|
Top Document: Comp.software-eng FAQ (Part 3): readings Previous Document: Object-Oriented Analysis and Design Next Document: Real-Time Systems See reader questions & answers on this topic! - Help others by sharing your knowledge Date: 6 Dec 1997 Originally collected by: oman@cs.uidaho.edu (Paul W. Oman) 1. N. Anand (1988) "Clarify Function!" ACM SigPLAN Notices, 23(6), 69-79. Advocates the use of mnemonic names for entities in a system. Rules are presented for naming procedures, variable, pointers, etc. 2. S. Henry (1988) "A Technique for Hiding Proprietary Details While Providing Sufficient Information for Researchers; or, do you Recognize this Well- known Algorithm?," Journal of Systems and Software, 8(1), 3-11. Suggests encryption of variable names as part of a technique for encoding algorithms, while still providing sufficient information to researchers. 3. R. Brooks (1980) "Studying Programmer Behavior Experimentally: The Problems of Proper Methodology," Communications of the ACM, 23(4), 207-213. Discusses issues and tradeoffs in proper control of experiments involving computer programmers. 4. E. Thomas & P. Oman "A Bibliography of Programming Style Literature," ACM SIGPLAN Notices, Vol. 25(2), Feb. 1990, pp. 7-16. User Contributions:Comment about this article, ask questions, or add new information about this topic:Top Document: Comp.software-eng FAQ (Part 3): readings Previous Document: Object-Oriented Analysis and Design Next Document: Real-Time Systems Part0 - Part1 - Part2 - Part3 - Single Page [ Usenet FAQs | Web FAQs | Documents | RFC Index ] Send corrections/additions to the FAQ Maintainer: dalamb@spamcop.net (David Alex Lamb)
Last Update March 27 2014 @ 02:12 PM
|

3SL, Suite 2, 22a Duke Street, Barrow in Furness, Cumbria, LA14 1HH
Please can you update this immediately.