124 papers:
- MSR-2015-LinW #fine-grained #why
- Why Power Laws? An Explanation from Fine-Grained Code Changes (ZL, JW), pp. 68–75.
- CSCW-2015-FieslerFB #community #comprehension #online
- Understanding Copyright Law in Online Creative Communities (CF, JLF, ASB), pp. 116–129.
- HCI-IT-2015-MurataMF #modelling #performance
- Effects of Target Shape and Display Location on Pointing Performance by Eye-Gaze Input System — Modeling of Pointing Time by Extended Fitts’ Law (AM, MM, DF), pp. 94–106.
- PLDI-2014-Hoare #concurrent #programming
- Laws of concurrent programming (CARH), p. 20.
- CHI-2014-TraftonR
- The law of unintended consequences: the case of external subgoal support (JGT, RMR), pp. 1767–1776.
- CAiSE-2014-SkoulisVZ #database #evolution #open source #question
- Open-Source Databases: Within, Outside, or Beyond Lehman’s Laws of Software Evolution? (IS, PV, AZ), pp. 379–393.
- SIGIR-2014-BabbarPGA #approach #classification #distributed #ranking #scalability
- Re-ranking approach to classification in large-scale power-law distributed category systems (RB, IP, ÉG, MRA), pp. 1059–1062.
- MoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using
- Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
- MoDELS-2014-SoltanaFASB #approach #case study #modelling #uml #using
- Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
- POPL-2014-Atkey #parametricity #theorem
- From parametricity to conservation laws, via Noether’s theorem (RA), pp. 491–502.
- SAC-2014-EngielCL #approach #concept #elicitation #using
- Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
- WCRE-2013-DuranBS #agile
- Lehman’s laws in agile and non-agile projects (KD, GB, PS), pp. 292–300.
- CHI-2013-BiLZ #modelling
- FFitts law: modeling finger touch with fitts’ law (XB, YL, SZ), pp. 1363–1372.
- ICEIS-v1-2013-AndradeRYS #data-driven #database #novel #similarity
- A Novel Method for Similarity Search over Meteorological Time Series Data based on the Coulomb’s Law (CGdA, MXR, CAY, MTPS), pp. 209–216.
- SAC-2013-FuriaMOTW #automation #random testing #testing
- The search for the laws of automatic random testing (CAF, BM, MO, AT, YW), pp. 1211–1216.
- SLE-2013-DiskinKM #design pattern #megamodelling
- Mapping-Aware Megamodeling: Design Patterns and Laws (ZD, SK, TSEM), pp. 322–343.
- DAC-2012-PalemA #exclamation #what
- What to do about the end of Moore’s law, probably! (KVP, LA), pp. 924–929.
- WCRE-2012-GallagherCD #reverse engineering
- The Law and Reverse Engineering (KG, CC, JD), pp. 3–4.
- CHI-2012-Hutchings #multi
- An investigation of Fitts’ law in a multiple-display environment (DH), pp. 3181–3184.
- CHI-2012-ZhangZF #2d
- Extending Fitts’ law to account for the effects of movement direction on 2d pointing (XZ, HZ, WF), pp. 3185–3194.
- KDD-2012-Ma #information management #semantics
- Semantic search and a new moore’s law effect in knowledge engineering (WYM), p. 586.
- BX-2012-JohnsonR #lens
- Lens put-put laws: monotonic and mixed (MJ, RDR), pp. 55–67.
- RE-2012-Ghazarian #functional #requirements #taxonomy
- Characterization of functional software requirements space: The law of requirements taxonomic growth (AG), pp. 241–250.
- REFSQ-2012-BeckersFKS #identification
- A Pattern-Based Method for Identifying and Analyzing Laws (KB, SF, JCK, HS), pp. 256–262.
- ICST-2012-Oriol #evaluation #fault #random testing #testing
- Random Testing: Evaluation of a Law Describing the Number of Faults Found (MO), pp. 201–210.
- ICSM-2011-Dragan #object-oriented
- Emergent laws of method and class stereotypes in object oriented software (ND), pp. 550–555.
