Software Technical Report
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Acm's Fy14 Annual Report
acm’s annual report for FY14 DOI:10.1145/2691599 ACM Council PRESIDENT ACM’s FY14 Vinton G. Cerf VICE PRESIDENT Annual Report Alexander L. Wolf SECRETAry/TREASURER As I write this letter, ACM has just issued Vicki L. Hanson a landmark announcement revealing the PAST PRESIDENT monetary level for the ACM A.M. Turing Alain Chesnais Award will be raised this year to $1 million, SIG GOVERNING BOARD CHAIR Erik Altman with all funding provided by Google puter science and mathematics. I was PUBLICATIONS BOARD Inc. The news made the global rounds honored to be a participant in this CO-CHAIRS in record time, bringing worldwide inaugural event; I found it an inspi- Jack Davidson visibility to the award and the Associa- rational gathering of innovators and Joseph A. Konstan tion. Long recognized as the equiva- understudies who will be the next MEMBERS-AT-LARGE lent to the Nobel Prize for computer award recipients. Eric Allman science, ACM’s Turing Award now This year also marked the publica- Ricardo Baeza-Yates carries the financial clout to stand on tion of highly anticipated ACM-IEEE- Cherri Pancake the same playing field with the most CS collaboration Computer Science Radia Perlman esteemed scientific and cultural prizes Curricula 2013 and the acclaimed Re- Mary Lou Soffa honoring game changers whose con- booting the Pathway to Success: Prepar- Eugene Spafford tributions have transformed the world. ing Students for Computer Workforce Salil Vadhan This really is an extraordinary time Needs in the United States, an exhaus- SGB COUNCIL to be part of the world’s largest educa- tive report from ACM’s Education REPRESENTATIVES tional and scientific society in comput- Policy Committee that focused on IT Brent Hailpern ing. -
Open Access Availability of Scientific Publications
Analytical Support for Bibliometrics Indicators Open access availability of scientific publications Analytical Support for Bibliometrics Indicators Open access availability of scientific publications* Final Report January 2018 By: Science-Metrix Inc. 1335 Mont-Royal E. ▪ Montréal ▪ Québec ▪ Canada ▪ H2J 1Y6 1.514.495.6505 ▪ 1.800.994.4761 [email protected] ▪ www.science-metrix.com *This work was funded by the National Science Foundation’s (NSF) National Center for Science and Engineering Statistics (NCSES). Any opinions, findings, conclusions or recommendations expressed in this report do not necessarily reflect the views of NCSES or the NSF. The analysis for this research was conducted by SRI International on behalf of NSF’s NCSES under contract number NSFDACS1063289. Analytical Support for Bibliometrics Indicators Open access availability of scientific publications Contents Contents .............................................................................................................................................................. i Tables ................................................................................................................................................................. ii Figures ................................................................................................................................................................ ii Abstract ............................................................................................................................................................ -
Special Collections: Proposal and Guidelines for Potential Guest Editors Special Collections Are an Important Component of Gerontology and Geriatric Medicine
Special Collections: Proposal and Guidelines for Potential Guest Editors Special Collections are an important component of Gerontology and Geriatric Medicine. They are an opportunity for the journal to cultivate a collection of articles around a specific topic, meeting/conference, or newsworthy development that falls within the scope of the journal. They should be organized by recognized experts in the area and attract articles of the highest quality. Special Collections are highlighted on the homepage for increased visibility and in most cases receive their own dedicated marketing efforts. Special Collections can be a continuously published section in a journal, or exist as a fixed set of articles. As the Guest Editor, you have the chance to shape the content, define the aims & scope of the collection, and collaborate with colleagues around a topic of particular interest to your personal research. Gerontology and Geriatric Medicine Aims and Scope Gerontology and Geriatric Medicine (GGM) is an interdisciplinary, peer-reviewed open access journal where scholars from a variety of disciplines present their work focusing on the psychological, behavioral, social, and biological aspects of aging, and public health services and research related to aging. The journal addresses a wide variety of topics related to health services research in gerontology and geriatrics. GGM seeks to be one of the world’s premier Open Access outlets for gerontological academic research. As such, GGM does not limit content due to page budgets or thematic significance. Papers will be subjected to rigorous peer review but will be selected solely on the basis of whether the research is sound and deserves publication. -
