Our Heedless Wars

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Heedless programming: ignoring detectable error is a widespread hazard

Software should be correct and robust. This paper suggests that we need forthright words for the failure of not being robust — heedless and heedlessness — and of recursively creating software (such as a compiler or virtual machine) that itself does not support dependable software development. Heedless programming is common, particularly affecting “trivial” operations such as on numbers, and ext...

متن کامل

Clone Wars

Code clones, the result of the ”copy&paste” programming technique, have negative impact on software quality and on the efficiency of the software maintenance process. Although copying may be the fastest way of creating a new feature, after a while it is really hard to detect and maintain the multiple instances of the same code snippets. Based on static source code analysis, clone detectors try ...

متن کامل

Turf Wars

Turf wars in organizations commonly occur in environments where competition undermines collaboration. We develop a game theoretic model and experimental test of turf wars. The model explores how team production incentives ex post affect team formation decisions ex ante. In the game, one agent decides whether to share jurisdiction over a project with other agents. Agents with jurisdiction decide...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Al-Raida Journal

سال: 1970

ISSN: 0259-9953

DOI: 10.32380/alrj.v0i0.629