Results 1  10
of
19
Extreme Programming Installed
, 2000
"... There aren't any silver bullets in software development, and there probably never will be. However, Extreme Programming is a simple set of commonsense practices that, when used together, really can give you much of what you just read in the paragraph above. In this book, we tell you what the X ..."
Abstract

Cited by 117 (0 self)
 Add to MetaCart
There aren't any silver bullets in software development, and there probably never will be. However, Extreme Programming is a simple set of commonsense practices that, when used together, really can give you much of what you just read in the paragraph above. In this book, we tell you what the XP practices are, and how to install them in your project.
Growth Strategies
, 2003
"... This is an attempt to derive broad, strategic lessons from the diverse experience with economic growth in last fifty years. The paper revolves around two key arguments. One is that neoclassical economic analysis is a lot more flexible than its practitioners in the policy domain have generally given ..."
Abstract

Cited by 72 (1 self)
 Add to MetaCart
This is an attempt to derive broad, strategic lessons from the diverse experience with economic growth in last fifty years. The paper revolves around two key arguments. One is that neoclassical economic analysis is a lot more flexible than its practitioners in the policy domain have generally given it credit. In particular, firstorder economic principles—protection of property rights, marketbased competition, appropriate incentives, sound money, and so on—do not map into unique policy packages. Reformers have substantial room for creatively packaging these principles into institutional designs that are sensitive to local opportunities and constraints. Successful countries are those that have used this room wisely. The second argument is that igniting economic growth and sustaining it are somewhat different enterprises. The former generally requires a limited range of (often unconventional) reforms that need not overly tax the institutional capacity of the economy. The latter challenge is in many ways harder, as it requires constructing over the longer term a sound institutional underpinning to endow the economy with resilience to shocks and maintain productive dynamism. Ignoring the distinction between these two tasks leaves reformers saddled with impossibly ambitious, undifferentiated, and impractical policy agendas.
Diagrams for solving physical problems
 Diagrammatic reasoning. Menlo Park, CA: AAAI
, 1995
"... wcbulko~ausvml.vnet.ibm.com Solving physics problems usually requires geometric reasoning; a computer problem solver must use a representation that is in some respects equivalent to the use of diagrams by human problem solvers. In this paper, we review the uses of diagrams and geometric reasoning in ..."
Abstract

Cited by 8 (0 self)
 Add to MetaCart
(Show Context)
wcbulko~ausvml.vnet.ibm.com Solving physics problems usually requires geometric reasoning; a computer problem solver must use a representation that is in some respects equivalent to the use of diagrams by human problem solvers. In this paper, we review the uses of diagrams and geometric reasoning in physics problem solving programs. Next, we consider the many roles that diagrams seem to play in human problem solving, the relative strengths and weaknesses of computers and human problem solvers for reasoning with diagramlike representations, and ways in which some of the uses of diagrams by humans might be implemented in computer programs. Geometric Reasoning in ISAAC
Safecracking for the computer scientist
 U. Penn CIS Department Technical Report
, 2004
"... This document contains medium resolution photographs and should be printed in color. This paper is a general survey of safe and vault security from a computer science perspective, with emphasis on the metrics used to evaluate these systems and the weaknesses that cause them to fail. We examine secur ..."
Abstract

