Results 1 - 10
of
423
Computational testing : Why, how and how much
- ORSA Journal on Computing
, 1990
"... This considers the issues associated with performing and reporting computational testing in the context of original research in operations research, particularly in its interface with computer science. The scope includes nonnumerical computations, such as fundamental algorithms and information stru ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
and reporting computational testing. At the same time, some principles are given and some are tacitly assumed. Section 2 suggests broad methods of testing, recognizing strengths and weaknesses of each. Finally, Section 3 gives guidelines for how much computational testing is appropriate, depending on why
Volume I: Computer Science and Software Engineering
, 2013
"... Algebraic algorithms deal with numbers, vectors, matrices, polynomials, for-mal power series, exponential and differential polynomials, rational functions, algebraic sets, curves and surfaces. In this vast area, manipulation with matri-ces and polynomials is fundamental for modern computations in Sc ..."
Abstract
- Add to MetaCart
Algebraic algorithms deal with numbers, vectors, matrices, polynomials, for-mal power series, exponential and differential polynomials, rational functions, algebraic sets, curves and surfaces. In this vast area, manipulation with matri-ces and polynomials is fundamental for modern computations in Sciences and
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
reliance on networks as the key feature of social morphology. While networks are old forms of social organization, they are now empowered by new information/communication technologies, so that they become able to cope at the same time with exible decentralization, and with focused decision
The Research Paper, and Why We Should Still Care
"... The Research Paper, and Why We Should Still Care -Brent 1 In this article, I revisit an orphaned child of writing studies-the -research paper.‖ Discussions of the research paper and how we might teach it remain spotty at best in the writing studies literature. There is still little agreement on the ..."
Abstract
- Add to MetaCart
The Research Paper, and Why We Should Still Care -Brent 1 In this article, I revisit an orphaned child of writing studies-the -research paper.‖ Discussions of the research paper and how we might teach it remain spotty at best in the writing studies literature. There is still little agreement
Software Security Engineering in Extreme Programming Methodology: A Systematic Literature Review
, 2013
"... INTRODUCTION Agile methodologies have had an important impact on software development practices in recent years In this paper, we explore both points of view in detail. We also present our own point of view on the existing agile models, methods and systems that have integrated security into XP pra ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
and Future Research Based on this SLR, we can conclude that some researchers do agree that XP is compatible with software security engineering. However, as such research is still at the beginning stages, specific ideas have yet to be proposed. Some researchers, however, do not agree that security elements
See What You Want to See: Motivational Influences on Visual Perception,”
- Journal of Personality and Social Psychology,
, 2006
"... People's motivational states-their wishes and preferences-influence their processing of visual stimuli. In 5 studies, participants shown an ambiguous figure (e.g., one that could be seen either as the letter B or the number 13) tended to report seeing the interpretation that assigned them to o ..."
Abstract
-
Cited by 79 (1 self)
- Add to MetaCart
that arose in psychology during the 1940s and 1950s These initial demonstrations of motivational influences on perception were met with much enthusiasm, which was then followed by withering criticism. To be sure, much of what the New Look theorists proposed has lasted through today and informs contemporary
International Journal of Mechanical Engineering Education 38/2 Learning
"... fi nite element methods by building applications ..."
Software reverse engineering as a sensemaking task (in press).
- Journal of Information Assurance and Security.
, 2012
"... Abstract: Software reverse engineering involves analyzing computer program executables to understand their structure, functionality, and behavior. In this paper, common reverse engineering functions are decomposed to isolate the information-processing and sensemaking subtasks involved. This paper r ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
smaller number of unchecked assumptions than learning about a program from its published application programming interface or even its source code. In this way, reverse engineers can collect observable data about how software actually interfaces with hardware and performs operations. In fact, many people
Extreme Programming and Its Positive Affect on Software Engineering Teams
"... ABSTRACT This paper presents an early empirical study on Extreme Programming (XP) practices employing Positive Affect metric. The study was conducted on university students doing development projects to gain an insight understanding of the effect of using agile practices on software engineering (SE ..."
Abstract
- Add to MetaCart
ABSTRACT This paper presents an early empirical study on Extreme Programming (XP) practices employing Positive Affect metric. The study was conducted on university students doing development projects to gain an insight understanding of the effect of using agile practices on software engineering
Results 1 - 10
of
423