BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
much (10)
softwar (9)
far (5)
model (5)
engin (4)

Stem too$ (all stems)

44 papers:

CHICHI-2015-StraitVFSU #elicitation #interactive
Too Much Humanness for Human-Robot Interaction: Exposure to Highly Humanlike Robots Elicits Aversive Responding in Observers (MS, LV, VF, MS, HLU), pp. 3593–3602.
SACSAC-2015-HoldererAM #bibliography #constraints #workflow
When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience (JH, RA, GM), pp. 1245–1248.
ESEC-FSEESEC-FSE-2015-XuJFZPT #comprehension #exclamation
Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software (TX, LJ, XF, YZ, SP, RT), pp. 307–319.
CHICHI-2014-RogersPBVMV #people
Never too old: engaging retired people inventing the future with MaKey MaKey (YR, JP, MB, KV, GM, FV), pp. 3913–3922.
VLDBVLDB-2013-GrustSU #sql
Functions Are Data Too (Defunctionalization for PL/SQL) (TG, NS, AU), pp. 1214–1217.
CHICHI-2013-AnnettB #exclamation #gesture #symmetry
Your left hand can do it too!: investigating intermanual, symmetric gesture transfer on touchscreens (MA, WFB), pp. 1119–1128.
PLOSPLOS-2013-KellerMAOCRKH #exclamation #file system #verification
File systems deserve verification too! (GK, TCM, SA, LO, ZC, LR, GK, GH), p. 7.
ITiCSEITiCSE-2012-Rabin #student
Never too early to begin: computer science for high-school students (MOR), p. 1.
TACASTACAS-2012-CoxSC #bound #precise #verification
A Bit Too Precise? Bounded Verification of Quantized Digital Filters (AC, SS, BYEC), pp. 33–47.
ICSMEICSM-2012-AlalfiCDSS #clone detection #detection #modelling
Models are code too: Near-miss clone detection for Simulink models (MHA, JRC, TRD, MS, AS), pp. 295–304.
CHICHI-2012-MalheirosJPBS #case study #effectiveness #personalisation
Too close for comfort: a study of the effectiveness and acceptability of rich-media personalized advertising (MM, CJ, SP, SB, MAS), pp. 579–588.
CHICHI-2012-SongQ #representation
Representing “too small to see” as “too small to see” with temporal representation (MS, CQ), pp. 1441–1450.
CIKMCIKM-2012-JatowtT12a #analysis #comparative #readability #wiki
Is wikipedia too difficult?: comparative analysis of readability of wikipedia, simple wikipedia and britannica (AJ, KT), pp. 2607–2610.
VLDBVLDB-2011-Gatterbauer #database #query #visualisation
Databases will Visualize Queries too (WG), pp. 1498–1501.
SCAMSCAM-2011-Larson #program analysis #set
Program Analysis Too Loopy? Set the Loops Aside (EL), pp. 15–24.
MODELSMoDELS-2011-FlochYGDCRF #compilation #modelling #optimisation #question
Model-Driven Engineering and Optimizing Compilers: A Bridge Too Far? (AF, TY, CG, SD, BC, SVR, RBF), pp. 608–622.
MODELSMoDELS-2011-FlochYGDCRF #compilation #modelling #optimisation #question
Model-Driven Engineering and Optimizing Compilers: A Bridge Too Far? (AF, TY, CG, SD, BC, SVR, RBF), pp. 608–622.
DACDAC-2010-GoodenoughA #design
Post-silicon is too late avoiding the $50 million paperweight starts with validated designs (JG, RA), pp. 8–11.
CHICHI-2010-CramerESGW #mobile #social #trust
Trying too hard: effects of mobile agents’ (Inappropriate) social expressiveness on trust, affect and compliance (HSMC, VE, TvS, MG, BJW), pp. 1471–1474.
ICPCICPC-2009-TorchianoS #agile #comprehension #developer #development #maintenance #testing