- WCRE-2011-GuoWGG #empirical #validation
- An Empirical Validation of the Benefits of Adhering to the Law of Demeter (YG, MW, EG, HCG), pp. 239–243.
- CHI-2011-GuiardOP #fault #trade-off
- Fitt’s law as an explicit time/error trade-off (YG, HBO, STP), pp. 1619–1628.
- CHI-2011-RohsOS #interactive #lens #validation
- Interaction with magic lenses: real-world validation of a Fitts’ Law model (MR, AO, TS), pp. 2725–2728.
- POPL-2011-AttiyaGHKMV #algorithm #concurrent #order
- Laws of order: expensive synchronization in concurrent algorithms cannot be eliminated (HA, RG, DH, PK, MMM, MTV), pp. 487–498.
- SAC-2011-SbaragliaCV #coordination #programming
- Programming coordination laws of artifacts in CArtAgO (MS, MC, MV), pp. 885–886.
- ICSE-2011-WilliamsW #contract #re-engineering #research
- The American law institute’s principles on software contracts and their ramifications for software engineering research (JBW, JHWJ), pp. 972–975.
- DRR-2010-ShahabKD #detection #web
- The aware toolbox for the detection of law infringements on web pages (AS, TK, AD), pp. 1–10.
- STOC-2010-BravermanO10a
- Zero-one frequency laws (VB, RO), pp. 281–290.
- CHI-2010-TullioHWZGT #experience #video
- Experience, adjustment, and engagement: the role of video in law enforcement (JT, EMH, DW, HZ, CVSG, AT), pp. 1505–1514.
- ICEIS-AIDSS-2010-CostaCNBA #approach
- An Agent-based Approach to Consumer’s Law Dispute Resolution (NC, DC, PN, DB, FA), pp. 103–110.
- ICEIS-J-2010-CostaCNBA10a
- An Advice System for Consumer’s Law Disputes (NC, DC, PN, DB, FA), pp. 237–248.
- KDD-2010-SatoN #modelling #process #topic #using
- Topic models with power-law using Pitman-Yor process (IS, HN), pp. 673–682.
- REFSQ-2010-IslamMW #elicitation #framework #privacy #requirements #security #towards
- Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations (SI, HM, SW), pp. 255–261.
- ASPLOS-2010-Brewer
- Technology for developing regions: Moore’s law is not enough (EAB), pp. 1–2.
- DAC-2009-CongNPJBGRRS #question
- Moore’s Law: another casualty of the financial meltdown? (JC, NSN, RP, WHJ, JB, MG, RR, PR, HS), pp. 202–203.
- VLDB-2009-LeeNS #estimation #set #similarity
- Power-Law Based Estimation of Set Similarity Join Size (HL, RTN, KS), pp. 658–669.
- ICSM-2009-AdamsCB #coordination
- Coordination and productivity issues in free software: The role of brooks’ law (PJA, AC, CB), pp. 319–328.
- IFM-2009-ZeydaC #diagrams
- Mechanised Translation of Control Law Diagrams into Circus (FZ, AC), pp. 151–166.
- CHI-2009-Guiard #consistency #design #distance #problem
- The problem of consistency in the design of Fitts’ law experiments: consider either target distance and width or movement form and scale (YG), pp. 1809–1818.
- HCD-2009-CangianoH #case study
- Capturing and Restoring the Context of Everyday Work: A Case Study at a Law Office (GRC, JDH), pp. 945–954.
- HIMI-II-2009-OkadaAF
- Investigation on Relation between Index of Difficulty in Fitts’ Law and Device Screen Sizes (HO, TA, RF), pp. 423–429.
- ASE-2008-GibbsBSDC #automation #question
- Living with the Law: Can Automation give us Moore with Less? (CG, JB, NS, MD, YC), pp. 395–398.
- WCRE-2008-Zhang #source code
- Exploring Regularity in Source Code: Software Science and Zipf’s Law (HZ), pp. 101–110.