Teachers and Research: an Annotated Bibliography. PUB DATE 1997-00-00 NOTE 11P.; In: Classroom Teachers and Classroom Research; See FL 024 999
DOCUMENT RESUME ED 415 703 FL 025 011 AUTHOR Griffee, Dale T. TITLE Teachers and Research: An Annotated Bibliography. PUB DATE 1997-00-00 NOTE 11p.; In: Classroom Teachers and Classroom Research; see FL 024 999. PUB TYPE Reference Materials Bibliographies (131) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS Annotated Bibliographies; Book Reviews; *Classroom Research; Classroom Techniques; English (Second Language); Foreign Countries; Higher Education; *Information Sources; *Research Methodology; Second Language Instruction; Second Languages; Statistical Analysis; *Teacher Researchers; Teacher Role; *Writing for Publication ABSTRACT The annotated bibliography consists of reviews, of three to seven paragraphs each, of nine books focusing on classroom research and the teacher's role in conducting and publishing it. Eight of the books relate specifically to research on English-as-a-Second-Language teaching and learning. Each review provides basic bibliographic information, followed by four kinds of information about the text: the primary audience and purpose; its organization; features that are unusual or might be overlooked; and a brief summary. (MSE) *********k********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. ******************************************************************************** U.S. DEPARTMENT OF EDUCATION "PERMISSION TO REPRODUCE THIS Office of Educational Research and Improvement EDUCATIONAL RESOURCES INFORMATION MATERIAL HAS BEEN GRANTED BY CENTER (ERIC) tAi.c4ns document has been reproduced as received from the person or organization 1°--(\ originating it. Chapter 12 Minor changes have been made to improve reproduction quality. Points of view or opinions stated in this TO THE EDUCATIONAL RESOURCES document do not necessarily represent INFORMATION CENTER (ERIC)." official OERI position or policy. Teachers and Research: O An Annotated Bibliography Dale T. -
Computer Viruses and Malware Advances in Information Security
Computer Viruses and Malware Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional tities in the series: HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN-10: 0-387-22426-3 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY.'Enabled Information Small-Medium Enterprises (TEISMES) by Charles A. -
Open Science Inspired by Community Frontiersin.Org Frontiers Thanks Its 50’000+ Editorial Board Members
2014 | PROGRESS REPORT Open science inspired by community frontiersin.org Frontiers thanks its 50’000+ editorial board members. Here we introduce a selection of Chief Editors from our 380 academic disciplines. Mary M David B Allison Jose Biller Idan Segev Larry Abbott (Continued on back cover) Christopher University of Loyola University The Hebrew Columbia University of Alabama at Medical Center, University of University, USA California, USA Birmingham, USA USA Jerusalem, Israel Richard A Frederic Kaplan Martin G Klotz Jon H Kaas Johannes le Coutre Derek LeRoith Joav Merrick Annalisa Pastore Henry Markram Jorgensen EPFL, Switzerland University of Vanderbilt Nestle Research Mt Sinai School of Ministry of Social King’s College EPFL, Switzerland University of North Carolina at University, USA Center, Switzerland Medicine, USA Affairs, Israel London, UK Arizona, USA Charlotte, USA Matthias Barton Ferdinand Antonio Francesco Steve Suib Alex Hansen George E Billman Berend Smit Mark A Elgar Jos Van Der Meer University of Köckerling Corno The University of NTNU, Norway The Ohio State University of University of Radboud University Zurich, Switzerland Vivantes Hospital University Sains Connecticut, USA University, USA California, USA Melbourne, Nijmegen Medical Berlin, Germany Malaysia, Malaysia Australia Centre, Netherlands Jeff M P Holly Carlos M. Duarte Kendall A Smith Lee Samuel Finn Mel Slater Giuseppe Giaccone Axel Cleeremans Théophile Alex M Thomson University of King Abdullah Weill Medical The Pennsylvania ICREA-University Georgetown Université -
Readership Data and Research Impact
