Software Technical Report

Total Page:16

File Type:pdf, Size:1020Kb

Software Technical Report A Technical History of the SEI Larry Druffel January 2017 SPECIAL REPORT CMU/SEI-2016-SR-027 SEI Director’s Office Distribution Statement A: Approved for Public Release; Distribution is Unlimited http://www.sei.cmu.edu Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineer- ing Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. This report was prepared for the SEI Administrative Agent AFLCMC/PZM 20 Schilling Circle, Bldg 1305, 3rd floor Hanscom AFB, MA 01731-2125 NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [Distribution Statement A] This material has been approved for public release and unlimited distribu- tion. Please see Copyright notice for non-US Government use and distribution. Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works. External use:* This material may be reproduced in its entirety, without modification, and freely distrib- uted in written or electronic form without requesting formal permission. Permission is required for any other external and/or commercial use. Requests for permission should be directed to the Software En- gineering Institute at [email protected]. * These restrictions do not apply to U.S. government entities. Architecture Tradeoff Analysis Method®,ATAM®, Carnegie Mellon®, CERT®,CERT Coordination Center®, FloCon® and OCTAVE® are registered marks of Carnegie Mellon University. COTS Usage Risk EvaluationSM, CURESM, EPICSM, Evolutionary Process for Integrating COTS-Based SystemsSM, Framework for Software Product Line PracticeSM, IDEALSM, Interim ProfileSM, OARSM, Operationally Critical ThreatSM, AssetSM, and Vulnerability EvaluationSM, Options Analysis for Reen- gineeringSM, Personal Software ProcessSM, PLQLSM, PLTPSM, Product Line Quick LookSM, Product Line Technical ProbeSM, PSPSM, SCESM, SEPGSM, SoS NavigatorSM, T-CheckSM, Team Software Pro- cessSM and TSPSM are service marks of Carnegie Mellon University. DM-0003942 Table of Contents Foreword xi Preface xix Abstract xxi 1 Introduction 1 Introduction 3 The DoD Software Environment in 1984 Motivated Formation of the SEI 3 SEI Charter—Improve the State of the Practice of Software Engineering 4 Software Engineering Context into Which SEI was Formed and Evolved 6 The SEI Began by Interpreting the Charter and Developing a Technical Strategy 6 Interpreting the Charter 7 Evolution of the Effort Composition Was Driven by Experience and Guidance from the Principal Sponsor 8 The SEI Proposes Work Based on an Evolving Technical Strategy 11 Mechanisms for Engaging the Community 12 References 13 2 Real-Time Embedded Systems Engineering 15 Introduction to Real-Time Embedded and Cyber-Physical Systems 19 The SEI Contributed to Early DoD Ada Adoption Effort for Real-Time Embedded Systems 19 The SEI Provided an Engineering Basis for Real-Time Systems Development 21 SEI Research Included Software for Parallel Hardware Architectures 22 The SEI Developed Analytic Techniques and Supporting Tools for Engineering Real-Time Systems 22 SEI Contributions to Standards 24 Summary 25 References 25 Ada/Real-Time Embedded Systems Testbed 27 The Challenge: Evaluating Runtime Performance on Embedded Processors 27 A Solution: A Testbed for Real-Time Performance Evaluation 27 The Consequence: Empirical Results for Runtime Performance Hypotheses 28 The SEI Contribution 29 References 29 Distributed Ada Real-Time Kernel 31 The Challenge: Provide Consistent Support for Ada in Real-Time Systems 31 A Solution: A Distributed Ada Real-Time Kernel 31 The Consequence: A Prototype Demonstration 31 The SEI Contribution 32 References 32 Ada Adoption Handbook 33 The Challenge: Where and When to Adopt Use of the Ada Language 33 A Solution: The Ada Adoption Handbook 33 The Consequence: Unbiased Guidance 34 The SEI Contribution 34 References 34 Rate Monotonic Analysis 36 The Challenge: Predicting Real-Time Systems’ Ability to Meet Performance Deadlines 36 CMU/SEI-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY i Distribution Statement A: Approved for Public Release; Distribution is Unlimited A Solution: Rate Monotonic Analysis 36 The Consequence: Engineering Replaces Art 37 The SEI Contribution 38 References 39 Simplex Architecture 40 The Challenge: Ensuring the Integrity of Safety-Critical Systems 40 A Solution: The Simplex Architecture 40 The Consequence: Increased Reliability of Safety-Critical Systems 41 The SEI Contribution 41 References 42 Software for Heterogeneous Machines 43 The Challenge: Meeting Performance Goals