TDD = too dumb developers? Implications of Test-Driven Development on maintainability and comprehension of software (MT, AS), pp. 280–282.
HCIHCI-NT-2009-PalanqueLNB #interactive #prototype
High-Fidelity Prototyping of Interactive Systems Can Be Formal Too (PAP, JFL, DN, EB), pp. 667–676.
ASEASE-2008-GrunbacherRD #lessons learnt #product line #tool support
Product Line Tools are Product Lines Too: Lessons Learned from Developing a Tool Suite (PG, RR, DD), pp. 351–354.
ECIRECIR-2008-Berendt #documentation #information retrieval #mining #web
You Are a Document Too: Web Mining and IR for Next-Generation Information Literacy (BB), p. 3.
PODSPODS-2007-BarakCDKMT #consistency #privacy
Privacy, accuracy, and consistency too: a holistic solution to contingency table release (BB, KC, CD, SK, FM, KT), pp. 273–282.
PASTEPASTE-2007-HovemeyerP #debugging #null #pointer
Finding more null pointer bugs, but not too many (DH, WP), pp. 9–14.
ITiCSEITiCSE-2006-SudolB #education #student #women
Is there such a thing as too much support?: a discussion from a teacher and a student’s perspective of support groups for girls in computer science (LAS, KB), p. 309.
SEKESEKE-2005-FurstT #knowledge-based #named #ontology
TooCoM: bridge the gap between Ontologies and Knowledge-Based Systems (FF, FT), pp. 479–484.
HTHT-2004-HarperYGS #evaluation #how #hypermedia
How much is too much in a hypertext link?: investigating context and preview — a formative evaluation (SH, YY, CAG, RS), pp. 116–125.
SACSAC-2004-SeigneurJ #privacy #trust #ubiquitous
Trust enhanced ubiquitous payment without too much privacy loss (JMS, CDJ), pp. 1593–1599.
SIGMODSIGMOD-2000-PopaDST #question
A Chase Too Far? (LP, AD, AS, VT), pp. 273–284.
CSEETCSEET-2000-Bach #question #re-engineering
Software Engineering — Coming of Age or Reaching Too Far? (JB), p. 3–?.
CSEETCSEET-2000-FraileyBDCT #re-engineering
Software Engineering — Coming of Age or Reaching Too Far? (panel) (DJF, JB, DD, BC, LLT), p. 7–?.
ITiCSEITiCSE-1999-DagdilelisS
Didactics too, not only technology (VD, MS), p. 183.
TOOLSTOOLS-USA-1998-Mellor98a #behaviour #how #modelling #question
Modeling Complex Behavior Simply or How Much is Too Much? (SJM), p. 444.
CHICHI-1997-ScholtzSLN #design #named
Design: No Job too Small (JS, TS, PL, JN), pp. 447–454.
ICSEICSE-1997-Osterweil #process
Software Processes Are Software Too, Revisited: An Invited Talk on the Most Influential Paper of ICSE 9 (LJO), pp. 540–548.
CSEETCSEE-1995-Budgen #design #education #problem #question
Is Teaching Software Design a “Wicked” Problem, too? (DB), pp. 239–254.
SIGIRSIGIR-1995-Allan #feedback
Relevance Feedback With Too Much Data (JA), pp. 337–343.
HTHT-1993-NanardN #empirical
Should Anchors be Typed Too? An Experiment with MacWeb (JN, MN), pp. 51–62.
SIGMODSIGMOD-1993-CareyHL #challenge #tuple
Tapes Hold Data, Too: Challenges of Tuples on Tertiary Store (MJC, LMH, ML), pp. 413–417.
CAVCAV-1992-Lamport #verification
Computer-Hindered Verification (Humans Can Do It Too) (LL), p. 1.
HTHT-1989-Lesk #what
What To Do When There’s Too Much Information (ML), pp. 305–318.
HCIHCI-SES-1987-MoodyJR #how #question
Vigilance and Its Role in AI Technology: How Smart is Too Smart? (TM, MJ, RR), pp. 263–270.
ICSEICSE-1987-Osterweil #process
Software Processes Are Software Too (LJO), pp. 2–13.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.