Readership data and Research Impact Ehsan Mohammadi1, Mike Thelwall 2 1School of Library and Information Science, University of South Carolina, Columbia, South Carolina, United States of America 2Statistical Cybermetrics Research Group, School of Mathematics and Computer Science, University of Wolverhampton, Wolverhampton, United Kingdom Abstract: Reading academic publications is a key scholarly activity. Scholars accessing and recording academic publications online are producing new types of readership data. These include publisher, repository and academic social network download statistics as well as online reference manager records. This chapter discusses the use of download and reference manager data for research evaluation and library collection development. The focus is on the validity and application of readership data as an impact indicator for academic publications across different discipline. Mendeley is particularly promising in this regard, although all data sources are not subjected to rigorous quality control and can be manipulated. Subject terms: readership; academic social network sites; reference managers; Mendeley 1.1 Introduction and Overview The act of reading an academic publication is a key point at which knowledge is transferred from the author to someone else. With the prevalence of the web and social web, scholars now often read and register academic publications online, leaving electronic records of their activities. This readership data can reveal which outputs are used as well as giving insights how the scientific enterprise works. It is important to exploit such information to improve research evaluation practices and to investigate how science communication is evolving. The main advantage of using readership information rather than citations is that reading occurs before citing and can therefore give more timely information. -
An Interview With
An Interview with LANCE HOFFMAN OH 451 Conducted by Rebecca Slayton on 1 July 2014 George Washington University Washington, D.C. Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright, Charles Babbage Institute Lance Hoffman Interview 1 July 2014 Oral History 451 Abstract This interview with security pioneer Lance Hoffman discusses his entrance into the field of computer security and privacy—including earning a B.S. in math at the Carnegie Institute of Technology, interning at SDC, and earning a PhD at Stanford University— before turning to his research on computer security risk management at as a Professor at the University of California–Berkeley and George Washington University. He also discusses the relationship between his PhD research on access control models and the political climate of the late 1960s, and entrepreneurial activities ranging from the creation of a computerized dating service to the starting of a company based upon the development of a decision support tool, RiskCalc. Hoffman also discusses his work with the Association for Computing Machinery and IEEE Computer Society, including his role in helping to institutionalize the ACM Conference on Computers, Freedom, and Privacy. The interview concludes with some reflections on the current state of the field of cybersecurity and the work of his graduate students. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.” 2 Slayton: So to start, please tell us a little bit about where you were born, where you grew up. -
National Principles Concerning Phd Thesis As a Collection of Articles
National principles concerning PhD thesis as a collection of articles Working group on the duration of PhD trajectories 27-08-2020 In its earlier memorandum to the Board of Law Deans (Raad der Decanen Rechtsgeleerdheid, RDR) dated 2 April 2020, the ‘Working group on the duration of PhD trajectories’ announced an upcoming separate memorandum on the theme of the PhD thesis as a collection of articles. Hence this document1. The principle behind considering the theme of the PhD thesis as a collection of articles, is that the RDR wishes to a. stimulate the PhD thesis as a collection of articles as a fully-fledged and high-quality way of gaining a PhD within the field of law, and b. achieve as much unity as possible at national level, also with the aim of making this type of trajectory foreseeable (in advance), i.e. a legal PhD thesis as a collection of articles, looks, in principle, like ‘this’. This reduction of uncertainty is required in order to introduce broader implementation of the PhD thesis as a collection of articles2. Furthermore, regulations on the PhD thesis as a collection of articles can facilitate inter and multi- disciplinary research within law faculties, in particular for disciplines in which the PhD thesis as a collection of articles is the norm. In this context, we have considered the formulation of a number of national principles for PhDs of this nature (for example covering the number of articles, coherence, authorship, reviews etc.). We are referring, in concrete terms, to a set of principles. The PhD regulations of the universities in question will (must) always take precedence; for the remainder, the principle of ‘comply or explain’ will apply. -
How to Read a Scientific Article -Cain Project in Engineering and Professional Communication
