Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Software Engineering (D.2) > Coding Tools and Techniques (D.2.3)  
 
Options:
 
  1-10 of 62 Reviews about "Coding Tools and Techniques (D.2.3)": Date Reviewed
  AI rewrites coding
Greengard S. Communications of the ACM 6612-14, 2023.  Type: Article

This thought-provoking article offers an interesting look at how artificial intelligence (AI) has the ability to completely change the world of programming. It investigates how AI is changing conventional coding techniques and introduces a new par...

Jun 21 2023
  Decoding the representation of code in the brain: an fMRI study of code review and expertise
Floyd B., Santander T., Weimer W.  ICSE 2017 (Proceedings of the 39th International Conference on Software Engineering, Buenos Aires, Argentina, May 20-28, 2017) 175-186, 2017.  Type: Proceedings

This paper presents an excellent example of an inter-disciplinary study to understand how the human brain processes common software engineering tasks by using medical imaging....

Oct 20 2017
  Practical enterprise software development techniques: tools and techniques for large scale solutions
Crookshanks E., Apress, New York, NY, 2015. 236 pp.  Type: Book (978-1-484206-21-8)

More often than not, computer science (CS) graduates feel overwhelmed and quite puzzled when being exposed to enterprise-level software development techniques at the start of their professional careers. Inherently, universitiesR...

Oct 29 2015
  Who builds a house without drawing blueprints?
Lamport L. Communications of the ACM 58(4): 38-41, 2015.  Type: Article

The ideal design and implementation of software systems should include detailed specifications of their requirements and functionalities. Unfortunately, as illustrated in this perceptive paper, writing software specifications without y...

May 13 2015
  Software trustworthiness 2.0: a semantic web enabled global source code analysis approach
Keivanloo I., Rilling J. Journal of Systems and Software 8933-50, 2014.  Type: Article

The subject of the investigation in the paper is source code analysis. The paper commences with a literature review covering the rich history of this field....

Mar 25 2015
  A study and toolkit for asynchronous programming in C#
Okur S., Hartveld D., Dig D., van Deursen A.  ICSE 2014 (Proceedings of the 36th International Conference on Software Engineering, Hyderabad, India, May 31-Jun 7, 2014) 1117-1127, 2014.  Type: Proceedings

Several common mistakes that programmers commit while writing asynchronous (async) programs are addressed in this paper. First, the authors discuss the different kinds of async programs available (call based and task asynchronous patte...

Jan 22 2015
  Hacker’s delight (2nd ed.)
Warren H., Addison-Wesley Professional, Upper Saddle River, NJ, 2013. 512 pp.  Type: Book (978-0-321842-68-8), Reviews: (2 of 2)

Computational speed matters. Programmers and computer science students are taught to carefully select or design an algorithm; to write clear, maintainable code; and to rely on compilers and processors to provide the speed. In most case...

Jan 7 2015
  Introduction to agile methods
Ashmore S., Runyan K., Addison-Wesley Professional, Upper Saddle River, NJ, 2015. 336 pp.  Type: Book (978-0-321929-56-3)

This is an excellent text for those who want to get in touch with agile methods. The writing style is effective and the coverage is quite broad. At the same time, the book is best for beginners in agile, students being exposed to a ran...

Nov 11 2014
  The CERT C coding standard: 98 rules for developing safe, reliable, and secure systems (2nd ed.)
Seacord R., Addison-Wesley Professional, Upper Saddle River, NJ, 2014. 576 pp.  Type: Book (978-0-321984-04-3)

The CERT C coding standard is intended to help create safe, reliable, and secure systems in C that are fully compliant with C99 and C11 standards. It lays out rules for coding that avoid exploitable vulnerabilities. The rules ar...

Oct 16 2014
  Precimonious: tuning assistant for floating-point precision
Rubio-González C., Nguyen C., Nguyen H., Demmel J., Kahan W., Sen K., Bailey D., Iancu C., Hough D.  SC 2013 (Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, Denver, Colorado, Nov 16-22, 2013) 1-12, 2013.  Type: Proceedings

Accuracy and error tolerance are important requirements for most software. A common practice for achieving the desirable accuracy and avoiding potential numerical problems, such as overflow/underflow, is to use high precision for all o...

Apr 23 2014
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy