865 Hits in 2.2 sec

Ten commandments revisited

Jonathan P. Bowen, Michael G. Hinchey
2005 Proceedings of the 10th international workshop on Formal methods for industrial critical systems - FMICS '05  
to Tiziana Margaria and Mieke Massink, the FMICS 2005 Co-chairs, for inviting this paper to coincide with the tenth anniversary of FMICS, and to Scott Hamilton of IEEE Computer, for encouraging us to revisit  ...  However, care must be taken when reusing and porting software. Ariane 5 is a prime example, where it was assumed that the same launch software used in the prior version (Ariane 4) could be reused.  ...  Thou shalt reuse.  ... 
doi:10.1145/1081180.1081183 fatcat:55enuoxeabaojdjjrk7l7wxu6a

Ten Commandments of Formal Methods ...Ten Years Later

J.P. Bowen, M.G. Hinchey
2006 Computer  
Thanks also to Scott Hamilton for encouraging us to revisit the commandments 10 years after the original paper.  ...  Reusing and porting software is not without pitfalls, however. Ariane 5 is a prime example. Its developers assumed that they could reuse the launch software from Ariane 4.  ...  Theoretically, formal methods can and should aid in promoting software reuse.  ... 
doi:10.1109/mc.2006.35 fatcat:dyu5t3vj2zclvjdrramc256t54

Identifying barriers to the remix of translated open educational resources

Tel Amiel
2013 International Review of Research in Open and Distance Learning  
For example, the JISC guide included an "OER myths" category that was unique and deemed of interest.  ...  Promoting participation and activity in OER therefore also means revisiting often forgotten socio-technical concerns in regards to the infrastructures necessary to use, produce, and disseminate resources  ... 
doi:10.19173/irrodl.v14i1.1351 fatcat:nww7khvcrzdxnfww6rmdzshf5u

Dispelling myths about rare disease registry system development

Matthew Bellgard, Christophe Beroud, Kay Parkinson, Tess Harris, Segolene Ayme, Gareth Baynam, Tarun Weeramanthri, Hugh Dawkins, Adam Hunter
2013 Source Code for Biology and Medicine  
We dispel a number of myths in RDR development, outline key criteria for robust and sustainable RDR implementation and introduce the concept of a RDR Checklist to guide future RDR development.  ...  Surprisingly however, registries possess a diverse range of functionality, operate in different, often-times incompatible, software environments and serve various, and sometimes incongruous, purposes.  ...  Myth 3: open source is easy Making software available for download is a relatively straightforward process.  ... 
doi:10.1186/1751-0473-8-21 pmid:24131574 pmcid:PMC4015362 fatcat:waniywidnzg3tca5gfi6ynmv6u

Common Requirements Problems, Their Negative Consequences, and the Industry Best Practices to Help Solve Them

Donald Firesmith
2007 Journal of Object Technology  
Although there is nothing really new here, these problems are well worth revisiting because they are still far too common, probably because the associated industry best practices are still far from being  ...  Disclaimers The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense.  ...  Although there is nothing really new here, these problems are well worth revisiting because they continue to occur far too often.  ... 
doi:10.5381/jot.2007.6.1.c2 fatcat:yx6keagcazd2rlkek3au347ubi

Wireless Communications: Myths and Reality

Samuel C. Yang, Charlie C. Chan
2004 Communications of the Association for Information Systems  
Many myths exist about different aspects of wireless computing. The purpose of this article is to examine the more prominent popular beliefs in this area.  ...  To understand why this belief continues to exist or even if it is valid today, it is important to revisit some basic fundamental concepts in communications.  ...  M-commerce applications are exposed not only to existing e-commerce security threats (due to convergence), but also to m-commerce specific threats such as software risks, platforms risks, software application  ... 
doi:10.17705/1cais.01339 fatcat:jeaatt6zbvgshnjuqehoiv5zee

A practical approach to security assessment

Darrell M. Kienzle, William A. Wulf
1997 Proceedings of the 1997 workshop on New security paradigms - NSPW '97  
driving the software development process.  ...  A risk-driven process model of software development provides a framework for building software that balances conflicting requirements.  ...  The scope of this reuse can range from individual functions in a source code library to complete commercial off-the-shelf software products.  ... 
doi:10.1145/283699.283731 dblp:conf/nspw/KienzleW97 fatcat:od22xt24gjdopiczxry2e2fyuy

100 Open Sourced Software Robots for Tomorrow's Education: Revolutionizing the University Learning Experience with Bot Technologies