for Real-Time Applications Involving Heterogeneous Machines 43 A Solution: Software for Heterogeneous Machines (Durra) 43 The Consequence: Successful Demonstration in Prototype Systems 44 The SEI Contribution 44 References 44 Real-Time Multicore Scheduling 46 The Challenge: Taking Advantage of Multicore Chips 46 A Solution: Real-Time Scheduling for Multicore Processors 46 The Consequence: Effective Use of Multicore Processors 47 The SEI Contribution 48 References 48 Integrated Methods for Predictive Analytic Composition and Tradeoff 50 The Challenge: Effective Real-Time Performance in Dynamic Environments 50 A Solution: Development of Analytic Methods 50 The Consequence: Bringing an Analytic Basis to Engineering Dynamic Systems 52 The SEI Contribution 52 References 53 Architecting Software-Reliant, Safety-Critical Systems with SAE AADL 54 The Challenge: Reducing Faults in Safety-Critical Defense Systems 54 A Solution: SAE Architecture Analysis & Design Language (AADL) 54 The Consequence: Architecture-Centric Engineering Beyond Documentation 55 The SEI Contribution 56 References 56 3 Education and Training 57 Introduction to Education and Training 60 Academic Curricula 60 Curricula Transition 62 Professional Education and Training 63 Evolution of Instructional Delivery Based on Technology Advancements 64 References 64 Model Curriculum for Master of Software Engineering Degree 66 The Challenge: The Need for a Standard Software Engineering Curriculum 66 A Solution: Creation of the SEI Master of Software Engineering Curriculum Guidelines 66 The Consequence: New Academic Programs Established 67 The SEI Contribution 67 References 67 Undergraduate Software Engineering Curriculum 69 The Challenge: Lack of Curriculum Guidance for Undergraduate Software Engineering Education 69 A Solution: Development and Dissemination of Curriculum Guidance 69 CMU/SEI-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY ii Distribution Statement A: Approved for Public Release; Distribution is Unlimited The Consequence: Undergraduate Software Engineering Programs Established 70 The SEI Contribution 71 References 71 Software Assurance Curriculum for Colleges and Universities 73 The Challenge: Demand for Software Assurance Expertise 73 A Solution: Educate Future Practitioners 73 The Consequence: More Well-Qualified Software Assurance Professionals 74 The SEI Contribution 75 References 75 Survivability and Information Assurance Education for System Administrators 77 The Challenge: Adapting System Administration to the Unexpected and to Business 77 A Solution: Survivability and Information Assurance Curriculum 77 The Consequence: System Administrators Who Support the Business Mission 78 The SEI Contribution 78 References 79 Conference on Software Engineering Education and Training 80 The Challenge: A Forum for Software Engineering Education Advances and Collaboration 80 A Solution: The Premier Conference on Software Engineering Education 80 The Consequence: Growth of Conferences and Tracks on Software Engineering Education 81 The SEI Contribution 81 References 82 CMU Master of Software Engineering Program 83 The Challenge: The Need for a Strong Academic Software Engineering Program 83 A Solution: Creation of the CMU Master of Software Engineering Program 83 The Consequence: New Academic Programs Established 84 The SEI Contribution 84 References 84 Executive Education Program 85 The Challenge: Effectively Managing Software Systems 85 A Solution: Executive Education Program 85 The Consequence: Improved Management by Executives 86 The SEI Contribution 86 References 86 Professional Training 87 The Challenge: Providing High-Quality Training to Software Practitioners 87 A Solution: Quality Assurance for SEI Training Products 87 The Consequence:
Recommended publications
  • Acm's Fy14 Annual Report
    acm’s annual report for FY14 DOI:10.1145/2691599 ACM Council PRESIDENT ACM’s FY14 Vinton G. Cerf VICE PRESIDENT Annual Report Alexander L. Wolf SECRETAry/TREASURER As I write this letter, ACM has just issued Vicki L. Hanson a landmark announcement revealing the PAST PRESIDENT monetary level for the ACM A.M. Turing Alain Chesnais Award will be raised this year to $1 million, SIG GOVERNING BOARD CHAIR Erik Altman with all funding provided by Google puter science and mathematics. I was PUBLICATIONS BOARD Inc. The news made the global rounds honored to be a participant in this CO-CHAIRS in record time, bringing worldwide inaugural event; I found it an inspi- Jack Davidson visibility to the award and the Associa- rational