- SEFM-2008-SilvaSL #object-oriented #semantics
- Laws of Object-Orientation with Reference Semantics (LS, AS, ZL), pp. 217–226.
- CHI-2008-WobbrockCHM #fault
- An error model for pointing based on Fitts’ law (JOW, EC, SH, ISM), pp. 1613–1622.
- KDD-2008-SeshadriMSBFL #graph #mobile
- Mobile call graphs: beyond power-law and lognormal distributions (MS, SM, AS, JB, CF, JL), pp. 596–604.
- HPCA-2008-Hill #manycore
- Amdahl’s Law in the multicore era (MDH), p. 187.
- HPCA-2008-WellsS
- Serializing instructions in system-intensive workloads: Amdahl’s Law strikes again (PMW, GSS), pp. 264–275.
- DATE-2007-Naumann #design #evolution #question
- Keynote address: Was Darwin wrong? Has design evolution stopped at the RTL level... or will software and custom processors (or system-level design) extend Moore’s law? (AN), p. 2.
- FoSSaCS-2007-HirschkoffP #congruence #π-calculus
- A Distribution Law for CCS and a New Congruence Result for the π-Calculus (DH, DP), pp. 228–242.
- IFM-2007-Chen #process
- Inheriting Laws for Processes with States (YC), pp. 138–155.
- CSEET-2006-Kay #named #re-engineering #tutorial
- Tutorial: Intellectual Property Law Basicsc For Software Engineering Educators (DGK), pp. 242–244.
- ICALP-v1-2006-FortnowHPVW #complexity
- Extracting Kolmogorov Complexity with Applications to Dimension Zero-One Laws (LF, JMH, AP, NVV, FW), pp. 335–345.
- ICPR-v3-2006-CaronV #evaluation #image #modelling #quality #using
- Compressed Image Quality Evaluation using Power Law Models (YC, NV), pp. 657–660.
- STOC-2005-AchlioptasCKM #bias #graph #on the
- On the bias of traceroute sampling: or, power-law degree distributions in regular graphs (DA, AC, DK, CM), pp. 694–703.
- FM-2005-CavalcantiCO #diagrams
- Control Law Diagrams in Circus (AC, PC, CO), pp. 253–268.
- CHI-2005-Ahlstrom #modelling #using
- Modeling and improving selection in cascading pull-down menus using Fitts’ law, the steering law and force fields (DA), pp. 61–70.
- KDD-2005-LeskovecKF #graph
- Graphs over time: densification laws, shrinking diameters and possible explanations (JL, JMK, CF), pp. 177–187.
- SAC-2005-SartorPV
- Computer-aided law and advanced technologies (GS, JVP, AV), pp. 280–281.
- DAC-2004-RutenbarBMPPSW #question
- Will Moore’s Law rule in the land of analog? (RAR, ARB, THYM, EP, RP, CS, JW), p. 633.
- SCAM-2004-HouHR #c++ #guidelines #programming #specification
- Specifying the Law of Demeter and C++ Programming Guidelines with FCL (DH, HJH, PR), pp. 119–127.
- ICEIS-v5-2004-Sneiders #tool support
- Tool Support for Legal Enquiry: Focus on Spatial-Planning Law (ES), pp. 289–294.
- SAC-2004-StefanoSPT #communication #framework
- Enforcing agent communication laws by means of a reflective framework (ADS, CS, GP, ET), pp. 462–468.
- LICS-2004-AkamaBHK
- An Arithmetical Hierarchy of the Law of Excluded Middle and Related Principles (YA, SB, SH, UK), pp. 192–201.
- SCAM-2003-WheeldonC
- Power Law Distributions in Class Relationships (RW, SC), pp. 45–54.
- CHI-2003-AccotZ #modelling
- Refining Fitts’ law models for bivariate pointing (JA, SZ), pp. 193–200.
- LICS-2003-Lynch #convergence #graph #random #sequence
- Convergence Law for Random Graphs with Specified Degree Sequence (JFL), p. 301–?.