Anh Nguyen Duc, Pekka Abrahamsson
2017 Figshare  
The topics and themes introduced in the course vary from software processes and project management to architecture design, software testing and implementation.  ...  As a result, students of NTNU's TDT4140 Software Engineering course developed more than 100 software robots to take the university education to a new level.Seeking for a close match with the industry style  ...  We bust the myth that mathematics can't be fun -once and for all.  ... 
doi:10.6084/m9.figshare.5597983.v1 fatcat:qvqgbmkgkffqvez7kati2anpvy

Toward an engineering discipline for grammarware

Paul Klint, Ralf Lämmel, Chris Verhoef
2005 ACM Transactions on Software Engineering and Methodology  
The term grammar-dependent software refers to all software that involves grammar knowledge in an essential manner.  ...  and Chris Verhoef Vrije Universiteit Amsterdam Grammarware comprises grammars and all grammar-dependent software.  ...  , at the Software Improvement Group in Amsterdam (2000), at the Free University of Amsterdam (2001), at the University of Namur (2001)  ... 
doi:10.1145/1072997.1073000 fatcat:xxek643pnrhjbh4zwajskmojjm

More than one way to flip a class: learning analytics for mixed models of learning

Alan Dix
2016 Compass: Journal of Learning and Teaching  
This case study presents personal experiences in the reuse of materials, originally prepared for a small-scale MOOC, in face-to-face flipped classroom and blended learning teaching.  ...  Talis develops teaching and learning software primarily targeted at higher education.  ...  In fact, the majority of the students focused on the first two units only, but kept revisiting them for the entire nominal length of the course.  ... 
doi:10.21100/compass.v8i12.275 fatcat:5zra6fwffzbefjyqzecrlmfypi

Investigating Open Government Data Barriers [chapter]

Jonathan Crusoe, Ulf Melin
2018 Lecture Notes in Computer Science  
We have also identified a need for further insight into open data barriers and myths, especially on the economic aspects, assumptions, and the gap between use and evaluation.  ...  This is a way to expand the scope of OGD, where we move away from the reported myths surrounding open data. We have also identified a knowledge gap between use and evaluation for barriers.  ...  Myths, for example, [13, 20, 28] are not reused or connected to other OGD barrier research. Research has not revisited the focus on implementation and use from a multi-level perspective [26] .  ... 
doi:10.1007/978-3-319-98690-6_15 fatcat:bsxm4t6e4rbkdenf6prp62bevq

Conceptual Model Notions – A Matter of Controversy: Conceptual Modelling and its Lacunas

Bernhard Thalheim
2018 Enterprise Modelling and Information Systems Architectures - An International Journal  
It has brought a good number of myths similar to those known for software development (see Ambler and Sadalage 2006) : 1. Modelling is mainly for documentation.  ...  Support for reuse. Problems in the application domain considered are more likely to be similar than solutions. Models reuse should therefore be even more promising than code reuse.  ... 
doi:10.18417/ dblp:journals/emisaij/Thalheim18 fatcat:f23wweyo4vgahlttgrwleg2ab4

Behind the help desk

Christine A. Halverson, Thomas Erickson, Mark S. Ackerman
2004 Proceedings of the 2004 ACM conference on Computer supported cooperative work - CSCW '04  
We note how shifts in management, organizational structure, incentives, software technologies, and other factors affected the development of the system.  ...  This paper examines the way in which a knowledge management system (KMS)-by which we mean the people, processes and software-came into being and evolved in response to a variety of shifting social, technical  ...  Cooley's reuse of an existing database to support the process added the shaping of software constraints.  ... 
doi:10.1145/1031607.1031657 dblp:conf/cscw/HalversonEA04 fatcat:fuypaikxqbhlfithzojbgubufq

Software reuse - facts and myths

K.D. Wentzel
Proceedings of 16th International Conference on Software Engineering  
This panel brings together several researchers and practitioners of software reuse to discuss what they see as some of the most important facts and myths about software reuse.  ...  The concept of systematic software reuse is simple: the idea of building and using "software preferred parts."  ...  Software Reuse Myths Revisited Will Tracz Loral Federal Systems Company Owego.  ... 
doi:10.1109/icse.1994.296785 fatcat:gedvlmrffngdpdv2ihhl5p5hya

The Digital Scholar Revisited

M. Weller
2018 The Digital Scholar Philosopher s Lab  
Watters argues that disruption has become somewhat akin to a cultural myth amongst the software industry .  ...  Revisiting Boyer Using these five themes of change in digital scholarship, it is possible to revisit the Boyer categories, and highlight relevant digital scholarship examples for each of the five themes  ... 
doi:10.5840/dspl20181218 fatcat:7rm6dw25zvba5ipjpoy6qyhkia
« Previous Showing results 1 — 15 out of 865 results