gathering of innovators and Joseph A. Konstan tion. Long recognized as the equiva- understudies who will be the next MEMBERS-AT-LARGE lent to the Nobel Prize for computer award recipients. Eric Allman science, ACM’s Turing Award now This year also marked the publica- Ricardo Baeza-Yates carries the financial clout to stand on tion of highly anticipated ACM-IEEE- Cherri Pancake the same playing field with the most CS collaboration Computer Science Radia Perlman esteemed scientific and cultural prizes Curricula 2013 and the acclaimed Re- Mary Lou Soffa honoring game changers whose con- booting the Pathway to Success: Prepar- Eugene Spafford tributions have transformed the world. ing Students for Computer Workforce Salil Vadhan This really is an extraordinary time Needs in the United States, an exhaus- SGB COUNCIL to be part of the world’s largest educa- tive report from ACM’s Education REPRESENTATIVES tional and scientific society in comput- Policy Committee that focused on IT Brent Hailpern ing.
    [Show full text]
  • Open Access Availability of Scientific Publications
    Analytical Support for Bibliometrics Indicators Open access availability of scientific publications Analytical Support for Bibliometrics Indicators Open access availability of scientific publications* Final Report January 2018 By: Science-Metrix Inc. 1335 Mont-Royal E. ▪ Montréal ▪ Québec ▪ Canada ▪ H2J 1Y6 1.514.495.6505 ▪ 1.800.994.4761 [email protected] ▪ www.science-metrix.com *This work was funded by the National Science Foundation’s (NSF) National Center for Science and Engineering Statistics (NCSES). Any opinions, findings, conclusions or recommendations expressed in this report do not necessarily reflect the views of NCSES or the NSF. The analysis for this research was conducted by SRI International on behalf of NSF’s NCSES under contract number NSFDACS1063289. Analytical Support for Bibliometrics Indicators Open access availability of scientific publications Contents Contents .............................................................................................................................................................. i Tables ................................................................................................................................................................. ii Figures ................................................................................................................................................................ ii Abstract ............................................................................................................................................................
    [Show full text]
  • Special Collections: Proposal and Guidelines for Potential Guest Editors Special Collections Are an Important Component of Gerontology and Geriatric Medicine
    Special Collections: Proposal and Guidelines for Potential Guest Editors Special Collections are an important component of Gerontology and Geriatric Medicine. They are an opportunity for the journal to cultivate a collection of articles around a specific topic, meeting/conference, or newsworthy development that falls within the scope of the journal. They should be organized by recognized experts in the area and attract articles of the highest quality. Special Collections are highlighted on the homepage for increased visibility and in most cases receive their own dedicated marketing efforts. Special Collections can be a continuously published section in a journal, or exist as a fixed set of articles. As the Guest Editor, you have the chance to shape the content, define the aims & scope of the collection, and collaborate with colleagues around a topic of particular interest to your personal research. Gerontology and Geriatric Medicine Aims and Scope Gerontology and Geriatric Medicine (GGM) is an interdisciplinary, peer-reviewed open access journal where scholars from a variety of disciplines present their work focusing on the psychological, behavioral, social, and biological aspects of aging, and public health services and research related to aging. The journal addresses a wide variety of topics related to health services research in gerontology and geriatrics. GGM seeks to be one of the world’s premier Open Access outlets for gerontological academic research. As such, GGM does not limit content due to page budgets or thematic significance. Papers will be subjected to rigorous peer review but will be selected solely on the basis of whether the research is sound and deserves publication.