- CSEET-2002-Kaner #re-engineering #tutorial
- Tutorial 4: Issues in Commmercial Law of Interest to Software Engineering Educators (CK), pp. 273–274.
- ICSM-2002-Munson #metric
- Implications of Software Measurement to Lehman’s Eight Laws (JCM), p. 69.
- ICSM-2002-Perry #evolution
- Laws and Principles of Evolution (DEP), p. 70.
- ICSM-2002-Ramil #empirical #evolution
- Laws of Software Evolution and Their Empirical Support (JFR), p. 71.
- ICALP-2002-FabrikantKP #internet #paradigm #trade-off
- Heuristically Optimized Trade-Offs: A New Paradigm for Power Laws in the Internet (AF, EK, CHP), pp. 110–122.
- CIKM-2002-Faloutsos #data mining #mining #network #self
- Future directions in data mining: streams, networks, self-similarity and power laws (CF), p. 93.
- CSL-2002-ChernovSSV #logic
- Variants of Realizability for Propositional Formulas and the Logic of the Weak Law of Excluded Middle (AVC, DPS, EZS, NKV), pp. 74–88.
- LICS-2002-Bars #logic #satisfiability
- The 0-1 law fails for frame satisfiability of propositional modal logic (JMLB), pp. 225–234.
- CSEET-2001-Kay #re-engineering
- Computer Law Basics for Software Engineering Educators (DGK), p. 289–?.
- CHI-2001-AccotZ
- Scale effects in steering law tasks (JA, SZ), pp. 1–8.
- SIGMOD-2000-FaloutsosSTT #using
- Spatial Join Selectivity Using Power Laws (CF, BS, AJMT, CTJ), pp. 177–188.
- ICML-2000-WashioMN #equation
- Enhancing the Plausibility of Law Equation Discovery (TW, HM, YN), pp. 1127–1134.
- CSL-2000-BlassG00a #polynomial
- Choiceless Polynomial Time Computation and the Zero-One Law (AB, YG), pp. 18–40.
- CHI-1999-AccotZ #evaluation #performance
- Performance Evaluation of Input Devices in Trajectory-Based Tasks: An Application of the Steering Law (JA, SZ), pp. 466–472.
- HCI-CCAD-1999-MurataFAI #2d #effectiveness
- Extending effective target width in Fitt’s law to two-dimensional pointing task (AM, MF, YA, HI), pp. 1236–1240.
- HCI-EI-1999-SchmittO #using
- Calculation of Totally Optimized Button Configurations Using Fitts’ Law (AS, PO), pp. 392–396.
- ICSE-1999-HerbslebG #revisited
- Splitting the Organization and Integrating the Code: Conway’s Law Revisited (JDH, REG), pp. 85–95.
- CSL-1999-Stewart #array #quantifier
- Program Schemes, Arrays, Lindström Quantifiers and Zero-One Laws (IAS), pp. 374–388.
- CHI-1998-FriedlanderSM #exclamation
- Bullseye! when Fitts’ Law Doesn’t Fit (NF, KS, MMM), pp. 257–264.
- ICPR-1998-Yang #image #scalability
- Invariance and scaling laws in natural images (ZY), pp. 728–730.
- ICPR-1998-YangX #image #retrieval #scalability
- Scaling laws in image gradient fields and texture retrieval (ZY, JX), pp. 1062–1064.
- LICS-1998-Bars #higher-order #logic
- Fragments of Existential Second-Order Logic without 0-1 Laws (JMLB), pp. 525–536.
- CHI-1997-AccotZ #human-computer #modelling
- Beyond Fitts’ Law: Models for Trajectory-Based HCI Tasks (JA, SZ), pp. 295–302.
- CHI-1997-PitkowP
- Life, Death, and Lawfulness on the Electronic Frontier (JEP, PP), pp. 383–390.
- PPoPP-1997-Prasanna #compilation #parallel
- Compilation of Parallel Multimedia Computations — Extending Retiming Theory and Amdahl’s Law (GNSP), pp. 180–192.
