Evaluating code readability and legibility: An examination of human-centric studies
Reading code is an essential activity in software maintenance and evolution. Several
studies with human subjects have investigated how different factors, such as the employed …
studies with human subjects have investigated how different factors, such as the employed …
Understanding and detecting real-world performance bugs
Developers frequently use inefficient code sequences that could be fixed by simple patches.
These inefficient code sequences can cause significant performance degradation and …
These inefficient code sequences can cause significant performance degradation and …
An empirical investigation into programming language syntax
A Stefik, S Siebert - ACM Transactions on Computing Education (TOCE), 2013 - dl.acm.org
Recent studies in the literature have shown that syntax remains a significant barrier to
novice computer science students in the field. While this syntax barrier is known to exist …
novice computer science students in the field. While this syntax barrier is known to exist …
Early experience with a commercial hardware transactional memory implementation
We report on our experience with the hardware transactional memory (HTM) feature of two
pre-production revisions of a new commercial multicore processor. Our experience includes …
pre-production revisions of a new commercial multicore processor. Our experience includes …
A comparative study of programming languages in rosetta code
Sometimes debates on programming languages are more religious than scientific.
Questions about which language is more succinct or efficient, or makes developers more …
Questions about which language is more succinct or efficient, or makes developers more …
PowerPi: Measuring and modeling the power consumption of the Raspberry Pi
F Kaup, P Gottschling… - 39th Annual IEEE …, 2014 - ieeexplore.ieee.org
An increasing number of households is connected to the Internet via DSL or cable, for which
home gateways are required. The optimization of these-caused by their large number-is a …
home gateways are required. The optimization of these-caused by their large number-is a …
ConMem: detecting severe concurrency bugs through an effect-oriented approach
Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it
is difficult to deliver reliable concurrent programs, because of the huge and non …
is difficult to deliver reliable concurrent programs, because of the huge and non …
A parallel programming assessment for stream processing applications on multi-core systems
Multi-core systems are any computing device nowadays and stream processing applications
are becoming recurrent workloads, demanding parallelism to achieve the desired quality of …
are becoming recurrent workloads, demanding parallelism to achieve the desired quality of …
An empirical study on the impact of C++ lambdas and programmer experience
Lambdas have seen increasing use in mainstream programming languages, notably in Java
8 and C++ 11. While the technical aspects of lambdas are known, we conducted the first …
8 and C++ 11. While the technical aspects of lambdas are known, we conducted the first …
Elastic transactions
This paper presents elastic transactions, a variant of the transactional model. Upon conflict
detection, an elastic transaction might drop what it did so far within a separate transaction …
detection, an elastic transaction might drop what it did so far within a separate transaction …