Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,232,275 papers from all fields of science
Search
Sign In
Create Free Account
Anti-pattern
Known as:
Anti-patterns
, Antipattern
, Software antipatterns
Expand
An anti-pattern is a common response to a recurring problem that is usually ineffective and risks being highly counterproductive. The term, coined in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
"Classic" Mac OS
Ambiguous viewpoint
Amelioration pattern
Anemic domain model
Expand
Broader (1)
Software architecture
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
A phylogenetic framework for the evolution of female polymorphism in anoles
E. Paemelaere
,
C. Guyer
,
F. Dobson
2011
Corpus ID: 55336595
Female pattern polymorphisms (FPP) are striking, poorly understood, and a major challenge to evolutionary theory. We examined the…
Expand
2010
2010
Universal Hinge Patterns to Fold Orthogonal Shapes
Nadia M. Benbernou
,
E. Demaine
,
M. Demaine
,
Aviv Ovadya
2010
Corpus ID: 13279154
An early result in computational origami is that every polyhedral surface can be folded from a large enough square of paper [2…
Expand
Review
2009
Review
2009
Modular neural networks with applications to pattern profiling problems
H. Tseng
,
B. Almogahed
Neurocomputing
2009
Corpus ID: 32803735
2008
2008
Design and Analysis of High-Capacity Anti-Collusion Hiding Codes
Byung-Ho Cha
,
C.-C. Jay Kuo
2008
Corpus ID: 8664631
A new methodology for the design of high-capacity anti-collusion hiding codes in a large-scale fingerprint-based traitor tracing…
Expand
2007
2007
Chapter 13 - Visual Analytics Methods for Movement Data
G. Andrienko
,
N. Andrienko
,
Ioannis Kopanakis
,
A. Ligtenberg
,
S. Wrobel
2007
Corpus ID: 37531108
,
2006
2006
Defining Misuse within the Development Process
Gunnar Peterson
IEEE Security and Privacy
2006
Corpus ID: 261292164
The software development industry often brings in security at the eleventh hour, right before developers throw the code over the…
Expand
2005
2005
EU Institutions and the Transformation of European-Level Politics: How to Understand Profound Change (If It Occurs)
M. Egeberg
2005
Corpus ID: 143816218
One key indicator of profound change in a Westphalian state order might be the extent to which cleavages are cross-cutting…
Expand
Review
2005
Review
2005
We're Not Gonna Take It: A Student Driven Anti-Bullying Approach
J. Packman
,
W. Lepkowski
,
Christian C. Overton
,
Marlowe H. Smaby
2005
Corpus ID: 56321648
Introduction Bullying is a pervasive and serious problem in today's schools. Recently, an attempt was made by one of the authors…
Expand
2004
2004
Cleavage and gastrulation of the euphausiacean Meganyctiphanes norvegica (Crustacea, Malacostraca)
Frederike Alwes
,
G. Scholtz
Zoomorphology
2004
Corpus ID: 37243559
According to the ‘Articulata’ hypothesis the cleavage of arthropods must be derived from spiral cleavage. However, arthropods…
Expand
2002
2002
Feature extraction for a multiple pattern classification neural network system
Y. Murphey
,
Yun Luo
Object recognition supported by user interaction…
2002
Corpus ID: 38709629
Feature extraction is an essential problem in pattern classification. The success of a pattern classifier very much depends on…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required