- VLDB-1996-FaloutsosMS #modelling #multi #using
- Modeling Skewed Distribution Using Multifractals and the “80-20” Law (CF, YM, AS), pp. 307–317.
- CSCW-1996-Post #tutorial
- Law in Cyberspace (Tutorial) (DGP), p. 6.
- KR-1996-Tennenholtz #equilibrium #on the #social
- On Stable Social Laws and Qualitative Equilibrium for Risk-Averse Agents (MT), pp. 553–561.
- LICS-1996-HirstH #complexity #recursion
- More About Recursive Structures: Descriptive Complexity and Zero-One Laws (TH, DH), pp. 334–347.
- LICS-1996-McColm #graph #random
- Zero-One Laws for Gilbert Random Graphs (GLM), pp. 360–369.
- CHI-1995-KabbashB #using
- The “Prince” Technique: Fitts’ Law and Selection Using Area Cursors (PK, WB), pp. 273–279.
- LICS-1995-DawarG #quantifier
- Generalized Quantifiers and 0-1 Laws (AD, EG), pp. 54–64.
- ICML-1994-Schaffer #performance
- A Conservation Law for Generalization Performance (CS), pp. 259–265.
- KDD-1994-TroxelSZZ #concept
- From Law-Like Knowledge to Concept Hierarchies in Data (MT, KS, RZ, JMZ), pp. 193–204.
- TOOLS-PACIFIC-1993-NakanishiAM #library
- Understandibility of Class Libraries and Zipf's Law (KN, TA, TM), pp. 225–232.
- HT-ECHT-1992-Gasparri #named
- HTLEX: A Law Reference System (Demonstration) (PG), p. 293.
- SEI-1992-Taulbee #interface #perspective #re-engineering
- The Software Engineering — Patent Law Interface: A Practitioner’s View (GMT), pp. 194–244.
- ESOP-1992-DohS #action semantics #semantics #type system
- Extraction of Strong Typing Laws from Action Semantics Definitions (KGD, DAS), pp. 151–166.
- CHI-1992-MacKenzieB #2d
- Extending Fitts’ Law to Two-Dimensional Tasks (ISM, WB), pp. 219–226.
- LICS-1992-HalpernK #logic
- Zero-One Laws for Modal Logic (JYH, BMK), pp. 369–380.
- LICS-1991-PacholskiS #higher-order #on the #similarity
- On the 0-1 Law for the class of Existential Second Order Minimal Gödel Sentences with Equality (LP, WS), pp. 280–285.
- ECHT-1990-Wilson #database #hypermedia
- Links and Structures in Hypertext Databases for Law (EW), pp. 194–211.
- CHI-1990-GillanHARM #how #question
- How does Fitts’ law fit pointing and dragging? (DJG, KLH, SA, MR, LM), pp. 227–234.
- LICS-1990-KolaitisV #logic
- 0-1 Laws for Infinitary Logics (Preliminary Report) (PGK, MYV), pp. 156–167.
- HT-1989-YoderW #hypermedia #using
- Using Hypertext in a Law Firm (EAY, TCW), pp. 159–167.
- STOC-1989-ChorK #privacy
- A Zero-One Law for Boolean Privacy (extended abstract) (BC, EK), pp. 62–72.
- OOPSLA-1989-MinskyR
- Controllable Delegation: An Exercise in Law-Governed Systems (NHM, DR), pp. 371–380.
- SIGIR-1988-Wilson #hypermedia #information retrieval
- Integrated Information Retrieval for Law in a Hypertext Environment (EW), pp. 663–677.
- LICS-1988-KolaitisV #higher-order #logic #problem
- 0-1 Laws and Decision Problems for Fragments of Second-Order Logic (PGK, MYV), pp. 2–11.
- OOPSLA-1987-MinskyR #approach #object-oriented #programming
- A Law-Based Approach to Object-Oriented Programming (NHM, DR), pp. 482–493.
- LFP-1986-Thompson
- Laws in Miranda (SJT), pp. 1–12.