AB), pp. 77–78.
SAT-2007-HertelHU #encoding #formal method #satisfiability- Formalizing Dangerous SAT Encodings (AH, PH, AU), pp. 159–172.
SAC-2003-Abdellatif-KaddourTW #testing- Property-Oriented Testing: A Strategy for Exploring Dangerous Scenarios (OAK, PTF, HW), pp. 1128–1134.
AdaEurope-1997-English #inheritance- Tha Dangers of Inheritance (JE), pp. 185–195.
SIGMOD-1996-GrayHOS #replication- The Dangers of Replication and a Solution (JG, PH, PEO, DS), pp. 173–182.
HCI-ACS-1993-Smith #automation- Automation of Work in Dangerous Environments (TJS), pp. 273–277.