Cited by 5 (0 self)
 Add to MetaCart
(Show Context)
This document contains medium resolution photographs and should be printed in color. This paper is a general survey of safe and vault security from a computer science perspective, with emphasis on the metrics used to evaluate these systems and the weaknesses that cause them to fail. We examine security against forced, covert and surreptitious safe opening, focusing on the mechanical combination locks most commonly used on commercial safes in the US. Our analysis contrasts the philosophy and tools of physical security with those of information security, especially where techniques might be profitably applied across these disciplines. 1 Safe and vault security: a computer science perspective There is an undeniable mystique surrounding safes and vaults. Containers to safeguard valuables and secrets from theft and prying eyes have existed almost as long as the concepts of valuables and secrets themselves, and yet in spite of the “Internet age, ” details of safes and the methods used to defeat them remain shrouded in obscurity and even a certain amount of mystery. Safe security is a delicate, almost perilous subject, protected by a near reverence that extends, in our imaginations at least, across both sides of the law. Safecrackers are perhaps the most romantic and “professional ” of thieves, conjuring images of meticulously planned
A student’s guide to research
 IEEE Control Systems Magazine
, 1999
"... Research is the search for new knowledge, and it is thus distinct from the routine application of known results. The "re " in "research " is a misnomer. When you perform research, your goal is to add to human knowledge by discovering, inventing or creating what wa ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
Research is the search for new knowledge, and it is thus distinct from the routine application of known results. The &quot;re &quot; in &quot;research &quot; is a misnomer. When you perform research, your goal is to add to human knowledge by discovering, inventing or creating what was previously unknown.
Operator calculus of differential chains and differential forms. ArXiv eprints
, 2012
"... We describe a topological predual ′B to the Fréchet space of differential forms B defined in an open subset U ⊂ Rn. This proper subspace of currents B ′ has useful properties: Subspaces of finitely supported Dirac chains and polyhedral chains are dense, offering a unification of discrete and contin ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
(Show Context)
We describe a topological predual ′B to the Fréchet space of differential forms B defined in an open subset U ⊂ Rn. This proper subspace of currents B ′ has useful properties: Subspaces of finitely supported Dirac chains and polyhedral chains are dense, offering a unification of discrete and continuum viewpoints. Operators can be defined constructively and geometrically on Dirac chains of arbitrary dimension and dipole order. The operators are continuous, and are thus defined on limits of Dirac chains, including polyhedral chains, submanifolds, stratified sets, and fractals. The operator algebra contains operators predual to exterior derivative, Hodge star, Lie derivative, wedge and interior product on differential forms, yielding simplifications and extensions of the classical integral theorems of calculus including theorems of Stokes, GaussGreen, and KelvinStokes to arbitrary dimension and codimension. The limit chains, called “differential chains ” may be highly irregular, and the differential forms may be discontinuous across the boundary of U. We announce new fundamental theorems for nonsmooth domains and their boundaries evolving in a flow. We close with broad generalizations of the Leibniz integral rule and Reynolds ’ transport theorem. 1
Topics in Theoretical Particle Physics and Cosmology Beyond the Standard Model
, 2008
"... Para Viviana, quien, sin nada de esto, hubiera sido posible (sic) iv If I have not seen as far as others, it is because giants were standing on my shoulders. ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
(Show Context)
Para Viviana, quien, sin nada de esto, hubiera sido posible (sic) iv If I have not seen as far as others, it is because giants were standing on my shoulders.
Operator calculus – the exterior differential complex. submitted
, 2010
"... Abstract. We describe a topological predual to differential forms constructed as an inductive limit of a sequence of Banach spaces. This subspace of currents has nice properties, in that Dirac chains and polyhedral chains are dense, and its operator algebra contains operators predual to exterior der ..."
Abstract

Cited by 1 (1 self)
 Add to MetaCart
Abstract. We describe a topological predual to differential forms constructed as an inductive limit of a sequence of Banach spaces. This subspace of currents has nice properties, in that Dirac chains and polyhedral chains are dense, and its operator algebra contains operators predual to exterior derivative, Hodge star, Lie derivative, and interior product. Using these operators, we establish higher order divergence theorems for net flux of kvector fields across nonsmooth boundaries, Stokes ’ theorem for domains in open sets which are not necessarily regular, and a new fundamental theorem for nonsmooth domains and their boundaries moving in a smooth flow. We close with broad generalizations of the Leibniz integral rule and Reynold’s transport theorem. 1.
The Relative Success of Private Funders And Government Funders in Funding Important Science
"... Regression analysis is used to test the effects of funding source (and of various control variables) on the importance of the article, as measured by the number of citations that the article receives. Funding source is measured by the number of private and the number of government grants mentioned i ..."
Abstract
 Add to MetaCart
Regression analysis is used to test the effects of funding source (and of various control variables) on the importance of the article, as measured by the number of citations that the article receives. Funding source is measured by the number of private and the number of government grants mentioned in the acknowledgements section. The importance of an article is measured by an “early ” count (of citations through October 1992), and a “late ” count (of citations through July 2002). Using either measure of article importance, the evidence suggests that private funders are more successful than the government at identifying important research. 1 I.
Book Review
"... James Gleick is a remarkable individual. An English major at Harvard University, his first adventure after college was an attempt to start up a newspaper. That failed, and he eventually moved into news reporting. He was a staffer for the New York Times for several years, and his rotation among vario ..."
Abstract
 Add to MetaCart
(Show Context)
James Gleick is a remarkable individual. An English major at Harvard University, his first adventure after college was an attempt to start up a newspaper. That failed, and he eventually moved into news reporting. He was a staffer for the New York Times for several years, and his rotation among various jobs at the Times led to his exposure to a good deal of interesting scientific activity. And then Gleick did a noteworthy thing: he synthesized everything that he had been seeing and hearing—the disparate works of Yorke and Feigenbaum and Hubbard and Mandelbrot and others. Gleick realized that the melange he had described was “chaos ” (a word that had already been used in the literature), and he wrote a bestselling book [GLE1] on the subject. Whatever you may think of chaos as a subject (and I happen to think it is little more than a random sequence of ejaculations), it is difficult to gainsay the fact that Gleick’s book has accomplished quite a lot, garnered a good bit of attention for a notable slice of modern scientific activity, and virtually spawned a literary genre (i.e., the current spate of popular scientific writing). Gleick’s