    [Show full text]
  • Teachers and Research: an Annotated Bibliography. PUB DATE 1997-00-00 NOTE 11P.; In: Classroom Teachers and Classroom Research; See FL 024 999
    DOCUMENT RESUME ED 415 703 FL 025 011 AUTHOR Griffee, Dale T. TITLE Teachers and Research: An Annotated Bibliography. PUB DATE 1997-00-00 NOTE 11p.; In: Classroom Teachers and Classroom Research; see FL 024 999. PUB TYPE Reference Materials Bibliographies (131) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS Annotated Bibliographies; Book Reviews; *Classroom Research; Classroom Techniques; English (Second Language); Foreign Countries; Higher Education; *Information Sources; *Research Methodology; Second Language Instruction; Second Languages; Statistical Analysis; *Teacher Researchers; Teacher Role; *Writing for Publication ABSTRACT The annotated bibliography consists of reviews, of three to seven paragraphs each, of nine books focusing on classroom research and the teacher's role in conducting and publishing it. Eight of the books relate specifically to research on English-as-a-Second-Language teaching and learning. Each review provides basic bibliographic information, followed by four kinds of information about the text: the primary audience and purpose; its organization; features that are unusual or might be overlooked; and a brief summary. (MSE) *********k********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. ******************************************************************************** U.S. DEPARTMENT OF EDUCATION "PERMISSION TO REPRODUCE THIS Office of Educational Research and Improvement EDUCATIONAL RESOURCES INFORMATION MATERIAL HAS BEEN GRANTED BY CENTER (ERIC) tAi.c4ns document has been reproduced as received from the person or organization 1°--(\ originating it. Chapter 12 Minor changes have been made to improve reproduction quality. Points of view or opinions stated in this TO THE EDUCATIONAL RESOURCES document do not necessarily represent INFORMATION CENTER (ERIC)." official OERI position or policy. Teachers and Research: O An Annotated Bibliography Dale T.
    [Show full text]
  • Computer Viruses and Malware Advances in Information Security
    Computer Viruses and Malware Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional tities in the series: HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN-10: 0-387-22426-3 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY.'Enabled Information Small-Medium Enterprises (TEISMES) by Charles A.
    [Show full text]
  • Open Science Inspired by Community Frontiersin.Org Frontiers Thanks Its 50’000+ Editorial Board Members
    2014 | PROGRESS REPORT Open science inspired by community frontiersin.org Frontiers thanks its 50’000+ editorial board members. Here we introduce a selection of Chief Editors from our 380 academic disciplines. Mary M David B Allison Jose Biller Idan Segev Larry Abbott (Continued on back cover) Christopher University of Loyola University The Hebrew Columbia University of Alabama at Medical Center, University of University, USA California, USA Birmingham, USA USA Jerusalem, Israel Richard A Frederic Kaplan Martin G Klotz Jon H Kaas Johannes le Coutre Derek LeRoith Joav Merrick Annalisa Pastore Henry Markram Jorgensen EPFL, Switzerland University of Vanderbilt Nestle Research Mt Sinai School of Ministry of Social King’s College EPFL, Switzerland University of North Carolina at University, USA Center, Switzerland Medicine, USA Affairs, Israel London, UK Arizona, USA Charlotte, USA Matthias Barton Ferdinand Antonio Francesco Steve Suib Alex Hansen George E Billman Berend Smit Mark A Elgar Jos Van Der Meer University of Köckerling Corno The University of NTNU, Norway The Ohio State University of University of Radboud University Zurich, Switzerland Vivantes Hospital University Sains Connecticut, USA University, USA California, USA Melbourne, Nijmegen Medical Berlin, Germany Malaysia, Malaysia Australia Centre, Netherlands Jeff M P Holly Carlos M. Duarte Kendall A Smith Lee Samuel Finn Mel Slater Giuseppe Giaccone Axel Cleeremans Théophile Alex M Thomson University of King Abdullah Weill Medical The Pennsylvania ICREA-University Georgetown Université
    [Show full text]
  • Readership Data and Research Impact
    Readership data and Research Impact Ehsan Mohammadi1, Mike Thelwall 2 1School of Library and Information Science, University of South Carolina, Columbia, South Carolina, United States of America 2Statistical Cybermetrics Research Group, School of Mathematics and Computer Science, University of Wolverhampton, Wolverhampton, United Kingdom Abstract: Reading academic publications is a key scholarly activity. Scholars accessing and recording academic publications online are producing new types of readership data. These include publisher, repository and academic social network download statistics as well as online reference manager records. This chapter discusses the use of download and reference manager data for research evaluation and library collection development. The focus is on the validity and application of readership data as an impact indicator for academic publications across different discipline. Mendeley is particularly promising in this regard, although all data sources are not subjected to rigorous quality control and can be manipulated. Subject terms: readership; academic social network sites; reference managers; Mendeley 1.1 Introduction and Overview The act of reading an academic publication is a key point at which knowledge is transferred from the author to someone else. With the prevalence of the web and social web, scholars now often read and register academic publications online, leaving electronic records of their activities. This readership data can reveal which outputs are used as well as giving insights how the scientific enterprise works. It is important to exploit such information to improve research evaluation practices and to investigate how science communication is evolving. The main advantage of using readership information rather than citations is that reading occurs before citing and can therefore give more timely information.
