Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Paul Wernick"'
Publikováno v:
Information and Software Technology. 96:126-140
Context In attempt to simulate the factors that affect the software evolution behaviour and possibly predict it, several simulation models have been developed recently. The current system dynamic (SD) simulation model of software evolution process wa
Publikováno v:
Philosophies
Volume 1
Issue 1
Pages 28-39
Volume 1
Issue 1
Pages 28-39
A major, but too-little-considered problem for Software Engineering (SE) is a lack of consensus concerning Computer Science (CS) and how this relates to developing unpredictable computing technology. We consider some implications for SE of computer s
Autor:
Paul Wernick, Bruce Christianson
Publikováno v:
Security Protocols XXIV ISBN: 9783319620329
Security Protocols Workshop
Security Protocols Workshop
Today, the majority of distributed system users are not systems programmers, nor do they aspire to be. The problem with existing access control mechanisms is not that they don’t work, it is that users despise them and will not interact with them in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bb4c32770a931ce524d71488cfcb5262
https://doi.org/10.1007/978-3-319-62033-6_5
https://doi.org/10.1007/978-3-319-62033-6_5
Autor:
Paul Wernick
Publikováno v:
Security Protocols XXV ISBN: 9783319710747
Security Protocols Workshop
Security Protocols Workshop
One of the things that’s come through, particularly in Simon’s and in Virgil and Frank’s work, is that different people might have different perceptions of how secure a system is, and that’s the basis of what I’m going to be talking about.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e52adae5dcdd00cc5ca44d2e8d93ed34
https://doi.org/10.1007/978-3-319-71075-4_8
https://doi.org/10.1007/978-3-319-71075-4_8
Publikováno v:
Security Protocols XXV ISBN: 9783319710747
Security Protocols Workshop
Security Protocols Workshop
Systems complicated enough to have ongoing security issues are difficult to understand, and hard to model. The models are hard to understand, even when they are right (another reason they are usually wrong), and too complicated to use to make decisio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dae63bec1e1670e71d721e1a3515a1ac
https://doi.org/10.1007/978-3-319-71075-4_7
https://doi.org/10.1007/978-3-319-71075-4_7
Publikováno v:
Innovation in Teaching and Learning in Information and Computer Sciences. 10:28-37
Understanding the perception and usage of Computerised Adaptive Testing (CAT) by colleagues in the sector represents an important part of an ongoing research programme into Learner Centred Design (LCD). For this reason, a web survey was published tha
Publikováno v:
Journal of Simulation. 2:91-102
In recent years, simulation modelling of software development processes has attracted considerable interest in software engineering. Despite the growing interest, there is little literature available that reports on the state-of-practice in software
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319206080
HCI (24)
HCI (24)
Sixteen students took a test that included a Flexilevel stage and a standard Computer Based Test (CBT) stage. The results were analysed using a Spearman’s Rank Order correlation and showed a significant positive correlation (rs = 0.58, p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bd4b4dd7bc045d569038bef604972d82
https://doi.org/10.1007/978-3-319-20609-7_26
https://doi.org/10.1007/978-3-319-20609-7_26
Autor:
Paul Wernick, Bruce Christianson
Publikováno v:
Security Protocols XXIII ISBN: 9783319260952
Security Protocols Workshop
Security Protocols Workshop
John Brunner postulates a technology that can record the thoughts and emotions generated by the human brain during sleep, and replay them on demand later for a third party. Isaac Asimov describes a device that can look into the past and display what
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe426c91a12faf69fd8155a97360800d
https://doi.org/10.1007/978-3-319-26096-9_31
https://doi.org/10.1007/978-3-319-26096-9_31
Publikováno v:
Software Evolution and Feedback: Theory and Practice
This paper re-examines the SPE taxonomy of evolving software systems, first proposed in 1980 (Lehman). It builds on the concept that software evolution is related to generic theories of evolution. A refinement of SPE is proposed that has provided a m