How to Read a Scientific Article Mary Purugganan, Ph.D. [email protected] Jan Hewitt, Ph.D. [email protected] Cain Project in Engineering and Professional Communication Reading a scientific article is a complex task. The worst way to approach this task is to treat it like the reading of a textbook—reading from title to literature cited, digesting every word along the way without any reflection or criticism. Rather, you should begin by skimming the article to identify its structure and features. As you read, look for the author’s main points. Generate questions before, during, and after reading. Draw inferences based on your own experiences and knowledge. And to really improve understanding and recall, take notes as you read. This handout discusses each of these strategies in more detail. 1. Skim the article and identify its structure. Most journals use a conventional IMRD structure: An abstract followed by Introduction, Methods, Results, and Discussion. Each of these sections normally contains easily recognized conventional features, and if you read with an anticipation of these features, you will read an article more quickly and comprehend more. Features of Abstracts Abstracts usually contain four kinds of information: • purpose or rationale of study (why they did it) • methodology (how they did it) • results (what they found) • conclusion (what it means) Most scientists read the abstract first. Others—especially experts in the field—skip right from the title to the visuals because the visuals, in many cases, tell the reader what kinds of experiments were done and what results were obtained. You should probably begin reading a paper by reading the abstract carefully and noting the four kinds of information outlined above. -
Policy Guidelines for the DEVELOPMENT and PROMOTION of OPEN ACCESS Communication and Information Sector
United Nations [ Cultural Organization Policy Guidelines FOR THE DEVELOPMENT AND PROMOTION OF OPEN ACCESS Communication and Information Sector United Nations [ Cultural Organization Policy Guidelines FOR THE DEVELOPMENT AND PROMOTION OF OPEN ACCESS by Alma Swan Open Guidelines Series Published by the United Nations Educational, Scientific and Cultural Organization 7, place de Fontenoy, 75352 Paris 07 SP, France © UNESCO 2012. Available in Open Access to copy, distribute and transmit the work for non-commercial purposes with appropriate attribution to the work. Some rights reserved for adaptation and derivative works. Permission must be taken from UNESCO for commercial use. Adaptation and derivatives of the work should not carry the UNESCO logo, and UNESCO shall not be responsible for any distortion of facts therein. Distortion, mutilation, modification of a Work leading to derogatory action in relation to the author of the work, the Work, and reputation of UNESCO and its Member States will be treated as breach of the Open Access provision. The person/institution responsible for the adaptation/derivative work shall be responsible for legal action, if any, and shall indemnify UNESCO from any liability arising out of such action. ISBN 978-92-3-001052-2 The designations employed and the presentation of material throughout this publication do not imply the expression of any opinion whatsoever on the part of UNESCO concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. About the Author: Dr. Alma Swan, a leading expert in scholarly communication and Open Access, is Director of Key Perspectives Ltd, United Kingdom. -
BBST Course 3 -- Test Design
BLACK BOX SOFTWARE TESTING: INTRODUCTION TO TEST DESIGN: A SURVEY OF TEST TECHNIQUES CEM KANER, J.D., PH.D. PROFESSOR OF SOFTWARE ENGINEERING: FLORIDA TECH REBECCA L. FIEDLER, M.B.A., PH.D. PRESIDENT: KANER, FIEDLER & ASSOCIATES This work is licensed under the Creative Commons Attribution License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. These notes are partially based on research that was supported by NSF Grants EIA- 0113539 ITR/SY+PE: “Improving the Education of Software Testers” and CCLI-0717613 “Adaptation & Implementation of an Activity-Based Online or Hybrid Course in Software Testing.” Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. BBST Test Design Copyright (c) Kaner & Fiedler (2011) 1 NOTICE … … AND THANKS The practices recommended and The BBST lectures evolved out of practitioner-focused courses co- discussed in this course are useful for an authored by Kaner & Hung Quoc Nguyen and by Kaner & Doug Hoffman introduction to testing, but more (now President of the Association for Software Testing), which then experienced testers will adopt additional merged with James Bach’s and Michael Bolton’s Rapid Software Testing practices. (RST) courses. The online adaptation of BBST was designed primarily by Rebecca L. Fiedler. I am writing this course with the mass- market software development industry in Starting in 2000, the course evolved from a practitioner-focused course mind.