The field of software economics seeks to develop technical theories, guidelines, and practices of software development based on sound, established, and emerging models of value and value-creation - adapted to the doma...
详细信息
The field of software economics seeks to develop technical theories, guidelines, and practices of software development based on sound, established, and emerging models of value and value-creation - adapted to the domain of software development as necessary. The premise of the field is that software development is an ongoing investment activity - in which developers and managers continually make investment decisions requiring the expenditure of valuable resources, such as time, talent, and money. The overriding aim of this activity is to maximize the value added subject to an equitable distribution among the participating stakeholders. The goal of the paper is to expose the audience to this line of thinking and introduce the tools pertinent to its pursuit. The paper is designed to be self-contained and will cover concepts from introductory to advanced. Both practitioners and researchers with an interest in the impact of value considerations in software decision-making will benefit from attending it.
Industry often complains that current academic curricula fail to address the practical issues of real software development. This paper outlines a proposal for an innovative core curriculum for a Bachelor of Science in...
Star queries are the most prevalent kind of queries in data warehousing, OLAP and business intelligence applications. Thus, there is an imperative need for efficiently processing star queries. To this end, a new class...
Star queries are the most prevalent kind of queries in data warehousing, OLAP and business intelligence applications. Thus, there is an imperative need for efficiently processing star queries. To this end, a new class of fact table organizations has emerged that exploits path-based surrogate keys in order to hierarchically cluster the fact table data of a star schema [DRSN98, MRB99, KS01]. In the context of these new organizations, star query processing changes radically. In this paper, we present a complete abstract processing plan that captures all the necessary steps in evaluating such queries over hierarchically clustered fact tables. Furthermore, we present optimizations for surrogate key processing and a novel early grouping transformation for grouping on the dimension hierarchies. Our algorithms have been already implemented in a commercial relational database management system (RDBMS) and the experimental evaluation, as well as customer feedback, indicates speedups of orders of magnitude for typical star queries in real world applications.
Multi Agent Based Simulation (MABS) has been used mostly in purely social contexts. However, compared to other approaches, e.g., traditional discrete event simulation, object-oriented simulation and dynamic micro simu...
详细信息
ASIS has proven to be an effective platform for developing various program analysis tools. However, in many cases ASIS, as defined in the ASIS ISO standard, appears to be at a very low-level of abstraction compared to...
详细信息
In 1996, USC switched its core two-semester softwareengineering course from a hypothetical-project, homework-and-exam course based on the Bloom taxonomy of educational objectives (knowledge, comprehension, applicatio...
详细信息
ISBN:
(纸本)9780769510507
In 1996, USC switched its core two-semester softwareengineering course from a hypothetical-project, homework-and-exam course based on the Bloom taxonomy of educational objectives (knowledge, comprehension, application, analysis, synthesis, evaluation). The revised course is a real-client team-project course based on the CRESST model of learning objectives (content understanding, problem solving, collaboration, communication, and self-regulation). We used the CRESST cognitive demands analysis to determine the necessary student skills required for software risk management and the other major project activities, and have been refining the approach over the last four years of experience, including revised versions for one-semester undergraduate and graduate project course at *** paper summarizes our experiences in evolving the risk management aspects of the project course. These have helped us mature more general techniques such as risk-driven specifications, domain specific simplifier and complicator lists, and the schedule as an independent variable (SSIV) process model. The largely positive results in terms of review pass/fail rates, client evaluations, product adoption rates, and hiring manager feedback are summarized as well.
This past October, the Associated Press reported that for over a month hackers effectively penetrated Microsoft's firewall and, potentially, had access to source code for future products. Over the past year, repor...
详细信息
ISBN:
(纸本)0769512127
This past October, the Associated Press reported that for over a month hackers effectively penetrated Microsoft's firewall and, potentially, had access to source code for future products. Over the past year, reported commercial espionage has been increasing steadily. These events underscore the necessary for security engineers to define and implement strong information assurance infrastructures. The concept of defense in depth is used to provide sufficient detection and defensive countermeasures to ensure an enterprise's information is protected. Over the past three years, Harris has conducted research leading to the development of an assurance superstructure tool: the Integrated Design Environment for Assurance (IDEA). Building upon concepts developed during the Network Vulnerability Tool (NVT) program, the IDEA program refined the design and provides a comprehensive assurance analysis superstructure. The IDEA program benifited from the NVT architecture to gain greater adaptive capabilities to address the evolving capabilities of external vulnerability assessment and risk management tools. This re-architected solution builds upon lessons learned during the NVT project.
This paper presents the design and architecture of a prototype implementation of a XML based policy-driven management information server. It also describes the usage of such a server in building a flexible, extensible...
详细信息
In 1996, the University of Southern California (USC) switched its core two-semester softwareengineering course from a hypothetical-project, homework-and-exam course based on the Bloom taxonomy of educational objectiv...
详细信息
ISBN:
(纸本)0769510507
In 1996, the University of Southern California (USC) switched its core two-semester softwareengineering course from a hypothetical-project, homework-and-exam course based on the Bloom taxonomy of educational objectives (knowledge, comprehension, application, analysis, synthesis and evaluation). The revised course is a real-client team-project course based on the CRESST (center for Research on Evaluation, Standards and Student Testing) model of learning objectives (content understanding, problem solving, collaboration, communication and self-regulation). We used the CRESST cognitive demands analysis to determine the necessary student skills required for software risk management and the other major project activities, and have been refining the approach over the last four years of experience, including revised versions for one-semester undergraduate and graduate project courses at Columbia University. This paper summarizes our experiences in evolving the risk management aspects of the project courses. These have helped us mature more general techniques, such as risk-driven specifications, domain-specific simplifier and complicator lists, and the SAIV (schedule as an independent variable) process model. The largely positive results in terms of review pass/fail rates, client evaluations, product adoption rates and hiring manager feedback are summarized as well.
This paper presents the design and architecture of a prototype implementation of a XML based policy-driven management information server. It also describes the usage of such a server in building a flexible, extensible...
详细信息
ISBN:
(纸本)0780367197
This paper presents the design and architecture of a prototype implementation of a XML based policy-driven management information server. It also describes the usage of such a server in building a flexible, extensible architecture for managing heterogeneous distributed systems.
暂无评论