    [Show full text]
  • An Interview With
    An Interview with LANCE HOFFMAN OH 451 Conducted by Rebecca Slayton on 1 July 2014 George Washington University Washington, D.C. Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright, Charles Babbage Institute Lance Hoffman Interview 1 July 2014 Oral History 451 Abstract This interview with security pioneer Lance Hoffman discusses his entrance into the field of computer security and privacy—including earning a B.S. in math at the Carnegie Institute of Technology, interning at SDC, and earning a PhD at Stanford University— before turning to his research on computer security risk management at as a Professor at the University of California–Berkeley and George Washington University. He also discusses the relationship between his PhD research on access control models and the political climate of the late 1960s, and entrepreneurial activities ranging from the creation of a computerized dating service to the starting of a company based upon the development of a decision support tool, RiskCalc. Hoffman also discusses his work with the Association for Computing Machinery and IEEE Computer Society, including his role in helping to institutionalize the ACM Conference on Computers, Freedom, and Privacy. The interview concludes with some reflections on the current state of the field of cybersecurity and the work of his graduate students. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.” 2 Slayton: So to start, please tell us a little bit about where you were born, where you grew up.
    [Show full text]
  • National Principles Concerning Phd Thesis As a Collection of Articles
    National principles concerning PhD thesis as a collection of articles Working group on the duration of PhD trajectories 27-08-2020 In its earlier memorandum to the Board of Law Deans (Raad der Decanen Rechtsgeleerdheid, RDR) dated 2 April 2020, the ‘Working group on the duration of PhD trajectories’ announced an upcoming separate memorandum on the theme of the PhD thesis as a collection of articles. Hence this document1. The principle behind considering the theme of the PhD thesis as a collection of articles, is that the RDR wishes to a. stimulate the PhD thesis as a collection of articles as a fully-fledged and high-quality way of gaining a PhD within the field of law, and b. achieve as much unity as possible at national level, also with the aim of making this type of trajectory foreseeable (in advance), i.e. a legal PhD thesis as a collection of articles, looks, in principle, like ‘this’. This reduction of uncertainty is required in order to introduce broader implementation of the PhD thesis as a collection of articles2. Furthermore, regulations on the PhD thesis as a collection of articles can facilitate inter and multi- disciplinary research within law faculties, in particular for disciplines in which the PhD thesis as a collection of articles is the norm. In this context, we have considered the formulation of a number of national principles for PhDs of this nature (for example covering the number of articles, coherence, authorship, reviews etc.). We are referring, in concrete terms, to a set of principles. The PhD regulations of the universities in question will (must) always take precedence; for the remainder, the principle of ‘comply or explain’ will apply.
    [Show full text]
  • How to Read a Scientific Article -Cain Project in Engineering and Professional Communication
    How to Read a Scientific Article Mary Purugganan, Ph.D. [email protected] Jan Hewitt, Ph.D. [email protected] Cain Project in Engineering and Professional Communication Reading a scientific article is a complex task. The worst way to approach this task is to treat it like the reading of a textbook—reading from title to literature cited, digesting every word along the way without any reflection or criticism. Rather, you should begin by skimming the article to identify its structure and features. As you read, look for the author’s main points. Generate questions before, during, and after reading. Draw inferences based on your own experiences and knowledge. And to really improve understanding and recall, take notes as you read. This handout discusses each of these strategies in more detail. 1. Skim the article and identify its structure. Most journals use a conventional IMRD structure: An abstract followed by Introduction, Methods, Results, and Discussion. Each of these sections normally contains easily recognized conventional features, and if you read with an anticipation of these features, you will read an article more quickly and comprehend more. Features of Abstracts Abstracts usually contain four kinds of information: • purpose or rationale of study (why they did it) • methodology (how they did it) • results (what they found) • conclusion (what it means) Most scientists read the abstract first. Others—especially experts in the field—skip right from the title to the visuals because the visuals, in many cases, tell the reader what kinds of experiments were done and what results were obtained. You should probably begin reading a paper by reading the abstract carefully and noting the four kinds of information outlined above.
    [Show full text]
  • Policy Guidelines for the DEVELOPMENT and PROMOTION of OPEN ACCESS Communication and Information Sector
    United Nations [ Cultural Organization Policy Guidelines FOR THE DEVELOPMENT AND PROMOTION OF OPEN ACCESS Communication and Information Sector United Nations [ Cultural Organization Policy Guidelines FOR THE DEVELOPMENT AND PROMOTION OF OPEN ACCESS by Alma Swan Open Guidelines Series Published by the United Nations Educational, Scientific and Cultural Organization 7, place de Fontenoy, 75352 Paris 07 SP, France © UNESCO 2012. Available in Open Access to copy, distribute and transmit the work for non-commercial purposes with appropriate attribution to the work. Some rights reserved for adaptation and derivative works. Permission must be taken from UNESCO for commercial use. Adaptation and derivatives of the work should not carry the UNESCO logo, and UNESCO shall not be responsible for any distortion of facts therein. Distortion, mutilation, modification of a Work leading to derogatory action in relation to the author of the work, the Work, and reputation of UNESCO and its Member States will be treated as breach of the Open Access provision. The person/institution responsible for the adaptation/derivative work shall be responsible for legal action, if any, and shall indemnify UNESCO from any liability arising out of such action. ISBN 978-92-3-001052-2 The designations employed and the presentation of material throughout this publication do not imply the expression of any opinion whatsoever on the part of UNESCO concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. About the Author: Dr. Alma Swan, a leading expert in scholarly communication and Open Access, is Director of Key Perspectives Ltd, United Kingdom.
    [Show full text]
  • BBST Course 3 -- Test Design
    BLACK BOX SOFTWARE TESTING: INTRODUCTION TO TEST DESIGN: A SURVEY OF TEST TECHNIQUES CEM KANER, J.D., PH.D. PROFESSOR OF SOFTWARE ENGINEERING: FLORIDA TECH REBECCA L. FIEDLER, M.B.A., PH.D. PRESIDENT: KANER, FIEDLER & ASSOCIATES This work is licensed under the Creative Commons Attribution License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. These notes are partially based on research that was supported by NSF Grants EIA- 0113539 ITR/SY+PE: “Improving the Education of Software Testers” and CCLI-0717613 “Adaptation & Implementation of an Activity-Based Online or Hybrid Course in Software Testing.” Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. BBST Test Design Copyright (c) Kaner & Fiedler (2011) 1 NOTICE … … AND THANKS The practices recommended and The BBST lectures evolved out of practitioner-focused courses co- discussed in this course are useful for an authored by Kaner & Hung Quoc Nguyen and by Kaner & Doug Hoffman introduction to testing, but more (now President of the Association for Software Testing), which then experienced testers will adopt additional merged with James Bach’s and Michael Bolton’s Rapid Software Testing practices. (RST) courses. The online adaptation of BBST was designed primarily by Rebecca L. Fiedler. I am writing this course with the mass- market software development industry in Starting in 2000, the course evolved from a practitioner-focused course mind.
    [Show full text]